首页 > 最新文献

Cognitive Computation最新文献

英文 中文
Towards Long-Term Remembering in Federated Continual Learning 在联合持续学习中实现长期记忆
IF 5.4 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-21 DOI: 10.1007/s12559-024-10314-z
Ziqin Zhao, Fan Lyu, Linyan Li, Fuyuan Hu, Minming Gu, Li Sun

Background

Federated Continual Learning (FCL) involves learning from distributed data on edge devices with incremental knowledge. However, current FCL methods struggle to retain long-term memories on the server.

Method

In this paper, we introduce a method called Fisher INformation Accumulation Learning (FINAL) to address catastrophic forgetting in FCL. First, we accumulate a global Fisher with a federated Fisher information matrix formed from clients task by task to remember long-term knowledge. Second, we present a novel multi-node collaborative integration strategy to assemble the federated Fisher, which reveals the task-specific co-importance of parameters among clients. Finally, we raise a Fisher balancing method to combine the global Fisher and federated Fisher, avoiding neglecting new learning or causing catastrophic forgetting.

Results

We conducted evaluations on four FCL datasets, and the findings demonstrate that the proposed FINAL effectively maintains long-term knowledge on the server.

Conclusions

The exceptional performance of this method indicates its significant value for future FCL research.

背景联合持续学习(FCL)涉及从边缘设备上的分布式数据中学习增量知识。方法在本文中,我们介绍了一种名为费舍尔信息积累学习(FINAL)的方法,以解决 FCL 中的灾难性遗忘问题。首先,我们用一个由客户逐个任务形成的联合 Fisher 信息矩阵来积累全局 Fisher,从而记住长期知识。其次,我们提出了一种新颖的多节点协作集成策略来组装联合费雪,从而揭示了客户间特定任务参数的共同重要性。最后,我们提出了一种费舍尔平衡方法,将全局费舍尔和联合费舍尔结合起来,避免忽略新的学习或造成灾难性遗忘。结果我们在四个 FCL 数据集上进行了评估,结果表明所提出的 FINAL 有效地维护了服务器上的长期知识。
{"title":"Towards Long-Term Remembering in Federated Continual Learning","authors":"Ziqin Zhao, Fan Lyu, Linyan Li, Fuyuan Hu, Minming Gu, Li Sun","doi":"10.1007/s12559-024-10314-z","DOIUrl":"https://doi.org/10.1007/s12559-024-10314-z","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Background</h3><p>Federated Continual Learning (FCL) involves learning from distributed data on edge devices with incremental knowledge. However, current FCL methods struggle to retain long-term memories on the server.</p><h3 data-test=\"abstract-sub-heading\">Method</h3><p>In this paper, we introduce a method called Fisher INformation Accumulation Learning (FINAL) to address catastrophic forgetting in FCL. First, we accumulate a global Fisher with a federated Fisher information matrix formed from clients task by task to remember long-term knowledge. Second, we present a novel multi-node collaborative integration strategy to assemble the federated Fisher, which reveals the task-specific co-importance of parameters among clients. Finally, we raise a Fisher balancing method to combine the global Fisher and federated Fisher, avoiding neglecting new learning or causing catastrophic forgetting.</p><h3 data-test=\"abstract-sub-heading\">Results</h3><p>We conducted evaluations on four FCL datasets, and the findings demonstrate that the proposed FINAL effectively maintains long-term knowledge on the server.</p><h3 data-test=\"abstract-sub-heading\">Conclusions</h3><p>The exceptional performance of this method indicates its significant value for future FCL research.</p>","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141502734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems SPEI-FL:智能医疗系统中的无服务器隐私边缘智能联合学习
IF 5.4 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-17 DOI: 10.1007/s12559-024-10310-3
Mahmuda Akter, Nour Moustafa, Benjamin Turnbull

Smart healthcare systems promise significant benefits for fast and accurate medical decisions. However, working with personal health data presents new privacy issues and constraints that must be solved from a cybersecurity perspective. Edge intelligence-enabled federated learning is a new scheme that utilises decentralised computing that allows data analytics to be carried out at the edge of a network, enhancing data privacy. However, this scheme suffers from privacy attacks, including inference, free-riding, and man-in-the-middle attacks, especially with serverless computing for allocating resources to user needs. Edge intelligence-enabled federated learning requires client data insertion and deletion to authenticate genuine clients and a serverless computing capability to ensure the security of collaborative machine learning models. This work introduces a serverless privacy edge intelligence-based federated learning (SPEI-FL) framework to address these issues. SPEI-FL includes a federated edge aggregator and authentication method to improve the data privacy of federated learning and allow client adaptation and removal without impacting the overall learning processes. It also can classify intruders through serverless computing processes. The proposed framework was evaluated with the unstructured COVID-19 medical chest x-rays and MNIST digit datasets, and the structured BoT-IoT dataset. The performance of the framework is comparable with existing authentication methods and reported a higher accuracy than comparable methods (approximately 90% as compared with the 81% reported by peer methods). The proposed authentication method prevents the exposure of sensitive patient information during medical device authentication and would become the cornerstone of the next generation of medical security with serverless computing.

智能医疗系统有望为快速、准确的医疗决策带来巨大好处。然而,个人健康数据的处理带来了新的隐私问题和限制,必须从网络安全的角度加以解决。边缘智能联合学习是一种利用分散计算的新方案,它允许在网络边缘进行数据分析,从而提高数据的隐私性。然而,这种方案受到隐私攻击,包括推理、搭便车和中间人攻击,尤其是在无服务器计算根据用户需求分配资源的情况下。支持边缘智能的联合学习需要插入和删除客户端数据以验证真正的客户端,还需要无服务器计算能力来确保协作机器学习模型的安全性。这项工作介绍了一种无服务器隐私边缘智能联合学习(SPEI-FL)框架,以解决这些问题。SPEI-FL 包括一个联合边缘聚合器和认证方法,以提高联合学习的数据隐私性,并允许在不影响整体学习过程的情况下调整和移除客户端。它还能通过无服务器计算流程对入侵者进行分类。我们用非结构化的 COVID-19 医学胸部 X 光片和 MNIST 数字数据集以及结构化的 BoT-IoT 数据集对所提出的框架进行了评估。该框架的性能与现有的身份验证方法不相上下,并且报告的准确率高于同类方法(约为 90%,而同类方法报告的准确率为 81%)。所提出的身份验证方法可防止医疗设备身份验证过程中患者敏感信息的泄露,并将成为下一代无服务器计算医疗安全的基石。
{"title":"SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems","authors":"Mahmuda Akter, Nour Moustafa, Benjamin Turnbull","doi":"10.1007/s12559-024-10310-3","DOIUrl":"https://doi.org/10.1007/s12559-024-10310-3","url":null,"abstract":"<p>Smart healthcare systems promise significant benefits for fast and accurate medical decisions. However, working with personal health data presents new privacy issues and constraints that must be solved from a cybersecurity perspective. Edge intelligence-enabled federated learning is a new scheme that utilises decentralised computing that allows data analytics to be carried out at the edge of a network, enhancing data privacy. However, this scheme suffers from privacy attacks, including inference, free-riding, and man-in-the-middle attacks, especially with serverless computing for allocating resources to user needs. Edge intelligence-enabled federated learning requires client data insertion and deletion to authenticate genuine clients and a serverless computing capability to ensure the security of collaborative machine learning models. This work introduces a serverless privacy edge intelligence-based federated learning (SPEI-FL) framework to address these issues. SPEI-FL includes a federated edge aggregator and authentication method to improve the data privacy of federated learning and allow client adaptation and removal without impacting the overall learning processes. It also can classify intruders through serverless computing processes. The proposed framework was evaluated with the unstructured COVID-19 medical chest x-rays and MNIST digit datasets, and the structured BoT-IoT dataset. The performance of the framework is comparable with existing authentication methods and reported a higher accuracy than comparable methods (approximately 90% as compared with the 81% reported by peer methods). The proposed authentication method prevents the exposure of sensitive patient information during medical device authentication and would become the cornerstone of the next generation of medical security with serverless computing.</p>","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141502720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognitive Tracing Data Trails: Auditing Data Provenance in Discriminative Language Models Using Accumulated Discrepancy Score 认知追踪数据轨迹:使用累积差异得分审核判别语言模型中的数据出处
IF 5.4 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-14 DOI: 10.1007/s12559-024-10315-y
Zhirui Zeng, Jialing He, Tao Xiang, Ning Wang, Biwen Chen, Shangwei Guo

The burgeoning practice of unauthorized acquisition and utilization of personal textual data (e.g., social media comments and search histories) by certain entities has become a discernible trend. To uphold data protection regulations such as the Asia–Pacific Privacy Initiative (APPI) and to identify instances of unpermitted exploitation of personal data, we propose a novel and efficient audit framework that helps users conduct cognitive analysis to determine if their textual data was used for data augmentation. and training a discriminative model. In particular, we focus on auditing models that use BERT as the backbone for discriminating text and are at the core of popular online services. We first propose an accumulated discrepancy score, which involves not only the response of the target model to the auditing sample but also the responses between pre-trained and finetuned models, to identify membership. We implement two types of audit methods (i.e., sample-level and user-level) according to our framework and conduct comprehensive experiments on two downstream applications to evaluate the performance. The experimental results demonstrate that our sample-level auditing achieves an AUC of 89.7% and an accuracy of 83%, whereas the user-level method can audit membership with an AUC of 89.7% and an accuracy of 88%. Additionally, we undertake an analysis of how augmentation methods impact auditing performance and expound upon the underlying reasons for these observations.

某些实体在未经授权的情况下获取和使用个人文本数据(如社交媒体评论和搜索历史)的做法日益增多,这已成为一种明显的趋势。为了维护数据保护法规(如亚太隐私倡议(APPI))并识别未经许可利用个人数据的情况,我们提出了一个新颖高效的审计框架,帮助用户进行认知分析,以确定其文本数据是否被用于数据增强。特别是,我们将重点放在使用 BERT 作为文本判别骨干的审计模型上,这些模型是流行在线服务的核心。我们首先提出了累积差异分数,它不仅涉及目标模型对审核样本的响应,还涉及预训练模型和微调模型之间的响应,以识别成员身份。根据我们的框架,我们实现了两种类型的审核方法(即样本级和用户级),并在两个下游应用上进行了综合实验以评估其性能。实验结果表明,样本级审核的 AUC 为 89.7%,准确率为 83%,而用户级方法的 AUC 为 89.7%,准确率为 88%。此外,我们还分析了增强方法如何影响审核性能,并阐述了这些观察结果的根本原因。
{"title":"Cognitive Tracing Data Trails: Auditing Data Provenance in Discriminative Language Models Using Accumulated Discrepancy Score","authors":"Zhirui Zeng, Jialing He, Tao Xiang, Ning Wang, Biwen Chen, Shangwei Guo","doi":"10.1007/s12559-024-10315-y","DOIUrl":"https://doi.org/10.1007/s12559-024-10315-y","url":null,"abstract":"<p>The burgeoning practice of unauthorized acquisition and utilization of personal textual data (e.g., social media comments and search histories) by certain entities has become a discernible trend. To uphold data protection regulations such as the Asia–Pacific Privacy Initiative (APPI) and to identify instances of unpermitted exploitation of personal data, we propose a novel and efficient audit framework that helps users conduct cognitive analysis to determine if their textual data was used for data augmentation. and training a discriminative model. In particular, we focus on auditing models that use BERT as the backbone for discriminating text and are at the core of popular online services. We first propose an accumulated discrepancy score, which involves not only the response of the target model to the auditing sample but also the responses between pre-trained and finetuned models, to identify membership. We implement two types of audit methods (i.e., sample-level and user-level) according to our framework and conduct comprehensive experiments on two downstream applications to evaluate the performance. The experimental results demonstrate that our sample-level auditing achieves an AUC of 89.7% and an accuracy of 83%, whereas the user-level method can audit membership with an AUC of 89.7% and an accuracy of 88%. Additionally, we undertake an analysis of how augmentation methods impact auditing performance and expound upon the underlying reasons for these observations.</p>","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141512680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explainable Histopathology Image Classification with Self-organizing Maps: A Granular Computing Perspective 利用自组织图进行可解释的组织病理学图像分类:粒度计算视角
IF 5.4 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-14 DOI: 10.1007/s12559-024-10312-1
Domenico Amato, Salvatore Calderaro, Giosué Lo Bosco, Riccardo Rizzo, Filippo Vella
{"title":"Explainable Histopathology Image Classification with Self-organizing Maps: A Granular Computing Perspective","authors":"Domenico Amato, Salvatore Calderaro, Giosué Lo Bosco, Riccardo Rizzo, Filippo Vella","doi":"10.1007/s12559-024-10312-1","DOIUrl":"https://doi.org/10.1007/s12559-024-10312-1","url":null,"abstract":"","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141342681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing Medical Imaging Through Generative Adversarial Networks: A Comprehensive Review and Future Prospects 通过生成式对抗网络推进医学成像:全面回顾与未来展望
IF 5.4 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-13 DOI: 10.1007/s12559-024-10291-3
Abiy Abinet Mamo, Bealu Girma Gebresilassie, Aniruddha Mukherjee, Vikas Hassija, Vinay Chamola

In medical imaging, traditional methods have long been relied upon. However, the integration of Generative Adversarial Networks (GANs) has sparked a paradigm shift, ushering in a new era of innovation. Our comprehensive investigation explores the groundbreaking impact of GANs on medical imaging, examining the evolution from traditional techniques to GAN-driven approaches. Through meticulous analysis, we dissect various aspects of GANs, encompassing their taxonomy, historical progression, and diverse iterations such as Self-Attention GANs (SAGAN), Conditional GANs, and Progressive Growing GANs (PGGAN). Complemented by a practical case study, we scrutinize the extensive applications of GANs, spanning image generation, reconstruction, enhancement, segmentation, and super-resolution. Despite promising prospects, enduring challenges including data scarcity, interpretability issues, and ethical concerns persist. Looking ahead, we anticipate advancements in personalized and pathological image generation, cross-modal synthesis, real-time interactive image generation, and enhanced anomaly detection. Through this review, we underscore the transformative potential of GANs in reshaping medical imaging practices, while also outlining avenues for future research endeavors.

长期以来,医学成像一直依赖传统方法。然而,生成对抗网络(GANs)的集成引发了范式的转变,开创了创新的新时代。我们的全面调查探讨了生成式对抗网络对医学成像的突破性影响,研究了从传统技术到生成式对抗网络驱动方法的演变过程。通过细致的分析,我们剖析了 GANs 的各个方面,包括其分类、历史进程和各种迭代,如自注意 GANs (SAGAN)、条件 GANs 和渐进生长 GANs (PGGAN)。在实际案例研究的补充下,我们仔细研究了 GANs 的广泛应用,包括图像生成、重建、增强、分割和超分辨率。尽管前景广阔,但包括数据稀缺、可解释性问题和伦理问题在内的持久挑战依然存在。展望未来,我们预计在个性化和病理图像生成、跨模态合成、实时交互式图像生成和增强型异常检测方面将取得进展。通过这篇综述,我们强调了 GANs 在重塑医学影像实践方面的变革潜力,同时也为未来的研究工作勾勒了蓝图。
{"title":"Advancing Medical Imaging Through Generative Adversarial Networks: A Comprehensive Review and Future Prospects","authors":"Abiy Abinet Mamo, Bealu Girma Gebresilassie, Aniruddha Mukherjee, Vikas Hassija, Vinay Chamola","doi":"10.1007/s12559-024-10291-3","DOIUrl":"https://doi.org/10.1007/s12559-024-10291-3","url":null,"abstract":"<p>In medical imaging, traditional methods have long been relied upon. However, the integration of Generative Adversarial Networks (GANs) has sparked a paradigm shift, ushering in a new era of innovation. Our comprehensive investigation explores the groundbreaking impact of GANs on medical imaging, examining the evolution from traditional techniques to GAN-driven approaches. Through meticulous analysis, we dissect various aspects of GANs, encompassing their taxonomy, historical progression, and diverse iterations such as Self-Attention GANs (SAGAN), Conditional GANs, and Progressive Growing GANs (PGGAN). Complemented by a practical case study, we scrutinize the extensive applications of GANs, spanning image generation, reconstruction, enhancement, segmentation, and super-resolution. Despite promising prospects, enduring challenges including data scarcity, interpretability issues, and ethical concerns persist. Looking ahead, we anticipate advancements in personalized and pathological image generation, cross-modal synthesis, real-time interactive image generation, and enhanced anomaly detection. Through this review, we underscore the transformative potential of GANs in reshaping medical imaging practices, while also outlining avenues for future research endeavors.</p>","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141512677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CPD-NSL: A Two-Stage Brain Effective Connectivity Network Construction Method Based on Dynamic Bayesian Network CPD-NSL:基于动态贝叶斯网络的两阶段大脑有效连接网络构建方法
IF 5.4 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-13 DOI: 10.1007/s12559-024-10296-y
Zhiqiong Wang, Qi Chen, Zhongyang Wang, Xinlei Wang, Luxuan Qu, Junchang Xin

Current brain science reveals that the connectivity patterns of the human brain are constantly changing when performing different tasks. Thus, brain effective connectivity networks based on non-stationary assumption can describe such neurodynamics better than the ones based on stationary assumption. However, existing methods for inferring non-stationary brain effective connectivity networks are committed to estimating the change points and network structures simultaneously. It is even worse that these methods will inevitably focus on one part of the estimation process and lead to the deviation of the results obtained by the other part. Then, the construction results of non-stationary brain effective connectivity networks cannot accurately reflect the real brain dynamics. In this paper, a novel approach to constructing non-stationary brain effective connectivity networks is proposed, namely CPD-NSL. It involves two stages including change point detection and network structure learning. In the first stage, the latent block model is used, and then the improved forward-backward search method is used to construct the stationary networks between adjacent change points in the network structure learning part. Finally, the constructed stationary networks are arranged in chronological order to obtain the final time-varying brain effective connectivity network. CPD-NSL is validated using simulated data as well as real fMRI data from HCP public datasets. The results show that CPD-NSL can restore the real network more accurately and consume less time. Experimental results on both simulated and real data demonstrate the effectiveness of the proposed method in constructing non-stationary state brain effective connectivity networks.

当前的脑科学发现,在执行不同任务时,人脑的连接模式是不断变化的。因此,基于非稳态假设的大脑有效连接网络能比基于稳态假设的网络更好地描述这种神经动力学。然而,现有的推断非稳态大脑有效连接网络的方法致力于同时估计变化点和网络结构。更糟糕的是,这些方法在估算过程中不可避免地会只关注其中一部分,而导致另一部分的结果出现偏差。那么,非稳态大脑有效连接网络的构建结果就不能准确反映真实的大脑动态。本文提出了一种构建非稳态脑有效连接网络的新方法,即 CPD-NSL。它包括两个阶段,包括变化点检测和网络结构学习。第一阶段使用潜块模型,然后在网络结构学习部分使用改进的前向后向搜索法构建相邻变化点之间的静态网络。最后,将构建的静态网络按时间顺序排列,得到最终的时变大脑有效连接网络。CPD-NSL 利用模拟数据和来自 HCP 公共数据集的真实 fMRI 数据进行了验证。结果表明,CPD-NSL 能更准确地还原真实网络,且耗时更短。在模拟数据和真实数据上的实验结果证明了所提出的方法在构建非稳态大脑有效连接网络方面的有效性。
{"title":"CPD-NSL: A Two-Stage Brain Effective Connectivity Network Construction Method Based on Dynamic Bayesian Network","authors":"Zhiqiong Wang, Qi Chen, Zhongyang Wang, Xinlei Wang, Luxuan Qu, Junchang Xin","doi":"10.1007/s12559-024-10296-y","DOIUrl":"https://doi.org/10.1007/s12559-024-10296-y","url":null,"abstract":"<p>Current brain science reveals that the connectivity patterns of the human brain are constantly changing when performing different tasks. Thus, brain effective connectivity networks based on non-stationary assumption can describe such neurodynamics better than the ones based on stationary assumption. However, existing methods for inferring non-stationary brain effective connectivity networks are committed to estimating the change points and network structures simultaneously. It is even worse that these methods will inevitably focus on one part of the estimation process and lead to the deviation of the results obtained by the other part. Then, the construction results of non-stationary brain effective connectivity networks cannot accurately reflect the real brain dynamics. In this paper, a novel approach to constructing non-stationary brain effective connectivity networks is proposed, namely CPD-NSL. It involves two stages including change point detection and network structure learning. In the first stage, the latent block model is used, and then the improved forward-backward search method is used to construct the stationary networks between adjacent change points in the network structure learning part. Finally, the constructed stationary networks are arranged in chronological order to obtain the final time-varying brain effective connectivity network. CPD-NSL is validated using simulated data as well as real fMRI data from HCP public datasets. The results show that CPD-NSL can restore the real network more accurately and consume less time. Experimental results on both simulated and real data demonstrate the effectiveness of the proposed method in constructing non-stationary state brain effective connectivity networks.</p>","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141512676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Memristors Based Echo State Network Model Inspired by the Brain’s Uni-hemispheric Slow-Wave Sleep Characteristics 受大脑单半球慢波睡眠特性启发、基于新型 Memristors 的回声状态网络模型
IF 5.4 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-10 DOI: 10.1007/s12559-024-10265-5
Jingyu Sun, Lixiang Li, Haipeng Peng, Yin Meng
{"title":"A Novel Memristors Based Echo State Network Model Inspired by the Brain’s Uni-hemispheric Slow-Wave Sleep Characteristics","authors":"Jingyu Sun, Lixiang Li, Haipeng Peng, Yin Meng","doi":"10.1007/s12559-024-10265-5","DOIUrl":"https://doi.org/10.1007/s12559-024-10265-5","url":null,"abstract":"","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141361963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative AI and Cognitive Computing-Driven Intrusion Detection System in Industrial CPS 工业 CPS 中生成式人工智能和认知计算驱动的入侵检测系统
IF 5.4 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-10 DOI: 10.1007/s12559-024-10309-w
Shareeful Islam, D. Javeed, Muhammad Shahid Saeed, Prabhat Kumar, Alireza Jolfaei, A. N. Islam
{"title":"Generative AI and Cognitive Computing-Driven Intrusion Detection System in Industrial CPS","authors":"Shareeful Islam, D. Javeed, Muhammad Shahid Saeed, Prabhat Kumar, Alireza Jolfaei, A. N. Islam","doi":"10.1007/s12559-024-10309-w","DOIUrl":"https://doi.org/10.1007/s12559-024-10309-w","url":null,"abstract":"","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141362414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of Leakage Delays on Bifurcation in Fractional-Order Bidirectional Associative Memory Neural Networks with Five Neurons and Discrete Delays 泄漏延迟对具有五个神经元和离散延迟的分数阶双向联想记忆神经网络分岔的影响
IF 5.4 3区 计算机科学 Q1 Computer Science Pub Date : 2024-06-05 DOI: 10.1007/s12559-024-10305-0
Yangling Wang, Jinde Cao, Chengdai Huang

As is well known that time delays are inevitable in practice due to the finite switching speed of amplifiers and information transmission between neurons. So the study on the Hopf bifurcation of delayed neural networks has aroused extensive attention in recent years. However, it’s worth mentioning that only the communication delays between neurons were generally considered in most existing relevant literatures. Actually, it has been proven that a kind of so-called leakage delays cannot be ignored because the self-decay process of a neuron’s action potential is not instantaneous in hardware implementation of neural networks. Though leakage delays have been taken into account in a few more recent works concerning the Hopf bifurcation of fractional-order bidirectional associative memory neural networks, the addressed neural networks were low-dimension or the involved time delays were single. In this paper, we propose a five-neuron fractional-order bidirectional associative memory neural network model, which includes leakage delays and discrete communication delays to meet the characteristics of real neural networks better. Then we use the stability theory of fractional differential equations and Hopf bifurcation theory to investigate its dynamic behavior of Hopf bifurcation. The Hopf bifurcation of the proposed model are studied by taking the involved two different leakage delays as the bifurcation parameter respectively, and two kinds of sufficient conditions for Hopf bifurcation are obtained. A numerical example as well as its simulation plots and phase portraits are given at last. Our results indicate that a Hopf bifurcation rises near the zero equilibrium point when the leakage delay reaches its critical value which is given by an explicit formula. Particularly, the results of numerical simulations show that the leakage delay would narrow the stability region of the proposed system and make the Hopf bifurcation occur earlier.

众所周知,在实际应用中,由于放大器的开关速度和神经元之间的信息传输速度有限,时间延迟是不可避免的。因此,近年来关于延迟神经网络霍普夫分岔的研究引起了广泛关注。然而,值得一提的是,在现有的大多数相关文献中,一般只考虑了神经元之间的通信延迟。实际上,在神经网络的硬件实现过程中,神经元动作电位的自衰减过程并不是瞬时的,因此有一种所谓的泄漏延迟是不容忽视的。虽然最近一些关于分数阶双向联想记忆神经网络霍普夫分岔的研究也考虑到了泄漏延迟,但所涉及的神经网络维度较低,或者涉及的时间延迟比较单一。本文提出了一种五神经元分数阶双向联想记忆神经网络模型,该模型包含泄漏延迟和离散通信延迟,更符合实际神经网络的特点。然后,我们利用分数微分方程的稳定性理论和霍普夫分岔理论来研究其霍普夫分岔的动态行为。以两种不同的泄漏延迟为分岔参数,分别研究了所提模型的霍普夫分岔,并得到了霍普夫分岔的两种充分条件。最后给出了一个数值实例及其仿真图和相位图。我们的结果表明,当泄漏延迟达到临界值时,霍普夫分岔就会在零平衡点附近出现。特别是,数值模拟结果表明,泄漏延迟会缩小拟议系统的稳定区域,并使霍普夫分岔提前发生。
{"title":"Effect of Leakage Delays on Bifurcation in Fractional-Order Bidirectional Associative Memory Neural Networks with Five Neurons and Discrete Delays","authors":"Yangling Wang, Jinde Cao, Chengdai Huang","doi":"10.1007/s12559-024-10305-0","DOIUrl":"https://doi.org/10.1007/s12559-024-10305-0","url":null,"abstract":"<p>As is well known that time delays are inevitable in practice due to the finite switching speed of amplifiers and information transmission between neurons. So the study on the Hopf bifurcation of delayed neural networks has aroused extensive attention in recent years. However, it’s worth mentioning that only the communication delays between neurons were generally considered in most existing relevant literatures. Actually, it has been proven that a kind of so-called leakage delays cannot be ignored because the self-decay process of a neuron’s action potential is not instantaneous in hardware implementation of neural networks. Though leakage delays have been taken into account in a few more recent works concerning the Hopf bifurcation of fractional-order bidirectional associative memory neural networks, the addressed neural networks were low-dimension or the involved time delays were single. In this paper, we propose a five-neuron fractional-order bidirectional associative memory neural network model, which includes leakage delays and discrete communication delays to meet the characteristics of real neural networks better. Then we use the stability theory of fractional differential equations and Hopf bifurcation theory to investigate its dynamic behavior of Hopf bifurcation. The Hopf bifurcation of the proposed model are studied by taking the involved two different leakage delays as the bifurcation parameter respectively, and two kinds of sufficient conditions for Hopf bifurcation are obtained. A numerical example as well as its simulation plots and phase portraits are given at last. Our results indicate that a Hopf bifurcation rises near the zero equilibrium point when the leakage delay reaches its critical value which is given by an explicit formula. Particularly, the results of numerical simulations show that the leakage delay would narrow the stability region of the proposed system and make the Hopf bifurcation occur earlier.</p>","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141257565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization Based Deep Learning for COVID-19 Detection Using Respiratory Sound Signals 利用呼吸声信号进行基于优化的 COVID-19 检测深度学习
IF 5.4 3区 计算机科学 Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.1007/s12559-024-10300-5
Jawad Ahmad Dar, Kamal Kr Srivastava, Sajaad Ahmed Lone

The COVID-19 prediction process is more indispensable to handle the spread and death occurred rate because of COVID-19. However, early and precise prediction of COVID-19 is more difficult, because of different sizes and resolutions of input image. Thus, these challenges and problems experienced by traditional COVID-19 detection methods are considered as major motivation to develop SJHBO-based Deep Q Network. The classification issue of respiratory sound has perceived a great focus from the clinical scientists as well as the community of medical researcher in the previous year for the identification of COVID-19 disease. The major contribution of this research is to design an effectual COVID-19 detection model using devised SJHBO-based Deep Q Network. In this paper, the COVID-19 detection is carried out by the deep learning with optimization technique, namely Snake Jaya Honey Badger Optimization (SJHBO) algorithm-driven Deep Q Network. Here, the SJHBO algorithm is the incorporation of Jaya Honey Badger Optimization (JHBO) along with Snake optimization (SO). Here, the COVID-19 is detected by the Deep Q Network wherein the weights of Deep Q Network are tuned by the SJHBO algorithm. Moreover, JHBO is modelled by hybrids, which are the Jaya algorithm and Honey Badger Optimization (HBO) algorithm. Furthermore, the features, such as spectral contrast, Mel frequency cepstral coefficients (MFCC), empirical mode decomposition (EMD) algorithm, spectral flux, fast Fourier transform (FFT), spectral roll-off, spectral centroid, zero-crossing rate, root mean square energy, spectral bandwidth, spectral flatness, power spectral density, mobility complexity, fluctuation index and relative amplitude, are mined for enlightening the detection performance. The developed method realized the better performance based on the accuracy, sensitivity and specificity of 0.9511, 0.9506 and 0.9469. All test results are validated with the k-fold cross validation method in order to make an assessment of the generalizability of these results. Statistical analysis is performed to analyze the performance of the proposed method based on testing accuracy, sensitivity and specificity. Hence, this paper presents the newly devised SJHBO-based Deep Q-Net for COVID-19 detection. This research considers the audio samples as an input, which is acquired from the Coswara dataset. The SJHBO-based Deep Q network approach is developed for COVID-19 detection. The developed approach can be extended by including other hybrid optimization algorithms as well as other features that can be extracted for further improving the detection performance. The proposed COVID-19 detection method is useful in various applications, like medical and so on. Developed SJHBO-enabled Deep Q network for COVID-19 detection: An effective COVID-19 detection technique is introduced based on hybrid optimization–driven deep learning model. The Deep Q Network is used for detecting COVID-19, which classifies the feature vector

COVID-19 预测过程对于处理 COVID-19 的扩散和死亡发生率更加不可或缺。然而,由于输入图像的尺寸和分辨率不同,COVID-19 的早期精确预测较为困难。因此,这些传统 COVID-19 检测方法所面临的挑战和问题被认为是开发基于 SJHBO 的深度 Q 网络的主要动力。去年,临床科学家和医学研究人员都非常关注呼吸音的分类问题,以识别 COVID-19 疾病。本研究的主要贡献在于利用设计的基于 SJHBO 的深度 Q 网络设计了一个有效的 COVID-19 检测模型。在本文中,COVID-19 检测是通过深度学习与优化技术(即蛇獾优化(SJHBO)算法驱动的深度 Q 网络)来实现的。在这里,SJHBO 算法是 Jaya Honey Badger Optimization(JHBO)与 Snake optimization(SO)的结合。在这里,COVID-19 由深度 Q 网络检测,而深度 Q 网络的权重则由 SJHBO 算法调整。此外,JHBO 是由 Jaya 算法和蜜獾优化(HBO)算法的混合体模拟而成。此外,还挖掘了频谱对比度、梅尔频率倒频谱系数(MFCC)、经验模式分解(EMD)算法、频谱通量、快速傅里叶变换(FFT)、频谱滚降、频谱中心点、过零率、均方根能量、频谱带宽、频谱平坦度、功率谱密度、移动复杂度、波动指数和相对振幅等特征,以提高检测性能。所开发的方法的准确度、灵敏度和特异度分别为 0.9511、0.9506 和 0.9469,具有较好的性能。所有检测结果都通过 k 倍交叉验证法进行了验证,以评估这些结果的通用性。本文还进行了统计分析,根据测试准确性、灵敏度和特异性分析了建议方法的性能。因此,本文介绍了新设计的用于 COVID-19 检测的基于 SJHBO 的深度 QNet。本研究将从 Coswara 数据集中获取的音频样本作为输入。为 COVID-19 检测开发了基于 SJHBO 的深度 Q 网络方法。为了进一步提高检测性能,还可以通过加入其他混合优化算法和提取其他特征来扩展所开发的方法。所提出的 COVID-19 检测方法适用于医疗等各种应用。为 COVID-19 检测开发了支持 SJHBO 的深度 Q 网络:基于混合优化驱动的深度学习模型,提出了一种有效的 COVID-19 检测技术。深度 Q 网络用于检测 COVID-19,它将特征向量分类为 COVID-19 或非 COVID-19。此外,深度 Q 网络是通过设计的 SJHBO 方法进行训练的,该方法结合了 Jaya Honey Badger 优化(JHBO)和 Snake 优化(SO)。
{"title":"Optimization Based Deep Learning for COVID-19 Detection Using Respiratory Sound Signals","authors":"Jawad Ahmad Dar, Kamal Kr Srivastava, Sajaad Ahmed Lone","doi":"10.1007/s12559-024-10300-5","DOIUrl":"https://doi.org/10.1007/s12559-024-10300-5","url":null,"abstract":"<p>The COVID-19 prediction process is more indispensable to handle the spread and death occurred rate because of COVID-19. However, early and precise prediction of COVID-19 is more difficult, because of different sizes and resolutions of input image. Thus, these challenges and problems experienced by traditional COVID-19 detection methods are considered as major motivation to develop SJHBO-based Deep Q Network. The classification issue of respiratory sound has perceived a great focus from the clinical scientists as well as the community of medical researcher in the previous year for the identification of COVID-19 disease. The major contribution of this research is to design an effectual COVID-19 detection model using devised SJHBO-based Deep Q Network. In this paper, the COVID-19 detection is carried out by the deep learning with optimization technique, namely Snake Jaya Honey Badger Optimization (SJHBO) algorithm-driven Deep Q Network. Here, the SJHBO algorithm is the incorporation of Jaya Honey Badger Optimization (JHBO) along with Snake optimization (SO). Here, the COVID-19 is detected by the Deep Q Network wherein the weights of Deep Q Network are tuned by the SJHBO algorithm. Moreover, JHBO is modelled by hybrids, which are the Jaya algorithm and Honey Badger Optimization (HBO) algorithm. Furthermore, the features, such as spectral contrast, Mel frequency cepstral coefficients (MFCC), empirical mode decomposition (EMD) algorithm, spectral flux, fast Fourier transform (FFT), spectral roll-off, spectral centroid, zero-crossing rate, root mean square energy, spectral bandwidth, spectral flatness, power spectral density, mobility complexity, fluctuation index and relative amplitude, are mined for enlightening the detection performance. The developed method realized the better performance based on the accuracy, sensitivity and specificity of 0.9511, 0.9506 and 0.9469. All test results are validated with the k-fold cross validation method in order to make an assessment of the generalizability of these results. Statistical analysis is performed to analyze the performance of the proposed method based on testing accuracy, sensitivity and specificity. Hence, this paper presents the newly devised SJHBO-based Deep Q-Net for COVID-19 detection. This research considers the audio samples as an input, which is acquired from the Coswara dataset. The SJHBO-based Deep Q network approach is developed for COVID-19 detection. The developed approach can be extended by including other hybrid optimization algorithms as well as other features that can be extracted for further improving the detection performance. The proposed COVID-19 detection method is useful in various applications, like medical and so on. Developed SJHBO-enabled Deep Q network for COVID-19 detection: An effective COVID-19 detection technique is introduced based on hybrid optimization–driven deep learning model. The Deep Q Network is used for detecting COVID-19, which classifies the feature vector ","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cognitive Computation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1