作者:
Wanjari, KetanVerma, Prateek
Faculty of Engineering and Technology Department of Computer Science and Engineering Maharashtra Wardha442001 India
Faculty of Engineering and Technology Department of Artificial Intelligence and Data Science Maharashtra Wardha442001 India
Skin cancer is the most commonly reported type of cancer globally and one of the few cancers that can be effectively treated if detected in its early stages. Recent advancements in artificialintelligence (AI) have si...
详细信息
Video forgery is one of the most serious problems affecting the credibility and reliability of video content. Therefore, detecting video forgery presents a major challenge for researchers due to the diversity of forge...
详细信息
Melanoma is a type of skin cancer that poses a significant health threat globally, necessitating effective early detection methods. Melanoma arises from the pigment-producing cells(melanocytes) and is known for its hi...
详细信息
Synthetic aperture radar (SAR) ship detection plays a significant role in ocean monitoring. However, the current SAR ship detection methods face limitations in detecting small and dense ships. To address these issues,...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
The availability of computing resources and services through the Internet is a revolutionary approach to delivering computer resources. It is considered by many managers and experts as capable of making changes in the...
详细信息
Long Short-Term Memory (LSTM) networks are particularly useful in recommender systems since user preferences change over time. Unlike traditional recommender models which assume static user-item interactions, LSTM mod...
详细信息
1 Introduction Document-level Role Filler Extraction aims to identify those spans of text that denote the role fillers for each event described in the document[1].Despite achieving certain accomplishments,existing met...
详细信息
1 Introduction Document-level Role Filler Extraction aims to identify those spans of text that denote the role fillers for each event described in the document[1].Despite achieving certain accomplishments,existing methods are still not effective due to the following two issues:(1)there are difficulties in contextual modeling of long text,which requires modeling and understanding coherence and connections across sentences and paragraphs;(2)there usually ignore the explicit dependency relationships between event elements displayed in long *** this end,we propose a novel graph-augmented approach for document-level event role filler extraction,named element relational graph-augmented multi-granularity contextualized encoder(ERGM),whose main idea is to effectively enhance the model's capabilities in capturing deep semantic information of events in long texts and modeling dependency relationships among event elements by incorporating the Event elements relational ***,this method first constructs the structural graph by extracting elements from the source document.
Object localization is a critical task in image analysis, often facilitated by artificialintelligence techniques. While the Maximally Stable Extremal Regions (MSER) detection algorithm is a popular choice for local d...
详细信息
Metal active gas(MAG)welding is one of the widely applied welding techniques using argon and carbon dioxide as shielding *** response to the problem of welding halo and drag shadow during the image acquisition process...
详细信息
Metal active gas(MAG)welding is one of the widely applied welding techniques using argon and carbon dioxide as shielding *** response to the problem of welding halo and drag shadow during the image acquisition process of it,which makes it difficult to accurately extract the contour of the molten pool,this paper proposes a molten pool edge detection method that combines dark channel prior dehazing(DCPD)and improved single scale Retinex image enhancement *** method overcomes the problem of excessive edge noise in the original molten pool image and the difficulty in feature extraction caused by the dark part of the molten pool after DCPD *** comparative experiments and ablation experiments,it has been shown that the algorithm proposed in this paper has significantly improved the enhancement effect and feature extraction effect,extracting accurate and complete molten pool contours.
暂无评论