no code implementations • ACL 2022 • Kunyuan Pang, Haoyu Zhang, Jie zhou, Ting Wang
In this work, we propose a clustering-based loss correction framework named Feature Cluster Loss Correction (FCLC), to address these two problems.
no code implementations • Findings (EMNLP) 2021 • Yi Feng, Ting Wang, Chuanyi Li, Vincent Ng, Jidong Ge, Bin Luo, Yucheng Hu, Xiaopeng Zhang
User targeting is an essential task in the modern advertising industry: given a package of ads for a particular category of products (e. g., green tea), identify the online users to whom the ad package should be targeted.
no code implementations • 24 May 2022 • Zhiwei Ling, Zhihao Yue, Jun Xia, Ming Hu, Ting Wang, Mingsong Chen
Along with the popularity of Artificial Intelligence (AI) and Internet-of-Things (IoT), Federated Learning (FL) has attracted steadily increasing attentions as a promising distributed machine learning paradigm, which enables the training of a central model on for numerous decentralized devices without exposing their privacy.
no code implementations • 13 May 2022 • Yisheng Song, Ting Wang, Subrota K Mondal, Jyoti Prakash Sahoo
Few-shot learning (FSL) has emerged as an effective learning method and shows great potential.
1 code implementation • 9 May 2022 • Zhihao Yue, Jun Xia, Zhiwei Ling, Ming Hu, Ting Wang, Xian Wei, Mingsong Chen
Due to the popularity of Artificial Intelligence (AI) techniques, we are witnessing an increasing number of backdoor injection attacks that are designed to maliciously threaten Deep Neural Networks (DNNs) causing misclassification.
1 code implementation • 21 Apr 2022 • Jun Xia, Ting Wang, Jiepin Ding, Xian Wei, Mingsong Chen
Due to the prosperity of Artificial Intelligence (AI) techniques, more and more backdoors are designed by adversaries to attack Deep Neural Networks (DNNs). Although the state-of-the-art method Neural Attention Distillation (NAD) can effectively erase backdoor triggers from DNNs, it still suffers from non-negligible Attack Success Rate (ASR) together with lowered classification ACCuracy (ACC), since NAD focuses on backdoor defense using attention features (i. e., attention maps) of the same order.
no code implementations • 7 Apr 2022 • Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang
To bridge this critical gap, we conduct the first large-scale systematic empirical study of transfer attacks against major cloud-based MLaaS platforms, taking the components of a real transfer attack into account.
1 code implementation • 29 Mar 2022 • Peng Yang, Yuning Jiang, Ting Wang, Yong Zhou, Yuanming Shi, Colin N. Jones
To address this issue, in this paper, we instead propose a novel over-the-air second-order federated optimization algorithm to simultaneously reduce the communication rounds and enable low-latency global model aggregation.
no code implementations • 17 Mar 2022 • Fuzhou Gong, Ting Wang
In this paper, we propose and study a novel continuous-time model, based on the well-known constant elasticity of variance (CEV) model, to describe the asset price process.
no code implementations • 28 Feb 2022 • Bo Li, Ting Wang, Peng Yang, Mingsong Chen, Shui Yu, Mounir Hamdi
To support the needs of ever-growing cloud-based services, the number of servers and network devices in data centers is increasing exponentially, which in turn results in high complexities and difficulties in network optimization.
no code implementations • 22 Feb 2022 • Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang
Facial Liveness Verification (FLV) is widely used for identity authentication in many security-sensitive domains and offered as Platform-as-a-Service (PaaS) by leading cloud vendors.
no code implementations • 29 Jan 2022 • Tian Liu, Jiahao Ding, Ting Wang, Miao Pan, Mingsong Chen
However, since our grouping method is based on the similarity of extracted feature maps from IoT devices, it may incur additional risks of privacy exposure.
no code implementations • 24 Dec 2021 • Haibo Jin, Ruoxi Chen, Jinyin Chen, Yao Cheng, Chong Fu, Ting Wang, Yue Yu, Zhaoyan Ming
Existing DNN testing methods are mainly designed to find incorrect corner case behaviors in adversarial settings but fail to discover the backdoors crafted by strong trojan attacks.
no code implementations • 11 Dec 2021 • Muchao Ye, Junyu Luo, Guanjie Zheng, Cao Xiao, Ting Wang, Fenglong Ma
Deep neural networks (DNNs) have been broadly adopted in health risk prediction to provide healthcare diagnoses and treatments.
no code implementations • 24 Nov 2021 • Shiqi Liu, Lu Wang, Jie Lian, Ting Chen, Cong Liu, Xuchen Zhan, Jintao Lu, Jie Liu, Ting Wang, Dong Geng, Hongwei Duan, Yuze Tian
Relative radiometric normalization(RRN) of different satellite images of the same terrain is necessary for change detection, object classification/segmentation, and map-making tasks.
1 code implementation • 22 Nov 2021 • Tong Wang, Yuan YAO, Feng Xu, Shengwei An, Hanghang Tong, Ting Wang
We also evaluate FTROJAN against state-of-the-art defenses as well as several adaptive defenses that are designed on the frequency domain.
no code implementations • 30 Oct 2021 • Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang
However, a pre-trained model with backdoor can be a severe threat to the applications.
1 code implementation • 12 Oct 2021 • Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang
Neural Architecture Search (NAS) represents an emerging machine learning (ML) paradigm that automatically searches for models tailored to given tasks, which greatly simplifies the development of ML systems and propels the trend of ML democratization.
no code implementations • 25 Jan 2021 • Min Fu, Yong Zhou, Yuanming Shi, Ting Wang, Wei Chen
Over-the-air computation (AirComp) provides a promising way to support ultrafast aggregation of distributed data.
Optimize the trajectory of UAV which plays a BS in communication system
no code implementations • 22 Jan 2021 • Xinyang Zhang, Ren Pang, Shouling Ji, Fenglong Ma, Ting Wang
Providing explanations for deep neural networks (DNNs) is essential for their use in domains wherein the interpretability of decisions is a critical prerequisite.
no code implementations • 1 Jan 2021 • Xinyang Zhang, Zheng Zhang, Ting Wang
One intriguing property of deep neural networks (DNNs) is their vulnerability to adversarial perturbations.
1 code implementation • 16 Dec 2020 • Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Ting Wang
To bridge this gap, we design and implement TROJANZOO, the first open-source platform for evaluating neural backdoor attacks/defenses in a unified, holistic, and practical manner.
no code implementations • 10 Dec 2020 • Ting Wang, Zongkai Wu, Donglin Wang
In the training phase, we first locate the generalization problem to the visual perception module, and then compare two meta-learning algorithms for better generalization in seen and unseen environments.
1 code implementation • 5 Oct 2020 • Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang
We hope that our findings can shed light on reliable fuzzing evaluation, so that we can discover promising fuzzing primitives to effectively facilitate fuzzer designs in the future.
Cryptography and Security
1 code implementation • 1 Aug 2020 • Xinyang Zhang, Zheng Zhang, Shouling Ji, Ting Wang
Recent years have witnessed the emergence of a new paradigm of building natural language processing (NLP) systems: general-purpose, pre-trained language models (LMs) are composed with simple downstream models and fine-tuned for a variety of NLP tasks.
1 code implementation • 21 Jun 2020 • Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang
One intriguing property of deep neural networks (DNNs) is their inherent vulnerability to backdoor attacks -- a trojan model responds to trigger-embedded inputs in a highly predictable manner while functioning normally otherwise.
1 code implementation • 16 Jun 2020 • Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang
Deep neural networks (DNNs) are inherently susceptible to adversarial attacks even under black-box settings, in which the adversary only has query access to the target models.
no code implementations • 24 Mar 2020 • Junfeng Guo, Ting Wang, Cong Liu
Being able to detect and mitigate poisoning attacks, typically categorized into backdoor and adversarial poisoning (AP), is critical in enabling safe adoption of DNNs in many application domains.
1 code implementation • 24 Mar 2020 • Ting Wang, Yingjin Ma, Lian Zhao, Jinrong Jiang
In this work, we present an efficient procedure for constructing CI expansions from MPS using the Charm++ parallel programming framework, upon which automatic load balancing and object migration facilities can be employed.
Computational Physics Strongly Correlated Electrons
1 code implementation • 5 Nov 2019 • Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, Ting Wang
Specifically, (i) we develop a new attack model that jointly optimizes adversarial inputs and poisoned models; (ii) with both analytical and empirical evidence, we reveal that there exist intriguing "mutual reinforcement" effects between the two attack vectors -- leveraging one vector significantly amplifies the effectiveness of the other; (iii) we demonstrate that such effects enable a large design spectrum for the adversary to enhance the existing attacks that exploit both vectors (e. g., backdoor attacks), such as maximizing the attack evasiveness with respect to various detection methods; (iv) finally, we discuss potential countermeasures against such optimized attacks and their technical challenges, pointing to several promising research directions.
no code implementations • ICLR 2019 • Xinyang Zhang, Yifan Huang, Chanh Nguyen, Shouling Ji, Ting Wang
On the possibility side, we show that it is still feasible to construct adversarial training methods to significantly improve the resilience of networks against adversarial inputs over empirical datasets.
no code implementations • 23 Jan 2019 • Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah
Despite their immense popularity, deep learning-based acoustic systems are inherently vulnerable to adversarial attacks, wherein maliciously crafted audios trigger target systems to misbehave.
Cryptography and Security
1 code implementation • 13 Dec 2018 • Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li, Ting Wang
Deep Learning-based Text Understanding (DLTU) is the backbone technique behind various applications, including question answering, machine translation, and text classification.
no code implementations • 3 Dec 2018 • Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang
The improved interpretability is believed to offer a sense of security by involving human in the decision-making process.
no code implementations • 2 Dec 2018 • Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang
By empirically studying four deep learning systems (including both individual and ensemble systems) used in skin cancer screening, speech recognition, face verification, and autonomous steering, we show that such attacks are (i) effective - the host systems misbehave on the targeted inputs as desired by the adversary with high probability, (ii) evasive - the malicious models function indistinguishably from their benign counterparts on non-targeted inputs, (iii) elastic - the malicious models remain effective regardless of various system design choices and tuning strategies, and (iv) easy - the adversary needs little prior knowledge about the data used for system tuning or inference.
Cryptography and Security
no code implementations • 1 Aug 2018 • Yujie Ji, Xinyang Zhang, Ting Wang
Deep neural networks (DNNs) are inherently vulnerable to adversarial inputs: such maliciously crafted samples trigger DNNs to misbehave, leading to detrimental consequences for DNN-powered systems.
2 code implementations • 5 Jan 2018 • Xinyang Zhang, Shouling Ji, Ting Wang
Privacy-preserving releasing of complex data (e. g., image, text, audio) represents a long-standing challenge for the data mining research community.
no code implementations • 2 Dec 2017 • Chanh Nguyen, Georgi Georgiev, Yujie Ji, Ting Wang
We believe that this work opens a new direction for designing adversarial input detection methods.
no code implementations • 25 Aug 2017 • Xinyang Zhang, Yujie Ji, Ting Wang
Many of today's machine learning (ML) systems are not built from scratch, but are compositions of an array of {\em modular learning components} (MLCs).
no code implementations • 24 Apr 2017 • Shu Zhang, Hui Yu, Ting Wang, Junyu Dong, Honghai Liu
With the increasing demands of applications in virtual reality such as 3D films, virtual Human-Machine Interactions and virtual agents, the analysis of 3D human face analysis is considered to be more and more important as a fundamental step for those virtual reality tasks.
no code implementations • 6 Apr 2017 • Zhe Sun, Ting Wang, Ke Deng, Xiao-Feng Wang, Robert Lafyatis, Ying Ding, Ming Hu, Wei Chen
More importantly, as a model-based approach, DIMM-SC is able to quantify the clustering uncertainty for each single cell, facilitating rigorous statistical inference and biological interpretations, which are typically unavailable from existing clustering methods.
no code implementations • 11 Oct 2016 • Yifan Hou, Pan Zhou, Ting Wang, Li Yu, Yuchong Hu, Dapeng Wu
In this respect, the key challenge is how to realize personalized course recommendation as well as to reduce the computing and storage costs for the tremendous course data.
no code implementations • 22 Aug 2014 • Peilei Liu, Ting Wang
Firstly, we briefly introduce this model in this paper, and then we explain the neural mechanism of language and reasoning with it.
no code implementations • 18 Jul 2014 • Peilei Liu, Ting Wang
Finally, we compare motor system with sensory system.
no code implementations • 25 Jun 2014 • Peilei Liu, Ting Wang
The coding mechanism of sensory memory on the neuron scale is one of the most important questions in neuroscience.
no code implementations • 23 Jun 2014 • Peilei Liu, Ting Wang
This is complementary to existing theories and has provided better explanations for sound localization.
no code implementations • 8 Jun 2014 • Peilei Liu, Ting Wang
Protein-protein interaction extraction is the key precondition of the construction of protein knowledge network, and it is very important for the research in the biomedicine.