The automated generation of radiology reports has attracted significant attention in the field of bioinformatics. Currently, the main limitations of this task include insufficient utilization of prior medical knowledg...
详细信息
Transformers have increasingly become the de facto method to model sequential data with state-of-the-art performance. Due to its widespread use, being able to estimate and calibrate its modeling uncertainty is importa...
详细信息
作者:
Li, BoqiLiu, WeiweiSchool of Computer Science
National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
The rising threat of backdoor poisoning attacks (BPAs) on Deep Neural Networks (DNNs) has become a significant concern in recent years. In such attacks, the adversaries strategically target a specific class and genera...
详细信息
The rising threat of backdoor poisoning attacks (BPAs) on Deep Neural Networks (DNNs) has become a significant concern in recent years. In such attacks, the adversaries strategically target a specific class and generate a poisoned training set. The neural network (NN), well-trained on the poisoned training set, is able to predict any input with the trigger pattern as the targeted label, while maintaining accurate outputs for clean inputs. However, why the BPAs work remains less explored. To fill this gap, we employ a dirty-label attack and conduct a detailed analysis of BPAs in a two-layer convolutional neural network. We provide theoretical insights and results on the effectiveness of BPAs. Our experimental results on two real-world datasets validate our theoretical findings. Copyright 2024 by the author(s)
Exploring the intricate connections between non-coding RNAs (ncRNAs) and drug resistance is crucial for understanding the molecular mechanisms behind drug resistance, identifying novel drug development targets, and un...
详细信息
In unsupervised meta-learning, the clustering-based pseudo-labeling approach is an attractive framework, since it is model-agnostic, allowing it to synergize with supervised algorithms to learn from unlabeled data. Ho...
详细信息
In recent years, object detection technology has developed rapidly, especially the FPN has been widely adopted in production application and academic research. Compared with the traditional network, the accuracy of Ef...
详细信息
SegIt is a novel, user-friendly, and highly efficient sensor data labeling tool designed to tackle critical challenges such as data privacy, synchronization accuracy, and memory efficiency inherent in existing labelin...
详细信息
Consensus is unnecessary when the truth is available. In this paper, we present a new perspective of rebuilding the blockchain without consensus. When the consensus phase is eliminated from a blockchain, transactions ...
详细信息
Breast cancer is the most often diagnosed cancer in women affecting one in eight at the age of 80 in US. Breast is the most threatening cancer among women which leads to death. Early diagnosis of breast cancer can sav...
详细信息
Assembly sequence planning (ASP) is the most important process in the product lifecycle. This paper aims to propose a parallel assembly sequence planning method based on sparrow search algorithm (SSA) to improve the a...
详细信息
暂无评论