With the increasing concern for environmental protection and resource optimization, efficient waste sorting has become a serious challenge today. In this paper, we propose a new offloading control problem that aims to...
详细信息
In recent years, deep learning network models, particularly Vision Transformer (ViT), have achieved remarkable progress in the domain of computer vision. Radar remote sensing has garnered attention due to its all-weat...
详细信息
image enhancement is a process to improve the visual standard of image so as to extract spatial features of image. Histogram Equalization is method by which image can be improved for better perception and interpretati...
详细信息
Existing image inpainting methods used traditional and deep learning methods to restore a large missing region in the damaged image. This often leads to color discrepancy and blurriness. Pre-processing of prior line d...
详细信息
One of the most important aspects of any conversation is to maintain the intelligibility and integrity of the message. Assume that the data being transferred is accompanied by an undesired disturbance. In that instanc...
详细信息
Recent studies show that image retrieval systems are vulnerable to adversarial attacks that adds imperceptible noise to the images. But the imperceptibility of noise limits the attack performance. As a commonly accept...
详细信息
ISBN:
(纸本)9781665473156
Recent studies show that image retrieval systems are vulnerable to adversarial attacks that adds imperceptible noise to the images. But the imperceptibility of noise limits the attack performance. As a commonly acceptable interference, watermark often appears in images, which can be treated as "imperceptible" but is unexploited. In this paper, we propose a Watermark Attack method on image Retrieval systems (WAIR). Attacking retrieval systems is challenging due to black-box model, the absence of confidence guide, and attack failures and low efficiency caused by the randomness of traditional evolutionary algorithms. To solve these challenges, we propose a new evolutionary algorithm called Gene Joint Selecting Algorithm (GJSA) that jointly optimize the watermark parameters. We also design the Fitness Record Table (FRT), a new data structure that records the historical attack effect to guide the following evolution and avoid local optimal solutions. Thanks to FRT, WAIR can also reduce the duplicate searching caused by algorithm randomness. The extensive experiments show that WAIR can attack the black-box image retrieval system with a successful rate of 0.806, which is 12.4% higher than the traditional evolutionary algorithm. Moreover, for attacking commercial image retrieval system, we achieve 2x higher attack success rate on Baidu image Retrieval API than the existing methods.
Several solutions have been used in distributed file systems to increase data availability and dependability. Historically, replication techniques were the favored method for storing data in such systems. However, the...
详细信息
In sentence similarity research methods, sentence similarity is often calculated from semantic aspects, however, the influence of other features is ignored. For example, the influence of sentence syntactic structure a...
详细信息
The ubiquitous usage of social media and other internet platforms has led to the widespread proliferation of naturally occurring social networks. This has caused a revolution in marketing and information dissemination...
详细信息
ISBN:
(纸本)9798350364613;9798350364606
The ubiquitous usage of social media and other internet platforms has led to the widespread proliferation of naturally occurring social networks. This has caused a revolution in marketing and information dissemination due to the rise of influencers, and their innate ability to broadcast information to large audiences. Influence maximization, a key problem in identifying optimal influential individuals, can be used to identify influencers in a social network, or can be superimposed on other settings which exhibit relational information. Popular methods, such as greedy algorithms, face scalability issues, performing poorly on larger networks, and incurring a large memory overhead. To address these challenges, this paper introduces a novel methodology, RIMR, which leverages statistical modeling and parallel programming to circumvent the need for storing large collections of data, achieving scalability and efficiency. Experimental results demonstrate the effectiveness and scalability of the proposed approach compared to state-of-the-art methods, showcasing significant speedups. This paper provides insights into the development of the proposed statistical process, the heterogeneous algorithm implementation, and a prototype demonstrating its efficacy.
Remote direct memory access (RDMA) supports zero-copy networking by transferring data from clients directly to host memory, eliminating the need to copy data between clients' memory and the data buffers in the hos...
详细信息
ISBN:
(纸本)9798400701559
Remote direct memory access (RDMA) supports zero-copy networking by transferring data from clients directly to host memory, eliminating the need to copy data between clients' memory and the data buffers in the hosting server. However, the hosting server must design efficient memory management schemes to handle incoming clients' data. In this paper, we propose a high-performance host memory management scheme called HM2 for RDMA-enabled distributed systems. We present a new buffer structure for incoming data from clients. In addition, we propose efficient data processingmethods to reduce network transfers between clients and servers. We conducted a preliminary experiment to evaluate HM2, and the results showed HM2 achieved higher throughput than existing schemes, including L5 and FaRM.
暂无评论