Image caption-generating systems aim to deliver accurate, coherent, and useful captions. This includes identifying the scene, items, relationships, and attributes of the image's objects. Due to constraints in usin...
详细信息
Confidentiality of maintaining the Electronic Health Records of patients is a major concern to both the patient and Doctor. Sharing the data on cloud is one of the most efficient technology infrastructures with extens...
详细信息
With the rise of artificial intelligence and cloud computing, machine-learning-as-a-service platforms,such as Google, Amazon, and IBM, have emerged to provide sophisticated tasks for cloud applications. These propriet...
详细信息
With the rise of artificial intelligence and cloud computing, machine-learning-as-a-service platforms,such as Google, Amazon, and IBM, have emerged to provide sophisticated tasks for cloud applications. These proprietary models are vulnerable to model extraction attacks due to their commercial value. In this paper, we propose a time-efficient model extraction attack framework called Swift Theft that aims to steal the functionality of cloud-based deep neural network models. We distinguish Swift Theft from the existing works with a novel distribution estimation algorithm and reference model settings, finding the most informative query samples without querying the victim model. The selected query samples can be applied to various cloud models with a one-time selection. We evaluate our proposed method through extensive experiments on three victim models and six datasets, with up to 16 models for each dataset. Compared to the existing attacks, Swift Theft increases agreement(i.e., similarity) by 8% while consuming 98% less selecting time.
Effective task scheduling and resource allocation have become major problems as a result of the fast development of cloud computing as well as the rise of multi-cloud systems. To successfully handle these issues, we p...
详细信息
High-dimensional and incomplete(HDI) matrices are primarily generated in all kinds of big-data-related practical applications. A latent factor analysis(LFA) model is capable of conducting efficient representation lear...
详细信息
High-dimensional and incomplete(HDI) matrices are primarily generated in all kinds of big-data-related practical applications. A latent factor analysis(LFA) model is capable of conducting efficient representation learning to an HDI matrix,whose hyper-parameter adaptation can be implemented through a particle swarm optimizer(PSO) to meet scalable ***, conventional PSO is limited by its premature issues,which leads to the accuracy loss of a resultant LFA model. To address this thorny issue, this study merges the information of each particle's state migration into its evolution process following the principle of a generalized momentum method for improving its search ability, thereby building a state-migration particle swarm optimizer(SPSO), whose theoretical convergence is rigorously proved in this study. It is then incorporated into an LFA model for implementing efficient hyper-parameter adaptation without accuracy loss. Experiments on six HDI matrices indicate that an SPSO-incorporated LFA model outperforms state-of-the-art LFA models in terms of prediction accuracy for missing data of an HDI matrix with competitive computational ***, SPSO's use ensures efficient and reliable hyper-parameter adaptation in an LFA model, thus ensuring practicality and accurate representation learning for HDI matrices.
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d...
详细信息
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the digital twin communication system implementation is completely *** verification is currently recognized as a method to ensure the correctness of software system for communication in digital twins because it uses rigorous mathematical methods to verify the correctness of systems for communication in digital twins and can effectively help system designers determine whether the system is designed and implemented *** this paper,we use the interactive theorem proving tool Isabelle/HOL to construct the formal model of the X86 architecture,and to model the related assembly *** verification result shows that the system states obtained after the operations of relevant assembly instructions is consistent with the expected states,indicating that the system meets the design expectations.
Most social networks allow connections amongst many people based on shared *** networks have to offer shared data like videos,photos with minimum latency to the group,which could be challenging as the storage cost has...
详细信息
Most social networks allow connections amongst many people based on shared *** networks have to offer shared data like videos,photos with minimum latency to the group,which could be challenging as the storage cost has to be minimized and hence entire data replication is not a *** replication of data across a network of read-intensive can potentially lead to increased savings in cost and energy and reduce the end-user’s response *** simple and adaptive replication strategies exist,the solution is non-deter-ministic;the replicas of the data need to be optimized to the data usability,perfor-mance,and stability of the application *** resolve the non-deterministic issue of replication,metaheuristics are *** this work,Harmony Search and Tabu Search algorithms are used optimizing the replication process.A novel Har-mony-Tabu search is proposed for effective placement and replication of *** on large datasets show the effectiveness of the proposed *** is seen that the bandwidth saving for proposed harmony-Tabu replication per-forms better in the range of 3.57%to 18.18%for varying number of cloud data-centers when compared to simple replication,Tabu replication and Harmony replication algorithm.
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theo...
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theories and methodologies [2]. Instead of replacing existing software modules implemented by symbolic logic, incorporating FMs' capabilities to build software systems requires entirely new modules that leverage the unique capabilities of ***, while FMs excel at handling uncertainty, recognizing patterns, and processing unstructured data, we need new engineering theories that support the paradigm shift from explicitly programming and maintaining user-defined symbolic logic to creating rich, expressive requirements that FMs can accurately perceive and implement.
In recent years, mental health issues have profoundly impacted individuals’ well-being, necessitating prompt identification and intervention. Existing approaches grapple with the complex nature of mental health, faci...
详细信息
In recent years, mental health issues have profoundly impacted individuals’ well-being, necessitating prompt identification and intervention. Existing approaches grapple with the complex nature of mental health, facing challenges like task interference, limited adaptability, and difficulty in capturing nuanced linguistic expressions indicative of various conditions. In response to these challenges, our research presents three novel models employing multi-task learning (MTL) to understand mental health behaviors comprehensively. These models encompass soft-parameter sharing-based long short-term memory with attention mechanism (SPS-LSTM-AM), SPS-based bidirectional gated neural networks with self-head attention mechanism (SPS-BiGRU-SAM), and SPS-based bidirectional neural network with multi-head attention mechanism (SPS-BNN-MHAM). Our models address diverse tasks, including detecting disorders such as bipolar disorder, insomnia, obsessive-compulsive disorder, and panic in psychiatric texts, alongside classifying suicide or non-suicide-related texts on social media as auxiliary tasks. Emotion detection in suicide notes, covering emotions of abuse, blame, and sorrow, serves as the main task. We observe significant performance enhancement in the primary task by incorporating auxiliary tasks. Advanced encoder-building techniques, including auto-regressive-based permutation and enhanced permutation language modeling, are recommended for effectively capturing mental health contexts’ subtleties, semantic nuances, and syntactic structures. We present the shared feature extractor called shared auto-regressive for language modeling (S-ARLM) to capture high-level representations that are useful across tasks. Additionally, we recommend soft-parameter sharing (SPS) subtypes-fully sharing, partial sharing, and independent layer-to minimize tight coupling and enhance adaptability. Our models exhibit outstanding performance across various datasets, achieving accuracies of 96.9%, 97.
Cancer remains a leading cause of mortality worldwide, with early detection and accurate diagnosis critical to improving patient outcomes. While computer-aided diagnosis systems powered by deep learning have shown con...
详细信息
暂无评论