Nowadays, Blockchain technology has also drawn mammoth attention as it is currently triggering multiple projects. This technology is the prevalent technology that allows Bitcoin to operate. Bitcoin has already cemente...
详细信息
This paper studies the correlation between students' concentration in class and learning interest, emotional state and other influencing factors. By collecting students' classroom status data, a data set suita...
详细信息
Exploring Dimensionality discount strategies for Analytical Processing (OLAP) is an area of research that makes a specialty of the use of diverse techniques to reduce the variety of dimensions needed to investigate a ...
详细信息
The decision making is a very challenging and complex process while doing the diagnosis of any specific illness. Huge ambiguities and problems are faced in the process of diagnosing by using the human visual system, w...
详细信息
The autonomous decision-making problem in the mixed process of medium-range and close-range confrontation stages of agents is studied in this paper, utilizing reinforcement learning theory. The complexity and intensit...
The autonomous decision-making problem in the mixed process of medium-range and close-range confrontation stages of agents is studied in this paper, utilizing reinforcement learning theory. The complexity and intensity of the environment resulting from the integration of information technology and system-of-systems (SoS) support in the agent confrontation scenario, as well as the oversimplification of scenarios in traditional research on autonomous decision-making of agents, are taken into account. Firstly, a simulation platform is constructed based on the Agent-Based Modeling and Simulation (ABMS). Then, the state space, action space, and reward function are designed to adapt to the multi-stage confrontation scenario for agents. Finally, an autonomous decision-making method based on Proximal Policy Optimization (PPO) algorithm for agent confrontation is proposed. The experimental results demonstrate that the proposed decision-making algorithm can learn reasonable confrontation tactics in multi-stage confrontation scenarios, verifying the feasibility of studying the problem based on the above modeling and simulation framework.
This article mainly conducts a series of research on the synchronization control of Cohen-Grossberg neural networks. Firstly, a memristive Cohen-Grossberg neural network model with time-varying delay was constructed, ...
详细信息
Deep getting to know techniques have become increasingly more popular due to their potential to improve huge-scale records processing performance. Leveraging specialized hardware which includes GPUs, deep getting to k...
详细信息
Existing black-box model inversion attacks mainly focus on training and attacking surrogate models. However, due to the deployment process of face recognition models, training surrogate models becomes extremely diffic...
详细信息
Existing black-box model inversion attacks mainly focus on training and attacking surrogate models. However, due to the deployment process of face recognition models, training surrogate models becomes extremely difficult in practice. At the same time, query-based black-box inversion attacks still suffer from low image quality and high computational costs. To bridge these gaps, in this paper, we propose BMI-S, a sparse black-box inversion attack against face recognition models. BMI-S first introduces evolution strategies to perform efficient black-box gradient estimation and achieve query-based attacks. Meanwhile, BMI-S performs sparse attacks on the key styles that contribute most to the face recognition process. By only optimizing key style control vectors, BMI-S further narrows the dimensions of the search space and accelerates the inversion attacks.
Due to the rise of recipe sharing websites, it is now quite easy to find online cooking instructions that list ingredients and cooking techniques. The development of recipe suggestion systems has also been a focus of ...
详细信息
Due to the rise of recipe sharing websites, it is now quite easy to find online cooking instructions that list ingredients and cooking techniques. The development of recipe suggestion systems has also been a focus of several recipe sharing websites. Little has been done to analyse the relationship between cuisines and ingredients, while the majority of contemporary food-related research works concentrate on recipe suggestion systems. The work presented here offers an insight into which cuisines are the most related and what are a cuisine’s important elements because we know that each cuisine is unique and has a separate list of ingredients. While the cuisine of food has been regarded as the class label, the ingredients have been seen as the features. In order to categorise the cuisine of unlabeled data, this work is focused on selecting the most important ingredients using various feature selection strategies and classification approaches. This has been done to investigate the fundamental connection between ingredients and cuisine.
The Internet of Things (IoT) has experienced rapid growth in recent years, drawing significant attention from both academics and industry. As IoT gradually gains popularity in the industrial market, industrial interne...
The Internet of Things (IoT) has experienced rapid growth in recent years, drawing significant attention from both academics and industry. As IoT gradually gains popularity in the industrial market, industrial internet of things(IIoT) has emerged as a necessary solution to meet the demands of the times. The limitations posed by the small storage space of certain devices, restricted network throughput coupled with timing and reliability requirements, and the need for safety assurance in the IIoT, all present significant challenges. In particular, security threats are constantly increasing, posing a significant risk to the rapid development of IIoT. Therefore, CLAST scheme was proposed to address these issues, which based on elliptic curve cryptography and bilinear mapping to ensure the security of information. The security analysis of the scheme in the random oracle model was proved, affirming that it satisfies the security requirements for signature verification. Furthermore, the scheme reduces the complexity of the cryptographic operation process and reduces the computational overhead of the signature verification algorithm. These benefits have been substantiated through security analysis performance analysis.
暂无评论