Skip to main content

Showing 1–50 of 59 results for author: Lou, Q

  1. arXiv:2407.07308  [pdf, other

    cs.CR cs.DC

    BoostCom: Towards Efficient Universal Fully Homomorphic Encryption by Boosting the Word-wise Comparisons

    Authors: Ardhi Wiratama Baskara Yudha, Jiaqi Xue, Qian Lou, Huiyang Zhou, Yan Solihin

    Abstract: Fully Homomorphic Encryption (FHE) allows for the execution of computations on encrypted data without the need to decrypt it first, offering significant potential for privacy-preserving computational operations. Emerging arithmetic-based FHE schemes (ar-FHE), like BGV, demonstrate even better performance in word-wise comparison operations over non-arithmetic FHE (na-FHE) schemes, such as TFHE, esp… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

    Comments: To be appeared on PACT 2024

  2. arXiv:2406.18725  [pdf, other

    cs.LG cs.CL

    Jailbreaking LLMs with Arabic Transliteration and Arabizi

    Authors: Mansour Al Ghanim, Saleh Almohaimeed, Mengxin Zheng, Yan Solihin, Qian Lou

    Abstract: This study identifies the potential vulnerabilities of Large Language Models (LLMs) to 'jailbreak' attacks, specifically focusing on the Arabic language and its various forms. While most research has concentrated on English-based prompt manipulation, our investigation broadens the scope to investigate the Arabic language. We initially tested the AdvBench benchmark in Standardized Arabic, finding t… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    Comments: 14 pages, 4 figures

  3. arXiv:2406.16694  [pdf, other

    cs.CL

    Task Oriented In-Domain Data Augmentation

    Authors: Xiao Liang, Xinyu Hu, Simiao Zuo, Yeyun Gong, Qiang Lou, Yi Liu, Shao-Lun Huang, Jian Jiao

    Abstract: Large Language Models (LLMs) have shown superior performance in various applications and fields. To achieve better performance on specialized domains such as law and advertisement, LLMs are often continue pre-trained on in-domain data. However, existing approaches suffer from two major issues. First, in-domain data are scarce compared with general domain-agnostic data. Second, data used for contin… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

  4. arXiv:2406.01873  [pdf, other

    cs.CL cs.CR cs.LG

    CR-UTP: Certified Robustness against Universal Text Perturbations on Large Language Models

    Authors: Qian Lou, Xin Liang, Jiaqi Xue, Yancheng Zhang, Rui Xie, Mengxin Zheng

    Abstract: It is imperative to ensure the stability of every prediction made by a language model; that is, a language's prediction should remain consistent despite minor input variations, like word substitutions. In this paper, we investigate the problem of certifying a language model's robustness against Universal Text Perturbations (UTPs), which have been widely used in universal adversarial attacks and ba… ▽ More

    Submitted 5 June, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

    Comments: Accepted by ACL Findings 2024

  5. arXiv:2406.00083  [pdf, other

    cs.CR cs.AI cs.CL cs.IR cs.LG

    BadRAG: Identifying Vulnerabilities in Retrieval Augmented Generation of Large Language Models

    Authors: Jiaqi Xue, Mengxin Zheng, Yebowen Hu, Fei Liu, Xun Chen, Qian Lou

    Abstract: Large Language Models (LLMs) are constrained by outdated information and a tendency to generate incorrect data, commonly referred to as "hallucinations." Retrieval-Augmented Generation (RAG) addresses these limitations by combining the strengths of retrieval-based methods and generative models. This approach involves retrieving relevant information from a large, up-to-date dataset and using it to… ▽ More

    Submitted 6 June, 2024; v1 submitted 2 June, 2024; originally announced June 2024.

  6. arXiv:2405.11607  [pdf, other

    cs.CR cs.AR

    OFHE: An Electro-Optical Accelerator for Discretized TFHE

    Authors: Mengxin Zheng, Cheng Chu, Qian Lou, Nathan Youngblood, Mo Li, Sajjad Moazeni, Lei Jiang

    Abstract: This paper presents \textit{OFHE}, an electro-optical accelerator designed to process Discretized TFHE (DTFHE) operations, which encrypt multi-bit messages and support homomorphic multiplications, lookup table operations and full-domain functional bootstrappings. While DTFHE is more efficient and versatile than other fully homomorphic encryption schemes, it requires 32-, 64-, and 128-bit polynomia… ▽ More

    Submitted 19 May, 2024; originally announced May 2024.

  7. arXiv:2401.14641  [pdf, other

    cs.CV eess.IV

    Super Efficient Neural Network for Compression Artifacts Reduction and Super Resolution

    Authors: Wen Ma, Qiuwen Lou, Arman Kazemi, Julian Faraone, Tariq Afzal

    Abstract: Video quality can suffer from limited internet speed while being streamed by users. Compression artifacts start to appear when the bitrate decreases to match the available bandwidth. Existing algorithms either focus on removing the compression artifacts at the same video resolution, or on upscaling the video resolution but not removing the artifacts. Super resolution-only approaches will amplify t… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

  8. arXiv:2401.12549  [pdf, other

    cond-mat.mes-hall physics.app-ph

    Synthetic iterative scheme for thermal applications in hotspot systems with large temperature variance

    Authors: Chuang Zhang, Qin Lou, Hong Liang

    Abstract: A synthetic iterative scheme is developed for thermal applications in hotspot systems with large temperature variance. Different from previous work with linearized equilibrium state and small temperature difference assumption, the phonon equilibrium distribution shows a nonlinear relationship with temperature and mean free path changes with the spatial temperature when the temperature difference o… ▽ More

    Submitted 9 July, 2024; v1 submitted 23 January, 2024; originally announced January 2024.

    Comments: 20 pages, 43 figures

    MSC Class: 82D37; 80A05 80A19

  9. arXiv:2312.10508  [pdf, other

    cs.LG

    TrojFair: Trojan Fairness Attacks

    Authors: Mengxin Zheng, Jiaqi Xue, Yi Sheng, Lei Yang, Qian Lou, Lei Jiang

    Abstract: Deep learning models have been incorporated into high-stakes sectors, including healthcare diagnosis, loan approvals, and candidate recruitment, among others. Consequently, any bias or unfairness in these models can harm those who depend on such models. In response, many algorithms have emerged to ensure fairness in deep learning. However, while the potential for harm is substantial, the resilienc… ▽ More

    Submitted 16 December, 2023; originally announced December 2023.

    Comments: 12 pages, 2 figures

  10. arXiv:2312.10467  [pdf, other

    cs.LG

    TrojFSP: Trojan Insertion in Few-shot Prompt Tuning

    Authors: Mengxin Zheng, Jiaqi Xue, Xun Chen, YanShan Wang, Qian Lou, Lei Jiang

    Abstract: Prompt tuning is one of the most effective solutions to adapting a fixed pre-trained language model (PLM) for various downstream tasks, especially with only a few input samples. However, the security issues, e.g., Trojan attacks, of prompt tuning on a few data samples are not well-studied. Transferring established data poisoning attacks directly to few-shot prompt tuning presents multiple challeng… ▽ More

    Submitted 18 March, 2024; v1 submitted 16 December, 2023; originally announced December 2023.

    Comments: 9 pages, 2 figures

  11. arXiv:2310.13855  [pdf, other

    cs.CL cs.AI

    Evoke: Evoking Critical Thinking Abilities in LLMs via Reviewer-Author Prompt Editing

    Authors: Xinyu Hu, Pengfei Tang, Simiao Zuo, Zihan Wang, Bowen Song, Qiang Lou, Jian Jiao, Denis Charles

    Abstract: Large language models (LLMs) have made impressive progress in natural language processing. These models rely on proper human instructions (or prompts) to generate suitable responses. However, the potential of LLMs are not fully harnessed by commonly-used prompting methods: many human-in-the-loop algorithms employ ad-hoc procedures for prompt selection; while auto prompt generation approaches are e… ▽ More

    Submitted 20 October, 2023; originally announced October 2023.

  12. arXiv:2309.11469  [pdf

    cs.AI

    Multi-Label Takagi-Sugeno-Kang Fuzzy System

    Authors: Qiongdan Lou, Zhaohong Deng, Zhiyong Xiao, Kup-Sze Choi, Shitong Wang

    Abstract: Multi-label classification can effectively identify the relevant labels of an instance from a given set of labels. However,the modeling of the relationship between the features and the labels is critical to the classification performance. To this end, we propose a new multi-label classification method, called Multi-Label Takagi-Sugeno-Kang Fuzzy System (ML-TSK FS), to improve the classification pe… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

    Comments: This work has been accepted by IEEE Transactions on Fuzzy Systems

  13. arXiv:2306.17413  [pdf, other

    cs.IR

    DeepTagger: Knowledge Enhanced Named Entity Recognition for Web-Based Ads Queries

    Authors: Simiao Zuo, Pengfei Tang, Xinyu Hu, Qiang Lou, Jian Jiao, Denis Charles

    Abstract: Named entity recognition (NER) is a crucial task for online advertisement. State-of-the-art solutions leverage pre-trained language models for this task. However, three major challenges remain unresolved: web queries differ from natural language, on which pre-trained models are trained; web queries are short and lack contextual information; and labeled data for NER is scarce. We propose DeepTagger… ▽ More

    Submitted 30 June, 2023; originally announced June 2023.

  14. arXiv:2306.06815  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    TrojLLM: A Black-box Trojan Prompt Attack on Large Language Models

    Authors: Jiaqi Xue, Mengxin Zheng, Ting Hua, Yilin Shen, Yepeng Liu, Ladislau Boloni, Qian Lou

    Abstract: Large Language Models (LLMs) are progressively being utilized as machine learning services and interface tools for various applications. However, the security implications of LLMs, particularly in relation to adversarial and Trojan attacks, remain insufficiently examined. In this paper, we propose TrojLLM, an automatic and black-box framework to effectively generate universal and stealthy triggers… ▽ More

    Submitted 30 October, 2023; v1 submitted 11 June, 2023; originally announced June 2023.

    Comments: Accepted by NeurIPS'23

  15. arXiv:2305.09148  [pdf, other

    cs.CL cs.AI

    Dual-Alignment Pre-training for Cross-lingual Sentence Embedding

    Authors: Ziheng Li, Shaohan Huang, Zihan Zhang, Zhi-Hong Deng, Qiang Lou, Haizhen Huang, Jian Jiao, Furu Wei, Weiwei Deng, Qi Zhang

    Abstract: Recent studies have shown that dual encoder models trained with the sentence-level translation ranking task are effective methods for cross-lingual sentence embedding. However, our research indicates that token-level alignment is also crucial in multilingual scenarios, which has not been fully explored previously. Based on our findings, we propose a dual-alignment pre-training (DAP) framework for… ▽ More

    Submitted 15 May, 2023; originally announced May 2023.

    Comments: ACL 2023

  16. arXiv:2303.13679  [pdf, other

    cs.CR

    Primer: Fast Private Transformer Inference on Encrypted Data

    Authors: Mengxin Zheng, Qian Lou, Lei Jiang

    Abstract: It is increasingly important to enable privacy-preserving inference for cloud services based on Transformers. Post-quantum cryptographic techniques, e.g., fully homomorphic encryption (FHE), and multi-party computation (MPC), are popular methods to support private Transformer inference. However, existing works still suffer from prohibitively computational and communicational overhead. In this work… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

    Comments: 6 pages, 6 figures, 3 tables

    Journal ref: 2023 Design Automation Conference

  17. arXiv:2303.09079  [pdf, other

    cs.CR cs.CV cs.LG

    SSL-Cleanse: Trojan Detection and Mitigation in Self-Supervised Learning

    Authors: Mengxin Zheng, Jiaqi Xue, Zihao Wang, Xun Chen, Qian Lou, Lei Jiang, Xiaofeng Wang

    Abstract: Self-supervised learning (SSL) is a prevalent approach for encoding data representations. Using a pre-trained SSL image encoder and subsequently training a downstream classifier, impressive performance can be achieved on various tasks with very little labeled data. The growing adoption of SSL has led to an increase in security research on SSL encoders and associated Trojan attacks. Trojan attacks… ▽ More

    Submitted 7 October, 2023; v1 submitted 16 March, 2023; originally announced March 2023.

    Comments: 9 pages, 6 figures, 4 tables

  18. arXiv:2303.08886  [pdf, other

    cs.CR

    vFHE: Verifiable Fully Homomorphic Encryption with Blind Hash

    Authors: Qian Lou, Muhammad Santriaji, Ardhi Wiratama Baskara Yudha, Jiaqi Xue, Yan Solihin

    Abstract: Fully homomorphic encryption (FHE) is a powerful encryption technique that allows for computation to be performed on ciphertext without the need for decryption. FHE will thus enable privacy-preserving computation and a wide range of applications, such as secure cloud computing on sensitive medical and financial data, secure machine learning, etc. Prior research in FHE has largely concentrated on i… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

    Comments: 8 pages, 5 figures

  19. arXiv:2303.02242  [pdf, other

    cs.CL

    TrojText: Test-time Invisible Textual Trojan Insertion

    Authors: Qian Lou, Yepeng Liu, Bo Feng

    Abstract: In Natural Language Processing (NLP), intelligent neuron models can be susceptible to textual Trojan attacks. Such attacks occur when Trojan models behave normally for standard inputs but generate malicious output for inputs that contain a specific trigger. Syntactic-structure triggers, which are invisible, are becoming more popular for Trojan attacks because they are difficult to detect and defen… ▽ More

    Submitted 21 August, 2023; v1 submitted 3 March, 2023; originally announced March 2023.

    Comments: In The Eleventh International Conference on Learning Representations. 2023 (ICLR 2023)

  20. arXiv:2301.06892  [pdf

    cs.CV cs.AI

    Cooperation Learning Enhanced Colonic Polyp Segmentation Based on Transformer-CNN Fusion

    Authors: Yuanyuan Wang, Zhaohong Deng, Qiongdan Lou, Shudong Hu, Kup-sze Choi, Shitong Wang

    Abstract: Traditional segmentation methods for colonic polyps are mainly designed based on low-level features. They could not accurately extract the location of small colonic polyps. Although the existing deep learning methods can improve the segmentation accuracy, their effects are still unsatisfied. To meet the above challenges, we propose a hybrid network called Fusion-Transformer-HardNetMSEG (i.e., Fu-T… ▽ More

    Submitted 17 January, 2023; originally announced January 2023.

    Comments: This paper has been submitted to a journal

  21. arXiv:2301.03283  [pdf

    cs.AI

    A Robust Multilabel Method Integrating Rule-based Transparent Model, Soft Label Correlation Learning and Label Noise Resistance

    Authors: Qiongdan Lou, Zhaohong Deng, Kup-Sze Choi, Shitong Wang

    Abstract: Model transparency, label correlation learning and the robust-ness to label noise are crucial for multilabel learning. However, few existing methods study these three characteristics simultaneously. To address this challenge, we propose the robust multilabel Takagi-Sugeno-Kang fuzzy system (R-MLTSK-FS) with three mechanisms. First, we design a soft label learning mechanism to reduce the effect of… ▽ More

    Submitted 25 September, 2023; v1 submitted 9 January, 2023; originally announced January 2023.

    Comments: This paper has been accepted by IEEE Transactions on Fuzzy Systems

  22. arXiv:2211.13780  [pdf, other

    cs.CR cs.AR

    CryptoLight: An Electro-Optical Accelerator for Fully Homomorphic Encryption

    Authors: Mengxin Zheng, Qian Lou, Fan Chen, Lei Jiang, Yongxin Zhu

    Abstract: Fully homomorphic encryption (FHE) protects data privacy in cloud computing by enabling computations to directly occur on ciphertexts. To improve the time-consuming FHE operations, we present an electro-optical (EO) FHE accelerator, CryptoLight. Compared to prior FHE accelerators, on average, CryptoLight reduces the latency of various FHE applications by >94.4% and the energy consumption by >95%

    Submitted 27 January, 2023; v1 submitted 24 November, 2022; originally announced November 2022.

    Comments: 2 pages, 2 figures

  23. arXiv:2211.10908  [pdf, other

    cs.CV cs.CR cs.LG

    ESTAS: Effective and Stable Trojan Attacks in Self-supervised Encoders with One Target Unlabelled Sample

    Authors: Jiaqi Xue, Qian Lou

    Abstract: Emerging self-supervised learning (SSL) has become a popular image representation encoding method to obviate the reliance on labeled data and learn rich representations from large-scale, ubiquitous unlabelled data. Then one can train a downstream classifier on top of the pre-trained SSL image encoder with few or no labeled downstream data. Although extensive works show that SSL has achieved remark… ▽ More

    Submitted 24 January, 2023; v1 submitted 20 November, 2022; originally announced November 2022.

    Comments: 10 pages, 7 figures, 6 tables

  24. arXiv:2211.09718  [pdf, other

    cs.CL cs.LG

    Numerical Optimizations for Weighted Low-rank Estimation on Language Model

    Authors: Ting Hua, Yen-Chang Hsu, Felicity Wang, Qian Lou, Yilin Shen, Hongxia Jin

    Abstract: Singular value decomposition (SVD) is one of the most popular compression methods that approximate a target matrix with smaller matrices. However, standard SVD treats the parameters within the matrix with equal importance, which is a simple but unrealistic assumption. The parameters of a trained neural network model may affect task performance unevenly, which suggests non-equal importance among th… ▽ More

    Submitted 15 December, 2022; v1 submitted 1 November, 2022; originally announced November 2022.

    Comments: long paper EMNLP 2022

    Journal ref: Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing

  25. arXiv:2209.09996  [pdf, other

    cs.LG cs.CR

    Audit and Improve Robustness of Private Neural Networks on Encrypted Data

    Authors: Jiaqi Xue, Lei Xu, Lin Chen, Weidong Shi, Kaidi Xu, Qian Lou

    Abstract: Performing neural network inference on encrypted data without decryption is one popular method to enable privacy-preserving neural networks (PNet) as a service. Compared with regular neural networks deployed for machine-learning-as-a-service, PNet requires additional encoding, e.g., quantized-precision numbers, and polynomial activation. Encrypted input also introduces novel challenges such as adv… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

    Comments: 10 pages, 10 figures

  26. arXiv:2208.13049  [pdf, other

    cs.LG cs.CR

    TrojViT: Trojan Insertion in Vision Transformers

    Authors: Mengxin Zheng, Qian Lou, Lei Jiang

    Abstract: Vision Transformers (ViTs) have demonstrated the state-of-the-art performance in various vision-related tasks. The success of ViTs motivates adversaries to perform backdoor attacks on ViTs. Although the vulnerability of traditional CNNs to backdoor attacks is well-known, backdoor attacks on ViTs are seldom-studied. Compared to CNNs capturing pixel-wise local features by convolutions, ViTs extract… ▽ More

    Submitted 14 September, 2023; v1 submitted 27 August, 2022; originally announced August 2022.

    Comments: 10 pages, 4 figures, 11 tables

  27. arXiv:2208.05122  [pdf, other

    eess.AS

    Improving Hypernasality Estimation with Automatic Speech Recognition in Cleft Palate Speech

    Authors: Kaitao Song, Teng Wan, Bixia Wang, Huiqiang Jiang, Luna Qiu, Jiahang Xu, Liping Jiang, Qun Lou, Yuqing Yang, Dongsheng Li, Xudong Wang, Lili Qiu

    Abstract: Hypernasality is an abnormal resonance in human speech production, especially in patients with craniofacial anomalies such as cleft palate. In clinical application, hypernasality estimation is crucial in cleft palate diagnosis, as its results determine the subsequent surgery and additional speech therapy. Therefore, designing an automatic hypernasality assessment method will facilitate speech-lang… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

    Comments: Accepted by InterSpeech 2022

  28. arXiv:2207.00112  [pdf, other

    cs.LG cs.AI cs.CL

    Language model compression with weighted low-rank factorization

    Authors: Yen-Chang Hsu, Ting Hua, Sungen Chang, Qian Lou, Yilin Shen, Hongxia Jin

    Abstract: Factorizing a large matrix into small matrices is a popular strategy for model compression. Singular value decomposition (SVD) plays a vital role in this compression strategy, approximating a learned matrix with fewer parameters. However, SVD minimizes the squared error toward reconstructing the original matrix without gauging the importance of the parameters, potentially giving a larger reconstru… ▽ More

    Submitted 30 June, 2022; originally announced July 2022.

    Comments: ICLR 2022

  29. arXiv:2205.03238  [pdf

    eess.SP cond-mat.mtrl-sci cs.LG

    Ultra-sensitive Flexible Sponge-Sensor Array for Muscle Activities Detection and Human Limb Motion Recognition

    Authors: Jiao Suo, Yifan Liu, Clio Cheng, Keer Wang, Meng Chen, Ho-yin Chan, Roy Vellaisamy, Ning Xi, Vivian W. Q. Lou, Wen Jung Li

    Abstract: Human limb motion tracking and recognition plays an important role in medical rehabilitation training, lower limb assistance, prosthetics design for amputees, feedback control for assistive robots, etc. Lightweight wearable sensors, including inertial sensors, surface electromyography sensors, and flexible strain/pressure, are promising to become the next-generation human motion capture devices. H… ▽ More

    Submitted 29 June, 2022; v1 submitted 30 April, 2022; originally announced May 2022.

    Comments: 17 pages, 6 figures

  30. arXiv:2202.08814  [pdf, other

    cs.CR cs.AR

    MATCHA: A Fast and Energy-Efficient Accelerator for Fully Homomorphic Encryption over the Torus

    Authors: Lei Jiang, Qian Lou, Nrushad Joshi

    Abstract: Fully Homomorphic Encryption over the Torus (TFHE) allows arbitrary computations to happen directly on ciphertexts using homomorphic logic gates. However, each TFHE gate on state-of-the-art hardware platforms such as GPUs and FPGAs is extremely slow ($>0.2ms$). Moreover, even the latest FPGA-based TFHE accelerator cannot achieve high energy efficiency, since it frequently invokes expensive double-… ▽ More

    Submitted 17 February, 2022; originally announced February 2022.

    Comments: 6 pages

    Journal ref: 2022 Design Automation Conference

  31. arXiv:2201.04915  [pdf, ps, other

    physics.flu-dyn physics.comp-ph

    Numerical study of three-dimensional single-mode Rayleigh-Taylor instability in turbulent mixing stage

    Authors: Bin Liu, Chunhua Zhang, Qin Lou, Hong Liang

    Abstract: Rayleigh-Taylor instability (RTI) as a multi-scale, strongly nonlinear physical phenomenon which plays an important role in the engineering applications and scientific research. In this paper, the mesoscopic lattice Boltzmann method is used to numerically study the late-time evolutional mechanism of three-dimensional (3D) single-mode RTI and the influences of extensive dimensionless Reynolds numbe… ▽ More

    Submitted 13 January, 2022; originally announced January 2022.

    Comments: 26 pages, 11 figures. arXiv admin note: text overlap with arXiv:2009.14655

  32. Automatic Mixed-Precision Quantization Search of BERT

    Authors: Changsheng Zhao, Ting Hua, Yilin Shen, Qian Lou, Hongxia Jin

    Abstract: Pre-trained language models such as BERT have shown remarkable effectiveness in various natural language processing tasks. However, these models usually contain millions of parameters, which prevents them from practical deployment on resource-constrained devices. Knowledge distillation, Weight pruning, and Quantization are known to be the main directions in model compression. However, compact mode… ▽ More

    Submitted 30 December, 2021; originally announced December 2021.

    Journal ref: Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, IJCAI, 2021

  33. arXiv:2111.08457  [pdf

    eess.SP cs.LG

    A Novel TSK Fuzzy System Incorporating Multi-view Collaborative Transfer Learning for Personalized Epileptic EEG Detection

    Authors: Andong Li, Zhaohong Deng, Qiongdan Lou, Kup-Sze Choi, Hongbin Shen, Shitong Wang

    Abstract: In clinical practice, electroencephalography (EEG) plays an important role in the diagnosis of epilepsy. EEG-based computer-aided diagnosis of epilepsy can greatly improve the ac-curacy of epilepsy detection while reducing the workload of physicians. However, there are many challenges in practical applications for personalized epileptic EEG detection (i.e., training of detection model for a specif… ▽ More

    Submitted 11 November, 2021; originally announced November 2021.

    Comments: Submitted to IEEE Trans

  34. arXiv:2110.10950  [pdf, other

    quant-ph physics.atom-ph

    Cavity Quantum Electrodynamics Effects with Nitrogen Vacancy Center Spins in Diamond and Microwave Resonators at Room Temperature

    Authors: Yuan Zhang, Qilong Wu, Shi-Lei Su, Qing Lou, ChongXin Shan, Klaus Mølmer

    Abstract: Cavity quantum electrodynamics (C-QED) effects, such as Rabi splitting, Rabi oscillations and superradiance, have been demonstrated with nitrogen vacancy center spins in diamond in microwave resonators at cryogenic temperature. In this article we explore the possibility to realize strong collective coupling and the resulting C-QED effects with ensembles of spins at room temperature. Thermal excita… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

    Comments: 9 pages, 6 figures

  35. arXiv:2110.05610  [pdf

    cs.LG cs.AI

    TSK Fuzzy System Towards Few Labeled Incomplete Multi-View Data Classification

    Authors: Wei Zhang, Zhaohong Deng, Qiongdan Lou, Te Zhang, Kup-Sze Choi, Shitong Wang

    Abstract: Data collected by multiple methods or from multiple sources is called multi-view data. To make full use of the multi-view data, multi-view learning plays an increasingly important role. Traditional multi-view learning methods rely on a large number of labeled and completed multi-view data. However, it is expensive and time-consuming to obtain a large number of labeled multi-view data in real-world… ▽ More

    Submitted 7 December, 2021; v1 submitted 8 October, 2021; originally announced October 2021.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  36. arXiv:2106.11757  [pdf, other

    cs.DC

    Application-driven Design Exploration for Dense Ferroelectric Embedded Non-volatile Memories

    Authors: Mohammad Mehdi Sharifi, Lillian Pentecost, Ramin Rajaei, Arman Kazemi, Qiuwen Lou, Gu-Yeon Wei, David Brooks, Kai Ni, X. Sharon Hu, Michael Niemier, Marco Donato

    Abstract: The memory wall bottleneck is a key challenge across many data-intensive applications. Multi-level FeFET-based embedded non-volatile memories are a promising solution for denser and more energy-efficient on-chip memory. However, reliable multi-level cell storage requires careful optimizations to minimize the design overhead costs. In this work, we investigate the interplay between FeFET device cha… ▽ More

    Submitted 17 June, 2021; originally announced June 2021.

    Comments: Accepted at ISLPED 2021

  37. arXiv:2106.00038  [pdf, other

    cs.CR cs.AI

    HEMET: A Homomorphic-Encryption-Friendly Privacy-Preserving Mobile Neural Network Architecture

    Authors: Qian Lou, Lei Jiang

    Abstract: Recently Homomorphic Encryption (HE) is used to implement Privacy-Preserving Neural Networks (PPNNs) that perform inferences directly on encrypted data without decryption. Prior PPNNs adopt mobile network architectures such as SqueezeNet for smaller computing overhead, but we find naïvely using mobile network architectures for a PPNN does not necessarily achieve shorter inference latency. Despite… ▽ More

    Submitted 31 May, 2021; originally announced June 2021.

    Journal ref: The Thirty-eighth International Conference on Machine Learning 2021

  38. arXiv:2104.02621  [pdf, other

    cs.AI

    How to Accelerate Capsule Convolutions in Capsule Networks

    Authors: Zhenhua Chen, Xiwen Li, Qian Lou, David Crandall

    Abstract: How to improve the efficiency of routing procedures in CapsNets has been studied a lot. However, the efficiency of capsule convolutions has largely been neglected. Capsule convolution, which uses capsules rather than neurons as the basic computation unit, makes it incompatible with current deep learning frameworks' optimization solution. As a result, capsule convolutions are usually very slow with… ▽ More

    Submitted 6 April, 2021; originally announced April 2021.

  39. arXiv:2010.11796  [pdf, other

    cs.CR cs.AI

    CryptoGRU: Low Latency Privacy-Preserving Text Analysis With GRU

    Authors: Bo Feng, Qian Lou, Lei Jiang, Geoffrey C. Fox

    Abstract: Billions of text analysis requests containing private emails, personal text messages, and sensitive online reviews, are processed by recurrent neural networks (RNNs) deployed on public clouds every day. Although prior secure networks combine homomorphic encryption (HE) and garbled circuit (GC) to preserve users' privacy, naively adopting the HE and GC hybrid technique to implement RNNs suffers fro… ▽ More

    Submitted 9 September, 2021; v1 submitted 22 October, 2020; originally announced October 2020.

    Journal ref: The 2021 Conference on Empirical Methods in Natural Language Processing

  40. Physics-informed neural networks for solving forward and inverse flow problems via the Boltzmann-BGK formulation

    Authors: Qin Lou, Xuhui Meng, George Em Karniadakis

    Abstract: In this study, we employ physics-informed neural networks (PINNs) to solve forward and inverse problems via the Boltzmann-BGK formulation (PINN-BGK), enabling PINNs to model flows in both the continuum and rarefied regimes. In particular, the PINN-BGK is composed of three sub-networks, i.e., the first for approximating the equilibrium distribution function, the second for approximating the non-equ… ▽ More

    Submitted 18 October, 2020; originally announced October 2020.

    Comments: 30 pages, 11 figures

  41. arXiv:2008.03107  [pdf, other

    cs.AR cs.ET cs.LG

    Helix: Algorithm/Architecture Co-design for Accelerating Nanopore Genome Base-calling

    Authors: Qian Lou, Sarath Janga, Lei Jiang

    Abstract: Nanopore genome sequencing is the key to enabling personalized medicine, global food security, and virus surveillance. The state-of-the-art base-callers adopt deep neural networks (DNNs) to translate electrical signals generated by nanopore sequencers to digital DNA symbols. A DNN-based base-caller consumes $44.5\%$ of total execution time of a nanopore sequencing pipeline. However, it is difficul… ▽ More

    Submitted 4 August, 2020; originally announced August 2020.

    Comments: 12 pages, 26 figures, The 29th International Conference on Parallel Architectures and Compilation Techniques (PACT'20)

  42. arXiv:2006.04219  [pdf, other

    cs.CR cs.LG

    AutoPrivacy: Automated Layer-wise Parameter Selection for Secure Neural Network Inference

    Authors: Qian Lou, Song Bian, Lei Jiang

    Abstract: Hybrid Privacy-Preserving Neural Network (HPPNN) implementing linear layers by Homomorphic Encryption (HE) and nonlinear layers by Garbled Circuit (GC) is one of the most promising secure solutions to emerging Machine Learning as a Service (MLaaS). Unfortunately, a HPPNN suffers from long inference latency, e.g., $\sim100$ seconds per image, which makes MLaaS unsatisfactory. Because HE-based linea… ▽ More

    Submitted 15 October, 2020; v1 submitted 7 June, 2020; originally announced June 2020.

  43. arXiv:2001.11954  [pdf, other

    eess.SP

    MindReading: An Ultra-Low-Power Photonic Accelerator for EEG-based Human Intention Recognition

    Authors: Qian Lou, Wenyang Liu, Weichen Liu, Feng Guo, Lei Jiang

    Abstract: A scalp-recording electroencephalography (EEG)-based brain-computer interface (BCI) system can greatly improve the quality of life for people who suffer from motor disabilities. Deep neural networks consisting of multiple convolutional, LSTM and fully-connected layers are created to decode EEG signals to maximize the human intention recognition accuracy. However, prior FPGA, ASIC, ReRAM and photon… ▽ More

    Submitted 30 January, 2020; originally announced January 2020.

    Comments: 6 pages, 8 figures

  44. arXiv:1911.07101  [pdf, other

    cs.LG stat.ML

    Glyph: Fast and Accurately Training Deep Neural Networks on Encrypted Data

    Authors: Qian Lou, Bo Feng, Geoffrey C. Fox, Lei Jiang

    Abstract: Big data is one of the cornerstones to enabling and training deep neural networks (DNNs). Because of the lack of expertise, to gain benefits from their data, average users have to rely on and upload their private data to big data companies they may not trust. Due to the compliance, legal, or privacy constraints, most users are willing to contribute only their encrypted data, and lack interests or… ▽ More

    Submitted 21 October, 2020; v1 submitted 16 November, 2019; originally announced November 2019.

    Comments: 10 pages, 34th Conference on Neural Information Processing Systems (NeurIPS 2020), Vancouver, Canada

  45. arXiv:1911.00139  [pdf, ps, other

    cs.NE cs.LG

    Device-Circuit-Architecture Co-Exploration for Computing-in-Memory Neural Accelerators

    Authors: Weiwen Jiang, Qiuwen Lou, Zheyu Yan, Lei Yang, Jingtong Hu, Xiaobo Sharon Hu, Yiyu Shi

    Abstract: Co-exploration of neural architectures and hardware design is promising to simultaneously optimize network accuracy and hardware efficiency. However, state-of-the-art neural architecture search algorithms for the co-exploration are dedicated for the conventional von-neumann computing architecture, whose performance is heavily limited by the well-known memory wall. In this paper, we are the first t… ▽ More

    Submitted 20 March, 2020; v1 submitted 31 October, 2019; originally announced November 2019.

    Comments: 10 pages, 6 figures

  46. arXiv:1906.00148  [pdf, other

    cs.CR cs.LG

    SHE: A Fast and Accurate Deep Neural Network for Encrypted Data

    Authors: Qian Lou, Lei Jiang

    Abstract: Homomorphic Encryption (HE) is one of the most promising security solutions to emerging Machine Learning as a Service (MLaaS). Leveled-HE (LHE)-enabled Convolutional Neural Networks (LHECNNs) are proposed to implement MLaaS to avoid large bootstrapping overhead. However, prior LHECNNs have to pay significant computing overhead but achieve only low inference accuracy, due to their polynomial approx… ▽ More

    Submitted 16 November, 2019; v1 submitted 31 May, 2019; originally announced June 2019.

    Comments: 8 pages, 4 figures

  47. arXiv:1905.12679  [pdf, other

    cs.ET cs.NE

    Nonvolatile Spintronic Memory Cells for Neural Networks

    Authors: Andrew W. Stephan, Qiuwen Lou, Michael Niemier, X. Sharon Hu, Steven J. Koester

    Abstract: A new spintronic nonvolatile memory cell analogous to 1T DRAM with non-destructive read is proposed. The cells can be used as neural computing units. A dual-circuit neural network architecture is proposed to leverage these devices against the complex operations involved in convolutional networks. Simulations based on HSPICE and Matlab were performed to study the performance of this architecture wh… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

  48. arXiv:1903.06649  [pdf, other

    cs.ET cs.CV cs.DC

    Application-level Studies of Cellular Neural Network-based Hardware Accelerators

    Authors: Qiuwen Lou, Indranil Palit, Tang Li, Andras Horvath, Michael Niemier, X. Sharon Hu

    Abstract: As cost and performance benefits associated with Moore's Law scaling slow, researchers are studying alternative architectures (e.g., based on analog and/or spiking circuits) and/or computational models (e.g., convolutional and recurrent neural networks) to perform application-level tasks faster, more energy efficiently, and/or more accurately. We investigate cellular neural network (CeNN)-based co… ▽ More

    Submitted 12 June, 2019; v1 submitted 28 February, 2019; originally announced March 2019.

  49. arXiv:1902.05690  [pdf, other

    cs.LG stat.ML

    AutoQ: Automated Kernel-Wise Neural Network Quantization

    Authors: Qian Lou, Feng Guo, Lantao Liu, Minje Kim, Lei Jiang

    Abstract: Network quantization is one of the most hardware friendly techniques to enable the deployment of convolutional neural networks (CNNs) on low-power mobile devices. Recent network quantization techniques quantize each weight kernel in a convolutional layer independently for higher inference accuracy, since the weight kernels in a layer exhibit different variances and hence have different amounts of… ▽ More

    Submitted 7 February, 2020; v1 submitted 15 February, 2019; originally announced February 2019.

    Comments: 10 pages, 12 figures

  50. arXiv:1811.12500  [pdf, other

    cs.LG cs.IR stat.ML

    Sequential Embedding Induced Text Clustering, a Non-parametric Bayesian Approach

    Authors: Tiehang Duan, Qi Lou, Sargur N. Srihari, Xiaohui Xie

    Abstract: Current state-of-the-art nonparametric Bayesian text clustering methods model documents through multinomial distribution on bags of words. Although these methods can effectively utilize the word burstiness representation of documents and achieve decent performance, they do not explore the sequential information of text and relationships among synonyms. In this paper, the documents are modeled as t… ▽ More

    Submitted 29 November, 2018; originally announced November 2018.