Depression and its symptoms are very common disorders of mental health. They affect the day-to-day activity of the person and degrade the quality of life. The article presents the comparative study of different deep l...
详细信息
Depression and its symptoms are very common disorders of mental health. They affect the day-to-day activity of the person and degrade the quality of life. The article presents the comparative study of different deep learning models on natural language processing data for detection of depression using textual data. Several studies have been performed for depression detection using artificial intelligence and deep learning state of the art methods. This article investigates the state-of-the-art models and perform hyperparameter tuning for best accuracy results and develop our own hybrid model for detection of depression with improved accuracy scores. The aim of our study is to research and compare the existing findings in deep learning and machine learning models for depression detection and build a precise hybrid model for depression detection with higher accuracy and scores.
An oriented multigraph is a directed multigraph without directed 2-cycles. Let fas(D) denote the minimum size of a feedback arc set in an oriented multigraph D. The degree of a vertex is the sum of its out- and in-deg...
We introduce a new intrinsic measure of local curvature on point-cloud data called diffusion curvature. Our measure uses the framework of diffusion maps, including the data diffusion operator, to structure point cloud...
ISBN:
(纸本)9781713871088
We introduce a new intrinsic measure of local curvature on point-cloud data called diffusion curvature. Our measure uses the framework of diffusion maps, including the data diffusion operator, to structure point cloud data and define local curvature based on the laziness of a random walk starting at a point or region of the data. We show that this laziness directly relates to volume comparison results from Riemannian geometry. We then extend this scalar curvature notion to an entire quadratic form using neural network estimations based on the diffusion map of point-cloud data. We show applications of both estimations on toy data, single-cell data and on estimating local Hessian matrices of neural network loss landscapes.
Software-defined networking(SDN)is a new paradigm that promises to change by breaking vertical integration,decoupling network control logic from the underlying routers and switches,promoting(logical)network control ce...
详细信息
Software-defined networking(SDN)is a new paradigm that promises to change by breaking vertical integration,decoupling network control logic from the underlying routers and switches,promoting(logical)network control centralization,and introducing network ***,the controller is similarly vulnerable to a“single point of failure”,an attacker can execute a distributed denial of service(DDoS)attack that invalidates the controller and compromises the network security in *** address the problem of DDoS traffic detection in SDN,a novel detection approach based on information entropy and deep neural network(DNN)is *** approach contains a DNN-based DDoS traffic detection module and an information-based entropy initial inspection *** initial inspection module detects the suspicious network traffic by computing the information entropy value of the data packet’s source and destination Internet Protocol(IP)addresses,and then identifies it using the DDoS detection module based on *** assaults were found when suspected irregular traffic was *** reveal that the algorithm recognizes DDoS activity at a rate of more than 99%,with a much better accuracy *** false alarm rate(FAR)is much lower than that of the information entropy-based detection ***,the proposed framework can shorten the detection time and improve the resource utilization efficiency.
In the era of big data,outsourcing massive data to a remote cloud server is a promising *** storage and computation services can reduce storage costs and computational ***,public cloud storage brings about new privacy...
详细信息
In the era of big data,outsourcing massive data to a remote cloud server is a promising *** storage and computation services can reduce storage costs and computational ***,public cloud storage brings about new privacy and security concerns since the cloud servers can be shared by multiple ***-preserving feature extraction techniques are an effective solution to this *** the Rotation Invariant Local Binary Pattern(RILBP)has been widely used in various image processing fields,we propose a new privacy-preserving outsourcing computation of RILBP over encrypted images in this paper(called PPRILBP).To protect image content,original images are encrypted using block scrambling,pixel circular shift,and pixel diffusion when uploaded to the cloud *** is proved that RILBP features remain unchanged before and after ***,the server can directly extract RILBP features from encrypted *** and experiments confirm that the proposed scheme is secure and effective,and outperforms previous secure LBP feature computing methods.
One of the most challenging problems in Bioinformatics is the finding of a protein conformation and it is known as the Protein Structure Prediction (PSP) problem. The main feature present in the AB off-lattice model i...
详细信息
In this paper, we propose a novel warm restart technique using a new logarithmic step size for the stochastic gradient descent (SGD) approach. For smooth and non-convex functions, we establish an O(1/√T) convergence ...
详细信息
Despite the remarkable performance and generalization levels of deep learning models in a wide range of artificial intelligence tasks, it has been demonstrated that these models can be easily fooled by the addition of...
详细信息
Despite the remarkable performance and generalization levels of deep learning models in a wide range of artificial intelligence tasks, it has been demonstrated that these models can be easily fooled by the addition of imperceptible yet malicious perturbations to natural inputs. These altered inputs are known in the literature as adversarial examples. In this paper, we propose a novel probabilistic framework to generalize and extend adversarial attacks in order to produce a desired probability distribution for the classes when we apply the attack method to a large number of inputs. This novel attack paradigm provides the adversary with greater control over the target model, thereby exposing, in a wide range of scenarios, threats against deep learning models that cannot be conducted by the conventional paradigms. We introduce four different strategies to efficiently generate such attacks, and illustrate our approach by extending multiple adversarial attack algorithms. We also experimentally validate our approach for the spoken command classification task and the Tweet emotion classification task, two exemplary machine learning problems in the audio and text domain, respectively. Our results demonstrate that we can closely approximate any probability distribution for the classes while maintaining a high fooling rate and even prevent the attacks from being detected by label-shift detection methods.
Functional data analysis is typically performed in two steps: first, functionally representing discrete observations, and then applying functional methods to the so-represented data. The initial choice of a functional...
详细信息
Injectivity plays an important role in generative models where it enables inference; in inverse problems and compressed sensing with generative priors it is a precursor to well posedness. We establish sharp characteri...
详细信息
Injectivity plays an important role in generative models where it enables inference; in inverse problems and compressed sensing with generative priors it is a precursor to well posedness. We establish sharp characterizations of injectivity of fully-connected and convolutional ReLU layers and networks. First, through a layerwise analysis, we show that an expansivity factor of two is necessary and sufficient for injectivity by constructing appropriate weight matrices. We show that global injectivity with iid Gaussian matrices, a commonly used tractable model, requires larger expansivity between 3.4 and 10.5. We also characterize the stability of inverting an injective network via worst-case Lipschitz constants of the inverse. We then use arguments from differential topology to study injectivity of deep networks and prove that any Lipschitz map can be approximated by an injective ReLU network. Finally, using an argument based on random projections, we show that an end-to-end--rather than layerwise--doubling of the dimension suffices for injectivity. Our results establish a theoretical basis for the study of nonlinear inverse and inference problems using neural networks.
暂无评论