Agriculture is backbone of many economies but still farmers often face many challenges in accessing financial services or available resources for them, making informed crop choices and participating in government init...
详细信息
Human activity recognition (HAR) plays a crucial role in assisting the elderly and individuals with vascular dementia by providing support and monitoring for their daily activities. This paper presents a deep learning...
详细信息
From variate bit-rate stereo matching, it is observed that the image pair with a low intensity quantization level is still capable of providing good disparity maps. In this article, a mathematical model representing t...
详细信息
Optical character recognition is a way of converting scanned images of printed or handwritten documents into machine-encoded text, making it easier to store, browse, retrieve, and process electronic data. In this rese...
详细信息
The evolution of advanced artificial intelligence generated content approaches has heightened concerns about deepfake, due to the sophisticated forgeries and concealed appearances they produce. To this end, the pre-tr...
详细信息
The evolution of advanced artificial intelligence generated content approaches has heightened concerns about deepfake, due to the sophisticated forgeries and concealed appearances they produce. To this end, the pre-trained Vision Transformer (ViT) model has become a de facto choice for deepfake detection, thanks to its powerful learning capability. Despite favorable results achieved by existing ViT-based methods, they have inherent limitations that could result in suboptimal performance in scenarios with continuously evolving forgery techniques, such as overfitting to single forgery patterns or placing excessive emphasis on dominant forgery regions. In this paper, we propose CUTA, a simple yet effective deepfake detection paradigm that utilizes ViT adapters as the medium and fully exploits the spatial- and frequency-domain features of given images to overcome the limitations of existing methods. Specifically, CUTA focuses on frequency domain masking within the input space, which obscures parts of the high-frequency image to intensify the training challenge while preserving subtle forgery cues in the frequency domain to facilitate comprehensive forgery representations. Furthermore, we propose two task-customized modules within the ViT model, i.e., the texture enhancement module and the multi-scale perceptron module, to seamlessly integrate local texture and rich contextual features. These two modules ensure an organic interaction between the task-specific forgery patterns and general semantic features within the pre-trained ViT framework. The experimental results on several publicly available benchmark datasets demonstrate CUTA’s superiority in performance, particularly showcasing its significant advantages in both cross-dataset and cross-manipulation scenarios. 2005-2012 IEEE.
To automate GUI testing for Android apps, a popular technique is to use a GUI craw-ler to systematically explore the GUIs of the apps while detecting possible app crashes. However, during GUI exploration, the crawler ...
详细信息
Aquaculture stands as a flourishing industry, serving as a significant financial resource for many. However, it encounters various challenges such as environmental degradation and disease outbreaks. Consequently, main...
详细信息
Heart disease remains a leading global cause of mortality, emphasizing the need for innovative diagnostic solutions. Traditional Clinical Decision Support Systems (CDSS) often struggle with limited datasets and imbala...
详细信息
This paper presents a comprehensive method aimed at extending the operational lifetime of wireless sensor networks (WSNs) by optimizing energy consumption and improving network efficiency. A novel energy-aware routing...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security ***,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of *** decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing *** this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their ***,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security ***,we discuss the challenges posed by BGP security problems and outline prospects for future research.
暂无评论