When I started working on analog computing for neural network systems in the 1980s, the question everyone feared to be asked at the end of their presentation was "couldn't this be done on a DSP processor?&quo...
详细信息
To develop rice varieties with better nutritional qualities, it is important to classify rice seeds accurately. Hyperspectral imaging can be used to extract spectral information from rice seeds, which can then be used...
详细信息
Off-axis digital holography plays a crucial role in high-precision three-dimensional imaging. However, high-resolution phase images are often affected by the limited pixel size of the sensor. To address this issue, th...
详细信息
This paper presents a dual-band implantable antenna with coaxial probe feeding for wireless biotelemetry applications. The antenna features spiral patches, resulting in a compact size of 27 × 14 × 1.6 mm3. I...
详细信息
With the increasing number of edited videos, many robust video fingerprinting schemes have been proposed to solve the problem of video content authentication. However, most of them either deal with the temporal and sp...
详细信息
Knowledge distillation has demonstrated significant potential in addressing the challenge of unsupervised anomaly detection (AD). The representation discrepancy of anomalies in the teacher–student (T-S) model pr...
详细信息
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). E...
详细信息
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). Eliminating DolphinAttacks is challenging if ever possible since it requires to modify the microphone hardware. In this paper, we design EarArray, a lightweight method that can not only detect such attacks but also identify the direction of attackers without requiring any extra hardware or hardware modification. Essentially, inaudible voice commands are modulated on ultrasounds that inherently attenuate faster than the one of audible sounds. By inspecting the command sound signals via the built-in multiple microphones on smart devices, EarArray is able to estimate the attenuation rate and thus detect the attacks. We propose a model of the propagation of audible sounds and ultrasounds from the sound source to a voice assistant, e.g., a smart speaker, and illustrate the underlying principle and its feasibility. We implemented EarArray using two specially-designed microphone arrays and our experiments show that EarArray can detect inaudible voice commands with an accuracy of above 99% and recognize the direction of the attackers with an accuracy of 97.89% and can also detect the laser-based attack with an accuracy of 100%. IEEE
By replacing the exponential decay function in the circular Airy beam (CAB) with a super-Gaussian function, we propose a novel abruptly autofocusing beam, the circular super-Gaussian Airy beam (CSGAB). Similar to CAB,...
详细信息
Multi-exposure image fusion (MEF) involves combining images captured at different exposure levels to create a single, well-exposed fused image. MEF has a wide range of applications, including low light, low contrast, ...
详细信息
This work introduces novel architecture components and training procedures to create augmented neural networks with the ability to process data bidirectionally via an end-to-end approximate inverse. We develop pseudoi...
详细信息
暂无评论