作者: 蟄伏 時間: 2025-3-21 22:10
Smart Cities with Deep Edgesreported data to remove identifiable information to keep the user anonymous before sending it to the cloud. This multi-stage analytics allows for initial urban reasoning on a city wide scale for deriving context information with additional analytics in the cloud focusing on certain domain challenges作者: craven 時間: 2025-3-22 01:57 作者: 過剩 時間: 2025-3-22 05:09
Extending Support Vector Regression to Constraint Optimization: Application to the Reduction of Poteaper, we propose an approach using support vector machine for regression to select not only the geographic areas but also the number of to-be-added nurses in these areas for the biggest reduction of potentially avoidable hospitalizations. In this approach, besides considering all the potential facto作者: 羽毛長成 時間: 2025-3-22 12:10
SALER: A Data Science Solution to Detect and Prevent Corruption in Public Administrationget and cash management, public service accounts, salaries, disbursement, grants, subsidies, etc. The project has already resulted in an initial prototype (.) successfully tested by the governing bodies of Valencia, in Spain.作者: 人工制品 時間: 2025-3-22 13:38 作者: 人工制品 時間: 2025-3-22 17:22
Agustín Vicente,Fernando Martínez-Manriquer detection technique on MNIST and CIFAR-10, achieving a high success rate for various adversarial attacks including FGSM, DeepFool, CW, PGD. We also show that training the detector model with attribution of adversarial examples generated even from a simple attack like FGSM further increases the det作者: DAUNT 時間: 2025-3-22 23:30 作者: 食品室 時間: 2025-3-23 02:36
3. Systems with Slowly Varying Coefficients,he state of Maharashtra (India) to predict and visualize urban LULC changes over the past 14 years. We observe that the HMM integrated model has improved prediction accuracy as compared to the corresponding MC integrated model.作者: 專心 時間: 2025-3-23 09:20 作者: 即席 時間: 2025-3-23 13:07 作者: 舊石器時代 時間: 2025-3-23 16:23
Strategische Allianzen und Akquisitionen,ee established criteria of quality: cardinality, the spread of the solutions, spacing, and the resulting score and number of turns. Although all four algorithms show different strengths, .-. is selected to be the most suitable for this problem. Ultimately, the simulation incorporates the model and t作者: neologism 時間: 2025-3-23 19:58
ECML PKDD 2018 Workshops978-3-030-13453-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: detach 時間: 2025-3-24 01:29 作者: 淡紫色花 時間: 2025-3-24 06:10
978-3-030-13452-5Springer Nature Switzerland AG 2019作者: Contort 時間: 2025-3-24 06:33 作者: 思想靈活 時間: 2025-3-24 13:25 作者: growth-factor 時間: 2025-3-24 16:35 作者: SENT 時間: 2025-3-24 22:31 作者: Ablation 時間: 2025-3-24 23:43 作者: cultivated 時間: 2025-3-25 07:16 作者: headlong 時間: 2025-3-25 11:01
Fernanda Ferreira,Hossein Karimiexperiments with imagery from Mapillary crowdsourcing platform demonstrate that with increasing amount of images, the detection accuracy is getting close to that obtained with high-end street level data. Nevertheless, due to excessive camera position noise, the estimated geolocation (position) of th作者: tenosynovitis 時間: 2025-3-25 14:45
Lebendige Sonne, Ursprung des Lebens,stantial costs due to patient treatments. In addition, some recent studies have suggested that increasing the number of nurses in selected geographic areas could lead to the reduction of the rates of potentially avoidable hospitalizations in those areas. In the meantime, health authorities are highl作者: 口訣法 時間: 2025-3-25 18:17
Der egozentrische Selbstdarsteller,lic administration. The main contribution of the project is the development of a data science-based solution to systematically assist managing authorities to increase the effectiveness and efficiency when analysing fraud and corruption cases. The tool combines descriptive and predictive machine lear作者: fluffy 時間: 2025-3-25 21:54
Strategische Allianzen und Akquisitionen,s an optimisation agent that could help in decision making. This paper describes the creation of an open-source simulation based on an existing Dutch liveability score with a built-in AI module. Features are selected using feature engineering and Random Forests. Then, a modified scoring function is 作者: 提名的名單 時間: 2025-3-26 04:01
W. G. Chace,M. A. Levine,C. V. Fishex, affect the bottom of the socio-economic pyramid, and have wider spread across populations and geographies with resource constraints. In this paper we identify challenges and propose certain design considerations to guide development of machine learning based data-driven applications for addressi作者: handle 時間: 2025-3-26 07:02 作者: Forsake 時間: 2025-3-26 09:26
Shipboard Sources of Magnetic Field,tudies how an adversary could corrupt the PC structure learning algorithm by inserting fake data. We propose a novel measure of strength of links for Bayesian networks. We show how this measure can be used to attack the PC algorithm. We identify two subclasses of data poisoning attacks: (1) model in作者: FLIRT 時間: 2025-3-26 14:31
Constraints on VLIW architectures,xistence of adversarial examples has raised suspicions regarding the generalization capabilities of neural networks. In this work, we focus on the weight matrix learned by the neural networks and hypothesize that an ill-conditioned weight matrix is one of the contributing factors in the neural netwo作者: 哪有黃油 時間: 2025-3-26 20:48 作者: Ondines-curse 時間: 2025-3-26 23:08 作者: Malcontent 時間: 2025-3-27 01:10
Label Sanitization Against Label Flipping Poisoning Attacks can inject malicious data in the training dataset to subvert the learning process, compromising the performance of the algorithm producing errors in a targeted or an indiscriminate way. Label flipping attacks are a special case of data poisoning, where the attacker can control the labels assigned t作者: humectant 時間: 2025-3-27 07:53
Limitations of the Lipschitz Constant as a Defense Against Adversarial Examplesrecently proposed methods for computing the Lipschitz constant. We show that the Lipschitz constant may indeed enable adversarially robust neural networks. However, the methods currently employed for computing it suffer from theoretical and practical limitations. We argue that addressing this shortc作者: 強有力 時間: 2025-3-27 12:19
Understanding Adversarial Space Through the Lens of Attributionaltered original image, neural networks behave abnormally on these modified images. Image attribution methods highlight regions of input image important for the model’s prediction. We believe that the domains of adversarial generation and attribution are closely related and we support this claim by 作者: 聽覺 時間: 2025-3-27 16:46
Detecting Potential Local Adversarial Examples for Human-Interpretable Defenseulate specific variables, such as the age or the salary, in order to get better chances of approval. In this ongoing work, we propose to discuss, with a first proposition, the issue of detecting a potential local adversarial example on classical tabular data by providing to a human expert the locall作者: Canary 時間: 2025-3-27 18:18
Smart Cities with Deep Edges in IoT and smart cities. This will enable a considerable increase in the analytics and urban reasoning that can take place at the edge of the network. The end-to-end latency for these models will also be reduced due to the physical proximity of the edge devices, which allows reasoning one hop away 作者: Conduit 時間: 2025-3-28 00:29 作者: ANT 時間: 2025-3-28 05:00
Object Geolocation from Crowdsourced Street Level Imageryexperiments with imagery from Mapillary crowdsourcing platform demonstrate that with increasing amount of images, the detection accuracy is getting close to that obtained with high-end street level data. Nevertheless, due to excessive camera position noise, the estimated geolocation (position) of th作者: 山間窄路 時間: 2025-3-28 07:59
Extending Support Vector Regression to Constraint Optimization: Application to the Reduction of Potestantial costs due to patient treatments. In addition, some recent studies have suggested that increasing the number of nurses in selected geographic areas could lead to the reduction of the rates of potentially avoidable hospitalizations in those areas. In the meantime, health authorities are highl作者: committed 時間: 2025-3-28 13:58 作者: transdermal 時間: 2025-3-28 17:39
MaaSim: A Liveability Simulation for Improving the Quality of Life in Citiess an optimisation agent that could help in decision making. This paper describes the creation of an open-source simulation based on an existing Dutch liveability score with a built-in AI module. Features are selected using feature engineering and Random Forests. Then, a modified scoring function is 作者: 廣口瓶 時間: 2025-3-28 19:43
Designing Data-Driven Solutions to Societal Problems: Challenges and Approachesex, affect the bottom of the socio-economic pyramid, and have wider spread across populations and geographies with resource constraints. In this paper we identify challenges and propose certain design considerations to guide development of machine learning based data-driven applications for addressi作者: Epithelium 時間: 2025-3-29 01:50
Host Based Intrusion Detection System with Combined CNN/RNN Model avoid the impact of cybercrimes. Host based intrusion detection systems help to protect systems from various kinds of malicious cyber attacks. One approach is to determine normal behaviour of a system based on sequences of system calls made by processes in the system?[.]. This paper describes a com作者: 內行 時間: 2025-3-29 03:13 作者: sigmoid-colon 時間: 2025-3-29 09:06 作者: 異端 時間: 2025-3-29 15:05
Pseudo-Random Number Generation Using Generative Adversarial Networksy proposing the use of generative adversarial networks (GAN) to train a neural network to behave as a PRNG. Furthermore, we showcase a number of interesting modifications to the standard GAN architecture. The most significant is partially concealing the output of the GAN’s generator, and training th作者: FLACK 時間: 2025-3-29 17:17 作者: 天氣 時間: 2025-3-29 22:42
0302-9743 .SoGood 2018: Third Workshop on Data Science for Social Good..IWAISe 2018: Second International Workshop on Artificial Intelligence in Security.Green Data Mining 2018: First International Workshop on Energy Efficient Data Mining and Knowledge Discovery.978-3-030-13452-5978-3-030-13453-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Veneer 時間: 2025-3-30 01:07 作者: Pseudoephedrine 時間: 2025-3-30 07:22
Thyago S. P. C. Duque,David E. Goldbergonnected neural network to produce pseudo-random number sequences with good statistical properties. At best, subjected to the NIST test suite, the trained generator passed around 99% of test instances and 98% of overall tests, outperforming a number of standard non-cryptographic PRNGs.作者: 性滿足 時間: 2025-3-30 09:49
Host Based Intrusion Detection System with Combined CNN/RNN Modelproved anomaly IDS. Intrusion Detection is based on determining the probability of a particular call sequence occurring from a language model trained on normal call sequences from the ADFA Data set of system call traces?[.]. Sequences with a low probability of occurring are classified as an anomaly.作者: GLEAN 時間: 2025-3-30 13:52 作者: Wernickes-area 時間: 2025-3-30 19:53 作者: CYN 時間: 2025-3-30 23:03
Neural Networks in an Adversarial Setting and Ill-Conditioned Weight Spacerk’s susceptibility towards adversarial examples. For ensuring that the learned weight matrix’s condition number remains sufficiently low, we suggest using an orthogonal regularizer. We show that this indeed helps in increasing the adversarial accuracy on MNIST and F-MNIST datasets.