no code implementations • 6 Mar 2024 • Zewei Tian, Min Sun, Alex Liu, Shawon Sarkar, Jing Liu
This paper explores the transformative potential of computer-assisted textual analysis in enhancing instructional quality through in-depth insights from educational artifacts.
no code implementations • 2 Dec 2023 • Alex Liu, Min Sun
Obtaining stakeholders' diverse experiences and opinions about current policy in a timely manner is crucial for policymakers to identify strengths and gaps in resource allocation, thereby supporting effective policy design and implementation.
no code implementations • 17 Oct 2022 • Joey Wang, Yingcan Wei, Minseok Lee, Matthias Langer, Fan Yu, Jie Liu, Alex Liu, Daniel Abel, Gems Guo, Jianbing Dong, Jerry Shi, Kunlun Li
In this talk, we introduce Merlin HugeCTR.
1 code implementation • 12 Oct 2022 • Hongyuan Yu, Ting Li, Weichen Yu, Jianguo Li, Yan Huang, Liang Wang, Alex Liu
In this paper, we propose Regularized Graph Structure Learning (RGSL) model to incorporate both explicit prior structure and implicit structure together, and learn the forecasting deep networks along with the graph structure.
no code implementations • 27 Jun 2022 • Zain Shamsi, Daniel Zhang, Daehyun Kyoung, Alex Liu
Network honeypots are often used by information security teams to measure the threat landscape in order to secure their networks.
no code implementations • NeurIPS Workshop Deep_Invers 2021 • Alex Liu, Yi Xue, Laura Waller
Computer-generated holography (CGH) has broad applications such as direct-view display, virtual and augmented reality, as well as optical microscopy.
no code implementations • 10 Apr 2020 • Chaochao Chen, Liang Li, Wenjing Fang, Jun Zhou, Li Wang, Lei Wang, Shuang Yang, Alex Liu, Hao Wang
Nowadays, the utilization of the ever expanding amount of data has made a huge impact on web technologies while also causing various types of security concerns.
1 code implementation • 5 Nov 2019 • Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, Ting Wang
Specifically, (i) we develop a new attack model that jointly optimizes adversarial inputs and poisoned models; (ii) with both analytical and empirical evidence, we reveal that there exist intriguing "mutual reinforcement" effects between the two attack vectors -- leveraging one vector significantly amplifies the effectiveness of the other; (iii) we demonstrate that such effects enable a large design spectrum for the adversary to enhance the existing attacks that exploit both vectors (e. g., backdoor attacks), such as maximizing the attack evasiveness with respect to various detection methods; (iv) finally, we discuss potential countermeasures against such optimized attacks and their technical challenges, pointing to several promising research directions.
1 code implementation • COLING 2018 • Juan Diego Rodriguez, Adam Caldwell, Alex Liu, er
Our results empirically demonstrate when each of the published approaches tends to do well.
Entity Extraction using GAN Named Entity Recognition (NER) +2