首页 > 最新文献

Frontiers of Computer Science最新文献

英文 中文
Constrained clustering with weak label prior 弱标签先验的受限聚类
IF 4.2 3区 计算机科学 Q1 Mathematics Pub Date : 2023-12-13 DOI: 10.1007/s11704-023-3355-7
Jing Zhang, Ruidong Fan, Hong Tao, Jiacheng Jiang, Chenping Hou

Clustering is widely exploited in data mining. It has been proved that embedding weak label prior into clustering is effective to promote its performance. Previous researches mainly focus on only one type of prior. However, in many real scenarios, two kinds of weak label prior information, e.g., pairwise constraints and cluster ratio, are easily obtained or already available. How to incorporate them to improve clustering performance is important but rarely studied. We propose a novel constrained Clustering with Weak Label Prior method (CWLP), which is an integrated framework. Within the unified spectral clustering model, the pairwise constraints are employed as a regularizer in spectral embedding and label proportion is added as a constraint in spectral rotation. To approximate a variant of the embedding matrix more precisely, we replace a cluster indicator matrix with its scaled version. Instead of fixing an initial similarity matrix, we propose a new similarity matrix that is more suitable for deriving clustering results. Except for the theoretical convergence and computational complexity analyses, we validate the effectiveness of CWLP through several benchmark datasets, together with its ability to discriminate suspected breast cancer patients from healthy controls. The experimental evaluation illustrates the superiority of our proposed approach.

聚类在数据挖掘中被广泛应用。实践证明,在聚类中嵌入弱标签先验可以有效提高聚类性能。以往的研究主要只关注一种先验信息。然而,在许多实际场景中,有两种弱标签先验信息,如成对约束和聚类比率,是很容易获得或已经存在的。如何结合它们来提高聚类性能非常重要,但却很少有人研究。我们提出了一种新颖的弱标签先验约束聚类方法(CWLP),它是一个集成框架。在统一的光谱聚类模型中,配对约束被用作光谱嵌入的正则化器,标签比例被添加为光谱旋转的约束。为了更精确地近似嵌入矩阵的变体,我们用其缩放版本取代了聚类指标矩阵。我们没有固定初始相似性矩阵,而是提出了一种更适合得出聚类结果的新相似性矩阵。除了理论收敛性和计算复杂性分析外,我们还通过几个基准数据集验证了 CWLP 的有效性,以及它区分疑似乳腺癌患者和健康对照组的能力。实验评估证明了我们提出的方法的优越性。
{"title":"Constrained clustering with weak label prior","authors":"Jing Zhang, Ruidong Fan, Hong Tao, Jiacheng Jiang, Chenping Hou","doi":"10.1007/s11704-023-3355-7","DOIUrl":"https://doi.org/10.1007/s11704-023-3355-7","url":null,"abstract":"<p>Clustering is widely exploited in data mining. It has been proved that embedding weak label prior into clustering is effective to promote its performance. Previous researches mainly focus on only one type of prior. However, in many real scenarios, two kinds of weak label prior information, e.g., pairwise constraints and cluster ratio, are easily obtained or already available. How to incorporate them to improve clustering performance is important but rarely studied. We propose a novel constrained Clustering with Weak Label Prior method (CWLP), which is an integrated framework. Within the unified spectral clustering model, the pairwise constraints are employed as a regularizer in spectral embedding and label proportion is added as a constraint in spectral rotation. To approximate a variant of the embedding matrix more precisely, we replace a cluster indicator matrix with its scaled version. Instead of fixing an initial similarity matrix, we propose a new similarity matrix that is more suitable for deriving clustering results. Except for the theoretical convergence and computational complexity analyses, we validate the effectiveness of CWLP through several benchmark datasets, together with its ability to discriminate suspected breast cancer patients from healthy controls. The experimental evaluation illustrates the superiority of our proposed approach.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":null,"pages":null},"PeriodicalIF":4.2,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138579387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safeguarding text generation API’s intellectual property through meaning-preserving lexical watermarks 通过意义保护词汇水印保护文本生成应用程序接口的知识产权
IF 4.2 3区 计算机科学 Q1 Mathematics Pub Date : 2023-12-13 DOI: 10.1007/s11704-023-3252-0
Shiyu Zhu, Yun Li, Xiaoye Ouyang, Xiaocheng Hu, Jipeng Qiang

We aim to protect text generation APIs in this work. Previous LW methods compromised text quality and made watermarks easy to detect through error analysis due to not considering polysemy. To fit this, we propose meaning-preserving lexical substitution method that considers the target word’s correct meaning in context x. This enables high-confidence identification while making watermarks more invisible.

我们的目标是在这项工作中保护文本生成 API。以前的 LW 方法由于没有考虑多义词而影响了文本质量,并使水印很容易通过错误分析被检测出来。为了解决这个问题,我们提出了意义保护词汇替换法,这种方法会考虑目标词在上下文 x 中的正确含义。
{"title":"Safeguarding text generation API’s intellectual property through meaning-preserving lexical watermarks","authors":"Shiyu Zhu, Yun Li, Xiaoye Ouyang, Xiaocheng Hu, Jipeng Qiang","doi":"10.1007/s11704-023-3252-0","DOIUrl":"https://doi.org/10.1007/s11704-023-3252-0","url":null,"abstract":"<p>We aim to protect text generation APIs in this work. Previous LW methods compromised text quality and made watermarks easy to detect through error analysis due to not considering polysemy. To fit this, we propose meaning-preserving lexical substitution method that considers the target word’s correct meaning in context <b>x</b>. This enables high-confidence identification while making watermarks more invisible.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":null,"pages":null},"PeriodicalIF":4.2,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138581818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic similarity-based program retrieval: a multi-relational graph perspective 基于语义相似性的程序检索:多关系图的视角
IF 4.2 3区 计算机科学 Q1 Mathematics Pub Date : 2023-12-13 DOI: 10.1007/s11704-023-2678-8
Qianwen Gou, Yunwei Dong, YuJiao Wu, Qiao Ke

In this paper, we formulate the program retrieval problem as a graph similarity problem. This is achieved by first explicitly representing queries and program snippets as AMR and CPG, respectively. Then, through intra-level and inter-level attention mechanisms to infer fine-grained correspondence by propagating node correspondence along the graph edge. Moreover, such a design can learn correspondence of nodes at different levels, which were mostly ignored by previous works. Experiments have demonstrated the superiority of USRAE.

在本文中,我们将程序检索问题表述为图相似性问题。为此,我们首先将查询和程序片段分别明确表示为 AMR 和 CPG。然后,通过层内和层间关注机制,沿着图边传播节点对应关系,从而推断出细粒度的对应关系。此外,这种设计还能学习不同层次节点的对应关系,而这一点在以往的研究中大多被忽略。实验证明了 USRAE 的优越性。
{"title":"Semantic similarity-based program retrieval: a multi-relational graph perspective","authors":"Qianwen Gou, Yunwei Dong, YuJiao Wu, Qiao Ke","doi":"10.1007/s11704-023-2678-8","DOIUrl":"https://doi.org/10.1007/s11704-023-2678-8","url":null,"abstract":"<p>In this paper, we formulate the program retrieval problem as a graph similarity problem. This is achieved by first explicitly representing queries and program snippets as AMR and CPG, respectively. Then, through intra-level and inter-level attention mechanisms to infer fine-grained correspondence by propagating node correspondence along the graph edge. Moreover, such a design can learn correspondence of nodes at different levels, which were mostly ignored by previous works. Experiments have demonstrated the superiority of USRAE.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":null,"pages":null},"PeriodicalIF":4.2,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138579522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The governance technology for blockchain systems: a survey 区块链系统的治理技术:调查
IF 4.2 3区 计算机科学 Q1 Mathematics Pub Date : 2023-12-06 DOI: 10.1007/s11704-023-3113-x
Guocheng Zhu, Debiao He, Haoyang An, Min Luo, Cong Peng

After the Ethereum DAO attack in 2016, which resulted in significant economic losses, blockchain governance has become a prominent research area. However, there is a lack of comprehensive and systematic literature review on blockchain governance. To deeply understand the process of blockchain governance and provide guidance for the future design of the blockchain governance model, we provide an in-depth review of blockchain governance. In this paper, first we introduce the consensus algorithms currently used in blockchain and relate them to governance theory. Second, we present the main content of off-chain governance and investigate two well-known off-chain governance projects. Third, we investigate four common on-chain governance voting techniques, then summarize the seven attributes that the on-chain governance voting process should meet, and finally analyze four well-known on-chain governance blockchain projects based on the previous research. We hope this survey will provide an in-depth insight into the potential development direction of blockchain governance and device future research agenda.

2016年以太坊DAO攻击事件造成重大经济损失后,区块链治理成为一个突出的研究领域。然而,目前对区块链治理缺乏全面、系统的文献综述。为了深入了解区块链治理的过程,为未来区块链治理模式的设计提供指导,我们对区块链治理进行了深入的回顾。在本文中,我们首先介绍了目前在区块链中使用的共识算法,并将它们与治理理论联系起来。其次,介绍了链下治理的主要内容,并考察了两个知名的链下治理项目。第三,我们研究了四种常见的链上治理投票技术,然后总结了链上治理投票过程应该满足的七个属性,最后在前人研究的基础上分析了四个知名的链上治理区块链项目。我们希望这项调查能够深入了解区块链治理的潜在发展方向和设备未来的研究议程。
{"title":"The governance technology for blockchain systems: a survey","authors":"Guocheng Zhu, Debiao He, Haoyang An, Min Luo, Cong Peng","doi":"10.1007/s11704-023-3113-x","DOIUrl":"https://doi.org/10.1007/s11704-023-3113-x","url":null,"abstract":"<p>After the Ethereum DAO attack in 2016, which resulted in significant economic losses, blockchain governance has become a prominent research area. However, there is a lack of comprehensive and systematic literature review on blockchain governance. To deeply understand the process of blockchain governance and provide guidance for the future design of the blockchain governance model, we provide an in-depth review of blockchain governance. In this paper, first we introduce the consensus algorithms currently used in blockchain and relate them to governance theory. Second, we present the main content of off-chain governance and investigate two well-known off-chain governance projects. Third, we investigate four common on-chain governance voting techniques, then summarize the seven attributes that the on-chain governance voting process should meet, and finally analyze four well-known on-chain governance blockchain projects based on the previous research. We hope this survey will provide an in-depth insight into the potential development direction of blockchain governance and device future research agenda.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":null,"pages":null},"PeriodicalIF":4.2,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MLDA: a multi-level k-degree anonymity scheme on directed social network graphs 有向社交网络图上的多层级k度匿名方案
IF 4.2 3区 计算机科学 Q1 Mathematics Pub Date : 2023-12-04 DOI: 10.1007/s11704-023-2759-8
Yuanjing Hao, Long Li, Liang Chang, Tianlong Gu

With the emergence of network-centric data, social network graph publishing is conducive to data analysts to mine the value of social networks, analyze the social behavior of individuals or groups, implement personalized recommendations, and so on. However, published social network graphs are often subject to re-identification attacks from adversaries, which results in the leakage of users’ privacy. The k-anonymity technology is widely used in the field of graph publishing, which is quite effective to resist re-identification attacks. However, the current researches still exist some issues to be solved: the protection of directed graphs is less concerned than that of undirected graphs; the protection of graph structure is often ignored while achieving the protection of nodes’ identities; the same protection is performed for different users, which doesn’t meet the different privacy requirements of users. Therefore, to address the above issues, a multi-level k-degree anonymity (MLDA) scheme on directed social network graphs is proposed in this paper. First, node sets with different importance are divided by the firefly algorithm and constrained connectedness upper approximation, and they are performed different k-degree anonymity protection to meet the different privacy requirements of users. Second, a new graph anonymity method is proposed, which achieves the addition and removal of edges with the help of fake nodes. In addition, to improve the utility of the anonymized graph, a new edge cost criterion is proposed, which is used to select the most appropriate edge to be removed. Third, to protect the community structure of the original graph as much as possible, fake nodes contained in a same community are merged prior to fake nodes contained in different communities. Experimental results on real datasets show that the newly proposed MLDA scheme is effective to balance the privacy and utility of the anonymized graph.

随着以网络为中心的数据的出现,社交网络图发布有利于数据分析师挖掘社交网络的价值,分析个人或群体的社交行为,实施个性化推荐等。然而,公开的社交网络图经常会受到对手的再识别攻击,导致用户隐私的泄露。k-匿名技术广泛应用于图形发布领域,能够有效地抵御再识别攻击。然而,目前的研究还存在一些有待解决的问题:有向图的保护不如无向图的保护受关注;在实现节点身份保护的同时,图结构的保护往往被忽略;对不同的用户进行相同的保护,不能满足用户不同的隐私需求。因此,为了解决上述问题,本文提出了一种基于有向社交网络图的多级k度匿名(MLDA)方案。首先,采用萤火虫算法和约束连通上近似对不同重要度的节点集进行划分,并对其进行不同的k度匿名保护,以满足用户的不同隐私要求;其次,提出了一种新的图匿名方法,利用假节点实现图边的添加和删除。此外,为了提高匿名图的效用,提出了一种新的边缘代价准则,用于选择最合适的要去除的边缘。第三,为了尽可能地保护原始图的社区结构,将包含在同一社区中的假节点合并在不同社区中的假节点之前。在真实数据集上的实验结果表明,所提出的MLDA方案能够有效地平衡匿名图的隐私性和实用性。
{"title":"MLDA: a multi-level k-degree anonymity scheme on directed social network graphs","authors":"Yuanjing Hao, Long Li, Liang Chang, Tianlong Gu","doi":"10.1007/s11704-023-2759-8","DOIUrl":"https://doi.org/10.1007/s11704-023-2759-8","url":null,"abstract":"<p>With the emergence of network-centric data, social network graph publishing is conducive to data analysts to mine the value of social networks, analyze the social behavior of individuals or groups, implement personalized recommendations, and so on. However, published social network graphs are often subject to re-identification attacks from adversaries, which results in the leakage of users’ privacy. The <i>k</i>-anonymity technology is widely used in the field of graph publishing, which is quite effective to resist re-identification attacks. However, the current researches still exist some issues to be solved: the protection of directed graphs is less concerned than that of undirected graphs; the protection of graph structure is often ignored while achieving the protection of nodes’ identities; the same protection is performed for different users, which doesn’t meet the different privacy requirements of users. Therefore, to address the above issues, a multi-level <i>k</i>-degree anonymity (MLDA) scheme on directed social network graphs is proposed in this paper. First, node sets with different importance are divided by the firefly algorithm and constrained connectedness upper approximation, and they are performed different <i>k</i>-degree anonymity protection to meet the different privacy requirements of users. Second, a new graph anonymity method is proposed, which achieves the addition and removal of edges with the help of fake nodes. In addition, to improve the utility of the anonymized graph, a new edge cost criterion is proposed, which is used to select the most appropriate edge to be removed. Third, to protect the community structure of the original graph as much as possible, fake nodes contained in a same community are merged prior to fake nodes contained in different communities. Experimental results on real datasets show that the newly proposed MLDA scheme is effective to balance the privacy and utility of the anonymized graph.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":null,"pages":null},"PeriodicalIF":4.2,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CW-YOLO: joint learning for mask wearing detection in low-light conditions CW-YOLO:微光条件下口罩佩戴检测联合学习
IF 4.2 3区 计算机科学 Q1 Mathematics Pub Date : 2023-12-02 DOI: 10.1007/s11704-023-3351-y
Mingqiang Guo, Hongting Sheng, Zhizheng Zhang, Ying Huang, Xueye Chen, Cunjin Wang, Jiaming Zhang

Comprehensive comparison results on the above two datasets indicate that the detection improvements proposed in CWYOLO framework for low-light conditions are effective and can stand out among the existing excellent method. In future work, we would explore a more efficient and lightweight network architecture with group convolution to advance the mobile deployment of the detection framework.

在上述两个数据集上的综合对比结果表明,CWYOLO框架在弱光条件下的检测改进是有效的,可以在现有的优秀方法中脱颖而出。在未来的工作中,我们将探索一种更高效、更轻量级的网络架构,利用群卷积来推进检测框架的移动部署。
{"title":"CW-YOLO: joint learning for mask wearing detection in low-light conditions","authors":"Mingqiang Guo, Hongting Sheng, Zhizheng Zhang, Ying Huang, Xueye Chen, Cunjin Wang, Jiaming Zhang","doi":"10.1007/s11704-023-3351-y","DOIUrl":"https://doi.org/10.1007/s11704-023-3351-y","url":null,"abstract":"<p>Comprehensive comparison results on the above two datasets indicate that the detection improvements proposed in CWYOLO framework for low-light conditions are effective and can stand out among the existing excellent method. In future work, we would explore a more efficient and lightweight network architecture with group convolution to advance the mobile deployment of the detection framework.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":null,"pages":null},"PeriodicalIF":4.2,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alignment efficient image-sentence retrieval considering transferable cross-modal representation learning 考虑可转移跨模态表示学习的对齐高效图像句子检索
IF 4.2 3区 计算机科学 Q1 Mathematics Pub Date : 2023-12-02 DOI: 10.1007/s11704-023-3186-6
Yang Yang, Jinyi Guo, Guangyu Li, Lanyu Li, Wenjie Li, Jian Yang

Traditional image-sentence cross-modal retrieval methods usually aim to learn consistent representations of heterogeneous modalities, thereby to search similar instances in one modality according to the query from another modality in result. The basic assumption behind these methods is that parallel multi-modal data (i.e., different modalities of the same example are aligned) can be obtained in prior. In other words, the image-sentence cross-modal retrieval task is a supervised task with the alignments as ground-truths. However, in many real-world applications, it is difficult to realign a large amount of parallel data for new scenarios due to the substantial labor costs, leading the non-parallel multi-modal data and existing methods cannot be used directly. On the other hand, there actually exists auxiliary parallel multi-modal data with similar semantics, which can assist the non-parallel data to learn the consistent representations. Therefore, in this paper, we aim at “Alignment Efficient Image-Sentence Retrieval” (AEIR), which recurs to the auxiliary parallel image-sentence data as the source domain data, and takes the non-parallel data as the target domain data. Unlike single-modal transfer learning, AEIR learns consistent image-sentence cross-modal representations of target domain by transferring the alignments of existing parallel data. Specifically, AEIR learns the image-sentence consistent representations in source domain with parallel data, while transferring the alignment knowledge across domains by jointly optimizing a novel designed cross-domain cross-modal metric learning based constraint with intra-modal domain adversarial loss. Consequently, we can effectively learn the consistent representations for target domain considering both the structure and semantic transfer. Furthermore, extensive experiments on different transfer scenarios validate that AEIR can achieve better retrieval results comparing with the baselines.

传统的图像-句子跨模态检索方法通常旨在学习异构模态的一致表示,从而根据结果中来自另一模态的查询来搜索一个模态中的相似实例。这些方法背后的基本假设是可以预先获得并行多模态数据(即同一示例的不同模态对齐)。换句话说,图像-句子跨模态检索任务是一个以对齐为基础事实的监督任务。然而,在许多实际应用中,由于大量的并行数据难以重新调整到新的场景,导致非并行多模态数据和现有方法无法直接使用。另一方面,实际上存在语义相似的辅助并行多模态数据,可以帮助非并行数据学习一致的表示。因此,本文以“对齐高效图像句子检索”(AEIR)为研究目标,即以辅助的并行图像句子数据为源域数据,以非并行数据为目标域数据。与单模态迁移学习不同,AEIR通过转移现有并行数据的对齐来学习目标域一致的图像-句子跨模态表示。具体来说,AEIR利用并行数据在源域中学习图像-句子一致表示,同时通过联合优化设计的基于模内域对抗损失的跨域跨模态度量学习约束,跨域传递对齐知识。因此,在考虑结构和语义迁移的情况下,我们可以有效地学习目标域的一致表示。此外,在不同传输场景下的大量实验验证了与基线相比,AEIR可以获得更好的检索结果。
{"title":"Alignment efficient image-sentence retrieval considering transferable cross-modal representation learning","authors":"Yang Yang, Jinyi Guo, Guangyu Li, Lanyu Li, Wenjie Li, Jian Yang","doi":"10.1007/s11704-023-3186-6","DOIUrl":"https://doi.org/10.1007/s11704-023-3186-6","url":null,"abstract":"<p>Traditional image-sentence cross-modal retrieval methods usually aim to learn consistent representations of heterogeneous modalities, thereby to search similar instances in one modality according to the query from another modality in result. The basic assumption behind these methods is that parallel multi-modal data (i.e., different modalities of the same example are aligned) can be obtained in prior. In other words, the image-sentence cross-modal retrieval task is a supervised task with the alignments as ground-truths. However, in many real-world applications, it is difficult to realign a large amount of parallel data for new scenarios due to the substantial labor costs, leading the non-parallel multi-modal data and existing methods cannot be used directly. On the other hand, there actually exists auxiliary parallel multi-modal data with similar semantics, which can assist the non-parallel data to learn the consistent representations. Therefore, in this paper, we aim at “Alignment Efficient Image-Sentence Retrieval” (AEIR), which recurs to the auxiliary parallel image-sentence data as the source domain data, and takes the non-parallel data as the target domain data. Unlike single-modal transfer learning, AEIR learns consistent image-sentence cross-modal representations of target domain by transferring the alignments of existing parallel data. Specifically, AEIR learns the image-sentence consistent representations in source domain with parallel data, while transferring the alignment knowledge across domains by jointly optimizing a novel designed cross-domain cross-modal metric learning based constraint with intra-modal domain adversarial loss. Consequently, we can effectively learn the consistent representations for target domain considering both the structure and semantic transfer. Furthermore, extensive experiments on different transfer scenarios validate that AEIR can achieve better retrieval results comparing with the baselines.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":null,"pages":null},"PeriodicalIF":4.2,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on federated learning: a perspective from multi-party computation 联邦学习研究综述:多方计算视角
IF 4.2 3区 计算机科学 Q1 Mathematics Pub Date : 2023-12-02 DOI: 10.1007/s11704-023-3282-7
Fengxia Liu, Zhiming Zheng, Yexuan Shi, Yongxin Tong, Yi Zhang

Federated learning is a promising learning paradigm that allows collaborative training of models across multiple data owners without sharing their raw datasets. To enhance privacy in federated learning, multi-party computation can be leveraged for secure communication and computation during model training. This survey provides a comprehensive review on how to integrate mainstream multi-party computation techniques into diverse federated learning setups for guaranteed privacy, as well as the corresponding optimization techniques to improve model accuracy and training efficiency. We also pinpoint future directions to deploy federated learning to a wider range of applications.

联邦学习是一种很有前途的学习范例,它允许在不共享原始数据集的情况下跨多个数据所有者协作训练模型。为了增强联邦学习中的隐私性,可以在模型训练期间利用多方计算进行安全通信和计算。本文全面回顾了如何将主流多方计算技术集成到各种联邦学习设置中以保证隐私,以及相应的优化技术以提高模型准确性和训练效率。我们还指出了将联邦学习部署到更广泛的应用程序的未来方向。
{"title":"A survey on federated learning: a perspective from multi-party computation","authors":"Fengxia Liu, Zhiming Zheng, Yexuan Shi, Yongxin Tong, Yi Zhang","doi":"10.1007/s11704-023-3282-7","DOIUrl":"https://doi.org/10.1007/s11704-023-3282-7","url":null,"abstract":"<p>Federated learning is a promising learning paradigm that allows collaborative training of models across multiple data owners without sharing their raw datasets. To enhance privacy in federated learning, multi-party computation can be leveraged for secure communication and computation during model training. This survey provides a comprehensive review on how to integrate mainstream multi-party computation techniques into diverse federated learning setups for guaranteed privacy, as well as the corresponding optimization techniques to improve model accuracy and training efficiency. We also pinpoint future directions to deploy federated learning to a wider range of applications.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":null,"pages":null},"PeriodicalIF":4.2,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved differential-neural cryptanalysis for round-reduced SIMECK32/64 SIMECK32/64的改进差分神经密码分析
IF 4.2 3区 计算机科学 Q1 Mathematics Pub Date : 2023-12-02 DOI: 10.1007/s11704-023-3261-z
Liu Zhang, Jinyu Lu, Zilong Wang, Chao Li

In this study, we have developed a neural network aimed at enhancing the precision of neural distinguishers, demonstrating its capability to surpass DDT-based distinguishers in certain rounds. To extend the scope of our key recovery attack to additional rounds, we have diligently focused on improving both classical differentials and neural distinguishers. Consequently, we have successfully executed practical key recovery attacks on SIMECK32/64, effectively advancing the practical attack threshold by two additional rounds, allowing us to reach up to 17 rounds.

在这项研究中,我们开发了一个神经网络,旨在提高神经区分器的精度,并证明了它在某些回合中超过基于ddd的区分器的能力。为了将键恢复攻击的范围扩展到更多回合,我们一直在努力改进经典微分和神经区分。因此,我们已经成功地在SIMECK32/64上执行了实际的密钥恢复攻击,有效地将实际攻击阈值提高了两轮,使我们达到了17轮。
{"title":"Improved differential-neural cryptanalysis for round-reduced SIMECK32/64","authors":"Liu Zhang, Jinyu Lu, Zilong Wang, Chao Li","doi":"10.1007/s11704-023-3261-z","DOIUrl":"https://doi.org/10.1007/s11704-023-3261-z","url":null,"abstract":"<p>In this study, we have developed a neural network aimed at enhancing the precision of neural distinguishers, demonstrating its capability to surpass DDT-based distinguishers in certain rounds. To extend the scope of our key recovery attack to additional rounds, we have diligently focused on improving both classical differentials and neural distinguishers. Consequently, we have successfully executed practical key recovery attacks on SIMECK32/64, effectively advancing the practical attack threshold by two additional rounds, allowing us to reach up to 17 rounds.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":null,"pages":null},"PeriodicalIF":4.2,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive fusion of structure and attribute guided polarized communities search 结构与属性自适应融合引导极化群落搜索
IF 4.2 3区 计算机科学 Q1 Mathematics Pub Date : 2023-12-02 DOI: 10.1007/s11704-023-2776-7
Fanyi Yang, Huifang Ma, Wentao Wang, Zhixin Li, Liang Chang

In this paper, we propose the community search framework searching polarized communities via adaptively fusing structure and attribute in attributed signed networks, which searches for two polarized subgraphs on an attributed signed network for given query nodes. We first conduct a analysis by the similarity of attributes between nodes. And we adaptively integrate topology and node attributes into an augmented signed network. Then, a spectral method based on generalized Rayleigh quotient is proposed. Finally, a linear programming problem is designed to detect polarized communities by local eigenspace. Experiments on real-world datasets demonstrate the effectiveness of our method.

本文提出了一种基于自适应融合结构和属性的极化社团搜索框架,该框架针对给定的查询节点,在给定的属性签名网络上搜索两个极化子图。我们首先通过节点间属性的相似性进行分析。并自适应地将拓扑和节点属性集成到增强签名网络中。然后,提出了一种基于广义瑞利商的谱法。最后,设计了一个利用局部特征空间检测极化群落的线性规划问题。在实际数据集上的实验证明了该方法的有效性。
{"title":"Adaptive fusion of structure and attribute guided polarized communities search","authors":"Fanyi Yang, Huifang Ma, Wentao Wang, Zhixin Li, Liang Chang","doi":"10.1007/s11704-023-2776-7","DOIUrl":"https://doi.org/10.1007/s11704-023-2776-7","url":null,"abstract":"<p>In this paper, we propose the community search framework searching polarized communities via adaptively fusing structure and attribute in attributed signed networks, which searches for two polarized subgraphs on an attributed signed network for given query nodes. We first conduct a analysis by the similarity of attributes between nodes. And we adaptively integrate topology and node attributes into an augmented signed network. Then, a spectral method based on generalized Rayleigh quotient is proposed. Finally, a linear programming problem is designed to detect polarized communities by local eigenspace. Experiments on real-world datasets demonstrate the effectiveness of our method.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":null,"pages":null},"PeriodicalIF":4.2,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Frontiers of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1