With the development of deep learning and computer vision, face detection has achieved rapid progress owing. Face detection has several application domains, including identity authentication, security protection, medi...
详细信息
Knowledge tracing aims to track students’knowledge status over time to predict students’future performance *** a real environment,teachers expect knowledge tracing models to provide the interpretable result of knowl...
详细信息
Knowledge tracing aims to track students’knowledge status over time to predict students’future performance *** a real environment,teachers expect knowledge tracing models to provide the interpretable result of knowledge *** chain-based knowledge tracing(MCKT)models,such as Bayesian Knowledge Tracing,can track knowledge concept mastery probability over ***,as the number of tracked knowledge concepts increases,the time complexity of MCKT predicting student performance increases exponentially(also called explaining away problem).When the number of tracked knowledge concepts is large,we cannot utilize MCKT to track knowledge concept mastery probability over *** addition,the existing MCKT models only consider the relationship between students’knowledge status and problems when modeling students’responses but ignore the relationship between knowledge concepts in the same *** address these challenges,we propose an inTerpretable pRobAbilistiC gEnerative moDel(TRACED),which can track students’numerous knowledge concepts mastery probabilities over *** solve explain away problem,we design long and short-term memory(LSTM)-based networks to approximate the posterior distribution,predict students’future performance,and propose a heuristic algorithm to train LSTMs and probabilistic graphical model *** better model students’exercise responses,we proposed a logarithmic linear model with three interactive strategies,which models students’exercise responses by considering the relationship among students’knowledge status,knowledge concept,and *** conduct experiments with four real-world datasets in three knowledge-driven *** experimental results show that TRACED outperforms existing knowledge tracing methods in predicting students’future performance and can learn the relationship among students,knowledge concepts,and problems from students’exercise *** also conduct several case *** case studies show that
Demand response has recently become an essential means for businesses to reduce production costs in industrial ***,the current industrial chain structure has also become increasingly complex,forming new characteristic...
详细信息
Demand response has recently become an essential means for businesses to reduce production costs in industrial ***,the current industrial chain structure has also become increasingly complex,forming new characteristics of multiplex networked industrial *** in real-time electricity prices in demand response propagate through the coupling and cascading relationships within and among these network layers,resulting in negative impacts on the overall energy management ***,existing demand response methods based on reinforcement learning typically focus only on individual agents without considering the influence of dynamic factors on intra and inter-network *** paper proposes a Layered Temporal Spatial Graph Attention(LTSGA)reinforcement learning algorithm suitable for demand response in multiplex networked industrial chains to address this *** algorithm first uses Long Short-Term Memory(LSTM)to learn the dynamic temporal characteristics of electricity prices for ***,LTSGA incorporates a layered spatial graph attention model to evaluate the impact of dynamic factors on the complex multiplex networked industrial chain *** demonstrate that the proposed LTSGA approach effectively characterizes the influence of dynamic factors on intra-and inter-network relationships within the multiplex industrial chain,enhancing convergence speed and algorithm performance compared with existing state-of-the-art algorithms.
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical...
详细信息
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical *** paper analyzes two fundamental failure cases in the baseline AD model and identifies key reasons that limit the recognition accuracy of existing approaches. Specifically, by Case-1, we found that the main reason detrimental to current AD methods is that the inputs to the recovery model contain a large number of detailed features to be recovered, which leads to the normal/abnormal area has not/has been recovered into its original state. By Case-2, we surprisingly found that the abnormal area that cannot be recognized in image-level representations can be easily recognized in the feature-level representation. Based on the above observations, we propose a novel recover-then-discriminate(ReDi) framework for *** takes a self-generated feature map(e.g., histogram of oriented gradients) and a selected prompted image as explicit input information to address the identified in Case-1. Additionally, a feature-level discriminative network is introduced to amplify abnormal differences between the recovered and input representations. Extensive experiments on two widely used yet challenging AD datasets demonstrate that ReDi achieves state-of-the-art recognition accuracy.
Electronic auctions(e-auctions)remove the physical limitations of traditional auctions and bring this mechanism to the general ***,most e-auction schemes involve a trusted auctioneer,which is not always credible in **...
详细信息
Electronic auctions(e-auctions)remove the physical limitations of traditional auctions and bring this mechanism to the general ***,most e-auction schemes involve a trusted auctioneer,which is not always credible in *** studies have applied cryptography tools to solve this problem by distributing trust,but they ignore the existence of *** this paper,a blockchain-based Privacy-Preserving and Collusion-Resistant scheme(PPCR)for double auctions is proposed by employing both cryptography and blockchain technology,which is the first decentralized and collusion-resistant double auction scheme that guarantees bidder anonymity and bid privacy.A two-server-based auction framework is designed to support off-chain allocation with privacy preservation and on-chain dispute resolution for collusion resistance.A Dispute Resolution agreement(DR)is provided to the auctioneer to prove that they have conducted the auction correctly and the result is fair and *** addition,a Concise Dispute Resolution protocol(CDR)is designed to handle situations where the number of accused winners is small,significantly reducing the computation cost of dispute *** experimental results confirm that PPCR can indeed achieve efficient collusion resistance and verifiability of auction results with low on-chain and off-chain computational overhead.
The current urban intelligent transportation is in a rapid development stage, and coherence control of vehicle formations has important implications in urban intelligent transportation research. This article focuses o...
详细信息
There is a growing interest in sustainable ecosystem development, which includes methods such as scientific modeling, environmental assessment, and development forecasting and planning. However, due to insufficient su...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a few research studies have focused on the application of ML especially supervised learning techniques in Requirement engineering(RE)activities to solve the problems that occur in RE *** authors focus on the systematic mapping of past work to investigate those studies that focused on the application of supervised learning techniques in RE activities between the period of 2002–*** authors aim to investigate the research trends,main RE activities,ML algorithms,and data sources that were studied during this ***-five research studies were selected based on our exclusion and inclusion *** results show that the scientific community used 57 *** those algorithms,researchers mostly used the five following ML algorithms in RE activities:Decision Tree,Support Vector Machine,Naïve Bayes,K-nearest neighbour Classifier,and Random *** results show that researchers used these algorithms in eight major RE *** activities are requirements analysis,failure prediction,effort estimation,quality,traceability,business rules identification,content classification,and detection of problems in requirements written in natural *** selected research studies used 32 private and 41 public data *** most popular data sources that were detected in selected studies are the Metric Data Programme from NASA,Predictor Models in softwareengineering,and iTrust Electronic Health Care System.
With the rise of artificial intelligence and cloud computing, machine-learning-as-a-service platforms,such as Google, Amazon, and IBM, have emerged to provide sophisticated tasks for cloud applications. These propriet...
详细信息
With the rise of artificial intelligence and cloud computing, machine-learning-as-a-service platforms,such as Google, Amazon, and IBM, have emerged to provide sophisticated tasks for cloud applications. These proprietary models are vulnerable to model extraction attacks due to their commercial value. In this paper, we propose a time-efficient model extraction attack framework called Swift Theft that aims to steal the functionality of cloud-based deep neural network models. We distinguish Swift Theft from the existing works with a novel distribution estimation algorithm and reference model settings, finding the most informative query samples without querying the victim model. The selected query samples can be applied to various cloud models with a one-time selection. We evaluate our proposed method through extensive experiments on three victim models and six datasets, with up to 16 models for each dataset. Compared to the existing attacks, Swift Theft increases agreement(i.e., similarity) by 8% while consuming 98% less selecting time.
Non-coding RNAs (ncRNAs), which do not encode proteins, have been implicated in chemotherapy resistance in cancer treatment. Given the high costs and time requirements of traditional biological experiments, there is a...
详细信息
暂无评论