Object detection is one of the essential tasks of computer vision. Object detectors based on the deep neural network have been used more and more widely in safe-sensitive applications, like face recognition, video sur...
详细信息
Object detection is one of the essential tasks of computer vision. Object detectors based on the deep neural network have been used more and more widely in safe-sensitive applications, like face recognition, video surveillance, autonomous driving, and other tasks. It has been proved that object detectors are vulnerable to adversarial attacks. We propose a novel black-box attack method, which can successfully attack regression-based and region-based object detectors. We introduce methods to reduce search dimensions, reduce the dimension of optimization problems and reduce the number of queries by using the Covariance matrix adaptation Evolution strategy(CMA-ES) as the primary method to generate adversarial examples. Our method only adds adversarial perturbations in the object box to achieve a precise *** proposed attack can hide the specified object with an attack success rate of 86% and an average number of queries of 5, 124, and hide all objects with a success rate of74% and an average number of queries of 6, 154. Our work illustrates the effectiveness of the CMA-ES method to generate adversarial examples and proves the vulnerability of the object detectors against the adversarial attacks.
The proposed research work suggests a combined technique based on decision trees and cloud computing for predicting cognitive decline in Alzheimer's patients. Medical records and data from wearable devices are amo...
详细信息
The rapid expansion of scientific publications poses a significant challenge for researchers who need to stay updated on recent advancements and efficiently extract crucial information. Summarizing scientific document...
详细信息
The emergence of blockchain technology has paved the way for innovative solutions in various domains, including social media. This research paper presents the design and implementation of "SocialChain," a de...
详细信息
ISBN:
(数字)9783031660443
ISBN:
(纸本)9783031660436
The emergence of blockchain technology has paved the way for innovative solutions in various domains, including social media. This research paper presents the design and implementation of "SocialChain," a decentralized social media platform built on the Ethereum blockchain using the Solidity programming language. SocialChain aims to address issues related to data privacy, content ownership, and censorship prevalent in traditional social media platforms. The proposed system leverages blockchain’s inherent properties such as immutability, transparency, and decentralization to create a trustless and secure environment for social interactions. The platform allows users to create posts, share content, and engage in discussions while maintaining ownership and control over their data. The underlying blockchain ensures that the history of posts and interactions remains tamper-proof and verifiable. The core components of the SocialChain smart contract include data structures for posts and comments, functions for creating posts and adding comments, as well as mechanisms for retrieving post-related information. Each user’s identity is associated with their Ethereum address, eliminating the need for traditional authentication methods and enhancing user pseudonymity. To ensure efficiency, the contract optimizes data storage by using mappings and arrays, minimizing gas costs and improving scalability. The contract also incorporates modifiers to validate post and comment existence, enhancing security and preventing unauthorized access. The results of this research showcase the feasibility of integrating blockchain technology into social media platforms. However, it is important to note that while the implementation provides a foundational framework, practical deployment requires addressing challenges such as user experience, scalability, and incentivization mechanisms. In conclusion, SocialChain exemplifies the potential of blockchain technology to revolutionize the landscape of s
While tokenized graph Transformers have demonstrated strong performance in node classification tasks, their reliance on a limited subset of nodes with high similarity scores for constructing token sequences overlooks ...
ISBN:
(纸本)9798331314385
While tokenized graph Transformers have demonstrated strong performance in node classification tasks, their reliance on a limited subset of nodes with high similarity scores for constructing token sequences overlooks valuable information from other nodes, hindering their ability to fully harness graph information for learning optimal node representations. To address this limitation, we propose a novel graph Transformer called GCFormer. Unlike previous approaches, GCFormer develops a hybrid token generator to create two types of token sequences, positive and negative, to capture diverse graph information. And a tailored Transformer-based backbone is adopted to learn meaningful node representations from these generated token sequences. Additionally, GCFormer introduces contrastive learning to extract valuable information from both positive and negative token sequences, enhancing the quality of learned node representations. Extensive experimental results across various datasets, including homophily and heterophily graphs, demonstrate the superiority of GCFormer in node classification, when compared to representative graph neural networks (GNNs) and graph Transformers.
BookGenius introduces a groundbreaking platform designed to revolutionize book discovery. Leveraging full-stack development principles, BookGenius offers personalized book recommendations, detailed overview of books, ...
详细信息
Pursuing profitability and a loyal customer base in the current conflict via opposition banking structure requires understanding and predicting customer churn. This research focuses on the usage of Machine Learning (M...
详细信息
- Underwater image enhancement has been employed in a variety of areas, such as terrain scanning, underwater microscopic detection, telecommunication cables, mine detection, and autonomous underwater vehicles. However...
详细信息
Due to technology advancement, connectivity and intelligence have revolutionized the consumer electronics (CE) world and IoT systems pose a new cybersecurity threat because smart devices are constantly connected to se...
详细信息
Today it is more crucial than ever to remove language barriers in the linked world of today. This study compares and contrasts on-demand live translation services with an emphasis on effectiveness and accuracy. It pre...
详细信息
暂无评论