Skip to main content

Showing 1–38 of 38 results for author: Wen, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.07954  [pdf, other

    cs.CR cs.AI

    Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition

    Authors: Edoardo Debenedetti, Javier Rando, Daniel Paleka, Silaghi Fineas Florin, Dragos Albastroiu, Niv Cohen, Yuval Lemberg, Reshmi Ghosh, Rui Wen, Ahmed Salem, Giovanni Cherubin, Santiago Zanella-Beguelin, Robin Schmid, Victor Klemm, Takahiro Miki, Chenhao Li, Stefan Kraft, Mario Fritz, Florian Tramèr, Sahar Abdelnabi, Lea Schönherr

    Abstract: Large language model systems face important security risks from maliciously crafted messages that aim to overwrite the system's original instructions or leak private data. To study this problem, we organized a capture-the-flag competition at IEEE SaTML 2024, where the flag is a secret string in the LLM system prompt. The competition was organized in two phases. In the first phase, teams developed… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  2. arXiv:2405.10253  [pdf, other

    cs.DS

    Adaptive Quotient Filters

    Authors: Richard Wen, Hunter McCoy, David Tench, Guido Tagliavini, Michael A. Bender, Alex Conway, Martin Farach-Colton, Rob Johnson, Prashant Pandey

    Abstract: Adaptive filters, such as telesco** and adaptive cuckoo filters, update their representation upon detecting a false positive to avoid repeating the same error in the future. Adaptive filters require an auxiliary structure, typically much larger than the main filter and often residing on slow storage, to facilitate adaptation. However, existing adaptive filters are not practical and have seen no… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

  3. arXiv:2404.01121  [pdf, other

    cs.CV eess.IV

    CMT: Cross Modulation Transformer with Hybrid Loss for Pansharpening

    Authors: Wen-Jie Shu, Hong-Xia Dou, Rui Wen, Xiao Wu, Liang-Jian Deng

    Abstract: Pansharpening aims to enhance remote sensing image (RSI) quality by merging high-resolution panchromatic (PAN) with multispectral (MS) images. However, prior techniques struggled to optimally fuse PAN and MS images for enhanced spatial and spectral information, due to a lack of a systematic framework capable of effectively coordinating their individual strengths. In response, we present the Cross… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  4. arXiv:2404.00108  [pdf, other

    cs.CR

    Efficient Data-Free Model Stealing with Label Diversity

    Authors: Yiyong Liu, Rui Wen, Michael Backes, Yang Zhang

    Abstract: Machine learning as a Service (MLaaS) allows users to query the machine learning model in an API manner, which provides an opportunity for users to enjoy the benefits brought by the high-performance model trained on valuable data. This interface boosts the proliferation of machine learning based applications, while on the other hand, it introduces the attack surface for model stealing attacks. Exi… ▽ More

    Submitted 29 March, 2024; originally announced April 2024.

  5. arXiv:2402.09179  [pdf, other

    cs.CR cs.LG

    Instruction Backdoor Attacks Against Customized LLMs

    Authors: Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang

    Abstract: The increasing demand for customized Large Language Models (LLMs) has led to the development of solutions like GPTs. These solutions facilitate tailored LLM creation via natural language prompts without coding. However, the trustworthiness of third-party custom versions of LLMs remains an essential concern. In this paper, we propose the first instruction backdoor attacks against applications integ… ▽ More

    Submitted 28 May, 2024; v1 submitted 14 February, 2024; originally announced February 2024.

  6. arXiv:2312.13910  [pdf, other

    cs.RO cs.LG cs.MA

    Multi-Agent Probabilistic Ensembles with Trajectory Sampling for Connected Autonomous Vehicles

    Authors: Ruoqi Wen, Jiahao Huang, Rongpeng Li, Guoru Ding, Zhifeng Zhao

    Abstract: Autonomous Vehicles (AVs) have attracted significant attention in recent years and Reinforcement Learning (RL) has shown remarkable performance in improving the autonomy of vehicles. In that regard, the widely adopted Model-Free RL (MFRL) promises to solve decision-making tasks in connected AVs (CAVs), contingent on the readiness of a significant amount of data samples for training. Nevertheless,… ▽ More

    Submitted 3 July, 2024; v1 submitted 21 December, 2023; originally announced December 2023.

  7. arXiv:2310.20271  [pdf, other

    cs.CV

    From Denoising Training to Test-Time Adaptation: Enhancing Domain Generalization for Medical Image Segmentation

    Authors: Ruxue Wen, Hangjie Yuan, Dong Ni, Wenbo Xiao, Yaoyao Wu

    Abstract: In medical image segmentation, domain generalization poses a significant challenge due to domain shifts caused by variations in data acquisition devices and other factors. These shifts are particularly pronounced in the most common scenario, which involves only single-source domain data due to privacy concerns. To address this, we draw inspiration from the self-supervised learning paradigm that ef… ▽ More

    Submitted 2 November, 2023; v1 submitted 31 October, 2023; originally announced October 2023.

    Comments: Accepted to WACV 2024

  8. arXiv:2310.19410  [pdf, other

    cs.CR cs.CV cs.LG

    Generated Distributions Are All You Need for Membership Inference Attacks Against Generative Models

    Authors: Minxing Zhang, Ning Yu, Rui Wen, Michael Backes, Yang Zhang

    Abstract: Generative models have demonstrated revolutionary success in various visual creation tasks, but in the meantime, they have been exposed to the threat of leaking private information of their training data. Several membership inference attacks (MIAs) have been proposed to exhibit the privacy vulnerability of generative models by classifying a query image as a training dataset member or nonmember. Ho… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

  9. arXiv:2310.11970  [pdf, other

    cs.CR

    Quantifying Privacy Risks of Prompts in Visual Prompt Learning

    Authors: Yixin Wu, Rui Wen, Michael Backes, Pascal Berrang, Mathias Humbert, Yun Shen, Yang Zhang

    Abstract: Large-scale pre-trained models are increasingly adapted to downstream tasks through a new paradigm called prompt learning. In contrast to fine-tuning, prompt learning does not update the pre-trained model's parameters. Instead, it only learns an input perturbation, namely prompt, to be added to the downstream task data for predictions. Given the fast development of prompt learning, a well-generali… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

    Comments: To appear in the 33rd USENIX Security Symposium, August 14-16, 2024

  10. arXiv:2310.11397  [pdf, other

    cs.CR cs.LG

    Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning

    Authors: Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang, Ahmed Salem

    Abstract: Large Language Models (LLMs) are powerful tools for natural language processing, enabling novel applications and user experiences. However, to achieve optimal performance, LLMs often require adaptation with private data, which poses privacy and security challenges. Several techniques have been proposed to adapt LLMs with private data, such as Low-Rank Adaptation (LoRA), Soft Prompt Tuning (SPT), a… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

  11. arXiv:2309.04716  [pdf, other

    cs.LG cs.AI cs.CL

    Toward Reproducing Network Research Results Using Large Language Models

    Authors: Qiao Xiang, Yuling Lin, Mingjun Fang, Bang Huang, Siyong Huang, Ridi Wen, Franck Le, Linghe Kong, Jiwu Shu

    Abstract: Reproducing research results in the networking community is important for both academia and industry. The current best practice typically resorts to three approaches: (1) looking for publicly available prototypes; (2) contacting the authors to get a private prototype; and (3) manually implementing a prototype following the description of the publication. However, most published network research do… ▽ More

    Submitted 9 September, 2023; originally announced September 2023.

  12. arXiv:2309.02046  [pdf, other

    cs.IT math.OC

    A Fast and Provable Algorithm for Sparse Phase Retrieval

    Authors: Jian-Feng Cai, Yu Long, Ruixue Wen, Jiaxi Ying

    Abstract: We study the sparse phase retrieval problem, which seeks to recover a sparse signal from a limited set of magnitude-only measurements. In contrast to prevalent sparse phase retrieval algorithms that primarily use first-order methods, we propose an innovative second-order algorithm that employs a Newton-type method with hard thresholding. This algorithm overcomes the linear convergence limitations… ▽ More

    Submitted 19 March, 2024; v1 submitted 5 September, 2023; originally announced September 2023.

  13. arXiv:2308.10187  [pdf, other

    cs.NE cs.CV

    Spiking-Diffusion: Vector Quantized Discrete Diffusion Model with Spiking Neural Networks

    Authors: Mingxuan Liu, Jie Gan, Rui Wen, Tao Li, Yongli Chen, Hong Chen

    Abstract: Spiking neural networks (SNNs) have tremendous potential for energy-efficient neuromorphic chips due to their binary and event-driven architecture. SNNs have been primarily used in classification tasks, but limited exploration on image generation tasks. To fill the gap, we propose a Spiking-Diffusion model, which is based on the vector quantized discrete diffusion model. First, we develop a vector… ▽ More

    Submitted 21 September, 2023; v1 submitted 20 August, 2023; originally announced August 2023.

    Comments: Under Review

  14. Feasibility Retargeting for Multi-contact Teleoperation and Physical Interaction

    Authors: Quentin Rouxel, Ruoshi Wen, Zhibin Li, Carlo Tiseo, Jean-Baptiste Mouret, Serena Ivaldi

    Abstract: This short paper outlines two recent works on multi-contact teleoperation and the development of the SEIKO (Sequential Equilibrium Inverse Kinematic Optimization) framework. SEIKO adapts commands from the operator in real-time and ensures that the reference configuration sent to the underlying controller is feasible. Additionally, an admittance scheme is used to implement physical interaction, whi… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

    Comments: 2nd Workshop Toward Robot Avatars, 2023 IEEE International Conference on Robotics and Automation (ICRA), Jun 2023, London, United Kingdom

  15. arXiv:2307.04619  [pdf, other

    cs.RO

    Learning Fine Pinch-Grasp Skills using Tactile Sensing from A Few Real-world Demonstrations

    Authors: Xiaofeng Mao, Yucheng Xu, Ruoshi Wen, Mohammadreza Kasaei, Wanming Yu, Efi Psomopoulou, Nathan F. Lepora, Zhibin Li

    Abstract: Imitation learning for robot dexterous manipulation, especially with a real robot setup, typically requires a large number of demonstrations. In this paper, we present a data-efficient learning from demonstration framework which exploits the use of rich tactile sensing data and achieves fine bimanual pinch gras**. Specifically, we employ a convolutional autoencoder network that can effectively e… ▽ More

    Submitted 17 March, 2024; v1 submitted 10 July, 2023; originally announced July 2023.

  16. arXiv:2211.05975  [pdf, other

    cs.NI cs.DC

    From RDMA to RDCA: Toward High-Speed Last Mile of Data Center Networks Using Remote Direct Cache Access

    Authors: Qiang Li, Qiao Xiang, Derui Liu, Yuxin Wang, Haonan Qiu, Xiaoliang Wang, Jie Zhang, Ridi Wen, Haohao Song, Gexiao Tian, Chenyang Huang, Lulu Chen, Shaozong Liu, Yaohui Wu, Zhiwu Wu, Zicheng Luo, Yuchao Shao, Chao Han, Zhongjie Wu, Jianbo Dong, Zheng Cao, **bo Wu, Jiwu Shu, Jiesheng Wu

    Abstract: In this paper, we conduct systematic measurement studies to show that the high memory bandwidth consumption of modern distributed applications can lead to a significant drop of network throughput and a large increase of tail latency in high-speed RDMA networks.We identify its root cause as the high contention of memory bandwidth between application processes and network processes. This contention… ▽ More

    Submitted 25 March, 2023; v1 submitted 10 November, 2022; originally announced November 2022.

  17. arXiv:2210.08158  [pdf, ps, other

    cs.RO cs.HC

    Hidden Complexities in the Computational Modeling of Proportionality for Robotic Norm Violation Response

    Authors: Ruchen Wen, Tom Williams

    Abstract: Language-capable robots hold unique persuasive power over humans, and thus can help regulate people's behavior and preserve a better moral ecosystem, by rejecting unethical commands and calling out norm violations. However, miscalibrated norm violation responses (when the harshness of a response does not match the actual norm violation severity) may not only decrease the effectiveness of human-rob… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

    Comments: 5 pages, the AI-HRI Symposium at AAAI Fall Symposium Series (FSS) 2022

    Report number: AIHRI/2022/0790

    Journal ref: Proceedings of the AI-HRI Symposium at AAAI Fall Symposium Series (FSS) 2022

  18. arXiv:2209.14292   

    cs.AI cs.HC

    Proceedings of the AI-HRI Symposium at AAAI-FSS 2022

    Authors: Zhao Han, Emmanuel Senft, Muneeb I. Ahmad, Shelly Bagchi, Amir Yazdani, Jason R. Wilson, Boyoung Kim, Ruchen Wen, Justin W. Hart, Daniel Hernández García, Matteo Leonetti, Ross Mead, Reuth Mirsky, Ahalya Prabhakar, Megan L. Zimmerman

    Abstract: The Artificial Intelligence (AI) for Human-Robot Interaction (HRI) Symposium has been a successful venue of discussion and collaboration on AI theory and methods aimed at HRI since 2014. This year, after a review of the achievements of the AI-HRI community over the last decade in 2021, we are focusing on a visionary theme: exploring the future of AI-HRI. Accordingly, we added a Blue Sky Ideas trac… ▽ More

    Submitted 28 November, 2022; v1 submitted 28 September, 2022; originally announced September 2022.

  19. arXiv:2209.05278  [pdf, other

    cs.LG

    A Nonparametric Contextual Bandit with Arm-level Eligibility Control for Customer Service Routing

    Authors: Ruofeng Wen, Wenjun Zeng, Yi Liu

    Abstract: Amazon Customer Service provides real-time support for millions of customer contacts every year. While bot-resolver helps automate some traffic, we still see high demand for human agents, also called subject matter experts (SMEs). Customers outreach with questions in different domains (return policy, device troubleshooting, etc.). Depending on their training, not all SMEs are eligible to handle al… ▽ More

    Submitted 8 September, 2022; originally announced September 2022.

    Comments: Accepted at 4th Edition of Knowledge-aware and Conversational Recommender Systems (KaRS) Workshop @ RecSys 2022, September 18--23 2023, Seattle, WA, USA

  20. Multi-Contact Motion Retargeting using Whole-body Optimization of Full Kinematics and Sequential Force Equilibrium

    Authors: Quentin Rouxel, Kai Yuan, Ruoshi Wen, Zhibin Li

    Abstract: This paper presents a multi-contact motion adaptation framework that enables teleoperation of high degree-of-freedom (DoF) robots, such as quadrupeds and humanoids, for loco-manipulation tasks in multi-contact settings. Our proposed algorithms optimize whole-body configurations and formulate the retargeting of multi-contact motions as sequential quadratic programming, which is robust and stable ne… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

    Journal ref: IEEE/ASME Transactions on Mechatronics, 2022

  21. Collaborative Bimanual Manipulation Using Optimal Motion Adaptation and Interaction Control

    Authors: Ruoshi Wen, Quentin Rouxel, Michael Mistry, Zhibin Li, Carlo Tiseo

    Abstract: This work developed collaborative bimanual manipulation for reliable and safe human-robot collaboration, which allows remote and local human operators to work interactively for bimanual tasks. We proposed an optimal motion adaptation to retarget arbitrary commands from multiple human operators into feasible control references. The collaborative manipulation framework has three main modules: (1) co… ▽ More

    Submitted 18 July, 2023; v1 submitted 1 June, 2022; originally announced June 2022.

    Comments: in IEEE Robotics & Automation Magazine, 2023

  22. arXiv:2205.07808  [pdf, other

    eess.SY cs.NI cs.PL

    Switch as a Verifier: Toward Scalable Data Plane Checking via Distributed, On-Device Verification

    Authors: Qiao Xiang, Ridi Wen, Chenyang Huang, Yuxin Wang, Franck Le

    Abstract: Data plane verification (DPV) is important for finding network errors. Current DPV tools employ a centralized architecture, where a server collects the data planes of all devices and verifies them. Despite substantial efforts on accelerating DPV, this centralized architecture is inherently unscalable. In this paper, to tackle the scalability challenge of DPV, we circumvent the scalability bottlene… ▽ More

    Submitted 30 September, 2022; v1 submitted 16 May, 2022; originally announced May 2022.

  23. arXiv:2205.05675  [pdf, other

    cs.CV eess.IV

    NTIRE 2022 Challenge on Efficient Super-Resolution: Methods and Results

    Authors: Yawei Li, Kai Zhang, Radu Timofte, Luc Van Gool, Fangyuan Kong, Mingxi Li, Songwei Liu, Zongcai Du, Ding Liu, Chenhui Zhou, **gyi Chen, Qingrui Han, Zheyuan Li, Yingqi Liu, Xiangyu Chen, Haoming Cai, Yu Qiao, Chao Dong, Long Sun, **shan Pan, Yi Zhu, Zhikai Zong, Xiaoxiao Liu, Zheng Hui, Tao Yang , et al. (86 additional authors not shown)

    Abstract: This paper reviews the NTIRE 2022 challenge on efficient single image super-resolution with focus on the proposed solutions and results. The task of the challenge was to super-resolve an input image with a magnification factor of $\times$4 based on pairs of low and corresponding high resolution images. The aim was to design a network for single image super-resolution that achieved improvement of e… ▽ More

    Submitted 11 May, 2022; originally announced May 2022.

    Comments: Validation code of the baseline model is available at https://github.com/ofsoundof/IMDN. Validation of all submitted models is available at https://github.com/ofsoundof/NTIRE2022_ESR

  24. arXiv:2111.12618  [pdf, other

    cs.IR

    Group based Personalized Search by Integrating Search Behaviour and Friend Network

    Authors: Yujia Zhou, Zhicheng Dou, Bingzheng Wei, Ruobing Xievand Ji-Rong Wen

    Abstract: The key to personalized search is to build the user profile based on historical behaviour. To deal with the users who lack historical data, group based personalized models were proposed to incorporate the profiles of similar users when re-ranking the results. However, similar users are mostly found based on simple lexical or topical similarity in search behaviours. In this paper, we propose a neur… ▽ More

    Submitted 24 November, 2021; originally announced November 2021.

    Comments: 10 pages

  25. arXiv:2110.03026  [pdf, other

    cs.RO cs.CY

    Human Capabilities as Guiding Lights for the Field of AI-HRI: Insights from Engineering Education

    Authors: Tom Williams, Ruchen Wen

    Abstract: Social Justice oriented Engineering Education frameworks have been developed to help guide engineering students' decisions about which projects will genuinely address human needs to create a better and more equitable society. In this paper, we explore the role such theories might play in the field of AI-HRI, consider the extent to which our community is (or is not) aligned with these recommendatio… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

    Comments: Presented at AI-HRI symposium as part of AAAI-FSS 2021 (arXiv:2109.10836)

    Report number: AIHRI/2021/48

  26. arXiv:2106.09895  [pdf, other

    cs.CL

    PRGC: Potential Relation and Global Correspondence Based Joint Relational Triple Extraction

    Authors: Hengyi Zheng, Rui Wen, Xi Chen, Yifan Yang, Yunyan Zhang, Ziheng Zhang, Ningyu Zhang, Bin Qin, Ming Xu, Yefeng Zheng

    Abstract: Joint extraction of entities and relations from unstructured texts is a crucial task in information extraction. Recent methods achieve considerable performance but still suffer from some inherent limitations, such as redundancy of relation prediction, poor generalization of span-based extraction and inefficiency. In this paper, we decompose this task into three subtasks, Relation Judgement, Entity… ▽ More

    Submitted 17 June, 2021; originally announced June 2021.

    Comments: Accepted by ACL 2021

  27. arXiv:2103.00165  [pdf, other

    cs.AI

    Lifelong Learning based Disease Diagnosis on Clinical Notes

    Authors: Zifeng Wang, Yifan Yang, Rui Wen, Xi Chen, Shao-Lun Huang, Yefeng Zheng

    Abstract: Current deep learning based disease diagnosis systems usually fall short in catastrophic forgetting, i.e., directly fine-tuning the disease diagnosis model on new tasks usually leads to abrupt decay of performance on previous tasks. What is worse, the trained diagnosis system would be fixed once deployed but collecting training data that covers enough diseases is infeasible, which inspires us to d… ▽ More

    Submitted 4 March, 2021; v1 submitted 27 February, 2021; originally announced March 2021.

    Comments: Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD'21)

  28. arXiv:2102.05429  [pdf, other

    cs.CR cs.LG

    Node-Level Membership Inference Attacks Against Graph Neural Networks

    Authors: Xinlei He, Rui Wen, Yixin Wu, Michael Backes, Yun Shen, Yang Zhang

    Abstract: Many real-world data comes in the form of graphs, such as social networks and protein structure. To fully utilize the information contained in graph data, a new family of machine learning (ML) models, namely graph neural networks (GNNs), has been introduced. Previous studies have shown that machine learning models are vulnerable to privacy attacks. However, most of the current efforts concentrate… ▽ More

    Submitted 10 February, 2021; originally announced February 2021.

  29. arXiv:2102.02551  [pdf, other

    cs.CR cs.AI cs.LG stat.ML

    ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models

    Authors: Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang

    Abstract: Inference attacks against Machine Learning (ML) models allow adversaries to learn sensitive information about training data, model parameters, etc. While researchers have studied, in depth, several kinds of attacks, they have done so in isolation. As a result, we lack a comprehensive picture of the risks caused by the attacks, e.g., the different scenarios they can be applied to, the common factor… ▽ More

    Submitted 6 October, 2021; v1 submitted 4 February, 2021; originally announced February 2021.

  30. arXiv:2011.06395  [pdf, other

    cs.CL cs.LG

    Turn-level Dialog Evaluation with Dialog-level Weak Signals for Bot-Human Hybrid Customer Service Systems

    Authors: Ruofeng Wen

    Abstract: We developed a machine learning approach that quantifies multiple aspects of the success or values in Customer Service contacts, at anytime during the interaction. Specifically, the value/reward function regarding to the turn-level behaviors across human agents, chatbots and other hybrid dialog systems is characterized by the incremental information and confidence gain between sentences, based on… ▽ More

    Submitted 25 October, 2020; originally announced November 2020.

  31. arXiv:2009.09841  [pdf, other

    cs.LG cs.AI cs.CL

    Finding Influential Instances for Distantly Supervised Relation Extraction

    Authors: Zifeng Wang, Rui Wen, Xi Chen, Shao-Lun Huang, Ningyu Zhang, Yefeng Zheng

    Abstract: Distant supervision (DS) is a strong way to expand the datasets for enhancing relation extraction (RE) models but often suffers from high label noise. Current works based on attention, reinforcement learning, or GAN are black-box models so they neither provide meaningful interpretation of sample selection in DS nor stability on different domains. On the contrary, this work proposes a novel model-a… ▽ More

    Submitted 25 January, 2022; v1 submitted 16 September, 2020; originally announced September 2020.

  32. arXiv:2009.02625  [pdf, other

    cs.LG cs.AI cs.IR

    Online Disease Self-diagnosis with Inductive Heterogeneous Graph Convolutional Networks

    Authors: Zifeng Wang, Rui Wen, Xi Chen, Shilei Cao, Shao-Lun Huang, Buyue Qian, Yefeng Zheng

    Abstract: We propose a Healthcare Graph Convolutional Network (HealGCN) to offer disease self-diagnosis service for online users based on Electronic Healthcare Records (EHRs). Two main challenges are focused in this paper for online disease diagnosis: (1) serving cold-start users via graph convolutional networks and (2) handling scarce clinical description via a symptom retrieval system. To this end, we fir… ▽ More

    Submitted 12 February, 2021; v1 submitted 5 September, 2020; originally announced September 2020.

  33. arXiv:2009.02623  [pdf, other

    cs.LG cs.IR stat.ME stat.ML

    Information Theoretic Counterfactual Learning from Missing-Not-At-Random Feedback

    Authors: Zifeng Wang, Xi Chen, Rui Wen, Shao-Lun Huang, Ercan E. Kuruoglu, Yefeng Zheng

    Abstract: Counterfactual learning for dealing with missing-not-at-random data (MNAR) is an intriguing topic in the recommendation literature since MNAR data are ubiquitous in modern recommender systems. Missing-at-random (MAR) data, namely randomized controlled trials (RCTs), are usually required by most previous counterfactual learning methods for debiasing learning. However, the execution of RCTs is extra… ▽ More

    Submitted 17 October, 2020; v1 submitted 5 September, 2020; originally announced September 2020.

  34. arXiv:2003.03675  [pdf, other

    cs.CR cs.LG stat.ML

    Dynamic Backdoor Attacks Against Machine Learning Models

    Authors: Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang

    Abstract: Machine learning (ML) has made tremendous progress during the past decade and is being adopted in various critical real-world applications. However, recent research has shown that ML models are vulnerable to multiple security and privacy attacks. In particular, backdoor attacks against ML models have recently raised a lot of awareness. A successful backdoor attack can cause severe consequences, su… ▽ More

    Submitted 3 March, 2022; v1 submitted 7 March, 2020; originally announced March 2020.

  35. arXiv:2002.01791  [pdf, other

    cs.RO

    Force-guided High-precision Gras** Control of Fragile and Deformable Objects using sEMG-based Force Prediction

    Authors: Ruoshi Wen, Kai Yuan, Qiang Wang, Shuai Heng, Zhibin Li

    Abstract: Regulating contact forces with high precision is crucial for gras** and manipulating fragile or deformable objects. We aim to utilize the dexterity of human hands to regulate the contact forces for robotic hands and exploit human sensory-motor synergies in a wearable and non-invasive way. We extracted force information from the electric activities of skeletal muscles during their voluntary contr… ▽ More

    Submitted 11 February, 2021; v1 submitted 5 February, 2020; originally announced February 2020.

    Comments: 8 pages, 11 figures, to be published on IEEE Robotics and Automation Letters. For the attached video, see https://youtu.be/0AotKaWFJDU

  36. arXiv:2001.09328   

    cs.LG stat.ML

    On the Fairness of Randomized Trials for Recommendation with Heterogeneous Demographics and Beyond

    Authors: Zifeng Wang, Xi Chen, Rui Wen, Shao-Lun Huang

    Abstract: Observed events in recommendation are consequence of the decisions made by a policy, thus they are usually selectively labeled, namely the data are Missing Not At Random (MNAR), which often causes large bias to the estimate of true outcomes risk. A general approach to correct MNAR bias is performing small Randomized Controlled Trials (RCTs), where an additional uniform policy is employed to random… ▽ More

    Submitted 3 October, 2021; v1 submitted 25 January, 2020; originally announced January 2020.

    Comments: The latest version of this paper has been published in NeurIPS'20 with the name: Information Theoretic Counterfactual Learning from Missing-Not-At-Random Feedback. Please refer to arXiv:2009.02623

  37. arXiv:1907.10697  [pdf, other

    stat.ML cs.LG

    Deep Generative Quantile-Copula Models for Probabilistic Forecasting

    Authors: Ruofeng Wen, Kari Torkkola

    Abstract: We introduce a new category of multivariate conditional generative models and demonstrate its performance and versatility in probabilistic time series forecasting and simulation. Specifically, the output of quantile regression networks is expanded from a set of fixed quantiles to the whole Quantile Function by a univariate map** from a latent uniform distribution to the target distribution. Then… ▽ More

    Submitted 24 July, 2019; originally announced July 2019.

    Comments: Published at the 36th International Conference on Machine Learning (ICML2019), Time Series Workshop, Long Beach, California, 2019

  38. arXiv:1812.05329   

    cs.CV eess.IV

    Wider Channel Attention Network for Remote Sensing Image Super-resolution

    Authors: Jun Gu, Guangluan Xu, Yue Zhang, Xian Sun, Ran Wen, Lei Wang

    Abstract: Recently, deep convolutional neural networks (CNNs) have obtained promising results in image processing tasks including super-resolution (SR). However, most CNN-based SR methods treat low-resolution (LR) inputs and features equally across channels, rarely notice the loss of information flow caused by the activation function and fail to leverage the representation ability of CNNs. In this letter, w… ▽ More

    Submitted 2 January, 2019; v1 submitted 13 December, 2018; originally announced December 2018.

    Comments: This work is proposed for remote sensing images, but the idea of the whole paper do not foucs on the characteristics of remote sensing images. The content of the article does not match the title. In this case, we want to do some experiments on the natural images to verify the three tricks in our work