Models based on MLP-Mixer architecture are becoming popular,but they still sufer from adversarial *** it has been shown that MLP-Mixer is more robust to adversarial attacks compared to convolutional neural networks(CN...
详细信息
Models based on MLP-Mixer architecture are becoming popular,but they still sufer from adversarial *** it has been shown that MLP-Mixer is more robust to adversarial attacks compared to convolutional neural networks(CNNs),there has been no research on adversarial attacks tailored to its *** this paper,we fll this *** propose a dedicated attack framework called Maxwell’s demon Attack(MA).Specifcally,we break the chan‑nel-mixing and token-mixing mechanisms of the MLP-Mixer by perturbing inputs of each Mixer layer to achieve high *** demonstrate that disrupting the MLP-Mixer’s capture of the main information of images by mask‑ing its inputs can generate adversarial examples with cross-architectural *** evaluations show the efectiveness and superior performance of *** generated based on masked inputs obtain a higher success rate of black-box attacks than existing transfer ***,our approach can be easily combined with existing methods to improve the transferability both within MLP-Mixer based models and to models with difer‑ent *** achieve up to 55.9%attack performance *** work exploits the true generaliza‑tion potential of the MLP-Mixer adversarial space and helps make it more robust for future deployments.
Researchers have recently achieved significant advances in deep learning techniques, which in turn has substantially advanced other research disciplines, such as natural language processing, image processing, speech r...
详细信息
Researchers have recently achieved significant advances in deep learning techniques, which in turn has substantially advanced other research disciplines, such as natural language processing, image processing, speech recognition, and software engineering. Various deep learning techniques have been successfully employed to facilitate software engineering tasks, including code generation, software refactoring, and fault localization. Many studies have also been presented in top conferences and journals, demonstrating the applications of deep learning techniques in resolving various software engineering tasks. However,although several surveys have provided overall pictures of the application of deep learning techniques in software engineering,they focus more on learning techniques, that is, what kind of deep learning techniques are employed and how deep models are trained or fine-tuned for software engineering tasks. We still lack surveys explaining the advances of subareas in software engineering driven by deep learning techniques, as well as challenges and opportunities in each subarea. To this end, in this study, we present the first task-oriented survey on deep learning-based software engineering. It covers twelve major software engineering subareas significantly impacted by deep learning techniques. Such subareas spread out through the whole lifecycle of software development and maintenance, including requirements engineering, software development, testing, maintenance, and developer collaboration. As we believe that deep learning may provide an opportunity to revolutionize the whole discipline of software engineering, providing one survey covering as many subareas as possible in software engineering can help future research push forward the frontier of deep learning-based software engineering more systematically. For each of the selected subareas,we highlight the major advances achieved by applying deep learning techniques with pointers to the available datasets i
Denoising(DN) and demosaicing(DM) are the first crucial stages in the image signal processing pipeline. Recently, researches pay more attention to solve DN and DM in a joint manner, which is an extremely undetermined ...
详细信息
Denoising(DN) and demosaicing(DM) are the first crucial stages in the image signal processing pipeline. Recently, researches pay more attention to solve DN and DM in a joint manner, which is an extremely undetermined inverse problem. Existing deep learning methods learn the desired prior on synthetic dataset, which limits the generalization of learned network to the real world data. Moreover, existing methods mainly focus on the raw data property of high green information sampling rate for DM, but occasionally exploit the high intensity and signalto-noise(SNR) of green channel. In this work, a deep guided attention network(DGAN) is presented for real image joint DN and DM(JDD), which considers both high SNR and high sampling rate of green information for DN and DM, respectively. To ease the training and fully exploit the data property of green channel, we first train DN and DM sub-networks sequentially and then learn them jointly, which can alleviate the error accumulation. Besides, in order to support the real image JDD, we collect paired raw clean RGB and noisy mosaic images to conduct a realistic dataset. The experimental results on real JDD dataset show the presented approach performs better than the state-of-the-art methods, in terms of both quantitative metrics and qualitative visualization.
Dear Editor,This letter presents a distributed adaptive second-order latent factor(DAS) model for addressing the issue of high-dimensional and incomplete data representation. Compared with first-order optimizers, a se...
详细信息
Dear Editor,This letter presents a distributed adaptive second-order latent factor(DAS) model for addressing the issue of high-dimensional and incomplete data representation. Compared with first-order optimizers, a second-order optimizer has stronger ability in approaching a better solution when dealing with the non-convex optimization problems, thus obtaining better performance in extracting the latent factors(LFs) well representing the known information from high-dimensional and incomplete data.
The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and ***,traditional DL methods compromise client privacy by collecting...
详细信息
The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and ***,traditional DL methods compromise client privacy by collecting sensitive data,underscoring the necessity for privacy-preserving solutions like Federated Learning(FL).FL effectively addresses escalating privacy concerns by facilitating collaborative model training without necessitating the sharing of raw *** that FL clients autonomously manage training data,encouraging client engagement is pivotal for successful model *** overcome challenges like unreliable communication and budget constraints,we present ENTIRE,a contract-based dynamic participation incentive mechanism for *** ensures impartial model training by tailoring participation levels and payments to accommodate diverse client *** approach involves several key ***,we examine how random client participation impacts FL convergence in non-convex scenarios,establishing the correlation between client participation levels and model ***,we reframe model performance optimization as an optimal contract design challenge to guide the distribution of rewards among clients with varying participation *** balancing budget considerations with model effectiveness,we craft optimal contracts for different budgetary constraints,prompting clients to disclose their participation preferences and select suitable contracts for contributing to model ***,we conduct a comprehensive experimental evaluation of ENTIRE using three real *** results demonstrate a significant 12.9%enhancement in model performance,validating its adherence to anticipated economic properties.
WiFi-based gait recognition technologies have seen significant advancements in recent years. However, most existing approaches rely on a critical assumption: users must walk continuously and maintain a consistent body...
详细信息
he advance in Non-Volatile Memory(NVM)has changed the traditional *** to DRAM,NVM has the advantages of nonvolatility and large ***,as the read/write speed of NVM is still lower than that of DRAM,building DRAM/NVM-bas...
详细信息
he advance in Non-Volatile Memory(NVM)has changed the traditional *** to DRAM,NVM has the advantages of nonvolatility and large ***,as the read/write speed of NVM is still lower than that of DRAM,building DRAM/NVM-based hybrid memory systems is a feasible way of adding NVM into the current computer *** paper aims to optimize the well-known B^(+)-tree for hybrid *** novelty of this study is ***,we observed that the space utilization of internal nodes in B^(+)-tree is generally below 70%.Inspired by this observation,we propose to maintain hot keys in the free space within internal nodes,yielding a new index named HATree(Hotness-Aware Tree).The new idea of HATree is to use the unused space of the parent of leaf nodes(PLNs)as the hotspot data ***,no extra space is needed,and the in-node hotspot cache can efficiently improve query ***,to further improve the update performance of HATree,we propose to utilize the eADR technology supported by the third-generation Intel Xeon Scalable Processors to enhance HATree with instant log persistence,which results in the new HATree-Log *** conduct extensive experiments on real hybrid memory architecture involving DRAM and Intel Optane Persistent Memory to evaluate the performance of HATree and *** state-of-the-art indices for hybrid memory,namely NBTree,LBTree,and FPTree,are included in the experiments,and the results suggest the efficiency of HATree and HATree-Log.
Localizing discriminative object parts(e.g.,bird head)is crucial for fine-grained classification tasks,especially for the more challenging fine-grained few-shot *** work always relies on the learned object parts in a ...
详细信息
Localizing discriminative object parts(e.g.,bird head)is crucial for fine-grained classification tasks,especially for the more challenging fine-grained few-shot *** work always relies on the learned object parts in a unified manner,where they attend the same object parts(even with common attention weights)for different few-shot episodic *** this paper,we propose that it should adaptively capture the task-specific object parts that require attention for each few-shot task,since the parts that can distinguish different tasks are naturally *** for a few-shot task,after obtaining part-level deep features,we learn a task-specific part-based dictionary for both aligning and reweighting part features in an ***,part-level categorical prototypes are generated based on the part features of support data,which are later employed by calculating distances to classify query data for *** retain the discriminative ability of the part-level representations(i.e.,part features and part prototypes),we design an optimal transport solution that also utilizes query data in a transductive way to optimize the aforementioned distance calculation for the final *** experiments on five fine-grained benchmarks show the superiority of our method,especially for the 1-shot setting,gaining 0.12%,8.56%and 5.87%improvements over state-of-the-art methods on CUB,Stanford Dogs,and Stanford Cars,respectively.
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature...
详细信息
This paper considers the asynchronous control for discrete-time Markov jump systems (MJSs) using a multi-node round-robin protocol (MNRRP). Compared to the traditional round-robin protocol, MNRRP increases the number ...
详细信息
暂无评论