Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2024
MILE: A Mutation Testing Framework of In-Context Learning Systems
Dependable Software Engineering. Theories, Tools, and ApplicationsPages 327–343https://doi.org/10.1007/978-981-96-0602-3_18AbstractIn-context Learning (ICL) has achieved notable success in large language models (LLMs) applications. By adding only a few input-output pairs demonstrating a new task, LLMs can efficiently learn the task during inference without modifying their ...
- research-articleNovember 2024
Resource Allocation and Deep Learning-Based Joint Detection Scheme in Satellite NOMA Systems
IEEE Transactions on Wireless Communications (TWC), Volume 24, Issue 1Pages 526–539https://doi.org/10.1109/TWC.2024.3496089To overcome the challenges of complex time-varying satellite channels and severe inter-user interference in non-orthogonal multiple access (NOMA), rational power allocation and accurate multi-user joint detection methods are essential. In this paper, a ...
- research-articleNovember 2024
Linkable and traceable anonymous authentication with fine-grained access control
Frontiers of Computer Science: Selected Publications from Chinese Universities (FCS), Volume 19, Issue 2https://doi.org/10.1007/s11704-023-3225-3AbstractTo prevent misuse of privacy, numerous anonymous authentication schemes with linkability and/or traceability have been proposed to ensure different types of accountabilities. Previous schemes cannot simultaneously achieve public linking and ...
- research-articleNovember 2024
MixRGBX: Universal multi-modal tracking with symmetric mixed attention
AbstractThe multi-modal tracker realizes robust tracking by complementing the unique information between modalities. However, there is still a serious data deficiency problem in multi-modal tracking, which leads to inadequate learning of fusion modules ...
Highlights- We propose a universal multi-modal tracking framework, named MixRGBX.
- We introduce a symmetric complementary fusion module for arbitrary modality fusion.
- Our model has achieved state-of-the-art results in various multi-modal ...
-
- research-articleNovember 2024
Inverse distance weight-assisted particle swarm optimized indoor localization
- Jingxue Bi,
- Jianhui Wang,
- Hongji Cao,
- Guobiao Yao,
- Yunjia Wang,
- Zengke Li,
- Meng Sun,
- Hongchao Yang,
- Jie Zhen,
- Guoqiang Zheng
AbstractIndoor localization using wireless fidelity (WiFi) fingerprint has attracted considerable attention due to its extensive deployment and low cost. Most indoor fingerprint localization methods could be computationally inefficient and behave with ...
Highlights- A particle swarm optimized indoor positioning in the online stage is proposed.
- The fitness function is the sum of standard deviations between two fingerprints.
- The testing fingerprint compares with generated one by IDW, not the ...
- research-articleNovember 2024
Target speaker filtration by mask estimation for source speaker traceability in voice conversion
Engineering Applications of Artificial Intelligence (EAAI), Volume 136, Issue PBhttps://doi.org/10.1016/j.engappai.2024.109071AbstractVoice Conversion (VC) can manipulate the source speaker's identity of speech signal to make it sound like some specific target speaker, which makes it harder for a human being or a speaker verification/identification system to trace the real ...
- ArticleSeptember 2024
Optimal Solution Guided Branching Strategy for Neural Network Branch and Bound Verification
AbstractAdversarial examples reveal the vulnerability of neural networks, thereby increasing the demand for formal verification of their robustness. Verification methods employing branch and bound technique have shown excellent performance for this task ...
- research-articleJuly 2024
An attack-agnostic defense method against adversarial attacks on speaker verification by fusing downsampling and upsampling of speech signals
Information Sciences: an International Journal (ISCI), Volume 670, Issue Chttps://doi.org/10.1016/j.ins.2024.120618AbstractWith the advance of deep learning, adversarial attack and defense has becoming a hot research topic. However, existing defense methods rely on the prior knowledge of the adversarial attacks, and are also vulnerable to adaptive attacks. In this ...
Highlights- An adversarial defense framework by fusing downsampling and upsampling.
- Pairwise random downsampling to resist normal and adaptive adversarial attacks.
- A new deep learning architecture to perform speech super-resolution.
- research-articleJune 2024
Scale-aware dual-branch complex convolutional recurrent network for monaural speech enhancement
AbstractA key step to single channel speech enhancement is the orthogonal separation of speech and noise. In this paper, a dual branch complex convolutional recurrent network (DBCCRN) is proposed to separate the complex spectrograms of speech and noises ...
Highlights- A dual-branch network to estimate speech and noise simultaneously.
- Scale-aware loss to ensure speech waveforms with correct scale.
- A new evaluation metric to measure the scale error.
- The proposed method achieves state-of-the-...
- research-articleMay 2024
An Augmented Space Smoothing Method based on the Signal Space in Coherent Scenarios
Circuits, Systems, and Signal Processing (CSSP), Volume 43, Issue 9Pages 5661–5681https://doi.org/10.1007/s00034-024-02695-1AbstractIn the field of coherent direction of arrival (DOA) estimation, traditional subspace-based algorithms encounter difficulties due to the loss of rank in the signal covariance matrix. To mitigate this concern, we introduce a novel technique called ...
- research-articleMay 2024
Mindfulness and growth mindset as protective factors for the impact of media multitasking on academic performance: The mediating role of self-control
Education and Information Technologies (KLU-EAIT), Volume 29, Issue 17Pages 22841–22858https://doi.org/10.1007/s10639-024-12759-zAbstractThe negative effects of media multitasking have been addressed in previous studies, and the widespread adoption of online learning to control the outbreak of COVID-19 has further increased concerns about the media use, especially media ...
- research-articleJuly 2024
Noise-robust voice conversion using adversarial training with multi-feature decoupling
Engineering Applications of Artificial Intelligence (EAAI), Volume 131, Issue Chttps://doi.org/10.1016/j.engappai.2023.107807AbstractMost existing voice conversion methods focus primarily on separating speech content from speaker information while overlooking the decoupling of pitch information. Additionally, the quality of converted speech significantly degrades when the ...
- research-articleApril 2024
Clopper-Pearson Algorithms for Efficient Statistical Model Checking Estimation
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 7Pages 1726–1746https://doi.org/10.1109/TSE.2024.3392720Statistical model checking (SMC) is a simulation-based formal verification technique to deal with the scalability problem faced by traditional model checking. The main workflow of SMC is to perform iterative simulations. The number of simulations depends ...
- research-articleJanuary 2025
Temporal adaptive RGBT tracking with modality prompt
AAAI'24/IAAI'24/EAAI'24: Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence and Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence and Fourteenth Symposium on Educational Advances in Artificial IntelligenceArticle No.: 604, Pages 5436–5444https://doi.org/10.1609/aaai.v38i6.28352RGBT tracking has been widely used in various fields such as robotics, surveillance processing, and autonomous driving. Existing RGBT trackers fully explore the spatial information between the template and the search region and locate the target based on ...
- research-articleMarch 2024
Mutation testing of unsupervised learning systems
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 146, Issue Chttps://doi.org/10.1016/j.sysarc.2023.103050AbstractUnsupervised learning (UL) is one of the most important areas in artificial intelligence. UL systems are capable of learning patterns from unlabeled data and playing an increasingly critical role in many fields. Therefore, more and more attention ...
- research-articleFebruary 2024
Secure and efficient multi-key aggregation for federated learning
Information Sciences: an International Journal (ISCI), Volume 654, Issue Chttps://doi.org/10.1016/j.ins.2023.119830AbstractFederated learning (FL) is a distributed machine learning framework that aims to provide privacy for local datasets while learning a global machine learning model. However, the updates exchanged in FL may indirectly reveal information about the ...
- research-articleMay 2024
Innovation of Practical Training Mode in Special Industry Education Based on Intelligent Base Industry-Teaching Integration
ICIEAI '23: Proceedings of the 2023 International Conference on Information Education and Artificial IntelligencePages 728–732https://doi.org/10.1145/3660043.3660173The rapid evolution of society, changing industrial structures, and the advancement of intelligent technologies pose new challenges and opportunities for specialty colleges and universities in nurturing talent. This paper firstly introduces the status ...
- research-articleMarch 2024
Attribute-based anonymous credential: Delegation, traceability, and revocation
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 237, Issue Chttps://doi.org/10.1016/j.comnet.2023.110086AbstractAttribute-based anonymous credential schemes have been envisioned with the motivation to allow users to prove the possession of their attributes interactively with service providers anonymously. So far, three major properties: delegation, ...