Anomalies of gait sequences are detected on the basis of an autoencoder strategy in which input data are reconstructed from their embeddings. The denoising dense low-dimensional and sparse high-dimensional autoencoder...
详细信息
作者:
Stanczyk, UrszulaBaron, GrzegorzDepartment of Graphics
Computer Vision and Digital Systems Faculty of Automatic Control Electronics and Computer Science Silesian University of Technology Akademicka 2A Gliwice44-100 Poland
Stylometric analysis of texts relies on learning characteristic traits of writing styles for authors. Once these patterns are discovered, they can be compared to the ones present in other text samples, to recognise th...
详细信息
The characteristics that make up the general identity of engineering technology (ET) degree programs and their graduates are well known;however, the explicit characteristics of ET capstone nationally is unknown. In ot...
详细信息
In Internet of Things (IoT) and clouds, while many image processing tasks are outsourced to third party cloud computing platforms, image processing in encrypted domain is needed in many services for data confidentiali...
详细信息
Manual classification of artefacts is a labor intensive process. Based on 2D images and 3D scans of - for example - ceramic shards, we developed a pattern recognition algorithm which automatically extracts relief feat...
详细信息
Forest monitoring and education are key to forest protection, education and management, which is an effective way to measure the progress of a country's forest and climate commitments. Due to the lack of a large-s...
详细信息
ISBN:
(数字)9798350374490
ISBN:
(纸本)9798350374506
Forest monitoring and education are key to forest protection, education and management, which is an effective way to measure the progress of a country's forest and climate commitments. Due to the lack of a large-scale wild forest monitoring benchmark, the common practice is to train the model on a common outdoor benchmark (e.g., KITTI) and evaluate it on real forest datasets (e.g., CanaTree100). However, there is a large domain gap in this setting, which makes the evaluation and deployment difficult. In this paper, we propose a new photorealistic virtual forest dataset and a multimodal transformer-based algorithm for tree detection and instance segmentation. To the best of our knowledge, it is the first time that a multimodal detection and segmentation algorithm is applied to a large-scale forest scenes. We believe that the proposed dataset and method will inspire the simulation, computer vision, education and forestry communities towards a more comprehensive multi-modal understanding.
On the base of the method of Support vector data description (SVDD), this paper proposes a SVDD method based on maximum distance between two centers of spheres. It applies two hyperspheres to separate two kinds of tra...
详细信息
On the base of the method of Support vector data description (SVDD), this paper proposes a SVDD method based on maximum distance between two centers of spheres. It applies two hyperspheres to separate two kinds of training instance and maximize distance between two centers of hyperspheres at the same time. Experimental results show that the method is effective, especially for unbalance problem, our method can get better results than all other methods.
Object 6D pose estimation is essential for a variety of applications, including autonomous driving, robotic manipulation, and automated harvesting. Due to the influence of different lighting conditions and occlusions,...
详细信息
Among various ancient cultures it was common practice to adorn pottery artifacts with lavish surface decoration. While the applied painting styles, color schemes and displayed mythological content may vary greatly, th...
详细信息
The integration of diverse infrastructures in modern-day power systems facilitates unauthorized access and data manipulation by adversaries, as these systems heavily rely on Information and Communication technology (I...
详细信息
ISBN:
(数字)9798331540104
ISBN:
(纸本)9798331540111
The integration of diverse infrastructures in modern-day power systems facilitates unauthorized access and data manipulation by adversaries, as these systems heavily rely on Information and Communication technology (ICT) for monitoring and control. A significant challenge within these power networks is the risk of operational disruptions, such as congestion and voltage instability, resulting from stealthy false data injection (FDI) cyberattacks. Different from the existing work, this paper proposes a solution by introducing a defense framework that utilizes a Wasserstein Generative Adversarial Network (WGAN) to generate synthetic data. This synthetic data closely resembles the output from actual Phasor Measurement Units (PMU) and is developed by training the WGAN with extensive real PMU datasets. Additionally, mixing synthetic and real data when sending it to the Supervisory Control and Data Acquisition (SCADA) system adds layers of complexity and obscures the data landscape for attackers, thereby hindering their ability to detect vulnerabilities and anomalies.
暂无评论