-
Generative Adversarial Networks Bridging Art and Machine Intelligence
Authors:
Junhao Song,
Yichao Zhang,
Ziqian Bi,
Tianyang Wang,
Keyu Chen,
Ming Li,
Qian Niu,
Junyu Liu,
Benji Peng,
Sen Zhang,
Ming Liu,
Jiawei Xu,
Xuanhe Pan,
Jinlang Wang,
Pohsun Feng,
Yizhu Wen,
Lawrence K. Q. Yan,
Hong-Ming Tseng,
Xinyuan Song,
Jintao Ren,
Silin Chen,
Yunze Wang,
Weiche Hsieh,
Bowen Jing,
Junjie Yang
, et al. (3 additional authors not shown)
Abstract:
Generative Adversarial Networks (GAN) have greatly influenced the development of computer vision and artificial intelligence in the past decade and also connected art and machine intelligence together. This book begins with a detailed introduction to the fundamental principles and historical development of GANs, contrasting them with traditional generative models and elucidating the core adversari…
▽ More
Generative Adversarial Networks (GAN) have greatly influenced the development of computer vision and artificial intelligence in the past decade and also connected art and machine intelligence together. This book begins with a detailed introduction to the fundamental principles and historical development of GANs, contrasting them with traditional generative models and elucidating the core adversarial mechanisms through illustrative Python examples. The text systematically addresses the mathematical and theoretical underpinnings including probability theory, statistics, and game theory providing a solid framework for understanding the objectives, loss functions, and optimisation challenges inherent to GAN training. Subsequent chapters review classic variants such as Conditional GANs, DCGANs, InfoGAN, and LAPGAN before progressing to advanced training methodologies like Wasserstein GANs, GANs with gradient penalty, least squares GANs, and spectral normalisation techniques. The book further examines architectural enhancements and task-specific adaptations in generators and discriminators, showcasing practical implementations in high resolution image generation, artistic style transfer, video synthesis, text to image generation and other multimedia applications. The concluding sections offer insights into emerging research trends, including self-attention mechanisms, transformer-based generative models, and a comparative analysis with diffusion models, thus charting promising directions for future developments in both academic and applied settings.
△ Less
Submitted 9 February, 2025; v1 submitted 6 February, 2025;
originally announced February 2025.
-
Deep Learning Model Security: Threats and Defenses
Authors:
Tianyang Wang,
Ziqian Bi,
Yichao Zhang,
Ming Liu,
Weiche Hsieh,
Pohsun Feng,
Lawrence K. Q. Yan,
Yizhu Wen,
Benji Peng,
Junyu Liu,
Keyu Chen,
Sen Zhang,
Ming Li,
Chuanqi Jiang,
Xinyuan Song,
Junjie Yang,
Bowen Jing,
Jintao Ren,
Junhao Song,
Hong-Ming Tseng,
Silin Chen,
Yunze Wang,
Chia Xin Liang,
Jiawei Xu,
Xuanhe Pan
, et al. (2 additional authors not shown)
Abstract:
Deep learning has transformed AI applications but faces critical security challenges, including adversarial attacks, data poisoning, model theft, and privacy leakage. This survey examines these vulnerabilities, detailing their mechanisms and impact on model integrity and confidentiality. Practical implementations, including adversarial examples, label flipping, and backdoor attacks, are explored a…
▽ More
Deep learning has transformed AI applications but faces critical security challenges, including adversarial attacks, data poisoning, model theft, and privacy leakage. This survey examines these vulnerabilities, detailing their mechanisms and impact on model integrity and confidentiality. Practical implementations, including adversarial examples, label flipping, and backdoor attacks, are explored alongside defenses such as adversarial training, differential privacy, and federated learning, highlighting their strengths and limitations.
Advanced methods like contrastive and self-supervised learning are presented for enhancing robustness. The survey concludes with future directions, emphasizing automated defenses, zero-trust architectures, and the security challenges of large AI models. A balanced approach to performance and security is essential for developing reliable deep learning systems.
△ Less
Submitted 15 December, 2024; v1 submitted 12 December, 2024;
originally announced December 2024.
-
Deep Learning, Machine Learning, Advancing Big Data Analytics and Management
Authors:
Weiche Hsieh,
Ziqian Bi,
Keyu Chen,
Benji Peng,
Sen Zhang,
Jiawei Xu,
Jinlang Wang,
Caitlyn Heqi Yin,
Yichao Zhang,
Pohsun Feng,
Yizhu Wen,
Tianyang Wang,
Ming Li,
Chia Xin Liang,
Jintao Ren,
Qian Niu,
Silin Chen,
Lawrence K. Q. Yan,
Han Xu,
Hong-Ming Tseng,
Xinyuan Song,
Bowen Jing,
Junjie Yang,
Junhao Song,
Junyu Liu
, et al. (1 additional authors not shown)
Abstract:
Advancements in artificial intelligence, machine learning, and deep learning have catalyzed the transformation of big data analytics and management into pivotal domains for research and application. This work explores the theoretical foundations, methodological advancements, and practical implementations of these technologies, emphasizing their role in uncovering actionable insights from massive,…
▽ More
Advancements in artificial intelligence, machine learning, and deep learning have catalyzed the transformation of big data analytics and management into pivotal domains for research and application. This work explores the theoretical foundations, methodological advancements, and practical implementations of these technologies, emphasizing their role in uncovering actionable insights from massive, high-dimensional datasets. The study presents a systematic overview of data preprocessing techniques, including data cleaning, normalization, integration, and dimensionality reduction, to prepare raw data for analysis. Core analytics methodologies such as classification, clustering, regression, and anomaly detection are examined, with a focus on algorithmic innovation and scalability. Furthermore, the text delves into state-of-the-art frameworks for data mining and predictive modeling, highlighting the role of neural networks, support vector machines, and ensemble methods in tackling complex analytical challenges. Special emphasis is placed on the convergence of big data with distributed computing paradigms, including cloud and edge computing, to address challenges in storage, computation, and real-time analytics. The integration of ethical considerations, including data privacy and compliance with global standards, ensures a holistic perspective on data management. Practical applications across healthcare, finance, marketing, and policy-making illustrate the real-world impact of these technologies. Through comprehensive case studies and Python-based implementations, this work equips researchers, practitioners, and data enthusiasts with the tools to navigate the complexities of modern data analytics. It bridges the gap between theory and practice, fostering the development of innovative solutions for managing and leveraging data in the era of artificial intelligence.
△ Less
Submitted 3 December, 2024;
originally announced December 2024.
-
A Comprehensive Guide to Explainable AI: From Classical Models to LLMs
Authors:
Weiche Hsieh,
Ziqian Bi,
Chuanqi Jiang,
Junyu Liu,
Benji Peng,
Sen Zhang,
Xuanhe Pan,
Jiawei Xu,
Jinlang Wang,
Keyu Chen,
Pohsun Feng,
Yizhu Wen,
Xinyuan Song,
Tianyang Wang,
Ming Liu,
Junjie Yang,
Ming Li,
Bowen Jing,
Jintao Ren,
Junhao Song,
Hong-Ming Tseng,
Yichao Zhang,
Lawrence K. Q. Yan,
Qian Niu,
Silin Chen
, et al. (2 additional authors not shown)
Abstract:
Explainable Artificial Intelligence (XAI) addresses the growing need for transparency and interpretability in AI systems, enabling trust and accountability in decision-making processes. This book offers a comprehensive guide to XAI, bridging foundational concepts with advanced methodologies. It explores interpretability in traditional models such as Decision Trees, Linear Regression, and Support V…
▽ More
Explainable Artificial Intelligence (XAI) addresses the growing need for transparency and interpretability in AI systems, enabling trust and accountability in decision-making processes. This book offers a comprehensive guide to XAI, bridging foundational concepts with advanced methodologies. It explores interpretability in traditional models such as Decision Trees, Linear Regression, and Support Vector Machines, alongside the challenges of explaining deep learning architectures like CNNs, RNNs, and Large Language Models (LLMs), including BERT, GPT, and T5. The book presents practical techniques such as SHAP, LIME, Grad-CAM, counterfactual explanations, and causal inference, supported by Python code examples for real-world applications.
Case studies illustrate XAI's role in healthcare, finance, and policymaking, demonstrating its impact on fairness and decision support. The book also covers evaluation metrics for explanation quality, an overview of cutting-edge XAI tools and frameworks, and emerging research directions, such as interpretability in federated learning and ethical AI considerations. Designed for a broad audience, this resource equips readers with the theoretical insights and practical skills needed to master XAI. Hands-on examples and additional resources are available at the companion GitHub repository: https://github.com/Echoslayer/XAI_From_Classical_Models_to_LLMs.
△ Less
Submitted 8 December, 2024; v1 submitted 1 December, 2024;
originally announced December 2024.
-
Deep Learning and Machine Learning -- Natural Language Processing: From Theory to Application
Authors:
Keyu Chen,
Cheng Fei,
Ziqian Bi,
Junyu Liu,
Benji Peng,
Sen Zhang,
Xuanhe Pan,
Jiawei Xu,
Jinlang Wang,
Caitlyn Heqi Yin,
Yichao Zhang,
Pohsun Feng,
Yizhu Wen,
Tianyang Wang,
Ming Li,
Jintao Ren,
Qian Niu,
Silin Chen,
Weiche Hsieh,
Lawrence K. Q. Yan,
Chia Xin Liang,
Han Xu,
Hong-Ming Tseng,
Xinyuan Song,
Ming Liu
Abstract:
With a focus on natural language processing (NLP) and the role of large language models (LLMs), we explore the intersection of machine learning, deep learning, and artificial intelligence. As artificial intelligence continues to revolutionize fields from healthcare to finance, NLP techniques such as tokenization, text classification, and entity recognition are essential for processing and understa…
▽ More
With a focus on natural language processing (NLP) and the role of large language models (LLMs), we explore the intersection of machine learning, deep learning, and artificial intelligence. As artificial intelligence continues to revolutionize fields from healthcare to finance, NLP techniques such as tokenization, text classification, and entity recognition are essential for processing and understanding human language. This paper discusses advanced data preprocessing techniques and the use of frameworks like Hugging Face for implementing transformer-based models. Additionally, it highlights challenges such as handling multilingual data, reducing bias, and ensuring model robustness. By addressing key aspects of data processing and model fine-tuning, this work aims to provide insights into deploying effective and ethically sound AI solutions.
△ Less
Submitted 17 December, 2024; v1 submitted 30 October, 2024;
originally announced November 2024.
-
Large Language Model Benchmarks in Medical Tasks
Authors:
Lawrence K. Q. Yan,
Qian Niu,
Ming Li,
Yichao Zhang,
Caitlyn Heqi Yin,
Cheng Fei,
Benji Peng,
Ziqian Bi,
Pohsun Feng,
Keyu Chen,
Tianyang Wang,
Yunze Wang,
Silin Chen,
Ming Liu,
Junyu Liu
Abstract:
With the increasing application of large language models (LLMs) in the medical domain, evaluating these models' performance using benchmark datasets has become crucial. This paper presents a comprehensive survey of various benchmark datasets employed in medical LLM tasks. These datasets span multiple modalities including text, image, and multimodal benchmarks, focusing on different aspects of medi…
▽ More
With the increasing application of large language models (LLMs) in the medical domain, evaluating these models' performance using benchmark datasets has become crucial. This paper presents a comprehensive survey of various benchmark datasets employed in medical LLM tasks. These datasets span multiple modalities including text, image, and multimodal benchmarks, focusing on different aspects of medical knowledge such as electronic health records (EHRs), doctor-patient dialogues, medical question-answering, and medical image captioning. The survey categorizes the datasets by modality, discussing their significance, data structure, and impact on the development of LLMs for clinical tasks such as diagnosis, report generation, and predictive decision support. Key benchmarks include MIMIC-III, MIMIC-IV, BioASQ, PubMedQA, and CheXpert, which have facilitated advancements in tasks like medical report generation, clinical summarization, and synthetic data generation. The paper summarizes the challenges and opportunities in leveraging these benchmarks for advancing multimodal medical intelligence, emphasizing the need for datasets with a greater degree of language diversity, structured omics data, and innovative approaches to synthesis. This work also provides a foundation for future research in the application of LLMs in medicine, contributing to the evolving field of medical artificial intelligence.
△ Less
Submitted 9 December, 2024; v1 submitted 28 October, 2024;
originally announced October 2024.
-
Jailbreaking and Mitigation of Vulnerabilities in Large Language Models
Authors:
Benji Peng,
Keyu Chen,
Qian Niu,
Ziqian Bi,
Ming Liu,
Pohsun Feng,
Tianyang Wang,
Lawrence K. Q. Yan,
Yizhu Wen,
Yichao Zhang,
Caitlyn Heqi Yin
Abstract:
Large Language Models (LLMs) have transformed artificial intelligence by advancing natural language understanding and generation, enabling applications across fields beyond healthcare, software engineering, and conversational systems. Despite these advancements in the past few years, LLMs have shown considerable vulnerabilities, particularly to prompt injection and jailbreaking attacks. This revie…
▽ More
Large Language Models (LLMs) have transformed artificial intelligence by advancing natural language understanding and generation, enabling applications across fields beyond healthcare, software engineering, and conversational systems. Despite these advancements in the past few years, LLMs have shown considerable vulnerabilities, particularly to prompt injection and jailbreaking attacks. This review analyzes the state of research on these vulnerabilities and presents available defense strategies. We roughly categorize attack approaches into prompt-based, model-based, multimodal, and multilingual, covering techniques such as adversarial prompting, backdoor injections, and cross-modality exploits. We also review various defense mechanisms, including prompt filtering, transformation, alignment techniques, multi-agent defenses, and self-regulation, evaluating their strengths and shortcomings. We also discuss key metrics and benchmarks used to assess LLM safety and robustness, noting challenges like the quantification of attack success in interactive contexts and biases in existing datasets. Identifying current research gaps, we suggest future directions for resilient alignment strategies, advanced defenses against evolving attacks, automation of jailbreak detection, and consideration of ethical and societal impacts. This review emphasizes the need for continued research and cooperation within the AI community to enhance LLM security and ensure their safe deployment.
△ Less
Submitted 8 May, 2025; v1 submitted 19 October, 2024;
originally announced October 2024.
-
Mastering AI: Big Data, Deep Learning, and the Evolution of Large Language Models -- Blockchain and Applications
Authors:
Pohsun Feng,
Ziqian Bi,
Lawrence K. Q. Yan,
Yizhu Wen,
Benji Peng,
Junyu Liu,
Caitlyn Heqi Yin,
Tianyang Wang,
Keyu Chen,
Sen Zhang,
Ming Li,
Jiawei Xu,
Ming Liu,
Xuanhe Pan,
Jinlang Wang,
Qian Niu
Abstract:
A detailed exploration of blockchain technology and its applications across various fields is provided, beginning with an introduction to cryptography fundamentals, including symmetric and asymmetric encryption, and their roles in ensuring security and trust within blockchain systems. The structure and mechanics of Bitcoin and Ethereum are then examined, covering topics such as proof-of-work, proo…
▽ More
A detailed exploration of blockchain technology and its applications across various fields is provided, beginning with an introduction to cryptography fundamentals, including symmetric and asymmetric encryption, and their roles in ensuring security and trust within blockchain systems. The structure and mechanics of Bitcoin and Ethereum are then examined, covering topics such as proof-of-work, proof-of-stake, and smart contracts. Practical applications of blockchain in industries like decentralized finance (DeFi), supply chain management, and identity authentication are highlighted. The discussion also extends to consensus mechanisms and scalability challenges in blockchain, offering insights into emerging technologies like Layer 2 solutions and cross-chain interoperability. The current state of academic research on blockchain and its potential future developments are also addressed.
△ Less
Submitted 17 December, 2024; v1 submitted 13 October, 2024;
originally announced October 2024.
-
Autocrine signaling and quorum sensing: Extreme ends of a common spectrum
Authors:
Berkalp A. Doğaner,
Lawrence K. Q. Yan,
Hyun Youk
Abstract:
"Secrete-and-sense cells" can communicate by secreting a signaling molecule while also producing a receptor that detects the molecule. The cell can potentially "talk" to itself ("self-communication") or talk to neighboring cells with the same receptor ("neighbor-communication"). The predominant forms of secrete-and-sense cells are self-communicating "autocrine cells" that are largely found in anim…
▽ More
"Secrete-and-sense cells" can communicate by secreting a signaling molecule while also producing a receptor that detects the molecule. The cell can potentially "talk" to itself ("self-communication") or talk to neighboring cells with the same receptor ("neighbor-communication"). The predominant forms of secrete-and-sense cells are self-communicating "autocrine cells" that are largely found in animals, and neighbor-communicating "quorum sensing cells" that are mostly associated with bacteria. While assumed to function independent of one another, recent studies have discovered quorum sensing organs and autocrine signaling microbes. Moreover, similar types of genetic circuits control many autocrine and quorum sensing cells. We outline these recent findings and explain how autocrine and quorum sensing are two sides of a many-sided "dice" created by the versatile secrete-and-sense cell.
△ Less
Submitted 18 February, 2016;
originally announced February 2016.