Search Results for author: Haitao Zheng

Found 26 papers, 8 papers with code

Wasserstein Selective Transfer Learning for Cross-domain Text Mining

no code implementations EMNLP 2021 Lingyun Feng, Minghui Qiu, Yaliang Li, Haitao Zheng, Ying Shen

However, the source and target domains usually have different data distributions, which may lead to negative transfer.

Transfer Learning

Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?

no code implementations5 Feb 2024 Anna Yoo Jeong Ha, Josephine Passananti, Ronik Bhaskar, Shawn Shan, Reid Southen, Haitao Zheng, Ben Y. Zhao

We curate real human art across 7 styles, generate matching images from 5 generative models, and apply 8 detectors (5 automated detectors and 3 different human groups including 180 crowdworkers, 4000+ professional artists, and 13 expert artists experienced at detecting AI).

Towards Scalable and Robust Model Versioning

no code implementations17 Jan 2024 Wenxin Ding, Arjun Nitin Bhagoji, Ben Y. Zhao, Haitao Zheng

In this paper, we explore the feasibility of generating multiple versions of a model that possess different attack properties, without acquiring new training data or changing model architecture.

Investigating Graph Structure Information for Entity Alignment with Dangling Cases

no code implementations10 Apr 2023 Jin Xu, Yangning Li, Xiangjin Xie, Yinghui Li, Niu Hu, Haitao Zheng, Yong Jiang

To improve the exploitation of the structural information, we propose a novel entity alignment framework called Weakly-Optimal Graph Contrastive Learning (WOGCL), which is refined on three dimensions : (i) Model.

Contrastive Learning Entity Alignment +3

Linguistic Rules-Based Corpus Generation for Native Chinese Grammatical Error Correction

2 code implementations19 Oct 2022 Shirong Ma, Yinghui Li, Rongyi Sun, Qingyu Zhou, Shulin Huang, Ding Zhang, Li Yangning, Ruiyang Liu, Zhongli Li, Yunbo Cao, Haitao Zheng, Ying Shen

Extensive experiments and detailed analyses not only demonstrate that the training data constructed by our method effectively improves the performance of CGEC models, but also reflect that our benchmark is an excellent resource for further development of the CGEC field.

Grammatical Error Correction

Natural Backdoor Datasets

1 code implementation21 Jun 2022 Emily Wenger, Roma Bhattacharjee, Arjun Nitin Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao

Research on physical backdoors is limited by access to large datasets containing real images of physical objects co-located with targets of classification.

Understanding Robust Learning through the Lens of Representation Similarities

1 code implementation20 Jun 2022 Christian Cianfarani, Arjun Nitin Bhagoji, Vikash Sehwag, Ben Y. Zhao, Prateek Mittal, Haitao Zheng

Representation learning, i. e. the generation of representations useful for downstream applications, is a task of fundamental importance that underlies much of the success of deep neural networks (DNNs).

Representation Learning

On the Permanence of Backdoors in Evolving Models

no code implementations8 Jun 2022 Huiying Li, Arjun Nitin Bhagoji, Yuxin Chen, Haitao Zheng, Ben Y. Zhao

Existing research on training-time attacks for deep neural networks (DNNs), such as backdoors, largely assume that models are static once trained, and hidden backdoors trained into models remain active indefinitely.

Assessing Privacy Risks from Feature Vector Reconstruction Attacks

no code implementations11 Feb 2022 Emily Wenger, Francesca Falzon, Josephine Passananti, Haitao Zheng, Ben Y. Zhao

In deep neural networks for facial recognition, feature vectors are numerical representations that capture the unique features of a given face.

SoK: Anti-Facial Recognition Technology

no code implementations8 Dec 2021 Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao

The rapid adoption of facial recognition (FR) technology by both government and commercial entities in recent years has raised concerns about civil liberties and privacy.

Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks

no code implementations13 Oct 2021 Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao

We propose a novel iterative clustering and pruning solution that trims "innocent" training samples, until all that remains is the set of poisoned data responsible for the attack.

Data Poisoning Malware Classification

"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World

no code implementations20 Sep 2021 Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Y. Zhao

Advances in deep learning have introduced a new wave of voice synthesis tools, capable of producing audio that sounds as if spoken by a target speaker.

Speaker Recognition Speech Synthesis

ASR-GLUE: A New Multi-task Benchmark for ASR-Robust Natural Language Understanding

no code implementations30 Aug 2021 Lingyun Feng, Jianwei Yu, Deng Cai, Songxiang Liu, Haitao Zheng, Yan Wang

%To facilitate the research on ASR-robust general language understanding, In this paper, we propose ASR-GLUE benchmark, a new collection of 6 different NLU tasks for evaluating the performance of models under ASR error across 3 different levels of background noise and 6 speakers with various voice characteristics.

Automatic Speech Recognition Automatic Speech Recognition (ASR) +3

Understanding the Effect of Bias in Deep Anomaly Detection

1 code implementation16 May 2021 Ziyu Ye, Yuxin Chen, Haitao Zheng

We also provide an extensive empirical study on how a biased training anomaly set affects the anomaly score function and therefore the detection performance on different anomaly classes.

Anomaly Detection

A Real-time Defense against Website Fingerprinting Attacks

no code implementations8 Feb 2021 Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao

We experimentally demonstrate that Dolos provides 94+% protection against state-of-the-art WF attacks under a variety of settings.

Website Fingerprinting Attacks Cryptography and Security

Understanding Bias in Anomaly Detection: A Semi-Supervised View with PAC Guarantees

1 code implementation1 Jan 2021 Ziyu Ye, Yuxin Chen, Haitao Zheng

Given two different anomaly score functions, we formally define their difference in performance as the relative scoring bias of the anomaly detectors.

Semi-supervised Anomaly Detection Supervised Anomaly Detection +1

Answer-driven Deep Question Generation based on Reinforcement Learning

no code implementations COLING 2020 Liuyin Wang, Zihan Xu, Zibo Lin, Haitao Zheng, Ying Shen

First, we propose an answer-aware initialization module with a gated connection layer which introduces both document and answer information to the decoder, thus helping to guide the choice of answer-focused question words.

Question Generation Question-Generation +2

Integrating User History into Heterogeneous Graph for Dialogue Act Recognition

no code implementations COLING 2020 Dong Wang, Ziran Li, Haitao Zheng, Ying Shen

Dialogue Act Recognition (DAR) is a challenging problem in Natural Language Understanding, which aims to attach Dialogue Act (DA) labels to each utterance in a conversation.

Dialogue Act Classification

Summarize before Aggregate: A Global-to-local Heterogeneous Graph Inference Network for Conversational Emotion Recognition

no code implementations COLING 2020 Dongming Sheng, Dong Wang, Ying Shen, Haitao Zheng, Haozhuang Liu

Local dependencies, which captures short-term emotional effects between neighbouring utterances, are further injected via an Aggregation Graph to distinguish the subtle differences between utterances containing emotional phrases.

Emotion Recognition in Conversation

Backdoor Attacks Against Deep Learning Systems in the Physical World

no code implementations CVPR 2021 Emily Wenger, Josephine Passananti, Arjun Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao

A critical question remains unanswered: can backdoor attacks succeed using physical objects as triggers, thus making them a credible threat against deep learning systems in the real world?

Transfer Learning

Piracy Resistant Watermarks for Deep Neural Networks

1 code implementation2 Oct 2019 Huiying Li, Emily Wenger, Shawn Shan, Ben Y. Zhao, Haitao Zheng

We empirically show that our proposed watermarks achieve piracy resistance and other watermark properties, over a wide range of tasks and models.

Transfer Learning

Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors

1 code implementation23 Oct 2018 Yanzi Zhu, Zhujun Xiao, Yuxin Chen, Zhijing Li, Max Liu, Ben Y. Zhao, Haitao Zheng

Our work demonstrates a new set of silent reconnaissance attacks, which leverages the presence of commodity WiFi devices to track users inside private homes and offices, without compromising any WiFi network, data packets, or devices.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.