no code implementations • 8 May 2024 • Yongheng Zhang, Tingwen Du, Yunshan Ma, Xiang Wang, Yi Xie, Guozheng Yang, Yuliang Lu, Ee-Chien Chang
Thus, we propose a fully automatic LLM-based framework to construct attack knowledge graphs named: AttacKG+.
1 code implementation • 24 Jan 2024 • Zhi-Hao Tan, Jian-Dong Liu, Xiao-Dong Bi, Peng Tan, Qin-Cheng Zheng, Hai-Tian Liu, Yi Xie, Xiao-Chuan Zou, Yang Yu, Zhi-Hua Zhou
The learnware paradigm proposed by Zhou [2016] aims to enable users to reuse numerous existing well-trained models instead of building machine learning models from scratch, with the hope of solving new user tasks even beyond models' original purposes.
1 code implementation • 17 Dec 2023 • Yi Xie, Jie Zhang, Shiqian Zhao, Tianwei Zhang, Xiaofeng Chen
While deep learning models have shown significant performance across various domains, their deployment needs extensive resources and advanced computing infrastructure.
1 code implementation • 3 Nov 2023 • Mingze Yuan, Peng Bao, Jiajia Yuan, Yunhao Shen, ZiFan Chen, Yi Xie, Jie Zhao, Yang Chen, Li Zhang, Lin Shen, Bin Dong
This has sparked significant interest in applying LLMs to enhance various aspects of healthcare, ranging from medical education to clinical decision support.
no code implementations • 7 May 2023 • Grant P. Strimel, Yi Xie, Brian King, Martin Radfar, Ariya Rastrow, Athanasios Mouchtaris
Streaming speech recognition architectures are employed for low-latency, real-time applications.
Automatic Speech Recognition Automatic Speech Recognition (ASR) +1
no code implementations • CVPR 2023 • Yi Xie, Huaidong Zhang, Xuemiao Xu, Jianqing Zhu, Shengfeng He
Specifically, the employed student model is initially a heavy model to fruitfully learn distilled knowledge in the early training epochs, and the student model is gradually compressed during the training.
2 code implementations • 28 Nov 2022 • Hongjun Wang, Jiyuan Chen, Tong Pan, Zipei Fan, Boyuan Zhang, Renhe Jiang, Lingyu Zhang, Yi Xie, Zhongyi Wang, Xuan Song
Spatial-temporal (ST) graph modeling, such as traffic speed forecasting and taxi demand prediction, is an important task in deep learning area.
no code implementations • 5 Sep 2022 • Chun-Nam Yu, Yi Xie
Few-shot classification aims to learn to classify new object categories well using only a few labeled examples.
1 code implementation • 22 Aug 2022 • Huy Phan, Cong Shi, Yi Xie, Tianfang Zhang, Zhuohang Li, Tianming Zhao, Jian Liu, Yan Wang, Yingying Chen, Bo Yuan
Recently backdoor attack has become an emerging threat to the security of deep neural network (DNN) models.
no code implementations • 15 Jul 2022 • Xuefei Yin, Yanming Zhu, Yi Xie, Jiankun Hu
Case studies on the detection of SFDIAs on the benchmark smart grids show that the PowerFDNet achieved significant improvement compared with the state-of-the-art SFDIA detection methods.
no code implementations • 5 Jul 2022 • Yi Xie, Jonathan Macoskey, Martin Radfar, Feng-Ju Chang, Brian King, Ariya Rastrow, Athanasios Mouchtaris, Grant P. Strimel
We present a streaming, Transformer-based end-to-end automatic speech recognition (ASR) architecture which achieves efficient neural inference through compute cost amortization.
Automatic Speech Recognition Automatic Speech Recognition (ASR) +1
1 code implementation • NeurIPS 2021 • Yang Sui, Miao Yin, Yi Xie, Huy Phan, Saman Zonouz, Bo Yuan
Filter pruning has been widely used for neural network compression because of its enabled practical acceleration.
no code implementations • 12 Jul 2021 • Fei Shen, Yi Xie, Jianqing Zhu, Xiaobin Zhu, Huanqiang Zeng
In the macro view, a list of GiT blocks are stacked to build a vehicle re-identification model, in where graphs are to extract discriminative local features within patches and transformers are to extract robust global features among patches.
Ranked #2 on Vehicle Re-Identification on VehicleID Small (mAP metric)
no code implementations • 13 May 2021 • XiaoYu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang
This survey presents the most recent findings of privacy attacks and defenses appeared in cloud-based neural network services.
no code implementations • 19 Apr 2021 • Fei Shen, Xin He, Mengwan Wei, Yi Xie
In this report, we introduce the technical details of our submission to the VIPriors object detection challenge.
no code implementations • 28 Mar 2021 • Xiao Zang, Yi Xie, Siyu Liao, Jie Chen, Bo Yuan
In this paper, we, for the first time, perform systematic investigation on noise injection-based regularization for point cloud-domain DNNs.
no code implementations • Sensors 2021 • Xiaotao Shao, Qing Wang, Wei Yang, Yun Chen, Yi Xie, Yan Shen, Zhongli Wang
MFPN includes two modules, namely double feature pyramid network (FPN) integrated with ResNet (DFR) and repulsion loss of minimum (RLM).
no code implementations • 10 Aug 2020 • Yi Xie, Yun Xiong, Yangyong Zhu
Most of the existing algorithms for traffic speed forecasting split spatial features and temporal features to independent modules, and then associate information from both dimensions.
Social and Information Networks
1 code implementation • 29 May 2020 • Fei Shen, Jianqing Zhu, Xiaobin Zhu, Yi Xie, Jingchang Huang
Secondly, a novel pyramidal graph network (PGN) is designed to comprehensively explore the spatial significance of feature maps at multiple scales.
Ranked #3 on Vehicle Re-Identification on VehicleID Small (mAP metric)
no code implementations • 8 May 2020 • Manchao Zhang, Yi Xie, Jie Zhang, Weichen Wang, Chunwang Wu, Ting Chen, Wei Wu, Pingxing Chen
Decoherence induced by the laser frequency noise is one of the most important obstacles in the quantum information processing.
Quantum Physics
no code implementations • 26 Apr 2020 • Yi Xie, Zhuohang Li, Cong Shi, Jian Liu, Yingying Chen, Bo Yuan
These idealized assumptions, however, makes the existing audio adversarial attacks mostly impossible to be launched in a timely fashion in practice (e. g., playing unnoticeable adversarial perturbations along with user's streaming input).
no code implementations • 23 Apr 2020 • Chunhua Deng, Siyu Liao, Yi Xie, Keshab K. Parhi, Xuehai Qian, Bo Yuan
On the other hand, the recent structured matrix-based approach (i. e., CirCNN) is limited by the relatively complex arithmetic computation (i. e., FFT), less flexible compression ratio, and its inability to fully utilize input sparsity.
no code implementations • 4 Mar 2020 • Yi Xie, Cong Shi, Zhuohang Li, Jian Liu, Yingying Chen, Bo Yuan
As the popularity of voice user interface (VUI) exploded in recent years, speaker recognition system has emerged as an important medium of identifying a speaker in many security-required applications and services.
1 code implementation • 12 Feb 2020 • Xiao Zang, Yi Xie, Jie Chen, Bo Yuan
Worse, the bad actors found for one graph model severely compromise other models as well.
no code implementations • 16 Dec 2019 • Huy Phan, Yi Xie, Siyu Liao, Jie Chen, Bo Yuan
In addition, CAG exhibits high transferability across different DNN classifier models in black-box attack scenario by introducing random dropout in the process of generating perturbations.