Skip to main content

Showing 1–46 of 46 results for author: Ruan, W

  1. Ents: An Efficient Three-party Training Framework for Decision Trees by Communication Optimization

    Authors: Guopeng Lin, Weili Han, Wenqiang Ruan, Ruisheng Zhou, Lushan Song, Bingshuai Li, Yunfeng Shao

    Abstract: Multi-party training frameworks for decision trees based on secure multi-party computation enable multiple parties to train high-performance models on distributed private data with privacy preservation. The training process essentially involves frequent dataset splitting according to the splitting criterion (e.g. Gini impurity). However, existing multi-party training frameworks for decision trees… ▽ More

    Submitted 3 July, 2024; v1 submitted 12 June, 2024; originally announced June 2024.

    Comments: This paper is the full version of a paper to appear in ACM CCS 2024

  2. arXiv:2406.07006  [pdf, other

    cs.CV

    MIPI 2024 Challenge on Few-shot RAW Image Denoising: Methods and Results

    Authors: Xin Jin, Chunle Guo, Xiaoming Li, Zongsheng Yue, Chongyi Li, Shangchen Zhou, Ruicheng Feng, Yuekun Dai, Peiqing Yang, Chen Change Loy, Ruoqi Li, Chang Liu, Ziyi Wang, Yao Du, Jingjing Yang, Long Bao, Heng Sun, Xiangyu Kong, Xiaoxia Xing, Jinlong Wu, Yuanyang Xue, Hyunhee Park, Sejun Song, Changho Kim, Jingfan Tan , et al. (17 additional authors not shown)

    Abstract: The increasing demand for computational photography and imaging on mobile platforms has led to the widespread development and integration of advanced image sensors with novel algorithms in camera systems. However, the scarcity of high-quality data for research and the rare opportunity for in-depth exchange of views from industry and academia constrain the development of mobile intelligent photogra… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

    Comments: CVPR 2024 Mobile Intelligent Photography and Imaging (MIPI) Workshop--Few-shot RAWImage Denoising Challenge Report. Website: https://mipi-challenge.org/MIPI2024/

  3. arXiv:2404.07919  [pdf, other

    cs.LG cs.AI

    Low-rank Adaptation for Spatio-Temporal Forecasting

    Authors: Weilin Ruan, Wei Chen, Xilin Dang, Jianxiang Zhou, Weichuang Li, Xu Liu, Yuxuan Liang

    Abstract: Spatio-temporal forecasting is crucial in real-world dynamic systems, predicting future changes using historical data from diverse locations. Existing methods often prioritize the development of intricate neural networks to capture the complex dependencies of the data, yet their accuracy fails to show sustained improvement. Besides, these methods also overlook node heterogeneity, hindering customi… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

  4. arXiv:2403.17520  [pdf, other

    cs.LG cs.CV

    Boosting Adversarial Training via Fisher-Rao Norm-based Regularization

    Authors: Xiangyu Yin, Wenjie Ruan

    Abstract: Adversarial training is extensively utilized to improve the adversarial robustness of deep neural networks. Yet, mitigating the degradation of standard generalization performance in adversarial-trained models remains an open problem. This paper attempts to resolve this issue through the lens of model complexity. First, We leverage the Fisher-Rao norm, a geometrically invariant metric for model com… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

    Comments: This paper has been accepted to CVPR2024

  5. arXiv:2402.17729  [pdf, other

    cs.CV

    Towards Fairness-Aware Adversarial Learning

    Authors: Yanghao Zhang, Tianle Zhang, Ronghui Mu, Xiaowei Huang, Wenjie Ruan

    Abstract: Although adversarial training (AT) has proven effective in enhancing the model's robustness, the recently revealed issue of fairness in robustness has not been well addressed, i.e. the robust accuracy varies significantly among different categories. In this paper, instead of uniformly evaluating the model's average class performance, we delve into the issue of robust fairness, by considering the w… ▽ More

    Submitted 27 March, 2024; v1 submitted 27 February, 2024; originally announced February 2024.

    Comments: This work will appear in the CVPR 2024 conference proceedings

  6. arXiv:2402.15429  [pdf, other

    cs.CV cs.AI cs.LG

    ProTIP: Probabilistic Robustness Verification on Text-to-Image Diffusion Models against Stochastic Perturbation

    Authors: Yi Zhang, Yun Tang, Wenjie Ruan, Xiaowei Huang, Siddartha Khastgir, Paul Jennings, Xingyu Zhao

    Abstract: Text-to-Image (T2I) Diffusion Models (DMs) have shown impressive abilities in generating high-quality images based on simple text descriptions. However, as is common with many Deep Learning (DL) models, DMs are subject to a lack of robustness. While there are attempts to evaluate the robustness of T2I DMs as a binary or worst-case problem, they cannot answer how robust in general the model is when… ▽ More

    Submitted 12 July, 2024; v1 submitted 23 February, 2024; originally announced February 2024.

    Comments: Accepted by ECCV24

  7. arXiv:2402.01822  [pdf, ps, other

    cs.CL cs.AI

    Building Guardrails for Large Language Models

    Authors: Yi Dong, Ronghui Mu, Gaojie Jin, Yi Qi, Jinwei Hu, Xingyu Zhao, Jie Meng, Wenjie Ruan, Xiaowei Huang

    Abstract: As Large Language Models (LLMs) become more integrated into our daily lives, it is crucial to identify and mitigate their risks, especially when the risks can have profound impacts on human users and societies. Guardrails, which filter the inputs or outputs of LLMs, have emerged as a core safeguarding technology. This position paper takes a deep look at current open-source solutions (Llama Guard,… ▽ More

    Submitted 29 May, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

    Comments: Proceedings of the 41st International Conference on Machine Learning, Vienna, Austria. PMLR 235, 2024

  8. arXiv:2312.07392  [pdf, other

    cs.LG cs.AI

    ReRoGCRL: Representation-based Robustness in Goal-Conditioned Reinforcement Learning

    Authors: Xiangyu Yin, Sihao Wu, Jiaxu Liu, Meng Fang, Xingyu Zhao, Xiaowei Huang, Wenjie Ruan

    Abstract: While Goal-Conditioned Reinforcement Learning (GCRL) has gained attention, its algorithmic robustness against adversarial perturbations remains unexplored. The attacks and robust representation training methods that are designed for traditional RL become less effective when applied to GCRL. To address this challenge, we first propose the Semi-Contrastive Representation attack, a novel approach ins… ▽ More

    Submitted 19 December, 2023; v1 submitted 12 December, 2023; originally announced December 2023.

    Comments: This paper has been accepted in AAAI24 (https://aaai.org/aaai-conference/)

  9. arXiv:2312.06436  [pdf, other

    cs.LG cs.AI

    Reward Certification for Policy Smoothed Reinforcement Learning

    Authors: Ronghui Mu, Leandro Soriano Marcolino, Tianle Zhang, Yanghao Zhang, Xiaowei Huang, Wenjie Ruan

    Abstract: Reinforcement Learning (RL) has achieved remarkable success in safety-critical areas, but it can be weakened by adversarial attacks. Recent studies have introduced "smoothed policies" in order to enhance its robustness. Yet, it is still challenging to establish a provable guarantee to certify the bound of its total reward. Prior methods relied primarily on computing bounds using Lipschitz continui… ▽ More

    Submitted 12 December, 2023; v1 submitted 11 December, 2023; originally announced December 2023.

    Comments: This paper will be presented in AAAI2024

  10. arXiv:2305.11391  [pdf, other

    cs.AI cs.LG

    A Survey of Safety and Trustworthiness of Large Language Models through the Lens of Verification and Validation

    Authors: Xiaowei Huang, Wenjie Ruan, Wei Huang, Gaojie Jin, Yi Dong, Changshun Wu, Saddek Bensalem, Ronghui Mu, Yi Qi, Xingyu Zhao, Kaiwen Cai, Yanghao Zhang, Sihao Wu, Peipei Xu, Dengyu Wu, Andre Freitas, Mustafa A. Mustafa

    Abstract: Large Language Models (LLMs) have exploded a new heatwave of AI for their ability to engage end-users in human-level conversations with detailed and articulate answers across many knowledge domains. In response to their fast adoption in many industrial applications, this survey concerns their safety and trustworthiness. First, we review known vulnerabilities and limitations of the LLMs, categorisi… ▽ More

    Submitted 27 August, 2023; v1 submitted 18 May, 2023; originally announced May 2023.

  11. arXiv:2304.00813  [pdf, other

    cs.LG

    Model-Agnostic Reachability Analysis on Deep Neural Networks

    Authors: Chi Zhang, Wenjie Ruan, Fu Wang, Peipei Xu, Geyong Min, Xiaowei Huang

    Abstract: Verification plays an essential role in the formal analysis of safety-critical systems. Most current verification methods have specific requirements when working on Deep Neural Networks (DNNs). They either target one particular network category, e.g., Feedforward Neural Networks (FNNs), or networks with specific activation functions, e.g., RdLU. In this paper, we develop a model-agnostic verificat… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Comments: PAKDD 2023

  12. arXiv:2303.01668  [pdf, other

    cs.LG cs.AI

    RePreM: Representation Pre-training with Masked Model for Reinforcement Learning

    Authors: Yuanying Cai, Chuheng Zhang, Wei Shen, Xuyun Zhang, Wenjie Ruan, Longbo Huang

    Abstract: Inspired by the recent success of sequence modeling in RL and the use of masked language model for pre-training, we propose a masked model for pre-training in RL, RePreM (Representation Pre-training with Masked Model), which trains the encoder combined with transformer blocks to predict the masked states or actions in a trajectory. RePreM is simple but effective compared to existing representation… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

    Comments: Accepted by AAAI-23

  13. arXiv:2301.12456  [pdf, other

    cs.LG cs.AI cs.CV

    Towards Verifying the Geometric Robustness of Large-scale Neural Networks

    Authors: Fu Wang, Peipei Xu, Wenjie Ruan, Xiaowei Huang

    Abstract: Deep neural networks (DNNs) are known to be vulnerable to adversarial geometric transformation. This paper aims to verify the robustness of large-scale DNNs against the combination of multiple geometric transformations with a provable guarantee. Given a set of transformations (e.g., rotation, scaling, etc.), we develop GeoRobust, a black-box robustness analyser built upon a novel global optimisati… ▽ More

    Submitted 30 March, 2023; v1 submitted 29 January, 2023; originally announced January 2023.

  14. arXiv:2301.12100  [pdf, other

    cs.LG

    Reachability Analysis of Neural Network Control Systems

    Authors: Chi Zhang, Wenjie Ruan, Peipei Xu

    Abstract: Neural network controllers (NNCs) have shown great promise in autonomous and cyber-physical systems. Despite the various verification approaches for neural networks, the safety analysis of NNCs remains an open problem. Existing verification approaches for neural network control systems (NNCSs) either can only work on a limited type of activation functions, or result in non-trivial over-approximati… ▽ More

    Submitted 28 January, 2023; originally announced January 2023.

    Comments: accepted by AAAI 2023

  15. arXiv:2301.07107  [pdf, other

    cs.LG cs.AI

    Mortality Prediction with Adaptive Feature Importance Recalibration for Peritoneal Dialysis Patients: a deep-learning-based study on a real-world longitudinal follow-up dataset

    Authors: Liantao Ma, Chaohe Zhang, Junyi Gao, Xianfeng Jiao, Zhihao Yu, Xinyu Ma, Yasha Wang, Wen Tang, Xinju Zhao, Wenjie Ruan, Tao Wang

    Abstract: Objective: Peritoneal Dialysis (PD) is one of the most widely used life-supporting therapies for patients with End-Stage Renal Disease (ESRD). Predicting mortality risk and identifying modifiable risk factors based on the Electronic Medical Records (EMR) collected along with the follow-up visits are of great importance for personalized medicine and early intervention. Here, our objective is to dev… ▽ More

    Submitted 8 February, 2023; v1 submitted 17 January, 2023; originally announced January 2023.

  16. arXiv:2212.11746  [pdf, other

    cs.LG cs.MA

    Certified Policy Smoothing for Cooperative Multi-Agent Reinforcement Learning

    Authors: Ronghui Mu, Wenjie Ruan, Leandro Soriano Marcolino, Gaojie Jin, Qiang Ni

    Abstract: Cooperative multi-agent reinforcement learning (c-MARL) is widely applied in safety-critical scenarios, thus the analysis of robustness for c-MARL models is profoundly important. However, robustness certification for c-MARLs has not yet been explored in the community. In this paper, we propose a novel certification method, which is the first work to leverage a scalable approach for c-MARLs to dete… ▽ More

    Submitted 22 December, 2022; originally announced December 2022.

    Comments: This paper will appear in AAAI2023

  17. pMPL: A Robust Multi-Party Learning Framework with a Privileged Party

    Authors: Lushan Song, Jiaxuan Wang, Zhexuan Wang, Xinyu Tu, Guopeng Lin, Wenqiang Ruan, Haoqi Wu, Weili Han

    Abstract: In order to perform machine learning among multiple parties while protecting the privacy of raw data, privacy-preserving machine learning based on secure multi-party computation (MPL for short) has been a hot spot in recent. The configuration of MPL usually follows the peer-to-peer architecture, where each party has the same chance to reveal the output result. However, typical business scenarios o… ▽ More

    Submitted 16 November, 2022; v1 submitted 2 October, 2022; originally announced October 2022.

    Comments: This paper is the full version of a paper to appear in CCS 2022

    Journal ref: 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS'22)

  18. Adversarial Detection: Attacking Object Detection in Real Time

    Authors: Han Wu, Syed Yunas, Sareh Rowlands, Wenjie Ruan, Johan Wahlstrom

    Abstract: Intelligent robots rely on object detection models to perceive the environment. Following advances in deep learning security it has been revealed that object detection models are vulnerable to adversarial attacks. However, prior research primarily focuses on attacking static images or offline videos. Therefore, it is still unclear if such attacks could jeopardize real-world robotic applications in… ▽ More

    Submitted 12 December, 2023; v1 submitted 5 September, 2022; originally announced September 2022.

    Comments: Accepted by IEEE Intelligent Vehicle Symposium, 2023

    Journal ref: IEEE Intelligent Vehicle Symposium, 2023

  19. arXiv:2208.08662  [pdf, other

    cs.CR cs.LG

    Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy

    Authors: Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han

    Abstract: Secure multi-party computation-based machine learning, referred to as MPL, has become an important technology to utilize data from multiple parties with privacy preservation. While MPL provides rigorous security guarantees for the computation process, the models trained by MPL are still vulnerable to attacks that solely depend on access to the models. Differential privacy could help to defend agai… ▽ More

    Submitted 18 August, 2022; originally announced August 2022.

    Comments: This paper has been accepted for publication at IEEE S&P 2023. Please cite this paper as "Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han. Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy. In Proceedings of The 44th IEEE Symposium on Security and Privacy, San Francisco, May 22-26, 2023."

  20. arXiv:2208.00906  [pdf, other

    cs.CV cs.LG

    Understanding Adversarial Robustness of Vision Transformers via Cauchy Problem

    Authors: Zheng Wang, Wenjie Ruan

    Abstract: Recent research on the robustness of deep learning has shown that Vision Transformers (ViTs) surpass the Convolutional Neural Networks (CNNs) under some perturbations, e.g., natural corruption, adversarial attacks, etc. Some papers argue that the superior robustness of ViT comes from the segmentation of its input images; others say that the Multi-head Self-Attention (MSA) is the key to preserving… ▽ More

    Submitted 1 August, 2022; originally announced August 2022.

    Comments: Accepted by ECML-PKDD 2022

  21. arXiv:2207.08044  [pdf, other

    cs.CV

    DIMBA: Discretely Masked Black-Box Attack in Single Object Tracking

    Authors: Xiangyu Yin, Wenjie Ruan, Jonathan Fieldsend

    Abstract: The adversarial attack can force a CNN-based model to produce an incorrect output by craftily manipulating human-imperceptible input. Exploring such perturbations can help us gain a deeper understanding of the vulnerability of neural networks, and provide robustness to deep learning against miscellaneous adversaries. Despite extensive studies focusing on the robustness of image, audio, and NLP, wo… ▽ More

    Submitted 16 July, 2022; originally announced July 2022.

  22. arXiv:2207.07539  [pdf, other

    cs.CV cs.LG

    3DVerifier: Efficient Robustness Verification for 3D Point Cloud Models

    Authors: Ronghui Mu, Wenjie Ruan, Leandro S. Marcolino, Qiang Ni

    Abstract: 3D point cloud models are widely applied in safety-critical scenes, which delivers an urgent need to obtain more solid proofs to verify the robustness of models. Existing verification method for point cloud model is time-expensive and computationally unattainable on large networks. Additionally, they cannot handle the complete PointNet model with joint alignment network (JANet) that contains multi… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

  23. arXiv:2207.02036  [pdf, other

    cs.LG cs.AI cs.CV stat.ML

    PRoA: A Probabilistic Robustness Assessment against Functional Perturbations

    Authors: Tianle Zhang, Wenjie Ruan, Jonathan E. Fieldsend

    Abstract: In safety-critical deep learning applications robustness measurement is a vital pre-deployment phase. However, existing robustness verification methods are not sufficiently practical for deploying machine learning systems in the real world. On the one hand, these methods attempt to claim that no perturbations can ``fool'' deep neural networks (DNNs), which may be too stringent in practice. On the… ▽ More

    Submitted 5 July, 2022; originally announced July 2022.

    Comments: The short version of this work will appear in the Proceedings of the 2022 European Conference on Machine Learning and Data Mining (ECML-PKDD 2022)

    MSC Class: 68T07 ACM Class: I.2; I.2.6

  24. arXiv:2111.05468  [pdf, other

    cs.CV

    Sparse Adversarial Video Attacks with Spatial Transformations

    Authors: Ronghui Mu, Wenjie Ruan, Leandro Soriano Marcolino, Qiang Ni

    Abstract: In recent years, a significant amount of research efforts concentrated on adversarial attacks on images, while adversarial video attacks have seldom been explored. We propose an adversarial attack strategy on videos, called DeepSAVA. Our model includes both additive perturbation and spatial transformation by a unified optimisation framework, where the structural similarity index (SSIM) measure is… ▽ More

    Submitted 9 November, 2021; originally announced November 2021.

    Comments: The short version of this work will appear in the BMVC 2021 conference

  25. arXiv:2108.10451  [pdf, other

    cs.LG cs.AI

    Adversarial Robustness of Deep Learning: Theory, Algorithms, and Applications

    Authors: Wenjie Ruan, Xinping Yi, Xiaowei Huang

    Abstract: This tutorial aims to introduce the fundamentals of adversarial robustness of deep learning, presenting a well-structured review of up-to-date techniques to assess the vulnerability of various types of deep learning models to adversarial examples. This tutorial will particularly highlight state-of-the-art techniques in adversarial attacks and robustness verification of deep neural networks (DNNs).… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

    Comments: Accepted as Tutorial in CIKM 2021

  26. arXiv:2108.01734  [pdf, other

    cs.SE

    Tutorials on Testing Neural Networks

    Authors: Nicolas Berthier, Youcheng Sun, Wei Huang, Yanghao Zhang, Wenjie Ruan, Xiaowei Huang

    Abstract: Deep learning achieves remarkable performance on pattern recognition, but can be vulnerable to defects of some important properties such as robustness and security. This tutorial is based on a stream of research conducted since the summer of 2018 at a few UK universities, including the University of Liverpool, University of Oxford, Queen's University Belfast, University of Lancaster, University of… ▽ More

    Submitted 3 August, 2021; originally announced August 2021.

  27. Semantic-guided Pixel Sampling for Cloth-Changing Person Re-identification

    Authors: Xiujun Shu, Ge Li, Xiao Wang, Weijian Ruan, Qi Tian

    Abstract: Cloth-changing person re-identification (re-ID) is a new rising research topic that aims at retrieving pedestrians whose clothes are changed. This task is quite challenging and has not been fully studied to date. Current works mainly focus on body shape or contour sketch, but they are not robust enough due to view and posture variations. The key to this task is to exploit cloth-irrelevant cues. Th… ▽ More

    Submitted 23 July, 2021; originally announced July 2021.

    Comments: This paper has been published on IEEE Signal Processing Letters

  28. Adversarial Driving: Attacking End-to-End Autonomous Driving

    Authors: Han Wu, Syed Yunas, Sareh Rowlands, Wenjie Ruan, Johan Wahlstrom

    Abstract: As research in deep neural networks advances, deep convolutional networks become promising for autonomous driving tasks. In particular, there is an emerging trend of employing end-to-end neural network models for autonomous driving. However, previous research has shown that deep neural network classifiers are vulnerable to adversarial attacks. While for regression tasks, the effect of adversarial… ▽ More

    Submitted 12 December, 2023; v1 submitted 16 March, 2021; originally announced March 2021.

    Comments: Accepted by IEEE Intelligent Vehicle Symposium, 2023

    Journal ref: IEEE Intelligent Vehicle Symposium, 2023

  29. arXiv:2103.03076  [pdf, other

    cs.LG cs.CR

    Dynamic Efficient Adversarial Training Guided by Gradient Magnitude

    Authors: Fu Wang, Yanghao Zhang, Yanbin Zheng, Wenjie Ruan

    Abstract: Adversarial training is an effective but time-consuming way to train robust deep neural networks that can withstand strong adversarial attacks. As a response to its inefficiency, we propose Dynamic Efficient Adversarial Training (DEAT), which gradually increases the adversarial iteration during training. We demonstrate that the gradient's magnitude correlates with the curvature of the trained mode… ▽ More

    Submitted 14 March, 2023; v1 submitted 4 March, 2021; originally announced March 2021.

    Comments: 18 pages, 6 figures

  30. arXiv:2101.00989  [pdf, other

    cs.CV cs.LG

    Fooling Object Detectors: Adversarial Attacks by Half-Neighbor Masks

    Authors: Yanghao Zhang, Fu Wang, Wenjie Ruan

    Abstract: Although there are a great number of adversarial attacks on deep learning based classifiers, how to attack object detection systems has been rarely studied. In this paper, we propose a Half-Neighbor Masked Projected Gradient Descent (HNM-PGD) based attack, which can generate strong perturbation to fool different kinds of detectors under strict constraints. We also applied the proposed HNM-PGD atta… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

    Comments: To appear in the Proceedings of the CIKM 2020 Workshops published by CEUR-WS

  31. arXiv:2101.00847  [pdf, other

    cs.NI

    Machine Learning based Malicious Payload Identification in Software-Defined Networking

    Authors: Qiumei Cheng, Chunming WU, Haifeng Zhou, Dezhang Kong, Dong Zhang, Junchi Xing, Wei Ruan

    Abstract: Deep packet inspection (DPI) has been extensively investigated in software-defined networking (SDN) as complicated attacks may intractably inject malicious payloads in the packets. Existing proprietary pattern-based or port-based third-party DPI tools can suffer from limitations in efficiently processing a large volume of data traffic. In this paper, a novel OpenFlow-enabled deep packet inspection… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

  32. arXiv:2012.03386  [pdf, other

    cs.CR cs.LG

    SoK: Training Machine Learning Models over Multiple Sources with Privacy Preservation

    Authors: Lushan Song, Guopeng Lin, Jiaxuan Wang, Haoqi Wu, Wenqiang Ruan, Weili Han

    Abstract: Nowadays, gathering high-quality training data from multiple data sources with privacy preservation is a crucial challenge to training high-performance machine learning models. The potential solutions could break the barriers among isolated data corpus, and consequently enlarge the range of data available for processing. To this end, both academic researchers and industrial vendors are recently st… ▽ More

    Submitted 13 March, 2023; v1 submitted 6 December, 2020; originally announced December 2020.

    Comments: 19pages, 4 figures

  33. arXiv:2010.07788  [pdf, other

    cs.CV cs.CR cs.LG

    Generalizing Universal Adversarial Attacks Beyond Additive Perturbations

    Authors: Yanghao Zhang, Wenjie Ruan, Fu Wang, Xiaowei Huang

    Abstract: The previous study has shown that universal adversarial attacks can fool deep neural networks over a large set of input images with a single human-invisible perturbation. However, current methods for universal adversarial attacks are based on additive perturbation, which cause misclassification when the perturbation is directly added to the input images. In this paper, for the first time, we show… ▽ More

    Submitted 29 October, 2020; v1 submitted 15 October, 2020; originally announced October 2020.

    Comments: A short version of this work will appear in the ICDM 2020 conference proceedings

  34. Interpretable Machine Learning for COVID-19: An Empirical Study on Severity Prediction Task

    Authors: Han Wu, Wenjie Ruan, Jiangtao Wang, Dingchang Zheng, Bei Liu, Yayuan Gen, Xiangfei Chai, Jian Chen, Kunwei Li, Shaolin Li, Sumi Helal

    Abstract: The black-box nature of machine learning models hinders the deployment of some high-accuracy models in medical diagnosis. It is risky to put one's life in the hands of models that medical researchers do not fully understand. However, through model interpretation, black-box models can promptly reveal significant biomarkers that medical practitioners may have overlooked due to the surge of infected… ▽ More

    Submitted 20 October, 2021; v1 submitted 30 September, 2020; originally announced October 2020.

    Comments: Accepted by IEEE Transactions on Artificial Intelligence, 2021

    Journal ref: IEEE Transactions on Artificial Intelligence, 2021

  35. arXiv:2009.06114  [pdf, other

    cs.LG cs.AI cs.CV stat.ML

    Towards the Quantification of Safety Risks in Deep Neural Networks

    Authors: Peipei Xu, Wenjie Ruan, Xiaowei Huang

    Abstract: Safety concerns on the deep neural networks (DNNs) have been raised when they are applied to critical sectors. In this paper, we define safety risks by requesting the alignment of the network's decision with human perception. To enable a general methodology for quantifying safety risks, we define a generic safety property and instantiate it to express various safety risks. For the quantification o… ▽ More

    Submitted 13 September, 2020; originally announced September 2020.

    Comments: 19 pages, 10 figures

  36. arXiv:2007.08848  [pdf, other

    cs.LG cs.AI stat.ML

    CovidCare: Transferring Knowledge from Existing EMR to Emerging Epidemic for Interpretable Prognosis

    Authors: Liantao Ma, Xinyu Ma, Junyi Gao, Chaohe Zhang, Zhihao Yu, Xianfeng Jiao, Wenjie Ruan, Yasha Wang, Wen Tang, Jiangtao Wang

    Abstract: Due to the characteristics of COVID-19, the epidemic develops rapidly and overwhelms health service systems worldwide. Many patients suffer from systemic life-threatening problems and need to be carefully monitored in ICUs. Thus the intelligent prognosis is in an urgent need to assist physicians to take an early intervention, prevent the adverse outcome, and optimize the medical resource allocatio… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

  37. arXiv:2001.05284  [pdf, other

    cs.CL cs.SD eess.AS

    Improving Spoken Language Understanding By Exploiting ASR N-best Hypotheses

    Authors: Mingda Li, Weitong Ruan, Xinyue Liu, Luca Soldaini, Wael Hamza, Chengwei Su

    Abstract: In a modern spoken language understanding (SLU) system, the natural language understanding (NLU) module takes interpretations of a speech from the automatic speech recognition (ASR) module as the input. The NLU module usually uses the first best interpretation of a given speech in downstream tasks such as domain and intent classification. However, the ASR module might misrecognize some speeches an… ▽ More

    Submitted 11 January, 2020; originally announced January 2020.

    Comments: Submitted to ICASSP 2020. Have signed an e-copyright agreement with the IEEE during ICASSP 2020 submission

  38. arXiv:1911.12216  [pdf, other

    cs.LG stat.ML

    ConCare: Personalized Clinical Feature Embedding via Capturing the Healthcare Context

    Authors: Liantao Ma, Chaohe Zhang, Yasha Wang, Wenjie Ruan, Jiantao Wang, Wen Tang, Xinyu Ma, Xin Gao, Junyi Gao

    Abstract: Predicting the patient's clinical outcome from the historical electronic medical records (EMR) is a fundamental research problem in medical informatics. Most deep learning-based solutions for EMR analysis concentrate on learning the clinical visit embedding and exploring the relations between visits. Although those works have shown superior performances in healthcare prediction, they fail to explo… ▽ More

    Submitted 27 November, 2019; originally announced November 2019.

  39. arXiv:1911.12205  [pdf, other

    cs.LG stat.ML

    AdaCare: Explainable Clinical Health Status Representation Learning via Scale-Adaptive Feature Extraction and Recalibration

    Authors: Liantao Ma, Junyi Gao, Yasha Wang, Chaohe Zhang, Jiangtao Wang, Wenjie Ruan, Wen Tang, Xin Gao, Xinyu Ma

    Abstract: Deep learning-based health status representation learning and clinical prediction have raised much research interest in recent years. Existing models have shown superior performance, but there are still several major issues that have not been fully taken into consideration. First, the historical variation pattern of the biomarker in diverse time scales plays a vital role in indicating the health s… ▽ More

    Submitted 27 November, 2019; originally announced November 2019.

  40. Coverage Guided Testing for Recurrent Neural Networks

    Authors: Wei Huang, Youcheng Sun, Xingyu Zhao, James Sharp, Wenjie Ruan, Jie Meng, Xiaowei Huang

    Abstract: Recurrent neural networks (RNNs) have been applied to a broad range of applications, including natural language processing, drug discovery, and video recognition. Their vulnerability to input perturbation is also known. Aligning with a view from software defect detection, this paper aims to develop a coverage guided testing approach to systematically exploit the internal behaviour of RNNs, with th… ▽ More

    Submitted 13 May, 2021; v1 submitted 5 November, 2019; originally announced November 2019.

    Comments: Accepted by IEEE Transactions on Reliability

  41. arXiv:1812.08342  [pdf, other

    cs.LG cs.AI

    A Survey of Safety and Trustworthiness of Deep Neural Networks: Verification, Testing, Adversarial Attack and Defence, and Interpretability

    Authors: Xiaowei Huang, Daniel Kroening, Wenjie Ruan, James Sharp, Youcheng Sun, Emese Thamo, Min Wu, Xinping Yi

    Abstract: In the past few years, significant progress has been made on deep neural networks (DNNs) in achieving human-level performance on several long-standing tasks. With the broader deployment of DNNs on various applications, the concerns over their safety and trustworthiness have been raised in public, especially after the widely reported fatal incidents involving self-driving cars. Research to address… ▽ More

    Submitted 31 May, 2020; v1 submitted 17 December, 2018; originally announced December 2018.

    Comments: To appear in the journal of Computer Science Review

    ACM Class: I.2; F.3.1

  42. arXiv:1807.03571  [pdf, other

    cs.LG cs.AI stat.ML

    A Game-Based Approximate Verification of Deep Neural Networks with Provable Guarantees

    Authors: Min Wu, Matthew Wicker, Wenjie Ruan, Xiaowei Huang, Marta Kwiatkowska

    Abstract: Despite the improved accuracy of deep neural networks, the discovery of adversarial examples has raised serious safety concerns. In this paper, we study two variants of pointwise robustness, the maximum safe radius problem, which for a given input sample computes the minimum distance to an adversarial example, and the feature robustness problem, which aims to quantify the robustness of individual… ▽ More

    Submitted 6 March, 2019; v1 submitted 10 July, 2018; originally announced July 2018.

    Journal ref: Theoretical Computer Science 807 (2020) 298-329

  43. arXiv:1805.02242  [pdf, other

    cs.LG cs.CV stat.ML

    Reachability Analysis of Deep Neural Networks with Provable Guarantees

    Authors: Wenjie Ruan, Xiaowei Huang, Marta Kwiatkowska

    Abstract: Verifying correctness of deep neural networks (DNNs) is challenging. We study a generic reachability problem for feed-forward DNNs which, for a given set of inputs to the network and a Lipschitz-continuous function over its outputs, computes the lower and upper bound on the function values. Because the network and the function are Lipschitz continuous, all values in the interval between the lower… ▽ More

    Submitted 6 May, 2018; originally announced May 2018.

    Comments: This is the long version of the conference paper accepted in IJCAI-2018. Github: https://github.com/TrustAI/DeepGO

  44. arXiv:1805.00089  [pdf, other

    cs.LG cs.SE stat.ML

    Concolic Testing for Deep Neural Networks

    Authors: Youcheng Sun, Min Wu, Wenjie Ruan, Xiaowei Huang, Marta Kwiatkowska, Daniel Kroening

    Abstract: Concolic testing combines program execution and symbolic analysis to explore the execution paths of a software program. This paper presents the first concolic testing approach for Deep Neural Networks (DNNs). More specifically, we formalise coverage criteria for DNNs that have been studied in the literature, and then develop a coherent method for performing concolic testing to increase test covera… ▽ More

    Submitted 4 August, 2018; v1 submitted 30 April, 2018; originally announced May 2018.

  45. arXiv:1804.05805  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Global Robustness Evaluation of Deep Neural Networks with Provable Guarantees for the $L_0$ Norm

    Authors: Wenjie Ruan, Min Wu, Youcheng Sun, Xiaowei Huang, Daniel Kroening, Marta Kwiatkowska

    Abstract: Deployment of deep neural networks (DNNs) in safety- or security-critical systems requires provable guarantees on their correct behaviour. A common requirement is robustness to adversarial perturbations in a neighbourhood around an input. In this paper we focus on the $L_0$ norm and aim to compute, for a trained DNN and an input, the maximal radius of a safe norm ball around the input within which… ▽ More

    Submitted 20 November, 2018; v1 submitted 16 April, 2018; originally announced April 2018.

    Comments: 42 Pages, Github: https://github.com/TrustAI/L0-TRE

  46. arXiv:1709.07903  [pdf, other

    stat.ML cs.LG

    Ensemble Multi-task Gaussian Process Regression with Multiple Latent Processes

    Authors: Weitong Ruan, Eric L. Miller

    Abstract: Multi-task/Multi-output learning seeks to exploit correlation among tasks to enhance performance over learning or solving each task independently. In this paper, we investigate this problem in the context of Gaussian Processes (GPs) and propose a new model which learns a mixture of latent processes by decomposing the covariance matrix into a sum of structured hidden components each of which is con… ▽ More

    Submitted 9 May, 2018; v1 submitted 22 September, 2017; originally announced September 2017.

    Comments: main body: 9 pages, supplemental material: 7 pages. This version corrected a few typos in previous version