Search Results - shuangjun+liu

43 Results Sort By:
Adversarial Text Purification: Large Language Model Approach for Defense
Background Adversarial purification is a defense mechanism for safe-guarding classifiers against adversarial attacks without knowing the type of attacks or training of the classifier. These techniques analyze and eliminate adversarial perturbations from the attacked inputs, and help to restore purified samples that retain similarity to the attacked...
Published: 6/27/2025   |   Inventor(s): Raha Moraffah, Shubh Khandelwal, Amrita Bhattacharjee, Huan Liu
Keywords(s): Artificial Intelligence, Defense Applications, Machine Learning, Natural Language Processing, Security, Text Mining
Category(s): Physical Science, Artificial Intelligence/Machine Learning, Applied Technologies, Cybersecurity
Methods and Systems for Detecting Disinformation Generated by Large Language Models
Background The rapid dissemination of news is an important factor for the global population to stay up to date with current events, or to make well-informed decisions in dynamic sectors like the stock market. Journalists typically include large amounts of quantitative information using data visualization to help enhance accessibility and comprehension...
Published: 6/17/2025   |   Inventor(s): Bohan Jiang, Zhen Tan, Ayushi Nirmal, Huan Liu
Keywords(s): Data Mining, Disinformation, Large Language Model, Machine Learning
Category(s): Cybersecurity, Physical Science, Artificial Intelligence/Machine Learning
Synthesis of Anticancer Agents Nannocystins and Their Analogs
Synthetic route to producing nannocystins, an anticancer agent that is typically found in myxobacteria. Background: Myxobacteria are some of the top producers of microbial secondary metabolites, a large portion of which have shown activity against human diseases. One of these metabolite groups are nannocystins, since they have shown excellent anticancer...
Published: 5/13/2025   |   Inventor(s): Zhang Wang, Jun Huang
Keywords(s): drug delivery, oncology
Category(s): Technology Classifications > Research Tools and Reagents, Campus > University at Albany
Enhancing Fairness Through Aleatoric Uncertainty
Background In recent years, advancements in machine learning have revolutionized various domains, but concerns about bias and unfairness in automated decision-making systems have gained significant attention. One of the causes of unfairness in AI systems is the reliance on training data. Aleatoric uncertainty refers to the inherent randomness or variability...
Published: 2/13/2025   |   Inventor(s): Anique Tahir, Lu Cheng, Huan Liu
Keywords(s): Artificial Intelligence, Machine Learning
Category(s): Physical Science, Computing & Information Technology, Intelligence & Security
DNA Methylation Barriers
In normal differentiated cells, most of the genome is densely methylated, except CpG islands near promoters of actively transcribed genes. Maintaining this boundary between unmethylated promoter-associated and adjacent methylated regions is crucial as loss of segregation can lead to disease. Unfortunately, it is not clear where these boundaries are,...
Published: 2/13/2025   |   Inventor(s): Li Liu, Jingmin Shu
Keywords(s):  
Category(s): Applied Technologies, Genomic Assays/Reagents/Tools, Life Science (All LS Techs), Diagnostic Assays/Devices
Systems and Algorithms for Few-Shot Node Classification on Graphs
­Node classification in real-world attributed networks is a central analytical task that is a growing research area. In real-world networks, a large portion of node classes only contain limited labeled instances. Many prevailing graph machine learning methods typically rely upon the availability of sufficient labeled data. However, the long-tail...
Published: 2/13/2025   |   Inventor(s): Kaize Ding, Jianling Wang, Huan Liu
Keywords(s): Algorithm Development, Data Mining, Machine Learning, Neural Computing, PS-Computing and Information Technology, Social Media
Category(s): Physical Science, Computing & Information Technology
Portable Railroad Spike Inspection System based on Acoustic Signals
Reference #: 01567 The University of South Carolina is offering licensing opportunities for Portable Railroad Spike Inspection System based on Acoustic Signals Background: It is reported that broken spikes were observed frequently, including cut spikes, screw spikes, and driven spikes that were used to restrict both tie plates and rails. Since the...
Published: 3/7/2025   |   Inventor(s): Yu Qian, Jun Liu
Keywords(s): acoustic emission, hammer excitation, microphone, non-destructive testing, railroad spike, sound wave frequency and pattern, wave propagation
Category(s): Engineering and Physical Sciences
Graph Prototypical Networks for Few-Shot Learning on Attributed Networks
Background Attributed networks provide high-impact data representation in many real-world complex systems, including social network analysis, financial fraud detection, and drug discovery. In these networks, users can be represented as nodes, which are classified based on the information available from the network. However, there are currently limited...
Published: 2/13/2025   |   Inventor(s): Kaize Ding, Huan Liu
Keywords(s):  
Category(s): Intelligence & Security, Physical Science, Computing & Information Technology, Wireless & Networking
Detecting Fake News on Social Media by Message Diffusion Pathways
­Background Classification of social media content is often regarded as a text categorization problem and mainly focuses on content features, such as words and hashtags. However, for many emerging applications like fake news and rumor detection, it is very challenging, if not impossible, to identify useful features based on message content. A key...
Published: 2/13/2025   |   Inventor(s): Liang Wu, Huan Liu
Keywords(s): Information Propagation
Category(s): Computing & Information Technology, Physical Science, Intelligence & Security
Inductive Anomaly Detection for Attributed Networks
­Background In a variety of real-world applications (e.g., social spam detection, financial fraud detection, and network intrusion detection), detecting anomalies from networked data plays a vital role in keeping malicious behaviors or attacks at bay. With the increasing usage of attributed networks for modeling information systems, anomaly detection...
Published: 2/13/2025   |   Inventor(s): Kaize Ding, Huan Liu
Keywords(s):  
Category(s): Computing & Information Technology, Physical Science, Intelligence & Security
1 2 3 4 5