In this paper,a reasoning enhancement method based on RGCN(Relational Graph Convolutional Network)is proposed to improve the detection capability of UAV(Unmanned Aerial Vehicle)on fast-moving military targets in urban...
详细信息
In this paper,a reasoning enhancement method based on RGCN(Relational Graph Convolutional Network)is proposed to improve the detection capability of UAV(Unmanned Aerial Vehicle)on fast-moving military targets in urban battlefield *** combining military images with the publicly available VisDrone2019 dataset,a new dataset called VisMilitary was built and multiple YOLO(You Only Look Once)models were tested on *** to the low confidence problem caused by fuzzy targets,the performance of traditional YOLO models on real battlefield images decreases ***,we propose an improved RGCN inference model,which improves the performance of the model in complex environments by optimizing the data processing and graph network *** results show that the proposed method achieves an improvement of 0.4%to 1.7%on mAP@0.50,which proves the effectiveness of the model in military target *** research of this paper provides a new technical path for UAV target detection in urban battlefield,and provides important enlightenment for the application of deep learning in military field.
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most...
详细信息
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most circumstances,binary-level code similarity analysis(BCSA)has been paid much attention *** recent years,many BCSA studies incorporating Al techniques focus on deriving semantic information from binary functions with code representations such as assembly code,intermediate representations,and control flow graphs to measure the ***,due to the impacts of different compilers,architectures,and obfuscations,binaries compiled from the same source code may vary considerably,which becomes the major obstacle for these works to obtain robust *** this paper,we propose a solution,named UPPC(Unleashing the Power of Pseudo-code),which leverages the pseudo-code of binary function as input,to address the binary code similarity analysis challenge,since pseudocode has higher abstraction and is platform-independent compared to binary *** selectively inlines the functions to capture the full function semantics across different compiler optimization levels and uses a deep pyramidal convolutional neural network to obtain the semantic embedding of the *** evaluated UPPC on a data set containing vulnerabilities and a data set including different architectures(X86,ARM),different optimization options(O0-O3),different compilers(GCC,Clang),and four obfuscation *** experimental results show that the accuracy of UPPC in function search is 33.2%higher than that of existing methods.
The tracking performance of Multi-Object Tracking (MOT) has recently been improved by using discriminative appearance and motion features. However, dense crowds and occlusions significantly reduce the reliability of t...
详细信息
Quantum Key Distribution or QKD revolutionizes secure communication using quantum mechanics. Unlike traditional cryptographic methods vulnerable to advances in computing power, QKD guarantees unconditional security by...
详细信息
Structural vibrations have a great impact on civil structures. Most of the damage happening to structures that lead to a reduction in their life span is due to vibration. This vibration can be natural or man-made. Thi...
详细信息
Cancer disease prediction is a critical task in healthcare that can significantly impact patient outcomes. This abstract presents a multimodal deep neural network (DNN) approach for cancer disease prediction, implemen...
详细信息
Analyzing website performance is crucial for optimizing a site's functionality, enhancing user engagement, and aligning with business goals. This evaluation focuses on essential metrics such as average engagement ...
详细信息
Machine Learning (ML) techniques, specifically Support Vector Machine (SVM) and Extreme Gradient Boosting (XGBoost), were employed to achieve precise and intuitive real-time eye tracking mouse control through computer...
详细信息
Vehicle cloud computing (VCC) is a recent area of study that blends vehicular networks with cloud computing, offering networking and sensor capabilities to vehicles for interaction with other vehicles and roadside inf...
详细信息
Plant disease detection systems may face challenges in accurately distinguishing between various diseases, especially when symptoms overlap or environmental factors introduce ambiguity, impacting the system's reli...
详细信息
暂无评论