Search Results for author: Liehuang Zhu

Found 11 papers, 2 papers with code

Neeko: Leveraging Dynamic LoRA for Efficient Multi-Character Role-Playing Agent

1 code implementation21 Feb 2024 Xiaoyan Yu, Tongxu Luo, Yifan Wei, Fangyu Lei, Yiming Huang, Hao Peng, Liehuang Zhu

Large Language Models (LLMs) have revolutionized open-domain dialogue agents but encounter challenges in multi-character role-playing (MCRP) scenarios.

Incremental Learning

CLIP-Driven Semantic Discovery Network for Visible-Infrared Person Re-Identification

no code implementations11 Jan 2024 Xiaoyan Yu, Neng Dong, Liehuang Zhu, Hao Peng, Dapeng Tao

Additionally, acknowledging the complementary nature of semantic details across different modalities, we integrate text features from the bimodal language descriptions to achieve comprehensive semantics.

Person Re-Identification

Binary Linear Tree Commitment-based Ownership Protection for Distributed Machine Learning

no code implementations11 Jan 2024 Tianxiu Xie, Keke Gai, Jing Yu, Liehuang Zhu

Distributed machine learning enables parallel training of extensive datasets by delegating computing tasks across multiple workers.

Zero-knowledge Proof Meets Machine Learning in Verifiability: A Survey

no code implementations23 Oct 2023 Zhibo Xing, Zijian Zhang, Jiamou Liu, Ziang Zhang, Meng Li, Liehuang Zhu, Giovanni Russello

However, in practice, due to various challenges such as limited computational resources and data privacy concerns, users in need of models often cannot train machine learning models locally.

Federated Learning

VFedMH: Vertical Federated Learning for Training Multiple Heterogeneous Models

no code implementations20 Oct 2023 Shuo Wang, Keke Gai, Jing Yu, Liehuang Zhu, Kim-Kwang Raymond Choo, Bin Xiao

Then the passive party, who owns only features of the sample, injects the blinding factor into the local embedding and sends it to the active party.

Vertical Federated Learning

Artificial Intelligence for Web 3.0: A Comprehensive Survey

no code implementations17 Aug 2023 Meng Shen, Zhehui Tan, Dusit Niyato, Yuzhi Liu, Jiawen Kang, Zehui Xiong, Liehuang Zhu, Wei Wang, Xuemin, Shen

Then, we thoroughly analyze the current state of AI technology applications in the four layers of Web 3. 0 and offer some insights into its potential future development direction.

Management

MSDC: Exploiting Multi-State Power Consumption in Non-intrusive Load Monitoring based on A Dual-CNN Model

no code implementations11 Feb 2023 Jialing He, Jiamou Liu, Zijian Zhang, Yang Chen, Yiwei Liu, Bakh Khoussainov, Liehuang Zhu

Non-intrusive load monitoring (NILM) aims to decompose aggregated electrical usage signal into appliance-specific power consumption and it amounts to a classical example of blind source separation tasks.

blind source separation Non-Intrusive Load Monitoring

Robust Attacks on Deep Learning Face Recognition in the Physical World

no code implementations27 Nov 2020 Meng Shen, Hao Yu, Liehuang Zhu, Ke Xu, Qi Li, Xiaojiang Du

Deep neural networks (DNNs) have been increasingly used in face recognition (FR) systems.

Face Recognition

A new hashing based nearest neighbors selection technique for big datasets

no code implementations5 Apr 2020 Jude Tchaye-Kondi, Yanlong Zhai, Liehuang Zhu

When it comes to select the nearest neighbors of a given observation, we firstly identify the cell the observation belongs by using hashing, and then we look for nearest neighbors from that central cell and cells around it layer by layer.

Decision Making

REM: From Structural Entropy to Community Structure Deception

1 code implementation NeurIPS 2019 Yiwei Liu, Jiamou Liu, Zijian Zhang, Liehuang Zhu, Angsheng Li

This paper focuses on the privacy risks of disclosing the community structure in an online social network.

Community Detection

IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks

no code implementations8 Oct 2018 Meng Shen, Zelin Liao, Liehuang Zhu, Rashid Mijumbi, Xiaojiang Du, Jiankun Hu

Face liveness detection has become a widely used technique with a growing importance in various authentication scenarios to withstand spoofing attacks.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.