期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
Boosting Adversarial Training with Learnable Distribution
1
作者 Kai Chen Jinwei Wang +2 位作者 James Msughter Adeke Guangjie Liu Yuewei Dai 《Computers, Materials & Continua》 SCIE EI 2024年第3期3247-3265,共19页
In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural networks.Adversarial training is one of the most potent methods to defend against adversarial attacks.How... In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural networks.Adversarial training is one of the most potent methods to defend against adversarial attacks.However,the difference in the feature space between natural and adversarial examples hinders the accuracy and robustness of the model in adversarial training.This paper proposes a learnable distribution adversarial training method,aiming to construct the same distribution for training data utilizing the Gaussian mixture model.The distribution centroid is built to classify samples and constrain the distribution of the sample features.The natural and adversarial examples are pushed to the same distribution centroid to improve the accuracy and robustness of the model.The proposed method generates adversarial examples to close the distribution gap between the natural and adversarial examples through an attack algorithm explicitly designed for adversarial training.This algorithm gradually increases the accuracy and robustness of the model by scaling perturbation.Finally,the proposed method outputs the predicted labels and the distance between the sample and the distribution centroid.The distribution characteristics of the samples can be utilized to detect adversarial cases that can potentially evade the model defense.The effectiveness of the proposed method is demonstrated through comprehensive experiments. 展开更多
关键词 adversarial training feature space learnable distribution distribution centroid
下载PDF
A Study of Ensemble Feature Selection and Adversarial Training for Malicious User Detection
2
作者 Linjie Zhang Xiaoyan Zhu Jianfeng Ma 《China Communications》 SCIE CSCD 2023年第10期212-229,共18页
The continuously booming of information technology has shed light on developing a variety of communication networks,multimedia,social networks and Internet of Things applications.However,users inevitably suffer from t... The continuously booming of information technology has shed light on developing a variety of communication networks,multimedia,social networks and Internet of Things applications.However,users inevitably suffer from the intrusion of malicious users.Some studies focus on static characteristics of malicious users,which is easy to be bypassed by camouflaged malicious users.In this paper,we present a malicious user detection method based on ensemble feature selection and adversarial training.Firstly,the feature selection alleviates the dimension disaster problem and achieves more accurate classification performance.Secondly,we embed features into the multidimensional space and aggregate it into a feature map to encode the explicit content preference and implicit interaction preference.Thirdly,we use an effective ensemble learning which could avoid over-fitting and has good noise resistance.Finally,we propose a datadriven neural network detection model with the regularization technique adversarial training to deeply analyze the characteristics.It simplifies the parameters,obtaining more robust interaction features and pattern features.We demonstrate the effectiveness of our approach with numerical simulation results for malicious user detection,where the robustness issues are notable concerns. 展开更多
关键词 malicious user detection feature selection ensemble learning adversarial training
下载PDF
Instance Reweighting Adversarial Training Based on Confused Label
3
作者 Zhicong Qiu Xianmin Wang +3 位作者 Huawei Ma Songcao Hou Jing Li Zuoyong Li 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1243-1256,共14页
Reweighting adversarial examples during training plays an essential role in improving the robustness of neural networks,which lies in the fact that examples closer to the decision boundaries are much more vulnerable t... Reweighting adversarial examples during training plays an essential role in improving the robustness of neural networks,which lies in the fact that examples closer to the decision boundaries are much more vulnerable to being attacked and should be given larger weights.The probability margin(PM)method is a promising approach to continuously and path-independently mea-suring such closeness between the example and decision boundary.However,the performance of PM is limited due to the fact that PM fails to effectively distinguish the examples having only one misclassified category and the ones with multiple misclassified categories,where the latter is closer to multi-classification decision boundaries and is supported to be more critical in our observation.To tackle this problem,this paper proposed an improved PM criterion,called confused-label-based PM(CL-PM),to measure the closeness mentioned above and reweight adversarial examples during training.Specifi-cally,a confused label(CL)is defined as the label whose prediction probability is greater than that of the ground truth label given a specific adversarial example.Instead of considering the discrepancy between the probability of the true label and the probability of the most misclassified label as the PM method does,we evaluate the closeness by accumulating the probability differences of all the CLs and ground truth label.CL-PM shares a negative correlation with data vulnerability:data with larger/smaller CL-PM is safer/riskier and should have a smaller/larger weight.Experiments demonstrated that CL-PM is more reliable in indicating the closeness regarding multiple misclassified categories,and reweighting adversarial training based on CL-PM outperformed state-of-the-art counterparts. 展开更多
关键词 Reweighting adversarial training adversarial example boundary closeness confused label
下载PDF
Adversarial Training Against Adversarial Attacks for Machine Learning-Based Intrusion Detection Systems
4
作者 Muhammad Shahzad Haroon Husnain Mansoor Ali 《Computers, Materials & Continua》 SCIE EI 2022年第11期3513-3527,共15页
Intrusion detection system plays an important role in defending networks from security breaches.End-to-end machine learning-based intrusion detection systems are being used to achieve high detection accuracy.However,i... Intrusion detection system plays an important role in defending networks from security breaches.End-to-end machine learning-based intrusion detection systems are being used to achieve high detection accuracy.However,in case of adversarial attacks,that cause misclassification by introducing imperceptible perturbation on input samples,performance of machine learning-based intrusion detection systems is greatly affected.Though such problems have widely been discussed in image processing domain,very few studies have investigated network intrusion detection systems and proposed corresponding defence.In this paper,we attempt to fill this gap by using adversarial attacks on standard intrusion detection datasets and then using adversarial samples to train various machine learning algorithms(adversarial training)to test their defence performance.This is achieved by first creating adversarial sample based on Jacobian-based Saliency Map Attack(JSMA)and Fast Gradient Sign Attack(FGSM)using NSLKDD,UNSW-NB15 and CICIDS17 datasets.The study then trains and tests JSMA and FGSM based adversarial examples in seen(where model has been trained on adversarial samples)and unseen(where model is unaware of adversarial packets)attacks.The experiments includes multiple machine learning classifiers to evaluate their performance against adversarial attacks.The performance parameters include Accuracy,F1-Score and Area under the receiver operating characteristic curve(AUC)Score. 展开更多
关键词 Intrusion detection system adversarial attacks adversarial training adversarial machine learning
下载PDF
Improving the performance of SSVEP-BCI contaminated by physiological noise via adversarial training
5
作者 Dai Wang Aiping Liu +2 位作者 Bo Xue Le Wu Xun Chen 《Medicine in Novel Technology and Devices》 2023年第2期102-113,共12页
Brain-computer interface(BCI)based on Steady-State Visual Evoked Potentials(SSVEP)provides an effective method for human-computer communication.In practical application scenarios,SSVEP-BCI systems are easily interfere... Brain-computer interface(BCI)based on Steady-State Visual Evoked Potentials(SSVEP)provides an effective method for human-computer communication.In practical application scenarios,SSVEP-BCI systems are easily interfered by physiological noises such as electromyography(EMG)and electrooculography(EOG).The performance of traditional SSVEP recognition methods will degrade in such a noisy environment,which limits their real-world applications.To alleviate the interference of noise,existing works either require additional reference electrodes or are designed for removing background noise such as trend terms rather than physiological noises.In this study,we utilize adversarial training(AT)and neural networks(NNs)to construct a robust recognition method for SSVEP contaminated by physiological noise.During model training,we generate adversarial noises which are most harmful to the current model according to gradients and enforce the model to overcome them.In this way,we strengthen the robustness of the model to potential noises,such as physiological noises.In this study,we recorded a real-world speaking SSVEP dataset and simulated various noisy datasets to conducted comparison experiments on two benchmark models named EEGNet and DeepConvNet.The experimental results demonstrated that AT strategies can help the neural networks get better performance on SSVEP data contaminated by EMG and EOG.We also verified that introducing AT can slightly improve the performance of models under a cross-subject scenario.Our method can be integrated into existing deep learning methods efficiently and will contribute to the real-world applications of SSVEP. 展开更多
关键词 Steady-state visual evoked potentials Neural networks adversarial training ELECTROENCEPHALOGRAPHY Physiological artifacts
下载PDF
LDAS&ET-AD:Learnable Distillation Attack Strategies and Evolvable Teachers Adversarial Distillation
6
作者 Shuyi Li Hongchao Hu +3 位作者 XiaohanYang Guozhen Cheng Wenyan Liu Wei Guo 《Computers, Materials & Continua》 SCIE EI 2024年第5期2331-2359,共29页
Adversarial distillation(AD)has emerged as a potential solution to tackle the challenging optimization problem of loss with hard labels in adversarial training.However,fixed sample-agnostic and student-egocentric atta... Adversarial distillation(AD)has emerged as a potential solution to tackle the challenging optimization problem of loss with hard labels in adversarial training.However,fixed sample-agnostic and student-egocentric attack strategies are unsuitable for distillation.Additionally,the reliability of guidance from static teachers diminishes as target models become more robust.This paper proposes an AD method called Learnable Distillation Attack Strategies and Evolvable Teachers Adversarial Distillation(LDAS&ET-AD).Firstly,a learnable distillation attack strategies generating mechanism is developed to automatically generate sample-dependent attack strategies tailored for distillation.A strategy model is introduced to produce attack strategies that enable adversarial examples(AEs)to be created in areas where the target model significantly diverges from the teachers by competing with the target model in minimizing or maximizing the AD loss.Secondly,a teacher evolution strategy is introduced to enhance the reliability and effectiveness of knowledge in improving the generalization performance of the target model.By calculating the experimentally updated target model’s validation performance on both clean samples and AEs,the impact of distillation from each training sample and AE on the target model’s generalization and robustness abilities is assessed to serve as feedback to fine-tune standard and robust teachers accordingly.Experiments evaluate the performance of LDAS&ET-AD against different adversarial attacks on the CIFAR-10 and CIFAR-100 datasets.The experimental results demonstrate that the proposed method achieves a robust precision of 45.39%and 42.63%against AutoAttack(AA)on the CIFAR-10 dataset for ResNet-18 and MobileNet-V2,respectively,marking an improvement of 2.31%and 3.49%over the baseline method.In comparison to state-of-the-art adversarial defense techniques,our method surpasses Introspective Adversarial Distillation,the top-performing method in terms of robustness under AA attack for the CIFAR-10 dataset,with enhancements of 1.40%and 1.43%for ResNet-18 and MobileNet-V2,respectively.These findings demonstrate the effectiveness of our proposed method in enhancing the robustness of deep learning networks(DNNs)against prevalent adversarial attacks when compared to other competing methods.In conclusion,LDAS&ET-AD provides reliable and informative soft labels to one of the most promising defense methods,AT,alleviating the limitations of untrusted teachers and unsuitable AEs in existing AD techniques.We hope this paper promotes the development of DNNs in real-world trust-sensitive fields and helps ensure a more secure and dependable future for artificial intelligence systems. 展开更多
关键词 adversarial training adversarial distillation learnable distillation attack strategies teacher evolution strategy
下载PDF
Adversarial Training for Supervised Relation Extraction 被引量:2
7
作者 Yanhua Yu Kanghao He Jie Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2022年第3期610-618,共9页
Most supervised methods for relation extraction(RE) involve time-consuming human annotation. Distant supervision for RE is an efficient method to obtain large corpora that contains thousands of instances and various r... Most supervised methods for relation extraction(RE) involve time-consuming human annotation. Distant supervision for RE is an efficient method to obtain large corpora that contains thousands of instances and various relations. However, the existing approaches rely heavily on knowledge bases(e.g., Freebase), thereby introducing data noise. Various relations and noisy labeling instances make the issue difficult to solve. In this study, we propose a model based on a piecewise convolution neural network with adversarial training. Inspired by generative adversarial networks, we adopt a heuristic algorithm to identify noisy datasets and apply adversarial training to RE. Experiments on the extended dataset of SemEval-2010 Task 8 show that our model can obtain more accurate training data for RE and significantly outperforms several competitive baseline models. Our model has an F1 score of 89.61%. 展开更多
关键词 relation extraction piecewise convolution neural network adversarial training generative adversarial network
原文传递
Remaining Useful Life Prediction With Partial Sensor Malfunctions Using Deep Adversarial Networks 被引量:2
8
作者 Xiang Li Yixiao Xu +2 位作者 Naipeng Li Bin Yang Yaguo Lei 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第1期121-134,共14页
In recent years,intelligent data-driven prognostic methods have been successfully developed,and good machinery health assessment performance has been achieved through explorations of data from multiple sensors.However... In recent years,intelligent data-driven prognostic methods have been successfully developed,and good machinery health assessment performance has been achieved through explorations of data from multiple sensors.However,existing datafusion prognostic approaches generally rely on the data availability of all sensors,and are vulnerable to potential sensor malfunctions,which are likely to occur in real industries especially for machines in harsh operating environments.In this paper,a deep learning-based remaining useful life(RUL)prediction method is proposed to address the sensor malfunction problem.A global feature extraction scheme is adopted to fully exploit information of different sensors.Adversarial learning is further introduced to extract generalized sensor-invariant features.Through explorations of both global and shared features,promising and robust RUL prediction performance can be achieved by the proposed method in the testing scenarios with sensor malfunctions.The experimental results suggest the proposed approach is well suited for real industrial applications. 展开更多
关键词 adversarial training data fusion deep learning remaining useful life(RUL)prediction sensor malfunction
下载PDF
Domain adversarial training for classification of cracking in images of concrete surfaces
9
作者 Bruno Oliveira Santos Jónatas Valença +1 位作者 João P.Costeira Eduardo Julio 《AI in Civil Engineering》 2022年第1期119-132,共14页
The development of automatic methods to recognize cracks in surfaces of concrete has been under focus in recent years,firstly through computer vision methods and more recently focusing on convolutional neural networks... The development of automatic methods to recognize cracks in surfaces of concrete has been under focus in recent years,firstly through computer vision methods and more recently focusing on convolutional neural networks that are delivering promising results.Challenges are still persisting in crack recognition,namely due to the confusion added by the myriad of elements commonly found on concrete surfaces.The robustness of these methods would deal with these elements if access to correspondingly heterogeneous datasets was possible.Even so,this would be a cumbersome methodology,since training would be needed for each particular case and models would be case dependent.Thus,efforts from the scientific community are focusing on generalizing neural network models to achieve high per-formance in images from different domains,slightly different from those in which they were effectively trained.The generalization of networks can be achieved by domain adaptation techniques at the training stage.Domain adapta-tion enables finding a feature space in which features from both domains are invariant,and thus,classes become separable.The work presented here proposes the DA-Crack method,which is a domain adversarial training method,to generalize a neural network for recognizing cracks in images of concrete surfaces.The domain adversarial method uses a convolutional extractor followed by a classifier and a discriminator,and relies on two datasets:a source labeled dataset and a target unlabeled small dataset.The classifier is responsible for the classification of images randomly chosen,while the discriminator is dedicated to uncovering to which dataset each image belongs.Backpropagation from the discriminator reverses the gradient used to update the extractor.This enables fighting the convergence promoted by the updating backpropagated from the classifier,and thus generalizing the extractor enabling it for crack recognition of images from both source and target datasets.Results show that the DA-Crack training method improved accuracy in crack classification of images from the target dataset in 54 percentage points,while accuracy on the source dataset remains unaffected. 展开更多
关键词 DA-Crack method Domain-adaptation adversarial training network Crack detection Concrete surfaces Computer vision
原文传递
Unsupervised Anomaly Detection Approach Based on Adversarial Memory Autoencoders for Multivariate Time Series
10
作者 Tianzi Zhao Liang Jin +3 位作者 Xiaofeng Zhou Shuai Li Shurui Liu Jiang Zhu 《Computers, Materials & Continua》 SCIE EI 2023年第7期329-346,共18页
The widespread usage of Cyber Physical Systems(CPSs)generates a vast volume of time series data,and precisely determining anomalies in the data is critical for practical production.Autoencoder is the mainstream method... The widespread usage of Cyber Physical Systems(CPSs)generates a vast volume of time series data,and precisely determining anomalies in the data is critical for practical production.Autoencoder is the mainstream method for time series anomaly detection,and the anomaly is judged by reconstruction error.However,due to the strong generalization ability of neural networks,some abnormal samples close to normal samples may be judged as normal,which fails to detect the abnormality.In addition,the dataset rarely provides sufficient anomaly labels.This research proposes an unsupervised anomaly detection approach based on adversarial memory autoencoders for multivariate time series to solve the above problem.Firstly,an encoder encodes the input data into low-dimensional space to acquire a feature vector.Then,a memory module is used to learn the feature vector’s prototype patterns and update the feature vectors.The updating process allows partial forgetting of information to prevent model overgeneralization.After that,two decoders reconstruct the input data.Finally,this research uses the Peak Over Threshold(POT)method to calculate the threshold to determine anomalous samples from normal samples.This research uses a two-stage adversarial training strategy during model training to enlarge the gap between the reconstruction error of normal and abnormal samples.The proposed method achieves significant anomaly detection results on synthetic and real datasets from power systems,water treatment plants,and computer clusters.The F1 score reached an average of 0.9196 on the five datasets,which is 0.0769 higher than the best baseline method. 展开更多
关键词 Anomaly detection autoencoder memory module adversarial training
下载PDF
Black Box Adversarial Defense Based on Image Denoising and Pix2Pix
11
作者 Zhenyong Rui Xiugang Gong 《Journal of Computer and Communications》 2023年第12期14-30,共17页
Deep Neural Networks (DNN) are widely utilized due to their outstanding performance, but the susceptibility to adversarial attacks poses significant security risks, making adversarial defense research crucial in the f... Deep Neural Networks (DNN) are widely utilized due to their outstanding performance, but the susceptibility to adversarial attacks poses significant security risks, making adversarial defense research crucial in the field of AI security. Currently, robustness defense techniques for models often rely on adversarial training, a method that tends to only defend against specific types of attacks and lacks strong generalization. In response to this challenge, this paper proposes a black-box defense method based on Image Denoising and Pix2Pix (IDP) technology. This method does not require prior knowledge of the specific attack type and eliminates the need for cumbersome adversarial training. When making predictions on unknown samples, the IDP method first undergoes denoising processing, followed by inputting the processed image into a trained Pix2Pix model for image transformation. Finally, the image generated by Pix2Pix is input into the classification model for prediction. This versatile defense approach demonstrates excellent defensive performance against common attack methods such as FGSM, I-FGSM, DeepFool, and UPSET, showcasing high flexibility and transferability. In summary, the IDP method introduces new perspectives and possibilities for adversarial sample defense, alleviating the limitations of traditional adversarial training methods and enhancing the overall robustness of models. 展开更多
关键词 Deep Neural Networks (DNN) adversarial attack adversarial training Fourier Transform Robust Defense
下载PDF
GACNet: A Generative Adversarial Capsule Network for Regional Epitaxial Traffic Flow Prediction 被引量:1
12
作者 Jinyuan Li Hao Li +3 位作者 Guorong Cui Yan Kang Yang Hu Yingnan Zhou 《Computers, Materials & Continua》 SCIE EI 2020年第8期925-940,共16页
With continuous urbanization,cities are undergoing a sharp expansion within the regional space.Due to the high cost,the prediction of regional traffic flow is more difficult to extend to entire urban areas.To address ... With continuous urbanization,cities are undergoing a sharp expansion within the regional space.Due to the high cost,the prediction of regional traffic flow is more difficult to extend to entire urban areas.To address this challenging problem,we present a new deep learning architecture for regional epitaxial traffic flow prediction called GACNet,which predicts traffic flow of surrounding areas based on inflow and outflow information in central area.The method is data-driven,and the spatial relationship of traffic flow is characterized by dynamically transforming traffic information into images through a two-dimensional matrix.We introduce adversarial training to improve performance of prediction and enhance the robustness.The generator mainly consists of two parts:abstract traffic feature extraction in the central region and traffic prediction in the extended region.In particular,the feature extraction part captures nonlinear spatial dependence using gated convolution,and replaces the maximum pooling operation with dynamic routing,finally aggregates multidimensional information in capsule form.The effectiveness of the method is evaluated using traffic flow datasets for two real traffic networks:Beijing and New York.Experiments on highly challenging datasets show that our method performs well for this task. 展开更多
关键词 Regional traffic flow adversarial training feature extraction nonlinear spatial dependence dynamic routing
下载PDF
Towards sustainable adversarial training with successive perturbation generation
13
作者 Wei LIN Lichuan LIAO 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI 2024年第4期527-539,共13页
Adversarial training with online-generated adversarial examples has achieved promising performance in defending adversarial attacks and improving robustness of convolutional neural network models.However,most existing... Adversarial training with online-generated adversarial examples has achieved promising performance in defending adversarial attacks and improving robustness of convolutional neural network models.However,most existing adversarial training methods are dedicated to finding strong adversarial examples for forcing the model to learn the adversarial data distribution,which inevitably imposes a large computational overhead and results in a decrease in the generalization performance on clean data.In this paper,we show that progressively enhancing the adversarial strength of adversarial examples across training epochs can effectively improve the model robustness,and appropriate model shifting can preserve the generalization performance of models in conjunction with negligible computational cost.To this end,we propose a successive perturbation generation scheme for adversarial training(SPGAT),which progressively strengthens the adversarial examples by adding the perturbations on adversarial examples transferred from the previous epoch and shifts models across the epochs to improve the efficiency of adversarial training.The proposed SPGAT is both efficient and effective;e.g.,the computation time of our method is 900 min as against the 4100 min duration observed in the case of standard adversarial training,and the performance boost is more than 7%and 3%in terms of adversarial accuracy and clean accuracy,respectively.We extensively evaluate the SPGAT on various datasets,including small-scale MNIST,middle-scale CIFAR-10,and large-scale CIFAR-100.The experimental results show that our method is more efficient while performing favorably against state-of-the-art methods. 展开更多
关键词 adversarial training adversarial attack Stochastic weight average Machine learning Model generalization
原文传递
Identity-Preserving Adversarial Training for Robust Network Embedding
14
作者 岑科廷 沈华伟 +2 位作者 曹婧 徐冰冰 程学旗 《Journal of Computer Science & Technology》 SCIE EI 2024年第1期177-191,共15页
Network embedding,as an approach to learning low-dimensional representations of nodes,has been proved extremely useful in many applications,e.g.,node classification and link prediction.Unfortunately,existing network e... Network embedding,as an approach to learning low-dimensional representations of nodes,has been proved extremely useful in many applications,e.g.,node classification and link prediction.Unfortunately,existing network embed-ding models are vulnerable to random or adversarial perturbations,which may degrade the performance of network em-bedding when being applied to downstream tasks.To achieve robust network embedding,researchers introduce adversari-al training to regularize the embedding learning process by training on a mixture of adversarial examples and original ex-amples.However,existing methods generate adversarial examples heuristically,failing to guarantee the imperceptibility of generated adversarial examples,and thus limit the power of adversarial training.In this paper,we propose a novel method Identity-Preserving Adversarial Training(IPAT)for network embedding,which generates imperceptible adversarial exam-ples with explicit identity-preserving regularization.We formalize such identity-preserving regularization as a multi-class classification problem where each node represents a class,and we encourage each adversarial example to be discriminated as the class of its original node.Extensive experimental results on real-world datasets demonstrate that our proposed IPAT method significantly improves the robustness of network embedding models and the generalization of the learned node representations on various downstream tasks. 展开更多
关键词 network embedding identity-preserving adversarial training adversarial the example
原文传递
Adversarial Neural Collaborative Filtering with Embedding Dimension Correlations
15
作者 Yi Gao Jianxia Chen +5 位作者 Liang Xiao Hongyang Wang Liwei Pan Xuan Wen Zhiwei Ye Xinyun Wu 《Data Intelligence》 EI 2023年第3期786-806,共21页
Recently,convolutional neural networks(CNNs)have achieved excellent performance for the recommendation system by extracting deep features and building collaborative filtering models.However,CNNs have been verified sus... Recently,convolutional neural networks(CNNs)have achieved excellent performance for the recommendation system by extracting deep features and building collaborative filtering models.However,CNNs have been verified susceptible to adversarial examples.This is because adversarial samples are subtle non-random disturbances,which indicates that machine learning models produce incorrect outputs.Therefore,we propose a novel model of Adversarial Neural Collaborative Filtering with Embedding Dimension Correlations,named ANCF in short,to address the adversarial problem of CNN-based recommendation system.In particular,the proposed ANCF model adopts the matrix factorization to train the adversarial personalized ranking in the prediction layer.This is because matrix factorization supposes that the linear interaction of the latent factors,which are captured between the user and the item,can describe the observable feedback,thus the proposed ANCF model can learn more complicated representation of their latent factors to improve the performance of recommendation.In addition,the ANCF model utilizes the outer product instead of the inner product or concatenation to learn explicitly pairwise embedding dimensional correlations and obtain the interaction map from which CNNs can utilize its strengths to learn high-order correlations.As a result,the proposed ANCF model can improve the robustness performance by the adversarial personalized ranking,and obtain more information by encoding correlations between different embedding layers.Experimental results carried out on three public datasets demonstrate that the ANCF model outperforms other existing recommendation models. 展开更多
关键词 Neural Collaborative Filtering Matrix Factorization Convolutional Neural Networks adversarial training Recommendation systems
原文传递
Understanding Discrepancy of Power System Dynamic Security Assessment with Unknown Faults: A Reliable Transfer Learning-based Method
16
作者 Chao Ren Han Yu +1 位作者 Yan Xu Zhao Yang Dong 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2024年第1期427-431,共5页
This letter proposes a reliable transfer learning(RTL)method for pre-fault dynamic security assessment(DSA)in power systems to improve DSA performance in the presence of potentially related unknown faults.It takes ind... This letter proposes a reliable transfer learning(RTL)method for pre-fault dynamic security assessment(DSA)in power systems to improve DSA performance in the presence of potentially related unknown faults.It takes individual discrepancies into consideration and can handle unknown faults with incomplete data.Extensive experiment results demonstrate high DSA accuracy and computational efficiency of the proposed RTL method.Theoretical analysis shows RTL can guarantee system performance. 展开更多
关键词 adversarial training dynamic security assessment maximum classifier discrepancy missing data transfer learning
原文传递
Generating high-resolution climatological precipitation data using SinGAN
17
作者 Yang Wang Hassan A.Karimi 《Big Earth Data》 EI CSCD 2023年第1期81-100,共20页
High-resolution(HR)climate data are indispensable for studying regional climate trends,disaster prediction,and urban development planning in the face of climate change.However,state-of-the-art long-term global climate... High-resolution(HR)climate data are indispensable for studying regional climate trends,disaster prediction,and urban development planning in the face of climate change.However,state-of-the-art long-term global climate simulations do not provide appropriate HR climate data.Deep learning models are often used to obtain high-resolution climate data.However,due to the fact that these models require sufficient low-resolution(LR)and HR data pairs for the training process,they cannot be applied to scenario with inadequate training data.In this paper,we explore the applicability of a single image generative adversarial network(SinGAN)in generating HR climate data.SinGAN relies on single LR input data to obtain the corresponding HR data.To improve the performance for extreme-value regions,we propose a SinGAN combined with the weighted patchGAN discriminator(WSinGAN).The proposed WSinGAN outperforms comparable models in generating HR precipitation data,and its results are close to real HR data with sharp gradients and more refined small-scale features.We also test the scalability of the pre-trained WSinGAN for unseen samples and show that although only a single LR sample is used to train WSinGAN,it can still produce reliable HR data for unseen data. 展开更多
关键词 Climate downscaling SinGAN deep learning adversarial training
原文传递
GPDCCL: Cross-Domain Named Entity Recognition with Span-Based Domain Confusion Contrastive Learning
18
作者 Ye Wang Chenxiao Shi +1 位作者 Lijie Li Manyuan Guo 《国际计算机前沿大会会议论文集》 EI 2023年第2期202-212,共11页
The goal of cross-domain named entity recognition is to transfer mod-els learned from labelled source domain data to unlabelled or lightly labelled target domain datasets.This paper discusses how to adapt a cross-doma... The goal of cross-domain named entity recognition is to transfer mod-els learned from labelled source domain data to unlabelled or lightly labelled target domain datasets.This paper discusses how to adapt a cross-domain sen-timent analysis model to thefield of named entity recognition,as the sentiment analysis model is more relevant to the tasks and data characteristics of named entity recognition.Most previous classification methods were based on a token-wise approach,and this paper introduces entity boundary information to prevent the model from being affected by a large number of nonentity labels.Specifically,adversarial training is used to enable the model to learn domain-confusing knowl-edge,and contrastive learning is used to reduce domain shift problems.The entity boundary information is transformed into a global boundary matrix representing sentence-level target labels,enabling the model to learn explicit span boundary information.Experimental results demonstrate that this method achieves good per-formance compared to multiple cross-domain named entity recognition models on the SciTech dataset.Ablation experiments reveal that the method of introducing entity boundary information significantly improves KL divergence and contrastive learning. 展开更多
关键词 Transfer Learning Named Entity Recognition Domain Adaptation Contrastive Learning adversarial training
原文传递
Semi-Supervised Noisy Label Learning for Chinese Clinical Named Entity Recognition 被引量:2
19
作者 Zhucong Li Zhen Gan +5 位作者 Baoli Zhang Yubo Chen Jing Wan Kang Liu Jun Zhao Shengping Liu 《Data Intelligence》 2021年第3期389-401,共13页
This paper describes our approach for the Chinese clinical named entity recognition(CNER) task organized by the 2020 China Conference on Knowledge Graph and Semantic Computing(CCKS) competition. In this task, we need ... This paper describes our approach for the Chinese clinical named entity recognition(CNER) task organized by the 2020 China Conference on Knowledge Graph and Semantic Computing(CCKS) competition. In this task, we need to identify the entity boundary and category labels of six entities from Chinese electronic medical record(EMR). We constructed a hybrid system composed of a semi-supervised noisy label learning model based on adversarial training and a rule post-processing module. The core idea of the hybrid system is to reduce the impact of data noise by optimizing the model results. Besides, we used post-processing rules to correct three cases of redundant labeling, missing labeling, and wrong labeling in the model prediction results. Our method proposed in this paper achieved strict criteria of 0.9156 and relax criteria of 0.9660 on the final test set, ranking first. 展开更多
关键词 Named entity recognition Electronic medical record Noisy label learning SEMI-SUPERVISED adversarial training
原文传递
Evaluation of model generalization for growing plants using conditional learning
20
作者 Hafiz Sami Ullah Abdul Bais 《Artificial Intelligence in Agriculture》 2022年第1期189-198,共10页
This paper aims to solve the lack of generalization of existing semantic segmentation models in the crop and weed segmentation domain.We compare two training mechanisms,classical and adversarial,to understand which sc... This paper aims to solve the lack of generalization of existing semantic segmentation models in the crop and weed segmentation domain.We compare two training mechanisms,classical and adversarial,to understand which scheme works best for a particular encoder-decoder model.We use simple U-Net,SegNet,and DeepLabv3+with ResNet-50 backbone as segmentation networks.The models are trained with cross-entropy loss for classical and PatchGAN loss for adversarial training.By adopting the Conditional Generative Adversarial Network(CGAN)hierarchical settings,we penalize different Generators(G)using PatchGAN Discriminator(D)and L1 loss to generate segmentation output.The generalization is to exhibit fewer failures and perform comparably for growing plants with different data distributions.We utilize the images from four different stages of sugar beet.We divide the data so that the full-grown stage is used for training,whereas earlier stages are entirely dedicated to testing the model.We conclude that U-Net trained in adversarial settings is more robust to changes in the dataset.The adversarially trained U-Net reports 10%overall improvement in the results with mIOU scores of 0.34,0.55,0.75,and 0.85 for four different growth stages. 展开更多
关键词 Weed detection Semantic segmentation adversarial training Late germination Sugar beet Crop segmentation Growing plants Domain change
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部