Skip to main content

Showing 1–42 of 42 results for author: Dou, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18118  [pdf, other

    cs.CR cs.CL

    SafeAligner: Safety Alignment against Jailbreak Attacks via Response Disparity Guidance

    Authors: Caishuang Huang, Wanxu Zhao, Rui Zheng, Huijie Lv, Shihan Dou, Sixian Li, Xiao Wang, Enyu Zhou, Junjie Ye, Yuming Yang, Tao Gui, Qi Zhang, Xuan**g Huang

    Abstract: As the development of large language models (LLMs) rapidly advances, securing these models effectively without compromising their utility has become a pivotal area of research. However, current defense strategies against jailbreak attacks (i.e., efforts to bypass security protocols) often suffer from limited adaptability, restricted general capability, and high cost. To address these challenges, w… ▽ More

    Submitted 28 June, 2024; v1 submitted 26 June, 2024; originally announced June 2024.

  2. arXiv:2406.11190  [pdf, other

    cs.CL cs.AI

    Aligning Large Language Models from Self-Reference AI Feedback with one General Principle

    Authors: Rong Bao, Rui Zheng, Shihan Dou, Xiao Wang, Enyu Zhou, Bo Wang, Qi Zhang, Liang Ding, Dacheng Tao

    Abstract: In aligning large language models (LLMs), utilizing feedback from existing advanced AI rather than humans is an important method to scale supervisory signals. However, it is highly challenging for AI to understand human intentions and societal values, and provide accurate preference feedback based on these. Current AI feedback methods rely on powerful LLMs, carefully designed specific principles t… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

    Comments: 19 pages, 3 figures

  3. arXiv:2405.00438  [pdf, other

    cs.LG cs.CL

    MetaRM: Shifted Distributions Alignment via Meta-Learning

    Authors: Shihan Dou, Yan Liu, Enyu Zhou, Tianlong Li, Haoxiang Jia, Limao Xiong, Xin Zhao, Junjie Ye, Rui Zheng, Tao Gui, Qi Zhang, Xuan**g Huang

    Abstract: The success of Reinforcement Learning from Human Feedback (RLHF) in language model alignment is critically dependent on the capability of the reward model (RM). However, as the training process progresses, the output distribution of the policy model shifts, leading to the RM's reduced ability to distinguish between responses. This issue is further compounded when the RM, trained on a specific data… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: 11 pages, 6 figures. arXiv admin note: text overlap with arXiv:2401.06080

  4. arXiv:2405.00428  [pdf, other

    cs.SE

    CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection

    Authors: Shihan Dou, Yueming Wu, Haoxiang Jia, Yuhao Zhou, Yan Liu, Yang Liu

    Abstract: With the development of the open source community, the code is often copied, spread, and evolved in multiple software systems, which brings uncertainty and risk to the software system (e.g., bug propagation and copyright infringement). Therefore, it is important to conduct code clone detection to discover similar code pairs. Many approaches have been proposed to detect code clones where token-base… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: 21 pages, 7 figures

  5. arXiv:2403.12171  [pdf, other

    cs.CL cs.AI

    EasyJailbreak: A Unified Framework for Jailbreaking Large Language Models

    Authors: Weikang Zhou, Xiao Wang, Limao Xiong, Han Xia, Yingshuang Gu, Mingxu Chai, Fukang Zhu, Caishuang Huang, Shihan Dou, Zhiheng Xi, Rui Zheng, Songyang Gao, Yicheng Zou, Hang Yan, Yifan Le, Ruohui Wang, Lijun Li, **g Shao, Tao Gui, Qi Zhang, Xuan**g Huang

    Abstract: Jailbreak attacks are crucial for identifying and mitigating the security vulnerabilities of Large Language Models (LLMs). They are designed to bypass safeguards and elicit prohibited outputs. However, due to significant differences among various jailbreak methods, there is no standard implementation framework available for the community, which limits comprehensive security evaluations. This paper… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  6. arXiv:2402.16717  [pdf, other

    cs.CL cs.AI cs.CR

    CodeChameleon: Personalized Encryption Framework for Jailbreaking Large Language Models

    Authors: Huijie Lv, Xiao Wang, Yuansen Zhang, Caishuang Huang, Shihan Dou, Junjie Ye, Tao Gui, Qi Zhang, Xuan**g Huang

    Abstract: Adversarial misuse, particularly through `jailbreaking' that circumvents a model's safety and ethical protocols, poses a significant challenge for Large Language Models (LLMs). This paper delves into the mechanisms behind such successful attacks, introducing a hypothesis for the safety mechanism of aligned LLMs: intent security recognition followed by response generation. Grounded in this hypothes… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

  7. arXiv:2402.15102  [pdf, other

    cs.LG cs.AI cs.GT cs.IR

    Trajectory-wise Iterative Reinforcement Learning Framework for Auto-bidding

    Authors: Haoming Li, Yusen Huo, Shuai Dou, Zhenzhe Zheng, Zhilin Zhang, Chuan Yu, Jian Xu, Fan Wu

    Abstract: In online advertising, advertisers participate in ad auctions to acquire ad opportunities, often by utilizing auto-bidding tools provided by demand-side platforms (DSPs). The current auto-bidding algorithms typically employ reinforcement learning (RL). However, due to safety concerns, most RL-based auto-bidding policies are trained in simulation, leading to a performance degradation when deployed… ▽ More

    Submitted 8 April, 2024; v1 submitted 23 February, 2024; originally announced February 2024.

    Comments: Accepted by The Web Conference 2024 (WWW'24) as an oral paper

  8. arXiv:2402.11525  [pdf, other

    cs.CL cs.LG

    Advancing Translation Preference Modeling with RLHF: A Step Towards Cost-Effective Solution

    Authors: Nuo Xu, Jun Zhao, Can Zu, Sixian Li, Lu Chen, Zhihao Zhang, Rui Zheng, Shihan Dou, Wenjuan Qin, Tao Gui, Qi Zhang, Xuan**g Huang

    Abstract: Faithfulness, expressiveness, and elegance is the constant pursuit in machine translation. However, traditional metrics like \textit{BLEU} do not strictly align with human preference of translation quality. In this paper, we explore leveraging reinforcement learning with human feedback (\textit{RLHF}) to improve translation quality. It is non-trivial to collect a large high-quality dataset of huma… ▽ More

    Submitted 27 February, 2024; v1 submitted 18 February, 2024; originally announced February 2024.

  9. arXiv:2402.05808  [pdf, other

    cs.AI cs.CL cs.LG

    Training Large Language Models for Reasoning through Reverse Curriculum Reinforcement Learning

    Authors: Zhiheng Xi, Wenxiang Chen, Boyang Hong, Senjie **, Rui Zheng, Wei He, Yiwen Ding, Shichun Liu, Xin Guo, Junzhe Wang, Honglin Guo, Wei Shen, Xiaoran Fan, Yuhao Zhou, Shihan Dou, Xiao Wang, Xinbo Zhang, Peng Sun, Tao Gui, Qi Zhang, Xuan**g Huang

    Abstract: In this paper, we propose R$^3$: Learning Reasoning through Reverse Curriculum Reinforcement Learning (RL), a novel method that employs only outcome supervision to achieve the benefits of process supervision for large language models. The core challenge in applying RL to complex reasoning is to identify a sequence of actions that result in positive rewards and provide appropriate supervision for o… ▽ More

    Submitted 17 March, 2024; v1 submitted 8 February, 2024; originally announced February 2024.

    Comments: Preprint. Codes released: https://github.com/WooooDyy/LLM-Reverse-Curriculum-RL

  10. arXiv:2402.01391  [pdf, other

    cs.SE cs.CL

    StepCoder: Improve Code Generation with Reinforcement Learning from Compiler Feedback

    Authors: Shihan Dou, Yan Liu, Haoxiang Jia, Limao Xiong, Enyu Zhou, Wei Shen, Junjie Shan, Caishuang Huang, Xiao Wang, Xiaoran Fan, Zhiheng Xi, Yuhao Zhou, Tao Ji, Rui Zheng, Qi Zhang, Xuan**g Huang, Tao Gui

    Abstract: The advancement of large language models (LLMs) has significantly propelled the field of code generation. Previous work integrated reinforcement learning (RL) with compiler feedback for exploring the output space of LLMs to enhance code generation quality. However, the lengthy code generated by LLMs in response to complex human requirements makes RL exploration a challenge. Also, since the unit te… ▽ More

    Submitted 5 February, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

    Comments: 13 pages, 5 figures

  11. arXiv:2401.18032  [pdf, other

    cs.CV

    DROP: Decouple Re-Identification and Human Parsing with Task-specific Features for Occluded Person Re-identification

    Authors: Shuguang Dou, Xiangyang Jiang, Yuanpeng Tu, Junyao Gao, Zefan Qu, Qingsong Zhao, Cairong Zhao

    Abstract: The paper introduces the Decouple Re-identificatiOn and human Parsing (DROP) method for occluded person re-identification (ReID). Unlike mainstream approaches using global features for simultaneous multi-task learning of ReID and human parsing, or relying on semantic information for attention guidance, DROP argues that the inferior performance of the former is due to distinct granularity requireme… ▽ More

    Submitted 31 January, 2024; originally announced January 2024.

  12. arXiv:2401.17221  [pdf, other

    cs.CV cs.AI cs.CL cs.LG

    MouSi: Poly-Visual-Expert Vision-Language Models

    Authors: Xiaoran Fan, Tao Ji, Changhao Jiang, Shuo Li, Senjie **, Sirui Song, Junke Wang, Boyang Hong, Lu Chen, Guodong Zheng, Ming Zhang, Caishuang Huang, Rui Zheng, Zhiheng Xi, Yuhao Zhou, Shihan Dou, Junjie Ye, Hang Yan, Tao Gui, Qi Zhang, Xipeng Qiu, Xuan**g Huang, Zuxuan Wu, Yu-Gang Jiang

    Abstract: Current large vision-language models (VLMs) often encounter challenges such as insufficient capabilities of a single visual component and excessively long visual tokens. These issues can limit the model's effectiveness in accurately interpreting complex visual information and over-lengthy contextual information. Addressing these challenges is crucial for enhancing the performance and applicability… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

  13. arXiv:2401.11458  [pdf, other

    cs.CL

    Linear Alignment: A Closed-form Solution for Aligning Human Preferences without Tuning and Feedback

    Authors: Songyang Gao, Qiming Ge, Wei Shen, Shihan Dou, Junjie Ye, Xiao Wang, Rui Zheng, Yicheng Zou, Zhi Chen, Hang Yan, Qi Zhang, Dahua Lin

    Abstract: The success of AI assistants based on Language Models (LLMs) hinges on Reinforcement Learning from Human Feedback (RLHF) to comprehend and align with user intentions. However, traditional alignment algorithms, such as PPO, are hampered by complex annotation and training requirements. This reliance limits the applicability of RLHF and hinders the development of professional assistants tailored to d… ▽ More

    Submitted 1 July, 2024; v1 submitted 21 January, 2024; originally announced January 2024.

    Comments: Accepted by ICML2024, I'm still preparing a better vision

  14. arXiv:2401.06824  [pdf, other

    cs.CL cs.AI

    Open the Pandora's Box of LLMs: Jailbreaking LLMs through Representation Engineering

    Authors: Tianlong Li, Shihan Dou, Wenhao Liu, Muling Wu, Changze Lv, Xiaoqing Zheng, Xuan**g Huang

    Abstract: Jailbreaking techniques aim to probe the boundaries of safety in large language models (LLMs) by inducing them to generate toxic responses to malicious queries, a significant concern within the LLM community. While existing jailbreaking methods primarily rely on prompt engineering, altering inputs to evade LLM safety mechanisms, they suffer from low attack success rates and significant time overhe… ▽ More

    Submitted 16 February, 2024; v1 submitted 11 January, 2024; originally announced January 2024.

    Comments: 13 pages, 9 figures

  15. arXiv:2401.06080  [pdf, other

    cs.AI

    Secrets of RLHF in Large Language Models Part II: Reward Modeling

    Authors: Binghai Wang, Rui Zheng, Lu Chen, Yan Liu, Shihan Dou, Caishuang Huang, Wei Shen, Senjie **, Enyu Zhou, Chenyu Shi, Songyang Gao, Nuo Xu, Yuhao Zhou, Xiaoran Fan, Zhiheng Xi, Jun Zhao, Xiao Wang, Tao Ji, Hang Yan, Lixing Shen, Zhan Chen, Tao Gui, Qi Zhang, Xipeng Qiu, Xuan**g Huang , et al. (2 additional authors not shown)

    Abstract: Reinforcement Learning from Human Feedback (RLHF) has become a crucial technology for aligning language models with human values and intentions, enabling models to produce more helpful and harmless responses. Reward models are trained as proxies for human preferences to drive reinforcement learning optimization. While reward models are often considered central to achieving high performance, they f… ▽ More

    Submitted 12 January, 2024; v1 submitted 11 January, 2024; originally announced January 2024.

  16. arXiv:2401.00741  [pdf, other

    cs.CL cs.AI

    ToolEyes: Fine-Grained Evaluation for Tool Learning Capabilities of Large Language Models in Real-world Scenarios

    Authors: Junjie Ye, Guanyu Li, Songyang Gao, Caishuang Huang, Yilong Wu, Sixian Li, Xiaoran Fan, Shihan Dou, Qi Zhang, Tao Gui, Xuan**g Huang

    Abstract: Existing evaluations of tool learning primarily focus on validating the alignment of selected tools for large language models (LLMs) with expected outcomes. However, these approaches rely on a limited set of scenarios where answers can be pre-determined, diverging from genuine needs. Furthermore, a sole emphasis on outcomes disregards the intricate capabilities essential for LLMs to effectively ut… ▽ More

    Submitted 14 January, 2024; v1 submitted 1 January, 2024; originally announced January 2024.

  17. arXiv:2312.09979  [pdf, other

    cs.CL

    LoRAMoE: Alleviate World Knowledge Forgetting in Large Language Models via MoE-Style Plugin

    Authors: Shihan Dou, Enyu Zhou, Yan Liu, Songyang Gao, Jun Zhao, Wei Shen, Yuhao Zhou, Zhiheng Xi, Xiao Wang, Xiaoran Fan, Shiliang Pu, Jiang Zhu, Rui Zheng, Tao Gui, Qi Zhang, Xuan**g Huang

    Abstract: Supervised fine-tuning (SFT) is a crucial step for large language models (LLMs), enabling them to align with human instructions and enhance their capabilities in downstream tasks. Increasing instruction data substantially is a direct solution to align the model with a broader range of downstream tasks or notably improve its performance on a specific task. However, we find that large-scale increase… ▽ More

    Submitted 8 March, 2024; v1 submitted 15 December, 2023; originally announced December 2023.

    Comments: 14 pages, 7 figures

  18. arXiv:2311.08778  [pdf, other

    cs.SE

    Gitor: Scalable Code Clone Detection by Building Global Sample Graph

    Authors: Junjie Shan, Shihan Dou, Yueming Wu, Hairu Wu, Yang Liu

    Abstract: Code clone detection is about finding out similar code fragments, which has drawn much attention in software engineering since it is important for software maintenance and evolution. Researchers have proposed many techniques and tools for source code clone detection, but current detection methods concentrate on analyzing or processing code samples individually without exploring the underlying conn… ▽ More

    Submitted 18 November, 2023; v1 submitted 15 November, 2023; originally announced November 2023.

    Comments: 12 pages, 5 figures

  19. arXiv:2310.16582  [pdf, other

    cs.CL

    Tailoring Personality Traits in Large Language Models via Unsupervisedly-Built Personalized Lexicons

    Authors: Tianlong Li, Shihan Dou, Changze Lv, Wenhao Liu, Jianhan Xu, Muling Wu, Zixuan Ling, Xiaoqing Zheng, Xuan**g Huang

    Abstract: Personality plays a pivotal role in sha** human expression patterns, thus regulating the personality of large language models (LLMs) holds significant potential in enhancing the user experience of LLMs. Previous methods either relied on fine-tuning LLMs on specific corpora or necessitated manually crafted prompts to elicit specific personalities from LLMs. However, the former approach is ineffic… ▽ More

    Submitted 6 January, 2024; v1 submitted 25 October, 2023; originally announced October 2023.

    Comments: Work in progress

  20. arXiv:2310.11971  [pdf, other

    cs.LG cs.AI

    Improving Generalization of Alignment with Human Preferences through Group Invariant Learning

    Authors: Rui Zheng, Wei Shen, Yuan Hua, Wenbin Lai, Shihan Dou, Yuhao Zhou, Zhiheng Xi, Xiao Wang, Haoran Huang, Tao Gui, Qi Zhang, Xuan**g Huang

    Abstract: The success of AI assistants based on language models (LLMs) hinges crucially on Reinforcement Learning from Human Feedback (RLHF), which enables the generation of responses more aligned with human preferences. As universal AI assistants, there's a growing expectation for them to perform consistently across various domains. However, previous work shows that Reinforcement Learning (RL) often exploi… ▽ More

    Submitted 25 December, 2023; v1 submitted 18 October, 2023; originally announced October 2023.

  21. arXiv:2310.05199  [pdf, other

    cs.CL

    Loose lips sink ships: Mitigating Length Bias in Reinforcement Learning from Human Feedback

    Authors: Wei Shen, Rui Zheng, Wenyu Zhan, Jun Zhao, Shihan Dou, Tao Gui, Qi Zhang, Xuan**g Huang

    Abstract: Reinforcement learning from human feedback serves as a crucial bridge, aligning large language models with human and societal values. This alignment requires a vast corpus of human feedback to learn a reward model, which is subsequently used to finetune language models. However, we have identified that the reward model often finds shortcuts to bypass its intended objectives, misleadingly assuming… ▽ More

    Submitted 29 November, 2023; v1 submitted 8 October, 2023; originally announced October 2023.

    Comments: EMNLP 2023 findings, Length Bias in RLHF, Mitigate bias in reward modeling

  22. arXiv:2309.07864  [pdf, other

    cs.AI cs.CL

    The Rise and Potential of Large Language Model Based Agents: A Survey

    Authors: Zhiheng Xi, Wenxiang Chen, Xin Guo, Wei He, Yiwen Ding, Boyang Hong, Ming Zhang, Junzhe Wang, Senjie **, Enyu Zhou, Rui Zheng, Xiaoran Fan, Xiao Wang, Limao Xiong, Yuhao Zhou, Weiran Wang, Changhao Jiang, Yicheng Zou, Xiangyang Liu, Zhangyue Yin, Shihan Dou, Rongxiang Weng, Wensen Cheng, Qi Zhang, Wenjuan Qin , et al. (4 additional authors not shown)

    Abstract: For a long time, humanity has pursued artificial intelligence (AI) equivalent to or surpassing the human level, with AI agents considered a promising vehicle for this pursuit. AI agents are artificial entities that sense their environment, make decisions, and take actions. Many efforts have been made to develop intelligent agents, but they mainly focus on advancement in algorithms or training stra… ▽ More

    Submitted 19 September, 2023; v1 submitted 14 September, 2023; originally announced September 2023.

    Comments: 86 pages, 12 figures

  23. Reviving Static Charts into Live Charts

    Authors: Lu Ying, Yun Wang, Haotian Li, Shuguang Dou, Haidong Zhang, Xinyang Jiang, Huamin Qu, Yingcai Wu

    Abstract: Data charts are prevalent across various fields due to their efficacy in conveying complex data relationships. However, static charts may sometimes struggle to engage readers and efficiently present intricate information, potentially resulting in limited understanding. We introduce "Live Charts," a new format of presentation that decomposes complex information within a chart and explains the infor… ▽ More

    Submitted 17 May, 2024; v1 submitted 6 September, 2023; originally announced September 2023.

    Comments: Accepted by IEEE TVCG

  24. arXiv:2308.01191  [pdf, other

    cs.SE

    Towards Understanding the Capability of Large Language Models on Code Clone Detection: A Survey

    Authors: Shihan Dou, Junjie Shan, Haoxiang Jia, Wenhao Deng, Zhiheng Xi, Wei He, Yueming Wu, Tao Gui, Yang Liu, Xuan**g Huang

    Abstract: Code cloning, the duplication of code fragments, is common in software development. While some reuse aids productivity, excessive cloning hurts maintainability and introduces bugs. Hence, automatic code clone detection is vital. Meanwhile, large language models (LLMs) possess diverse code-related knowledge, making them versatile for various software engineering challenges. However, LLMs' performan… ▽ More

    Submitted 5 August, 2023; v1 submitted 2 August, 2023; originally announced August 2023.

    Comments: 13 pages, 3 figures

  25. arXiv:2307.04964  [pdf, other

    cs.CL cs.AI cs.LG

    Secrets of RLHF in Large Language Models Part I: PPO

    Authors: Rui Zheng, Shihan Dou, Songyang Gao, Yuan Hua, Wei Shen, Binghai Wang, Yan Liu, Senjie **, Qin Liu, Yuhao Zhou, Limao Xiong, Lu Chen, Zhiheng Xi, Nuo Xu, Wenbin Lai, Minghao Zhu, Cheng Chang, Zhangyue Yin, Rongxiang Weng, Wensen Cheng, Haoran Huang, Tianxiang Sun, Hang Yan, Tao Gui, Qi Zhang , et al. (2 additional authors not shown)

    Abstract: Large language models (LLMs) have formulated a blueprint for the advancement of artificial general intelligence. Its primary objective is to function as a human-centric (helpful, honest, and harmless) assistant. Alignment with humans assumes paramount significance, and reinforcement learning with human feedback (RLHF) emerges as the pivotal technological paradigm underpinning this pursuit. Current… ▽ More

    Submitted 18 July, 2023; v1 submitted 10 July, 2023; originally announced July 2023.

  26. arXiv:2306.15705  [pdf, other

    cs.CL cs.LG

    On the Universal Adversarial Perturbations for Efficient Data-free Adversarial Detection

    Authors: Songyang Gao, Shihan Dou, Qi Zhang, Xuan**g Huang, ** Ma, Ying Shan

    Abstract: Detecting adversarial samples that are carefully crafted to fool the model is a critical step to socially-secure applications. However, existing adversarial detection methods require access to sufficient training data, which brings noteworthy concerns regarding privacy leakage and generalizability. In this work, we validate that the adversarial sample generated by attack algorithms is strongly rel… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

    Comments: Accepted by ACL2023 (Short Paper)

  27. arXiv:2306.15164  [pdf, other

    cs.CL cs.LG

    DSRM: Boost Textual Adversarial Training with Distribution Shift Risk Minimization

    Authors: Songyang Gao, Shihan Dou, Yan Liu, Xiao Wang, Qi Zhang, Zhongyu Wei, ** Ma, Ying Shan

    Abstract: Adversarial training is one of the best-performing methods in improving the robustness of deep language models. However, robust models come at the cost of high time consumption, as they require multi-step gradient ascents or word substitutions to obtain adversarial samples. In addition, these generated samples are deficient in grammatical quality and semantic consistency, which impairs the effecti… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

    Comments: Accepted by ACL2023

  28. arXiv:2305.02865  [pdf, other

    cs.CL cs.AI

    CausalAPM: Generalizable Literal Disentanglement for NLU Debiasing

    Authors: Songyang Gao, Shihan Dou, Junjie Shan, Qi Zhang, Xuan**g Huang

    Abstract: Dataset bias, i.e., the over-reliance on dataset-specific literal heuristics, is getting increasing attention for its detrimental effect on the generalization ability of NLU models. Existing works focus on eliminating dataset bias by down-weighting problematic data in the training process, which induce the omission of valid feature information while mitigating bias. In this work, We analyze the ca… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

    Comments: 10 pages, 4 figures

  29. arXiv:2212.07860  [pdf

    cs.NI cs.LG

    Multi-Level Association Rule Mining for Wireless Network Time Series Data

    Authors: Chen Zhu, Chengbo Qiu, Shaoyu Dou, Minghao Liao

    Abstract: Key performance indicators(KPIs) are of great significance in the monitoring of wireless network service quality. The network service quality can be improved by adjusting relevant configuration parameters(CPs) of the base station. However, there are numerous CPs and different cells may affect each other, which bring great challenges to the association analysis of wireless network data. In this pap… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

    Comments: 7 pages, 4 figures

  30. arXiv:2212.06150  [pdf

    cs.LG

    CPMLHO:Hyperparameter Tuning via Cutting Plane and Mixed-Level Optimization

    Authors: Shuo Yang, Yang Jiao, Shaoyu Dou, Mana Zheng, Chen Zhu

    Abstract: The hyperparameter optimization of neural network can be expressed as a bilevel optimization problem. The bilevel optimization is used to automatically update the hyperparameter, and the gradient of the hyperparameter is the approximate gradient based on the best response function. Finding the best response function is very time consuming. In this paper we propose CPMLHO, a new hyperparameter opti… ▽ More

    Submitted 11 December, 2022; originally announced December 2022.

  31. arXiv:2211.15918  [pdf, other

    cs.CR cs.CV

    Similarity Distribution based Membership Inference Attack on Person Re-identification

    Authors: Junyao Gao, Xinyang Jiang, Huishuai Zhang, Yifan Yang, Shuguang Dou, Dongsheng Li, Duoqian Miao, Cheng Deng, Cairong Zhao

    Abstract: While person Re-identification (Re-ID) has progressed rapidly due to its wide real-world applications, it also causes severe risks of leaking personal information from training data. Thus, this paper focuses on quantifying this risk by membership inference (MI) attack. Most of the existing MI attack algorithms focus on classification models, while Re-ID follows a totally different training and inf… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

    Comments: 9 pages, 7 figures, Accepted by AAAI 2023

  32. arXiv:2211.10933  [pdf, other

    cs.CV cs.CR

    Invisible Backdoor Attack with Dynamic Triggers against Person Re-identification

    Authors: Wenli Sun, Xinyang Jiang, Shuguang Dou, Dongsheng Li, Duoqian Miao, Cheng Deng, Cairong Zhao

    Abstract: In recent years, person Re-identification (ReID) has rapidly progressed with wide real-world applications, but also poses significant risks of adversarial attacks. In this paper, we focus on the backdoor attack on deep ReID models. Existing backdoor attack methods follow an all-to-one or all-to-all attack scenario, where all the target classes in the test set have already been seen in the training… ▽ More

    Submitted 10 May, 2023; v1 submitted 20 November, 2022; originally announced November 2022.

  33. arXiv:2210.07547  [pdf, other

    cs.CL cs.LG

    Kernel-Whitening: Overcome Dataset Bias with Isotropic Sentence Embedding

    Authors: Songyang Gao, Shihan Dou, Qi Zhang, Xuan**g Huang

    Abstract: Dataset bias has attracted increasing attention recently for its detrimental effect on the generalization ability of fine-tuned models. The current mainstream solution is designing an additional shallow model to pre-identify biased instances. However, such two-stage methods scale up the computational complexity of training process and obstruct valid feature information while mitigating bias. To ad… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

    Comments: Accepted by EMNLP2022

  34. arXiv:2209.00484  [pdf, other

    cs.CL cs.AI

    Focus-Driven Contrastive Learniang for Medical Question Summarization

    Authors: Ming Zhang, Shuai Dou, Ziyang Wang, Yunfang Wu

    Abstract: Automatic medical question summarization can significantly help the system to understand consumer health questions and retrieve correct answers. The Seq2Seq model based on maximum likelihood estimation (MLE) has been applied in this task, which faces two general problems: the model can not capture well question focus and and the traditional MLE strategy lacks the ability to understand sentence-lev… ▽ More

    Submitted 14 February, 2023; v1 submitted 1 September, 2022; originally announced September 2022.

    Comments: Accepted by COLING 2022, long paper

  35. arXiv:2207.08159  [pdf, other

    cs.LG cs.AI

    Task-aware Similarity Learning for Event-triggered Time Series

    Authors: Shaoyu Dou, Kai Yang, Yang Jiao, Chengbo Qiu, Kui Ren

    Abstract: Time series analysis has achieved great success in diverse applications such as network security, environmental monitoring, and medical informatics. Learning similarities among different time series is a crucial problem since it serves as the foundation for downstream analysis such as clustering and anomaly detection. It often remains unclear what kind of distance metric is suitable for similarity… ▽ More

    Submitted 17 July, 2022; originally announced July 2022.

    Comments: 11 pages, 12 figures, under reviewing

  36. arXiv:2207.07311  [pdf, other

    cs.CV

    Towards Privacy-Preserving Person Re-identification via Person Identify Shift

    Authors: Shuguang Dou, Xinyang Jiang, Qingsong Zhao, Dongsheng Li, Cairong Zhao

    Abstract: Recently privacy concerns of person re-identification (ReID) raise more and more attention and preserving the privacy of the pedestrian images used by ReID methods become essential. De-identification (DeID) methods alleviate privacy issues by removing the identity-related of the ReID data. However, most of the existing DeID methods tend to remove all personal identity-related information and compr… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

  37. arXiv:2204.04391  [pdf, other

    cs.CL cs.IR

    MINER: Improving Out-of-Vocabulary Named Entity Recognition from an Information Theoretic Perspective

    Authors: Xiao Wang, Shihan Dou, Limao Xiong, Yicheng Zou, Qi Zhang, Tao Gui, Liang Qiao, Zhanzhan Cheng, Xuan**g Huang

    Abstract: NER model has achieved promising performance on standard NER benchmarks. However, recent studies show that previous approaches may over-rely on entity mention information, resulting in poor performance on out-of-vocabulary (OOV) entity recognition. In this work, we propose MINER, a novel NER learning framework, to remedy this issue from an information-theoretic perspective. The proposed approach c… ▽ More

    Submitted 3 May, 2022; v1 submitted 9 April, 2022; originally announced April 2022.

    Comments: Accepted as a long paper at ACL 2022

  38. arXiv:2203.00833  [pdf, other

    cs.LG cs.CV

    Adaptive Discriminative Regularization for Visual Classification

    Authors: Qingsong Zhao, Yi Wang, Shuguang Dou, Chen Gong, Yin Wang, Cairong Zhao

    Abstract: How to improve discriminative feature learning is central in classification. Existing works address this problem by explicitly increasing inter-class separability and intra-class similarity, whether by constructing positive and negative pairs for contrastive learning or posing tighter class separating margins. These methods do not exploit the similarity between different classes as they adhere to… ▽ More

    Submitted 11 January, 2023; v1 submitted 1 March, 2022; originally announced March 2022.

    Comments: We submit it to a Journal this time

  39. arXiv:2202.08048  [pdf, other

    cs.CL cs.AI cs.IT

    Decorrelate Irrelevant, Purify Relevant: Overcome Textual Spurious Correlations from a Feature Perspective

    Authors: Shihan Dou, Rui Zheng, Ting Wu, SongYang Gao, Junjie Shan, Qi Zhang, Yueming Wu, Xuan**g Huang

    Abstract: Natural language understanding (NLU) models tend to rely on spurious correlations (i.e., dataset bias) to achieve high performance on in-distribution datasets but poor performance on out-of-distribution ones. Most of the existing debiasing methods often identify and weaken these samples with biased features (i.e., superficial surface features that cause such spurious correlations). However, down-w… ▽ More

    Submitted 13 September, 2022; v1 submitted 16 February, 2022; originally announced February 2022.

    Comments: Accepted as a long paper at COLING 2022 (Oral)

  40. arXiv:2112.06250  [pdf, other

    cs.CR

    Boosting the Capability of Intelligent Vulnerability Detection by Training in a Human-Learning Manner

    Authors: Shihan Dou, Yueming Wu, Wenxuan Li, Feng Cheng, Wei Yang, Yang Liu

    Abstract: Due to its powerful automatic feature extraction, deep learning (DL) has been widely used in source code vulnerability detection. However, although it performs well on artificial datasets, its performance is not satisfactory when detecting real-world vulnerabilities due to the high complexity of real-world samples. In this paper, we propose to train DL-based vulnerability detection models in a hum… ▽ More

    Submitted 12 December, 2021; originally announced December 2021.

  41. arXiv:2107.03799  [pdf, other

    cs.CR

    Contrastive Learning for Robust Android Malware Familial Classification

    Authors: Yueming Wu, Shihan Dou, Deqing Zou, Wei Yang, Weizhong Qiang, Hai **

    Abstract: Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Features extracted from these obfuscated samples through program analysis contain many useless and disguised features, which leads to many false negatives. To address the issue, in this pape… ▽ More

    Submitted 31 October, 2022; v1 submitted 8 July, 2021; originally announced July 2021.

  42. arXiv:2010.01596  [pdf, other

    cs.LG cs.AI stat.ML

    TimeAutoML: Autonomous Representation Learning for Multivariate Irregularly Sampled Time Series

    Authors: Yang Jiao, Kai Yang, Shaoyu Dou, Pan Luo, Sijia Liu, Dong** Song

    Abstract: Multivariate time series (MTS) data are becoming increasingly ubiquitous in diverse domains, e.g., IoT systems, health informatics, and 5G networks. To obtain an effective representation of MTS data, it is not only essential to consider unpredictable dynamics and highly variable lengths of these data but also important to address the irregularities in the sampling rates of MTS. Existing parametric… ▽ More

    Submitted 4 October, 2020; originally announced October 2020.