Skip to main content

Showing 1–18 of 18 results for author: Yuen, P C

  1. arXiv:2405.17495  [pdf, other

    cs.LG cs.CR

    Vertical Federated Learning for Effectiveness, Security, Applicability: A Survey

    Authors: Mang Ye, Wei Shen, Bo Du, Eduard Snezhko, Vassili Kovalev, Pong C. Yuen

    Abstract: Vertical Federated Learning (VFL) is a privacy-preserving distributed learning paradigm where different parties collaboratively learn models using partitioned features of shared samples, without leaking private data. Recent research has shown promising results addressing various challenges in VFL, highlighting its potential for practical applications in cross-domain collaboration. However, the cor… ▽ More

    Submitted 4 June, 2024; v1 submitted 25 May, 2024; originally announced May 2024.

    Comments: 31 pages, 9 figures, 10 tables

  2. arXiv:2404.17830  [pdf, other

    cs.LG cs.CV

    Dynamic Against Dynamic: An Open-set Self-learning Framework

    Authors: Haifeng Yang, Chuanxing Geng, Pong C. Yuen, Songcan Chen

    Abstract: In open-set recognition, existing methods generally learn statically fixed decision boundaries using known classes to reject unknown classes. Though they have achieved promising results, such decision boundaries are evidently insufficient for universal unknown classes in dynamic and open scenarios as they can potentially appear at any position in the feature space. Moreover, these methods just sim… ▽ More

    Submitted 2 May, 2024; v1 submitted 27 April, 2024; originally announced April 2024.

    Comments: The first two authors contributed equally to this work. Accepted at IJCAI2024

  3. arXiv:2307.10616  [pdf, other

    cs.LG cs.AI cs.CV

    Heterogeneous Federated Learning: State-of-the-art and Research Challenges

    Authors: Mang Ye, Xiuwen Fang, Bo Du, Pong C. Yuen, Dacheng Tao

    Abstract: Federated learning (FL) has drawn increasing attention owing to its potential use in large-scale industrial applications. Existing federated learning works mainly focus on model homogeneous settings. However, practical federated learning typically faces the heterogeneity of data distributions, model architectures, network environments, and hardware devices among participant clients. Heterogeneous… ▽ More

    Submitted 8 September, 2023; v1 submitted 20 July, 2023; originally announced July 2023.

    Comments: 42 pages, 11 figures, and 4 tables

  4. arXiv:2202.05953  [pdf, other

    cs.CV

    Open-set Adversarial Defense with Clean-Adversarial Mutual Learning

    Authors: Rui Shao, Pramuditha Perera, Pong C. Yuen, Vishal M. Patel

    Abstract: Open-set recognition and adversarial defense study two key aspects of deep learning that are vital for real-world deployment. The objective of open-set recognition is to identify samples from open-set classes during testing, while adversarial defense aims to robustify the network against images perturbed by imperceptible adversarial noise. This paper demonstrates that open-set recognition systems… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

    Comments: Accepted by International Journal of Computer Vision (IJCV) 2022. Code will be available at https://github.com/rshaojimmy/ECCV2020-OSAD. arXiv admin note: text overlap with arXiv:2009.00814

  5. arXiv:2110.12613  [pdf, other

    cs.CV

    Federated Test-Time Adaptive Face Presentation Attack Detection with Dual-Phase Privacy Preservation

    Authors: Rui Shao, Bochao Zhang, Pong C. Yuen, Vishal M. Patel

    Abstract: Face presentation attack detection (fPAD) plays a critical role in the modern face recognition pipeline. The generalization ability of face presentation attack detection models to unseen attacks has become a key issue for real-world deployment, which can be improved when models are trained with face images from different input distributions and different types of spoof attacks. In reality, due to… ▽ More

    Submitted 24 October, 2021; originally announced October 2021.

    Comments: Accepted by FG 2021. arXiv admin note: substantial text overlap with arXiv:2104.06595, arXiv:2005.14638

  6. arXiv:2104.06595  [pdf, other

    cs.CV

    Federated Generalized Face Presentation Attack Detection

    Authors: Rui Shao, Pramuditha Perera, Pong C. Yuen, Vishal M. Patel

    Abstract: Face presentation attack detection plays a critical role in the modern face recognition pipeline. A face presentation attack detection model with good generalization can be obtained when it is trained with face images from different input distributions and different types of spoof attacks. In reality, training data (both real face images and spoof images) are not directly shared between data owner… ▽ More

    Submitted 30 April, 2022; v1 submitted 13 April, 2021; originally announced April 2021.

    Comments: Accepted by IEEE Transactions on Neural Networks and Learning Systems (TNNLS) 2022. arXiv admin note: substantial text overlap with arXiv:2005.14638

  7. arXiv:2009.00814  [pdf, other

    cs.CV cs.AI

    Open-set Adversarial Defense

    Authors: Rui Shao, Pramuditha Perera, Pong C. Yuen, Vishal M. Patel

    Abstract: Open-set recognition and adversarial defense study two key aspects of deep learning that are vital for real-world deployment. The objective of open-set recognition is to identify samples from open-set classes during testing, while adversarial defense aims to defend the network against images with imperceptible adversarial perturbations. In this paper, we show that open-set recognition systems are… ▽ More

    Submitted 2 September, 2020; originally announced September 2020.

    Comments: Accepted by ECCV 2020

  8. arXiv:2008.02129  [pdf, other

    cs.CV

    Self-supervised Temporal Discriminative Learning for Video Representation Learning

    Authors: Jinpeng Wang, Yiqi Lin, Andy J. Ma, Pong C. Yuen

    Abstract: Temporal cues in videos provide important information for recognizing actions accurately. However, temporal-discriminative features can hardly be extracted without using an annotated large-scale video action dataset for training. This paper proposes a novel Video-based Temporal-Discriminative Learning (VTDL) framework in self-supervised manner. Without labelled data for network pretraining, tempor… ▽ More

    Submitted 5 August, 2020; originally announced August 2020.

    Comments: 10 pages

  9. arXiv:2005.14638  [pdf, other

    cs.CV

    Federated Face Presentation Attack Detection

    Authors: Rui Shao, Pramuditha Perera, Pong C. Yuen, Vishal M. Patel

    Abstract: Face presentation attack detection (fPAD) plays a critical role in the modern face recognition pipeline. A face presentation attack detection model with good generalization can be obtained when it is trained with face images from different input distributions and different types of spoof attacks. In reality, training data (both real face images and spoof images) are not directly shared between dat… ▽ More

    Submitted 28 September, 2020; v1 submitted 29 May, 2020; originally announced May 2020.

  10. arXiv:1911.10771  [pdf, other

    cs.CV

    Regularized Fine-grained Meta Face Anti-spoofing

    Authors: Rui Shao, Xiangyuan Lan, Pong C. Yuen

    Abstract: Face presentation attacks have become an increasingly critical concern when face recognition is widely applied. Many face anti-spoofing methods have been proposed, but most of them ignore the generalization ability to unseen attacks. To overcome the limitation, this work casts face anti-spoofing as a domain generalization (DG) problem, and attempts to address this problem by developing a new meta-… ▽ More

    Submitted 25 November, 2019; originally announced November 2019.

    Comments: Accepted by AAAI 2020. Codes are available at https://github.com/rshaojimmy/AAAI2020-RFMetaFAS

  11. arXiv:1904.03436  [pdf, other

    cs.CV

    Unsupervised Embedding Learning via Invariant and Spreading Instance Feature

    Authors: Mang Ye, Xu Zhang, Pong C. Yuen, Shih-Fu Chang

    Abstract: This paper studies the unsupervised embedding learning problem, which requires an effective similarity measurement between samples in low-dimensional embedding space. Motivated by the positive concentrated and negative separated properties observed from category-wise supervised learning, we propose to utilize the instance-wise supervision to approximate these properties, which aims at learning dat… ▽ More

    Submitted 6 April, 2019; originally announced April 2019.

    Comments: CVPR 2019

  12. Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification

    Authors: Yi Wang, Jianwu Wan, Jun Guo, Yiu-Ming Cheung, Pong C Yuen

    Abstract: Similarity search is essential to many important applications and often involves searching at scale on high-dimensional data based on their similarity to a query. In biometric applications, recent vulnerability studies have shown that adversarial machine learning can compromise biometric recognition systems by exploiting the biometric similarity information. Existing methods for biometric privacy… ▽ More

    Submitted 5 November, 2017; originally announced November 2017.

    Comments: 14 pages, 10 figures, 2 tables, regular paper

  13. arXiv:1709.09297  [pdf, ps, other

    cs.CV

    Dynamic Label Graph Matching for Unsupervised Video Re-Identification

    Authors: Mang Ye, Andy J Ma, Liang Zheng, Jiawei Li, P C Yuen

    Abstract: Label estimation is an important component in an unsupervised person re-identification (re-ID) system. This paper focuses on cross-camera label estimation, which can be subsequently used in feature learning to learn robust re-ID models. Specifically, we propose to construct a graph for samples in each camera, and then graph matching scheme is introduced for cross-camera labeling association. While… ▽ More

    Submitted 26 September, 2017; originally announced September 2017.

    Comments: Accepted by ICCV 2017. Revised our IDE results on MARS dataset under standard evaluation protocol

  14. On the Reconstruction of Face Images from Deep Face Templates

    Authors: Guangcan Mai, Kai Cao, Pong C. Yuen, Anil K. Jain

    Abstract: State-of-the-art face recognition systems are based on deep (convolutional) neural networks. Therefore, it is imperative to determine to what extent face templates derived from deep networks can be inverted to obtain the original face image. In this paper, we study the vulnerabilities of a state-of-the-art face recognition system based on template reconstruction attack. We propose a neighborly de-… ▽ More

    Submitted 28 April, 2018; v1 submitted 2 March, 2017; originally announced March 2017.

    Comments: To appear in TPAMI, IEEE Transactions on Pattern Analysis and Machine Intelligence, 2018

  15. arXiv:1611.00800  [pdf

    cs.LG cs.CV stat.ML

    Temporal Matrix Completion with Locally Linear Latent Factors for Medical Applications

    Authors: Frodo Kin Sun Chan, Andy J Ma, Pong C Yuen, Terry Cheuk-Fung Yip, Yee-Kit Tse, Vincent Wai-Sun Wong, Grace Lai-Hung Wong

    Abstract: Regular medical records are useful for medical practitioners to analyze and monitor patient health status especially for those with chronic disease, but such records are usually incomplete due to unpunctuality and absence of patients. In order to resolve the missing data problem over time, tensor-based model is suggested for missing data imputation in recent papers because this approach makes use… ▽ More

    Submitted 31 October, 2016; originally announced November 2016.

  16. arXiv:1512.05990  [pdf, other

    cs.CV

    Deformable Distributed Multiple Detector Fusion for Multi-Person Tracking

    Authors: Andy J Ma, Pong C Yuen, Suchi Saria

    Abstract: This paper addresses fully automated multi-person tracking in complex environments with challenging occlusion and extensive pose variations. Our solution combines multiple detectors for a set of different regions of interest (e.g., full-body and head) for multi-person tracking. The use of multiple detectors leads to fewer miss detections as it is able to exploit the complementary strengths of the… ▽ More

    Submitted 18 December, 2015; originally announced December 2015.

  17. arXiv:1205.0088   

    cs.LG math.OC

    ProPPA: A Fast Algorithm for $\ell_1$ Minimization and Low-Rank Matrix Completion

    Authors: Ranch Y. Q. Lai, Pong C. Yuen

    Abstract: We propose a Projected Proximal Point Algorithm (ProPPA) for solving a class of optimization problems. The algorithm iteratively computes the proximal point of the last estimated solution projected into an affine space which itself is parallel and approaching to the feasible set. We provide convergence analysis theoretically supporting the general algorithm, and then apply it for solving $\ell_1$-… ▽ More

    Submitted 19 May, 2012; v1 submitted 1 May, 2012; originally announced May 2012.

    Comments: update needed

  18. arXiv:1201.1409  [pdf, other

    cs.GR cs.AI

    Interactive Character Posing by Sparse Coding

    Authors: Ranch Y. Q. Lai, Pong C. Yuen, K. W. Lee, J. H. Lai

    Abstract: Character posing is of interest in computer animation. It is difficult due to its dependence on inverse kinematics (IK) techniques and articulate property of human characters . To solve the IK problem, classical methods that rely on numerical solutions often suffer from the under-determination problem and can not guarantee naturalness. Existing data-driven methods address this problem by learning… ▽ More

    Submitted 6 January, 2012; originally announced January 2012.

    Comments: Submitted to Computer Graphics Forum

    ACM Class: I.7