Islanding is a significant obstacle along with excessive penetration of DG sources. The islanding could cause harm to the customers and their equipment. The ieee 1547 DG interconnection regulations stipulate that the ...
详细信息
The proceedings contain 31 papers. The special focus in this conference is on signal and image Processing. The topics include: A Blockchain-based Secure Framework for Storage and Access of Surveillance Video Data;enco...
ISBN:
(纸本)9789819795147
The proceedings contain 31 papers. The special focus in this conference is on signal and image Processing. The topics include: A Blockchain-based Secure Framework for Storage and Access of Surveillance Video Data;encountering the Challenges and Awareness of internet Security;Data-Driven Strategies for Twitter Engagement: Hashtag Recommendations and API Insights;Analyzing and Visualizing AI Decision-Making for Human-Centered Interaction and Trust;AI-ML-based Handover Techniques in Next-Generation Wireless Networks;castle Defender: Design and Implementation of Game based on Pygame;optimizing Healthcare: Enhancing Disease Management with Recommendation systems;optimizing Diabetes Prediction Models for Enhanced Health Data Processing;comparative Analysis of Classification Models Using Various Feature Sets;An Early Detection of Tomato Plant Disease with Deep Reinforcement Learning and CNN;ioT-Powered Health Monitoring System for Protecting Vital Organs Through Cloud-based Diagnosis;LASKV: Lightweight Authenticated Session Key Agreement for Video Surveillance System;Data Analyses of Factors Influencing Sustainable Adoption of Online Public Services: An Extended UTAUT Analysis in North Macedonia;a Comprehensive Review on Real-Time Campus Compass;deep Learning Approaches for Early Detection of Bovine Respiratory Diseases in Cattle;identifying Suitable Cloud Storage Services from Cross Cloud Platforms based on the Requirements;storage-Savvy Frame Recorder: Enhancing Storage Efficiency and Inspection Speed*;lossless Medical image Compression Using Block-Wise Burrows–Wheeler Transform and Modified Run Length Encoding;advancing Software Defect Detection and Prevention: Bridging Gaps in Early-Stage and Evolving Software systems;a New Way to Communicate: Deep Learning for Deaf and Dumb People;dependent Binomial: A Family of Distributions Derivable by Modifying a Base.
Driver fatigue poses a critical threat to road safety, necessitating the development of robust detection methods to minimize traffic accidents and societal burdens. Deep neural networks have recently been effectively ...
详细信息
image-text retrieval is a task to search for the proper textual descriptions of the visual world and vice versa. One challenge of this task is the vulnerability to input image/text corruptions. Such corruptions are of...
详细信息
Although modern smartphone platforms emphasize user privacy protection by continually improving security mechanisms, vulnerabilities still exist, especially in the case of the Android operating system. The Android sec...
详细信息
This paper presents a comprehensive analysis of the network performance of a proliferated Low Earth Orbit (LEO) satellite internet system, specifically the Starlink constellation. Starlink is known for its global Inte...
详细信息
The internet of Things (IoT) is an upcoming and promising technology that involves efficient transmission techniques to communicate data obtained from sensory devices in the developed application. The role played by t...
详细信息
For image processing tasks in intelligent internet of Things (IoT) devices, the traditional method is to upload the raw image data of IoT devices to an edge/cloud server for processing, and then return the processed r...
详细信息
This work proposes the quantum-state-based mapping (QSM) for machine learning. QSM uses wave functions that describe microscopic particle systems as mappings. By QSM, original inputs or features extracted by neural ne...
详细信息
With the development of multimedia communication technology, the image information stored in electronic devices faces increasing privacy risks and requires processing for protection. However, it is found that adversar...
详细信息
ISBN:
(纸本)9781665468916
With the development of multimedia communication technology, the image information stored in electronic devices faces increasing privacy risks and requires processing for protection. However, it is found that adversarial perturbations added to images for semantic information protection may corrupt the frequency domain watermarks added for copyright statement. With such challenges, we propose an Adversarial Frequency domain Watermarking (AFW) framework to protect images from both copyright and semantic content. Specifically, the AFW framework constructs the images as adversarial examples by embedding crafted adversarial watermarks in the frequency domain, followed by an optimization algorithm to improve the visual quality. Notably, AFW can generally integrate with existing watermark and attack methods. Extensive experiments on five network models and the imageNet dataset demonstrate that the AFW framework can achieve information hiding and adversarial attacking goals under visual quality assurance.
暂无评论