Articles with "adversarial training" as a keyword



Photo from wikipedia

Adversarial training based lattice LSTM for Chinese clinical named entity recognition

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of biomedical informatics"

DOI: 10.1016/j.jbi.2019.103290

Abstract: Clinical named entity recognition (CNER), which intends to automatically detect clinical entities in electronic health record (EHR), is a committed step for further clinical text mining. Recently, more and more deep learning models are used… read more here.

Keywords: clinical named; entity recognition; adversarial training; lattice lstm ... See more keywords
Photo from wikipedia

De novo generation of dual-target ligands using adversarial training and reinforcement learning.

Sign Up to like & get
recommendations!
Published in 2021 at "Briefings in bioinformatics"

DOI: 10.1093/bib/bbab333

Abstract: Artificial intelligence, such as deep generative methods, represents a promising solution to de novo design of molecules with the desired properties. However, generating new molecules with biological activities toward two specific targets remains an extremely… read more here.

Keywords: dual target; novo generation; target; adversarial training ... See more keywords
Photo from wikipedia

Prostate MR Image Segmentation With Self-Attention Adversarial Training Based on Wasserstein Distance

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2959611

Abstract: Prostate diseases are very common in men. Accurate segmentation of the prostate plays a significant role in further clinical treatment and diagnosis. There have been some methods that combine the segmentation network and generative adversarial… read more here.

Keywords: adversarial training; prostate; attention; segmentation ... See more keywords
Photo from wikipedia

Adversarial Training Improved Multi-Path Multi-Scale Relation Detector for Knowledge Base Question Answering

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2984393

Abstract: Knowledge Base Question Answering (KBQA) is a promising approach for users to access substantial knowledge and has become a research focus in recent years. Our paper focuses on relation detection, a subtask of KBQA and… read more here.

Keywords: question; adversarial training; knowledge base; relation ... See more keywords
Photo from wikipedia

Self-Supervised Animation Synthesis Through Adversarial Training

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3008523

Abstract: In this paper, we propose a novel deep generative model for image animation synthesis. Based on self-supervised learning and adversarial training, the model can find labeling rules and mark them without origin sample labels. In… read more here.

Keywords: self supervised; adversarial training; animation synthesis; animation ... See more keywords
Photo by victorfreitas from unsplash

Directional Adversarial Training for Robust Ownership-Based Recommendation System

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3140352

Abstract: Machine learning algorithms are susceptible to cyberattacks, posing security problems in computer vision, speech recognition, and recommendation systems. So far, researchers have made great strides in adopting adversarial training as a defensive strategy. Single-step adversarial… read more here.

Keywords: recommendation; training; directional adversarial; adversarial training ... See more keywords
Photo by iamromankraft from unsplash

Adversarial Training for Fake News Classification

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3195030

Abstract: News is a source of information to know about progress in the various areas of life all across the globe. However, the volume of this information is high, and getting benefits from the available information… read more here.

Keywords: baseline; classification; fake news; news ... See more keywords
Photo from wikipedia

Improving Health Mention Classification of Social Media Content Using Contrastive Adversarial Training

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3200159

Abstract: Health mention classification (HMC) involves the classification of an input text as health mention or not. Figurative and non-health mention of disease words makes the classification task challenging. Learning the context of the input text… read more here.

Keywords: classification; adversarial training; mention classification; health mention ... See more keywords
Photo from wikipedia

AccelAT: A Framework for Accelerating the Adversarial Training of Deep Neural Networks Through Accuracy Gradient

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3213734

Abstract: Adversarial training is exploited to develop a robust Deep Neural Network (DNN) model against the malicious altered data. These attacks may have catastrophic effects on DNN models but are indistinguishable for a human being. For… read more here.

Keywords: accelerating adversarial; training; deep neural; accuracy gradient ... See more keywords
Photo from wikipedia

Revisiting the Adversarial Robustness-Accuracy Tradeoff in Robot Learning

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Robotics and Automation Letters"

DOI: 10.1109/lra.2023.3240930

Abstract: Adversarial training (i.e., training on adversarially perturbed input data) is a well-studied method for making neural networks robust to potential adversarial attacks during inference. However, the improved robustness does not come for free but rather… read more here.

Keywords: robot learning; adversarial training; robustness accuracy; robot ... See more keywords
Photo by cokdewisnu from unsplash

R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2022.3222090

Abstract: Hardware Trojans (HTs) have become a serious problem, and extermination of them is strongly required for enhancing the security and safety of integrated circuits. An effective solution is to identify HTs at the gate level… read more here.

Keywords: hardware; htdetector; machine learning; detection ... See more keywords