This paper presents results from the development and evaluation of a deductive verification benchmark consisting of 26 unmodified Linux kernel library functions implementing conventional memory and string operations. ...
详细信息
The development of domestically generated food additives based on eco-technologies with specified functional-technological and bioactive qualities is now a significant focus of contemporary study. Pickering emulsions ...
详细信息
Integrating machine learning into Automated Control systems (ACS) enhances decision-making in industrial process management. One of the limitations to the widespread adoption of these technologies in industry is the v...
详细信息
MSC Codes 65K10In this paper, we leverage an information-theoretic upper bound on the maximum admissible level of noise (MALN) in convex Lipschitz-continuous zeroth-order optimisation to establish corresponding upper ...
详细信息
Current security cloud practices can successfully protect stored data and data in transit, but they do not keep the same protection during data processing. The data value extraction requires decryption, creating criti...
详细信息
ISBN:
(数字)9798350377514
ISBN:
(纸本)9798350377521
Current security cloud practices can successfully protect stored data and data in transit, but they do not keep the same protection during data processing. The data value extraction requires decryption, creating critical exposure points. As a result, privacy-preserving techniques are emerging as a crucial consideration in cloud computing. The homomorphic processing of machine learning models in the cloud represents a central challenge. The activation function is fundamental in constructing a privacy-preserving Neural Network (NN) with Homomorphic Encryption (HE). Standard activation functions require operations not supported by HE, so it is necessary to find cryptographically compatible replacement functions to operate over encrypted data. Multiple approaches address the limitation of function compatibility with polynomial approximation. These functions should exhibit a trade-off between complexity and accuracy, limiting the efficiency of conventional approximation techniques. The current literature on polynomial approximation of NN activation functions still lacks a thorough review. In this paper, we comprehensively review the standard activation functions of modern NN models and current polynomial approximation approaches. We highlight fundamental features to consider in the activation function and the approximation technique to operate over encrypted data.
The article discusses the features of the solving the forecasting problems using machine learning techniques. The issues of accounting and correctly processing non-linear non-stationary processes in the problems of mo...
详细信息
This work considers the non-convex finite sum minimization problem. There are several algorithms for such problems, but existing methods often work poorly when the problem is badly scaled and/or ill-conditioned, and a...
详细信息
While there are many works on the applications of machine learning, not so many of them are trying to understand the theoretical justifications to explain their efficiency. In this work, overfitting control (or genera...
详细信息
The article presents a study of the syntactic compatibility of verbs of motion in the Vakh dialect of the Khanty language. The study was conducted with the help of the tools of the platform for documentation of the Ur...
详细信息
The article presents a study of the syntactic compatibility of verbs of motion in the Vakh dialect of the Khanty language. The study was conducted with the help of the tools of the platform for documentation of the Uralic languages Lingvodoc. The purpose of the article is to describe patterns of syntactic valency that Vakh Khanty verbs of motion have.
暂无评论