Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–27 of 27 results for author: Liu, J K

.
  1. arXiv:2407.10737  [pdf, other

    cs.CV cs.AI

    Aligning Neuronal Coding of Dynamic Visual Scenes with Foundation Vision Models

    Authors: Rining Wu, Feixiang Zhou, Ziwei Yin, Jian K. Liu

    Abstract: Our brains represent the ever-changing environment with neurons in a highly dynamic fashion. The temporal features of visual pixels in dynamic natural scenes are entrapped in the neuronal responses of the retina. It is crucial to establish the intrinsic temporal relationship between visual pixels and neuronal responses. Recent foundation vision models have paved an advanced way of understanding im… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

    Comments: This article is accepted by ECCV 2024, which ID is 12149. Accepted papers' id can be found in: https://eccv2024.ecva.net/Conferences/2024/AcceptedPapers

  2. arXiv:2407.08969  [pdf, ps, other

    cs.CR

    Detect Llama -- Finding Vulnerabilities in Smart Contracts using Large Language Models

    Authors: Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du

    Abstract: In this paper, we test the hypothesis that although OpenAI's GPT-4 performs well generally, we can fine-tune open-source models to outperform GPT-4 in smart contract vulnerability detection. We fine-tune two models from Meta's Code Llama and a dataset of 17k prompts, Detect Llama - Foundation and Detect Llama - Instruct, and we also fine-tune OpenAI's GPT-3.5 Turbo model (GPT-3.5FT). We then evalu… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

  3. arXiv:2405.12645  [pdf, other

    q-bio.NC

    Implementing feature binding through dendritic networks of a single neuron

    Authors: Yuanhong Tang, Shanshan Jia, Tiejun Huang, Zhaofei Yu, Jian K. Liu

    Abstract: A single neuron receives an extensive array of synaptic inputs through its dendrites, raising the fundamental question of how these inputs undergo integration and summation, culminating in the initiation of spikes in the soma. Experimental and computational investigations have revealed various modes of integration operations that include linear, superlinear, and sublinear summation. Interestingly,… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

  4. arXiv:2404.17456  [pdf, other

    cs.NE

    Converting High-Performance and Low-Latency SNNs through Explicit Modelling of Residual Error in ANNs

    Authors: Zhipeng Huang, Jianhao Ding, Zhiyu Pan, Haoran Li, Ying Fang, Zhaofei Yu, Jian K. Liu

    Abstract: Spiking neural networks (SNNs) have garnered interest due to their energy efficiency and superior effectiveness on neuromorphic chips compared with traditional artificial neural networks (ANNs). One of the mainstream approaches to implementing deep SNNs is the ANN-SNN conversion, which integrates the efficient training strategy of ANNs with the energy-saving potential and fast inference capability… ▽ More

    Submitted 26 April, 2024; originally announced April 2024.

  5. arXiv:2401.03639  [pdf, ps, other

    q-bio.NC cs.AI cs.CV cs.LG

    Deep Learning for Visual Neuroprosthesis

    Authors: Peter Beech, Shanshan Jia, Zhaofei Yu, Jian K. Liu

    Abstract: The visual pathway involves complex networks of cells and regions which contribute to the encoding and processing of visual information. While some aspects of visual perception are understood, there are still many unanswered questions regarding the exact mechanisms of visual encoding and the organization of visual information along the pathway. This chapter discusses the importance of visual perce… ▽ More

    Submitted 7 January, 2024; originally announced January 2024.

  6. arXiv:2306.05654  [pdf, other

    q-bio.NC cs.NE

    Spike timing reshapes robustness against attacks in spiking neural networks

    Authors: Jianhao Ding, Zhaofei Yu, Tiejun Huang, Jian K. Liu

    Abstract: The success of deep learning in the past decade is partially shrouded in the shadow of adversarial attacks. In contrast, the brain is far more robust at complex cognitive tasks. Utilizing the advantage that neurons in the brain communicate via spikes, spiking neural networks (SNNs) are emerging as a new type of neural network model, boosting the frontier of theoretical investigation and empirical… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

  7. arXiv:2306.03693  [pdf, other

    cs.NE cs.AI

    ESL-SNNs: An Evolutionary Structure Learning Strategy for Spiking Neural Networks

    Authors: Jiangrong Shen, Qi Xu, Jian K. Liu, Yueming Wang, Gang Pan, Huajin Tang

    Abstract: Spiking neural networks (SNNs) have manifested remarkable advantages in power consumption and event-driven property during the inference process. To take full advantage of low power consumption and improve the efficiency of these models further, the pruning methods have been explored to find sparse SNNs without redundancy connections after training. However, parameter redundancy still hinders the… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

  8. arXiv:2304.09500  [pdf, other

    cs.NE cs.AI

    Biologically inspired structure learning with reverse knowledge distillation for spiking neural networks

    Authors: Qi Xu, Yaxin Li, Xuanye Fang, Jiangrong Shen, Jian K. Liu, Huajin Tang, Gang Pan

    Abstract: Spiking neural networks (SNNs) have superb characteristics in sensory information recognition tasks due to their biological plausibility. However, the performance of some current spiking-based models is limited by their structures which means either fully connected or too-deep structures bring too much redundancy. This redundancy from both connection and neurons is one of the key factors hindering… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

  9. arXiv:2304.05627  [pdf, other

    cs.NE cs.AI

    Constructing Deep Spiking Neural Networks from Artificial Neural Networks with Knowledge Distillation

    Authors: Qi Xu, Yaxin Li, Jiangrong Shen, Jian K Liu, Huajin Tang, Gang Pan

    Abstract: Spiking neural networks (SNNs) are well known as the brain-inspired models with high computing efficiency, due to a key component that they utilize spikes as information units, close to the biological neural systems. Although spiking based models are energy efficient by taking advantage of discrete spike signals, their performance is limited by current network structures and their training methods… ▽ More

    Submitted 16 April, 2023; v1 submitted 12 April, 2023; originally announced April 2023.

  10. arXiv:2210.13225  [pdf, other

    cs.NE cs.LG q-bio.NC

    Biologically Plausible Variational Policy Gradient with Spiking Recurrent Winner-Take-All Networks

    Authors: Zhile Yang, Shangqi Guo, Ying Fang, Jian K. Liu

    Abstract: One stream of reinforcement learning research is exploring biologically plausible models and algorithms to simulate biological intelligence and fit neuromorphic hardware. Among them, reward-modulated spike-timing-dependent plasticity (R-STDP) is a recent branch with good potential in energy efficiency. However, current R-STDP methods rely on heuristic designs of local learning rules, thus requirin… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: Accepted to BMVC 2022

  11. arXiv:2003.06103  [pdf, other

    cs.CR

    ShieldDB: An Encrypted Document Database with Padding Countermeasures

    Authors: Viet Vo, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Surya Nepal, Cong Wang

    Abstract: The security of our data stores is underestimated in current practice, which resulted in many large-scale data breaches. To change the status quo, this paper presents the design of ShieldDB, an encrypted document database. ShieldDB adapts the searchable encryption technique to preserve the search functionality over encrypted documents without having much impact on its scalability. However, merely… ▽ More

    Submitted 5 November, 2021; v1 submitted 13 March, 2020; originally announced March 2020.

    Comments: Accepted version of our work published in IEEE Transactions on Knowledge and Data Engineering (TKDE, 2021)

  12. arXiv:2001.04064  [pdf, other

    q-bio.NC

    Towards the Next Generation of Retinal Neuroprosthesis: Visual Computation with Spikes

    Authors: Zhaofei Yu, Jian K. Liu, Shanshan Jia, Yichen Zhang, Yajing Zheng, Yonghong Tian, Tiejun Huang

    Abstract: Neuroprosthesis, as one type of precision medicine device, is aiming for manipulating neuronal signals of the brain in a closed-loop fashion, together with receiving stimulus from the environment and controlling some part of our brain/body. In terms of vision, incoming information can be processed by the brain in millisecond interval. The retina computes visual scenes and then sends its output as… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

    Comments: 15 pages, 5 figures

    Journal ref: published 2019

  13. arXiv:2001.03743  [pdf, other

    cs.CR cs.DS

    Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution

    Authors: Viet Vo, Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Surya Nepal, Joseph K. Liu

    Abstract: Searchable encryption (SE) is one of the key enablers for building encrypted databases. It allows a cloud server to search over encrypted data without decryption. Dynamic SE additionally includes data addition and deletion operations to enrich the functions of encrypted databases. Recent attacks exploiting the leakage in dynamic operations drive rapid development of new SE schemes revealing less i… ▽ More

    Submitted 9 April, 2020; v1 submitted 11 January, 2020; originally announced January 2020.

    Comments: SGX-based dynamic SSE protocol with Forward and Backward Privacy

  14. Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes

    Authors: Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu

    Abstract: Network Function Virtualisation (NFV) advances the adoption of composable software middleboxes. Accordingly, cloud data centres become major NFV vendors for enterprise traffic processing. Due to the privacy concern of traffic redirection to the cloud, secure middlebox systems (e.g., BlindBox) draw much attention; they can process encrypted packets against encrypted rules directly. However, most of… ▽ More

    Submitted 21 March, 2021; v1 submitted 6 January, 2020; originally announced January 2020.

    Comments: Accepted version of our work published in IEEE Transactions on Dependable and Secure Computing (TDSC, 2021)

  15. Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets

    Authors: Shangqi Lai, Xingliang Yuan, Amin Sakzad, Mahsa Salehi, Joseph K. Liu, Dongxi Liu

    Abstract: Outlier detection is widely used in practice to track the anomaly on incremental datasets such as network traffic and system logs. However, these datasets often involve sensitive information, and sharing the data to third parties for anomaly detection raises privacy concerns. In this paper, we present a privacy-preserving outlier detection protocol (PPOD) for incremental datasets. The protocol dec… ▽ More

    Submitted 13 November, 2019; originally announced November 2019.

    Comments: To appear in IEEE Internet of Things Journal

  16. arXiv:1907.03720  [pdf, other

    cs.CR

    Catfish Effect Between Internal and External Attackers:Being Semi-honest is Helpful

    Authors: Hanqing Liu, Na Ruan, Joseph K. Liu

    Abstract: The consensus protocol named proof of work (PoW) is widely applied by cryptocurrencies like Bitcoin. Although security of a PoW cryptocurrency is always the top priority, it is threatened by mining attacks like selfish mining. Researchers have proposed many mining attack models with one attacker, and optimized the attacker's strategy. During these mining attacks, an attacker pursues a higher relat… ▽ More

    Submitted 19 June, 2019; originally announced July 2019.

    Comments: 14pages; Blockchain;

  17. arXiv:1905.08561  [pdf, other

    cs.CR

    Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy

    Authors: Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk

    Abstract: Dynamic searchable symmetric encryption (DSSE) is a useful cryptographic tool in encrypted cloud storage. However, it has been reported that DSSE usually suffers from file-injection attacks and content leak of deleted documents. To mitigate these attacks, forward privacy and backward privacy have been proposed. Nevertheless, the existing forward/backward-private DSSE schemes can only support singl… ▽ More

    Submitted 21 May, 2019; originally announced May 2019.

    Comments: ESORICS 2018

  18. GraphSE$^2$: An Encrypted Graph Database for Privacy-Preserving Social Search

    Authors: Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu

    Abstract: In this paper, we propose GraphSE$^2$, an encrypted graph database for online social network services to address massive data breaches. GraphSE$^2$ preserves the functionality of social search, a key enabler for quality social network services, where social search queries are conducted on a large-scale social graph and meanwhile perform set and computational operations on user-generated contents.… ▽ More

    Submitted 15 May, 2019; v1 submitted 11 May, 2019; originally announced May 2019.

    Comments: This is the full version of our AsiaCCS paper "GraphSE$^2$: An Encrypted Graph Database for Privacy-Preserving Social Search". It includes the security proof of the proposed scheme. If you want to cite our work, please cite the conference version of it

  19. Coding Capacity of Purkinje Cells with Different Schemes of Morphological Reduction

    Authors: Lingling An, Yuanhong Tang, Quan Wang, Qingqi Pei, Ran Wei, Huiyuan Duan, Jian K. Liu

    Abstract: The brain as a neuronal system has very complex structure with large diversity of neuronal types. The most basic complexity is seen from the structure of neuronal morphology, which usually has a complex tree-like structure with dendritic spines distributed in branches. For simulating a large-scale network with spiking neurons, the simple point neuron, such as integrate-and-fire neuron, is often us… ▽ More

    Submitted 25 April, 2019; originally announced May 2019.

    Comments: In Press. Front. Comput. Neurosci. | doi: 10.3389/fncom.2019.00029

  20. arXiv:1904.13007  [pdf, other

    q-bio.NC cs.LG stat.ML

    Reconstruction of Natural Visual Scenes from Neural Spikes with Deep Neural Networks

    Authors: Yichen Zhang, Shanshan Jia, Yajing Zheng, Zhaofei Yu, Yonghong Tian, Siwei Ma, Tiejun Huang, Jian K. Liu

    Abstract: Neural coding is one of the central questions in systems neuroscience for understanding how the brain processes stimulus from the environment, moreover, it is also a cornerstone for designing algorithms of brain-machine interface, where decoding incoming stimulus is highly demanded for better performance of physical devices. Traditionally researchers have focused on functional magnetic resonance i… ▽ More

    Submitted 28 January, 2020; v1 submitted 29 April, 2019; originally announced April 2019.

    Comments: 35 pages, 10 figures

    ACM Class: I.2.6

  21. arXiv:1902.08411  [pdf, other

    q-bio.NC cs.LG stat.ML

    Probabilistic Inference of Binary Markov Random Fields in Spiking Neural Networks through Mean-field Approximation

    Authors: Yajing Zheng, Shanshan Jia, Zhaofei Yu, Tiejun Huang, Jian K. Liu, Yonghong Tian

    Abstract: Recent studies have suggested that the cognitive process of the human brain is realized as probabilistic inference and can be further modeled by probabilistic graphical models like Markov random fields. Nevertheless, it remains unclear how probabilistic inference can be implemented by a network of spiking neurons in the brain. Previous studies have tried to relate the inference equation of binary… ▽ More

    Submitted 12 March, 2020; v1 submitted 22 February, 2019; originally announced February 2019.

    Comments: Accepted in Neural Networks

  22. arXiv:1811.02290  [pdf, other

    q-bio.NC cs.LG

    Revealing Fine Structures of the Retinal Receptive Field by Deep Learning Networks

    Authors: Qi Yan, Yajing Zheng, Shanshan Jia, Yichen Zhang, Zhaofei Yu, Feng Chen, Yonghong Tian, Tiejun Huang, Jian K. Liu

    Abstract: Deep convolutional neural networks (CNNs) have demonstrated impressive performance on many visual tasks. Recently, they became useful models for the visual system in neuroscience. However, it is still not clear what are learned by CNNs in terms of neuronal circuits. When a deep CNN with many layers is used for the visual system, it is not easy to compare the structure components of CNNs with possi… ▽ More

    Submitted 18 February, 2020; v1 submitted 6 November, 2018; originally announced November 2018.

    Comments: updated version

  23. arXiv:1808.03958  [pdf, ps, other

    q-bio.NC cs.LG cs.NE stat.ML

    Neural System Identification with Spike-triggered Non-negative Matrix Factorization

    Authors: Shanshan Jia, Zhaofei Yu, Arno Onken, Yonghong Tian, Tiejun Huang, Jian K. Liu

    Abstract: Neuronal circuits formed in the brain are complex with intricate connection patterns. Such complexity is also observed in the retina as a relatively simple neuronal circuit. A retinal ganglion cell receives excitatory inputs from neurons in previous layers as driving forces to fire spikes. Analytical methods are required that can decipher these components in a systematic manner. Recently a method… ▽ More

    Submitted 1 March, 2020; v1 submitted 12 August, 2018; originally announced August 2018.

    Comments: updated version

  24. arXiv:1808.00675  [pdf, other

    q-bio.NC cs.NE

    Winner-Take-All as Basic Probabilistic Inference Unit of Neuronal Circuits

    Authors: Zhaofei Yu, Yonghong Tian, Tiejun Huang, Jian K. Liu

    Abstract: Experimental observations of neuroscience suggest that the brain is working a probabilistic way when computing information with uncertainty. This processing could be modeled as Bayesian inference. However, it remains unclear how Bayesian inference could be implemented at the level of neuronal circuits of the brain. In this study, we propose a novel general-purpose neural implementation of probabil… ▽ More

    Submitted 2 August, 2018; originally announced August 2018.

    Comments: 10 pages, 4 figures

  25. arXiv:1806.05882  [pdf, other

    cs.CV eess.IV q-bio.NC

    A simple blind-denoising filter inspired by electrically coupled photoreceptors in the retina

    Authors: Yang Yue, Liuyuan He, Gan He, Jian. K. Liu, Kai Du, Yonghong Tian, Tiejun Huang

    Abstract: Photoreceptors in the retina are coupled by electrical synapses called "gap junctions". It has long been established that gap junctions increase the signal-to-noise ratio of photoreceptors. Inspired by electrically coupled photoreceptors, we introduced a simple filter, the PR-filter, with only one variable. On BSD68 dataset, PR-filter showed outstanding performance in SSIM during blind denoising t… ▽ More

    Submitted 27 August, 2018; v1 submitted 15 June, 2018; originally announced June 2018.

    Comments: 16 pages, 8 figures, 9 tables, Submitted to NIPS 2018

  26. Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications

    Authors: Mark Huasong Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo, Yu Wang

    Abstract: The number of Android smartphone and tablet users has experienced a rapid growth in the past few years and it raises users' awareness on the privacy and security of their mobile devices. The features of openness and extensibility make Android unique, attractive and competitive but meanwhile vulnerable to malicious attack. There are lots of users rooting their Android devices for some useful functi… ▽ More

    Submitted 1 November, 2022; v1 submitted 12 April, 2018; originally announced April 2018.

    Comments: 13 pages

  27. arXiv:1711.02837  [pdf, ps, other

    stat.ML cs.CV q-bio.NC

    Revealing structure components of the retina by deep learning networks

    Authors: Qi Yan, Zhaofei Yu, Feng Chen, Jian K. Liu

    Abstract: Deep convolutional neural networks (CNNs) have demonstrated impressive performance on visual object classification tasks. In addition, it is a useful model for predication of neuronal responses recorded in visual system. However, there is still no clear understanding of what CNNs learn in terms of visual neuronal circuits. Visualizing CNN's features to obtain possible connections to neuronscience… ▽ More

    Submitted 8 November, 2017; originally announced November 2017.

    Comments: Presented at NIPS 2017 Symposium on Interpretable Machine Learning