Aiming at the problem of security hidden trouble in the process of sharing Internet of Things privacy data, which is restricted by long-distance and high-speed cross-domain, this paper adopts artificialintelligence t...
详细信息
We proposed a novel image-enhancing framework to ensure consolidated restoration accuracy when remedying the visual quality of dehazed images, such as over-saturation, color deviation, or luminance issues. Conventiona...
详细信息
The robustness of graph neural networks(GNNs) is a critical research topic in deep *** researchers have designed regularization methods to enhance the robustness of neural networks,but there is a lack of theoretical...
详细信息
The robustness of graph neural networks(GNNs) is a critical research topic in deep *** researchers have designed regularization methods to enhance the robustness of neural networks,but there is a lack of theoretical analysis on the principle of *** order to tackle the weakness of current robustness designing methods,this paper gives new insights into how to guarantee the robustness of GNNs.A novel regularization strategy named Lya-Reg is designed to guarantee the robustness of GNNs by Lyapunov *** results give new insights into how regularization can mitigate the various adversarial effects on different graph *** experiments on various public datasets demonstrate that the proposed regularization method is more robust than the state-of-theart methods such as L1-norm,L2-norm,L2-norm,Pro-GNN,PA-GNN and GARNET against various types of graph adversarial attacks.
Label distribution learning(LDL) has shown advantages over traditional single-label learning(SLL) in many realworld applications, but its superiority has not been theoretically understood. In this paper, we attempt to...
详细信息
Label distribution learning(LDL) has shown advantages over traditional single-label learning(SLL) in many realworld applications, but its superiority has not been theoretically understood. In this paper, we attempt to explain why LDL generalizes better than SLL. Label distribution has rich supervision information such that an LDL method can still choose the sub-optimal label from label distribution even if it neglects the optimal one. In comparison, an SLL method has no information to choose from when it fails to predict the optimal label. The better generalization of LDL can be credited to the rich information of label distribution. We further establish the label distribution margin theory to prove this explanation; inspired by the theory,we put forward a novel LDL approach called LDL-LDML. In the experiments, the LDL baselines outperform the SLL ones, and LDL-LDML achieves competitive performance against existing LDL methods, which support our explanation and theories in this paper.
Existing semi-supervisedmedical image segmentation algorithms use copy-paste data augmentation to correct the labeled-unlabeled data distribution ***,current copy-paste methods have three limitations:(1)training the m...
详细信息
Existing semi-supervisedmedical image segmentation algorithms use copy-paste data augmentation to correct the labeled-unlabeled data distribution ***,current copy-paste methods have three limitations:(1)training the model solely with copy-paste mixed pictures from labeled and unlabeled input loses a lot of labeled information;(2)low-quality pseudo-labels can cause confirmation bias in pseudo-supervised learning on unlabeled data;(3)the segmentation performance in low-contrast and local regions is less than *** design a Stochastic Augmentation-Based Dual-Teaching Auxiliary Training Strategy(SADT),which enhances feature diversity and learns high-quality features to overcome these *** be more precise,SADT trains the Student Network by using pseudo-label-based training from Teacher Network 1 and supervised learning with labeled data,which prevents the loss of rare labeled *** introduce a bi-directional copy-pastemask with progressive high-entropy filtering to reduce data distribution disparities and mitigate confirmation bias in *** the mixed images,Deep-Shallow Spatial Contrastive Learning(DSSCL)is proposed in the feature spaces of Teacher Network 2 and the Student Network to improve the segmentation capabilities in low-contrast and local *** this procedure,the features retrieved by the Student Network are subjected to a random feature perturbation *** two openly available datasets,extensive trials show that our proposed SADT performs much better than the state-ofthe-art semi-supervised medical segmentation *** only 10%of the labeled data for training,SADT was able to acquire a Dice score of 90.10%on the ACDC(Automatic Cardiac Diagnosis Challenge)dataset.
Recently,Generative Adversarial Networks(GANs)have become the mainstream text-to-image(T2I)***,a standard normal distribution noise of inputs cannot provide sufficient information to synthesize an image that approache...
详细信息
Recently,Generative Adversarial Networks(GANs)have become the mainstream text-to-image(T2I)***,a standard normal distribution noise of inputs cannot provide sufficient information to synthesize an image that approaches the ground-truth image ***,the multistage generation strategy results in complex T2I ***,this study proposes a novel feature-grounded single-stage T2I model,which considers the“real”distribution learned from training images as one input and introduces a worst-case-optimized similarity measure into the loss function to enhance the model's generation *** results on two benchmark datasets demonstrate the competitive performance of the proposed model in terms of the Frechet inception distance and inception score compared to those of some classical and state-of-the-art models,showing the improved similarities among the generated image,text,and ground truth.
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
While single-modal visible light images or infrared images provide limited information,infrared light captures significant thermal radiation data,whereas visible light excels in presenting detailed texture ***-bining ...
详细信息
While single-modal visible light images or infrared images provide limited information,infrared light captures significant thermal radiation data,whereas visible light excels in presenting detailed texture ***-bining images obtained from both modalities allows for leveraging their respective strengths and mitigating individual limitations,resulting in high-quality images with enhanced contrast and rich texture *** capabilities hold promising applications in advanced visual tasks including target detection,instance segmentation,military surveillance,pedestrian detection,among *** paper introduces a novel approach,a dual-branch decomposition fusion network based on AutoEncoder(AE),which decomposes multi-modal features into intensity and texture information for enhanced *** contrast enhancement module(CEM)and texture detail enhancement module(DEM)are devised to process the decomposed images,followed by image fusion through the *** proposed loss function ensures effective retention of key information from the source images of both *** comparisons and generalization experiments demonstrate the superior performance of our network in preserving pixel intensity distribution and retaining texture *** the qualitative results,we can see the advantages of fusion details and local *** the quantitative experiments,entropy(EN),mutual information(MI),structural similarity(SSIM)and other results have improved and exceeded the SOTA(State of the Art)model as a whole.
Deploying service nodes hierarchically at the edge of the network can effectively improve the service quality of offloaded task requests and increase the utilization of *** this paper,we study the task scheduling prob...
详细信息
Deploying service nodes hierarchically at the edge of the network can effectively improve the service quality of offloaded task requests and increase the utilization of *** this paper,we study the task scheduling problem in the hierarchically deployed edge *** first formulate the minimization of the service time of scheduled tasks in edge cloud as a combinatorial optimization problem,blue and then prove the NP-hardness of the *** from the existing work that mostly designs heuristic approximation-based algorithms or policies to make scheduling decision,we propose a newly designed scheduling policy,named Joint Neural Network and Heuristic Scheduling(JNNHSP),which combines a neural network-based method with a heuristic based *** takes the Sequence-to-Sequence(Seq2Seq)model trained by Reinforcement Learning(RL)as the primary policy and adopts the heuristic algorithm as the auxiliary policy to obtain the scheduling solution,thereby achieving a good balance between the quality and the efficiency of the scheduling ***-depth experiments show that compared with a variety of related policies and optimization solvers,JNNHSP can achieve better performance in terms of scheduling error ratio,the degree to which the policy is affected by re-sources limitations,average service latency,and execution efficiency in a typical hierarchical edge cloud.
In this paper,a detection method combining Cameron decomposition based on polarization scattering characteristics in sea clutter background is ***,the Cameron decomposition is exploited to fuse the radar echoes of ful...
详细信息
In this paper,a detection method combining Cameron decomposition based on polarization scattering characteristics in sea clutter background is ***,the Cameron decomposition is exploited to fuse the radar echoes of full polarization channels at the data *** to the artificial material structure on the surface of the target,it can be shown that the non-reciprocity of the target cell is stronger than that of the clutter ***,based on the analysis of the decomposition results,a new feature with scattering geometry characteristics in polarization domain,denoted as Cameron polarization decomposition scattering weight(CPD-SW),is extracted as the test statistic,which can achieve more detailed descriptions of the clutter scattering characteristics utilizing the difference between their scattering ***,the superiority of the proposed CPD-SW detector over traditional detectors in improving detection performance is verified by the IPIX measured dataset,which has strong stability under short-time observation in threshold detection and can also improve the separability of feature space zin anomaly detection.
暂无评论