Multi-label classification is a challenging problem that has attracted significant attention from researchers, particularly in the domain of image and text attribute annotation. However, multi-label datasets are prone...
详细信息
Multi-label classification is a challenging problem that has attracted significant attention from researchers, particularly in the domain of image and text attribute annotation. However, multi-label datasets are prone to serious intra-class and inter-class imbalance problems, which can significantly degrade the classification performance. To address the above issues, we propose the multi-label weighted broad learning system(MLW-BLS) from the perspective of label imbalance weighting and label correlation mining. Further, we propose the multi-label adaptive weighted broad learning system(MLAW-BLS) to adaptively adjust the specific weights and values of labels of MLW-BLS and construct an efficient imbalanced classifier set. Extensive experiments are conducted on various datasets to evaluate the effectiveness of the proposed model, and the results demonstrate its superiority over other advanced approaches.
Although lots of research has been done in recognizing facial expressions,there is still a need to increase the accuracy of facial expression recognition,particularly under uncontrolled *** use of Local Directional Pa...
详细信息
Although lots of research has been done in recognizing facial expressions,there is still a need to increase the accuracy of facial expression recognition,particularly under uncontrolled *** use of Local Directional Patterns(LDP),which has good characteristics for emotion detection has yielded encouraging *** innova-tive end-to-end learnable High Response-based Local Directional Pattern(HR-LDP)network for facial emotion recognition is implemented by employing fixed convolutional filters in the proposed *** combining learnable convolutional layers with fixed-parameter HR-LDP layers made up of eight Kirsch filters and derivable simulated gate functions,this network considerably minimizes the number of network *** cost of the parameters in our fully linked layers is up to 64 times lesser than those in currently used deep learning-based detection *** seven well-known databases,including JAFFE,CK+,MMI,SFEW,OULU-CASIA and MUG,the recognition rates for seven-class facial expression recognition are 99.36%,99.2%,97.8%,60.4%,91.1%and 90.1%,*** results demonstrate the advantage of the proposed work over cutting-edge techniques.
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ...
详细信息
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research.
This paper first estimated the infectious capacity of COVID-19 based on the time series evolution data of confirmed cases in multiple countries. Then, a method to infer the cross-regional spread speed of COVID-19 was ...
详细信息
This paper first estimated the infectious capacity of COVID-19 based on the time series evolution data of confirmed cases in multiple countries. Then, a method to infer the cross-regional spread speed of COVID-19 was introduced in this paper, which took the gross domestic product(GDP) of each region as one of the factors that affect the spread speed of COVID-19 and studied the relationship between the GDP and the infection density of each region(China's Mainland, the United States, and EU countries). In addition, the geographic distance between regions was also considered in this method and the effect of geographic distance on the spread speed of COVID-19 was studied. Studies have shown that the probability of mutual infection of these two regions decreases with increasing geographic distance. Therefore, this paper proposed an epidemic disease spread index based on GDP and geographic distance to quantify the spread speed of COVID-19 in a region. The analysis results showed a strong correlation between the epidemic disease spread index in a region and the number of confirmed cases. This finding provides reasonable suggestions for the control of epidemics. Strengthening the control measures in regions with higher epidemic disease spread index can effectively control the spread of epidemics.
The integration of machine learning and electrocatalysis presents nota ble advancements in designing and predicting the performance of chiral materials for hydrogen evolution reactions(HER).This study utilizes theor...
详细信息
The integration of machine learning and electrocatalysis presents nota ble advancements in designing and predicting the performance of chiral materials for hydrogen evolution reactions(HER).This study utilizes theoretical calculations and machine learning techniques to assess the HER performance of both chiral and achiral M-N-SWCNTs(M=In,Bi,and Sb) single-atom catalysts(SACs).The stability preferences of metal atoms are dependent on chirality when interacting with chiral *** HER activity of the right-handed In-N-SWCNT is 5.71 times greater than its achiral counterpart,whereas the left-handed In-N-SWCNT exhibits a 5.12-fold *** calculated hydrogen adsorption free energy for the right-handed In-N-SWCNT reaches as low as-0.02 *** enhancement is attributed to the symmetry breaking in spin density distribution,transitioning from C2Vin achiral SACs to C2in chiral SACs,which facilitates active site transfer and enhances local spin ***-handed M-N-SWCNTs exhibit superior α-electron separation and transport efficiency relative to left-handed variants,owing to the chiral induced spin selectivity(CISS) effect,with spin-up α-electron density reaching 3.43 × 10-3e/Bohr3at active *** learning provides deeper insights,revealing that the interplay of weak spatial electronic effects and appropriate curvature-chirality effects significantly enhances HER performance.A weaker spatial electronic effect correlates with higher HER activity,larger exchange current density,and higher turnover *** curvature-chirality effect undersco res the influence of intrinsic structures on HER *** findings offer critical insights into the role of chirality in electrocatalysis and propose innovative approaches for optimizing HER through chirality.
Real-time systems are widely implemented in the Internet of Things(IoT) and safety-critical systems, both of which have generated enormous social value. Aiming at the classic schedulability analysis problem in real-ti...
详细信息
Real-time systems are widely implemented in the Internet of Things(IoT) and safety-critical systems, both of which have generated enormous social value. Aiming at the classic schedulability analysis problem in real-time systems, we proposed an exact Boolean analysis based on interference(EBAI) for schedulability analysis in real-time systems. EBAI is based on worst-case interference time(WCIT), which considers both the release jitter and blocking time of the task. We improved the efficiency of the three existing tests and provided a comprehensive summary of related research results in the field. Abundant experiments were conducted to compare EBAI with other related results. Our evaluation showed that in certain cases, the runtime gain achieved using our analysis method may exceed 73% compared to the stateof-the-art schedulability test. Furthermore, the benefits obtained from our tests grew with the number of tasks, reaching a level suitable for practical application. EBAI is oriented to the five-tuple real-time task model with stronger expression ability and possesses a low runtime overhead. These characteristics make it applicable in various real-time systems such as spacecraft, autonomous vehicles, industrial robots, and traffic command systems.
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the...
详细信息
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the generated counterfeit facial images have become increasingly challenging to distinguish. There is an urgent need for a more robust and convincing detection method. Current detection methods mainly operate in the spatial domain and transform the spatial domain into other domains for analysis. With the emergence of transformers, some researchers have also combined traditional convolutional networks with transformers for detection. This paper explores the artifacts left by Deepfakes in various domains and, based on this exploration, proposes a detection method that utilizes the steganalysis rich model to extract high-frequency noise to complement spatial features. We have designed two main modules to fully leverage the interaction between these two aspects based on traditional convolutional neural networks. The first is the multi-scale mixed feature attention module, which introduces artifacts from high-frequency noise into spatial textures, thereby enhancing the model's learning of spatial texture features. The second is the multi-scale channel attention module, which reduces the impact of background noise by weighting the features. Our proposed method was experimentally evaluated on mainstream datasets, and a significant amount of experimental results demonstrate the effectiveness of our approach in detecting Deepfake forged faces, outperforming the majority of existing methods.
The article addresses the output-feedback control issue for a class of multi-input multi-output(MIMO)uncertain nonlinear systems with multiple event-triggered mechanisms(ETM).Compared to previous event-triggering stud...
详细信息
The article addresses the output-feedback control issue for a class of multi-input multi-output(MIMO)uncertain nonlinear systems with multiple event-triggered mechanisms(ETM).Compared to previous event-triggering studies,this paper aims to trigger both the output and filtered *** nonlinear dynamics are approximated using fuzzy logic systems(FLSs).Then,a novel kind of state observer has been designed to deal with unmeasurable state problems using the triggered output *** sampled estimated state,the triggered output signal,and the filtered signal are utilized to propose an event-triggering mechanism that consists of sensor-to-observer(SO)and observer-to-controller(OC).An event-triggered output feedback control approach is given inside backstepping control,whereby the filter may be employed to circumvent the issue of the virtual control function not being differentiable at the trigger *** is testified that,according to the Lyapunov stability analysis scheme,all closed-loop signals and the system output are ultimately uniformly constrained by our control ***,the simulation examples are performed to confirm the theoretical findings.
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
暂无评论