Skip to main content

Showing 1–50 of 186 results for author: Ren, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.01598  [pdf

    cs.LG cs.AI

    Long-Term Prediction Accuracy Improvement of Data-Driven Medium-Range Global Weather Forecast

    Authors: Yifan Hu, Fukang Yin, Weimin Zhang, Kaijun Ren, Junqiang Song, Kefeng Deng, Di Zhang

    Abstract: Long-term stability stands as a crucial requirement in data-driven medium-range global weather forecasting. Spectral bias is recognized as the primary contributor to instabilities, as data-driven methods difficult to learn small-scale dynamics. In this paper, we reveal that the universal mechanism for these instabilities is not only related to spectral bias but also to distortions brought by proce… ▽ More

    Submitted 25 June, 2024; originally announced July 2024.

  2. arXiv:2407.00981  [pdf, other

    cs.HC cs.CL

    VisEval: A Benchmark for Data Visualization in the Era of Large Language Models

    Authors: Nan Chen, Yuge Zhang, Jiahang Xu, Kan Ren, Yuqing Yang

    Abstract: Translating natural language to visualization (NL2VIS) has shown great promise for visual data analysis, but it remains a challenging task that requires multiple low-level implementations, such as natural language processing and visualization design. Recent advancements in pre-trained large language models (LLMs) are opening new avenues for generating visualizations from natural language. However,… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  3. arXiv:2406.16601  [pdf, other

    cs.CV

    Do As I Do: Pose Guided Human Motion Copy

    Authors: Sifan Wu, Zhenguang Liu, Beibei Zhang, Roger Zimmermann, Zhongjie Ba, Xiaosong Zhang, Kui Ren

    Abstract: Human motion copy is an intriguing yet challenging task in artificial intelligence and computer vision, which strives to generate a fake video of a target person performing the motion of a source person. The problem is inherently challenging due to the subtle human-body texture details to be generated and the temporal consistency to be considered. Existing approaches typically adopt a conventional… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

  4. arXiv:2406.16333  [pdf, other

    cs.CV cs.AI

    Prompt-Consistency Image Generation (PCIG): A Unified Framework Integrating LLMs, Knowledge Graphs, and Controllable Diffusion Models

    Authors: Yichen Sun, Zhixuan Chu, Zhan Qin, Kui Ren

    Abstract: The rapid advancement of Text-to-Image(T2I) generative models has enabled the synthesis of high-quality images guided by textual descriptions. Despite this significant progress, these models are often susceptible in generating contents that contradict the input text, which poses a challenge to their reliability and practical deployment. To address this problem, we introduce a novel diffusion-based… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

  5. arXiv:2406.15805  [pdf, other

    cs.CV

    Smart Feature is What You Need

    Authors: Zhaoxin Hu, Keyan Ren

    Abstract: Lack of shape guidance and label jitter caused by information deficiency of weak label are the main problems in 3D weakly-supervised object detection. Current weakly-supervised models often use heuristics or assumptions methods to infer information from weak labels without taking advantage of the inherent clues of weakly-supervised and fully-supervised methods, thus it is difficult to explore a me… ▽ More

    Submitted 22 June, 2024; originally announced June 2024.

    Comments: IJCNN2024 accepted

  6. arXiv:2406.15731  [pdf, other

    cs.CR cs.AI

    Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning

    Authors: Zhibo Wang, Zhiwei Chang, Jiahui Hu, Xiaoyi Pang, Jiacheng Du, Yongle Chen, Kui Ren

    Abstract: Federated Learning (FL) exhibits privacy vulnerabilities under gradient inversion attacks (GIAs), which can extract private information from individual gradients. To enhance privacy, FL incorporates Secure Aggregation (SA) to prevent the server from obtaining individual gradients, thus effectively resisting GIAs. In this paper, we propose a stealthy label inference attack to bypass SA and recover… ▽ More

    Submitted 22 June, 2024; originally announced June 2024.

    Comments: 10 pages, conference to IEEE INFOCOM 2024

  7. arXiv:2406.14841  [pdf, other

    cs.CR cs.DB cs.LG

    TabularMark: Watermarking Tabular Datasets for Machine Learning

    Authors: Yihao Zheng, Haocheng Xia, Junyuan Pang, **fei Liu, Kui Ren, Lingyang Chu, Yang Cao, Li Xiong

    Abstract: Watermarking is broadly utilized to protect ownership of shared data while preserving data utility. However, existing watermarking methods for tabular datasets fall short on the desired properties (detectability, non-intrusiveness, and robustness) and only preserve data utility from the perspective of data statistics, ignoring the performance of downstream ML models trained on the datasets. Can we… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

  8. arXiv:2406.13348  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    Textual Unlearning Gives a False Sense of Unlearning

    Authors: Jiacheng Du, Zhibo Wang, Kui Ren

    Abstract: Language models (LMs) are susceptible to "memorizing" training data, including a large amount of private or copyright-protected content. To safeguard the right to be forgotten (RTBF), machine unlearning has emerged as a promising method for LMs to efficiently "forget" sensitive training content and mitigate knowledge leakage risks. However, despite its good intentions, could the unlearning mechani… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

  9. arXiv:2406.03712  [pdf, other

    cs.CL cs.LG

    A Survey on Medical Large Language Models: Technology, Application, Trustworthiness, and Future Directions

    Authors: Lei Liu, Xiaoyan Yang, Junchi Lei, Xiaoyang Liu, Yue Shen, Zhiqiang Zhang, Peng Wei, **jie Gu, Zhixuan Chu, Zhan Qin, Kui Ren

    Abstract: Large language models (LLMs), such as GPT series models, have received substantial attention due to their impressive capabilities for generating and understanding human-level language. More recently, LLMs have emerged as an innovative and powerful adjunct in the medical field, transforming traditional practices and heralding a new era of enhanced healthcare services. This survey provides a compreh… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

  10. arXiv:2405.16173  [pdf, other

    cs.LG

    Diffusion-based Reinforcement Learning via Q-weighted Variational Policy Optimization

    Authors: Shutong Ding, Ke Hu, Zhenhao Zhang, Kan Ren, Weinan Zhang, **gyi Yu, **gya Wang, Ye Shi

    Abstract: Diffusion models have garnered widespread attention in Reinforcement Learning (RL) for their powerful expressiveness and multimodality. It has been verified that utilizing diffusion policies can significantly improve the performance of RL algorithms in continuous control tasks by overcoming the limitations of unimodal policies, such as Gaussian policies, and providing the agent with enhanced explo… ▽ More

    Submitted 25 May, 2024; originally announced May 2024.

  11. arXiv:2405.15240  [pdf, other

    cs.LG cs.CV

    Towards Real World Debiasing: A Fine-grained Analysis On Spurious Correlation

    Authors: Zhibo Wang, Peng Kuang, Zhixuan Chu, **gyi Wang, Kui Ren

    Abstract: Spurious correlations in training data significantly hinder the generalization capability of machine learning models when faced with distribution shifts in real-world scenarios. To tackle the problem, numerous debias approaches have been proposed and benchmarked on datasets intentionally designed with severe biases. However, it remains to be asked: \textit{1. Do existing benchmarks really capture… ▽ More

    Submitted 30 May, 2024; v1 submitted 24 May, 2024; originally announced May 2024.

    Comments: 9 pages of main paper, 10 pages of appendix

  12. arXiv:2405.14191  [pdf, other

    cs.CR cs.CL

    S-Eval: Automatic and Adaptive Test Generation for Benchmarking Safety Evaluation of Large Language Models

    Authors: Xiaohan Yuan, **feng Li, Dongxia Wang, Yuefeng Chen, Xiaofeng Mao, Longtao Huang, Hui Xue, Wenhai Wang, Kui Ren, **gyi Wang

    Abstract: Large Language Models have gained considerable attention for their revolutionary capabilities. However, there is also growing concern on their safety implications, making a comprehensive safety evaluation for LLMs urgently needed before model deployment. In this work, we propose S-Eval, a new comprehensive, multi-dimensional and open-ended safety evaluation benchmark. At the core of S-Eval is a no… ▽ More

    Submitted 28 May, 2024; v1 submitted 23 May, 2024; originally announced May 2024.

    Comments: 18 pages, 11 figures

  13. arXiv:2405.04825  [pdf, other

    cs.CR cs.AI cs.LG

    Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution

    Authors: Shuo Shao, Yiming Li, Hongwei Yao, Yiling He, Zhan Qin, Kui Ren

    Abstract: Ownership verification is currently the most critical and widely adopted post-hoc method to safeguard model copyright. In general, model owners exploit it to identify whether a given suspicious third-party model is stolen from them by examining whether it has particular properties `inherited' from their released models. Currently, backdoor-based model watermarks are the primary and cutting-edge me… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  14. arXiv:2405.04180  [pdf, other

    cs.LG cs.CV

    Sora Detector: A Unified Hallucination Detection for Large Text-to-Video Models

    Authors: Zhixuan Chu, Lei Zhang, Yichen Sun, Siqiao Xue, Zhibo Wang, Zhan Qin, Kui Ren

    Abstract: The rapid advancement in text-to-video (T2V) generative models has enabled the synthesis of high-fidelity video content guided by textual descriptions. Despite this significant progress, these models are often susceptible to hallucination, generating contents that contradict the input text, which poses a challenge to their reliability and practical deployment. To address this critical issue, we in… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: arXiv admin note: text overlap with arXiv:2306.08302, arXiv:2403.05131 by other authors

  15. arXiv:2405.04160  [pdf, other

    cs.CL

    A Causal Explainable Guardrails for Large Language Models

    Authors: Zhixuan Chu, Yan Wang, Longfei Li, Zhibo Wang, Zhan Qin, Kui Ren

    Abstract: Large Language Models (LLMs) have shown impressive performance in natural language tasks, but their outputs can exhibit undesirable attributes or biases. Existing methods for steering LLMs towards desired attributes often assume unbiased representations and rely solely on steering prompts. However, the representations learned from pre-training can introduce semantic biases that influence the steer… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 23 pages

  16. arXiv:2405.04095  [pdf, other

    cs.CR cs.AI

    Going Proactive and Explanatory Against Malware Concept Drift

    Authors: Yiling He, Junchi Lei, Zhan Qin, Kui Ren

    Abstract: Deep learning-based malware classifiers face significant challenges due to concept drift. The rapid evolution of malware, especially with new families, can depress classification accuracy to near-random levels. Previous research has primarily focused on detecting drift samples, relying on expert-led analysis and labeling for model retraining. However, these methods often lack a comprehensive under… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

  17. arXiv:2405.00818  [pdf, ps, other

    cs.DS

    Approximation Schemes for Orienteering and Deadline TSP in Doubling Metrics

    Authors: Kinter Ren, Mohammad R. Salavatipour

    Abstract: In this paper we look at $k$-stroll, point-to-point orienteering, as well as the deadline TSP problem on graphs with bounded doubling dimension and bounded treewidth and present approximation schemes for them. Given a weighted graph $G=(V,E)$, start node $s\in V$, distances $d:E\rightarrow \mathbb{Q}^+$ and integer $k$. In the $k$-stroll problem the goal is to find a path starting at $s$ of minimu… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  18. arXiv:2404.18771  [pdf, other

    cs.SE

    KBX: Verified Model Synchronization via Formal Bidirectional Transformation

    Authors: Jianhong Zhao, Yongwang Zhao, Peisen Yao, Fanlang Zeng, Bohua Zhan, Kui Ren

    Abstract: Complex safety-critical systems require multiple models for a comprehensive description, resulting in error-prone development and laborious verification. Bidirectional transformation (BX) is an approach to automatically synchronizing these models. However, existing BX frameworks lack formal verification to enforce these models' consistency rigorously. This paper introduces KBX, a formal bidirectio… ▽ More

    Submitted 1 May, 2024; v1 submitted 29 April, 2024; originally announced April 2024.

  19. arXiv:2404.12720  [pdf, other

    cs.CV cs.CL

    PDF-MVQA: A Dataset for Multimodal Information Retrieval in PDF-based Visual Question Answering

    Authors: Yihao Ding, Kaixuan Ren, Jiabin Huang, Siwen Luo, Soyeon Caren Han

    Abstract: Document Question Answering (QA) presents a challenge in understanding visually-rich documents (VRD), particularly those dominated by lengthy textual content like research journal articles. Existing studies primarily focus on real-world documents with sparse text, while challenges persist in comprehending the hierarchical semantic relations among multiple pages to locate multimodal components. To… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    Comments: Accepted by IJCAI 2024

  20. arXiv:2404.06798  [pdf, other

    cs.CV

    MedRG: Medical Report Grounding with Multi-modal Large Language Model

    Authors: Ke Zou, Yang Bai, Zhihao Chen, Yang Zhou, Yidi Chen, Kai Ren, Meng Wang, Xuedong Yuan, Xiao**g Shen, Huazhu Fu

    Abstract: Medical Report Grounding is pivotal in identifying the most relevant regions in medical images based on a given phrase query, a critical aspect in medical image analysis and radiological diagnosis. However, prevailing visual grounding approaches necessitate the manual extraction of key phrases from medical reports, imposing substantial burdens on both system efficiency and physicians. In this pape… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: 12 pages, 4 figures

  21. arXiv:2404.05403  [pdf, other

    cs.CR cs.AI

    SoK: Gradient Leakage in Federated Learning

    Authors: Jiacheng Du, Jiahui Hu, Zhibo Wang, Peng Sun, Neil Zhenqiang Gong, Kui Ren

    Abstract: Federated learning (FL) enables collaborative model training among multiple clients without raw data exposure. However, recent studies have shown that clients' private training data can be reconstructed from the gradients they share in FL, known as gradient inversion attacks (GIAs). While GIAs have demonstrated effectiveness under \emph{ideal settings and auxiliary assumptions}, their actual effic… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

  22. arXiv:2403.20300  [pdf, other

    cs.MA cs.AI cs.RO

    Improving Learnt Local MAPF Policies with Heuristic Search

    Authors: Rishi Veerapaneni, Qian Wang, Kevin Ren, Arthur Jakobsson, Jiaoyang Li, Maxim Likhachev

    Abstract: Multi-agent path finding (MAPF) is the problem of finding collision-free paths for a team of agents to reach their goal locations. State-of-the-art classical MAPF solvers typically employ heuristic search to find solutions for hundreds of agents but are typically centralized and can struggle to scale when run with short timeouts. Machine learning (ML) approaches that learn policies for each agent… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

    Comments: Accepted in ICAPS 2024

  23. arXiv:2403.17898  [pdf, other

    cs.CV

    Octree-GS: Towards Consistent Real-time Rendering with LOD-Structured 3D Gaussians

    Authors: Kerui Ren, Lihan Jiang, Tao Lu, Mulin Yu, Linning Xu, Zhangkai Ni, Bo Dai

    Abstract: The recent 3D Gaussian splatting (3D-GS) has shown remarkable rendering fidelity and efficiency compared to NeRF-based neural scene representations. While demonstrating the potential for real-time rendering, 3D-GS encounters rendering bottlenecks in large scenes with complex details due to an excessive number of Gaussian primitives located within the viewing frustum. This limitation is particularl… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

    Comments: Project page: https://city-super.github.io/octree-gs/

  24. arXiv:2403.15191  [pdf, other

    cs.CR cs.DC

    VORTEX: Real-Time Off-Chain Payments and Cross-Chain Swaps for Cryptocurrencies

    Authors: Di Wu, Jian Liu, Zhengwei Hou, Wu Wen, Kui Ren

    Abstract: In this paper, we present VERTEX, a TEE-based layer-2 solution that tackles two crucial challenges in the realm of cryptocurrencies: off-chain payments and cross-chain swaps. It offers three notable features: - Channel-free off-chain payments: it allows a payer to make direct payments to anyone without requiring any on-chain relationship or intermediary channels. - Real-time yet decentralized cros… ▽ More

    Submitted 5 June, 2024; v1 submitted 22 March, 2024; originally announced March 2024.

  25. arXiv:2403.13274  [pdf, other

    cs.RO

    UNO Push: Unified Nonprehensile Object Pushing via Non-Parametric Estimation and Model Predictive Control

    Authors: Gaotian Wang, Kejia Ren, Kaiyu Hang

    Abstract: Nonprehensile manipulation through precise pushing is an essential skill that has been commonly challenged by perception and physical uncertainties, such as those associated with contacts, object geometries, and physical properties. For this, we propose a unified framework that jointly addresses system modeling, action generation, and control. While most existing approaches either heavily rely on… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

  26. arXiv:2403.13144  [pdf, other

    cs.RO

    Interactive Robot-Environment Self-Calibration via Compliant Exploratory Actions

    Authors: Podshara Chanrungmaneekul, Kejia Ren, Joshua T. Grace, Aaron M. Dollar, Kaiyu Hang

    Abstract: Calibrating robots into their workspaces is crucial for manipulation tasks. Existing calibration techniques often rely on sensors external to the robot (cameras, laser scanners, etc.) or specialized tools. This reliance complicates the calibration process and increases the costs and time requirements. Furthermore, the associated setup and measurement procedures require significant human interventi… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

  27. arXiv:2403.12641  [pdf, other

    cs.LG

    Automated Contrastive Learning Strategy Search for Time Series

    Authors: Baoyu **g, Yansen Wang, Guoxin Sui, **g Hong, **grui He, Yuqing Yang, Dongsheng Li, Kan Ren

    Abstract: In recent years, Contrastive Learning (CL) has become a predominant representation learning paradigm for time series. Most existing methods in the literature focus on manually building specific Contrastive Learning Strategies (CLS) by human heuristics for certain datasets and tasks. However, manually develo** CLS usually require excessive prior knowledge about the datasets and tasks, e.g., profe… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

    Comments: Preprint. Work in progress

  28. arXiv:2403.11960  [pdf, other

    cs.LG stat.ML

    CASPER: Causality-Aware Spatiotemporal Graph Neural Networks for Spatiotemporal Time Series Imputation

    Authors: Baoyu **g, Dawei Zhou, Kan Ren, Carl Yang

    Abstract: Spatiotemporal time series is the foundation of understanding human activities and their impacts, which is usually collected via monitoring sensors placed at different locations. The collected data usually contains missing values due to various failures, which have significant impact on data analysis. To impute the missing values, a lot of methods have been introduced. When recovering a specific d… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

    Comments: Preprint. Work in progress

  29. arXiv:2403.11708  [pdf, other

    cs.CV

    Implicit Discriminative Knowledge Learning for Visible-Infrared Person Re-Identification

    Authors: Kaijie Ren, Lei Zhang

    Abstract: Visible-Infrared Person Re-identification (VI-ReID) is a challenging cross-modal pedestrian retrieval task, due to significant intra-class variations and cross-modal discrepancies among different cameras. Existing works mainly focus on embedding images of different modalities into a unified space to mine modality-shared features. They only seek distinctive information within these shared features,… ▽ More

    Submitted 26 March, 2024; v1 submitted 18 March, 2024; originally announced March 2024.

    Comments: CVPR 2024

  30. arXiv:2403.01786  [pdf, other

    cs.CV cs.IT

    Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection

    Authors: Zhongjie Ba, Qingyu Liu, Zhenguang Liu, Shuang Wu, Feng Lin, Li Lu, Kui Ren

    Abstract: Deepfake technology has given rise to a spectrum of novel and compelling applications. Unfortunately, the widespread proliferation of high-fidelity fake videos has led to pervasive confusion and deception, shattering our faith that seeing is believing. One aspect that has been overlooked so far is that current deepfake detection approaches may easily fall into the trap of overfitting, focusing onl… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: AAAI2024

  31. arXiv:2403.01731  [pdf, other

    cs.CV cs.RO

    RISeg: Robot Interactive Object Segmentation via Body Frame-Invariant Features

    Authors: Howard H. Qian, Yangxiao Lu, Kejia Ren, Gaotian Wang, Ninad Khargonkar, Yu Xiang, Kaiyu Hang

    Abstract: In order to successfully perform manipulation tasks in new environments, such as gras**, robots must be proficient in segmenting unseen objects from the background and/or other objects. Previous works perform unseen object instance segmentation (UOIS) by training deep neural networks on large-scale data to learn RGB/RGB-D feature embeddings, where cluttered environments often result in inaccurat… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: 7 pages, 5 figures, ICRA 2024

  32. arXiv:2402.17168  [pdf, other

    cs.AI cs.CL

    Benchmarking Data Science Agents

    Authors: Yuge Zhang, Qiyang Jiang, Xingyu Han, Nan Chen, Yuqing Yang, Kan Ren

    Abstract: In the era of data-driven decision-making, the complexity of data analysis necessitates advanced expertise and tools of data science, presenting significant challenges even for specialists. Large Language Models (LLMs) have emerged as promising aids as data science agents, assisting humans in data analysis and processing. Yet their practical efficacy remains constrained by the varied demands of re… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

    Comments: Source code and data are available at https://github.com/MetaCopilot/dseval

  33. arXiv:2402.10635  [pdf, other

    cs.LG cs.AI

    ContiFormer: Continuous-Time Transformer for Irregular Time Series Modeling

    Authors: Yuqi Chen, Kan Ren, Yansen Wang, Yuchen Fang, Weiwei Sun, Dongsheng Li

    Abstract: Modeling continuous-time dynamics on irregular time series is critical to account for data evolution and correlations that occur continuously. Traditional methods including recurrent neural networks or Transformer models leverage inductive bias via powerful neural architectures to capture complex patterns. However, due to their discrete characteristic, they have limitations in generalizing to cont… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

    Comments: Neurips 2023 Poster

  34. arXiv:2402.07818  [pdf, other

    cs.LG cs.AI cs.CL

    Differentially Private Zeroth-Order Methods for Scalable Large Language Model Finetuning

    Authors: Z Liu, J Lou, W Bao, Y Hu, B Li, Z Qin, K Ren

    Abstract: Fine-tuning on task-specific datasets is a widely-embraced paradigm of harnessing the powerful capability of pretrained LLMs for various downstream tasks. Due to the popularity of LLMs fine-tuning and its accompanying privacy concerns, differentially private (DP) fine-tuning of pretrained LLMs has been widely used to safeguarding the privacy of task-specific datasets. Lying at the design core of D… ▽ More

    Submitted 9 May, 2024; v1 submitted 12 February, 2024; originally announced February 2024.

  35. arXiv:2402.03705  [pdf, other

    cs.CV cs.CR

    FoolSDEdit: Deceptively Steering Your Edits Towards Targeted Attribute-aware Distribution

    Authors: Qi Zhou, Dongxia Wang, Tianlin Li, Zhihong Xu, Yang Liu, Kui Ren, Wenhai Wang, Qing Guo

    Abstract: Guided image synthesis methods, like SDEdit based on the diffusion model, excel at creating realistic images from user inputs such as stroke paintings. However, existing efforts mainly focus on image quality, often overlooking a key point: the diffusion model represents a data distribution, not individual images. This introduces a low but critical chance of generating images that contradict user i… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  36. Ambush from All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines

    Authors: Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren

    Abstract: The continuous integration and continuous deployment (CI/CD) pipelines are widely adopted on Internet hosting platforms, such as GitHub. With the popularity, the CI/CD pipeline faces various security threats. However, current CI/CD pipelines suffer from malicious code and severe vulnerabilities. Even worse, people have not been fully aware of its attack surfaces and the corresponding impacts. Th… ▽ More

    Submitted 31 January, 2024; originally announced January 2024.

    Journal ref: IEEE Transactions on Dependable and Secure Computing (Volume: 21, Issue: 1, Jan.-Feb. 2024)

  37. arXiv:2401.15704  [pdf, other

    cs.CR cs.SD eess.AS

    Phoneme-Based Proactive Anti-Eavesdrop** with Controlled Recording Privilege

    Authors: Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Yang Wang, Kui Ren

    Abstract: The widespread smart devices raise people's concerns of being eavesdropped on. To enhance voice privacy, recent studies exploit the nonlinearity in microphone to jam audio recorders with inaudible ultrasound. However, existing solutions solely rely on energetic masking. Their simple-form noise leads to several problems, such as high energy requirements and being easily removed by speech enhancemen… ▽ More

    Submitted 28 January, 2024; originally announced January 2024.

    Comments: 14 pages, 28 figures; submitted to IEEE TDSC

  38. arXiv:2401.11206  [pdf, other

    cs.CL

    InferAligner: Inference-Time Alignment for Harmlessness through Cross-Model Guidance

    Authors: Pengyu Wang, Dong Zhang, Linyang Li, Chenkun Tan, Xinghao Wang, Ke Ren, Botian Jiang, Xipeng Qiu

    Abstract: With the rapid development of large language models (LLMs), they are not only used as general-purpose AI assistants but are also customized through further fine-tuning to meet the requirements of different applications. A pivotal factor in the success of current LLMs is the alignment process. Current alignment methods, such as supervised fine-tuning (SFT) and reinforcement learning from human feed… ▽ More

    Submitted 20 January, 2024; originally announced January 2024.

  39. arXiv:2401.10278  [pdf, other

    eess.SP cs.AI cs.LG cs.MM q-bio.NC

    EEGFormer: Towards Transferable and Interpretable Large-Scale EEG Foundation Model

    Authors: Yuqi Chen, Kan Ren, Kaitao Song, Yansen Wang, Yifan Wang, Dongsheng Li, Lili Qiu

    Abstract: Self-supervised learning has emerged as a highly effective approach in the fields of natural language processing and computer vision. It is also applicable to brain signals such as electroencephalography (EEG) data, given the abundance of available unlabeled data that exist in a wide spectrum of real-world medical applications ranging from seizure detection to wave analysis. The existing works lev… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

    Comments: A preprint version of an ongoing work

  40. arXiv:2401.08217  [pdf, other

    cs.IR

    LLM-Guided Multi-View Hypergraph Learning for Human-Centric Explainable Recommendation

    Authors: Zhixuan Chu, Yan Wang, Qing Cui, Longfei Li, Wenqing Chen, Zhan Qin, Kui Ren

    Abstract: As personalized recommendation systems become vital in the age of information overload, traditional methods relying solely on historical user interactions often fail to fully capture the multifaceted nature of human interests. To enable more human-centric modeling of user preferences, this work proposes a novel explainable recommendation framework, i.e., LLMHG, synergizing the reasoning capabiliti… ▽ More

    Submitted 29 March, 2024; v1 submitted 16 January, 2024; originally announced January 2024.

    Comments: 14 pages, 5 figures

  41. arXiv:2401.07261  [pdf, other

    cs.CR

    LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts

    Authors: Shoupeng Ren, Tianyu Tu, Jian Liu, Di Wu, Kui Ren

    Abstract: DeFi incidents stemming from various smart contract vulnerabilities have culminated in financial damages exceeding 3 billion USD. The attacks causing such incidents commonly commence with the deployment of adversarial contracts, subsequently leveraging these contracts to execute adversarial transactions that exploit vulnerabilities in victim contracts. Existing defense mechanisms leverage heuristi… ▽ More

    Submitted 2 February, 2024; v1 submitted 14 January, 2024; originally announced January 2024.

    Comments: 14 pages, 11 figures

  42. arXiv:2312.10336  [pdf, ps, other

    cs.LG

    Certified Minimax Unlearning with Generalization Rates and Deletion Capacity

    Authors: Jiaqi Liu, Jian Lou, Zhan Qin, Kui Ren

    Abstract: We study the problem of $(ε,δ)$-certified machine unlearning for minimax models. Most of the existing works focus on unlearning from standard statistical learning models that have a single variable and their unlearning steps hinge on the direct Hessian-based conventional Newton update. We develop a new $(ε,δ)$-certified machine unlearning algorithm for minimax models. It proposes a minimax unlearn… ▽ More

    Submitted 16 December, 2023; originally announced December 2023.

    Comments: NeurIPS 2023

  43. arXiv:2311.18760  [pdf, other

    cs.CL cs.AI

    TaskBench: Benchmarking Large Language Models for Task Automation

    Authors: Yongliang Shen, Kaitao Song, Xu Tan, Wenqi Zhang, Kan Ren, Siyu Yuan, Weiming Lu, Dongsheng Li, Yueting Zhuang

    Abstract: Recently, the incredible progress of large language models (LLMs) has ignited the spark of task automation, which decomposes the complex tasks described by user instructions into sub-tasks, and invokes external tools to execute them, and plays a central role in autonomous agents. However, there lacks a systematic and standardized benchmark to foster the development of LLMs in task automation. To t… ▽ More

    Submitted 9 December, 2023; v1 submitted 30 November, 2023; originally announced November 2023.

  44. arXiv:2311.16136  [pdf, other

    cs.CR cs.AI

    ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach

    Authors: Yuke Hu, Jian Lou, Jiaqi Liu, Wangze Ni, Feng Lin, Zhan Qin, Kui Ren

    Abstract: Over the past years, Machine Learning-as-a-Service (MLaaS) has received a surging demand for supporting Machine Learning-driven services to offer revolutionized user experience across diverse application areas. MLaaS provides inference service with low inference latency based on an ML model trained using a dataset collected from numerous individual data owners. Recently, for the sake of data owner… ▽ More

    Submitted 18 June, 2024; v1 submitted 3 November, 2023; originally announced November 2023.

    Comments: Accepted by CCS'24

  45. arXiv:2311.16062  [pdf, other

    cs.CR

    Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory

    Authors: Xiaochen Li, Weiran Liu, Jian Lou, Yuan Hong, Lei Zhang, Zhan Qin, Kui Ren

    Abstract: Top-$k$ frequent items detection is a fundamental task in data stream mining. Many promising solutions are proposed to improve memory efficiency while still maintaining high accuracy for detecting the Top-$k$ items. Despite the memory efficiency concern, the users could suffer from privacy loss if participating in the task without proper protection, since their contributed local data streams may c… ▽ More

    Submitted 27 November, 2023; originally announced November 2023.

  46. arXiv:2310.17186  [pdf, other

    cs.SE

    Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem

    Authors: Chenghao Li, Yifei Wu, Wenbo Shen, Zichen Zhao, Rui Chang, Chengwei Liu, Yang Liu, Kui Ren

    Abstract: Rust programming language is gaining popularity rapidly in building reliable and secure systems due to its security guarantees and outstanding performance. To provide extra functionalities, the Rust compiler introduces Rust unstable features (RUF) to extend compiler functionality, syntax, and standard library support. However, these features are unstable and may get removed, introducing compilatio… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

    Comments: Published in ICSE'2024 Conference: https://conf.researchr.org/details/icse-2024/icse-2024-research-track/6/Demystifying-Compiler-Unstable-Feature-Usage-and-Impacts-in-the-Rust-Ecosystem. Project webiste: https://sites.google.com/view/ruf-study/home. Released Source Code Zonodo: https://zenodo.org/records/8289375

  47. arXiv:2310.13424  [pdf, other

    cs.CR cs.AI cs.DC cs.LG

    FLTracer: Accurate Poisoning Attack Provenance in Federated Learning

    Authors: Xinyu Zhang, Qingyu Liu, Zhongjie Ba, Yuan Hong, Tianhang Zheng, Feng Lin, Li Lu, Kui Ren

    Abstract: Federated Learning (FL) is a promising distributed learning approach that enables multiple clients to collaboratively train a shared global model. However, recent studies show that FL is vulnerable to various poisoning attacks, which can degrade the performance of global models or introduce backdoors into them. In this paper, we first conduct a comprehensive study on prior FL attacks and detection… ▽ More

    Submitted 20 October, 2023; originally announced October 2023.

    Comments: 18 pages, 27 figures

  48. arXiv:2310.11237  [pdf, other

    cs.CL

    Watermarking LLMs with Weight Quantization

    Authors: Linyang Li, Botian Jiang, Pengyu Wang, Ke Ren, Hang Yan, Xipeng Qiu

    Abstract: Abuse of large language models reveals high risks as large language models are being deployed at an astonishing speed. It is important to protect the model weights to avoid malicious usage that violates licenses of open-source large language models. This paper proposes a novel watermarking strategy that plants watermarks in the quantization process of large language models without pre-defined trig… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

    Comments: Accepted by Findings of EMNLP2023

  49. arXiv:2310.08903  [pdf, other

    cs.CL

    SeqXGPT: Sentence-Level AI-Generated Text Detection

    Authors: Pengyu Wang, Linyang Li, Ke Ren, Botian Jiang, Dong Zhang, Xipeng Qiu

    Abstract: Widely applied large language models (LLMs) can generate human-like content, raising concerns about the abuse of LLMs. Therefore, it is important to build strong AI-generated text (AIGT) detectors. Current works only consider document-level AIGT detection, therefore, in this paper, we first introduce a sentence-level detection challenge by synthesizing a dataset that contains documents that are po… ▽ More

    Submitted 14 December, 2023; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: Accepted by EMNLP2023

  50. arXiv:2310.08889  [pdf, other

    cs.CL

    PerturbScore: Connecting Discrete and Continuous Perturbations in NLP

    Authors: Linyang Li, Ke Ren, Yunfan Shao, Pengyu Wang, Xipeng Qiu

    Abstract: With the rapid development of neural network applications in NLP, model robustness problem is gaining more attention. Different from computer vision, the discrete nature of texts makes it more challenging to explore robustness in NLP. Therefore, in this paper, we aim to connect discrete perturbations with continuous perturbations, therefore we can use such connections as a bridge to help understan… ▽ More

    Submitted 13 October, 2023; originally announced October 2023.

    Comments: Accepted by Findings of EMNLP2023