Searched for: +
(1 - 12 of 12)
document
Zhao, Z. (author), Huang, J. (author), Chen, Lydia Y. (author), Roos, S. (author)
Generative Adversarial Networks (GANs) are increasingly adopted by the industry to synthesize realistic images using competing generator and discriminator neural networks. Due to data not being centrally available, Multi-Discriminator (MD)-GANs training frameworks employ multiple discriminators that have direct access to the real data....
conference paper 2024
document
Huang, J. (author), Zhao, Z. (author), Chen, Lydia Y. (author), Roos, S. (author)
Attacks on Federated Learning (FL) can severely reduce the quality of the generated models and limit the usefulness of this emerging learning paradigm that enables on-premise decentralized learning. However, existing untargeted attacks are not practical for many scenarios as they assume that i) the attacker knows every update of benign...
conference paper 2023
document
Zhao, Z. (author), Birke, Robert (author), Chen, Lydia Y. (author)
Generative Adversarial Networks (GANs) are typically trained to synthesize data, from images and more recently tabular data, under the assumption of directly accessible training data. While learning image GANs on Federated Learning (FL) and Multi-Discriminator (MD) systems has just been demonstrated, it is unknown if tabular GANs can be learned...
conference paper 2023
document
Zhao, Z. (author), Birke, Robert (author), Chen, Lydia Y. (author)
An alternative method for sharing knowledge while complying with strict data access regulations, such as the European General Data Protection Regulation (GDPR), is the emergence of synthetic tabular data. Mainstream table synthesizers utilize methodologies derived from Generative Adversarial Networks (GAN). Although several state-of-the-art ...
conference paper 2023
document
Zhao, Zhendong (author), Chen, Xiaojun (author), Xuan, Yuexin (author), Dong, Ye (author), Wang, Dakui (author), Liang, K. (author)
Backdoor attack is a type of serious security threat to deep learning models. An adversary can provide users with a model trained on poisoned data to manipulate prediction behavior in test stage using a backdoor. The backdoored models behave normally on clean images, yet can be activated and output incorrect prediction if the input is stamped...
conference paper 2022
document
Lee, Y. (author), Chen, H. (author), Zhao, Guoying (author), Specht, M.M. (author)
Human attention is critical yet challenging cognitive process to measure due to its diverse definitions and non-standardized evaluation. In this work, we focus on the attention self-regulation of learners, which commonly occurs as an effort to regain focus, contrary to attention loss. We focus on easy-to-observe behavioral signs in the real...
conference paper 2022
document
Zhu, Yujin (author), Zhao, Z. (author), Birke, Robert (author), Chen, Lydia Y. (author)
Tabular data synthesis is an emerging approach to circumvent strict regulations on data privacy while discovering knowledge through big data. Although state-of-the-art AI-based tabular data synthesizers, e.g., table-GAN, CTGAN, TVAE, and CTAB-GAN, are effective at generating synthetic tabular data, their training is sensitive to column...
conference paper 2022
document
Gu, Guanjie (author), Yang, Changgui (author), Li, Zhuhao (author), Feng, Xiangdong (author), Chang, Ziyi (author), Wang, Ting-Hsun (author), Zhang, Yunshan (author), Luo, Yuxuan (author), Zhang, Hong (author), Wang, Ping (author), Du, S. (author), Chen, Yong (author), Zhao, Bo (author)
Body Channel Communication (BCC) offers a low-loss signal transmission medium for ultra-low-power wearable devices on human body [1]. However, the effective communication range on human body is limited to less than 1m in the state-of-the-art BCC transceivers [2], where the signal loss at the interface of body surface and BCC receiver remains to...
conference paper 2022
document
Wu, Han (author), Zhao, Z. (author), Chen, Lydia Y. (author), van Moorsel, Aad (author)
Federated Learning (FL) has emerged as a potentially powerful privacy-preserving machine learning method-ology, since it avoids exchanging data between participants, but instead exchanges model parameters. FL has traditionally been applied to image, voice and similar data, but recently it has started to draw attention from domains including...
conference paper 2022
document
Chen, H. (author), Tan, E.B.K. (author), Lee, Y. (author), Praharaj, S. (author), Specht, M.M. (author), Zhao, G. (author)
Using Artificial Intelligence (AI) and machine learning technologies to automatically mine latent patterns from educational data holds great potential to inform teaching and learning practices. However, the current AI technology mostly works as "black box"-only the inputs and the corresponding outputs are available, which largely impedes...
conference paper 2020
document
Huang, J. (author), Talbi, Rania (author), Zhao, Z. (author), Boucchenak, Sara (author), Chen, Lydia Y. (author), Roos, S. (author)
Federated Learning is an emerging distributed collaborative learning paradigm adopted by many of today's applications, e.g., keyboard prediction and object recognition. Its core principle is to learn from large amount of users data while preserving data privacy by design as collaborative users only need to share the machine learning models...
conference paper 2020
document
Tobón, L. (author), Chen, J. (author), Lee, J. (author), Yuan, M. (author), Zhao, B. (author), Liu, Q.H. (author)
Many system-level electromagnetic design problems are multiscale and very challenging to solve. They remain a significant barrier to system design optimization for a foreseeable future. Such multiscale problems often contain three electrical scales, i.e., the fine scale (geometrical feature size much smaller than a wavelength), the coarse scale ...
conference paper 2013
Searched for: +
(1 - 12 of 12)