Search Results for author: Alex Liu

Found 11 papers, 3 papers with code

Enhancing Instructional Quality: Leveraging Computer-Assisted Textual Analysis to Generate In-Depth Insights from Educational Artifacts

no code implementations6 Mar 2024 Zewei Tian, Min Sun, Alex Liu, Shawon Sarkar, Jing Liu

This paper explores the transformative potential of computer-assisted textual analysis in enhancing instructional quality through in-depth insights from educational artifacts.

From Voices to Validity: Leveraging Large Language Models (LLMs) for Textual Analysis of Policy Stakeholder Interviews

no code implementations2 Dec 2023 Alex Liu, Min Sun

Obtaining stakeholders' diverse experiences and opinions about current policy in a timely manner is crucial for policymakers to identify strengths and gaps in resource allocation, thereby supporting effective policy design and implementation.

Sentiment Analysis

Regularized Graph Structure Learning with Semantic Knowledge for Multi-variates Time-Series Forecasting

1 code implementation12 Oct 2022 Hongyuan Yu, Ting Li, Weichen Yu, Jianguo Li, Yan Huang, Liang Wang, Alex Liu

In this paper, we propose Regularized Graph Structure Learning (RGSL) model to incorporate both explicit prior structure and implicit structure together, and learn the forecasting deep networks along with the graph structure.

Graph Generation Graph structure learning +2

Measuring and Clustering Network Attackers using Medium-Interaction Honeypots

no code implementations27 Jun 2022 Zain Shamsi, Daniel Zhang, Daehyun Kyoung, Alex Liu

Network honeypots are often used by information security teams to measure the threat landscape in order to secure their networks.

Clustering

Sparse deep computer-generated holography for optical microscopy

no code implementations NeurIPS Workshop Deep_Invers 2021 Alex Liu, Yi Xue, Laura Waller

Computer-generated holography (CGH) has broad applications such as direct-view display, virtual and augmented reality, as well as optical microscopy.

Secret Sharing based Secure Regressions with Applications

no code implementations10 Apr 2020 Chaochao Chen, Liang Li, Wenjing Fang, Jun Zhou, Li Wang, Lei Wang, Shuang Yang, Alex Liu, Hao Wang

Nowadays, the utilization of the ever expanding amount of data has made a huge impact on web technologies while also causing various types of security concerns.

regression

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models

1 code implementation5 Nov 2019 Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, Ting Wang

Specifically, (i) we develop a new attack model that jointly optimizes adversarial inputs and poisoned models; (ii) with both analytical and empirical evidence, we reveal that there exist intriguing "mutual reinforcement" effects between the two attack vectors -- leveraging one vector significantly amplifies the effectiveness of the other; (iii) we demonstrate that such effects enable a large design spectrum for the adversary to enhance the existing attacks that exploit both vectors (e. g., backdoor attacks), such as maximizing the attack evasiveness with respect to various detection methods; (iv) finally, we discuss potential countermeasures against such optimized attacks and their technical challenges, pointing to several promising research directions.

Cannot find the paper you are looking for? You can Submit a new open access paper.