Explainable recommendation systems, which can produce high-accuracy recommendations and help users make quick decisions, have become a hotspot in research field. Most of existing research algorithms committed to impro...
详细信息
Sign Language recognition is one of the essential and focal areas for researchers in terms of improving the integration of speech and hearing-impaired people into common society. The main idea is to detect the hand ge...
详细信息
Stimulating and maintaining students’ learning motivation is the key to fully mobilizing the enthusiasm of students’ active participation and realizing the unity of students’ learning and teachers’ teaching. The A...
详细信息
Utilizing the vast amount of data available online to model and predict this diffusion is of great importance in various fields. Existing approaches for information cascade prediction fall into three main categories: ...
详细信息
The widespread adoption of deep neural networks (DNNs) is a testament to their profound impact on various domains. However, they are vulnerable to backdoor attacks. Previous defense strategies suffer from requiring ad...
详细信息
ISBN:
(数字)9798350390155
ISBN:
(纸本)9798350390162
The widespread adoption of deep neural networks (DNNs) is a testament to their profound impact on various domains. However, they are vulnerable to backdoor attacks. Previous defense strategies suffer from requiring additional prior knowledge or performance decreases. To tackle these challenges, we propose a new method to mitigate the impact of backdoor triggers. Specifically, we first devise a simple yet effective detection mechanism based on the region growing algorithm, which enables the identification of triggers within training data without necessitating prior knowledge. Then, we leverage the diffusion model to eliminate the inserted triggers while recovering the data information at the triggers’ locations. Finally, the processed data are fed into the current model for label recovery. Extensive experiments on the CIFAR10, Tiny Imagenet, and GTSRB datasets demonstrate that our method can defend against backdoor attacks effectively and surpasses the state-of-the-art defenses in terms of both main task accuracy (ACC) and backdoor task attack success rate (ASR).
The explosive growth of the Internet has elevated social networks to a pivotal role in information propagation, reshaping conventional paradigms of information distribution. Utilizing the vast amount of data available...
详细信息
The explosive growth of the Internet has elevated social networks to a pivotal role in information propagation, reshaping conventional paradigms of information distribution. Utilizing the vast amount of data available online to model and predict this diffusion is of great importance in various fields. Existing approaches for information cascade prediction fall into three main categories: feature-driven methods, point process-based methods, and deep learning-based methods. Among them, deep learning-based methods, characterized by their superior learning and representation capabilities, mitigate the shortcomings inherent in the other methods. However, current deep learning methods still face several persistent challenges. In particular, accurate representation of user attributes remains problematic due to factors such as fake followers and complex network configurations. Previous algorithms that focused on the sequential order of user activations often neglected the rich insights offered by activation timing. Furthermore, these techniques often fail to holistically integrate temporal and structural aspects, thus missing the nuanced propagation trends inherent in information cascades. To address these issues, we propose the Cross-Domain Information Fusion Framework (CasCIFF), which is tailored for information cascade prediction. This framework exploits multi-hop neighborhood information to make user embeddings robust. When embedding cascades, the framework intentionally incorporates timestamps, endowing it with the ability to capture evolving patterns of information diffusion. In particular, CasCIFF seamlessly integrates the tasks of user classification and cascade prediction into a consolidated framework, thereby allowing the extraction of common features that prove useful for all tasks, a strategy anchored in the principles of multitask learning. After extensive experiments conducted on publicly available datasets, the results demonstrate CasCIFF’s superiority over e
With the development of Mashup technique, the number of Web APIs released on the Web continues to grow year by year. However, it is a challenging issue to find and select the desirable Web APIs among the large amount ...
With the development of Mashup technique, the number of Web APIs released on the Web continues to grow year by year. However, it is a challenging issue to find and select the desirable Web APIs among the large amount of Web APIs. Consequently, interactive Web API recommendation is used to alleviate the difficulty of service selection, when users or developers try to invoke Web APIs for solving their business requirements or software development requirements. Currently, there are several collaborative filtering based approaches proposed for Web API recommendation, while their recommendation performance is limited on both optimality and scalability. This paper proposes a light neural graph collaborative filtering based Web API recommendation approach, named LNGCF. Specifically, LNGCF learns user and item embeddings by linearly propagating them on the user-item interaction graph, and uses the weighted summation of the embeddings learned at all layers as the final embedding. Such simple, linear, and neat model is much easier to implement and train. A set of experiments are conducted on a real-world dataset. Experimental results demonstrate the substantial improvements on both optimality and scalability over the baselines.
Log-based anomaly detection is essential for maintaining software availability. However, existing log-based anomaly detection approaches heavily rely on fine-grained exact labels of log entries which are very hard to ...
详细信息
ISBN:
(数字)9798331505691
ISBN:
(纸本)9798331505707
Log-based anomaly detection is essential for maintaining software availability. However, existing log-based anomaly detection approaches heavily rely on fine-grained exact labels of log entries which are very hard to obtain in real-world systems. This brings a key problem that anomaly detection models require supervision signals while labeled log entries are unavailable. Facing this problem, we propose a new labeling strategy called inexact labeling that instead of labeling an log entry, system experts can label a bag of log entries in a time span. Furthermore, we propose MIDLog, a weakly supervised log-based anomaly detection approach with inexact labels. We leverage the multiinstance learning paradigm to achieve explicit separation of anomalous log entries from the inexact labeled anomalous log set so as to deduce exact anomalous log labels from inexact labeled log sets. Extensive evaluation on three public datasets shows that our approach achieves an F1 score of over 85% with inexact labels.
Recurrent Neural Network (RNN) is a typical feedback neural network, which is particularly effective in processing time-series data tasks such as image description, text generation and classification, etc. However, it...
详细信息
Location is one of the fundamental factors that determine hotel success. The location, once selected, cannot be changed without a significant investment. This research aims to identify the location-specific factors th...
详细信息
暂无评论