Searched for: subject%3A%22Neural%255C+network%22
(1 - 14 of 14)
document
Xu, J. (author)
Deep Neural Networks (DNNs) have found extensive applications across diverse fields, such as image classification, speech recognition, and natural language processing. However, their susceptibility to various adversarial attacks, notably the backdoor attack, has repeatedly been demonstrated in recent years. <br/>The backdoor attack aims to...
doctoral thesis 2025
document
Xu, Y. (author)
Micro air vehicles (MAVs) have shown significant potential in modern society. The development in robotics and automation is changing the roles of MAVs from remotely controlled machines requiring human pilots to autonomous and intelligent robots. There is an increasing number of autonomous MAVs involved in outdoor operations. In contrast, the...
doctoral thesis 2023
document
Wan, Z. (author), Chang, Z. (author), Xu, Y. (author), Šavija, B. (author)
In this paper, optimization of vascular structure of self-healing concrete is performed with deep neural network (DNN). An input representation method is proposed to effectively represent the concrete beams with 6 round pores in the middle span as well as benefit the optimization process. To investigate the feasibility of using DNN for...
journal article 2023
document
Xu, J. (author), Abad, Gorka (author), Picek, S. (author)
Backdoor attacks have been demonstrated as a security threat for machine learning models. Traditional backdoor attacks intend to inject backdoor functionality into the model such that the backdoored model will perform abnormally on inputs with predefined backdoor triggers and still retain state-of-the-art performance on the clean inputs. While...
conference paper 2023
document
Li, Wanda (author), Xu, Zhiwei (author), Sun, Yi (author), Gong, Qingyuan (author), Chen, Y. (author), Ding, Aaron Yi (author), Wang, Xin (author), Hui, Pan (author)
Outstanding users (OUs) denote the influential, 'core' or 'bridge' users in online social networks. How to accurately detect and rank them is an important problem for third-party online service providers and researchers. Conventional efforts, ranging from early graph-based algorithms to recent machine learning-based approaches, typically rely on...
journal article 2023
document
Koffas, S. (author), Xu, J. (author), Conti, M. (author), Picek, S. (author)
This work explores backdoor attacks for automatic speech recognition systems where we inject inaudible triggers. By doing so, we make the backdoor attack challenging to detect for legitimate users and, consequently, potentially more dangerous. We conduct experiments on two versions of a speech dataset and three neural networks and explore the...
conference paper 2022
document
Xu, R. (author), Zhou, Xu Hui (author), Han, Jiequn (author), Dwight, R.P. (author), Xiao, Heng (author)
In fluid dynamics, constitutive models are often used to describe the unresolved turbulence and to close the Reynolds averaged Navier–Stokes (RANS) equations. Traditional PDE-based constitutive models are usually too rigid to calibrate with a large set of high-fidelity data. Moreover, commonly used turbulence models are based on the weak...
journal article 2022
document
Xu, J. (author), Picek, S. (author)
Graph Neural Networks (GNNs) have achieved impressive results in various graph learning tasks. They have found their way into many applications, such as fraud detection, molecular property prediction, or knowledge graph reasoning. However, GNNs have been recently demonstrated to be vulnerable to backdoor attacks. In this work, we explore a...
conference paper 2022
document
Chang, Z. (author), Wan, Z. (author), Xu, Y. (author), Schlangen, E. (author), Šavija, B. (author)
Extrusion-based 3D concrete printing (3DCP) results in deposited materials with complex microstructures that have high porosity and distinct anisotropy. Due to the material heterogeneity and rapid growth of cracks, fracture analysis in these air-void structures is often complex, resulting in a high computational cost. This study proposes a...
journal article 2022
document
Xu, J. (author), Wang, R. (author), Koffas, S. (author), Liang, K. (author), Picek, S. (author)
Graph Neural Networks (GNNs) are a class of deep learning-based methods for processing graph domain information. GNNs have recently become a widely used graph analysis method due to their superior ability to learn representations for complex graph data. Due to privacy concerns and regulation restrictions, centralized GNNs can be difficult to...
conference paper 2022
document
Conti, M. (author), Li, Jiaxin (author), Picek, S. (author), Xu, J. (author)
Graph Neural Networks (GNNs), inspired by Convolutional Neural Networks (CNNs), aggregate the message of nodes' neighbors and structure information to acquire expressive representations of nodes for node classification, graph classification, and link prediction. Previous studies have indicated that node-level GNNs are vulnerable to Membership...
conference paper 2022
document
Tao, Qinghua (author), Li, Zhen (author), Xu, Jun (author), Lin, Shu (author), De Schutter, B.H.K. (author), Suykens, Johan A.K. (author)
Traffic flow (TF) prediction is an important and yet a challenging task in transportation systems, since the TF involves high nonlinearities and is affected by many elements. Recently, neural networks have attracted much attention for TF prediction, but they are commonly black boxes with complex architectures and difficult to be interpreted,...
journal article 2022
document
Xu, J. (author), Xue, Minhui (author), Picek, S. (author)
Backdoor attacks represent a serious threat to neural network models. A backdoored model will misclassify the trigger-embedded inputs into an attacker-chosen target label while performing normally on other benign inputs. There are already numerous works on backdoor attacks on neural networks, but only a few works consider graph neural...
conference paper 2021
document
Sun, Zhu (author), Yang, J. (author), Zhang, J. (author), Bozzon, A. (author), Huang, Long Kai (author), Xu, Chi (author)
Knowledge graphs (KGs) have proven to be effective to improve recommendation. Existing methods mainly rely on hand-engineered features from KGs (e.g., meta paths), which requires domain knowledge. This paper presents RKGE, a KG embedding approach that automatically learns semantic representations of both entities and paths between entities...
conference paper 2018
Searched for: subject%3A%22Neural%255C+network%22
(1 - 14 of 14)