2022
DOI: 10.48550/arxiv.2203.08887
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

On Redundancy and Diversity in Cell-based Neural Architecture Search

Abstract: Searching for the architecture cells is a dominant paradigm in NAS. However, little attention has been devoted to the analysis of the cell-based search spaces even though it is highly important for the continual development of NAS. In this work, we conduct an empirical post-hoc analysis of architectures from the popular cellbased search spaces and find that the existing search spaces contain a high degree of redundancy: the architecture performance is minimally sensitive to changes at large parts of the cells,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…For older, un-upgraded systems in the high-complexity environment under study, the complicated relationship descriptions and the minute distinctions that set them apart exhibit multivariate standardization systems while maintaining high heterogeneity [7]. The intricacy and secrecy of supply chain attacks, which make them difficult to combat effectively, have made them stand out among the other dangers as a considerable worry [131,132]. Approaches to risk management are frequently used to lessen such attacks.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…For older, un-upgraded systems in the high-complexity environment under study, the complicated relationship descriptions and the minute distinctions that set them apart exhibit multivariate standardization systems while maintaining high heterogeneity [7]. The intricacy and secrecy of supply chain attacks, which make them difficult to combat effectively, have made them stand out among the other dangers as a considerable worry [131,132]. Approaches to risk management are frequently used to lessen such attacks.…”
Section: Discussionmentioning
confidence: 99%
“…One of the advanced security objectives of information is cryptography, which has subobjectives including confidentiality, non-repudiation, integrity, and authenticity. In manuscript [132], the authors proposed a highly efficient quantum digital signature (QDS) protocol that uses asymmetric quantum keys. The authors successfully completed the demonstration of the complete function of a quantum security network, which met all required objectives of information security.…”
Section: Discussionmentioning
confidence: 99%