This study proposes a bearing fault diagnosis method that combines the Cuckoo Optimization Algorithm (COA) with the KAN algorithm. COA, as an intelligent optimization algorithm, is primarily used to find the optimal h...
详细信息
software defect prediction helps quality assurance teams find defects in software, thereby enhancing the reliability of the systems. In existing code-visualization-based defect prediction methods, challenges arise fro...
详细信息
Intensive monitoring and anomaly diagnosis have become a knotty problem for modern microservice architecture due to the dynamics of service dependency. While most previous studies rely heavily on ample monitoring metr...
详细信息
The automated generation of radiology reports has attracted significant attention in the field of bioinformatics. Currently, the main limitations of this task include insufficient utilization of prior medical knowledg...
详细信息
Transformers have increasingly become the de facto method to model sequential data with state-of-the-art performance. Due to its widespread use, being able to estimate and calibrate its modeling uncertainty is importa...
详细信息
作者:
Li, BoqiLiu, WeiweiSchool of Computer Science
National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
The rising threat of backdoor poisoning attacks (BPAs) on Deep Neural Networks (DNNs) has become a significant concern in recent years. In such attacks, the adversaries strategically target a specific class and genera...
详细信息
The rising threat of backdoor poisoning attacks (BPAs) on Deep Neural Networks (DNNs) has become a significant concern in recent years. In such attacks, the adversaries strategically target a specific class and generate a poisoned training set. The neural network (NN), well-trained on the poisoned training set, is able to predict any input with the trigger pattern as the targeted label, while maintaining accurate outputs for clean inputs. However, why the BPAs work remains less explored. To fill this gap, we employ a dirty-label attack and conduct a detailed analysis of BPAs in a two-layer convolutional neural network. We provide theoretical insights and results on the effectiveness of BPAs. Our experimental results on two real-world datasets validate our theoretical findings. Copyright 2024 by the author(s)
Exploring the intricate connections between non-coding RNAs (ncRNAs) and drug resistance is crucial for understanding the molecular mechanisms behind drug resistance, identifying novel drug development targets, and un...
详细信息
In unsupervised meta-learning, the clustering-based pseudo-labeling approach is an attractive framework, since it is model-agnostic, allowing it to synergize with supervised algorithms to learn from unlabeled data. Ho...
详细信息
In recent years, object detection technology has developed rapidly, especially the FPN has been widely adopted in production application and academic research. Compared with the traditional network, the accuracy of Ef...
详细信息
SegIt is a novel, user-friendly, and highly efficient sensor data labeling tool designed to tackle critical challenges such as data privacy, synchronization accuracy, and memory efficiency inherent in existing labelin...
详细信息
暂无评论