Radiomics is a non-invasive method for extracting quantitative and higher-dimensional features from medical images for *** has received great attention due to its huge application prospects in recent *** can know that...
详细信息
Radiomics is a non-invasive method for extracting quantitative and higher-dimensional features from medical images for *** has received great attention due to its huge application prospects in recent *** can know that the number of features selected by the existing radiomics feature selectionmethods is basically about *** this paper,a heuristic feature selection method based on frequency iteration and multiple supervised training mode is *** on the combination between features,it decomposes all features layer by layer to select the optimal features for each layer,then fuses the optimal features to form a local optimal group layer by layer and iterates to the global optimal combination *** with the currentmethod with the best prediction performance in the three data sets,thismethod proposed in this paper can reduce the number of features fromabout ten to about three without losing classification accuracy and even significantly improving classification *** proposed method has better interpretability and generalization ability,which gives it great potential in the feature selection of radiomics.
Aiming at the problems of short duration,low intensity,and difficult detection of micro-expressions(MEs),the global and local features of ME video frames are extracted by combining spatial feature extraction and tempo...
详细信息
Aiming at the problems of short duration,low intensity,and difficult detection of micro-expressions(MEs),the global and local features of ME video frames are extracted by combining spatial feature extraction and temporal feature *** on traditional convolution neural network(CNN)and long short-term memory(LSTM),a recognition method combining global identification attention network(GIA),block identification attention network(BIA)and bi-directional long short-term memory(Bi-LSTM)is *** the BIA,the ME video frame will be cropped,and the training will be carried out by cropping into 24 identification blocks(IBs),10 IBs and uncropped *** alleviate the overfitting problem in training,we first extract the basic features of the preprocessed sequence through the transfer learning layer,and then extract the global and local spatial features of the output data through the GIA layer and the BIA layer,*** the BIA layer,the input data will be cropped into local feature vectors with attention weights to extract the local features of the ME frames;in the GIA layer,the global features of the ME frames will be ***,after fusing the global and local feature vectors,the ME time-series information is extracted by *** experimental results show that using IBs can significantly improve the model’s ability to extract subtle facial features,and the model works best when 10 IBs are used.
The objective of image-based virtual try-on is to seamlessly integrate clothing onto a target image, generating a realistic representation of the character in the specified attire. However, existing virtual try-on met...
详细信息
The objective of image-based virtual try-on is to seamlessly integrate clothing onto a target image, generating a realistic representation of the character in the specified attire. However, existing virtual try-on methods frequently encounter challenges, including misalignment between the body and clothing, noticeable artifacts, and the loss of intricate garment details. To overcome these challenges, we introduce a two-stage high-resolution virtual try-on framework that integrates an attention mechanism, comprising a garment warping stage and an image generation stage. During the garment warping stage, we incorporate a channel attention mechanism to effectively retain the critical features of the garment, addressing challenges such as the loss of patterns, colors, and other essential details commonly observed in virtual try-on images produced by existing methods. During the image generation stage, with the aim of maximizing the utilization of the information proffered by the input image, the input features undergo double sampling within the normalization procedure, thereby enhancing the detail fidelity and clothing alignment efficacy of the output image. Experimental evaluations conducted on high-resolution datasets validate the effectiveness of the proposed method. Results demonstrate significant improvements in preserving garment details, reducing artifacts, and achieving superior alignment between the clothing and body compared to baseline methods, establishing its advantage in generating realistic and high-quality virtual try-on images.
The adoption of deep learning-based side-channel analysis(DL-SCA)is crucial for leak detection in secure *** previous studies have applied this method to break targets protected with *** the increasing number of studi...
详细信息
The adoption of deep learning-based side-channel analysis(DL-SCA)is crucial for leak detection in secure *** previous studies have applied this method to break targets protected with *** the increasing number of studies,the problem of model *** research mainly focuses on exploring hyperparameters and network architectures,while offering limited insights into the effects of external factors on side-channel attacks,such as the number and type of *** paper proposes a Side-channel Analysis method based on a Stacking ensemble,called *** our method,multiple models are deeply *** the extended application of base models and the meta-model,Stacking-SCA effectively improves the output class probabilities of the model,leading to better ***,this method shows that the attack performance is sensitive to changes in the number of ***,five independent subsets are extracted from the original ASCAD database as multi-segment datasets,which are mutually *** method shows how these subsets are used as inputs for Stacking-SCA to enhance its attack *** experimental results show that Stacking-SCA outperforms the current state-of-the-art results on several considered datasets,significantly reducing the number of attack traces required to achieve a guessing entropy of ***,different hyperparameter sizes are adjusted to further validate the robustness of the method.
The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher...
详细信息
The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of *** previous work unfolds when certain(adversarial and implementation)conditions are met,and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected *** this paper,we investigate the security characteristics of IPM under different *** adversarial condition,the security properties of first-order IPMs obtained through parametric characterization are preserved in the face of univariate and bivariate *** implementation condition,we construct two new polynomial leakage functions to observe the nonlinear leakage of the IPM and connect the security order amplification to the nonlinear *** observe that the security of IPMis affected by the degree and the linear component in the leakage *** addition,the comparison experiments from the coefficients,signal-to-noise ratio(SNR)and the public parameter show that the security properties of the IPM are highly implementation-dependent.
In rice production,the prevention and management of pests and diseases have always received special *** methods require human experts,which is costly and *** to the complexity of the structure of rice diseases and pes...
详细信息
In rice production,the prevention and management of pests and diseases have always received special *** methods require human experts,which is costly and *** to the complexity of the structure of rice diseases and pests,quickly and reliably recognizing and locating them is ***,deep learning technology has been employed to detect and identify rice diseases and *** paper introduces common publicly available datasets;summarizes the applications on rice diseases and pests from the aspects of image recognition,object detection,image segmentation,attention mechanism,and few-shot learning methods according to the network structure differences;and compares the performances of existing ***,the current issues and challenges are explored fromthe perspective of data acquisition,data processing,and application,providing possible solutions and *** study aims to review various DL models and provide improved insight into DL techniques and their cutting-edge progress in the prevention and management of rice diseases and pests.
Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys ***,two issues in GA-based CPA still need to be addressed:key degeneration and slow...
详细信息
Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys ***,two issues in GA-based CPA still need to be addressed:key degeneration and slow evolution within *** challenges significantly hinder key recovery *** paper proposes a screening correlation power analysis framework combined with a genetic algorithm,named SFGA-CPA,to address these ***-CPA introduces three operations designed to exploit CPA characteris-tics:propagative operation,constrained crossover,and constrained ***,the propagative operation accelerates population evolution by maximizing the number of correct bytes in each ***,the constrained crossover and mutation operations effectively address key degeneration by preventing the compromise of correct ***,an intelligent search method is proposed to identify optimal parameters,further improving attack *** were conducted on both simulated environments and real power traces collected from the SAKURA-G *** the case of simulation,SFGA-CPA reduces the number of traces by 27.3%and 60%compared to CPA based on multiple screening methods(MS-CPA)and CPA based on simple GA method(SGA-CPA)when the success rate reaches 90%.Moreover,real experimental results on the SAKURA-G platform demonstrate that our approach outperforms other methods.
The accurate and automatic segmentation of retinal vessels fromfundus images is critical for the early diagnosis and prevention ofmany eye diseases,such as diabetic retinopathy(DR).Existing retinal vessel segmentation...
详细信息
The accurate and automatic segmentation of retinal vessels fromfundus images is critical for the early diagnosis and prevention ofmany eye diseases,such as diabetic retinopathy(DR).Existing retinal vessel segmentation approaches based on convolutional neural networks(CNNs)have achieved remarkable ***,we extend a retinal vessel segmentation model with low complexity and high performance based on U-Net,which is one of the most popular *** view of the excellent work of depth-wise separable convolution,we introduce it to replace the standard convolutional *** complexity of the proposed model is reduced by decreasing the number of parameters and calculations required for *** ensure performance while lowering redundant parameters,we integrate the pre-trained MobileNet V2 into the ***,a feature fusion residual module(FFRM)is designed to facilitate complementary strengths by enhancing the effective fusion between adjacent levels,which alleviates extraneous clutter introduced by direct ***,we provide detailed comparisons between the proposed SepFE and U-Net in three retinal image mainstream datasets(DRIVE,STARE,and CHASEDB1).The results show that the number of SepFE parameters is only 3%of U-Net,the Flops are only 8%of U-Net,and better segmentation performance is *** superiority of SepFE is further demonstrated through comparisons with other advanced methods.
IoT devices have been widely used with the advent of *** devices contain a large amount of private data during *** is primely important for ensuring their ***,we proposed a lightweight block cipher based on dynamic S-...
详细信息
IoT devices have been widely used with the advent of *** devices contain a large amount of private data during *** is primely important for ensuring their ***,we proposed a lightweight block cipher based on dynamic S-box named *** is introduced for devices with limited hardware resources and high throughput *** is a 128-bit block cipher supporting 64-bit key,which is based on a new generalized Feistel variant *** retains the consistency and significantly boosts the diffusion of the traditional Feistel *** SubColumns of round function is implemented by combining bit-slice technology with *** S-box is dynamically associated with the *** has been demonstrated that DBST has a good avalanche effect,low hardware area,and high *** S-box has been proven to have fewer differential features than RECTANGLE *** security analysis of DBST reveals that it can against impossible differential attack,differential attack,linear attack,and other types of attacks.
The main challenges in face swapping are the preservation and adaptive superimposition of attributes of two *** this study,the Face Swapping Attention Network(FSA-Net)is proposed to generate photoreal-istic face *** e...
详细信息
The main challenges in face swapping are the preservation and adaptive superimposition of attributes of two *** this study,the Face Swapping Attention Network(FSA-Net)is proposed to generate photoreal-istic face *** existing face-swapping methods ignore the blending attributes or mismatch the facial keypoint(cheek,mouth,eye,nose,etc.),which causes artifacts and makes the generated face silhouette *** address this problem,a novel reinforced multi-aware attention module,referred to as RMAA,is proposed for handling facial fusion and expression occlusion *** framework includes two *** the first stage,a novel attribute encoder is proposed to extract multiple levels of target face attributes and integrate identities and attributes when synthesizing swapped *** the second stage,a novel Stochastic Error Refinement(SRE)module is designed to solve the problem of facial occlusion,which is used to repair occlusion regions in a semi-supervised way without any *** proposed method is then compared with the current state-of-the-art *** obtained results demonstrate the qualitative and quantitative outperformance of the proposed *** details are provided at the footnote link and at https://***/view/fsa-net-official.
暂无评论