The knowledge graph(KG) that represents structural relations among entities has become an increasingly important research field for knowledge-driven artificial intelligence. In this survey, a comprehensive review of K...
详细信息
The knowledge graph(KG) that represents structural relations among entities has become an increasingly important research field for knowledge-driven artificial intelligence. In this survey, a comprehensive review of KG and KG reasoning is provided. It introduces an overview of KGs, including representation, storage, and essential technologies. Specifically, it summarizes several types of knowledge reasoning approaches, including logic rules-based, representation-based, and neural network-based methods. Moreover, this paper analyzes the representation methods of knowledge hypergraphs. To effectively model hyper-relational data and improve the performance of knowledge reasoning, a three-layer knowledge hypergraph model is proposed. Finally, it analyzes the advantages of three-layer knowledge hypergraphs through reasoning and update algorithms which could facilitate future research.
In recent years, security incidents of website occur increasingly frequently, and this motivates us to study websites’ security. Although there are many phishing detection approaches to detect phishing websites, the ...
详细信息
In non-cooperative communication systems,wireless interference classification(WIC)is one of the most essential ***,deep learning(DL)based WIC methods have been ***,conventional DL-based WIC methods have high computati...
详细信息
In non-cooperative communication systems,wireless interference classification(WIC)is one of the most essential ***,deep learning(DL)based WIC methods have been ***,conventional DL-based WIC methods have high computational complexity and unsatisfactory accuracy,especially when the interference-tonoise ratio(INR)is *** this end,we propose three effective ***,we introduce multibranch convolutional neural networks(CNNs)for interference *** multi-branch CNN is constructed by repeating a layer that aggregates several transformations with the same topology,and it notably improves the recognition ability for *** design avoids the carefully crafted selection of each ***,multi-branch CNNs are computationally expensive and *** this end,we further propose Low complexity multibranch networks(LCMN),which are mathematically equivalent to multi-branch CNNs but maintain low computing costs and efficient ***,we present novel loss function,which encourages networks to have consistent prediction probabilities for samples with high visual similarities,resulting in increasing recognition accuracy of *** results demonstrate the proposed methods consistently boost the classification performance of WIC without substantially increasing computational overhead compared to traditional DL-based methods.
Time series anomaly detection is crucial in various industrial applications to identify unusual behaviors within the time series *** to the challenges associated with annotating anomaly events,time series reconstructi...
详细信息
Time series anomaly detection is crucial in various industrial applications to identify unusual behaviors within the time series *** to the challenges associated with annotating anomaly events,time series reconstruction has become a prevalent approach for unsupervised anomaly ***,effectively learning representations and achieving accurate detection results remain challenging due to the intricate temporal patterns and dependencies in real-world time *** this paper,we propose a cross-dimension attentive feature fusion network for time series anomaly detection,referred to as ***,a series and feature mixing block is introduced to learn representations in 1D ***,a fast Fourier transform is employed to convert the time series into 2D space,providing the capability for 2D feature ***,a cross-dimension attentive feature fusion mechanism is designed that adaptively integrates features across different dimensions for anomaly *** results on real-world time series datasets demonstrate that CAFFN performs better than other competing methods in time series anomaly detection.
Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare ***,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not...
详细信息
Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare ***,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well *** instance,since the trust domain of the cloud server is not identical to the data owner or data user,the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource,to pursue maximum economic interest or other malicious ***,the PHRs data storing or sharing via the cloud server should be performed with consistency and integrity ***,the emergence of blockchain technology provides new ideas and prospects for ensuring the consistency and integrity of shared PHRs *** this end,in this work,we leverage the consortiumblockchain technology to enhance the trustworthiness of each participant and propose a blockchain-based patient-centric data sharing scheme for PHRs in cloud computing(BC-PC-Share).Different from the state-of-art schemes,our proposal can achieve the following desired properties:(1)Realizing patient-centric PHRs sharing with a public verification function,i.e.,which can ensure that the returned shared data is consistent with the requested shared data and the integrity of the shared data is not compromised.(2)Supporting scalable and fine-grained access control and sharing of PHRs data with multiple domain users,such as hospitals,medical research institutes,and medical insurance companies.(3)Achieving efficient user decryption by leveraging the transformation key technique and efficient user revocation by introducing time-controlled *** security analysis and simulation experiment demonstrate that the proposed BC-PC-Share scheme is a feasible and promising solution for PHRs data sharing via consortium b
Deep learning-based image semantic segmentation approaches heavily rely on large-scale training datasets with dense annotations and often suffer from scarce semantic labels for unseen categories. This limitation has s...
详细信息
Bundle recommendation offers users more holistic insights by recommending multiple compatible items at ***,the intricate correlations between items,varied user preferences,and the pronounced data sparsity in combinati...
详细信息
Bundle recommendation offers users more holistic insights by recommending multiple compatible items at ***,the intricate correlations between items,varied user preferences,and the pronounced data sparsity in combinations present significant challenges for bundle recommendation ***,current bundle recommendation methods fail to identify mismatched items within a given set,a process termed as‘‘outlier item detection’’.These outlier items are those with the weakest correlations within a *** them can aid users in refining their item *** the correlation among items can predict the detection of such outliers,the adaptability of combinations might not be adequately responsive to shifts in individual items during the learning *** limitation can hinder the algorithm’s *** tackle these challenges,we introduce an encoder–decoder architecture tailored for outlier item *** encoder learns potential item correlations through a self-attention ***,the decoder garners efficient inference frameworks by directly assessing item *** have validated the efficacy and efficiency of our proposed algorithm using real-world datasets.
In this paper,a feature selection method for determining input parameters in antenna modeling is *** antenna modeling,the input feature of artificial neural network(ANN)is geometric *** selection criteria contain corr...
详细信息
In this paper,a feature selection method for determining input parameters in antenna modeling is *** antenna modeling,the input feature of artificial neural network(ANN)is geometric *** selection criteria contain correlation and sensitivity between the geometric parameter and the electromagnetic(EM)*** information coefficient(MIC),an exploratory data mining tool,is introduced to evaluate both linear and nonlinear *** EM response range is utilized to evaluate the *** wide response range corresponding to varying values of a parameter implies the parameter is highly sensitive and the narrow response range suggests the parameter is *** the parameter which is highly correlative and sensitive is selected as the input of ANN,and the sampling space of the model is highly *** modeling of a wideband and circularly polarized antenna is studied as an example to verify the effectiveness of the proposed *** number of input parameters decreases from8 to *** testing errors of|S_(11)|and axis ratio are reduced by8.74%and 8.95%,respectively,compared with the ANN with no feature selection.
As a promising cathode material for aqueous zinc-ion batteries,1T-MoS_(2)has been extensively investigated because of its facile two-dimensional ion-diffusion channels and high electrical ***,the limited number of ava...
详细信息
As a promising cathode material for aqueous zinc-ion batteries,1T-MoS_(2)has been extensively investigated because of its facile two-dimensional ion-diffusion channels and high electrical ***,the limited number of available Zn storage sites,i.e.,limited capacity,hinders its application because the inserted Zn^(2+),which form strong electrostatic interactions with 1T-MoS_(2),preventing subsequent Zn^(2+)***,the approach of enlarging the interlayer distance to reduce electrostatic interactions has been commonly used to enhance the capacity and reduce Zn^(2+)migration ***,an enlarged interlayer spacing can weaken the van der Waals force between 1T-MoS_(2)monolayers,easily disrupting the structural ***,to address this issue,an effective strategy based on Fe doping is proposed for 1T-MoS_(2)(Fe-1T-MoS_(2)).The theoretical calculations reveal that Fe doping can simultaneously moderate the rate of decrease in the adsorption energy after gradually increasing the number of stored atoms,and enhance the electron delocalization on metal-O ***,the experiment results show that Fe doping can simultaneously activate more Zn storage sites,thus enhancing the capacity,and stabilize the structural stability for improved cycling ***,Fe-1T-MoS_(2)exhibits a larger capacity(189 mAh·g^(-1)at 0.1 A·g^(-1))and superior cycling stability(78%capacity retention after 400 cycles at 2 A·g^(-1))than pure 1T-MoS_(2).This work may open up a new avenue for constructing high-performance MoS_(2)-based cathodes.
As a mature distributed machine learning paradigm,federated learning enables wireless edge devices to collaboratively train a shared AI-model by stochastic gradient descent(SGD).However,devices need to upload high-dim...
详细信息
As a mature distributed machine learning paradigm,federated learning enables wireless edge devices to collaboratively train a shared AI-model by stochastic gradient descent(SGD).However,devices need to upload high-dimensional stochastic gradients to edge server in training,which cause severe communication *** address this problem,we compress the communication by sparsifying and quantizing the stochastic gradients of edge *** first derive a closed form of the communication compression in terms of sparsification and quantization ***,the convergence rate of this communicationcompressed system is analyzed and several insights are ***,we formulate and deal with the quantization resource allocation problem for the goal of minimizing the convergence upper bound,under the constraint of multiple-access channel *** show that the proposed scheme outperforms the benchmarks.
暂无评论