Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2024
Detecting and Mitigating Errors in Neural Networks
Computer Safety, Reliability, and Security. SAFECOMP 2024 WorkshopsPages 101–114https://doi.org/10.1007/978-3-031-68738-9_8AbstractIn our modern world, neural networks are ubiquitous. Their functionality and complexity keep increasing while the feature size of the hardware that runs today’s neural networks keeps continuously shrinking. In addition, the number of attacks keeps ...
- ArticleSeptember 2024
Error Correction of Japanese Character-Recognition in Answers to Writing-Type Questions Using T5
- Rina Suzuki,
- Hisao Usui,
- Hiroaki Ozaki,
- Hung Tuan Nguyen,
- Kanako Komiya,
- Tsunenori Ishioka,
- Masaki Nakagawa
AbstractThis paper proposes a method for correcting character-recognition errors in Japanese handwritten answers to writing-type questions from exercise books. We created a model to correct character-recognition errors by fine-tuning the text-to-text-...
- short-paperSeptember 2024
Post-OCR Correction with OpenAI's GPT Models on Challenging English Prosody Texts
DocEng '24: Proceedings of the ACM Symposium on Document Engineering 2024Article No.: 9, Pages 1–4https://doi.org/10.1145/3685650.3685669The digitization of historical documents faces challenges with the accuracy of Optical Character Recognition (OCR). Noting the success of large language models (LLMs) on many text-based tasks, this paper explores the potential of OpenAI's GPT models (3.5-...
- research-articleJune 2024
Fortified-Edge 4.0: A ML-Based Error Correction Framework for Secure Authentication in Collaborative Edge Computing
GLSVLSI '24: Proceedings of the Great Lakes Symposium on VLSI 2024Pages 639–644https://doi.org/10.1145/3649476.3660384Physical Unclonable Functions (PUFs) are widely researched in the field of security because of their unique, robust, and reliable nature, PUFs are considered device-specific root keys that are hard to duplicate. There are many variants of PUFs that are ...
- ArticleDecember 2023
Clinical Dialogue Transcription Error Correction with Self-supervision
AbstractA clinical dialogue is a conversation between a clinician and a patient to share medical information, which is critical in clinical decision-making. The reliance on manual note-taking is highly inefficient and leads to transcription errors when ...
-
- ArticleJune 2024
Securing Autonomous Vehicles: Fundamentals, Challenges, and Perspectives
AbstractThis work introduces a comprehensive methodology aimed at enhancing security and immunity in automotive networks, placing a primary focus on the detection, prediction, and forecasting of errors in autonomous vehicles. Conventional approaches to ...
- ArticleNovember 2023
CSEC: A Chinese Semantic Error Correction Dataset for Written Correction
AbstractExisting research primarily focuses on spelling and grammatical errors in English, such as missing or wrongly adding characters. This kind of shallow error has been well-studied. Instead, there are many unsolved deep-level errors in real ...
- ArticleOctober 2023
Overview of the NLPCC 2023 Shared Task: Chinese Spelling Check
Natural Language Processing and Chinese ComputingPages 337–345https://doi.org/10.1007/978-3-031-44699-3_30AbstractThis paper provides an overview of the Chinese Spelling Check shared task 8, held at NLPCC 2023. The task aims to correct spelling errors in Chinese sentences, including homophonic errors, visually similar errors, and other types of errors found ...
- ArticleJune 2023
Novel Benchmark Data Set for Automatic Error Detection and Correction
Natural Language Processing and Information SystemsPages 511–521https://doi.org/10.1007/978-3-031-35320-8_38AbstractThe present paper introduces a novel benchmark data set for automatic error detection as well as error correction in text documents based on language models or other techniques. The data set contains a large number of sentences from various ...
- ArticleOctober 2023
Modeling Noise-Accepting Key Exchange
AbstractIn this paper we use code-based public key encryption schemes to construct key exchange protocols that are suitable for use in the presence of transmission bit-errors, such as in mobile ad hoc networks.
Building upon the security model by Bellare ...
- articleOctober 2021
Method of Combining Cryptography and LDPC Coding for Enhanced Privacy
International Journal of Interdisciplinary Telecommunications and Networking (IJITN-IGI), Volume 13, Issue 4Pages 51–70https://doi.org/10.4018/IJITN.2021100105This paper describes a method of combining cryptographic encoding and low density parity check (LDPC) encoding for the purpose of enhancing privacy. This method uses pseudorandom number generators (PRNGs) to create parity check matrices that are ...
- short-paperJune 2021
Smart Energy Meter Calibration: An Edge Computation Method: Poster
e-Energy '21: Proceedings of the Twelfth ACM International Conference on Future Energy SystemsPages 280–281https://doi.org/10.1145/3447555.3466569Smart meters are the backbone of smart grids. They provide real time electricity consumption data and and are widely used for measuring, monitoring and analyzing energy consumption. Sometimes, they enable users to perform corrective actions. But, to ...
- ArticleApril 2021
BayesPerf: minimizing performance monitoring errors using Bayesian statistics
ASPLOS '21: Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating SystemsPages 832–844https://doi.org/10.1145/3445814.3446739Hardware performance counters (HPCs) that measure low-level architectural and microarchitectural events provide dynamic contextual information about the state of the system. However, HPC measurements are error-prone due to non determinism (e.g., ...
- research-articleApril 2020
Accuracy Improvement of Human Tracking in Aerial Images Using Error Correction Based on Color Information
ICSCA '20: Proceedings of the 2020 9th International Conference on Software and Computer ApplicationsPages 124–128https://doi.org/10.1145/3384544.3384599The authors are trying to construct a real-time vital sensing system during exercise where humans wearing sensor nodes move quickly and their density becomes sometimes higher. In this case, existing multi-hop networking using RSSI or GPS to gather vital ...
- articleJanuary 2020
Cointegration and Causality Study Among Inward FDI, Economic Growth and Exports: An Indian Perspective
International Journal of Asian Business and Information Management (IJABIM), Volume 11, Issue 1Pages 63–77https://doi.org/10.4018/IJABIM.2020010104One significant feature of liberalisation for India has been a greater openness to foreign direct investment (FDI) as a means of acquiring technologies, skills and access to international markets, and of entering dynamic trade and production. The ...
- research-articleJune 2019
ScratchThat: Supporting Command-Agnostic Speech Repair in Voice-Driven Assistants
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 3, Issue 2Article No.: 63, Pages 1–17https://doi.org/10.1145/3328934Speech interfaces have become an increasingly popular input method for smartphone-based virtual assistants, smart speakers, and Internet of Things (IoT) devices. While they facilitate rapid and natural interaction in the form of voice commands, current ...
- ArticleJuly 2018
Reliable In-Memory Data Management on Unreliable Hardware
DATA 2018: Proceedings of the 7th International Conference on Data Science, Technology and ApplicationsPages 365–372https://doi.org/10.5220/0006884203650372The key objective of database systems is to reliably manage data, whereby high query throughput and low query latency are core requirements. To satisfy these requirements, database systems constantly adapt to novel hardware features. Although it has ...
- ArticleJune 2018
Soft Patterns Reduction for RBF Network Performance Improvement
AbstractSuccessful training of artificial neural networks depends primarily on used architecture and suitable algorithm that is able to train given network. During training process error for many patterns reach low level very fast while for other patterns ...
- research-articleDecember 2017
Practical Method of Low-Light-Level Binocular Ranging Based on Triangulation and Error Correction
CSAI '17: Proceedings of the 2017 International Conference on Computer Science and Artificial IntelligencePages 259–264https://doi.org/10.1145/3168390.3168417Reliable target distance measurement at long range during the night is crucial for security surveillance at night. We present a practical method for low-light-level ranging using a motionless stereo vision system. The approach can measure the target ...
- articleJuly 2017
A Novel Visual Secret Sharing Scheme Based on QR Codes
International Journal of Digital Crime and Forensics (IJDCF), Volume 9, Issue 3Pages 38–48https://doi.org/10.4018/IJDCF.2017070104In this paper, a novel visual secret sharing VSS scheme using QR codes is investigated. The proposed visual secret sharing scheme based on QR codesVSSQR can visually reveal secret image by stacking sufficient shadow images shares as well as scan the QR ...