INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically loc...
INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically locate objects of interest in remote sensing images and distinguish their specific categories,is an important fundamental task in the *** provides an effective means for geospatial object monitoring in many social applications,such as intelligent transportation,urban planning,environmental monitoring and homeland security.
López-Alt et al.(STOC12)put forward a primitive called multi-key fully homomorphic encryption(MKFHE),in which each involved party encrypts their own data using keys that are independently and randomly chosen wher...
详细信息
López-Alt et al.(STOC12)put forward a primitive called multi-key fully homomorphic encryption(MKFHE),in which each involved party encrypts their own data using keys that are independently and randomly chosen whereby arbitrary computations can be performed on these encrypted data by a final ***,several superior schemes based on the standard assumption(LWE)were *** of these schemes were constructed by expanding a fresh GSW-ciphertext or BGV-ciphertext under a single key to a new same-type ciphertext of the same message under a combination of associated parties’***,the new ciphertext’s size grew more or less linearly with an increase in the number of *** this paper,we proposed a novel and simple scheme of MKFHE based on LWE without increasing the size of the ciphertext in the two non-collusion server *** other words,each party first independently shares their own data between two servers and each server only needs a one-round communication with another to construct a ciphertext of the same plaintext under a sum of associated parties’*** new ciphertext under multiple keys has the same size as that of the original one with only one-round communication between two *** communication complexity is O(kmlogq)-bit,where k is the number of input ciphertexts involved,m is the size of a GSW-ciphertext and q is a *** conclusion,we proved that our scheme is CPA-secure against semi-honest adversaries.
Recently,addressing the few-shot learning issue with meta-learning framework achieves great *** we know,regularization is a powerful technique and widely used to improve machine learning ***,rare research focuses on d...
详细信息
Recently,addressing the few-shot learning issue with meta-learning framework achieves great *** we know,regularization is a powerful technique and widely used to improve machine learning ***,rare research focuses on designing appropriate meta-regularizations to further improve the generalization of meta-learning models in few-shot *** this paper,we propose a novel metacontrastive loss that can be regarded as a regularization to fill this *** motivation of our method depends on the thought that the limited data in few-shot learning is just a small part of data sampled from the whole data distribution,and could lead to various bias representations of the whole data because of the different sampling ***,the models trained by a few training data(support set)and test data(query set)might misalign in the model space,making the model learned on the support set can not generalize well on the query *** proposed meta-contrastive loss is designed to align the models of support and query sets to overcome this *** performance of the meta-learning model in few-shot learning can be *** experiments demonstrate that our method can improve the performance of different gradientbased meta-learning models in various learning problems,e.g.,few-shot regression and classification.
Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles(IoV).However,intricate security challenges are intertwinedwith technological progress:Vehicular ad h...
详细信息
Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles(IoV).However,intricate security challenges are intertwinedwith technological progress:Vehicular ad hoc Networks(VANETs),a core component of IoV,face security issues,particularly the Black Hole Attack(BHA).This malicious attack disrupts the seamless flow of data and threatens the network’s overall reliability;also,BHA strategically disrupts communication pathways by dropping data packets from legitimate nodes *** the importance of this challenge,we have introduced a new solution called ad hoc On-Demand Distance Vector-Reputation-based mechanism Local Outlier Factor(AODV-RL).The significance of AODVRL lies in its unique approach:it verifies and confirms the trustworthiness of network components,providing robust protection against *** additional safety layer is established by implementing the Local Outlier Factor(LOF),which detects and addresses abnormal network *** testing of our solution has revealed its remarkable ability to enhance communication in ***,Our experimental results achieve message delivery ratios of up to 94.25%andminimal packet loss ratios of just 0.297%.Based on our experimental results,the proposedmechanismsignificantly improves VANET communication reliability and *** results promise a more secure and dependable future for IoV,capable of transforming transportation safety and efficiency.
Incremental object detection (IOD) aims to achieve simultaneous prediction of old and new samples on localization and classification when new concepts are provided. It is a challenging task due to the need for a joint...
详细信息
Social media platforms are more accessible than needed in this digital era. People are given the freedom to express their thoughts, their emotions, and their opinions. And this freedom is being exploited negatively. I...
详细信息
Elderly individuals who reside independently face a heightened risk of experiencing serious harm due to accidental falls, a leading contributor to mortality rates in this demographic. Fall detection is a critical part...
详细信息
Forest fires, a dangerous natural phenomenon, cause large-scale destruction in forests and nearby communities. In this paper, we leverage the capabilities of classification and fast prediction of machine learning and ...
详细信息
Passwords play a significant role in the authentication process for web applications. These applications are widely employed to deliver a diverse range of crucial services, making their security a top priority. Due to...
详细信息
Collecting 3D point cloud data is cumbersome, so generating high-quality point clouds from existing data can save time and resources while providing more data to support tasks in various fields. In this paper, we prop...
详细信息
暂无评论