The paper considers application of natural language processing methods (NLP) to solve the task of identifying the core skills acquired by students in the process of education. An ensemble solution, consisting of model...
详细信息
作者:
Gok, GorkemBoyaci, AytugUlas, MustafaFirat University
Faculty of Technology Department of Software Engineering Elaziǧ Turkey Air Force Academy
National Defence University Department of Computer Engineering İstanbul Turkey Firat University
Faculty of Engineering Department of Artificial Intelligence and Data Science Engineering Elaziǧ Turkey
This study is meant to research the evolution of intrusion detection and network monitoring within computer, cloud-based systems, IIoT, and mobile environments. The source has outlined the novel technologies in IDS, f...
详细信息
Supervised learning algorithms generally assume the availability of enough memory to store data models during the training and test phases. However, this assumption is unrealistic when data comes in the form of infini...
详细信息
Transformers have increasingly become the de facto method to model sequential data with state-of-the-art performance. Due to its widespread use, being able to estimate and calibrate its modeling uncertainty is importa...
详细信息
Fast and accurate real-time 3D hand-object pose estimation is an important capability for many collaborative human-robot interaction applications. However, the application of vision-based hand-object pose estimation r...
详细信息
Human emotions, psychology, and social well-being are all parts of mental health. It has an impact on how people feel, think, and act. It aids in figuring out how individuals act under pressure, interact with each oth...
详细信息
Although attention weights have been commonly used as a means to provide explanations for deep learning models, the approach has been widely criticized due to its lack of faithfulness. In this work, we present a simpl...
详细信息
Breast cancer is the most often diagnosed cancer in women affecting one in eight at the age of 80 in US. Breast is the most threatening cancer among women which leads to death. Early diagnosis of breast cancer can sav...
详细信息
Agile methods are a well-established paradigm in the software development field. Agile adoption has contributed to improving software quality. However, software products are vulnerable to security challenges and susce...
详细信息
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph,which is amenable to be adopted in tra...
详细信息
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph,which is amenable to be adopted in traditional machine learning algorithms in favor of vector *** embedding methods build an important bridge between social network analysis and data analytics,as social networks naturally generate an unprecedented volume of graph data *** social network data not only brings benefit for public health,disaster response,commercial promotion,and many other applications,but also gives birth to threats that jeopardize each individual’s privacy and ***,most existing works in publishing social graph embedding data only focus on preserving social graph structure with less attention paid to the privacy issues inherited from social *** be specific,attackers can infer the presence of a sensitive relationship between two individuals by training a predictive model with the exposed social network *** this paper,we propose a novel link-privacy preserved graph embedding framework using adversarial learning,which can reduce adversary’s prediction accuracy on sensitive links,while persevering sufficient non-sensitive information,such as graph topology and node attributes in graph *** experiments are conducted to evaluate the proposed framework using ground truth social network datasets.
暂无评论