Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

164 results about "Learning architecture" patented technology

Learning by imitation dialogue generation method based on generative adversarial networks

The invention relates to a learning by imitation dialogue generation method based on generative adversarial networks. The method comprises the following steps: 1) building a dialogue statement expertcorpus; 2) building the generative adversarial network, wherein a generator in the generative adversarial network comprises a pair of encoder and decoder; 3) building a false corpus; 4) performing first classification training for a discriminator; 5) inputting an input statement into the generator, and training the encoder and the decoder in the generator through a reinforcement learning architecture; 6) adding an output statement generated in the step 5) into the false corpus, and continuing training the discriminator; 7) alternatively performing training of the generator and training of thediscriminator through a training mode of the generative adversarial network, until that the generator and the discriminator both are converged. Compared with the prior art, the method provided by theinvention can generate the statements more similar as that of human and avoid emergence of too much general answers, and can promote training effects of a dialogue generation model and solve a problemof extremely high frequency of the general answers.
Owner:TONGJI UNIV

Network flow fingerprint feature two-stage multi-classification Internet of Things device identification method

The invention discloses a network flow fingerprint feature two-stage multi-classification Internet of Things device identification method, belongs to the technical field of Internet of Things device access control, and the algorithm extracts network flow features from network flow and matches and identifies accessed Internet of Things devices. The algorithm mainly comprises the following steps: firstly, acquiring N pieces of network message data when an Internet of Things device starts an access stage, and extracting features from three dimensions of sequence field contents, sequence protocolinformation and sequence statistical values to serve as device fingerprint features; using a one-to-many multi-classification machine learning architecture to perform preliminary identification on theto-be-detected Internet of Things device; and if a plurality of identification results appear in the preliminary identification, inputting the results into a maximum similarity comparison module forsecondary classification identification, and selecting the type with the highest similarity as a final identification result. According to the method, the problem that identification overlapping is easy to occur when the existing identification algorithm is used for identifying the Internet of Things device is solved, and the identification accuracy and uniqueness are improved.
Owner:SOUTHEAST UNIV

Federated learning privacy protection method based on homomorphic encryption in Internet of Vehicles

ActiveCN112583575AFully homomorphic encryptionNo need to exposeKey distribution for secure communicationEnsemble learningAlgorithmAttack
The invention provides a federated learning privacy protection method based on homomorphic encryption in the Internet of Vehicles, which introduces federated learning based on homomorphic encryption into the Internet of Vehicles, improves a Paillier algorithm with addition homomorphic lines and an RSA algorithm with multiplication homomorphism, combines an AES algorithm and a step size confusion mode, and adopts a hierarchical encryption technology at the same time. According to the method, the addition homomorphism is completed at the edge end, and the multiplication homomorphism is completedat the cloud end to improve the encryption efficiency, so that federated learning malicious attacks are effectively prevented, and the delay caused by encryption is effectively reduced. The method can be applied to privacy protection in the Internet of Vehicles to introduce federated learning into the IoV so as to solve the problem of user privacy leakage. In order to further enhance the data safety, efficient homomorphic encryption is introduced into federated learning; moreover, a Paillier algorithm with addition homogeneity and an RSA algorithm with multiplication homogeneity are improved,and a federated learning architecture with full homomorphic encryption is constructed in combination with an AES algorithm and a step length confusion mode.
Owner:HUAQIAO UNIVERSITY +1

Land utilization change and carbon reserve quantitative estimation method based on remote sensing data

ActiveCN112836610AFitting Nonlinear RelationshipsFit closelyScene recognitionNeural architecturesAlgorithmNetwork output
The invention discloses a land utilization change and carbon reserve quantitative estimation method based on remote sensing data. The method comprises the following steps: downloading an image; preprocessing the image; using and classifying land; calculating ground object carbon density according to ground survey data; making correlation analysis on the carbon reserves in the sample plots and the characteristic values, and selecting the characteristic values with significant correlation for modeling; and normalizing the screened characteristic values as an input layer of the convolutional neural network, putting the calculated carbon density of each sample plot into a network output layer, carrying out network training, and carrying out carbon reserve quantitative estimation on a to-be-studied region by utilizing a trained model. The invention is based on a hierarchical learning architecture of the multi-scale convolutional neural network, so that a land utilization classification result is better. On the basis of different feature values in the image and the carbon density obtained from ground survey data, the nonlinear relation between the feature variables and the carbon reserves is better fitted, and the final quantitative estimation result of the regional carbon reserves is improved.
Owner:平衡机器科技(深圳)有限公司

Bionic robot peacock image identification method based on deep learning

The invention discloses a bionic robot peacock image identification method based on deep learning. The method comprises the following steps that: collecting a public face detection database as an image dataset for training and verification; designing deep learning architecture based on a convolutional neural network, and realizing a face detection function in the deep learning architecture; collecting a site image shot by a bionic robot peacock camera to fine tuning on the trained convolutional neural network to realize the face detection function under an indoor complex environment; and obtaining an empirical parameter to determine the dressing positioning of an audience, and carrying out statistics on the corresponding proportion of various colors. By use of the method, the accurate andefficient face detection and color identification of the recreational bionic robot under the complex environment can be realized, and robustness is high; in addition, for the site image, carrying outparameter fine tuning on the trained deep learning architecture; and finally, carrying out real-time face detection and dressing identification on the site image captured by the camera. The method canbe applied to science and technology museums, hotels and shops for tourists to visit and amuse.
Owner:INST OF AUTOMATION CHINESE ACAD OF SCI

Deepfake traceability system based on big data federated learning architecture

The invention discloses a deepfake traceability system based on a big data federated learning architecture. The system comprises: an application layer, an interface layer, a logic layer, a network layer, and a storage layer which are connected in sequence; the application layer is used for providing a deepfake traceability service for a user and obtaining user login and uploading data; the interface layer is used for providing interface service and realizing communication between a server side and a web side; the logic layer is used for dividing system functions and designing an algorithm to construct a model to realize system function logics; the network layer is used for carrying out parameter exchange and encrypting gradient information in a modeling process; the storage layer is used for receiving transmitted parameter information and encrypted information and storing the parameter information and the encrypted information in a local database and a blockchain network. According to the system, an overall architecture of federated anti-counterfeiting traceability chains is provided, a federated anti-counterfeiting mechanism, an abnormal traceability mechanism and a risk prediction mechanism are established, Web security threats can be prevented, and the problems of data poisoning and single-point failure for federated learning can be effectively solved.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products