Low-light image enhancement methods based on diffusion models, though effective in improving image quality, often overrely on noise sensitivity and neglect the reconstruction deviations due to the naive up- and down-s...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
Low-light image enhancement methods based on diffusion models, though effective in improving image quality, often overrely on noise sensitivity and neglect the reconstruction deviations due to the naive up- and down-sampling operations. To address this issue, we propose a novel diffusion model, MWT-Diff, which utilizes multi-layer wavelet transforms to replace up-and down-sampling based on convolutions for extracting high-order features of different scales while mitigating representation degradations. Specifically, MWT-Diff is based on the U-Net architecture; it encodes four local features after the frequency-based down-sampling at each layer and fuses the enhanced four components during the up-sampling process. Additionally, we incorporate global refinement branches to mitigate information loss and employ efficient soft gate aggregation for feature fusion and reconstruction. Extensive quantitative and qualitative experiments demonstrate that our model achieves state-of-the-art performance on benchmark datasets. Code is available at: https://***/lalalulao/MWT-Diff.
As blockchain technology becomes widely applied, handling high volumes of transactions has become a critical challenge. Sharding has emerged as an effective solution to enhance the throughput of blockchain systems. Ye...
详细信息
作者:
Gu, QiliangLu, Qin
Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China
Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science
Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ...
详细信息
With the extensive application of network traffic encryption technology, the accurate and efficient classification of encrypted traffic has become a critical need for network management. Deep learning has become the p...
详细信息
X-ray image detection is essential for ensuring public safety, but traditional methods rely heavily on human analysis and are relatively inefficient. To address this issue, this paper proposes a new object detection m...
详细信息
In certain specific industrial scenarios, smoking and cellphone usage are strictly prohibited behaviors. In these scenarios, it is crucial to rapidly and accurately detect smoking and cell phone usage, and promptly is...
详细信息
Identity-based encryption with equality test(IBEET)is proposed to check whether the underlying messages of ciphertexts,even those encrypted with different public keys,are the same or not without *** people pre-fer to ...
详细信息
Identity-based encryption with equality test(IBEET)is proposed to check whether the underlying messages of ciphertexts,even those encrypted with different public keys,are the same or not without *** people pre-fer to encrypt before outsourcing their data for privacy protection nowadays,the research of IBEET on cloud computing applications naturally attracts ***,we claim that the existing IBEET schemes suffer from the illegal trap-door sharing problem caused by the inherited key escrow problem of the Identity-Based Encryption(IBE)*** traditional IBEET,the private key generator(PKG)with the master secret key generates trapdoors for all authorized cloud *** the reality in practice,the PKG is usually not fully *** this case,the Private-key Gen-erator(PKG)may generate,share,or even sell any trapdoor without any risk of being caught,or not being held account-able,which may lead to serious consequences such as the illegal sharing of a gene bank's *** this paper,to re-lieve the illegal trapdoor sharing problem in IBEET,we present a new notion,called IBEET Supporting Accountable Au-thorization(IBEET-AA).In IBEET-AA,if there is a disputed trapdoor,the generator will be distinguished among the PKG and suspected testers by an additional tracing *** the additional tracing function,except for the tradi-tional indistinguishability(IND)and one-way(OW)security models in IBEET,we define three more security models to protect the tracing security against dishonest authorizers,PKG,and testers,*** on Gentry's IBE scheme,we instantiate IBEET-AA and give a specific construction along with a formalized security proof with random oracles.
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th...
Cyber-Physical networks(CPN)are comprehensive systems that integrate information and physical domains,and are widely used in various fields such as online social networking,smart grids,and the Internet of Vehicles(IoV...
详细信息
Cyber-Physical networks(CPN)are comprehensive systems that integrate information and physical domains,and are widely used in various fields such as online social networking,smart grids,and the Internet of Vehicles(IoV).With the increasing popularity of digital photography and Internet technology,more and more users are sharing images on ***,many images are shared without any privacy processing,exposing hidden privacy risks and making sensitive content easily accessible to Artificial Intelligence(AI)*** image sharing methods lack fine-grained image sharing policies and cannot protect user *** address this issue,we propose a social relationship-driven privacy customization protection model for publishers and *** construct a heterogeneous social information network centered on social relationships,introduce a user intimacy evaluation method with time decay,and evaluate privacy levels considering user interest *** protect user privacy while maintaining image appreciation,we design a lightweight face-swapping algorithm based on Generative Adversarial network(GAN)to swap faces that need to be *** proposed method minimizes the loss of image utility while satisfying privacy requirements,as shown by extensive theoretical and simulation analyses.
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many *** by the self-nonself discrimination par...
详细信息
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many *** by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network ***,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called ***,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept ***,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social *** evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social *** experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding *** experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components.
暂无评论