Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Series

Deep Learning

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 114

Full-Text Articles in Physical Sciences and Mathematics

Singleadv: Single-Class Target-Specific Attack Against Interpretable Deep Learning Systems, Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed May 2024

Singleadv: Single-Class Target-Specific Attack Against Interpretable Deep Learning Systems, Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed

Computer Science: Faculty Publications and Other Works

In this paper, we present a novel Single-class target-specific Adversarial attack called SingleADV. The goal of SingleADV is to generate a universal perturbation that deceives the target model into confusing a specific category of objects with a target category while ensuring highly relevant and accurate interpretations. The universal perturbation is stochastically and iteratively optimized by minimizing the adversarial loss that is designed to consider both the classifier and interpreter costs in targeted and non-targeted categories. In this optimization framework, ruled by the first- and second-moment estimations, the desired loss surface promotes high confidence and interpretation score of adversarial samples. By …


Ghost Connect-Net: A Connectivity-Based Companion Network To Enhance Pruning Methods, Mary Isabelle Wisell May 2024

Ghost Connect-Net: A Connectivity-Based Companion Network To Enhance Pruning Methods, Mary Isabelle Wisell

Honors College

Deep neural network (DNN) approaches excel in various real-world applications like robotics and computer vision, yet their computational demands and memory requirements hinder usability on advanced devices. Also, larger models heighten overparameterization risks, making networks more vulnerable to input disturbances. Recent studies aim to boost DNN efficiency by trimming redundant neurons or filters based on task relevance. Instead of introducing a new pruning method, this project aims to enhance existing techniques by introducing a companion network, Ghost Connect-Net (GC-Net), to monitor the connections in the original network. The initial weights of GC- Net are equal to the connectivity measurements of …


Functional Data Learning Using Convolutional Neural Networks, Jose Galarza, Tamer Oraby Feb 2024

Functional Data Learning Using Convolutional Neural Networks, Jose Galarza, Tamer Oraby

School of Mathematical and Statistical Sciences Faculty Publications and Presentations

In this paper, we show how convolutional neural networks (CNNs) can be used in regression and classification learning problems for noisy and non-noisy functional data (FD). The main idea is to transform the FD into a 28 by 28 image. We use a specific but typical architecture of a CNN to perform all the regression exercises of parameter estimation and functional form classification. First, we use some functional case studies of FD with and without random noise to showcase the strength of the new method. In particular, we use it to estimate exponential growth and decay rates, the bandwidths of …


Deep Learning Approaches For Chaotic Dynamics And High-Resolution Weather Simulations In The Us Midwest, Vlada Volyanskaya, Kabir Batra, Shubham Shrivastava Dec 2023

Deep Learning Approaches For Chaotic Dynamics And High-Resolution Weather Simulations In The Us Midwest, Vlada Volyanskaya, Kabir Batra, Shubham Shrivastava

Discovery Undergraduate Interdisciplinary Research Internship

Weather prediction is indispensable across various sectors, from agriculture to disaster forecasting, deeply influencing daily life and work. Recent advancement of AI foundation models for weather and climate predictions makes it possible to perform a large number of predictions in reasonable time to support timesensitive policy- and decision-making. However, the uncertainty quantification, validation, and attribution of these models have not been well explored, and the lack of knowledge can eventually hinder the improvement of their prediction accuracy and precision. Our project is embarking on a two-fold approach leveraging deep learning techniques (LSTM and Transformer) architectures. Firstly, we model the Lorenz …


Optimizing Uncertainty Quantification Of Vision Transformers In Deep Learning On Novel Ai Architectures, Erik Pautsch, John Li, Silvio Rizzi, George K. Thiruvathukal, Maria Pantoja Nov 2023

Optimizing Uncertainty Quantification Of Vision Transformers In Deep Learning On Novel Ai Architectures, Erik Pautsch, John Li, Silvio Rizzi, George K. Thiruvathukal, Maria Pantoja

Computer Science: Faculty Publications and Other Works

Deep Learning (DL) methods have shown substantial efficacy in computer vision (CV) and natural language processing (NLP). Despite their proficiency, the inconsistency in input data distributions can compromise prediction reliability. This study mitigates this issue by introducing uncertainty evaluations in DL models, thereby enhancing dependability through a distribution of predictions. Our focus lies on the Vision Transformer (ViT), a DL model that harmonizes both local and global behavior. We conduct extensive experiments on the ImageNet-1K dataset, a vast resource with over a million images across 1,000 categories. ViTs, while competitive, are vulnerable to adversarial attacks, making uncertainty estimation crucial for …


Flacgec: A Chinese Grammatical Error Correction Dataset With Fine-Grained Linguistic Annotation, Hanyue Du, Yike Zhao, Qingyuan Tian, Jiani Wang, Lei Wang, Yunshi Lan, Xuesong Lu Oct 2023

Flacgec: A Chinese Grammatical Error Correction Dataset With Fine-Grained Linguistic Annotation, Hanyue Du, Yike Zhao, Qingyuan Tian, Jiani Wang, Lei Wang, Yunshi Lan, Xuesong Lu

Research Collection School Of Computing and Information Systems

Chinese Grammatical Error Correction (CGEC) has been attracting growing attention from researchers recently. In spite of the fact that multiple CGEC datasets have been developed to support the research, these datasets lack the ability to provide a deep linguistic topology of grammar errors, which is critical for interpreting and diagnosing CGEC approaches. To address this limitation, we introduce FlaCGEC, which is a new CGEC dataset featured with fine-grained linguistic annotation. Specifically, we collect raw corpus from the linguistic schema defined by Chinese language experts, conduct edits on sentences via rules, and refine generated samples manually, which results in 10k sentences …


Emotion-Aware Music Recommendation, Hieu Tran, Tuan Le, Anh Do, Tram Vu, Steven Bogaerts, Brian T. Howard Sep 2023

Emotion-Aware Music Recommendation, Hieu Tran, Tuan Le, Anh Do, Tram Vu, Steven Bogaerts, Brian T. Howard

Computer Science Faculty publications

It is common to listen to songs that match one's mood. Thus, an AI music recommendation system that is aware of the user's emotions is likely to provide a superior user experience to one that is unaware. In this paper, we present an emotion-aware music recommendation system. Multiple models are discussed and evaluated for affect identification from a live image of the user. We propose two models: DRViT, which applies dynamic routing to vision transformers, and InvNet50, which uses involution. All considered models are trained and evaluated on the AffectNet dataset. Each model outputs the user's estimated valence and arousal …


Gpachov At Checkthat! 2023: A Diverse Multi-Approach Ensemble For Subjectivity Detection In News Articles, Georgi Pachov, Dimitar Dimitrov, Ivan Koychev, Preslav Nakov Sep 2023

Gpachov At Checkthat! 2023: A Diverse Multi-Approach Ensemble For Subjectivity Detection In News Articles, Georgi Pachov, Dimitar Dimitrov, Ivan Koychev, Preslav Nakov

Natural Language Processing Faculty Publications

The wide-spread use of social networks has given rise to subjective, misleading, and even false information on the Internet. Thus, subjectivity detection can play an important role in ensuring the objectiveness and the quality of a piece of information. This paper presents the solution built by the Gpachov team for the CLEF-2023 CheckThat! lab Task 2 on subjectivity detection. Three different research directions are explored. The first one is based on fine-tuning a sentence embeddings encoder model and dimensionality reduction. The second one explores a sample-efficient few-shot learning model. The third one evaluates fine-tuning a multilingual transformer on an altered …


Sctiger: A Deep-Learning Method For Inferring Gene Regulatory Networks From Case Versus Control Scrna-Seq Datasets., Madison Dautle, Shaoqiang Zhang, Yong Chen Aug 2023

Sctiger: A Deep-Learning Method For Inferring Gene Regulatory Networks From Case Versus Control Scrna-Seq Datasets., Madison Dautle, Shaoqiang Zhang, Yong Chen

Faculty Scholarship for the College of Science & Mathematics

Inferring gene regulatory networks (GRNs) from single-cell RNA-seq (scRNA-seq) data is an important computational question to find regulatory mechanisms involved in fundamental cellular processes. Although many computational methods have been designed to predict GRNs from scRNA-seq data, they usually have high false positive rates and none infer GRNs by directly using the paired datasets of case-versus-control experiments. Here we present a novel deep-learning-based method, named scTIGER, for GRN detection by using the co-differential relationships of gene expression profiles in paired scRNA-seq datasets. scTIGER employs cell-type-based pseudotiming, an attention-based convolutional neural network method and permutation-based significance testing for inferring GRNs among …


Duplicate Bug Report Detection: How Far Are We?, Ting Zhang, Donggyun Han, Venkatesh Vinayakarao, Ivana Clairine Irsan, Bowen Xu, Thung Ferdian, David Lo, Lingxiao Jiang Jul 2023

Duplicate Bug Report Detection: How Far Are We?, Ting Zhang, Donggyun Han, Venkatesh Vinayakarao, Ivana Clairine Irsan, Bowen Xu, Thung Ferdian, David Lo, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

Many Duplicate Bug Report Detection (DBRD) techniques have been proposed in the research literature. The industry uses some other techniques. Unfortunately, there is insufficient comparison among them, and it is unclear how far we have been. This work fills this gap by comparing the aforementioned techniques. To compare them, we first need a benchmark that can estimate how a tool would perform if applied in a realistic setting today. Thus, we first investigated potential biases that affect the fair comparison of the accuracy of DBRD techniques. Our experiments suggest that data age and issue tracking system choice cause a significant …


Spatial & Temporal Agnostic Deep-Learning Based Radio Fingerprinting, Fahmida Afrin Jul 2023

Spatial & Temporal Agnostic Deep-Learning Based Radio Fingerprinting, Fahmida Afrin

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Radio fingerprinting is a technique that validates wireless devices based on their unique radio frequency (RF) signals. This method is highly feasible because RF signals carry distinct hardware variations introduced during manufacturing. The security and trustworthiness of current and future wireless networks heavily rely on radio fingerprinting. In addition to identifying individual devices, it can also differentiate mission-critical targets. Despite significant efforts in the literature, existing radio fingerprinting methods require improved robustness, scalability, and resilience. This study focuses on the challenges of spatial-temporal variations in the wireless environment. Many prior approaches overlook the complex numerical structure of the in-phase and …


Boosting Adversarial Training Using Robust Selective Data Augmentation, Bader Rasheed, Asad Masood Khattak, Adil Khan, Stanislav Protasov, Muhammad Ahmad May 2023

Boosting Adversarial Training Using Robust Selective Data Augmentation, Bader Rasheed, Asad Masood Khattak, Adil Khan, Stanislav Protasov, Muhammad Ahmad

All Works

Artificial neural networks are currently applied in a wide variety of fields, and they are near to achieving performance similar to humans in many tasks. Nevertheless, they are vulnerable to adversarial attacks in the form of a small intentionally designed perturbation, which could lead to misclassifications, making these models unusable, especially in applications where security is critical. The best defense against these attacks, so far, is adversarial training (AT), which improves the model’s robustness by augmenting the training data with adversarial examples. In this work, we show that the performance of AT can be further improved by employing the neighborhood …


Automated Classification Of Pectinodon Bakkeri Teeth Images Using Machine Learning, Jacob A. Bahn Apr 2023

Automated Classification Of Pectinodon Bakkeri Teeth Images Using Machine Learning, Jacob A. Bahn

MS in Computer Science Project Reports

Microfossil dinosaur teeth are studied by paleontologists in order to better under- stand dinosaurs. Currently, tooth classification is a long, manual, error-ridden process. Deep learning offers a solution that allows for an automated way of classifying images of these microfossil teeth. In this thesis, we aimed to use deep learning in order to develop an automated approach for classifying images of Pectinodon bakkeri teeth. The proposed model was trained using a custom topology and it classified the images based on clusters created via K-Means. The model had an accuracy of 71%, a precision of 71%, a recall of 70.5%, and …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Improving Automatic Melanoma Diagnosis Using Deep Learning-Based Segmentation Of Irregular Networks, Anand K. Nambisan, Akanksha Maurya, Norsang Lama, Thanh Phan, Gehana Patel, Keith Miller, Binita Lama, Jason Hagerty, Ronald Stanley, William V. Stoecker Feb 2023

Improving Automatic Melanoma Diagnosis Using Deep Learning-Based Segmentation Of Irregular Networks, Anand K. Nambisan, Akanksha Maurya, Norsang Lama, Thanh Phan, Gehana Patel, Keith Miller, Binita Lama, Jason Hagerty, Ronald Stanley, William V. Stoecker

Chemistry Faculty Research & Creative Works

Deep Learning Has Achieved Significant Success in Malignant Melanoma Diagnosis. These Diagnostic Models Are Undergoing a Transition into Clinical Use. However, with Melanoma Diagnostic Accuracy in the Range of Ninety Percent, a Significant Minority of Melanomas Are Missed by Deep Learning. Many of the Melanomas Missed Have Irregular Pigment Networks Visible using Dermoscopy. This Research Presents an Annotated Irregular Network Database and Develops a Classification Pipeline that Fuses Deep Learning Image-Level Results with Conventional Hand-Crafted Features from Irregular Pigment Networks. We Identified and Annotated 487 Unique Dermoscopic Melanoma Lesions from Images in the ISIC 2019 Dermoscopic Dataset to Create a …


Towards A Novel Approach For Smart Agriculture Predictability, Rima Grati, Myriam Aloulou, Khouloud Boukadi Jan 2023

Towards A Novel Approach For Smart Agriculture Predictability, Rima Grati, Myriam Aloulou, Khouloud Boukadi

All Works

No abstract provided.


Champions For Social Good: How Can We Discover Social Sentiment And Attitude-Driven Patterns In Prosocial Communication?, Raghava Rao Mukkamala, Robert J. Kauffman, Helle Zinner Henriksen Jan 2023

Champions For Social Good: How Can We Discover Social Sentiment And Attitude-Driven Patterns In Prosocial Communication?, Raghava Rao Mukkamala, Robert J. Kauffman, Helle Zinner Henriksen

Research Collection School Of Computing and Information Systems

The UN High Commissioner on Refugees (UNHCR) is pursuing a social media strategy to inform people about displaced populations and refugee emergencies. It is actively engaging public figures to increase awareness through its prosocial communications and improve social informedness and support for policy changes in its services. We studied the Twitter communications of UNHCR social media champions and investigated their role as high-profile influencers. In this study, we offer a design science research and data analytics framework and propositions based on the social informedness theory we propose in this paper to assess communication about UNHCR’s mission. Two variables—refugee-emergency and champion …


Rafid: A Lightweight Approach To Radio Frequency Interference Detection In Time Domain Using Lstm And Statistical Analysis, Luke A. Smith, Vishesh Kumar Tanwar, Maciej Jan Zawodniok, Sanjay Kumar Madria Jan 2023

Rafid: A Lightweight Approach To Radio Frequency Interference Detection In Time Domain Using Lstm And Statistical Analysis, Luke A. Smith, Vishesh Kumar Tanwar, Maciej Jan Zawodniok, Sanjay Kumar Madria

Electrical and Computer Engineering Faculty Research & Creative Works

Recently, the utilization of Radio Frequency (RF) devices has increased exponentially over numerous vertical platforms. This rise has led to an abundance of Radio Frequency Interference (RFI) continues to plague RF systems today. The continued crowding of the RF spectrum makes RFI efficient and lightweight mitigation critical. Detecting and localizing the interfering signals is the foremost step for mitigating RFI concerns. Addressing these challenges, we propose a novel and lightweight approach, namely RaFID, to detect and locate the RFI by incorporating deep neural networks (DNNs) and statistical analysis via batch-wise mean aggregation and standard deviation (SD) calculations. RaFID investigates the …


Attention In The Faithful Self-Explanatory Nlp Models, Mostafa Rafaiejokandan Dec 2022

Attention In The Faithful Self-Explanatory Nlp Models, Mostafa Rafaiejokandan

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Deep neural networks (DNNs) can perform impressively in many natural language processing (NLP) tasks, but their black-box nature makes them inherently challenging to explain or interpret. Self-Explanatory models are a new approach to overcoming this challenge, generating explanations in human-readable languages besides task objectives like answering questions. The main focus of this thesis is the explainability of NLP tasks, as well as how attention methods can help enhance performance. Three different attention modules are proposed, SimpleAttention, CrossSelfAttention, and CrossModality. It also includes a new dataset transformation method called Two-Documents that converts every dataset into two separate documents required by the …


Bevers: A General, Simple, And Performant Framework For Automatic Fact Verification, Mitchell Dehaven Dec 2022

Bevers: A General, Simple, And Performant Framework For Automatic Fact Verification, Mitchell Dehaven

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Fact verification has become an important process, primarily done manually by humans, to verify the authenticity of claims and statements made online. Increasingly, social media companies have utilized human effort to debunk false claims on their platforms, opting to either tag the content as misleading or false, or removing it entirely to combat misinformation on their sites. In tandem, the field of automatic fact verification has become a subject of focus among the natural language processing (NLP) community, spawning new datasets and research. The most popular dataset is the Fact Extraction and VERification (FEVER) dataset. In this thesis an end-to-end …


Computer Vision Based Analysis Of Crowd Behavior For Efficient Video Surveillance In Public Places, Abhilash K. Pai Nov 2022

Computer Vision Based Analysis Of Crowd Behavior For Efficient Video Surveillance In Public Places, Abhilash K. Pai

Technical Collection

Automated crowd behavior analysis and monitoring is a challenging task due to the unpredictable nature of the crowd, making it an open problem. Within this domain, we are focusing on two research problems which deal with low to mid-level analysis of crowd videos. The first problem focuses on how to effectively utilize the readily available compressed motion vector information in an input crowd video to model the motion of the crowd and perform crowd behavior analysis in varying densities of crowds. For this purpose, we consider a mid-level crowd scene analysis task called as motion pattern segmentation. The second research …


Overview Of The Clpsych 2022 Shared Task: Capturing Moments Of Change In Longitudinal User Posts, Adam Tsakalidis, Jenny Chim, Iman Munire Bilal, Ayah Zirikly, Dana Atzil-Slonim, Federico Nanni, Philip Resnik, Manas Gaur, Kaushik Roy, Becky Inkster, Jeff Leintz, Maria Liakata Oct 2022

Overview Of The Clpsych 2022 Shared Task: Capturing Moments Of Change In Longitudinal User Posts, Adam Tsakalidis, Jenny Chim, Iman Munire Bilal, Ayah Zirikly, Dana Atzil-Slonim, Federico Nanni, Philip Resnik, Manas Gaur, Kaushik Roy, Becky Inkster, Jeff Leintz, Maria Liakata

Publications

We provide an overview of the CLPsych 2022 Shared Task, which focusses on the automatic identification of Moments of Change in longitudinal posts by individuals on social media and its connection with information regarding mental health . This year's task introduced the notion of longitudinal modelling of the text generated by an individual online over time, along with appropriate temporally sensitive evaluation metrics. The Shared Task consisted of two subtasks: (a) the main task of capturing changes in an individual's mood (drastic changes-`Switches'- and gradual changes -`Escalations'- on the basis of textual content shared online; and subsequently (b) the sub-task …


Towards Understanding The Faults Of Javascript-Based Deep Learning Systems, Lili Quan, Qianyu Guo, Xiaofei Xie, Sen Chen, Xiaohong Li, Yang Liu Oct 2022

Towards Understanding The Faults Of Javascript-Based Deep Learning Systems, Lili Quan, Qianyu Guo, Xiaofei Xie, Sen Chen, Xiaohong Li, Yang Liu

Research Collection School Of Computing and Information Systems

Quality assurance is of great importance for deep learning (DL) systems, especially when they are applied in safety-critical applications. While quality issues of native DL applications have been extensively analyzed, the issues of JavaScript-based DL applications have never been systematically studied. Compared with native DL applications, JavaScript-based DL applications can run on major browsers, making the platform- and device-independent. Specifically, the quality of JavaScript-based DL applications depends on the 3 parts: the application, the third-party DL library used and the underlying DL framework (e.g., TensorFlow.js), called JavaScript-based DL system. In this paper, we conduct the first empirical study on the …


Deep Learning For Coverage-Guided Fuzzing: How Far Are We?, Siqi Li, Xiaofei Xie, Yun Lin, Yuekang Li, Ruitao Feng, Xiaohong Li, Weimin Ge, Jin Song Dong Sep 2022

Deep Learning For Coverage-Guided Fuzzing: How Far Are We?, Siqi Li, Xiaofei Xie, Yun Lin, Yuekang Li, Ruitao Feng, Xiaohong Li, Weimin Ge, Jin Song Dong

Research Collection School Of Computing and Information Systems

Fuzzing is a widely-used software vulnerability discovery technology, many of which are optimized using coverage-feedback. Recently, some techniques propose to train deep learning (DL) models to predict the branch coverage of an arbitrary input owing to its always-available gradients etc. as a guide. Those techniques have proved their success in improving coverage and discovering bugs under different experimental settings. However, DL models, usually as a magic black-box, are notoriously lack of explanation. Moreover, their performance can be sensitive to the collected runtime coverage information for training, indicating potentially unstable performance. In this work, we conduct a systematic empirical study on …


Sel-Covidnet: An Intelligent Application For The Diagnosis Of Covid-19 From Chest X-Rays And Ct-Scans, Ahmad Al Smadi, Ahed Abugabah, Ahmad Mohammad Al-Smadi, Sultan Almotairi Aug 2022

Sel-Covidnet: An Intelligent Application For The Diagnosis Of Covid-19 From Chest X-Rays And Ct-Scans, Ahmad Al Smadi, Ahed Abugabah, Ahmad Mohammad Al-Smadi, Sultan Almotairi

All Works

COVID-19 detection from medical imaging is a difficult challenge that has piqued the interest of experts worldwide. Chest X-rays and computed tomography (CT) scanning are the essential imaging modalities for diagnosing COVID-19. All researchers focus their efforts on developing viable methods and rapid treatment procedures for this pandemic. Fast and accurate automated detection approaches have been devised to alleviate the need for medical professionals. Deep Learning (DL) technologies have successfully recognized COVID-19 situations. This paper proposes a developed set of nine deep learning models for diagnosing COVID-19 based on transfer learning and implementation in a novel architecture (SEL-COVIDNET). In which …


Holistic Combination Of Structural And Textual Code Information For Context Based Api Recommendation, Chi Chen, Xin Peng, Zhengchang Xing, Jun Sun, Xin Wang, Yifan Zhao, Wenyun Zhao Aug 2022

Holistic Combination Of Structural And Textual Code Information For Context Based Api Recommendation, Chi Chen, Xin Peng, Zhengchang Xing, Jun Sun, Xin Wang, Yifan Zhao, Wenyun Zhao

Research Collection School Of Computing and Information Systems

Context based API recommendation is an important way to help developers find the needed APIs effectively and efficiently. For effective API recommendation, we need not only a joint view of both structural and textual code information, but also a holistic view of correlated API usage in control and data flow graph as a whole. Unfortunately, existing API recommendation methods exploit structural or textual code information separately. In this work, we propose a novel API recommendation approach called APIRec-CST (API Recommendation by Combining Structural and Textual code information). APIRec-CST is a deep learning model that combines the API usage with the …


Cross-Lingual Transfer Learning For Statistical Type Inference, Zhiming Li, Xiaofei Xie, Haoliang Li, Zhengzi Xu, Yi Li, Yang Liu Jul 2022

Cross-Lingual Transfer Learning For Statistical Type Inference, Zhiming Li, Xiaofei Xie, Haoliang Li, Zhengzi Xu, Yi Li, Yang Liu

Research Collection School Of Computing and Information Systems

Hitherto statistical type inference systems rely thoroughly on supervised learning approaches, which require laborious manual effort to collect and label large amounts of data. Most Turing-complete imperative languages share similar control- and data-flow structures, which make it possible to transfer knowledge learned from one language to another. In this paper, we propose a cross-lingual transfer learning framework, Plato, for statistical type inference, which allows us to leverage prior knowledge learned from the labeled dataset of one language and transfer it to the others, e.g., Python to JavaScript, Java to JavaScript, etc. Plato is powered by a novel kernelized attention mechanism …


Anomaly Detection In Sequential Data: A Deep Learning-Based Approach, Jayesh Soni Jun 2022

Anomaly Detection In Sequential Data: A Deep Learning-Based Approach, Jayesh Soni

FIU Electronic Theses and Dissertations

Anomaly Detection has been researched in various domains with several applications in intrusion detection, fraud detection, system health management, and bio-informatics. Conventional anomaly detection methods analyze each data instance independently (univariate or multivariate) and ignore the sequential characteristics of the data. Anomalies in the data can be detected by grouping the individual data instances into sequential data and hence conventional way of analyzing independent data instances cannot detect anomalies. Currently: (1) Deep learning-based algorithms are widely used for anomaly detection purposes. However, significant computational overhead time is incurred during the training process due to static constant batch size and learning …


Machine Learning With Kay, Lasith Niroshan, James Carswell Jun 2022

Machine Learning With Kay, Lasith Niroshan, James Carswell

Conference Papers

Computational power is very important when training Deep Learning (DL) models with large amounts of data (Wooldridge, 2021). Hence, High-Performance Computing (HPC) can be leveraged to reduce computational cost, and the Irish Centre for High-End Computing (ICHEC) provides significant infrastructure and services for research and development to both academia and industry. A portion of ICHEC's HPC system has been allocated for institutional access, and this paper presents a case study of how to use Kay (Ireland's national supercomputer) in the remote sensing domain. Specifically, this study uses clusters of Kay Graphics Processing Units (GPUs) for training DL models to extract …


Deep Learning For Person Re-Identification: A Survey And Outlook, Mang Ye, Jianbing Shen, Gaojie Lin, Tao Xiang, Ling Shao, Steven C. H. Hoi Jun 2022

Deep Learning For Person Re-Identification: A Survey And Outlook, Mang Ye, Jianbing Shen, Gaojie Lin, Tao Xiang, Ling Shao, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Person re-identification (Re-ID) aims at retrieving a person of interest across multiple non-overlapping cameras. With the advancement of deep neural networks and increasing demand of intelligent video surveillance, it has gained significantly increased interest in the computer vision community. By dissecting the involved components in developing a person Re-ID system, we categorize it into the closed-world and open-world settings. We first conduct a comprehensive overview with in-depth analysis for closed-world person Re-ID from three different perspectives, including deep feature representation learning, deep metric learning and ranking optimization. With the performance saturation under closed-world setting, the research focus for person Re-ID …