Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2701 - 2730 of 7471

Full-Text Articles in Physical Sciences and Mathematics

Adapting Bert For Target-Oriented Multimodal Sentiment Classification, Jianfei Yu, Jing Jiang Aug 2019

Adapting Bert For Target-Oriented Multimodal Sentiment Classification, Jianfei Yu, Jing Jiang

Research Collection School Of Computing and Information Systems

As an important task in Sentiment Analysis, Target-oriented Sentiment Classification (TSC) aims to identify sentiment polarities over each opinion target in a sentence. However, existing approaches to this task primarily rely on the textual content, but ignoring the other increasingly popular multimodal data sources (e.g., images), which can enhance the robustness of these text-based models. Motivated by this observation and inspired by the recently proposed BERT architecture, we study Target-oriented Multimodal Sentiment Classification (TMSC) and propose a multimodal BERT architecture. To model intra-modality dynamics, we first apply BERT to obtain target-sensitive textual representations. We then borrow the idea from self-attention …


Low-Rank Sparse Subspace For Spectral Clustering, Xiaofeng Zhu, Shichao Zhang, Yonggang Li, Jilian Zhang, Lifeng Yang, Yue Fang Aug 2019

Low-Rank Sparse Subspace For Spectral Clustering, Xiaofeng Zhu, Shichao Zhang, Yonggang Li, Jilian Zhang, Lifeng Yang, Yue Fang

Research Collection School Of Computing and Information Systems

The current two-step clustering methods separately learn the similarity matrix and conduct k means clustering. Moreover, the similarity matrix is learnt from the original data, which usually contain noise. As a consequence, these clustering methods cannot achieve good clustering results. To address these issues, this paper proposes a new graph clustering methods (namely Low-rank Sparse Subspace clustering (LSS)) to simultaneously learn the similarity matrix and conduct the clustering from the low-dimensional feature space of the original data. Specifically, the proposed LSS integrates the learning of similarity matrix of the original feature space, the learning of similarity matrix of the low-dimensional …


Locating Vulnerabilities In Binaries Via Memory Layout Recovering, Haijun Wang, Xiaofei Xie, Shang-Wei Lin, Yun Lin, Yuekang Li, Shengchao Qin, Yang Liu, Ting Liu Aug 2019

Locating Vulnerabilities In Binaries Via Memory Layout Recovering, Haijun Wang, Xiaofei Xie, Shang-Wei Lin, Yun Lin, Yuekang Li, Shengchao Qin, Yang Liu, Ting Liu

Research Collection School Of Computing and Information Systems

Locating vulnerabilities is an important task for security auditing, exploit writing, and code hardening. However, it is challenging to locate vulnerabilities in binary code, because most program semantics (e.g., boundaries of an array) is missing after compilation. Without program semantics, it is difficult to determine whether a memory access exceeds its valid boundaries in binary code. In this work, we propose an approach to locate vulnerabilities based on memory layout recovery. First, we collect a set of passed executions and one failed execution. Then, for passed and failed executions, we restore their program semantics by recovering fine-grained memory layouts based …


Deep Anomaly Detection With Deviation Networks, Guansong Pang, Chunhua Shen, Anton Van Den Hengel Aug 2019

Deep Anomaly Detection With Deviation Networks, Guansong Pang, Chunhua Shen, Anton Van Den Hengel

Research Collection School Of Computing and Information Systems

Although deep learning has been applied to successfully address many data mining problems, relatively limited work has been done on deep learning for anomaly detection. Existing deep anomaly detection methods, which focus on learning new feature representations to enable downstream anomaly detection methods, perform indirect optimization of anomaly scores, leading to data-inefficient learning and suboptimal anomaly scoring. Also, they are typically designed as unsupervised learning due to the lack of large-scale labeled anomaly data. As a result, they are difficult to leverage prior knowledge (e.g., a few labeled anomalies) when such information is available as in many real-world anomaly detection …


Latent Error Prediction And Fault Localization For Microservice Applications By Learning From System Trace Logs, Xiang Zhou, Xin Peng, Tao Xie, Jun Sun, Chao Ji, Dewei Liu, Qilin Xiang, Chuan He Aug 2019

Latent Error Prediction And Fault Localization For Microservice Applications By Learning From System Trace Logs, Xiang Zhou, Xin Peng, Tao Xie, Jun Sun, Chao Ji, Dewei Liu, Qilin Xiang, Chuan He

Research Collection School Of Computing and Information Systems

In the production environment, a large part of microservice failures are related to the complex and dynamic interactions and runtime environments, such as those related to multiple instances, environmental configurations, and asynchronous interactions of microservices. Due to the complexity and dynamism of these failures, it is often hard to reproduce and diagnose them in testing environments. It is desirable yet still challenging that these failures can be detected and the faults can be located at runtime of the production environment to allow developers to resolve them efficiently. To address this challenge, in this paper, we propose MEPFL, an approach of …


Improving Law Enforcement Daily Deployment Through Machine Learning-Informed Optimization Under Uncertainty, Jonathan David Chase, Duc Thien Nguyen, Haiyang Sun, Hoong Chuin Lau Aug 2019

Improving Law Enforcement Daily Deployment Through Machine Learning-Informed Optimization Under Uncertainty, Jonathan David Chase, Duc Thien Nguyen, Haiyang Sun, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Urban law enforcement agencies are under great pressure to respond to emergency incidents effectively while operating within restricted budgets. Minutes saved on emergency response times can save lives and catch criminals, and a responsive police force can deter crime and bring peace of mind to citizens. To efficiently minimize the response times of a law enforcement agency operating in a dense urban environment with limited manpower, we consider in this paper the problem of optimizing the spatial and temporal deployment of law enforcement agents to predefined patrol regions in a real-world scenario informed by machine learning. To this end, we …


Data-Driven Decision-Support For Process Improvement Through Predictions Of Bed Occupancy Rates, Kar Way Tan, Qi You Ng, Francis Ngoc Hoang Long Nguyen, Sean Shao Wei Lam Aug 2019

Data-Driven Decision-Support For Process Improvement Through Predictions Of Bed Occupancy Rates, Kar Way Tan, Qi You Ng, Francis Ngoc Hoang Long Nguyen, Sean Shao Wei Lam

Research Collection School Of Computing and Information Systems

Managing bed utilization and ensuring the supply keeps up with the demand is not an easy task in a large public hospital with many medical disciplines. The bed managers who makes decisions on reserving and allocating beds centrally require high-dimensional data from several hospital information systems supporting emergency room, specialized clinics and bed management processes. In this work, we put together an automated process for cleaning, consolidating and integrating data from several hospital information systems to several reports required by the bed managers to analyse the bed occupancy situations across more than thirty medical disciplines. To prevent bed crunch situations …


Sar: Learning Cross-Language Api Mappings With Little Knowledge, Duy Quoc Nghi Bui, Yijun Yu, Lingxiao Jiang Aug 2019

Sar: Learning Cross-Language Api Mappings With Little Knowledge, Duy Quoc Nghi Bui, Yijun Yu, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

To save effort, developers often translate programs from one programming language to another, instead of implementing it from scratch. Translating application program interfaces (APIs) used in one language to functionally equivalent ones available in another language is an important aspect of program translation. Existing approaches facilitate the translation by automatically identifying the API mappings across programming languages. However, these approaches still require large amount of parallel corpora, ranging from pairs of APIs or code fragments that are functionally equivalent, to similar code comments. To minimize the need of parallel corpora, this paper aims at an automated approach that can map …


Adversarial Learning On Heterogeneous Information Networks, Binbin Hu, Yuan Fang, Chuan Shi Aug 2019

Adversarial Learning On Heterogeneous Information Networks, Binbin Hu, Yuan Fang, Chuan Shi

Research Collection School Of Computing and Information Systems

Network embedding, which aims to represent network data in alow-dimensional space, has been commonly adopted for analyzingheterogeneous information networks (HIN). Although exiting HINembedding methods have achieved performance improvement tosome extent, they still face a few major weaknesses. Most importantly, they usually adopt negative sampling to randomly selectnodes from the network, and they do not learn the underlying distribution for more robust embedding. Inspired by generative adversarial networks (GAN), we develop a novel framework HeGAN forHIN embedding, which trains both a discriminator and a generatorin a minimax game. Compared to existing HIN embedding methods,our generator would learn the node distribution to …


Ezlog: Data Visualization For Logistics, Aldy Gunawan, Benjamin Gan, Jin An Tan, Sheena L.S.L Villanueva, Timothy K.J. Wen Aug 2019

Ezlog: Data Visualization For Logistics, Aldy Gunawan, Benjamin Gan, Jin An Tan, Sheena L.S.L Villanueva, Timothy K.J. Wen

Research Collection School Of Computing and Information Systems

With the increasing availability of data in the logistics industry due to the digitalization trend, interest and opportunities for leveraging analytics in supply chain management to make data-driven decisions is growing rapidly. In this paper, we introduce EzLog, an integrated visualization prototype platform for supply chain analytics. This web-based platform built by two undergraduate student teams for their capstone course can be used for data wrangling and rapid analysis of data from different business units of a major logistics company. Other functionalities of the system include standard processes to perform data analysis such as supervised extraction, transformation, loading (ETL), data …


Integrated Assignment And Routing With Mixed Service Mode Cross-Dock, Vincent Yu, Aldy Gunawan, Eric I. Junaidi, Audrey T. Widjaja Aug 2019

Integrated Assignment And Routing With Mixed Service Mode Cross-Dock, Vincent Yu, Aldy Gunawan, Eric I. Junaidi, Audrey T. Widjaja

Research Collection School Of Computing and Information Systems

Amixed service mode cross-dock is a cross-dock facility that considers the useof flexible doors. Instead of having a specific task as an exclusive mode, eachdoor can be used as a flexible door, either an inbound or an outbound doordepending on the requirement. Having a mixed service mode cross-dock in anintegrated assignment and routing problem is a new model in large field ofcross-docking problems. Decisions that need to be made include doors’functionality, suppliers’ assignments, customers’ deliveries, and vehicles’ routeswith the objective of minimizing the total transportation and material handlingcosts. We develop a mathematical programming model and propose a SimulatedAnnealing (SA) algorithm …


How Does Machine Learning Change Software Development Practices?, Zhiyuan Wan, Xin Xia, David Lo, Gail C. Murphy Aug 2019

How Does Machine Learning Change Software Development Practices?, Zhiyuan Wan, Xin Xia, David Lo, Gail C. Murphy

Research Collection School Of Computing and Information Systems

Adding an ability for a system to learn inherently adds uncertainty into the system. Given the rising popularity of incorporating machine learning into systems, we wondered how the addition alters software development practices. We performed a mixture of qualitative and quantitative studies with 14 interviewees and 342 survey respondents from 26 countries across four continents to elicit significant differences between the development of machine learning systems and the development of non-machine-learning systems. Our study uncovers significant differences in various aspects of software engineering (e.g., requirements, design, testing, and process) and work characteristics (e.g., skill variety, problem solving and task identity). …


Trust Architecture And Reputation Evaluation For Internet Of Things, Juan Chen, Zhihong Tian, Xiang Cui, Lihua Yin, Xianzhi Wang Aug 2019

Trust Architecture And Reputation Evaluation For Internet Of Things, Juan Chen, Zhihong Tian, Xiang Cui, Lihua Yin, Xianzhi Wang

Research Collection School Of Computing and Information Systems

Internet of Things (IoT) represents a fundamental infrastructure and set of techniques that support innovative services in various application domains. Trust management plays an important role in enabling the reliable data collection and mining, context-awareness, and enhanced user security in the IoT. The main tasks of trust management include trust architecture design and reputation evaluation. However, existing trust architectures and reputation evaluation solutions cannot be directly applied to the IoT, due to the large number of physical entities, the limited computation ability of physical entities, and the highly dynamic nature of the network. In comparison, it generally requires a general …


Gradient Boosting With Piece-Wise Linear Regression Trees, Yu Shi, Jian Li, Zhize Li Aug 2019

Gradient Boosting With Piece-Wise Linear Regression Trees, Yu Shi, Jian Li, Zhize Li

Research Collection School Of Computing and Information Systems

Gradient Boosted Decision Trees (GBDT) is a very successful ensemble learning algorithm widely used across a variety of applications. Recently, several variants of GBDT training algorithms and implementations have been designed and heavily optimized in some very popular open sourced toolkits including XGBoost, LightGBM and CatBoost. In this paper, we show that both the accuracy and efficiency of GBDT can be further enhanced by using more complex base learners. Specifically, we extend gradient boosting to use piecewise linear regression trees (PL Trees), instead of piecewise constant regression trees, as base learners. We show that PL Trees can accelerate convergence of …


Faster First-Order Methods For Stochastic Non-Convex Optimization On Riemannian Manifolds, Pan Zhou, Xiao-Tong Yuan, Shuicheng Yan, Jiashi Feng Aug 2019

Faster First-Order Methods For Stochastic Non-Convex Optimization On Riemannian Manifolds, Pan Zhou, Xiao-Tong Yuan, Shuicheng Yan, Jiashi Feng

Research Collection School Of Computing and Information Systems

First-order non-convex Riemannian optimization algorithms have gained recent popularity in structured machine learning problems including principal component analysis and low-rank matrix completion. The current paper presents an efficient Riemannian Stochastic Path Integrated Differential EstimatoR (R-SPIDER) algorithm to solve the finite-sum and online Riemannian non-convex minimization problems. At the core of R-SPIDER is a recursive semi-stochastic gradient estimator that can accurately estimate Riemannian gradient under not only exponential mapping and parallel transport, but also general retraction and vector transport operations. Compared with prior Riemannian algorithms, such a recursive gradient estimation mechanism endows R-SPIDER with higher computational efficiency in first-order oracle complexity. …


Learning Multiple Maps From Conditional Ordinal Triplets, Duy Dung Le, Hady Wirawan Lauw Aug 2019

Learning Multiple Maps From Conditional Ordinal Triplets, Duy Dung Le, Hady Wirawan Lauw

Research Collection School Of Computing and Information Systems

Ordinal embedding seeks a low-dimensional representation of objects based on relative comparisons of their similarities. This low-dimensional representation lends itself to visualization on a Euclidean map. Classical assumptions admit only one valid aspect of similarity. However, there are increasing scenarios involving ordinal comparisons that inherently reflect multiple aspects of similarity, which would be better represented by multiple maps. We formulate this problem as conditional ordinal embedding, which learns a distinct low-dimensional representation conditioned on each aspect, yet allows collaboration across aspects via a shared representation. Our geometric approach is novel in its use of a shared spherical representation and multiple …


Who Should Pay The Cost: A Game-Theoretic Model For Government Subsidized Investments To Improve National Cybersecurity, Xinrun Wang, Bo An, Hau Chan Aug 2019

Who Should Pay The Cost: A Game-Theoretic Model For Government Subsidized Investments To Improve National Cybersecurity, Xinrun Wang, Bo An, Hau Chan

Research Collection School Of Computing and Information Systems

Due to the recent cyber attacks, cybersecurity is becoming more critical in modern society. A single attack (e.g., WannaCry ransomware attack) can cause as much as $4 billion in damage. However, the cybersecurity investment by companies is far from satisfactory. Therefore, governments (e.g., in the UK) launch grants and subsidies to help companies to boost their cybersecurity to create a safer national cyber environment. The allocation problem is hard due to limited subsidies and the interdependence between self-interested companies and the presence of a strategic cyber attacker. To tackle the government's allocation problem, we introduce a Stackelberg game-theoretic model where …


Enhancing Multi-Hop Sensor Calibration With Uncertainty Estimates, Balz Maag, Zimu Zhou, Lothar Thiele Aug 2019

Enhancing Multi-Hop Sensor Calibration With Uncertainty Estimates, Balz Maag, Zimu Zhou, Lothar Thiele

Research Collection School Of Computing and Information Systems

Low-cost sensors, installed on mobile vehicles, provide a cost-effective way for fine-grained urban air pollution monitoring. However, frequent calibration is crucial for lowcost sensors to consistently deliver accurate measurements. Multi-hop calibration is a common practice to calibrate mobile sensor deployments, but is prone to severe error accumulation over hops. Prior research mitigates error accumulation by designing special calibration models, which only apply to linear models. In this paper, we propose an orthogonal approach by selecting reliable measurements for calibration at each hop. We analyze the impact of different data-induced uncertainties on calibration errors and devise a scheme to estimate these …


Simulated Annealing For The Multi-Vehicle Cyclic Inventory Routing Problem, Aldy Gunawan, Vincent F. Yu, Audrey Tedja Widjaja, Pieter Vansteenwegen Aug 2019

Simulated Annealing For The Multi-Vehicle Cyclic Inventory Routing Problem, Aldy Gunawan, Vincent F. Yu, Audrey Tedja Widjaja, Pieter Vansteenwegen

Research Collection School Of Computing and Information Systems

This paper studies the Multi-Vehicle Cyclic Inventory Routing Problem (MV-CIRP) as the extension of the Single-Vehicle CIRP (SV-CIRP). The objective is to minimize both distribution and inventory costs at the customers and to maximize the collected rewards simultaneously. The problem is treated as a single objective optimization problem. A subset of customers is selected for each vehicle including the quantity to be delivered to each customer. For each vehicle, a cyclic distribution plan is developed. We construct a mathematical programming model and propose a simulated annealing (SA) metaheuristic for solving both SV-CIRP and MV-CIRP. For SV-CIRP, experimental results on benchmark …


Multimodal Transformer Networks For End-To-End Video-Grounded Dialogue Systems, Hung Le, Doyen Sahoo, Nancy F. Chen, Steven C. H. Hoi Aug 2019

Multimodal Transformer Networks For End-To-End Video-Grounded Dialogue Systems, Hung Le, Doyen Sahoo, Nancy F. Chen, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Developing Video-Grounded Dialogue Systems (VGDS), where a dialogue is conducted based on visual and audio aspects of a given video, is significantly more challenging than traditional image or text-grounded dialogue systems because (1) feature space of videos span across multiple picture frames, making it difficult to obtain semantic information; and (2) a dialogue agent must perceive and process information from different modalities (audio, video, caption, etc.) to obtain a comprehensive understanding. Most existing work is based on RNNs and sequence-to-sequence architectures, which are not very effective for capturing complex long-term dependencies (like in videos). To overcome this, we propose Multimodal …


Control-Flow Carrying Code, Yan Lin, Debin Gao Jul 2019

Control-Flow Carrying Code, Yan Lin, Debin Gao

Research Collection School Of Computing and Information Systems

Control-Flow Integrity (CFI) is an effective approach in mitigating control-flow hijacking attacks including code-reuse attacks. Most conventional CFI techniques use memory page protection mechanism, Data Execution Prevention (DEP), as an underlying basis. For instance, CFI defenses use read-only address tables to avoid metadata corruption. However, this assumption has shown to be invalid with advanced attacking techniques, such as Data-Oriented Programming, data race, and Rowhammer attacks. In addition, there are scenarios in which DEP is unavailable, e.g., bare-metal systems and applications with dynamically generated code. We present the design and implementation of Control-Flow Carrying Code (C3), a new CFI enforcement without …


Dynopvm: Vm-Based Software Obfuscation With Dynamic Opcode Mapping, Xiaoyang Cheng, Yan Lin, Debin Gao Jul 2019

Dynopvm: Vm-Based Software Obfuscation With Dynamic Opcode Mapping, Xiaoyang Cheng, Yan Lin, Debin Gao

Research Collection School Of Computing and Information Systems

VM-based software obfuscation has emerged as an effective technique for program obfuscation. Despite various attempts in improving its effectiveness and security, existing VM-based software obfuscators use potentially multiple but static secret mappings between virtual and native opcodes to hide the underlying instructions. In this paper, we present an attack using frequency analysis to effectively recover the secret mapping to compromise the protection, and then propose a novel VM-based obfuscator in which each basic block uses a dynamic and control-flow-aware mapping between the virtual and native instructions. We show that our proposed VM-based obfuscator not only renders the frequency analysis attack …


Practical And Effective Sandboxing For Linux Containers, Zhiyuan Wan, David Lo, Xin Xia, Liang Cai Jul 2019

Practical And Effective Sandboxing For Linux Containers, Zhiyuan Wan, David Lo, Xin Xia, Liang Cai

Research Collection School Of Computing and Information Systems

A container is a group of processes isolated from other groups via distinct kernel namespaces and resource allocation quota. Attacks against containers often leverage kernel exploits through the system call interface. In this paper, we present an approach that mines sandboxes and enables fine-grained sandbox enforcement for containers. We first explore the behavior of a container by running test cases and monitor the accessed system calls including types and arguments during testing. We then characterize the types and arguments of system call invocations and translate them into sandbox rules for the container. The mined sandbox restricts the container’s access to …


Network-Clustered Multi-Modal Bug Localization, Thong Hoang, Richard J. Oentaryo, Tien-Duy B. Le, David Lo Jul 2019

Network-Clustered Multi-Modal Bug Localization, Thong Hoang, Richard J. Oentaryo, Tien-Duy B. Le, David Lo

Research Collection School Of Computing and Information Systems

Developers often spend much effort and resources to debug a program. To help the developers debug, numerous information retrieval (IR)-based and spectrum-based bug localization techniques have been devised. IR-based techniques process textual information in bug reports, while spectrum-based techniques process program spectra (i.e., a record of which program elements are executed for each test case). While both techniques ultimately generate a ranked list of program elements that likely contain a bug, they only consider one source of information—either bug reports or program spectra— which is not optimal. In light of this deficiency, this paper presents a new approach dubbed Network-clustered …


On True Language Understanding, Seng-Beng Ho, Zhaoxia Wang Jul 2019

On True Language Understanding, Seng-Beng Ho, Zhaoxia Wang

Research Collection School Of Computing and Information Systems

Despite the relative successes of natural language processing in providing some useful interfaces for users, natural language understanding is a much more difficult issue. Natural language processing was one of the main topics of AI for as long as computers were put to the task of generating intelligent behavior, and a number of systems that were created since the inception of AI have also been characterized as being capable of natural language understanding. However, in the existing domain of natural language processing and understanding, a definition and consensus of what it means for a system to “truly” understand language do …


Correlated Learning For Aggregation Systems, Tanvi Verma, Pradeep Varakantham Jul 2019

Correlated Learning For Aggregation Systems, Tanvi Verma, Pradeep Varakantham

Research Collection School Of Computing and Information Systems

Aggregation systems (e.g., Uber, Lyft, FoodPanda, Deliveroo) have been increasingly used to improve efficiency in numerous environments, including in transportation, logistics, food and grocery delivery. In these systems, a centralized entity (e.g., Uber) aggregates supply and assigns them to demand so as to optimize a central metric such as profit, number of requests, delay etc. Due to optimizing a metric of importance to the centralized entity, the interests of individuals (e.g., drivers, delivery boys) can be sacrificed. Therefore, in this paper, we focus on the problem of serving individual interests, i.e., learning revenue maximizing policies for individuals in the presence …


Towards Understanding Android System Vulnerabilities: Techniques And Insights, Daoyuan Wu, Debin Gao, Eric K. T. Cheng, Yichen Cao, Jintao Jiang, Robert H. Deng Jul 2019

Towards Understanding Android System Vulnerabilities: Techniques And Insights, Daoyuan Wu, Debin Gao, Eric K. T. Cheng, Yichen Cao, Jintao Jiang, Robert H. Deng

Research Collection School Of Computing and Information Systems

As a common platform for pervasive devices, Android has been targeted by numerous attacks that exploit vulnerabilities in its apps and the operating system. Compared to app vulnerabilities, systemlevel vulnerabilities in Android, however, were much less explored in the literature. In this paper, we perform the first systematic study of Android system vulnerabilities by comprehensively analyzing all 2,179 vulnerabilities on the Android Security Bulletin program over about three years since its initiation in August 2015. To this end, we propose an automatic analysis framework, upon a hierarchical database structure, to crawl, parse, clean, and analyze vulnerability reports and their publicly …


A Scalable Approach To Joint Cyber Insurance And Security-As-A-Service Provisioning In Cloud Computing, Jonathan David Chase, Dusit Niyato, Ping Wang, Sivadon Chaisiri, Ryan K. L. Ko Jul 2019

A Scalable Approach To Joint Cyber Insurance And Security-As-A-Service Provisioning In Cloud Computing, Jonathan David Chase, Dusit Niyato, Ping Wang, Sivadon Chaisiri, Ryan K. L. Ko

Research Collection School Of Computing and Information Systems

As computing services are increasingly cloud-based, corporations are investing in cloud-based security measures. The Security-as-a-Service (SECaaS) paradigm allows customers to outsource security to the cloud, through the payment of a subscription fee. However, no security system is bulletproof, and even one successful attack can result in the loss of data and revenue worth millions of dollars. To guard against this eventuality, customers may also purchase cyber insurance to receive recompense in the case of loss. To achieve cost effectiveness, it is necessary to balance provisioning of security and insurance, even when future costs and risks are uncertain. To this end, …


Eugene: Towards Deep Intelligence As A Service, Shuochao Yao, Yifan Hao, Yiran Zhao, Ailing Piao, Huajie Shao, Dongxin Liu, Shengzhong Liu, Shaohan Hu, Dulanga Weerakoon, Kasthuri Jayarajah, Archan Misra, Tarek Abdelzaher Jul 2019

Eugene: Towards Deep Intelligence As A Service, Shuochao Yao, Yifan Hao, Yiran Zhao, Ailing Piao, Huajie Shao, Dongxin Liu, Shengzhong Liu, Shaohan Hu, Dulanga Weerakoon, Kasthuri Jayarajah, Archan Misra, Tarek Abdelzaher

Research Collection School Of Computing and Information Systems

The paper discusses an emerging suite of machine intelligence services that are of increasing importance in the highly instrumented world of the Internet of Things (IoT). The suite, called Eugene, would offer a form of intelligent behavior (based on deep neural networks) to otherwise simple embedded devices; the clients of the service. These devices would benefit from service resources to learn from data and to perform intelligent inference, classification, prediction, and estimation tasks that they are too limited to carry out on their own. The paper discusses the taxonomy of such services and the state of implementation, as well as …


Modeling Intra-Relation In Math Word Problems With Different Functional Multi-Head Attentions, Jierui Li, Lei Wang, Jipeng Zhang, Yan Wang, Bing Tian Dai, Dongxiang Zhang Jul 2019

Modeling Intra-Relation In Math Word Problems With Different Functional Multi-Head Attentions, Jierui Li, Lei Wang, Jipeng Zhang, Yan Wang, Bing Tian Dai, Dongxiang Zhang

Research Collection School Of Computing and Information Systems

Several deep learning models have been proposed for solving math word problems (MWPs) automatically. Although these models have the ability to capture features without manual efforts, their approaches to capturing features are not specifically designed for MWPs. To utilize the merits of deep learning models with simultaneous consideration of MWPs’ specific features, we propose a group attention mechanism to extract global features, quantity-related features, quantity-pair features and question-related features in MWPs respectively. The experimental results show that the proposed approach performs significantly better than previous state-of-the-art methods, and boost performance from 66.9% to 69.5% on Math23K with training-test split, from …