Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025
Distributed Ishikawa algorithms for seeking the fixed points of multi-agent global operators over time-varying communication graphs
Journal of Computational and Applied Mathematics (JCAM), Volume 457, Issue Chttps://doi.org/10.1016/j.cam.2024.116250AbstractIn this article, the problem of seeking fixed points for global operators over the time-varying graphs in a real Hilbert space is studied. The global operator is a linear combination of local operators, each local operator being accessed ...
- research-articleJanuary 2025
Component connectivity of wheel networks
Applied Mathematics and Computation (APMC), Volume 487, Issue Chttps://doi.org/10.1016/j.amc.2024.129096AbstractThe r-component connectivity c κ r ( G ) of a noncomplete graph G is the size of a minimum set of vertices, whose deletion disconnects G such that the remaining graph has at least r components. When r = 2, c κ r ( G ) is reduced to the classic ...
Highlights- We study the r-component connectivity of the wheel network CWm.
- We prove that the 3-component connectivity of the wheel network is 4 m − 7.
- We prove that the 4-component connectivity of the wheel network is 6 m − 13.
- We prove ...
- research-articleDecember 2024
Future-proofing class-incremental learning: Future-proofing class-incremental learning
Machine Vision and Applications (MVAA), Volume 36, Issue 1https://doi.org/10.1007/s00138-024-01635-yAbstractExemplar-free class incremental learning is a highly challenging setting where replay memory is unavailable. Methods relying on frozen feature extractors have drawn attention recently in this setting due to their impressive performances and lower ...
- research-articleNovember 2024
Edit Temporal-Consistent Videos with Image Diffusion Model
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 20, Issue 12Article No.: 368, Pages 1–16https://doi.org/10.1145/3691344Large-scale text-to-image (T2I) diffusion models have been extended for text-guided video editing, yielding impressive zero-shot video editing performance. Nonetheless, the generated videos usually show spatial irregularities and temporal inconsistencies ...
- research-articleNovember 2024
SQLStateGuard: Statement-Level SQL Injection Defense Based on Learning-Driven Middleware
SoCC '24: Proceedings of the 2024 ACM Symposium on Cloud ComputingPages 69–82https://doi.org/10.1145/3698038.3698569SQL injection is a significant and persistent threat to web services. Most existing protections against SQL injections rely on traffic-level anomaly detection, which often results in high false-positive rates and can be easily bypassed by attackers. This ...
-
- ArticleNovember 2024
Constrained Reasoning Chains for Enhancing Theory-of-Mind in Large Language Models
PRICAI 2024: Trends in Artificial IntelligencePages 354–360https://doi.org/10.1007/978-981-96-0119-6_34AbstractTheory-of-Mind (ToM) possessed by Large Language Models (LLMs) has been shown to be limited. Most existing methods for improving ToM in LLMs adopt zero-shot prompting, and they have poor performance in complex ToM reasoning tasks. We propose a ...
- ArticleNovember 2024
Document-Level Relation Extraction Model Based on Boundary Distance Loss and Long-Tail Relation Enhancement
PRICAI 2024: Trends in Artificial IntelligencePages 263–274https://doi.org/10.1007/978-981-96-0119-6_26AbstractIn today’s data-driven era, deriving meaningful insights from documents poses a considerable challenge. The task of Document-level Relation Extraction (DocRE) seeks to discern relationships among multiple entities within documents, mirroring real-...
- research-articleNovember 2024
Behaviour-diverse automatic penetration testing: a coverage-based deep reinforcement learning approach
Frontiers of Computer Science: Selected Publications from Chinese Universities (FCS), Volume 19, Issue 3https://doi.org/10.1007/s11704-024-3380-1AbstractReinforcement Learning (RL) is gaining importance in automating penetration testing as it reduces human effort and increases reliability. Nonetheless, given the rapidly expanding scale of modern network infrastructure, the limited testing scale ...
- research-articleNovember 2024
Fire-Flyer AI-HPC: A Cost-Effective Software-Hardware Co-Design for Deep Learning
- Wei An,
- Xiao Bi,
- Guanting Chen,
- Shanhuang Chen,
- Chengqi Deng,
- Honghui Ding,
- Kai Dong,
- Qiushi Du,
- Wenjun Gao,
- Kang Guan,
- Jianzhong Guo,
- Yongqiang Guo,
- Zhe Fu,
- Ying He,
- Panpan Huang,
- Jiashi Li,
- Wenfeng Liang,
- Xiaodong Liu,
- Xin Liu,
- Yiyuan Liu,
- Yuxuan Liu,
- Shanghao Lu,
- Xuan Lu,
- Xiaotao Nie,
- Tian Pei,
- Junjie Qiu,
- Hui Qu,
- Zehui Ren,
- Zhangli Sha,
- Xuecheng Su,
- Xiaowen Sun,
- Yixuan Tan,
- Minghui Tang,
- Shiyu Wang,
- Yaohui Wang,
- Yongji Wang,
- Ziwei Xie,
- Yiliang Xiong,
- Yanhong Xu,
- Shengfeng Ye,
- Shuiping Yu,
- Yukun Zha,
- Liyue Zhang,
- Haowei Zhang,
- Mingchuan Zhang,
- Wentao Zhang,
- Yichao Zhang,
- Chenggang Zhao,
- Yao Zhao,
- Shangyan Zhou,
- Shunfeng Zhou,
- Yuheng Zou
SC '24: Proceedings of the International Conference for High Performance Computing, Networking, Storage, and AnalysisArticle No.: 83, Pages 1–23https://doi.org/10.1109/SC41406.2024.00089The rapid progress in Deep Learning (DL) and Large Language Models (LLMs) has exponentially increased demands of computational power and bandwidth. This, combined with the high costs of faster computing chips and interconnects, has significantly inflated ...
- research-articleNovember 2024
From Recognition to Prediction: Leveraging Sequence Reasoning for Action Anticipation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 20, Issue 11Article No.: 361, Pages 1–19https://doi.org/10.1145/3687474The action anticipation task refers to predicting what action will happen based on observed videos, which requires the model to have a strong ability to summarize the present and then reason about the future. Experience and common sense suggest that there ...
- research-articleNovember 2024
S3PaR: Section-based Sequential Scientific Paper Recommendation for paper writing assistance
Knowledge-Based Systems (KNBS), Volume 303, Issue Chttps://doi.org/10.1016/j.knosys.2024.112437AbstractA scientific paper recommender system (RS) is very helpful for literature searching in that it (1) helps novice researchers explore their own field and (2) helps experienced researchers explore new fields outside their area of expertise. However, ...
- research-articleNovember 2024
CasCIFF: A cross-domain information fusion framework tailored for cascade prediction in social networks
Knowledge-Based Systems (KNBS), Volume 303, Issue Chttps://doi.org/10.1016/j.knosys.2024.112391AbstractThe explosive growth of the Internet has elevated social networks to a pivotal role in information propagation, reshaping conventional paradigms of information distribution. Utilizing the vast amount of data available online to model and predict ...
- research-articleNovember 2024
A 7DOF redundant manipulator inverse kinematic solution algorithm based on bald eagle search optimization algorithm
- Guojun Zhao,
- Ying Sun,
- Du Jiang,
- Xin Liu,
- Bo Tao,
- Guozhang Jiang,
- Jianyi Kong,
- Juntong Yun,
- Ying Liu,
- Gongfa Li
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 28, Issue 23Pages 13681–13699https://doi.org/10.1007/s00500-024-10197-0AbstractSolving inverse kinematics (IK) is an excellent challenge for redundant manipulators due to their highly non-linear and complex coupling, which is not amenable to analytical solutions by conventional methods. In this paper, the conventional ...
- research-articleJanuary 2025
Channel randomisation: Self-supervised representation learning for reliable visual anomaly detection in speciality crops
Computers and Electronics in Agriculture (COEA), Volume 226, Issue Chttps://doi.org/10.1016/j.compag.2024.109416AbstractModern, automated quality control systems for speciality crops utilise computer vision together with a machine learning paradigm exploiting large datasets for learning efficient crop assessment components. To model anomalous visuals, data ...
Highlights
- Channel Randomisation augments images for self-supervised representation learning.
- Classifying augmented images leads to neural representations of colour irregularities.
- Learnt representations better detect unhealthy crops than ...
- research-articleJanuary 2025
Integrated optimization of vessel dispatching and empty container repositioning considering turnover time uncertainty
Computers and Industrial Engineering (CINE), Volume 197, Issue Chttps://doi.org/10.1016/j.cie.2024.110566AbstractThe global trade disproportion results in the accumulation of containers in import-dominated ports and shortages in export-dominated ports, causing congestion and high freight costs, thus hindering maritime shipping economy development. To ...
Highlights- Developed a stochastic programming model for the integrated scheduling problem.
- Employed the p-median method to improve computational efficiency.
- Introduced the Benders decomposition algorithm with acceleration techniques.
- The ...
- research-articleOctober 2024
FacialPulse: An Efficient RNN-based Depression Detection via Temporal Facial Landmarks
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 311–320https://doi.org/10.1145/3664647.3681546Depression is a prevalent mental health disorder that significantly impacts individuals' lives and well-being. Early detection and intervention are crucial for effective treatment and management of depression. Recently, there are many end-to-end deep ...
- research-articleOctober 2024
What's the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 6900–6909https://doi.org/10.1145/3664647.3681100Voice is one of the most widely used media for information transmission in human society. While high-quality synthetic voices are extensively utilized in various applications, they pose significant risks to content security and trust building. Numerous ...
- research-articleOctober 2024
Towards Open-vocabulary HOI Detection with Calibrated Vision-language Models and Locality-aware Queries
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 1495–1504https://doi.org/10.1145/3664647.3680680The open-vocabulary human-object interaction (Ov-HOI) detection aims to identify both base and novel categories of human-object interactions while only base categories are available during training. Existing Ov-HOI methods commonly leverage knowledge ...
- ArticleOctober 2024
Extended Withdrawable Signature
Data Security and Privacy ProtectionPages 119–140https://doi.org/10.1007/978-981-97-8540-7_8AbstractWithdrawable signature, the new notion of signature recently introduced, enables the retraction of a digital signature without revealing the signer’s private key or compromising the security of other signatures the signer created before. This ...
- research-articleOctober 2024
Collaborative Fraud Detection on Large Scale Graph Using Secure Multi-Party Computation
CIKM '24: Proceedings of the 33rd ACM International Conference on Information and Knowledge ManagementPages 1473–1482https://doi.org/10.1145/3627673.3679863Enabling various parties to share data enhances online fraud detection capabilities considering fraudsters tend to reuse resources attacking multiple platforms. Multi-party computation (MPC) techniques, such as secret sharing, offer potential privacy-...