Zum Hauptinhalt springen

Showing 1–9 of 9 results for author: Rong, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.06391  [pdf, other

    q-bio.QM cs.AI cs.LG

    Autoregressive Enzyme Function Prediction with Multi-scale Multi-modality Fusion

    Authors: Dingyi Rong, Wenzhuo Zheng, Bozitao Zhong, Zhouhan Lin, Liang Hong, Ning Liu

    Abstract: Accurate prediction of enzyme function is crucial for elucidating biological mechanisms and driving innovation across various sectors. Existing deep learning methods tend to rely solely on either sequence data or structural data and predict the EC number as a whole, neglecting the intrinsic hierarchical structure of EC numbers. To address these limitations, we introduce MAPred, a novel multi-modal… ▽ More

    Submitted 11 August, 2024; originally announced August 2024.

  2. arXiv:2403.15010  [pdf, other

    cs.CV cs.CR

    Clean-image Backdoor Attacks

    Authors: Dazhong Rong, Guoyao Yu, Shuheng Shen, Xinyi Fu, Peng Qian, Jianhai Chen, Qinming He, Xing Fu, Weiqiang Wang

    Abstract: To gather a significant quantity of annotated training data for high-performance image classification models, numerous companies opt to enlist third-party providers to label their unlabeled data. This practice is widely regarded as secure, even in cases where some annotated errors occur, as the impact of these minor inaccuracies on the final performance of the models is negligible and existing bac… ▽ More

    Submitted 26 March, 2024; v1 submitted 22 March, 2024; originally announced March 2024.

  3. arXiv:2312.04512  [pdf, other

    cs.CR

    MuFuzz: Sequence-Aware Mutation and Seed Mask Guidance for Blockchain Smart Contract Fuzzing

    Authors: Peng Qian, Hanjie Wu, Zeren Du, Turan Vural, Dazhong Rong, Zheng Cao, Lun Zhang, Yanbin Wang, Jianhai Chen, Qinming He

    Abstract: As blockchain smart contracts become more widespread and carry more valuable digital assets, they become an increasingly attractive target for attackers. Over the past few years, smart contracts have been subject to a plethora of devastating attacks, resulting in billions of dollars in financial losses. There has been a notable surge of research interest in identifying defects in smart contracts.… ▽ More

    Submitted 9 December, 2023; v1 submitted 7 December, 2023; originally announced December 2023.

    Comments: This paper has been accepted by ICDE 2024

  4. arXiv:2303.07607  [pdf, other

    cs.IR

    CoMeta: Enhancing Meta Embeddings with Collaborative Information in Cold-start Problem of Recommendation

    Authors: Haonan Hu, Dazhong Rong, Jianhai Chen, Qinming He, Zhenguang Liu

    Abstract: The cold-start problem is quite challenging for existing recommendation models. Specifically, for the new items with only a few interactions, their ID embeddings are trained inadequately, leading to poor recommendation performance. Some recent studies introduce meta learning to solve the cold-start problem by generating meta embeddings for new items as their initial ID embeddings. However, we argu… ▽ More

    Submitted 7 June, 2023; v1 submitted 13 March, 2023; originally announced March 2023.

    Comments: This paper was accepted by Knowledge Science, Engineering and Management (KSEM) 2023

  5. arXiv:2212.02280  [pdf, other

    cs.CV

    GARF:Geometry-Aware Generalized Neural Radiance Field

    Authors: Yue Shi, Dingyi Rong, Bingbing Ni, Chang Chen, Wenjun Zhang

    Abstract: Neural Radiance Field (NeRF) has revolutionized free viewpoint rendering tasks and achieved impressive results. However, the efficiency and accuracy problems hinder its wide applications. To address these issues, we propose Geometry-Aware Generalized Neural Radiance Field (GARF) with a geometry-aware dynamic sampling (GADS) strategy to perform real-time novel view rendering and unsupervised depth… ▽ More

    Submitted 7 December, 2022; v1 submitted 5 December, 2022; originally announced December 2022.

  6. Differentiable Projection from Optical Coherence Tomography B-Scan without Retinal Layer Segmentation Supervision

    Authors: Dingyi Rong, Jiancheng Yang, Bingbing Ni, Bilian Ke

    Abstract: Projection map (PM) from optical coherence tomography (OCT) B-scan is an important tool to diagnose retinal diseases, which typically requires retinal layer segmentation. In this study, we present a novel end-to-end framework to predict PMs from B-scans. Instead of segmenting retinal layers explicitly, we represent them implicitly as predicted coordinates. By pixel interpolation on uniformly sampl… ▽ More

    Submitted 11 June, 2022; originally announced June 2022.

    Comments: ISBI2022

  7. arXiv:2204.13594  [pdf, other

    cs.IR cs.CR cs.LG

    Poisoning Deep Learning Based Recommender Model in Federated Learning Scenarios

    Authors: Dazhong Rong, Qinming He, Jianhai Chen

    Abstract: Various attack methods against recommender systems have been proposed in the past years, and the security issues of recommender systems have drawn considerable attention. Traditional attacks attempt to make target items recommended to as many users as possible by poisoning the training data. Benifiting from the feature of protecting users' private data, federated recommendation can effectively def… ▽ More

    Submitted 8 June, 2022; v1 submitted 26 April, 2022; originally announced April 2022.

    Comments: This paper has been accepted by the 31st International Joint Conference on Artificial Intelligence (IJCAI-22, Main Track)

  8. arXiv:2204.01499  [pdf, other

    cs.CR cs.LG

    FedRecAttack: Model Poisoning Attack to Federated Recommendation

    Authors: Dazhong Rong, Shuai Ye, Ruoyan Zhao, Hon Ning Yuen, Jianhai Chen, Qinming He

    Abstract: Federated Recommendation (FR) has received considerable popularity and attention in the past few years. In FR, for each user, its feature vector and interaction data are kept locally on its own client thus are private to others. Without the access to above information, most existing poisoning attacks against recommender systems or federated learning lose validity. Benifiting from this characterist… ▽ More

    Submitted 13 October, 2022; v1 submitted 1 April, 2022; originally announced April 2022.

    Comments: This paper has been accepted by IEEE International Conference on Data Engineering 2022 (Second Research Round)

  9. arXiv:2111.07734  [pdf, other

    cs.AI

    Zero-Shot Learning in Named-Entity Recognition with External Knowledge

    Authors: Nguyen Van Hoang, Soeren Hougaard Mulvad, Dexter Neo Yuan Rong, Yang Yue

    Abstract: A significant shortcoming of current state-of-the-art (SOTA) named-entity recognition (NER) systems is their lack of generalization to unseen domains, which poses a major problem since obtaining labeled data for NER in a new domain is expensive and time-consuming. We propose ZERO, a model that performs zero-shot and few-shot learning in NER to generalize to unseen domains by incorporating pre-exis… ▽ More

    Submitted 15 November, 2021; originally announced November 2021.

    Comments: 4 main pages, 5 including broader impact and references. 4 figures. 2 equations. 2 tables. For code, see https://github.com/shmulvad/zero-for-ner