Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2024
FedRoLA: Robust Federated Learning Against Model Poisoning via Layer-based Aggregation
KDD '24: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 3667–3678https://doi.org/10.1145/3637528.3671906Federated Learning (FL) is increasingly vulnerable to model poisoning attacks, where malicious clients degrade the global model's accuracy with manipulated updates. Unfortunately, most existing defenses struggle to handle the scenarios when multiple ...
- research-articleJuly 2024
Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 257–273https://doi.org/10.1145/3634737.3657022Computing the distance between two non-normalized vectors x and y, represented by Δ (x, y) and comparing it to a predefined public threshold τ is an essential functionality used in privacy-sensitive applications such as biometric authentication, ...
- research-articleAugust 2024
Research on Large Language Model Q&A Method Based on Specific Domain Regulation Documents
MIDA '24: Proceedings of the 2024 International Conference on Machine Intelligence and Digital ApplicationsPages 319–323https://doi.org/10.1145/3662739.3665685In response to the lack of relevant high-quality Q&A (question and answer) datasets in some specific domain Q&A systems, this paper proposes a large language model Q&A Method based on specific domain regulation documents. The paper adopts natural ...
- short-paperMay 2024
Is Cosine-Similarity of Embeddings Really About Similarity?
WWW '24: Companion Proceedings of the ACM Web Conference 2024Pages 887–890https://doi.org/10.1145/3589335.3651526Cosine-similarity is the cosine of the angle between two vectors, or equivalently the dot product between their normalizations. A popular application is to quantify semantic similarity between high-dimensional objects by applying cosine-similarity to a ...
- posterMarch 2024
Towards More Efficient Office Hours for Large Courses: Using Cosine Similarity to Efficiently Construct Student Help Groups
SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 2Pages 1684–1685https://doi.org/10.1145/3626253.3635544As undergraduate enrollment in computer science rises, instructors continue to investigate methods to improve the student experience at scale. One aspect commonly used in courses at scale is queue-driven office hours, in which students join an online ...
-
- research-articleSeptember 2024
A data classification method for innovation and entrepreneurship in applied universities based on nearest neighbour criterion
International Journal of Business Intelligence and Data Mining (IJBIDM), Volume 25, Issue 3-4Pages 382–393https://doi.org/10.1504/ijbidm.2024.140894Aiming to improve the accuracy, recall, and F1 value of data classification, this paper proposes an applied university innovation and entrepreneurship data classification method based on the nearest neighbour criterion. Firstly, the decision tree ...
- research-articleApril 2024
Knowledge mapping-based online teaching resource recommendation method for Chinese education
International Journal of Business Intelligence and Data Mining (IJBIDM), Volume 24, Issue 3-4Pages 252–265https://doi.org/10.1504/ijbidm.2024.137740In order to overcome the problems of poor recommendation accuracy, low recommendation recall and long recommendation time in traditional teaching resource recommendation methods, a knowledge map based Chinese online teaching resource recommendation ...
- research-articleMarch 2024
Selection of HBV key reactivation factors based on maximum information coefficient combined with cosine similarity
Technology and Health Care (TAHC), Volume 32, Issue 2Pages 749–763https://doi.org/10.3233/THC-230161BACKGROUND:Hepatitis B Virus (HBV) reactivation is the most common complication for patients with primary liver cancer (PLC) after radiotherapy. How to reduce the reactivation of HBV has been a hot topic in the study of postoperative radiotherapy for ...
- research-articleMarch 2024
A Study of Summarization and Keyword Extraction Function in Meeting Note Generation System from Voice Records
ICNCC '23: Proceedings of the 2023 12th International Conference on Networks, Communication and ComputingPages 106–112https://doi.org/10.1145/3638837.3638853Currently, we are studying a meeting note generation system to automatically make a note from voice records. Previously, we implemented the first function of the system to convert voice records to texts using the Whisper model. However, the current ...
- ArticleMarch 2024
Privacy-Preserving Plagiarism Checking
AbstractPlagiarism is a pressing issue in academia and industry, where individuals often modify existing content without providing due credit to the original creator and unethically claiming the work to be their own. Existing plagiarism detection tools ...
- research-articleJanuary 2023
Research on user phase identification algorithm based on improved cloud model and adaptive segmented voltage
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 45, Issue 5Pages 8583–8594https://doi.org/10.3233/JIFS-232415To solve the problem of inaccurate user phase identification, the paper proposes a new algorithm based on improved cloud model and adaptive segmented voltage algorithm. Firstly, the new algorithm uses improved cloud model to calculate the digital features ...
- research-articleJanuary 2023
An improved k-NN anomaly detection framework based on locality sensitive hashing for edge computing environment
Intelligent Data Analysis (INDA), Volume 27, Issue 5Pages 1267–1285https://doi.org/10.3233/IDA-216461Large deployment of wireless sensor networks in various fields bring great benefits. With the increasing volume of sensor data, traditional data collection and processing schemes gradually become unable to meet the requirements in actual ...
- research-articleJanuary 2023
An online social network image retrieval using deep belief network
International Journal of Web Based Communities (IJWBC), Volume 19, Issue 4Pages 320–331https://doi.org/10.1504/ijwbc.2023.134866In order to solve the problems of high retrieval error rate and long retrieval time existing in traditional online social network image retrieval methods, this paper proposes an online social network image retrieval method based on deep belief network. ...
- research-articleJanuary 2023
Multiple evaluation methods of MOOC online English teaching quality based on social network
International Journal of Web Based Communities (IJWBC), Volume 19, Issue 2-3Pages 175–186https://doi.org/10.1504/ijwbc.2023.131401In order to solve the problem of low evaluation accuracy of English teaching quality evaluation methods, this paper designs a diversified evaluation method of MOOC online English teaching quality based on social network. Firstly, the characteristics of ...
- research-articleJanuary 2023
SCS-Net: An efficient and practical approach towards Face Mask Detection
Procedia Computer Science (PROCS), Volume 218, Issue CPages 1878–1887https://doi.org/10.1016/j.procs.2023.01.165AbstractMuch work has been done in the computer vision domain for the problem of facial mask detection to curb the spread of the Coronavirus disease (COVID-19). Preventive measures developed using deep learning-based models have got enormous attention. ...
- research-articleDecember 2022
Unsupervised spectral feature selection algorithms for high dimensional data
Frontiers of Computer Science: Selected Publications from Chinese Universities (FCS), Volume 17, Issue 5https://doi.org/10.1007/s11704-022-2135-0AbstractIt is a significant and challenging task to detect the informative features to carry out explainable analysis for high dimensional data, especially for those with very small number of samples. Feature selection especially the unsupervised ones are ...
- research-articleNovember 2022
Local Density Estimation in High Dimensions
Mathematics of Operations Research (MOOR), Volume 47, Issue 4Pages 2614–2640https://doi.org/10.1287/moor.2021.1221An important question that arises in the study of high-dimensional vector representations learned from data are, given a set D of vectors and a query q, estimate the number of points within a specified distance threshold of q. We develop two estimators, ...
- research-articleJanuary 2022
An anti-phishing model based on similarity measurement
International Journal of Computational Vision and Robotics (IJCVR), Volume 12, Issue 2Pages 141–155https://doi.org/10.1504/ijcvr.2022.121169Phishing has represented a more noteworthy danger to clients. In the current work, the authors attempted to build up a powerful anti-phishing technique based on hybrid similarity approach combining Cosine and Soft Cosine similarity that measures the ...
- research-articleDecember 2021
Interpretive self-supervised pre-training: boosting performance on visual medical data
ICVGIP '21: Proceedings of the Twelfth Indian Conference on Computer Vision, Graphics and Image ProcessingArticle No.: 15, Pages 1–9https://doi.org/10.1145/3490035.3490273Self-supervised learning algorithms have become one of the best tools for unsupervised representation learning. Although self- supervised algorithms have achieved state-of-the-art performance for classification tasks in the case of natural image data, ...
- research-articleJanuary 2021
An efficient technique for cloud storage using secured de-duplication algorithm
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 41, Issue 2Pages 2969–2980https://doi.org/10.3233/JIFS-210038Techniques of data compression involve de-duplication of data that plays an important role in eliminating duplicate copies of information and has been widely employed in cloud storage to scale back the storage capacity and save information measure. A ...