A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Rule-Based Modelling and Model Perturbation
[chapter]
2009
Lecture Notes in Computer Science
We present here a syntactic extension of Kappa, an established rule-based modelling platform, that enables the expression of a structured space of agents and rules that simultaneously allows us to comfortably ...
This also enables a mode of model construction where, starting from our current consensus model, we attempt to reproduce in numero the mutational and more generally perturbational analyses that were used ...
However, in recent years, a new modelling approach has arisen that helps tame this combinatorial explosion, namely agent-or rule-based modelling [5] . ...
doi:10.1007/978-3-642-04186-0_6
fatcat:wyma4mv4nrfvvgcpv5gsgy2jne
Learning Post-Hoc Causal Explanations for Recommendation
[article]
2021
arXiv
pre-print
Our approach firstly achieves counterfactual examples with the aid of a perturbation model, and then extracts personalized causal relationships for the recommendation model through a causal rule mining ...
Meanwhile, We evaluate the discovered causal explanations in terms of quality and fidelity, which show that compared with conventional association rules, causal rules can provide personalized and more ...
Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect those of the sponsors. ...
arXiv:2006.16977v2
fatcat:2ngtmfbgzvat7cgvsitm5r25hu
Model Robustness with Text Classification: Semantic-preserving adversarial attacks
[article]
2020
arXiv
pre-print
The attacks cause significant number of flips in white-box setting and same rule based can be used in black-box setting. ...
We propose algorithms to create adversarial attacks to assess model robustness in text classification problems. ...
The rule-based approach presented also shows a sequence of steps to maintain the quality of perturbations, which can be easily be adapted to any perturbation scheme and used to maintain the semantics of ...
arXiv:2008.05536v2
fatcat:em6sgq22xjfwxc6sh6zajz4vva
Universal Rules for Fooling Deep Neural Networks based Text Classification
[article]
2019
arXiv
pre-print
In other words, the universal rules are sample and method agnostic. ...
Hopefully, the results from this work will impact the development of yet more sample and model agnostic attacks as well as their defenses, culminating in perhaps a new age for artificial intelligence. ...
The aim of the method is to find universal rules efficiently based on the combination of useful and accurate small perturbations rules. ...
arXiv:1901.07132v2
fatcat:nsdxdivblvcftasb5rd2lsx65a
Measurably Stronger Explanation Reliability via Model Canonization
[article]
2022
arXiv
pre-print
In this work, we quantitatively verify the beneficial effects of network canonization to rule-based attributions on VGG-16 and ResNet18 models with BatchNorm layers and thus extend the current best practices ...
This procedure leverages the implementation-dependency of rule-based attributions and restructures a model into a functionally identical equivalent of alternative design to which established attribution ...
rule-based approaches. ...
arXiv:2202.06621v1
fatcat:cfy7eicxjjg2rhgwrzodoavkvi
Controlling Neural Networks with Rule Representations
[article]
2021
arXiv
pre-print
DeepCTRL is agnostic to data type and model architecture. It can be applied to any kind of rule defined for inputs and outputs. ...
Deep Neural Networks with Controllable Rule Representations (DeepCTRL) incorporates a rule encoder into the model coupled with a rule-based objective, enabling a shared representation for decision making ...
We propose a novel perturbation-based rule encoding method to integrate arbitrary rules into meaningful representations. Overall, DEEPCTRL is model architecture, data type and rule type agnostic. ...
arXiv:2106.07804v2
fatcat:huhu7hrjdndjtaq4z3o7uakype
Modelling and Design of Five Parameter Single Diode Photovoltaic Model with Artificial Intelligent MPPT Power System
2019
International journal of recent technology and engineering
Further, in this paper added with improved Perturb and Observe (P&O) based FLC control approach utilized to extract the highest energy from solar panel. ...
The percentage relative error and highest power is computed and compared with previous models in the survey for dissimilar photovoltaic modules. ...
The fuzzy rules impersonate the conduct of improved perturb and observe technique. The fuzzification of the perturbation and observation technique with the rules is revealed in Fig.3 . ...
doi:10.35940/ijrte.b1014.0882s819
fatcat:e74mvrp3mbg2ni4yqhxktepebi
Building Models for Biopathway Dynamics Using Intrinsic Dimensionality Analysis
[article]
2018
arXiv
pre-print
Particularly, the dataset relates to the yeast pheromone pathway and is studied in-silico with a stochastic model. The model reconstructs signal propagation stimulated by a mating pheromone. ...
In the paper, we elaborate on the reason of multidimensional analysis problem in the context of molecular signaling, and next, we introduce the model of choice, simulation details and obtained time series ...
Rule-based modelling The subject of signalling pathways and networks has already been addressed by many modelling formalisms. ...
arXiv:1804.11005v3
fatcat:qj5b4xfk3rgtxmaw6qal6xqovm
Securing Informative Fuzzy Association Rules using Bayesian Network
2019
International Journal of Advanced Computer Science and Applications
In our model, sensitive fuzzy association rules are secured by identifying sensitive fuzzy item to perturb fuzzified dataset. ...
The resulting transformed FARs are analyzed to conclude/calculate the accuracy level of our model in context of newly generated fuzzy association rules, hidden rules and lost rules. ...
A Bayesian network-based model has been used as well in privacy preservation [23] . ...
doi:10.14569/ijacsa.2019.0101068
fatcat:dfe6wecbnjcglgrxl7r2lomiei
Experimental goal regression: A method for learning problem-solving heuristics
1986
Machine Learning
The ideas are formalized in an algorithm for learning and problem solving and demonstrated with examples from the domains of simultaneous linear equations and symbolic integration. ...
This research examines the process of learning problem solving with minimal requirements for a priori knowledge and teacher involvement. ...
In particular, PET uses relational models in two ways: to detect and recover from over-generalization of heuristic rules and to guide the selection of perturbation operators. ...
doi:10.1007/bf00116893
fatcat:u5niprweh5dvrllyus6qghic5i
Third Party Privacy Preserving Protocol for Perturbation Based Classification of Vertically Fragmented Data Bases
[article]
2013
arXiv
pre-print
In case of trusted third party models the conventional asymmetric cryptographic based techniques will be used and in case of multi party based protocols data perturbed to make sure no other party to understand ...
In order to enhance security features by combining strengths of both models in this paper, we propose to use data perturbed techniques in third party privacy preserving protocol to conduct the classification ...
This proposed privacy preserving association rules based classification model on vertically portioned databases shown accuracy of 77.2% on test data bases of UCI PIMA dataset and 81.7 on test data base ...
arXiv:1304.6575v1
fatcat:wlxxpa4zmffyhajfp24cjcpxgq
Algorithmic Information Dynamics of Cellular Automata
[article]
2022
arXiv
pre-print
two different contexts (1) perturbation analysis and (2) dynamic-state colliding CA. ...
We demonstrate the sensitivity of the Block Decomposition Method on 1D and 2D CA, including Conway's Game of Life, against measures of statistical nature such as compression (LZW) and Shannon Entropy in ...
Figures 4 show the resulting change in BDM over various ECA rules and perturbation locations. ...
arXiv:2112.13177v2
fatcat:vw43d7rfnrcoja5rzzzqh5abga
Robustifying Learnability
2005
Finance and Economics Discussion Series
The issue is then whether a central bank can design policy to account for perturbations and still assure the learnability of the model. ...
Some contributions to the literature, including Bullard and Mitra (2001) and Evans and Honkapohja (2002) , have made significant headway in establishing certain features of monetary policy rules that facilitate ...
Figure 5 : Contours of radii for the NKB model, forecast-based rule, selected φ r Figure 6 : Contours of radii for the NKB model, forecast-based rule, selected φ r bations, captured in W 1 , and our selection ...
doi:10.17016/feds.2005.58
fatcat:dndzg7w4xrgkll3sluf7xoahva
CAN MARKOV CHAIN MODELS MIMIC BIOLOGICAL REGULATION?
2002
Journal of biological systems
This study tests this possibility by: (i) constructing a finite state homogeneous Markov chain model using a small set of interesting genes; (ii) estimating the model parameters based on the observed experimental ...
Studies of the ability to predict a gene's state based on the states of other genes suggest that it may be possible to abstract sufficient information to build models of the system that retain steady-state ...
Shmulevich for his insightful suggestions on the areas of probabilistic Boolean network and Markov chain simulation. ...
doi:10.1142/s0218339002000676
fatcat:y7hdpgqfubap7cysm3pegg2am4
Robustness of STDP-induced memory to perturbations of presynaptic activity: a simulation study
2011
BMC Neuroscience
We simulate a conductance-based one-compartment spiking model neuron with ("additive" and "multiplicative") STDP learning rules for the excitatory (but not the inhibitory) synapses. ...
If a neuron does not remain silent, both magnitude and duration of the perturbation determine the scale of memory destruction, which was generally more severe for the multiplicative rule. ...
We simulate a conductance-based one-compartment spiking model neuron with ("additive" and "multiplicative") STDP learning rules for the excitatory (but not the inhibitory) synapses. ...
doi:10.1186/1471-2202-12-s1-p290
pmcid:PMC3240401
fatcat:evejzx7p5zelppgvgmrmnhqv6y
« Previous
Showing results 1 — 15 out of 372,959 results