Multi-modal sarcasm detection has attracted much recent attention. Nevertheless, the existing benchmark (MMSD) has some shortcomings that hinder the development of reliable multi-modal sarcasm detection system: (1) Th...
In this paper, to secure the communication between autonomous vehicle and its digital representative in the vehicular digital twin system, we propose a GAN augmentation-based continuous authentication scheme. Specific...
详细信息
ISBN:
(数字)9781728190549
ISBN:
(纸本)9781728190556
In this paper, to secure the communication between autonomous vehicle and its digital representative in the vehicular digital twin system, we propose a GAN augmentation-based continuous authentication scheme. Specifically, in the proposed scheme, we first introduce a data augmentation technique based Generative Adversarial Network (GAN) that provides the augmentation of raw data from vehicle sensors. We then present the efficient authentication: 1) We train a Convolutional Neural Network (CNN) using raw and augmented data; 2) Deep features are extracted through a combination of Principal Component Analysis (PCA) and CNN; 3) We train the OC-SVM classifier during the registration to ensure the legality of vehicle in the authentication phase. Performance evaluations via extensive simulations demonstrate the efficiency and effectiveness of the proposed scheme in terms of GAN loss and accuracy.
Pelvic fracture is a complex and severe injury. Accurate diagnosis and treatment planning require the segmentation of the pelvic structure and the fractured fragments from preoperative CT scans. However, this segmenta...
详细信息
Out-of-distribution (OOD) detection is crucial for developing trustworthy and reliable machine learning systems. Recent advances in training with auxiliary OOD data demonstrate efficacy in enhancing detection capabili...
详细信息
The stitching of borehole images has an important predictive role in safety analysis in the field of geotechnical engineering and intelligent geological exploration. Applying traditional image stitching methods that d...
The stitching of borehole images has an important predictive role in safety analysis in the field of geotechnical engineering and intelligent geological exploration. Applying traditional image stitching methods that designed specifically for high-resolution images to low-resolution images will lead to blurred stitching results, stitching seams, fewer matched feature points and difficulties in massive image stitching. To address these problems, we propose an autoencoder-based coarse-to-fine feature extraction network, which can extract image features with high semantic and improves the accuracy of the feature point matching. Besides, we design a cross-cycle Transformer-based image stitching framework, which increase the number of matching feature points by Cross-QuadTree attention and stitch image by affine transformation. Experimental results show that the proposed method can effectively stitch low-resolution geotechnical borehole images with satisfactory visual quality.
We introduce vPlanSim, an open source tool to aid in AI PDDL development. This tool is primarily aimed at researchers and developers who need a visual representation of their planning problem so that they can make use...
详细信息
Internet of things is progressing very rapidly and involving multiple domains of everyday life including environment, governance, healthcare system, transportation system, energy management system, etc. smart city is ...
详细信息
Internet of things is progressing very rapidly and involving multiple domains of everyday life including environment, governance, healthcare system, transportation system, energy management system, etc. smart city is a platform for collecting and storing the information that is accessed through various sensor-based IoT devices and make their information available in required and authorized domains. This interoperability can be achieved by semantic web technology. In this paper, I have reviewed multiple papers related to IoT in Smart Cities and presented a comparison among the semantic parameters. Moreover, I’ve presented my future domain of research which is about delivering the COVID-19 patients report to the concerned domains by the healthcare system domain.
Deep Q-learning (DQN) has shown recent success on a wide range of complicated sequential decision-making issues, especially in the classic control area. However, in most DQN training, the sampling policies, particular...
详细信息
Smart contracts have emerged as one of the most successful applications in the blockchain domain, playing a significant role in various blockchain ecosystems. Inspired by smart contracts, a multitude of cryptographic ...
详细信息
ISBN:
(数字)9798350345865
ISBN:
(纸本)9798350345872
Smart contracts have emerged as one of the most successful applications in the blockchain domain, playing a significant role in various blockchain ecosystems. Inspired by smart contracts, a multitude of cryptographic assets have been created. To standardize these assets, industry standards such as ERC20 (Ethereum Request for Comments 20), ERC721, and ERC1155 have been proposed. In recent years, smart contracts have frequently fallen victim to attacks. Honeypot contracts, disguised as ERC20-compliant tokens, are widely prevalent on the blockchain, enticing victims to make purchases. Such malicious smart contracts exhibiting deceptive behavior are collectively referred to as honeypot tokens. This paper focuses on ERC20-compliant smart contracts and defines six common types of honeypot issues. Building upon advancements in smart contract vulnerability detection, we propose an enhanced symbolic execution-based detection tool called Honeytoken-Detector. We conduct experiments on both contracts known to have similar issues and actual token contracts from the real world. The experimental results demonstrate the effectiveness of our tool in identifying vulnerabilities.
To mitigate the nonlinearity and cycle-skipping effects inherent in inverse scattering problems (ISPs), we propose a robust permittivity inversion method using the iterative data to Born (DtB) process. The DtB process...
详细信息
ISBN:
(数字)9798350369908
ISBN:
(纸本)9798350369915
To mitigate the nonlinearity and cycle-skipping effects inherent in inverse scattering problems (ISPs), we propose a robust permittivity inversion method using the iterative data to Born (DtB) process. The DtB process is based on reduced order models (ROMs) obtained by the Galerkin approximation of wave operators. We incorporate the layer-peeling (LP) strategy to ensure efficient and stable convergence. Furthermore, two regularization techniques are implemented to improve the robustness of the inversion algorithm in noisy environments. The inversion algorithm is validated through a 2D example.
暂无评论