no code implementations • 13 May 2024 • Haoran Li, Yulin Chen, Zihao Zheng, Qi Hu, Chunkit Chan, Heshan Liu, Yangqiu Song
Yet, language models' inherent vulnerabilities may be exacerbated due to increased accessibility and unrestricted model training on massive textual data from the Internet.
1 code implementation • 25 Apr 2024 • Haoyuan Li, Qi Hu, You Yao, Kailun Yang, Peng Chen
Furthermore, we introduce the Cross-modality Fusion Mamba with Weather-removal (CFMW) to augment detection accuracy in adverse weather conditions.
no code implementations • 22 Feb 2024 • Qi Hu, Weifeng Jiang, Haoran Li, ZiHao Wang, Jiaxin Bai, Qianren Mao, Yangqiu Song, Lixin Fan, JianXin Li
An entity can be involved in various knowledge graphs and reasoning on multiple KGs and answering complex queries on multi-source KGs is important in discovering knowledge cross graphs.
no code implementations • 25 Dec 2023 • Qi Hu, Haoran Li, Jiaxin Bai, ZiHao Wang, Yangqiu Song
Neural graph databases (NGDBs) have emerged as a powerful paradigm that combines the strengths of graph databases (GDBs) and neural networks to enable efficient storage, retrieval, and analysis of graph-structured data which can be adaptively trained with LLMs.
1 code implementation • 23 Dec 2023 • Qi Hu, Yangqiu Song
However, the recommendation model learned by a common FedRec may still be vulnerable to private information leakage risks, particularly attribute inference attacks, which means that the attacker can easily infer users' personal attributes from the learned model.
no code implementations • 7 Nov 2023 • Haoran Li, Dadi Guo, Donghao Li, Wei Fan, Qi Hu, Xin Liu, Chunkit Chan, Duanyi Yao, Yangqiu Song
Lastly, P-Bench performs existing privacy attacks on LMs with pre-defined privacy objectives as the empirical evaluation results.
no code implementations • 16 Oct 2023 • Haoran Li, Yulin Chen, Jinglong Luo, Yan Kang, Xiaojin Zhang, Qi Hu, Chunkit Chan, Yangqiu Song
The advancement of large language models (LLMs) has significantly enhanced the ability to effectively tackle various downstream NLP tasks and unify these tasks into generative pipelines.
1 code implementation • 16 Aug 2023 • Qi Hu, Yangqiu Song
Additionally, we introduce a novel regularization to enforce the independence of the encoders.
no code implementations • 6 Jan 2023 • Qi Hu, Martin Hailstone, Jingyu Wang, Matthew Wincott, Danail Stoychev, Huriye Atilgan, Dalia Gala, Tai Chaiamarit, Richard M. Parton, Jacopo Antonello, Adam M. Packer, Ilan Davis, Martin J. Booth
Unlike previous ML methods, we used a bespoke neural network (NN) architecture, designed using physical understanding of image formation, that was embedded in the control loop of the microscope.
no code implementations • 24 Sep 2020 • Bolong Zheng, Qi Hu, Lingfeng Ming, Jilin Hu, Lu Chen, Kai Zheng, Christian S. Jensen
In this setting, an assignment authority is to assign agents to requests such that the average idle time of the agents is minimized.
Databases Signal Processing
1 code implementation • 2 Jun 2020 • Debayan Saha, Uwe Schmidt, Qinrong Zhang, Aurelien Barbotin, Qi Hu, Na Ji, Martin J. Booth, Martin Weigert, Eugene W. Myers
Additionally, we study the predictability of individual aberrations with respect to their data requirements and find that the symmetry of the wavefront plays a crucial role.
no code implementations • ACL 2018 • Puyang Xu, Qi Hu
We highlight a practical yet rarely discussed problem in dialogue state tracking (DST), namely handling unknown slot values.