Two-stage recommender systems play a crucial role in efficiently identifying relevant items and personalizing recommendations from a vast array of options. This paper, based on an error decomposition framework, analyz...
Diffusion models have achieved significant success in computer vision and shown immense potential in natural language processing applications, particularly for text generation tasks. However, generating high-quality t...
详细信息
Radio Frequency Identification (RFID) is a crucial technology in the Internet of Things (IoT), enabling seamless wireless communication and data exchange. However, these technologies can pose significant security chal...
详细信息
Amid the rise of mobile technologies and Location-Based Social Networks (LBSNs), there’s an escalating demand for personalized Point-of-Interest (POI) recommendations. Especially pivotal in smart cities, these system...
详细信息
Retrieval-augmented generation (RAG) expands the capabilities of large language models (LLMs) in various applications by integrating relevant information retrieved from external data sources. However, the RAG systems ...
This letter focuses on integrated CPU-GPU edge systems with renewable energy sources and studies the resource management problem to minimize the energy consumption of real-time tasks while ensuring temperature and rel...
详细信息
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features i...
详细信息
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features if applied to other models due to their good ***,adversarial examples often exhibit overfitting,as they are tailored to exploit the particular architecture and feature representation of source ***,when attempting black-box transfer attacks on different target models,their effectiveness is *** solve this problem,this study proposes an approach based on a Regularized Constrained Feature Layer(RCFL).The proposed method first uses regularization constraints to attenuate the initial examples of low-frequency *** are then added to a pre-specified layer of the source model using the back-propagation technique,in order to modify the original adversarial ***,a regularized loss function is used to enhance the black-box transferability between different target *** proposed method is finally tested on the ImageNet,CIFAR-100,and Stanford Car datasets with various target models,The obtained results demonstrate that it achieves a significantly higher transfer-based adversarial attack success rate compared with baseline techniques.
Weakly-supervised Temporal Action Localization (WTAL) following a localization-by-classification paradigm has achieved significant results, yet still grapples with confounding arising from ambiguous snippets. Previous...
详细信息
The Simultaneous Localization and Mapping (SLAM) technique is often employed in robotic localization tasks. For lidar-based SLAM, point cloud registration (PCR) is one of the crucial factors for overall localization p...
With the promotion of cloud medical diagnostic applications, the telemedicine system has become increasingly mature, which brings about much convenience to the people’s lives. Meanwhile, the diagnostic time was great...
详细信息
暂无评论