This paper tackles the challenge of active perception for robotic grasp detection in cluttered environments. Incomplete 3D geometry information can negatively affect the performance of learning-based grasp detection m...
Can artists be recognized from the way they render certain materials, such as fabric, skin, or hair? In this paper, we study this problem with a focus on recognizing works by Rembrandt, Van Dyck, and other Dutch and F...
详细信息
—Battery electric buses (BEBs) are known for being eco-friendly transportation in smart cities. They are cost-effective compared to their diesel counterpart if BEBs are charged efficiently. There are two main chargin...
详细信息
Planetary-scale terrain requires adaptive simplification and tessellation for highperformance rendering. Real-world visualisation requires adaptive rendering of the world-scale geometric model, which is a challenging ...
详细信息
The rapid expansion of Internet of Things (IoT) applications necessitates the demand for efficient IoT middleware platforms, especially Context Management Platforms (CMPs) for accessing real-time contextual informatio...
详细信息
The Resource Public Key Infrastructure (RPKI) is an essential technology for securing the Border Gateway Protocol (BGP) routing on the Internet. Although the global RPKI-ROV (Route Origin Validation) rate of unique Pr...
详细信息
Illegible handwriting on medical prescriptions poses a significant challenge, often leading to the misinterpretation of drug names and dosages. This issue primarily stems from doctors' use of Latin abbreviations, ...
详细信息
Recent research highlights the advantages of leveraging complementary strengths of both human expert and model in decision-making processes. Learning to Defer(L2D) is proposed to build a system consisting of both and ...
详细信息
Copy-move forgery is a common audio tampering technique in which users copy the contents of one speech and paste them into another region of the same speech signal, thus achieving the effect of tampering with the sema...
详细信息
E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely *** web developers may have varying lev...
详细信息
E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely *** web developers may have varying levels of understanding when it comes to securing an online *** Query language SQL injection and cross-site scripting are the two vulnerabilities defined by the OpenWeb Application Security Project(OWASP)for its 2017 Top Ten List Cross Site Scripting(XSS).An attacker can exploit these two flaws and launch malicious web-based actions as a result of these *** published articles focused on these attacks’binary *** article described a novel deep-learning approach for detecting SQL injection and XSS *** datasets for SQL injection and XSS payloads are combined into a single *** dataset is labeledmanually into three labels,each representing a kind of *** work implements some pre-processing algorithms,including Porter stemming,one-hot encoding,and the word-embedding method to convert a word’s text into a *** model used bidirectional long short-term memory(BiLSTM)to extract features automatically,train,and test the payload *** payloads were classified into three types by BiLSTM:XSS,SQL injection attacks,and *** outcomes demonstrated excellent performance in classifying payloads into XSS attacks,injection attacks,and non-malicious ***’s high performance was demonstrated by its accuracy of 99.26%.
暂无评论