no code implementations • 16 Mar 2024 • Rabimba Karanjai, Weidong Shi
Artificial General Intelligence falls short when communicating role specific nuances to other systems.
no code implementations • 13 Mar 2024 • Rabimba Karanjai, Lei Xu, Weidong Shi
The advent of large language models (LLMs) has marked a significant milestone in the realm of artificial intelligence, with their capabilities often matching or surpassing human expertise in various domains.
no code implementations • 5 Aug 2023 • Rabimba Karanjai, Edward Li, Lei Xu, Weidong Shi
The main objective of this study is to assess the quality of generated code provided by LLMs for smart contracts.
no code implementations • 20 Nov 2022 • Md Hasibul Amin, Harika Madanu, Sahithi Lavu, Hadi Mansourifar, Dana Alsagheer, Weidong Shi
Since the beginning of the vaccination trial, social media has been flooded with anti-vaccination comments and conspiracy beliefs.
no code implementations • 20 Sep 2022 • Jiaqi Xue, Lei Xu, Lin Chen, Weidong Shi, Kaidi Xu, Qian Lou
(ii) How to design a robust PNet given the encrypted input without decryption?
no code implementations • 4 Jul 2022 • Keshav Kasichainula, Hadi Mansourifar, Weidong Shi
In this paper, we propose recursive adversarial attack on face recognition using automatic face warping which needs extremely limited number of queries to fool the target model.
no code implementations • 21 Feb 2022 • Dana Alsagheer, Hadi Mansourifar, Weidong Shi
To the best of our knowledge, no attempt has been made to survey the related work to compare the past research in terms of CHS's impact on social media.
no code implementations • 24 Jun 2021 • Hadi Mansourifar, Dana Alsagheer, Reza Fathi, Weidong Shi, Lan Ni, Yan Huang
This makes the hate speech detection challenging in new social media like Clubhouse.
no code implementations • 22 Jun 2021 • Hadi Mansourifar, Dana Alsagheer, Weidong Shi, Lan Ni, Yan Huang
It has proven that, state-of-the-art hate speech classifiers are efficient only when tested on the data with the same feature distribution as training data.
no code implementations • 14 Jan 2021 • Mudabbir Kaleem, Keshav Kasichainula, Rabimba Karanjai, Lei Xu, Zhimin Gao, Lin Chen, Weidong Shi
This paper presents EDSC, a novel smart contract platform design based on the event-driven execution model as opposed to the traditionally employed transaction-driven execution model.
Distributed, Parallel, and Cluster Computing
no code implementations • 31 Oct 2020 • Weidong Shi, Guanghui Ren, Yunpeng Chen, Shuicheng Yan
We observe that existing knowledge distillation models optimize the proxy tasks that force the student to mimic the teacher's behavior, instead of directly optimizing the face recognition accuracy.
no code implementations • 23 Aug 2020 • Hadi Mansourifar, Weidong Shi
In this paper, we prove that, the face reconstruction attacks based on composite faces can reveal the inefficiency of rounding policy as countermeasure.
no code implementations • 23 Aug 2020 • Hadi Mansourifar, Weidong Shi
Virtual Big Data (VBD) proved to be effective to alleviate mode collapse and vanishing generator gradient as two major problems of Generative Adversarial Neural Networks (GANs) very recently.
no code implementations • 27 Mar 2020 • Hadi Mansourifar, Weidong Shi
As the quality of fake faces increases, the trained models become more and more inefficient to detect the novel fake faces, since the corresponding training data is considered outdated.
no code implementations • 22 Mar 2020 • Hadi Mansourifar, Weidong Shi
In this method, a deep neural network regression model is used to train the inputs and outputs of traditional SMOTE.
no code implementations • 14 Mar 2020 • Hadi Mansourifar, Lin Chen, Weidong Shi
In this paper, we propose a novel hybrid pump and dump detection method based on distance and density metrics.
no code implementations • 7 Nov 2018 • Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi
In this paper, we introduce a novel variant of the bribery problem, "Election with Bribed Voter Uncertainty" or BVU for short, accommodating the uncertainty that the vote of a bribed voter may or may not be counted.
no code implementations • 5 Nov 2018 • Hadi Mansourifar, Weidong Shi
Breast cancer is the most frequently reported cancer type among the women around the globe and beyond that it has the second highest female fatality rate among all cancer types.