This paper is devoted to studying the application of the block Krylov subspace method for approximation of the truncated tensor SVD (T-SVD). The theoretical results of the proposed randomized approach are presented. S...
详细信息
This paper presents iterative methods for solving tensor equations involving the T-product. The proposed approaches apply tensor computations without matrix construction. For each initial tensor, these algorithms solv...
详细信息
With exponential data growth search engines require more memory for storage and time for search. The data is indexed to increase search speed, which requires additional memory. In this study we develop a fully functio...
详细信息
Domain generalization is a sub-field of transfer learning that aims at bridging the gap between two different domains in the absence of any knowledge about the target domain. Our approach tackles the problem of a mode...
详细信息
machinelearning (ML) models are trained using historical data that may contain stereotypes of the society (biases). These biases will be inherently learned by the ML models which might eventually result in discrimina...
详细信息
Smartphones have ubiquitously integrated into our home and work environments. It is now a common practice for people to store their sensitive and confidential information on their phones. This has made it extremely im...
详细信息
ISBN:
(纸本)9781509006212
Smartphones have ubiquitously integrated into our home and work environments. It is now a common practice for people to store their sensitive and confidential information on their phones. This has made it extremely important to authenticate legitimate users of a phone and block imposters. In this paper, we demonstrate that the motion dynamics of smartphones, captured using their built in accelerometers, can be used for accurate user identification. We call this mechanism gait fingerprinting. To this end, we first collected the acceleration data from multiple users as they walked with a smartphone placed freely in their pants pockets. Next, we studied the application of different feature extraction, feature selection and classification techniques from the machinelearning literature on these data. Through extensive experimentation, demonstrated is that simple time domain features extracted from these data, which are further optimized using stepwise linear discrimination analysis, can be used to train artificial neural networks to identify legitimate user and block imposter with an average accuracy of 95%.
Training machinelearning models with the only accuracy as a final goal may promote prejudices and discriminatory behaviors embedded in the data. One solution is to learn latent representations that fulfill specific f...
详细信息
Fairness has become an essential problem in many domains of machinelearning (ML), such as classification, natural language processing, and Generative Adversarial Networks (GANs). In this research effort, we study the...
详细信息
We apply augmentations to our dataset to enhance the quality of our predictions and make our final models more resilient to noisy data and domain drifts. Yet the question remains, how are these augmentations going to ...
详细信息
Outlier detection is one of the main fields in machinelearning and it has been growing rapidly due to its wide range of applications. In the last few years, deep learning-based methods have outperformed machine learn...
详细信息
暂无评论