Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (28)
- Selected Works (9)
- Old Dominion University (8)
- University of Colorado Law School (8)
- MBZUAI (7)
-
- University of Nebraska - Lincoln (7)
- Walden University (7)
- Edith Cowan University (6)
- Kennesaw State University (6)
- University of Wollongong (6)
- Nova Southeastern University (5)
- Brigham Young University (4)
- Missouri University of Science and Technology (4)
- University of Tennessee, Knoxville (4)
- University of Kentucky (3)
- University of Massachusetts Amherst (3)
- Zayed University (3)
- Roger Williams University (2)
- Technological University Dublin (2)
- Thomas Jefferson University (2)
- Utah State University (2)
- Wright State University (2)
- Ateneo de Manila University (1)
- California Polytechnic State University, San Luis Obispo (1)
- China Simulation Federation (1)
- Claremont Colleges (1)
- Cleveland State University (1)
- Dakota State University (1)
- Dartmouth College (1)
- Department of Primary Industries and Regional Development, Western Australia (1)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (28)
- Walden Dissertations and Doctoral Studies (7)
- Faculty of Informatics - Papers (Archive) (6)
- CCE Theses and Dissertations (5)
- Journal of Cybersecurity Education, Research and Practice (5)
-
- Australian Information Warfare and Security Conference (4)
- Electronic Theses and Dissertations (4)
- International Journal of Nuclear Security (4)
- Machine Learning Faculty Publications (4)
- Theses and Dissertations (4)
- All Works (3)
- Chemistry Department Faculty Publication Series (3)
- Christian Binek Publications (3)
- Computer Science Faculty Research & Creative Works (3)
- Computer Vision Faculty Publications (3)
- Best Management Practices (BMPs): What? How? And Why? (May 26) (2)
- Browse all Theses and Dissertations (2)
- Christian Binek (2)
- Engineering Technology Faculty Publications (2)
- IGC Proceedings (1997-2023) (2)
- Law Library Newsletters/Blog (2)
- Professor Salim Bouzerdoum (2)
- Sci-Tech News (2)
- USDA Wildlife Services: Staff Publications (2)
- VMASC Publications (2)
- 2012 Energy Justice Conference and Technology Exposition (September 17-18) (1)
- Academic Symposium of Undergraduate Scholarship (1)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1)
- All Graduate Theses, Dissertations, and Other Capstone Projects (1)
- All Maxine Goodman Levin School of Urban Affairs Publications (1)
- Publication Type
Articles 1 - 30 of 160
Full-Text Articles in Entire DC Network
Conditional Neural Heuristic For Multiobjective Vehicle Routing Problems, Mingfeng Fan, Yaoxin Wu, Zhiguang Cao, Wen Song, Guillaume Sartoretti, Huan Liu, Guohua Wu
Conditional Neural Heuristic For Multiobjective Vehicle Routing Problems, Mingfeng Fan, Yaoxin Wu, Zhiguang Cao, Wen Song, Guillaume Sartoretti, Huan Liu, Guohua Wu
Research Collection School Of Computing and Information Systems
Existing neural heuristics for multiobjective vehicle routing problems (MOVRPs) are primarily conditioned on instance context, which failed to appropriately exploit preference and problem size, thus holding back the performance. To thoroughly unleash the potential, we propose a novel conditional neural heuristic (CNH) that fully leverages the instance context, preference, and size with an encoder–decoder structured policy network. Particularly, in our CNH, we design a dual-attention-based encoder to relate preferences and instance contexts, so as to better capture their joint effect on approximating the exact Pareto front (PF). We also design a size-aware decoder based on the sinusoidal encoding to explicitly …
Forage And Grazinglands Extension: Training The Next Generation Of Specialists, D. W. Hancock
Forage And Grazinglands Extension: Training The Next Generation Of Specialists, D. W. Hancock
IGC Proceedings (1997-2023)
This invited talk provides a perspective on what is required to excel in the role as an Extension Specialist. In the USA, most such Extension Specialists are tenure-track faculty, and have state-wide or even multi-state responsibilities. Advice is given on how to balance the high expectations of such a faculty appointment while providing appropriate recommendations to farmers/ranchers and service providers in the forage and grazinglands industry. This talk will offer one former Extension Specialist’s perspective on the skills, experience, and persona required to begin a successful career as a Forage and Grazinglands Extension Specialist. Additional exposition will be given on …
Affinity Uncertainty-Based Hard Negative Mining In Graph Contrastive Learning, Chaoxi Niu, Guansong Pang, Ling Chen
Affinity Uncertainty-Based Hard Negative Mining In Graph Contrastive Learning, Chaoxi Niu, Guansong Pang, Ling Chen
Research Collection School Of Computing and Information Systems
Hard negative mining has shown effective in enhancing self-supervised contrastive learning (CL) on diverse data types, including graph CL (GCL). The existing hardness-aware CL methods typically treat negative instances that are most similar to the anchor instance as hard negatives, which helps improve the CL performance, especially on image data. However, this approach often fails to identify the hard negatives but leads to many false negatives on graph data. This is mainly due to that the learned graph representations are not sufficiently discriminative due to oversmooth representations and/or non-independent and identically distributed (non-i.i.d.) issues in graph data. To tackle this …
Personalized Federated Graph Learning On Non-Iid Electronic Health Records, Tao Tang, Zhuoyang Han, Zhen Cai, Shuo Yu, Xiaokang Zhou, Taiwo Oseni, Sajal K. Das
Personalized Federated Graph Learning On Non-Iid Electronic Health Records, Tao Tang, Zhuoyang Han, Zhen Cai, Shuo Yu, Xiaokang Zhou, Taiwo Oseni, Sajal K. Das
Computer Science Faculty Research & Creative Works
Understanding The Latent Disease Patterns Embedded In Electronic Health Records (EHRs) Is Crucial For Making Precise And Proactive Healthcare Decisions. Federated Graph Learning-Based Methods Are Commonly Employed To Extract Complex Disease Patterns From The Distributed EHRs Without Sharing The Client-Side Raw Data. However, The Intrinsic Characteristics Of The Distributed EHRs Are Typically Non-Independent And Identically Distributed (Non-IID), Significantly Bringing Challenges Related To Data Imbalance And Leading To A Notable Decrease In The Effectiveness Of Making Healthcare Decisions Derived From The Global Model. To Address These Challenges, We Introduce A Novel Personalized Federated Learning Framework Named PEARL, Which Is Designed For …
Learning An Interpretable Stylized Subspace For 3d-Aware Animatable Artforms, Chenxi Zheng, Bangzhen Liu, Xuemiao Xu, Huaidong Zhang, Shengfeng He
Learning An Interpretable Stylized Subspace For 3d-Aware Animatable Artforms, Chenxi Zheng, Bangzhen Liu, Xuemiao Xu, Huaidong Zhang, Shengfeng He
Research Collection School Of Computing and Information Systems
Throughout history, static paintings have captivated viewers within display frames, yet the possibility of making these masterpieces vividly interactive remains intriguing. This research paper introduces 3DArtmator, a novel approach that aims to represent artforms in a highly interpretable stylized space, enabling 3D-aware animatable reconstruction and editing. Our rationale is to transfer the interpretability and 3D controllability of the latent space in a 3D-aware GAN to a stylized sub-space of a customized GAN, revitalizing the original artforms. To this end, the proposed two-stage optimization framework of 3DArtmator begins with discovering an anchor in the original latent space that accurately mimics the …
Communication-Efficient Federated Learning For Leo Constellations Integrated With Haps Using Hybrid Noma-Ofdm, Mohamed Elmahallawy, Tony T. Luo, Khaled Ramadan
Communication-Efficient Federated Learning For Leo Constellations Integrated With Haps Using Hybrid Noma-Ofdm, Mohamed Elmahallawy, Tony T. Luo, Khaled Ramadan
Computer Science Faculty Research & Creative Works
Space AI has become increasingly important and sometimes even necessary for government, businesses, and society. An active research topic under this mission is integrating federated learning (FL) with satellite communications (SatCom) so that numerous low Earth orbit (LEO) satellites can collaboratively train a machine learning model. However, the special communication environment of SatCom leads to a very slow FL training process up to days and weeks. This paper proposes NomaFedHAP, a novel FL-SatCom approach tailored to LEO satellites, that (1) utilizes high-altitude platforms (HAPs) as distributed parameter servers (PSs) to enhance satellite visibility, and (2) introduces non-orthogonal multiple access (NOMA) …
Resource Aware Clustering For Tackling The Heterogeneity Of Participants In Federated Learning, Rahul Mishra, Hari Prabhat Gupta, Garvit Banga, Sajal K. Das
Resource Aware Clustering For Tackling The Heterogeneity Of Participants In Federated Learning, Rahul Mishra, Hari Prabhat Gupta, Garvit Banga, Sajal K. Das
Computer Science Faculty Research & Creative Works
Federated Learning Is A Training Framework That Enables Multiple Participants To Collaboratively Train A Shared Model While Preserving Data Privacy. The Heterogeneity Of Devices And Networking Resources Of The Participants Delay The Training And Aggregation. The Paper Introduces A Novel Approach To Federated Learning By Incorporating Resource-Aware Clustering. This Method Addresses The Challenges Posed By The Diverse Devices And Networking Resources Among Participants. Unlike Static Clustering Approaches, This Paper Proposes A Dynamic Method To Determine The Optimal Number Of Clusters Using Dunn Indices. It Enables Adaptability To The Varying Heterogeneity Levels Among Participants, Ensuring A Responsive And Customized Approach To …
Active Code Learning: Benchmarking Sample-Efficient Training Of Code Models, Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon
Active Code Learning: Benchmarking Sample-Efficient Training Of Code Models, Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon
Research Collection School Of Computing and Information Systems
The costly human effort required to prepare the training data of machine learning (ML) models hinders their practical development and usage in software engineering (ML4Code), especially for those with limited budgets. Therefore, efficiently training models of code with less human effort has become an emergent problem. Active learning is such a technique to address this issue that allows developers to train a model with reduced data while producing models with desired performance, which has been well studied in computer vision and natural language processing domains. Unfortunately, there is no such work that explores the effectiveness of active learning for code …
Understanding The Impact Of Environmental Impact Assessment Research On Policy And Practice, Angus Morrison-Saunders, Annette Nykiel, Nicole Atkins
Understanding The Impact Of Environmental Impact Assessment Research On Policy And Practice, Angus Morrison-Saunders, Annette Nykiel, Nicole Atkins
Research outputs 2022 to 2026
There is an enormous and ever-growing body of environmental impact assessment (EIA) research, much of which is grounded in practice or seeks to advance it. In this paper we show how the impact of EIA research on policy and practice might be conceptualised and how to set about evidencing it. A framework is developed through literature review to account for impact in four areas pertaining to instrumental impact, conceptual impact, capacity building and knowledge brokerage and co-production. Methods for implementing the framework include citations within policy documents along with content analysis to determine influence and interviews or surveys with policy …
Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu
Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu
Journal of Cybersecurity Education, Research and Practice
This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post experimental design was employed. 43 self-selected participants were recruited via an online register and posters at the university (excluding IT related courses). Participants completed the Human Aspects of Information Security Questionnaire (HAIS-Q) and Fear of Missing Out (FoMO) Scale. They then completed all games and quizzes in the GICAST course before repeating the HAIS-Q and …
Hrgcn: Heterogeneous Graph-Level Anomaly Detection With Hierarchical Relation-Augmented Graph Neural Networks, Jiaxi Li, Guansong Pang, Ling Chen, Mohammad-Reza Namazi-Rad
Hrgcn: Heterogeneous Graph-Level Anomaly Detection With Hierarchical Relation-Augmented Graph Neural Networks, Jiaxi Li, Guansong Pang, Ling Chen, Mohammad-Reza Namazi-Rad
Research Collection School Of Computing and Information Systems
This work considers the problem of heterogeneous graph-level anomaly detection. Heterogeneous graphs are commonly used to represent behaviours between different types of entities in complex industrial systems for capturing as much information about the system operations as possible. Detecting anomalous heterogeneous graphs from a large set of system behaviour graphs is crucial for many real-world applications like online web/mobile service and cloud access control. To address the problem, we propose HRGCN, an unsupervised deep heterogeneous graph neural network, to model complex heterogeneous relations between different entities in the system for effectively identifying these anomalous behaviour graphs. HRGCN trains a hierarchical …
Cloud-Edge Collaborative Service Architecture For Lvc Training System, Peng Yong, Miao Zhang, Yue Hu
Cloud-Edge Collaborative Service Architecture For Lvc Training System, Peng Yong, Miao Zhang, Yue Hu
Journal of System Simulation
Abstract: LVC training, an important means of military training, has received great attention from military and M&S experts. As the virtual and physical elements become more abundant and deeply integrated, LVC training systems become increasingly complex. Aiming at physical-virtual connection, information interaction, simulation computation, run-time control, etc., this paper designs a cloud-edge collaborative service architecture for LVC training systems (CESA-LVC) by reference to cyber-physical systems and cloud-edge computing architectures. CESA-LVC standardizes the structures of LVC training systems from several aspects of intelligent real-time interconnection, joint simulation computation, training auxiliary service, training cognitive decision, and dynamic configuration optimization. It provides a …
Asynchronous Fdrl-Based Low-Latency Computation Offloading For Integrated Terrestrial And Non-Terrestrial Power Iot, Sifeng Li, Sunxuan Zhang, Zhao Wang, Zhenyu Zhou, Xiaoyan Wang, Shahid Mumtaz, Mohsen Guizani, Valerio Frascolla
Asynchronous Fdrl-Based Low-Latency Computation Offloading For Integrated Terrestrial And Non-Terrestrial Power Iot, Sifeng Li, Sunxuan Zhang, Zhao Wang, Zhenyu Zhou, Xiaoyan Wang, Shahid Mumtaz, Mohsen Guizani, Valerio Frascolla
Machine Learning Faculty Publications
Integrated terrestrial and non-terrestrial power internet of things (IPIoT) has emerged as a paradigm shift to three-dimensional vertical communication networks for power systems in the 6G era. Computation offloading plays key roles in enabling real-time data processing and analysis for electric services. However, computation offloading in IPIoT still faces challenges of coupling between task offloading and computation resource allocation, resource heterogeneity and dynamics, and degraded model training caused by electromagnetic interference (EMI). In this article, we propose an asynchronous federated deep reinforcement learning (AFDRL)-based computation offloading framework for IPIoT, where models are uploaded asynchronously for federated averaging to relieve network …
Dynamic Graph Enhanced Contrastive Learning For Chest X-Ray Report Generation, Mingjie Li, Bingqian Lin, Zicong Chen, Haokun Lin, Xiaodan Liang, Xiaojun Chang
Dynamic Graph Enhanced Contrastive Learning For Chest X-Ray Report Generation, Mingjie Li, Bingqian Lin, Zicong Chen, Haokun Lin, Xiaodan Liang, Xiaojun Chang
Computer Vision Faculty Publications
Automatic radiology reporting has great clinical potential to relieve radiologists from heavy workloads and improve diagnosis interpretation. Recently, researchers have enhanced data-driven neural networks with medical knowledge graphs to eliminate the severe visual and textual bias in this task. The structures of such graphs are exploited by using the clinical dependencies formed by the disease topic tags via general knowledge and usually do not update during the training process. Consequently, the fixed graphs can not guarantee the most appropriate scope of knowledge and limit the effectiveness. To address the limitation, we propose a knowledge graph with Dynamic structure and nodes …
3d-Aware Multi-Class Image-To-Image Translation With Nerfs, Senmao Li, Joost Van De Weijer, Yaxing Wang, Fahad Shahbaz Khan, Meiqin Liu, Jian Yang
3d-Aware Multi-Class Image-To-Image Translation With Nerfs, Senmao Li, Joost Van De Weijer, Yaxing Wang, Fahad Shahbaz Khan, Meiqin Liu, Jian Yang
Computer Vision Faculty Publications
Recent advances in 3D-aware generative models (3D-aware GANs) combined with Neural Radiance Fields (NeRF) have achieved impressive results. However no prior works investigate 3D-aware GANs for 3D consistent multiclass image-to-image (3D-aware 121) translation. Naively using 2D-121 translation methods suffers from unrealistic shape/identity change. To perform 3D-aware multiclass 121 translation, we decouple this learning process into a multiclass 3D-aware GAN step and a 3D-aware 121 translation step. In the first step, we propose two novel techniques: a new conditional architecture and an effective training strategy. In the second step, based on the well-trained multiclass 3D-aware GAN architecture, that preserves view-consistency, we …
Kd-Dlgan: Data Limited Image Generation Via Knowledge Distillation, Kaiwen Cui, Yingchen Yu, Fangneng Zhan, Shengcai Liao, Shijian Lu, Eric Xing
Kd-Dlgan: Data Limited Image Generation Via Knowledge Distillation, Kaiwen Cui, Yingchen Yu, Fangneng Zhan, Shengcai Liao, Shijian Lu, Eric Xing
Machine Learning Faculty Publications
Generative Adversarial Networks (GANs) rely heavily on large-scale training data for training high-quality image generation models. With limited training data, the GAN discriminator often suffers from severe overfitting which directly leads to degraded generation especially in generation diversity. Inspired by the recent advances in knowledge distillation (KD), we propose KD-DLGAN, a knowledge-distillation based generation framework that introduces pre-trained vision-language models for training effective data-limited generation models. KD-DLGAN consists of two innovative designs. The first is aggregated generative KD that mitigates the discriminator overfitting by challenging the discriminator with harder learning tasks and distilling more generalizable knowledge from the pre-trained models. …
Smartbrush: Text And Shape Guided Object Inpainting With Diffusion Model, Shaoan Xie, Zhifei Zhang, Zhe Lin, Tobias Hinz, Kun Zhang
Smartbrush: Text And Shape Guided Object Inpainting With Diffusion Model, Shaoan Xie, Zhifei Zhang, Zhe Lin, Tobias Hinz, Kun Zhang
Machine Learning Faculty Publications
Generic image inpainting aims to complete a corrupted image by borrowing surrounding information, which barely generates novel content. By contrast, multi-modal inpainting provides more flexible and useful controls on the inpainted content, e.g., a text prompt can be used to describe an object with richer attributes, and a mask can be used to constrain the shape of the inpainted object rather than being only considered as a missing area. We propose a new diffusion-based model named SmartBrush for completing a missing region with an object using both text and shape-guidance. While previous work such as DALLE-2 and Stable Diffusion can …
Change In Grassland Science: Implications For Training, Research And Grassland Societies, G. Lemaire, R. J. Wilkins, J. Hodgson
Change In Grassland Science: Implications For Training, Research And Grassland Societies, G. Lemaire, R. J. Wilkins, J. Hodgson
IGC Proceedings (1997-2023)
In most of the world the priority for production-oriented research has been succeeded by the need for grassland research to focus on systems which satisfy requirements relating to the stability and protection of land, water and atmospheric resources and to biodiversity, in addition to production efficiency. This dictates not only a new approach to research, but also new approaches for the organisation of research, the training and development of research scientists and the activities of Grassland Societies and associated organisations.
How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training, David Sikolia, David Biros, Tianjian Zhang
How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training, David Sikolia, David Biros, Tianjian Zhang
Journal of Cybersecurity Education, Research and Practice
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Specifically, with a broad range of cybersecurity knowledge crammed into in a single SETA session, it is unclear how effective different types of knowledge are in mitigating human errors in a longitudinal setting. his study investigates how knowledge gained through SETA programs affects human errors in cybersecurity to fill the longitudinal void. In a baseline experiment, we establish that SETA programs reduce …
Reinforced Adaptation Network For Partial Domain Adaptation, Keyu Wu, Min Wu, Zhenghua Chen, Ruibing Jin, Wei Cui, Zhiguang Cao, Xiaoli Li
Reinforced Adaptation Network For Partial Domain Adaptation, Keyu Wu, Min Wu, Zhenghua Chen, Ruibing Jin, Wei Cui, Zhiguang Cao, Xiaoli Li
Research Collection School Of Computing and Information Systems
Domain adaptation enables generalized learning in new environments by transferring knowledge from label-rich source domains to label-scarce target domains. As a more realistic extension, partial domain adaptation (PDA) relaxes the assumption of fully shared label space, and instead deals with the scenario where the target label space is a subset of the source label space. In this paper, we propose a Reinforced Adaptation Network (RAN) to address the challenging PDA problem. Specifically, a deep reinforcement learning model is proposed to learn source data selection policies. Meanwhile, a domain adaptation model is presented to simultaneously determine rewards and learn domain-invariant feature …
Improving Rumor Detection By Promoting Information Campaigns With Transformer-Based Generative Adversarial Learning, Jing Ma, Jun Li, Wei Gao, Yang Yang, Kam-Fai Wong
Improving Rumor Detection By Promoting Information Campaigns With Transformer-Based Generative Adversarial Learning, Jing Ma, Jun Li, Wei Gao, Yang Yang, Kam-Fai Wong
Research Collection School Of Computing and Information Systems
Rumors can cause devastating consequences to individuals and our society. Analysis shows that the widespread of rumors typically results from deliberate promotion of information aiming to shape the collective public opinions on the concerned event. In this paper, we combat such chaotic phenomenon with a countermeasure by mirroring against how such chaos is created to make rumor detection more robust and effective. Our idea is inspired by adversarial learning method originated from Generative Adversarial Networks (GAN). We propose a GAN-style approach, where a generator is designed to produce uncertain or conflicting voices, further polarizing the original conversational threads to boost …
Learning Relation Prototype From Unlabeled Texts For Long-Tail Relation Extraction, Yixin Cao, Jun Kuang, Ming Gao, Aoying Zhou, Yonggang Wen, Tat-Seng Chua
Learning Relation Prototype From Unlabeled Texts For Long-Tail Relation Extraction, Yixin Cao, Jun Kuang, Ming Gao, Aoying Zhou, Yonggang Wen, Tat-Seng Chua
Research Collection School Of Computing and Information Systems
Relation Extraction (RE) is a vital step to complete Knowledge Graph (KG) by extracting entity relations from texts. However, it usually suffers from the long-tail issue. The training data mainly concentrates on a few types of relations, leading to the lack of sufficient annotations for the remaining types of relations. In this paper, we propose a general approach to learn relation prototypes from unlabeled texts, to facilitate the long-tail relation extraction by transferring knowledge from the relation types with sufficient training data. We learn relation prototypes as an implicit factor between entities, which reflects the meanings of relations as well …
Deep-Learning-Based Classification Of Digitally Modulated Signals Using Capsule Networks And Cyclic Cumulants, John A. Snoap, Dimitrie C. Popescu, James A. Latshaw, Chad M. Spooner
Deep-Learning-Based Classification Of Digitally Modulated Signals Using Capsule Networks And Cyclic Cumulants, John A. Snoap, Dimitrie C. Popescu, James A. Latshaw, Chad M. Spooner
Electrical & Computer Engineering Faculty Publications
This paper presents a novel deep-learning (DL)-based approach for classifying digitally modulated signals, which involves the use of capsule networks (CAPs) together with the cyclic cumulant (CC) features of the signals. These were blindly estimated using cyclostationary signal processing (CSP) and were then input into the CAP for training and classification. The classification performance and the generalization abilities of the proposed approach were tested using two distinct datasets that contained the same types of digitally modulated signals, but had distinct generation parameters. The results showed that the classification of digitally modulated signals using CAPs and CCs proposed in the paper …
Verifytl: Secure And Verifiable Collaborative Transfer Learning, Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Wei Zheng, Kim-Kwang Raymond Choo, Robert H. Deng
Verifytl: Secure And Verifiable Collaborative Transfer Learning, Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Wei Zheng, Kim-Kwang Raymond Choo, Robert H. Deng
Research Collection School Of Computing and Information Systems
Getting access to labeled datasets in certain sensitive application domains can be challenging. Hence, one may resort to transfer learning to transfer knowledge learned from a source domain with sufficient labeled data to a target domain with limited labeled data. However, most existing transfer learning techniques only focus on one-way transfer which may not benefit the source domain. In addition, there is the risk of a malicious adversary corrupting a number of domains, which can consequently result in inaccurate prediction or privacy leakage. In this paper, we construct a secure and Verif iable collaborative T ransfer L earning scheme, VerifyTL, …
How To Find Actionable Static Analysis Warnings: A Case Study With Findbugs, Rahul Yedida, Hong Jin Kang, Huy Tu, Xueqi Yang, David Lo, Tim Menzies
How To Find Actionable Static Analysis Warnings: A Case Study With Findbugs, Rahul Yedida, Hong Jin Kang, Huy Tu, Xueqi Yang, David Lo, Tim Menzies
Research Collection School Of Computing and Information Systems
Automatically generated static code warnings suffer from a large number of false alarms. Hence, developers only take action on a small percent of those warnings. To better predict which static code warnings should ot be ignored, we suggest that analysts need to look deeper into their algorithms to find choices that better improve the particulars of their specific problem. Specifically, we show here that effective predictors of such warnings can be created by methods that ocally adjust the decision boundary (between actionable warnings and others). These methods yield a new high water-mark for recognizing actionable static code warnings. For eight …
Defending Ai-Based Automatic Modulation Recognition Models Against Adversarial Attacks, Haolin Tang, Ferhat Ozgur Catak, Murat Kuzlu, Evren Catak, Yanxiao Zhao
Defending Ai-Based Automatic Modulation Recognition Models Against Adversarial Attacks, Haolin Tang, Ferhat Ozgur Catak, Murat Kuzlu, Evren Catak, Yanxiao Zhao
Engineering Technology Faculty Publications
Automatic Modulation Recognition (AMR) is one of the critical steps in the signal processing chain of wireless networks, which can significantly improve communication performance. AMR detects the modulation scheme of the received signal without any prior information. Recently, many Artificial Intelligence (AI) based AMR methods have been proposed, inspired by the considerable progress of AI methods in various fields. On the one hand, AI-based AMR methods can outperform traditional methods in terms of accuracy and efficiency. On the other hand, they are susceptible to new types of cyberattacks, such as model poisoning or adversarial attacks. This paper explores the vulnerabilities …
How Do Cooperatives Enable Empowerment Among Rural Women? Evidence From The Municipality Of Cavinti, Laguna, Maria Theresa M. Castro-Bernardo, Liezel S. Cruz
How Do Cooperatives Enable Empowerment Among Rural Women? Evidence From The Municipality Of Cavinti, Laguna, Maria Theresa M. Castro-Bernardo, Liezel S. Cruz
Journal of Economics, Management and Agricultural Development
The persistent gender issues and their implications for sustainable development have led to several strategic yet collective schemes, such as the cooperatives, promising to contribute to (women) empowerment and social equality. Guided by Kabeer’s conceptual framework, this study analyzes the role of cooperative membership in promoting empowerment among its female coop-members in Cavinti, Laguna. Primary and secondary sources of data were used and analyzed using descriptive statistics and correlation analysis. The result indicates that cooperatives play a critical role in empowering women by providing new and/or improved knowledge and skills through capacity-building training necessary to make informed decisions, thus strengthening …
Mitigating Popularity Bias In Recommendation With Unbalanced Interactions: A Gradient Perspective, Weijieying Ren, Lei Wang, Kunpeng Liu, Ruocheng Guo, Ee-Peng Lim, Yanjie Fu
Mitigating Popularity Bias In Recommendation With Unbalanced Interactions: A Gradient Perspective, Weijieying Ren, Lei Wang, Kunpeng Liu, Ruocheng Guo, Ee-Peng Lim, Yanjie Fu
Research Collection School Of Computing and Information Systems
Recommender systems learn from historical user-item interactions to identify preferred items for target users. These observed interactions are usually unbalanced following a long-tailed distribution. Such long-tailed data lead to popularity bias to recommend popular but not personalized items to users. We present a gradient perspective to understand two negative impacts of popularity bias in recommendation model optimization: (i) the gradient direction of popular item embeddings is closer to that of positive interactions, and (ii) the magnitude of positive gradient for popular items are much greater than that of unpopular items. To address these issues, we propose a simple yet efficient …
Maximum Spatial Perturbation Consistency For Unpaired Image-To-Image Translation, Yanwu Xu, Shaoan Xie, Wenhao Wu, Kun Zhang, Mingming Gong, Kayhan Batmanghelich
Maximum Spatial Perturbation Consistency For Unpaired Image-To-Image Translation, Yanwu Xu, Shaoan Xie, Wenhao Wu, Kun Zhang, Mingming Gong, Kayhan Batmanghelich
Machine Learning Faculty Publications
Unpaired image-to-image translation (I2I) is an ill-posed problem, as an infinite number of translation functions can map the source domain distribution to the target distribution. Therefore, much effort has been put into designing suitable constraints, e.g., cycle consistency (CycleGAN), geometry consistency (GCGAN), and contrastive learning-based constraints (CUTGAN), that help better pose the problem. However, these well-known constraints have limitations: (1) they are either too restrictive or too weak for specific I2I tasks; (2) these methods result in content distortion when there is a significant spatial variation between the source and target domains. This paper proposes a universal regularization technique called …
Learning Improvement Heuristics For Solving Routing Problems, Yaoxin Wu, Wen Song, Zhiguang Cao, Jie Zhang, Andrew Lim
Learning Improvement Heuristics For Solving Routing Problems, Yaoxin Wu, Wen Song, Zhiguang Cao, Jie Zhang, Andrew Lim
Research Collection School Of Computing and Information Systems
Recent studies in using deep learning to solve routing problems focus on construction heuristics, the solutions of which are still far from optimality. Improvement heuristics have great potential to narrow this gap by iteratively refining a solution. However, classic improvement heuristics are all guided by hand-crafted rules which may limit their performance. In this paper, we propose a deep reinforcement learning framework to learn the improvement heuristics for routing problems. We design a self-attention based deep architecture as the policy network to guide the selection of next solution. We apply our method to two important routing problems, i.e. travelling salesman …