CNNs(Convolutional Neural Networks) have a good performance on most classification tasks,but they are vulnerable when meeting adversarial *** and design of highly aggressive adversarial examples can help enhance the s...
CNNs(Convolutional Neural Networks) have a good performance on most classification tasks,but they are vulnerable when meeting adversarial *** and design of highly aggressive adversarial examples can help enhance the security and robustness of *** transferability of adversarial examples is still low in black-box ***,an adversarial example method based on probability histogram equalization,namely HE-MI-FGSM(Histogram Equalization Momentum Iterative Fast Gradient Sign Method) is *** each iteration of the adversarial example generation process,the original input image is randomly histogram equalized,and then the gradient is calculated to generate adversarial perturbations to mitigate overfitting in the adversarial *** effectiveness of the method is verified on the ImageNet *** with the advanced method I-FGSM(Iterative Fast Gradient Sign Method) and MI-FGSM(Momentum I-FGSM),the attack success rate in the adversarial training network increased by 27.9% and 7.7% on average,respectively.
Interpolation technology has evolved into a powerful tool for reversible data hiding in the image processing ***,existing interpolated algorithms only have a trivial impact on image *** this paper,an innovative interp...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
Interpolation technology has evolved into a powerful tool for reversible data hiding in the image processing ***,existing interpolated algorithms only have a trivial impact on image *** this paper,an innovative interpolation and matrix-based algorithm is proposed.A novel concept of the difference between interpolated pixels is represented to dramatically improve the visual quality of the image,which lays a solid foundation for the subsequent data hiding *** is growing evidence that the Tetris matrix plays a vital role in improving embedding *** is worth mentioning that our scheme can intensely resist different attacks of various *** experimental findings demonstrate that the effect of our proposed scheme is unprecedentedly perfect even though a higher capacity is embedded than with traditional steganography approaches.
Adding subtle perturbations to an image can cause the classification model to misclassify, and such images are called adversarial examples. Adversarial examples threaten the safe use of deep neural networks, but when ...
Adding subtle perturbations to an image can cause the classification model to misclassify, and such images are called adversarial examples. Adversarial examples threaten the safe use of deep neural networks, but when combined with reversible data hiding(RDH) technology, they can protect images from being correctly identified by unauthorized models and recover the image lossless under authorized models. Based on this, the reversible adversarial example(RAE) is rising. However, existing RAE technology focuses on feasibility, attack success rate and image quality, but ignores transferability and time complexity. In this paper,we optimize the data hiding structure and combine data augmentation technology,which flips the input image in probability to avoid overfitting phenomenon on the dataset. On the premise of maintaining a high success rate of white-box attacks and the image's visual quality, the proposed method improves the transferability of reversible adversarial examples by approximately 16% and reduces the computational cost by approximately 43% compared to the state-of-the-art method. In addition, the appropriate flip probability can be selected for different application scenarios.
Membrane algorithms are a new class of heuristic algorithms, which attempt to incorporate some components of membrane computing models (also called P systems) for designing efficient optimization algorithms, such as t...
详细信息
Membrane algorithms are a new class of heuristic algorithms, which attempt to incorporate some components of membrane computing models (also called P systems) for designing efficient optimization algorithms, such as the structure of P systems, the way of communication between cells, etc. Membrane algorithms are a kind of parallel methods, where many operations can be performed in parallel. Although the importance of the parallelism of such algorithms is recognized, membrane algorithms were often implemented on the serial computing device Central processing Unit (CPU), which makes the algorithms cannot work in a more efficient way. In this work, we consider the implementation of membrane algorithms on the parallel computing device Graphics processing Unit (GPU). Under such implementation, all cells of membrane algorithms can work simultaneously. Experiment results on two classical intractable problems, point set matching problem and TSP, show that GPU implementation of membrane algorithms is much more efficient than CPU implementation in terms of runtime, especially for solving the problems with a high complexity.
Recent years have witnessed the growing popularity of hashing for efficient large-scale similarity search. It has been shown that the hashing quality could be boosted by hash function learning (HFL). In this paper, we...
详细信息
ISBN:
(纸本)9781577356332
Recent years have witnessed the growing popularity of hashing for efficient large-scale similarity search. It has been shown that the hashing quality could be boosted by hash function learning (HFL). In this paper, we study HFL in the context of multimodal data for cross-view similarity search. We present a novel multimodal HFL method, called Parametric Local Multimodal Hashing (PLMH), which learns a set of hash functions to locally adapt to the data structure of each modality. To balance locality and computational efficiency, the hashing projection matrix of each instance is parameterized, with guaranteed approximation error bound, as a linear combination of basis hashing projections of a small set of anchor points. A local optimal conjugate gradient algorithm is designed to learn the hash functions for each bit, and the overall hash codes are learned in a sequential manner to progressively minimize the bias. Experimental evaluations on cross-media retrieval tasks demonstrate that PLMH performs competitively against the state-of-the-art methods.
A new incident source with different angles was constructed for dealing with wide-angle scattering problems. Considering the impendence matrix in method of moments (MOM) is independent from incident angles, the equiv...
A new incident source with different angles was constructed for dealing with wide-angle scattering problems. Considering the impendence matrix in method of moments (MOM) is independent from incident angles, the equivalent relationship between induced current and the measured CS-current was build, while the CS-current can be computed directly under the new incident source. Finally, we can reconstruct the induce current by utilizing the theory of compressive sensing (CS). Compared with traditional MOM, the computational complexity can be greatly reduced.
The Knowledge Grid is an intelligent and sustainable Internet application environment that enables people and roles to effectively capture, publish, share and manage explicit knowledge resources. As an important funct...
详细信息
Collab.ration among authors is a pervasive phenomenon currently. Mining useful information from cooperation is a significant study to unravel relationships underneath these papers and predict potential collab.rations ...
详细信息
Collab.ration among authors is a pervasive phenomenon currently. Mining useful information from cooperation is a significant study to unravel relationships underneath these papers and predict potential collab.rations or future popular academic topics. This paper demonstrates the change of Structural Holes in the whole network and for some individual authors from 2009 to 2012 in ICML. This paper is going to study the biggest subset in 2009, which separates into several smaller subsets with less structural holes in 2010 and 2011, while the number of structural holes in 2012 increases. The graphs of the whole networks from 2009 to 2012 drawn by Ucinet are going to demonstrate the changes of structural holes from 2009 to 2012 and expl the reason why there are more structural holes in 2012 compared to 2010 and 2011. The reason is that the ainnumber of authors in 2012 increases about 50 percent compared to 2011, which results in that authors need to find new collab.rations and leaders may become intermediaries to connect new authors and existing authors occupying structural holes. And some authors whose papers are published on ICML continuously from 2009 to 2012 are going to be analysed to indicate the changes of their position in the network. Some authors are increasingly constrained in certain groups, while some other authors become bridges connecting different groups and some other authors changes are correspond to the changes of the whole network. They are constrained in certain subset with less structural holes in 2010 and 2011 but, due to large number of authors joining in ICML, more likely to occupy more structural holes.
The Semantic Link Network model SLN and Resource Space Model RSM are semantic models proposed separately for effectively specifying and managing versatile resources across the Internet. Collab.rating the relational se...
详细信息
The transformational and spatial proximities are important cues for identifying inliers from an appearance based match set because correct matches generally stay close in input images and share similar local transform...
详细信息
暂无评论