The rapid expansion of Internet of Things (IoT) devices in smart homes has significantly improved the quality of life, offering enhanced convenience, automation, and energy efficiency. However, this proliferation of c...
详细信息
A chatbot is an AI-powered software or application designed to communicate with people. This technology can perform a variety of tasks, including providing instant responses and answers to users, delivering informatio...
详细信息
Gold price has the characteristics of nonlinearity, high noise and stochasticity, and accurate prediction of price trend is important for investors and international environment. The experiment selects 5-minute high-f...
详细信息
Although visual perception algorithms have made significant progress in most normal scenes, it is still challenging for autonomous driving systems to accurately perceive long-tail scenes that occur less frequently, wh...
详细信息
ISBN:
(数字)9798350349252
ISBN:
(纸本)9798350349269
Although visual perception algorithms have made significant progress in most normal scenes, it is still challenging for autonomous driving systems to accurately perceive long-tail scenes that occur less frequently, which can lead to serious traffic safety issues. However, existing open-source datasets do not systematically collect sufficient long-tail scenes. To fill this gap, we propose a pipeline for designing large-scale, diverse long-tail traffic scenes and generating virtual datasets based on the parallel vision approach. A virtual dataset named Vir-LTTS (virtual long-tail traffic scenes) is built, comprising various scenes such as extreme weather conditions, adverse lighting conditions, traffic accidents, unique forms of traffic objects, and blurry images caused by camera defects. We investigate the potential of training models using the Vir-LTTS dataset in long-tail traffic scenes. Experimental results show that pre-training with Vir-LTTS significantly improves the performance of visual models in long-tail traffic scenes.
Analyzing large-scale graphs poses challenges due to their increasing size and the demand for interactive and user-friendly analytics tools. These graphs arise from various domains, including cybersecurity, social sci...
Analyzing large-scale graphs poses challenges due to their increasing size and the demand for interactive and user-friendly analytics tools. These graphs arise from various domains, including cybersecurity, social sciences, health sciences, and network sciences, where networks can represent interactions between humans, neurons in the brain, or malicious flows in a network. Exploring these large graphs is crucial for revealing hidden structures and metrics that are not easily computable without parallel computing. Currently, Python users can leverage the open-source Arkouda framework to efficiently execute Pandas and NumPy-related tasks on thousands of cores. To address large-scale graph analysis, Arachne, an extension to Arkouda, enables easy transformation of Arkouda dataframes into graphs. This paper proposes and evaluates three distributable data structures for property graphs, implemented in Chapel, that are integrated into Arachne. Enriching Arachne with support for property graphs will empower data scientists to extend their analysis to new problem domains. Property graphs present additional complexities, requiring efficient storage for extra information on vertices and edges, such as labels, relationships, and properties.
High-quality public datasets significantly prompt the prosperity of deep neural networks (DNNs). Currently, dataset ownership verification (DOV), which consists of dataset watermarking and ownership verification, is t...
ISBN:
(纸本)9798331314385
High-quality public datasets significantly prompt the prosperity of deep neural networks (DNNs). Currently, dataset ownership verification (DOV), which consists of dataset watermarking and ownership verification, is the only feasible solution to protect their copyright by preventing unauthorized use. In this paper, we revisit existing DOV methods and find that they all mainly focused on the first stage by designing different types of dataset watermarks and directly exploiting watermarked samples as the verification samples for ownership verification. As such, their success relies on an underlying assumption that verification is a onetime and privacy-preserving process, which does not necessarily hold in practice. To alleviate this problem, we propose ZeroMark to conduct ownership verification without disclosing dataset-specified watermarks. Our method is inspired by our empirical and theoretical findings of the intrinsic property of DNNs trained on the watermarked dataset. Specifically, ZeroMark first generates the closest boundary version of given benign samples and calculates their boundary gradients under the label-only black-box setting. After that, it examines whether the given suspicious method has been trained on the protected dataset by performing a hypothesis test, based on the cosine similarity measured on the boundary gradients and the watermark pattern. Extensive experiments on benchmark datasets verify the effectiveness of our ZeroMark and its resistance to potential adaptive attacks. The codes for reproducing our main experiments are publicly available at https://***/JunfengGo/***.
This paper proposed a novel distributed memetic evolutionary model,where four modules distributed exploration,intensified exploitation,knowledge transfer,and evolutionary restart are coevolved to maximize their streng...
详细信息
This paper proposed a novel distributed memetic evolutionary model,where four modules distributed exploration,intensified exploitation,knowledge transfer,and evolutionary restart are coevolved to maximize their strengths and achieve superior global *** exploration evolves three independent populations by heterogenous *** exploitation evolves an external elite archive in parallel with exploration to balance global and local *** transfer is based on a point-ring communication topology to share successful experiences among distinct search *** restart adopts an adaptive perturbation strategy to control search diversity *** computation is a newly emerging technique,which has powerful computing power and parallelized ***,this paper further fuses quantum mechanisms into the proposed evolutionary model to build a new evolutionary algorithm,referred to as quantum-inspired distributed memetic algorithm(QDMA).In QDMA,individuals are represented by the quantum characteristics and evolved by the quantum-inspired evolutionary optimizers in the quantum *** QDMA integrates the superiorities of distributed,memetic,and quantum *** experiments are carried out to evaluate the superior performance of *** results demonstrate the effectiveness of special designs and show that QDMA has greater superiority compared to the compared state-of-the-art algorithms based on Wilcoxon’s rank-sum *** superiority is attributed not only to good cooperative coevolution of distributed memetic evolutionary model,but also to superior designs of each special component.
There is a growing need for diverse, high-quality stuttered speech data, particularly in the context of Indian languages. This paper introduces Project Boli, a multi-lingual stuttered speech dataset designed to advanc...
详细信息
As an important part of the energy industry, power generation enterprises have complex production process and environment, and many hazard risk factors. The importance of its safety management has gradually become a c...
详细信息
暂无评论