In existing hand gesture recognition research, single-modal recognition is commonly used. For example, visual hand gesture recognition uses image information, but it is easily affected by the shooting environment. Ano...
详细信息
The addition of microparticles of aluminum trihydrate (ATH) and alumina (AL) to flax-based polypropylene (PP) composites enhances their mechanical strength and fire resistance. The composite materials were produced vi...
详细信息
This study introduces an innovative waste disposal method by incorporating technology into a plastic bottle trash bin that offers Wi-Fi access as a reward for proper waste management. The 'smart bin' is design...
详细信息
These days, the usage of industrial Internet of Things (IIoT), such as industrial robotics, smart homes, and electric, has been growing progressively. The IIoT applications consisted of different sensors and generated...
详细信息
Nowadays, there is massive volume of data transmitted constantly through digital mediums. This data faces the risks of various cyber-attacks like eavesdropping, traffic analysis, packet injection, and packet dropping....
详细信息
Accurate and timely detection of retinal disease helps prevent severe vision impairment, although traditional diagnostics take plenty of time and are demanding to perform. This led to the design of the advanced diagno...
详细信息
Switch getting to know has become increasingly famous in many aspects of pc vision, including picture segmentation. This paper explores switch-gaining knowledge for automated brain tumor segmentation using a deep gett...
详细信息
Recent advances in adversarial robustness rely on an abundant set of training data, where using external or additional datasets has become a common setting. However, in real life, the training data is often kept priva...
详细信息
Recent advances in adversarial robustness rely on an abundant set of training data, where using external or additional datasets has become a common setting. However, in real life, the training data is often kept private for security and privacy issues, while only the pretrained weight is available to the public. In such scenarios, existing methods that assume accessibility to the original data become inapplicable. Thus we investigate the pivotal problem of data-free adversarial robustness, where we try to achieve adversarial robustness without accessing any real data. Through a preliminary study, we highlight the severity of the problem by showing that robustness without the original dataset is difficult to achieve, even with similar domain datasets. To address this issue, we propose DataFreeShield, which tackles the problem from two perspectives: surrogate dataset generation and adversarial training using the generated data. Through extensive validation, we show that DataFreeShield outperforms baselines, demonstrating that the proposed method sets the first entirely data-free solution for the adversarial robustness problem. Copyright 2024 by the author(s)
Recent years have witnessed growing scientific research interest in the Internet of Things(IoT)technologies,which supports the development of a variety of applications such as health care,Industry 4.0,agriculture,ecol...
详细信息
Recent years have witnessed growing scientific research interest in the Internet of Things(IoT)technologies,which supports the development of a variety of applications such as health care,Industry 4.0,agriculture,ecological data management,and other various *** utilizes the Internet as a prime medium of communication for both single documents as well as multi-digital ***,due to the wide-open nature of the Internet,it is important to ensure the anonymity,untraceably,confidentiality,and unforgeability of communication with efficient computational complexity and low *** designed a light weight and secure proxy blind signcryption for multi-digital messages based on a hyperelliptic curve(HEC).Our results outperform the available schemes in terms of computational cost and communication *** designed scheme also has the desired authentication,unforgeability of warrants and/or plaintext,confidentiality,integrity,and blindness,***,our scheme is more suitable for devices with low computation power such as mobiles and tablets.
The healthcare sector has observed notable progressions as a result of incorporating computer technology and artificial intelligence (AI). This study explores the application of deep learning and machine learning tech...
详细信息
暂无评论