Based on the wide application of cloud computing and wireless sensor networks in various fields,the Sensor-Cloud System(SCS)plays an indispensable role between the physical world and the network ***,due to the close c...
详细信息
Based on the wide application of cloud computing and wireless sensor networks in various fields,the Sensor-Cloud System(SCS)plays an indispensable role between the physical world and the network ***,due to the close connection and interdependence between the physical resource network and computing resource network,there are security problems such as cascading failures between systems in the *** this paper,we propose a model with two interdependent networks to represent a sensor-cloud ***,based on the percolation theory,we have carried out a formulaic theoretical analysis of the whole process of cascading *** the system’s subnetwork presents a steady state where there is no further collapse,we can obtain the largest remaining connected subgroup components and the penetration ***,this result is the critical maximum that the coupled SCS can *** verify the correctness of the theoretical results,we further carried out actual simulation *** results show that a scale-free network priority attack’s percolation threshold is always less than that of ER network which is priority ***,when the scale-free network is attacked first,adding the power law exponentλcan be more intuitive and more effective to improve the network’s reliability.
Genetic algorithms (GAs) are a powerful class of optimization techniques inspired by the principles of natural selection and genetics. One of the theoretical cornerstones of GAs is schema theory, which provides a fram...
详细信息
The development of effective drug therapies is a complex and multifaceted problem involving various biological, chemical, and computational challenges. Traditional drug development methods are often time-consuming and...
详细信息
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed per-embedding Gaussian fields (DEGSTalk), a 3D Gaussian Splatting (3DGS)-based talking face synthesis method for generating realistic talking faces with long hairs. Our DEGSTalk employs Deformable Pre-Embedding Gaussian Fields, which dynamically adjust pre-embedding Gaussian primitives using implicit expression coefficients. This enables precise capture of dynamic facial regions and subtle expressions. Additionally, we propose a Dynamic Hair-Preserving Portrait Rendering technique to enhance the realism of long hair motions in the synthesized videos. Results show that DEGSTalk achieves improved realism and synthesis quality compared to existing approaches, particularly in handling complex facial dynamics and hair preservation. Our code is available at https://***/CVI-SZU/DEGSTalk.
The rapid evolution of edge computing and artificial intelligence (AI) paves the way for pervasive intelligence in the next-generation network. As a hybrid training paradigm, federated split learning (FSL) leverages d...
详细信息
In large-scale networks, the state space is exploding and changing dynamically. This leads to difficulties in collecting and analyzing situational awareness data, so we construct an adaptive situational awareness mode...
详细信息
With the development of information and sensing technologies, a wide variety of intersection traffic data is available. The purpose of this paper is to make full use of video and commercial vehicle trajectory data to ...
详细信息
The emergence of Large Language Models (LLMs) in the medical domain has stressed a compelling need for standard datasets to evaluate their question-answering (QA) performance. Although there have been several benchmar...
详细信息
P2P Botnet is famous for the resilience against termination. However, its dependence on Neighbor List (NL) makes it susceptible to infiltration and poison, also leading to a dearth of adequate protection of Botmaster&...
详细信息
In this article, we propose a new graph neural network (GNN) explainability model, CiRLExplainer, which elucidates GNN predictions from a causal attribution perspective. Initially, a causal graph is constructed to ana...
详细信息
In this article, we propose a new graph neural network (GNN) explainability model, CiRLExplainer, which elucidates GNN predictions from a causal attribution perspective. Initially, a causal graph is constructed to analyze the causal relationships between the graph structure and GNN predicted values, identifying node attributes as confounding factors between the two. Subsequently, a backdoor adjustment strategy is employed to circumvent these confounders. Additionally, since the edges within the graph structure are not independent, reinforcement learning is incorporated. Through a sequential selection process, each step evaluates the combined effects of an edge and the previous structure to generate an explanatory subgraph. Specifically, a policy network predicts the probability of each candidate edge being selected and adds a new edge through sampling. The causal effect of this action is quantified as a reward, reflecting the interactivity among edges. By maximizing the policy gradient during training, the reward stream of the edge sequence is optimized. The CiRLExplainer is versatile and can be applied to any GNN model. A series of experiments was conducted, including accuracy (ACC) analysis of the explanation results, visualization of the explanatory subgraph, and ablation studies considering node attributes as confounding factors. The experimental results demonstrate that our model not only outperforms current state-of-the-art explanation techniques, but also provides precise semantic explanations from a causal perspective. Additionally, the experiments validate the rationale for considering node attributes as confounding factors, thereby enhancing the explanatory power and ACC of the model. Notably, across different datasets, our explainer achieved improvements over the best baseline models in the ACC-area under the curve (AUC) metrics by 5.89%, 5.69%, and 4.87%, respectively.
暂无评论