We present a lightweight magnetic field simultaneous localisation and mapping (SLAM) approach for drift correction in odometry paths, where the interest is purely in the odometry and not in map building. We represent ...
详细信息
Addressing the rising concerns of privacy and security, domain adaptation in the dark aims to adapt a black-box source trained model to an unlabeled target domain without access to any source data or source model para...
详细信息
Acoustic information in confidential premise can be leaked through channels such as walls, pipes, doors and windows. Acoustic leakage level needs to be measured through specific indicators. Acoustic leakage evaluation...
详细信息
作者:
Liu, XiaojingJiang, XuesongYi, Fengge
Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China
Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science
Shandong Provincial Key Laboratory of Computer Networks Jinan China
The objective of Multimodal Knowledge Graph Completion (MKGC) is to forecast absent entities within a knowledge graph by leveraging additional textual and visual modalities. Existing studies commonly utilize a singula...
详细信息
Aiming at the security problem of range gated laser imaging in high noise background,a range gated laser image encryption scheme based on the quantum genetic algorithm(QGA)is *** to the fuzziness of the laser image it...
详细信息
Aiming at the security problem of range gated laser imaging in high noise background,a range gated laser image encryption scheme based on the quantum genetic algorithm(QGA)is *** to the fuzziness of the laser image itself,the randomness and security of the key become more and more important in *** this paper,the chaotic sequence is used as the parent chromosome of the QGA,and the random number satisfying the encryption algorithm is obtained by an iterative genetic *** further improve the security of laser images,some random pixels are stochastically inserted around the laser image before *** random pixels are scrambled together with the ***,an adaptive diffusion method is designed to completely change the original statistical information of the *** simulation and performance analysis show that the scheme has high security.
Physically Unclonable Function (PUF) is a useful and versatile lightweight hardware security primitive that takes advantage of unavoidable and unpredictable random process variations during chip manufacturing. This pa...
详细信息
Heterogeneous cloud datacenters are well-suited and cost-efficient platforms for execution of scientific workflows requested from academics. Workflow scheduling algorithms have drastic impacts on the objectives that s...
详细信息
The rapid growth of healthcare data transactions has fostered win-win developments in healthcare technology innovation and economic benefits. However, the issue of secondary transactions makes data ownership vulnerabl...
详细信息
In today's fast-paced IT environment, adopting Infrastructure-as-Code mechanisms to automate the provisioning of servers, virtual machines, and Kubernetes clusters has become essential. However, relying solely on ...
详细信息
This work explores the performance of single- and multi-GPU computing on state-of-the-art NVIDIA- and AMD-based server-class hardware using various programming interfaces to accelerate a real-world scientific applicat...
详细信息
暂无评论