Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- surveyDecember 2024
Tool Learning with Foundation Models
- Yujia Qin,
- Shengding Hu,
- Yankai Lin,
- Weize Chen,
- Ning Ding,
- Ganqu Cui,
- Zheni Zeng,
- Xuanhe Zhou,
- Yufei Huang,
- Chaojun Xiao,
- Chi Han,
- Yi Ren Fung,
- Yusheng Su,
- Huadong Wang,
- Cheng Qian,
- Runchu Tian,
- Kunlun Zhu,
- Shihao Liang,
- Xingyu Shen,
- Bokai Xu,
- Zhen Zhang,
- Yining Ye,
- Bowen Li,
- Ziwei Tang,
- Jing Yi,
- Yuzhang Zhu,
- Zhenning Dai,
- Lan Yan,
- Xin Cong,
- Yaxi Lu,
- Weilin Zhao,
- Yuxiang Huang,
- Junxi Yan,
- Xu Han,
- Xian Sun,
- Dahai Li,
- Jason Phang,
- Cheng Yang,
- Tongshuang Wu,
- Heng Ji,
- Guoliang Li,
- Zhiyuan Liu,
- Maosong Sun
ACM Computing Surveys (CSUR), Volume 57, Issue 4Article No.: 101, Pages 1–40https://doi.org/10.1145/3704435Humans possess an extraordinary ability to create and utilize tools. With the advent of foundation models, artificial intelligence systems have the potential to be equally adept in tool use as humans. This paradigm, which is dubbed as tool learning with ...
- research-articleNovember 2024
A deep residual SConv1D-attention intrusion detection model for industrial Internet of Things
AbstractThe development of intrusion detection technology has contributed greatly to industrial Internet of Things (IIoT) security. However, intrusion detection system (IDS) for IIOT anomaly detection suffer from limited computational costs. In addition, ...
- research-articleApril 2024
Reinforcement learning marine predators algorithm for global optimization
Cluster Computing (KLU-CLUS), Volume 27, Issue 7Pages 9137–9190https://doi.org/10.1007/s10586-024-04381-yAbstractGiven the weak convergence, limited balance capacity, and optimization limitations observed in the Marine Predators Algorithm (MPA), which draws inspiration from the predatory behavior of marine organisms during evolutionary processes, this study ...
- research-articleJune 2024
FAGnet: Family-aware-based android malware analysis using graph neural network
AbstractAndroid malware family analysis is essential for building an efficient malware detection mechanism. In recent years, many graph representation learning-based malware detection and classification studies have been proposed, and many methods model ...
- research-articleFebruary 2024
A lightweight IoT intrusion detection model based on improved BERT-of-Theseus
Expert Systems with Applications: An International Journal (EXWA), Volume 238, Issue PFhttps://doi.org/10.1016/j.eswa.2023.122045AbstractThe proliferation of Internet of Things (IoT) technology has resulted in an increase in security vulnerabilities associated with the interconnectivity of IoT devices. As a result, there is a need for intrusion detection mechanisms that can ...
- research-articleNovember 2023
CRLM: A cooperative model based on reinforcement learning and metaheuristic algorithms of routing protocols in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 236, Issue Chttps://doi.org/10.1016/j.comnet.2023.110019AbstractIn wireless sensor networks, reasonable clustering and routing are keys to efficient energy utilization. However, the selection of cluster heads and routes is NP-hard. Most of the existing routing protocols use heuristic or metaheuristic ...
Graphical abstractDisplay Omitted
Highlights- Control the updating of meta-heuristic algorithms using reinforcement learning.
- The Integrated Cluster-Routing Solution is used to logically pair cluster and route.
- A pruning-based cluster pruning rule is used to balance the load ...
- research-articleJanuary 2021
Network Intrusion Detection Model Based on Improved BYOL Self-Supervised Learning
The combination of deep learning and intrusion detection has become a hot topic in today’s network security. In the face of massive, high-dimensional network traffic with uneven sample distribution, how to be able to accurately detect anomalous traffic is ...
- research-articleJuly 2020
A Novel Soft Robotic Glove with Positive-negative Pneumatic Actuator for Hand Rehabilitation<sup>*</sup>
2020 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM)Pages 1840–1847https://doi.org/10.1109/AIM43001.2020.9158826Pneumatic soft robots show great potential application value in the field of hand rehabilitation. This paper presents a novel pneumatic soft robotic glove for hand rehabilitation with a portable pneumatic box. The glove uses positive-negative pneumatic ...
- research-articleJanuary 2020
Exit Decision of Venture Capital Based on Linear Contract in Continuous Time: IPO or M&A
Based on the assumption that the long-term value of a venture capital satisfies the algebraic Brownian motion, we develop a continuous-time exit model of venture capital under different exit modes, namely, initial public offering (IPO) and mergers and ...
- articleJuly 2017
Self-adaptive differential evolution with global neighborhood search
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 21, Issue 13Pages 3759–3768https://doi.org/10.1007/s00500-016-2029-xDifferential evolution (DE) is a simple yet efficient stochastic search approach for numerical optimization. However, it tends to suffer from slow convergence when tackling complicated problems. In addition, its search ability is significantly ...
- ArticleDecember 2011
SOSOF: A fuzzy learning approach for Proportional Slowdown Differentiation control
SOCA '11: Proceedings of the 2011 IEEE International Conference on Service-Oriented Computing and ApplicationsPages 1–8https://doi.org/10.1109/SOCA.2011.6166241The Proportional Slowdown Differentiation (PSD) is an important Quality of Service (QoS) model for services in the Cloud. It aims to maintain consistent pre-specified slowdown ratios between the requests of different service classes. In this paper, a ...
- articleMarch 2011
An evolutionary performance-enhanced PSO approach by using a BP neural-learning-based PID controller
Connection Science (CONSCI), Volume 23, Issue 1Pages 45–63https://doi.org/10.1080/09540091.2011.573070In this paper, a novel evolutionary strategy-based particle swarm optimisation (PSO) approach is presented. The evolutionary strategy is dependent on a BP neural proportional integral derivative (PID) controller, which is intentionally placed between ...
- ArticleJanuary 2005
Haptic shoes: representing information by vibration
APVis '05: proceedings of the 2005 Asia-Pacific symposium on Information visualisation - Volume 45Pages 47–50This paper undertakes a new approach transferring and representing the requested information by the design and implementation of haptic shoes. Different from the traditional method of visualisation, stock market data are conveyed to the users via the ...