|
|
|
Doyeob Yeo, Min-Suk Kim and Ji-Hoon Bae
A deep-learning technology for knowledge transfer is necessary to advance and optimize efficient knowledge distillation. Here, we aim to develop a new adversarial optimization-based knowledge transfer method involved with a layer-wise dense flow that is ...
ver más
|
|
|
|
|
|
|
Zahid Masood, Muhammad Usama, Shahroz Khan, Konstantinos Kostas and Panagiotis D. Kaklis
Generative models offer design diversity but tend to be computationally expensive, while non-generative models are computationally cost-effective but produce less diverse and often invalid designs. However, the limitations of non-generative models can be...
ver más
|
|
|
|
|
|
|
Amani Alqarni and Hamoud Aljamaan
Software defect prediction is an active research area. Researchers have proposed many approaches to overcome the imbalanced defect problem and build highly effective machine learning models that are not biased towards the majority class. Generative adver...
ver más
|
|
|
|
|
|
|
Yun Sha, Zhaoyu Chen, Xuejun Liu, Yong Yan, Chenchen Du, Jiayi Liu and Ranran Han
The scarcity of attack samples is the bottleneck problem of anomaly detection of underlying business data in the industrial control system. Predecessors have done a lot of research on temporal data generation, but most of them are not suitable for indust...
ver más
|
|
|
|
|
|
|
Dejian Guan, Wentao Zhao and Xiao Liu
Recent studies show that deep neural networks (DNNs)-based object recognition algorithms overly rely on object textures rather than global object shapes, and DNNs are also vulnerable to human-less perceptible adversarial perturbations. Based on these two...
ver más
|
|
|
|
|
|
|
Zheng-Lian Su, Xun-Lin Jiang, Ning Li, Hai-Feng Ling and Yu-Jun Zheng
Unmanned aerial vehicles (UAVs) have been widely used for target detection in modern battlefields. From the viewpoint of the opponents, false target jamming is an effective approach to decrease the UAV detection ability or probability, but currently ther...
ver más
|
|
|
|
|
|
|
Vitor Nazário Coelho, Rodolfo Pereira Araújo, Haroldo Gambini Santos, Wang Yong Qiang and Igor Machado Coelho
Mixed-integer mathematical programming has been widely used to model and solve challenging optimization problems. One interesting feature of this technique is the ability to prove the optimality of the achieved solution, for many practical scenarios wher...
ver más
|
|
|
|
|
|
|
Zuwei Tan, Runze Li and Yufei Zhang
The inlet is one of the most important components of a hypersonic vehicle. The design and optimization of the hypersonic inlet is of great significance to the research and development of hypersonic vehicles. In recent years, artificial intelligence techn...
ver más
|
|
|
|
|
|
|
Weimin Zhao, Sanaa Alwidian and Qusay H. Mahmoud
Deep neural networks are exposed to the risk of adversarial attacks via the fast gradient sign method (FGSM), projected gradient descent (PGD) attacks, and other attack algorithms. Adversarial training is one of the methods used to defend against the thr...
ver más
|
|
|
|
|
|
|
Chunhe Hu, Yu Xia and Junguo Zhang
Path planning of unmanned aerial vehicles (UAVs) in threatening and adversarial areas is a constrained nonlinear optimal problem which takes a great amount of static and dynamic constraints into account. Quantum-behaved pigeon-inspired optimization (QPIO...
ver más
|
|
|
|
|
|
|
Chunhe Hu, Yu Xia and Junguo Zhang
Path planning of unmanned aerial vehicles (UAVs) in threatening and adversarial areas is a constrained nonlinear optimal problem which takes a great amount of static and dynamic constraints into account. Quantum-behaved pigeon-inspired optimization (QPIO...
ver más
|
|
|
|
|
|
|
Raz Lapid, Zvika Haramaty and Moshe Sipper
Deep neural networks (DNNs) are sensitive to adversarial data in a variety of scenarios, including the black-box scenario, where the attacker is only allowed to query the trained model and receive an output. Existing black-box methods for creating advers...
ver más
|
|
|
|
|
|
|
Dapeng Lang, Deyun Chen, Jinjie Huang and Sizhao Li
Small perturbations can make deep models fail. Since deep models are widely used in face recognition systems (FRS) such as surveillance and access control, adversarial examples may introduce more subtle threats to face recognition systems. In this paper,...
ver más
|
|
|
|
|
|
|
Shucong Liu, Hongjun Wang and Xiang Zhang
In gas turbine rotor systems, an intelligent data-driven fault diagnosis method is an important means to monitor the health status of the gas turbine, and it is necessary to obtain sufficient fault data to train the intelligent diagnosis model. In the ac...
ver más
|
|
|
|
|
|
|
Yule Chen, Hong Liang and Shuo Pang
Underwater target classification methods based on deep learning suffer from obvious model overfitting and low recognition accuracy in the case of small samples and complex underwater environments. This paper proposes a novel classification network (Effic...
ver más
|
|
|
|
|
|
|
Huayu Li,Dmitry Namiot
Pág. 9 - 16
This article provides a detailed survey of the so-called adversarial attacks and defenses. These are special modifications to the input data of machine learning systems that are designed to cause machine learning systems to work incor...
ver más
|
|
|
|
|
|
|
Manuel Domínguez-Rodrigo, Ander Fernández-Jaúregui, Gabriel Cifuentes-Alcobendas and Enrique Baquedano
Deep learning models are based on a combination of neural network architectures, optimization parameters and activation functions. All of them provide exponential combinations whose computational fitness is difficult to pinpoint. The intricate resemblanc...
ver más
|
|
|
|
|
|
|
Jeiyoon Park, Chanhee Lee, Chanjun Park, Kuekyeng Kim and Heuiseok Lim
Despite its significant effectiveness in adversarial training approaches to multidomain task-oriented dialogue systems, adversarial inverse reinforcement learning of the dialogue policy frequently fails to balance the performance of the reward estimator ...
ver más
|
|
|
|
|
|
|
Meng Bi, Xianyun Yu, Zhida Jin and Jian Xu
In this paper, we propose an Iterative Greedy-Universal Adversarial Perturbations (IGUAP) approach based on an iterative greedy algorithm to create universal adversarial perturbations for acoustic prints. A thorough, objective account of the IG-UAP metho...
ver más
|
|
|
|
|
|
|
Danilo Pau, Andrea Pisani and Antonio Candelieri
In the context of TinyML, many research efforts have been devoted to designing forward topologies to support On-Device Learning. Reaching this target would bring numerous advantages, including reductions in latency and computational complexity, stronger ...
ver más
|
|
|
|