Search Results for author: Zhiyu Wu

Found 7 papers, 0 papers with code

Andes: Defining and Enhancing Quality-of-Experience in LLM-Based Text Streaming Services

no code implementations25 Apr 2024 Jiachen Liu, Zhiyu Wu, Jae-Won Chung, Fan Lai, Myungjin Lee, Mosharaf Chowdhury

The advent of large language models (LLMs) has transformed text-based services, enabling capabilities ranging from real-time translation to AI-driven chatbots.

BERT-ERC: Fine-tuning BERT is Enough for Emotion Recognition in Conversation

no code implementations17 Jan 2023 Xiangyu Qin, Zhiyu Wu, Jinshi Cui, Tingting Zhang, Yanran Li, Jian Luan, Bin Wang, Li Wang

Accordingly, we propose a novel paradigm, i. e., exploring contextual information and dialogue structure information in the fine-tuning step, and adapting the PLM to the ERC task in terms of input text, classification structure, and training strategy.

Emotion Recognition in Conversation text-classification +1

Detecting Backdoor in Deep Neural Networks via Intentional Adversarial Perturbations

no code implementations29 May 2021 Mingfu Xue, Yinghao Wu, Zhiyu Wu, Yushu Zhang, Jian Wang, Weiqiang Liu

Experimental results show that, the backdoor detection rate of the proposed defense method is 99. 63%, 99. 76% and 99. 91% on Fashion-MNIST, CIFAR-10 and GTSRB datasets, respectively.

Backdoor Attack

AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption

no code implementations28 May 2021 Mingfu Xue, Zhiyu Wu, Jian Wang, Yushu Zhang, Weiqiang Liu

Moreover, the proposed method only needs to encrypt an extremely low number of parameters, and the proportion of the encrypted parameters of all the model's parameters is as low as 0. 000205%.

3D Invisible Cloak

no code implementations27 Nov 2020 Mingfu Xue, Can He, Zhiyu Wu, Jian Wang, Zhe Liu, Weiqiang Liu

on person stealth attacks, and propose 3D transformations to generate 3D invisible cloak.

SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images

no code implementations27 Nov 2020 Mingfu Xue, Shichang Sun, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu

After being injected with the perturbation, the social image can easily fool the object detector, while its visual quality will not be degraded.

Object Privacy Preserving

Cannot find the paper you are looking for? You can Submit a new open access paper.