This paper examines fault-tolerant quantized control for neural networks under persistent dwell-time switching, considering the presence of actuator faults and dynamic output quantization. The dynamic scaling factor (...
详细信息
Models based on MLP-Mixer architecture are becoming popular,but they still sufer from adversarial *** it has been shown that MLP-Mixer is more robust to adversarial attacks compared to convolutional neural networks(CN...
详细信息
Models based on MLP-Mixer architecture are becoming popular,but they still sufer from adversarial *** it has been shown that MLP-Mixer is more robust to adversarial attacks compared to convolutional neural networks(CNNs),there has been no research on adversarial attacks tailored to its *** this paper,we fll this *** propose a dedicated attack framework called Maxwell’s demon Attack(MA).Specifcally,we break the chan‑nel-mixing and token-mixing mechanisms of the MLP-Mixer by perturbing inputs of each Mixer layer to achieve high *** demonstrate that disrupting the MLP-Mixer’s capture of the main information of images by mask‑ing its inputs can generate adversarial examples with cross-architectural *** evaluations show the efectiveness and superior performance of *** generated based on masked inputs obtain a higher success rate of black-box attacks than existing transfer ***,our approach can be easily combined with existing methods to improve the transferability both within MLP-Mixer based models and to models with difer‑ent *** achieve up to 55.9%attack performance *** work exploits the true generaliza‑tion potential of the MLP-Mixer adversarial space and helps make it more robust for future deployments.
Researchers have recently achieved significant advances in deep learning techniques, which in turn has substantially advanced other research disciplines, such as natural language processing, image processing, speech r...
详细信息
Researchers have recently achieved significant advances in deep learning techniques, which in turn has substantially advanced other research disciplines, such as natural language processing, image processing, speech recognition, and software engineering. Various deep learning techniques have been successfully employed to facilitate software engineering tasks, including code generation, software refactoring, and fault localization. Many studies have also been presented in top conferences and journals, demonstrating the applications of deep learning techniques in resolving various software engineering tasks. However,although several surveys have provided overall pictures of the application of deep learning techniques in software engineering,they focus more on learning techniques, that is, what kind of deep learning techniques are employed and how deep models are trained or fine-tuned for software engineering tasks. We still lack surveys explaining the advances of subareas in software engineering driven by deep learning techniques, as well as challenges and opportunities in each subarea. To this end, in this study, we present the first task-oriented survey on deep learning-based software engineering. It covers twelve major software engineering subareas significantly impacted by deep learning techniques. Such subareas spread out through the whole lifecycle of software development and maintenance, including requirements engineering, software development, testing, maintenance, and developer collaboration. As we believe that deep learning may provide an opportunity to revolutionize the whole discipline of software engineering, providing one survey covering as many subareas as possible in software engineering can help future research push forward the frontier of deep learning-based software engineering more systematically. For each of the selected subareas,we highlight the major advances achieved by applying deep learning techniques with pointers to the available datasets i
The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and ***,traditional DL methods compromise client privacy by collecting...
详细信息
The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and ***,traditional DL methods compromise client privacy by collecting sensitive data,underscoring the necessity for privacy-preserving solutions like Federated Learning(FL).FL effectively addresses escalating privacy concerns by facilitating collaborative model training without necessitating the sharing of raw *** that FL clients autonomously manage training data,encouraging client engagement is pivotal for successful model *** overcome challenges like unreliable communication and budget constraints,we present ENTIRE,a contract-based dynamic participation incentive mechanism for *** ensures impartial model training by tailoring participation levels and payments to accommodate diverse client *** approach involves several key ***,we examine how random client participation impacts FL convergence in non-convex scenarios,establishing the correlation between client participation levels and model ***,we reframe model performance optimization as an optimal contract design challenge to guide the distribution of rewards among clients with varying participation *** balancing budget considerations with model effectiveness,we craft optimal contracts for different budgetary constraints,prompting clients to disclose their participation preferences and select suitable contracts for contributing to model ***,we conduct a comprehensive experimental evaluation of ENTIRE using three real *** results demonstrate a significant 12.9%enhancement in model performance,validating its adherence to anticipated economic properties.
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature...
详细信息
This paper considers the asynchronous control for discrete-time Markov jump systems (MJSs) using a multi-node round-robin protocol (MNRRP). Compared to the traditional round-robin protocol, MNRRP increases the number ...
详细信息
Recently,many researches have created adversarial samples to enrich the diversity of training data for improving the text classification performance via reducing the loss incurred in the neural network ***,existing st...
详细信息
Recently,many researches have created adversarial samples to enrich the diversity of training data for improving the text classification performance via reducing the loss incurred in the neural network ***,existing studies have focused solely on adding perturbations to the input,such as text sentences and embedded representations,resulting in adversarial samples that are very similar to the original *** adversarial samples can not significantly improve the diversity of training data,which restricts the potential for improved classification *** alleviate the problem,in this paper,we extend the diversity of generated adversarial samples based on the fact that adding different disturbances between different layers of neural network has different *** propose a novel neural network with perturbation strategy(PTNet),which generates adversarial samples by adding perturbation to the intrinsic representation of each hidden layer of the neural ***,we design two different perturbation ways to perturb each hidden layer:1)directly adding a certain threshold perturbation;2)adding the perturbation in the way of adversarial *** above settings,we can get more perturbed intrinsic representations of hidden layers and use them as new adversarial samples,thus improving the diversity of the augmented training *** validate the effectiveness of our approach on six text classification datasets and demonstrate that it improves the classification ability of the *** particular,the classification accuracy on the sentiment analysis task improved by an average of 1.79%and on question classification task improved by 3.2%compared to the BERT baseline,respectively.
Currently,the main idea of iterative rendering methods is to allocate a fixed number of samples to pixels that have not been fully rendered by calculating the completion *** is obvious that this strategy ignores the c...
详细信息
Currently,the main idea of iterative rendering methods is to allocate a fixed number of samples to pixels that have not been fully rendered by calculating the completion *** is obvious that this strategy ignores the changes in pixel values during the previous rendering process,which may result in additional iterative operations.
The article addresses the output-feedback control issue for a class of multi-input multi-output(MIMO)uncertain nonlinear systems with multiple event-triggered mechanisms(ETM).Compared to previous event-triggering stud...
详细信息
The article addresses the output-feedback control issue for a class of multi-input multi-output(MIMO)uncertain nonlinear systems with multiple event-triggered mechanisms(ETM).Compared to previous event-triggering studies,this paper aims to trigger both the output and filtered *** nonlinear dynamics are approximated using fuzzy logic systems(FLSs).Then,a novel kind of state observer has been designed to deal with unmeasurable state problems using the triggered output *** sampled estimated state,the triggered output signal,and the filtered signal are utilized to propose an event-triggering mechanism that consists of sensor-to-observer(SO)and observer-to-controller(OC).An event-triggered output feedback control approach is given inside backstepping control,whereby the filter may be employed to circumvent the issue of the virtual control function not being differentiable at the trigger *** is testified that,according to the Lyapunov stability analysis scheme,all closed-loop signals and the system output are ultimately uniformly constrained by our control ***,the simulation examples are performed to confirm the theoretical findings.
Current motion detection and evaluation technologies face challenges such as limited scalability, imprecise feedback, and lack of personalized guidance. To address these challenges, this research integrated efficient ...
详细信息
暂无评论