Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t...
详细信息
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and targets while ignoring relational types information. Considering the positive or negative effects of DTIs will facilitate the study on comprehensive mechanisms of multiple drugs on a common target, in this work, we model DTIs on signed heterogeneous networks, through categorizing interaction patterns of DTIs and additionally extracting interactions within drug pairs and target protein pairs. We propose signed heterogeneous graph neural networks(SHGNNs), further put forward an end-to-end framework for signed DTIs prediction, called SHGNN-DTI,which not only adapts to signed bipartite networks, but also could naturally incorporate auxiliary information from drug-drug interactions(DDIs) and protein-protein interactions(PPIs). For the framework, we solve the message passing and aggregation problem on signed DTI networks, and consider different training modes on the whole networks consisting of DTIs, DDIs and PPIs. Experiments are conducted on two datasets extracted from Drug Bank and related databases, under different settings of initial inputs, embedding dimensions and training modes. The prediction results show excellent performance in terms of metric indicators, and the feasibility is further verified by the case study with two drugs on breast cancer.
The increasing data pool in finance sectors forces machine learning(ML)to step into new *** data has significant financial implications and is *** users data from several organizations for various banking services may...
详细信息
The increasing data pool in finance sectors forces machine learning(ML)to step into new *** data has significant financial implications and is *** users data from several organizations for various banking services may result in various intrusions and privacy *** a result,this study employs federated learning(FL)using a flower paradigm to preserve each organization’s privacy while collaborating to build a robust shared global ***,diverse data distributions in the collaborative training process might result in inadequate model learning and a lack of *** address this issue,the present paper proposes the imple-mentation of Federated Averaging(FedAvg)and Federated Proximal(FedProx)methods in the flower framework,which take advantage of the data locality while training and guaranteeing global *** improves the privacy of the local *** analysis used the credit card and Canadian Institute for Cybersecurity Intrusion Detection Evaluation(CICIDS)***,recall,and accuracy as performance indicators to show the efficacy of the proposed strategy using FedAvg and *** experimental findings suggest that the proposed approach helps to safely use banking data from diverse sources to enhance customer banking services by obtaining accuracy of 99.55%and 83.72%for FedAvg and 99.57%,and 84.63%for FedProx.
Background: The IoT (Internet of Things) assigns to the capacity of Device-to-Machine (D2M) connections, which is a vital component in the development of the digital economy. IoT integration with a human being enables...
详细信息
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical *** main objective of nonlinear filtering is to i...
详细信息
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical *** main objective of nonlinear filtering is to infer the states of a nonlinear dynamical system of interest based on the available noisy measurements. In recent years, the advance of network communication technology has not only popularized the networked systems with apparent advantages in terms of installation,cost and maintenance, but also brought about a series of challenges to the design of nonlinear filtering algorithms, among which the communication constraint has been recognized as a dominating concern. In this context, a great number of investigations have been launched towards the networked nonlinear filtering problem with communication constraints, and many samplebased nonlinear filters have been developed to deal with the highly nonlinear and/or non-Gaussian scenarios. The aim of this paper is to provide a timely survey about the recent advances on the sample-based networked nonlinear filtering problem from the perspective of communication constraints. More specifically, we first review three important families of sample-based filtering methods known as the unscented Kalman filter, particle filter,and maximum correntropy filter. Then, the latest developments are surveyed with stress on the topics regarding incomplete/imperfect information, limited resources and cyber ***, several challenges and open problems are highlighted to shed some lights on the possible trends of future research in this realm.
Graphconvolutional networks(GCNs)have become prevalent in recommender system(RS)due to their superiority in modeling collaborative *** improving the overall accuracy,GCNs unfortunately amplify popularity bias-tail ite...
详细信息
Graphconvolutional networks(GCNs)have become prevalent in recommender system(RS)due to their superiority in modeling collaborative *** improving the overall accuracy,GCNs unfortunately amplify popularity bias-tail items are less likely to be *** effect prevents the GCN-based RS from making precise and fair recommendations,decreasing the effectiveness of recommender systems in the long *** this paper,we investigate how graph convolutions amplify the popularity bias in *** theoretical analyses,we identify two fundamental factors:(1)with graph convolution(i.e.,neighborhood aggregation),popular items exert larger influence than tail items on neighbor users,making the users move towards popular items in the representation space;(2)after multiple times of graph convolution,popular items would affect more high-order neighbors and become more *** two points make popular items get closer to almost users and thus being recommended more *** rectify this,we propose to estimate the amplified effect of popular nodes on each node's representation,and intervene the effect after each graph ***,we adopt clustering to discover highly-influential nodes and estimate the amplification effect of each node,then remove the effect from the node embeddings at each graph convolution *** method is simple and generic-it can be used in the inference stage to correct existing models rather than training a new model from scratch,and can be applied to various GCN *** demonstrate our method on two representative GCN backbones LightGCN and UltraGCN,verifying its ability in improving the recommendations of tail items without sacrificing the performance of popular *** are open-sourced^(1)).
Roads are an important part of transporting goods and products from one place to another. In developing countries, the main challenge is to maintain road conditions regularly. Roads can deteriorate from time to time. ...
详细信息
Background: The main objective of the Internet of Things (IoT) has significantly influenced and altered technology, such as interconnection, interoperability, and sensor devices. To ensure seamless healthcare faciliti...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***,attackers have used advanced techniques to evade defenses by transforming their malware into functionality-preserving *** systematically analyze such evasion attacks and conduct a large-scale empirical study in this paper to evaluate their impact on *** specifically,we focus on two forms of evasion attacks:obfuscation and adversarial *** the best of our knowledge,this paper is the first to investigate and contrast the two families of evasion attacks *** apply 10 obfuscation attacks and 9 adversarial attacks to 2870 malware *** obtained findings are as follows.(1)Commercial Off-The-Shelf(COTS)malware detectors are vulnerable to evasion attacks.(2)Adversarial attacks affect COTS malware detectors slightly more effectively than obfuscated malware examples.(3)Code similarity detection approaches can be affected by obfuscated examples and are barely affected by adversarial attacks.(4)These attacks can preserve the functionality of original malware examples.
Task scheduling for virtual machines (VMs) has shown to be essential for the effective development of cloud computing at the lowest cost and fastest turnaround time. A number of research gaps about job schedule optimi...
详细信息
To address the privacy concerns that arise from centralizing model training on a large number of IoT devices, a revolutionary new distributed learning framework called federated learning has been developed. This setup...
详细信息
暂无评论