This study provides a detailed study of a Сonvolutional Neural Network (СNN) model optimized for facial eхpression recognition with Fuzzy logic using Fuzzy2DPooling and Fuzzy Neural Networks (FNN), and discusses da...
详细信息
Text mining, a subfield of natural language processing (NLP), has received considerable attention in recent years due to its ability to extract valuable insights from large volumes of unstructured textual data. This r...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
With the rapid expansion of computer networks and informationtechnology, ensuring secure data transmission is increasingly vital—especially for image data, which often contains sensitive information. This research p...
详细信息
In today’s era, smartphones are used in daily lives because they are ubiquitous and can be customized by installing third-party apps. As a result, the menaces because of these apps, which are potentially risky for u...
详细信息
Our lives have been significantly altered due to the digital revolution, and the Internet of Things (IoT) has played a significant part in this transformation. However, the fast expansion of the IoT into almost every ...
详细信息
With the advent of cloud computing, many organizations, institutions, and individuals have chosen to store their data in the cloud as a way to compensate for limited local storage capabilities and reduce expenses. How...
详细信息
The perception in most existing vision-based reinforcement learning(RL) models for robotic manipulation relies heavily on static third-person or hand-mounted first-person cameras. In scenarios with occlusions and limi...
详细信息
The perception in most existing vision-based reinforcement learning(RL) models for robotic manipulation relies heavily on static third-person or hand-mounted first-person cameras. In scenarios with occlusions and limited maneuvering space, these carefully positioned cameras often struggle to provide effective visual observations during manipulation. Taking inspiration from human capabilities, we introduce a novel RL-based dual-arm active visual-guided manipulation model(DAVMM), which simultaneously infers “eye” actions and “hand” actions for two separate robotic arms(referred to as the vision-arm and the worker-arm) based on current observations, empowering the robot with the ability to actively perceive and interact with its environment. To handle the extensive redundant observation-action space, we propose a decouplable target-centric reward paradigm to offer stable guidance for the training process. For making fine-grained manipulation action decisions, alongside a global scene image encoder, we utilize an independent encoder to extract local target texture features,enabling the simultaneous acquisition of both global and detailed local information. Additionally, we employ residual-RL and curriculum learning techniques to further enhance our model's sample efficiency and training stability. We conducted comparative experiments and analyses of DAVMM against a set of strong baselines on three occluded and narrow-space manipulation tasks. DAVMM notably improves the success rates across all manipulation tasks and showcases rapid learning capabilities.
Counterfeiting is still a pervasive global issue,affecting multiple industries and hindering industrial innovation,while causing substantial financial losses,reputational damage,and risks to consumer *** luxury goods ...
详细信息
Counterfeiting is still a pervasive global issue,affecting multiple industries and hindering industrial innovation,while causing substantial financial losses,reputational damage,and risks to consumer *** luxury goods and pharmaceuticals to electronics and automotive parts,counterfeit products infiltrate supply chains,leading to a loss of revenue for legitimate businesses and undermining consumer *** anti-counterfeiting measures,such as holograms,serial numbers,and barcodes,have proven to be insufficient as counterfeiters continuously develop more sophisticated replication *** a result,there is a growing need for more advanced,secure,and reliable methods to prevent *** paper presents a novel,holistic anti-counterfeiting platform that integrates Near Field Communication(NFC)-enabled mobile applications with blockchain technology to provide an innovative,secure,and consumer-friendly authentication *** approach addresses key gaps in existing solutions by incorporating dynamic product identifiers,which make replication significantly more *** system enables consumers to verify the authenticity of products instantly using their smartphones,enhancing transparency and trust in the supply *** technology plays a crucial role in our proposed solution by providing an immutable,decentralized ledger that records product authentication *** ensures that product verification records cannot be tampered with or altered,adding a layer of security that is absent in conventional ***,NFC technology enhances security by offering unique identification capabilities,enabling real-time product *** validate the effectiveness of the proposed system,real-world testing was conducted across different *** results demonstrated the platform’s ability to significantly reduce counterfeit products in the supply chain,offering businesses and consumers a more robust and reliable aut
This study examines the use of experimental designs, specifically full and fractional factorial designs, for predicting Alzheimer’s disease with fewer variables. The full factorial design systematically investigates ...
详细信息
暂无评论