Existing self-knowledge distillation (Self-KD) solutions usually focus on transferring historical predictions of individual instances to the current network. However, this approach tends to create overconfidence for e...
Existing self-knowledge distillation (Self-KD) solutions usually focus on transferring historical predictions of individual instances to the current network. However, this approach tends to create overconfidence for easy instances and underconfidence for hard instances. The widely used temperature-based strategies to smooth or sharpen the predicted distributions can lead to inconsistencies across instances, causing sensitivity issues. To address this, our approach views a queue of instances as an ensemble rather than treating each instance independently. We propose a novel method that distills historical knowledge from a dimensional perspective, utilizing intra class characteristics and interclass relationships within each ensemble. First, we align each dimension distribution from the current network to the historical output. Second, we ensure each dimension is closer to similar dimensions than dissimilar ones, maintaining consistent attitudes from present and historical perspectives. Our insights reveal that distilling historical knowledge from a dimensional perspective is more effective than the traditional instance-based approach, with potential applications in related tasks. Empirical results on three famous datasets and various network architectures demonstrate the superiority of our proposed method. Our code is available at https://***/WenkeHuang/DimSelfKD.
Images captured in low-light or underwater environments are often accompanied by significant degradation, which can negatively impact the quality and performance of downstream tasks. While convolutional neural network...
详细信息
Cloud computing has emerged as a promising mode for storaging vast quantities of big data, which is vulnerable to potential security threats, making it urgent to ensure data confidentiality and integrity auditing. In ...
详细信息
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit...
详细信息
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining ***,these tools suffer from some *** terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search ***,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information *** this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation *** leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion *** combination allows for the unified handling of binary programs across various architectures,compilers,and compilation ***,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)***,the graph embedding network is utilized to evaluate the similarity of program *** on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target *** solved content serves as the initial seed for targeted *** binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity *** approach facilitates
With the rising popularity of online social interactions, emojis play a pivotal role in communication, effectively conveying people's emotions. Hence, accurately converting facial micro-expressions into correspond...
详细信息
The battery energy storage system (BESS) has immense potential for enhancing grid reliability and security through its participation in the electricity market. BESS often seeks various revenue streams by taking part i...
详细信息
In the recent years, the development of generative models has stimulated the health care progress, specially medical image generation. The synthetic medical images can be applied to several fields and have many utiliz...
详细信息
Due to the aging of the world's population, the incidence of retinal diseases is on the rise. Machine learning is expected to have a crucial role in identifying retinal disease. Multiple medical institutions coope...
详细信息
This paper introduces an enhanced YOLOv5 algorithm tailored for real-world traffic sign detection applications. Through the incorporation of Coordinate Attention after the SPPF module of the YOLOv5 backbone, the YOLOv...
详细信息
Cloud storage provides highly available and low cost resources to users. However, as massive amounts of outsourced data grow rapidly, an effective data deduplication scheme is necessary. This is a hot and challenging ...
详细信息
Cloud storage provides highly available and low cost resources to users. However, as massive amounts of outsourced data grow rapidly, an effective data deduplication scheme is necessary. This is a hot and challenging field, in which there are quite a few researches. However, most of previous works require dual-server fashion to be against brute-force attacks and do not support batch checking. It is not practicable for the massive data stored in the cloud. In this paper, we present a secure batch deduplication scheme for backup system. Besides, our scheme resists the brute-force attacks without the aid of other servers. The core idea of the batch deduplication is to separate users into different groups by using short hashes. Within each group, we leverage group key agreement and symmetric encryption to achieve secure batch checking and semantically secure storage. We also extensively evaluate its performance and overhead based on different datasets. We show that our scheme saves the data storage by up to 89.84%. These results show that our scheme is efficient and scalable for cloud backup system and can also ensure data confidentiality. IEEE
暂无评论