The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized *** study provides an approach to color image encryption that could find practical use in various *** proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and *** unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s *** a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives.
Despite the effectiveness of vision-language supervised fine-tuning in enhancing the performance of vision large language models(VLLMs), existing visual instruction tuning datasets include the following limitations.(1...
详细信息
Despite the effectiveness of vision-language supervised fine-tuning in enhancing the performance of vision large language models(VLLMs), existing visual instruction tuning datasets include the following limitations.(1) Instruction annotation quality: despite existing VLLMs exhibiting strong performance,instructions generated by those advanced VLLMs may still suffer from inaccuracies, such as hallucinations.(2) Instructions and image diversity: the limited range of instruction types and the lack of diversity in image data may impact the model's ability to generate diversified and closer to real-world scenarios outputs. To address these challenges, we construct a high-quality, diverse visual instruction tuning dataset MMInstruct,which consists of 973k instructions from 24 domains. There are four instruction types: judgment, multiplechoice, long visual question answering, and short visual question answering. To construct MMInstruct, we propose an instruction generation data engine that leverages GPT-4V, GPT-3.5, and manual correction. Our instruction generation engine enables semi-automatic, low-cost, and multi-domain instruction generation at 1/6 the cost of manual construction. Through extensive experiment validation and ablation experiments,we demonstrate that MMInstruct could significantly improve the performance of VLLMs, e.g., the model fine-tuning on MMInstruct achieves new state-of-the-art performance on 10 out of 12 benchmarks. The code and data shall be available at https://***/yuecao0119/MMInstruct.
This study examines the impact of environmental, social, and governance (ESG) factors on economic investment from a statistical perspective, aiming to develop a tested investment strategy that capitalizes on the conne...
详细信息
In recent times, AI and UAV have progressed significantly in several applications. This article analyzes applications of UAV with modern green computing in various sectors. It addresses cutting-edge technologies such ...
详细信息
The process of modifying digital images has been made significantly easier by the availability of several image editing software. However, in a variety of contexts, including journalism, judicial processes, and histor...
详细信息
With growing awareness of privacy protection, Federated Learning (FL) in vehicular network scenarios effectively addresses privacy concerns, leading to the development of Federated Vehicular Networks (FVN). In FVN, ve...
详细信息
Battery Energy Storage Systems (BESS) are critical for addressing the intermittent nature of Distributed Energy Resources (DERs) in power distribution networks. By enabling real-time monitoring and remote control, Int...
详细信息
As a frontier technology,holography has important research values in fields such as bio-micrographic imaging,light feld modulation and data ***,the real-time acquisition of 3D scenes and high-fidelity reconstruction t...
详细信息
As a frontier technology,holography has important research values in fields such as bio-micrographic imaging,light feld modulation and data ***,the real-time acquisition of 3D scenes and high-fidelity reconstruction technology has not yet made a breakthrough,which has seriously hindered the development of ***,a novel holographic camera is proposed to solve the above inherent problems *** proposed holographic camera consists of the acquisition end and the calculation *** the acquisition end of the holographic camera,specially configured liquid materials and liquid lens structure based on voice-coil motor-driving are used to produce the liquid camera,so that the liquid camera can quickly capture the focus stack of the real 3D scene within 15 *** the calculation end,a new structured focus stack network(FS-Net)is designed for hologram *** training the FS-Net with the focus stack renderer and learnable Zernike phase,it enables hologram calculation within 13 *** the first device to achieve real-time incoherent acquisition and high-fidelity holographic reconstruction of a real 3D scene,our proposed holographic camera breaks technical bottlenecks of difficulty in acquiring the real 3D scene,low quality of the holographic reconstructed image,and incorrect defocus *** experimental results demonstrate the effectiveness of our holographic camera in the acquisition of focal plane information and hologram calculation of the real 3D *** proposed holographic camera opens up a new way for the application of holography in fields such as 3D display,light field modulation,and 3D measurement.
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use...
详细信息
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use are outdated and suffer from numerous vulnerabilities that stem from the design of the underlying BAS *** this paper,we provide a comprehensive,up-to-date survey on BASs and attacks against seven BAS protocols including BACnet,EnOcean,KNX,LonWorks,Modbus,ZigBee,and *** studies of secure BAS protocols are also presented,covering BACnet Secure Connect,KNX Data Secure,KNX/IP Secure,ModBus/TCP Security,EnOcean High Security and Z-Wave *** and ZigBee do not have security *** point out how these security protocols improve the security of the BAS and what issues remain.A case study is provided which describes a real-world BAS and showcases its vulnerabilities as well as recommendations for improving the security of *** seek to raise awareness to those in academia and industry as well as highlight open problems within BAS security.
暂无评论