no code implementations • 5 Feb 2025 • Yuchao Wu, Xiaofei Yu, Hao Chen, Yang Luo, Yeyu Tong, Yuzhe ma
The design of PICs is time-consuming and prone to errors due to the extensive and repetitive nature of code involved in photonic chip design.
no code implementations • 1 Apr 2024 • Xiaoxiao Liang, HaoYu Yang, Kang Liu, Bei Yu, Yuzhe ma
Optical proximity correction (OPC) is a vital step to ensure printability in modern VLSI manufacturing.
no code implementations • 31 Mar 2024 • Dongsheng Zuo, Jiadong Zhu, Yikang Ouyang, Yuzhe ma
Furthermore, we enhance the original framework with parallel reinforcement learning and design space pruning techniques and extend its capability to optimize fused multiply-accumulate (MAC) designs.
1 code implementation • 19 Dec 2023 • Jing Cui, Yufei Han, Yuzhe ma, Jianbin Jiao, Junge Zhang
Our algorithm, BadRL, strategically chooses state observations with high attack values to inject triggers during training and testing, thereby reducing the chances of detection.
no code implementations • 18 Mar 2023 • Guojin Chen, Ziyang Yu, Hongduo Liu, Yuzhe ma, Bei Yu
To further enhance printability and fast iterative convergence, we propose a novel deep neural network delicately designed with level set intrinsic principles to facilitate the joint optimization of DNN and GPU accelerated level set optimizer.
no code implementations • 15 Mar 2023 • Guojin Chen, Zehua Pei, HaoYu Yang, Yuzhe ma, Bei Yu, Martin D. F. Wong
Lithography is fundamental to integrated circuit fabrication, necessitating large computation overhead.
no code implementations • 15 Mar 2023 • Wenqian Zhao, Xufeng Yao, Ziyang Yu, Guojin Chen, Yuzhe ma, Bei Yu, Martin D. F. Wong
We inspect the pattern distribution on a design layer and find that different sub-regions have different pattern complexity.
no code implementations • 30 Jan 2023 • Yuzhe ma, Zhijin Zhou
We also derived a theoretical lower bound on the cumulative attack cost that any victim-agnostic attack algorithm must incur.
no code implementations • 15 Aug 2022 • Wei Li, Ruxuan Li, Yuzhe ma, Siu On Chan, David Pan, Bei Yu
Graph coloring, a classical and critical NP-hard problem, is the problem of assigning connected nodes as different colors as possible.
no code implementations • 18 Oct 2021 • Yuzhe ma, Young Wu, Xiaojin Zhu
We study the game redesign problem in which an external designer has the ability to change the payoff function in each round, but incurs a design cost for deviating from the original game.
1 code implementation • 10 Jan 2021 • Guyue Huang, Jingbo Hu, Yifan He, Jialong Liu, Mingyuan Ma, Zhaoyang Shen, Juejian Wu, Yuanfan Xu, Hengrui Zhang, Kai Zhong, Xuefei Ning, Yuzhe ma, HaoYu Yang, Bei Yu, Huazhong Yang, Yu Wang
With the down-scaling of CMOS technology, the design complexity of very large-scale integrated (VLSI) is increasing.
no code implementations • 1 Jan 2021 • Wei Li, Ruxuan Li, Yuzhe ma, Siu On Chan, Bei Yu
To characterize the power of GNNs for the graph coloring problem, we first formalize the discrimination power of GNNs as the capability to assign nodes different colors.
no code implementations • 16 Dec 2020 • Yuzhe ma, Jon Sharp, Ruizhe Wang, Earlence Fernandes, Xiaojin Zhu
In this paper, we study adversarial attacks on KF as part of the more complex machine-human hybrid system of Forward Collision Warning.
no code implementations • 5 Sep 2020 • Yun-Shiuan Chuang, Xuezhou Zhang, Yuzhe ma, Mark K. Ho, Joseph L. Austerweil, Xiaojin Zhu
To solve the machine teaching optimization problem, we use a deep learning approximation method which simulates learners in the environment and learns to predict how feedback affects the learner's internal states.
no code implementations • 16 Jun 2020 • Xuezhou Zhang, Shubham Kumar Bharti, Yuzhe ma, Adish Singla, Xiaojin Zhu
Our TDim results provide the minimum number of samples needed for reinforcement learning, and we discuss their connections to standard PAC-style RL sample complexity and teaching-by-demonstration sample complexity results.
no code implementations • NeurIPS 2020 • Xuezhou Zhang, Yuzhe ma, Adish Singla
To address these challenges, we propose the \textit{task-agnostic RL} framework: In the exploration phase, the agent first collects trajectories by exploring the MDP without the guidance of a reward function.
no code implementations • ICML 2020 • Xuezhou Zhang, Yuzhe ma, Adish Singla, Xiaojin Zhu
In reward-poisoning attacks against reinforcement learning (RL), an attacker can perturb the environment reward $r_t$ into $r_t+\delta_t$ at each step, with the goal of forcing the RL agent to learn a nefarious policy.
no code implementations • 16 Dec 2019 • Haoyu Yang, Wei Zhong, Yuzhe ma, Hao Geng, Ran Chen, Wanli Chen, Bei Yu
VLSI mask optimization is one of the most critical stages in manufacturability aware design, which is costly due to the complicated mask optimization and lithography simulation.
1 code implementation • NeurIPS 2019 • Yuzhe Ma, Xuezhou Zhang, Wen Sun, Xiaojin Zhu
We study a security threat to batch reinforcement learning and control where the attacker aims to poison the learned policy.
no code implementations • 25 Jun 2019 • Kang Liu, Hao-Yu Yang, Yuzhe ma, Benjamin Tan, Bei Yu, Evangeline F. Y. Young, Ramesh Karri, Siddharth Garg
There is substantial interest in the use of machine learning (ML) based techniques throughout the electronic computer-aided design (CAD) flow, particularly those based on deep learning.
no code implementations • 7 May 2019 • Yufei Han, Yuzhe ma, Christopher Gates, Kevin Roundy, Yun Shen
To address these challenges, we formulate collaborative teaching as a consensus and privacy-preserving optimization process to minimize teaching risk.
no code implementations • 23 Mar 2019 • Yuzhe Ma, Xiaojin Zhu, Justin Hsu
Data poisoning attacks aim to manipulate the model produced by a learning algorithm by adversarially modifying the training set.
no code implementations • NeurIPS 2018 • Kwang-Sung Jun, Lihong Li, Yuzhe ma, Xiaojin Zhu
We study adversarial attacks that manipulate the reward signals to control the actions chosen by a stochastic multi-armed bandit algorithm.
no code implementations • 17 Aug 2018 • Yuzhe Ma, Kwang-Sung Jun, Lihong Li, Xiaojin Zhu
We provide a general attack framework based on convex optimization and show that by slightly manipulating rewards in the data, an attacker can force the bandit algorithm to pull a target arm for a target contextual vector.
no code implementations • 26 Jul 2018 • Yuzhe Ma, Ran Chen, Wei Li, Fanhua Shang, Wenjian Yu, Minsik Cho, Bei Yu
To address this issue, various approximation techniques have been investigated, which seek for a light weighted network with little performance degradation in exchange of smaller model size or faster inference.
no code implementations • 23 Jul 2018 • Qianru Zhang, Meng Zhang, Tinghuan Chen, Zhifei Sun, Yuzhe ma, Bei Yu
We propose a taxonomy in terms of three levels, i. e.~structure level, algorithm level, and implementation level, for acceleration methods.
1 code implementation • 18 Jul 2018 • Yuzhe Ma, Subhendu Roy, Jin Miao, Jiamin Chen, Bei Yu
In spite of maturity to the modern electronic design automation (EDA) tools, optimized designs at architectural stage may become sub-optimal after going through physical design flow.
no code implementations • 25 Feb 2018 • Yuzhe Ma, Robert Nowak, Philippe Rigollet, Xuezhou Zhang, Xiaojin Zhu
We call a learner super-teachable if a teacher can trim down an iid training set while making the learner learn even better.