This paper studies the recognition of oracle character, the earliest known hieroglyphs in China. Essentially, oracle character recognition suffers from the problem of data limitation and imbalance. Recognizing the ora...
详细信息
ISBN:
(纸本)9783030695439
This paper studies the recognition of oracle character, the earliest known hieroglyphs in China. Essentially, oracle character recognition suffers from the problem of data limitation and imbalance. Recognizing the oracle characters of extremely limited samples, naturally, should be taken as the few-shot learning task. Different from the standard few-shot learning setting, our model has only access to large-scale unlabeled source Chinese characters and few labeled oracle characters. In such a setting, meta-based or metric-based few-shot methods are failed to be efficiently trained on source unlabeled data;and thus the only possible methodologies are self-supervised learning and data augmentation. Unfortunately, the conventional geometric augmentation always performs the same global transformations to all samples in pixel format, without considering the diversity of each part within a sample. Moreover, to the best of our knowledge, there is no effective self-supervised learning method for few-shot learning. To this end, this paper integrates the idea of self-supervised learning in data augmentation. And we propose a novel data augmentation approach, named Orc-Bert Augmentor pre-trained by self-supervised learning, for few-shot oracle character recognition. Specifically, Orc-Bert Augmentor leverages a self-supervised BERT model pre-trained on large unlabeled Chinese characters datasets to generate sample-wise augmented samples. Given a masked input in vector format, Orc-Bert Augmentor can recover it and then output a pixel format image as augmented data. Different mask proportion brings diverse reconstructed output. Concatenated with Gaussian noise, the model further performs point-wise displacement to improve diversity. Experimentally, we collect two large-scale datasets of oracle characters and other Chinese ancient characters for few-shot oracle character recognition and Orc-Bert Augmentor pre-training. Extensive experiments on few-shot learning demonstrate the effe
Personal digital data is a critical asset, and governments worldwide have enforced laws and regulations to protect data privacy. data users have been endowed with the 'right to be forgotten' of their data. In ...
详细信息
We explore practical optimizations on comparison-based exact string matching algorithms. We present a guard test that compares q-grams between the pattern and the text before entering the match loop, and evaluate expe...
详细信息
The rapid advancement of immersive technologies has propelled the development of the Metaverse, where the convergence of virtual and physical realities necessitates the generation of high-quality, photorealistic image...
详细信息
One-shot voice conversion (VC) aims to alter the timbre of speech from a source speaker to match that of a target speaker using just a single reference speech from the target, while preserving the semantic content of ...
详细信息
The Merge changes Ethereum from Proof-of-Work (PoW) to the more secure and less energy-intensive Proof-of-Stake (PoS) mechanism. However, the existence of malicious valida tors still threatens the security of Ethereum...
详细信息
ISBN:
(数字)9798350377842
ISBN:
(纸本)9798350377859
The Merge changes Ethereum from Proof-of-Work (PoW) to the more secure and less energy-intensive Proof-of-Stake (PoS) mechanism. However, the existence of malicious valida tors still threatens the security of Ethereum, primarily through a discouragement attack. How can we redesign the incentive mech-anism in PoS Ethereum for a more secure blockchain? For this quest, we, for the first time, apply the cutting-edge reinforcement mechanism design method-an interdisciplinary approach at the intersection of reinforcement learning (RL) and mechanism design-to staking mechanism designs. We abstract a generalized staking mechanism as a game environment and implement an RL method for the blockchain as a mechanism designer to explore the optimal incentive design. Our reinforcement mechanism design outperforms the status quo in cultivating honest validators. Furthermore, we identify Advantage Actor-Critic (A2C) as the most efficient RL algorithm among the three alternatives, which intuitively performs better when the initial proportion of honest validator is larger. Our interdisciplinary approach of generalized abstraction could be adapted to analyze the incentive design in any PoS blockchain and beyond.
The widespread adoption of Electric Vehicles (EVs) poses critical challenges for energy providers, particularly in predicting charging time (temporal prediction), ensuring user privacy, and managing resources efficien...
详细信息
The widespread adoption of Electric Vehicles (EVs) poses critical challenges for energy providers, particularly in predicting charging time (temporal prediction), ensuring user privacy, and managing resources efficiently in mobility-driven networks. This paper introduces the Hierarchical Federated Learning Transformer Network (H-FLTN) framework to address these challenges. H-FLTN employs a three-tier hierarchical architecture comprising EVs, community Distributed Energy Resource Management Systems (DERMS), and the Energy Provider data Centre (EPDC) to enable accurate spatio-temporal predictions of EV charging needs while preserving privacy. Temporal prediction is enhanced using Transformer-based learning, capturing complex dependencies in charging behavior. Privacy is ensured through Secure Aggregation, Additive Secret Sharing, and Peer-to-Peer (P2P) Sharing with Augmentation, which allow only secret shares of model weights to be exchanged while securing all transmissions. To improve training efficiency and resource management, H-FLTN integrates Dynamic Client Capping Mechanism (DCCM) and Client Rotation Management (CRM), ensuring that training remains both computationally and temporally efficient as the number of participating EVs increases. DCCM optimises client participation by limiting excessive computational loads, while CRM balances training contributions across epochs, preventing imbalanced participation. Our simulation results based on large-scale empirical vehicle mobility data reveal that DCCM and CRM reduce the training time complexity with increasing EVs from linear to constant. By mitigating key FL challenges including data heterogeneity, computational overhead, and bias H-FLTN provides a secure, resource-efficient solution for predicting EV charging behavior. Its integration into real-world smart city infrastructure enhances energy demand forecasting, resource allocation, and grid stability, ensuring reliability and sustainability in future mobility ec
Using large language models (LLMs) to convert natural language (NL) into SQL simplifies data access for users by allowing them to use everyday language. However, business departments often distrust LLM-based text-to-S...
详细信息
ISBN:
(纸本)9798400713316
Using large language models (LLMs) to convert natural language (NL) into SQL simplifies data access for users by allowing them to use everyday language. However, business departments often distrust LLM-based text-to-SQL systems due to the probabilistic nature of SQL generation, which can result in incorrect but executable SQL queries caused by model hallucinations. This leads to significant concerns regarding the accuracy and reliability of the queried data. In this paper, we present RBDQ, a novel LLM-based text-to-SQL system designed to address the unique challenges of business data queries. RBDQ innovatively introduces the Hierarchical Metrics Query Method and integrates advanced Retrieval-Augmented Generation (RAG) methods along with a self-reflection mechanism to tackle these challenges. RBDQ effectively meets the requirements of business metric queries in real-world scenarios. Currently implemented in the Quality Assurance department at ByteDance, RBDQ has significantly improved operational efficiency and query flexibility. Our experiments demonstrate the system's effectiveness, achieving an Execution Accuracy of 96.20%.
Being able to predict the mental states of others is a key factor to effective social interaction. It is also crucial for distributed multi-agent systems, where agents are required to communicate and cooperate. In thi...
详细信息
Photography is the most important, powerful, and reliable means of expression. Today, digital images not only provide disinformation but also act as agents for secret communication. Users and editing professionals wor...
Photography is the most important, powerful, and reliable means of expression. Today, digital images not only provide disinformation but also act as agents for secret communication. Users and editing professionals work with digital images for a variety of purposes. Images are often regarded as facts or proof of reality, so they are misleading and fake news or publications of any form that use images manipulated in a highly misleading way. To recognize image tampering needs multiple image data and a model that can handle all the pixels in the image. Furthermore, training the data more efficiently and needed flexibility support everyday use. Models based on Deep learning such as Convolutional Neural Networks with error level analysis (ELA) are the perfect solution.
暂无评论