Search Results for author: Qi Hu

Found 11 papers, 4 papers with code

CFMW: Cross-modality Fusion Mamba for Multispectral Object Detection under Adverse Weather Conditions

1 code implementation25 Apr 2024 Haoyuan Li, Qi Hu, You Yao, Kailun Yang, Peng Chen

Furthermore, we introduce the Cross-modality Fusion Mamba with Weather-removal (CFMW) to augment detection accuracy in adverse weather conditions.

Multispectral Object Detection Object +2

FedCQA: Answering Complex Queries on Multi-Source Knowledge Graphs via Federated Learning

no code implementations22 Feb 2024 Qi Hu, Weifeng Jiang, Haoran Li, ZiHao Wang, Jiaxin Bai, Qianren Mao, Yangqiu Song, Lixin Fan, JianXin Li

An entity can be involved in various knowledge graphs and reasoning on multiple KGs and answering complex queries on multi-source KGs is important in discovering knowledge cross graphs.

Complex Query Answering Federated Learning +2

Privacy-Preserved Neural Graph Databases

no code implementations25 Dec 2023 Qi Hu, Haoran Li, Jiaxin Bai, ZiHao Wang, Yangqiu Song

Neural graph databases (NGDBs) have emerged as a powerful paradigm that combines the strengths of graph databases (GDBs) and neural networks to enable efficient storage, retrieval, and analysis of graph-structured data which can be adaptively trained with LLMs.

Privacy Preserving Retrieval

User Consented Federated Recommender System Against Personalized Attribute Inference Attack

1 code implementation23 Dec 2023 Qi Hu, Yangqiu Song

However, the recommendation model learned by a common FedRec may still be vulnerable to private information leakage risks, particularly attribute inference attacks, which means that the attacker can easily infer users' personal attributes from the learned model.

Attribute Federated Learning +2

P-Bench: A Multi-level Privacy Evaluation Benchmark for Language Models

no code implementations7 Nov 2023 Haoran Li, Dadi Guo, Donghao Li, Wei Fan, Qi Hu, Xin Liu, Chunkit Chan, Duanyi Yao, Yangqiu Song

Lastly, P-Bench performs existing privacy attacks on LMs with pre-defined privacy objectives as the empirical evaluation results.

Privacy Preserving

Privacy in Large Language Models: Attacks, Defenses and Future Directions

no code implementations16 Oct 2023 Haoran Li, Yulin Chen, Jinglong Luo, Yan Kang, Xiaojin Zhang, Qi Hu, Chunkit Chan, Yangqiu Song

The advancement of large language models (LLMs) has significantly enhanced the ability to effectively tackle various downstream NLP tasks and unify these tasks into generative pipelines.

Independent Distribution Regularization for Private Graph Embedding

1 code implementation16 Aug 2023 Qi Hu, Yangqiu Song

Additionally, we introduce a novel regularization to enforce the independence of the encoders.

Attribute Graph Embedding +5

Universal adaptive optics for microscopy through embedded neural network control

no code implementations6 Jan 2023 Qi Hu, Martin Hailstone, Jingyu Wang, Matthew Wincott, Danail Stoychev, Huriye Atilgan, Dalia Gala, Tai Chaiamarit, Richard M. Parton, Jacopo Antonello, Adam M. Packer, Ilan Davis, Martin J. Booth

Unlike previous ML methods, we used a bespoke neural network (NN) architecture, designed using physical understanding of image formation, that was embedded in the control loop of the microscope.

SOUP: Spatial-Temporal Demand Forecasting and Competitive Supply

no code implementations24 Sep 2020 Bolong Zheng, Qi Hu, Lingfeng Ming, Jilin Hu, Lu Chen, Kai Zheng, Christian S. Jensen

In this setting, an assignment authority is to assign agents to requests such that the average idle time of the agents is minimized.

Databases Signal Processing

Practical sensorless aberration estimation for 3D microscopy with deep learning

1 code implementation2 Jun 2020 Debayan Saha, Uwe Schmidt, Qinrong Zhang, Aurelien Barbotin, Qi Hu, Na Ji, Martin J. Booth, Martin Weigert, Eugene W. Myers

Additionally, we study the predictability of individual aberrations with respect to their data requirements and find that the symmetry of the wavefront plays a crucial role.

An End-to-end Approach for Handling Unknown Slot Values in Dialogue State Tracking

no code implementations ACL 2018 Puyang Xu, Qi Hu

We highlight a practical yet rarely discussed problem in dialogue state tracking (DST), namely handling unknown slot values.

Dialogue State Tracking Spoken Language Understanding

Cannot find the paper you are looking for? You can Submit a new open access paper.