With the popularity of deep reinforcement learning(DRL), people have great interest in using deep reinforcement learning for application automated testing. However, most automated testing methods based on reinforcemen...
详细信息
With the popularity of deep reinforcement learning(DRL), people have great interest in using deep reinforcement learning for application automated testing. However, most automated testing methods based on reinforcement learning ignore text information, use random sampling in experience replay and ignore the characteristics of Android automated testing. To solve above problem, this paper proposes ITPRTesting(Integrated Text feature information and Priority experience in Testing). It extracts the text information in the interface and uses the BERT algorithm to generate sentence vectors. It fuses the interactive control feature diagram(ICFD), which is mentioned in the previous work, and text information as the state required by reinforcement learning. And in reinforcement learning, the priority experience replay is combined, also the traditional priority experience replay is improved. This paper has carried out experiments on 10 open source applications. The experimental results show that ITPRTesting is superior to other methods in statement coverage and branch coverage.
Deep neural networks are susceptible to attacks from adversarial examples in recent years. Especially, the black-box attacks cause a more serious threat to practical applications. However, while most existing black-bo...
详细信息
ISBN:
(数字)9798350365474
ISBN:
(纸本)9798350365481
Deep neural networks are susceptible to attacks from adversarial examples in recent years. Especially, the black-box attacks cause a more serious threat to practical applications. However, while most existing black-box attacks have achieved a high success rate in deceiving models, they have not focused on the stealthiness of adversarial examples, often exhibiting suspicious visual appearances. To address this issue, this paper proposes the Mask Momentum Iterative Attack (MMIA), which introduces a masking mechanism and adopts an optimal perturbation strategy to identify regions of an image most vulnerable to attacks. This approach effectively ensures the transferability and stealthiness of adversarial examples. Simultaneously, by integrating image enhancement techniques and temporal and spatial momentum terms into the iterative process of the attack, we prevent the attack from getting stuck in local optima, further improving the transferability of adversarial examples. To enhance the success rate of black-box attacks, we apply MMIA to a model ensemble using a joint optimization strategy. We demonstrate that adversarially trained models with a strong defense ability are also susceptible to our black-box attacks. We conduct extensive experiments on classification tasks using common vision models, and our results significantly demonstrate the superiority of our method over state-of-the-art approaches when considering both transferability and stealthiness.
Students' stress levels have a significant impact on their academic performance in higher education, thus it's important to identify signs of stress early on and intervene to improve academic performance. Mach...
详细信息
ISBN:
(数字)9798331508456
ISBN:
(纸本)9798331508463
Students' stress levels have a significant impact on their academic performance in higher education, thus it's important to identify signs of stress early on and intervene to improve academic performance. Machine learning has evolved into a powerful tool for stress prediction, allowing for proactive support of at-risk youngsters. In order to better anticipate college students' stress levels, this study presents an enhanced TriBranch CNN framework. In order to provide the best possible performance, the technique includes data preparation, feature extraction, and model training. The dimensionality and redundancy are reduced using Principal Component Analysis (PCA). After being trained and tested against other models, the Fully Conditional Temporal Bayesian Network (Fully CTBN) outperformed them all with an accuracy of 93.29%, beating both traditional CNN and FCN approaches. These findings demonstrate that the Fully CTBN approach is useful for identifying students who may be struggling academically and providing schools with the information they need to implement data-driven interventions that boost student well-being and performance.
In this study, for the two-stage ejector under three inlet conditions of air-conditioning, refrigerating and freezing, a three-dimensional simulation is used to study the impact of the mixing chamber radius of the fir...
详细信息
Poor software quality can lead to crashes, failures or downtime, the consequences of which may be lost profits, financial costs, leakage or loss of data, accidents, human casualties, material losses or environmental d...
Poor software quality can lead to crashes, failures or downtime, the consequences of which may be lost profits, financial costs, leakage or loss of data, accidents, human casualties, material losses or environmental disasters. The total cost of poor software quality for IT companies in the USA is estimated at ${\$}$2.41 trillion per year and tends to increase. Among the identified costs, the cost of unsuccessful projects is estimated at ${\$}$260 billion, and the total cost of operational failures caused by poor quality software is estimated at ${\$}$1.81 trillion. Late finding and fixing of software defects directly affects the success of the project as a whole, since it significantly increases the cost and development time, and affects its quality. This paper discussed the relationship between factors affecting the software development process and various groups of defects. It has been found that the leading groups of defects affecting the software quality are the defects in software requirements and defects in the design of software interfaces for human-computer interaction with the total percentage of influence of 33.3%.
There is a lot of room for research in how to detect breast cancer metastases in whole slide images more quickly and *** work contrasts several machine learning and deep learning models on the breast cancer metastases...
There is a lot of room for research in how to detect breast cancer metastases in whole slide images more quickly and *** work contrasts several machine learning and deep learning models on the breast cancer metastases detection problem and experiments the impacts of feature extraction,dimension reduction and the sizes of the datasets on these *** work also establishes a breast cancer metastases detection pipeline based on the most accurate model in the *** the models,Dense Model using features trained from DenseNet201 with weights trained by ImageNet is of the best *** work develops a computer aided method to examine the cancerous regions in the whole slide images of breast cancer more quickly and precisely than an experienced doctor does.
The occurrences of bugs are not isolated events, rather they may interact, affect each other, and trigger other latent bugs. Identifying and understanding bug correlations could help developers localize bug origins, p...
详细信息
Vertical Federated Learning (VFL) is a privacy-preserving distributed learning paradigm where different parties collaboratively learn models using partitioned features of shared samples, without leaking private data. ...
详细信息
While large language models (LLMs) showcase unprecedented capabilities, they also exhibit certain inherent limitations when facing seemingly trivial tasks. A prime example is the recently debated "reversal curse&...
ISBN:
(纸本)9798331314385
While large language models (LLMs) showcase unprecedented capabilities, they also exhibit certain inherent limitations when facing seemingly trivial tasks. A prime example is the recently debated "reversal curse", which surfaces when models, having been trained on the fact "A is B", struggle to generalize this knowledge to infer that "B is A". In this paper, we examine the manifestation of the reversal curse across various tasks and delve into both the generalization abilities and the problem-solving mechanisms of LLMs. This investigation leads to a series of significant insights: (1) LLMs are able to generalize to "B is A" when both A and B are presented in the context as in the case of a multiple-choice question. (2) This generalization ability is highly correlated to the structure of the fact "A is B" in the training documents. For example, this generalization only applies to biographies structured in "[Name] is [Description]" but not to "[Description] is [Name]". (3) We propose and verify the hypothesis that LLMs possess an inherent bias in fact recalling during knowledge application, which explains and underscores the importance of the document structure to successful learning. (4) The negative impact of this bias on the downstream performance of LLMs can hardly be mitigated through training alone. These findings offer a novel perspective on interpreting LLMs' generalization through their intrinsic mechanisms and provide insights for developing more effective learning methods. https://***/alibaba/thinking_***
暂无评论