no code implementations • 28 Nov 2024 • Yutong Zhang, Lixing Chen, Shenghong Li, Nan Cao, Yang Shi, Jiaxin Ding, Zhe Qu, Pan Zhou, Yang Bai
The former retrieves question-relevant domain knowledge from DKG and uses it to prompt LLM to enhance the reasoning capability for domain-specific tasks; the latter leverages LLM to generate new domain knowledge from processed tasks and use it to evolve DKG.
1 code implementation • 13 Jun 2023 • Zhicong Yan, Shenghong Li, Ruijie Zhao, Yuan Tian, YuanYuan Zhao
Instead of the staged pipeline, the DHBE treats the backdoor erasing task as a unified adversarial procedure, which seeks equilibrium between two different competing processes: distillation and backdoor regularization.
1 code implementation • 3 May 2023 • Yulong Wang, Tianxiang Li, Shenghong Li, Xin Yuan, Wei Ni
Deep Neural Networks (DNNs) are vulnerable to adversarial examples, while adversarial attack models, e. g., DeepFool, are on the rise and outrunning adversarial example detection techniques.
no code implementations • 11 Mar 2023 • Yulong Wang, Tong Sun, Shenghong Li, Xin Yuan, Wei Ni, Ekram Hossain, H. Vincent Poor
This survey provides a comprehensive overview of the recent advancements in the field of adversarial attack and defense techniques, with a focus on deep neural network-based classification models.
no code implementations • 19 Aug 2022 • Yulong Wang, Minghui Zhao, Shenghong Li, Xin Yuan, Wei Ni
In this paper, we propose a new backdoor trigger, which is easy to generate, imperceptible, and highly effective.
no code implementations • 14 May 2022 • David Ahmedt-Aristizabal, Chuong Nguyen, Lachlan Tychsen-Smith, Ashley Stacey, Shenghong Li, Joseph Pathikulangara, Lars Petersson, Dadong Wang
A modular camera rig arranged in a cylindrical configuration was designed to automatically capture images of the entire skin surface of a subject synchronously from multiple angles.
no code implementations • 3 Nov 2021 • Yulong Wang, Shenghong Li, Wei Ni, David Abbott, Mark Johnson, Guangyu Pei, Mark Hedley
We propose an efficient approach to solve the corresponding permutation combinatorial optimization problem, which integrates continuous space cooperative localization and permutation space likelihood ascent search.
no code implementations • 15 Mar 2021 • Ge Ren, Jun Wu, Gaolei Li, Shenghong Li
The smartphone and laptop can be unlocked by face or fingerprint recognition, while neural networks which confront numerous requests every day have little capability to distinguish between untrustworthy and credible users.
no code implementations • 29 Dec 2020 • Qianqian Pan, Jun Wu, Xi Zheng, Jianhua Li, Shenghong Li, Athanasios V. Vasilakos
The ever-increasing data traffic, various delay-sensitive services, and the massive deployment of energy-limited Internet of Things (IoT) devices have brought huge challenges to the current communication networks, motivating academia and industry to move to the sixth-generation (6G) network.
no code implementations • 24 May 2020 • Jinchao Huang, Guofu Li, Zhicong Yan, Fucai Luo, Shenghong Li
The extra trust brought by the model interpretation has made it an indispensable part of machine learning systems.
1 code implementation • 15 Jul 2013 • Hao Lou, Shenghong Li, Yuxin Zhao
In label update, a node adopts the label that has the maximum weighted-CNP instead of the one that is shared by most of its neighbors.