The current COVID-19 epidemic is responsible for causing a catastrophe on a global scale due to its risky spread. The community’s insecurity is growing as a result of a lack of appropriate remedial measures and immun...
详细信息
Deep learning models have revolutionized numerous fields, yet their decision-making processes often remain opaque, earning them the characterization of "black-box" models due to their lack of transparency an...
详细信息
Deep learning models have revolutionized numerous fields, yet their decision-making processes often remain opaque, earning them the characterization of "black-box" models due to their lack of transparency and comprehensibility. This opacity presents significant challenges to understanding the rationale behind their decisions, thereby impeding their interpretability, explainability, and reliability. This review examines 718 studies published between 2015 and 2024 in high-impact journals indexed in SCI, SCI-E, SSCI, and ESCI, providing a crucial reference for researchers investigating methodologies and techniques in related domains. In this exploration, we evaluate a wide array of interpretability and explainability (XAI) strategies, including visual and feature-based explanations, local approach-based techniques, and Bayesian methods. These strategies are assessed for their effectiveness and applicability using a comprehensive set of evaluation metrics. Moving beyond traditional analyses, we propose a novel taxonomy of XAI methods, addressing gaps in the literature and offering a structured classification that elucidates the roles and interactions of these methods. Moreover, we explore the intricate relationship between interpretability and explainability, examining potential conflicts and highlighting the necessity for interpretability in practical applications. Through detailed comparative analysis, we underscore the strengths and limitations of various XAI methods across different data types, ensuring a thorough understanding of their practical performance and real-world utility. The review also examines model robustness against adversarial attacks, emphasizing the critical importance of transparency, reliability, and ethical considerations in model development. A significant emphasis is placed on identifying and mitigating biases in deep learning systems, providing insights into future research directions that aim to enhance fairness and reduce bias. By thoroughl
Despite recent significant advancements in Handwritten Document Recognition (HDR), the efficient and accurate recognition of text against complex backgrounds, diverse handwriting styles, and varying document layouts r...
详细信息
Text similarity is a crucial area of study that evaluates how similar texts are both semantically and syntactically. As data volumes increase, understanding the similarities and relationships between texts becomes ess...
详细信息
Federated learning (FL) is a distributed learning framework that allows clients to jointly train a model by uploading parameter updates rather than sharing local data. FL deployed on a client-edge-cloud hierarchical a...
详细信息
This study investigates the application of advanced fine-tuned Large Language Models (LLMs) for Turkish Sentiment Analysis (SA), focusing on e-commerce product reviews. Our research utilizes four open-source Turkish S...
详细信息
Recommendation systems(RSs)are crucial in personalizing user experiences in digital environments by suggesting relevant content or *** filtering(CF)is a widely used personalization technique that leverages user-item i...
详细信息
Recommendation systems(RSs)are crucial in personalizing user experiences in digital environments by suggesting relevant content or *** filtering(CF)is a widely used personalization technique that leverages user-item interactions to generate ***,it struggles with challenges like the cold-start problem,scalability issues,and data *** address these limitations,we develop a Graph Convolutional Networks(GCNs)model that captures the complex network of interactions between users and items,identifying subtle patterns that traditional methods may *** integrate this GCNs model into a federated learning(FL)framework,enabling themodel to learn fromdecentralized *** not only significantly enhances user privacy—a significant improvement over conventionalmodels but also reassures users about the safety of their ***,by securely incorporating demographic information,our approach further personalizes recommendations and mitigates the coldstart issue without compromising user *** validate our RSs model using the openMovieLens dataset and evaluate its performance across six key metrics:Precision,Recall,Area Under the Receiver Operating Characteristic Curve(ROC-AUC),F1 Score,Normalized Discounted Cumulative Gain(NDCG),and Mean Reciprocal Rank(MRR).The experimental results demonstrate significant enhancements in recommendation quality,underscoring that combining GCNs with CF in a federated setting provides a transformative solution for advanced recommendation systems.
Conventional machine learning methods for software effort estimation (SEE) have seen an increase in research interest. Conversely, there are few research that try to evaluate how well deep learning techniques work in ...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical tools to thoroughly investigate the dynamics of the chaotic map,which allows us to select optimal parameter configurations for the encryption *** findings indicate that the proposed sine-cosine map is capable of generating a rich variety of chaotic attractors,an essential characteristic for effective *** encryption technique is based on bit-plane decomposition,wherein a plain image is divided into distinct bit *** planes are organized into two matrices:one containing the most significant bit planes and the other housing the least significant *** subsequent phases of chaotic confusion and diffusion utilize these matrices to enhance *** auxiliary matrix is then generated,comprising the combined bit planes that yield the final encrypted *** results demonstrate that our proposed technique achieves a commendable level of security for safeguarding sensitive patient information in medical *** a result,image quality is evaluated using the Structural Similarity Index(SSIM),yielding values close to zero for encrypted images and approaching one for decrypted ***,the entropy values of the encrypted images are near 8,with a Number of Pixel Change Rate(NPCR)and Unified Average Change Intensity(UACI)exceeding 99.50%and 33%,***,quantitative assessments of occlusion attacks,along with comparisons to leading algorithms,validate the integrity and efficacy of our medical image encryption approach.
Considering the increasing and widespread use of chatbots, it is of great importance to provide methods and tools to address ethical concerns and to make users aware of various aspects of a chatbot, including non-func...
详细信息
暂无评论