Alert button
Picture for Guang Cheng

Guang Cheng

Alert button

MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks

Dec 11, 2023
Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu

Viaarxiv icon

AutoDiff: combining Auto-encoder and Diffusion model for tabular data synthesizing

Oct 24, 2023
Namjoon Suh, Xiaofeng Lin, Din-Yin Hsieh, Merhdad Honarkhah, Guang Cheng

Figure 1 for AutoDiff: combining Auto-encoder and Diffusion model for tabular data synthesizing
Figure 2 for AutoDiff: combining Auto-encoder and Diffusion model for tabular data synthesizing
Figure 3 for AutoDiff: combining Auto-encoder and Diffusion model for tabular data synthesizing
Figure 4 for AutoDiff: combining Auto-encoder and Diffusion model for tabular data synthesizing
Viaarxiv icon

Improve Deep Forest with Learnable Layerwise Augmentation Policy Schedule

Sep 16, 2023
Hongyu Zhu, Sichu Liang, Wentao Hu, Fang-Qi Li, Yali yuan, Shi-Lin Wang, Guang Cheng

Figure 1 for Improve Deep Forest with Learnable Layerwise Augmentation Policy Schedule
Figure 2 for Improve Deep Forest with Learnable Layerwise Augmentation Policy Schedule
Figure 3 for Improve Deep Forest with Learnable Layerwise Augmentation Policy Schedule
Figure 4 for Improve Deep Forest with Learnable Layerwise Augmentation Policy Schedule
Viaarxiv icon

MissDiff: Training Diffusion Models on Tabular Data with Missing Values

Jul 02, 2023
Yidong Ouyang, Liyan Xie, Chongxuan Li, Guang Cheng

Figure 1 for MissDiff: Training Diffusion Models on Tabular Data with Missing Values
Figure 2 for MissDiff: Training Diffusion Models on Tabular Data with Missing Values
Figure 3 for MissDiff: Training Diffusion Models on Tabular Data with Missing Values
Figure 4 for MissDiff: Training Diffusion Models on Tabular Data with Missing Values
Viaarxiv icon

Utility Theory of Synthetic Data Generation

May 17, 2023
Shirong Xu, Will Wei Sun, Guang Cheng

Figure 1 for Utility Theory of Synthetic Data Generation
Figure 2 for Utility Theory of Synthetic Data Generation
Figure 3 for Utility Theory of Synthetic Data Generation
Figure 4 for Utility Theory of Synthetic Data Generation
Viaarxiv icon

Tight Non-asymptotic Inference via Sub-Gaussian Intrinsic Moment Norm

Mar 13, 2023
Huiming Zhang, Haoyu Wei, Guang Cheng

Figure 1 for Tight Non-asymptotic Inference via Sub-Gaussian Intrinsic Moment Norm
Figure 2 for Tight Non-asymptotic Inference via Sub-Gaussian Intrinsic Moment Norm
Figure 3 for Tight Non-asymptotic Inference via Sub-Gaussian Intrinsic Moment Norm
Figure 4 for Tight Non-asymptotic Inference via Sub-Gaussian Intrinsic Moment Norm
Viaarxiv icon

Statistical Theory of Differentially Private Marginal-based Data Synthesis Algorithms

Jan 25, 2023
Ximing Li, Chendi Wang, Guang Cheng

Figure 1 for Statistical Theory of Differentially Private Marginal-based Data Synthesis Algorithms
Viaarxiv icon

Double Matching Under Complementary Preferences

Jan 24, 2023
Yuantong Li, Guang Cheng, Xiaowu Dai

Figure 1 for Double Matching Under Complementary Preferences
Figure 2 for Double Matching Under Complementary Preferences
Figure 3 for Double Matching Under Complementary Preferences
Figure 4 for Double Matching Under Complementary Preferences
Viaarxiv icon

Ranking Differential Privacy

Jan 02, 2023
Shirong Xu, Will Wei Sun, Guang Cheng

Figure 1 for Ranking Differential Privacy
Figure 2 for Ranking Differential Privacy
Figure 3 for Ranking Differential Privacy
Figure 4 for Ranking Differential Privacy
Viaarxiv icon

On the Utility Recovery Incapability of Neural Net-based Differential Private Tabular Training Data Synthesizer under Privacy Deregulation

Nov 28, 2022
Yucong Liu, Chi-Hua Wang, Guang Cheng

Figure 1 for On the Utility Recovery Incapability of Neural Net-based Differential Private Tabular Training Data Synthesizer under Privacy Deregulation
Figure 2 for On the Utility Recovery Incapability of Neural Net-based Differential Private Tabular Training Data Synthesizer under Privacy Deregulation
Figure 3 for On the Utility Recovery Incapability of Neural Net-based Differential Private Tabular Training Data Synthesizer under Privacy Deregulation
Figure 4 for On the Utility Recovery Incapability of Neural Net-based Differential Private Tabular Training Data Synthesizer under Privacy Deregulation
Viaarxiv icon