The most common application of artificial immune networks (AINs) is on unsupervised learning tasks. This is due to the fact that AINs are inspired by the adaptive immune system, which consists of a network of antibodi...
详细信息
ISBN:
(纸本)9798400709067
The most common application of artificial immune networks (AINs) is on unsupervised learning tasks. This is due to the fact that AINs are inspired by the adaptive immune system, which consists of a network of antibodies that self-organises to form a memory of external antigens. The self-organising nature of AINs makes them a natural approach for solving problems involving learning and adapting to patterns or structures present in a dataset to form an abstract representation. Training AINs in this fashion means that the dataset need not have class labels because the typical aim of the learning process is not to perform classification. However, there have been attempts to use AINs for classification tasks by considering the resulting clusters of antibodies as representative of the classes present in a dataset. This has also been done when applying AINs to the task of recognising handwritten characters. However, in all the approaches found in the literature, the common method was to leave the task of discovering classes to the AINs. Doing so is contrary to how other models are trained to do classification tasks where data samples are provided along with their class labels to guide the learning process. Therefore, this paper presents a novel supervised learning approach to training AINs for multi-class classification. The proposed approach was tested on the MNIST handwritten digits dataset and achieved a classification accuracy of 99.45%.
Multimodal sarcasm detection (MSD) is essential for various downstream tasks. Existing MSD methods tend to rely on spurious correlations. These methods often mistakenly prioritize non-essential features yet still make...
详细信息
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti...
详细信息
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protection of mobile users’privacy *** present,mobile user authenticationmethods based on humancomputer interaction have been extensively studied due to their advantages of high precision and non-perception,but there are still shortcomings such as low data collection efficiency,untrustworthy participating nodes,and lack of *** this end,this paper proposes a privacy-enhanced mobile user authentication method with motion sensors,which mainly includes:(1)Construct a smart contract-based private chain and federated learning to improve the data collection efficiency of mobile user authentication,reduce the probability of the model being bypassed by attackers,and reduce the overhead of data centralized processing and the risk of privacy leakage;(2)Use certificateless encryption to realize the authentication of the device to ensure the credibility of the client nodes participating in the calculation;(3)Combine Variational Mode Decomposition(VMD)and Long Short-TermMemory(LSTM)to analyze and model the motion sensor data of mobile devices to improve the accuracy of model *** experimental results on the real environment dataset of 1513 people show that themethod proposed in this paper can effectively resist poisoning attacks while ensuring the accuracy and efficiency of mobile user authentication.
As bugs of Python built-in types can cause code crashes, detecting them is critical to the robustness of the software. Researchers have concluded plenty of patterns for the bug causes and applied these patterns in det...
详细信息
作者:
Gok, GorkemBoyaci, AytugUlas, MustafaFirat University
Faculty of Technology Department of Software Engineering Elaziǧ Turkey Air Force Academy
National Defence University Department of Computer Engineering İstanbul Turkey Firat University
Faculty of Engineering Department of Artificial Intelligence and Data Science Engineering Elaziǧ Turkey
This study is meant to research the evolution of intrusion detection and network monitoring within computer, cloud-based systems, IIoT, and mobile environments. The source has outlined the novel technologies in IDS, f...
详细信息
Brain tumors are abnormal cell growths that occur in various parts of the brain, and the accurate classification of these tumors plays a critical role in determining treatment methods. Classification and diagnosis of ...
详细信息
In recent years,Approximate Computing Circuits(ACCs)have been widely used in applications with intrinsic tolerance to *** the increased availability of approximate computing circuit approaches,reliability analysis met...
详细信息
In recent years,Approximate Computing Circuits(ACCs)have been widely used in applications with intrinsic tolerance to *** the increased availability of approximate computing circuit approaches,reliability analysis methods for assessing their fault vulnerability have become highly *** this study,two accurate reliability evaluation methods for approximate computing circuits are *** reliability of approximate computing circuits is calculated on the basis of the iterative Probabilistic Transfer Matrix(PTM)*** the calculation,the correlation coefficients are derived and combined to deal with the correlation problem caused by fanout *** accuracy and scalability of the two methods are verified using three sets of approximate computing circuit instances and more circuits in Evo Approx8 b,which is an approximate computing circuit open source *** results show that relative to the Monte Carlo simulation,the two methods achieve average error rates of 0.46%and 1.29%and time overheads of 0.002%and 0.1%.Different from the existing approaches to reliability estimation for approximate computing circuits based on the original PTM model,the proposed methods reduce the space overheads by nearly 50%and achieve time overheads of 1.78%and 2.19%.
With its characteristics of decentralization,security, data traceability, and tamper-resistance, the blockchain has been widely used in various *** the difference in the performance of the devices, the light client is...
详细信息
With its characteristics of decentralization,security, data traceability, and tamper-resistance, the blockchain has been widely used in various *** the difference in the performance of the devices, the light client is proposed so that devices without the ability to store a full blockchain copy can also participate in the blockchain transactions. However,the light client has to communicate with full nodes and verify the authenticity of a transaction which brings in some extent of communication, computation, and storage overheads to the light client. These overheads cannot be ignored for some low-performance devices, such as embedded devices or Io T chips, and therefore the current light client scheme does not work in this situation. We propose LOPE(a Low-overhead payment v Erification method) for poor-capacity nodes in the blockchain *** LOPE, a grouping protocol is designed to partition full nodes into groups to serve the verification requests of the light client. In addition, Practical byzantine fault tolerance(PBFT) is used to ensure the light client to get a credible result in spite of a few dishonest nodes existing in the group. We conduct LOPE and evaluate it in a testbed. The experiment results show that LOPE reduces more than half of the communication overhead, degrades the computation overhead of the light client to a large extent, and avoids the storage overhead of the hash roots of block headers in the light client. We also conduct theoretical analysis to show the performance improvement and security issues of LOPE.
Over 850,000 people die every year as a direct result of gun violence, yet civilians hold more than 85% of the world's weapons. Detecting weapons via manual surveillance has not been successful. It is critical to ...
详细信息
Estimation of wood moisture content (MC) is a fundamental aspect of woodworking, construction, and various other industries that rely on the versatile properties of wood. In this paper, we present mmMC, a novel system...
详细信息
暂无评论