Bingyan Liu

ORCID: 0000-0003-2613-9863
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Adversarial Robustness in Machine Learning
  • Domain Adaptation and Few-Shot Learning
  • Multimodal Machine Learning Applications
  • Generative Adversarial Networks and Image Synthesis
  • Cryptography and Data Security
  • Advanced Neural Network Applications
  • Internet Traffic Analysis and Secure E-voting
  • Traffic Prediction and Management Techniques
  • Reinforcement Learning in Robotics
  • Crystallization and Solubility Studies
  • Human Mobility and Location-Based Analysis
  • Software Testing and Debugging Techniques
  • Computer Graphics and Visualization Techniques
  • Metaheuristic Optimization Algorithms Research
  • Security and Verification in Computing
  • Mobile Crowdsensing and Crowdsourcing
  • E-commerce and Technology Innovations
  • X-ray Diffraction in Crystallography
  • Adaptive Dynamic Programming Control
  • Molecular Junctions and Nanostructures
  • Software Engineering Research
  • Advanced Graph Neural Networks
  • Advanced Clustering Algorithms Research
  • AI-based Problem Solving and Planning

Center for High Pressure Science and Technology Advanced Research
2025

Beijing University of Posts and Telecommunications
2023-2025

China University of Petroleum, East China
2025

Nanfang Hospital
2024

Nanfang College Guangzhou
2024

Kunming University of Science and Technology
2024

South China University of Technology
2023-2024

National Space Science Center
2024

Chinese Academy of Sciences
2024

Henan Forestry Vocational College
2023

Federated learning has emerged as an effective paradigm to achieve privacy-preserving collaborative among different parties. Compared traditional centralized that requires collecting data from each party, in federated learning, only the locally trained models or computed gradients are exchanged, without exposing any information. As a result, it is able protect privacy some extent. In recent years, become more and prevalent there have been many surveys for summarizing related methods this hot...

10.1016/j.neucom.2024.128019 article EN cc-by Neurocomputing 2024-06-11

Deep learning models have been deployed to a wide range of edge devices. Since the data distribution on devices may differ from cloud where model was trained, it is typically desirable customize for each device improve accuracy. However, such customization hard because collecting usually prohibited due privacy concerns. In this paper, we propose PMC, privacy-preserving framework effectively CNN without raw data. Instead, introduce method extract statistical information edge, which contains...

10.1145/3432208 article EN Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2020-12-17

Federated learning (FL) has become a prevalent distributed machine paradigm with improved privacy. After learning, the resulting federated model should be further personalized to each different client. While several methods have been proposed achieve personalization, they are typically limited single local device, which may incur bias or overfitting since data in device is extremely limited. In this paper, we attempt realize personalization beyond The motivation that during FL process, there...

10.1145/3442381.3449847 article EN 2021-04-19

Federated learning has emerged as an effective paradigm to achieve privacy-preserving collaborative among different parties. Compared traditional centralized that requires collecting data from each party, in federated learning, only the locally trained models or computed gradients are exchanged, without exposing any information. As a result, it is able protect privacy some extent. In recent years, become more and prevalent there have been many surveys for summarizing related methods this hot...

10.2139/ssrn.4410417 preprint EN 2023-01-01

The increasing of pre-trained models has significantly facilitated the performance on limited data tasks with transfer learning. However, progress learning mainly focuses optimizing weights models, which ignores structure mismatch between model and target task. This paper aims to improve from another angle - in addition tuning weights, we tune order better match To this end, propose TransTailor, targeting at pruning for improved Different traditional pipelines, prune fine-tune according...

10.1609/aaai.v35i10.17046 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2021-05-18

The knowledge of a deep learning model may be transferred to student model, leading intellectual property infringement or vulnerability propagation. Detecting such reuse is nontrivial because the suspect models not white-box accessible and/or serve different tasks. In this paper, we propose ModelDiff, testing-based approach similarity comparison. Instead directly comparing weights, activations, outputs two models, compare their behavioral patterns on same set test inputs. Specifically,...

10.1145/3460319.3464816 preprint EN 2021-07-08

Scholar clustering has garnered increasing attention due to the explosive growth of scholar data. Although researchers have proposed many algorithms cluster scholars, they typically focus on scholars from intrinsic view (scholars' contents). These may lead inaccurate and biased results because ignore extrinsic (scholar's specialty) changeability scholars' interest in each view. In this paper, we propose a multi-view topic model (MSCT), which integrates complementary information both views...

10.1109/tkde.2023.3248221 article EN IEEE Transactions on Knowledge and Data Engineering 2023-02-23

10.1109/cvpr52733.2024.00747 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2024-06-16

Transfer learning is a popular software reuse technique in the deep community that enables developers to build custom models (students) based on sophisticated pretrained (teachers). However, like vulnerability inheritance traditional reuse, some defects teacher model may also be inherited by students, such as well-known adversarial vulnerabilities and backdoors. Reducing challenging since student unaware of how trained and/or attacked. In this paper, we propose ReMoS, relevant slicing reduce...

10.1145/3510003.3510191 article EN Proceedings of the 44th International Conference on Software Engineering 2022-05-21

10.1109/icassp49660.2025.10889136 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

10.1109/icassp49660.2025.10889724 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Pressure-induced enhancement in optoelectronic properties of black-TiO2 nanocrystals are presented. The underlying mechanisms elucidated by comparing its behavior with that white-TiO2. disordered layer contributes to...

10.1039/d5cc00043b article EN Chemical Communications 2025-01-01

Mobile social applications have been widely used by Internet users. Users can efficiently acquire many kinds of information and share their statuses various platforms. However, when a user intends to through the user's applications, set access permission only before is posted. Once posted, it completely beyond control. Specifically, during recommendation process (for friend or information) in cannot control who get his/her information. If one accessed another malicious user, privacy be...

10.1109/mwc.001.1900440 article EN IEEE Wireless Communications 2020-06-01

10.1109/cvpr52733.2024.01223 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2024-06-16

Federated learning (FL) has emerged as an effective solution to decentralized and privacy-preserving machine for mobile clients. While traditional FL demonstrated its superiority, it ignores the non-iid (independently identically distributed) situation, which widely exists in scenarios. Failing handle situations could cause problems such performance decreasing possible attacks. Previous studies focus on "symptoms" directly, they try improve accuracy or detect attacks by adding extra steps...

10.1145/3494966 article EN Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2021-12-27

Crowdsourcing Federated learning (CFL) is a new crowdsourcing development paradigm for the Deep Neural Network (DNN) models, also called "software 2.0". In practice, privacy of CFL can be compromised by many attacks, such as free-rider adversarial gradient leakage and inference attacks. Conventional defensive techniques have low efficiency because they deploy heavy encryption or rely on Trusted Execution Environments (TEEs). To improve protecting from these this paper proposes FedSlice to...

10.1109/icse48619.2023.00049 article EN 2023-05-01

Recently, diffusion-based deep generative models (e.g., Stable Diffusion) have shown impressive results in text-to-image synthesis. However, current often require multiple passes of prompt engineering by humans order to produce satisfactory for real-world applications. We propose BeautifulPrompt, a model high-quality prompts from very simple raw descriptions, which enables generate more beautiful images. In our work, we first fine-tuned the BeautifulPrompt over low-quality and collecting...

10.18653/v1/2023.emnlp-industry.1 article EN cc-by 2023-01-01

Providing machine learning services is becoming profit business for IT companies. It estimated that the AI-related will bring trillions of dollars to global economy. When selling services, companies should consider two important aspects: security DNN model and inference latency. The models are expensive train represent precious intellectual property. latency because modern usually deployed time-sensitive tasks affects user's experience. Existing solutions cannot achieve a good balance...

10.1145/3536168.3543299 article EN 2022-07-15

In this paper, we propose a general network adaptation framework, namely WealthAdapt, to effectively adapt large for small data tasks, with the assistance of wealth related data. While many existing algorithms have proposed techniques resource-constrained systems, they typically implement based on dataset and do not perform well when facing tasks. Because poor feature expression ability, it may result in incorrect filter selection overfitting during fine-tuning process. first expand target...

10.1145/3343031.3351035 article EN Proceedings of the 30th ACM International Conference on Multimedia 2019-10-15

Artificial intelligence (AI) powered drug development has received remarkable attention in recent years. It addresses the limitations of traditional experimental methods that are costly and time-consuming. While there have been many surveys attempting to summarize related research, they only focus on general AI or specific aspects such as natural language processing graph neural network. Considering rapid advance computer vision, using molecular image enable appears be a more intuitive...

10.1093/bib/bbae294 article EN cc-by Briefings in Bioinformatics 2024-05-23
Coming Soon ...