no code implementations • 17 Aug 2024 • Xiyue Zhang, Benjie Wang, Marta Kwiatkowska, huan zhang
Most methods for neural network verification focus on bounding the image, i. e., set of outputs for a given input set.
no code implementations • 4 Jul 2024 • Xiaokun Luan, Xiyue Zhang, Jingyi Wang, Meng Sun
To the best of our knowledge, this is the first adversarial example-free method that exploits neuron functionality for DNN copyright protection.
no code implementations • 14 Jun 2024 • Matthias König, Xiyue Zhang, Holger H. Hoos, Marta Kwiatkowska, Jan N. van Rijn
In this work, we propose a novel parameter search method to improve the quality of these linear approximations.
no code implementations • 20 Sep 2023 • Marta Kwiatkowska, Xiyue Zhang
Artificial intelligence (AI) has been advancing at a fast pace and it is now poised for deployment in a wide range of applications, such as autonomous systems, medical diagnosis and natural language processing.
1 code implementation • 24 Jun 2023 • Zeming Wei, Xiyue Zhang, Yihao Zhang, Meng Sun
In this paper, we propose a novel framework of Weighted Finite Automata (WFA) extraction and explanation to tackle the limitations for natural language tasks.
1 code implementation • 5 May 2023 • Xiyue Zhang, Benjie Wang, Marta Kwiatkowska
Neural network verification mainly focuses on local robustness properties, which can be checked by bounding the image (set of outputs) of a given input set.
1 code implementation • 20 Apr 2023 • Yihao Zhang, Zeming Wei, Xiyue Zhang, Meng Sun
To evaluate the effectiveness of our implementation and improvements, we conduct extensive experiments on a set of benchmark datasets.
1 code implementation • 27 Jun 2022 • Zeming Wei, Xiyue Zhang, Meng Sun
Compositional approaches that are scablable to natural languages fall short in extraction precision.
1 code implementation • IJCAI 2021 • Lianghao Xia, Chao Huang, Yong Xu, Peng Dai, Liefeng Bo, Xiyue Zhang, Tianyi Chen
Crime prediction is crucial for public safety and resource optimization, yet is very challenging due to two aspects: i) the dynamics of criminal patterns across time and space, crime events are distributed unevenly on both spatial and temporal domains; ii) time-evolving dependencies between different types of crimes (e. g., Theft, Robbery, Assault, Damage) which reveal fine-grained semantics of crimes.
1 code implementation • 8 Oct 2021 • Xiyue Zhang, Chao Huang, Yong Xu, Lianghao Xia, Peng Dai, Liefeng Bo, Junbo Zhang, Yu Zheng
Accurate forecasting of citywide traffic flow has been playing critical role in a variety of spatial-temporal mining applications, such as intelligent traffic control and public risk assessment.
1 code implementation • 8 Oct 2021 • Lianghao Xia, Chao Huang, Yong Xu, Peng Dai, Xiyue Zhang, Hongsheng Yang, Jian Pei, Liefeng Bo
In particular: i) complex inter-dependencies across different types of user behaviors; ii) the incorporation of knowledge-aware item relations into the multi-behavior recommendation framework; iii) dynamic characteristics of multi-typed user-item interactions.
no code implementations • 8 Jun 2020 • Weidi Sun, Yuteng Lu, Xiyue Zhang, Zhanxing Zhu, Meng Sun
The wide deployment of deep neural networks, though achieving great success in many domains, has severe safety and reliability concerns.
no code implementations • 24 Apr 2020 • Xiyue Zhang, Xiaofei Xie, Lei Ma, Xiaoning Du, Qiang Hu, Yang Liu, Jianjun Zhao, Meng Sun
Based on this, we propose an automated testing technique to generate multiple types of uncommon AEs and BEs that are largely missed by existing techniques.