Narrow your search

Library

AP (4)

KDG (4)

KU Leuven (4)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

VIVES (4)

UCLL (3)

ULB (3)

KBC (2)

More...

Resource type

book (4)

digital (4)


Language

English (4)


Year
From To Submit

2024 (1)

2022 (1)

2018 (1)

2017 (1)

Listing 1 - 4 of 4
Sort by

Multi
A Few Things I Know About Her : A Personally Machine Learning Inspired Approach to Understand Surrounding Nature
Author:
ISBN: 9783030943790 9783030943783 9783030943806 9783030943813 Year: 2022 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book reconsiders key issues, such as description and explanation, which affect data analytics. For starters: the soul does not exist. Once released from this cumbersome roommate, we are left with complex biological systems: namely, ourselves, who must configure their environment in terms of worlds that are compatible with what they sense. Far from supplying yet another cosmogony, the book provides the cultivated reader with computational tools for describing and understanding data arising from his surroundings, such as climate parameters or stock market trends, even the win/defeat story of his son football team. Besides the superposition of the very many universes considered by quantum mechanics, we aim to manage families of worlds that may have generated those data through the key feature of their compatibility. Starting from a sharp engineering of ourselves in term of pairs consisting of genome plus a neuron ensemble, we toss this feature in different cognitive frameworks within a span of exploitations ranging from probability distributions to the latest implementations of machine learning. From the perspective of human society as an ensemble of the above pairs, the book also provides scientific tools for analyzing the benefits and drawbacks of the modern paradigm of the world as a service.


Multi
Attacks, Defenses and Testing for Deep Learning
Authors: --- ---
ISBN: 9789819704255 9789819704248 9789819704262 9789819704279 Year: 2024 Publisher: Singapore Springer Nature

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a systematic study on the security of deep learning. With its powerful learning ability, deep learning is widely used in CV, FL, GNN, RL, and other scenarios. However, during the process of application, researchers have revealed that deep learning is vulnerable to malicious attacks, which will lead to unpredictable consequences. Take autonomous driving as an example, there were more than 12 serious autonomous driving accidents in the world in 2018, including Uber, Tesla and other high technological enterprises. Drawing on the reviewed literature, we need to discover vulnerabilities in deep learning through attacks, reinforce its defense, and test model performance to ensure its robustness. Attacks can be divided into adversarial attacks and poisoning attacks. Adversarial attacks occur during the model testing phase, where the attacker obtains adversarial examples by adding small perturbations. Poisoning attacks occur during the model training phase, where the attacker injects poisoned examples into the training dataset, embedding a backdoor trigger in the trained deep learning model. An effective defense method is an important guarantee for the application of deep learning. The existing defense methods are divided into three types, including the data modification defense method, model modification defense method, and network add-on method. The data modification defense method performs adversarial defense by fine-tuning the input data. The model modification defense method adjusts the model framework to achieve the effect of defending against attacks. The network add-on method prevents the adversarial examples by training the adversarial example detector. Testing deep neural networks is an effective method to measure the security and robustness of deep learning models. Through test evaluation, security vulnerabilities and weaknesses in deep neural networks can be identified. By identifying and fixing these vulnerabilities, the security and robustness of the model can be improved. Our audience includes researchers in the field of deep learning security, as well as software development engineers specializing in deep learning.


Multi
Practical Quantum Computing for Developers : Programming Quantum Rigs in the Cloud using Python, Quantum Assembly Language and IBM QExperience
Author:
ISBN: 9781484242186 1484242181 Year: 2018 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Write algorithms and program in the new field of quantum computing. This book covers major topics such as the physical components of a quantum computer: qubits, entanglement, logic gates, circuits, and how they differ from a traditional computer. Also, Practical Quantum Computing for Developers discusses quantum computing in the cloud using IBM Q Experience including: the composer, quantum scores, experiments, circuits, simulators, real quantum devices, and more. You’ll be able to run experiments in the cloud on a real quantum device. Furthermore, this book shows you how to do quantum programming using the QISKit (Quantum Information Software Kit), Python SDK, and other APIs such as QASM (Quantum Assembly). You’ll learn to write code using these languages and execute it against simulators (local or remote) or a real quantum computer provided by IBM’s Q Experience. Finally, you’ll learn the current quantum algorithms for entanglement, random number generation, linear search, integer factorization, and others. You’ll peak inside the inner workings of the Bell states for entanglement, Grover’s algorithm for linear search, Shor’s algorithm for integer factorization, and other algorithms in the fields of optimization, and more. Along the way you’ll also cover game theory with the Magic Square, an example of quantum pseudo-telepathy where parties sharing entangled states can be observed to have some kind of communication between them. In this game Alice and Bob play against a referee. Quantum mechanics allows Alice and Bob to always win! By the end of this book, you will understand how this emerging technology provides massive parallelism and significant computational speedups over classical computers, and will be prepared to program quantum computers which are expected to replace traditional computers in the data center. You will: Use the Q Experience Composer, the first-of-its-kind web console to create visual programs/experiments and submit them to a quantum simulator or real device on the cloud Run programs remotely using the Q Experience REST API Write algorithms that provide superior performance over their classical counterparts Build a Node.js REST client for authenticating, listing remote devices, querying information about quantum processors, and listing or running experiments remotely in the cloud Create a quantum number generator: The quintessential coin flip with a quantum twist Discover quantum teleportation: This algorithm demonstrates how the exact state of a qubit (quantum information) can be transmitted from one location to another, with the help of classical communication and quantum entanglement between the sender and receiver Peek into single qubit operations with the classic game of Battleships with a quantum twist Handle the counterfeit coin problem: a classic puzzle that consists of finding a counterfeit coin in a beam balance among eight coins in only two turns.


Multi
Extended Cognition and the Dynamics of Algorithmic Skills
Author:
ISBN: 9783319518411 Year: 2017 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book describes a novel methodology for studying algorithmic skills, intended as cognitive activities related to rule-based symbolic transformation, and argues that some human computational abilities may be interpreted and analyzed as genuine examples of extended cognition. It shows that the performance of these abilities relies not only on innate neurocognitive systems or language-related skills, but also on external tools and general agent–environment interactions. Further, it asserts that a low-level analysis, based on a set of core neurocognitive systems linking numbers and language, is not sufficient to explain some specific forms of high-level numerical skills, like those involved in algorithm execution. To this end, it reports on the design of a cognitive architecture for modeling all the relevant features involved in the execution of algorithmic strategies, including external tools, such as paper and pencils. The first part of the book discusses the philosophical premises for endorsing and justifying a position in philosophy of mind that links a modified form of computationalism with some recent theoretical and scientific developments, like those introduced by the so-called dynamical approach to cognition. The second part is dedicated to the description of a Turing-machine-inspired cognitive architecture, expressly designed to formalize all kinds of algorithmic strategies.

Listing 1 - 4 of 4
Sort by