Goto

Collaborating Authors

 extractor


Jun Wang

Neural Information Processing Systems

With the success of deep learning, there are growing concerns over interpretability (Lipton, 2018). Ideally, the explanation should be both faithful (reflecting the model's actual behavior) and plausible



Towards Self-Interpretable Graph-Level Anomaly Detection

Neural Information Processing Systems

In this paper, we investigate a new challenging problem, explainable GLAD, where the learning objective is to predict the abnormality of each graph sample with corresponding explanations, i.e., the vital subgraph that leads to the predictions.


H-CNN-ViT: A Hierarchical Gated Attention Multi-Branch Model for Bladder Cancer Recurrence Prediction

Li, Xueyang, Wang, Zongren, Zhang, Yuliang, Pan, Zixuan, Chen, Yu-Jen, Sapkota, Nishchal, Xu, Gelei, Chen, Danny Z., Shi, Yiyu

arXiv.org Artificial Intelligence

Bladder cancer is one of the most prevalent malignancies worldwide, with a recurrence rate of up to 78%, necessitating accurate post-operative monitoring for effective patient management. Multi-sequence contrast-enhanced MRI is commonly used for recurrence detection; however, interpreting these scans remains challenging, even for experienced radiologists, due to post-surgical alterations such as scarring, swelling, and tissue remodeling. AI-assisted diagnostic tools have shown promise in improving bladder cancer recurrence prediction, yet progress in this field is hindered by the lack of dedicated multi-sequence MRI datasets for recurrence assessment study. In this work, we first introduce a curated multi-sequence, multi-modal MRI dataset specifically designed for bladder cancer recurrence prediction, establishing a valuable benchmark for future research. We then propose H-CNN-ViT, a new Hierarchical Gated Attention Multi-Branch model that enables selective weighting of features from the global (ViT) and local (CNN) paths based on contextual demands, achieving a balanced and targeted feature fusion. Our multi-branch architecture processes each modality independently, ensuring that the unique properties of each imaging channel are optimally captured and integrated. Evaluated on our dataset, H-CNN-ViT achieves an AUC of 78.6%, surpassing state-of-the-art models. Our model is publicly available at https://github.com/XLIAaron/H-CNN-ViT.


We sincerely thank the three reviewers for their constructive comments and supports

Neural Information Processing Systems

We sincerely thank the three reviewers for their constructive comments and supports. GPUs are essential to doing effective deep learning. Cloud platform is used, no compression is required. The novelty of this paper is twofold. Secondly, we enhance the robustness of knowledge distillation to deal with data imbalance problem and noise.



Revisiting the Evaluation of Image Synthesis with GANs Mengping Y ang 1, Ceyuan Y ang

Neural Information Processing Systems

Unlike most vision tasks that have per-sample ground-truth, image synthesis tasks target generating unseen data and hence are usually evaluated through a distributional distance between one set of real samples and another set of generated samples.


Model Inversion Attacks Meet Cryptographic Fuzzy Extractors

Prabhakar, Mallika, Xu, Louise, Saxena, Prateek

arXiv.org Artificial Intelligence

Model inversion attacks pose an open challenge to privacy-sensitive applications that use machine learning (ML) models. For example, face authentication systems use modern ML models to compute embedding vectors from face images of the enrolled users and store them. If leaked, inversion attacks can accurately reconstruct user faces from the leaked vectors. There is no systematic characterization of properties needed in an ideal defense against model inversion, even for the canonical example application of a face authentication system susceptible to data breaches, despite a decade of best-effort solutions. In this paper, we formalize the desired properties of a provably strong defense against model inversion and connect it, for the first time, to the cryptographic concept of fuzzy extractors. We further show that existing fuzzy extractors are insecure for use in ML-based face authentication. We do so through a new model inversion attack called PIPE, which achieves a success rate of over 89% in most cases against prior schemes. We then propose L2FE-Hash, the first candidate fuzzy extractor which supports standard Euclidean distance comparators as needed in many ML-based applications, including face authentication. We formally characterize its computational security guarantees, even in the extreme threat model of full breach of stored secrets, and empirically show its usable accuracy in face authentication for practical face distributions. It offers attack-agnostic security without requiring any re-training of the ML model it protects. Empirically, it nullifies both prior state-of-the-art inversion attacks as well as our new PIPE attack.


Knowledge Graph-enhanced Large Language Model for Incremental Game PlayTesting

Mu, Enhong, Cai, Jinyu, Lu, Yijun, Zhang, Mingyue, Tei, Kenji, Li, Jialong

arXiv.org Artificial Intelligence

The rapid iteration and frequent updates of modern video games pose significant challenges to the efficiency and specificity of testing. Although automated playtesting methods based on Large Language Models (LLMs) have shown promise, they often lack structured knowledge accumulation mechanisms, making it difficult to conduct precise and efficient testing tailored for incremental game updates. To address this challenge, this paper proposes a KLPEG framework. The framework constructs and maintains a Knowledge Graph (KG) to systematically model game elements, task dependencies, and causal relationships, enabling knowledge accumulation and reuse across versions. Building on this foundation, the framework utilizes LLMs to parse natural language update logs, identify the scope of impact through multi-hop reasoning on the KG, enabling the generation of update-tailored test cases. Experiments in two representative game environments, Overcooked and Minecraft, demonstrate that KLPEG can more accurately locate functionalities affected by updates and complete tests in fewer steps, significantly improving both playtesting effectiveness and efficiency.


Fréchet Power-Scenario Distance: A Metric for Evaluating Generative AI Models across Multiple Time-Scales in Smart Grids

Cai, Yuting, Liu, Shaohuai, Tian, Chao, Xie, Le

arXiv.org Artificial Intelligence

Abstract--Generative artificial intelligence (AI) models in smart grids have advanced significantly in recent years due to their ability to generate large amounts of synthetic data, which would otherwise be difficult to obtain in the real world due to confidentiality constraints. A key challenge in utilizing such synthetic data is how to assess the data quality produced from such generative models. Traditional metrics such as sample-wise Euclidean distance and distributional distances applied directly to raw generated data inadequately reflect higher-order temporal dependencies and cross-temporal relationships between real and synthetic series, and thus struggle to discriminate generative quality. In this work, we propose a novel metric based on the Fr echet Distance (FD) estimated between two datasets in a learned feature space. The proposed method assesses synthetic data quality via distributional comparisons in a feature space derived from a model tailored to the smart grid domain. Empirical results demonstrate the superiority of the proposed metric across downstream tasks and generative models, enhancing the reliability of data-driven decision-making in smart grid operations. ENERA TIVE models in the electric energy sector have been an active field of research in the past few years, thanks to their potential to create realistic and diverse scenarios for system planning, reliability assessment, and renewable energy integration--ultimately enhancing grid resilience and operational efficiency. These models, such as Generative Adversarial Networks (GANs), allow researchers to access much larger sets of synthetic data across multiple time scales that would otherwise be unavailable due to confidentiality constraints [1]. In contrast to traditional methods that involve creating synthetic power networks and subsequently using commercial-grade simulation software to generate electrical measurement variables [2], these generative approaches leverage a data-driven methodology.