129 research outputs found
A Study on Prevention of Non-Performing Assets of Chinese State-Owned Commercial Banks
For a long time, Chinese state-owned commercial banks have to face the actualities of large non-performing assets and a high rate of non-performing assets. Based on China’s national condition and referring to the US banking industry, this article makes proposals on preventing and controlling non-performing assets from four aspects: state-owned enterprise system, government regulation, credit risk management, and disposal of non-performing assets
Event-triggered communication for passivity and synchronisation of multi-weighted coupled neural networks with and without parameter uncertainties
A multi-weighted coupled neural networks (MWCNNs) model with event-triggered communication is studied here. On the one hand, the passivity of the presented network model is studied by utilising Lyapunov stability theory and some inequality techniques, and a synchronisation criterion based on the obtained output-strict passivity condition of MWCNNs with eventtriggered communication is derived. On the other hand, some robust passivity and robust synchronisation criteria based on output-strict passivity of the proposed network with uncertain parameters are presented. At last, two numerical examples are provided to testify the effectiveness of the output-strict passivity and robust synchronisation results
PECANN: Parallel Efficient Clustering with Graph-Based Approximate Nearest Neighbor Search
This paper studies density-based clustering of point sets. These methods use
dense regions of points to detect clusters of arbitrary shapes. In particular,
we study variants of density peaks clustering, a popular type of algorithm that
has been shown to work well in practice. Our goal is to cluster large
high-dimensional datasets, which are prevalent in practice. Prior solutions are
either sequential, and cannot scale to large data, or are specialized for
low-dimensional data.
This paper unifies the different variants of density peaks clustering into a
single framework, PECANN, by abstracting out several key steps common to this
class of algorithms. One such key step is to find nearest neighbors that
satisfy a predicate function, and one of the main contributions of this paper
is an efficient way to do this predicate search using graph-based approximate
nearest neighbor search (ANNS). To provide ample parallelism, we propose a
doubling search technique that enables points to find an approximate nearest
neighbor satisfying the predicate in a small number of rounds. Our technique
can be applied to many existing graph-based ANNS algorithms, which can all be
plugged into PECANN.
We implement five clustering algorithms with PECANN and evaluate them on
synthetic and real-world datasets with up to 1.28 million points and up to 1024
dimensions on a 30-core machine with two-way hyper-threading. Compared to the
state-of-the-art FASTDP algorithm for high-dimensional density peaks
clustering, which is sequential, our best algorithm is 45x-734x faster while
achieving competitive ARI scores. Compared to the state-of-the-art parallel
DPC-based algorithm, which is optimized for low dimensions, we show that PECANN
is two orders of magnitude faster. As far as we know, our work is the first to
evaluate DPC variants on large high-dimensional real-world image and text
embedding datasets
Cross-identity Video Motion Retargeting with Joint Transformation and Synthesis
In this paper, we propose a novel dual-branch Transformation-Synthesis
network (TS-Net), for video motion retargeting. Given one subject video and one
driving video, TS-Net can produce a new plausible video with the subject
appearance of the subject video and motion pattern of the driving video. TS-Net
consists of a warp-based transformation branch and a warp-free synthesis
branch. The novel design of dual branches combines the strengths of
deformation-grid-based transformation and warp-free generation for better
identity preservation and robustness to occlusion in the synthesized videos. A
mask-aware similarity module is further introduced to the transformation branch
to reduce computational overhead. Experimental results on face and dance
datasets show that TS-Net achieves better performance in video motion
retargeting than several state-of-the-art models as well as its single-branch
variants. Our code is available at https://github.com/nihaomiao/WACV23_TSNet.Comment: WACV 202
TSGBench: Time Series Generation Benchmark
Synthetic Time Series Generation (TSG) is crucial in a range of applications,
including data augmentation, anomaly detection, and privacy preservation.
Although significant strides have been made in this field, existing methods
exhibit three key limitations: (1) They often benchmark against similar model
types, constraining a holistic view of performance capabilities. (2) The use of
specialized synthetic and private datasets introduces biases and hampers
generalizability. (3) Ambiguous evaluation measures, often tied to custom
networks or downstream tasks, hinder consistent and fair comparison.
To overcome these limitations, we introduce \textsf{TSGBench}, the inaugural
Time Series Generation Benchmark, designed for a unified and comprehensive
assessment of TSG methods. It comprises three modules: (1) a curated collection
of publicly available, real-world datasets tailored for TSG, together with a
standardized preprocessing pipeline; (2) a comprehensive evaluation measures
suite including vanilla measures, new distance-based assessments, and
visualization tools; (3) a pioneering generalization test rooted in Domain
Adaptation (DA), compatible with all methods. We have conducted comprehensive
experiments using \textsf{TSGBench} across a spectrum of ten real-world
datasets from diverse domains, utilizing ten advanced TSG methods and twelve
evaluation measures. The results highlight the reliability and efficacy of
\textsf{TSGBench} in evaluating TSG methods. Crucially, \textsf{TSGBench}
delivers a statistical analysis of the performance rankings of these methods,
illuminating their varying performance across different datasets and measures
and offering nuanced insights into the effectiveness of each method.Comment: Accepted and to appear in VLDB 202
Natural & Adversarial Bokeh Rendering via Circle-of-Confusion Predictive Network
Bokeh effect is a natural shallow depth-of-field phenomenon that blurs the
out-of-focus part in photography. In recent years, a series of works have
proposed automatic and realistic bokeh rendering methods for artistic and
aesthetic purposes. They usually employ cutting-edge data-driven deep
generative networks with complex training strategies and network architectures.
However, these works neglect that the bokeh effect, as a real phenomenon, can
inevitably affect the subsequent visual intelligent tasks like recognition, and
their data-driven nature prevents them from studying the influence of
bokeh-related physical parameters (i.e., depth-of-the-field) on the intelligent
tasks. To fill this gap, we study a totally new problem, i.e., natural &
adversarial bokeh rendering, which consists of two objectives: rendering
realistic and natural bokeh and fooling the visual perception models (i.e.,
bokeh-based adversarial attack). To this end, beyond the pure data-driven
solution, we propose a hybrid alternative by taking the respective advantages
of data-driven and physical-aware methods. Specifically, we propose the
circle-of-confusion predictive network (CoCNet) by taking the all-in-focus
image and depth image as inputs to estimate circle-of-confusion parameters for
each pixel, which are employed to render the final image through a well-known
physical model of bokeh. With the hybrid solution, our method could achieve
more realistic rendering results with the naive training strategy and a much
lighter network.Comment: 11 pages, accepted by TM
FakeLocator: Robust Localization of GAN-Based Face Manipulations
Full face synthesis and partial face manipulation by virtue of the generative
adversarial networks (GANs) and its variants have raised wide public concerns.
In the multi-media forensics area, detecting and ultimately locating the image
forgery has become an imperative task. In this work, we investigate the
architecture of existing GAN-based face manipulation methods and observe that
the imperfection of upsampling methods therewithin could be served as an
important asset for GAN-synthesized fake image detection and forgery
localization. Based on this basic observation, we have proposed a novel
approach, termed FakeLocator, to obtain high localization accuracy, at full
resolution, on manipulated facial images. To the best of our knowledge, this is
the very first attempt to solve the GAN-based fake localization problem with a
gray-scale fakeness map that preserves more information of fake regions. To
improve the universality of FakeLocator across multifarious facial attributes,
we introduce an attention mechanism to guide the training of the model. To
improve the universality of FakeLocator across different DeepFake methods, we
propose partial data augmentation and single sample clustering on the training
images. Experimental results on popular FaceForensics++, DFFD datasets and
seven different state-of-the-art GAN-based face generation methods have shown
the effectiveness of our method. Compared with the baselines, our method
performs better on various metrics. Moreover, the proposed method is robust
against various real-world facial image degradations such as JPEG compression,
low-resolution, noise, and blur.Comment: 16 pages, accepted to IEEE Transactions on Information Forensics and
Securit
MIP: CLIP-based Image Reconstruction from PEFT Gradients
Contrastive Language-Image Pre-training (CLIP) model, as an effective
pre-trained multimodal neural network, has been widely used in distributed
machine learning tasks, especially Federated Learning (FL). Typically,
CLIP-based FL adopts Parameter-Efficient Fine-Tuning (PEFT) for model training,
which only fine-tunes adapter parameters or soft prompts rather than the full
parameters. Although PEFT is different from the traditional training mode, in
this paper, we theoretically analyze that the gradients of adapters or soft
prompts can still be used to perform image reconstruction attacks. Based on our
theoretical analysis, we propose Multm-In-Parvo (MIP), a proprietary
reconstruction attack method targeting CLIP-based distributed machine learning
architecture. Specifically, MIP can reconstruct CLIP training images according
to the gradients of soft prompts or an adapter. In addition, MIP includes a
label prediction strategy to accelerate convergence and an inverse gradient
estimation mechanism to avoid the vanishing gradient problem on the text
encoder. Experimental results show that MIP can effectively reconstruct
training images according to the gradients of soft prompts or adapters of CLIP
models
Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation
As a distributed machine learning paradigm, Federated Learning (FL) enables
large-scale clients to collaboratively train a model without sharing their raw
data. However, due to the lack of data auditing for untrusted clients, FL is
vulnerable to poisoning attacks, especially backdoor attacks. By using poisoned
data for local training or directly changing the model parameters, attackers
can easily inject backdoors into the model, which can trigger the model to make
misclassification of targeted patterns in images. To address these issues, we
propose a novel data-free trigger-generation-based defense approach based on
the two characteristics of backdoor attacks: i) triggers are learned faster
than normal knowledge, and ii) trigger patterns have a greater effect on image
classification than normal class patterns. Our approach generates the images
with newly learned knowledge by identifying the differences between the old and
new global models, and filters trigger images by evaluating the effect of these
generated images. By using these trigger images, our approach eliminates
poisoned models to ensure the updated global model is benign. Comprehensive
experiments demonstrate that our approach can defend against almost all the
existing types of backdoor attacks and outperform all the seven
state-of-the-art defense methods with both IID and non-IID scenarios.
Especially, our approach can successfully defend against the backdoor attack
even when 80\% of the clients are malicious
GitFL: Adaptive Asynchronous Federated Learning using Version Control
As a promising distributed machine learning paradigm that enables
collaborative training without compromising data privacy, Federated Learning
(FL) has been increasingly used in AIoT (Artificial Intelligence of Things)
design. However, due to the lack of efficient management of straggling devices,
existing FL methods greatly suffer from the problems of low inference accuracy
and long training time. Things become even worse when taking various uncertain
factors (e.g., network delays, performance variances caused by process
variation) existing in AIoT scenarios into account. To address this issue, this
paper proposes a novel asynchronous FL framework named GitFL, whose
implementation is inspired by the famous version control system Git. Unlike
traditional FL, the cloud server of GitFL maintains a master model (i.e., the
global model) together with a set of branch models indicating the trained local
models committed by selected devices, where the master model is updated based
on both all the pushed branch models and their version information, and only
the branch models after the pull operation are dispatched to devices. By using
our proposed Reinforcement Learning (RL)-based device selection mechanism, a
pulled branch model with an older version will be more likely to be dispatched
to a faster and less frequently selected device for the next round of local
training. In this way, GitFL enables both effective control of model staleness
and adaptive load balance of versioned models among straggling devices, thus
avoiding the performance deterioration. Comprehensive experimental results on
well-known models and datasets show that, compared with state-of-the-art
asynchronous FL methods, GitFL can achieve up to 2.64X training acceleration
and 7.88% inference accuracy improvements in various uncertain scenarios
- …