Search Results for author: Yang Xiang

Found 45 papers, 12 papers with code

Nebula-I: A General Framework for Collaboratively Training Deep Learning Models on Low-Bandwidth Cloud Clusters

no code implementations19 May 2022 Yang Xiang, Zhihua Wu, Weibao Gong, Siyu Ding, Xianjie Mo, Yuang Liu, Shuohuan Wang, Peng Liu, Yongshuai Hou, Long Li, Bin Wang, Shaohuai Shi, Yaqian Han, Yue Yu, Ge Li, Yu Sun, Yanjun Ma, dianhai yu

We took natural language processing (NLP) as an example to show how Nebula-I works in different training phases that include: a) pre-training a multilingual language model using two remote clusters; and b) fine-tuning a machine translation model using knowledge distilled from pre-trained models, which run through the most popular paradigm of recent deep learning.

Cross-Lingual Natural Language Inference Language Modelling +1

A deep representation learning speech enhancement method using $β$-VAE

no code implementations11 May 2022 Yang Xiang, Jesper Lisby Højvang, Morten Højfeldt Rasmussen, Mads Græsbøll Christensen

In previous work, we proposed a variational autoencoder-based (VAE) Bayesian permutation training speech enhancement (SE) method (PVAE) which indicated that the SE performance of the traditional deep neural network-based (DNN) method could be improved by deep representation learning (DRL).

Disentanglement Speech Enhancement

CATNet: Cross-event Attention-based Time-aware Network for Medical Event Prediction

no code implementations29 Apr 2022 Sicen Liu, Xiaolong Wang, Yang Xiang, Hui Xu, Hui Wang, Buzhou Tang

It is a time-aware, event-aware and task-adaptive method with the following advantages: 1) modeling heterogeneous information and temporal information in a unified way and considering temporal irregular characteristics locally and globally respectively, 2) taking full advantage of correlations among different types of events via cross-event attention.

Time Series

Multimodal data matters: language model pre-training over structured and unstructured electronic health records

1 code implementation25 Jan 2022 Sicen Liu, Xiaolong Wang, Yongshuai Hou, Ge Li, Hui Wang, Hui Xu, Yang Xiang, Buzhou Tang

The massive amount of electronic health records (EHRs) has created enormous potential for improving healthcare, among which clinical codes (structured data) and clinical narratives (unstructured data) are two important textual modalities.

Decision Making Language Modelling

Machine Learning for Multimodal Electronic Health Records-based Research: Challenges and Perspectives

no code implementations9 Nov 2021 Ziyi Liu, JiaQi Zhang, Yongshuai Hou, Xinran Zhang, Ge Li, Yang Xiang

Background: Electronic Health Records (EHRs) contain rich information of patients' health history, which usually include both structured and unstructured data.

Simple Recurrent Neural Networks is all we need for clinical events predictions using EHR data

1 code implementation3 Oct 2021 Laila Rasmy, Jie Zhu, Zhiheng Li, Xin Hao, Hong Thoai Tran, Yujia Zhou, Firat Tiryaki, Yang Xiang, Hua Xu, Degui Zhi

As a result, deep learning models developed for sequence modeling, like recurrent neural networks (RNNs) are common architecture for EHR-based clinical events predictive models.

GlyphCRM: Bidirectional Encoder Representation for Chinese Character with its Glyph

no code implementations1 Jul 2021 Yunxin Li, Yu Zhao, Baotian Hu, Qingcai Chen, Yang Xiang, Xiaolong Wang, Yuxin Ding, Lin Ma

Previous works indicate that the glyph of Chinese characters contains rich semantic information and has the potential to enhance the representation of Chinese characters.

Feature Flow Regularization: Improving Structured Sparsity in Deep Neural Networks

no code implementations5 Jun 2021 Yue Wu, Yuan Lan, Luchan Zhang, Yang Xiang

Pruning is a model compression method that removes redundant parameters in deep neural networks (DNNs) while maintaining accuracy.

Model Compression

Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey

no code implementations13 May 2021 XiaoYu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang

This survey presents the most recent findings of privacy attacks and defenses appeared in cloud-based neural network services.

Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey

2 code implementations16 Feb 2021 Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang

Stealing attack against controlled information, along with the increasing number of information leakage incidents, has become an emerging cyber security threat in recent years.

Continuum Model and Numerical Method for Dislocation Structure and Energy of Grain Boundaries

no code implementations7 Jan 2021 Xiaoxue Qin, Yejun Gu, Luchan Zhang, Yang Xiang

We present a continuum model to determine the dislocation structure and energy of low angle grain boundaries in three dimensions.

Materials Science

Continuum model for dislocation structures of semicoherent interfaces

no code implementations6 Dec 2020 Luchan Zhang, Xiaoxue Qin, Yang Xiang

In our continuum model, the dislocation structure of a semicoherent interface is obtained by minimizing the energy of the equilibrium dislocation network with respect to all the possible Burgers vectors, subject to the constraint of the Frank-Bilby equation.

Materials Science

DeFuzz: Deep Learning Guided Directed Fuzzing

no code implementations23 Oct 2020 Xiaogang Zhu, Shigang Liu, Xian Li, Sheng Wen, Jun Zhang, Camtepe Seyit, Yang Xiang

Fuzzing is one of the most effective technique to identify potential software vulnerabilities.

Vulnerability Detection

Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity

no code implementations26 Jun 2020 Tingmin Wu, Wanlun Ma, Sheng Wen, Xin Xia, Cecile Paris, Surya Nepal, Yang Xiang

We further compare the identified 16 security categories across different sources based on their popularity and impact.

Med-BERT: pre-trained contextualized embeddings on large-scale structured electronic health records for disease prediction

1 code implementation22 May 2020 Laila Rasmy, Yang Xiang, Ziqian Xie, Cui Tao, Degui Zhi

Deep learning (DL) based predictive models from electronic health records (EHR) deliver impressive performance in many clinical tasks.

Disease Prediction

A Study of Data Pre-processing Techniques for Imbalanced Biomedical Data Classification

no code implementations4 Nov 2019 Shigang Liu, Jun Zhang, Yang Xiang, Wanlei Zhou, Dongxi Xiang

However, previous studies usually focused on different classifiers, and overlook the class imbalance problem in real-world biomedical datasets.

Drug Discovery General Classification

Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models

no code implementations14 Oct 2019 Derui, Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang

First, such attacks must acquire the outputs from the models by multiple times before actually launching attacks, which is difficult for the MitM adversary in practice.

Hybrid Neural Tagging Model for Open Relation Extraction

no code implementations26 Jul 2019 Shengbin Jia, Yang Xiang

Furthermore, we propose a hybrid neural network model (HNN4ORT) for open relation tagging.

Feature Engineering Relation Extraction

Naive Bayes and BiLSTM Ensemble for Discriminating between Mainland and Taiwan Variation of Mandarin Chinese

no code implementations WS 2019 Li Yang, Yang Xiang

Automatic dialect identification is a more challengingctask than language identification, as it requires the ability to discriminate between varieties of one language.

Dialect Identification Word Embeddings

A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers

1 code implementation10 Jan 2019 Jian-hai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang, Zhenguang Liu

Next, we prove that our mechanism is an FPTAS, i. e., it can be approximated within $1 + \epsilon$ for any given $\epsilon > 0$, while the running time of our mechanism is polynomial in $n$ and $1/\epsilon$, where $n$ is the number of tenants in the datacenter.

Computer Science and Game Theory

ML-Net: multi-label classification of biomedical texts with deep neural networks

4 code implementations13 Nov 2018 Jingcheng Du, Qingyu Chen, Yifan Peng, Yang Xiang, Cui Tao, Zhiyong Lu

Due to this nature, the multi-label text classification task is often considered to be more challenging compared to the binary or multi-class text classification problems.

Classification Feature Engineering +6

An objective-adaptive refinement criterion based on modified ridge extraction method for finite-time Lyapunov exponent (FTLE) calculation

no code implementations13 Nov 2018 Haotian Hang, Bin Yu, Yang Xiang, Bin Zhang, Hong Liu

High-accuracy and high-efficiency finite-time Lyapunov exponent (FTLE) calculation method has long been a research hot point, and adaptive refinement method is a kind of method in this field.

Fluid Dynamics

Triple Trustworthiness Measurement for Knowledge Graph

1 code implementation25 Sep 2018 Shengbin Jia, Yang Xiang, Xiaojun Chen

The Knowledge graph (KG) uses the triples to describe the facts in the real world.

Chinese User Service Intention Classification Based on Hybrid Neural Network

no code implementations25 Sep 2018 Shengbin Jia, Yang Xiang

It is difficult for the intelligent system to understand the semantics of user demand which leads to poor recognition effect, because of the noise in user requirement descriptions.

Classification General Classification +2

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection

no code implementations10 Aug 2018 Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren

In contrast to existing works, the adversarial examples crafted by our method can also deceive recent machine learning based detectors that rely on semantic features such as control-flow-graph.

Cryptography and Security

Automated Big Traffic Analytics for Cyber Security

no code implementations24 Apr 2018 Yuantian Miao, Zichan Ruan, Lei Pan, Yu Wang, Jun Zhang, Yang Xiang

Network traffic analytics technology is a cornerstone for cyber security systems.

Cryptography and Security

Defending against Adversarial Attack towards Deep Neural Networks via Collaborative Multi-task Training

no code implementations14 Mar 2018 Derek Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang

For example, proactive defending methods are invalid against grey-box or white-box attacks, while reactive defending methods are challenged by low-distortion adversarial examples or transferring adversarial examples.

Adversarial Attack

Task-specific Word Identification from Short Texts Using a Convolutional Neural Network

no code implementations3 Jun 2017 Shuhan Yuan, Xintao Wu, Yang Xiang

The other case study on fake review detection shows that our approach can identify the fake-review words/phrases.

Wikipedia Vandal Early Detection: from User Behavior to User Embedding

1 code implementation3 Jun 2017 Shuhan Yuan, Panpan Zheng, Xintao Wu, Yang Xiang

In particular, we develop a multi-source long-short term memory network (M-LSTM) to model user behaviors by using a variety of user edit aspects as inputs, including the history of edit reversion information, edit page titles and categories.

Incorporating Label Dependency for Answer Quality Tagging in Community Question Answering via CNN-LSTM-CRF

1 code implementation COLING 2016 Yang Xiang, Xiaoqiang Zhou, Qingcai Chen, Zhihui Zheng, Buzhou Tang, Xiaolong Wang, Yang Qin

In community question answering (cQA), the quality of answers are determined by the matching degree between question-answer pairs and the correlation among the answers.

Community Question Answering

Representation Learning Models for Entity Search

no code implementations28 Oct 2016 Shijia E, Yang Xiang, Mohan Zhang

We focus on the problem of learning distributed representations for entity search queries, named entities, and their short descriptions.

Representation Learning

The Dependent Random Measures with Independent Increments in Mixture Models

no code implementations27 Jun 2016 Cheng Luo, Richard Yi Da Xu, Yang Xiang

One of the propositions of the dependent random measures is that the atoms of the posterior distribution are shared amongst groups, and hence groups can borrow information from each other.

Smoothed Hierarchical Dirichlet Process: A Non-Parametric Approach to Constraint Measures

no code implementations16 Apr 2016 Cheng Luo, Yang Xiang, Richard Yi Da Xu

The key novelty of this model is that we place a temporal constraint amongst the nearby discrete measures $\{G_j\}$ in the form of symmetric Kullback-Leibler (KL) Divergence with a fixed bound $B$.

Can Uncertainty Management be Realized in a Finite Totally Ordered Probability Algebra?

no code implementations27 Mar 2013 Yang Xiang, Michael P. Beddoes, David L. Poole

In this paper, the feasibility of using finite totally ordered probability models under Alelinnas's Theory of Probabilistic Logic [Aleliunas, 1988] is investigated.

Cannot find the paper you are looking for? You can Submit a new open access paper.