To improve the accuracy of paper metadata extraction, a paper metadata extraction approach based on meta-learning is presented. Firstly, we propose a construction method of base-classifiers, which combines the Support...
详细信息
The Amodal Instance Segmentation (AIS) task aims to infer the visible and occluded regions of an object instance. Existing AIS methods typically focus on directly predicting visible and occluded regions or leveraging ...
The Amodal Instance Segmentation (AIS) task aims to infer the visible and occluded regions of an object instance. Existing AIS methods typically focus on directly predicting visible and occluded regions or leveraging prior knowledge to guide predictions. However, these methods often ignore the perception of occluded views, leading to inaccurate results. To address this issue and achieve high-quality AIS, we propose a boundary-aware Occlusion Perception Network (OPNet). OPNet consists of three main components: the Dynamic Feature Augmentation Pyramid (DFAP), the Dual-path Boundary Aware Module (DBAM), and the Shape-guide Refinement Module (SRM). Specifically, DBAM employs an occlusion-perception strategy to learn discriminative features with boundary information, enabling it to distinguish occlusion from multiple views. Additionally, DFAP and SRM optimize the results by enhancing feature aggregation and imposing geometric constraints. Experiments on the D2SA, KINS, and CWALT datasets show that OPNet significantly outperforms state-of-the-art AIS methods that without prior knowledge. Code is available at https://***/ZitengXue/OPNet.
The existing robust collaborative recommendation algorithms have low robustness against PIA and Ao P attacks. Aiming at the problem, we propose a robust recommendation method based on shilling attack detection and mat...
详细信息
The existing robust collaborative recommendation algorithms have low robustness against PIA and Ao P attacks. Aiming at the problem, we propose a robust recommendation method based on shilling attack detection and matrix factorization model. Firstly, the type of shilling attack is identified based on statistical characteristics of attack profiles. Secondly, we devise corresponding unsupervised detection algorithms for standard attack, Ao P and PIA, and the suspicious users and items are flagged. Finally, we devise a robust recommendation algorithm by combining the proposed shilling attack detection algorithm with matrix factorization model, and conduct experiments on the Movie Lens dataset to demonstrate its effectiveness. Experimental results show that the proposed method exhibits good recommendation precision and excellent robustness for shilling attacks of multiple types.
With the research of influence maximization algorithm, many researchers have found that the existing algorithm has the problem of overlapping influence of seed nodes. In order to solve the problem of overlapping influ...
详细信息
With the research of influence maximization algorithm, many researchers have found that the existing algorithm has the problem of overlapping influence of seed nodes. In order to solve the problem of overlapping influence of seed nodes, this paper proposes an IMCS algorithm based on community structure. Firstly, we divide the community through the central node, and the quality of community division is ensured by defining community fitness and node contribution. Then through the analysis of the community division results, the seed node selects the one with the largest degree. Since most of the nodes activated by seed nodes of different communities also belong to different communities, this method solves the problem of overlapping influence to a certain extent. The experimental results show that the effectiveness of the IMCS algorithm is verified under the real network, cooperative network and artificial network, and the IMCS algorithm has a better effect than IEIR and Degree algorithms in most networks under the IC model.
In order to maximize the influence of commodity profits in e-commerce platforms, designing and improving the K-shell algorithm to select the more influential seed node sets in this paper. The new algorithm improves th...
详细信息
In order to maximize the influence of commodity profits in e-commerce platforms, designing and improving the K-shell algorithm to select the more influential seed node sets in this paper. The new algorithm improves the number of active nodes by setting node threshold and edge weight attributes. To obtain more commodity profits, a strategy IRDSN(Strategy for Improving Repeat Degree of Seed Nodes) is proposed to select initial seed nodes and improve the repeat degree of seed nodes. The profit maximization based on linear threshold model is realized by setting different propagation modes. The improved algorithm and strategy IRDSN are analysed and verified in real data set and e-commerce platform. The results show that the algorithm effectively improves the profit of commodities.
Community detection has become an important challenge during the past decade. Network is divided into some groups or communities that are densely connected to each other inside while less connected to the nodes outsid...
详细信息
Researches on community detection in signed social networks focus on the assignment of positive and negative edges. However, the community detection approaches that positive and negative edges are handled separately i...
详细信息
This paper is concerned with the problem of locating the code area related to software potential fault quickly and accurately in software testing period. A new method Sig BB based on graph model is proposed for mining...
详细信息
This paper is concerned with the problem of locating the code area related to software potential fault quickly and accurately in software testing period. A new method Sig BB based on graph model is proposed for mining the suspicious fault nodes from the passing and failing execution graphs. Representing each execution of a program as a graph, the graphs are divided into the passing and failing sets. By extracting the most representative passing and failing graphs based on these sets, the discriminative sub-graph is mined between the two representative graphs. First, Sig BB searches the max common graph, and then gets the opposite nodes set. The discriminative sub-graph is obtained by organizing and extending the set finally. Since the detected code scale is associated with the sorting of suspicious nodes, a suspicious metric strategy is also designed to sort the nodes in the discriminative sub-graph. Experimental results indicate that our method is both effective and efficient for software fault localization.
Dissimilar path detection is an important task in software behavior detection. Previous dissimilar path mining algorithms ignore time-interval weight and dissimilarity. Therefore, a dissimilar path detecting algorithm...
详细信息
Vulnerability discovery is at the centre of attention in computer security. Most vulnerability detection methods need considerable human auditing, thus making vulnerability detection inefficient and unreliable. Simila...
详细信息
暂无评论