no code implementations • 18 Nov 2024 • Ding Zhang, Jane Downer, Can Chen, Ren Wang
Graph classification is essential for understanding complex biological systems, where molecular structures and interactions are naturally represented as graphs.
no code implementations • 12 Jul 2024 • Ren Wang, YuXuan Li, Alfred Hero
Deep learning models have shown considerable vulnerability to adversarial attacks, particularly as attacker strategies become more sophisticated.
1 code implementation • 9 Jun 2024 • Wei Li, Pin-Yu Chen, Sijia Liu, Ren Wang
PSBD is motivated by an intriguing Prediction Shift (PS) phenomenon, where poisoned models' predictions on clean data often shift away from true labels towards certain other labels with dropout applied during inference, while backdoor samples exhibit less PS.
no code implementations • 26 Mar 2024 • Jane Downer, Ren Wang, Binghui Wang
Graph Neural Networks (GNNs) have gained popularity in numerous domains, yet they are vulnerable to backdoor attacks that can compromise their performance and ethical application.
1 code implementation • 15 Mar 2024 • Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu
Based on this, we pose the backdoor data identification problem as a hierarchical data splitting optimization problem, leveraging a novel SPC-based loss function as the primary optimization objective.
no code implementations • 22 Feb 2024 • Zhiyuan Wang, Jinhao Duan, Chenxi Yuan, Qingyu Chen, Tianlong Chen, Yue Zhang, Ren Wang, Xiaoshuang Shi, Kaidi Xu
Uncertainty estimation is crucial for the reliability of safety-critical human and artificial intelligence (AI) interaction systems, particularly in the domain of healthcare engineering.
no code implementations • 21 Nov 2023 • Ren Wang, Ming Zhong, Kaidi Xu, Lola Giráldez Sánchez-Cortés, Ignacio de Cominges Guerra
This paper addresses the challenge of transient stability in power systems with missing parameters and uncertainty propagation in swing equations.
no code implementations • 15 Oct 2023 • Yuxiu Lin, Hui Liu, Ren Wang, Qiang Guo, Caiming Zhang
i) The parameter scale of the FC layer is quadratic to sample numbers, resulting in high time and memory costs that significantly degrade their feasibility in large-scale datasets.
1 code implementation • 14 Jun 2023 • Ren Wang, Haoliang Sun, Qi Wei, Xiushan Nie, Yuling Ma, Yilong Yin
The key idea is to first break the rote memories by network pruning to address memorization overfitting in the inner loop, and then the gradients of pruned sub-networks naturally form the high-quality augmentation of the meta-gradient to alleviate learner overfitting in the outer loop.
1 code implementation • 17 Mar 2023 • Ren Wang, YuXuan Li, Sijia Liu
Adversarial robustness is a key concept in measuring the ability of neural networks to defend against adversarial attacks during the inference phase.
no code implementations • CVPR 2023 • Ren Wang, Haoliang Sun, Yuling Ma, Xiaoming Xi, Yilong Yin
To overcome them, we propose a novel bi-level-optimization-based multi-view learning framework, where the representation is learned in a uniform-to-specific manner.
no code implementations • CVPR 2023 • Qi Wei, Lei Feng, Haoliang Sun, Ren Wang, Chenhui Guo, Yilong Yin
To this end, we propose a novel framework called stochastic noise-tolerated supervised contrastive learning (SNSCL) that confronts label noise by encouraging distinguishable representation.
no code implementations • 20 Jan 2023 • Soumyadeep Pal, Ren Wang, Yuguang Yao, Sijia Liu
In this paper, we explore the potential of self-training via additional unlabeled data for mitigating backdoor attacks.
no code implementations • 7 Nov 2022 • Jianing Bai, Ren Wang, Zuyi Li
The advances in deep learning (DL) techniques have the potential to deliver transformative technological breakthroughs to numerous complex tasks in modern power systems that suffer from increasing uncertainty and nonlinearity.
no code implementations • 1 Oct 2022 • Binghao Liu, Boyu Yang, Lingxi Xie, Ren Wang, Qi Tian, Qixiang Ye
LDC is built upon a parameterized calibration unit (PCU), which initializes biased distributions for all classes based on classifier vectors (memory-free) and a single covariance matrix.
class-incremental learning Few-Shot Class-Incremental Learning +3
no code implementations • 6 Oct 2021 • Ren Wang, Zhe Xu, Alfred Hero
Deep learning-based Multi-Task Classification (MTC) is widely used in applications like facial attributes and healthcare that warrant strong privacy guarantees.
no code implementations • 29 Sep 2021 • Ren Wang, Zhe Xu, Alfred Hero
Deep learning-based Multi-Task Classification (MTC) is widely used in applications like facial attribute and healthcare that warrant strong privacy guarantees.
1 code implementation • ICCV 2021 • Ning-Hsu Wang, Ren Wang, Yu-Lun Liu, Yu-Hao Huang, Yu-Lin Chang, Chia-Ping Chen, Kevin Jou
In this paper, we propose a method to estimate not only a depth map but an AiF image from a set of images with different focus positions (known as a focal stack).
no code implementations • 15 Aug 2021 • Ren Wang, Tianqi Chen, Alfred Hero
Recent works have theoretically and empirically shown that deep neural networks (DNNs) have an inherent vulnerability to small perturbations.
no code implementations • 27 Jun 2021 • Ren Wang, Tianqi Chen, Stephen Lindsly, Cooper Stansbury, Indika Rajapakse, Alfred Hero
This immuno-mimetic model leads to a new computational biology framework for robustification of deep neural networks against adversarial attacks.
1 code implementation • 27 Jun 2021 • Ren Wang, Tianqi Chen, Philip Yao, Sijia Liu, Indika Rajapakse, Alfred Hero
K-Nearest Neighbor (kNN)-based deep learning methods have been applied to many applications due to their simplicity and geometric interpretability.
1 code implementation • 27 Jun 2021 • Ren Wang, Tianqi Chen, Stephen Lindsly, Cooper Stansbury, Alnawaz Rehemtulla, Indika Rajapakse, Alfred Hero
Initializing a population of exemplars that is balanced across classes, RAILS starts from a uniform label distribution that encourages diversity and uses an evolutionary optimization process to adaptively adjust the predictive label distribution in a manner that emulates the way the natural immune system recognizes novel pathogens.
1 code implementation • ICLR 2021 • Ren Wang, Kaidi Xu, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Chuang Gan, Meng Wang
Despite the generalization power of the meta-model, it remains elusive that how adversarial robustness can be maintained by MAML in few-shot learning.
no code implementations • 18 Dec 2020 • Ren Wang, Tianqi Chen, Stephen Lindsly, Alnawaz Rehemtulla, Alfred Hero, Indika Rajapakse
RAILS incorporates an Adaptive Immune System Emulation (AISE), which emulates in silico the biological mechanisms that are used to defend the host against attacks by pathogens.
no code implementations • 20 Oct 2020 • Chien-Chuan Su, Ren Wang, Hung-Jin Lin, Yu-Lun Liu, Chia-Ping Chen, Yu-Lin Chang, Soo-Chang Pei
It aims to preserve visual information of HDR images in a medium with a limited dynamic range.
no code implementations • 20 Sep 2020 • Xiao-Wu Chen, Jian Liu, Ren Wang
We investigate the problem when the tensor functor by a bimodule yields a singular equivalence.
Representation Theory Rings and Algebras 18G80, 16E45, 16D20, 16G20
1 code implementation • ECCV 2020 • Ke-Chi Chang, Ren Wang, Hung-Jin Lin, Yu-Lun Liu, Chia-Ping Chen, Yu-Lin Chang, Hwann-Tzong Chen
Modeling imaging sensor noise is a fundamental problem for image processing and computer vision applications.
1 code implementation • ECCV 2020 • Ren Wang, Gaoyuan Zhang, Sijia Liu, Pin-Yu Chen, JinJun Xiong, Meng Wang
When the training data are maliciously tampered, the predictions of the acquired deep neural network (DNN) can be manipulated by an adversary known as the Trojan attack (or poisoning backdoor attack).
no code implementations • 9 Jul 2020 • Yifan Yuan, Mohammad Alian, Yipeng Wang, Ilia Kurakin, Ren Wang, Charlie Tai, Nam Sung Kim
In this paper, we argue that besides CPU cores, high-speed network I/O is also important for LLC management.
Hardware Architecture Operating Systems
no code implementations • 5 Dec 2019 • Ren Wang, Meng Wang, JinJun Xiong
Existing works on tensor recovery have focused on data losses and random noises.
no code implementations • 16 Oct 2019 • Junhao Wang, Sacha Levy, Ren Wang, Aayushi Kulshrestha, Reihaneh Rabbany
Recent events have led to a burgeoning awareness on the misuse of social media sites to affect political events, sway public opinion, and confuse the voters.