The integration of learning and reasoning is high on the research agenda in AI. Nevertheless, there is only a little attention to use existing background knowledge for reasoning about partially observed scenes to answ...
详细信息
This paper addresses automatic event prediction from unstructured text, specifically event chains. While current approaches employ LSTM for encoding full chains, learning long-range narrative orders, or learning parti...
详细信息
Deep neural networks typically impose significant computational loads and memory consumption. Moreover, the large parameters pose constraints on deploying the model on edge devices such as embedded systems. Tensor dec...
详细信息
Recently, transformer architecture has demonstrated its significance in both Natural Language Processing (NLP) and computer Vision (CV) tasks. Although other network models are known to be vulnerable to the backdoor a...
详细信息
ISBN:
(纸本)9781665468916
Recently, transformer architecture has demonstrated its significance in both Natural Language Processing (NLP) and computer Vision (CV) tasks. Although other network models are known to be vulnerable to the backdoor attack, which embeds triggers in the models and controls the models' behavior when the triggers are presented, little is known about how such an attack performs on the transformer models. In this paper, we propose DBIA, a novel Data-free(1) Backdoor Attack against the CV-oriented transformer networks, leveraging the inherent attention mechanism of transformers to generate triggers and injecting the backdoor using a poisoned substitute dataset. We conducted extensive experiments using three benchmark transformers, i.e., ViT, DeiT, and Swin Transformer, on four mainstream image classification tasks, i.e., ImageNet, CIFAR-10, GTSRB, and Youtube Face. The evaluation results demonstrate that, with fewer resources, our approach can embed backdoors with a high success rate and a low impact on the performance of the victim transformers.
In text-to-SQL, generating accurate SQL queries is crucial. Existing methods that rely on Graph Neural Networks (GNN) still fall short in capturing complex semantic and relational information. We propose TFFSQL, which...
详细信息
Aspect Sentiment Understanding (ASU) in interactive scenarios (e.g., Question-Answering and Dialogue) has attracted ever-more interest in recent years and achieved important progresses. However, existing studies on in...
详细信息
Nowadays, the miniaturization of electronic devices continues. However, as the miniaturization progresses, like both sides of a coin, the available resources become limited because of the difficulty of implementing pe...
详细信息
ISBN:
(纸本)9784907626525
Nowadays, the miniaturization of electronic devices continues. However, as the miniaturization progresses, like both sides of a coin, the available resources become limited because of the difficulty of implementing performance above a certain level on a smaller chip. In this study, we implemented some methods for overcoming these limitations. We propose a scheduling based on deadline. It is possible to pre-emulate the program and predict when the task will finish. In addition, even if the total execution time is the same, high-priority tasks can be completed faster. Also, we implemented a struct bit field to cut back on the total resources downloaded onto the chip. Memory usage is almost 50 % lower than not using a struct bit field whereas the execution time is almost the same.
This paper explores a Tomographic Synthetic Aperture Radar (TomoSAR) learning imaging model based on the Learned ISTA (LISTA) algorithm. It addresses the limitations of traditional sparse regularization methods encoun...
详细信息
This study thoroughly examines various Generative Pretrained Transformer (GPT) methodologies in sentiment analysis, specifically in the context of Task 4 on the SemEval 2017 dataset. Three primary strategies are emplo...
详细信息
Distance learning requires students to have different skills than face-to-face learning. The learning environment and the interaction with the teacher and other students are different. Distance learning typically give...
详细信息
ISBN:
(纸本)9789038656908
Distance learning requires students to have different skills than face-to-face learning. The learning environment and the interaction with the teacher and other students are different. Distance learning typically gives students flexibility, s uch a s in terms of their study schedules. For these reasons, in distance learning, it is important for students to be able to independently study, do tasks, and manage their own time. Distance learning also requires increased self-motivation. For this research, master's-level computer science students took the Fisher self-directed learning readiness (SDLR) test to assess their level of self-direction. The results show that the level of student self-direction in the adult distance learning program is very high. The study examined student performance in distance learning courses in relation to SDLR scores. SDLR scores were not found to correlate with academic achievement when success was examined in terms of grades and course completion. The only difference between the different performers was found in the subscale of self-management, which includes time management, systematic thinking, and the ability to take responsibility for the progress of one's own learning. Although the difference was not statistically significant, the results s uggest t hat f actors related to time and daily life management could have an impact on learning outcomes, However, they alone do not explain learning outcomes, and other factors may also be involved.
暂无评论