1 code implementation • ECCV 2020 • Mahdi S. Hosseini, Lyndon Chan, Weimin Huang, Yichen Wang, Danial Hasan, Corwyn Rowsell, Savvas Damaskinos, Konstantinos N. Plataniotis
Deep learning tools in computational pathology, unlike natural vision tasks, face with limited histological tissue labels for classification.
no code implementations • 13 May 2025 • Lu Dai, Wenxuan Zhu, Xuehui Quan, Renzi Meng, Sheng Chai, Yichen Wang
To improve the identification of potential anomaly patterns in complex user behavior, this paper proposes an anomaly detection method based on a deep mixture density network.
no code implementations • 2 Apr 2025 • Xiao Tang, Kexin Zhao, Chao Shen, Qinghe Du, Yichen Wang, Dusit Niyato, Zhu Han
While unmanned aerial vehicles (UAVs) with flexible mobility are envisioned to enhance physical layer security in wireless communications, the efficient security design that adapts to such high network dynamics is rather challenging.
no code implementations • 23 Mar 2025 • Chi-Ning Chou, Hang Le, Yichen Wang, SueYeon Chung
Our framework provides a novel geometric perspective for understanding and quantifying feature learning in both artificial and biological neural networks.
no code implementations • 19 Mar 2025 • Hangtao Zhang, Yichen Wang, Shihui Yan, Chenyu Zhu, Ziqi Zhou, Linshan Hou, Shengshan Hu, Minghui Li, Yanjun Zhang, Leo Yu Zhang
To this end, we design TRAnsformation Consistency Evaluation (TRACE), a brand-new method for detecting poisoned samples at test time in object detection.
no code implementations • 12 Mar 2025 • Abe Bohan Hou, Hongru Du, Yichen Wang, Jingyu Zhang, Zixiao Wang, Paul Pu Liang, Daniel Khashabi, Lauren Gardner, Tianxing He
Can we simulate a sandbox society with generative agents to model human behavior, thereby reducing the over-reliance on real human trials for assessing public policies?
1 code implementation • 3 Feb 2025 • Yichen Wang, Yudong Chen, Lorenzo Rosasco, Fanghui Liu
Understanding how the test risk scales with model complexity is a central question in machine learning.
1 code implementation • 22 Dec 2024 • Yichen Wang, Yuxuan Chou, Ziqi Zhou, Hangtao Zhang, Wei Wan, Shengshan Hu, Minghui Li
In the second stage, we use attention-based feature fusion to overlay these RFs onto predictive features of clean images and remove unnecessary perturbations.
no code implementations • 2 Dec 2024 • Yichen Wang, Chengcheng Yu
To address these issues, we propose CSP-AIT-Net, a novel spatiotemporal graph attention framework designed to enhance OD flow prediction by incorporating asynchronous inflow tracking and advanced station semantics representation.
1 code implementation • 30 Nov 2024 • Yu Wang, Xiaofei Zhou, Yichen Wang, Geyuan Zhang, Tianxing He
With the significant advancement of Large Vision-Language Models (VLMs), concerns about their potential misuse and abuse have grown rapidly.
no code implementations • 27 Nov 2024 • Yichen Wang, Jie Wang, Fulin Wang, Xiang Li, Hao Yin, Bhiksha Raj
In recent years, graph representation learning has undergone a paradigm shift, driven by the emergence and proliferation of graph neural networks (GNNs) and their heterogeneous counterparts.
no code implementations • 27 Nov 2024 • Jie Wang, Yichen Wang, Zhilin Zhang, Jianhao Zeng, Kaidi Wang, Zhiyang Chen
With strong expressive capabilities in Large Language Models(LLMs), generative models effectively capture sentiment structures and deep semantics, however, challenges remain in fine-grained sentiment classification across multi-lingual and complex contexts.
no code implementations • 26 Nov 2024 • Yichen Wang, Qing Yu, Yancun Song
Marginal treatment effects of residential land use is higher on streets with middle-aged residents, high fixed employment, and low car ownership.
no code implementations • 26 Nov 2024 • Yichen Wang, Hao Yin, Yifan Yang, Chenyang Zhao, Siqin Wang
Freight truck-related crashes pose significant challenges, leading to substantial economic losses, injuries, and fatalities, with pronounced spatial disparities across different regions.
no code implementations • 18 Nov 2024 • Xianlong Wang, Hewen Pan, Hangtao Zhang, Minghui Li, Shengshan Hu, Ziqi Zhou, Lulu Xue, Peijin Guo, Yichen Wang, Wei Wan, Aishan Liu, Leo Yu Zhang
To address this, we propose \textit{TrojanRobot}, a highly stealthy and broadly effective robotic backdoor attack in the physical world.
no code implementations • 16 Jul 2024 • Hangtao Zhang, Chenyu Zhu, Xianlong Wang, Ziqi Zhou, Changgan Yin, Minghui Li, Lulu Xue, Yichen Wang, Shengshan Hu, Aishan Liu, Peijin Guo, Leo Yu Zhang
Embodied AI represents systems where AI is integrated into physical entities.
1 code implementation • 15 Jun 2024 • Chengzhengxu Li, Xiaoming Liu, Zhaohan Zhang, Yichen Wang, Chen Liu, Yu Lan, Chao Shen
Recent advances in prompt optimization have notably enhanced the performance of pre-trained language models (PLMs) on downstream tasks.
no code implementations • 8 Jun 2024 • Chengyuan Deng, Yiqun Duan, Xin Jin, Heng Chang, Yijun Tian, Han Liu, Yichen Wang, Kuofeng Gao, Henry Peng Zou, Yiqiao Jin, Yijia Xiao, Shenghao Wu, Zongxing Xie, Weimin Lyu, Sihong He, Lu Cheng, Haohan Wang, Jun Zhuang
Large Language Models (LLMs) have achieved unparalleled success across diverse language modeling tasks in recent years.
no code implementations • 17 Apr 2024 • Hangtao Zhang, Shengshan Hu, Yichen Wang, Leo Yu Zhang, Ziqi Zhou, Xianlong Wang, Yanjun Zhang, Chao Chen
This paper is dedicated to bridging this gap by introducing Detector Collapse} (DC), a brand-new backdoor attack paradigm tailored for object detection.
1 code implementation • 18 Feb 2024 • Yichen Wang, Shangbin Feng, Abe Bohan Hou, Xiao Pu, Chao Shen, Xiaoming Liu, Yulia Tsvetkov, Tianxing He
Our experiments reveal that almost none of the existing detectors remain robust under all the attacks, and all detectors exhibit different loopholes.
2 code implementations • 17 Feb 2024 • Abe Bohan Hou, Jingyu Zhang, Yichen Wang, Daniel Khashabi, Tianxing He
Recent watermarked generation algorithms inject detectable signatures during language generation to facilitate post-hoc detection.
1 code implementation • 1 Feb 2024 • Shengchao Liu, Xiaoming Liu, Yichen Wang, Zehua Cheng, Chengzhengxu Li, Zhaohan Zhang, Yu Lan, Chao Shen
Hence, we propose a novel fine-tuned detector, Pecola, bridging metric-based and fine-tuned methods by contrastive learning on selective perturbation.
1 code implementation • 8 Nov 2023 • Yichen Wang, Kevin Yang, Xiaoming Liu, Dan Klein
Existing LLM-based systems for writing long-form stories or story outlines frequently suffer from unnatural pacing, whether glossing over important events or over-elaborating on insignificant details, resulting in a jarring experience for the reader.
no code implementations • 21 Oct 2023 • Li Wang, Xinyu Zhang, Fachuan Zhao, Chuze Wu, Yichen Wang, Ziying Song, Lei Yang, Jun Li, Huaping Liu
The proposed Fuzzy-NMS module combines the volume and clustering density of candidate bounding boxes, refining them with a fuzzy classification method and optimizing the appropriate suppression thresholds to reduce uncertainty in the NMS process.
1 code implementation • 11 Oct 2023 • Xinyu Zhang, Li Wang, Jian Chen, Cheng Fang, Lei Yang, Ziying Song, Guangqi Yang, Yichen Wang, Xiaofei Zhang, Jun Li, Zhiwei Li, Qingshan Yang, Zhenlin Zhang, Shuzhi Sam Ge
Compared with commonly used 3D radars, the latest 4D radars have precise vertical resolution and higher point cloud density, making it a highly promising sensor for autonomous driving in complex environmental perception.
2 code implementations • 6 Oct 2023 • Abe Bohan Hou, Jingyu Zhang, Tianxing He, Yichen Wang, Yung-Sung Chuang, Hongwei Wang, Lingfeng Shen, Benjamin Van Durme, Daniel Khashabi, Yulia Tsvetkov
Existing watermarking algorithms are vulnerable to paraphrase attacks because of their token-level design.
no code implementations • 12 Sep 2023 • Xinyue Hu, Zenan Sun, Yi Nian, Yichen Wang, Yifang Dang, Fang Li, Jingna Feng, Evan Yu, Cui Tao
Objective: Our goal is to utilize Graph Neural Networks (GNNs) with claims data for ADRD risk prediction.
1 code implementation • 14 Aug 2023 • Chengzhengxu Li, Xiaoming Liu, Yichen Wang, Duyi Li, Yu Lan, Chao Shen
However, prior discrete prompt optimization methods require expert knowledge to design the base prompt set and identify high-quality prompts, which is costly, inefficient, and subjective.
no code implementations • 13 Mar 2023 • T. Tony Cai, Yichen Wang, Linjun Zhang
The score attack method is based on the tracing attack concept in differential privacy and can be applied to any statistical model with a well-defined score statistic.
2 code implementations • 6 Mar 2023 • Shuai Tang, Sergul Aydore, Michael Kearns, Saeyoung Rho, Aaron Roth, Yichen Wang, Yu-Xiang Wang, Zhiwei Steven Wu
We revisit the problem of differentially private squared error linear regression.
1 code implementation • 20 Dec 2022 • Xiaoming Liu, Zhaohan Zhang, Yichen Wang, Hang Pu, Yu Lan, Chao Shen
Machine-Generated Text (MGT) detection, a task that discriminates MGT from Human-Written Text (HWT), plays a crucial role in preventing misuse of text generative models, which excel in mimicking human writing style recently.
no code implementations • 8 Nov 2020 • T. Tony Cai, Yichen Wang, Linjun Zhang
We propose differentially private algorithms for parameter estimation in both low-dimensional and high-dimensional sparse generalized linear models (GLMs) by constructing private versions of projected gradient descent.
1 code implementation • 1 Jul 2020 • Haiyang Liu, Yichen Wang, Jiayi Zhao, Guowu Yang, Fengmao Lv
Our method assumes that both the source images with full pixel-level labels and unlabeled target images are available during training.
no code implementations • 8 Apr 2019 • Jiaxuan You, Yichen Wang, Aditya Pal, Pong Eksombatchai, Chuck Rosenberg, Jure Leskovec
Recommender systems that can learn from cross-session data to dynamically predict the next item a user will choose are crucial for online platforms.
no code implementations • 12 Feb 2019 • T. Tony Cai, Yichen Wang, Linjun Zhang
By refining the "tracing adversary" technique for lower bounds in the theoretical computer science literature, we formulate a general lower bound argument for minimax risks with differential privacy constraints, and apply this argument to high-dimensional mean estimation and linear regression problems.
no code implementations • 22 May 2018 • Yichen Wang, Le Song, Hongyuan Zha
We first propose a unified KL framework that generalizes existing maximum entropy inverse optimal control methods.
no code implementations • NeurIPS 2017 • Yichen Wang, Xiaojing Ye, Hongyuan Zha, Le Song
Point processes are powerful tools to model user activities and have a plethora of applications in social sciences.
2 code implementations • ICML 2017 • Rakshit Trivedi, Hanjun Dai, Yichen Wang, Le Song
The occurrence of a fact (edge) is modeled as a multivariate point process whose intensity function is modulated by the score for that fact computed based on the learned entity embeddings.
no code implementations • ICML 2017 • Yichen Wang, Grady Williams, Evangelos Theodorou, Le Song
Temporal point processes have been widely applied to model event sequence data generated by online users.
no code implementations • NeurIPS 2016 • Yichen Wang, Nan Du, Rakshit Trivedi, Le Song
Matching users to the right items at the right time is a fundamental task in recommendation systems.
no code implementations • 13 Sep 2016 • Hanjun Dai, Yichen Wang, Rakshit Trivedi, Le Song
DeepCoevolve use recurrent neural network (RNN) over evolving networks to define the intensity function in point processes, which allows the model to capture complex mutual influence between users and items, and the feature evolution over time.
no code implementations • 3 Aug 2016 • Niao He, Zaid Harchaoui, Yichen Wang, Le Song
Since almost all gradient-based optimization algorithms rely on Lipschitz-continuity, optimizing Poisson likelihood models with a guarantee of convergence can be challenging, especially for large-scale problems.
no code implementations • NeurIPS 2015 • Nan Du, Yichen Wang, Niao He, Jimeng Sun, Le Song
By making personalized suggestions, a recommender system is playing a crucial role in improving the engagement of users in modern web-services.
1 code implementation • NeurIPS 2015 • Mehrdad Farajtabar, Yichen Wang, Manuel Gomez Rodriguez, Shuang Li, Hongyuan Zha, Le Song
Information diffusion in online social networks is affected by the underlying network topology, but it also has the power to change it.