Advance Persistent Threats (APTs), adopted by most delicate attackers, are becoming increasing common and pose great threat to various enterprises and institutions. Data provenance analysis on provenance graphs has em...
详细信息
To solve the data island problem,federated learning(FL)provides a solution paradigm where each client sends the model parameters but not the data to a server for model ***-to-peer(P2P)federated learning further improv...
详细信息
To solve the data island problem,federated learning(FL)provides a solution paradigm where each client sends the model parameters but not the data to a server for model ***-to-peer(P2P)federated learning further improves the robustness of the system,in which there is no server and each client communicates directly with the *** secure aggregation,secure multi-party computing(SMPC)protocols have been utilized in peer-to-peer ***,the ideal SMPC protocols could fail when some clients drop *** this paper,we propose a robust peer-to-peer learning(RP2PL)algorithm via SMPC to resist clients dropping *** improve the segmentbased SMPC protocol by adding a check and designing the generation method of random seg*** RP2PL,each client aggregates their models by the improved robust secure multi-part computation protocol when finishes the local *** results demonstrate that the RP2PL paradigm can mitigate clients dropping out with no significant degradation in performance.
Event data can asynchronously capture variations in light intensity, thereby implicitly providing valuable complementary cues for RGB-Event tracking. Existing methods typically employ a direct interaction mechanism to...
详细信息
In addressing the challenges of limited semantic labeling data and imprecise segmentation regions prevalent in the semantic segmentation of ship flame images, this study introduces a semi-supervised semantic segmentat...
In addressing the challenges of limited semantic labeling data and imprecise segmentation regions prevalent in the semantic segmentation of ship flame images, this study introduces a semi-supervised semantic segmentation method tailored for ship flame images. This approach is grounded in the principles of pairwise similarity with strong-weak perturbations. Adopting a pseudo-label self-learning strategy, the method employs weak-strong perturbation pairwise similarity, ensuring the propagation of high-confidence predictions during label generation, and thereby enhancing performance. Additionally, to tackle the inherent difficulties presented by smoke enveloping and obscuring flame regions in ship images, we have conceived a Vertical Continuity Feature Enhancement module. This module empowers the model to discern more explicit inter-class boundaries. Empirical evaluations on our proprietary dataset substantiate the superiority of our method, registering an improvement of 4.12 percentage points in mIoU over other semi-supervised approaches. Such results attest to the efficacy of the proposed pairwise similarity approach and the Vertical Continuity Feature Enhancement module in flame semantic segmentation.
Neural models are being widely applied for text summarization, including headline generation,and are typically trained using a set of document-headline pairs. In a large document set, documents can usually be grouped ...
详细信息
Neural models are being widely applied for text summarization, including headline generation,and are typically trained using a set of document-headline pairs. In a large document set, documents can usually be grouped into various topics, and documents within a certain topic may exhibit specific summarization patterns. Most existing neural models, however, have not taken the topic information of documents into consideration. This paper categorizes documents into multiple topics, since documents within the same topic have similar content and share similar summarization patterns. By taking advantage of document topic information, this study proposes a topic-sensitive neural headline generation model(TopicN HG). It is evaluated on a real-world dataset, large scale Chinese short text summarization dataset. Experimental results show that it outperforms several baseline systems on each topic and achieves comparable performance with the state-of-the-art system. This indicates that TopicN HG can generate more accurate headlines guided by document topics.
We introduce OmniMark, a novel and efficient fingerprinting method for Latent Diffusion Models (LDM). OmniMark can encode user-specific fingerprints across diverse dimensions of the weights of the LDM, including kerne...
Blockchain has recently emerged as a research trend,with potential applications in a broad range of industries and *** particular successful Blockchain technology is smart contract,which is widely used in commercial s...
详细信息
Blockchain has recently emerged as a research trend,with potential applications in a broad range of industries and *** particular successful Blockchain technology is smart contract,which is widely used in commercial settings(e.g.,high value financial transactions).This,however,has security implications due to the potential to financially benefit from a security incident(e.g.,identification and exploitation of a vulnerability in the smart contract or its implementation).Among,Ethereum is the most active and ***,in this paper,we systematically review existing research efforts on Ethereum smart contract security,published between 2015 and ***,we focus on how smart contracts can be maliciously exploited and targeted,such as security issues of contract program model,vulnerabilities in the program and safety consideration introduced by program execution *** also identify potential research opportunities and future research agenda.
Network failures are unavoidable and occur *** the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence *** this period,a large number of messages are discarded,whi...
详细信息
Network failures are unavoidable and occur *** the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence *** this period,a large number of messages are discarded,which results in a decline in the user experience and severely affects the quality of service of Internet Service Providers(ISP).Therefore,improving the availability of intra-domain routing is a trending research question to be *** usually employs routing protection algorithms to improve intra-domain routing ***,existing routing protection schemes compute as many backup paths as possible to reduce message loss due to network failures,which increases the cost of the network and impedes the methods deployed in *** address the issues,this study proposes an efficient routing protection algorithm based on optimized network topology(ERPBONT).ERPBONT adopts the optimized network topology to calculate a backup path with the minimum path coincidence degree with the shortest path for all source ***,the backup path with the minimum path coincidence with the shortest path is described as an integer programming *** the simulated annealing algorithm ERPBONT is used to find the optimal ***,the algorithm is tested on the simulated topology and the real *** experimental results show that ERPBONT effectively reduces the path coincidence between the shortest path and the backup path,and significantly improves the routing availability.
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
暂无评论