Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025JUST ACCEPTED
Scalable Subsampling Inference for Deep Neural Networks
Deep neural networks (DNN) has received increasing attention in machine learning applications in the last several years. Recently, a non-asymptotic error bound has been developed to measure the performance of the fully connected DNN estimator with ReLU ...
HighlightsProblem statement
Machine Learning (ML) methods have been developed rapidly. Among different ML methods, Deep Neural Networks (DNN) received increased attention due to their great empirical performance. However, their theoretical foundation is ...
- surveyJanuary 2025JUST ACCEPTED
Can Graph Neural Networks be Adequately Explained? A Survey
To address the barrier caused by the black-box nature of Deep Learning (DL) for practical deployment, eXplainable Artificial Intelligence (XAI) has emerged and is developing rapidly. While significant progress has been made in explanation techniques for ...
- research-articleJanuary 2025
NetProbe: Deep Learning-Driven DDoS Detection with a Two-Tiered Mitigation Strategy
ICDCN '25: Proceedings of the 26th International Conference on Distributed Computing and NetworkingPages 402–407https://doi.org/10.1145/3700838.3703687Web servers are the backbone of modern Internet infrastructure, serving as the primary medium for online information distribution. Despite their critical role, web servers are susceptible to cyber-attacks. While current firewall mechanisms provide some ...
- research-articleJanuary 2025
Unmanned Aerial Vehicle (UAV) Based Disaster Detection and Crowd Sensing Using Deep Learning Models
ICDCN '25: Proceedings of the 26th International Conference on Distributed Computing and NetworkingPages 414–419https://doi.org/10.1145/3700838.3703685Natural disasters, such as earthquakes, floods, fires, and hurricanes, result in extensive damage and challenge effective disaster management and rescue efforts. Timely detection of disaster zones and accurate crowd density estimation are essential for ...
- research-articleJanuary 2025
Detecting Adversarial Samples using Kernel Density Feature Extractor in Medical Image
ICDCN '25: Proceedings of the 26th International Conference on Distributed Computing and NetworkingPages 420–425https://doi.org/10.1145/3700838.3703675Deep learning algorithms have advanced in medical imaging, and they have demonstrated promising outcomes in the diagnosis of numerous disorders. A recent study found that adversarial examples/attacks, which entail making minute, almost undetectable ...
-
- research-articleDecember 2024
Exploring Dataset Bias and Scaling Techniques in Multi-Source Gait Biomechanics: An Explainable Machine Learning Approach
- research-articleDecember 2024
- research-articleDecember 2024
Studying the Impact of TensorFlow and PyTorch Bindings on Machine Learning Software Quality
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 34, Issue 1Article No.: 20, Pages 1–31https://doi.org/10.1145/3678168Bindings for machine learning frameworks (such as TensorFlow and PyTorch) allow developers to integrate a framework’s functionality using a programming language different from the framework’s default language (usually Python). In this article, we study ...
- research-articleDecember 2024
Invisible Adversarial Watermarking: A Novel Security Mechanism for Enhancing Copyright Protection
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 21, Issue 2Article No.: 43, Pages 1–22https://doi.org/10.1145/3652608Invisible watermarking can be used as an important tool for copyright certification in the Metaverse. However, with the advent of deep learning, Deep Neural Networks (DNNs) have posed new threats to this technique. For example, artificially trained DNNs ...
- research-articleDecember 2024JUST ACCEPTED
A Multiple Attention Layer-shareable Method for Link Prediction in Multilayer Networks
ACM Transactions on Knowledge Discovery from Data (TKDD), Just Accepted https://doi.org/10.1145/3709142Link prediction in multilayer networks aims to predict missing links at the target layer by incorporating structural information from both auxiliary layers and the target layer. Existing methods tend to learn layer-specific knowledge to maximize the link ...
- surveyDecember 2024
AI-powered Fraud Detection in Decentralized Finance: A Project Life Cycle Perspective
ACM Computing Surveys (CSUR), Volume 57, Issue 4Article No.: 96, Pages 1–38https://doi.org/10.1145/3705296Decentralized finance (DeFi) represents a novel financial system but faces significant fraud challenges, leading to substantial losses. Recent advancements in artificial intelligence (AI) show potential for complex fraud detection. Despite growing ...
- articleDecember 2024
Quantization Aware Factorization for Deep Neural Network Compression
Tensor decomposition of convolutional and fully-connected layers is an effective way to reduce parameters and FLOP in neural networks. Due to memory and power consumption limitations of mobile or embedded devices, the quantization step is usually ...
- research-articleDecember 2024JUST ACCEPTED
Ubiquitous and Low-Overhead Floor Identification with Limited Cellular Information
ACM Transactions on Spatial Algorithms and Systems (TSAS), Just Accepted https://doi.org/10.1145/3708986Floor identification has gained much attention due to the increasing demand for indoor location-based services, especially prompt emergency response services. Leveraging cellular signals for floor identification has recently been of interest due to the ...
- research-articleDecember 2024JUST ACCEPTED
Building Robust and Trustworthy HGNN Models: A Learnable Threshold Approach for Node Classification
ACM Transactions on Knowledge Discovery from Data (TKDD), Just Accepted https://doi.org/10.1145/3707645Message passing scheme is a general idea for graph neural networks (GNNs) to learn node representations. During message passing, given a target node, we transform and aggregate the feature vectors of its neighbours and generate a representation vector for ...
- research-articleJanuary 2025
Enhancing Sleep Disorder Diagnosis with a Machine Learning Approach Using Ensemble Neural Networks: Sleep Disorder Diagnosis with Ensemble Neural Networks: Sleep Disorder Diagnosis with Ensemble Neural Networks
NSysS '24: Proceedings of the 11th International Conference on Networking, Systems, and SecurityPages 48–55https://doi.org/10.1145/3704522.3704533Sleep disorders, including conditions such as obstructive sleep apnea, significantly impact the quality of life and pose serious health risks. Early detection and diagnosis are crucial for effective management. This study explores various machine learning ...
- research-articleJanuary 2025
XLNet-CNN: Combining Global Context Understanding of XLNet with Local Context Capture through Convolution for Improved Multi-Label Text Classification
NSysS '24: Proceedings of the 11th International Conference on Networking, Systems, and SecurityPages 24–31https://doi.org/10.1145/3704522.3704540Multi-label text classification (MLTC) is the task of assigning multiple relevant labels to a text, which is particularly challenging due to the complex interdependencies between labels and the imbalanced distribution of label frequencies. Domain-specific ...
- research-articleJanuary 2025
Enhancing Graph Representation Learning with WalkLM for Effective Community Detection
NSysS '24: Proceedings of the 11th International Conference on Networking, Systems, and SecurityPages 41–47https://doi.org/10.1145/3704522.3704537Embeddings in deep neural networks are essential for processing high-dimensional and categorical data by converting it into compact, low-dimensional vectors. This conversion enables the model to capture complex semantic relationships and improves its ...
- research-articleJanuary 2025
Knowledge Distillation and Weight Pruning for Two-step Compression of ConvNets in Rice Leaf Disease Classification
NSysS '24: Proceedings of the 11th International Conference on Networking, Systems, and SecurityPages 72–78https://doi.org/10.1145/3704522.3704525Rice is a crucial agricultural crop, but it is susceptible to various diseases. Although Convolutional Neural Networks (CNN) excel in classifying plant diseases, their significant computational demands render them impractical for resource-limited devices ...
- research-articleDecember 2024JUST ACCEPTED
Siamese Network-Based Detection of DeepFake Impersonation Attacks with a Person of Interest Approach
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Just Accepted https://doi.org/10.1145/3708352Deepfake technology presents critical cybersecurity challenges that have become more popular since easily accessible applications have become more widely available. The proliferation of fake portrait videos constitutes a serious risk to the legal system, ...
- surveyDecember 2024JUST ACCEPTED
Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning
Multi-Agent Reinforcement Learning (MARL) is susceptible to Adversarial Machine Learning (AML) attacks. Execution-time AML attacks against MARL are complex due to effects that propagate across time and between agents. To understand the interaction between ...