The identity-based encryption (IBE) scheme SM9 is a commercial encryption standard in China and has been used as a basic building block for authentication. Currently, to accommodate large-scale application scenarios, ...
详细信息
The identity-based encryption (IBE) scheme SM9 is a commercial encryption standard in China and has been used as a basic building block for authentication. Currently, to accommodate large-scale application scenarios, a variant hierarchical identity-based encryption (HIBE) scheme has been constructed on the basis of SM9. However, there still a problem that the ciphertext may leak the identity of the recipients. An anonymous HIBE has been developed based on SM9 to realize the anonymization of data recipients. Moreover, the anonymous HIBE scheme will be proven to have adaptive secure under the standard model. The performance of the anonymous HIBE is evaluated, the experimental results are comparable to the classical AHIBE algorithm which show the practicability of the scheme.
Relation extraction is an essential component of Natural Language Processing (NLP) and significantly influences information retrieval and structured information extraction. Within clinical notes, the task is needed to...
详细信息
Underwater images are often affected by problems such as light attenuation, color distortion, noise and scattering, resulting in image defects. A novel image inpainting method is proposed to intelligently predict and ...
Underwater images are often affected by problems such as light attenuation, color distortion, noise and scattering, resulting in image defects. A novel image inpainting method is proposed to intelligently predict and fill damaged areas for complete and continuous visualization of the image. First, in order to effectively solve the problem of color distortion caused by light refraction in underwater environments, the improved gated attention mechanism is used. This mechanism improves the local details by learning and weighting the important features of the image. Second, gated convolution automatically determines the degree of restoration for each pixel based on local features of the original image. It eliminates distractions such as low contrast and scattering, retaining more original detailed information. By doing so, image inpainting techniques improve the quality and visualization of underwater images.
In many underwater application scenarios, recognition tasks need to be executed promptly on computationally limited platforms. However, models designed for this field often exhibit spatial locality, and existing works...
In many underwater application scenarios, recognition tasks need to be executed promptly on computationally limited platforms. However, models designed for this field often exhibit spatial locality, and existing works lack the ability to capture crucial details in images. Therefore, a lightweight and detail-aware vision network (LDVNet) for resource-constrained environments is proposed to overcome the limitations of these approaches. Firstly, in order to enhance the accuracy of target image recognition, we introduce transformer modules to acquire global information, thus addressing the issue of spatial locality inherent in traditional convolutional neural networks (CNNs). Secondly, to maintain the network’s lightweight nature, we integrate the transformer module with convolutional operations, thereby mitigating the substantial parameter and floating point operations (FLOPs) overhead. Thirdly, for the efficient extraction of crucial fine-grained details from feature maps, we have devised a channel and spatial attention module (C&SA). This module aids in recognizing intricate and fine-grained visual tasks and enhances image understanding. It is seamlessly integrated into LDVNet with nearly negligible parameter overhead. The experimental results demonstrate that LDVNet outperforms other lightweight networks and hybrid networks in different recognition tasks, while being suitable for resource-constrained environments.
The development of the Internet has made people more closely related and has put forward higher requirements for recommendation models. Most recommendation models are studied only for the long-term interests of users....
The development of the Internet has made people more closely related and has put forward higher requirements for recommendation models. Most recommendation models are studied only for the long-term interests of users. In this paper, the interaction time between the user and the item is introduced as auxiliary information in the model construction. Interaction time is used to determine users’ long-term preferences and short-term preferences. In this paper, temporal features are extracted by building a convolutional gated recurrent unit with attention neural network (CNN-GRU-Attention). Firstly, for the problem of accurate feature extraction, CNN are constructed to extract higher-level and more abstract features of themselves and transform high-dimensional data into low-dimensional data; secondly, for the problem of social temporality, GRU are used to not only extract temporal information, but also effectively reduce gradient dispersion, making model convergence and training easier; finally, Graph Attention networks are used to aggregate the social relationship information of users and items respectively, which constitute the final feature representation of users and items respectively. In particular, a modified cosine similarity is used to reduce the error caused by data insensitivity when constructing the social information of the item. In this study, simulation experiments are conducted on two publicly available datasets (Epinions and Ciao), and the experimental results show that the proposed recommended model performs better than other social recommendation models, improving the evaluation metrics of MAE and RMSE by 1.06%-1.33% and 1.19%-1.37%, respectively. The effectiveness of the model innovation is proved.
Few-shot semantic segmentation (FSS) offers immense potential in the field of medical image analysis, enabling accurate object segmentation with limited training data. However, existing FSS techniques heavily rely on ...
详细信息
FrameNet is a lexical research project that produces a glossary containing very detailed information about syntax (semantic relationships of specific English words such as verbs, nouns, and adjectives). Both human and...
详细信息
Modern organizations face rising levels of cyber risks, making cybersecurity a top priority for safeguarding sensitive data and maintaining operational continuity. Recent studies find human factors as the most critica...
详细信息
ISBN:
(数字)9798331518592
ISBN:
(纸本)9798331518608
Modern organizations face rising levels of cyber risks, making cybersecurity a top priority for safeguarding sensitive data and maintaining operational continuity. Recent studies find human factors as the most critical contributors to cyber risks. These human-related risks include user misuse, user mistakes, and user malice. A large proportion of cyber risks arise when hackers use social engineering or phishing techniques to manipulate employees into disclosing confidential information. While some employees knowingly engage in these actions, some incidents occur accidentally due to a lack of awareness about cybersecurity protocols. As a result, governments around the world are enacting data protection legislation aimed at enhancing employees' cyber risk. This study explores the perception of US employees on the effectiveness of data protection legislation in countering cyber threats. It surveyed 30 randomly selected employees from various industries. The results showed that employees perceive data protection legislation as effective in mitigating employeerelated cyber risks.
Skin lesion segmentation plays a critical role in the early detection and accurate diagnosis of dermatological conditions. Denoising Diffusion Probabilistic Models (DDPMs) have recently gained attention for their exce...
详细信息
The adoption of Internet of Things(IoT)sensing devices is growing rapidly due to their ability to provide realtime ***,it is constrained by limited data storage and processing *** offloads its massive data stream to e...
详细信息
The adoption of Internet of Things(IoT)sensing devices is growing rapidly due to their ability to provide realtime ***,it is constrained by limited data storage and processing *** offloads its massive data stream to edge devices and the cloud for adequate storage and *** further leads to the challenges of data outliers,data redundancies,and cloud resource load balancing that would affect the execution and outcome of data *** paper presents a review of existing analytics algorithms deployed on IoT-enabled edge cloud infrastructure that resolved the challenges of data outliers,data redundancies,and cloud resource load *** review highlights the problems solved,the results,the weaknesses of the existing algorithms,and the physical and virtual cloud storage servers for resource load *** addition,it discusses the adoption of network protocols that govern the interaction between the three-layer architecture of IoT sensing devices enabled edge cloud and its prevailing challenges.A total of 72 algorithms covering the categories of classification,regression,clustering,deep learning,and optimization have been *** classification approach has been widely adopted to solve the problem of redundant data,while clustering and optimization approaches are more used for outlier detection and cloud resource allocation.
暂无评论