the proceedings contain 18 papers. the special focus in this conference is on Machine Learning and Knowledge Extraction. the topics include: Enhancing Trust in Machine Learning systems by Formal Methods: With an Appli...
ISBN:
(纸本)9783031408366
the proceedings contain 18 papers. the special focus in this conference is on Machine Learning and Knowledge Extraction. the topics include: Enhancing Trust in Machine Learning systems by Formal Methods: With an Application to a Meteorological Problem;sustainability Effects of Robust and Resilient Artificial Intelligence;the Split Matters: Flat Minima Methods for Improving the Performance of GNNs;probabilistic Framework based on Deep Learning for Differentiating Ultrasound Movie View Planes;standing Still Is Not an Option: Alternative Baselines for Attainable Utility Preservation;Memorization of Named Entities in Fine-Tuned BERT Models;event and Entity Extraction from Generated Video Captions;fine-Tuning Language Models for Scientific Writing Support;efficient Approximation of Asymmetric Shapley Values Using Functional Decomposition;domain-Specific Evaluation of Visual Explanations for Application-Grounded Facial Expression Recognition;human-in-the-Loop Integration with Domain-Knowledge Graphs for Explainable Federated Deep Learning;the Tower of Babel in Explainable Artificial Intelligence (XAI);Hyper-Stacked: Scalable and distributed Approach to AutoML for Big Data;transformers are Short-Text Classifiers;reinforcement Learning with Temporal-Logic-based Causal Diagrams;using Machine Learning to Generate a Dictionary for Environmental Issues.
Enabling real-time processing of financial data streams is extremely challenging, especially considering that typical operations that interest investors often require combining data across (a potentially quadratic num...
详细信息
An event-driven spectrum-aware routing algorithm based on the Hungarian algorithm (ESRH) is proposed to improve the spectrum utilization and the energy efficiency of cognitive radio sensor networks(CRSN). the method p...
An event-driven spectrum-aware routing algorithm based on the Hungarian algorithm (ESRH) is proposed to improve the spectrum utilization and the energy efficiency of cognitive radio sensor networks(CRSN). the method performs clustering in a distributed and self-organized manner and selects the node withthe largest weight as the cluster head (CH). the Hungarian algorithm is used to assign the channels with smaller occupancy probability of primary user (PU), longer idle time and higher throughput to sensor nodes (SUs), which reduces the channel competition from SUs to PUs and improves the data transmission success rate. the gateway nodes and packet forwarding nodes are used for relay communication between clusters. Simulation results show that ESRH outperforms ESAC and ERP algorithms in terms of transmission performance, routing stability and network lifetime in a multi-round event-driven CRSN.
作者:
Alfardus, AsmaRawat, Danda B.
Department of Electrical Engineering and Computer Science WashingtonDC20059 United States
the complex distributedsystems installed in vehicles represent the cutting edge of the automotive industry. Electronic control units communicate with each other by sending and receiving messages over a well-known pro...
详细信息
ISBN:
(纸本)9798331510633
the complex distributedsystems installed in vehicles represent the cutting edge of the automotive industry. Electronic control units communicate with each other by sending and receiving messages over a well-known protocol called the Controller Area Network (CAN) bus system. Car Broadcast is a new, but insecure, way to communicate between external electronic devices. However, today's vehicles are on the brink of security because the CAN network lacks a secure authentication and authorization mechanism. the rise in cyber attacks such as spoofing, spoofing and most commonly denial of service attacks is the result of uncertain measures in the CAN bus network. Although many intrusion detection systems have been developed to provide more secure communication in the vehicle, CAN is still far from being the most secure communication protocol. Since cyber attacks can come from a little-known or completely unknown source, it is essential to take a probabilistic approach based on previous observations from previous attacks. therefore, we propose a new intrusion detection system that uses binary logistic regression (BLR) to detect and mitigate attacks on a CAN bus network. Binary logistic regression is a very popular predictive model that is widely used in various fields. In binary logistic regression, data is first analyzed, then the probability of individual events is estimated by observing previous data, and then a binary classification model is created. An evaluation of the well-known Nsl-kdd and Kdd-99 datasets shows that our proposed method has a dominant overall performance. the final detection rate is 099.031% using Nsl-kdd with a positive rate as low as 00.073% and the rate of detection is 099.043% using kdd-99 with a positive false rate as low as 00.046%˙ Specifically, to detect denial of service (DoS) attacks, the proposed system achieved a detection rate of 099.061% and 099.098% in Nsl-kdd and kdd-99 dataset respectively. Comparative evaluation confirmed that BLR i
the proceedings contain 103 papers. the topics discussed include: web application based text encryption;improving classifier efficiency by expanding number of functions in the dataset;brain tumor classification using ...
ISBN:
(纸本)9781450396752
the proceedings contain 103 papers. the topics discussed include: web application based text encryption;improving classifier efficiency by expanding number of functions in the dataset;brain tumor classification using machine learning and deep learning algorithms: a comparison classifying brain MRI images on the basis of location of tumor and comparing the various machine learning and deep learning models used to predict best performance;identification of undamaged buildings after the event of disaster using deep learning;SVM and logistic regression for facial palsy detection utilizing facial landmark features;implementation of zero-phase zero frequency resonator algorithm on FPGA;an exhaustive investigation on resource-aware client selection mechanisms for cross-device federated learning;advanced malware and their impact on virtualization: a case study on hybrid feature extraction using deep memory introspection;and achieving multilevel elasticity for distributed stream processing systems in the cloud environment: a review and conceptual framework.
A popular metric for measuring progress in autonomous driving has been the "miles per intervention". this is nowhere near a sufficient metric and it does not allow for a fair comparison between the capabilit...
详细信息
ISBN:
(纸本)9781450383530
A popular metric for measuring progress in autonomous driving has been the "miles per intervention". this is nowhere near a sufficient metric and it does not allow for a fair comparison between the capabilities of two autonomous vehicles (AVs). In this paper we propose Scenario2Vector - a Scenario Description Language (SDL) based embedding for traffic situations that allows us to automatically search for similar traffic situations from large AV data-sets. Our SDL embedding distills a traffic situation experienced by an AV into its canonical components - actors, actions, and the traffic scene. We can then use this embedding to evaluate similarity of different traffic situations in vector space. We have also created a first of its kind, Traffic Scenario Similarity (TSS) dataset which contains human ranking annotations for the similarity between traffic scenarios. Using the TSS data, we compare our SDL embedding with textual caption based search methods such as Sentence2Vector. We find that Scenario2Vector outperforms Sentence2Vector by 13%;and is a promising step towards enabling fair comparisons among AVs by inspecting how they perform in similar traffic situations. We hope that Scenario2Vector can have a similar impact to the AV community that Word2Vec/Sent2Vec have had in Natural Language Processing datasets.
Contemporary HPC systems use batch scheduling of compute jobs running on exclusively assigned hardware resources. During communication, polling for progress is the state of the art as it promises minimal latency. Prev...
详细信息
the technological development of the last few years has made a contribution to the form of the work. the tendency to development of work environmental with features that are like those in real life has gone mainstream...
详细信息
this work presents the design and implementation of a blockchain system that enables the trustable transactive energy management for distributed energy resources (DERs). We model the interactions among DERs, including...
详细信息
Video streams are becoming ubiquitous in smart cities and traffic monitoring. Recent advances in computer vision with deep neural networks enable querying a rich set of visual features from these video streams. Howeve...
详细信息
暂无评论