Recent advances in Large Language Models (LLMs) have been changing the paradigm of Recommender Systems (RS). However, when items in the recommendation scenarios contain rich textual information, such as product descri...
详细信息
Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification. Recently, the detectability of absolute moment block truncation coding (AM...
详细信息
The growth of the commodification of music in the present age has made royalties allocation in an efficient, straight-forward manner to the stakeholders, in general, a complex issue. To address these challenges, this ...
详细信息
Due to high proliferation of unsolicited information in the text, image and video files, the social media analytics engine suffers from losing its user, user privacy and others. The unsolicited information is been a h...
详细信息
The security and privacy of digital images are a major concern in cyberspace. JPEG is the most widely used image compression standard and yet there are problems with format compatibility and file size preservation in ...
详细信息
The study of enhancing model robustness against adversarial examples has become increasingly critical in the security of deep learning, leading to the development of numerous adversarial defense techniques. While thes...
详细信息
Recently, Transformer-based methods for single image super-resolution (SISR) have achieved better performance advantages than the methods based on convolutional neural network (CNN). Exploiting self-attention mechanis...
详细信息
As the most widely distributed vegetation type on Earth, grasslands are the second largest ecosystem after forests, and are known as the 'skin of the earth'. However, the frequency of rodent infestation has be...
详细信息
Image forgery detection remains a challenging *** the most common copy-move forgery detection,the robustness and accuracy of existing methods can still be further *** the best of our knowledge,we are the first to prop...
详细信息
Image forgery detection remains a challenging *** the most common copy-move forgery detection,the robustness and accuracy of existing methods can still be further *** the best of our knowledge,we are the first to propose an image copy-move forgery passive detection method by combining the improved pulse coupled neural network(PCNN)and the self-selected *** method has the following steps:First,contour detection is performed on the input color image,and bounding boxes are drawn to frame the contours to form suspected forgery ***,by improving PCNN to perform feature extraction of sub-images,the feature invariance of rotation,scaling,noise adding,and so on can be ***,the dual feature matching is used to match the features and locate the forgery ***’s more,the self-selected sub-images can quickly obtain suspected forgery sub-images and lessen the workload of feature extraction,and the improved PCNN can extract image features with high *** experiments on the standard image forgery datasets CoMoFoD and CASIA,it is effectively verified that the robustness score and accuracy of proposed method are much higher than the current best method,which is a more efficient image copy-move forgery passive detection method.
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo...
详细信息
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud *** on cloud platforms usually have some subjective or objective attacks,which make the outsourced graph data in an insecure *** issue of privacy data protection has become an important obstacle to data sharing and *** to query outsourcing graph data safely and effectively has become the focus of *** query is a basic and frequently used operation in graph,and it will effectively promote the query range and query ability if multi-keyword fuzzy search can be supported at the same *** work proposes to protect the privacy information of outsourcing graph data by encryption,mainly studies the problem of multi-keyword fuzzy adjacency query,and puts forward a *** our scheme,we use the Bloom filter and encryption mechanism to build a secure index and query token,and adjacency queries are implemented through indexes and query tokens on the cloud *** proposed scheme is proved by formal analysis,and the performance and effectiveness of the scheme are illustrated by experimental *** research results of this work will provide solid theoretical and technical support for the further popularization and application of encrypted graph data processing technology.
暂无评论