the proceedings contain 197 papers. the topics discussed include: anytime exploitation of stragglers in synchronous stochastic gradient descent;an evolutionary learning approach to self-configuring image pipelines in ...
ISBN:
(纸本)9781538614174
the proceedings contain 197 papers. the topics discussed include: anytime exploitation of stragglers in synchronous stochastic gradient descent;an evolutionary learning approach to self-configuring image pipelines in the context of carbon fiber fault detection;learning to coordinate with deep reinforcement learning in doubles pong game;anomaly prediction based on k-means clustering for memory-constrained embedded devices;clustering distributed short time series with dense patterns;attribute assisted interpretation confidence classification using machinelearning;predictive modelling strategies to understand heterogeneous manifestations of asthma in early life;home appliance energy disaggregation using low frequency data and machinelearning classifiers;on the impacts of noise from group-based label collection for visual classification;learning robust video synchronization without annotations;machinelearning in appearance-based robot self-localization;learning antecedent structures for event coreference resolution;automatic generation and recommendation for API mashups;an evolutionary learning approach to self-configuring image pipelines in the context of carbon fiber fault detection;and machinelearning approach to detecting sensor data modification intrusions in WBANs.
Continual learning (CL) focuses on enabling machinelearning algorithms to learn from a series of tasks without forgetting previously acquired knowledge. the use of continual learning has not been widely explored in c...
详细信息
ISBN:
(纸本)9783031785535;9783031785542
Continual learning (CL) focuses on enabling machinelearning algorithms to learn from a series of tasks without forgetting previously acquired knowledge. the use of continual learning has not been widely explored in cybersecurity and network safety applications, partially due to the lack of proper datasets. Besides, the benchmark datasets used in CL methods are often relatively restrictive in terms of data distribution shift among the tasks. In this work, we present a CL benchmark framework to construct datasets for CL in cybersecurity applications. For the cybersecurity applications, the proposed framework can generate datasets for CL under distribution shifts in data inputs (e.g., features of internet traffic flow), distribution shifts in data output (e.g., intrusion types), and distribution shifts in both data inputs and outputs, respectively. Moreover, we propose several distance-based and model-based metrics tometiculously quantify the magnitude of distribution shift between datasets of the tasks. We elaborate the construction of benchmark datasets and evaluate the quality of the constructed datasets by applying several existing CL methods and investigating their performance.
An attribute assisted classification deriving estimates of interpretation confidence was performed. Instantaneous and coherency attributes were used in a supervised followed by an unsupervised classification resulting...
详细信息
ISBN:
(纸本)9781538614174
An attribute assisted classification deriving estimates of interpretation confidence was performed. Instantaneous and coherency attributes were used in a supervised followed by an unsupervised classification resulting in an error envelope of the interpretation. In an initial approximation, confidence weights for a signal and background response are estimated using support vector machinelearning. Subsequently, a weighted discrimination based on several coherency attributes using self-organizing maps is obtained. the resulting quantization is used as additional input and constraint in a final probability assessment of signal confidence using instantaneous attributes in support vector machinelearning. the additional input in the form of quantization vectors and possible reduction in dimensionality of the input attribute vector space, allows to combine highly non-linear correlations in a multivariate discrimination. the trained classification is used to assign signal confidence probabilities to an interpreted seismic horizon. the proposed methodology is applied to an onshore data set from Wyoming, USA, revealing how single-and multi-trace attributes can be used to quantitatively assess the uncertainty of an interpretation often lost during project maturation.
Regularization is an important issue for neural networks because of strong expression power causing overfitting to data. A regularization method is to penalize cost functions by activation-based penalty. In its applic...
详细信息
ISBN:
(纸本)9781538614174
Regularization is an important issue for neural networks because of strong expression power causing overfitting to data. A regularization method is to penalize cost functions by activation-based penalty. In its applications to recurrent neural networks, the method usually assigns penalty uniformly distributed over time steps. However, required strength for recurrent networks differs by time steps. In this paper we propose a new activation-based penalty function varying its strength over time steps in recurrent neural networks. To verify its impact, we conducted practical experiments to predict the power consumption of home appliances. In the results, the proposed method reduced training errors and maintained validation and test errors, which implies the improvement of forecasting ability. In sensitivity analysis, the method restricted sudden decrease of impact of early time steps to the cost.
Many applications, from ordering search engine results to medical triage, rely on learning to accurately rank a set of objects by combining a given collection of ranking or preference functions. We propose a technique...
详细信息
ISBN:
(纸本)9781538614174
Many applications, from ordering search engine results to medical triage, rely on learning to accurately rank a set of objects by combining a given collection of ranking or preference functions. We propose a technique for rank-learning using a boosting approach which merges accurate regions of poor-quality metrics into a single accurate metric. We show an improvement in accuracy for general similarity-ranking tasks across a variety of benchmark datasets and apply this technique to the prediction of software bug severity and resolution time from error report text, showing a significant improvement in bug triage accuracy over the state of the art.
this paper provides a comprehensive overview of theories, methodologies, techniques, standards and frameworks of biometric systems. the studies conducted between 2007-2017 are examined in order to ensure the security ...
详细信息
ISBN:
(纸本)9781538614174
this paper provides a comprehensive overview of theories, methodologies, techniques, standards and frameworks of biometric systems. the studies conducted between 2007-2017 are examined in order to ensure the security of the equipment used in a biometric system, to secure the characteristic feature extraction, to provide secure data storage in the biometric database, to maintain transmission channels used in biometric applications from vulnerabilities, and to ensure the correctness of the results obtained from intelligent decision mechanism. machinelearning techniques used to detect and protect existing attacks are analyzed, obtained results are shared and recommendations are made in the last part of the study.
Patent classification is the task of assign a special code to a patent, where the assigned code is used to group patents with similar subject into a same category. this paper presents a patent categorization method ba...
详细信息
ISBN:
(纸本)9781538614174
Patent classification is the task of assign a special code to a patent, where the assigned code is used to group patents with similar subject into a same category. this paper presents a patent categorization method based on word embedding and long short term memory network to classify patents down to the subgroup IPC level. the experimental results indicate that our classification method achieve 63% accuracy at the subgroup level.
the preparation of labeled training data for supervised machinelearning methods involves a lot of effort. Regarding surface inspection tasks, this endeavor is often not economically reasonable. In this paper, an arti...
详细信息
ISBN:
(纸本)9781538614174
the preparation of labeled training data for supervised machinelearning methods involves a lot of effort. Regarding surface inspection tasks, this endeavor is often not economically reasonable. In this paper, an artificial defect synthetization algorithm based on a multistep stochastic process is proposed. It adds defects to fault-free surface images, which can be used for supervised machinelearning. By this means a deep convolutional neural network has been trained, achieving a detection rate of 94% of occurring real defects on the presented test surface.
One of the goals in scaling sequential machinelearning methods pertains to dealing with high-dimensional data spaces. A key related challenge is that many methods heavily depend on obtaining the inverse covariance ma...
详细信息
ISBN:
(纸本)9781538614174
One of the goals in scaling sequential machinelearning methods pertains to dealing with high-dimensional data spaces. A key related challenge is that many methods heavily depend on obtaining the inverse covariance matrix of the data. It is well known that covariance matrix estimation is problematic when the number of observations is relatively small compared to the number of variables. A common way to tackle this problem is through the use of a shrinkage estimator that offers a compromise between the sample covariance matrix and a well-conditioned matrix, withthe aim of minimizing the mean-squared error. We derived sequential update rules to approximate the inverse shrinkage estimator of the covariance matrix. the approach paves the way for improved large-scale machinelearning methods that involve sequential updates.
the utility industry has invested widely in smart grid (SG) over the past decade. they considered it the future electrical grid while the information and electricity are delivered in two-way flow. SG has many Artifici...
详细信息
ISBN:
(纸本)9781538614174
the utility industry has invested widely in smart grid (SG) over the past decade. they considered it the future electrical grid while the information and electricity are delivered in two-way flow. SG has many Artificial Intelligence (AI) applications such as Artificial Neural Network (ANN), machinelearning (ML) and Deep learning (DL). Recently, DL has been a hot topic for AI applications in many fields such as time series load forecasting. this paper introduces the common algorithms of DL in the literature applied to load forecasting problems in the SG and power systems. the intention of this survey is to explore the different applications of DL that are used in the power systems and smart grid load forecasting. In addition, it compares the accuracy results RMSE and MAE for the reviewed applications and shows the use of convolutional neural network CNN with k-means algorithm had a great percentage of reduction in terms of RMSE.
暂无评论