no code implementations • 7 May 2024 • Tianxiu Xie, Keke Gai, Jing Yu, Liehuang Zhu, Kim-Kwang Raymond Choo
Model identity auditing is a challenging issue in protecting intellectual property of DNN models and verifying the integrity and ownership of models for guaranteeing trusts in transactions is one of the critical obstacles.
no code implementations • 7 May 2024 • Yanli Yuan, Bingbing Wang, Chuan Zhang, Jingyi Xu, Ximeng Liu, Liehuang Zhu
Though recent methods based on Fully Convolutional Neural Networks (F-CNNs) have shown success in many segmentation tasks, fusing features from images with different scales is still a challenge: (1) Due to the lack of spatial awareness, F-CNNs share the same weights at different spatial locations.
1 code implementation • 21 Feb 2024 • Xiaoyan Yu, Tongxu Luo, Yifan Wei, Fangyu Lei, Yiming Huang, Hao Peng, Liehuang Zhu
Large Language Models (LLMs) have revolutionized open-domain dialogue agents but encounter challenges in multi-character role-playing (MCRP) scenarios.
no code implementations • 11 Jan 2024 • Xiaoyan Yu, Neng Dong, Liehuang Zhu, Hao Peng, Dapeng Tao
Additionally, acknowledging the complementary nature of semantic details across different modalities, we integrate text features from the bimodal language descriptions to achieve comprehensive semantics.
no code implementations • 11 Jan 2024 • Tianxiu Xie, Keke Gai, Jing Yu, Liehuang Zhu
Distributed machine learning enables parallel training of extensive datasets by delegating computing tasks across multiple workers.
no code implementations • 23 Oct 2023 • Zhibo Xing, Zijian Zhang, Jiamou Liu, Ziang Zhang, Meng Li, Liehuang Zhu, Giovanni Russello
However, in practice, due to various challenges such as limited computational resources and data privacy concerns, users in need of models often cannot train machine learning models locally.
no code implementations • 20 Oct 2023 • Shuo Wang, Keke Gai, Jing Yu, Liehuang Zhu, Kim-Kwang Raymond Choo, Bin Xiao
Then the passive party, who owns only features of the sample, injects the blinding factor into the local embedding and sends it to the active party.
no code implementations • 17 Aug 2023 • Meng Shen, Zhehui Tan, Dusit Niyato, Yuzhi Liu, Jiawen Kang, Zehui Xiong, Liehuang Zhu, Wei Wang, Xuemin, Shen
Then, we thoroughly analyze the current state of AI technology applications in the four layers of Web 3. 0 and offer some insights into its potential future development direction.
no code implementations • 11 Feb 2023 • Jialing He, Jiamou Liu, Zijian Zhang, Yang Chen, Yiwei Liu, Bakh Khoussainov, Liehuang Zhu
Non-intrusive load monitoring (NILM) aims to decompose aggregated electrical usage signal into appliance-specific power consumption and it amounts to a classical example of blind source separation tasks.
no code implementations • 27 Nov 2020 • Meng Shen, Hao Yu, Liehuang Zhu, Ke Xu, Qi Li, Xiaojiang Du
Deep neural networks (DNNs) have been increasingly used in face recognition (FR) systems.
no code implementations • 5 Apr 2020 • Jude Tchaye-Kondi, Yanlong Zhai, Liehuang Zhu
When it comes to select the nearest neighbors of a given observation, we firstly identify the cell the observation belongs by using hashing, and then we look for nearest neighbors from that central cell and cells around it layer by layer.
1 code implementation • NeurIPS 2019 • Yiwei Liu, Jiamou Liu, Zijian Zhang, Liehuang Zhu, Angsheng Li
This paper focuses on the privacy risks of disclosing the community structure in an online social network.
no code implementations • 8 Oct 2018 • Meng Shen, Zelin Liao, Liehuang Zhu, Rashid Mijumbi, Xiaojiang Du, Jiankun Hu
Face liveness detection has become a widely used technique with a growing importance in various authentication scenarios to withstand spoofing attacks.
Cryptography and Security