Search Results for author: Han Xu

Found 43 papers, 15 papers with code

Self-playing Adversarial Language Game Enhances LLM Reasoning

1 code implementation16 Apr 2024 Pengyu Cheng, Tianhao Hu, Han Xu, Zhisong Zhang, Yong Dai, Lei Han, Nan Du

Hence, we are curious about whether LLMs' reasoning ability can be further enhanced by Self-Play in this Adversarial language Game (SPAG).

Text-IF: Leveraging Semantic Text Guidance for Degradation-Aware and Interactive Image Fusion

1 code implementation25 Mar 2024 Xunpeng Yi, Han Xu, Hao Zhang, Linfeng Tang, Jiayi Ma

Through the text semantic encoder and semantic interaction fusion decoder, Text-IF is accessible to the all-in-one infrared and visible image degradation-aware processing and the interactive flexible fusion outcomes.

Unveiling and Mitigating Memorization in Text-to-image Diffusion Models through Cross Attention

1 code implementation17 Mar 2024 Jie Ren, Yaxin Li, Shenglai Zen, Han Xu, Lingjuan Lyu, Yue Xing, Jiliang Tang

Recent advancements in text-to-image diffusion models have demonstrated their remarkable capability to generate high-quality images from textual prompts.

Memorization

The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation (RAG)

1 code implementation23 Feb 2024 Shenglai Zeng, Jiankun Zhang, Pengfei He, Yue Xing, Yiding Liu, Han Xu, Jie Ren, Shuaiqiang Wang, Dawei Yin, Yi Chang, Jiliang Tang

In this work, we conduct extensive empirical studies with novel attack methods, which demonstrate the vulnerability of RAG systems on leaking the private retrieval database.

Language Modelling Retrieval

Copyright Protection in Generative AI: A Technical Perspective

no code implementations4 Feb 2024 Jie Ren, Han Xu, Pengfei He, Yingqian Cui, Shenglai Zeng, Jiankun Zhang, Hongzhi Wen, Jiayuan Ding, Hui Liu, Yi Chang, Jiliang Tang

We examine from two distinct viewpoints: the copyrights pertaining to the source data held by the data owners and those of the generative models maintained by the model builders.

A Scalable Network-Aware Multi-Agent Reinforcement Learning Framework for Decentralized Inverter-based Voltage Control

no code implementations7 Dec 2023 Han Xu, Jialin Zheng, Guannan Qu

This paper addresses the challenges associated with decentralized voltage control in power grids due to an increase in distributed generations (DGs).

Multi-agent Reinforcement Learning

Accurate Time-segmented Loss Model for SiC MOSFETs in Electro-thermal Multi-Rate Simulation

no code implementations13 Nov 2023 Jialin Zheng, Zhengming Zhao, Han Xu, Weicheng Liu, Yangbin Zeng

The experimental results verify the accuracy of the model which provides guidance for the circuit design of SiC MOSFETs.

An Event-Based Synchronization Framework for Controller Hardware-in-the-loop Simulation of Electric Railway Power Electronics Systems

no code implementations13 Nov 2023 Jialin Zheng, Yangbin Zeng, Han Xu, Weicheng Liu, Di Mou, Zhengming Zhao

However, it is challenging to implement the conventional CHIL simulations on the railway power converters with complex topologies and high switching frequencies due to strict real_time constraints.

FPGA-Based Implicit-Explicit Real-time Simulation Solver for Railway Wireless Power Transfer with Nonlinear Magnetic Coupling Components

no code implementations27 Oct 2023 Han Xu, Yangbin Zeng, Jialin Zheng, Kainan Chen, Weicheng Liu, Zhengming Zhao

The novelty of our approach lies in the use of the IMEX algorithm and the half-step integration method, which significantly improves the accuracy and efficiency of the simulation.

Numerical Derivative-based Flexible Integration Algorithm for Power Electronic Systems Simulation Considering Nonlinear Components

no code implementations24 Oct 2023 Han Xu, Bochen Shi, Zhujun Yu, Jialin Zheng, Zhengming Zhao

Conventional general-purpose integration algorithms assume nonlinearity within systems but face inefficiency in handling the piecewise characteristics of power electronic switches.

Computational Efficiency

Exploring Memorization in Fine-tuned Language Models

no code implementations10 Oct 2023 Shenglai Zeng, Yaxin Li, Jie Ren, Yiding Liu, Han Xu, Pengfei He, Yue Xing, Shuaiqiang Wang, Jiliang Tang, Dawei Yin

In this work, we conduct the first comprehensive analysis to explore language models' (LMs) memorization during fine-tuning across tasks.

Memorization

FT-Shield: A Watermark Against Unauthorized Fine-tuning in Text-to-Image Diffusion Models

no code implementations3 Oct 2023 Yingqian Cui, Jie Ren, Yuping Lin, Han Xu, Pengfei He, Yue Xing, Wenqi Fan, Hui Liu, Jiliang Tang

Text-to-image generative models based on latent diffusion models (LDM) have demonstrated their outstanding ability in generating high-quality and high-resolution images according to language prompt.

Face Transfer

On the Generalization of Training-based ChatGPT Detection Methods

1 code implementation2 Oct 2023 Han Xu, Jie Ren, Pengfei He, Shenglai Zeng, Yingqian Cui, Amy Liu, Hui Liu, Jiliang Tang

ChatGPT is one of the most popular language models which achieve amazing performance on various natural language tasks.

DiffusionShield: A Watermark for Copyright Protection against Generative Diffusion Models

no code implementations25 May 2023 Yingqian Cui, Jie Ren, Han Xu, Pengfei He, Hui Liu, Lichao Sun, Yue Xing, Jiliang Tang

By detecting the watermark from generated images, copyright infringement can be exposed with evidence.

Transferable Unlearnable Examples

1 code implementation18 Oct 2022 Jie Ren, Han Xu, Yuxuan Wan, Xingjun Ma, Lichao Sun, Jiliang Tang

The unlearnable strategies have been introduced to prevent third parties from training on the data without permission.

Towards Fair Classification against Poisoning Attacks

no code implementations18 Oct 2022 Han Xu, Xiaorui Liu, Yuxuan Wan, Jiliang Tang

We demonstrate that the fairly trained classifiers can be greatly vulnerable to such poisoning attacks, with much worse accuracy & fairness trade-off, even when we apply some of the most effective defenses (originally proposed to defend traditional classification tasks).

Classification Fairness

Towards Generating Adversarial Examples on Mixed-type Data

no code implementations17 Oct 2022 Han Xu, Menghai Pan, Zhimeng Jiang, Huiyuan Chen, Xiaoting Li, Mahashweta Das, Hao Yang

The existence of adversarial attacks (or adversarial examples) brings huge concern about the machine learning (ML) model's safety issues.

Anomaly Detection Vocal Bursts Type Prediction

Probabilistic Categorical Adversarial Attack & Adversarial Training

no code implementations17 Oct 2022 Han Xu, Pengfei He, Jie Ren, Yuxuan Wan, Zitao Liu, Hui Liu, Jiliang Tang

To tackle this problem, we propose Probabilistic Categorical Adversarial Attack (PCAA), which transfers the discrete optimization problem to a continuous problem that can be solved efficiently by Projected Gradient Descent.

Adversarial Attack

Seen to Unseen: When Fuzzy Inference System Predicts IoT Device Positioning Labels That Had Not Appeared in Training Phase

no code implementations21 Sep 2022 Han Xu, Zheming Zuo, Jie Li, Victor Chang

Situating at the core of Artificial Intelligence (AI), Machine Learning (ML), and more specifically, Deep Learning (DL) have embraced great success in the past two decades.

feature selection

A Comprehensive Survey on Trustworthy Recommender Systems

no code implementations21 Sep 2022 Wenqi Fan, Xiangyu Zhao, Xiao Chen, Jingran Su, Jingtong Gao, Lin Wang, Qidong Liu, Yiqi Wang, Han Xu, Lei Chen, Qing Li

As one of the most successful AI-powered applications, recommender systems aim to help people make appropriate decisions in an effective and efficient way, by providing personalized suggestions in many aspects of our lives, especially for various human-oriented online services such as e-commerce platforms and social media sites.

Fairness Recommendation Systems

PCDF: A Parallel-Computing Distributed Framework for Sponsored Search Advertising Serving

no code implementations26 Jun 2022 Han Xu, Hao Qi, Kunyao Wang, Pei Wang, Guowei Zhang, Congcong Liu, Junsheng Jin, Xiwei Zhao, Zhangang Lin, Jinghe Hu, Jingping Shao

In this work, we propose a novel framework PCDF(Parallel-Computing Distributed Framework), allowing to split the computation cost into three parts and to deploy them in the pre-module in parallel with the retrieval stage, the middle-module for ranking ads, and the post-module for re-ranking ads with external items.

Click-Through Rate Prediction Re-Ranking +1

Defense Against Gradient Leakage Attacks via Learning to Obscure Data

no code implementations1 Jun 2022 Yuxuan Wan, Han Xu, Xiaorui Liu, Jie Ren, Wenqi Fan, Jiliang Tang

However, federated learning is still under the risk of privacy leakage because of the existence of attackers who deliberately conduct gradient leakage attacks to reconstruct the client data.

Federated Learning Privacy Preserving

Color Invariant Skin Segmentation

1 code implementation21 Apr 2022 Han Xu, Abhijit Sarkar, A. Lynn Abbott

A primary motivation of the work has been to achieve results that are consistent across the full range of skin tones, even while using a training dataset that is significantly biased toward lighter skin tones.

Segmentation

VRKG4Rec: Virtual Relational Knowledge Graphs for Recommendation

1 code implementation3 Apr 2022 Lingyun Lu, Bang Wang, Zizhuo Zhang, Shenghao Liu, Han Xu

Recent studies regard items as entities of a knowledge graph and leverage graph neural networks to assist item encoding, yet by considering each relation type individually.

Knowledge Graphs Recommendation Systems +2

RFNet: Unsupervised Network for Mutually Reinforcing Multi-Modal Image Registration and Fusion

no code implementations CVPR 2022 Han Xu, Jiayi Ma, Jiteng Yuan, Zhuliang Le, Wei Liu

Specifically, for image registration, we solve the bottlenecks of defining registration metrics applicable for multi-modal images and facilitating the network convergence.

Image Registration

Graph Neural Networks with Adaptive Residual

1 code implementation NeurIPS 2021 Xiaorui Liu, Jiayuan Ding, Wei Jin, Han Xu, Yao Ma, Zitao Liu, Jiliang Tang

Graph neural networks (GNNs) have shown the power in graph representation learning for numerous tasks.

Graph Representation Learning

Jointly Attacking Graph Neural Network and its Explanations

no code implementations7 Aug 2021 Wenqi Fan, Wei Jin, Xiaorui Liu, Han Xu, Xianfeng Tang, Suhang Wang, Qing Li, Jiliang Tang, JianPing Wang, Charu Aggarwal

Despite the great success, recent studies have shown that GNNs are highly vulnerable to adversarial attacks, where adversaries can mislead the GNNs' prediction by modifying graphs.

Imbalanced Adversarial Training with Reweighting

no code implementations28 Jul 2021 Wentao Wang, Han Xu, Xiaorui Liu, Yaxin Li, Bhavani Thuraisingham, Jiliang Tang

Adversarial training has been empirically proven to be one of the most effective and reliable defense methods against adversarial attacks.

Towards the Memorization Effect of Neural Networks in Adversarial Training

no code implementations9 Jun 2021 Han Xu, Xiaorui Liu, Wentao Wang, Wenbiao Ding, Zhongqin Wu, Zitao Liu, Anil Jain, Jiliang Tang

In this work, we study the effect of memorization in adversarial trained DNNs and disclose two important findings: (a) Memorizing atypical samples is only effective to improve DNN's accuracy on clean atypical samples, but hardly improve their adversarial robustness and (b) Memorizing certain atypical samples will even hurt the DNN's performance on typical samples.

Adversarial Robustness Memorization

Curvature-based Feature Selection with Application in Classifying Electronic Health Records

1 code implementation10 Jan 2021 Zheming Zuo, Jie Li, Han Xu, Noura Al Moubayed

Disruptive technologies provides unparalleled opportunities to contribute to the identifications of many aspects in pervasive healthcare, from the adoption of the Internet of Things through to Machine Learning (ML) techniques.

Breast Cancer Detection Breast Tissue Identification +4

Generalizable control for multiparameter quantum metrology

no code implementations24 Dec 2020 Han Xu, Lingna Wang, Haidong Yuan, Xin Wang

Here we study the generalizability of optimal control, namely, optimal controls that can be systematically updated across a range of parameters with minimal cost.

Quantum Physics

To be Robust or to be Fair: Towards Fairness in Adversarial Training

2 code implementations13 Oct 2020 Han Xu, Xiaorui Liu, Yaxin Li, Anil K. Jain, Jiliang Tang

However, we find that adversarial training algorithms tend to introduce severe disparity of accuracy and robustness between different groups of data.

Fairness

Yet Meta Learning Can Adapt Fast, It Can Also Break Easily

no code implementations2 Sep 2020 Han Xu, Ya-Xin Li, Xiaorui Liu, Hui Liu, Jiliang Tang

Thus, in this paper, we perform the initial study about adversarial attacks on meta learning under the few-shot classification problem.

Few-Shot Image Classification Meta-Learning

DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses

3 code implementations13 May 2020 Ya-Xin Li, Wei Jin, Han Xu, Jiliang Tang

DeepRobust is a PyTorch adversarial learning library which aims to build a comprehensive and easy-to-use platform to foster this research field.

Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies

3 code implementations2 Mar 2020 Wei Jin, Ya-Xin Li, Han Xu, Yiqi Wang, Shuiwang Ji, Charu Aggarwal, Jiliang Tang

As the extensions of DNNs to graphs, Graph Neural Networks (GNNs) have been demonstrated to inherit this vulnerability.

Adversarial Attack

Collaborative Attention Network for Person Re-identification

no code implementations29 Nov 2019 Wenpeng Li, Yongli Sun, Jinjun Wang, Han Xu, Xiangru Yang, Long Cui

Jointly utilizing global and local features to improve model accuracy is becoming a popular approach for the person re-identification (ReID) problem, because previous works using global features alone have very limited capacity at extracting discriminative local patterns in the obtained feature representation.

Person Re-Identification

Adversarial Attacks and Defenses in Images, Graphs and Text: A Review

4 code implementations17 Sep 2019 Han Xu, Yao Ma, Haochen Liu, Debayan Deb, Hui Liu, Jiliang Tang, Anil K. Jain

In this survey, we review the state of the art algorithms for generating adversarial examples and the countermeasures against adversarial examples, for the three popular data types, i. e., images, graphs and text.

Adversarial Attack

Strain engineering of epitaxial oxide heterostructures beyond substrate limitations

no code implementations3 May 2019 Xiong Deng, Chao Chen, Deyang Chen, Xiangbin Cai, Xiaozhe Yin, Chao Xu, Fei Sun, Caiwen Li, Yan Li, Han Xu, Mao Ye, Guo Tian, Zhen Fan, Zhipeng Hou, Minghui Qin, Yu Chen, Zhenlin Luo, Xubing Lu, Guofu Zhou, Lang Chen, Ning Wang, Ye Zhu, Xingsen Gao, Jun-Ming Liu

The limitation of commercially available single-crystal substrates and the lack of continuous strain tunability preclude the ability to take full advantage of strain engineering for further exploring novel properties and exhaustively studying fundamental physics in complex oxides.

Materials Science

Generalizable control for quantum parameter estimation through reinforcement learning

1 code implementation25 Apr 2019 Han Xu, Junning Li, Liqiang Liu, Yu Wang, Haidong Yuan, Xin Wang

Measurement and estimation of parameters are essential for science and engineering, where one of the main quests is to find systematic schemes that can achieve high precision.

Quantum Physics Mesoscale and Nanoscale Physics

Covariance-Insured Screening

no code implementations17 May 2018 Kevin He, Jian Kang, Hyokyoung Grace Hong, Ji Zhu, Yanming Li, Huazhen Lin, Han Xu, Yi Li

Modern bio-technologies have produced a vast amount of high-throughput data with the number of predictors far greater than the sample size.

Cannot find the paper you are looking for? You can Submit a new open access paper.