In this article, we focus on performing few-shot learning (FSL) under multi-agent scenarios in which participating agents only have scarce labeled data and need to collaborate to predict labels of query observations. We aim at designing a coordination and learning framework in which multiple agents, such as drones and robots, can collectively perceive the environment accurately and efficiently under limited communication and computation conditions. We propose a metric-based multi-agent FSL framework which has three main components: an efficient communication mechanism that propagates compact and fine-grained query feature maps from query agents to support agents; an asymmetric attention mechanism that computes region-level attention weights between query and support feature maps; and a metric-learning module which calculates the image-level relevance between query and support data fast and accurately. Furthermore, we propose a specially designed ranking-based feature learning module, which can fully utilize the order information of training data by maximizing the inter-class distance, while minimizing the intra-class distance explicitly. We perform extensive numerical studies and demonstrate that our approach can achieve significantly improved accuracy in visual and acoustic perception tasks such as face identification, semantic segmentation, and sound genre recognition, consistently outperforming the state-of-the-art baselines by 5%-20%.

Download full-text PDF

Source
http://dx.doi.org/10.1109/TPAMI.2023.3285755DOI Listing

Publication Analysis

Top Keywords

ranking-based feature
8
feature learning
8
feature maps
8
query support
8
query
5
few-shot multi-agent
4
multi-agent perception
4
perception ranking-based
4
feature
4
learning
4

Similar Publications

Deepfake detection using deep feature stacking and meta-learning.

Heliyon

February 2024

Department of Computer Science and Engineering, Jadavpur University, Kolkata, 700032, India.

Deepfake is a type of face manipulation technique using deep learning that allows for the replacement of faces in videos in a very realistic way. While this technology has many practical uses, if used maliciously, it can have a significant number of bad impacts on society, such as spreading fake news or cyberbullying. Therefore, the ability to detect deepfake has become a pressing need.

View Article and Find Full Text PDF

An Entropy-Based Clustering Algorithm for Real-Time High-Dimensional IoT Data Streams.

Sensors (Basel)

November 2024

Department of Information Science, College of Humanities and Social Sciences, King Saud University, P.O. Box 11451, Riyadh 4545, Saudi Arabia.

The rapid growth of data streams, propelled by the proliferation of sensors and Internet of Things (IoT) devices, presents significant challenges for real-time clustering of high-dimensional data. Traditional clustering algorithms struggle with high dimensionality, memory and time constraints, and adapting to dynamically evolving data. Existing dimensionality reduction methods often neglect feature ranking, leading to suboptimal clustering performance.

View Article and Find Full Text PDF

As mobile applications proliferate and user feedback becomes abundant, the task of identifying and resolving conflicts among application features is crucial for delivering satisfactory user experiences. This research, motivated to align application development with user preferences, introduces a novel methodology that leverages advanced Natural Language Processing techniques. The paper showcases the use of sentiment analysis using RoBERTa, topic modeling with Non-negative matrix factorization (NMF), and semantic similarity measures from Sentence-BERT.

View Article and Find Full Text PDF

Due to the importance of the commercial aviation system and, also, the existence of countless accidents and unfortunate occurrences in this industry, there has been a need for a structured approach to deal with them in recent years. Therefore, this study presents a comprehensive and sequential model for analyzing commercial aviation accidents based on historical data and reports. The model first uses the failure mode and effects analysis (FMEA) technique to determine and score existing risks; then, the risks are prioritized using two multi-attribute decision making (MADM) methods and two novel and innovative techniques, including ranking based on intuitionistic fuzzy risk priority number and ranking based on the vague sets.

View Article and Find Full Text PDF

Detection of honey adulteration using machine learning.

PLOS Digit Health

June 2024

Information System, College of Informatics, Wollo University, Dessie, Ethiopia.

Honey adulteration is a growing concern due to its health benefits and high nutritional content. Traditional methods like Melissopalynology are ineffective in detecting adulterated honey. This research presents a comparative study of machine learning algorithms for detecting adulteration in honey.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!