With the rise in quantum computing, there is an increase in the security concerns of existing cryptographic algorithms such as Rivest Shamir Adleman (RSA) and advanced encryption standard (AES) along with elliptic cur...
详细信息
Encryption is the primary way for ensuring communication security. The symmetric key method, often known as Advanced Encryption Standard (AES), is a well-known technique in the field of security. AES can be implemente...
详细信息
Zero-shot neural scene segmentation, which reconstructs 3D neural segmentation field without manual annotations, serves as an effective way for scene understanding. However, existing models, especially the efficient 3...
详细信息
In minimally invasive surgical robot system, high-precision force perception will improve the efficiency of surgery. The sampling signal of multidimensional force sensor usually appears baseline drift and noise. In th...
详细信息
Deep learning methods have achieved remarkable success in various tasks from cervical cytology images. However, for the gigapixel whole slide images (WSIs), the acquisition of annotations is a time-consuming and labor...
详细信息
Source-free domain generalization (SFDG) tackles the challenge of adapting models to unseen target domains without access to source domain data. To deal with this challenging task, recent advances in SFDG have primari...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
Source-free domain generalization (SFDG) tackles the challenge of adapting models to unseen target domains without access to source domain data. To deal with this challenging task, recent advances in SFDG have primarily focused on leveraging the text modality of vision-language models such as CLIP. These methods involve developing a transferable linear classifier based on diverse style features extracted from the text and learned prompts or deriving domain-unified text representations from domain banks. However, both style features and domain banks have limitations in capturing comprehensive domain knowledge. In this work, we propose Prompt-Driven Text Adapter (PromptTA) method, which is designed to better capture the distribution of style features and employ resampling to ensure thorough coverage of domain knowledge. To further leverage this rich domain information, we introduce a text adapter that learns from these style features for efficient domain information storage. Extensive experiments conducted on four benchmark datasets demonstrate that PromptTA achieves state-of-the-art performance. The code is available at https://***/zhanghr2001/PromptTA.
Since public transportation scenarios have high requirements for baggage security, accurate X-Ray Object Segmentation for baggage security inspection is vital to help maintain social security. Since X-Ray images gener...
详细信息
Multi-robot collaborative exploration in unknown environments has drawn more and more attention, and the exploration algorithms can be well applied in many real-worlds applications such as search and rescue, underwate...
详细信息
Dear Editor,This letter is concerned with the energy-aware multiple sensor coscheduling for bearing-only target tracking in the underwater wireless sensor networks(UWSNs).Considering the traditional methods facing wit...
详细信息
Dear Editor,This letter is concerned with the energy-aware multiple sensor coscheduling for bearing-only target tracking in the underwater wireless sensor networks(UWSNs).Considering the traditional methods facing with the problems of strong environment dependence and lack flexibility,a novel sensor scheduling algorithm based on the deep reinforcement learning is ***,the sensors’co-scheduling strategy in UWSNs is formulated as Markov decision process(MDP).
Multi-Agent Reinforcement Learning (MARL) discovers policies that maximize reward but do not have safety guarantees during the learning and deployment phases. Although shielding with Linear Temporal Logic (LTL) is a p...
详细信息
暂无评论