no code implementations • 30 Dec 2024 • Yihan Wang, Yiwei Lu, Xiao-Shan Gao, Gautam Kamath, YaoLiang Yu
Availability attacks, or unlearnable examples, are defensive techniques that allow data owners to modify their datasets in ways that prevent unauthorized machine learning models from learning effectively while maintaining the data's intended functionality.
no code implementations • 18 Sep 2024 • Zhe Yu, Yiwei Lu
Building on this, this paper explores how to provide designers with effective explanations for their legally relevant design decisions.
no code implementations • 25 Jun 2024 • Martin Pawelczyk, Jimmy Z. Di, Yiwei Lu, Gautam Kamath, Ayush Sekhari, Seth Neel
We revisit the efficacy of several practical methods for approximate machine unlearning developed for large-scale deep learning.
no code implementations • 5 Jun 2024 • Yihan Wang, Yiwei Lu, Guojun Zhang, Franziska Boenisch, Adam Dziedzic, YaoLiang Yu, Xiao-Shan Gao
Machine unlearning provides viable solutions to revoke the effect of certain training data on pre-trained model parameters.
1 code implementation • 10 Apr 2024 • Yiwei Lu, Matthew Y. R. Yang, Zuoqiu Liu, Gautam Kamath, YaoLiang Yu
Copyright infringement may occur when a generative model produces samples substantially similar to some copyrighted data that it had access to during the training phase.
no code implementations • NeurIPS 2023 • Yiwei Lu, YaoLiang Yu, Xinlin Li, Vahid Partovi Nia
In neural network binarization, BinaryConnect (BC) and its variants are considered the standard.
no code implementations • 20 Feb 2024 • Yiwei Lu, Matthew Y. R. Yang, Gautam Kamath, YaoLiang Yu
In this paper, we extend the exploration of the threat of indiscriminate attacks on downstream tasks that apply pre-trained feature extractors.
no code implementations • 15 Feb 2024 • Yiwei Lu, Guojun Zhang, Sun Sun, Hongyu Guo, YaoLiang Yu
In self-supervised contrastive learning, a widely-adopted objective function is InfoNCE, which uses the heuristic cosine similarity for the representation comparison, and is closely related to maximizing the Kullback-Leibler (KL)-based mutual information.
1 code implementation • 7 Mar 2023 • Yiwei Lu, Gautam Kamath, YaoLiang Yu
Building on existing parameter corruption attacks and refining the Gradient Canceling attack, we perform extensive experiments to confirm our theoretical findings, test the predictability of our transition threshold, and significantly improve existing indiscriminate data poisoning baselines over a range of datasets and models.
no code implementations • 7 Sep 2022 • Zhe Yu, Yiwei Lu
Ontology is a popular method for knowledge representation in different domains, including the legal domain, and description logics (DL) is commonly used as its description language.
1 code implementation • 19 Apr 2022 • Yiwei Lu, Gautam Kamath, YaoLiang Yu
Data poisoning attacks, in which a malicious adversary aims to influence a model by injecting "poisoned" data into the training process, have attracted significant recent attention.
no code implementations • 29 Sep 2021 • Guojun Zhang, Yiwei Lu, Sun Sun, Hongyu Guo, YaoLiang Yu
Self-supervised contrastive learning is an emerging field due to its power in providing good data representations.
1 code implementation • 23 Oct 2020 • Mahesh Kumar Krishna Reddy, Mrigank Rochan, Yiwei Lu, Yang Wang
In particular, we propose a new problem called unlabeled scene-adaptive crowd counting.
1 code implementation • ECCV 2020 • Yiwei Lu, Frank Yu, Mahesh Kumar Krishna Reddy, Yang Wang
In this paper, we propose a novel few-shot scene-adaptive anomaly detection problem to address the limitations of previous approaches.
no code implementations • 3 Dec 2019 • Zhao Kang, Xiao Lu, Yiwei Lu, Chong Peng, Zenglin Xu
Leveraging on the underlying low-dimensional structure of data, low-rank and sparse modeling approaches have achieved great success in a wide range of applications.
no code implementations • 5 Sep 2019 • Yiwei Lu, Mahesh Kumar Krishna Reddy, Seyed shahabeddin Nabavi, Yang Wang
Anomaly detection in videos aims at reporting anything that does not conform the normal behaviour or distribution.
1 code implementation • 11 Mar 2019 • Zhao Kang, Yiwei Lu, Yuanzhang Su, Changsheng Li, Zenglin Xu
Data similarity is a key concept in many data-driven applications.