Saliency prediction is an important way to understand human's behavior and has a wide range of applications. Although lots of algorithms have been designed to predict saliency for planar images, there are few work...
ISBN:
(数字)9781509066315
ISBN:
(纸本)9781509066322
Saliency prediction is an important way to understand human's behavior and has a wide range of applications. Although lots of algorithms have been designed to predict saliency for planar images, there are few works for 360° images. In this paper, we propose an encoder-decoder network for panoramic image saliency prediction. Dilated convolutional layers are deployed in the network, which can extract more representative features and improve the accuracy of saliency prediction. To deal with the image distortions in 360° images, our network takes cube map format as input and processes six faces of cube map simultaneously. Respecting the saliency distribution of ground truth, we also propose a new data augmentation method to train the network, which is validated to be helpful for performance improvement. Extensive experiments show that our method gives new state-of-the-art results on 360° image saliency prediction.
This paper mainly analyzes the stability of high-dimensional fractional-order gene regulatory network systems with time *** on the judgment of eigenvalues,this paper proposes sufficient information about the stability...
详细信息
This paper mainly analyzes the stability of high-dimensional fractional-order gene regulatory network systems with time *** on the judgment of eigenvalues,this paper proposes sufficient information about the stability of high-dimensional fractional-order gene regulatory network systems with time ***,and by analyzing the characteristic equations,the bifurcation conditions of the high-dimensional fractional-order gene regulatory network system with time delay are ***,the theoretical part of this paper is verified by numerical simulation.
Person forensics aims to retrieve the specified person across non-overlapping cameras. It is difficult owing to the appearance variations caused by occlusion, human pose change, background clutter, illumination variat...
详细信息
Many graph products have been applied to generate complex networks with striking properties observed in real-world systems. In this paper, we propose a simple generative model for simplicial networks by iteratively us...
详细信息
Overvoltage will occur after single-phase grounding fault in distribution network, endangering system insulation. It is of great significance to find out the fault line as soon as possible to ensure the safe operation...
Overvoltage will occur after single-phase grounding fault in distribution network, endangering system insulation. It is of great significance to find out the fault line as soon as possible to ensure the safe operation of the system. Wavelet modulus maxima can be used to detect the sudden change singularity of transient current. However, the judgement of single mode maximum value is easily influenced by the form of fault and interference, leading to misjudgement. In this paper, the transient characteristics of single-phase grounding fault are analyzed, and the magnitude and phase characteristics of the first half wave are given; Based on wavelet packet algorithm, several key problems such as boundary effect, wavelet selection and decomposition scale are explored; Taking the zero sequence voltage as the reference to determine the fault interval, the zero sequence current of each line is decomposed by three-scale wavelet packet using db6 wavelet, and the wavelet coefficients of the characteristic frequency band are extracted for comparison. The fault line is the one with the largest amplitude and different phase from others. The distribution system model of neutral grounding through arc suppression coil is built. Simulation is carried out for several cases with great difficulty in line selection, such as short circuit when phase voltage crosses zero, high resistance grounding and long line fault. The experimental results prove the reliability of this method.
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature...
详细信息
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Features extracted from these obfuscated samples through program analysis contain many useless and disguised features, which leads to many false negatives. To address the issue, in this paper, we demonstrate that obfuscation-resilient malware family analysis can be achieved through contrastive learning. The key insight behind our analysis is that contrastive learning can be used to reduce the difference introduced by obfuscation while amplifying the difference between malware and other types of malware. Based on the proposed analysis, we design a system that can achieve robust and interpretable classification of Android malware. To achieve robust classification, we perform contrastive learning on malware samples to learn an encoder that can automatically extract robust features from malware samples. To achieve interpretable classification, we transform the function call graph of a sample into an image by centrality analysis. Then the corresponding heatmaps can be obtained by visualization techniques. These heatmaps can help users understand why the malware is classified as this family. We implement IFDroid and perform extensive evaluations on two datasets. Experimental results show that IFDroid is superior to state-of-the-art Android malware familial classification systems. Moreover, IFDroid is capable of maintaining a 98.4% F1 on classifying 69,421 obfuscated malware samples. IEEE
In response to the problem that particle swarm optimization algorithm (PSO) is prone to falling into local optimum and premature convergence in later operations, this paper reconstructs the concept of weighted aggrega...
详细信息
G-chain transitive and G-chain mixing have an important significance in terms of theory and application. According to the definition of chain transitive and chain mixing, we give the concept of G-chain transitiveand G...
ISBN:
(数字)9781728170817
ISBN:
(纸本)9781728170824
G-chain transitive and G-chain mixing have an important significance in terms of theory and application. According to the definition of chain transitive and chain mixing, we give the concept of G-chain transitiveand G-chain mixing in this paper. By inference, some conclusions of the hyperspace were extended to the hyperspace of topological group action. We have the following result: (1)Letbe the hyperspace of. Ifis a G-chain transitive map, thenis a G-chain transitive map; (2)Letbe the hyperspace of. Ifis a G-chain mixing map, thenis a G-chain mixing map; (3)Letbe the hyperspace ofandbe a equivariant map. All non-empty open set are invariable for. Thenis a G-exact map if and only ifis a G-exact map. These results enriched the theory of the G-chain transitive and G-chain mixing on the hyperspace of topological group action.
It is difficult to select the fault line in distribution network because of the small single-phase grounding fault current. Wavelet transform is especially suitable for fault transient analysis because of its unique t...
It is difficult to select the fault line in distribution network because of the small single-phase grounding fault current. Wavelet transform is especially suitable for fault transient analysis because of its unique time-frequency localization performance. However, the characteristics of different wavelets have a direct impact on the line selection results. Improper selection of wavelets will directly lead to misjudgment. Firstly, the transient characteristics of single-phase grounding fault and the relationship between wavelet transform modulus maxima and singularity are analysed, and the line selection criterion of wavelet modulus maxima is given. Then, the influence of wavelet vanishing moment order, support length, symmetry, and orthogonality on the detection effect of signal singularity is analysed, and four principles for selecting wavelet in fault line selection are proposed. The larger the order of vanishing moment and support length, the more conducive to detection. The influence of vanishing moment order is much greater than that of support length. The 10kV system simulation model is built, five representative wavelets are selected to decompose the zero- sequence current of the fault line in four scales respectively, and the different modulus maxima corresponding to the sudden change point are compared. The experimental results prove the reliability of the wavelet selection principles proposed in this paper.
暂无评论