no code implementations • 17 Feb 2025 • Xi Zheng, Ziyang Li, Ivan Ruchkin, Ruzica Piskac, Miroslav Pajic
Autonomous cyber-physical systems (CPSs) leverage AI for perception, planning, and control but face trust and safety certification challenges due to inherent uncertainties.
1 code implementation • 1 Nov 2024 • Xi Zheng, Xiangyu Chang, Ruoxi Jia, Yong Tan
The Shapley value, a well-established concept from cooperative game theory, has been widely adopted to assess the contribution of individual data sources in supervised machine learning.
no code implementations • 24 Aug 2024 • Jiwei Guan, Tianyu Ding, Longbing Cao, Lei Pan, Chen Wang, Xi Zheng
In this paper, we study the adversarial vulnerability of recent VLP transformers and design a novel Joint Multimodal Transformer Feature Attack (JMTFA) that concurrently introduces adversarial perturbations in both visual and textual modalities under white-box settings.
no code implementations • 19 Dec 2023 • Ran Chen, Jing Zhao, Xiaomin Luo, Xinxue Yan, Xi Zheng, Yijun Mao, Xiaoping Fu, Xueqi Yao, Sijia Jiang
This study focuses on the "ecology-food" imbalance problem. taking Sichuan-Chongqing Region as an example, to set up future scenarios topredicate the distribution of ESs.
no code implementations • 13 Nov 2023 • Xi Zheng, Aloysius K. Mok, Ruzica Piskac, Yong Jae Lee, Bhaskar Krishnamachari, Dakai Zhu, Oleg Sokolsky, Insup Lee
The integration of machine learning (ML) into cyber-physical systems (CPS) offers significant benefits, including enhanced efficiency, predictive capabilities, real-time responsiveness, and the enabling of autonomous operations.
no code implementations • 12 Oct 2023 • Jianchao Lu, Yuzhe Tian, Yang Zhang, Jiaqi Ge, Quan Z. Sheng, Xi Zheng
The efficiency, assessed on two public EEG datasets and two real-world EEG devices, significantly outperforms the state-of-the-art solution in accuracy ($82. 54\%$ versus $62. 22\%$) with fewer parameters (64. 9M compared to 183. 7M).
1 code implementation • 2 Jun 2023 • Tiehua Zhang, Rui Xu, Jianping Zhang, Yuze Liu, Xin Chen, Jun Yin, Xi Zheng
Vulnerability detection is a critical problem in software security and attracts growing attention both from academia and industry.
no code implementations • 30 May 2023 • Jiwei Guan, Lei Pan, Chen Wang, Shui Yu, Longxiang Gao, Xi Zheng
As deep learning has been applied to increasingly sensitive tasks, uncertainty measurement is crucial in helping improve model robustness, especially in mission-critical scenarios.
no code implementations • 25 May 2023 • Linfeng Liang, Yao Deng, Yang Zhang, Jianchao Lu, Chen Wang, Quanzheng Sheng, Xi Zheng
Discrepancies in decision-making between Autonomous Driving Systems (ADS) and human drivers underscore the need for intuitive human gaze predictors to bridge this gap, thereby improving user trust and experience.
no code implementations • 10 Apr 2023 • Haoxiang Yu, Hsiao-Yuan Chen, Sangsu Lee, Sriram Vishwanath, Xi Zheng, Christine Julien
We leverage a smart contract not only for providing explicit incentives to end devices to participate in decentralized learning but also to create a fully decentralized mechanism to inspect and reflect on the behavior of the learning architecture.
no code implementations • 4 Mar 2023 • Shutao Zhang, Xinzhi Ning, Xi Zheng, Qingjiang Shi, Tsung-Hui Chang, Zhi-Quan Luo
Localized channel modeling is crucial for offline performance optimization of 5G cellular networks, but the existing channel models are for general scenarios and do not capture local geographical structures.
no code implementations • 4 Oct 2022 • Xi Zheng, Jun Fang, Hongwei Wang, Peilan Wang, Hongbin Li
Also, by utilizing the singular value decomposition-like structure of the effective channel, this paper develops a joint active and passive beamforming method based on the estimated cascade channels.
no code implementations • 26 Sep 2022 • Jianchao Lu, Yuzhe Tian, Shuang Wang, Michael Sheng, Xi Zheng
Sleep stage recognition is crucial for assessing sleep and diagnosing chronic diseases.
no code implementations • 7 Jun 2022 • Tiehua Zhang, Yuze Liu, Zhishu Shen, Rui Xu, Xin Chen, Xiaowei Huang, Xi Zheng
Spatial-temporal data contains rich information and has been widely studied in recent years due to the rapid development of relevant applications in many fields.
no code implementations • 30 Mar 2022 • Xi Zheng, Peilan Wang, Jun Fang, Hongbin Li
We consider the problem of downlink channel estimation for intelligent reflecting surface (IRS)-assisted millimeter Wave (mmWave) orthogonal frequency division multiplexing (OFDM) systems.
no code implementations • 24 Feb 2022 • Shengzhe Wang, Ling Wang, ZhiHao Lin, Xi Zheng
We are the first to use the temporal convolution filters as the backbone to construct a domain adaptation network architecture which is suitable for deep learning regression models with very limited training data of the target domain.
1 code implementation • 22 Jan 2022 • Xi Zheng, Rui Ma, Rui Gao, Qi Hao
In this paper, we propose a phase based Simultaneous Localization and Mapping (Phase-SLAM) framework for fast and accurate SLI sensor pose estimation and 3D object reconstruction.
no code implementations • 29 Dec 2021 • Tiehua Zhang, Yuze Liu, Xin Chen, Xiaowei Huang, Feng Zhu, Xi Zheng
Graph representation learning has drawn increasing attention in recent years, especially for learning the low dimensional embedding at both node and graph level for classification and recommendations tasks.
no code implementations • 5 Dec 2021 • Qing Wang, Qing Liu, Zihao Zhang, HaoYu Fang, Xi Zheng
Artificial intelligence (AI) based device identification improves the security of the internet of things (IoT), and accelerates the authentication process.
1 code implementation • 12 Nov 2021 • Guannan Lou, Yuze Liu, Tiehua Zhang, Xi Zheng
We present a spatial-temporal federated learning framework for graph neural networks, namely STFL.
no code implementations • 25 May 2021 • Guangquan Xu, GuoHua Xin, Litao Jiao, Jian Liu, Shaoying Liu, Meiqi Feng, Xi Zheng
With the growing popularity of Android devices, Android malware is seriously threatening the safety of users.
1 code implementation • 20 Apr 2021 • Jiwei Guan, Xi Zheng, Chen Wang, Yipeng Zhou, Alireza Jolfa
This technology enables drivers to use voice commands to control the vehicle and will be soon available in Advanced Driver Assistance Systems (ADAS).
no code implementations • 5 Apr 2021 • Yao Deng, Tiehua Zhang, Guannan Lou, Xi Zheng, Jiong Jin, Qing-Long Han
The rapid development of artificial intelligence, especially deep learning technology, has advanced autonomous driving systems (ADSs) by providing precise control decisions to counterpart almost any driving event, spanning from anti-fatigue safe driving to intelligent route planning.
no code implementations • 24 Mar 2021 • Sangsu Lee, Xi Zheng, Jie Hua, Haris Vikalo, Christine Julien
We define a new approach, opportunistic federated learning, in which individual devices belonging to different users seek to learn robust models that are personalized to their user's own experiences.
no code implementations • 12 Mar 2021 • Chenhao Xu, Jiaqi Ge, Yong Li, Yao Deng, Longxiang Gao, Mengshi Zhang, Yong Xiang, Xi Zheng
Federated learning (FL) enables collaborative training of a shared model on edge devices while maintaining data privacy.
no code implementations • 20 Jan 2021 • Shangming Cai, Dongsheng Wang, Haixia Wang, Yongqiang Lyu, Guangquan Xu, Xi Zheng, Athanasios V. Vasilakos
To reduce uploading bandwidth and address privacy concerns, deep learning at the network edge has been an emerging topic.
no code implementations • 29 Dec 2020 • Qianqian Pan, Jun Wu, Xi Zheng, Jianhua Li, Shenghong Li, Athanasios V. Vasilakos
The ever-increasing data traffic, various delay-sensitive services, and the massive deployment of energy-limited Internet of Things (IoT) devices have brought huge challenges to the current communication networks, motivating academia and industry to move to the sixth-generation (6G) network.
1 code implementation • 17 Nov 2020 • Haimiao Mo, Shuai Ding, Shanlin Yang, Athanasios V. Vasilakos, Xi Zheng
We proposed a non-contact respiratory rate monitoring system with a cooperative three-layer design to increase the precision of respiratory monitoring and decrease data transmission latency.
no code implementations • 20 Oct 2020 • Yupeng Jiang, Yong Li, Yipeng Zhou, Xi Zheng
The state-of-the-art privacy-preserving technique in the context of federated learning is user-level differential privacy.
Cryptography and Security Distributed, Parallel, and Cluster Computing
no code implementations • 18 Oct 2020 • Jianchao Lu, Xi Zheng, Tianyi Zhang, Michael Sheng, Chen Wang, Jiong Jin, Shui Yu, Wanlei Zhou
In this paper, we propose a novel driver fatigue detection method by embedding surface electromyography (sEMG) sensors on a steering wheel.
no code implementations • 15 Oct 2020 • Ling Wang, Cheng Zhang, Zejian Luo, ChenGuang Liu, Jie Liu, Xi Zheng, Athanasios Vasilakos
To reduce the computational cost without loss of generality, we present a defense strategy called a progressive defense against adversarial attacks (PDAAA) for efficiently and effectively filtering out the adversarial pixel mutations, which could mislead the neural network towards erroneous outputs, without a-priori knowledge about the attack type.
no code implementations • 22 Aug 2020 • Min Fu, Jiwei Guan, Xi Zheng, Jie zhou, Jianchao Lu, Tianyi Zhang, Shoujie Zhuo, Lijun Zhan, Jian Yang
Existing solution recommendation methods for online customer service are unable to determine the best solutions at runtime, leading to poor satisfaction of end customers.
1 code implementation • 6 Feb 2020 • Yao Deng, Xi Zheng, Tianyi Zhang, Chen Chen, Guannan Lou, Miryung Kim
We derive several implications for system and middleware builders: (1) when adding a defense component against adversarial attacks, it is important to deploy multiple defense methods in tandem to achieve a good coverage of various attacks, (2) a blackbox attack is much less effective compared with a white-box attack, implying that it is important to keep model details (e. g., model architecture, hyperparameters) confidential via model obfuscation, and (3) driving models with a complex architecture are preferred if computing resources permit as they are more resilient to adversarial attacks than simple models.
no code implementations • 19452854 2019 • Samundra Deep, Xi Zheng
Specifically, in this paper, we proposed a hybrid architecture which features a combination of Convolutional neural networks (CNN) and Long short-term Memory (LSTM) networks for HAR task.