Current intelligent diagnostic systems often catastrophically forget old knowledge when learning new diseases only from the training dataset of the new diseases. Inspired by human learning of visual classes with the e...
详细信息
Plants affect economy, agriculture industry and climate of any country. Therefore it is very important to take care of plants. Like human being, plants are also infected by various disease that are resulted from virus...
详细信息
As a form of a future traffic system,a connected and automated vehicle(CAV)platoon is a typical nonlinear physical *** can communicate with each other and exchange ***,communication failures can change the platoon sys...
详细信息
As a form of a future traffic system,a connected and automated vehicle(CAV)platoon is a typical nonlinear physical *** can communicate with each other and exchange ***,communication failures can change the platoon system *** characterize this change,a dynamic topology-based car-following model and its generalized form are proposed in this ***,a stability analysis method is ***,taking the dynamic cooperative intelligent driver model(DC-IDM)for example,a series of numerical simulations is conducted to analyze the platoon stability in different communication topology *** results show that the communication failures reduce the stability,but information from vehicles that are farther ahead and the use of a larger desired time headway can improve ***,the critical ratio of communication failures required to ensure stability for different driving parameters is studied in this work.
Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in ***,the current prevailing biometric key generation techniques such as fingerprint recognition a...
详细信息
Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in ***,the current prevailing biometric key generation techniques such as fingerprint recognition and facial recognition are poor in randomness and can be forged *** to the characteristics of Electroencephalographic(EEG)signals such as the randomness,nonlinear and non-stationary etc.,it can significantly avoid these *** paper proposes a novel method to generate keys based on EEG signals with end-edgecloud collaboration *** sensors to measure motor imagery EEG data,the key is generated via pre-processing,feature extraction and *** show the total time consumption of the key generation process is about *** scheme is practical and feasible,which provides a research route to generate biometric keys using EEG data.
This paper proposes an artificial neural network to determine orientation using polarized skylight. This neural network has specific dilated convolution, which can extract light intensity information of different pola...
详细信息
This paper proposes an artificial neural network to determine orientation using polarized skylight. This neural network has specific dilated convolution, which can extract light intensity information of different polarization directions. Then, the degree of polarization (DOP) and angle of polarization (AOP) are directly extracted in the network. In addition, the exponential function encoding of orientation is designed as the network output, which can better reflect the insect’s encoding of polarization information and improve the accuracy of orientation determination. Finally, training and testing were conducted on a public polarized skylight navigation dataset, and the experimental results proved the stability and effectiveness of the network.
PROBLEM In recent years,the rapid development of artificial intelligence (AI) technology,especially machine learning and deep learning, is profoundly changing human production and *** various fields,such as robotics,f...
详细信息
PROBLEM In recent years,the rapid development of artificial intelligence (AI) technology,especially machine learning and deep learning, is profoundly changing human production and *** various fields,such as robotics,face recognition,autonomous driving and healthcare,AI is playing an important ***,although AI is promoting the technological revolution and industrial progress,its security risks are often *** studies have found that the wellperforming deep learning models are extremely vulnerable to adversarial examples [1-3].The adversarial examples are crafted by applying small,humanimperceptible perturbations to natural examples,but can mislead deep learning models to make wrong *** vulnerability of deep learning models to adversarial examples can raise security and safety threats to various realworld applications.
With the proliferation of cloud services and the continuous growth in enterprises' demand for dynamic multi-dimensional resources, the implementation of effective strategy for time-varying workload scheduling has ...
详细信息
Evolutionary reinforcement learning algorithms (ERLs), which combine evolutionary algorithms (EAs) with reinforcement learning (RL), have demonstrated significant success in enhancing RL performance. However, most ERL...
详细信息
In microwave communication systems, focusing and imaging have attracted widespread attention due to their application prospects in the information processing and communication fields. Most existing multi-channel focus...
详细信息
In microwave communication systems, focusing and imaging have attracted widespread attention due to their application prospects in the information processing and communication fields. Most existing multi-channel focusing and imaging are implemented by interleaved metasurfaces. However, the disadvantages of their large size and low efficiency limit their practical applications in large-capacity and low-loss integrated systems.
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph which is amenable to be adopted in tra...
详细信息
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph which is amenable to be adopted in traditional machine learning algorithms in favor of vector *** embedding methods build an important bridge between social network analysis and data analytics as social networks naturally generate an unprecedented volume of graph data *** social network data not only bring benefit for public health,disaster response,commercial promotion,and many other applications,but also give birth to threats that jeopardize each individual’s privacy and ***,most existing works in publishing social graph embedding data only focus on preserving social graph structure with less attention paid to the privacy issues inherited from social *** be specific,attackers can infer the presence of a sensitive relationship between two individuals by training a predictive model with the exposed social network *** this paper,we propose a novel link-privacy preserved graph embedding framework using adversarial learning,which can reduce adversary’s prediction accuracy on sensitive links while persevering sufficient non-sensitive information such as graph topology and node attributes in graph *** experiments are conducted to evaluate the proposed framework using ground truth social network datasets.
暂无评论