Federated Learning (FL) has significant potential to protect data privacy and mitigate network burden in mobile edge computing (MEC) networks. However, due to the system and data heterogeneity of mobile clients (MCs),...
详细信息
In dynamic meteorological prediction, accurate rainfall forecasting is a mystery. In a complex and dynamic natural environment with unpredictable sky movements, we propose an innovative methodology that forecasts week...
详细信息
A common approach to explaining NLP models is to use importance measures that express which tokens are important for a prediction. Unfortunately, such explanations are often wrong despite being persuasive. Therefore, ...
A common approach to explaining NLP models is to use importance measures that express which tokens are important for a prediction. Unfortunately, such explanations are often wrong despite being persuasive. Therefore, it is essential to measure their faithfulness. One such metric is if tokens are truly important, then masking them should result in worse model performance. However, token masking introduces out-of-distribution issues, and existing solutions that address this are computationally expensive and employ proxy models. Furthermore, other metrics are very limited in scope. This work proposes an inherently faithfulness measurable model that addresses these challenges. This is achieved using a novel fine-tuning method that incorporates masking, such that masking tokens become in-distribution by design. This differs from existing approaches, which are completely model-agnostic but are inapplicable in practice. We demonstrate the generality of our approach by applying it to 16 different datasets and validate it using statistical in-distribution tests. The faithfulness is then measured with 9 different importance measures. Because masking is in-distribution, importance measures that themselves use masking become consistently more faithful. Additionally, because the model makes faithfulness cheap to measure, we can optimize explanations towards maximal faithfulness;thus, our model becomes indirectly inherently explainable. Copyright 2024 by the author(s)
The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security *** such types of applications based on wireless mobile sensor network ...
详细信息
The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security *** such types of applications based on wireless mobile sensor network are generally using real time data,most of them are interested in real time communication directly from cluster head of cluster instead of a base station in cluster *** would be possible if an external user allows to directly access real time data from the cluster head in cluster wireless mobile sensor network instead of accessing data from base *** this leads to a serious security breach and degrades the performance of any security protocol available in this *** existing schemes for authentication and cluster key management for external users,exchange a number of messages between cluster head and base station to allow external to access real time data from the base station instead of cluster *** increase communication cost and delay in such real time access *** handle this critical issue in cluster wireless mobile sensor network,we propose a lightweight authentication and key management scheme using a fuzzy *** this scheme,any external user can access data directly from the cluster head of any cluster without the involvement of the base *** proposed scheme only uses the one-way hash functions and bitwise XOR operations,apart from the fuzzy extractor method for the user biometric verification at the login *** presented scheme supports scalability for an increasing number of nodes using *** proposed scheme increases the life-time of the network by decreasing the key pool size.
With air travel growing rapidly worldwide, airports are busier than ever, making efficient security screening a top priority. To meet this growing demand, various advanced X-ray baggage scanners have been deployed at ...
详细信息
With air travel growing rapidly worldwide, airports are busier than ever, making efficient security screening a top priority. To meet this growing demand, various advanced X-ray baggage scanners have been deployed at airports worldwide. Researchers have proposed multiple automated threat detection systems to enhance security screening efficiency; however, automated baggage threat segmentation remains a complex task, especially in the context of multi-class threat detection across diverse datasets. Traditional deep learning models struggle with differentiating between multiple threat types and suffer from catastrophic forgetting when exposed to new classes. To address these limitations, we propose an incremental learning framework that enables the model to progressively learn new threat categories while retaining previously acquired knowledge. Our approach utilizes SegFormer as the backbone and introduces a custom loss function, combining mutual distillation loss, KL divergence, and cross-entropy loss, to enhance knowledge retention and adaptability. The model is trained sequentially on three publicly available datasets, SIXRAY, GDXRAY, and PIDRAY, enabling it to generalize effectively across diverse baggage imagery. Through extensive experiments, we demonstrate that our method outperforms state-of-the-art incremental learning techniques, achieving superior segmentation accuracy and knowledge retention. Furthermore, Grad-CAM visualizations and t-SNE plots provide interpretability, offering insights into the model’s learning behavior and class separability. The proposed framework establishes a scalable and adaptable solution for real-world security screening applications, enabling efficient threat detection without requiring model retraining from scratch.
Recently, a lot of research on the movie recommendation system has been conducted. The most important element in the movie recommendation system is to recommend the most suitable movie for an individual. To increase t...
详细信息
The demand for high-quality datasets is rapidly increasing across sectors such as healthcare, finance, and cybersecurity, yet challenges like data scarcity and privacy concerns persist. To address this, we introduce a...
详细信息
We proposed a practical approach with position-based dynamics (PBD) to simulate the volume of a deformable body. A variety of materials were simulated using the general constraints of PBD such as stretch, bending, and...
详细信息
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly *** have been attem...
详细信息
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly *** have been attempts to utilize Digital Twins(DTs)to facilitate the design,evaluation,and deployment of IoV-based systems,for example by supporting high-fidelity modeling,real-time monitoring,and advanced predictive ***,the literature review undertaken in this paper suggests that integrating DTs into IoV-based system design and deployment remains an understudied *** addition,this paper explains how DTs can benefit IoV system designers and implementers,as well as describes several challenges and opportunities for future researchers.
Early detection of lung cancer, liver cancer (HCC), and pancreatitis is crucial for effective treatment. This study assessed the use of laser guidance CT scans for diagnosis and staging. 26 patients of CT scan which w...
详细信息
暂无评论