The memory-intensive embedding layer in recommendation model continues to be the performance bottleneck. While prior works have attempted to improve the embedding layer performance by exploiting the data locality to c...
详细信息
Binary code analysis serves as the foundation for research in vulnerability discovery, software protection, and malicious code analysis. However, analyzing binary files is challenging due to the lack of high-level sem...
详细信息
Two-dimensional (2D) material photodetector based on semi-floating gate (SFG) structure is expected to achieve multiple functions of information sensing, storage, and processing in a single device. Here, we demonstrat...
详细信息
The need for assistive devices such as lower limb exoskeletons is steadily growing, making quick and precise gait recognition essential for optimal operation of these apparatuses. The knowledge distillation method was...
详细信息
作者:
Mahmoodi, MohammadrezaPishbin, EsmailDepartment of Civil
Architectural and Environmental Engineering The University of Texas at Austin 2515 Speedway AustinTX78712 United States Bio-Microfluidics Lab
Department of Electrical Engineering and Information Technology Iranian Research Organization for Science and Technology Tehran Iran
Water pollution, driven by a variety of enduring contaminants, poses considerable threats to ecosystems, human health, and biodiversity, highlighting the urgent need for innovative and sustainable treatment approaches...
详细信息
Reinforcement learning(RL) has roots in dynamic programming and it is called adaptive/approximate dynamic programming(ADP) within the control community. This paper reviews recent developments in ADP along with RL and ...
详细信息
Reinforcement learning(RL) has roots in dynamic programming and it is called adaptive/approximate dynamic programming(ADP) within the control community. This paper reviews recent developments in ADP along with RL and its applications to various advanced control fields. First, the background of the development of ADP is described, emphasizing the significance of regulation and tracking control problems. Some effective offline and online algorithms for ADP/adaptive critic control are displayed, where the main results towards discrete-time systems and continuous-time systems are surveyed, ***, the research progress on adaptive critic control based on the event-triggered framework and under uncertain environment is discussed, respectively, where event-based design, robust stabilization, and game design are reviewed. Moreover, the extensions of ADP for addressing control problems under complex environment attract enormous attention. The ADP architecture is revisited under the perspective of data-driven and RL frameworks,showing how they promote ADP formulation ***, several typical control applications with respect to RL and ADP are summarized, particularly in the fields of wastewater treatment processes and power systems, followed by some general prospects for future research. Overall, the comprehensive survey on ADP and RL for advanced control applications has d emonstrated its remarkable potential within the artificial intelligence era. In addition, it also plays a vital role in promoting environmental protection and industrial intelligence.
Bacterial strains in the same genus share highly similar morphology, gram-staining characteristics, colony sizes, and spatial arrangements. Therefore, identifying them by deep learning can be quite challenging. This s...
详细信息
Federated Learning (FL) has emerged as a promising approach for preserving data privacy in recommendation systems by training models locally. Recently, Graph Neural Networks (GNN) have gained popularity in recommendat...
详细信息
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
详细信息
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerprint samples are generated to query models to detect such tampering. In this paper, we present Intersecting-Boundary-Sensitive Fingerprinting (IBSF), a novel method for black-box integrity verification of DNN models using only top-1 labels. Recognizing that tampering with a model alters its decision boundary, IBSF crafts fingerprint samples from normal samples by maximizing the partial Shannon entropy of a selected subset of categories to position the fingerprint samples near decision boundaries where the categories in the subset intersect. These fingerprint samples are almost indistinguishable from their source samples. We theoretically establish and confirm experimentally that these fingerprint samples' expected sensitivity to tampering increases with the cardinality of the subset. Extensive evaluation demonstrates that IBSF surpasses existing state-of-the-art fingerprinting methods, particularly with larger subset cardinality, establishing its state-of-the-art performance in black-box tampering detection using only top-1 labels. The IBSF code is available at: https://***/CGCL-codes/IBSF. Copyright 2024 by the author(s)
In order to achieve accurate segmentation of gait phases for precise real-time control of lower limb exoskeleton robots, the periodic statistical analysis of human motion posture by using the inertial measurement unit...
详细信息
暂无评论