no code implementations • 23 Oct 2023 • Yaguan Qian, Chenyu Zhao, Zhaoquan Gu, Bin Wang, Shouling Ji, Wei Wang, Boyang Zhou, Pan Zhou
We propose a Feature-Focusing Adversarial Training (F$^2$AT), which differs from previous work in that it enforces the model to focus on the core features from natural patterns and reduce the impact of spurious features from perturbed patterns.
1 code implementation • 21 Aug 2023 • Xin-Cheng Wen, Xinchen Wang, Cuiyun Gao, Shaohua Wang, Yang Liu, Zhaoquan Gu
In this paper, we focus on the Positive and Unlabeled (PU) learning problem for vulnerability detection and propose a novel model named PILOT, i. e., PositIve and unlabeled Learning mOdel for vulnerability deTection.
no code implementations • 3 Aug 2022 • Xiao Zhang, Hao Tan, Xuan Huang, Denghui Zhang, Keke Tang, Zhaoquan Gu
With the development of hardware and algorithms, ASR(Automatic Speech Recognition) systems evolve a lot.
Automatic Speech Recognition Automatic Speech Recognition (ASR) +1
1 code implementation • ECCV 2022 • Yaguan Qian, Shenghui Huang, Bin Wang, Xiang Ling, Xiaohui Guan, Zhaoquan Gu, Shaoning Zeng, WuJie Zhou, Haijiang Wang
This process is modeled as a multi-objective bilevel optimization problem and a novel algorithm is proposed to solve this optimization.
no code implementations • 4 Jul 2022 • Yaguan Qian, Yuqi Wang, Bin Wang, Zhaoquan Gu, Yuhan Guo, Wassim Swaileh
Extensive experiments conducted on the MINIST and CIFAR-10 datasets show that our adversarial learning with second-order adversarial examples outperforms other fisrt-order methods, which can improve the model robustness against a wide range of attacks.
no code implementations • Findings (ACL) 2022 • Bin Zhu, Zhaoquan Gu, Le Wang, Jinyin Chen, Qi Xuan
On top of FADA, we propose geometry-aware adversarial training (GAT) to perform adversarial training on friendly adversarial data so that we can save a large number of search steps.
1 code implementation • 12 Nov 2021 • Dongda Li, Zhaoquan Gu, Yuexuan Wang, Changwei Ren, Francis C. M. Lau
In this paper, we propose a Recurrent Conditional Query Learning (RCQL) method to solve both 2D and 3D packing problems.
no code implementations • 13 Sep 2021 • Bin Zhu, Zhaoquan Gu, Le Wang, Zhihong Tian
Recent work shows that deep neural networks are vulnerable to adversarial examples.
no code implementations • ICCV 2021 • Keke Tang, Dingruibo Miao, Weilong Peng, Jianpeng Wu, Yawen Shi, Zhaoquan Gu, Zhihong Tian, Wenping Wang
Overconfident predictions on out-of-distribution (OOD) samples is a thorny issue for deep neural networks.
Generative Adversarial Network Out of Distribution (OOD) Detection
no code implementations • 1 Feb 2021 • Yaguan Qian, Qiqi Shao, Tengteng Yao, Bin Wang, Shouling Ji, Shaoning Zeng, Zhaoquan Gu, Wassim Swaileh
Adversarial training is wildly considered as one of the most effective way to defend against adversarial examples.
no code implementations • 1 Jan 2021 • Keke Tang, Guodong Wei, Jie Zhu, Yuexin Ma, Runnan Chen, Zhaoquan Gu, Wenping Wang
Deep neural networks have achieved great success in computer vision, thanks to their ability in extracting category-relevant semantic features.
no code implementations • 1 Jan 2021 • Yaguan Qian, Jiamin Wang, Xiang Ling, Zhaoquan Gu, Bin Wang, Chunming Wu
Recently, to deal with the vulnerability to generate examples of CNNs, there are many advanced algorithms that have been proposed.
no code implementations • 2 Dec 2020 • Yaguan Qian, Jiamin Wang, Bin Wang, Shaoning Zeng, Zhaoquan Gu, Shouling Ji, Wassim Swaileh
With this soft mask, we develop a new loss function with inverse temperature to search for optimal perturbations in CFR.
no code implementations • 19 Sep 2020 • Ya-guan Qian, Qiqi Shao, Jia-min Wang, Xiang Lin, Yankai Guo, Zhaoquan Gu, Bin Wang, Chunming Wu
This dynamic defense can prohibit the adversary from selecting an optimal substitute model for black-box attacks.
1 code implementation • 31 Jul 2020 • Ya-guan Qian, Ximin Zhang, Bin Wang, Wei Li, Zhaoquan Gu, Haijiang Wang, Wassim Swaileh
In this paper, we propose a novel method (TEAM, Taylor Expansion-Based Adversarial Methods) to generate more powerful adversarial examples than previous methods.
no code implementations • 27 Nov 2019 • Keke Tang, Peng Song, Yuexin Ma, Zhaoquan Gu, Yu Su, Zhihong Tian, Wenping Wang
High-level (e. g., semantic) features encoded in the latter layers of convolutional neural networks are extensively exploited for image classification, leaving low-level (e. g., color) features in the early layers underexplored.
no code implementations • 25 Sep 2019 • Dongda Li, Changwei Ren, Zhaoquan Gu, Yuexuan Wang, Francis Lau
Previous studies have shown that NCO outperforms heuristic algorithms in many combinatorial optimization problems such as the routing problems.
no code implementations • 17 Dec 2018 • Keke Tang, Guodong Wei, Runnan Chen, Jie Zhu, Zhaoquan Gu, Wenping Wang
In this paper, we propose a general framework for image classification using the attention mechanism and global context, which could incorporate with various network architectures to improve their performance.