The problem of multi-armed bandit (MAB) with fairness constraints has emerged as an important research topic recently. For such problems, one common objective is to maximize the total rewards within a fixed number of ...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
App reviews are crucial in influencing user decisions and providing essential feedback for developers to improve their *** the analysis of these reviews is vital for efficient review *** traditional machine learning(M...
详细信息
App reviews are crucial in influencing user decisions and providing essential feedback for developers to improve their *** the analysis of these reviews is vital for efficient review *** traditional machine learning(ML)models rely on basic word-based feature extraction,deep learning(DL)methods,enhanced with advanced word embeddings,have shown superior *** research introduces a novel aspectbased sentiment analysis(ABSA)framework to classify app reviews based on key non-functional requirements,focusing on usability factors:effectiveness,efficiency,and *** propose a hybrid DL model,combining BERT(Bidirectional Encoder Representations from Transformers)with BiLSTM(Bidirectional Long Short-Term Memory)and CNN(Convolutional Neural Networks)layers,to enhance classification *** analysis against state-of-the-art models demonstrates that our BERT-BiLSTM-CNN model achieves exceptional performance,with precision,recall,F1-score,and accuracy of 96%,87%,91%,and 94%,*** contributions of this work include a refined ABSA-based relabeling framework,the development of a highperformance classifier,and the comprehensive relabeling of the Instagram App Reviews *** advancements provide valuable insights for software developers to enhance usability and drive user-centric application development.
Crude oil prices (COP) profoundly influence global economic stability, with fluctuations reverberating across various sectors. Accurate forecasting of COP is indispensable for governments, policymakers, and stakeholde...
详细信息
In the digital age, embedding imperceptible data into images for authenticating ownership and content integrity through watermarking has gained immense importance. Existing watermarking methods struggle to balance imp...
详细信息
Food Infestation Detection is more important for food safety and health concerns. It is a challenging task to separate the grains into infested or non-infested. It is found that in the existing system, there is no eff...
详细信息
Water resource management and disaster response have become some of the most challenging tasks, especially when disasters pose a threat, as delays could lead to more impacts. The centralized system used for water dyna...
详细信息
Water resource management and disaster response have become some of the most challenging tasks, especially when disasters pose a threat, as delays could lead to more impacts. The centralized system used for water dynamics and disaster control usually presents itself as a scalability problem since more clients present a problem, the system's latency is high, and the system is always prone to a single-point failure. The previous approach lacks flexibility and does not synchronously guarantee the integration of several subjects in real time, especially during unpredictable disaster conditions. The proposed FL-MAPPO model surpasses current methods by facilitating decentralized, privacy-protecting decision-making minimizing latency and single-point failures. In contrast to LSTM, Bi-LSTM, and DRNN, which are based on centralized data processing, FL-MAPPO provides real-time adaptability and effective resource management. Experimental results validate that it has lower MSE, higher R² scores, and quicker response times, making it better suited for flood prediction and disaster response. To this end, this study advances a solution through a Decentralized Learning-Driven Multi-Agent Autonomous System (DL-MAAS). The new feature is a Decentralized Cooperation environment in which intelligent and self-managing agents learn utilizing Reinforcement Learning (RL) and Federated Learning (FL) algorithms for enhancing smart water management and real-time disaster relief. IoT devices are adopted for sensing and data acquisition, adaptive learning for decision-making, and optimization of energy use among the agents in the system through metaheuristic algorithms. The research methodology for implementing the proposed solution involves the design of a multi-layered architecture, including data acquisition, decentralized learning, and real-time execution. With a Mean Squared Error (MSE) of 0.112, R-squared (R²) of 0.953, and Mean Absolute Error (MAE) of 0.207, the proposed method is better
Named Data Network (NDN), a future Internet architecture is introduced to address the shortcomings of the current Internet architecture. NDN supports in-network caching to facilitate scalable content distribution and ...
详细信息
In recent times, drastic climate changes have caused a substantial increase in the growth of crop diseases. This causes large-scale demolition of crops, decreases cultivation, and eventually leads to the financial los...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
暂无评论