Search Results for author: Weifeng Li

Found 10 papers, 2 papers with code

Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach

no code implementations4 Feb 2024 Brian Etter, James Lee Hu, Mohammedreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen

Adversarial Malware Generation (AMG), the gen- eration of adversarial malware variants to strengthen Deep Learning (DL)-based malware detectors has emerged as a crucial tool in the development of proactive cyberdefense.

Malware Detection reinforcement-learning +1

Learning Trustworthy Model from Noisy Labels based on Rough Set for Surface Defect Detection

no code implementations25 Jan 2023 Tongzhi Niu, Bin Li, Kai Li, Yufeng Lin, Yuwei Li, Weifeng Li, Zhenrong Wang

In the surface defect detection, there are some suspicious regions that cannot be uniquely classified as abnormal or normal.

Defect Detection

Multi-view Representation Learning from Malware to Defend Against Adversarial Variants

no code implementations25 Oct 2022 James Lee Hu, MohammadReza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen

This provides an opportunity for the defenders (i. e., malware detectors) to detect the adversarial variants by utilizing more than one view of a malware file (e. g., source code view in addition to the binary view).

Adversarial Robustness MULTI-VIEW LEARNING +1

A fully differentiable ligand pose optimization framework guided by deep learning and traditional scoring functions

1 code implementation27 Jun 2022 Zechen Wang, Liangzhen Zheng, Sheng Wang, Mingzhi Lin, Zhihao Wang, Adams Wai-Kin Kong, Yuguang Mu, Yanjie Wei, Weifeng Li

In this work, we propose a fully differentiable framework for ligand pose optimization based on a hybrid scoring function (SF) combined with a multi-layer perceptron (DeepRMSD) and the traditional AutoDock Vina SF.

Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach

no code implementations11 Nov 2021 Yizhi Liu, Fang Yu Lin, MohammadReza Ebrahimi, Weifeng Li, Hsinchun Chen

While Information Extraction (IE) techniques can be used to extract the PII automatically, Deep Learning (DL)-based IE models alleviate the need for feature engineering and further improve the efficiency.

Embeddings Evaluation Feature Engineering +1

OnionNet-2: A Convolutional Neural Network Model for Predicting Protein-Ligand Binding Affinity based on Residue-Atom Contacting Shells

1 code implementation22 Mar 2021 Zechen Wang, Liangzhen Zheng, Yang Liu, Yuanyuan Qu, Yong-Qiang Li, Mingwen Zhao, Yuguang Mu, Weifeng Li

In this study, we proposed a simple scoring function (called OnionNet-2) based on convolutional neural network to predict $\triangle$$G$.

Quantitative Interpretations of Energetic Features and Key Residues at SARS Coronavirus Spike Receptor-Binding Domain and ACE2 Receptor Interface

no code implementations11 Mar 2021 Yanmei Yang, Yunju Zhang, Yuanyuan Qu, Xuewei Liu, Mingwen Zhao, Yuguang Mu, Weifeng Li

Energy decomposition analyses identified three binding patches in the SARS-CoV-2 RBD and eleven key residues (Phe486, Tyr505, Asn501, Tyr489, Gln493, Leu455 and etc) which are believed to be the main targets for drug development.

Feature Learning with Gaussian Restricted Boltzmann Machine for Robust Speech Recognition

no code implementations23 Sep 2013 Xin Zheng, Zhiyong Wu, Helen Meng, Weifeng Li, Lianhong Cai

In this paper, we first present a new variant of Gaussian restricted Boltzmann machine (GRBM) called multivariate Gaussian restricted Boltzmann machine (MGRBM), with its definition and learning algorithm.

Robust Speech Recognition speech-recognition

Cannot find the paper you are looking for? You can Submit a new open access paper.