Skip to main content

Showing 1–50 of 69 results for author: Tao, G

.
  1. arXiv:2509.18046  [pdf, ps, other

    cs.RO cs.AI cs.ET eess.SP eess.SY

    HuMam: Humanoid Motion Control via End-to-End Deep Reinforcement Learning with Mamba

    Authors: Yinuo Wang, Yuanyang Qi, Jinzhao Zhou, Gavin Tao

    Abstract: End-to-end reinforcement learning (RL) for humanoid locomotion is appealing for its compact perception-action mapping, yet practical policies often suffer from training instability, inefficient feature fusion, and high actuation cost. We present HuMam, a state-centric end-to-end RL framework that employs a single-layer Mamba encoder to fuse robot-centric states with oriented footstep targets and a… ▽ More

    Submitted 22 September, 2025; originally announced September 2025.

    Comments: 10 pages

  2. arXiv:2509.16950  [pdf, ps, other

    cs.CR

    Temporal Logic-Based Multi-Vehicle Backdoor Attacks against Offline RL Agents in End-to-end Autonomous Driving

    Authors: Xuan Chen, Shiwei Feng, Zikang Xiong, Shengwei An, Yunshu Mao, Lu Yan, Guanhong Tao, Wenbo Guo, Xiangyu Zhang

    Abstract: Assessing the safety of autonomous driving (AD) systems against security threats, particularly backdoor attacks, is a stepping stone for real-world deployment. However, existing works mainly focus on pixel-level triggers that are impractical to deploy in the real world. We address this gap by introducing a novel backdoor attack against the end-to-end AD systems that leverage one or more other vehi… ▽ More

    Submitted 11 October, 2025; v1 submitted 21 September, 2025; originally announced September 2025.

  3. arXiv:2509.11752  [pdf, ps, other

    cs.CV

    A Fully Open and Generalizable Foundation Model for Ultrasound Clinical Applications

    Authors: Hongyuan Zhang, Yuheng Wu, Mingyang Zhao, Zhiwei Chen, Rebecca Li, Fei Zhu, Haohan Zhao, Xiaohua Yuan, Meng Yang, Chunli Qiu, Xiang Cong, Haiyan Chen, Lina Luan, Randolph H. L. Wong, Huai Liao, Colin A Graham, Shi Chang, Guowei Tao, Dong Yi, Zhen Lei, Nassir Navab, Sebastien Ourselin, Jiebo Luo, Hongbin Liu, Gaofeng Meng

    Abstract: Artificial intelligence (AI) that can effectively learn ultrasound representations by integrating multi-source data holds significant promise for advancing clinical care. However, the scarcity of large labeled datasets in real-world clinical environments and the limited generalizability of task-specific models have hindered the development of generalizable clinical AI models for ultrasound applica… ▽ More

    Submitted 15 September, 2025; originally announced September 2025.

  4. arXiv:2509.07593  [pdf, ps, other

    cs.RO cs.AI cs.CV eess.IV eess.SY

    Can SSD-Mamba2 Unlock Reinforcement Learning for End-to-End Motion Control?

    Authors: Gavin Tao, Yinuo Wang, Jinzhao Zhou

    Abstract: End-to-end reinforcement learning for motion control promises unified perception-action policies that scale across embodiments and tasks, yet most deployed controllers are either blind (proprioception-only) or rely on fusion backbones with unfavorable compute-memory trade-offs. Recurrent controllers struggle with long-horizon credit assignment, and Transformer-based fusion incurs quadratic cost in… ▽ More

    Submitted 9 September, 2025; originally announced September 2025.

    Comments: 4 figures and 6 tables

  5. arXiv:2509.03976  [pdf

    physics.optics

    Harnessing modal fields retrieved from speckle for multi-dimensional metrology

    Authors: Qingbo Liu, Zhongyang Xu, Guangkui Tao, Xiuyuan Sun, Min Xue, Weihao Yuan, Shilong Pan

    Abstract: Although speckle is a powerful tool for high-precision metrology, large datasets and cumbersome training are always required to learn from the encoded speckle patterns, which is unfavorable for rapid deployment and multi-dimensional metrology. To enable high accuracy and fast training, physics-informed machine learning enforces physical laws to address high-dimensional problems. Here, we harness t… ▽ More

    Submitted 4 September, 2025; originally announced September 2025.

  6. arXiv:2508.19153  [pdf, ps, other

    cs.RO cs.AI cs.CV eess.IV eess.SY

    QuadKAN: KAN-Enhanced Quadruped Motion Control via End-to-End Reinforcement Learning

    Authors: Yinuo Wang, Gavin Tao

    Abstract: We address vision-guided quadruped motion control with reinforcement learning (RL) and highlight the necessity of combining proprioception with vision for robust control. We propose QuadKAN, a spline-parameterized cross-modal policy instantiated with Kolmogorov-Arnold Networks (KANs). The framework incorporates a spline encoder for proprioception and a spline fusion head for proprioception-vision… ▽ More

    Submitted 6 September, 2025; v1 submitted 26 August, 2025; originally announced August 2025.

    Comments: 14pages, 9 figures, Journal paper

  7. arXiv:2508.11849  [pdf, ps, other

    cs.RO cs.AI cs.CV eess.IV eess.SY

    LocoMamba: Vision-Driven Locomotion via End-to-End Deep Reinforcement Learning with Mamba

    Authors: Yinuo Wang, Gavin Tao

    Abstract: We introduce LocoMamba, a vision-driven cross-modal DRL framework built on selective state-space models, specifically leveraging Mamba, that achieves near-linear-time sequence modeling, effectively captures long-range dependencies, and enables efficient training with longer sequences. First, we embed proprioceptive states with a multilayer perceptron and patchify depth images with a lightweight co… ▽ More

    Submitted 28 August, 2025; v1 submitted 15 August, 2025; originally announced August 2025.

    Comments: 13 pages

  8. arXiv:2507.03619  [pdf, ps, other

    cs.CR

    Blackbox Dataset Inference for LLM

    Authors: Ruikai Zhou, Kang Yang, Xun Chen, Wendy Hui Wang, Guanhong Tao, Jun Xu

    Abstract: Today, the training of large language models (LLMs) can involve personally identifiable information and copyrighted material, incurring dataset misuse. To mitigate the problem of dataset misuse, this paper explores \textit{dataset inference}, which aims to detect if a suspect model $\mathcal{M}$ used a victim dataset $\mathcal{D}$ in training. Previous research tackles dataset inference by aggrega… ▽ More

    Submitted 18 July, 2025; v1 submitted 4 July, 2025; originally announced July 2025.

  9. arXiv:2507.01401  [pdf, ps, other

    cs.CV cs.AI

    Medical-Knowledge Driven Multiple Instance Learning for Classifying Severe Abdominal Anomalies on Prenatal Ultrasound

    Authors: Huanwen Liang, Jingxian Xu, Yuanji Zhang, Yuhao Huang, Yuhan Zhang, Xin Yang, Ran Li, Xuedong Deng, Yanjun Liu, Guowei Tao, Yun Wu, Sheng Zhao, Xinru Gao, Dong Ni

    Abstract: Fetal abdominal malformations are serious congenital anomalies that require accurate diagnosis to guide pregnancy management and reduce mortality. Although AI has demonstrated significant potential in medical diagnosis, its application to prenatal abdominal anomalies remains limited. Most existing studies focus on image-level classification and rely on standard plane localization, placing less emp… ▽ More

    Submitted 2 July, 2025; originally announced July 2025.

    Comments: Accepted by MICCAI 2025

  10. arXiv:2506.08211  [pdf, ps, other

    eess.SY math.ST

    Standard LSParameter Estimators Ensure Finite Convergence Time for Linear Regression Equations Under an Interval Excitation Assumption

    Authors: Romeo Ortega, Jose Guadalupe Romero, Stanislav Aranovskiy, Gang Tao

    Abstract: In this brief note we recall the little-known fact that, for linear regression equations (LRE) with intervally excited (IE) regressors, standard Least Square (LS) parameter estimators ensure finite convergence time (FCT) of the estimated parameters. The convergence time being equal to the time length needed to comply with the IE assumption. As is well-known, IE is necessary and sufficient for the… ▽ More

    Submitted 9 June, 2025; originally announced June 2025.

  11. arXiv:2506.07214  [pdf, other

    cs.CV cs.CR

    Backdoor Attack on Vision Language Models with Stealthy Semantic Manipulation

    Authors: Zhiyuan Zhong, Zhen Sun, Yepang Liu, Xinlei He, Guanhong Tao

    Abstract: Vision Language Models (VLMs) have shown remarkable performance, but are also vulnerable to backdoor attacks whereby the adversary can manipulate the model's outputs through hidden triggers. Prior attacks primarily rely on single-modality triggers, leaving the crucial cross-modal fusion nature of VLMs largely unexplored. Unlike prior work, we identify a novel attack surface that leverages cross-mo… ▽ More

    Submitted 8 June, 2025; originally announced June 2025.

  12. arXiv:2505.12360  [pdf, ps, other

    physics.comp-ph cs.LG

    LaPON: A Lagrange's-mean-value-theorem-inspired operator network for solving PDEs and its application on NSE

    Authors: Siwen Zhang, Xizeng Zhao, Zhengzhi Deng, Zhaoyuan Huang, Gang Tao, Nuo Xu, Zhouteng Ye

    Abstract: Accelerating the solution of nonlinear partial differential equations (PDEs) while maintaining accuracy at coarse spatiotemporal resolution remains a key challenge in scientific computing. Physics-informed machine learning (ML) methods such as Physics-Informed Neural Networks (PINNs) introduce prior knowledge through loss functions to ensure physical consistency, but their "soft constraints" are u… ▽ More

    Submitted 18 May, 2025; originally announced May 2025.

  13. arXiv:2505.10464  [pdf, ps, other

    eess.IV cs.CV

    HWA-UNETR: Hierarchical Window Aggregate UNETR for 3D Multimodal Gastric Lesion Segmentation

    Authors: Jiaming Liang, Lihuan Dai, Xiaoqi Sheng, Xiangguang Chen, Chun Yao, Guihua Tao, Qibin Leng, Hongmin Cai, Xi Zhong

    Abstract: Multimodal medical image segmentation faces significant challenges in the context of gastric cancer lesion analysis. This clinical context is defined by the scarcity of independent multimodal datasets and the imperative to amalgamate inherently misaligned modalities. As a result, algorithms are constrained to train on approximate data and depend on application migration, leading to substantial res… ▽ More

    Submitted 26 May, 2025; v1 submitted 15 May, 2025; originally announced May 2025.

    Comments: This work has been provisionally accepted for MICCAI 2025

  14. arXiv:2504.09757  [pdf, other

    cs.CR

    Alleviating the Fear of Losing Alignment in LLM Fine-tuning

    Authors: Kang Yang, Guanhong Tao, Xun Chen, Jun Xu

    Abstract: Large language models (LLMs) have demonstrated revolutionary capabilities in understanding complex contexts and performing a wide range of tasks. However, LLMs can also answer questions that are unethical or harmful, raising concerns about their applications. To regulate LLMs' responses to such questions, a training strategy called \textit{alignment} can help. Yet, alignment can be unexpectedly co… ▽ More

    Submitted 13 April, 2025; originally announced April 2025.

  15. arXiv:2503.15554  [pdf, other

    cs.CR cs.LG cs.SE

    A Comprehensive Study of LLM Secure Code Generation

    Authors: Shih-Chieh Dai, Jun Xu, Guanhong Tao

    Abstract: LLMs are widely used in software development. However, the code generated by LLMs often contains vulnerabilities. Several secure code generation methods have been proposed to address this issue, but their current evaluation schemes leave several concerns unaddressed. Specifically, most existing studies evaluate security and functional correctness separately, using different datasets. That is, they… ▽ More

    Submitted 18 March, 2025; originally announced March 2025.

  16. FetalFlex: Anatomy-Guided Diffusion Model for Flexible Control on Fetal Ultrasound Image Synthesis

    Authors: Yaofei Duan, Tao Tan, Zhiyuan Zhu, Yuhao Huang, Yuanji Zhang, Rui Gao, Patrick Cheong-Iao Pang, Xinru Gao, Guowei Tao, Xiang Cong, Zhou Li, Lianying Liang, Guangzhi He, Linliang Yin, Xuedong Deng, Xin Yang, Dong Ni

    Abstract: Fetal ultrasound (US) examinations require the acquisition of multiple planes, each providing unique diagnostic information to evaluate fetal development and screening for congenital anomalies. However, obtaining a comprehensive, multi-plane annotated fetal US dataset remains challenging, particularly for rare or complex anomalies owing to their low incidence and numerous subtypes. This poses diff… ▽ More

    Submitted 19 March, 2025; originally announced March 2025.

    Comments: 18 pages, 10 figures

  17. arXiv:2502.03698  [pdf, ps, other

    cs.LG cs.CR cs.RO

    How Vulnerable Is My Learned Policy? Universal Adversarial Perturbation Attacks On Modern Behavior Cloning Policies

    Authors: Akansha Kalra, Basavasagar Patil, Guanhong Tao, Daniel S. Brown

    Abstract: Learning from Demonstration (LfD) algorithms have shown promising results in robotic manipulation tasks, but their vulnerability to offline universal perturbation attacks remains underexplored. This paper presents a comprehensive study of adversarial attacks on both classic and recently proposed algorithms, including Behavior Cloning (BC), LSTM-GMM, Implicit Behavior Cloning (IBC), Diffusion Polic… ▽ More

    Submitted 13 October, 2025; v1 submitted 5 February, 2025; originally announced February 2025.

  18. arXiv:2501.03544  [pdf, ps, other

    cs.CV cs.AI cs.CR

    PromptGuard: Soft Prompt-Guided Unsafe Content Moderation for Text-to-Image Models

    Authors: Lingzhi Yuan, Xinfeng Li, Chejian Xu, Guanhong Tao, Xiaojun Jia, Yihao Huang, Wei Dong, Yang Liu, Bo Li

    Abstract: Recent text-to-image (T2I) models have exhibited remarkable performance in generating high-quality images from text descriptions. However, these models are vulnerable to misuse, particularly generating not-safe-for-work (NSFW) content, such as sexually explicit, violent, political, and disturbing images, raising serious ethical concerns. In this work, we present PromptGuard, a novel content modera… ▽ More

    Submitted 5 September, 2025; v1 submitted 7 January, 2025; originally announced January 2025.

    Comments: 15 pages, 8 figures, 14 tables

  19. arXiv:2412.11454  [pdf, ps, other

    eess.SY

    Adaptive Output Tracking Control with Reference Model System Uncertainties: Extensions

    Authors: Gang Tao

    Abstract: This paper develops some extensions to the work of [1] which studied the continuous-time adaptive output tracking control schemes with the reference output signal generated from an unknown reference model system. The presented extensions include adaptive control schemes with reference model system uncertainties for single-input single-output (SISO) discrete-time systems and multi-input multi-outpu… ▽ More

    Submitted 16 December, 2024; originally announced December 2024.

  20. arXiv:2411.15367  [pdf, other

    cs.CV cs.AI

    Exploiting Watermark-Based Defense Mechanisms in Text-to-Image Diffusion Models for Unauthorized Data Usage

    Authors: Soumil Datta, Shih-Chieh Dai, Leo Yu, Guanhong Tao

    Abstract: Text-to-image diffusion models, such as Stable Diffusion, have shown exceptional potential in generating high-quality images. However, recent studies highlight concerns over the use of unauthorized data in training these models, which may lead to intellectual property infringement or privacy violations. A promising approach to mitigate these issues is to apply a watermark to images and subsequentl… ▽ More

    Submitted 26 November, 2024; v1 submitted 22 November, 2024; originally announced November 2024.

  21. arXiv:2407.11372  [pdf, other

    cs.CR cs.CV

    UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening

    Authors: Siyuan Cheng, Guangyu Shen, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Hanxi Guo, Shiqing Ma, Xiangyu Zhang

    Abstract: Deep neural networks (DNNs) have demonstrated effectiveness in various fields. However, DNNs are vulnerable to backdoor attacks, which inject a unique pattern, called trigger, into the input to cause misclassification to an attack-chosen target label. While existing works have proposed various methods to mitigate backdoor effects in poisoned models, they tend to be less effective against recent ad… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

    Comments: The 18th European Conference on Computer Vision ECCV 2024

  22. arXiv:2406.05580  [pdf, ps, other

    eess.SY

    Adaptive Output Tracking Control with Reference Model System Uncertainties

    Authors: Gang Tao

    Abstract: This paper develops adaptive output tracking control schemes with the reference output signal generated from an unknown reference system whose output derivatives are also unknown. To deal with such reference system uncertainties, an expanded adaptive controller structure is developed to include a parametrized estimator of the equivalent reference input signal. Without using the knowledge of the re… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

  23. arXiv:2405.07804  [pdf

    nlin.AO

    Multiple stochastic resonances and inverse stochastic resonances in asymmetric bistable system under the ultra-high frequency excitation

    Authors: Cong Wang, Zhongqiu Wang, Jianhua Yang, Miguel A. F. Sanjuán, Gong Tao, Zhen Shan, Mengen Shen

    Abstract: Ultra-high frequency linear frequency modulation (UHF-LFM) signal, as a kind of typical non-stationary signal, has been widely used in microwave radar and other fields, with advantages such as long transmission distance, strong anti-interference ability, and wide bandwidth. Utilizing optimal dynamics response has unique advantages in weak feature identification under strong background noise. We pr… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: 23 pages, 13 figures

  24. arXiv:2404.10944  [pdf, other

    cs.IR

    Threat Behavior Textual Search by Attention Graph Isomorphism

    Authors: Chanwoo Bae, Guanhong Tao, Zhuo Zhang, Xiangyu Zhang

    Abstract: Cyber attacks cause over \$1 trillion loss every year. An important task for cyber security analysts is attack forensics. It entails understanding malware behaviors and attack origins. However, existing automated or manual malware analysis can only disclose a subset of behaviors due to inherent difficulties (e.g., malware cloaking and obfuscation). As such, analysts often resort to text search tec… ▽ More

    Submitted 18 April, 2024; v1 submitted 16 April, 2024; originally announced April 2024.

    Journal ref: Proceedings of the 18th Conference of the European Chapter of the Association for Computational Linguistics (Volume 1: Long Papers). 2024

  25. arXiv:2403.17235  [pdf, ps, other

    eess.SY

    A Discrete-Time Least-Squares Adaptive State Tracking Control Scheme with A Mobile-Robot System Study

    Authors: Qianhong Zhao, Gang Tao

    Abstract: This paper develops an adaptive state tracking control scheme for discrete-time systems, using the least-squares algorithm, as the new solution to the long-standing discrete-time adaptive state tracking control problem to which the Lyapunov method (well-developed for the continuous-time adaptive state tracking problem) is not applicable. The new adaptive state tracking scheme is based on a recentl… ▽ More

    Submitted 1 February, 2025; v1 submitted 25 March, 2024; originally announced March 2024.

  26. arXiv:2403.17188  [pdf, other

    cs.CV cs.CR

    LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning

    Authors: Siyuan Cheng, Guanhong Tao, Yingqi Liu, Guangyu Shen, Shengwei An, Shiwei Feng, Xiangzhe Xu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang

    Abstract: Backdoor attack poses a significant security threat to Deep Learning applications. Existing attacks are often not evasive to established backdoor detection techniques. This susceptibility primarily stems from the fact that these attacks typically leverage a universal trigger pattern or transformation function, such that the trigger can cause misclassification for any input. In response to this, re… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2024)

  27. arXiv:2403.04303  [pdf, other

    cs.CV

    LORS: Low-rank Residual Structure for Parameter-Efficient Network Stacking

    Authors: Jialin Li, Qiang Nie, Weifu Fu, Yuhuan Lin, Guangpin Tao, Yong Liu, Chengjie Wang

    Abstract: Deep learning models, particularly those based on transformers, often employ numerous stacked structures, which possess identical architectures and perform similar functions. While effective, this stacking paradigm leads to a substantial increase in the number of parameters, posing challenges for practical applications. In today's landscape of increasingly large models, stacking depth can even rea… ▽ More

    Submitted 7 March, 2024; originally announced March 2024.

    Comments: 9 pages, 5 figures, 11 tables, CVPR2024 accepted

  28. arXiv:2402.10930  [pdf, other

    cs.AR cs.AI cs.LG

    ConSmax: Hardware-Friendly Alternative Softmax with Learnable Parameters

    Authors: Shiwei Liu, Guanchen Tao, Yifei Zou, Derek Chow, Zichen Fan, Kauna Lei, Bangfei Pan, Dennis Sylvester, Gregory Kielian, Mehdi Saligane

    Abstract: The self-attention mechanism distinguishes transformer-based large language models (LLMs) apart from convolutional and recurrent neural networks. Despite the performance improvement, achieving real-time LLM inference on silicon remains challenging due to the extensive use of Softmax in self-attention. In addition to the non-linearity, the low arithmetic intensity significantly limits processing pa… ▽ More

    Submitted 14 November, 2024; v1 submitted 31 January, 2024; originally announced February 2024.

    Journal ref: International Conference on Computer-Aided Design 2024

  29. arXiv:2402.05467  [pdf, other

    cs.AI cs.CL cs.CR

    Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia

    Authors: Guangyu Shen, Siyuan Cheng, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Lu Yan, Zhuo Zhang, Shiqing Ma, Xiangyu Zhang

    Abstract: Large Language Models (LLMs) have become prevalent across diverse sectors, transforming human life with their extraordinary reasoning and comprehension abilities. As they find increased use in sensitive tasks, safety concerns have gained widespread attention. Extensive efforts have been dedicated to aligning LLMs with human moral principles to ensure their safe deployment. Despite their potential,… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  30. arXiv:2401.00905  [pdf, other

    cs.CR

    Opening A Pandora's Box: Things You Should Know in the Era of Custom GPTs

    Authors: Guanhong Tao, Siyuan Cheng, Zhuo Zhang, Junmin Zhu, Guangyu Shen, Xiangyu Zhang

    Abstract: The emergence of large language models (LLMs) has significantly accelerated the development of a wide range of applications across various fields. There is a growing trend in the construction of specialized platforms based on LLMs, such as the newly introduced custom GPTs by OpenAI. While custom GPTs provide various functionalities like web browsing and code execution, they also introduce signific… ▽ More

    Submitted 31 December, 2023; originally announced January 2024.

  31. arXiv:2312.10479  [pdf, other

    cs.CL

    A Soft Contrastive Learning-based Prompt Model for Few-shot Sentiment Analysis

    Authors: Jingyi Zhou, Jie Zhou, Jiabao Zhao, Siyin Wang, Haijun Shan, Gui Tao, Qi Zhang, Xuanjing Huang

    Abstract: Few-shot text classification has attracted great interest in both academia and industry due to the lack of labeled data in many fields. Different from general text classification (e.g., topic classification), few-shot sentiment classification is more challenging because the semantic distances among the classes are more subtle. For instance, the semantic distances between the sentiment labels in a… ▽ More

    Submitted 16 December, 2023; originally announced December 2023.

    Comments: Accepted by ICASSP

  32. arXiv:2312.04782  [pdf, other

    cs.CR cs.LG

    Make Them Spill the Beans! Coercive Knowledge Extraction from (Production) LLMs

    Authors: Zhuo Zhang, Guangyu Shen, Guanhong Tao, Siyuan Cheng, Xiangyu Zhang

    Abstract: Large Language Models (LLMs) are now widely used in various applications, making it crucial to align their ethical standards with human values. However, recent jail-breaking methods demonstrate that this alignment can be undermined using carefully constructed prompts. In our study, we reveal a new threat to LLM alignment when a bad actor has access to the model's output logits, a common feature in… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

  33. arXiv:2312.00050  [pdf, other

    cs.CR cs.AI cs.LG

    Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift

    Authors: Shengwei An, Sheng-Yen Chou, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Guangyu Shen, Siyuan Cheng, Shiqing Ma, Pin-Yu Chen, Tsung-Yi Ho, Xiangyu Zhang

    Abstract: Diffusion models (DM) have become state-of-the-art generative models because of their capability to generate high-quality images from noises without adversarial training. However, they are vulnerable to backdoor attacks as reported by recent studies. When a data input (e.g., some Gaussian noise) is stamped with a trigger (e.g., a white patch), the backdoored model always generates the target image… ▽ More

    Submitted 4 February, 2024; v1 submitted 27 November, 2023; originally announced December 2023.

    Comments: AAAI 2024

  34. arXiv:2308.15449  [pdf, other

    cs.SE

    PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model

    Authors: Xiangzhe Xu, Zhou Xuan, Shiwei Feng, Siyuan Cheng, Yapeng Ye, Qingkai Shi, Guanhong Tao, Le Yu, Zhuo Zhang, Xiangyu Zhang

    Abstract: Binary similarity analysis determines if two binary executables are from the same source program. Existing techniques leverage static and dynamic program features and may utilize advanced Deep Learning techniques. Although they have demonstrated great potential, the community believes that a more effective representation of program semantics can further improve similarity analysis. In this paper,… ▽ More

    Submitted 29 August, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

  35. arXiv:2308.06605  [pdf, other

    cs.DC

    Towards Exascale Computation for Turbomachinery Flows

    Authors: Yuhang Fu, Weiqi Shen, Jiahuan Cui, Yao Zheng, Guangwen Yang, Zhao Liu, Jifa Zhang, Tingwei Ji, Fangfang Xie, Xiaojing Lv, Hanyue Liu, Xu Liu, Xiyang Liu, Xiaoyu Song, Guocheng Tao, Yan Yan, Paul Tucker, Steven A. E. Miller, Shirui Luo, Seid Koric, Weimin Zheng

    Abstract: A state-of-the-art large eddy simulation code has been developed to solve compressible flows in turbomachinery. The code has been engineered with a high degree of scalability, enabling it to effectively leverage the many-core architecture of the new Sunway system. A consistent performance of 115.8 DP-PFLOPs has been achieved on a high-pressure turbine cascade consisting of over 1.69 billion mesh e… ▽ More

    Submitted 29 December, 2023; v1 submitted 12 August, 2023; originally announced August 2023.

    Comments: SC23, November, 2023, Denver, CO., USA

  36. arXiv:2308.02484  [pdf, ps, other

    eess.SY

    Discrete-Time Adaptive State Tracking Control Schemes Using Gradient Algorithms

    Authors: Gang Tao

    Abstract: This paper conducts a comprehensive study of a classical adaptive control problem: adaptive control of a state-space plant model: $\dot{x}(t) = A x(t) + B u(t)$ in continuous time, or $x(t+1) = A x(t) + B u(t)$ in discrete time, for state tracking of a chosen stable reference model system: $\dot{x}_m(t) = A_m x_m(t) + B_m r(t)$ in continuous time, or $x_m(t+1) = A_m x_m(t) + B_m r(t)$ in discrete… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

  37. arXiv:2308.02122  [pdf, other

    cs.CR cs.CL

    ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP

    Authors: Lu Yan, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Xuan Chen, Guangyu Shen, Xiangyu Zhang

    Abstract: Backdoor attacks have emerged as a prominent threat to natural language processing (NLP) models, where the presence of specific triggers in the input can lead poisoned models to misclassify these inputs to predetermined target classes. Current detection mechanisms are limited by their inability to address more covert backdoor strategies, such as style-based attacks. In this work, we propose an inn… ▽ More

    Submitted 27 October, 2023; v1 submitted 3 August, 2023; originally announced August 2023.

  38. arXiv:2305.17506  [pdf, other

    cs.SE cs.AI cs.CL

    Backdooring Neural Code Search

    Authors: Weisong Sun, Yuchen Chen, Guanhong Tao, Chunrong Fang, Xiangyu Zhang, Quanjun Zhang, Bin Luo

    Abstract: Reusing off-the-shelf code snippets from online repositories is a common practice, which significantly enhances the productivity of software developers. To find desired code snippets, developers resort to code search engines through natural language queries. Neural code search models are hence behind many such engines. These models are based on deep learning and gain substantial attention due to t… ▽ More

    Submitted 12 June, 2023; v1 submitted 27 May, 2023; originally announced May 2023.

    Comments: Accepted to the 61st Annual Meeting of the Association for Computational Linguistics (ACL 2023)

    MSC Class: 68T01 ACM Class: I.2.2; D.2.13

  39. arXiv:2305.03778  [pdf, ps, other

    eess.SY

    Koopman System Approximation Based Optimal Control of Multiple Robots -- Part II: Simulations and Evaluations

    Authors: Qianhong Zhao, Gang Tao

    Abstract: This report presents the results of a simulation study of the linear model and bilinear model approximations of the Koopman system model of the nonlinear utility functions in optimal control of a 3-robot system. In such a control problem, the nonlinear utility functions are maximized to achieve the control objective of moving the robots to their target positions and avoiding collisions. With the l… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

  40. arXiv:2305.03777  [pdf, ps, other

    eess.SY

    Koopman System Approximation Based Optimal Control of Multiple Robots -- Part I: Concepts and Formulations

    Authors: Gang Tao, Qianhong Zhao

    Abstract: This paper presents a study of the Koopman operator theory and its application to optimal control of a multi-robot system. The Koopman operator, while operating on a set of observation functions of the state vector of a nonlinear system, produces a set of dynamic equations which, through a dynamic transformation, form a new dynamic system. As an operator, it has a rich spectrum of mathematical pro… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

  41. arXiv:2304.14614  [pdf, other

    cs.CV cs.CR

    Fusion is Not Enough: Single Modal Attacks on Fusion Models for 3D Object Detection

    Authors: Zhiyuan Cheng, Hongjun Choi, James Liang, Shiwei Feng, Guanhong Tao, Dongfang Liu, Michael Zuzak, Xiangyu Zhang

    Abstract: Multi-sensor fusion (MSF) is widely used in autonomous vehicles (AVs) for perception, particularly for 3D object detection with camera and LiDAR sensors. The purpose of fusion is to capitalize on the advantages of each modality while minimizing its weaknesses. Advanced deep neural network (DNN)-based fusion techniques have demonstrated the exceptional and industry-leading performance. Due to the r… ▽ More

    Submitted 2 March, 2024; v1 submitted 27 April, 2023; originally announced April 2023.

    Comments: Accepted at ICLR'2024

  42. arXiv:2303.15180  [pdf, other

    cs.CV cs.AI cs.CR

    Detecting Backdoors in Pre-trained Encoders

    Authors: Shiwei Feng, Guanhong Tao, Siyuan Cheng, Guangyu Shen, Xiangzhe Xu, Yingqi Liu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang

    Abstract: Self-supervised learning in computer vision trains on unlabeled data, such as images or (image, text) pairs, to obtain an image encoder that learns high-quality embeddings for input data. Emerging backdoor attacks towards encoders expose crucial vulnerabilities of self-supervised learning, since downstream classifiers (even further trained on clean data) may inherit backdoor behaviors from encoder… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

    Comments: Accepted at CVPR 2023. Code is available at https://github.com/GiantSeaweed/DECREE

  43. arXiv:2301.13487  [pdf, other

    cs.CV cs.AI

    Adversarial Training of Self-supervised Monocular Depth Estimation against Physical-World Attacks

    Authors: Zhiyuan Cheng, James Liang, Guanhong Tao, Dongfang Liu, Xiangyu Zhang

    Abstract: Monocular Depth Estimation (MDE) is a critical component in applications such as autonomous driving. There are various attacks against MDE networks. These attacks, especially the physical ones, pose a great threat to the security of such systems. Traditional adversarial training method requires ground-truth labels hence cannot be directly applied to self-supervised MDE that does not have ground-tr… ▽ More

    Submitted 2 April, 2023; v1 submitted 31 January, 2023; originally announced January 2023.

    Comments: Initially accepted at ICLR2023 (Spotlight)

  44. Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering

    Authors: Rui Zhu, Di Tang, Siyuan Tang, Guanhong Tao, Shiqing Ma, Xiaofeng Wang, Haixu Tang

    Abstract: Most existing methods to detect backdoored machine learning (ML) models take one of the two approaches: trigger inversion (aka. reverse engineer) and weight analysis (aka. model diagnosis). In particular, the gradient-based trigger inversion is considered to be among the most effective backdoor detection techniques, as evidenced by the TrojAI competition, Trojan Detection Challenge and backdoorBen… ▽ More

    Submitted 2 March, 2024; v1 submitted 28 January, 2023; originally announced January 2023.

    Journal ref: NDSS Symposium 2024

  45. arXiv:2301.06241  [pdf, other

    cs.CR cs.LG

    BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense

    Authors: Siyuan Cheng, Guanhong Tao, Yingqi Liu, Shengwei An, Xiangzhe Xu, Shiwei Feng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Shiqing Ma, Xiangyu Zhang

    Abstract: Deep Learning backdoor attacks have a threat model similar to traditional cyber attacks. Attack forensics, a critical counter-measure for traditional cyber attacks, is hence of importance for defending model backdoor attacks. In this paper, we propose a novel model backdoor forensics technique. Given a few attack samples such as inputs with backdoor triggers, which may represent different types of… ▽ More

    Submitted 15 January, 2023; originally announced January 2023.

  46. arXiv:2212.11473  [pdf, other

    cs.CV

    Restoring Vision in Hazy Weather with Hierarchical Contrastive Learning

    Authors: Tao Wang, Guangpin Tao, Wanglong Lu, Kaihao Zhang, Wenhan Luo, Xiaoqin Zhang, Tong Lu

    Abstract: Image restoration under hazy weather condition, which is called single image dehazing, has been of significant interest for various computer vision applications. In recent years, deep learning-based methods have achieved success. However, existing image dehazing methods typically neglect the hierarchy of features in the neural network and fail to exploit their relationships fully. To this end, we… ▽ More

    Submitted 23 September, 2023; v1 submitted 21 December, 2022; originally announced December 2022.

    Comments: 30 pages, 10 figures

    Journal ref: Pattern Recognition, 2023

  47. arXiv:2211.15929  [pdf, other

    cs.CR cs.LG

    Backdoor Vulnerabilities in Normally Trained Deep Learning Models

    Authors: Guanhong Tao, Zhenting Wang, Siyuan Cheng, Shiqing Ma, Shengwei An, Yingqi Liu, Guangyu Shen, Zhuo Zhang, Yunshu Mao, Xiangyu Zhang

    Abstract: We conduct a systematic study of backdoor vulnerabilities in normally trained Deep Learning models. They are as dangerous as backdoors injected by data poisoning because both can be equally exploited. We leverage 20 different types of injected backdoor attacks in the literature as the guidance and study their correspondences in normally trained models, which we call natural backdoor vulnerabilitie… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

  48. arXiv:2210.12873  [pdf, other

    cs.CR cs.AI cs.LG

    FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning

    Authors: Kaiyuan Zhang, Guanhong Tao, Qiuling Xu, Siyuan Cheng, Shengwei An, Yingqi Liu, Shiwei Feng, Guangyu Shen, Pin-Yu Chen, Shiqing Ma, Xiangyu Zhang

    Abstract: Federated Learning (FL) is a distributed learning paradigm that enables different parties to train a model together for high quality and strong privacy protection. In this scenario, individual participants may get compromised and perform backdoor attacks by poisoning the data (or gradients). Existing work on robust aggregation and certified FL robustness does not study how hardening benign clients… ▽ More

    Submitted 27 February, 2023; v1 submitted 23 October, 2022; originally announced October 2022.

    Comments: Accepted by ICLR 2023. Code is available at https://github.com/KaiyuanZh/FLIP

  49. arXiv:2207.04718  [pdf, other

    cs.CV

    Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches

    Authors: Zhiyuan Cheng, James Liang, Hongjun Choi, Guanhong Tao, Zhiwen Cao, Dongfang Liu, Xiangyu Zhang

    Abstract: Deep learning has substantially boosted the performance of Monocular Depth Estimation (MDE), a critical component in fully vision-based autonomous driving (AD) systems (e.g., Tesla and Toyota). In this work, we develop an attack against learning-based MDE. In particular, we use an optimization-based method to systematically generate stealthy physical-object-oriented adversarial patches to attack d… ▽ More

    Submitted 11 July, 2022; originally announced July 2022.

    Comments: ECCV2022

  50. arXiv:2206.09272  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    DECK: Model Hardening for Defending Pervasive Backdoors

    Authors: Guanhong Tao, Yingqi Liu, Siyuan Cheng, Shengwei An, Zhuo Zhang, Qiuling Xu, Guangyu Shen, Xiangyu Zhang

    Abstract: Pervasive backdoors are triggered by dynamic and pervasive input perturbations. They can be intentionally injected by attackers or naturally exist in normally trained models. They have a different nature from the traditional static and localized backdoors that can be triggered by perturbing a small input area with some fixed pattern, e.g., a patch with solid color. Existing defense techniques are… ▽ More

    Submitted 18 June, 2022; originally announced June 2022.