Story generation and analysis have been researched for decades using AI and Natural Language Processing technology. However, while ethics is becoming essential for developing AI applications, little research deals wit...
详细信息
Story generation and analysis have been researched for decades using AI and Natural Language Processing technology. However, while ethics is becoming essential for developing AI applications, little research deals with morality in the narrative. We present the framework to build embeddings for representing characters in terms of the character’s morality. In addition, we propose a morality judgment task using storybooks. We conduct experiments, and the results suggest that word embedding models can learn a character’s morality.
Time Series Classification predicts outcomes by analyzing sequential data that changes over time. As the complexity of time series data increases, particularly in scenarios involving dynamic relationships, existing mo...
详细信息
Recently, artificial intelligence technology has been actively applied to the defense field. In this paper, we propose a method for collaboratively detecting objects on 3D coordinates based on data collected from vari...
详细信息
Recently, artificial intelligence technology has been actively applied to the defense field. In this paper, we propose a method for collaboratively detecting objects on 3D coordinates based on data collected from various viewpoints by multiple RGB-D sensors to increase object detection rates in poor warfare environments. In Chapter 2, we describe the structure, design and implementation of our Collaborative Object Detection Systems and present future research directions in Chapter 3.
As the Android operating system dominates the mobile ecosystem, its open-source nature has made it increasingly vulnerable to sophisticated malware attacks. Traditional security techniques, such as static and dynamic ...
详细信息
ISBN:
(数字)9798331529024
ISBN:
(纸本)9798331529031
As the Android operating system dominates the mobile ecosystem, its open-source nature has made it increasingly vulnerable to sophisticated malware attacks. Traditional security techniques, such as static and dynamic code analysis, often fail to detect modern malware due to issues like code obfuscation and limited scalability. This paper explores the limitations of these methods and suggests incorporating advanced Deep Neural Networks as more effective solutions for malware detection in Android environments. Additionally, the integration of Large Language Models (LLMs) offers new possibilities for understanding complex malware behaviors and patterns. We also discuss Android’s security architecture, highlighting key vulnerabilities and attack surfaces. Through this study, we suggest a forward-thinking approach to enhancing Android malware detection using machine learning models, envisioning the future of security in the Android ecosystem as bigdata and artificial intelligence technologies continue to evolve.
Software defect prediction (SDP) is essential for ensuring software quality and reliability. Transformer architectures, known for their success in vision and NLP, offer significant potential for SDP. This study invest...
详细信息
ISBN:
(数字)9798331529024
ISBN:
(纸本)9798331529031
Software defect prediction (SDP) is essential for ensuring software quality and reliability. Transformer architectures, known for their success in vision and NLP, offer significant potential for SDP. This study investigates the application of the AutoInt Transformer model, which excels in capturing complex feature interactions from numerical and categorical data, for predicting defects. AutoInt is evaluated on several SDP datasets and compared to advanced models like GRU, Tab-Net, FT-Transformer, and TabTransformer using standard evaluation metrics. Results demonstrate AutoInt’s superior performance, further validated through effect size measurements. This research highlights the promise of transformer-based techniques for advancing SDP and enhancing software quality assurance.
Mobile health has emerged as a practical alternative in treating and managing one’s health problems. However, most of the mobile health data are observational data collected through sensors, which makes it difficult ...
详细信息
Mobile health has emerged as a practical alternative in treating and managing one’s health problems. However, most of the mobile health data are observational data collected through sensors, which makes it difficult to analyze the causality of the delivered interventions through standard regression methods. In this work, we review deep learning models that can be used to estimate the causal effect in raw mobile health data. These models are capable of handling multivariate time series data in estimating the unbiased causal effect given a sequence of treatments.
Seven research areas introduced by the 'Autonomous Systems' research lab provide research areas required to enable the autonomous vehicle industry. For ensuring the validity of the research areas with the base...
详细信息
ISBN:
(纸本)9781728189246
Seven research areas introduced by the 'Autonomous Systems' research lab provide research areas required to enable the autonomous vehicle industry. For ensuring the validity of the research areas with the baseline, we apply Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) on the US patents containing 'Autonomous Vehicles' to identify keywords and research areas of relevant technologies. Keyword clustering and TF-IDF are repeatedly applied to the retrieved keywords to further filter out irrelevant words. Coherence values for LSA and LDA are evaluated to determine an adequate number of topics that need to be generated. We found that results from LSA provide a list of technologies already included in the baseline while topics from LDA provide associated keywords to support defining each technology. We conclude the numbers and topics provided by the baseline model closely represent the industry of autonomous vehicles but the identified topics from us provide a significant extension in research areas. The resulting research areas may provide overviews and guidelines on the autonomous vehicles industry for researchers and institutes
Trajectory analysis can be useful to understand pedestrian behaviour in indoor environments. Collecting real data however can be difficult and time consuming, and many publicly available data sets and trajectory gener...
详细信息
ISBN:
(纸本)9781728189246
Trajectory analysis can be useful to understand pedestrian behaviour in indoor environments. Collecting real data however can be difficult and time consuming, and many publicly available data sets and trajectory generation methods focus on outdoor scenarios. We propose a method for generating realistic indoor trajectory data, taking into account the various restrictions of indoor environments. The result of our experiments, conducted on two museum floor plans, is a system which only requires a set of points of interest and a floor plan picture. A graph is automatically generated using Delaunay triangulation and trajectories can be obtained by simulating a person walking through the graph.
Depression is a common, recurring mental disorder that causes significant impairment in people’s lives. In recent years, ubiquitous computing using mobile phones can monitor behavioral patterns relevant to depressive...
详细信息
Depression is a common, recurring mental disorder that causes significant impairment in people’s lives. In recent years, ubiquitous computing using mobile phones can monitor behavioral patterns relevant to depressive symptoms in-the-wild. In this paper, we propose data processing pipeline of short-term depression detection using mobile sensor data. We build a group model classified by depression severity for capturing depressive mood in a short-period time to handle data quality and data imbalance problem in a large-scale dataset. We expect the group model to identify and characterize digital phenotype representing each depressive group as a middle step toward personalization.
The transmission of image data over the internet is inevitable considering its effective use-cases in tele-healthcare, online-banking, remote-education, e-commerce, email exchanges, and many others. However secure com...
The transmission of image data over the internet is inevitable considering its effective use-cases in tele-healthcare, online-banking, remote-education, e-commerce, email exchanges, and many others. However secure communication of the image data is still evolving and not standardized yet, but it is desirable owing to various cyber attacks especially adversarial attack leading to the loss of critical information. One of the primary challenges on adopting secure communication is to balance computational and communication cost for encrypting the data but also attain high security. Applying encryption across all pixelated data is likely to increase the communication overhead and reduce the throughput which otherwise becomes bottleneck for some of real-time applications. The large size of ciphertext makes the system highly inefficient. This research proposes an approach based on one-pixel attack factored selective image encryption scheme (PA-SIE) to reduce the size of the ciphertext while ensuring the security of the image data. The proposed approach identifies the sensitive pixels in the image by using the differential evolution algorithm and encrypts them using a preferred encryption scheme, while leaving the remaining pixels unencrypted. To the best of our knowledge, this is the first study to propose this approach for balancing cost and security in image data transmission. This approach significantly reduces the cost of data transfer while ensuring the secure transmission of sensitive image data. The proposed PA-SIE approach offers maximum communication latency improvement and energy savings of 84.65 %, when compared with full Elliptic Curve Cryptography (ECC) applied encrypted image transmission for web traffic over the HTTPS protocol. The proposed approach is a step towards ensuring secure and efficient transmission of image data over the internet from low resource and bandwidth constrained edge-computing systems.
暂无评论