Search Results for author: Ren Wang

Found 16 papers, 6 papers with code

Multi-Trigger-Key: Towards Multi-Task Privacy Preserving In Deep Learning

no code implementations6 Oct 2021 Ren Wang, Zhe Xu, Alfred Hero

Deep learning-based Multi-Task Classification (MTC) is widely used in applications like facial attributes and healthcare that warrant strong privacy guarantees.

Multi-Trigger-Key: Towards Multi-Task Privacy-Preserving In Deep Learning

no code implementations29 Sep 2021 Ren Wang, Zhe Xu, Alfred Hero

Deep learning-based Multi-Task Classification (MTC) is widely used in applications like facial attribute and healthcare that warrant strong privacy guarantees.

Bridging Unsupervised and Supervised Depth from Focus via All-in-Focus Supervision

1 code implementation ICCV 2021 Ning-Hsu Wang, Ren Wang, Yu-Lun Liu, Yu-Hao Huang, Yu-Lin Chang, Chia-Ping Chen, Kevin Jou

In this paper, we propose a method to estimate not only a depth map but an AiF image from a set of images with different focus positions (known as a focal stack).

Depth Estimation

Deep Adversarially-Enhanced k-Nearest Neighbors

no code implementations15 Aug 2021 Ren Wang, Tianqi Chen, Alfred Hero

Recent works have theoretically and empirically shown that deep neural networks (DNNs) have an inherent vulnerability to small perturbations.

Immuno-mimetic Deep Neural Networks (Immuno-Net)

no code implementations27 Jun 2021 Ren Wang, Tianqi Chen, Stephen Lindsly, Cooper Stansbury, Indika Rajapakse, Alfred Hero

This immuno-mimetic model leads to a new computational biology framework for robustification of deep neural networks against adversarial attacks.

Image Classification

RAILS: A Robust Adversarial Immune-inspired Learning System

1 code implementation27 Jun 2021 Ren Wang, Tianqi Chen, Stephen Lindsly, Cooper Stansbury, Alnawaz Rehemtulla, Indika Rajapakse, Alfred Hero

Initializing a population of exemplars that is balanced across classes, RAILS starts from a uniform label distribution that encourages diversity and uses an evolutionary optimization process to adaptively adjust the predictive label distribution in a manner that emulates the way the natural immune system recognizes novel pathogens.

Adversarial Defense Adversarial Robustness +1

ASK: Adversarial Soft k-Nearest Neighbor Attack and Defense

1 code implementation27 Jun 2021 Ren Wang, Tianqi Chen, Philip Yao, Sijia Liu, Indika Rajapakse, Alfred Hero

K-Nearest Neighbor (kNN)-based deep learning methods have been applied to many applications due to their simplicity and geometric interpretability.

On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning

1 code implementation ICLR 2021 Ren Wang, Kaidi Xu, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Chuang Gan, Meng Wang

Despite the generalization power of the meta-model, it remains elusive that how adversarial robustness can be maintained by MAML in few-shot learning.

Adversarial Attack Adversarial Robustness +3

RAILS: A Robust Adversarial Immune-inspired Learning System

no code implementations18 Dec 2020 Ren Wang, Tianqi Chen, Stephen Lindsly, Alnawaz Rehemtulla, Alfred Hero, Indika Rajapakse

RAILS incorporates an Adaptive Immune System Emulation (AISE), which emulates in silico the biological mechanisms that are used to defend the host against attacks by pathogens.

Adversarial Defense Image Classification

Explorable Tone Mapping Operators

no code implementations20 Oct 2020 Chien-Chuan Su, Ren Wang, Hung-Jin Lin, Yu-Lun Liu, Chia-Ping Chen, Yu-Lin Chang, Soo-Chang Pei

It aims to preserve visual information of HDR images in a medium with a limited dynamic range.

Tone Mapping

Singular equivalences induced by bimodules and quadratic monomial algebras

no code implementations20 Sep 2020 Xiao-Wu Chen, Jian Liu, Ren Wang

We investigate the problem when the tensor functor by a bimodule yields a singular equivalence.

Representation Theory Rings and Algebras 18G80, 16E45, 16D20, 16G20

Learning Camera-Aware Noise Models

1 code implementation ECCV 2020 Ke-Chi Chang, Ren Wang, Hung-Jin Lin, Yu-Lun Liu, Chia-Ping Chen, Yu-Lin Chang, Hwann-Tzong Chen

Modeling imaging sensor noise is a fundamental problem for image processing and computer vision applications.

Noise Estimation

Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases

1 code implementation ECCV 2020 Ren Wang, Gaoyuan Zhang, Sijia Liu, Pin-Yu Chen, JinJun Xiong, Meng Wang

When the training data are maliciously tampered, the predictions of the acquired deep neural network (DNN) can be manipulated by an adversary known as the Trojan attack (or poisoning backdoor attack).

Backdoor Attack

IOCA: High-Speed I/O-Aware LLC Management for Network-Centric Multi-Tenant Platform

no code implementations9 Jul 2020 Yifan Yuan, Mohammad Alian, Yipeng Wang, Ilia Kurakin, Ren Wang, Charlie Tai, Nam Sung Kim

In this paper, we argue that besides CPU cores, high-speed network I/O is also important for LLC management.

Hardware Architecture Operating Systems

Tensor Recovery from Noisy and Multi-Level Quantized Measurements

no code implementations5 Dec 2019 Ren Wang, Meng Wang, JinJun Xiong

Existing works on tensor recovery have focused on data losses and random noises.

Quantization

SCG: Spotting Coordinated Groups in Social Media

no code implementations16 Oct 2019 Junhao Wang, Sacha Levy, Ren Wang, Aayushi Kulshrestha, Reihaneh Rabbany

Recent events have led to a burgeoning awareness on the misuse of social media sites to affect political events, sway public opinion, and confuse the voters.

Fake News Detection Misinformation

Cannot find the paper you are looking for? You can Submit a new open access paper.