Currently, the majority of lattice-base identity-based signature (LB-IBS) schemes rely on lattice trapdoor technique introduced by Gentry, Peikert, and Vaikuntanathan. However, this approach significantly impacts comp...
详细信息
Traditional image emotion recognition focuses only on the emotion information embedded in the subject or part of the image, while ignoring the global emotion information. In this paper, we propose a new network based ...
详细信息
Microservice architecture, renowned for its flexible scalability and loose coupling, has seen widespread adoption. However, this architecture has also become a prime target for network attackers, with low-rate denial ...
详细信息
1Introduction In recent years,nationality and region inference has atracted more and_more *** anthropological researches indicate that human faces are influenced by genes,and other external factors,e.g-,geographical e...
详细信息
1Introduction In recent years,nationality and region inference has atracted more and_more *** anthropological researches indicate that human faces are influenced by genes,and other external factors,e.g-,geographical environment[1].This relevance provides possible solutions for geographical area inference by ***,it remains a challenging task due to the tiny differences on faces for various countries,which is even hard for human beings to tell.
Non-autoregressive translation (NAT) reduces the decoding latency but suffers from performance degradation due to the multi-modality problem. Recently, the structure of directed acyclic graph has achieved great succes...
详细信息
Aspect-based sentiment analysis (ABSA) is a crucial granular task within sentiment analysis, focusing on the precise identification of sentiment orientations for specific aspects within text. Recognizing that identica...
详细信息
Motor imagery electroencephalogram recognition is a key area in brain-computer interfaces, with applications in human-computer interaction, rehabilitation, and virtual reality. Traditional methods often overlook the b...
详细信息
Link flood attacks (LFA) represent a significant cybersecurity threat due to their ability to cause extensive network disruptions. Traditional traffic scrubbing methods, relying on static rules, often struggle to coun...
详细信息
PROBLEM In recent years,the rapid development of artificial intelligence (AI) technology,especially machine learning and deep learning, is profoundly changing human production and *** various fields,such as robotics,f...
详细信息
PROBLEM In recent years,the rapid development of artificial intelligence (AI) technology,especially machine learning and deep learning, is profoundly changing human production and *** various fields,such as robotics,face recognition,autonomous driving and healthcare,AI is playing an important ***,although AI is promoting the technological revolution and industrial progress,its security risks are often *** studies have found that the wellperforming deep learning models are extremely vulnerable to adversarial examples [1-3].The adversarial examples are crafted by applying small,humanimperceptible perturbations to natural examples,but can mislead deep learning models to make wrong *** vulnerability of deep learning models to adversarial examples can raise security and safety threats to various realworld applications.
Cognitive diagnosis models (CDMs) with high generalization are essential for intelligent education systems to reveal students' knowledge states in multiple datasets. However, existing CDMs' architectures are d...
详细信息
暂无评论