image denoising is a fundamental task in computer vision and image processing, crucial for improving the visual quality and interpretability of images captured in noisy environments. In this research, we propose a qua...
详细信息
In recent times, propelled by the swift evolution of the internet industry, the realm of intelligent healthcare has undergone significant advancements. The portable ECG monitoring system has emerged as a prominent res...
详细信息
In order to improve the quality of UAV transmission line inspection pictures and ensure the effectiveness of the defect recognition network, this paper proposes a model based on Swin Deformer to denoise the pictures. ...
详细信息
Nowadays, facial recognition systems are still vulnerable to adversarial attacks. These attacks vary from simple perturbations of the input image to modifying the parameters of the recognition model to impersonate an ...
详细信息
ISBN:
(纸本)9798350324914
Nowadays, facial recognition systems are still vulnerable to adversarial attacks. These attacks vary from simple perturbations of the input image to modifying the parameters of the recognition model to impersonate an authorised subject. So-called privacy-enhancing facial recognition systems have been mostly developed to provide protection of stored biometric reference data, i.e. templates. In the literature, privacy-enhancing facial recognition approaches have focused solely on conventional security threats at the template level, ignoring the growing concern related to adversarial attacks. Up to now, few works have provided mechanisms to protect face recognition against adversarial attacks while maintaining high security at the template level. In this paper, we propose different key selection strategies to improve the security of a competitive cancelable scheme operating at the signal level. Experimental results show that certain strategies based on signal-level key selection can lead to complete blocking of the adversarial attack based on an iterative optimization for the most secure threshold, while for the most practical threshold, the attack success chance can be decreased to approximately 5.0%.
This study explores the optimization of loss functions in conditional Generative Adversarial Networks (cGANs), specifically the pix2pix model, for the deconvolution of astronomical images obtained from the Hubble Spac...
详细信息
Tactile internet (TI) enables the transfer of human skills over the internet, enabling teleoperation with force feedback. Advancements are being made rapidly at several fronts to realize a functional TI soon. Generall...
详细信息
ISBN:
(纸本)9781665409674
Tactile internet (TI) enables the transfer of human skills over the internet, enabling teleoperation with force feedback. Advancements are being made rapidly at several fronts to realize a functional TI soon. Generally, TI is expected to faithfully reproduce operator's actions at the other end, where a robotic arm emulates it while providing force feedback to the operator. Performance of TI is usually characterized using objective metrics such as network delay, packet losses, and RMSE. Pari passu, subjective evaluations are used as additional validation, and performance evaluation itself is not primarily based on user experience. Hence objective evaluation, which generally minimizes error (signal mismatch), is oblivious to subjective experience. In this paper, we argue that user-centric designs of TI solutions are necessary. We first consider a few common TI errors and examine their perceivability. The idea is to reduce the impact of perceivable errors and exploit the imperceivable errors to our advantage, while the objective metrics may indicate that the errors are high. To harness the imperceivable errors, we design Adaptive Offset Framework (AOF) to improve the TI signal reconstruction under realistic network settings. We use AOF to highlight the contradictory inferences drawn by objective and subjective evaluations while realizing that subjective evaluations are closer to ground truth. This strongly suggests the existence of `blind spots of objective measures'. Further, we show that AOF significantly improves the user grade, up to 3 points (on a scale of 10) compared to the standard reconstruction method.
Whole body bone imaging is a commonly used method for the diagnosis of bone metastases, but the images acquired by this method have some problems such as low resolution and poor contrast. In this paper, we propose an ...
详细信息
The proliferation of images on the internet in the era of artificial intelligence has increased the risk of image plagiarism. image plagiarism is the most serious problem in the field of research. Using artificial int...
详细信息
As a kind of grid-forming control method that can effectively provide virtual inertia for the power grid, the virtual synchronous generator (VSG) control has received increasing attention in recent years. However, the...
详细信息
In fractal image compression, similarities between the picture's self-similar components, often known as fractals, are exploited in order to create a novel method of image representation. In order to depict these ...
详细信息
暂无评论