185 research outputs found

    Optical Tweezers as a Micromechanical Tool for Studying Defects in 2D Colloidal Crystals

    Full text link
    This paper reports on some new results from the analyses of the video microscopy data obtained in a prior experiment on two-dimensional (2D) colloidal crystals. It was reported previously that optical tweezers can be used to create mono- and di-vacancies in a 2D colloidal crystal. Here we report the results on the creation of a vacancy-interstitial pair, as well as tri-vacancies. It is found that the vacancy-interstitial pair can be long-lived, but they do annihilate each other. The behavior of tri-vacancies is most intriguing, as it fluctuates between a configuration of bound pairs of dislocations and that of a locally amorphous state. The relevance of this observation to the issue of the nature of 2D melting is discussed.Comment: 6 pages, 4 figure

    Private Model Compression via Knowledge Distillation

    Full text link
    The soaring demand for intelligent mobile applications calls for deploying powerful deep neural networks (DNNs) on mobile devices. However, the outstanding performance of DNNs notoriously relies on increasingly complex models, which in turn is associated with an increase in computational expense far surpassing mobile devices' capacity. What is worse, app service providers need to collect and utilize a large volume of users' data, which contain sensitive information, to build the sophisticated DNN models. Directly deploying these models on public mobile devices presents prohibitive privacy risk. To benefit from the on-device deep learning without the capacity and privacy concerns, we design a private model compression framework RONA. Following the knowledge distillation paradigm, we jointly use hint learning, distillation learning, and self learning to train a compact and fast neural network. The knowledge distilled from the cumbersome model is adaptively bounded and carefully perturbed to enforce differential privacy. We further propose an elegant query sample selection method to reduce the number of queries and control the privacy loss. A series of empirical evaluations as well as the implementation on an Android mobile device show that RONA can not only compress cumbersome models efficiently but also provide a strong privacy guarantee. For example, on SVHN, when a meaningful (9.83,10−6)(9.83,10^{-6})-differential privacy is guaranteed, the compact model trained by RONA can obtain 20×\times compression ratio and 19×\times speed-up with merely 0.97% accuracy loss.Comment: Conference version accepted by AAAI'1

    The Relationship between Resilience and Mental Health: the Mediating Effect of Positive Emotions

    Get PDF
    To investigate the relationship of resilience, positive emotions and mental health, and the relationship of resilience, positive emotion and three sub-dimensions of mental health: self-affirmation, depression and anxiety. In this study, the existing cross-sectional data, select the Beijing Forestry University data as samples. In this study, questionnaire survey a random sample of 199 undergraduate students of Beijing Forestry University, they uniform application three Scale Surveying, PANAS, CD-RISC, GHQ-20. According from the study, (1) resilience, positive mood and general health are related where resilience and positive emotions between the resilience. General psychological health, positive emotions and general mental health?it is positively correlated. (2) Resilience and self-affirmation exists, positive correlation with depression and anxiety, respectively negative correlation. Between positive emotions and self-affirmation the positive correlation with anxiety negative correlation. (3) Part mediating effect of positive emotions exist between resilience and self-affirmation, resilience can be made to self-affirmation prediction coefficient from 0.042 down to 0.036. Therefore, this study concluded that resilience undergraduates can have an impact on mental health through the intermediary variable positive emotions

    Adversarial Attack and Defense on Graph Data: A Survey

    Full text link
    Deep neural networks (DNNs) have been widely applied to various applications including image classification, text generation, audio recognition, and graph data analysis. However, recent studies have shown that DNNs are vulnerable to adversarial attacks. Though there are several works studying adversarial attack and defense strategies on domains such as images and natural language processing, it is still difficult to directly transfer the learned knowledge to graph structure data due to its representation challenges. Given the importance of graph analysis, an increasing number of works start to analyze the robustness of machine learning models on graph data. Nevertheless, current studies considering adversarial behaviors on graph data usually focus on specific types of attacks with certain assumptions. In addition, each work proposes its own mathematical formulation which makes the comparison among different methods difficult. Therefore, in this paper, we aim to survey existing adversarial learning strategies on graph data and first provide a unified formulation for adversarial learning on graph data which covers most adversarial learning studies on graph. Moreover, we also compare different attacks and defenses on graph data and discuss their corresponding contributions and limitations. In this work, we systemically organize the considered works based on the features of each topic. This survey not only serves as a reference for the research community, but also brings a clear image researchers outside this research domain. Besides, we also create an online resource and keep updating the relevant papers during the last two years. More details of the comparisons of various studies based on this survey are open-sourced at https://github.com/YingtongDou/graph-adversarial-learning-literature.Comment: In submission to Journal. For more open-source and up-to-date information, please check our Github repository: https://github.com/YingtongDou/graph-adversarial-learning-literatur

    Sequential Keystroke Behavioral Biometrics for Mobile User Identification via Multi-view Deep Learning

    Full text link
    With the rapid growth in smartphone usage, more organizations begin to focus on providing better services for mobile users. User identification can help these organizations to identify their customers and then cater services that have been customized for them. Currently, the use of cookies is the most common form to identify users. However, cookies are not easily transportable (e.g., when a user uses a different login account, cookies do not follow the user). This limitation motivates the need to use behavior biometric for user identification. In this paper, we propose DEEPSERVICE, a new technique that can identify mobile users based on user's keystroke information captured by a special keyboard or web browser. Our evaluation results indicate that DEEPSERVICE is highly accurate in identifying mobile users (over 93% accuracy). The technique is also efficient and only takes less than 1 ms to perform identification.Comment: 2017 Joint European Conference on Machine Learning and Knowledge Discovery in Database
    • …
    corecore