期刊文献+
共找到192篇文章
< 1 2 10 >
每页显示 20 50 100
Hybrid Memory-Enhanced Autoencoder with Adversarial Training for Anomaly Detection in Virtual Power Plants
1
作者 Yuqiao Liu Chen Pan +1 位作者 YeonJae Oh Chang Gyoon Lim 《Computers, Materials & Continua》 2025年第3期4593-4629,共37页
Virtual Power Plants(VPPs)are integral to modern energy systems,providing stability and reliability in the face of the inherent complexities and fluctuations of solar power data.Traditional anomaly detection methodolo... Virtual Power Plants(VPPs)are integral to modern energy systems,providing stability and reliability in the face of the inherent complexities and fluctuations of solar power data.Traditional anomaly detection methodologies often need to adequately handle these fluctuations from solar radiation and ambient temperature variations.We introduce the Memory-Enhanced Autoencoder with Adversarial Training(MemAAE)model to overcome these limitations,designed explicitly for robust anomaly detection in VPP environments.The MemAAE model integrates three principal components:an LSTM-based autoencoder that effectively captures temporal dynamics to distinguish between normal and anomalous behaviors,an adversarial training module that enhances system resilience across diverse operational scenarios,and a prediction module that aids the autoencoder during the reconstruction process,thereby facilitating precise anomaly identification.Furthermore,MemAAE features a memory mechanism that stores critical pattern information,mitigating overfitting,alongside a dynamic threshold adjustment mechanism that adapts detection thresholds in response to evolving operational conditions.Our empirical evaluation of the MemAAE model using real-world solar power data shows that the model outperforms other comparative models on both datasets.On the Sopan-Finder dataset,MemAAE has an accuracy of 99.17%and an F1-score of 95.79%,while on the Sunalab Faro PV 2017 dataset,it has an accuracy of 97.67%and an F1-score of 93.27%.Significant performance advantages have been achieved on both datasets.These results show that MemAAE model is an effective method for real-time anomaly detection in virtual power plants(VPPs),which can enhance robustness and adaptability to inherent variables in solar power generation. 展开更多
关键词 Virtual power plants(VPPs) anomaly detection memory-enhanced autoencoder adversarial training solar power
在线阅读 下载PDF
Unsupervised Anomaly Detection Approach Based on Adversarial Memory Autoencoders for Multivariate Time Series 被引量:2
2
作者 Tianzi Zhao Liang Jin +3 位作者 Xiaofeng Zhou Shuai Li Shurui Liu Jiang Zhu 《Computers, Materials & Continua》 SCIE EI 2023年第7期329-346,共18页
The widespread usage of Cyber Physical Systems(CPSs)generates a vast volume of time series data,and precisely determining anomalies in the data is critical for practical production.Autoencoder is the mainstream method... The widespread usage of Cyber Physical Systems(CPSs)generates a vast volume of time series data,and precisely determining anomalies in the data is critical for practical production.Autoencoder is the mainstream method for time series anomaly detection,and the anomaly is judged by reconstruction error.However,due to the strong generalization ability of neural networks,some abnormal samples close to normal samples may be judged as normal,which fails to detect the abnormality.In addition,the dataset rarely provides sufficient anomaly labels.This research proposes an unsupervised anomaly detection approach based on adversarial memory autoencoders for multivariate time series to solve the above problem.Firstly,an encoder encodes the input data into low-dimensional space to acquire a feature vector.Then,a memory module is used to learn the feature vector’s prototype patterns and update the feature vectors.The updating process allows partial forgetting of information to prevent model overgeneralization.After that,two decoders reconstruct the input data.Finally,this research uses the Peak Over Threshold(POT)method to calculate the threshold to determine anomalous samples from normal samples.This research uses a two-stage adversarial training strategy during model training to enlarge the gap between the reconstruction error of normal and abnormal samples.The proposed method achieves significant anomaly detection results on synthetic and real datasets from power systems,water treatment plants,and computer clusters.The F1 score reached an average of 0.9196 on the five datasets,which is 0.0769 higher than the best baseline method. 展开更多
关键词 Anomaly detection autoencoder memory module adversarial training
在线阅读 下载PDF
Fooling intrusion detection systems using adversarially autoencoder 被引量:2
3
作者 Junjun Chen Di Wu +3 位作者 Ying Zhao Nabin Sharma Michael Blumenstein Shui Yu 《Digital Communications and Networks》 SCIE CSCD 2021年第3期453-460,共8页
Due to the increasing cyber-attacks,various Intrusion Detection Systems(IDSs)have been proposed to identify network anomalies.Most existing machine learning-based IDSs learn patterns from the features extracted from n... Due to the increasing cyber-attacks,various Intrusion Detection Systems(IDSs)have been proposed to identify network anomalies.Most existing machine learning-based IDSs learn patterns from the features extracted from network traffic flows,and the deep learning-based approaches can learn data distribution features from the raw data to differentiate normal and anomalous network flows.Although having been used in the real world widely,the above methods are vulnerable to some types of attacks.In this paper,we propose a novel attack framework,Anti-Intrusion Detection AutoEncoder(AIDAE),to generate features to disable the IDS.In the proposed framework,an encoder transforms features into a latent space,and multiple decoders reconstruct the continuous and discrete features,respectively.Additionally,a generative adversarial network is used to learn the flexible prior distribution of the latent space.The correlation between continuous and discrete features can be kept by using the proposed training scheme.Experiments conducted on NSL-KDD,UNSW-NB15,and CICIDS2017 datasets show that the generated features indeed degrade the detection performance of existing IDSs dramatically. 展开更多
关键词 Intrusion detection Cyber attacks autoencoder Generative adversarial networks
在线阅读 下载PDF
Missing Value Imputation Model Based on Adversarial Autoencoder Using Spatiotemporal Feature Extraction 被引量:1
4
作者 Dong-Hoon Shin Seo-El Lee +1 位作者 Byeong-Uk Jeon Kyungyong Chung 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1925-1940,共16页
Recently,the importance of data analysis has increased significantly due to the rapid data increase.In particular,vehicle communication data,considered a significant challenge in Intelligent Transportation Systems(ITS... Recently,the importance of data analysis has increased significantly due to the rapid data increase.In particular,vehicle communication data,considered a significant challenge in Intelligent Transportation Systems(ITS),has spatiotemporal characteristics and many missing values.High missing values in data lead to the decreased predictive performance of models.Existing missing value imputation models ignore the topology of transportation net-works due to the structural connection of road networks,although physical distances are close in spatiotemporal image data.Additionally,the learning process of missing value imputation models requires complete data,but there are limitations in securing complete vehicle communication data.This study proposes a missing value imputation model based on adversarial autoencoder using spatiotemporal feature extraction to address these issues.The proposed method replaces missing values by reflecting spatiotemporal characteristics of transportation data using temporal convolution and spatial convolution.Experimental results show that the proposed model has the lowest error rate of 5.92%,demonstrating excellent predictive accuracy.Through this,it is possible to solve the data sparsity problem and improve traffic safety by showing superior predictive performance. 展开更多
关键词 Missing value adversarial autoencoder spatiotemporal feature extraction
在线阅读 下载PDF
Network Intrusion Detection Model Based on Ensemble of Denoising Adversarial Autoencoder 被引量:1
5
作者 KE Rui XING Bin +1 位作者 SI Zhan-jun ZHANG Ying-xue 《印刷与数字媒体技术研究》 CAS 北大核心 2024年第5期185-194,218,共11页
Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research si... Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research significance for network security.Due to the strong generalization of invalid features during training process,it is more difficult for single autoencoder intrusion detection model to obtain effective results.A network intrusion detection model based on the Ensemble of Denoising Adversarial Autoencoder(EDAAE)was proposed,which had higher accuracy and reliability compared to the traditional anomaly detection model.Using the adversarial learning idea of Adversarial Autoencoder(AAE),the discriminator module was added to the original model,and the encoder part was used as the generator.The distribution of the hidden space of the data generated by the encoder matched with the distribution of the original data.The generalization of the model to the invalid features was also reduced to improve the detection accuracy.At the same time,the denoising autoencoder and integrated operation was introduced to prevent overfitting in the adversarial learning process.Experiments on the CICIDS2018 traffic dataset showed that the proposed intrusion detection model achieves an Accuracy of 95.23%,which out performs traditional self-encoders and other existing intrusion detection models methods in terms of overall performance. 展开更多
关键词 Intrusion detection Noise-Reducing autoencoder Generative adversarial networks Integrated learning
在线阅读 下载PDF
Deep convolutional adversarial graph autoencoder using positive pointwise mutual information for graph embedding
6
作者 MA Xiuhui WANG Rong +3 位作者 CHEN Shudong DU Rong ZHU Danyang ZHAO Hua 《High Technology Letters》 EI CAS 2022年第1期98-106,共9页
Graph embedding aims to map the high-dimensional nodes to a low-dimensional space and learns the graph relationship from its latent representations.Most existing graph embedding methods focus on the topological struct... Graph embedding aims to map the high-dimensional nodes to a low-dimensional space and learns the graph relationship from its latent representations.Most existing graph embedding methods focus on the topological structure of graph data,but ignore the semantic information of graph data,which results in the unsatisfied performance in practical applications.To overcome the problem,this paper proposes a novel deep convolutional adversarial graph autoencoder(GAE)model.To embed the semantic information between nodes in the graph data,the random walk strategy is first used to construct the positive pointwise mutual information(PPMI)matrix,then,graph convolutional net-work(GCN)is employed to encode the PPMI matrix and node content into the latent representation.Finally,the learned latent representation is used to reconstruct the topological structure of the graph data by decoder.Furthermore,the deep convolutional adversarial training algorithm is introduced to make the learned latent representation conform to the prior distribution better.The state-of-the-art experimental results on the graph data validate the effectiveness of the proposed model in the link prediction,node clustering and graph visualization tasks for three standard datasets,Cora,Citeseer and Pubmed. 展开更多
关键词 graph autoencoder(GAE) positive pointwise mutual information(PPMI) deep convolutional generative adversarial network(DCGAN) graph convolutional network(GCN) se-mantic information
在线阅读 下载PDF
Anomalous node detection in attributed social networks using dual variational autoencoder with generative adversarial networks
7
作者 Wasim Khan Shafiqul Abidin +5 位作者 Mohammad Arif Mohammad Ishrat Mohd Haleem Anwar Ahamed Shaikh Nafees Akhtar Farooqui Syed Mohd Faisal 《Data Science and Management》 2024年第2期89-98,共10页
Many types of real-world information systems, including social media and e-commerce platforms, can be modelled by means of attribute-rich, connected networks. The goal of anomaly detection in artificial intelligence i... Many types of real-world information systems, including social media and e-commerce platforms, can be modelled by means of attribute-rich, connected networks. The goal of anomaly detection in artificial intelligence is to identify illustrations that deviate significantly from the main distribution of data or that differ from known cases. Anomalous nodes in node-attributed networks can be identified with greater precision if both graph and node attributes are taken into account. Almost all of the studies in this area focus on supervised techniques for spotting outliers. While supervised algorithms for anomaly detection work well in theory, they cannot be applied to real-world applications owing to a lack of labelled data. Considering the possible data distribution, our model employs a dual variational autoencoder (VAE), while a generative adversarial network (GAN) assures that the model is robust to adversarial training. The dual VAEs are used in another capacity: as a fake-node generator. Adversarial training is used to ensure that our latent codes have a Gaussian or uniform distribution. To provide a fair presentation of the graph, the discriminator instructs the generator to generate latent variables with distributions that are more consistent with the actual distribution of the data. Once the model has been learned, the discriminator is used for anomaly detection via reconstruction loss which has been trained to distinguish between the normal and artificial distributions of data. First, using a dual VAE, our model simultaneously captures cross-modality interactions between topological structure and node characteristics and overcomes the problem of unlabeled anomalies, allowing us to better understand the network sparsity and nonlinearity. Second, the proposed model considers the regularization of the latent codes while solving the issue of unregularized embedding techniques that can quickly lead to unsatisfactory representation. Finally, we use the discriminator reconstruction loss for anomaly detection as the discriminator is well-trained to separate the normal and generated data distributions because reconstruction-based loss does not include the adversarial component. Experiments conducted on attributed networks demonstrate the effectiveness of the proposed model and show that it greatly surpasses the previous methods. The area under the curve scores of our proposed model for the BlogCatalog, Flickr, and Enron datasets are 0.83680, 0.82020, and 0.71180, respectively, proving the effectiveness of the proposed model. The result of the proposed model on the Enron dataset is slightly worse than other models;we attribute this to the dataset’s low dimensionality as the most probable explanation. 展开更多
关键词 Anomaly detection deep learning Attributed networks autoencoder Dual variational-autoencoder Generative adversarial networks
在线阅读 下载PDF
A Hybrid Wasserstein GAN and Autoencoder Model for Robust Intrusion Detection in IoT
8
作者 Mohammed S.Alshehri Oumaima Saidani +4 位作者 Wajdan Al Malwi Fatima Asiri Shahid Latif Aizaz Ahmad Khattak Jawad Ahmad 《Computer Modeling in Engineering & Sciences》 2025年第6期3899-3920,共22页
The emergence of Generative Adversarial Network(GAN)techniques has garnered significant attention from the research community for the development of Intrusion Detection Systems(IDS).However,conventional GAN-based IDS ... The emergence of Generative Adversarial Network(GAN)techniques has garnered significant attention from the research community for the development of Intrusion Detection Systems(IDS).However,conventional GAN-based IDS models face several challenges,including training instability,high computational costs,and system failures.To address these limitations,we propose a Hybrid Wasserstein GAN and Autoencoder Model(WGAN-AE)for intrusion detection.The proposed framework leverages the stability of WGAN and the feature extraction capabilities of the Autoencoder Model.The model was trained and evaluated using two recent benchmark datasets,5GNIDD and IDSIoT2024.When trained on the 5GNIDD dataset,the model achieved an average area under the precisionrecall curve is 99.8%using five-fold cross-validation and demonstrated a high detection accuracy of 97.35%when tested on independent test data.Additionally,the model is well-suited for deployment on resource-limited Internetof-Things(IoT)devices due to its ability to detect attacks within microseconds and its small memory footprint of 60.24 kB.Similarly,when trained on the IDSIoT2024 dataset,the model achieved an average PR-AUC of 94.09%and an attack detection accuracy of 97.35%on independent test data,with a memory requirement of 61.84 kB.Extensive simulation results demonstrate that the proposed hybrid model effectively addresses the shortcomings of traditional GAN-based IDS approaches in terms of detection accuracy,computational efficiency,and applicability to real-world IoT environments. 展开更多
关键词 autoencoder CYBERSECURITY generative adversarial network Internet of Things intrusion detection system
在线阅读 下载PDF
Aerodynamic optimization of supersonic airfoils using bijective cycle generative adversarial networks
9
作者 Chenfei Zhao Yuting Dai +2 位作者 XueWang Chao Yang Guangjing Huang 《Theoretical & Applied Mechanics Letters》 2025年第4期339-350,共12页
An efficient,diversified,and low-dimensional airfoil parameterization method is critical to airfoil aerodynamic optimization design.This paper proposes a supersonic airfoil parameterization method based on a bijective... An efficient,diversified,and low-dimensional airfoil parameterization method is critical to airfoil aerodynamic optimization design.This paper proposes a supersonic airfoil parameterization method based on a bijective cycle generative adversarial network(Bicycle-GAN),whose performance is compared with that of the conditional variational autoencoder(cVAE)based parameterization method in terms of parsimony,flawlessness,intuitiveness,and physicality.In all four aspects,the Bicycle-GAN-based parameterization method is superior to the cVAEbased parameterization method.Combined with multifidelity Gaussian process regression(MFGPR)surrogate model and a Bayesian optimization algorithm,a Bicycle-GAN-based optimization framework is established for the aerodynamic performance optimization of airfoils immersed in supersonic flow,which is compared with the cVAE-based optimization method in terms of optimized efficiency and effectiveness.The MFGPR surrogate model is established using low-fidelity aerodynamic data obtained from supersonic thin-airfoil theory and high-fidelity aerodynamic data obtained from steady CFD simulation.For both supersonic conditions,the CFD simulation costs are reduced by>20%compared with those of the cVAE-based optimization,and better optimization results are obtained through the Bicycle-GAN model.The optimization results for this supersonic flow point to a sharper leading edge,a smaller camber and thickness with a flatter lower surface,and a maximum thickness at 50%chord length.The advantages of the Bicycle-GAN and MFGPR models are comprehensively demonstrated in terms of airfoil generation characteristics,surrogate model prediction accuracy and optimization efficiency. 展开更多
关键词 Aerodynamic optimization design Deep learning Generative adversarial network Variational autoencoder Multifidelity gaussian process regression
在线阅读 下载PDF
融合对抗自编码器和U-net的非侵入式负荷分解方法
10
作者 王凌云 朱倍萱 +1 位作者 张涛 罗明天 《电力系统及其自动化学报》 北大核心 2026年第2期59-68,共10页
为了提高非侵入式负荷分解模型的分解效果和泛化性能,并针对现有生成式模型在非侵入式负荷分解任务中存在的一些局限性,提出一种引入变分推理思想和联合对抗机制的对抗自编码器非侵入式负荷分解方法。为保证负荷分解的实时性,采用序列... 为了提高非侵入式负荷分解模型的分解效果和泛化性能,并针对现有生成式模型在非侵入式负荷分解任务中存在的一些局限性,提出一种引入变分推理思想和联合对抗机制的对抗自编码器非侵入式负荷分解方法。为保证负荷分解的实时性,采用序列到序列映射模型。基于U-net框架构建对抗自编码器模型,在编码器与解码器之间添加跳跃连接,使模型可以同时捕获电器特征的局部细节和全局信息,实现多特征融合,避免特征丢失,同时引入实例-批归一化网络,提高模型的分解性能以及泛化性能。最后将所提模型与几种代表性模型在UK-DALE数据集上进行对比实验。结果表明:所提模型具有优秀的分解性能和泛化能力,并且更加轻量化。 展开更多
关键词 非侵入式负荷分解 对抗自编码器 深度学习 序列到序列 U-net 实例-批归一化
在线阅读 下载PDF
基于Diff-Cascade的低资源命名实体识别方法
11
作者 邱云飞 董丽波 张文文 《计算机科学与探索》 北大核心 2026年第2期533-545,共13页
在低资源命名实体识别(NER)任务中,目前许多基于迁移学习的方法虽然能够缓解数据稀缺问题,但往往会导致句子中部分正确信息的遗漏或识别错误,从而影响模型在低资源环境中的效果。针对此问题,提出了一种基于多模块协同的NER模型Diff-Casc... 在低资源命名实体识别(NER)任务中,目前许多基于迁移学习的方法虽然能够缓解数据稀缺问题,但往往会导致句子中部分正确信息的遗漏或识别错误,从而影响模型在低资源环境中的效果。针对此问题,提出了一种基于多模块协同的NER模型Diff-Cascade-NER。利用变分自编码器(VAE)在潜在空间中学习数据表示,并生成多样化的样本;将上下文信息、句法分析和VAE重构数据作为条件输入到条件编码器(CE)进行编码;将编码后的数据传递给级联扩散模型(CDM),通过多阶段的去噪和生成过程产生高质量样本;通过对抗学习阶段(AL)优化生成样本的质量和多样性。实验结果表明,对比现有模型,Diff-Cascade-NER在8个低资源数据集上表现优越,特别是在BC2GM和WNUT-16数据集上,F1值分别达到85.44%和56.38%,验证了各模块协同作用在低资源NER任务中的有效性。 展开更多
关键词 低资源命名实体识别 变分自编码器 条件编码器 级联扩散模型 对抗学习
在线阅读 下载PDF
考虑传感器噪声影响的间冷塔出水温度预测
12
作者 赵濮 南新元 +4 位作者 高丙朋 蔡鑫 许涛 潘宗金 张伟 《中国测试》 北大核心 2026年第1期140-147,共8页
针对现场传感器含噪数据影响出水温度预测精度的问题,提出一种由对抗对比盲降噪自编码器(adversarial contrastive blind denoising autoencoder,ACBDAE)和融合Transformer与BiLSTM网络的间冷塔出水温度降噪预测架构。首先通过ACBDAE网... 针对现场传感器含噪数据影响出水温度预测精度的问题,提出一种由对抗对比盲降噪自编码器(adversarial contrastive blind denoising autoencoder,ACBDAE)和融合Transformer与BiLSTM网络的间冷塔出水温度降噪预测架构。首先通过ACBDAE网络对间冷塔数据进行盲降噪,构建残差GRU提取时间特征;采用InfoNCE正则化帮助模型更好地区分数据中的相似性和差异性;引入对抗网络提高自编码器重构数据的质量。然后降噪数据通过TransBiLSTM网络进行出水温度预测,Transformer编码器可捕捉全局的序列信息和复杂的依赖关系,而BiLSTM则可以更好地捕捉局部的时序特征和变化趋势,以提高预测的准确率。结果表明:经过ACBDAE模型降噪后,预测模型r2提高3.13%,MSE、MAE和MAPE分别减少约76.24%、71.16%和71.08%,具有较好的间冷塔出水温度预测性能。 展开更多
关键词 间冷塔 出水温度预测 对抗对比盲降噪自编码器 TRANSFORMER BiLSTM 深度学习
在线阅读 下载PDF
基于SAE-LS-CGAN数据增强的语音情感识别
13
作者 魏佳楠 孙颖 张雪英 《太原理工大学学报》 北大核心 2026年第1期202-211,共10页
【目的】语音情感语料库普遍存在数据稀少的问题,而深度神经网络的训练依赖大规模标注数据以保障模型性能。数据增强是缓解该问题的主流技术手段,但是当前语音情感识别领域对数据增强方法的有效性验证研究尚且不足。【方法】在分析多种... 【目的】语音情感语料库普遍存在数据稀少的问题,而深度神经网络的训练依赖大规模标注数据以保障模型性能。数据增强是缓解该问题的主流技术手段,但是当前语音情感识别领域对数据增强方法的有效性验证研究尚且不足。【方法】在分析多种语音数据增强方法的基础上,提出了一种基于改进条件生成对抗模型(Conditional Generative Adversarial Network,CGAN)的新的数据增强模型SAE-LS-CGAN。该模型将语音特征映射为N个矩阵,鉴别器分别对每个矩阵进行评价,提升鉴别精度。与传统的生成对抗网络(Generative Adversarial Network,GAN)相比,该模型引入栈式自编码器(Stacked AutoEncoder,SAE),并将其输出作为改进CGAN的输入,同时结合类别学习器(Class Learning Block,CLB)优化生成样本的质量;进一步引入最小二乘损失函数(The Least Squares Loss Function,LS)对网络进行对抗性训练,在原始特征空间和潜在空间中生成高质量的特征向量,并将生成数据融入到训练数据中用于分类。【结果】实验结果表明,所提模型在Emo-DB和IEMOCAP数据集上的语音情感识别任务中均取得了较优的性能表现。 展开更多
关键词 语音情感识别 数据增强 栈式自编码器 条件生成对抗网络 最小二乘损失函数
在线阅读 下载PDF
一种用于心衰患者死亡率预测的数据多重插补方法
14
作者 张雅楠 张琳琳 +2 位作者 郭渊博 毕雪华 赵楷 《新疆大学学报(自然科学版中英文)》 2026年第1期61-69,共9页
针对真实数据采集机制不完善致使数据缺失、现有方法对临床特征表示不足导致模型性能受限问题,本文提出一种用于心衰患者死亡率预测的数据多重插补方法(Self-attention and Generative adversarial network based Mortality Prediction,... 针对真实数据采集机制不完善致使数据缺失、现有方法对临床特征表示不足导致模型性能受限问题,本文提出一种用于心衰患者死亡率预测的数据多重插补方法(Self-attention and Generative adversarial network based Mortality Prediction,SGMP).首先,针对临床特征在变分自编码器(Variational Autoencoder,VAE)的潜在空间中结合自注意力机制动态融合多组候选估计值,并结合生成对抗网络(Generative Adversarial Network,GAN)的对抗训练策略优化表征学习能力.然后,根据掩码矩阵有效获取候选估计结果,实现缺失数据多重插补.最后,采用合成少数类过采样技术(Synthetic Minority Over-sampling Technique,SMOTE)进行数据增强,使用多层感知机(Multilayer Perceptron,MLP)实现死亡率预测.基于新疆某三甲医院心衰患者数据进行验证,结果表明:死亡率预测任务中,相比其他模型,SGMP在多个指标上有明显提升,受试者工作特征曲线下面积达到0.902. 展开更多
关键词 死亡率预测 多重插补(MI) 自注意力机制 生成对抗网络(GAN) 变分自编码器(VAE)
在线阅读 下载PDF
基于对抗式自动编码器的管道泄漏声信号噪声抑制
15
作者 焦建冲 陆鹏飞 伍志勇 《电子设计工程》 2026年第5期32-36,共5页
在管道泄漏检测中,声信号因其独特的传播特性和敏感性成为研究焦点。然而,实际环境中的噪声干扰严重制约了声信号在泄漏检测中的应用效果。因此提出基于对抗式自动编码器的管道泄漏声信号噪声抑制方法。通过专业采集设备获取管道泄漏声... 在管道泄漏检测中,声信号因其独特的传播特性和敏感性成为研究焦点。然而,实际环境中的噪声干扰严重制约了声信号在泄漏检测中的应用效果。因此提出基于对抗式自动编码器的管道泄漏声信号噪声抑制方法。通过专业采集设备获取管道泄漏声信号,为后续处理提供原始数据。利用自动编码器对采集到的声信号进行处理,提取关键特征,为后续噪声抑制提供低维特征表示。通过构建基于生成对抗网络的噪声抑制模型,实现对降维后声信号的噪声抑制。实验结果显示,该方法提高了信号的信噪比,降低了均方误差,证明其在实际应用中的有效性。 展开更多
关键词 自动编码器 生成对抗网络 管道泄漏 声信号 噪声抑制
在线阅读 下载PDF
人工智能生成内容技术综述
16
作者 张旭龙 瞿晓阳 +3 位作者 谢骏飞 刘鹏程 肖春光 王健宗 《大数据》 2026年第1期146-173,共28页
人工智能生成内容(AIGC)技术作为一种新的内容创作方式,为数字经济中的数字智能挑战提供了新的解决方案。AIGC利用人工智能技术辅助或替代人工创作,根据用户需求生成文本、图像、语音、视频等多种形式的内容。近年来,深度学习模型的快... 人工智能生成内容(AIGC)技术作为一种新的内容创作方式,为数字经济中的数字智能挑战提供了新的解决方案。AIGC利用人工智能技术辅助或替代人工创作,根据用户需求生成文本、图像、语音、视频等多种形式的内容。近年来,深度学习模型的快速发展显著提升了AIGC的生成能力,使其成为人工智能领域的研究热点。AIGC作为一项底层技术,拥有巨大的应用潜力,但也存在一些局限性。对AIGC技术进行了综述,首先介绍了AIGC的相关算法,包括生成对抗网络、变分自编码器扩散模型和大型生成模型等;然后探讨了AIGC在不同内容形式生成中的应用;最后总结了AIGC技术面临的挑战,并展望了未来的发展趋势。 展开更多
关键词 人工智能生成内容 生成对抗网络 变分自编码器 扩散模型 大语言模型
在线阅读 下载PDF
生成式模型在医疗影像分析中的应用综述
17
作者 张有健 周冠群 +2 位作者 周昊天 王中亚 张志诚 《医学信息学杂志》 2026年第2期1-10,共10页
目的/意义系统梳理生成式模型在医疗影像分析领域的研究现状、前沿进展与核心挑战,为相关研究提供参考。方法/过程采用文献综述法,系统阐述以生成对抗网络、变分自编码器和扩散模型为代表的主流生成式模型的基本原理、技术演进及优缺点... 目的/意义系统梳理生成式模型在医疗影像分析领域的研究现状、前沿进展与核心挑战,为相关研究提供参考。方法/过程采用文献综述法,系统阐述以生成对抗网络、变分自编码器和扩散模型为代表的主流生成式模型的基本原理、技术演进及优缺点。从跨模态影像合成、数据增强、重建去噪、超分辨率、分割检测等关键应用任务出发,对现有研究工作进行归纳和分类。梳理模型性能评估框架,总结从技术指标到临床应用效能的多维度评测体系。结果/结论生成式模型在医疗影像分析领域展现出巨大潜力与应用价值,但其临床转化仍面临模型可控性与可解释性不足、泛化鲁棒性待提升、数据伦理与高计算开销等挑战。 展开更多
关键词 医疗影像分析 生成对抗网络 变分自编码器 扩散模型
暂未订购
面向国产芯片的应用软件适配评估模型设计
18
作者 孙镇 高若寒 +2 位作者 王立晨 李赫然 崔祺 《电子设计工程》 2026年第2期131-135,共5页
传统Apriori关联规则在应用软件适配评估过程中存在效率低、稀疏数据特征提取能力差的缺点,文中使用深度神经网络对其进行改进,提出一种基于改进关联规则的应用软件适配评估模型。针对Apriori效率低的问题,通过深度稀疏自编码器对数据... 传统Apriori关联规则在应用软件适配评估过程中存在效率低、稀疏数据特征提取能力差的缺点,文中使用深度神经网络对其进行改进,提出一种基于改进关联规则的应用软件适配评估模型。针对Apriori效率低的问题,通过深度稀疏自编码器对数据集进行降维后的提取特征。对于Apriori稀疏数据特征提取能力差的问题,采用对抗神经网络对数据集进行特征加强训练,同时引入注意力机制,进一步增强了模型的缺陷特征提取能力。在实验测试中,改进算法的性能明显优于原算法,且在对比算法中的表现良好,对高维数据集的检测准确率可达79.9%,表明所提模型可以有效地发现应用软件中的缺陷,能够为国产芯片在软件应用层面的发展提供支持。 展开更多
关键词 应用适配 软件缺陷特征检测 Apriori关联算法 深度稀疏自编码器 对抗神经网络 注意力机制
在线阅读 下载PDF
基于深度生成模型的点云生成算法综述
19
作者 林志浩 赵家池 程卓 《电子技术应用》 2026年第2期7-14,共8页
点云生成作为三维视觉领域的核心任务,在点云形状补全、点云上采样、点云合成等场景具有重要价值,广泛服务于自动驾驶、机器人导航及医学影像等关键领域。由于点云数据固有的无序性、稀疏性和复杂结构,传统几何建模方法难以高效生成高... 点云生成作为三维视觉领域的核心任务,在点云形状补全、点云上采样、点云合成等场景具有重要价值,广泛服务于自动驾驶、机器人导航及医学影像等关键领域。由于点云数据固有的无序性、稀疏性和复杂结构,传统几何建模方法难以高效生成高质量且多样化的点云样本。近年来,基于深度生成模型的点云生成技术快速发展,成为该领域的研究热点,极大地提高了点云生成的质量与效率。总结了基于深度生成模型的点云生成算法的前沿进展与当前面临的挑战,并对未来研究方向进行展望。 展开更多
关键词 点云生成 深度生成模型 生成对抗网络 变分自编码器 归一化流 自回归模型 扩散模型
在线阅读 下载PDF
基于LAAE网络的跨语言短文本情感分析方法 被引量:1
20
作者 沈江红 廖晓东 《计算机系统应用》 2021年第6期203-208,共6页
跨语言短文本情感分析作为自然语言处理领域的一项重要的任务,近年来备受关注.跨语言情感分析能够利用资源丰富的源语言标注数据对资源匮乏的目标语言数据进行情感分析,建立语言之间的联系是该任务的核心.与传统的机器翻译建立联系方法... 跨语言短文本情感分析作为自然语言处理领域的一项重要的任务,近年来备受关注.跨语言情感分析能够利用资源丰富的源语言标注数据对资源匮乏的目标语言数据进行情感分析,建立语言之间的联系是该任务的核心.与传统的机器翻译建立联系方法相比,迁移学习更胜一筹,而高质量的跨语言文本向量则会提升迁移效果.本文提出LAAE网络模型,该模型通过长短记忆网络(LSTM)和对抗式自编码器(AAE)获得含上下文情感信息的跨语言向量,然后利用双向GRU (Gated Recurrent Unite)进行后续情感分类任务.其中,分类器首先在源语言上进行训练,最后迁移到目标语言上进行分类任务.本方法的有效性体现在实验结果中. 展开更多
关键词 跨语言情感分析 迁移学习 长短记忆网络 对抗式自编码器 双向GRU
在线阅读 下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部