Alert button
Picture for Ren Wang

Ren Wang

Alert button

Securing GNNs: Explanation-Based Identification of Backdoored Training Graphs

Add code
Bookmark button
Alert button
Mar 26, 2024
Jane Downer, Ren Wang, Binghui Wang

Viaarxiv icon

Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency

Add code
Bookmark button
Alert button
Mar 15, 2024
Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu

Figure 1 for Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency
Figure 2 for Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency
Figure 3 for Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency
Figure 4 for Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency
Viaarxiv icon

Word-Sequence Entropy: Towards Uncertainty Estimation in Free-Form Medical Question Answering Applications and Beyond

Add code
Bookmark button
Alert button
Feb 22, 2024
Zhiyuan Wang, Jinhao Duan, Chenxi Yuan, Qingyu Chen, Tianlong Chen, Huaxiu Yao, Yue Zhang, Ren Wang, Kaidi Xu, Xiaoshuang Shi

Viaarxiv icon

PINNs-Based Uncertainty Quantification for Transient Stability Analysis

Add code
Bookmark button
Alert button
Nov 21, 2023
Ren Wang, Ming Zhong, Kaidi Xu, Lola Giráldez Sánchez-Cortés, Ignacio de Cominges Guerra

Viaarxiv icon

Efficient and Effective Multi-View Subspace Clustering for Large-scale Data

Add code
Bookmark button
Alert button
Oct 15, 2023
Yuxiu Lin, Hui Liu, Ren Wang, Gongguan Chen, Caiming Zhang

Viaarxiv icon

Improving Generalization in Meta-Learning via Meta-Gradient Augmentation

Add code
Bookmark button
Alert button
Jun 14, 2023
Ren Wang, Haoliang Sun, Qi Wei, Xiushan Nie, Yuling Ma, Yilong Yin

Figure 1 for Improving Generalization in Meta-Learning via Meta-Gradient Augmentation
Figure 2 for Improving Generalization in Meta-Learning via Meta-Gradient Augmentation
Figure 3 for Improving Generalization in Meta-Learning via Meta-Gradient Augmentation
Figure 4 for Improving Generalization in Meta-Learning via Meta-Gradient Augmentation
Viaarxiv icon

Robust Mode Connectivity-Oriented Adversarial Defense: Enhancing Neural Network Robustness Against Diversified $\ell_p$ Attacks

Add code
Bookmark button
Alert button
Mar 17, 2023
Ren Wang, Yuxuan Li, Sijia Liu

Figure 1 for Robust Mode Connectivity-Oriented Adversarial Defense: Enhancing Neural Network Robustness Against Diversified $\ell_p$ Attacks
Figure 2 for Robust Mode Connectivity-Oriented Adversarial Defense: Enhancing Neural Network Robustness Against Diversified $\ell_p$ Attacks
Figure 3 for Robust Mode Connectivity-Oriented Adversarial Defense: Enhancing Neural Network Robustness Against Diversified $\ell_p$ Attacks
Figure 4 for Robust Mode Connectivity-Oriented Adversarial Defense: Enhancing Neural Network Robustness Against Diversified $\ell_p$ Attacks
Viaarxiv icon

MetaViewer: Towards A Unified Multi-View Representation

Add code
Bookmark button
Alert button
Mar 11, 2023
Ren Wang, Haoliang Sun, Yuling Ma, Xiaoming Xi, Yilong Yin

Figure 1 for MetaViewer: Towards A Unified Multi-View Representation
Figure 2 for MetaViewer: Towards A Unified Multi-View Representation
Figure 3 for MetaViewer: Towards A Unified Multi-View Representation
Figure 4 for MetaViewer: Towards A Unified Multi-View Representation
Viaarxiv icon

Fine-Grained Classification with Noisy Labels

Add code
Bookmark button
Alert button
Mar 04, 2023
Qi Wei, Lei Feng, Haoliang Sun, Ren Wang, Chenhui Guo, Yilong Yin

Figure 1 for Fine-Grained Classification with Noisy Labels
Figure 2 for Fine-Grained Classification with Noisy Labels
Figure 3 for Fine-Grained Classification with Noisy Labels
Figure 4 for Fine-Grained Classification with Noisy Labels
Viaarxiv icon

Towards Understanding How Self-training Tolerates Data Backdoor Poisoning

Add code
Bookmark button
Alert button
Jan 20, 2023
Soumyadeep Pal, Ren Wang, Yuguang Yao, Sijia Liu

Figure 1 for Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
Figure 2 for Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
Figure 3 for Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
Figure 4 for Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
Viaarxiv icon