The log-structured merge-tree (LSM-tree)-based key-value store has been widely adopted by many large-scale data storage applications for its excellent write performance. However, such write performance gains mainly co...
详细信息
Adversarial generative neural networks (GANs) have received increased research interest in recent years, and they have been applied in various fields, such as image generation, transformation, and restoration. Pix2Pix...
详细信息
In the rapidly evolving field of autonomous driving, accurately detecting and understanding dynamic environments remains a challenge. Federated learning (FL) offers a promising approach by integrating decentralized mo...
详细信息
Pre-trained large-scale models have exhibited remarkable efficacy in computer vision, particularly for 2D image analysis. However, when it comes to 3D point clouds, the constrained accessibility of data, in contrast t...
Vision-language models (VLMs) pre-trained on large-scale image-text pairs have shown great success in various image tasks. However, how to efficiently transfer such powerful VLMs into video domain is still an open pro...
详细信息
The height of Infiltration line of tailings dam is a very important parameter for the safety of tailings reservoir. Infiltration line is the intersection line between the free water surface and the cross section of th...
详细信息
Deep learning has become an important computational paradigm in our daily lives with a wide range of applications,from authentication using facial recognition to autonomous driving in smart vehicles. The quality of th...
Deep learning has become an important computational paradigm in our daily lives with a wide range of applications,from authentication using facial recognition to autonomous driving in smart vehicles. The quality of the deep learning models, i.e., neural architectures with parameters trained over a dataset, is crucial to our daily living and economy.
The growth of the Internet of Things (IoT), particularly in wearable devices like Fitbits, has raised challenges related to source code quality, testing, data accuracy, and practical applications. This paper investiga...
详细信息
Aiming at the problem that the iForest algorithm is not sensitive enough to local anomalies and produces a large number of false alarms in the detection results on some low sea state datasets, this paper proposes the ...
详细信息
The emergence of sophisticated variant botnet attacks like Okiru poses significant security challenges to the proliferating IoT devices. This study proposes a reinforcement learning (RL)-based defense system for IoT n...
详细信息
暂无评论