作者:
Gu, QiliangLu, Qin
Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China
Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science
Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ...
详细信息
Interacting impurity spins adsorbed on surfaces have been suggested as basic components for applications in quantum computation and spintronics. Such spins usually prefer a parallel or antiparallel configuration, but ...
详细信息
Interacting impurity spins adsorbed on surfaces have been suggested as basic components for applications in quantum computation and spintronics. Such spins usually prefer a parallel or antiparallel configuration, but weakly noncollinear alignments are possible due to the Dzyaloshinskii-Moriya interaction (DMI) that arises in the presence of relativistic spin-orbit coupling. Here, we show that an effective Dzyaloshinskii-Moriya-type interaction (DMTI) can emerge purely from superconducting correlations without any spin-orbit interaction. We give an analytical proof and provide a numerical study which shows that DMTI arises in mixed-parity superconductors solely from the superconducting pairing. Moreover, we show that the same effect can be realized in Josephson junctions between s-wave and p-wave superconductors, where a phase bias toggles the DMTI entirely on and off. These results enable a way to engineer spin textures using superconducting order.
Histo-genomic multi-modal methods have emerged as a powerful paradigm, demonstrating significant potential for cancer prognosis. However, genome sequencing, unlike histopathology imaging, is still not widely accessibl...
详细信息
Orthogonal Frequency Division Multiple Access (OFDMA) is utilized in wireless local area networks (WLANs) to improve channel utilization and increase network throughput. However, random transmissions by wireless stati...
详细信息
作者:
Ding, LichaoZhao, JingLu, KaiHao, Zenghao
Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China
Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks
Shandong Fundamental Research Center for Computer Science Jinan China
Knowledge graphs (KGs) provide a structured representation of the real world through entity-relation triples. However, current KGs are often incomplete, typically containing only a small fraction of all possible facts...
详细信息
The medical community has more concern on lung cancer *** experts’physical segmentation of lung cancers is time-consuming and needs to be *** research study’s objective is to diagnose lung tumors at an early stage t...
详细信息
The medical community has more concern on lung cancer *** experts’physical segmentation of lung cancers is time-consuming and needs to be *** research study’s objective is to diagnose lung tumors at an early stage to extend the life of humans using deep learning ***-Aided Diagnostic(CAD)system aids in the diagnosis and shortens the time necessary to detect the tumor *** application of Deep Neural networks(DNN)has also been exhibited as an excellent and effective method in classification and segmentation *** research aims to separate lung cancers from images of Magnetic Resonance Imaging(MRI)with threshold *** Honey hook process categorizes lung cancer based on characteristics retrieved using several *** this principle,the work presents a solution for image compression utilizing a Deep Wave Auto-Encoder(DWAE).The combination of the two approaches significantly reduces the overall size of the feature set required for any future classification process performed using *** proposed DWAE-DNN image classifier is applied to a lung imaging dataset with Radial Basis Function(RBF)*** study reported promising results with an accuracy of 97.34%,whereas using the Decision Tree(DT)classifier has an accuracy of 94.24%.The proposed approach(DWAE-DNN)is found to classify the images with an accuracy of 98.67%,either as malignant or normal *** contrast to the accuracy requirements,the work also uses the benchmark standards like specificity,sensitivity,and precision to evaluate the efficiency of the *** is found from an investigation that the DT classifier provides the maximum performance in the DWAE-DNN depending on the network’s performance on image testing,as shown by the data acquired by the categorizers themselves.
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are expl...
详细信息
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are exploited to carry client patterns observed by a *** client patterns facilitate the particular client’s future visit to the corresponding ***,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the *** protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource *** this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP *** proposed protocol uses a secret key embedded within a *** proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication ***,the analysis presented in this paper confirms that proposed protocol resists various known attacks.
Federated learning came into being with the increasing concern of privacy security,as people’s sensitive information is being exposed under the era of big *** is an algorithm that does not collect users’raw data,but...
详细信息
Federated learning came into being with the increasing concern of privacy security,as people’s sensitive information is being exposed under the era of big *** is an algorithm that does not collect users’raw data,but aggregates model parameters from each client and therefore protects user’s ***,due to the inherent distributed nature of federated learning,it is more vulnerable under attacks since users may upload malicious data to break down the federated learning *** addition,some recent studies have shown that attackers can recover information merely from ***,there is still lots of room to improve the current federated learning *** this survey,we give a brief review of the state-of-the-art federated learning techniques and detailedly discuss the improvement of federated *** open issues and existing solutions in federated learning are *** also point out the future research directions of federated learning.
Post-hoc explainability methods such as Grad-CAM are popular because they do not influence the performance of a trained model. However, they mainly reveal "where" a model looks at for a given input, fail to ...
详细信息
Post-hoc explainability methods such as Grad-CAM are popular because they do not influence the performance of a trained model. However, they mainly reveal "where" a model looks at for a given input, fail to explain "what" the model looks for (e.g., what is important to classify a bird image to a Scott Oriole?). Existing part-prototype networks leverage part-prototypes (e.g., characteristic Scott Oriole’s wing and head) to answer both "where" and "what", but often under-perform their black box counterparts in the accuracy. Therefore, a natural question is: can one construct a network that answers both "where" and "what" in a post-hoc manner to guarantee the model’s performance? To this end, we propose the first post-hoc part-prototype network via decomposing the classification head of a trained model into a set of interpretable part-prototypes. Concretely, we propose an unsupervised prototype discovery and refining strategy to obtain prototypes that can precisely reconstruct the classification head, yet being interpretable. Besides guaranteeing the performance, we show that our network offers more faithful explanations qualitatively and yields even better part-prototypes quantitatively than prior part-prototype networks. Copyright 2024 by the author(s)
In response to the growing demand for high-resolution rainfall data to support disaster prevention in Taiwan, this study presents an innovative approach for downscaling precipitation data. We employed a hierarchical a...
详细信息
暂无评论