Jian Lou

ORCID: 0000-0002-4110-2068
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Adversarial Robustness in Machine Learning
  • Video Coding and Compression Technologies
  • Tensor decomposition and applications
  • Advanced Data Compression Techniques
  • Advanced Neural Network Applications
  • Stochastic Gradient Optimization Techniques
  • Cryptography and Data Security
  • Topic Modeling
  • Image and Video Quality Assessment
  • Sparse and Compressive Sensing Techniques
  • Anomaly Detection Techniques and Applications
  • Mobile Crowdsensing and Crowdsourcing
  • Advanced Vision and Imaging
  • Internet Traffic Analysis and Secure E-voting
  • Game Theory and Applications
  • Auction Theory and Applications
  • Game Theory and Voting Systems
  • Advanced Malware Detection Techniques
  • Machine Learning in Healthcare
  • Face and Expression Recognition
  • Domain Adaptation and Few-Shot Learning
  • Natural Language Processing Techniques
  • Explainable Artificial Intelligence (XAI)
  • Privacy, Security, and Data Protection

Sun Yat-sen University
2025

Shanghai Jiao Tong University
2023-2024

Zhejiang University
2002-2024

Xidian University
2021-2024

Zhejiang University of Science and Technology
2023-2024

Nanjing University of Aeronautics and Astronautics
2022-2023

Northeastern University
2009-2023

Guangzhou University
2023

Wenzhou Medical University
2022

China Mobile (China)
2022

Prompts have significantly improved the performance of pre-trained Large Language Models (LLMs) on various downstream tasks recently, making them increasingly indispensable for a diverse range LLM application scenarios. However, backdoor vulnerability, serious security threat that can maliciously alter victim model's normal predictions, has not been sufficiently explored prompt-based LLMs. In this paper, we present PoisonPrompt, novel attack capable successfully compromising both hard and...

10.1109/icassp48485.2024.10446267 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2024-03-18

Data-driven machine learning has become ubiquitous. A marketplace for models connects data owners and model buyers, can dramatically facilitate data-driven applications. In this paper, we take a formal perspective propose the first en<u> D </u>-to-end mod <u>e</u> l m <u>a</u> rketp <u>l</u> ace with diff rential p <u>r</u> ivacy ( Dealer ) towards answering following questions: How to formulate owners' compensation functions...

10.14778/3447689.3447700 article EN Proceedings of the VLDB Endowment 2021-02-01

Tensor factorization has been demonstrated as an efficient approach for computational phenotyping, where massive electronic health records (EHRs) are converted to concise and meaningful clinical concepts. While distributing the tensor tasks local sites can avoid direct data sharing, it still requires exchange of intermediary results which could reveal sensitive patient information. Therefore, challenge is how jointly decompose under rigorous principled privacy constraints, while support...

10.1145/3357384.3357878 preprint EN 2019-11-03

Federated Learning (FL) is a promising framework for multiple clients to learn joint model without directly sharing the data. In addition high utility of model, rigorous privacy protection data and communication efficiency are important design goals. Many existing efforts achieve by ensuring differential intermediate parameters, however, they assume uniform parameter all clients. practice, different may have requirements due varying policies or preferences. this paper, we focus on explicitly...

10.14778/3503585.3503592 article EN Proceedings of the VLDB Endowment 2021-12-01

10.1109/sp54263.2024.00209 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2024-05-19

Large Language Models (LLMs) have showcased remarkable capabilities across various domains. Accompanying the evolving and expanding deployment scenarios of LLMs, their challenges escalate due to sheer scale advanced yet complex activation designs prevalent in notable model series, such as Llama, Gemma, Mistral. These become particularly pronounced resource-constrained scenarios, where mitigating inference efficiency bottlenecks is imperative. Among recent efforts, approximation has emerged a...

10.48550/arxiv.2502.00840 preprint EN arXiv (Cornell University) 2025-02-02

Safety alignment is critical in pre-training large language models (LLMs) to generate responses aligned with human values and refuse harmful queries. Unlike LLM, the current safety of VLMs often achieved post-hoc fine-tuning. However, these methods are less effective white-box attacks. To address this, we propose $\textit{Adversary-aware DPO (ADPO)}$, a novel training framework that explicitly considers adversarial. (ADPO)}$ integrates adversarial into enhance under worst-case perturbations....

10.48550/arxiv.2502.11455 preprint EN arXiv (Cornell University) 2025-02-17

Current Stackelberg security game models primarily focus on isolated systems in which only one defender is present, despite being part of a more complex system with multiple players. However, many real such as transportation networks and the power grid exhibit interdependencies among targets and, consequently, between decision makers jointly charged protecting them. To understand multidefender strategic interactions present scenarios, authors investigate games defenders. Unlike most prior...

10.1109/mis.2017.11 article EN IEEE Intelligent Systems 2017-01-01

Modern healthcare systems knitted by a web of entities (e.g., hospitals, clinics, pharmacy companies) are collecting huge volume data from large number individuals with various medical procedures, medications, diagnosis, and lab tests. To extract meaningful concepts (i.e., phenotypes) such higher-arity relational data, tensor factorization has been proven to be an effective approach received increasing research attention, due their intrinsic capability represent the high-dimensional data....

10.1145/3442381.3449832 article EN 2021-04-19

Tensor singular value decomposition (t-SVD) has recently become increasingly popular for tensor recovery under partial and/or corrupted observations. However, the existing t -SVD-based methods neither make use of a rank prior nor provide an accurate estimation (RE), which would limit their performance. From practical perspective, RE problem is nontrivial and difficult to solve. In this article, we, therefore, aim determine correct intrinsic low-rank from observations based on t-SVD further...

10.1109/tcyb.2021.3067676 article EN IEEE Transactions on Cybernetics 2021-04-20

The robustness and security of natural language processing (NLP) models are significantly important in real-world applications. In the context text classification tasks, adversarial examples can be designed by substituting words with synonyms under certain semantic syntactic constraints, such that a well-trained model will give wrong prediction. Therefore, it is crucial to develop techniques provide rigorous provable guarantee against attacks. this paper, we propose WordDP achieve certified...

10.18653/v1/2021.naacl-main.87 article EN cc-by Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies 2021-01-01

Machine unlearning is an emerging task of removing the influence selected training datapoints from a trained model upon data deletion requests, which echoes widely enforced regulations mandating Right to be Forgotten. Many methods have been proposed recently, achieving significant efficiency gains over naive baseline retraining scratch. However, existing focus exclusively on standard models and do not apply adversarial (ATMs) despite their popularity as effective defenses against examples....

10.1109/iccv51070.2023.00451 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2023-10-01

10.1016/j.engappai.2024.107858 article EN Engineering Applications of Artificial Intelligence 2024-01-18

Top-k frequent items detection is a fundamental task in data stream mining. Many promising solutions are proposed to improve memory efficiency while still maintaining high accuracy for detecting the items. Despite concern, users could suffer from privacy loss if participating without proper protection, since their contributed local streams may continually leak sensitive individual information. However, most existing works solely focus on addressing either memory-efficiency problem or...

10.1145/3639285 article EN Proceedings of the ACM on Management of Data 2024-03-12

10.1109/cvpr52733.2024.01210 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2024-06-16

Over the past years, Machine Learning-as-a-Service (MLaaS) has received a surging demand for supporting Learning-driven services to offer revolutionized user experience across diverse application areas. MLaaS provides inference service with low latency based on an ML model trained using dataset collected from numerous individual data owners. Recently, sake of owners' privacy and comply "right be forgotten (RTBF)" as enacted by protection legislation, many machine unlearning methods have been...

10.1145/3658644.3670398 article EN 2024-12-02

Spear-phishing attacks pose a serious threat to sensitive computer systems, since they sidestep technical security mechanisms by exploiting the carelessness of authorized users. A common way mitigate such is use e-mail filters which block e-mails with maliciousness score above chosen threshold. Optimal choice threshold involves tradeoff between risk from delivered malicious emails and cost blocking benign traffic. further complicating factor strategic nature an attacker, who may selectively...

10.1609/aaai.v30i1.10020 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2016-02-21

Single sample per person face recognition (SSPP FR), i.e., identifying a (i.e., data subject) with single image only for training, has several attractive potential applications, but it is still challenging problem. Existing generic learning methods usually leverage prototype plus variation (P+V) model SSPP FR provided that samples in the biometric enrolment database are variation-free and thus can be treated as prototypes of subjects. However, this condition not satisfied when these...

10.1109/tifs.2019.2919950 article EN IEEE Transactions on Information Forensics and Security 2019-05-30

ABSTRACT BACKGROUND The COVID-19 epidemic, first emerged in Wuhan during December 2019, has spread globally. While the mass population movement for Chinese New Year significantly influenced spreading disease, little direct evidence exists about relevance to epidemic and its control of from Wuhan, local emergency response, medical resources China. METHODS Spearman’s correlation analysis was performed between official data confirmed cases Jan 20 th Feb 19 , 2020 real-time travel health data....

10.1101/2020.02.24.20027623 preprint EN cc-by-nc-nd medRxiv (Cold Spring Harbor Laboratory) 2020-02-27

As an important perceptual characteristic of the Human Visual System (HVS), Just Noticeable Difference (JND) has been studied for decades with image and video processing (e.g., visual signal compression). However, there is little exploration on existence JND Deep Machine Vision (DMV), although DMV made great strides in many machine vision tasks. In this paper, we take initial attempt, demonstrate that JND, termed as DMV-JND. We then propose a model classification task DMV. It discovered can...

10.1109/tcsvt.2021.3113572 article EN IEEE Transactions on Circuits and Systems for Video Technology 2021-09-16

Federated learning is a prominent framework that enables clients (e.g., mobile devices or organizations) to collaboratively train global model under central server's orchestration while keeping local data private. However, the aggregation step in federated vulnerable adversarial attacks as server cannot enforce clients' behavior. As result, performance of and convergence training process can be affected such attacks. To mitigate this vulnerability, existing works have proposed robust methods...

10.1145/3511808.3557439 article EN Proceedings of the 31st ACM International Conference on Information & Knowledge Management 2022-10-16

Recently, based on a new tensor algebraic framework for third-order tensors, the singular value decomposition (t-SVD) and its associated tubal rank definition have shed light low-rank modeling. Its applications to robust image/video recovery background modeling show promising performance due superior capability in cross-channel/frame information. Under t-SVD framework, we propose norm called spectral k-support (TSP-k) by an alternative convex relaxation. As interpolation between existing...

10.1109/tip.2019.2946445 article EN IEEE Transactions on Image Processing 2019-10-15

Rationale: Coronavirus disease 2019 (COVID-19) has caused a global pandemic.A classifier combining chest X-ray (CXR) with clinical features may serve as rapid screening approach.Methods: The study included 512 patients COVID-19 and 106 influenza A/B pneumonia.A deep neural network (DNN) was applied, derived from CXR findings formed fused for diagnosis prediction. Results:The of showed different patterns.Patients experienced less fever, more diarrhea, salient hypercoagulability.Classifiers...

10.7150/ijbs.53982 article EN cc-by-nc International Journal of Biological Sciences 2021-01-01
Coming Soon ...