Skip to main content

Showing 1–10 of 10 results for author: Zhi, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.01769  [pdf, other

    cs.LG

    Unifying Qualitative and Quantitative Safety Verification of DNN-Controlled Systems

    Authors: Dapeng Zhi, Peixin Wang, Si Liu, Luke Ong, Min Zhang

    Abstract: The rapid advance of deep reinforcement learning techniques enables the oversight of safety-critical systems through the utilization of Deep Neural Networks (DNNs). This underscores the pressing need to promptly establish certified safety guarantees for such DNN-controlled systems. Most of the existing verification approaches rely on qualitative approaches, predominantly employing reachability ana… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: This work is a technical report for the paper with the same name to appear in the 36th International Conference on Computer Aided Verification (CAV 2024)

  2. arXiv:2312.09695  [pdf, other

    cs.AI

    Robustness Verification of Deep Reinforcement Learning Based Control Systems using Reward Martingales

    Authors: Dapeng Zhi, Peixin Wang, Cheng Chen, Min Zhang

    Abstract: Deep Reinforcement Learning (DRL) has gained prominence as an effective approach for control systems. However, its practical deployment is impeded by state perturbations that can severely impact system performance. Addressing this critical challenge requires robustness verification about system performance, which involves tackling two quantitative questions: (i) how to establish guaranteed bounds… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

  3. arXiv:2309.15132  [pdf, other

    q-bio.QM cs.LG

    Genetic InfoMax: Exploring Mutual Information Maximization in High-Dimensional Imaging Genetics Studies

    Authors: Yaochen Xie, Ziqian Xie, Sheikh Muhammad Saiful Islam, Degui Zhi, Shuiwang Ji

    Abstract: Genome-wide association studies (GWAS) are used to identify relationships between genetic variations and specific traits. When applied to high-dimensional medical imaging data, a key step is to extract lower-dimensional, yet informative representations of the data as traits. Representation learning for imaging genetics is largely under-explored due to the unique challenges posed by GWAS in compari… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

    Comments: 17 pages, 7 figures

  4. arXiv:2303.10794  [pdf, other

    cs.LG cs.CL cs.MM q-bio.QM

    PheME: A deep ensemble framework for improving phenotype prediction from multi-modal data

    Authors: Shenghan Zhang, Haoxuan Li, Ruixiang Tang, Sirui Ding, Laila Rasmy, Degui Zhi, Na Zou, Xia Hu

    Abstract: Detailed phenotype information is fundamental to accurate diagnosis and risk estimation of diseases. As a rich source of phenotype information, electronic health records (EHRs) promise to empower diagnostic variant interpretation. However, how to accurately and efficiently extract phenotypes from the heterogeneous EHR data remains a challenge. In this work, we present PheME, an Ensemble framework… ▽ More

    Submitted 26 April, 2023; v1 submitted 19 March, 2023; originally announced March 2023.

  5. arXiv:2211.11127  [pdf, other

    cs.LG cs.AI

    Taming Reachability Analysis of DNN-Controlled Systems via Abstraction-Based Training

    Authors: Jiaxu Tian, Dapeng Zhi, Si Liu, Peixin Wang, Guy Katz, Min Zhang

    Abstract: The intrinsic complexity of deep neural networks (DNNs) makes it challenging to verify not only the networks themselves but also the hosting DNN-controlled systems. Reachability analysis of these systems faces the same challenge. Existing approaches rely on over-approximating DNNs using simpler polynomial models. However, they suffer from low efficiency and large overestimation, and are restricted… ▽ More

    Submitted 31 October, 2023; v1 submitted 20 November, 2022; originally announced November 2022.

  6. arXiv:2110.00998  [pdf

    cs.LG cs.AI cs.CL cs.NE

    Simple Recurrent Neural Networks is all we need for clinical events predictions using EHR data

    Authors: Laila Rasmy, Jie Zhu, Zhiheng Li, Xin Hao, Hong Thoai Tran, Yujia Zhou, Firat Tiryaki, Yang Xiang, Hua Xu, Degui Zhi

    Abstract: Recently, there is great interest to investigate the application of deep learning models for the prediction of clinical events using electronic health records (EHR) data. In EHR data, a patient's history is often represented as a sequence of visits, and each visit contains multiple events. As a result, deep learning models developed for sequence modeling, like recurrent neural networks (RNNs) are… ▽ More

    Submitted 3 October, 2021; originally announced October 2021.

    Comments: This podium abstract was peer-reviewed and accepted in 2018, and presented at Medinfo-2019 in Leon France in August 2019

  7. arXiv:2005.12833  [pdf

    cs.CL cs.LG cs.NE

    Med-BERT: pre-trained contextualized embeddings on large-scale structured electronic health records for disease prediction

    Authors: Laila Rasmy, Yang Xiang, Ziqian Xie, Cui Tao, Degui Zhi

    Abstract: Deep learning (DL) based predictive models from electronic health records (EHR) deliver impressive performance in many clinical tasks. Large training cohorts, however, are often required to achieve high accuracy, hindering the adoption of DL-based models in scenarios with limited training data size. Recently, bidirectional encoder representations from transformers (BERT) and related models have ac… ▽ More

    Submitted 22 May, 2020; originally announced May 2020.

    Comments: L.R., X.Y., and Z.X. share first authorship of this work

  8. A quantum secret sharing scheme with verifiable function

    Authors: Li-Juan Liu, Zhi-Hui Li, Zhao-Wei Han, Dan-Li Zhi

    Abstract: In the $\left( {t,n} \right)$ threshold quantum secret sharing scheme, it is difficult to ensure that internal participants are honest. In this paper, a verifiable $\left( {t,n} \right)$ threshold quantum secret sharing scheme is designed combined with classical secret sharing scheme. First of all, the distributor uses the asymmetric binary polynomials to generate the shares and sends them to each… ▽ More

    Submitted 9 March, 2020; originally announced March 2020.

  9. A Verifiable Quantum Secret Sharing Scheme Based on a Single Qubit

    Authors: Dan-Li Zhi, Zhi-Hui Li, Zhao-Wei Han, Li-Juan Liu

    Abstract: To detect frauds from some internal participants or external attackers, some verifiable threshold quantum secret sharing schemes have been proposed. In this paper, we present a new verifiable threshold structure based on a single qubit using bivariate polynomial. First, Alice chooses an asymmetric bivariate polynomial and sends a pair of values from this polynomial to each participant. Then Alice… ▽ More

    Submitted 9 March, 2020; originally announced March 2020.

  10. arXiv:1906.01415  [pdf

    cs.CV

    Active Object Manipulation Facilitates Visual Object Learning: An Egocentric Vision Study

    Authors: Satoshi Tsutsui, Dian Zhi, Md Alimoor Reza, David Crandall, Chen Yu

    Abstract: Inspired by the remarkable ability of the infant visual learning system, a recent study collected first-person images from children to analyze the `training data' that they receive. We conduct a follow-up study that investigates two additional directions. First, given that infants can quickly learn to recognize a new object without much supervision (i.e. few-shot learning), we limit the number of… ▽ More

    Submitted 4 June, 2019; originally announced June 2019.

    Comments: Accepted at 2019 CVPR Workshop on Egocentric Perception, Interaction and Computing (EPIC)