Multimodal sentiment analysis (MSA) seeks to understand human affection by leveraging signals from multiple modalities. A core challenge in MSA is the effective extraction of sentimental relations between these signal...
详细信息
With the prevalence of machine learning in malware defense,hackers have tried to attack machine learning models to evade *** is generally difficult to explore the details of malware detection models,hackers can adopt ...
详细信息
With the prevalence of machine learning in malware defense,hackers have tried to attack machine learning models to evade *** is generally difficult to explore the details of malware detection models,hackers can adopt fuzzing attack to manipulate the features of the malware closer to benign programs on the premise of retaining their *** this paper,attack and defense methods on malware detection models based on machine learning algorithms were ***,we designed a fuzzing attack method by randomly modifying features to evade *** fuzzing attack can effectively descend the accuracy of machine learning model with single *** an adversarial malware detection model MaliFuzz is proposed to defend fuzzing *** from the ordinary single feature detection model,the combined features by static and dynamic analysis to improve the defense ability are *** experiment results show that the adversarial malware detection model with combined features can deal with the *** methods designed in this paper have great significance in improving the security of malware detection models and have good application prospects.
To enhance the capability of classifying and localizing defects on the surface of hot-rolled strips, this paper proposed an algorithm based on YOLOv7 to improve defect detection. The BI-SPPFCSPC structure was incorpor...
详细信息
This paper first estimated the infectious capacity of COVID-19 based on the time series evolution data of confirmed cases in multiple countries. Then, a method to infer the cross-regional spread speed of COVID-19 was ...
详细信息
This paper first estimated the infectious capacity of COVID-19 based on the time series evolution data of confirmed cases in multiple countries. Then, a method to infer the cross-regional spread speed of COVID-19 was introduced in this paper, which took the gross domestic product(GDP) of each region as one of the factors that affect the spread speed of COVID-19 and studied the relationship between the GDP and the infection density of each region(China's Mainland, the United States, and EU countries). In addition, the geographic distance between regions was also considered in this method and the effect of geographic distance on the spread speed of COVID-19 was studied. Studies have shown that the probability of mutual infection of these two regions decreases with increasing geographic distance. Therefore, this paper proposed an epidemic disease spread index based on GDP and geographic distance to quantify the spread speed of COVID-19 in a region. The analysis results showed a strong correlation between the epidemic disease spread index in a region and the number of confirmed cases. This finding provides reasonable suggestions for the control of epidemics. Strengthening the control measures in regions with higher epidemic disease spread index can effectively control the spread of epidemics.
In the field of computer-aided drug discovery, identifying promising drug candidates from small molecule libraries requires meaningful molecular embeddings for downstream tasks, such as property prediction. However, o...
详细信息
As the core competitiveness of the national industry,large-scale equipment such as ships,high-speed rail and nuclear power equipment,their production process involves in-depth *** includes complex processes and long m...
详细信息
As the core competitiveness of the national industry,large-scale equipment such as ships,high-speed rail and nuclear power equipment,their production process involves in-depth *** includes complex processes and long manufacturing *** addition,the equipment’s supply chain management is extremely ***,the development of a supply chain management knowledge graph is of significant strategic *** not only enhances the synergistic effect of the supply chain management but also upgrades the level of intelligent *** paper proposes a distant supervision knowledge extraction and knowledge graph construction method in the supply chain management of large equipment manufacturing,which achieves digital and structured management and efficient use of supply chain management knowledge in the *** paper presents an approach to extract entity-relation knowledge using limited *** achieve this by establishing a distant supervision ***,we introduce a fusion gate mechanism and integrate ontology information,thereby enhancing the model’s capability to effectively discern sentence-level ***,we promptly modify the weights of input features using the gate mechanism to strengthen the model’s resilience and address the issue of vector noise ***,an inter-bag sentence attention mechanism is introduced to integrate different sentence bag information at the sentence bag level,which achieves more accurate entity-relation knowledge *** experimental results prove that compared with the latest distant supervision method,the accuracy of relation extraction is improved by 2.8%,and the AUC value is increased by 3.9%,effectively improving the quality of knowledge graph in supply chain management.
In recent years, deep neural networks (DNNs) have made significant progress on face recognition (FR). However, DNNs have been found to be vulnerable to adversarial examples, leading to fatal consequences in real-world...
详细信息
Point cloud completion aims to infer complete point clouds based on partial 3D point cloud *** previous methods apply coarseto-fine strategy networks for generating complete point ***,such methods are not only relativ...
详细信息
Point cloud completion aims to infer complete point clouds based on partial 3D point cloud *** previous methods apply coarseto-fine strategy networks for generating complete point ***,such methods are not only relatively time-consuming but also cannot provide representative complete shape features based on partial *** this paper,a novel feature alignment fast point cloud completion network(FACNet)is proposed to directly and efficiently generate the detailed shapes of *** aligns high-dimensional feature distributions of both partial and complete point clouds to maintain global information about the complete *** its decoding process,the local features from the partial point cloud are incorporated along with the maintained global information to ensure complete and time-saving generation of the complete point *** results show that FACNet outperforms the state-of-theart on PCN,Completion3D,and MVP datasets,and achieves competitive performance on ShapeNet-55 and KITTI ***,FACNet and a simplified version,FACNet-slight,achieve a significant speedup of 3–10 times over other state-of-the-art methods.
Databases play a vital role in data management in many fields,such as finance,government,telecommunications,energy,electricity,transportation,*** the database management system has become a core foundational *** is an...
详细信息
Databases play a vital role in data management in many fields,such as finance,government,telecommunications,energy,electricity,transportation,*** the database management system has become a core foundational *** is an enterprise-grade open-source database,a product of deep integration of research and development from Huawei,Tsinghua University,and China Mobile in the past decade.
The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation *** their trans...
详细信息
The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation *** their transformative impact in fields such as machine translation and intelligent dialogue systems,LLMs face significant *** challenges include safety,security,and privacy concerns that undermine their trustworthiness and effectiveness,such as hallucinations,backdoor attacks,and privacy *** works often conflated safety issues with security *** contrast,our study provides clearer and more reasonable definitions for safety,security,and privacy within the context of *** on these definitions,we provide a comprehensive overview of the vulnerabilities and defense mechanisms related to safety,security,and privacy in ***,we explore the unique research challenges posed by LLMs and suggest potential avenues for future research,aiming to enhance the robustness and reliability of LLMs in the face of emerging threats.
暂无评论