Skip to main content

Showing 1–50 of 153 results for author: Ho, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10130  [pdf, other

    cs.CL

    The Devil is in the Neurons: Interpreting and Mitigating Social Biases in Pre-trained Language Models

    Authors: Yan Liu, Yu Liu, Xiaokang Chen, Pin-Yu Chen, Daoguang Zan, Min-Yen Kan, Tsung-Yi Ho

    Abstract: Pre-trained Language models (PLMs) have been acknowledged to contain harmful information, such as social biases, which may cause negative social impacts or even bring catastrophic results in application. Previous works on this problem mainly focused on using black-box methods such as probing to detect and quantify social biases in PLMs by observing model outputs. As a result, previous debiasing me… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  2. arXiv:2405.20112  [pdf, other

    cs.CV

    RIGID: A Training-free and Model-Agnostic Framework for Robust AI-Generated Image Detection

    Authors: Zhiyuan He, Pin-Yu Chen, Tsung-Yi Ho

    Abstract: The rapid advances in generative AI models have empowered the creation of highly realistic images with arbitrary content, raising concerns about potential misuse and harm, such as Deepfakes. Current research focuses on training detectors using large datasets of generated images. However, these training-based solutions are often computationally expensive and show limited generalization to unseen ge… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  3. arXiv:2405.20099  [pdf, other

    cs.CR

    Defensive Prompt Patch: A Robust and Interpretable Defense of LLMs against Jailbreak Attacks

    Authors: Chen Xiong, Xiangyu Qi, Pin-Yu Chen, Tsung-Yi Ho

    Abstract: Safety, security, and compliance are essential requirements when aligning large language models (LLMs). However, many seemingly aligned LLMs are soon shown to be susceptible to jailbreak attacks. These attacks aim to circumvent the models' safety guardrails and security mechanisms by introducing jailbreak prompts into malicious queries. In response to these challenges, this paper introduces Defens… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  4. arXiv:2405.08681  [pdf, other

    cs.CV cs.AI

    Achieving Fairness Through Channel Pruning for Dermatological Disease Diagnosis

    Authors: Qingpeng Kong, Ching-Hao Chiu, Dewen Zeng, Yu-Jen Chen, Tsung-Yi Ho, **gtong hu, Yiyu Shi

    Abstract: Numerous studies have revealed that deep learning-based medical image classification models may exhibit bias towards specific demographic attributes, such as race, gender, and age. Existing bias mitigation methods often achieve high level of fairness at the cost of significant accuracy degradation. In response to this challenge, we propose an innovative and adaptable Soft Nearest Neighbor Loss-bas… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

    Comments: 13 pages, 3 figures, early accepted by International Conference on Medical Image Computing and Computer-Assisted Intervention (MICCAI), 2024

  5. arXiv:2405.05590  [pdf, other

    cs.CR cs.AR cs.LG

    TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans

    Authors: Fangzhou Wang, Qi**g Wang, Lilas Alrahis, Bangqi Fu, Shui Jiang, Xiaopeng Zhang, Ozgur Sinanoglu, Tsung-Yi Ho, Evangeline F. Y. Young, Johann Knechtel

    Abstract: Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise to many security threats, like piracy of IC intellectual property or insertion of hardware Trojans, i.e., malicious circuit modifications. In this work, we proactively and systematically protect the physical layouts of ICs against… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  6. arXiv:2403.14736  [pdf, other

    q-bio.QM cs.AI cs.LG

    NaNa and MiGu: Semantic Data Augmentation Techniques to Enhance Protein Classification in Graph Neural Networks

    Authors: Yi-Shan Lan, Pin-Yu Chen, Tsung-Yi Ho

    Abstract: Protein classification tasks are essential in drug discovery. Real-world protein structures are dynamic, which will determine the properties of proteins. However, the existing machine learning methods, like ProNet (Wang et al., 2022a), only access limited conformational characteristics and protein side-chain features, leading to impractical protein structure and inaccuracy of protein classes in th… ▽ More

    Submitted 26 March, 2024; v1 submitted 21 March, 2024; originally announced March 2024.

  7. arXiv:2403.12172  [pdf, other

    cs.CV cs.AI

    Graph-Jigsaw Conditioned Diffusion Model for Skeleton-based Video Anomaly Detection

    Authors: Ali Karami, Thi Kieu Khanh Ho, Narges Armanfard

    Abstract: Skeleton-based video anomaly detection (SVAD) is a crucial task in computer vision. Accurately identifying abnormal patterns or events enables operators to promptly detect suspicious activities, thereby enhancing safety. Achieving this demands a comprehensive understanding of human motions, both at body and region levels, while also accounting for the wide variations of performing a single action.… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

    Comments: 18 pages, 2 figures, 6 tables

  8. arXiv:2403.07257  [pdf, other

    cs.AR cs.ET

    The Dawn of AI-Native EDA: Opportunities and Challenges of Large Circuit Models

    Authors: Lei Chen, Yiqi Chen, Zhufei Chu, Wenji Fang, Tsung-Yi Ho, Ru Huang, Yu Huang, Sadaf Khan, Min Li, Xingquan Li, Yu Li, Yun Liang, **wei Liu, Yi Liu, Yibo Lin, Guojie Luo, Zhengyuan Shi, Guangyu Sun, Dimitrios Tsaras, Runsheng Wang, Ziyi Wang, Xinming Wei, Zhiyao Xie, Qiang Xu, Chenhao Xue , et al. (14 additional authors not shown)

    Abstract: Within the Electronic Design Automation (EDA) domain, AI-driven solutions have emerged as formidable tools, yet they typically augment rather than redefine existing methodologies. These solutions often repurpose deep learning models from other domains, such as vision, text, and graph analytics, applying them to circuit design without tailoring to the unique complexities of electronic circuits. Suc… ▽ More

    Submitted 1 May, 2024; v1 submitted 11 March, 2024; originally announced March 2024.

    Comments: The authors are ordered alphabetically. Contact: qxu@cse[dot]cuhk[dot]edu[dot]hk, gluo@pku[dot]edu[dot]cn, yuan.mingxuan@huawei[dot]com

  9. arXiv:2403.05125  [pdf, other

    cs.CV cs.AI

    Evaluating Text-to-Image Generative Models: An Empirical Study on Human Image Synthesis

    Authors: Muxi Chen, Yi Liu, Jian Yi, Changran Xu, Qiuxia Lai, Hongliang Wang, Tsung-Yi Ho, Qiang Xu

    Abstract: In this paper, we present an empirical study introducing a nuanced evaluation framework for text-to-image (T2I) generative models, applied to human image synthesis. Our framework categorizes evaluations into two distinct groups: first, focusing on image qualities such as aesthetics and realism, and second, examining text conditions through concept coverage and fairness. We introduce an innovative… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  10. arXiv:2403.00867  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    Gradient Cuff: Detecting Jailbreak Attacks on Large Language Models by Exploring Refusal Loss Landscapes

    Authors: Xiaomeng Hu, Pin-Yu Chen, Tsung-Yi Ho

    Abstract: Large Language Models (LLMs) are becoming a prominent generative AI tool, where the user enters a query and the LLM generates an answer. To reduce harm and misuse, efforts have been made to align these LLMs to human values using advanced training techniques such as Reinforcement Learning from Human Feedback (RLHF). However, recent studies have highlighted the vulnerability of LLMs to adversarial j… ▽ More

    Submitted 5 March, 2024; v1 submitted 29 February, 2024; originally announced March 2024.

    Comments: Project page: https://huggingface.co/spaces/TrustSafeAI/GradientCuff-Jailbreak-Defense

  11. arXiv:2402.13061  [pdf, other

    cs.CV

    Toward Fairness via Maximum Mean Discrepancy Regularization on Logits Space

    Authors: Hao-Wei Chung, Ching-Hao Chiu, Yu-Jen Chen, Yiyu Shi, Tsung-Yi Ho

    Abstract: Fairness has become increasingly pivotal in machine learning for high-risk applications such as machine learning in healthcare and facial recognition. However, we see the deficiency in the previous logits space constraint methods. Therefore, we propose a novel framework, Logits-MMD, that achieves the fairness condition by imposing constraints on output logits with Maximum Mean Discrepancy. Moreove… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

  12. arXiv:2402.12179  [pdf, other

    cs.CV cs.AI cs.CY

    Examining Monitoring System: Detecting Abnormal Behavior In Online Examinations

    Authors: Dinh An Ngo, Thanh Dat Nguyen, Thi Le Chi Dang, Huy Hoan Le, Ton Bao Ho, Vo Thanh Khang Nguyen, Truong Thanh Hung Nguyen

    Abstract: Cheating in online exams has become a prevalent issue over the past decade, especially during the COVID-19 pandemic. To address this issue of academic dishonesty, our "Exam Monitoring System: Detecting Abnormal Behavior in Online Examinations" is designed to assist proctors in identifying unusual student behavior. Our system demonstrates high accuracy and speed in detecting cheating in real-time s… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

  13. Achieve Fairness without Demographics for Dermatological Disease Diagnosis

    Authors: Ching-Hao Chiu, Yu-Jen Chen, Yawen Wu, Yiyu Shi, Tsung-Yi Ho

    Abstract: In medical image diagnosis, fairness has become increasingly crucial. Without bias mitigation, deploying unfair AI would harm the interests of the underprivileged population and potentially tear society apart. Recent research addresses prediction biases in deep learning models concerning demographic groups (e.g., gender, age, and race) by utilizing demographic (sensitive attribute) information dur… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  14. arXiv:2312.13615  [pdf, other

    eess.AS cs.SD eess.SP

    Self-supervised Complex Network for Machine Sound Anomaly Detection

    Authors: Miseul Kim, Minh Tri Ho, Hong-Goo Kang

    Abstract: In this paper, we propose an anomaly detection algorithm for machine sounds with a deep complex network trained by self-supervision. Using the fact that phase continuity information is crucial for detecting abnormalities in time-series signals, our proposed algorithm utilizes the complex spectrum as an input and performs complex number arithmetic throughout the entire process. Since the usefulness… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Comments: Published in EUSIPCO 2021

  15. arXiv:2312.05849  [pdf, other

    cs.CV cs.GR cs.MM

    InteractDiffusion: Interaction Control in Text-to-Image Diffusion Models

    Authors: Jiun Tian Hoe, Xudong Jiang, Chee Seng Chan, Yap-Peng Tan, Weipeng Hu

    Abstract: Large-scale text-to-image (T2I) diffusion models have showcased incredible capabilities in generating coherent images based on textual descriptions, enabling vast applications in content generation. While recent advancements have introduced control over factors such as object localization, posture, and image contours, a crucial gap remains in our ability to control the interactions between objects… ▽ More

    Submitted 26 February, 2024; v1 submitted 10 December, 2023; originally announced December 2023.

    Comments: Website: https://jiuntian.github.io/interactdiffusion. Accepted at CVPR2024

  16. arXiv:2312.00656  [pdf, other

    cs.LG cs.AI stat.ML

    Simple Transferability Estimation for Regression Tasks

    Authors: Cuong N. Nguyen, Phong Tran, Lam Si Tung Ho, Vu Dinh, Anh T. Tran, Tal Hassner, Cuong V. Nguyen

    Abstract: We consider transferability estimation, the problem of estimating how well deep learning models transfer from a source to a target task. We focus on regression tasks, which received little previous attention, and propose two simple and computationally efficient approaches that estimate transferability based on the negative regularized mean squared error of a linear regression model. We prove novel… ▽ More

    Submitted 3 December, 2023; v1 submitted 1 December, 2023; originally announced December 2023.

    Comments: Paper published at The 39th Conference on Uncertainty in Artificial Intelligence (UAI) 2023

  17. arXiv:2312.00050  [pdf, other

    cs.CR cs.AI cs.LG

    Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift

    Authors: Shengwei An, Sheng-Yen Chou, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Guangyu Shen, Siyuan Cheng, Shiqing Ma, Pin-Yu Chen, Tsung-Yi Ho, Xiangyu Zhang

    Abstract: Diffusion models (DM) have become state-of-the-art generative models because of their capability to generate high-quality images from noises without adversarial training. However, they are vulnerable to backdoor attacks as reported by recent studies. When a data input (e.g., some Gaussian noise) is stamped with a trigger (e.g., a white patch), the backdoored model always generates the target image… ▽ More

    Submitted 4 February, 2024; v1 submitted 27 November, 2023; originally announced December 2023.

    Comments: AAAI 2024

  18. arXiv:2311.17516  [pdf, other

    cs.CR cs.CV

    MMA-Diffusion: MultiModal Attack on Diffusion Models

    Authors: Yijun Yang, Ruiyuan Gao, Xiaosen Wang, Tsung-Yi Ho, Nan Xu, Qiang Xu

    Abstract: In recent years, Text-to-Image (T2I) models have seen remarkable advancements, gaining widespread adoption. However, this progress has inadvertently opened avenues for potential misuse, particularly in generating inappropriate or Not-Safe-For-Work (NSFW) content. Our work introduces MMA-Diffusion, a framework that presents a significant and realistic threat to the security of T2I models by effecti… ▽ More

    Submitted 30 March, 2024; v1 submitted 29 November, 2023; originally announced November 2023.

    Comments: CVPR 2024. Our codes and benchmarks are available at https://github.com/cure-lab/MMA-Diffusion

  19. arXiv:2311.16646  [pdf, other

    cs.LG cs.CR

    Rethinking Backdoor Attacks on Dataset Distillation: A Kernel Method Perspective

    Authors: Ming-Yu Chung, Sheng-Yen Chou, Chia-Mu Yu, Pin-Yu Chen, Sy-Yen Kuo, Tsung-Yi Ho

    Abstract: Dataset distillation offers a potential means to enhance data efficiency in deep learning. Recent studies have shown its ability to counteract backdoor risks present in original training samples. In this study, we delve into the theoretical aspects of backdoor attacks and dataset distillation based on kernel methods. We introduce two new theory-driven trigger pattern generation methods specialized… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

    Comments: 19 pages, 4 figures

  20. arXiv:2311.11046  [pdf

    q-bio.QM cs.LG q-bio.NC

    DenseNet and Support Vector Machine classifications of major depressive disorder using vertex-wise cortical features

    Authors: Vladimir Belov, Tracy Erwin-Grabner, Ling-Li Zeng, Christopher R. K. Ching, Andre Aleman, Alyssa R. Amod, Zeynep Basgoze, Francesco Benedetti, Bianca Besteher, Katharina Brosch, Robin Bülow, Romain Colle, Colm G. Connolly, Emmanuelle Corruble, Baptiste Couvy-Duchesne, Kathryn Cullen, Udo Dannlowski, Christopher G. Davey, Annemiek Dols, Jan Ernsting, Jennifer W. Evans, Lukas Fisch, Paola Fuentes-Claramonte, Ali Saffet Gonul, Ian H. Gotlib , et al. (63 additional authors not shown)

    Abstract: Major depressive disorder (MDD) is a complex psychiatric disorder that affects the lives of hundreds of millions of individuals around the globe. Even today, researchers debate if morphological alterations in the brain are linked to MDD, likely due to the heterogeneity of this disorder. The application of deep learning tools to neuroimaging data, capable of capturing complex non-linear patterns, h… ▽ More

    Submitted 18 November, 2023; originally announced November 2023.

  21. arXiv:2311.06851  [pdf, other

    cs.CL

    Automatic Textual Normalization for Hate Speech Detection

    Authors: Anh Thi-Hoang Nguyen, Dung Ha Nguyen, Nguyet Thi Nguyen, Khanh Thanh-Duy Ho, Kiet Van Nguyen

    Abstract: Social media data is a valuable resource for research, yet it contains a wide range of non-standard words (NSW). These irregularities hinder the effective operation of NLP tools. Current state-of-the-art methods for the Vietnamese language address this issue as a problem of lexical normalization, involving the creation of manual rules or the implementation of multi-staged deep learning frameworks,… ▽ More

    Submitted 4 December, 2023; v1 submitted 12 November, 2023; originally announced November 2023.

    Comments: Accepted to present at 2023 International Conference on Intelligent Systems Design and Applications (ISDA2023)

  22. arXiv:2310.12294  [pdf, other

    cs.LG

    Open-Set Multivariate Time-Series Anomaly Detection

    Authors: Thomas Lai, Thi Kieu Khanh Ho, Narges Armanfard

    Abstract: Numerous methods for time series anomaly detection (TSAD) methods have emerged in recent years. Most existing methods are unsupervised and assume the availability of normal training samples only, while few supervised methods have shown superior performance by incorporating labeled anomalous samples in the training phase. However, certain anomaly types are inherently challenging for unsupervised me… ▽ More

    Submitted 13 February, 2024; v1 submitted 18 October, 2023; originally announced October 2023.

    Comments: 12 pages, 7 tables, 2 figures

  23. arXiv:2310.08523  [pdf, other

    cs.CL

    LLM-augmented Preference Learning from Natural Language

    Authors: Inwon Kang, Sikai Ruan, Tyler Ho, Jui-Chien Lin, Farhad Mohsin, Oshani Seneviratne, Lirong Xia

    Abstract: Finding preferences expressed in natural language is an important but challenging task. State-of-the-art(SotA) methods leverage transformer-based models such as BERT, RoBERTa, etc. and graph neural architectures such as graph attention networks. Since Large Language Models (LLMs) are equipped to deal with larger context lengths and have much larger model sizes than the transformer-based model, we… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  24. arXiv:2310.08381  [pdf, other

    cs.CV cs.LG

    AutoVP: An Automated Visual Prompting Framework and Benchmark

    Authors: Hsi-Ai Tsao, Lei Hsiung, Pin-Yu Chen, Sijia Liu, Tsung-Yi Ho

    Abstract: Visual prompting (VP) is an emerging parameter-efficient fine-tuning approach to adapting pre-trained vision models to solve various downstream image-classification tasks. However, there has hitherto been little systematic study of the design space of VP and no clear benchmark for evaluating its performance. To bridge this gap, we propose AutoVP, an end-to-end expandable framework for automating V… ▽ More

    Submitted 10 March, 2024; v1 submitted 12 October, 2023; originally announced October 2023.

    Comments: ICLR 2024

  25. arXiv:2310.05892  [pdf, ps, other

    stat.ML cs.LG

    A Generalization Bound of Deep Neural Networks for Dependent Data

    Authors: Quan Huu Do, Binh T. Nguyen, Lam Si Tung Ho

    Abstract: Existing generalization bounds for deep neural networks require data to be independent and identically distributed (iid). This assumption may not hold in real-life applications such as evolutionary biology, infectious disease epidemiology, and stock price prediction. This work establishes a generalization bound of feed-forward neural networks for non-stationary $φ$-mixing data.

    Submitted 9 October, 2023; originally announced October 2023.

  26. arXiv:2308.12563  [pdf, other

    cs.LG eess.SP

    Multivariate Time-Series Anomaly Detection with Contaminated Data

    Authors: Thi Kieu Khanh Ho, Narges Armanfard

    Abstract: Mainstream unsupervised anomaly detection algorithms often excel in academic datasets, yet their real-world performance is restricted due to the controlled experimental conditions involving clean training data. Addressing the challenge of training with noise, a prevalent issue in practical anomaly detection, is frequently overlooked. In a pioneering endeavor, this study delves into the realm of la… ▽ More

    Submitted 16 February, 2024; v1 submitted 24 August, 2023; originally announced August 2023.

    Comments: 9 pages, 4 tables, 4 figures

  27. arXiv:2308.01672  [pdf, other

    cs.AR cs.ET

    Floorplet: Performance-aware Floorplan Framework for Chiplet Integration

    Authors: Shixin Chen, Shanyi Li, Zhen Zhuang, Su Zheng, Zheng Liang, Tsung-Yi Ho, Bei Yu, Alberto L. Sangiovanni-Vincentelli

    Abstract: A chiplet is an integrated circuit that encompasses a well-defined subset of an overall system's functionality. In contrast to traditional monolithic system-on-chips (SoCs), chiplet-based architecture can reduce costs and increase reusability, representing a promising avenue for continuing Moore's Law. Despite the advantages of multi-chiplet architectures, floorplan design in a chiplet-based archi… ▽ More

    Submitted 11 December, 2023; v1 submitted 3 August, 2023; originally announced August 2023.

    Comments: accepted by TCAD, 12 pages, 10 figures

  28. arXiv:2307.03838  [pdf, other

    cs.CL cs.AI cs.LG

    RADAR: Robust AI-Text Detection via Adversarial Learning

    Authors: Xiaomeng Hu, Pin-Yu Chen, Tsung-Yi Ho

    Abstract: Recent advances in large language models (LLMs) and the intensifying popularity of ChatGPT-like applications have blurred the boundary of high-quality text generation between humans and machines. However, in addition to the anticipated revolutionary changes to our technology and society, the difficulty of distinguishing LLM-generated texts (AI-text) from human-generated texts poses new challenges… ▽ More

    Submitted 24 October, 2023; v1 submitted 7 July, 2023; originally announced July 2023.

    Comments: Accepted by NeurIPS 2023. Project page and demos: https://radar.vizhub.ai

  29. arXiv:2306.16869  [pdf, other

    cs.LG cs.AR cs.CV

    NeuralFuse: Learning to Recover the Accuracy of Access-Limited Neural Network Inference in Low-Voltage Regimes

    Authors: Hao-Lun Sun, Lei Hsiung, Nandhini Chandramoorthy, Pin-Yu Chen, Tsung-Yi Ho

    Abstract: Deep neural networks (DNNs) have become ubiquitous in machine learning, but their energy consumption remains a notable issue. Lowering the supply voltage is an effective strategy for reducing energy consumption. However, aggressively scaling down the supply voltage can lead to accuracy degradation due to random bit flips in static random access memory (SRAM) where model parameters are stored. To a… ▽ More

    Submitted 21 February, 2024; v1 submitted 29 June, 2023; originally announced June 2023.

  30. Toward Fairness Through Fair Multi-Exit Framework for Dermatological Disease Diagnosis

    Authors: Ching-Hao Chiu, Hao-Wei Chung, Yu-Jen Chen, Yiyu Shi, Tsung-Yi Ho

    Abstract: Fairness has become increasingly pivotal in medical image recognition. However, without mitigating bias, deploying unfair medical AI systems could harm the interests of underprivileged populations. In this paper, we observe that while features extracted from the deeper layers of neural networks generally offer higher accuracy, fairness conditions deteriorate as we extract features from deeper laye… ▽ More

    Submitted 1 July, 2023; v1 submitted 26 June, 2023; originally announced June 2023.

    Comments: MICCAI2023

  31. arXiv:2306.14505  [pdf, other

    cs.CV cs.AI

    AME-CAM: Attentive Multiple-Exit CAM for Weakly Supervised Segmentation on MRI Brain Tumor

    Authors: Yu-Jen Chen, Xinrong Hu, Yiyu Shi, Tsung-Yi Ho

    Abstract: Magnetic resonance imaging (MRI) is commonly used for brain tumor segmentation, which is critical for patient evaluation and treatment planning. To reduce the labor and expertise required for labeling, weakly-supervised semantic segmentation (WSSS) methods with class activation map** (CAM) have been proposed. However, existing CAM methods suffer from low resolution due to strided convolution and… ▽ More

    Submitted 1 December, 2023; v1 submitted 26 June, 2023; originally announced June 2023.

    Comments: arXiv admin note: text overlap with arXiv:2306.05476

  32. arXiv:2306.06874  [pdf, other

    cs.CR cs.CV cs.LG

    VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion Models

    Authors: Sheng-Yen Chou, Pin-Yu Chen, Tsung-Yi Ho

    Abstract: Diffusion Models (DMs) are state-of-the-art generative models that learn a reversible corruption process from iterative noise addition and denoising. They are the backbone of many generative AI applications, such as text-to-image conditional generation. However, recent studies have shown that basic unconditional DMs (e.g., DDPM and DDIM) are vulnerable to backdoor injection, a type of output manip… ▽ More

    Submitted 29 December, 2023; v1 submitted 12 June, 2023; originally announced June 2023.

    Comments: Accepted by NeurIPS 2023, NeurIPS 2023 BUGS Workshop Oral

  33. arXiv:2306.05476  [pdf, other

    cs.CV

    A Novel Confidence Induced Class Activation Map** for MRI Brain Tumor Segmentation

    Authors: Yu-Jen Chen, Yiyu Shi, Tsung-Yi Ho

    Abstract: Magnetic resonance imaging (MRI) is a commonly used technique for brain tumor segmentation, which is critical for evaluating patients and planning treatment. To make the labeling process less laborious and dependent on expertise, weakly-supervised semantic segmentation (WSSS) methods using class activation map** (CAM) have been proposed. However, current CAM-based WSSS methods generate the objec… ▽ More

    Submitted 30 October, 2023; v1 submitted 8 June, 2023; originally announced June 2023.

  34. arXiv:2306.03878  [pdf, other

    cs.CV

    Conditional Diffusion Models for Weakly Supervised Medical Image Segmentation

    Authors: Xinrong Hu, Yu-Jen Chen, Tsung-Yi Ho, Yiyu Shi

    Abstract: Recent advances in denoising diffusion probabilistic models have shown great success in image synthesis tasks. While there are already works exploring the potential of this powerful tool in image semantic segmentation, its application in weakly supervised semantic segmentation (WSSS) remains relatively under-explored. Observing that conditional diffusion models (CDM) is capable of generating image… ▽ More

    Submitted 15 September, 2023; v1 submitted 6 June, 2023; originally announced June 2023.

    Comments: MICCAI 2023

  35. arXiv:2305.15377  [pdf, other

    cs.CL

    Uncovering and Quantifying Social Biases in Code Generation

    Authors: Yan Liu, Xiaokang Chen, Yan Gao, Zhe Su, Fengji Zhang, Daoguang Zan, Jian-Guang Lou, Pin-Yu Chen, Tsung-Yi Ho

    Abstract: With the popularity of automatic code generation tools, such as Copilot, the study of the potential hazards of these tools is gaining importance. In this work, we explore the social bias problem in pre-trained code generation models. We propose a new paradigm to construct code prompts and successfully uncover social biases in code generation models. To quantify the severity of social biases in gen… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

  36. arXiv:2304.09875  [pdf, other

    cs.LG cs.AI

    GREAT Score: Global Robustness Evaluation of Adversarial Perturbation using Generative Models

    Authors: Zaitang Li, Pin-Yu Chen, Tsung-Yi Ho

    Abstract: Current studies on adversarial robustness mainly focus on aggregating local robustness results from a set of data samples to evaluate and rank different models. However, the local statistics may not well represent the true global robustness of the underlying unknown data distribution. To address this challenge, this paper makes the first attempt to present a new framework, called GREAT Score , for… ▽ More

    Submitted 2 May, 2023; v1 submitted 19 April, 2023; originally announced April 2023.

  37. arXiv:2302.07669  [pdf, other

    cs.CV cs.IR

    Unsupervised Hashing with Similarity Distribution Calibration

    Authors: Kam Woh Ng, Xiatian Zhu, Jiun Tian Hoe, Chee Seng Chan, Tianyu Zhang, Yi-Zhe Song, Tao Xiang

    Abstract: Unsupervised hashing methods typically aim to preserve the similarity between data points in a feature space by map** them to binary hash codes. However, these methods often overlook the fact that the similarity between data points in the continuous feature space may not be preserved in the discrete hash code space, due to the limited similarity range of hash codes. The similarity range is bound… ▽ More

    Submitted 31 August, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

    Comments: BMVC 2023

  38. arXiv:2302.00058  [pdf, other

    cs.LG

    Graph Anomaly Detection in Time Series: A Survey

    Authors: Thi Kieu Khanh Ho, Ali Karami, Narges Armanfard

    Abstract: With the recent advances in technology, a wide range of systems continue to collect a large amount of data over time and thus generate time series. Time-Series Anomaly Detection (TSAD) is an important task in various time-series applications such as e-commerce, cybersecurity, vehicle maintenance, and healthcare monitoring. However, this task is very challenging as it requires considering both the… ▽ More

    Submitted 28 April, 2024; v1 submitted 31 January, 2023; originally announced February 2023.

    Comments: 20 pages, 4 figures, 2 tables

  39. arXiv:2301.02989  [pdf, other

    cs.CV cs.AI cs.LG

    Fair Multi-Exit Framework for Facial Attribute Classification

    Authors: Ching-Hao Chiu, Hao-Wei Chung, Yu-Jen Chen, Yiyu Shi, Tsung-Yi Ho

    Abstract: Fairness has become increasingly pivotal in facial recognition. Without bias mitigation, deploying unfair AI would harm the interest of the underprivileged population. In this paper, we observe that though the higher accuracy that features from the deeper layer of a neural networks generally offer, fairness conditions deteriorate as we extract features from deeper layers. This phenomenon motivates… ▽ More

    Submitted 8 January, 2023; originally announced January 2023.

  40. arXiv:2212.05400  [pdf, other

    cs.CV cs.CR cs.LG

    How to Backdoor Diffusion Models?

    Authors: Sheng-Yen Chou, Pin-Yu Chen, Tsung-Yi Ho

    Abstract: Diffusion models are state-of-the-art deep learning empowered generative models that are trained based on the principle of learning forward and reverse diffusion processes via progressive noise-addition and denoising. To gain a better understanding of the limitations and potential risks, this paper presents the first study on the robustness of diffusion models against backdoor attacks. Specificall… ▽ More

    Submitted 8 June, 2023; v1 submitted 10 December, 2022; originally announced December 2022.

    Comments: Accepted by CVPR 2023

  41. arXiv:2211.16274  [pdf, other

    cs.LG cs.AI cs.HC

    NCTV: Neural Clam** Toolkit and Visualization for Neural Network Calibration

    Authors: Lei Hsiung, Yung-Chen Tang, Pin-Yu Chen, Tsung-Yi Ho

    Abstract: With the advancement of deep learning technology, neural networks have demonstrated their excellent ability to provide accurate predictions in many tasks. However, a lack of consideration for neural network calibration will not gain trust from humans, even for high-accuracy models. In this regard, the gap between the confidence of the model's predictions and the actual correctness likelihood must… ▽ More

    Submitted 29 November, 2022; originally announced November 2022.

    Comments: AAAI 2023 Demo Track; The demonstration is at https://hsiung.cc/NCTV/

  42. arXiv:2211.08277  [pdf, other

    cs.LG physics.soc-ph q-bio.PE

    SPADE4: Sparsity and Delay Embedding based Forecasting of Epidemics

    Authors: Esha Saha, Lam Si Tung Ho, Giang Tran

    Abstract: Predicting the evolution of diseases is challenging, especially when the data availability is scarce and incomplete. The most popular tools for modelling and predicting infectious disease epidemics are compartmental models. They stratify the population into compartments according to health status and model the dynamics of these compartments using dynamical systems. However, these predefined system… ▽ More

    Submitted 13 June, 2023; v1 submitted 11 November, 2022; originally announced November 2022.

    Comments: 24 pages, 13 figures, 2 tables

    Journal ref: Bull.Math.Bio.85.8 (2023) 71

  43. arXiv:2211.07997  [pdf, other

    cs.CR cs.AR cs.LG

    Security Closure of IC Layouts Against Hardware Trojans

    Authors: Fangzhou Wang, Qi**g Wang, Bangqi Fu, Shui Jiang, Xiaopeng Zhang, Lilas Alrahis, Ozgur Sinanoglu, Johann Knechtel, Tsung-Yi Ho, Evangeline F. Y. Young

    Abstract: Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise to many threats, like piracy of IC intellectual property or insertion of hardware Trojans, i.e., malicious circuit modifications. In this work, we proactively and systematically harden the physical layouts of ICs against post-desi… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Comments: To appear in ISPD'23

  44. arXiv:2209.11604  [pdf, other

    cs.LG

    Neural Clam**: Joint Input Perturbation and Temperature Scaling for Neural Network Calibration

    Authors: Yung-Chen Tang, Pin-Yu Chen, Tsung-Yi Ho

    Abstract: Neural network calibration is an essential task in deep learning to ensure consistency between the confidence of model prediction and the true correctness likelihood. In this paper, we propose a new post-processing calibration method called Neural Clam**, which employs a simple joint input-output transformation on a pre-trained classifier via a learnable universal input perturbation and an outpu… ▽ More

    Submitted 23 September, 2022; originally announced September 2022.

  45. arXiv:2209.05709  [pdf, ps, other

    cs.LG cs.AI

    Generalization Bounds for Deep Transfer Learning Using Majority Predictor Accuracy

    Authors: Cuong N. Nguyen, Lam Si Tung Ho, Vu Dinh, Tal Hassner, Cuong V. Nguyen

    Abstract: We analyze new generalization bounds for deep learning models trained by transfer learning from a source to a target task. Our bounds utilize a quantity called the majority predictor accuracy, which can be computed efficiently from data. We show that our theory is useful in practice since it implies that the majority predictor accuracy can be used as a transferability measure, a fact that is also… ▽ More

    Submitted 12 September, 2022; originally announced September 2022.

    Comments: 5 pages, Paper published at the International Symposium on Information Theory and Its Applications (ISITA 2022)

  46. arXiv:2209.01604  [pdf, other

    cs.CV cs.LG

    Representative Image Feature Extraction via Contrastive Learning Pretraining for Chest X-ray Report Generation

    Authors: Yu-Jen Chen, Wei-Hsiang Shen, Hao-Wei Chung, Ching-Hao Chiu, Da-Cheng Juan, Tsung-Ying Ho, Chi-Tung Cheng, Meng-Lin Li, Tsung-Yi Ho

    Abstract: Medical report generation is a challenging task since it is time-consuming and requires expertise from experienced radiologists. The goal of medical report generation is to accurately capture and describe the image findings. Previous works pretrain their visual encoding neural networks with large datasets in different domains, which cannot learn general visual representation in the specific medica… ▽ More

    Submitted 7 January, 2023; v1 submitted 4 September, 2022; originally announced September 2022.

  47. arXiv:2209.00525  [pdf

    cs.LG cs.AI

    Complexity of Representations in Deep Learning

    Authors: Tin Kam Ho

    Abstract: Deep neural networks use multiple layers of functions to map an object represented by an input vector progressively to different representations, and with sufficient training, eventually to a single score for each class that is the output of the final decision function. Ideally, in this output space, the objects of different classes achieve maximum separation. Motivated by the need to better under… ▽ More

    Submitted 1 September, 2022; originally announced September 2022.

    Journal ref: Proceedings of the 26th International Conference on Pattern Recognition (ICPR 2022), August 21-25, 2022, Montréal, Québec, Canada

  48. arXiv:2209.00005  [pdf, other

    cs.LG cs.CR

    Be Your Own Neighborhood: Detecting Adversarial Example by the Neighborhood Relations Built on Self-Supervised Learning

    Authors: Zhiyuan He, Yijun Yang, Pin-Yu Chen, Qiang Xu, Tsung-Yi Ho

    Abstract: Deep Neural Networks (DNNs) have achieved excellent performance in various fields. However, DNNs' vulnerability to Adversarial Examples (AE) hinders their deployments to safety-critical applications. This paper presents a novel AE detection framework, named BEYOND, for trustworthy predictions. BEYOND performs the detection by distinguishing the AE's abnormal relation with its augmented versions, i… ▽ More

    Submitted 31 August, 2022; originally announced September 2022.

    Comments: co-first author

  49. arXiv:2208.07448  [pdf, other

    cs.LG eess.SP

    Self-Supervised Learning for Anomalous Channel Detection in EEG Graphs: Application to Seizure Analysis

    Authors: Thi Kieu Khanh Ho, Narges Armanfard

    Abstract: Electroencephalogram (EEG) signals are effective tools towards seizure analysis where one of the most important challenges is accurate detection of seizure events and brain regions in which seizure happens or initiates. However, all existing machine learning-based algorithms for seizure analysis require access to the labeled seizure data while acquiring labeled data is very labor intensive, expens… ▽ More

    Submitted 15 January, 2023; v1 submitted 15 August, 2022; originally announced August 2022.

    Comments: Accepted at AAAI-23 (Oral)

  50. arXiv:2207.07797  [pdf, other

    cs.CV cs.AI cs.HC

    CARBEN: Composite Adversarial Robustness Benchmark

    Authors: Lei Hsiung, Yun-Yun Tsai, Pin-Yu Chen, Tsung-Yi Ho

    Abstract: Prior literature on adversarial attack methods has mainly focused on attacking with and defending against a single threat model, e.g., perturbations bounded in Lp ball. However, multiple threat models can be combined into composite perturbations. One such approach, composite adversarial attack (CAA), not only expands the perturbable space of the image, but also may be overlooked by current modes o… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

    Comments: IJCAI 2022 Demo Track; The demonstration is at https://hsiung.cc/CARBEN/