Semi-supervised learning has garnered significant attention, particularly in medical image segmentation, owing to its capacity to leverage a large number of unlabeled data and a limited amount of labeled data to impro...
详细信息
Liver is a vital organ that performs various essential functions. Liver cancer can have severe implications on human health, including death. To reduce the mortality rate, early detection of hepatic cancer is imperati...
详细信息
With the continuous advancement of informatization and intelligence, the application of Unmanned Aerial Vehicles (UAVs) has become increasingly widespread. To improve the operational efficiency and safety of UAVs, 3D ...
详细信息
This paper investigates a new attack method called "near-source attack". It leverages the broadcast frames of the 802.11 protocol to establish a hidden tunnel and bypass physical isolation networks or air-ga...
This paper investigates a new attack method called "near-source attack". It leverages the broadcast frames of the 802.11 protocol to establish a hidden tunnel and bypass physical isolation networks or air-gapped networks. We first analyze and implement a common technology known as Ghost Tunnel, which allows the attacker to control the target host and transmit information without being detected. However, this method suffers from frame loss, repeated frame, and attack transparency. We then propose an improved solution to deliver malicious programs to the target host using a modified BadUSB hardware device. Once the attackers successfully get in the isolated networks, they can bypass security protection devices and exploit vulnerabilities of communication protocols, so that they can remote control of target devices and hidden data transmission. We further conducted experiments to verify the feasibility and effectiveness of this attack scheme. The results indicate that the attack logic is capable of inducing the target host to engage in covert communication. Finally, we give some defense measures for such attacks.
Great advance has been achieved to improve the CF-based trackers, most of them ignore to improve update scheme. The update scheme plays an important role in tracking, which helps the tracker adapt the change of target...
Great advance has been achieved to improve the CF-based trackers, most of them ignore to improve update scheme. The update scheme plays an important role in tracking, which helps the tracker adapt the change of target. This paper presents an adaptive update strategy by introducing the peak to sidelobe ratio (PSR) for kernelized correlation filter (KCF) tracker. It helps the KCF based trackers adapt to appearance changes and achieves excellent tracking performance under complex changes. The extensive evaluations on OTB2015 benchmark show that our tracker significantly enhances the tracking performance.
Based on the substation outdoor box cabinet in the operation process, which is prone to condensation and overheating, this paper designs a temperature and humidity control device for outdoor box cabinet of substation ...
Based on the substation outdoor box cabinet in the operation process, which is prone to condensation and overheating, this paper designs a temperature and humidity control device for outdoor box cabinet of substation based on STM32 micro-controller. The device uses STM32 as the main control unit, and uses DHT 11 temperature and humidity sensor to detect the temperature and humidity of the box cabinet, and compare the threshold value to judge the temperature and humidity in the box cabinet and control the heater and fan to effectively drive moisture and heat.
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last *** achieves safe access to systems using biometrics instead of the traditional *** utilization of a biometric in it...
详细信息
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last *** achieves safe access to systems using biometrics instead of the traditional *** utilization of a biometric in its original format makes it usable only ***,a cancelable biometric template should be used,so that it can be replaced when it is *** biometrics aims to enhance the security and privacy of biometric *** encryption is an efficient technique to be used in order to generate cancelable biometric *** this paper,a highly-secure encryption algorithm is proposed to ensure secure biometric data in verification *** considered biometric in this paper is the speech *** speech signal is transformed into its ***,the spectrogram is encrypted using two cascaded optical encryption *** first algorithm is the Optical Scanning Holography(OSH)for its efficiency as an encryption *** OSH encrypted spectrogram is encrypted using Double Random Phase Encoding(DRPE)by implementing two Random Phase Masks(RPMs).After the two cascaded optical encryption algorithms,the cancelable template is *** verification is implemented through correlation estimation between enrolled and test templates in their encrypted *** the correlation value is larger than a threshold value,the user is *** threshold value can be determined from the genuine and imposter correlation distribution curves as the midpoint between the two *** implementation of optical encryption is adopted using its software rather than the optical *** efficiency of the proposed cancelable biometric algorithm is illustrated by the simulation *** can improve the biometric data security without deteriorating the recognition *** results give close-to-zero This values for the Equal Error Rate(EER)and close-to-one values for the Area under Receiver Operator Charact
Pedestrian trajectory prediction plays a pivotal role in ensuring the safety and efficiency of various applications, including autonomous vehicles and traffic management systems. This paper proposes a novel method for...
详细信息
The detuning of the resonant tank due to component tolerance and aging influences the working performance of the wireless charging system (WCS). This article proposes a dynamic tuning circuit (DTC) using the principle...
详细信息
We present the first comprehensive video polyp segmentation(VPS)study in the deep learning *** the years,developments in VPS are not moving forward with ease due to the lack of a large-scale dataset with fine-grained ...
详细信息
We present the first comprehensive video polyp segmentation(VPS)study in the deep learning *** the years,developments in VPS are not moving forward with ease due to the lack of a large-scale dataset with fine-grained segmentation *** address this issue,we first introduce a high-quality frame-by-frame annotated VPS dataset,named SUN-SEG,which contains 158690colonoscopy video frames from the well-known *** provide additional annotation covering diverse types,i.e.,attribute,object mask,boundary,scribble,and ***,we design a simple but efficient baseline,named PNS+,which consists of a global encoder,a local encoder,and normalized self-attention(NS)*** global and local encoders receive an anchor frame and multiple successive frames to extract long-term and short-term spatial-temporal representations,which are then progressively refined by two NS *** experiments show that PNS+achieves the best performance and real-time inference speed(170 fps),making it a promising solution for the VPS ***,we extensively evaluate 13 representative polyp/object segmentation models on our SUN-SEG dataset and provide attribute-based ***,we discuss several open issues and suggest possible research directions for the VPS *** project and dataset are publicly available at https://***/GewelsJI/VPS.
暂无评论