1 code implementation • ECCV 2020 • Mahdi S. Hosseini, Lyndon Chan, Weimin Huang, Yichen Wang, Danial Hasan, Corwyn Rowsell, Savvas Damaskinos, Konstantinos N. Plataniotis
Deep learning tools in computational pathology, unlike natural vision tasks, face with limited histological tissue labels for classification.
no code implementations • 17 Apr 2024 • Hangtao Zhang, Shengshan Hu, Yichen Wang, Leo Yu Zhang, Ziqi Zhou, Xianlong Wang, Yanjun Zhang, Chao Chen
This paper is dedicated to bridging this gap by introducing Detector Collapse} (DC), a brand-new backdoor attack paradigm tailored for object detection.
1 code implementation • 18 Feb 2024 • Yichen Wang, Shangbin Feng, Abe Bohan Hou, Xiao Pu, Chao Shen, Xiaoming Liu, Yulia Tsvetkov, Tianxing He
Our experiments reveal that almost none of the existing detectors remain robust under all the attacks, and all detectors exhibit different loopholes.
1 code implementation • 17 Feb 2024 • Abe Bohan Hou, Jingyu Zhang, Yichen Wang, Daniel Khashabi, Tianxing He
Recent watermarked generation algorithms inject detectable signatures during language generation to facilitate post-hoc detection.
no code implementations • 1 Feb 2024 • Shengchao Liu, Xiaoming Liu, Yichen Wang, Zehua Cheng, Chengzhengxu Li, Zhaohan Zhang, Yu Lan, Chao Shen
Hence, we propose a novel fine-tuned detector, Pecola, bridging metric-based and fine-tuned detectors by contrastive learning on selective perturbation.
1 code implementation • 8 Nov 2023 • Yichen Wang, Kevin Yang, Xiaoming Liu, Dan Klein
Existing LLM-based systems for writing long-form stories or story outlines frequently suffer from unnatural pacing, whether glossing over important events or over-elaborating on insignificant details, resulting in a jarring experience for the reader.
no code implementations • 21 Oct 2023 • Li Wang, Xinyu Zhang, Fachuan Zhao, Chuze Wu, Yichen Wang, Ziying Song, Lei Yang, Jun Li, Huaping Liu
The proposed Fuzzy-NMS module combines the volume and clustering density of candidate bounding boxes, refining them with a fuzzy classification method and optimizing the appropriate suppression thresholds to reduce uncertainty in the NMS process.
1 code implementation • 11 Oct 2023 • Xinyu Zhang, Li Wang, Jian Chen, Cheng Fang, Lei Yang, Ziying Song, Guangqi Yang, Yichen Wang, Xiaofei Zhang, Jun Li, Zhiwei Li, Qingshan Yang, Zhenlin Zhang, Shuzhi Sam Ge
Compared with commonly used 3D radars, the latest 4D radars have precise vertical resolution and higher point cloud density, making it a highly promising sensor for autonomous driving in complex environmental perception.
1 code implementation • 6 Oct 2023 • Abe Bohan Hou, Jingyu Zhang, Tianxing He, Yichen Wang, Yung-Sung Chuang, Hongwei Wang, Lingfeng Shen, Benjamin Van Durme, Daniel Khashabi, Yulia Tsvetkov
Existing watermarking algorithms are vulnerable to paraphrase attacks because of their token-level design.
1 code implementation • 14 Aug 2023 • Chengzhengxu Li, Xiaoming Liu, Yichen Wang, Duyi Li, Yu Lan, Chao Shen
However, prior discrete prompt optimization methods require expert knowledge to design the base prompt set and identify high-quality prompts, which is costly, inefficient, and subjective.
no code implementations • 13 Mar 2023 • T. Tony Cai, Yichen Wang, Linjun Zhang
The score attack method is based on the tracing attack concept in differential privacy and can be applied to any statistical model with a well-defined score statistic.
2 code implementations • 6 Mar 2023 • Shuai Tang, Sergul Aydore, Michael Kearns, Saeyoung Rho, Aaron Roth, Yichen Wang, Yu-Xiang Wang, Zhiwei Steven Wu
We revisit the problem of differentially private squared error linear regression.
1 code implementation • 20 Dec 2022 • Xiaoming Liu, Zhaohan Zhang, Yichen Wang, Hang Pu, Yu Lan, Chao Shen
Machine-Generated Text (MGT) detection, a task that discriminates MGT from Human-Written Text (HWT), plays a crucial role in preventing misuse of text generative models, which excel in mimicking human writing style recently.
no code implementations • 8 Nov 2020 • T. Tony Cai, Yichen Wang, Linjun Zhang
We propose differentially private algorithms for parameter estimation in both low-dimensional and high-dimensional sparse generalized linear models (GLMs) by constructing private versions of projected gradient descent.
1 code implementation • 1 Jul 2020 • Haiyang Liu, Yichen Wang, Jiayi Zhao, Guowu Yang, Fengmao Lv
Our method assumes that both the source images with full pixel-level labels and unlabeled target images are available during training.
no code implementations • 8 Apr 2019 • Jiaxuan You, Yichen Wang, Aditya Pal, Pong Eksombatchai, Chuck Rosenberg, Jure Leskovec
Recommender systems that can learn from cross-session data to dynamically predict the next item a user will choose are crucial for online platforms.
no code implementations • 12 Feb 2019 • T. Tony Cai, Yichen Wang, Linjun Zhang
By refining the "tracing adversary" technique for lower bounds in the theoretical computer science literature, we formulate a general lower bound argument for minimax risks with differential privacy constraints, and apply this argument to high-dimensional mean estimation and linear regression problems.
no code implementations • 22 May 2018 • Yichen Wang, Le Song, Hongyuan Zha
We first propose a unified KL framework that generalizes existing maximum entropy inverse optimal control methods.
no code implementations • NeurIPS 2017 • Yichen Wang, Xiaojing Ye, Hongyuan Zha, Le Song
Point processes are powerful tools to model user activities and have a plethora of applications in social sciences.
2 code implementations • ICML 2017 • Rakshit Trivedi, Hanjun Dai, Yichen Wang, Le Song
The occurrence of a fact (edge) is modeled as a multivariate point process whose intensity function is modulated by the score for that fact computed based on the learned entity embeddings.
no code implementations • ICML 2017 • Yichen Wang, Grady Williams, Evangelos Theodorou, Le Song
Temporal point processes have been widely applied to model event sequence data generated by online users.
no code implementations • NeurIPS 2016 • Yichen Wang, Nan Du, Rakshit Trivedi, Le Song
Matching users to the right items at the right time is a fundamental task in recommendation systems.
no code implementations • 13 Sep 2016 • Hanjun Dai, Yichen Wang, Rakshit Trivedi, Le Song
DeepCoevolve use recurrent neural network (RNN) over evolving networks to define the intensity function in point processes, which allows the model to capture complex mutual influence between users and items, and the feature evolution over time.
no code implementations • 3 Aug 2016 • Niao He, Zaid Harchaoui, Yichen Wang, Le Song
Since almost all gradient-based optimization algorithms rely on Lipschitz-continuity, optimizing Poisson likelihood models with a guarantee of convergence can be challenging, especially for large-scale problems.
no code implementations • NeurIPS 2015 • Nan Du, Yichen Wang, Niao He, Jimeng Sun, Le Song
By making personalized suggestions, a recommender system is playing a crucial role in improving the engagement of users in modern web-services.
1 code implementation • NeurIPS 2015 • Mehrdad Farajtabar, Yichen Wang, Manuel Gomez Rodriguez, Shuang Li, Hongyuan Zha, Le Song
Information diffusion in online social networks is affected by the underlying network topology, but it also has the power to change it.