Quantum machine learning has been developing in recent years, demonstrating great potential in various research domains and promising applications for pattern recognition. However, due to the constraints of quantum ha...
详细信息
Software testing is an effective means of ensuring software quality. The cost of software testing is the main component of the total cost of software development. The generation of test data is very important in testi...
详细信息
Convolutional neural networks are widely used in computer vision and image processing. However, when the original input is added with manually imperceptible perturbations, these deep network models mostly tend to outp...
详细信息
Attackers can exploit vulnerabilities in web applications to commit malicious acts such as corrupting application functionality and Trojan horse implantation. For injection vulnerabilities in Web applications, existin...
详细信息
With increasing number of software vulnerabilities, the quantity of attacks utilizing malicious samples is also on rise, leading to intensified adversarial competition. In particular, the application of automatic vuln...
详细信息
As a benchmark for the overall performance of quantum computers, quantum volume has the advantage of being able to reflect the depth of running quantum circuits. But, the quantum volume test code provided by IBM needs...
详细信息
The mining and exploitation of security vulnerabilities have always been the focus of offensive and defensive confrontations. In recent years, with the application of technologies such as fuzzing in vulnerability mini...
详细信息
The management of Internet of Things (IoT) devices is becoming increasingly complex. One of the reasons is that IoT device manufacturers are different, and there are different degrees of heterogeneity in service, tech...
详细信息
Graph few-shot learning aims to predict well by training with very few labeled data. Meta learning has been the most popular solution for few-shot learning problem. However, transductive linear probing shows that fine...
详细信息
ISBN:
(数字)9798350355925
ISBN:
(纸本)9798350355932
Graph few-shot learning aims to predict well by training with very few labeled data. Meta learning has been the most popular solution for few-shot learning problem. However, transductive linear probing shows that fine-tuning a simple linear classification head after a pretrained graph neural networks can outperforms most of the sophisticated-designed graph meta learning algorithms. Therefore, in the paper, we propose a meta transductive linear probing methods named Meta-TLP to incorporate the advantages of graph self-supervised and graph meta learning model. Specifically, the graph neural network is firstly pretrained with graph contrastive learning methods. Then we design an unsupervised meta training task construction methods to require meta tasks without relying on labeled data. Finally, we meta training the linear classification head on the meta training tasks to learn to fast adopt to novel classes. Experiment results show that our model can perform better than TLP on three real world datasets.
Current white-box attack to deep neural networks have achieved considerable success, but not for black-box attack. The main reason is poor transferability, as the adversarial examples are crafted with single deep neur...
详细信息
暂无评论