As an important task in emotion analysis, Multimodal Emotion-Cause Pair Extraction in conversations (MECPE) aims to extract all the emotion-cause utterance pairs from a conversation. However, there are two shortcoming...
详细信息
As an important task in emotion analysis, Multimodal Emotion-Cause Pair Extraction in conversations (MECPE) aims to extract all the emotion-cause utterance pairs from a conversation. However, there are two shortcomings in the MECPE task: 1) it ignores emotion utterances whose causes cannot be located in the conversation but require contextualized inference;2) it fails to locate the exact causes that occur in vision or audio modalities beyond text. To address these issues, in this paper, we introduce a new task named Multimodal Emotion-Cause Pair Generation in Conversations (MECPG), which aims to identify the emotion utterances with their emotion categories and generate their corresponding causes in a conversation. To tackle the MECPG task, we construct a dataset based on a benchmark corpus for MECPE. We further propose a generative framework named MONICA, which jointly performs emotion recognition and emotion cause generation with a sequence-to-sequence model. Experiments on our annotated dataset show the superiority of MONICA over several competitive systems. Our dataset and source codes will be publicly released. IEEE
There is a growing interest in sustainable ecosystem development, which includes methods such as scientific modeling, environmental assessment, and development forecasting and planning. However, due to insufficient su...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
The Internet of Things (IoT) has developed into a crucial component for meeting the connection needs of the current smart healthcare systems. The Internet of Medical Things (IoMT) consists of medical devices that are ...
详细信息
Construction and demolition (C&D) waste management is challenging in urban areas due to the high volume of waste generated and widespread illegal dumping. City authorities are struggling with environmental, econom...
详细信息
The potential of AI-based disease prediction models for assessing COVID-19 patients outperforms conventional methods. However, their black-box nature has limited their applicability. This study explores the approach f...
详细信息
Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work ***-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security *** aim to investigate backdoo...
详细信息
Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work ***-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security *** aim to investigate backdoor attack methods for image categorization tasks,to promote the development of DNN towards higher *** on backdoor attacks currently faces significant challenges due to the distinct and abnormal data patterns of malicious samples,and the meticulous data screening by developers,hindering practical attack *** overcome these challenges,this study proposes a Gaussian Noise-Targeted Universal Adversarial Perturbation(GN-TUAP)*** approach restricts the direction of perturbations and normalizes abnormal pixel values,ensuring that perturbations progress as much as possible in a direction perpendicular to the decision hyperplane in linear *** limits anomalies within the perturbations improves their visual stealthiness,and makes them more challenging for defense methods to *** verify the effectiveness,stealthiness,and robustness of GN-TUAP,we proposed a comprehensive threat *** on this model,extensive experiments were conducted using the CIFAR-10,CIFAR-100,GTSRB,and MNIST datasets,comparing our method with existing state-of-the-art attack *** also tested our perturbation triggers using various defense methods and further experimented on the robustness of the triggers against noise filtering *** experimental outcomes demonstrate that backdoor attacks leveraging perturbations generated via our algorithm exhibit cross-model attack effectiveness and superior ***,they possess robust anti-detection capabilities and maintain commendable performance when subjected to noise-filtering methods.
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c...
详细信息
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication channels, semi-trusted RoadSide Unit (RSU), and collusion between vehicles and the RSU may lead to leakage of model parameters. Moreover, when aggregating data, since different vehicles usually have different computing resources, vehicles with relatively insufficient computing resources will affect the data aggregation efficiency. Therefore, in order to solve the privacy leakage problem and improve the data aggregation efficiency, this paper proposes a privacy-preserving data aggregation protocol for IoV with FL. Firstly, the protocol is designed based on methods such as shamir secret sharing scheme, pallier homomorphic encryption scheme and blinding factor protection, which can guarantee the privacy of model parameters. Secondly, the protocol improves the data aggregation efficiency by setting dynamic training time windows. Thirdly, the protocol reduces the frequent participations of Trusted Authority (TA) by optimizing the fault-tolerance mechanism. Finally, the security analysis proves that the proposed protocol is secure, and the performance analysis results also show that the proposed protocol has high computation and communication efficiency. IEEE
Current automatic segment extraction techniques for identifying target characters in videos have several limitations, including low accuracy, slow processing speeds, and poor adaptability to diverse scenes. This paper...
详细信息
Code review is a critical process in software development, contributing to the overall quality of the product by identifying errors early. A key aspect of this process is the selection of appropriate reviewers to scru...
详细信息
Code review is a critical process in software development, contributing to the overall quality of the product by identifying errors early. A key aspect of this process is the selection of appropriate reviewers to scrutinize changes made to source code. However, in large-scale open-source projects, selecting the most suitable reviewers for a specific change can be a challenging task. To address this, we introduce the Code Context Based Reviewer Recommendation (CCB-RR), a model that leverages information from changesets to recommend the most suitable reviewers. The model takes into consideration the paths of modified files and the context derived from the changesets, including their titles and descriptions. Additionally, CCB-RR employs KeyBERT to extract the most relevant keywords and compare the semantic similarity across changesets. The model integrates the paths of modified files, keyword information, and the context of code changes to form a comprehensive picture of the changeset. We conducted extensive experiments on four open-source projects, demonstrating the effectiveness of CCB-RR. The model achieved a Top-1 accuracy of 60%, 55%, 51%, and 45% on the Android, OpenStack, QT, and LibreOffice projects respectively. For Mean Reciprocal Rank (MRR), CCB achieved 71%, 62%, 52%, and 68% on the same projects respectively, thereby highlighting its potential for practical application in code reviewer recommendation.
暂无评论