no code implementations • 17 Sep 2023 • Ganghua Fan, Tianyu Jin, Yuan Lan, Yang Xiang, Luchan Zhang
In this paper, we propose an energy stable network (EStable-Net) for solving gradient flow equations.
1 code implementation • 14 Sep 2023 • Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shirui Pan, Kok-Leong Ong, Jun Zhang, Yang Xiang
For the first time, we show the feasibility of a client-side adversary with limited knowledge being able to recover the training samples from the aggregated global model.
no code implementations • 9 Sep 2023 • Sicen Liu, Xiaolong Wang, Jingcheng Du, Yongshuai Hou, Xianbing Zhao, Hui Xu, Hui Wang, Yang Xiang, Buzhou Tang
Effectively medication recommendation with complex multimorbidity conditions is a critical task in healthcare.
no code implementations • 20 Aug 2023 • Bingxin Wang, Xiaowen Fu, Yuan Lan, Luchan Zhang, Yang Xiang
Since the magnitude of available labeled electroencephalogram (EEG) data is much lower than that of text and image data, it is difficult for transformer models pre-trained from EEG to be developed as large as GPT-4 100T to fully unleash the potential of this architecture.
no code implementations • 4 Aug 2023 • Xin Mu, Yu Wang, Yehong Zhang, JiaQi Zhang, Hui Wang, Yang Xiang, Yue Yu
Understanding the life cycle of the machine learning (ML) model is an intriguing area of research (e. g., understanding where the model comes from, how it is trained, and how it is used).
no code implementations • 4 Jul 2023 • Chuqi Chen, Yue Wu, Yang Xiang
In this paper, we analyze the stability of the training process of these GANs from the perspective of probability density dynamics.
no code implementations • 15 May 2023 • Yahong Yang, Haizhao Yang, Yang Xiang
This paper addresses the problem of nearly optimal Vapnik--Chervonenkis dimension (VC-dimension) and pseudo-dimension estimations of the derivative functions of deep neural networks (DNNs).
no code implementations • 21 Apr 2023 • Jianfeng Lu, Yue Wu, Yang Xiang
We use the score-based transport modeling method to solve the mean-field Fokker-Planck equations, which we call MSBTM.
no code implementations • 30 Mar 2023 • Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, Wenzhi Chen
We then visualize the identity loss between the test and the reference image from the image differences of the aligned pairs, and design a custom metric to quantify the identity loss.
no code implementations • 19 Mar 2023 • Chuqi Chen, Yue Wu, Yang Xiang
We adopt the GAN framework and replace the discriminator with a feature transformation network to map the data into a latent space.
no code implementations • 11 Dec 2022 • Yuan Lan, Zhen Li, Jie Sun, Yang Xiang
Deep neural networks (DNNs) recently emerged as a promising tool for analyzing and solving complex differential equations arising in science and engineering applications.
no code implementations • 30 Nov 2022 • Shaohuai Shi, Qing Yang, Yang Xiang, Shuhan Qi, Xuan Wang
To enable the pre-trained models to be fine-tuned with local data on edge devices without sharing data with the cloud, we design an efficient split fine-tuning (SFT) framework for edge and cloud collaborative learning.
no code implementations • 16 Nov 2022 • Yang Xiang, Jesper Lisby Højvang, Morten Højfeldt Rasmussen, Mads Græsbøll Christensen
To obtain a higher quality enhanced speech, we propose a two-stage DRL-based SE method through adversarial training.
no code implementations • 27 Oct 2022 • Xutao Guo, Yanwu Yang, Chenfei Ye, Shang Lu, Yang Xiang, Ting Ma
Based on the Denoising Diffusion Probabilistic Model (DDPM), medical image segmentation can be described as a conditional image generation task, which allows to compute pixel-wise uncertainty maps of the segmentation and allows an implicit ensemble of segmentations to boost the segmentation performance.
no code implementations • 25 Oct 2022 • Yanwu Yang, Xutao Guo, Zhikai Chang, Chenfei Ye, Yang Xiang, Ting Ma
Graph neural networks have been proven to be of great importance in modeling brain connectome networks and relating disease-specific patterns.
1 code implementation • 21 Oct 2022 • Yuxuan Han, Jialin Zeng, Yang Wang, Yang Xiang, Jiheng Zhang
We study the stochastic contextual bandit with knapsacks (CBwK) problem, where each action, taken upon a context, not only leads to a random reward but also costs a random resource consumption in a vector form.
no code implementations • 7 Oct 2022 • Yuan Lan, Liang Qin, Zhaoyi Sun, Yang Xiang, Jie Sun
Besides the latent variable unique to each patch, we introduce shared latent variables between patches to construct the global context.
1 code implementation • 23 Sep 2022 • Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang
However, recent advanced backdoor attacks show that this assumption is no longer valid in dynamic backdoors where the triggers vary from input to input, thereby defeating the existing defenses.
no code implementations • 19 Sep 2022 • Yanwu Yang, Xutao Guo, Zhikai Chang, Chenfei Ye, Yang Xiang, Haiyan Lv, Ting Ma
The brain age has been proven to be a phenotype of relevance to cognitive performance and brain disease.
no code implementations • 10 Jul 2022 • Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang
It reduces the success rate of rPPG spoofing attacks in user authentication to 0. 05.
no code implementations • 28 May 2022 • Yahong Yang, Yang Xiang
In this paper, we establish a neural network to approximate functionals, which are maps from infinite dimensional spaces to finite dimensional spaces.
1 code implementation • 19 May 2022 • Yang Xiang, Zhihua Wu, Weibao Gong, Siyu Ding, Xianjie Mo, Yuang Liu, Shuohuan Wang, Peng Liu, Yongshuai Hou, Long Li, Bin Wang, Shaohuai Shi, Yaqian Han, Yue Yu, Ge Li, Yu Sun, Yanjun Ma, dianhai yu
We took natural language processing (NLP) as an example to show how Nebula-I works in different training phases that include: a) pre-training a multilingual language model using two remote clusters; and b) fine-tuning a machine translation model using knowledge distilled from pre-trained models, which run through the most popular paradigm of recent deep learning.
Cross-Lingual Natural Language Inference
Distributed Computing
+2
no code implementations • 11 May 2022 • Yang Xiang, Jesper Lisby Højvang, Morten Højfeldt Rasmussen, Mads Græsbøll Christensen
In previous work, we proposed a variational autoencoder-based (VAE) Bayesian permutation training speech enhancement (SE) method (PVAE) which indicated that the SE performance of the traditional deep neural network-based (DNN) method could be improved by deep representation learning (DRL).
no code implementations • 29 Apr 2022 • Sicen Liu, Xiaolong Wang, Yang Xiang, Hui Xu, Hui Wang, Buzhou Tang
It is a time-aware, event-aware and task-adaptive method with the following advantages: 1) modeling heterogeneous information and temporal information in a unified way and considering temporal irregular characteristics locally and globally respectively, 2) taking full advantage of correlations among different types of events via cross-event attention.
1 code implementation • 25 Jan 2022 • Sicen Liu, Xiaolong Wang, Yongshuai Hou, Ge Li, Hui Wang, Hui Xu, Yang Xiang, Buzhou Tang
As two important textual modalities in electronic health records (EHR), both structured data (clinical codes) and unstructured data (clinical narratives) have recently been increasingly applied to the healthcare domain.
no code implementations • 24 Jan 2022 • Yang Xiang, Jesper Lisby Højvang, Morten Højfeldt Rasmussen, Mads Græsbøll Christensen
This means that the proposed method can apply the VAE to model both speech and noise signals, which is totally different from the previous VAE-based SE works.
3 code implementations • 23 Dec 2021 • Shuohuan Wang, Yu Sun, Yang Xiang, Zhihua Wu, Siyu Ding, Weibao Gong, Shikun Feng, Junyuan Shang, Yanbin Zhao, Chao Pang, Jiaxiang Liu, Xuyi Chen, Yuxiang Lu, Weixin Liu, Xi Wang, Yangfan Bai, Qiuliang Chen, Li Zhao, Shiyong Li, Peng Sun, dianhai yu, Yanjun Ma, Hao Tian, Hua Wu, Tian Wu, Wei Zeng, Ge Li, Wen Gao, Haifeng Wang
A unified framework named ERNIE 3. 0 was recently proposed for pre-training large-scale knowledge enhanced models and trained a model with 10 billion parameters.
no code implementations • 9 Nov 2021 • Ziyi Liu, JiaQi Zhang, Yongshuai Hou, Xinran Zhang, Ge Li, Yang Xiang
Background: Electronic Health Records (EHRs) contain rich information of patients' health history, which usually include both structured and unstructured data.
1 code implementation • 3 Oct 2021 • Laila Rasmy, Jie Zhu, Zhiheng Li, Xin Hao, Hong Thoai Tran, Yujia Zhou, Firat Tiryaki, Yang Xiang, Hua Xu, Degui Zhi
As a result, deep learning models developed for sequence modeling, like recurrent neural networks (RNNs) are common architecture for EHR-based clinical events predictive models.
no code implementations • 1 Jul 2021 • Yunxin Li, Yu Zhao, Baotian Hu, Qingcai Chen, Yang Xiang, Xiaolong Wang, Yuxin Ding, Lin Ma
Previous works indicate that the glyph of Chinese characters contains rich semantic information and has the potential to enhance the representation of Chinese characters.
no code implementations • 5 Jun 2021 • Yue Wu, Yuan Lan, Luchan Zhang, Yang Xiang
Pruning is a model compression method that removes redundant parameters in deep neural networks (DNNs) while maintaining accuracy.
no code implementations • 13 May 2021 • XiaoYu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang
This survey presents the most recent findings of privacy attacks and defenses appeared in cloud-based neural network services.
no code implementations • 13 Mar 2021 • Qicheng Wang, Shuhai Zhang, JieZhang Cao, Jincheng Li, Mingkui Tan, Yang Xiang
Existing attack methods often construct adversarial examples relying on some metrics like the $\ell_p$ distance to perturb samples.
2 code implementations • 16 Feb 2021 • Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang
Stealing attack against controlled information, along with the increasing number of information leakage incidents, has become an emerging cyber security threat in recent years.
no code implementations • 7 Jan 2021 • Xiaoxue Qin, Yejun Gu, Luchan Zhang, Yang Xiang
We present a continuum model to determine the dislocation structure and energy of low angle grain boundaries in three dimensions.
Materials Science
no code implementations • 6 Dec 2020 • Luchan Zhang, Xiaoxue Qin, Yang Xiang
In our continuum model, the dislocation structure of a semicoherent interface is obtained by minimizing the energy of the equilibrium dislocation network with respect to all the possible Burgers vectors, subject to the constraint of the Frank-Bilby equation.
Materials Science
no code implementations • 23 Oct 2020 • Xiaogang Zhu, Shigang Liu, Xian Li, Sheng Wen, Jun Zhang, Camtepe Seyit, Yang Xiang
Fuzzing is one of the most effective technique to identify potential software vulnerabilities.
1 code implementation • 6 Jul 2020 • Yuan Lan, Yang Xiang, Luchan Zhang
The commonly used loss functions in the deep segmentation task are pixel-wise loss functions.
no code implementations • 26 Jun 2020 • Tingmin Wu, Wanlun Ma, Sheng Wen, Xin Xia, Cecile Paris, Surya Nepal, Yang Xiang
We further compare the identified 16 security categories across different sources based on their popularity and impact.
1 code implementation • 22 May 2020 • Laila Rasmy, Yang Xiang, Ziqian Xie, Cui Tao, Degui Zhi
Deep learning (DL) based predictive models from electronic health records (EHR) deliver impressive performance in many clinical tasks.
no code implementations • WS 2020 • Shengbin Jia, Ling Ding, Xiaojun Chen, Shijia E, Yang Xiang
Chinese word segmentation is necessary to provide word-level information for Chinese named entity recognition (NER) systems.
Chinese Named Entity Recognition
Chinese Word Segmentation
+3
no code implementations • 4 Nov 2019 • Shigang Liu, Jun Zhang, Yang Xiang, Wanlei Zhou, Dongxi Xiang
However, previous studies usually focused on different classifiers, and overlook the class imbalance problem in real-world biomedical datasets.
no code implementations • 14 Oct 2019 • Derui, Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang
First, such attacks must acquire the outputs from the models by multiple times before actually launching attacks, which is difficult for the MitM adversary in practice.
no code implementations • 26 Jul 2019 • Shengbin Jia, Yang Xiang
Furthermore, we propose a hybrid neural network model (HNN4ORT) for open relation tagging.
no code implementations • WS 2019 • Li Yang, Yang Xiang
Automatic dialect identification is a more challengingctask than language identification, as it requires the ability to discriminate between varieties of one language.
1 code implementation • 6 Feb 2019 • Derui Wang, Chaoran Li, Sheng Wen, Qing-Long Han, Surya Nepal, Xiangyu Zhang, Yang Xiang
Experimental results demonstrate that the attack effectively stops NMS from filtering redundant bounding boxes.
1 code implementation • 10 Jan 2019 • Jian-hai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang, Zhenguang Liu
Next, we prove that our mechanism is an FPTAS, i. e., it can be approximated within $1 + \epsilon$ for any given $\epsilon > 0$, while the running time of our mechanism is polynomial in $n$ and $1/\epsilon$, where $n$ is the number of tenants in the datacenter.
Computer Science and Game Theory
4 code implementations • 13 Nov 2018 • Jingcheng Du, Qingyu Chen, Yifan Peng, Yang Xiang, Cui Tao, Zhiyong Lu
Due to this nature, the multi-label text classification task is often considered to be more challenging compared to the binary or multi-class text classification problems.
no code implementations • 13 Nov 2018 • Haotian Hang, Bin Yu, Yang Xiang, Bin Zhang, Hong Liu
High-accuracy and high-efficiency finite-time Lyapunov exponent (FTLE) calculation method has long been a research hot point, and adaptive refinement method is a kind of method in this field.
Fluid Dynamics
no code implementations • 25 Sep 2018 • Shengbin Jia, Yang Xiang
It is difficult for the intelligent system to understand the semantics of user demand which leads to poor recognition effect, because of the noise in user requirement descriptions.
1 code implementation • 25 Sep 2018 • Shengbin Jia, Yang Xiang, Xiaojun Chen
The Knowledge graph (KG) uses the triples to describe the facts in the real world.
no code implementations • 10 Aug 2018 • Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren
In contrast to existing works, the adversarial examples crafted by our method can also deceive recent machine learning based detectors that rely on semantic features such as control-flow-graph.
Cryptography and Security
no code implementations • 24 Apr 2018 • Yuantian Miao, Zichan Ruan, Lei Pan, Yu Wang, Jun Zhang, Yang Xiang
Network traffic analytics technology is a cornerstone for cyber security systems.
Cryptography and Security
no code implementations • 14 Mar 2018 • Derek Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang
For example, proactive defending methods are invalid against grey-box or white-box attacks, while reactive defending methods are challenged by low-distortion adversarial examples or transferring adversarial examples.
1 code implementation • 3 Jun 2017 • Shuhan Yuan, Panpan Zheng, Xintao Wu, Yang Xiang
In particular, we develop a multi-source long-short term memory network (M-LSTM) to model user behaviors by using a variety of user edit aspects as inputs, including the history of edit reversion information, edit page titles and categories.
no code implementations • 3 Jun 2017 • Shuhan Yuan, Xintao Wu, Yang Xiang
The other case study on fake review detection shows that our approach can identify the fake-review words/phrases.
1 code implementation • COLING 2016 • Yang Xiang, Xiaoqiang Zhou, Qingcai Chen, Zhihui Zheng, Buzhou Tang, Xiaolong Wang, Yang Qin
In community question answering (cQA), the quality of answers are determined by the matching degree between question-answer pairs and the correlation among the answers.
no code implementations • 28 Oct 2016 • Shijia E, Yang Xiang, Mohan Zhang
We focus on the problem of learning distributed representations for entity search queries, named entities, and their short descriptions.
no code implementations • 27 Jun 2016 • Cheng Luo, Richard Yi Da Xu, Yang Xiang
One of the propositions of the dependent random measures is that the atoms of the posterior distribution are shared amongst groups, and hence groups can borrow information from each other.
no code implementations • 16 Apr 2016 • Cheng Luo, Yang Xiang, Richard Yi Da Xu
The key novelty of this model is that we place a temporal constraint amongst the nearby discrete measures $\{G_j\}$ in the form of symmetric Kullback-Leibler (KL) Divergence with a fixed bound $B$.
no code implementations • 27 Mar 2013 • Yang Xiang, Michael P. Beddoes, David L. Poole
In this paper, the feasibility of using finite totally ordered probability models under Alelinnas's Theory of Probabilistic Logic [Aleliunas, 1988] is investigated.