Three-dimensional human pose estimation(3 D HPE) has broad application prospects in the fields of trajectory prediction, posture tracking and action analysis. However, the frequent self-occlusions and the substantial ...
详细信息
Three-dimensional human pose estimation(3 D HPE) has broad application prospects in the fields of trajectory prediction, posture tracking and action analysis. However, the frequent self-occlusions and the substantial depth ambiguity in two-dimensional(2 D) representations hinder the further improvement of accuracy. In this paper, we propose a novel video-based human body geometric aware network to mitigate the above problems. Our network can implicitly be aware of the geometric constraints of the human body by capturing spatial and temporal context information from 2 D skeleton data. Specifically, a novel skeleton attention(SA) mechanism is proposed to model geometric context dependencies among different body joints, thereby improving the spatial feature representation ability of the network. To enhance the temporal consistency, a novel multilayer perceptron(MLP)-Mixer based structure is exploited to comprehensively learn temporal context information from input sequences. We conduct experiments on publicly available challenging datasets to evaluate the proposed approach. The results outperform the previous best approach by 0.5 mm in the Human3.6 m dataset. It also demonstrates significant improvements in Human Eva-I dataset.
This paper presents our research in the area of medical imaging diagnostics, focusing specifically on countering the devastating impact of the COVID-19 pandemic and numerous pulmonary pathologies. Using new deep-learn...
详细信息
With the increasing demand for Web of Things (WoT) and edge computing, the efficient utilization of limited computing power on edge devices is becoming a crucial challenge. Traditional neural networks (NNs) as web ser...
详细信息
Obfuscation techniques are frequently used in malicious programs to evade detection. However, current effective methods often require much memory space during training. This paper proposes a machine-learning-based sol...
详细信息
Traffic detection systems based on machine learning have been proposed to defend against cybersecurity threats, such as intrusion attacks and malware. However, they did not take the impact of network-induced phenomena...
详细信息
Traffic detection systems based on machine learning have been proposed to defend against cybersecurity threats, such as intrusion attacks and malware. However, they did not take the impact of network-induced phenomena into consideration, such as packet loss, retransmission, and out-of-order. These phenomena will introduce additional misclassifications in the real world. In this paper, we present ${\sf ERNN}$, a robust and end-to-end RNN model that is specially designed against network-induced phenomena. As its core, ${\sf ERNN}$ is designed with a novel gating unit named as session gate that includes: (i) four types of actions to simulate common network-induced phenomena during model training;and (ii) the Mealy machine to update states of session gate that adjusts the probability distribution of network-induced phenomena. Taken together, ${\sf ERNN}$ advances state-of-the-art by realizing the model robustness for network-induced phenomena in an error-resilient manner. We implement ${\sf ERNN}$ and evaluate it extensively on both intrusion detection and malware detection systems. By practical evaluation with dynamic bandwidth utilization and different network topologies, we demonstrate that ${\sf ERNN}$ can still identify 98.63% of encrypted intrusion traffic when facing about 16% abnormal packet sequences on a 10 Gbps dataplane. Similarly, ${\sf ERNN}$ can still robustly identify more than 97% of the encrypted malware traffic in multi-user concurrency scenarios. ${\sf ERNN}$ can realize $\sim$4% accuracy more than SOTA methods. Based on the Integrated Gradients method, we interpret the gating mechanism can reduce the dependencies on local packets (termed dependency dispersion). Moreover, we demonstrate that ${\sf ERNN}$ possesses superior stability and scalability in terms of parameter settings and feature selection. IEEE
With the rapid expansion of computer networks and information technology, ensuring secure data transmission is increasingly vital—especially for image data, which often contains sensitive information. This research p...
详细信息
Human-machine cooperative control has become an important area of intelligent driving,where driver intention recognition and dynamic control authority allocation are key factors for improving the performance of cooper...
详细信息
Human-machine cooperative control has become an important area of intelligent driving,where driver intention recognition and dynamic control authority allocation are key factors for improving the performance of cooperative decision-making and *** this paper,an online learning method is proposed for human-machine cooperative control,which introduces a priority control parameter in the reward function to achieve optimal allocation of control authority under different driver intentions and driving safety ***,a two-layer LSTM-based sequence prediction algorithm is proposed to recognise the driver's lane change(LC)intention for human-machine cooperative steering ***,an online reinforcement learning method is developed for optimising the steering authority to reduce driver workload and improve driving *** driver-in-the-loop simulation results show that our method can accurately predict the driver's LC intention in cooperative driving and effectively compensate for the driver's non-optimal driving *** experimental results on a real intelligent vehicle further demonstrate the online optimisation capability of the proposed RL-based control authority allocation algorithm and its effectiveness in improving driving safety.
Plasma,the fourth state of matter,is characterized by the presence of charged particles,including ions and *** has been shown to induce unique physical and chemical ***,there have been increased applications of plasma...
详细信息
Plasma,the fourth state of matter,is characterized by the presence of charged particles,including ions and *** has been shown to induce unique physical and chemical ***,there have been increased applications of plasma technology in the field of multiscale functional materials'preparation,with a number of interesting *** review will begin by introducing the basic knowledge of plasma,including the definition,typical parameters,and classification of plasma *** this,we will provide a comprehensive review and summary of the applications(phase conversion,doping,deposition,etching,exfoliation,and surface treatment)of plasma in common energy conversion and storage systems,such as electrocatalytic conversion of small molecules,batteries,fuel cells,and *** article summarizes the structure-performance relationships of electrochemical energy conversion and storage materials(ECSMs)that have been prepared or modified by *** also provides an overview of the challenges and perspectives of plasma technology,which could lead to a new approach for designing and modifying electrode materials in ECSMs.
Session-based Recommendation(SBR)aims to accurately recom-mend a list of items to users based on anonymous historical session *** methods for SBR suffer from several limitations:SBR based on Graph Neural Network often...
详细信息
Session-based Recommendation(SBR)aims to accurately recom-mend a list of items to users based on anonymous historical session *** methods for SBR suffer from several limitations:SBR based on Graph Neural Network often has information loss when constructing session graphs;Inadequate consideration is given to influencing factors,such as item price,and users’dynamic interest evolution is not taken into account.A new session recommendation model called Price-aware Session-based Recommendation(PASBR)is proposed to address these *** constructs session graphs by information lossless approaches to fully encode the original session information,then introduces item price as a new factor and models users’price tolerance for various items to influence users’*** addition,PASBR proposes a new method to encode user intent at the item category level and tries to capture the dynamic interest of users over ***,PASBR fuses the multi-perspective features to generate the global representation of users and make a ***,the intent,the short-term and long-term interests,and the dynamic interests of a user are *** on two real-world datasets show that PASBR can outperform representative baselines for SBR.
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
暂无评论