We study the maximum weight convex polytope problem, in which the goal is to find a convex polytope maximizing the total weight of enclosed points. Prior to this work, the only known result for this problem was an O(n...
Human beings have gone through stages that have made significant contributions to their lives with technological developments. One of the most important of these close to the present day is the introduction of IoTs, a...
详细信息
Graph neural networks (GNNs) have recently gained significant attention for their ability to model and analyze complex relationships, leading to numerous applications in a variety of fields. In line with this, explain...
详细信息
Cloud computing becomes an important application development platform for processing user data with high *** providers are accustomed to providing storage centers outside the trusted location preferred by the data ***...
详细信息
Cloud computing becomes an important application development platform for processing user data with high *** providers are accustomed to providing storage centers outside the trusted location preferred by the data ***,ensuring the security and confidentiality of the data while processing in the centralized network is very *** secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud *** are very active over the network like real authenticated user to hack the personal sensitive data,such as bank balance,health data,personal data,and confidential documents over the cloud *** this research,a secured key agreement between the sender and the receiver using Kerberos authentication protocol with fingerprint is proposed to ensure security in *** of patients are monitored using wireless sensor devices and are then transferred to the *** protocol helps in avoiding unnecessary communication of authenticated data over the cloud *** security process is a procedure with the best security in most of the authentication *** node is responsible in carrying data packets from the sender to the receiver in the cloud *** Kerberos protocol is used in trust node to ensure *** communication between the local health center and the healthcare server is ensured by using a fingerprint feature called minutiae form,which refers to the fingerprint image of both sender and *** computational and communicational cost of the proposed system is lesser when compared with other existing authentication methods.
In recent years,the growing popularity of social media platforms has led to several interesting natural language processing(NLP)***,these social media-based NLP applications are subject to different types of adversari...
详细信息
In recent years,the growing popularity of social media platforms has led to several interesting natural language processing(NLP)***,these social media-based NLP applications are subject to different types of adversarial attacks due to the vulnerabilities of machine learning(ML)and NLP *** work presents a new low-level adversarial attack recipe inspired by textual variations in online social media *** variations are generated to convey the message using out-of-vocabulary words based on visual and phonetic similarities of characters and words in the shortest possible *** intuition of the proposed scheme is to generate adversarial examples influenced by human cognition in text generation on social media platforms while preserving human robustness in text understanding with the fewest possible *** intentional textual variations introduced by users in online communication motivate us to replicate such trends in attacking text to see the effects of such widely used textual variations on the deep learning *** this work,the four most commonly used textual variations are chosen to generate adversarial ***,this article introduced a word importance ranking-based beam search algorithm as a searching method for the best possible perturbation *** effectiveness of the proposed adversarial attacks has been demonstrated on four benchmark datasets in an extensive experimental setup.
To overcome the limitations of examining blood cells under a microscope, several investigations have been carried out using artificial intelligence techniques. These investigations aim to automate the processes of det...
详细信息
Code smell detection is one of the most significant issues in the software industry. Metric-based static code analysis tools are used to detect undesirable coding practices known as code smells and guide refactoring r...
详细信息
Current electric grids were designed a century ago for simple and limited needs. An electric grid helps the power generation company (PGC) supply electricity to homes and industrial consumers. Traditional electric gri...
详细信息
Hand gestures are a natural way for human-robot *** based dynamic hand gesture recognition has become a hot research topic due to its various *** paper presents a novel deep learning network for hand gesture *** netwo...
详细信息
Hand gestures are a natural way for human-robot *** based dynamic hand gesture recognition has become a hot research topic due to its various *** paper presents a novel deep learning network for hand gesture *** network integrates several well-proved modules together to learn both short-term and long-term features from video inputs and meanwhile avoid intensive *** learn short-term features,each video input is segmented into a fixed number of frame groups.A frame is randomly selected from each group and represented as an RGB image as well as an optical flow *** two entities are fused and fed into a convolutional neural network(Conv Net)for feature *** Conv Nets for all groups share *** learn longterm features,outputs from all Conv Nets are fed into a long short-term memory(LSTM)network,by which a final classification result is *** new model has been tested with two popular hand gesture datasets,namely the Jester dataset and Nvidia *** with other models,our model produced very competitive *** robustness of the new model has also been proved with an augmented dataset with enhanced diversity of hand gestures.
Remote keyless entry (RKE) systems have become a standard feature in modern vehicles, offering the convenience of wireless control. However, this convenience is accompanied by significant security vulnerabilities, par...
详细信息
暂无评论