Deep neural networks (DNNs) are vulnerable to backdoor attacks, where adversaries embed a hidden backdoor trigger during the training process for malicious prediction manipulation. These attacks pose great threats to ...
详细信息
Pneumonia is a pathological condition characterised by the inflammation of the alveoli in either one or both lungs. Symptoms including productive cough, fever, chills, and dyspnea may develop when fluid or purulent ma...
详细信息
Industrial Internet of things (IIoT) is a promising architecture for cyber-physical systems. Although it brings a vast number of different advantages, it enables some severe challenges as well, such as energy consumpt...
详细信息
Robust local feature detection and description are crucial in a huge of computer vision tasks. However, current feature descriptors lack geometric information and spatial features. In this paper, we propose a novel sp...
详细信息
To solve the traditional water quality detection using ZigBee, GPRS, and other communication technologies having limited coverage distance, high power consumption, high cost, and complex deployment problems, according...
详细信息
Media bias is a persistent departure from the core values of objectivity and accuracy in journalism. Instead of presenting the facts objectively, media outlets and reporters frequently choose the storylines and specif...
详细信息
An improved object detection algorithm based on Yolov5s is proposed for the characteristics of remote sensing images with many types of features, dense objects and complex background. Firstly, the idea of reparameteri...
详细信息
This section introduces an innovative approach for advanced threat intelligence forecasting employing machine learning algorithms. The proposed method integrates three powerful algorithms - Random Forest, Support Vect...
详细信息
Predictive analysis of crude oil prices is very much required as worldwide economy depends on it. In this paper, time series based predictive analysis is implemented to predict crude oil prices in Indian national stoc...
详细信息
Offline signature verification serves as a robust authentication method, widely adopted in security applications due to its non-intrusive data collection procedure. Despite the notable advancements in this filed for t...
详细信息
暂无评论