As the most critical components in a sentence, subject, predicate and object require special attention in the video captioning task. To implement this idea, we design a novel framework, named COllaborative three-Strea...
详细信息
X-armed bandits have achieved the state-of-the-art performance in optimizing unknown stochastic continuous functions, which can model many machine learning tasks, specially in big data-driven personalized recommendati...
详细信息
X-armed bandits have achieved the state-of-the-art performance in optimizing unknown stochastic continuous functions, which can model many machine learning tasks, specially in big data-driven personalized recommendation. However, bandit algorithms are vulnerable to adversarial attacks. Existing works mainly focus on attacking multi-armed bandits in discrete setting; nevertheless, the attacks against X-armed bandits in continuous setting have not been well explored. In this paper, we aim to bridge this gap and investigate the robustness problem for the X-armed bandits. Specifically, we consider data poisoning attack and propose an attack algorithm named Confidence Poisoning Attack algorithm, which could hijack the clean tree-based X-armed bandits algorithm, i.e., high confidence tree (HCT) and make it choose the nodes including the arm targeted by the attacker very frequently with a sub-linear attack cost, i.e., O(T α )(0
In recent years, blockchain-based data trading platforms have gained great popularity in many fields because blockchain is decentralized, transparent, antitamper, and traceable. However, data trading for medical image...
详细信息
ISBN:
(数字)9798350349184
ISBN:
(纸本)9798350349191
In recent years, blockchain-based data trading platforms have gained great popularity in many fields because blockchain is decentralized, transparent, antitamper, and traceable. However, data trading for medical images still has problems such as privacy protection and copyright protection, so we propose a blockchain-based data trading scheme for medical images with copyright and privacy protection. Our scheme utilizes smart contracts in the blockchain to achieve automation and intelligence of data trading. We also combine digital watermarking and image encryption to further solve copyright, secure transmission, and privacy issues during medical image transactions. We conduct relevant experiments and verify the feasibility of our proposed scheme.
Detection of epileptic seizures on the basis of Electroencephalogram(EEG)recordings is a challenging task due to the complex,non-stationary and non-linear nature of these biomedical *** the existing literature,a numbe...
详细信息
Detection of epileptic seizures on the basis of Electroencephalogram(EEG)recordings is a challenging task due to the complex,non-stationary and non-linear nature of these biomedical *** the existing literature,a number of automatic epileptic seizure detection methods have been proposed that extract useful features from EEG segments and classify them using machine learning *** characterizing features of epileptic and non-epileptic EEG signals overlap;therefore,it requires that analysis of signals must be performed from diverse *** studies analyzed these signals in diverse domains to identify distinguishing characteristics of epileptic EEG *** pose the challenge mentioned above,in this paper,a fuzzy-based epileptic seizure detection model is proposed that incorporates a novel feature extraction and selection method along with fuzzy *** proposed work extracts pattern features along with time-domain,frequencydomain,and non-linear analysis of *** applies a feature selection strategy on extracted features to get more discriminating features that build fuzzy machine learning classifiers for the detection of epileptic *** empirical evaluation of the proposed model was conducted on the benchmark Bonn EEG *** shows significant accuracy of 98%to 100%for normal *** classification cases while for three class classification of normal ***-ictal *** accuracy reaches to above 97.5%.The obtained results for ten classification cases(including normal,seizure or ictal,and seizure-free or inter-ictal classes)prove the superior performance of proposed work as compared to other state-of-the-art counterparts.
Aiming at the problem of low efficiency and timeconsuming of the traditional college attendance sign-in method, an attendance system based on face recognition, wireless network verification, fingerprint and voice veri...
详细信息
Aiming at the problem of low efficiency and timeconsuming of the traditional college attendance sign-in method, an attendance system based on face recognition, wireless network verification, fingerprint and voice verification was proposed and designed. This design splits the attendance system into four functions: wireless network list acquisition verification, face recognition, voice verification, fingerprint acquisition, and signin record *** on this, a database for storing data and a graphical interface are designed to achieve The function of the time and attendance system.
Nuclear reactor computing software need to process and maintain complex and massive data sets. In order to meet the requirement of mass data storage and processing in software, the data storage model and I/O method an...
详细信息
Weibo is gradually replacing traditional media, becoming the main way for netizens and youth groups to obtain and exchange information. Weibo public opinion will have a great impact on society. This system is mainly b...
详细信息
Weibo is gradually replacing traditional media, becoming the main way for netizens and youth groups to obtain and exchange information. Weibo public opinion will have a great impact on society. This system is mainly based on the topic of public opinion mining and sentiment analysis, constructing a topic and sentiment knowledge graph on Weibo public opinion to provide a basis for guiding the direction of Weibo public opinion.
Formal concept analysis (FCA) is well suited to explain the meaning of clusters. However, most of the existing FCA-based concept clustering algorithms cannot handle fuzzy linguistic information. In this work, we propo...
详细信息
Knowledge Graphs (KGs) have been incorporated into recommender systems as side information to solve the clas-sical data-sparsity and cold-start problems, with explanations for recommended items. Traditional embedding-...
详细信息
Knowledge Graphs (KGs) have been incorporated into recommender systems as side information to solve the clas-sical data-sparsity and cold-start problems, with explanations for recommended items. Traditional embedding-based recommender systems generally utilize abundant information from KGs directly to enrich the representation of items or users, but the influences of spatial and temporal dependencies are usually ignored among them. In this paper, we propose a Spatio-Temporal Aware Knowledge Graph Embedding (STAKGE) for recommender systems, which incorporates spatio-temporal information with bias when propagating potential preferences of users in knowl-edge graph embedding. Moreover, we construct a multi-source KG-based recommender dataset - YelpST, containing spatio-temporal information. The experiments on YelpST dataset show that our proposed approach can capture comprehensive spatio-temporal correlations and improve the prediction performance as compared to various state-of-the-art baselines.
With the rapid development of quantum theory and technology in recent years,especially the emergence of some quantum cloud computing platforms,more and more researchers are not satisfied with the theoretical derivatio...
详细信息
With the rapid development of quantum theory and technology in recent years,especially the emergence of some quantum cloud computing platforms,more and more researchers are not satisfied with the theoretical derivation and simulation verification of quantum computation(especially quantum algorithms),experimental verification on real quantum devices has become a new *** this paper,three representative quantum algorithms,namely Deutsch-Jozsa,Grover,and Shor algorithms,are briefly depicted,and then their implementation circuits are presented,*** program these circuits on python with QISKit to connect the remote real quantum devices(i.e.,ibmqx4,ibmqx5)on IBM Q to verify these *** experimental results not only show the feasibility of these algorithms,but also serve to evaluate the functionality of these devices.
暂无评论