首页 > 最新文献

Artificial Intelligence最新文献

英文 中文
Grounded predictions of teamwork as a one-shot game: A multiagent multi-armed bandits approach 团队合作作为一个一次性游戏的基础预测:一个多代理多武装的强盗方法
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-13 DOI: 10.1016/j.artint.2025.104307
Alejandra López de Aberasturi Gómez, Carles Sierra, Jordi Sabater-Mir
Humans possess innate collaborative capacities. However, effective teamwork often remains challenging. This study delves into the feasibility of collaboration within teams of rational, self-interested agents who engage in teamwork without the obligation to contribute. Drawing from psychological and game theoretical frameworks, we formalise teamwork as a one-shot aggregative game, integrating insights from Steiner's theory of group productivity. We characterise this novel game's Nash equilibria and propose a multiagent multi-armed bandit system that learns to converge to approximations of such equilibria. Our research contributes value to the areas of game theory and multiagent systems, paving the way for a better understanding of voluntary collaborative dynamics. We examine how team heterogeneity, task typology, and assessment difficulty influence agents' strategies and resulting teamwork outcomes. Finally, we empirically study the behaviour of work teams under incentive systems that defy analytical treatment. Our agents demonstrate human-like behaviour patterns, corroborating findings from social psychology research.
人类具有天生的协作能力。然而,有效的团队合作往往仍然具有挑战性。本研究探讨了理性的、自利的、不承担贡献义务的团队合作的可行性。从心理学和博弈论的框架中,我们将团队合作形式化为一种一次性的集体游戏,整合了斯坦纳的团队生产力理论的见解。我们描述了这种新颖的博弈的纳什均衡,并提出了一个多智能体多臂强盗系统,该系统可以学习收敛到这种均衡的近似。我们的研究为博弈论和多智能体系统领域贡献了价值,为更好地理解自愿协作动力学铺平了道路。我们研究团队异质性、任务类型和评估难度如何影响代理人的策略和由此产生的团队合作结果。最后,我们实证研究了工作团队在激励制度下的行为。我们的代理人表现出类似人类的行为模式,证实了社会心理学研究的发现。
{"title":"Grounded predictions of teamwork as a one-shot game: A multiagent multi-armed bandits approach","authors":"Alejandra López de Aberasturi Gómez,&nbsp;Carles Sierra,&nbsp;Jordi Sabater-Mir","doi":"10.1016/j.artint.2025.104307","DOIUrl":"10.1016/j.artint.2025.104307","url":null,"abstract":"<div><div>Humans possess innate collaborative capacities. However, effective teamwork often remains challenging. This study delves into the feasibility of collaboration within teams of rational, self-interested agents who engage in teamwork without the obligation to contribute. Drawing from psychological and game theoretical frameworks, we formalise teamwork as a one-shot aggregative game, integrating insights from Steiner's theory of group productivity. We characterise this novel game's Nash equilibria and propose a multiagent multi-armed bandit system that learns to converge to approximations of such equilibria. Our research contributes value to the areas of game theory and multiagent systems, paving the way for a better understanding of voluntary collaborative dynamics. We examine how team heterogeneity, task typology, and assessment difficulty influence agents' strategies and resulting teamwork outcomes. Finally, we empirically study the behaviour of work teams under incentive systems that defy analytical treatment. Our agents demonstrate human-like behaviour patterns, corroborating findings from social psychology research.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"341 ","pages":"Article 104307"},"PeriodicalIF":5.1,"publicationDate":"2025-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143422377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grammar induction from visual, speech and text 从视觉、语音和文本进行语法归纳
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-12 DOI: 10.1016/j.artint.2025.104306
Yu Zhao , Hao Fei , Shengqiong Wu , Meishan Zhang , Min Zhang , Tat-seng Chua
Grammar Induction (GI) seeks to uncover the underlying grammatical rules and linguistic patterns of a language, positioning it as a pivotal research topic within Artificial Intelligence (AI). Although extensive research in GI has predominantly focused on text or other singular modalities, we reveal that GI could significantly benefit from rich heterogeneous signals, such as text, vision, and acoustics. In the process, features from distinct modalities essentially serve complementary roles to each other. With such intuition, this work introduces a novel unsupervised visual-audio-text grammar induction task (named VAT-GI), to induce the constituent grammar trees from parallel images, text, and speech inputs. Inspired by the fact that language grammar natively exists beyond the texts, we argue that the text has not to be the predominant modality in grammar induction. Thus we further introduce a textless setting of VAT-GI, wherein the task solely relies on visual and auditory inputs. To approach the task, we propose a visual-audio-text inside-outside recursive autoencoder (VaTiora) framework, which leverages rich modal-specific and complementary features for effective grammar parsing. Besides, a more challenging benchmark data is constructed to assess the generalization ability of VAT-GI system. Experiments on two benchmark datasets demonstrate that our proposed VaTiora system is more effective in incorporating the various multimodal signals, and also presents new state-of-the-art performance of VAT-GI. Further in-depth analyses are shown to gain a deep understanding of the VAT-GI task and how our VaTiora system advances. Our code and data: https://github.com/LLLogen/VAT-GI/.
语法归纳(GI)旨在揭示语言的潜在语法规则和语言模式,将其定位为人工智能(AI)中的关键研究课题。尽管对地理标志的广泛研究主要集中在文本或其他单一模式上,但我们发现地理标志可以从丰富的异构信号(如文本、视觉和声学)中显著受益。在这个过程中,来自不同形态的特征本质上是相互补充的。有了这样的直觉,本工作引入了一种新的无监督的视觉-音频-文本语法归纳任务(称为VAT-GI),从并行图像、文本和语音输入中归纳出组成语法树。由于语言语法本身存在于语篇之外,我们认为语篇不应该是语法归纳的主导形态。因此,我们进一步引入了一种无文本的VAT-GI设置,其中任务仅依赖于视觉和听觉输入。为了完成这项任务,我们提出了一个视觉-音频-文本内-外递归自动编码器(VaTiora)框架,该框架利用丰富的特定于情态的互补特性来进行有效的语法解析。此外,构建了更具挑战性的基准数据来评估VAT-GI系统的泛化能力。在两个基准数据集上的实验表明,我们提出的VaTiora系统在整合各种多模态信号方面更有效,并且也展示了VAT-GI的最新性能。进一步深入的分析显示,以获得对VAT-GI任务的深刻理解以及我们的VaTiora系统是如何进步的。我们的代码和数据:https://github.com/LLLogen/VAT-GI/。
{"title":"Grammar induction from visual, speech and text","authors":"Yu Zhao ,&nbsp;Hao Fei ,&nbsp;Shengqiong Wu ,&nbsp;Meishan Zhang ,&nbsp;Min Zhang ,&nbsp;Tat-seng Chua","doi":"10.1016/j.artint.2025.104306","DOIUrl":"10.1016/j.artint.2025.104306","url":null,"abstract":"<div><div>Grammar Induction (GI) seeks to uncover the underlying grammatical rules and linguistic patterns of a language, positioning it as a pivotal research topic within Artificial Intelligence (AI). Although extensive research in GI has predominantly focused on text or other singular modalities, we reveal that GI could significantly benefit from rich heterogeneous signals, such as text, vision, and acoustics. In the process, features from distinct modalities essentially serve complementary roles to each other. With such intuition, this work introduces a novel <em>unsupervised visual-audio-text grammar induction</em> task (named <strong>VAT-GI</strong>), to induce the constituent grammar trees from parallel images, text, and speech inputs. Inspired by the fact that language grammar natively exists beyond the texts, we argue that the text has not to be the predominant modality in grammar induction. Thus we further introduce a <em>textless</em> setting of VAT-GI, wherein the task solely relies on visual and auditory inputs. To approach the task, we propose a visual-audio-text inside-outside recursive autoencoder (<strong>VaTiora</strong>) framework, which leverages rich modal-specific and complementary features for effective grammar parsing. Besides, a more challenging benchmark data is constructed to assess the generalization ability of VAT-GI system. Experiments on two benchmark datasets demonstrate that our proposed VaTiora system is more effective in incorporating the various multimodal signals, and also presents new state-of-the-art performance of VAT-GI. Further in-depth analyses are shown to gain a deep understanding of the VAT-GI task and how our VaTiora system advances. Our code and data: <span><span>https://github.com/LLLogen/VAT-GI/</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"341 ","pages":"Article 104306"},"PeriodicalIF":5.1,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143418533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the computation of mixed strategies for security games with general defending requirements 具有一般防御要求的安全博弈混合策略的计算
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-10 DOI: 10.1016/j.artint.2025.104297
Rufan Bai , Haoxing Lin , Xiaowei Wu , Minming Li , Weijia Jia
The Stackelberg security game is played between a defender and an attacker, where the defender needs to allocate a limited amount of resources to multiple targets in order to minimize the loss due to adversarial attacks by the attacker. While allowing targets to have different values, classic settings often assume uniform requirements for defending the targets. This enables existing results that study mixed strategies (randomized allocation algorithms) to adopt a compact representation of the mixed strategies.
In this work, we initiate the study of mixed strategies for security games in which the targets can have different defending requirements. In contrast to the case of uniform defending requirements, for which an optimal mixed strategy can be computed efficiently, we show that computing the optimal mixed strategy is NP-hard for the general defending requirements setting. However, we show strong upper and lower bounds for the optimal mixed strategy defending result. Additionally, we extend our analysis to study uniform attack settings on these security games.
We propose an efficient close-to-optimal Patching algorithm that computes mixed strategies using only a few pure strategies. Furthermore, we study the setting when the game is played on a network and resource sharing is enabled between neighboring targets. We show the effectiveness of our algorithm in various large real-world datasets, addressing both uniform and general defending requirements.
Stackelberg安全游戏是在防御者和攻击者之间进行的,防御者需要将有限的资源分配给多个目标,以最大限度地减少由于攻击者的对抗性攻击而造成的损失。虽然允许目标具有不同的值,但经典设置通常假设防御目标的统一要求。这使得研究混合策略(随机分配算法)的现有结果能够采用混合策略的紧凑表示。在这项工作中,我们启动了安全博弈的混合策略研究,其中目标可以有不同的防御需求。在统一防御需求的情况下,可以有效地计算最优混合策略,而在一般防御需求设置下,计算最优混合策略是np困难的。然而,我们给出了最优混合策略防御结果的强上界和下界。此外,我们将分析扩展到研究这些安全游戏的统一攻击设置。我们提出了一种高效的接近最优的补丁算法,该算法仅使用少量纯策略计算混合策略。此外,我们研究了当游戏在网络上进行并且相邻目标之间实现资源共享时的设置。我们在各种大型现实世界数据集中展示了我们的算法的有效性,解决了统一和一般的防御要求。
{"title":"On the computation of mixed strategies for security games with general defending requirements","authors":"Rufan Bai ,&nbsp;Haoxing Lin ,&nbsp;Xiaowei Wu ,&nbsp;Minming Li ,&nbsp;Weijia Jia","doi":"10.1016/j.artint.2025.104297","DOIUrl":"10.1016/j.artint.2025.104297","url":null,"abstract":"<div><div>The Stackelberg security game is played between a defender and an attacker, where the defender needs to allocate a limited amount of resources to multiple targets in order to minimize the loss due to adversarial attacks by the attacker. While allowing targets to have different values, classic settings often assume uniform requirements for defending the targets. This enables existing results that study mixed strategies (randomized allocation algorithms) to adopt a <em>compact representation</em> of the mixed strategies.</div><div>In this work, we initiate the study of mixed strategies for security games in which the targets can have different defending requirements. In contrast to the case of uniform defending requirements, for which an optimal mixed strategy can be computed efficiently, we show that computing the optimal mixed strategy is <span>NP</span>-hard for the general defending requirements setting. However, we show strong upper and lower bounds for the optimal mixed strategy defending result. Additionally, we extend our analysis to study uniform attack settings on these security games.</div><div>We propose an efficient close-to-optimal <span>Patching</span> algorithm that computes mixed strategies using only a few pure strategies. Furthermore, we study the setting when the game is played on a network and resource sharing is enabled between neighboring targets. We show the effectiveness of our algorithm in various large real-world datasets, addressing both uniform and general defending requirements.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"341 ","pages":"Article 104297"},"PeriodicalIF":5.1,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IID prophet inequality with a single data point 单数据点的IID预测不等式
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-07 DOI: 10.1016/j.artint.2025.104296
Yilong Feng , Bo Li , Haolong Li , Xiaowei Wu , Yutong Wu
In this work, we study the single-choice prophet inequality problem, where a seller encounters a sequence of n online bids. These bids are modeled as independent and identically distributed (i.i.d.) random variables drawn from an unknown distribution. Upon the revelation of each bid's value, the seller must make an immediate and irrevocable decision on whether to accept the bid and sell the item to the bidder. The objective is to maximize the competitive ratio between the expected gain of the seller and that of the maximum bid. It is shown by Correa et al. [1] that when the distribution is unknown or only o(n) uniform samples from the distribution are given, the best an algorithm can do is 1/e-competitive. In contrast, when the distribution is known [2], or when Ω(n) uniform samples are given [3], the optimal competitive ratio of 0.7451 can be achieved. In this paper, we study the setting when the seller has access to a single point in the cumulative density function of the distribution, which can be learned from historical sales data. We investigate how effectively this data point can be used to design competitive algorithms. Motivated by the algorithm for the secretary problem, we propose the observe-and-accept algorithm that sets a threshold in the first phase using the data point and adopts the highest bid from the first phase as the threshold for the second phase. It can be viewed as a natural combination of the single-threshold algorithm for prophet inequality and the secretary problem algorithm. We show that our algorithm achieves a good competitive ratio for a wide range of data points, reaching up to 0.6785-competitive as n for certain data points. Additionally, we study an extension of the algorithm that utilizes more than two phases and show that the competitive ratio can be further improved to at least 0.6862.
在这项工作中,我们研究了单选择先知不等式问题,其中卖家遇到n个在线出价序列。这些出价被建模为来自未知分布的独立和同分布(i.i.d)随机变量。在每个投标的价值被披露后,卖方必须立即做出是否接受投标并将物品出售给投标人的不可撤销的决定。目标是使卖方的预期收益与最高出价之间的竞争比率最大化。Correa et al.[1]表明,当分布未知或只给出o(n)个均匀样本时,算法的最佳性能是1/e竞争。而当分布已知[2]时,或给定Ω(n)个均匀样本[3]时,最优竞争比为0.7451。本文从历史销售数据中,研究了当销售者可以访问分布的累积密度函数中的单个点时的设置。我们将研究如何有效地利用这些数据点来设计竞争性算法。受秘书问题算法的启发,我们提出了一种观察-接受算法,该算法在第一阶段使用数据点设置阈值,并采用第一阶段的最高出价作为第二阶段的阈值。它可以看作是先知不等式的单阈值算法与秘书问题算法的自然结合。我们表明,我们的算法在广泛的数据点范围内实现了良好的竞争比,在某些数据点n→∞时达到了0.6785的竞争比。此外,我们研究了一种使用两个以上阶段的算法的扩展,并表明竞争比可以进一步提高到至少0.6862。
{"title":"IID prophet inequality with a single data point","authors":"Yilong Feng ,&nbsp;Bo Li ,&nbsp;Haolong Li ,&nbsp;Xiaowei Wu ,&nbsp;Yutong Wu","doi":"10.1016/j.artint.2025.104296","DOIUrl":"10.1016/j.artint.2025.104296","url":null,"abstract":"<div><div>In this work, we study the single-choice prophet inequality problem, where a seller encounters a sequence of <em>n</em> online bids. These bids are modeled as independent and identically distributed (i.i.d.) random variables drawn from an unknown distribution. Upon the revelation of each bid's value, the seller must make an immediate and irrevocable decision on whether to accept the bid and sell the item to the bidder. The objective is to maximize the competitive ratio between the expected gain of the seller and that of the maximum bid. It is shown by Correa et al. <span><span>[1]</span></span> that when the distribution is unknown or only <span><math><mi>o</mi><mo>(</mo><mi>n</mi><mo>)</mo></math></span> uniform samples from the distribution are given, the best an algorithm can do is <span><math><mn>1</mn><mo>/</mo><mi>e</mi></math></span>-competitive. In contrast, when the distribution is known <span><span>[2]</span></span>, or when <span><math><mi>Ω</mi><mo>(</mo><mi>n</mi><mo>)</mo></math></span> uniform samples are given <span><span>[3]</span></span>, the optimal competitive ratio of 0.7451 can be achieved. In this paper, we study the setting when the seller has access to a single point in the cumulative density function of the distribution, which can be learned from historical sales data. We investigate how effectively this data point can be used to design competitive algorithms. Motivated by the algorithm for the secretary problem, we propose the observe-and-accept algorithm that sets a threshold in the first phase using the data point and adopts the highest bid from the first phase as the threshold for the second phase. It can be viewed as a natural combination of the single-threshold algorithm for prophet inequality and the secretary problem algorithm. We show that our algorithm achieves a good competitive ratio for a wide range of data points, reaching up to 0.6785-competitive as <span><math><mi>n</mi><mo>→</mo><mo>∞</mo></math></span> for certain data points. Additionally, we study an extension of the algorithm that utilizes more than two phases and show that the competitive ratio can be further improved to at least 0.6862.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"341 ","pages":"Article 104296"},"PeriodicalIF":5.1,"publicationDate":"2025-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explanations for query answers under existential rules 存在规则下查询答案的解释
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-04 DOI: 10.1016/j.artint.2025.104294
İsmail İlkan Ceylan , Thomas Lukasiewicz , Enrico Malizia , Andrius Vaicenavičius
Ontology-based data access is an extensively studied paradigm aiming at improving query answers with the use of an “ontology”. An ontology is a specification of a domain of interest, which, in this context, is described via a logical theory. As a form of logical entailment, ontology-mediated query answering is fully interpretable, which makes it possible to derive explanations for ontological query answers. This is a quite important aspect, as the fact that many recent AI systems mostly operating as black boxes has led to some serious concerns. In the literature, various works on explanations in the context of description logics (DLs) have appeared, mostly focusing on explaining concept subsumption and concept unsatisfiability in the ontologies. Some works on explaining query entailment in DLs have appeared as well, however, mainly dealing with inconsistency-tolerant semantics and, actually, non-entailment of the queries. Surprisingly, explaining ontological query entailment has received little attention for ontology languages based on existential rules. In fact, although DLs are popular formalisms to model ontologies, it is generally agreed that rule-based ontologies are well-suited for data-intensive applications, as they allow us to conveniently deal with higher-arity relations, which naturally occur in standard relational databases. The goal of this work is to close this gap, and study the problem of explaining query entailment in the context of existential rules ontologies in terms of minimal subsets of database facts. We provide a thorough complexity analysis for several decision problems associated with minimal explanations for various classes of existential rules, and for different complexity measures.
基于本体的数据访问是一种被广泛研究的范式,旨在通过使用“本体”来改进查询答案。本体是感兴趣的领域的规范,在这种情况下,它是通过逻辑理论来描述的。作为逻辑蕴涵的一种形式,本体中介查询回答是完全可解释的,这使得推导本体查询答案的解释成为可能。这是一个非常重要的方面,因为许多最近的AI系统大多以黑盒子的方式运行,这导致了一些严重的担忧。在文献中,出现了各种描述逻辑背景下的解释工作,主要集中在解释本体中的概念包容和概念不满足性。一些解释dl中的查询蕴涵的工作也出现了,然而,主要是处理不一致容忍语义,实际上是查询的非蕴涵。令人惊讶的是,对于基于存在规则的本体语言,解释本体查询蕴涵却很少受到关注。事实上,尽管dl是为本体建模的流行形式化方法,但人们普遍认为,基于规则的本体非常适合于数据密集型应用程序,因为它们允许我们方便地处理在标准关系数据库中自然出现的更高密度的关系。这项工作的目标是缩小这一差距,并研究在存在规则本体的背景下,根据数据库事实的最小子集解释查询蕴涵的问题。我们为几个决策问题提供了全面的复杂性分析,这些决策问题与各种存在规则的最小解释和不同的复杂性度量相关。
{"title":"Explanations for query answers under existential rules","authors":"İsmail İlkan Ceylan ,&nbsp;Thomas Lukasiewicz ,&nbsp;Enrico Malizia ,&nbsp;Andrius Vaicenavičius","doi":"10.1016/j.artint.2025.104294","DOIUrl":"10.1016/j.artint.2025.104294","url":null,"abstract":"<div><div>Ontology-based data access is an extensively studied paradigm aiming at improving query answers with the use of an “ontology”. An ontology is a specification of a domain of interest, which, in this context, is described via a logical theory. As a form of logical entailment, ontology-mediated query answering is fully interpretable, which makes it possible to derive explanations for ontological query answers. This is a quite important aspect, as the fact that many recent AI systems mostly operating as black boxes has led to some serious concerns. In the literature, various works on explanations in the context of description logics (DLs) have appeared, mostly focusing on explaining concept subsumption and concept unsatisfiability in the ontologies. Some works on explaining query entailment in DLs have appeared as well, however, mainly dealing with inconsistency-tolerant semantics and, actually, <em>non</em>-entailment of the queries. Surprisingly, explaining ontological query entailment has received little attention for ontology languages based on existential rules. In fact, although DLs are popular formalisms to model ontologies, it is generally agreed that rule-based ontologies are well-suited for data-intensive applications, as they allow us to conveniently deal with higher-arity relations, which naturally occur in standard relational databases. The goal of this work is to close this gap, and study the problem of explaining query entailment in the context of existential rules ontologies in terms of minimal subsets of database facts. We provide a thorough complexity analysis for several decision problems associated with minimal explanations for various classes of existential rules, and for different complexity measures.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"341 ","pages":"Article 104294"},"PeriodicalIF":5.1,"publicationDate":"2025-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143394775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
No free lunch theorem for privacy-preserving LLM inference 保护隐私的LLM推理没有免费午餐定理
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-04 DOI: 10.1016/j.artint.2025.104293
Xiaojin Zhang , Yahao Pang , Yan Kang , Wei Chen , Lixin Fan , Hai Jin , Qiang Yang
Individuals and businesses have been significantly benefited by Large Language Models (LLMs) including PaLM, Gemini and ChatGPT in various ways. For example, LLMs enhance productivity, reduce costs, and enable us to focus on more valuable tasks. Furthermore, LLMs possess the capacity to sift through extensive datasets, uncover underlying patterns, and furnish critical insights that propel the frontiers of technology and science. However, LLMs also pose privacy concerns. Users' interactions with LLMs may expose their sensitive personal or company information. A lack of robust privacy safeguards and legal frameworks could permit the unwarranted intrusion or improper handling of individual data, thereby risking infringements of privacy and the theft of personal identities. To ensure privacy, it is essential to minimize the dependency between shared prompts and private information. Various randomization approaches have been proposed to protect prompts' privacy, but they may incur utility loss compared to unprotected LLMs prompting. Therefore, it is essential to evaluate the balance between the risk of privacy leakage and loss of utility when conducting effective protection mechanisms. The current study develops a framework for inferring privacy-protected Large Language Models (LLMs) and lays down a solid theoretical basis for examining the interplay between privacy preservation and utility. The core insight is encapsulated within a theorem that is called as the NFL (abbreviation of the word No-Free-Lunch) Theorem.
包括PaLM、Gemini和ChatGPT在内的大型语言模型(llm)以各种方式使个人和企业受益匪浅。例如,法学硕士提高了生产力,降低了成本,使我们能够专注于更有价值的任务。此外,法学硕士有能力筛选广泛的数据集,发现潜在的模式,并提供关键的见解,推动技术和科学的前沿。然而,法学硕士也带来了隐私问题。用户与法学硕士的互动可能会暴露其敏感的个人或公司信息。缺乏强有力的隐私保护措施和法律框架可能会导致对个人数据的未经授权的入侵或不当处理,从而有侵犯隐私和窃取个人身份的风险。为了确保隐私,必须尽量减少共享提示和私有信息之间的依赖关系。已经提出了各种随机化方法来保护提示的隐私,但与未受保护的llm提示相比,它们可能会导致效用损失。因此,在实施有效的保护机制时,必须评估隐私泄露风险与效用损失之间的平衡。本研究开发了一个推断隐私保护的大型语言模型(llm)的框架,并为研究隐私保护与效用之间的相互作用奠定了坚实的理论基础。核心观点被封装在一个定理中,这个定理被称为NFL定理(No-Free-Lunch这个词的缩写)。
{"title":"No free lunch theorem for privacy-preserving LLM inference","authors":"Xiaojin Zhang ,&nbsp;Yahao Pang ,&nbsp;Yan Kang ,&nbsp;Wei Chen ,&nbsp;Lixin Fan ,&nbsp;Hai Jin ,&nbsp;Qiang Yang","doi":"10.1016/j.artint.2025.104293","DOIUrl":"10.1016/j.artint.2025.104293","url":null,"abstract":"<div><div>Individuals and businesses have been significantly benefited by Large Language Models (LLMs) including PaLM, Gemini and ChatGPT in various ways. For example, LLMs enhance productivity, reduce costs, and enable us to focus on more valuable tasks. Furthermore, LLMs possess the capacity to sift through extensive datasets, uncover underlying patterns, and furnish critical insights that propel the frontiers of technology and science. However, LLMs also pose privacy concerns. Users' interactions with LLMs may expose their sensitive personal or company information. A lack of robust privacy safeguards and legal frameworks could permit the unwarranted intrusion or improper handling of individual data, thereby risking infringements of privacy and the theft of personal identities. To ensure privacy, it is essential to minimize the dependency between shared prompts and private information. Various randomization approaches have been proposed to protect prompts' privacy, but they may incur utility loss compared to unprotected LLMs prompting. Therefore, it is essential to evaluate the balance between the risk of privacy leakage and loss of utility when conducting effective protection mechanisms. The current study develops a framework for inferring privacy-protected Large Language Models (LLMs) and lays down a solid theoretical basis for examining the interplay between privacy preservation and utility. The core insight is encapsulated within a theorem that is called as the NFL (abbreviation of the word No-Free-Lunch) Theorem.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"341 ","pages":"Article 104293"},"PeriodicalIF":5.1,"publicationDate":"2025-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143394774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Kripke-Lewis semantics for belief update and belief revision 信念更新与修正的Kripke-Lewis语义
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-01 DOI: 10.1016/j.artint.2024.104259
Giacomo Bonanno
We provide a new characterization of both belief update and belief revision in terms of a Kripke-Lewis semantics. We consider frames consisting of a set of states, a Kripke belief relation and a Lewis selection function. Adding a valuation to a frame yields a model. Given a model and a state, we identify the initial belief set K with the set of formulas that are believed at that state and we identify either the updated belief set Kϕ or the revised belief set Kϕ (prompted by the input represented by formula ϕ) as the set of formulas that are the consequent of conditionals that (1) are believed at that state and (2) have ϕ as antecedent. We show that this class of models characterizes both the Katsuno-Mendelzon (KM) belief update functions and the Alchourrón, Gärdenfors and Makinson (AGM) belief revision functions, in the following sense: (1) each model gives rise to a partial belief function that can be completed into a full KM/AGM update/revision function, and (2) for every KM/AGM update/revision function there is a model whose associated belief function coincides with it. The difference between update and revision can be reduced to two semantic properties that appear in a stronger form in revision relative to update, thus confirming the finding by Peppas et al. (1996) [30] that, “for a fixed theory K, revising K is much the same as updating K”. It is argued that the proposed semantic characterization brings into question the common interpretation of belief revision and update as change in beliefs in response to new information.
本文提出了基于Kripke-Lewis语义的信念更新和信念修正的新表征。我们考虑由一组状态、一个Kripke信念关系和一个Lewis选择函数组成的框架。将估值添加到框架中生成模型。给定一个模型和一个状态,我们用在该状态下相信的一组公式来识别初始信念集K,我们将更新的信念集K φ或修改的信念集K φ(由公式φ表示的输入提示)识别为(1)在该状态下相信的条件的结果的公式集,(2)有ϕ作为先决条件。我们证明了这类模型既具有Katsuno-Mendelzon (KM)信念更新函数的特征,也具有Alchourrón、Gärdenfors和Makinson (AGM)信念修正函数的特征,在以下意义上:(1)每个模型产生一个可以完成为完整KM/AGM更新/修正函数的部分信念函数;(2)对于每个KM/AGM更新/修正函数,都有一个与其相关联的信念函数重合的模型。更新和修订之间的区别可以简化为两种语义属性,这两种语义属性在修订中相对于更新以更强的形式出现,从而证实了Peppas et al.(1996)[30]的发现,“对于一个固定的理论K,修订K与更新K大致相同”。本文认为,所提出的语义表征对信念修正和更新的常见解释提出了质疑,即信念在响应新信息时发生了变化。
{"title":"A Kripke-Lewis semantics for belief update and belief revision","authors":"Giacomo Bonanno","doi":"10.1016/j.artint.2024.104259","DOIUrl":"10.1016/j.artint.2024.104259","url":null,"abstract":"<div><div>We provide a new characterization of both belief update and belief revision in terms of a Kripke-Lewis semantics. We consider frames consisting of a set of states, a Kripke belief relation and a Lewis selection function. Adding a valuation to a frame yields a model. Given a model and a state, we identify the initial belief set <em>K</em> with the set of formulas that are believed at that state and we identify either the updated belief set <span><math><mi>K</mi><mo>⋄</mo><mi>ϕ</mi></math></span> or the revised belief set <span><math><mi>K</mi><mo>⁎</mo><mi>ϕ</mi></math></span> (prompted by the input represented by formula <em>ϕ</em>) as the set of formulas that are the consequent of conditionals that (1) are believed at that state and (2) have <em>ϕ</em> as antecedent. We show that this class of models characterizes both the Katsuno-Mendelzon (KM) belief update functions and the Alchourrón, Gärdenfors and Makinson (AGM) belief revision functions, in the following sense: (1) each model gives rise to a partial belief function that can be completed into a full KM/AGM update/revision function, and (2) for every KM/AGM update/revision function there is a model whose associated belief function coincides with it. The difference between update and revision can be reduced to two semantic properties that appear in a stronger form in revision relative to update, thus confirming the finding by Peppas et al. (1996) <span><span>[30]</span></span> that, “for a fixed theory <em>K</em>, revising <em>K</em> is much the same as updating <em>K</em>”. It is argued that the proposed semantic characterization brings into question the common interpretation of belief revision and update as change in beliefs in response to new information.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"339 ","pages":"Article 104259"},"PeriodicalIF":5.1,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142788884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EMOA*: A framework for search-based multi-objective path planning EMOA*:基于搜索的多目标路径规划框架
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-01 DOI: 10.1016/j.artint.2024.104260
Zhongqiang Ren , Carlos Hernández , Maxim Likhachev , Ariel Felner , Sven Koenig , Oren Salzman , Sivakumar Rathinam , Howie Choset
In the Multi-Objective Shortest Path Problem (MO-SPP), one has to find paths on a graph that simultaneously minimize multiple objectives. It is not guaranteed that there exists a path that minimizes all objectives, and the problem thus aims to find the set of Pareto-optimal paths from the start to the goal vertex. A variety of multi-objective A*-based search approaches have been developed for this purpose. Typically, these approaches maintain a front set at each vertex during the search process to keep track of the Pareto-optimal paths that reach that vertex. Maintaining these front sets becomes burdensome and often slows down the search when there are many Pareto-optimal paths. In this article, we first introduce a framework for MO-SPP with the key procedures related to the front sets abstracted and highlighted, which provides a novel perspective for understanding the existing multi-objective A*-based search algorithms. Within this framework, we develop two different, yet closely related approaches to maintain these front sets efficiently during the search. We show that our approaches can find all cost-unique Pareto-optimal paths, and analyze their runtime complexity. We implement the approaches and compare them against baselines using instances with three, four and five objectives. Our experimental results show that our approaches run up to an order of magnitude faster than the baselines.
在多目标最短路径问题(MO-SPP)中,人们必须在图上找到同时最小化多个目标的路径。不能保证存在最小化所有目标的路径,因此问题的目的是找到从起点到目标顶点的帕累托最优路径集。为此,开发了各种基于A*的多目标搜索方法。通常,这些方法在搜索过程中维护每个顶点的前集,以跟踪到达该顶点的帕累托最优路径。当存在许多帕累托最优路径时,维护这些前沿集变得很麻烦,而且往往会减慢搜索速度。在本文中,我们首先引入了一个MO-SPP框架,抽象并突出了与前集相关的关键程序,为理解现有的基于a *的多目标搜索算法提供了一个新的视角。在这个框架内,我们开发了两种不同但密切相关的方法来在搜索过程中有效地维护这些前集。我们证明了我们的方法可以找到所有成本唯一的帕累托最优路径,并分析了它们的运行时复杂度。我们实现这些方法,并使用具有三个、四个和五个目标的实例将它们与基线进行比较。我们的实验结果表明,我们的方法比基线快了一个数量级。
{"title":"EMOA*: A framework for search-based multi-objective path planning","authors":"Zhongqiang Ren ,&nbsp;Carlos Hernández ,&nbsp;Maxim Likhachev ,&nbsp;Ariel Felner ,&nbsp;Sven Koenig ,&nbsp;Oren Salzman ,&nbsp;Sivakumar Rathinam ,&nbsp;Howie Choset","doi":"10.1016/j.artint.2024.104260","DOIUrl":"10.1016/j.artint.2024.104260","url":null,"abstract":"<div><div>In the Multi-Objective Shortest Path Problem (MO-SPP), one has to find paths on a graph that simultaneously minimize multiple objectives. It is not guaranteed that there exists a path that minimizes all objectives, and the problem thus aims to find the set of Pareto-optimal paths from the start to the goal vertex. A variety of multi-objective A*-based search approaches have been developed for this purpose. Typically, these approaches maintain a front set at each vertex during the search process to keep track of the Pareto-optimal paths that reach that vertex. Maintaining these front sets becomes burdensome and often slows down the search when there are many Pareto-optimal paths. In this article, we first introduce a framework for MO-SPP with the key procedures related to the front sets abstracted and highlighted, which provides a novel perspective for understanding the existing multi-objective A*-based search algorithms. Within this framework, we develop two different, yet closely related approaches to maintain these front sets efficiently during the search. We show that our approaches can find all cost-unique Pareto-optimal paths, and analyze their runtime complexity. We implement the approaches and compare them against baselines using instances with three, four and five objectives. Our experimental results show that our approaches run up to an order of magnitude faster than the baselines.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"339 ","pages":"Article 104260"},"PeriodicalIF":5.1,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142788886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Out-of-distribution detection by regaining lost clues 通过恢复丢失的线索进行分布外检测
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-01 DOI: 10.1016/j.artint.2024.104275
Zhilin Zhao , Longbing Cao , Philip S. Yu
Out-of-distribution (OOD) detection identifies samples in the test phase that are drawn from distributions distinct from that of training in-distribution (ID) samples for a trained network. According to the information bottleneck, networks that classify tabular data tend to extract labeling information from features with strong associations to ground-truth labels, discarding less relevant labeling cues. This behavior leads to a predicament in which OOD samples with limited labeling information receive high-confidence predictions, rendering the network incapable of distinguishing between ID and OOD samples. Hence, exploring more labeling information from ID samples, which makes it harder for an OOD sample to obtain high-confidence predictions, can address this over-confidence issue on tabular data. Accordingly, we propose a novel transformer chain (TC), which comprises a sequence of dependent transformers that iteratively regain discarded labeling information and integrate all the labeling information to enhance OOD detection. The generalization bound theoretically reveals that TC can balance ID generalization and OOD detection capabilities. Experimental results demonstrate that TC significantly surpasses state-of-the-art methods for OOD detection in tabular data.
分布外(OOD)检测识别测试阶段的样本,这些样本是从与训练网络的训练分布内(ID)样本不同的分布中提取的。根据信息瓶颈,分类表格数据的网络倾向于从与真值标签有强关联的特征中提取标记信息,丢弃不太相关的标记线索。这种行为导致标签信息有限的OOD样本接受高置信度预测的困境,使得网络无法区分ID和OOD样本。因此,从ID样本中探索更多的标签信息,这使得OOD样本更难获得高置信度的预测,可以解决表格数据上的这种过度置信度问题。因此,我们提出了一种新的变压器链(TC),它由一系列相互依赖的变压器组成,这些变压器迭代地重新获得丢弃的标签信息并整合所有标签信息以增强OOD检测。理论上的泛化界表明,TC可以平衡ID泛化和OOD检测能力。实验结果表明,在表格数据中,TC显著优于最先进的OOD检测方法。
{"title":"Out-of-distribution detection by regaining lost clues","authors":"Zhilin Zhao ,&nbsp;Longbing Cao ,&nbsp;Philip S. Yu","doi":"10.1016/j.artint.2024.104275","DOIUrl":"10.1016/j.artint.2024.104275","url":null,"abstract":"<div><div>Out-of-distribution (OOD) detection identifies samples in the test phase that are drawn from distributions distinct from that of training in-distribution (ID) samples for a trained network. According to the information bottleneck, networks that classify tabular data tend to extract labeling information from features with strong associations to ground-truth labels, discarding less relevant labeling cues. This behavior leads to a predicament in which OOD samples with limited labeling information receive high-confidence predictions, rendering the network incapable of distinguishing between ID and OOD samples. Hence, exploring more labeling information from ID samples, which makes it harder for an OOD sample to obtain high-confidence predictions, can address this over-confidence issue on tabular data. Accordingly, we propose a novel transformer chain (TC), which comprises a sequence of dependent transformers that iteratively regain discarded labeling information and integrate all the labeling information to enhance OOD detection. The generalization bound theoretically reveals that TC can balance ID generalization and OOD detection capabilities. Experimental results demonstrate that TC significantly surpasses state-of-the-art methods for OOD detection in tabular data.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"339 ","pages":"Article 104275"},"PeriodicalIF":5.1,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142867652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal verification and synthesis of mechanisms for social choice 社会选择机制的形式验证与综合
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-01 DOI: 10.1016/j.artint.2024.104272
Munyque Mittelmann , Bastien Maubert , Aniello Murano , Laurent Perrussel
Mechanism Design (MD) aims at defining resources allocation protocols that satisfy a predefined set of properties, and Auction Mechanisms are of foremost importance. Core properties of mechanisms, such as strategy-proofness or budget balance, involve: (i) complex strategic concepts such as Nash equilibria, (ii) quantitative aspects such as utilities, and often (iii) imperfect information, with agents' private valuations. We demonstrate that Strategy Logic provides a formal framework fit to model mechanisms and express such properties, and we show that it can be used either to automatically check that a given mechanism satisfies some property (verification), or automatically produce a mechanism that does (synthesis). To do so, we consider a quantitative and variant of Strategy Logic. We first show how to express the implementation of social choice functions. Second, we show how fundamental mechanism properties can be expressed as logical formulas, and thus evaluated by model checking. We then prove that model checking for this particular variant of Strategy Logic can be done in polynomial space. Next, we show how MD can be rephrased as a synthesis problem, where mechanisms are automatically synthesized from a partial or complete logical specification. We solve the automated synthesis of mechanisms in two cases: when the number of actions is bounded, and when agents play in turns. Finally, we provide examples of auction design based for each of these two cases. The benefit of our approach in relation to classical MD is to provide a general framework for addressing a large spectrum of MD problems, which is not tailored to a particular setting or problem.
机制设计(MD)旨在定义满足一系列预定属性的资源分配协议,其中拍卖机制最为重要。机制的核心属性,如策略防错或预算平衡,涉及:(i) 复杂的策略概念,如纳什均衡;(ii) 定量方面,如效用;(iii) 不完全信息,包括代理人的私人估值。我们证明,策略逻辑提供了一个正式的框架,适合对机制进行建模并表达此类属性,我们还证明,策略逻辑可用于自动检查给定机制是否满足某些属性(验证),或自动生成满足某些属性的机制(合成)。为此,我们考虑了策略逻辑的定量和变体。我们首先展示如何表达社会选择功能的实现。其次,我们展示了如何将基本机制属性表达为逻辑公式,并通过模型检查进行评估。然后,我们证明这种特定的策略逻辑变体的模型检查可以在多项式空间内完成。接下来,我们展示了如何将 MD 重新表述为一个合成问题,即从部分或完整的逻辑规范自动合成机制。我们解决了两种情况下的机制自动合成问题:当行动数量有限制时,以及当代理轮流参与游戏时。最后,我们分别提供了基于这两种情况的拍卖设计实例。与经典 MD 相比,我们的方法的优势在于为解决大量 MD 问题提供了一个通用框架,而不是针对特定环境或问题量身定制的。
{"title":"Formal verification and synthesis of mechanisms for social choice","authors":"Munyque Mittelmann ,&nbsp;Bastien Maubert ,&nbsp;Aniello Murano ,&nbsp;Laurent Perrussel","doi":"10.1016/j.artint.2024.104272","DOIUrl":"10.1016/j.artint.2024.104272","url":null,"abstract":"<div><div>Mechanism Design (MD) aims at defining resources allocation protocols that satisfy a predefined set of properties, and Auction Mechanisms are of foremost importance. Core properties of mechanisms, such as strategy-proofness or budget balance, involve: (i) complex strategic concepts such as Nash equilibria, (ii) quantitative aspects such as utilities, and often (iii) imperfect information, with agents' private valuations. We demonstrate that Strategy Logic provides a formal framework fit to model mechanisms and express such properties, and we show that it can be used either to automatically check that a given mechanism satisfies some property (verification), or automatically produce a mechanism that does (synthesis). To do so, we consider a quantitative and variant of Strategy Logic. We first show how to express the implementation of social choice functions. Second, we show how fundamental mechanism properties can be expressed as logical formulas, and thus evaluated by model checking. We then prove that model checking for this particular variant of Strategy Logic can be done in polynomial space. Next, we show how MD can be rephrased as a synthesis problem, where mechanisms are automatically synthesized from a partial or complete logical specification. We solve the automated synthesis of mechanisms in two cases: when the number of actions is bounded, and when agents play in turns. Finally, we provide examples of auction design based for each of these two cases. The benefit of our approach in relation to classical MD is to provide a general framework for addressing a large spectrum of MD problems, which is not tailored to a particular setting or problem.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"339 ","pages":"Article 104272"},"PeriodicalIF":5.1,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142821057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Artificial Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1