Music genre classification is one of the most interesting topics in digital music. Classifying genres is basically subjective, and different listeners may perceive genres in various ways. Furthermore, it might be diff...
详细信息
Adversarial training has been widely considered the most effective defense against adversarial ***,recent studies have demonstrated that a large discrepancy exists in the class-wise robustness of adversarial training,...
详细信息
Adversarial training has been widely considered the most effective defense against adversarial ***,recent studies have demonstrated that a large discrepancy exists in the class-wise robustness of adversarial training,leading to two potential issues:firstly,the overall robustness of a model is compromised due to the weakest class;and secondly,ethical concerns arising from unequal protection and biases,where certain societal demographic groups receive less robustness in defense *** these issues,solutions to address the discrepancy remain largely *** this paper,we advance beyond existing methods that focus on class-level *** investigation reveals that hard examples,identified by higher cross-entropy values,can provide more fine-grained information about the ***,we find that enhancing the diversity of hard examples can effectively reduce the robustness gap between *** by these observations,we propose Fair Adversarial Training(FairAT)to mitigate the discrepancy of class-wise *** experiments on various benchmark datasets and adversarial attacks demonstrate that FairAT outperforms state-of-the-art methods in terms of both overall robustness and *** a WRN-28-10 model trained on CIFAR10,FairAT improves the average and worst-class robustness by 2.13%and 4.50%,respectively.
When the ground communication base stations in the target area are severely destroyed,the deployment of Unmanned Aerial Vehicle(UAV)ad hoc networks can provide people with temporary communication ***,it is necessary t...
详细信息
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential sec...
详细信息
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential security risks that need to be carefully evaluated and addressed. In this survey, we provide an overview of the current state of research on security of using ChatGPT, with aspects of bias, disinformation, ethics, misuse,attacks and privacy. We review and discuss the literature on these topics and highlight open research questions and future *** this survey, we aim to contribute to the academic discourse on AI security, enriching the understanding of potential risks and mitigations. We anticipate that this survey will be valuable for various stakeholders involved in AI development and usage, including AI researchers, developers, policy makers, and end-users.
The Brain Tumor(BT)is created by an uncontrollable rise of anomalous cells in brain tissue,and it consists of 2 types of cancers they are malignant and benign *** benevolent BT does not affect the neighbouring healthy...
详细信息
The Brain Tumor(BT)is created by an uncontrollable rise of anomalous cells in brain tissue,and it consists of 2 types of cancers they are malignant and benign *** benevolent BT does not affect the neighbouring healthy and normal tissue;however,the malignant could affect the adjacent brain tissues,which results in *** recognition of BT is highly significant to protecting the patient’s ***,the BT can be identified through the magnetic resonance imaging(MRI)scanning *** the radiotherapists are not offering effective tumor segmentation in MRI images because of the position and unequal shape of the tumor in the ***,ML has prevailed against standard image processing *** studies denote the superiority of machine learning(ML)techniques over standard ***,this study develops novel brain tumor detection and classification model using met heuristic optimization with machine learning(BTDC-MOML)*** accomplish the detection of brain tumor effectively,a Computer-Aided Design(CAD)model using Machine Learning(ML)technique is proposed in this research ***,the input image pre-processing is performed using Gaborfiltering(GF)based noise removal,contrast enhancement,and skull ***,mayfly optimization with the Kapur’s thresholding based segmentation process takes *** feature extraction proposes,local diagonal extreme patterns(LDEP)are *** last,the Extreme Gradient Boosting(XGBoost)model can be used for the BT classification *** accuracy analysis is performed in terms of Learning accuracy,and the validation accuracy is performed to determine the efficiency of the proposed research *** experimental validation of the proposed model demonstrates its promising performance over other existing methods.
Federated recommender systems(FedRecs) have garnered increasing attention recently, thanks to their privacypreserving benefits. However, the decentralized and open characteristics of current FedRecs present at least t...
详细信息
Federated recommender systems(FedRecs) have garnered increasing attention recently, thanks to their privacypreserving benefits. However, the decentralized and open characteristics of current FedRecs present at least two ***, the performance of FedRecs is compromised due to highly sparse on-device data for each client. Second, the system's robustness is undermined by the vulnerability to model poisoning attacks launched by malicious users. In this paper, we introduce a novel contrastive learning framework designed to fully leverage the client's sparse data through embedding augmentation, referred to as CL4FedRec. Unlike previous contrastive learning approaches in FedRecs that necessitate clients to share their private parameters, our CL4FedRec aligns with the basic FedRec learning protocol, ensuring compatibility with most existing FedRec implementations. We then evaluate the robustness of FedRecs equipped with CL4FedRec by subjecting it to several state-of-the-art model poisoning attacks. Surprisingly, our observations reveal that contrastive learning tends to exacerbate the vulnerability of FedRecs to these attacks. This is attributed to the enhanced embedding uniformity, making the polluted target item embedding easily proximate to popular items. Based on this insight, we propose an enhanced and robust version of CL4FedRec(rCL4FedRec) by introducing a regularizer to maintain the distance among item embeddings with different popularity levels. Extensive experiments conducted on four commonly used recommendation datasets demonstrate that rCL4FedRec significantly enhances both the model's performance and the robustness of FedRecs.
Internet of things (IoT) devices make up 30%of all network-connected endpoints,introducing vulnerabilities and novel attacks that make many companies as primary targets for *** address this increasing threat surface,e...
详细信息
Internet of things (IoT) devices make up 30%of all network-connected endpoints,introducing vulnerabilities and novel attacks that make many companies as primary targets for *** address this increasing threat surface,every organization deploying IoT devices needs to consider security risks to ensure those devices are secure and *** all the solutions for security risks,firmware security analysis is essential to fix software bugs,patch vulnerabilities,or add new security features to protect users of those vulnerable ***,firmware security analysis has never been an easy job due to the diversity of the execution environment and the close source of *** two distinct features complicate the operations to unpack firmware samples for detailed *** also make it difficult to create visual environments to emulate the running of device *** researchers have developed many novel methods to overcome various challenges in the past decade,critical barriers impede firmware security analysis in ***,this survey is motivated to systematically review and analyze the research challenges and their solutions,considering both breadth and ***,based on the analysis perspectives,various methods that perform security analysis on IoT devices are introduced and classified into four *** challenges in each category are discussed in detail,and potential solutions are proposed *** then discuss the flaws of these solutions and provide future directions for this research *** survey can be utilized by a broad range of readers,including software developers,cyber security researchers,and software security engineers,to better understand firmware security analysis.
The present study advances object detection and tracking techniques by proposing a novel model combining Automated Image Annotation with Inception v2-based Faster RCNN (AIA-IFRCNN). The research methodology utilizes t...
详细信息
As embodied intelligence(EI), large language models(LLMs), and cloud computing continue to advance, Industry5.0 facilitates the development of industrial artificial intelligence(Ind AI) through cyber-physical-social s...
详细信息
As embodied intelligence(EI), large language models(LLMs), and cloud computing continue to advance, Industry5.0 facilitates the development of industrial artificial intelligence(Ind AI) through cyber-physical-social systems(CPSSs) with a human-centric focus. These technologies are organized by the system-wide approach of Industry 5.0, in order to empower the manufacturing industry to achieve broader societal goals of job creation, economic growth, and green production. This survey first provides a general framework of smart manufacturing in the context of Industry 5.0. Wherein, the embodied agents, like robots, sensors, and actuators, are the carriers for Ind AI, facilitating the development of the self-learning intelligence in individual entities, the collaborative intelligence in production lines and factories(smart systems), and the swarm intelligence within industrial clusters(systems of smart systems). Through the framework of CPSSs, the key technologies and their possible applications for supporting the single-agent, multi-agent and swarm-agent embodied Ind AI have been reviewed, such as the embodied perception, interaction, scheduling, multi-mode large language models, and collaborative training. Finally, to stimulate future research in this area, the open challenges and opportunities of applying Industry 5.0 to smart manufacturing are identified and discussed. The perspective of Industry 5.0-driven manufacturing industry aims to enhance operational productivity and efficiency by seamlessly integrating the virtual and physical worlds in a human-centered manner, thereby fostering an intelligent, sustainable, and resilient industrial landscape.
Edge learning (EL) is an end-to-edge collaborative learning paradigm enabling devices to participate in model training and data analysis, opening countless opportunities for edge intelligence. As a promising EL framew...
详细信息
暂无评论