Tsinghua Science and Technology最新文献

筛选
英文 中文
Desensitization of Private Text Dataset Based on Gradient Strategy Trans-WTGAN 基于Trans-WTGAN梯度策略的私有文本数据脱敏
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010155
Zhen Guo;Ying Zhou;Jun Ye;Yongxu Hou
{"title":"Desensitization of Private Text Dataset Based on Gradient Strategy Trans-WTGAN","authors":"Zhen Guo;Ying Zhou;Jun Ye;Yongxu Hou","doi":"10.26599/TST.2024.9010155","DOIUrl":"https://doi.org/10.26599/TST.2024.9010155","url":null,"abstract":"Privacy-sensitive data encounter immense security and usability challenges in processing, analyzing, and sharing. Meanwhile, traditional privacy data desensitization methods suffer from issues such as poor quality and low usability after desensitization. Therefore, a text data desensitization model that combines Transformer and Wasserstein Text convolutional Generative Adversarial Network (Trans-WTGAN) is proposed. Transformer as the generator and its self-attention mechanism can handle long-range dependencies, enabling the generated of higher-quality text; Text Convolutional Neural Network (TextCNN) integrates the idea of Wasserstein as the discriminator to enhance the stability of model training; and the strategy gradient scheme of reinforcement learning is employed. Reinforcement learning utilizes the policy gradient scheme as the updating method of generator parameters, ensuring the generated data retains the original key features and maintains a certain level of usability. The experimental results indicate that the proposed model scheme holds a greater advantage over existing methods in terms of text quality and structural consistency, can guarantee the desensitization effect, and ensures the usability of the privacy-sensitive data to a certain extent after desensitization, facilitates the simulation of the development environment for the use of real data and the analysis and sharing of data.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"2081-2096"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979794","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Parallel Processing Element Architecture for Accelerating ODE and AI 一种新的加速ODE和AI的并行处理单元结构
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010090
Kaiyuan Yang;Longchao Liu;Haotian Liu;Tiantai Deng
{"title":"A Novel Parallel Processing Element Architecture for Accelerating ODE and AI","authors":"Kaiyuan Yang;Longchao Liu;Haotian Liu;Tiantai Deng","doi":"10.26599/TST.2024.9010090","DOIUrl":"https://doi.org/10.26599/TST.2024.9010090","url":null,"abstract":"Transforming complex problems, such as transforming ordinary differential equations (ODEs) into matrix formats, into simpler computational tasks is key for AI advancements and paves the way for more efficient computing architectures. Systolic Arrays, known for their computational efficiency, low power use and ease of implementation, address AI's computational challenges. They are central to mainstream industry AI accelerators, with improvements to the Processing Element (PE) significantly boosting systolic array performance, and also streamlines computing architectures, paving the way for more efficient solutions in technology fields. This research presents a novel PE design and its integration of systolic array based on a novel computing theory - bit-level mathematics for Multiply-Accumulate (MAC) operation. We present 3 different architectures for the PE and provide a comprehensive comparison between them and the state-of-the-art technologies, focusing on power, area, and throughput. This research also demonstrates the integration of the proposed MAC unit design with systolic arrays, highlighting significant improvements in computational efficiency. Our implementations show a 2380952.38 times lower latency, yet 64.19 times less DSP48E1, 1.26 times less Look-Up Tables (LUTs), 10.76 times less Flip-Flops (FFs), with 99.63 times less power consumption and 15.19 times higher performance per PE compared to the state-of-the-art design.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"1954-1964"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979797","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Medical Image Classification Based on Improved FedAvg Algorithm 基于改进fedag算法的医学图像分类研究
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010184
Rui Li;Hai Wang;Qiang Lu;Jie Yan;Shuo Ji;Yuhui Ma
{"title":"Research on Medical Image Classification Based on Improved FedAvg Algorithm","authors":"Rui Li;Hai Wang;Qiang Lu;Jie Yan;Shuo Ji;Yuhui Ma","doi":"10.26599/TST.2024.9010184","DOIUrl":"https://doi.org/10.26599/TST.2024.9010184","url":null,"abstract":"Federated learning (FL) technology has significant advantages in solving data silos and user privacy problems, but the traditional federal average (FedAvg) algorithm is ineffective in classifying and faces the risk of refactoring attacks when dealing with non-independent and identically distributed (Non-IID) data, which is especially prominent since medical data involves sensitive personal health information. Therefore, optimizing FedAvg to adapt to Non-IID data distribution and enhancing privacy protection are urgent problems that need to be solved, and this paper investigates these two aspects. In order to enhance the classification performance of FedAvg under Non-IID distribution, this paper combines the optimized deep learning model SE-ResNet18-E with FedAvg to obtain the FedAvg(SE-ResNet18-E) algorithm. The algorithm takes advantage of the SE-ResNet18-E model in feature extraction and classification tasks, fully uses the data resources of each participant, and improves the classification performance of FedAvg under Non-IID distribution. In addition, the algorithm achieves high communication performance. Second, in order to enhance the security of FL in the medical domain, threshold Paillier encryption is further introduced on top of FedAvg(SE-ResNet18-E) to form the Safe-FedAvg(SE-ResNet18-E) algorithm, which solves the threat of reconstruction attack and private key leakage in medical FL. After experimental validation, the Safe-FedAvg (SE-ResNet18-E) algorithm effectively improves the accuracy of disease classification and effectively protects the privacy and security of medical data, and enhances the trust of medical organizations participating in FL.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"2243-2258"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979789","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximating High-Order Adversarial Attacks Using Runge-Kutta Methods 用龙格-库塔方法逼近高阶对抗性攻击
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010154
Anjie Peng;Guoqiang Shi;Zhi Lin;Hui Zeng;Xing Yang
{"title":"Approximating High-Order Adversarial Attacks Using Runge-Kutta Methods","authors":"Anjie Peng;Guoqiang Shi;Zhi Lin;Hui Zeng;Xing Yang","doi":"10.26599/TST.2024.9010154","DOIUrl":"https://doi.org/10.26599/TST.2024.9010154","url":null,"abstract":"Adversarial attacks craft adversarial examples (AEs) to fool convolution neural networks. The mainstream gradient-based attacks, based on first-order optimization methods, encounter bottlenecks to generate high transferable AEs attacking unknown models. Considering that the high-order method would be a better optimization algorithm, we attempt to build high-order adversarial attacks to improve the transferability of AEs. However, solving the optimization problem of adversarial attacks directly via higher-order derivatives is computationally difficult and may face the non-convergence problem. So, we leverage the Runge-Kutta (RK) method, which is an accurate yet efficient high-order numerical solver of ordinary differential equation (ODE), to approximate high-order adversarial attacks. We first induce the gradient descent process of gradient-based attack as an ODE, and then numerically solve the ODE via RK method to develop approximated high-order adversarial attacks. Concretely, through ignoring the higher-order infinitesimal item in the Taylor expansion of the loss, the proposed method utilizes a linear combination of the present gradient and looking-ahead gradients to replace the computationally expensive high-order derivatives, and yields a relatively fast equivalent high-order adversarial attack. The proposed high-order adversarial attack can be extensively integrated with transferability augmentation methods to generate high transferable AEs. Extensive experiments demonstrate that the RK-based attacks exhibit higher transferability than the state of the arts.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"1927-1939"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979816","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MFF-YOLO: An Improved YOLO Algorithm Based on Multi-Scale Semantic Feature Fusion MFF-YOLO:基于多尺度语义特征融合的改进YOLO算法
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010097
Junsan Zhang;Chenyang Xu;Shigen Shen;Jie Zhu;Peiying Zhang
{"title":"MFF-YOLO: An Improved YOLO Algorithm Based on Multi-Scale Semantic Feature Fusion","authors":"Junsan Zhang;Chenyang Xu;Shigen Shen;Jie Zhu;Peiying Zhang","doi":"10.26599/TST.2024.9010097","DOIUrl":"https://doi.org/10.26599/TST.2024.9010097","url":null,"abstract":"The YOLOv5 algorithm is widely used in edge computing systems for object detection. However, the limited computing resources of embedded devices and the large model size of existing deep learning based methods increase the difficulty of real-time object detection on edge devices. To address this issue, we propose a smaller, less computationally intensive, and more accurate algorithm for object detection. Multi-scale Feature Fusion-YOLO (MFF-YOLO) is built on top of the YOLOv5s framework, but it contains substantial improvements to YOLOv5s. First, we design the MFF module to improve the feature propagation path in the feature pyramid, which further integrates the semantic information from different paths of feature layers. Then, a large convolution-kernel module is used in the bottleneck. The structure enlarges the receptive field and preserves shallow semantic information, which overcomes the performance limitation arising from uneven propagation in Feature Pyramid Networks (FPN). In addition, a multi-branch downsampling method based on depthwise separable convolutions and a bottleneck structure with deformable convolutions are designed to reduce the complexity of the backbone network and minimize the real-time performance loss caused by the increased model complexity. The experimental results on PASCAL VOC and MS COCO datasets show that, compared with YOLOv5s, MFF-YOLO reduces the number of parameters by 7% and the number of FLoating point Operations Per second (FLOPs) by 11.8%. The mAP@0.5 has improved by 3.7% and 5.5%, and the mAP@0.5:0.95 has improved by 6.5% and 6.2%, respetively. Furthermore, compared with YOLOv7-tiny, PP-YOLO-tiny, and other mainstream methods, MFF-YOLO has achieved better results on multiple indicators.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"2097-2113"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979796","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A DQN-Based Edge Offloading Method for Smart City Pollution Control 基于dqn的智慧城市污染控制边缘卸载方法
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010105
Jiajie Xu;Haolong Xiang;Shaobo Zang;Muhammad Bilal;Maqbool Khan;Guangming Cui
{"title":"A DQN-Based Edge Offloading Method for Smart City Pollution Control","authors":"Jiajie Xu;Haolong Xiang;Shaobo Zang;Muhammad Bilal;Maqbool Khan;Guangming Cui","doi":"10.26599/TST.2024.9010105","DOIUrl":"https://doi.org/10.26599/TST.2024.9010105","url":null,"abstract":"Smart city pollution control is fundamental to urban sustainability, which relies extensively on physical infrastructure such as sensors and cameras for real-time monitoring. Generally, monitoring data needs to be transmitted to centralized servers for pollution control service determination. In order to achieve highly efficient service quality, edge computing is involved in the smart city pollution control system (SCPCS) as it provides computational capabilities near the monitoring devices and low-latency pollution control services. However, considering the diversity of service requests, determination of offloading destination is a crucial challenge for SCPCS. In this paper, A Deep Q-Network (DQN)-based edge offloading method, called N-DEO, is proposed. Initially, N-DEO employs neural hierarchical interpolation for time series forecasting (N-HITS) to forecast pollution control service requests. Afterwards, an epsilon-greedy policy is designed to select actions. Finally, the optimal service offloading strategy is determined by the DQN algorithm. Experimental results demonstrate that N-DEO achieves the higher performance on service latency and system load compared with the current state-of-the-art methods.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"2227-2242"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979785","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ensemble Learning Model Based on Three-Way Decision for Concept Drift Adaptation 基于三向决策的概念漂移自适应集成学习模型
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010085
Dayong Deng;Wenxin Shen;Zhixuan Deng;Tianrui Li;Anjin Liu
{"title":"An Ensemble Learning Model Based on Three-Way Decision for Concept Drift Adaptation","authors":"Dayong Deng;Wenxin Shen;Zhixuan Deng;Tianrui Li;Anjin Liu","doi":"10.26599/TST.2024.9010085","DOIUrl":"https://doi.org/10.26599/TST.2024.9010085","url":null,"abstract":"The ensemble learning model can effectively detect drift and utilize diversity to improve the performance of adapting to drift. However, local concept drift can occur in different types at different time points, causing basic learners are difficult to distinguish the drift of local boundaries, and the drift range is difficult to determine. Thus, the ensemble learning model to adapt local concept drifts is still challenging problem. Moreover, there are often differences in decision boundaries after drift adaptation, and employing overall diversity measurement is inappropriate. To address these two issues, this paper proposes a novel ensemble learning model called instance-weighted ensemble learning based on the three-way decision (IWE-TWD). In IWE-TWD, a divide-and-conquer strategy is employed to handle uncertain drift and to select base learners; Density clustering dynamically constructs density regions to lock drift range; Three-way decision is adopted to estimate whether the region distribution changes, and the instance is weighted with the probability of region distribution change; The diversities between base learners are determined with three-way decision also. Experimental results show that IWE-TWD has better performance than the state-of-the-art models in data stream classification on ten synthetic data sets and seven real-world data sets.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"2029-2047"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979650","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ComPact: Edge Collaborative Spatiotemporal Graph Learning for Wind Speed Forecasting 紧凑:用于风速预报的边缘协同时空图学习
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010261
Zaigang Gong;Siyu Chen;Qiangsheng Dai;Ying Feng;Jinghui Zhang
{"title":"ComPact: Edge Collaborative Spatiotemporal Graph Learning for Wind Speed Forecasting","authors":"Zaigang Gong;Siyu Chen;Qiangsheng Dai;Ying Feng;Jinghui Zhang","doi":"10.26599/TST.2024.9010261","DOIUrl":"https://doi.org/10.26599/TST.2024.9010261","url":null,"abstract":"In edge-distributed environments, spatiotemporal graphs provide a promising solution for capturing the complex dependencies among nodes and edges necessary for accurate wind speed forecasting. These dependencies involve spatial and temporal interactions that are crucial for modeling dynamic weather patterns. However, challenges, such as effectively maintaining spatial dependency information across spatiotemporal subgraphs, can lead to reduced prediction accuracy. Additionally, managing high communication costs, associated with the need for frequent and intensive data exchanges required for real-time forecasting across distributed nodes, poses significant hurdles. To address these issues, we propose graph coarsening-based cross-subgraph message passing with edge collaboration training mechanism (namely ComPact), a novel approach that simplifies graph structures through graph coarsening while preserving essential spatiotemporal dependencies. This coarsening process minimizes communication overhead and enables effective cross-subgraph message passing, capturing both local and long-range dependencies. ComPact further leverages hierarchical graph learning and structured edge collaboration to integrate global information into local subgraphs, enhancing predictive performance. Experimental validation on large-scale datasets, primarily the WindPower dataset, demonstrates ComPact's superiority in wind speed forecasting, with up to a 31.82% reduction in Mean Absolute Error (MAE) and 11.8% lower in Mean Absolute Percentage Error (MAPE) compared to federated learning baselines.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"2320-2341"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979814","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Innovative Algorithm for Attacking Symmetric Ciphers Using D-Wave Quantum Annealing 一种利用d波量子退火攻击对称密码的创新算法
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010231
Zhi Pei;Chunlei Hong;Fen Xia;Chao Wang
{"title":"An Innovative Algorithm for Attacking Symmetric Ciphers Using D-Wave Quantum Annealing","authors":"Zhi Pei;Chunlei Hong;Fen Xia;Chao Wang","doi":"10.26599/TST.2024.9010231","DOIUrl":"https://doi.org/10.26599/TST.2024.9010231","url":null,"abstract":"Quantum computing is generally considered non-threatening to symmetric ciphers. Quantum attacks on symmetric ciphers require a thorough analysis of their internal structures, posing considerable difficulties and challenges. As of 2023, Google's quantum supremacy chip, Sycamore, is still incapable of cryptanalysis. Leveraging D-Wave's quantum annealing exploits the unique quantum tunneling effect, providing an edge in solving combinatorial optimization problems. It can be regarded as a class of artificial intelligence algorithm that can achieve global optimization. We propose a quantum heuristic symmetric cipher attack algorithm for substitution-permutation network (SPN) symmetric ciphers, which transforms the plaintext-ciphertext propagation rules within SPN structure into the problem of solving a constrained quadratic model (CQM). A novel reduction algorithm is employed to eliminate redundant constraint conditions. The D-Wave Advantage quantum computer is used to recover the encryption sub-keys. Using the quantum approximate optimization algorithm, IBM Q Experience can only recover two rounds of the Heys Cipher sub-key, whereas D-Wave Advantage achieves complete key recovery, validating its potential in quantum symmetric cipher attacks.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"2184-2194"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979788","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximizing Depth of Graph-Structured Convolutional Neural Networks with Efficient Pathway Usage for Remote Sensing 基于有效路径的图结构卷积神经网络深度最大化遥感研究
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010102
Difeng Wang;Liangming Chen;Fang Gong;Qiankun Zhu
{"title":"Maximizing Depth of Graph-Structured Convolutional Neural Networks with Efficient Pathway Usage for Remote Sensing","authors":"Difeng Wang;Liangming Chen;Fang Gong;Qiankun Zhu","doi":"10.26599/TST.2024.9010102","DOIUrl":"https://doi.org/10.26599/TST.2024.9010102","url":null,"abstract":"Recently, Randomly Wired Neural Networks (RWNNs) using random graphs for Convolutional Neural Network (CNN) construction have shown efficient layer connectivity, but may limit depth, affecting approximation, generalization, and robustness. In this work, we increase the depth of graph-structured CNNs while maintaining efficient pathway usage, which is achieved by building a feature-extraction backbone with a depth-first search, employing edges that have not been traversed for parameter-efficient skip connections. The proposed Efficiently Pathed Deep Network (EPDN) reaches maximum graph-based architecture depth without redundant node use, ensuring feature propagation with reduced connectivity. The deep structure of EPDN, coupled with its efficient pathway usage, allows for a nuanced feature extraction. EPDN is highly beneficial for processing remote sensing images, as its performance relies on the ability to resolve intricate spatial details. EPDN facilitates this by preserving low-level details through its deep and efficient skip connections, allowing for enhanced feature extraction. Additionally, the remote-sensing-adapted EPDN variant is akin to a special case of a multistep method for solving an Ordinary Differential Equation (ODE), leveraging historical data for improved prediction. EPDN outperforms existing CNNs in generalization and robustness on image classification benchmarks and remote sensing tasks. The source code is publicly available at https://github.com/AnonymousGithubLink/EPDN.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"1940-1953"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979817","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信