image reconstruction-based anomaly detection has recently been in the spotlight because of the difficulty of constructing anomaly datasets. These approaches work by learning to model normal features without seeing abn...
详细信息
image reconstruction-based anomaly detection has recently been in the spotlight because of the difficulty of constructing anomaly datasets. These approaches work by learning to model normal features without seeing abnormal samples during training and then discriminating anomalies at test time based on the reconstructive errors. However, these models have limitations in reconstructing the abnormal samples due to their indiscriminate conveyance of features. Moreover, these approaches are not explicitly optimized for distinguishable anomalies. To address these problems, we propose a two-stream decoder network (TSDN), designed to learn both normal and abnormal features. Additionally, we propose a feature normality estimator (FNE) to eliminate abnormal features and prevent high-quality reconstruction of abnormal regions. Evaluation on a standard benchmark demonstrated performance better than state-of-the-art models.
Perceptual watermarking approaches achieve better image fidelity with the advantages of the Human Visual System (HVS). Saliency uses the advantages of this feature by identifying different visually perceptual regions ...
详细信息
Single-view novel view synthesis (NVS) is a notorious problem due to its ill-posed nature, and often requires large, computationally expensive approaches to produce tangible results. In this paper, we propose CheapNVS...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
Single-view novel view synthesis (NVS) is a notorious problem due to its ill-posed nature, and often requires large, computationally expensive approaches to produce tangible results. In this paper, we propose CheapNVS: a fully end-to-end approach for narrow baseline single-view NVS based on a novel, efficient multiple encoder/decoder design trained in a multi-stage fashion. CheapNVS first approximates the laborious 3D image warping with lightweight learnable modules that are conditioned on the camera pose embeddings of the target view, and then performs inpainting on the occluded regions in parallel to achieve significant performance gains. Once trained on a subset of Open images dataset, CheapNVS outperforms the state-of-the-art despite being 10× faster and consuming 6% less memory. Furthermore, CheapNVS runs comfortably in real-time on mobile devices, reaching over 30 FPS on a Samsung Tab 9+.
Artificial Intelligence (AI) and internet of Things (IoT) technologies have developed rapidly in recent years. AI on the Edge technology combined with IoT technology are very potential for smart city applications, the...
详细信息
ISBN:
(纸本)9781665406390
Artificial Intelligence (AI) and internet of Things (IoT) technologies have developed rapidly in recent years. AI on the Edge technology combined with IoT technology are very potential for smart city applications, the security protection is one of the very important problem in smart city. This study proposes a solution for detecting abnormal and dangerous activities using AI on the edge which can be applied in smart city applications. This project aims at developing a system which can detect abnormal and dangerous activities using Deep learning model on the edge computer. The video signal from the camera will be processed by embedded computer Jetson Nano, which is implemented with deep learning models to detect some abnormal and dangerous activities such as human without facemask in the SARS-CoV-2 pandemic areas or man with gun and knife in the city public areas..., the information of detected abnormal activities will be sent to cloud server through the IoT system. YOLOv5 deep learning model is selected to implement in this system, thousands of abnormal activities have been collected to train the model. A prototype abnormal and dangerous activities detection system has been designed and implemented in practical testing areas, which has very high accuracy detection result. based on these initial results of the proposed solution we can develop some practical applications for smart city to detect and track different kinds of abnormal human activities in smart city for security issues.
Nowadays, facial recognition systems are still vulnerable to adversarial attacks. These attacks vary from simple perturbations of the input image to modifying the parameters of the recognition model to impersonate an ...
Nowadays, facial recognition systems are still vulnerable to adversarial attacks. These attacks vary from simple perturbations of the input image to modifying the parameters of the recognition model to impersonate an authorised subject. So-called privacy-enhancing facial recognition systems have been mostly developed to provide protection of stored biometric reference data, i.e. templates. In the literature, privacy-enhancing facial recognition approaches have focused solely on conventional security threats at the template level, ignoring the growing concern related to adversarial attacks. Up to now, few works have provided mechanisms to protect face recognition against adversarial attacks while maintaining high security at the template level. In this paper, we propose different key selection strategies to improve the security of a competitive cancelable scheme operating at the signal level. Experimental results show that certain strategies based on signal-level key selection can lead to complete blocking of the adversarial attack based on an iterative optimization for the most secure threshold, while for the most practical threshold, the attack success chance can be decreased to approximately 5.0%.
The goal of the depth completion task is to generate a dense depth map from a sparse depth map. The RGB image is usually introduced as a guide to help the network obtain the missing depth information. Due to the rich ...
详细信息
Federated Learning (FL) quickly gained popularity as a secure distributed learning technologybased on insights sharing. The client-level privacy provided by FL has enabled its extensive integration in fields dealing ...
详细信息
ISBN:
(数字)9798350394474
ISBN:
(纸本)9798350394481
Federated Learning (FL) quickly gained popularity as a secure distributed learning technologybased on insights sharing. The client-level privacy provided by FL has enabled its extensive integration in fields dealing with susceptible data such as E-commerce, the internet of Medical Things, etc. However, the transmitted insights may still be subjected to eavesdropping since the security of the transmission medium cannot be guaranteed. Using complex techniques, this can lead to the inference of the client data. In many cases, quantization is applied over transmitted payload to hinder such attempts but results in drop of accuracy in the global models. Moreover, the capabilities of client nodes are not considered in most implementations which may lead to under or over-utilization of client resources and cause client dropouts due to exhaustion. When combined, the quantization and client dropouts cause a significant performance loss and make the network less stable. In this paper, we propose a Dynamic Resource-Aware Federated Framework for Secure and Sustainable Learning, which layers the quantization process with an active workload management technique based on the capabilities of the client nodes. The framework minimizes the dropout rates significantly while recovering the accuracy lost in quantization to some extent. Through experiments compared against standard FL and Quantized FL over multiple datasets, the DRAFFSS shows gains in security over the former and in accuracy over the latter while keeping client dropouts negligible.
Blind identification of channel codes is crucial in intelligent communication and non-cooperative signal processing, and it plays a significant role in wireless physical layer security, information interception, and i...
详细信息
The paper proposes an innovative frame for enhanced detection of targets in images based on EEG. In this study, we have achieved the process of long-term EEG signal in single trial. We have designed the experimental p...
详细信息
The terahertz (THz) band radio access with larger available bandwidth is anticipated to provide higher capacities for next-generation wireless communication systems. However, higher path loss at THz frequencies signif...
The terahertz (THz) band radio access with larger available bandwidth is anticipated to provide higher capacities for next-generation wireless communication systems. However, higher path loss at THz frequencies significantly limits the wireless communication range. Massive multiple-input multiple-output (mMIMO) is an attractive technology to increase the Rayleigh distance by generating higher gain beams using low wavelength and highly directive antenna array aperture. In addition, both far-field and near-field components of the antenna system should be considered for modeling THz electromagnetic propagation, where the channel estimation for this environment becomes a challenging task. This paper proposes a novel channel estimation method using a real image denoising network (RIDNet) and orthogonal matching pursuit (OMP) for hybrid-field THz mMIMO channels, including far-field and near-field constituents. The simulation experiments are performed using the ray-tracing tool. The results demonstrate that the proposed RIDNet-based method consistently provides lower channel estimation errors than the conventional OMP algorithm for all signal-to-noise ratio (SNR) regions. The performance gap becomes higher at low SNR regimes. Furthermore, the results imply that the same error performance of the OMP can be achieved by the RIDNet-based method using a lower number of RF chains and pilot symbols.
暂无评论