As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
Ecological validity remains essential for generalizing scientific research into real-world applications. However, current methods for crowd emotion detection lack ecological validity due to limited diversity samples i...
详细信息
Dear Editor,This letter presents a novel process monitoring model based on ensemble structure analysis(ESA).The ESA model takes advantage of principal component analysis(PCA),locality preserving projections(LPP),and m...
详细信息
Dear Editor,This letter presents a novel process monitoring model based on ensemble structure analysis(ESA).The ESA model takes advantage of principal component analysis(PCA),locality preserving projections(LPP),and multi-manifold projections(MMP)models,and then combines the multiple solutions within an ensemble result through Bayesian *** the developed ESA model,different structure features of the given dataset are taken into account simultaneously,the suitability and reliability of the ESA-based monitoring model are then illustrated through ***:The requirement for ensuring safe operation and improving process efficiency has led to increased research activity in the field of process monitoring.
Boolean satisfiability (SAT) is widely used as a solver engine in electronic design automation (EDA). Typically, SAT is used to determine whether one or more groups of variables can be combined to form a true formula....
详细信息
Boolean satisfiability (SAT) is widely used as a solver engine in electronic design automation (EDA). Typically, SAT is used to determine whether one or more groups of variables can be combined to form a true formula. All solutions SAT (AllSAT) is a variant of the SAT problem. In the fields of formal verification and pattern generation, AllSAT is particularly useful because it efficiently enumerates all possible solutions. In this paper, a semi-tensor product (STP) based AllSAT solver is proposed. The solver can solve instances described in both the conjunctive normal form (CNF) and circuit form. The implementation of our method differs from incremental enumeration because we do not add blocking conditions for existing solutions, but rather compute the matrices to obtain all the solutions in one pass. Additionally, the logical matrices support a variety of logic operations. Results from experiments with MCNC benchmarks using CNF-based and circuit-based forms show that our method can accelerate CPU time by 8.1x (238x maximum) and 19.9x (72x maximum), respectively.
Human values capture what people and societies perceive as desirable, transcend specific situations and serve as guiding principles for action. People’s value systems motivate their positions on issues concerning the...
详细信息
A new, to our knowledge, doped combination of Nd3+, Tm3+, and Ce3+ ions was developed in tellurite glass with a fundamental composition of TeO2-ZnO-WO3-Bi2O3, and the structural, thermal, and especially near-infrared ...
详细信息
In this paper,an induced current learning method(ICLM)for microwave through wall imaging(TWI),named as TWI-ICLM,is *** the inversion of induced current,the unknown object along with the enclosed walls are treated as a...
详细信息
In this paper,an induced current learning method(ICLM)for microwave through wall imaging(TWI),named as TWI-ICLM,is *** the inversion of induced current,the unknown object along with the enclosed walls are treated as a combination of ***,a non-iterative method called distorted-Born backpropagation(DB-BP)is utilized to generate the initial *** the training stage,several convolutional neural networks(CNNs)are cascaded to improve the estimated induced *** addition,a hybrid loss function consisting of the induced current error and the permittivity error is used to optimize the network ***,the relative permittivity images are conducted analytically using the predicted current based on *** the numerical and experimental TWI tests prove that,the proposed method can achieve better imaging accuracy compared to traditional distorted-Born iterative method(DBIM).
This paper addresses graph topology identification for applications where the underlying structure of systems like brain and social networks is not directly observable. Traditional approaches based on signal matching ...
详细信息
This paper brings the concept of 'optimism' to the new and promising framework of online Non-stochastic Control (NSC). Namely, we study how NSC can benefit from a prediction oracle of unknown quality responsib...
详细信息
This study explores the role of teaching assistants (TAs) as assessors in a university’s computerscience program. It examines the challenges and implications of TAs in grading, with a focus on their expertise and gr...
详细信息
暂无评论