Federated learning has been used extensively in business inno-vation scenarios in various *** research adopts the federated learning approach for the first time to address the issue of bank-enterprise information asym...
详细信息
Federated learning has been used extensively in business inno-vation scenarios in various *** research adopts the federated learning approach for the first time to address the issue of bank-enterprise information asymmetry in the credit assessment ***,this research designs a credit risk assessment model based on federated learning and feature selection for micro and small enterprises(MSEs)using multi-dimensional enterprise data and multi-perspective enterprise *** proposed model includes four main processes:namely encrypted entity alignment,hybrid feature selection,secure multi-party computation,and global model ***,a two-step feature selection algorithm based on wrapper and filter is designed to construct the optimal feature set in multi-source heterogeneous data,which can provide excellent accuracy and *** addition,a local update screening strategy is proposed to select trustworthy model parameters for aggregation each time to ensure the quality of the global *** results of the study show that the model error rate is reduced by 6.22%and the recall rate is improved by 11.03%compared to the algorithms commonly used in credit risk research,significantly improving the ability to identify ***,the business operations of commercial banks are used to confirm the potential of the proposed model for real-world implementation.
Although existing neural network approaches have achieved great success on Chinese spelling correction, there is still room to improve. The model is required to avoid over-correction and to distinguish a correct token...
详细信息
Existing approaches encompass deep neural network-based methods for temporal knowledge graph embedding and rule-based logical symbolic reasoning. However, the former may not adequately account for structural dependenc...
详细信息
In the era of big data and growing privacy concerns, Federated Learning (FL) has emerged as a promising solution for collaborative model training while preserving user data privacy. However, FL faces challenges such a...
详细信息
Scattering experiments become increasingly popular in modem scientific research,including the areas of materials,biology,chemistry,physics,***,various types of scattering facilities have been developed recently,such a...
详细信息
Scattering experiments become increasingly popular in modem scientific research,including the areas of materials,biology,chemistry,physics,***,various types of scattering facilities have been developed recently,such as lab-based x-ray scattering equipment,national synchrotron facilities and large neutron *** above-mentioned trends bring up fast-increasing data amounts of scattering data,as well as different scattering types(x-ray,neutron,laser and even microwaves).To help researchers process and analyze scattering data more efficiently,we developed a general and model-free scattering data analysis software based on matrix operation,which has the unique advantage of high throughput scattering data processing,analysis and *** maximize generality and efficiency,data processing is performed based on a three-dimensional matrix,where scattering curves are saved as matrices or vectors,rather than the traditional definition of paired *** can not only realize image batch processing,background subtraction and correction,but also analyze data according to scattering theory and model,such as radius of gyration,fractal dimension and other physical *** the aspect of visualization,the software allows the modify the color maps of two-dimensional scattering images and the gradual color variation of one-dimensional curves to suit efficient data *** all,this new software can work as a stand-alone platform for researchers to process,analyze and visualize scattering data from different research facilities without considering different file types or *** codes in this manuscript are open-sourced and can be easily implemented in matrix-based software,such as MATLAB,Python and Igor.
Disentangling facial expressions from other disturbing facial attributes in face images is an essential topic for facial expression *** methods only care about facial expression disentanglement(FED)itself,ignoring the...
详细信息
Disentangling facial expressions from other disturbing facial attributes in face images is an essential topic for facial expression *** methods only care about facial expression disentanglement(FED)itself,ignoring the negative effects of other facial *** to the annotations on limited facial attributes,it is difficult for existing FED solutions to disentangle all disturbance from the input *** solve this issue,we propose an expression complementary disentanglement network(ECDNet).ECDNet proposes to finish the FED task during a face reconstruction process,so as to address all facial attributes during *** from traditional reconstruction models,ECDNet reconstructs face images by progressively generating and combining facial appearance and matching *** designs the expression incentive(EIE) and expression inhibition(EIN) mechanisms,inducing the model to characterize the disentangled expression and complementary parts *** geometry and appearance,generated in the reconstructed process,are dealt with to represent facial expressions and complementary parts,*** combination of distinctive reconstruction model,EIE,and EIN mechanisms ensures the completeness and exactness of the FED *** results on RAF-DB,AffectNet,and CAER-S datasets have proven the effectiveness and superiority of ECDNet.
Mesh smoothing methods can enhance mesh quality by eliminating distorted elements, leading to improved convergence in simulations. To balance the efficiency and robustness of traditional mesh smoothing process, previo...
详细信息
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of *** existing schemes ofte...
详细信息
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of *** existing schemes often suffer from privacy breaches due to explicit attachment of access policies or partial hiding of critical attribute ***,resource-constrained IoT devices,especially those adopting wireless communication,frequently encounter affordability issues regarding decryption *** this paper,we propose an efficient and fine-grained access control scheme with fully hidden policies(named FHAC).FHAC conceals all attributes in the policy and utilizes bloom filters to efficiently locate them.A test phase before decryption is applied to assist authorized users in finding matches between their attributes and the access *** attacks are thwarted by providing unauthorized users with invalid *** heavy computational overhead of both the test phase and most of the decryption phase is outsourced to two cloud ***,users can verify the correctness of multiple outsourced decryption results *** analysis and performance comparisons demonstrate FHAC's effectiveness in protecting policy privacy and achieving efficient decryption.
Forecasting Human mobility is of great significance in the simulation and control of infectious diseases like COVID-19. To get a clear picture of potential future outbreaks, it is necessary to forecast multi-step Ori...
详细信息
暂无评论