Existing multi-view deep subspace clustering methods aim to learn a unified representation from multi-view data,while the learned representation is difficult to maintain the underlying structure hidden in the origin s...
详细信息
Existing multi-view deep subspace clustering methods aim to learn a unified representation from multi-view data,while the learned representation is difficult to maintain the underlying structure hidden in the origin samples,especially the high-order neighbor relationship between *** overcome the above challenges,this paper proposes a novel multi-order neighborhood fusion based multi-view deep subspace clustering *** creatively integrate the multi-order proximity graph structures of different views into the self-expressive layer by a multi-order neighborhood fusion *** this design,the multi-order Laplacian matrix supervises the learning of the view-consistent self-representation affinity matrix;then,we can obtain an optimal global affinity matrix where each connected node belongs to one *** addition,the discriminative constraint between views is designed to further improve the clustering performance.A range of experiments on six public datasets demonstrates that the method performs better than other advanced multi-view clustering *** code is availab.e at https://***/songzuolong/MNF-MDSC(accessed on 25 December 2024).
With the rapid development of Wireless sensor networks (WSNs) in recent years, users have been more interested in the services that WSNs can provide rather than data itself. To better bridge between data in different ...
详细信息
With the rapid development of Wireless sensor networks (WSNs) in recent years, users have been more interested in the services that WSNs can provide rather than data itself. To better bridge between data in different WSNs provided by different developers and comprehensive services required by users, a general service description language used in WSNs is needed. In this paper, we propose a general description schema of services - General service description language (GSDL), which is an XML-like language and can describe simple or composite services. This language makes use of tags agreement, compression and binary coding mechanisms so as to greatly reduce the size of service description document. Moreover, we design a lightweight service composition and decomposition algorithm, which can be executed at each service broker. Compared with widely used WSDL, GSDL is more compact, flexible and suitable for service description in WSNs.
The imaging features are shared by all images shot by cameras, the artificial images may break these features. We introduce the image formation model to image forensics. Orthogonal 1-D objects with known scale on eith...
详细信息
The imaging features are shared by all images shot by cameras, the artificial images may break these features. We introduce the image formation model to image forensics. Orthogonal 1-D objects with known scale on either direction are used to estimate the principal point parameter, and the inconsistency of the principal point indicates a forgery. Experiments show that our method can detect cropping and copy-paste efficiently, and it is robust to smoothing, noise and JPEG compression.
As artificial intelligence advances rapidly, particularly with the advent of GANs and diffusion models, the accuracy of Image Inpainting Localization (IIL) has become increasingly challenging. Current IIL methods face...
详细信息
Valid authentication and security protection measures are not provided for external code and resources executed by dynamic loading technology during the runtime in *** this paper,a new method of detecting vulnerabilit...
详细信息
Valid authentication and security protection measures are not provided for external code and resources executed by dynamic loading technology during the runtime in *** this paper,a new method of detecting vulnerabilities related to dynamic loading technology is *** phases are included in the detection *** analysis phase determines the location information of the loading point and extracts the feature vector for each loading *** phase classifies the extracted feature vector by means of constructed multilab.l classification ensemble learning *** to the examination result on 4464 Android applications,37.8% of all applications use the dynamic loading technology,and more than 12% of total test applications are detected with related security *** result shows that the detection method can detect vulnerabilities of dynamic loading effectively and is more comprehensive.
With the rapid development of Wireless sensor networks(WSNs) in recent years, users have been more interested in the services that WSNs can provide rather than data itself. To better bridge between data in different W...
详细信息
With the rapid development of Wireless sensor networks(WSNs) in recent years, users have been more interested in the services that WSNs can provide rather than data itself. To better bridge between data in different WSNs provided by different developers and comprehensive services required by users, a general service description language used in WSNs is needed. In this paper, we propose a general description schema of services— General service description language(GSDL), which is an XML-like language and can describe simple or composite services. This language makes use of tags agreement,compression and binary coding mechanisms so as to greatly reduce the size of service description document. Moreover,we design a lightweight service composition and decomposition algorithm, which can be executed at each service broker. Compared with widely used WSDL, GSDL is more compact, flexible and suitable for service description in WSNs.
The local crowd density and the crowd distribution estimation tasks are useful but *** are two main problems which limit the performance of existing algorithms. The first one is that there are not enough lab.led train...
详细信息
The local crowd density and the crowd distribution estimation tasks are useful but *** are two main problems which limit the performance of existing algorithms. The first one is that there are not enough lab.led training samples to build the highperformance estimation model. Another one is that existing methods lack the supports of physical theories of the crowd. To remedy them, a novel crowd density field model is proposed, which is deduced by jointing crowd dynamics theory and social force model. A crowd counting method based on the proposed crowd density field model is introduced to measure the proposed crowd density field model. Extensive experiments confirm the effectiveness of the proposed plan.
The imaging features are shared by all images shot by cameras, the artificial images may break these features. We introduce the image formation model to image forensics. Orthogonal 1-D objects with known scale on eith...
详细信息
The imaging features are shared by all images shot by cameras, the artificial images may break these features. We introduce the image formation model to image forensics. Orthogonal 1-D objects with known scale on either direction are used to estimate the principal point parameter, and the inconsistency of the principal point indicates a forgery. Experiments show that our method can detect cropping and copy-paste efficiently, and it is robust to smoothing, noise and JPEG compression.
In this paper, we target a similarity search among data supply chains, which plays an essential role in optimizing the supply chain and extending its value. This problem is very challenging for application-oriented da...
详细信息
In this paper, we target a similarity search among data supply chains, which plays an essential role in optimizing the supply chain and extending its value. This problem is very challenging for application-oriented data supply chains because the high complexity of the data supply chain makes the computation of similarity extremely complex and inefficient. In this paper, we propose a feature space representation model based on key points,which can extract the key features from the subsequences of the original data supply chain and simplify it into a feature vector form. Then, we formulate the similarity computation of the subsequences based on the multiscale features. Further, we propose an improved hierarchical clustering algorithm for a similarity search over the data supply chains. The main idea is to separate the subsequences into disjoint groups such that each group meets one specific clustering criteria; thus, the cluster containing the query object is the similarity search result. The experimental results show that the proposed approach is both effective and efficient for data supply chain retrieval.
Recently, the digital image blind forensics technology has received an increasing attention in academic community. This paper aims at developing a new identification approach based on the statistical noise and exchang...
详细信息
Recently, the digital image blind forensics technology has received an increasing attention in academic community. This paper aims at developing a new identification approach based on the statistical noise and exchangeable image file format(EXIF) information of image for images authentication. In particular, the authors can identify whether the current image has been modified or not by utilizing the relevance between noise and EXIF parameters and comparing the real values with the estimated values of the EXIF parameters. Experimental results validate the proposed method. That is, the detecting system can identify the doctored image effectively.
暂无评论