Due to their low power consumption and limited computing power,Internet of Things(IoT)devices are difficult to ***,the rapid growth of IoT devices in homes increases the risk of *** detection systems(IDS)are commonly ...
详细信息
Due to their low power consumption and limited computing power,Internet of Things(IoT)devices are difficult to ***,the rapid growth of IoT devices in homes increases the risk of *** detection systems(IDS)are commonly employed to prevent *** systems detect incoming attacks and instantly notify users to allow for the implementation of appropriate *** have been made in the past to detect new attacks using machine learning and deep learning techniques,however,these efforts have been *** this paper,we propose two deep learning models to automatically detect various types of intrusion attacks in IoT ***,we experimentally evaluate the use of two Convolutional Neural Networks(CNN)to detect nine distinct types of attacks listed in the NF-UNSW-NB15-v2 *** accomplish this goal,the network stream data were initially converted to twodimensional images,which were then used to train the neural network *** also propose two baseline models to demonstrate the performance of the proposed ***,both models achieve high accuracy in detecting the majority of these nine attacks.
Un-refined pseudo labels always disturb the cross-domain Re-ID performance in unsupervised clustering methods. In this paper, we propose a consistency-aware unsupervised label learning network to refine noisy labels f...
详细信息
data deduplication is crucial for cloud computing, particularly in managing the expansive growth of outsourced mobile data. Some existing approaches are vulnerable to brute-force attacks and single-point attacks, posi...
详细信息
As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social *** the realm of image tampering localization,accurately localizing...
详细信息
As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social *** the realm of image tampering localization,accurately localizing limited samples,multiple types,and various sizes of regions remains a multitude of *** issues impede the model’s universality and generalization capability and detrimentally affect its *** tackle these issues,we propose FL-MobileViT-an improved MobileViT model devised for image tampering *** proposed model utilizes a dual-stream architecture that independently processes the RGB and noise domain,and captures richer traces of tampering through dual-stream ***,the model incorporating the Focused Linear Attention mechanism within the lightweight network(MobileViT).This substitution significantly diminishes computational complexity and resolves homogeneity problems associated with traditional Transformer attention mechanisms,enhancing feature extraction diversity and improving the model’s localization *** comprehensively fuse the generated results from both feature extractors,we introduce the ASPP architecture for multi-scale feature *** facilitates a more precise localization of tampered regions of various ***,to bolster the model’s generalization ability,we adopt a contrastive learning method and devise a joint optimization training strategy that leverages fused features and captures the disparities in feature distribution in tampered *** strategy enables the learning of contrastive loss at various stages of the feature extractor and employs it as an additional constraint condition in conjunction with cross-entropy *** a result,overfitting issues are effectively alleviated,and the differentiation between tampered and untampered regions is *** evaluations on five benchmark datasets(IMD-20,CASIA,NIST-16,Columbia and Coverage)validat
This article evaluates an academic application designed to provide career guidance using the User Experience Questionnaire (UEQ). A survey involving 255 respondents assessed the application across 6 UX dimensions: att...
详细信息
The recent advancement Tesseract OCR engine and the YOLO4 (You Only Look Once version 4) object detection framework provide an innovative approach to optical character recognition (OCR) with a focus on table extractio...
详细信息
Global food security is seriously threatened by plant diseases and can cause severe economic losses to farmers. Automated detection of plant diseases using computer vision and machine learning techniques has become a ...
详细信息
Many deep learning-based registration methods rely on a single-stream encoder-decoder network for computing deformation fields between 3D ***,these methods often lack constraint information and overlook semantic consi...
详细信息
Many deep learning-based registration methods rely on a single-stream encoder-decoder network for computing deformation fields between 3D ***,these methods often lack constraint information and overlook semantic consistency,limiting their *** address these issues,we present a novel approach for medical image registration called theDual-VoxelMorph,featuring a dual-channel cross-constraint *** innovative network utilizes both intensity and segmentation images,which share identical semantic information and feature *** encoder-decoder structures calculate deformation fields for intensity and segmentation images,as generated by the dual-channel cross-constraint *** design facilitates bidirectional communication between grayscale and segmentation information,enabling the model to better learn the corresponding grayscale and segmentation details of the same anatomical *** ensure semantic and directional consistency,we introduce constraints and apply the cosine similarity function to enhance semantic *** on four public datasets demonstrates superior performance compared to the baselinemethod,achieving Dice scores of 79.9%,64.5%,69.9%,and 63.5%for OASIS-1,OASIS-3,LPBA40,and ADNI,respectively.
Alzheimer's disease (AD) has been the most common cause of dementia making cognitive score prediction and important feature identification crucial for its diagnosis. Although sparse linear regression has been used...
详细信息
The ability of Convolutional Neural Networks (CNNs) to accurately discriminate between normal and tumorous brain tissues has been promising. The review focuses on the different CNN models, pre-processing methods, data...
详细信息
暂无评论