Advancements in communication have boosted digital image sharing but also heightened security risks due to easy manipulation. Therefore, authentication techniques are crucial for securing medical images. This paper pr...
详细信息
Mainstream approaches for unsupervised domain adaptation (UDA) learn domain-invariant representations to address the domain shift. Recently, self-training has been used in UDA, which exploits pseudo-labels for unlabel...
详细信息
Quantum Computing is a fastly growing area with many applications, including quantum machine learning (QML). Due to the rapid increase of computational power, machine learning models based on artificial neural network...
详细信息
A long-standing question in the evolutionary multi-objective (EMO) community is how to generate a good initial population for EMO algorithms. Intuitively, as the starting point of optimization, a good initial populati...
详细信息
This paper addresses the task of extending a given synset with additional synonyms taking into account synonymy strength as a fuzzy value. Given a mono/multilingual synset and a threshold (a fuzzy value [0 − 1]), our ...
详细信息
Despite opaque machine learning models outperform transparent models, users are still unable to comprehend and trust their ***, Explainable Artificial Intelligence (XAI) becomes a prominent research area. The main obj...
详细信息
The COVID-19 pandemic has affected our lives in many ways. Many people faced different challenges during the pandemic to accomplish their daily activities. Many people faced various challenges during the pandemic migh...
详细信息
In this article, a new vision- and grating-sensor-based intelligent unmanned settlement (IUS) system is proposed for convenience stores to automatically recognize the shopping behavior of customers, record their ident...
详细信息
In this paper, we investigate the competitive content placement problem in Mobile Edge Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents and trade them with requesters at a suitable pr...
详细信息
Data analysis, private protection, detecting unusual things, identifying people, and transferring data are part of the study's unique security design. The major system method is AUA. Your authentication level depe...
详细信息
暂无评论