In the realm of artificial intelligence (AI), a notable challenge has surfaced: adversarial attacks, these attacks involve altering input data to mislead AI models. Developing defensive measures against adversarial at...
详细信息
In this paper,we address the problem of unsuperised social network embedding,which aims to embed network nodes,including node attributes,into a latent low dimensional *** recent methods,the fusion mechanism of node at...
详细信息
In this paper,we address the problem of unsuperised social network embedding,which aims to embed network nodes,including node attributes,into a latent low dimensional *** recent methods,the fusion mechanism of node attributes and network structure has been proposed for the problem and achieved impressive prediction ***,the non-linear property of node attributes and network structure is not efficiently fused in existing methods,which is potentially helpful in learning a better network *** this end,in this paper,we propose a novel model called ASM(Adaptive Specific Mapping)based on encoder-decoder *** encoder,we use the kernel mapping to capture the non-linear property of both node attributes and network *** particular,we adopt two feature mapping functions,namely an untrainable function for node attributes and a trainable function for network *** the mapping functions,we obtain the low dimensional feature vectors for node attributes and network structure,***,we design an attention layer to combine the learning of both feature vectors and adaptively learn the node *** encoder,we adopt the component of reconstruction for the training process of learning node attributes and network *** conducted a set of experiments on seven real-world social network *** experimental results verify the effectiveness and efficiency of our method in comparison with state-of-the-art baselines.
In the rapidly evolving beauty industry, consumers are often bombarded with an overwhelming array of skincare brands and products, making the quest for the perfect skincare regimen a daunting task. This saturation of ...
详细信息
Imposing data-driven with physical laws for user activity prediction could effectively solve various physical problems such as smart care, surveillance, and human-robot. In the growing field of artificial intelligence...
详细信息
Imposing data-driven with physical laws for user activity prediction could effectively solve various physical problems such as smart care, surveillance, and human-robot. In the growing field of artificial intelligence, the application of activity prediction based on the physical coupled hidden Markov model (CHMM) and tensor theory with physical properties has attracted increasing attentions. However, existing CHMMs usually only consider the time-series characteristic of data, while ignoring physical characteristics of user activity such as periodicity, timing, and correlation. Moreover, they are all matrix-based models, which could not holistically analyze the dependencies among physical states. The aforementioned disadvantages lead to lower prediction accuracy of the CHMM. To remove these disadvantages, three physics-informed tensor-based CHMMs are first constructed by incorporating prior physical knowledge. Then, the corresponding forward-backward algorithms are designed for resolving the evaluation problem of the CHMM. These algorithms could overall model multiple physical features by imposing physics and prior knowledge into the CHMM during training to improve the precision of probabilistic computing. The algorithms reduce the dependence of the model on training data by adding physical features. Finally, the comparative experiments show that our algorithms have better performances than existing prediction methods in precision and efficiency. In addition, further self-comparison experiments verify that our algorithms are effective and practical. Impact Statement-Through the analysis of users' behavior habits, consumption habits, preferences, etc., users? potential needs may be discovered. This discovery could help predict users' activities. If a waiter predicts the user's next activity. He gives her/him unexpected services to meet users' next needs. Obviously, it would significantly improve user satisfaction. In addition, connecting the front and rear products co
Handwriting is an important skill for children during their academic years. It is the coordination of perceptual-motor and cognitive abilities. Some children have difficulties in handwriting, which is an indication of...
详细信息
Traffic flow prediction plays a key role in the construction of intelligent transportation ***,due to its complex spatio-temporal dependence and its uncertainty,the research becomes very *** of the existing studies ar...
详细信息
Traffic flow prediction plays a key role in the construction of intelligent transportation ***,due to its complex spatio-temporal dependence and its uncertainty,the research becomes very *** of the existing studies are based on graph neural networks that model traffic flow graphs and try to use fixed graph structure to deal with the relationship between ***,due to the time-varying spatial correlation of the traffic network,there is no fixed node relationship,and these methods cannot effectively integrate the temporal and spatial *** paper proposes a novel temporal-spatial dynamic graph convolutional network(TSADGCN).The dynamic time warping algorithm(DTW)is introduced to calculate the similarity of traffic flow sequence among network nodes in the time dimension,and the spatiotemporal graph of traffic flow is constructed to capture the spatiotemporal characteristics and dependencies of traffic *** combining graph attention network and time attention network,a spatiotemporal convolution block is constructed to capture spatiotemporal characteristics of traffic *** on open data sets PEMSD4 and PEMSD8 show that TSADGCN has higher prediction accuracy than well-known traffic flow prediction algorithms.
In this paper we demonstrate how logic programming systems and Automated first-order logic Theorem Provers (ATPs) can improve the accuracy of Large Language Models (LLMs) for logical reasoning tasks where the baseline...
详细信息
Recent advances in text-to-speech, particularly those based on Graph Neural Networks (GNNs), have significantly improved the expressiveness of short-form synthetic speech. However, generating human-parity long-form sp...
详细信息
Color pencil drawing is well-loved due to its rich *** paper proposes an approach for generating feature-preserving color pencil drawings from *** mimic the tonal style of color pencil drawings,which are much lighter ...
详细信息
Color pencil drawing is well-loved due to its rich *** paper proposes an approach for generating feature-preserving color pencil drawings from *** mimic the tonal style of color pencil drawings,which are much lighter and have relatively lower saturation than photographs,we devise a lightness enhancement mapping and a saturation reduction *** lightness mapping is a monotonically decreasing derivative function,which not only increases lightness but also preserves input photograph *** saturation is usually related to lightness,so we suppress the saturation dependent on lightness to yield a harmonious ***,two extremum operators are provided to generate a foreground-aware outline map in which the colors of the generated contours and the foreground object are *** experiments show that color pencil drawings generated by our method surpass existing methods in tone capture and feature preservation.
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy conce...
详细信息
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy concerns within smart ***,existing methods struggle with efficiency and security when processing large-scale *** efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent *** paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data *** approach optimizes data preprocessing,integrates Long Short-Term Memory(LSTM)networks for handling time-series data,and employs homomorphic encryption to safeguard user *** also explores the application of Boneh Lynn Shacham(BLS)signatures for user *** proposed scheme’s efficiency,security,and privacy protection capabilities are validated through rigorous security proofs and experimental analysis.
暂无评论