Point clouds have been a recent interest for ray tracing-based radio channel characterization, as sensors such as RGB-D cameras and laser scanners can be utilized to generate an accurate virtual copy of a physical env...
详细信息
The enhancement of Intrusion Detection Systems (IDS) is required to ensure protection of network resources and services. This is a hot research topic, especially in the presence of advanced intrusions and at...
详细信息
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
Image encryption based on chaotic systems is a hot research topic in recent decade. However, the existing methods have shortcomings in key generation techniques such as insufficient randomness and limited key space. F...
详细信息
Due to network operation and maintenance relying heavily on network traffic monitoring, traffic matrix analysis has been one of the most crucial issues for network management related tasks. However, it is challenging ...
详细信息
3D vision recognition offers a significantly more robust tool for achieving machine cognition compared to traditional 2D vision techniques. However, similar to the vulnerabilities present in 2D vision, many 3D vision ...
详细信息
Are Renko charts suitable for algorithmic trading? What are their advantages and disadvantages? How can they be represented for convolutional neural networks (CNNs)? We contrast a classical trading approach (Renko cha...
详细信息
Over the years,the high magnetic induction of industrial Mn-added electrical steel is assumed to be the enhancement of{100}texture derived from its austenite-ferrite phase transformation during hot rolling(phase trans...
详细信息
Over the years,the high magnetic induction of industrial Mn-added electrical steel is assumed to be the enhancement of{100}texture derived from its austenite-ferrite phase transformation during hot rolling(phase transformation(PT)method).However,it is still undetermined without straightforward experimental *** reason for{100}texture improvement of Mn-added electrical steel is experimentally confirmed due to the recrystallization induced by the austenite-ferrite phase transformation during hot ***,a more promising methodology to further improve{100}texture and formability of hot-rolled electrical steel is promoted by the control of hot rolling deformation condition(shear deformation(SD)method).The results show that the nucleation mechanisms of{100}oriented recrystallized grains are different in the samples by SD and PT methods,which are in-depth shear deformation and austenite-ferrite phase transformation,*** this case,coarse{100}oriented recrystallized grains and low residual stress are obtained in the sample by SD method,which is responsible for its superior{100}texture and *** contrast,the sample by PT method forms fine recrystallized grains with random orientations and accumulates severe residual stress.
The rapid proliferation of Internet of Things (IoT) devices has significantly increased the risk of cyberattacks, particularly botnet intrusions, which pose serious security threats to IoT networks. Machine learning-b...
详细信息
暂无评论