• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 231
  • 21
  • 19
  • 9
  • 6
  • 3
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 372
  • 213
  • 186
  • 143
  • 133
  • 121
  • 113
  • 92
  • 89
  • 70
  • 68
  • 59
  • 55
  • 55
  • 51
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Text-Based Speech Video Synthesis from a Single Face Image

Zheng, Yilin January 2019 (has links)
No description available.
122

Semi Supervised Learning for Accurate Segmentation of Roughly Labeled Data

Rajan, Rachel 01 September 2020 (has links)
No description available.
123

Generating a synthetic dataset for kidney transplantation using generative adversarial networks and categorical logit encoding

Bartocci, John Timothy 24 May 2021 (has links)
No description available.
124

Vytváření matoucích vzorů ve strojovém učení / Creating Adversarial Examples in Machine Learning

Kumová, Věra January 2021 (has links)
This thesis examines adversarial examples in machine learning, specifically in the im- age classification domain. State-of-the-art deep learning models are able to recognize patterns better than humans. However, we can significantly reduce the model's accu- racy by adding imperceptible, yet intentionally harmful noise. This work investigates various methods of creating adversarial images as well as techniques that aim to defend deep learning models against these malicious inputs. We choose one of the contemporary defenses and design an attack that utilizes evolutionary algorithms to deceive it. Our experiments show an interesting difference between adversarial images created by evolu- tion and images created with the knowledge of gradients. Last but not least, we test the transferability of our created samples between various deep learning models. 1
125

Adversarial Attacks and Defense Mechanisms to Improve Robustness of Deep Temporal Point Processes

Khorshidi, Samira 08 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Temporal point processes (TPP) are mathematical approaches for modeling asynchronous event sequences by considering the temporal dependency of each event on past events and its instantaneous rate. Temporal point processes can model various problems, from earthquake aftershocks, trade orders, gang violence, and reported crime patterns, to network analysis, infectious disease transmissions, and virus spread forecasting. In each of these cases, the entity’s behavior with the corresponding information is noted over time as an asynchronous event sequence, and the analysis is done using temporal point processes, which provides a means to define the generative mechanism of the sequence of events and ultimately predict events and investigate causality. Among point processes, Hawkes process as a stochastic point process is able to model a wide range of contagious and self-exciting patterns. One of Hawkes process’s well-known applications is predicting the evolution of viral processes on networks, which is an important problem in biology, the social sciences, and the study of the Internet. In existing works, mean-field analysis based upon degree distribution is used to predict viral spreading across networks of different types. However, it has been shown that degree distribution alone fails to predict the behavior of viruses on some real-world networks. Recent attempts have been made to use assortativity to address this shortcoming. This thesis illustrates how the evolution of such a viral process is sensitive to the underlying network’s structure. In Chapter 3 , we show that adding assortativity does not fully explain the variance in the spread of viruses for a number of real-world networks. We propose using the graphlet frequency distribution combined with assortativity to explain variations in the evolution of viral processes across networks with identical degree distribution. Using a data-driven approach, by coupling predictive modeling with viral process simulation on real-world networks, we show that simple regression models based on graphlet frequency distribution can explain over 95% of the variance in virality on networks with the same degree distribution but different network topologies. Our results highlight the importance of graphlets and identify a small collection of graphlets that may have the most significant influence over the viral processes on a network. Due to the flexibility and expressiveness of deep learning techniques, several neural network-based approaches have recently shown promise for modeling point process intensities. However, there is a lack of research on the possible adversarial attacks and the robustness of such models regarding adversarial attacks and natural shocks to systems. Furthermore, while neural point processes may outperform simpler parametric models on in-sample tests, how these models perform when encountering adversarial examples or sharp non-stationary trends remains unknown. In Chapter 4 , we propose several white-box and black-box adversarial attacks against deep temporal point processes. Additionally, we investigate the transferability of whitebox adversarial attacks against point processes modeled by deep neural networks, which are considered a more elevated risk. Extensive experiments confirm that neural point processes are vulnerable to adversarial attacks. Such a vulnerability is illustrated both in terms of predictive metrics and the effect of attacks on the underlying point process’s parameters. Expressly, adversarial attacks successfully transform the temporal Hawkes process regime from sub-critical to into a super-critical and manipulate the modeled parameters that is considered a risk against parametric modeling approaches. Additionally, we evaluate the vulnerability and performance of these models in the presence of non-stationary abrupt changes, using the crimes and Covid-19 pandemic dataset as an example. Considering the security vulnerability of deep-learning models, including deep temporal point processes, to adversarial attacks, it is essential to ensure the robustness of the deployed algorithms that is despite the success of deep learning techniques in modeling temporal point processes. In Chapter 5 , we study the robustness of deep temporal point processes against several proposed adversarial attacks from the adversarial defense viewpoint. Specifically, we investigate the effectiveness of adversarial training using universal adversarial samples in improving the robustness of the deep point processes. Additionally, we propose a general point process domain-adopted (GPDA) regularization, which is strictly applicable to temporal point processes, to reduce the effect of adversarial attacks and acquire an empirically robust model. In this approach, unlike other computationally expensive approaches, there is no need for additional back-propagation in the training step, and no further network isrequired. Ultimately, we propose an adversarial detection framework that has been trained in the Generative Adversarial Network (GAN) manner and solely on clean training data. Finally, in Chapter 6 , we discuss implications of the research and future research directions.
126

Analysis of Artifact Formation and Removal in GAN Training

Hackney, Daniel 05 June 2023 (has links)
No description available.
127

Improving Unreal Engine Imagery using Generative Adversarial Networks / Förbättring av Unreal Engine-renderingar med hjälp av Generativa Motståndarnätverk

Jareman, Erik, Knast, Ludvig January 2023 (has links)
Game engines such as Unreal Engine 5 are widely used to create photo-realistic renderings. To run these renderings at high quality without experiencing any performance issues,high-performance hardware is often required. In situations where the hardware is lacking,users may be forced to lower the quality and resolution of renderings to maintain goodperformance. While this may be acceptable in some situations, it limits the benefit that apowerful tool like Unreal Engine 5 can provide. This thesis aims to explore the possibilityof using a Real-ESRGAN, fine-tuned on a custom data set, to increase both the resolutionand quality of screenshots taken in Unreal Engine 5. By doing this, users can lower theresolution and quality of their Unreal Engine 5 rendering while still being able to generatehigh quality screenshots similar to those produced when running the rendering at higherresolution and higher quality. To accomplish this, a custom data set was created by randomizing camera positionsand capturing screenshots in an Unreal Engine 5 rendering. This data set was used to finetune a pre-trained Real-ESRGAN model. The fine-tuned model could then generate imagesfrom low resolution and low quality screenshots taken in Unreal Engine 5. The resultingimages were analyzed and evaluated using both quantitative and qualitative methods.The conclusions drawn from this thesis indicate that images generated using the finetuned weights are of high quality. This conclusion is supported by quantitative measurements, demonstrating that the generated images and the ground truth images are similar.Furthermore, visual inspection conducted by the authors confirms that the generated images are similar to the reference images, despite occasional artifacts.
128

Musikgenerering med Generativa motståndsnätverk / Music Generation with Generative Adversarial Networks

Li, Yupeng, Linberg, Jonatan January 2023 (has links)
At present, state-of-the-art deep learning music generation systems require a lot time and hardware resources to develop. This means that they are almost exclusively available to large companies. In order to reduce these requirements, more efficient techniques and methods need to be utilised.  This project aims to investigate various approaches by developing a music generation system using generative adversarial networks, comparing different techniques and their effect on the system's performance.  Our results show the difficulties in generating music in a more resource-constrained environment. We find that structuring the input space with conditional model constraints improves the systems' ability to conform to musical standards. The results also indicate the importance of a patch-based discriminator for evaluating the texture of the generated music. Finally, we propose a similarity loss as a way of reducing mode collapse in the generator, thus stabilising the training process.
129

No Person Detected

Riley, Holly Jane 27 July 2023 (has links)
The collection of Victorian-themed wearables and accessories of  "No Person Detected" serves as an innovative solution to the issues surrounding biometric technology and the invasion of privacy. This wearable technology was designed to counteract the involuntary recording of an individual's unique biometric data through the use of body cameras and CCTV, which can be accessed by law enforcement and marketing companies. The technology represents a democratization of design ideas and collaboration that allows individuals to create adversarial fashion and provides a level of biometric protection. This thesis explores the potential of technological innovation and collaboration to result in a more privacy-conscious society, one where individuals can take control of their personal data and protect themselves against the dangers of biometric tracking. The convergence of fashion, technology, and design has the potential to revolutionize how we approach privacy in a digital age, and "No Person Detected" represents an exciting step towards that future. / Master of Fine Arts / As technology becomes a larger component of our daily lives, our digital footprint continues to expand, leaving behind sensitive identifying information. From this data, law enforcement agencies such as the FBI and ICE derive insights and conclusions about our lives. Due to unreliable data, facial recognition technology (FRT) has demonstrated implicit bias, particularly toward racialized bodies. This highlights the need for public education and responsible online behavior and raises questions about the privacy and security of personal data. At the intersection of fashion, history, and technology, "No Person Detected" aims to fight against the involuntary collection of biometric data in an adversarial way. With the proliferation of FRT and the accumulation of personal data from a variety of sources, it is crucial that both businesses and individuals establish transparent policies to protect user data. This thesis highlights both the historical context of racism in policing and the significance of privacy in the digital age.
130

A state-trait approach for bridging the gap between basic and applied occupational psychological constructs / 状態・特性アプローチによる職業活動に関わる基礎的および応用的心理学的構成概念の統合的理解

Yamashita, Jumpei 23 May 2023 (has links)
京都大学 / 新制・課程博士 / 博士(情報学) / 甲第24821号 / 情博第837号 / 新制||情||140(附属図書館) / 京都大学大学院情報学研究科知能情報学専攻 / (主査)教授 熊田 孝恒, 教授 西田 眞也, 教授 内田 由紀子, 准教授 中島 亮一 / 学位規則第4条第1項該当 / Doctor of Informatics / Kyoto University / DFAM

Page generated in 0.0834 seconds