With the rapid development of Natural Language Processing (NLP), text matching has become the basis of many downstream tasks in NLP, and the study of text matching is of great research significance for solving tasks s...
详细信息
ISBN:
(数字)9798350349184
ISBN:
(纸本)9798350349191
With the rapid development of Natural Language Processing (NLP), text matching has become the basis of many downstream tasks in NLP, and the study of text matching is of great research significance for solving tasks such as question and answer and information retrieval in NLP. Most of the current text matching methods tend to have problems such as mismatch of grammatical structures and insufficient interaction information in sentences. In order to solve the problems of insufficient interaction information and lack of features and ability to capture keyword and sequence information in text matching, this paper proposes a text matching method based on multi-layer coding and soft attention mechanism. The method first embeds the text and sends it to a gating module for processing, then sends the processed result to a module containing a combination of multilayer coding and soft attention mechanism for further operations such as multiple alignment, and finally sends it to a classifier containing a three-layer fully-connected network for predicting whether the input text pairs match or not. The two modules proposed in this paper are practically feasible, and comparison and ablation experiments have been conducted on the publicly available datasets LCQMC dataset and BQ dataset, and the experimental results show that the two modules improve the accuracy of text matching by 2.44% and 1.02%, respectively.
In this paper, the optimization of unmanned aerial vehicle (UAV) localization under jamming attacks is studied. In the considered network, a base station (BS) collaborates with an active UAV to localize a target UAV. ...
详细信息
ISBN:
(数字)9798350351255
ISBN:
(纸本)9798350351262
In this paper, the optimization of unmanned aerial vehicle (UAV) localization under jamming attacks is studied. In the considered network, a base station (BS) collaborates with an active UAV to localize a target UAV. During this positioning process, a jamming UAV transmits discontinuous signals to passive UAVs to interfere the distance information measurement. To localize the target UAV under jamming attacks, the BS jointly use two localization methods: 1) generative adversarial network (GAN)-based positioning method and 2) time difference of arrival (TDOA)-based positioning method. Since GAN-based positioning method cannot defense in a strong jamming signal while TDOA-based positioning method may consume more energy and sacrifice localization accuracy, the BS must select an appropriate positioning method (GAN-based or TDOA-based methods) and four distance measurement information of passive UAVs to estimate the position of the target UAV. This problem is formulated as an optimization problem whose goal is to minimize the positioning error between the estimated and the ground truth positions of the target UAV while considering jamming attacks and the trajectory of passive UAVs. To solve this problem, we propose a mixture Gaussian distribution model-based collaborative reinforcement learning (RL) method which enables the active UAV to determine its transmit power and trajectory, and enables the BS to select the most appropriate subsets of distance measurement information and the optimal positioning method according to the movement of passive UAVs and the unknown jamming attack pattern of the jamming UAV. Simulation results show the proposed method can reduce the positioning error of the target UAV by up to 36.5% compared to the method that does not consider the GAN-based positioning method.
In an effort to the problem of insufficient tracking performance of the Fully-convolutional Siamese network (SiamFC) in complex scenarios, a dual attention mechanism object tracking algorithm based on the Fully-convol...
详细信息
The development of the Internet has made people more closely related and has put forward higher requirements for recommendation models. Most recommendation models are studied only for the long-term interests of users....
The development of the Internet has made people more closely related and has put forward higher requirements for recommendation models. Most recommendation models are studied only for the long-term interests of users. In this paper, the interaction time between the user and the item is introduced as auxiliary information in the model construction. Interaction time is used to determine users’ long-term preferences and short-term preferences. In this paper, temporal features are extracted by building a convolutional gated recurrent unit with attention neural network (CNN-GRU-Attention). Firstly, for the problem of accurate feature extraction, CNN are constructed to extract higher-level and more abstract features of themselves and transform high-dimensional data into low-dimensional data; secondly, for the problem of social temporality, GRU are used to not only extract temporal information, but also effectively reduce gradient dispersion, making model convergence and training easier; finally, Graph Attention networks are used to aggregate the social relationship information of users and items respectively, which constitute the final feature representation of users and items respectively. In particular, a modified cosine similarity is used to reduce the error caused by data insensitivity when constructing the social information of the item. In this study, simulation experiments are conducted on two publicly available datasets (Epinions and Ciao), and the experimental results show that the proposed recommended model performs better than other social recommendation models, improving the evaluation metrics of MAE and RMSE by 1.06%-1.33% and 1.19%-1.37%, respectively. The effectiveness of the model innovation is proved.
To address the challenges associated with insufficiently extracting and utilizing features at different levels, overlooking the connection between label meanings and text, and facing problems of over-compression or in...
详细信息
ISBN:
(数字)9781665410205
ISBN:
(纸本)9781665410212
To address the challenges associated with insufficiently extracting and utilizing features at different levels, overlooking the connection between label meanings and text, and facing problems of over-compression or information loss when extracting global information using recurrent neural networks in the field of multi-label text categorization, this paper introduces an innovative model known as MFFLEN (MultiFeature Fusion and Label Embedding Neural network). First, a back-translated enhanced label set is constructed by back-translated splicing enhancement of the original label set. This set, together with the text, is then input into the embedding layer, which consists of the pre-trained model of bert-baseChinese, thus establishing the initial connection between the text and the labels within the same vector space. Then, to comprehensively extract multi-level semantic features, the model uses a convolutional layer to extract local features and an embedding layer to extract sentence-level features. A bidirectional attention embedded GRU (BAE-GRU) layer is used to extract hybrid finegrained features, which are then fed into the attention layer to further extract hybrid labeled features based on labeling information. Finally, these three different types of features are fused and multi-label text classification results are obtained using a classifier. The experiments proved that the MFFLEN model achieved 73.82% and 88.44% macro-F1 and 88.00% and 88.86% micro-F1 on the two datasets CAIL 2018 Small and CAIL 2018 Split, respectively, which is better than other baseline models.
Federated learning (FL) has been recognized as a viable distributed learning paradigm for training a machine learning model across distributed clients without uploading raw data. However, FL in wireless networks still...
详细信息
Post-hoc explanations are important for people to understand the predictions of explanation models. One class of methods in post-hoc explanation is the generation of counterfactuals, where a hypothetical example is ob...
Post-hoc explanations are important for people to understand the predictions of explanation models. One class of methods in post-hoc explanation is the generation of counterfactuals, where a hypothetical example is obtained by perturbing the inputs to show how one could obtain a different prediction from the decision model. Counter-factual explanations should satisfy several properties: One is that counterfactuals generated under specific scenarios and constraints should be feasible for users, i.e., they should accommodate different causal constraints. The other is that it is more desirable for users to have a wider variety of viable examples, i.e., counterfactual diversity. To this end, we propose a parallelizable method based on gradient optimization. We partition the input feasible domains, perform counterfactual generation independently for each feasible domain, and then parallelize the counterfactual generation process for each feasible domain. Experimental results show that our approach effectively improves the diversity, sparsity, and proximity of the generated counterfactual instances on the public datasets Adult-Income, Lending-Club, German-Credit, and COMPAS compared to other models.
In order to facilitate government departments to assess security risks and prevent infiltration, it's necessary to recognize the IoT device from open data by the method of Named entity recognition (NER). In this s...
详细信息
With the popularity of blockchains, low transaction throughput has become a significant bottleneck in applications such as cryptocurrencies. Payment channel networks (PCNs) have received attention as a way to improve ...
详细信息
We present GauKGT5, a sequence-to-sequence model proposed for knowledge graph completion (KGC). Our research extends the KGT5 model, a recent sequence-to-sequence link prediction (LP) model. GauKGT5 takes advantage of...
We present GauKGT5, a sequence-to-sequence model proposed for knowledge graph completion (KGC). Our research extends the KGT5 model, a recent sequence-to-sequence link prediction (LP) model. GauKGT5 takes advantage of textual characteristics inherent in the knowledge graph, exhibiting a small model size. However, KGT5’s proficiency in link prediction necessitates the ensemble with a knowledge graph embedding model, which itself poses challenges due to its substantial size and expense. By integrating the Gated Attention Unit into the KGT5 model and directly applying it to the encoder-decoder structure, we achieve improved contextual dependency capturing within the sequence, resulting in enhanced prediction accuracy, accelerated training speed, and enhanced computational efficiency. At the same time, we introduce parallel computing as a means to enhance the efficiency of model training and inference within the XPU distributed computing environment.
暂无评论