This research intends to contribute to the ongoing evolution of decentralized financial systems by proposing a novel architecture for a decentralized stock exchange. By analyzing the successes and challenges of existi...
详细信息
Distributed Denial of service (DDoS) attacks is an enormous threat to today's cyber world, cyber networks are compromised by the attackers to distribute attacks in a large volume by denying the service to legitima...
详细信息
Mobile-based devices and systems are now a common feature of daily life. Mobile trade is a new and more powerful emerging technology. In addition to the fast progress of the increasing popularity of powerful mobile de...
详细信息
Deep neural networks are commonly used in computer vision tasks,but they are vulnerable to adversarial samples,resulting in poor recognition *** traditional algorithms that craft adversarial samples have been effectiv...
详细信息
Deep neural networks are commonly used in computer vision tasks,but they are vulnerable to adversarial samples,resulting in poor recognition *** traditional algorithms that craft adversarial samples have been effective in attacking classification models,the attacking performance degrades when facing object detection models with more complex *** address this issue better,in this paper we first analyze the mechanism of multi-scale feature extraction of object detection models,and then by constructing the object feature-wise attention module and the perturbation extraction module,a novel adversarial sample generation algorithm for attacking detection models is ***,in the first module,based on the multi-scale feature map,we reduce the range of perturbation and improve the stealthiness of adversarial samples by computing the noise distribution in the object *** in the second module,we feed the noise distribution into the generative adversarial networks to generate adversarial perturbation with strong attack *** doing so,the proposed approach possesses the ability to better confuse the judgment of detection *** carried out on the DroneVehicle dataset show that our method is computationally efficient and works well in attacking detection models measured by qualitative analysis and quantitative analysis.
When NB-IoT is used to monitor UAVs, developers need to access a UAV via SSH (Secure Shell). However, NB-IoT services are sometimes behind symmetric NAT, and NB-IoT modules can only be controlled by specific AT comman...
详细信息
Cardiovascular disease is currently a prominent sickness that kills the majority of sufferers. The medical evaluation of cardiac disease presents significant problems. This diagnostic method is complex, requiring prec...
详细信息
Autonomous aerial vehicle (AAV) crowdsensing, as a complement to mobile crowdsensing, can provide ubiquitous sensing in extreme environments and has gathered significant attention in recent years. In this article, we ...
详细信息
This paper proposes A dynamic switching strategy based on Dijkstra algorithm and A ∗ algorithm. By setting a threshold, the dynamic switching algorithm according to the distance can improve the efficiency of path plan...
详细信息
The outbreak of the unconventional coronavirus or COVID-19 is affecting the whole global in various parts of the arena and has resulted in hundreds of thousands of deaths. This stays an ominous public fitness caution ...
详细信息
This paper presents a Spatial Pyramid image representation-based technique with global and local features captured through DCT coefficient at various levels for offline signature verification. The spatial pyramid feat...
详细信息
暂无评论