6,961 research outputs found
Stabilization of Cr(III) wastes by C3S and C3S hydrated matrix : comparison of two incorporation methods
In the present study, the influence of Cr(III) on the properties of C3S and its stabilization in C3S hydrates was investigated by either direct incorporation as Cr2O3 during C3S preparation or introduced as nitrate salt during hydration. Levels of Cr used were from 0.1 to 3.0 wt% of C3S. The effect of Cr on the polymorph and hydration of C3S and its immobilization in the hydrates was detected by means of DTA/TG, XRD, isothermal calorimeter and ICP-AES, etc. When doped during sintering process, Cr caused a C3S polymorph transformation from T1 to T2 and led a decomposition of C3S into C2S and CaO resulting in high f-CaO content. Cr doping showed an obvious promotion effect on the hydration properties. The promotion effect decreased when the Cr addition increased to 3.0 wt%. When Cr was added as nitrate salt, Cr showed a retardation effect on the hydration of C3S due to the formation of Ca2Cr(OH)7 center dot 3H(2)O, which resulted in a high degree of Cr stabilization
MMF3: Neural Code Summarization Based on Multi-Modal Fine-Grained Feature Fusion
Background: Code summarization automatically generates the corresponding
natural language descriptions according to the input code. Comprehensiveness of
code representation is critical to code summarization task. However, most
existing approaches typically use coarse-grained fusion methods to integrate
multi-modal features. They generally represent different modalities of a piece
of code, such as an Abstract Syntax Tree (AST) and a token sequence, as two
embeddings and then fuse the two ones at the AST/code levels. Such a coarse
integration makes it difficult to learn the correlations between fine-grained
code elements across modalities effectively. Aims: This study intends to
improve the model's prediction performance for high-quality code summarization
by accurately aligning and fully fusing semantic and syntactic structure
information of source code at node/token levels. Method: This paper proposes a
Multi-Modal Fine-grained Feature Fusion approach (MMF3) for neural code
summarization. We introduce a novel fine-grained fusion method, which allows
fine-grained fusion of multiple code modalities at the token and node levels.
Specifically, we use this method to fuse information from both token and AST
modalities and apply the fused features to code summarization. Results: We
conduct experiments on one Java and one Python datasets, and evaluate generated
summaries using four metrics. The results show that: 1) the performance of our
model outperforms the current state-of-the-art models, and 2) the ablation
experiments show that our proposed fine-grained fusion method can effectively
improve the accuracy of generated summaries. Conclusion: MMF3 can mine the
relationships between crossmodal elements and perform accurate fine-grained
element-level alignment fusion accordingly. As a result, more clues can be
provided to improve the accuracy of the generated code summaries.Comment: 12 pages, 5 figure
Reconstructive Neuron Pruning for Backdoor Defense
Deep neural networks (DNNs) have been found to be vulnerable to backdoor
attacks, raising security concerns about their deployment in mission-critical
applications. While existing defense methods have demonstrated promising
results, it is still not clear how to effectively remove backdoor-associated
neurons in backdoored DNNs. In this paper, we propose a novel defense called
\emph{Reconstructive Neuron Pruning} (RNP) to expose and prune backdoor neurons
via an unlearning and then recovering process. Specifically, RNP first unlearns
the neurons by maximizing the model's error on a small subset of clean samples
and then recovers the neurons by minimizing the model's error on the same data.
In RNP, unlearning is operated at the neuron level while recovering is operated
at the filter level, forming an asymmetric reconstructive learning procedure.
We show that such an asymmetric process on only a few clean samples can
effectively expose and prune the backdoor neurons implanted by a wide range of
attacks, achieving a new state-of-the-art defense performance. Moreover, the
unlearned model at the intermediate step of our RNP can be directly used to
improve other backdoor defense tasks including backdoor removal, trigger
recovery, backdoor label detection, and backdoor sample detection. Code is
available at \url{https://github.com/bboylyg/RNP}.Comment: Accepted by ICML2
Privacy-preserving Federated Learning based on Multi-key Homomorphic Encryption
With the advance of machine learning and the internet of things (IoT),
security and privacy have become key concerns in mobile services and networks.
Transferring data to a central unit violates privacy as well as protection of
sensitive data while increasing bandwidth demands.Federated learning mitigates
this need to transfer local data by sharing model updates only. However, data
leakage still remains an issue. In this paper, we propose xMK-CKKS, a multi-key
homomorphic encryption protocol to design a novel privacy-preserving federated
learning scheme. In this scheme, model updates are encrypted via an aggregated
public key before sharing with a server for aggregation. For decryption,
collaboration between all participating devices is required. This scheme
prevents privacy leakage from publicly shared information in federated
learning, and is robust to collusion between participating devices and
the server. Our experimental evaluation demonstrates that the scheme preserves
model accuracy against traditional federated learning as well as secure
federated learning with homomorphic encryption (MK-CKKS, Paillier) and reduces
computational cost compared to Paillier based federated learning. The average
energy consumption is 2.4 Watts, so that it is suited to IoT scenarios
RS-Corrector: Correcting the Racial Stereotypes in Latent Diffusion Models
Recent text-conditioned image generation models have demonstrated an
exceptional capacity to produce diverse and creative imagery with high visual
quality. However, when pre-trained on billion-sized datasets randomly collected
from the Internet, where potential biased human preferences exist, these models
tend to produce images with common and recurring stereotypes, particularly for
certain racial groups. In this paper, we conduct an initial analysis of the
publicly available Stable Diffusion model and its derivatives, highlighting the
presence of racial stereotypes. These models often generate distorted or biased
images for certain racial groups, emphasizing stereotypical characteristics. To
address these issues, we propose a framework called "RS-Corrector", designed to
establish an anti-stereotypical preference in the latent space and update the
latent code for refined generated results. The correction process occurs during
the inference stage without requiring fine-tuning of the original model.
Extensive empirical evaluations demonstrate that the introduced \themodel
effectively corrects the racial stereotypes of the well-trained Stable
Diffusion model while leaving the original model unchanged.Comment: 16 pages, 15 figures, conferenc
Large-scale Google Street View Images for Urban Change Detection
Urbanization has entered a new phase characterized by urban changes occurring at a micro-scale and “under the roof”, as opposed to external modifications. These changes, known as urban retrofitting, involve the incorporation of novel technologies or features into pre-existing systems to promote sustainability. Given the limitations of remote sensing images in identifying such urban changes, novel tools need to be developed for detecting urban retrofitting. In this study, we first build a pipeline to collect large-scale time-series urban street view images from Google Street View in Mecklenburg County, North Carolina. And we examine the feasibility of utilizing the acquired dataset to detect diverse forms of urban retrofitting, including re-building, re-greening and re-capital
Alteration-free and Model-agnostic Origin Attribution of Generated Images
Recently, there has been a growing attention in image generation models.
However, concerns have emerged regarding potential misuse and intellectual
property (IP) infringement associated with these models. Therefore, it is
necessary to analyze the origin of images by inferring if a specific image was
generated by a particular model, i.e., origin attribution. Existing methods are
limited in their applicability to specific types of generative models and
require additional steps during training or generation. This restricts their
use with pre-trained models that lack these specific operations and may
compromise the quality of image generation. To overcome this problem, we first
develop an alteration-free and model-agnostic origin attribution method via
input reverse-engineering on image generation models, i.e., inverting the input
of a particular model for a specific image. Given a particular model, we first
analyze the differences in the hardness of reverse-engineering tasks for the
generated images of the given model and other images. Based on our analysis, we
propose a method that utilizes the reconstruction loss of reverse-engineering
to infer the origin. Our proposed method effectively distinguishes between
generated images from a specific generative model and other images, including
those generated by different models and real images
SEABO: A Simple Search-Based Method for Offline Imitation Learning
Offline reinforcement learning (RL) has attracted much attention due to its
ability in learning from static offline datasets and eliminating the need of
interacting with the environment. Nevertheless, the success of offline RL
relies heavily on the offline transitions annotated with reward labels. In
practice, we often need to hand-craft the reward function, which is sometimes
difficult, labor-intensive, or inefficient. To tackle this challenge, we set
our focus on the offline imitation learning (IL) setting, and aim at getting a
reward function based on the expert data and unlabeled data. To that end, we
propose a simple yet effective search-based offline IL method, tagged SEABO.
SEABO allocates a larger reward to the transition that is close to its closest
neighbor in the expert demonstration, and a smaller reward otherwise, all in an
unsupervised learning manner. Experimental results on a variety of D4RL
datasets indicate that SEABO can achieve competitive performance to offline RL
algorithms with ground-truth rewards, given only a single expert trajectory,
and can outperform prior reward learning and offline IL methods across many
tasks. Moreover, we demonstrate that SEABO also works well if the expert
demonstrations contain only observations. Our code is publicly available at
https://github.com/dmksjfl/SEABO.Comment: To appear in ICLR202
- …