Document-level relation extraction aims at extracting relational facts between two entities in a document. Existing approaches mainly focus on target entities, utilizing techniques such as graph neural networks to enh...
详细信息
Cybersecurity plays an important role in protecting people and critical infrastructure. Sectors such as energy, defense and healthcare are increasingly at risk from cyber threats. To address these challenges, dedicate...
详细信息
Massive reinforcement learning (RL) data are typically collected to train policies offline without the need for interactions, but the large data volume can cause training inefficiencies. To tackle this issue, we formu...
datascience (DS) aims to extract knowledge from large amounts of data. Organizations can use the retrieved insights to achieve various performance improvements. However, DS projects often fail to fulfill their object...
详细信息
Prompted by the increasing dominance of proprietary Large Language Models (LLMs), such as OpenAI's GPT-4 and Google's Gemini, concerns about data privacy, accessibility and bias have led to a growing advocacy ...
详细信息
Transferability of adversarial examples is of critical importance to launch black-box adversarial attacks, where attackers are only allowed to access the output of the target model. However, under such a challenging b...
详细信息
In this paper,the authors study a class of weighted version of probability density *** is shown that the weighted estimator contains some existing estimators of probability density,no matter they are recursive or *** ...
详细信息
In this paper,the authors study a class of weighted version of probability density *** is shown that the weighted estimator contains some existing estimators of probability density,no matter they are recursive or *** statistical results including weak consistency,strong consistency,rate of strong consistency,and asymptotic normality are established under some mild ***,the random weighted estimator is also *** numerical simulations and a real data analysis are presented to study the numerical performances of the estimators.
Video forgery is one of the most serious problems affecting the credibility and reliability of video content. Therefore, detecting video forgery presents a major challenge for researchers due to the diversity of forge...
详细信息
We propose an approach for the early detection of COVID-19 and other related lung diseases using artificial intelligence (AI) and deep learning-based methods. The proposed approach involves utilizing transfer learning...
详细信息
Service function chains(SFC)mapping takes the responsibility for managing virtual network functions(VNFs).In SFC mapping,existing solutions duplicate VNFs with redundant instances to provide high availability in respo...
详细信息
Service function chains(SFC)mapping takes the responsibility for managing virtual network functions(VNFs).In SFC mapping,existing solutions duplicate VNFs with redundant instances to provide high availability in response to ***,as a compromise,these solutions result in high resource consumption due to device *** this paper,we propose a novel method named dynamic backup sharing(DBS)that allows SFCs to dynamically share backups to reduce resource *** formulates the problem of sharing backups among different VNFs as an integer linear programming(ILP).Thereafter,we design a novel online algorithm based on dynamic programming to solve the *** experimental results indicate that DBS outperforms state-ofthe-art works by reducing resource consumption and improving the number of accepted requests.
暂无评论