In this paper, an adaptive controller design method is proposed for chaotic systems with unknown actuator dead-zone. First, the terminal sliding mode (TSM) manifold is proposed to ensure exponential stability as well ...
详细信息
Disjoint sampling is critical for rigorous and unbiased evaluation of state-of-the-art(SOTA)models e.g.,Attention Graph and Vision *** training,validation,and test sets overlap or share data,it introduces a bias that ...
详细信息
Disjoint sampling is critical for rigorous and unbiased evaluation of state-of-the-art(SOTA)models e.g.,Attention Graph and Vision *** training,validation,and test sets overlap or share data,it introduces a bias that inflates performance metrics and prevents accurate assessment of a model’s true ability to generalize to new *** paper presents an innovative disjoint sampling approach for training SOTA models for the Hyperspectral Image Classification(HSIC).By separating training,validation,and test data without overlap,the proposed method facilitates a fairer evaluation of how well a model can classify pixels it was not exposed to during training or *** demonstrate the approach significantly improves a model’s generalization compared to alternatives that include training and validation data in test data(A trivial approach involves testing the model on the entire Hyperspectral dataset to generate the ground truth *** approach produces higher accuracy but ultimately results in low generalization performance).Disjoint sampling eliminates data leakage between sets and provides reliable metrics for benchmarking progress in *** sampling is critical for advancing SOTA models and their real-world application to large-scale land mapping with Hyperspectral ***,with the disjoint test set,the performance of the deep models achieves 96.36%accuracy on Indian Pines data,99.73%on Pavia University data,98.29%on University of Houston data,99.43%on Botswana data,and 99.88%on Salinas data.
Due to the advancements in cutting-edge generative AI algorithms, generating hyper realistic deepfake videos has become easier for the public. This hyperrealism consequently fails contemporary methods to reliably disc...
详细信息
Due to the advancements in cutting-edge generative AI algorithms, generating hyper realistic deepfake videos has become easier for the public. This hyperrealism consequently fails contemporary methods to reliably discriminate between original and fake videos. Therefore, to counter any threat caused by these next-generation artificially generated videos, dependable approaches are required to address this classification challenge. To achieve this objective this paper presents an interdisciplinary approach that integrates game theory with deep learning to bring a novel solution to the problem of deepfake detection and protect the detectors against anti-forensics attack. To the best of our knowledge, there does not exist any other work dedicated to video deepfake detection using the integrated approach of game theory and deep learning. The game is designed for two players to distinguish between pristine and deepfake videos. The game utilizes different strategies for the data manipulator as a player P1 and the deepfake detector as P2. Strategies used for P1 involve the formation of the subsets like open and close-set, combined subsets, imbalanced dataset, and post-processing attacks to create challenging strategies for P2. To counter the strategies of P1,we propose a novel Regularized Forensic Efficient Net (RFE Net) that employs regularization techniques, such as batch normalization, dropout, augmentation, and early stopping. Based on the P1 move, the detector chooses the regularization techniques by considering factors such as generalizability and efficiency. Regularization-based strategies improve the performance of our model when compared to contemporary methods. Computation of the Nash equilibrium with the proposed zero-sum game helps to effectively detect deepfakes and leads the game to maximum payoff. Performance of the proposed game theory-based RFE Net was measured on standard and diverse datasets of FaceForensic++, DFDC preview, CelebDF, DFFD, and the World lea
Zero-knowledge proof systems are becoming increasingly prevalent and being widely used to secure decentralized financial systems and protect the privacy of users. Given the sensitivity of these applications, zero-know...
详细信息
This paper explores reinforcement learning (RL) based on resource allocation in cell-free networks, a promising alternative to traditional cellular architectures. Cell-free networks eliminate cell boundaries by using ...
详细信息
Dynamic multiobjective optimization problems (DMOPs) usually contain multiple conflicting objectives that change over time, which requires the optimization algorithms to quickly track the Pareto optimal front (POF) wh...
详细信息
This paper introduces a new one-dimensional chaotic system and a new image encryption algorithm. Firstly, the new chaotic system is analyzed. The bifurcation diagram and Lyapunov exponent show that the system has stro...
详细信息
Metamorphic testing (MT) is an effective software quality assurance method;it uses metamorphic relations (MRs) to examine the inputs and outputs of multiple test cases. Metamorphic exploration (ME) and metamorphic rob...
详细信息
Context: Android games are gaining wide attention from users in recent years. However, the existing literature reports alarming statistics about banning popular and top-trending Android apps. The popular gaming apps h...
详细信息
The ability to continuously follow a target person in a dynamically changing environment remains a major challenge that indoor companion robots confront. Ongoing human following is complicated by close similarity matc...
详细信息
暂无评论