Recently,many researches have created adversarial samples to enrich the diversity of training data for improving the text classification performance via reducing the loss incurred in the neural network ***,existing st...
详细信息
Recently,many researches have created adversarial samples to enrich the diversity of training data for improving the text classification performance via reducing the loss incurred in the neural network ***,existing studies have focused solely on adding perturbations to the input,such as text sentences and embedded representations,resulting in adversarial samples that are very similar to the original *** adversarial samples can not significantly improve the diversity of training data,which restricts the potential for improved classification *** alleviate the problem,in this paper,we extend the diversity of generated adversarial samples based on the fact that adding different disturbances between different layers of neural network has different *** propose a novel neural network with perturbation strategy(PTNet),which generates adversarial samples by adding perturbation to the intrinsic representation of each hidden layer of the neural ***,we design two different perturbation ways to perturb each hidden layer:1)directly adding a certain threshold perturbation;2)adding the perturbation in the way of adversarial *** above settings,we can get more perturbed intrinsic representations of hidden layers and use them as new adversarial samples,thus improving the diversity of the augmented training *** validate the effectiveness of our approach on six text classification datasets and demonstrate that it improves the classification ability of the *** particular,the classification accuracy on the sentiment analysis task improved by an average of 1.79%and on question classification task improved by 3.2%compared to the BERT baseline,respectively.
Partial maximum satisfiability(PMS) is a significant generalization of Boolean satisfiability(SAT) and maximum satisfiability(MaxSAT), by introducing hard clauses and soft clauses. Compared with SAT and MaxSAT, the PM...
详细信息
Partial maximum satisfiability(PMS) is a significant generalization of Boolean satisfiability(SAT) and maximum satisfiability(MaxSAT), by introducing hard clauses and soft clauses. Compared with SAT and MaxSAT, the PMS problem has more real-world applications where both hard and soft constraints are involved. Local search is an effective incomplete method for solving PMS and is useful for important domains where good-quality solutions are desired within reasonable *** local search PMS solvers, the approach for initial assignment generation is crucial because its effectiveness significantly affects practical performance. In this study, we propose a novel initial assignment prediction approach, called InitPMS. When predicting an assignment for PMS, InitPMS considers the specific structure of PMS instances, i.e., distinguishing hard and soft clauses. Our experiments on extensive PMS instances from MaxSAT evaluations(MSEs) 2020 and 2021 show that InitPMS significantly boosts the performance of five state-of-the-art local search PMS solvers, demonstrating its generality. In addition,our results indicate that incorporating InitPMS could improve the performance of one of the best incomplete PMS solvers in MaxSAT Evaluation 2021, indicating that InitPMS might help advance the state of the art in PMS solving.
Dialogue-based relation extraction(DialogRE) aims to predict relationships between two entities in dialogue. Current approaches to dialogue relationship extraction grapple with long-distance entity relationships in di...
详细信息
Dialogue-based relation extraction(DialogRE) aims to predict relationships between two entities in dialogue. Current approaches to dialogue relationship extraction grapple with long-distance entity relationships in dialogue data as well as complex entity relationships, such as a single entity with multiple types of connections. To address these issues, this paper presents a novel approach for dialogue relationship extraction termed the hypergraphs and heterogeneous graphs model(HG2G). This model introduces a two-tiered structure, comprising dialogue hypergraphs and dialogue heterogeneous graphs, to address the shortcomings of existing methods. The dialogue hypergraph establishes connections between similar nodes using hyper-edges and utilizes hypergraph convolution to capture multi-level features. Simultaneously, the dialogue heterogeneous graph connects nodes and edges of different types, employing heterogeneous graph convolution to aggregate cross-sentence information. Ultimately, the integrated nodes from both graphs capture the semantic nuances inherent in dialogue. Experimental results on the DialogRE dataset demonstrate that the HG2G model outperforms existing state-of-the-art methods.
Due to its unique properties and excellent sequence design methods, DNA finds wide applications in computing, information storage, molecular circuits, and biological diagnosis. Previous efforts to enhance the efficien...
详细信息
Entity and relation extraction is a critical task in information *** approaches have emphasized obtaining improved span ***,existing work suffers from two major ***,there is an overabundance of low-quality candidate s...
详细信息
Entity and relation extraction is a critical task in information *** approaches have emphasized obtaining improved span ***,existing work suffers from two major ***,there is an overabundance of low-quality candidate spans,which hinders the effective extraction of information from high-quality candidate ***,the information encoded by existing marker strategies is often too simple to fully capture the nuances of the span,resulting in the loss of potentially valuable *** address these issues,we propose an enhancing entity and relation extraction with high-quality spans and enhanced marker(HSEM)strategies,it assigns adaptive weights to different spans in order to make the model more focused on high quality ***,the HSEM model enriches marker representation to incorporate more span information and enhance entity ***,we design a span scoring framework that assesses span quality based on the fusion of internal information and focuses the model on training high-quality samples to improve *** results on six benchmark datasets demonstrate that our model achieves state-of-the-art results after discriminating span quality.
The virtual private cloud service currently lacks a real-time end-to-end consistency validation mechanism, which prevents tenants from receiving immediate feedback on their requests. Existing solutions consume excessi...
详细信息
The virtual private cloud service currently lacks a real-time end-to-end consistency validation mechanism, which prevents tenants from receiving immediate feedback on their requests. Existing solutions consume excessive communication and computational resources in such large-scale cloud environments, and suffer from poor timeliness. To address these issues, we propose a lightweight consistency validation mechanism that includes real-time incremental validation and periodic full-scale validation. The former leverages message layer aggregation to enable tenants to swiftly determine the success of their requests on hosts with minimal communication overhead. The latter utilizes lightweight validation checksums to compare the expected and actual states of hosts locally, while efficiently managing the checksums of various host entries using inverted indexing. This approach enables us to efficiently validate the complete local configurations within the limited memory of hosts. In summary, our proposed mechanism achieves closed-loop implementation for new requests and ensures their long-term effectiveness.
Recently, redactable blockchain has been proposed and leveraged in a wide range of real systems for its unique properties of decentralization, traceability, and transparency while ensuring controllable on-chain data r...
详细信息
Recently, redactable blockchain has been proposed and leveraged in a wide range of real systems for its unique properties of decentralization, traceability, and transparency while ensuring controllable on-chain data redaction. However, the development of redactable blockchain is now obstructed by three limitations, which are data privacy breaches, high communication overhead, and low searching efficiency, respectively. In this paper, we propose PriChain, the first efficient privacy-preserving fine-grained redactable blockchain in decentralized settings. PriChain provides data owners with rights to control who can read and redact on-chain data while maintaining downward compatibility, ensuring the one who can redact will be able to read. Specifically, inspired by the concept of multi-authority attribute-based encryption, we utilize the isomorphism of the access control tree, realizing fine-grained redaction mechanism, downward compatibility, and collusion resistance. With the newly designed structure, PriChain can realize O(n) communication and storage overhead compared to prior O(n2) schemes. Furthermore, we integrate multiple access trees into a tree-based dictionary, optimizing searching efficiency. Theoretical analysis proves that PriChain is secure against the chosen-plaintext attack and has competitive complexity. The experimental evaluations show that PriChain realizes 10× efficiency improvement of searching and 100× lower communication and storage overhead on average compared with existing schemes.
Recent model recovery methods in federated unlearning (FUL) either rely on additional communication with the remaining clients or require large amounts of high-quality data from the server for training, overlooking sc...
详细信息
Ti-Mo-O alloys were used to analyze the effect of Mo and O contents on the mechanical compatibility and *** bending modulus,bending yield strength and springback ratio of the alloys were evaluated by using three-point...
详细信息
Ti-Mo-O alloys were used to analyze the effect of Mo and O contents on the mechanical compatibility and *** bending modulus,bending yield strength and springback ratio of the alloys were evaluated by using three-point bending tests and bending load-unloading *** biocompatibility was investigated by the adhesion,proliferation and the alkaline phosphatase(ALP)activity of mouse osteoblast-like cells(MC3T3-E1).The results showed that the bending modulus and bending yield strength first were increased and then decreased with the increase in Mo content,while the springback ratio exhibited an opposite trend to the bending *** the increase in O content,the bending modulus remained almost constant,while the bending yield strength was *** springback ratio exhibited a similar trend to the bending yield *** in vitro biological experiments showed that the Ti-Mo-O alloys had excellent biocompatibility due to the formed stable oxide films on their *** the increase in O and Mo contents,the TiO_(2)-MoO_(2)oxide film became *** with mechanical compatibility and biocompatibility,the Ti-15Mo-0.2O and Ti-15Mo-0.3O alloys were more suitable for the biomedical application of spinal fixation device.
Witness encryption(WE) is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance. Anyone who possesses a solution to this instance(i.e., a witness) can then recover the messa...
详细信息
Witness encryption(WE) is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance. Anyone who possesses a solution to this instance(i.e., a witness) can then recover the message from the *** introduce a variant of WE that allows ciphertext updates, referred to as ciphertext updateable WE(CUWE). With CUWE,a user can encrypt a message using an instance x and a tag t, and those who possess a valid witness w for x and match the access policy defined by tag t can decrypt the message. Furthermore, CUWE allows for the use of an update token to change the tag t of ciphertext to a different tag. This feature enables fine-grained access control, even after the ciphertext has been created, thereby significantly increasing the usefulness of the WE scheme. We demonstrate that such a WE framework with an updatable ciphertext scheme can be constructed using our puncturable instance-based deterministic encryption(PIDE) and indistinguishability obfuscation(iO). We also propose an instantiation of PIDE utilizing puncturable pseudorandom functions(PRFs) that provide(selectively) indistinguishable security. Finally, we expand our CUWE to ciphertext-updatable functional WE(CUFWE), which offers enhanced data access control.
暂无评论