Computational approach to politeness is the task of automatically predicting and/or generating politeness in text. This is a pivotal task for conversational analysis, given the ubiquity and challenges of politeness in...
详细信息
Learning from demonstration(LfD) allows for the effective transfer of human manipulation skills to a robot by building a model that represents these skills based on a limited number of demonstrated ***,a skilllearning...
详细信息
Learning from demonstration(LfD) allows for the effective transfer of human manipulation skills to a robot by building a model that represents these skills based on a limited number of demonstrated ***,a skilllearning model that can comprehensively satisfy multiple requirements,such as computational complexity,modeling accuracy,trajectory smoothness,and robustness,is still ***,this work aims to provide such a model by employing fuzzy ***,we introduce an LfD model named Takagi-Sugeno-Kang fuzzy system-based movement primitives(TSKFMPs),which exploits the advantages of the fuzzy theory for effective robotic imitation learning of human *** work formulates the TSK fuzzy system and gradient descent(GD) as imitation learning models,leveraging recent advancements in GD-based optimization for fuzzy *** study takes a two-step strategy.(ⅰ) The input-output relationships of the model are established using TSK fuzzy systems based on demonstration *** this way,the skill is encoded by the model parameter in the latent space.(ⅱ) GD is used to optimize the model parameter to increase the modeling accuracy and trajectory *** further explain how learned trajectories are adapted to new task scenarios through local *** conduct multiple tests using an open dataset to validate our method,and the results demonstrate performance comparable with those of other ***,we implement it in a real-world case study.
We have developed a new framework based on the theory of causal inference to protect language models against backdoor attacks. Backdoor attackers can poison language models with different types of triggers, such as wo...
详细信息
We have developed a new framework based on the theory of causal inference to protect language models against backdoor attacks. Backdoor attackers can poison language models with different types of triggers, such as words, sentences, grammar, and style, enabling them to selectively modify the decision-making of the victim model. However, existing defense approaches are only effective when the backdoor attack form meets specific assumptions, making it difficult to counter diverse backdoor attacks. We propose a new defense framework Front-door Adjustment for Backdoor Elimination (FABE) based on causal reasoning that does not rely on assumptions about the form of triggers. This method effectively differentiates between spurious and legitimate associations by creating a'front door' that maps out the actual causal relationships. The term'front door' refers to a text that retains the semantic equivalence of the initial input, which is generated by an additional, fine-tuned language model, denoted as the defense model. Our defense experiments against various attack methods at the token, sentence, and syntactic levels reduced the attack success rate from 93.63% to 15.12%, improving the defense effect by 2.91 times compared to the best baseline result of 66.61%, achieving state-of-the-art results. Through ablation study analysis, we analyzed the effect of each module in FABE, demonstrating the importance of complying with the front-door criterion and front-door adjustment formula, which also explains why previous methods failed. Our code to reproduce the experiments is available at: https://***/lyr17/FrontdoorAdjustment-Backdoor-Elimination. Copyright 2024 by the author(s)
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily *** IIoT brings us much convenience,a series of security and scalability issues r...
详细信息
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily *** IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device ***,at present,a reliable and dynamic access control management system for IIoT is in urgent *** till now,numerous access control architectures have been proposed for ***,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be *** this paper,we offer a smart contract token-based solution for decentralized access control in IIoT ***,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT *** also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration ***,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local ***,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research.
This study investigates how doping various elements from the periodic table affects the mechanical properties of ***26representative elements, which were subsequently used to establish doping structure models. The ela...
This study investigates how doping various elements from the periodic table affects the mechanical properties of ***26representative elements, which were subsequently used to establish doping structure models. The elastic constants and intrinsic mechanical properties of these alloy configurations were evaluated using first-principles calculations. Chemical compositions wereconvertedintophysicalfeatures,servingasinputvariablesformultiplemachinelearningalgorithmstopredictthe properties of alloys with common dopants. Furthermore, elements were clustered according to their influence on alloy properties. The results reveal significant variability in the effects of different elements. Notably, Young’s modulus and toughness often exhibited opposing trends. For instance, Zn and Co enhanced toughness, whereas Li and Pb led to increased ***, elements such as Pt, Ti, and Mn achieved a favorable balance between stiffness and ductility. Comparisons between experimental data and predicted results confirmed the accuracy of our approach. This method provides theoretical guidance for the compositional design of high-entropy alloys and offers insights into accelerating first-principles calculations.
In order to solve the problems caused by the inherent complex nonlinearity and the limitation of traditional linear modeling technology in engine fault diagnosis, the Equilibrium manifold model is introduced in this p...
详细信息
Dissimilar joining of Ti_(2)AlNb and Ti60 rolled sheet was performed by laser beam *** microstructures and mechanical properties of as-welded and post-weld heat-treated Ti_(2)AlNb/Ti60 joints were investigated by micr...
详细信息
Dissimilar joining of Ti_(2)AlNb and Ti60 rolled sheet was performed by laser beam *** microstructures and mechanical properties of as-welded and post-weld heat-treated Ti_(2)AlNb/Ti60 joints were investigated by microstructure observation and mechanical properties *** fusion zone(FZ)of the as-welded joint consisted of B_(2)/βmatrix and small S2 *** heataffected zones HAZ-Ti_(2)AINb and HAZ-Ti60 for the aswelded joint were characterized asα_(2)+B_(2)/β+O andα'+α+β+S_(2),*** tensile strength and elongation of as-welded sheet were 597.5 MPa and 6.2%at650℃,*** of the plastic deformation was taken place at the side of Ti60 *** the increase in the heat treatment temperature,the anchoring strength between each other of B_(2)/βgrains was enhanced by the precipitated lamellarα'and O grains at the *** depth of the fracture dimples increased with the heat treat temperature *** heat-treated welding joint at970℃presented a good balance of the tensile strength and plasticity,where the tensile strength and the elongation were enhanced to 669.7 MPa and 7.1%at 650℃,respectively.
The mechanical properties of negative stiffness(NS)metamaterial could be customized and tuned in a wide range for various requirements,achieving programmable performances by the design from the aspect of structure and...
详细信息
The mechanical properties of negative stiffness(NS)metamaterial could be customized and tuned in a wide range for various requirements,achieving programmable performances by the design from the aspect of structure and *** work investigates the viscoelastic NS metamaterial based on double curved beams using a combined approach of experiments,simulations,and analytical modeling with an emphasis on multistage loading bearing and programmable energy absorption *** simulations are first implemented based on the finite element models of three types of metamaterial cells,which provide comparisons of load bearing and energy absorption ***,the effects of geometric parameters of multistage metamaterial element and the mechanisms are *** analytical discrete model is then innovatively developed to provide straightforward understandings of the geometric effects and reveal the role of viscoelasticity by examining the instantaneous loading responses and rate-dependent ***,we fabricate the metamaterial samples using 3D-printing technique and perform compression tests to validate the properties based on different boundary conditions,loading rates and cyclic loading and *** of this work show the potential of wide programmable room for mechanical properties through structure and functional material design,such as multistage load bearing capacity and energy absorption ability.
Additively manufactured(AM)metallic materials commonly possess substantial tensile surface residual stress,which is detrimental to the load-bearing service ***,we demonstrated that deep cryogenic treatment(DCT)is an e...
详细信息
Additively manufactured(AM)metallic materials commonly possess substantial tensile surface residual stress,which is detrimental to the load-bearing service ***,we demonstrated that deep cryogenic treatment(DCT)is an effective method for improving the tensile properties of CoCrFeMnNi high-entropy alloy(HEA)samples fabricated by laser melting deposition(LMD),by introducing high compressive residual stress and deformation microstructures without destroying the AM ***,carrying out the DCT in a single-step mode does not improve the residual stress gradients inherent from the LMD process,which are undesirable as the mechanical properties will not be homogeneous within the *** this work,we show that carrying out the DCT in a cyclic mode with repeated cryogenic cooling and reheating can significantly homogenize the residual stress in LMD-fabricated Co Cr Fe Mn Ni HEA,and improve tensile strength and ductility,compared with single-step DCT of the same cryogenic soaking *** cyclic DCT,the thermal stress is re-elevated to a high value at each cryogenic cooling step,leading to the formation of denser and more intersecting reinforcing crystalline defects and hcp phase transformation,compared to single-step DCT of the same total cryogenic soaking duration in which the thermal stress relaxes towards a low value over *** enhancement of defect formation in the cyclic mode of DCT also leads to more uniform residual stress distribution in the sample after the *** results here provide important insights on optimizing DCT processes for post-fabrication improvement of mechanical properties of AM metallic net shapes.
Cloud providers frequently utilize two tightly coupled resource management strategies like task scheduling & data replication to boost the performance of the system generally, guaranteeing service level agreement ...
详细信息
暂无评论