185 research outputs found
Optical Tweezers as a Micromechanical Tool for Studying Defects in 2D Colloidal Crystals
This paper reports on some new results from the analyses of the video
microscopy data obtained in a prior experiment on two-dimensional (2D)
colloidal crystals. It was reported previously that optical tweezers can be
used to create mono- and di-vacancies in a 2D colloidal crystal. Here we report
the results on the creation of a vacancy-interstitial pair, as well as
tri-vacancies. It is found that the vacancy-interstitial pair can be
long-lived, but they do annihilate each other. The behavior of tri-vacancies is
most intriguing, as it fluctuates between a configuration of bound pairs of
dislocations and that of a locally amorphous state. The relevance of this
observation to the issue of the nature of 2D melting is discussed.Comment: 6 pages, 4 figure
Private Model Compression via Knowledge Distillation
The soaring demand for intelligent mobile applications calls for deploying
powerful deep neural networks (DNNs) on mobile devices. However, the
outstanding performance of DNNs notoriously relies on increasingly complex
models, which in turn is associated with an increase in computational expense
far surpassing mobile devices' capacity. What is worse, app service providers
need to collect and utilize a large volume of users' data, which contain
sensitive information, to build the sophisticated DNN models. Directly
deploying these models on public mobile devices presents prohibitive privacy
risk. To benefit from the on-device deep learning without the capacity and
privacy concerns, we design a private model compression framework RONA.
Following the knowledge distillation paradigm, we jointly use hint learning,
distillation learning, and self learning to train a compact and fast neural
network. The knowledge distilled from the cumbersome model is adaptively
bounded and carefully perturbed to enforce differential privacy. We further
propose an elegant query sample selection method to reduce the number of
queries and control the privacy loss. A series of empirical evaluations as well
as the implementation on an Android mobile device show that RONA can not only
compress cumbersome models efficiently but also provide a strong privacy
guarantee. For example, on SVHN, when a meaningful
-differential privacy is guaranteed, the compact model trained
by RONA can obtain 20 compression ratio and 19 speed-up with
merely 0.97% accuracy loss.Comment: Conference version accepted by AAAI'1
The Relationship between Resilience and Mental Health: the Mediating Effect of Positive Emotions
To investigate the relationship of resilience, positive emotions and mental health, and the relationship of resilience, positive emotion and three sub-dimensions of mental health: self-affirmation, depression and anxiety. In this study, the existing cross-sectional data, select the Beijing Forestry University data as samples. In this study, questionnaire survey a random sample of 199 undergraduate students of Beijing Forestry University, they uniform application three Scale Surveying, PANAS, CD-RISC, GHQ-20. According from the study, (1) resilience, positive mood and general health are related where resilience and positive emotions between the resilience. General psychological health, positive emotions and general mental health?it is positively correlated. (2) Resilience and self-affirmation exists, positive correlation with depression and anxiety, respectively negative correlation. Between positive emotions and self-affirmation the positive correlation with anxiety negative correlation. (3) Part mediating effect of positive emotions exist between resilience and self-affirmation, resilience can be made to self-affirmation prediction coefficient from 0.042 down to 0.036. Therefore, this study concluded that resilience undergraduates can have an impact on mental health through the intermediary variable positive emotions
Adversarial Attack and Defense on Graph Data: A Survey
Deep neural networks (DNNs) have been widely applied to various applications
including image classification, text generation, audio recognition, and graph
data analysis. However, recent studies have shown that DNNs are vulnerable to
adversarial attacks. Though there are several works studying adversarial attack
and defense strategies on domains such as images and natural language
processing, it is still difficult to directly transfer the learned knowledge to
graph structure data due to its representation challenges. Given the importance
of graph analysis, an increasing number of works start to analyze the
robustness of machine learning models on graph data. Nevertheless, current
studies considering adversarial behaviors on graph data usually focus on
specific types of attacks with certain assumptions. In addition, each work
proposes its own mathematical formulation which makes the comparison among
different methods difficult. Therefore, in this paper, we aim to survey
existing adversarial learning strategies on graph data and first provide a
unified formulation for adversarial learning on graph data which covers most
adversarial learning studies on graph. Moreover, we also compare different
attacks and defenses on graph data and discuss their corresponding
contributions and limitations. In this work, we systemically organize the
considered works based on the features of each topic. This survey not only
serves as a reference for the research community, but also brings a clear image
researchers outside this research domain. Besides, we also create an online
resource and keep updating the relevant papers during the last two years. More
details of the comparisons of various studies based on this survey are
open-sourced at
https://github.com/YingtongDou/graph-adversarial-learning-literature.Comment: In submission to Journal. For more open-source and up-to-date
information, please check our Github repository:
https://github.com/YingtongDou/graph-adversarial-learning-literatur
Sequential Keystroke Behavioral Biometrics for Mobile User Identification via Multi-view Deep Learning
With the rapid growth in smartphone usage, more organizations begin to focus
on providing better services for mobile users. User identification can help
these organizations to identify their customers and then cater services that
have been customized for them. Currently, the use of cookies is the most common
form to identify users. However, cookies are not easily transportable (e.g.,
when a user uses a different login account, cookies do not follow the user).
This limitation motivates the need to use behavior biometric for user
identification. In this paper, we propose DEEPSERVICE, a new technique that can
identify mobile users based on user's keystroke information captured by a
special keyboard or web browser. Our evaluation results indicate that
DEEPSERVICE is highly accurate in identifying mobile users (over 93% accuracy).
The technique is also efficient and only takes less than 1 ms to perform
identification.Comment: 2017 Joint European Conference on Machine Learning and Knowledge
Discovery in Database
- …