Chatbots use artificial intelligence (AI) and natural language processing (NLP) algorithms to construct a clever system. By copying human connections in the most helpful way possi-ble, chatbots emulate individuals and...
详细信息
Although lots of research has been done in recognizing facial expressions,there is still a need to increase the accuracy of facial expression recognition,particularly under uncontrolled *** use of Local Directional Pa...
详细信息
Although lots of research has been done in recognizing facial expressions,there is still a need to increase the accuracy of facial expression recognition,particularly under uncontrolled *** use of Local Directional Patterns(LDP),which has good characteristics for emotion detection has yielded encouraging *** innova-tive end-to-end learnable High Response-based Local Directional Pattern(HR-LDP)network for facial emotion recognition is implemented by employing fixed convolutional filters in the proposed *** combining learnable convolutional layers with fixed-parameter HR-LDP layers made up of eight Kirsch filters and derivable simulated gate functions,this network considerably minimizes the number of network *** cost of the parameters in our fully linked layers is up to 64 times lesser than those in currently used deep learning-based detection *** seven well-known databases,including JAFFE,CK+,MMI,SFEW,OULU-CASIA and MUG,the recognition rates for seven-class facial expression recognition are 99.36%,99.2%,97.8%,60.4%,91.1%and 90.1%,*** results demonstrate the advantage of the proposed work over cutting-edge techniques.
Social robot accounts controlled by artificial intelligence or humans are active in social networks,bringing negative impacts to network security and social *** social robot detection methods based on graph neural net...
详细信息
Social robot accounts controlled by artificial intelligence or humans are active in social networks,bringing negative impacts to network security and social *** social robot detection methods based on graph neural networks suffer from the problem of many social network nodes and complex relationships,which makes it difficult to accurately describe the difference between the topological relations of nodes,resulting in low detection accuracy of social *** paper proposes a social robot detection method with the use of an improved neural ***,social relationship subgraphs are constructed by leveraging the user’s social network to disentangle intricate social relationships ***,a linear modulated graph attention residual network model is devised to extract the node and network topology features of the social relation subgraph,thereby generating comprehensive social relation subgraph features,and the feature-wise linear modulation module of the model can better learn the differences between the ***,user text content and behavioral gene sequences are extracted to construct social behavioral features combined with the social relationship subgraph ***,social robots can be more accurately identified by combining user behavioral and relationship *** carrying out experimental studies based on the publicly available datasets TwiBot-20 and Cresci-15,the suggested method’s detection accuracies can achieve 86.73%and 97.86%,*** with the existing mainstream approaches,the accuracy of the proposed method is 2.2%and 1.35%higher on the two *** results show that the method proposed in this paper can effectively detect social robots and maintain a healthy ecological environment of social networks.
The rapid development of Internet of Things(IoT)technology has led to a significant increase in the computational task load of Terminal Devices(TDs).TDs reduce response latency and energy consumption with the support ...
详细信息
The rapid development of Internet of Things(IoT)technology has led to a significant increase in the computational task load of Terminal Devices(TDs).TDs reduce response latency and energy consumption with the support of task-offloading in Multi-access Edge Computing(MEC).However,existing task-offloading optimization methods typically assume that MEC’s computing resources are unlimited,and there is a lack of research on the optimization of task-offloading when MEC resources are *** addition,existing solutions only decide whether to accept the offloaded task request based on the single decision result of the current time slot,but lack support for multiple retry in subsequent time *** is resulting in TD missing potential offloading opportunities in the *** fill this gap,we propose a Two-Stage Offloading Decision-making Framework(TSODF)with request holding and dynamic *** Short-Term Memory(LSTM)-based task-offloading request prediction and MEC resource release estimation are integrated to infer the probability of a request being accepted in the subsequent time *** framework learns optimized decision-making experiences continuously to increase the success rate of task offloading based on deep learning *** results show that TSODF reduces total TD’s energy consumption and delay for task execution and improves task offloading rate and system resource utilization compared to the benchmark method.
Disentangling facial expressions from other disturbing facial attributes in face images is an essential topic for facial expression *** methods only care about facial expression disentanglement(FED)itself,ignoring the...
详细信息
Disentangling facial expressions from other disturbing facial attributes in face images is an essential topic for facial expression *** methods only care about facial expression disentanglement(FED)itself,ignoring the negative effects of other facial *** to the annotations on limited facial attributes,it is difficult for existing FED solutions to disentangle all disturbance from the input *** solve this issue,we propose an expression complementary disentanglement network(ECDNet).ECDNet proposes to finish the FED task during a face reconstruction process,so as to address all facial attributes during *** from traditional reconstruction models,ECDNet reconstructs face images by progressively generating and combining facial appearance and matching *** designs the expression incentive(EIE) and expression inhibition(EIN) mechanisms,inducing the model to characterize the disentangled expression and complementary parts *** geometry and appearance,generated in the reconstructed process,are dealt with to represent facial expressions and complementary parts,*** combination of distinctive reconstruction model,EIE,and EIN mechanisms ensures the completeness and exactness of the FED *** results on RAF-DB,AffectNet,and CAER-S datasets have proven the effectiveness and superiority of ECDNet.
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri...
详细信息
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the critical *** to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in ***,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key *** paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy *** addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key *** the main computation task is outsourced to the cloud,the burden of the user side is relatively *** of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.
Although Convolutional Neural Networks(CNNs)have achieved remarkable success in image classification,most CNNs use image datasets in the Red-Green-Blue(RGB)color space(one of the most commonly used color spaces).The e...
详细信息
Although Convolutional Neural Networks(CNNs)have achieved remarkable success in image classification,most CNNs use image datasets in the Red-Green-Blue(RGB)color space(one of the most commonly used color spaces).The existing literature regarding the influence of color space use on the performance of CNNs is *** paper explores the impact of different color spaces on image classification using *** compare the performance of five CNN models with different convolution operations and numbers of layers on four image datasets,each converted to nine color *** find that color space selection can significantly affect classification accuracy,and that some classes are more sensitive to color space changes than *** color spaces may have different expression abilities for different image features,such as brightness,saturation,hue,*** leverage the complementary information from different color spaces,we propose a pseudo-Siamese network that fuses two color spaces without modifying the network *** experiments show that our proposed model can outperform the single-color-space models on most *** also find that our method is simple,flexible,and compatible with any CNN and image dataset.
Mobile crowdsensing is a popular platform that takes advantage of the onboard sensors and resources on mobile nodes. The crowdsensing platform chooses to assign several sensing tasks each day, whose utility is based o...
详细信息
Mobile crowdsensing is a popular platform that takes advantage of the onboard sensors and resources on mobile nodes. The crowdsensing platform chooses to assign several sensing tasks each day, whose utility is based on the quality of harvested sensing data, the payment of transmitting data, and the recruitment of mobile nodes. An Internet serviceprovider (ISP) selects a portion of access points (APs) to power on for uploading data, whose utility depends on threeparts: the traffic income of transmitting sensing data, the energy cost of operating APs, and the energy cost of data transmissions by APs. The interaction between the crowdsensing platform and ISP is formulated as an iterated game, with social welfare defined as the sum of their expected utilities. In this paper, our objective is to unilaterally control social welfare without considering the opponent’s strategy, with the aim of achieving stable and maximized social welfare. Toachieve this goal, we leverage the concept of a zero-determinant strategy in the game theory. We introduce a zero-determinant strategy for the vehicular crowdsensing platform (ZD-VCS) and analyze it in discrete and continuous models in thevehicular crowdsensing scenario. Furthermore, we analyze an extortion strategy between the platform and ISP. Experimental results demonstrate that the ZD-VCS strategy enables unilateral control of social welfare, leading to a high andstable value.
Network traffic identification is critical for maintaining network security and further meeting various demands of network ***,network traffic data typically possesses high dimensionality and complexity,leading to pra...
详细信息
Network traffic identification is critical for maintaining network security and further meeting various demands of network ***,network traffic data typically possesses high dimensionality and complexity,leading to practical problems in traffic identification data *** the original Dung Beetle Optimizer(DBO)algorithm,Grey Wolf Optimization(GWO)algorithm,Whale Optimization Algorithm(WOA),and Particle Swarm Optimization(PSO)algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution,an Improved Dung Beetle Optimizer(IDBO)algorithm is proposed for network traffic ***,the Sobol sequence is utilized to initialize the dung beetle population,laying the foundation for finding the global optimal ***,an integration of levy flight and golden sine strategy is suggested to give dung beetles a greater probability of exploring unvisited areas,escaping from the local optimal solution,and converging more effectively towards a global optimal ***,an adaptive weight factor is utilized to enhance the search capabilities of the original DBO algorithm and accelerate *** the improvements above,the proposed IDBO algorithm is then applied to traffic identification data analytics and feature selection,as so to find the optimal subset for K-Nearest Neighbor(KNN)*** simulation experiments use the CICIDS2017 dataset to verify the effectiveness of the proposed IDBO algorithm and compare it with the original DBO,GWO,WOA,and PSO *** experimental results show that,compared with other algorithms,the accuracy and recall are improved by 1.53%and 0.88%in binary classification,and the Distributed Denial of Service(DDoS)class identification is the most effective in multi-classification,with an improvement of 5.80%and 0.33%for accuracy and recall,***,the proposed IDBO algorithm is effective in increasing the efficiency of traffic identificati
Sea ice has a significant impact on climate change and ship navigation. Therefore, it is essential to create maps charting that accurately depict the geographic distribution of different types of sea ice. To satisfy t...
详细信息
暂无评论