Search Results for author: Ren Wang

Found 23 papers, 8 papers with code

Improving Generalization in Meta-Learning via Meta-Gradient Augmentation

1 code implementation14 Jun 2023 Ren Wang, Haoliang Sun, Qi Wei, Xiushan Nie, Yuling Ma, Yilong Yin

The key idea is to first break the rote memories by network pruning to address memorization overfitting in the inner loop, and then the gradients of pruned sub-networks naturally form the high-quality augmentation of the meta-gradient to alleviate learner overfitting in the outer loop.

Few-Shot Learning Memorization +1

Robust Mode Connectivity-Oriented Adversarial Defense: Enhancing Neural Network Robustness Against Diversified $\ell_p$ Attacks

1 code implementation17 Mar 2023 Ren Wang, YuXuan Li, Sijia Liu

Adversarial robustness is a key concept in measuring the ability of neural networks to defend against adversarial attacks during the inference phase.

Adversarial Defense Adversarial Robustness

MetaViewer: Towards A Unified Multi-View Representation

no code implementations CVPR 2023 Ren Wang, Haoliang Sun, Yuling Ma, Xiaoming Xi, Yilong Yin

To overcome them, we propose a novel bi-level-optimization-based multi-view learning framework, where the representation is learned in a uniform-to-specific manner.

MULTI-VIEW LEARNING Representation Learning

Fine-Grained Classification with Noisy Labels

no code implementations CVPR 2023 Qi Wei, Lei Feng, Haoliang Sun, Ren Wang, Chenhui Guo, Yilong Yin

To this end, we propose a novel framework called stochastic noise-tolerated supervised contrastive learning (SNSCL) that confronts label noise by encouraging distinguishable representation.

Classification Contrastive Learning +1

Towards Understanding How Self-training Tolerates Data Backdoor Poisoning

no code implementations20 Jan 2023 Soumyadeep Pal, Ren Wang, Yuguang Yao, Sijia Liu

In this paper, we explore the potential of self-training via additional unlabeled data for mitigating backdoor attacks.

backdoor defense Representation Learning

Physics-Constrained Backdoor Attacks on Power System Fault Localization

no code implementations7 Nov 2022 Jianing Bai, Ren Wang, Zuyi Li

The advances in deep learning (DL) techniques have the potential to deliver transformative technological breakthroughs to numerous complex tasks in modern power systems that suffer from increasing uncertainty and nonlinearity.

Fault localization

Learnable Distribution Calibration for Few-Shot Class-Incremental Learning

no code implementations1 Oct 2022 Binghao Liu, Boyu Yang, Lingxi Xie, Ren Wang, Qi Tian, Qixiang Ye

LDC is built upon a parameterized calibration unit (PCU), which initializes biased distributions for all classes based on classifier vectors (memory-free) and a single covariance matrix.

class-incremental learning Few-Shot Class-Incremental Learning +3

Multi-Trigger-Key: Towards Multi-Task Privacy Preserving In Deep Learning

no code implementations6 Oct 2021 Ren Wang, Zhe Xu, Alfred Hero

Deep learning-based Multi-Task Classification (MTC) is widely used in applications like facial attributes and healthcare that warrant strong privacy guarantees.

Privacy Preserving

Multi-Trigger-Key: Towards Multi-Task Privacy-Preserving In Deep Learning

no code implementations29 Sep 2021 Ren Wang, Zhe Xu, Alfred Hero

Deep learning-based Multi-Task Classification (MTC) is widely used in applications like facial attribute and healthcare that warrant strong privacy guarantees.

Privacy Preserving

Bridging Unsupervised and Supervised Depth from Focus via All-in-Focus Supervision

1 code implementation ICCV 2021 Ning-Hsu Wang, Ren Wang, Yu-Lun Liu, Yu-Hao Huang, Yu-Lin Chang, Chia-Ping Chen, Kevin Jou

In this paper, we propose a method to estimate not only a depth map but an AiF image from a set of images with different focus positions (known as a focal stack).

Depth Estimation

Deep Adversarially-Enhanced k-Nearest Neighbors

no code implementations15 Aug 2021 Ren Wang, Tianqi Chen, Alfred Hero

Recent works have theoretically and empirically shown that deep neural networks (DNNs) have an inherent vulnerability to small perturbations.

ASK: Adversarial Soft k-Nearest Neighbor Attack and Defense

1 code implementation27 Jun 2021 Ren Wang, Tianqi Chen, Philip Yao, Sijia Liu, Indika Rajapakse, Alfred Hero

K-Nearest Neighbor (kNN)-based deep learning methods have been applied to many applications due to their simplicity and geometric interpretability.

Immuno-mimetic Deep Neural Networks (Immuno-Net)

no code implementations27 Jun 2021 Ren Wang, Tianqi Chen, Stephen Lindsly, Cooper Stansbury, Indika Rajapakse, Alfred Hero

This immuno-mimetic model leads to a new computational biology framework for robustification of deep neural networks against adversarial attacks.

Image Classification

RAILS: A Robust Adversarial Immune-inspired Learning System

1 code implementation27 Jun 2021 Ren Wang, Tianqi Chen, Stephen Lindsly, Cooper Stansbury, Alnawaz Rehemtulla, Indika Rajapakse, Alfred Hero

Initializing a population of exemplars that is balanced across classes, RAILS starts from a uniform label distribution that encourages diversity and uses an evolutionary optimization process to adaptively adjust the predictive label distribution in a manner that emulates the way the natural immune system recognizes novel pathogens.

Adversarial Defense Adversarial Robustness +2

On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning

1 code implementation ICLR 2021 Ren Wang, Kaidi Xu, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Chuang Gan, Meng Wang

Despite the generalization power of the meta-model, it remains elusive that how adversarial robustness can be maintained by MAML in few-shot learning.

Adversarial Attack Adversarial Robustness +3

RAILS: A Robust Adversarial Immune-inspired Learning System

no code implementations18 Dec 2020 Ren Wang, Tianqi Chen, Stephen Lindsly, Alnawaz Rehemtulla, Alfred Hero, Indika Rajapakse

RAILS incorporates an Adaptive Immune System Emulation (AISE), which emulates in silico the biological mechanisms that are used to defend the host against attacks by pathogens.

Adversarial Defense Image Classification

Explorable Tone Mapping Operators

no code implementations20 Oct 2020 Chien-Chuan Su, Ren Wang, Hung-Jin Lin, Yu-Lun Liu, Chia-Ping Chen, Yu-Lin Chang, Soo-Chang Pei

It aims to preserve visual information of HDR images in a medium with a limited dynamic range.

Tone Mapping

Singular equivalences induced by bimodules and quadratic monomial algebras

no code implementations20 Sep 2020 Xiao-Wu Chen, Jian Liu, Ren Wang

We investigate the problem when the tensor functor by a bimodule yields a singular equivalence.

Representation Theory Rings and Algebras 18G80, 16E45, 16D20, 16G20

Learning Camera-Aware Noise Models

1 code implementation ECCV 2020 Ke-Chi Chang, Ren Wang, Hung-Jin Lin, Yu-Lun Liu, Chia-Ping Chen, Yu-Lin Chang, Hwann-Tzong Chen

Modeling imaging sensor noise is a fundamental problem for image processing and computer vision applications.

Noise Estimation

Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases

1 code implementation ECCV 2020 Ren Wang, Gaoyuan Zhang, Sijia Liu, Pin-Yu Chen, JinJun Xiong, Meng Wang

When the training data are maliciously tampered, the predictions of the acquired deep neural network (DNN) can be manipulated by an adversary known as the Trojan attack (or poisoning backdoor attack).

Backdoor Attack

IOCA: High-Speed I/O-Aware LLC Management for Network-Centric Multi-Tenant Platform

no code implementations9 Jul 2020 Yifan Yuan, Mohammad Alian, Yipeng Wang, Ilia Kurakin, Ren Wang, Charlie Tai, Nam Sung Kim

In this paper, we argue that besides CPU cores, high-speed network I/O is also important for LLC management.

Hardware Architecture Operating Systems

Tensor Recovery from Noisy and Multi-Level Quantized Measurements

no code implementations5 Dec 2019 Ren Wang, Meng Wang, JinJun Xiong

Existing works on tensor recovery have focused on data losses and random noises.


SCG: Spotting Coordinated Groups in Social Media

no code implementations16 Oct 2019 Junhao Wang, Sacha Levy, Ren Wang, Aayushi Kulshrestha, Reihaneh Rabbany

Recent events have led to a burgeoning awareness on the misuse of social media sites to affect political events, sway public opinion, and confuse the voters.

Fake News Detection Misinformation

Cannot find the paper you are looking for? You can Submit a new open access paper.