In recent years,the growing popularity of social media platforms has led to several interesting natural language processing(NLP)***,these social media-based NLP applications are subject to different types of adversari...
详细信息
In recent years,the growing popularity of social media platforms has led to several interesting natural language processing(NLP)***,these social media-based NLP applications are subject to different types of adversarial attacks due to the vulnerabilities of machine learning(ML)and NLP *** work presents a new low-level adversarial attack recipe inspired by textual variations in online social media *** variations are generated to convey the message using out-of-vocabulary words based on visual and phonetic similarities of characters and words in the shortest possible *** intuition of the proposed scheme is to generate adversarial examples influenced by human cognition in text generation on social media platforms while preserving human robustness in text understanding with the fewest possible *** intentional textual variations introduced by users in online communication motivate us to replicate such trends in attacking text to see the effects of such widely used textual variations on the deep learning *** this work,the four most commonly used textual variations are chosen to generate adversarial ***,this article introduced a word importance ranking-based beam search algorithm as a searching method for the best possible perturbation *** effectiveness of the proposed adversarial attacks has been demonstrated on four benchmark datasets in an extensive experimental setup.
Hand gestures are a natural way for human-robot *** based dynamic hand gesture recognition has become a hot research topic due to its various *** paper presents a novel deep learning network for hand gesture *** netwo...
详细信息
Hand gestures are a natural way for human-robot *** based dynamic hand gesture recognition has become a hot research topic due to its various *** paper presents a novel deep learning network for hand gesture *** network integrates several well-proved modules together to learn both short-term and long-term features from video inputs and meanwhile avoid intensive *** learn short-term features,each video input is segmented into a fixed number of frame groups.A frame is randomly selected from each group and represented as an RGB image as well as an optical flow *** two entities are fused and fed into a convolutional neural network(Conv Net)for feature *** Conv Nets for all groups share *** learn longterm features,outputs from all Conv Nets are fed into a long short-term memory(LSTM)network,by which a final classification result is *** new model has been tested with two popular hand gesture datasets,namely the Jester dataset and Nvidia *** with other models,our model produced very competitive *** robustness of the new model has also been proved with an augmented dataset with enhanced diversity of hand gestures.
Additive Kernel SVM has been extensively used in many applications, including human activity detection and pedestrian detection. Since training an additive kernel SVM model is very time-consuming, which is not scalabl...
详细信息
Domain Generalization (DG) has been recently explored to improve the generalizability of point cloud classification (PCC) models toward unseen domains. However, they often suffer from limited receptive fields or quadr...
详细信息
Delay Tolerant Networks(DTNs)have the major problem of message delay in the network due to a lack of endto-end connectivity between the nodes,especially when the nodes are *** nodes in DTNs have limited buffer storage...
详细信息
Delay Tolerant Networks(DTNs)have the major problem of message delay in the network due to a lack of endto-end connectivity between the nodes,especially when the nodes are *** nodes in DTNs have limited buffer storage for storing delayed *** instantaneous sharing of data creates a low buffer/shortage ***,buffer congestion would occur and there would be no more space available in the buffer for the upcoming *** address this problem a buffer management policy is proposed named“A Novel and Proficient Buffer Management Technique(NPBMT)for the Internet of Vehicle-Based DTNs”.NPBMT combines appropriate-size messages with the lowest Time-to-Live(TTL)and then drops a combination of the appropriate messages to accommodate the newly arrived *** evaluate the performance of the proposed technique comparison is done with Drop Oldest(DOL),Size Aware Drop(SAD),and Drop Larges(DLA).The proposed technique is implemented in the Opportunistic Network Environment(ONE)*** shortest path mapbased movement model has been used as the movement path model for the nodes with the epidemic routing *** the simulation results,a significant change has been observed in the delivery probability as the proposed policy delivered 380 messages,DOL delivered 186 messages,SAD delivered 190 messages,and DLA delivered only 95 messages.A significant decrease has been observed in the overhead ratio,as the SAD overhead ratio is 324.37,DLA overhead ratio is 266.74,and DOL and NPBMT overhead ratios are 141.89 and 52.85,respectively,which reveals a significant reduction of overhead ratio in NPBMT as compared to existing *** network latency average of DOL is 7785.5,DLA is 5898.42,and SAD is 5789.43 whereas the NPBMT latency average is *** reveals that the proposed policy keeps the messages for a short time in the network,which reduces the overhead ratio.
Lung disease, especially Tuberculosis (TBC), placed the highest death rate in Indonesia. Tuberculosis (TB) in Indonesia is ranked second after India. Therefore, it is important to reduce or early detection of the lung...
详细信息
The Internet of Things (IoTs) have become ubiquitous in all aspects of public needs today. The application of IoT technology is crucial for promoting energy-saving behavior. This paper presents a control system used f...
详细信息
In recent years, the style transfer is being studied in the field of AI. It extracts a style from one data set and applies to another data set. This technique is actively studied mainly in computer vision. It is also ...
详细信息
As the boom of mobile devices,Android mobile apps play an irreplaceable roles in people’s daily life,which have the characteristics of frequent updates involving in many code commits to meet new ***-in-Time(JIT)defec...
详细信息
As the boom of mobile devices,Android mobile apps play an irreplaceable roles in people’s daily life,which have the characteristics of frequent updates involving in many code commits to meet new ***-in-Time(JIT)defect prediction aims to identify whether the commit instances will bring defects into the new release of apps and provides immediate feedback to developers,which is more suitable to mobile *** the within-app defect prediction needs sufficient historical data to label the commit instances,which is inadequate in practice,one alternative method is to use the cross-project *** this work,we propose a novel method,called KAL,for cross-project JIT defect prediction task in the context of Android mobile *** specifically,KAL first transforms the commit instances into a high-dimensional feature space using kernel-based principal component analysis technique to obtain the representative ***,the adversarial learning technique is used to extract the common feature embedding for the model *** conduct experiments on 14 Android mobile apps and employ four effort-aware indicators for performance *** results on 182 cross-project pairs demonstrate that our proposed KAL method obtains better performance than 20 comparative methods.
Older adults often struggle to meet their psychological needs due to retirement and living alone. Recent studies suggest that games featuring emotional challenge (EC) can help fulfill basic psychological needs such as...
详细信息
暂无评论