At the doctoral level in the field of computerscience, the domain of literature plagiarism detection encompasses numerous plagiarism detection algorithms, but relatively fewer have focused on methods specifically des...
详细信息
Traffic flow prediction plays a key role in the construction of intelligent transportation ***,due to its complex spatio-temporal dependence and its uncertainty,the research becomes very *** of the existing studies ar...
详细信息
Traffic flow prediction plays a key role in the construction of intelligent transportation ***,due to its complex spatio-temporal dependence and its uncertainty,the research becomes very *** of the existing studies are based on graph neural networks that model traffic flow graphs and try to use fixed graph structure to deal with the relationship between ***,due to the time-varying spatial correlation of the traffic network,there is no fixed node relationship,and these methods cannot effectively integrate the temporal and spatial *** paper proposes a novel temporal-spatial dynamic graph convolutional network(TSADGCN).The dynamic time warping algorithm(DTW)is introduced to calculate the similarity of traffic flow sequence among network nodes in the time dimension,and the spatiotemporal graph of traffic flow is constructed to capture the spatiotemporal characteristics and dependencies of traffic *** combining graph attention network and time attention network,a spatiotemporal convolution block is constructed to capture spatiotemporal characteristics of traffic *** on open data sets PEMSD4 and PEMSD8 show that TSADGCN has higher prediction accuracy than well-known traffic flow prediction algorithms.
One curious property of neural networks is the vulnerability to specific attacks, often called adversarial examples. One of the directions adversarial transferability research has taken is to focus on dataset features...
详细信息
ISBN:
(纸本)9798350345032
One curious property of neural networks is the vulnerability to specific attacks, often called adversarial examples. One of the directions adversarial transferability research has taken is to focus on dataset features. The transferability of adversarials is often linked to those common global features being present or not. To validate this theory, we tested if the transferability of attacks occurs when the underlying global features of a dataset remain the same. This is because topology promises to preserve the properties of an object under continuous deformations. In this paper, we test the correlation between topological similarities using the mapper algorithm by Singh et al. to generate an approximation of the topology in a graphical manner and a distance notion provided by the NetLSD algorithm, which promises size, scale, and permutation invariance. These two algorithms allow us to show that adversarial transferability is, in fact, independent of the topological similarity of datasets. We implement our findings in https://***/KDD-OpenSource/Topological-Transf. This is an astounding new insight, as former theories have led us to expect that if the assumption is true that global features are relevant for transferability, those should be captured using algorithms that detect global features under only topological change- Unless, of course, the transferability and those global features are explicitly agnostic to topological change. This might point to current research regarding adversarial transferability in different directions. More specifically, we take an experimental approach using topological approximation methods to capture essential features of datasets. Past studies concerning adversarial examples show that attacks can transfer in unforeseen ways and between different neural network architectures and may produce severe vulnerabilities in sophisticated learners. However, when tackling the problem of vulnerabilities to adversarial attacks, only a few a
Two packet scheduling algorithms for rechargeable sensor networks are proposed based on the signal to interference plus noise ratio *** allocate different transmission slots to conflicting packets and overcome the cha...
详细信息
Two packet scheduling algorithms for rechargeable sensor networks are proposed based on the signal to interference plus noise ratio *** allocate different transmission slots to conflicting packets and overcome the challenges caused by the fact that the channel state changes quickly and is *** first algorithm proposes a prioritybased framework for packet scheduling in rechargeable sensor *** packet is assigned a priority related to the transmission delay and the remaining energy of rechargeable batteries,and the packets with higher priority are scheduled *** second algorithm mainly focuses on the energy efficiency of *** priorities are related to the transmission distance of packets,and the packets with short transmission distance are scheduled *** sensors are equipped with low-capacity rechargeable batteries,and the harvest-store-use model is *** consider imperfect *** is,the battery capacity is limited,and battery energy leaks over *** energy harvesting rate,energy retention rate and transmission power are *** simulation results indicate that the battery capacity has little effect on the packet scheduling ***,the algorithms proposed in this paper are very suitable for wireless sensor networks with low-capacity batteries.
The rapid development of blockchain technology has led to many innovations, with the widespread use of smart contracts being particularly notable. However, this trend has spawned diverse blockchain scams, including th...
详细信息
Vehicular network technology has made substantial advancements in recent years in the field of Intelligent Transportation Systems. Vehicular Cloud Computing (VCC) has emerged as a novel paradigm with a substantial inc...
详细信息
"Tree-based ensemble algorithms" (TEAs) are extensively employed for classification and regression problems. However, existing TEAs lag behind the trade-off between TEA interpretability and achieving cutting...
详细信息
Lung function evaluation is important to many medical applications, but conducting pulmonary function tests is constrained by different conditions. This article presents a pioneer study of an integrated invertible dee...
详细信息
Prediction sets capture uncertainty by predicting sets of labels rather than individual labels, enabling downstream decisions to conservatively account for all plausible outcomes. Conformal inference algorithms constr...
详细信息
Multi-Criteria Recommender Systems (MCRSs) are a promising method that takes into account several elements of the user's preferences in order to improve recommendation accuracy. However, most existing research has...
详细信息
暂无评论