Human pose estimation is a critical research area in the field of computer vision,playing a significant role in applications such as human-computer interaction,behavior analysis,and action *** this paper,we propose a ...
详细信息
Human pose estimation is a critical research area in the field of computer vision,playing a significant role in applications such as human-computer interaction,behavior analysis,and action *** this paper,we propose a U-shaped keypoint detection network(DAUNet)based on an improved ResNet subsampling structure and spatial grouping *** network addresses key challenges in traditional methods,such as information loss,large network redundancy,and insufficient sensitivity to low-resolution *** is composed of three main ***,we introduce an improved BottleNeck block that employs partial convolution and strip pooling to reduce computational load and mitigate feature ***,after upsampling,the network eliminates redundant features,improving the overall ***,a lightweight spatial grouping attention mechanism is applied to enhance low-resolution semantic features within the feature map,allowing for better restoration of the original image size and higher *** results demonstrate that DAUNet achieves superior accuracy compared to most existing keypoint detection models,with a mean PCKh@0.5 score of 91.6%on the MPII dataset and an AP of 76.1%on the COCO ***,real-world experiments further validate the robustness and generalizability of DAUNet for detecting human bodies in unknown environments,highlighting its potential for broader applications.
The rapid evolution of artificial intelligence(AI)technologies has significantly propelled the advancement of the Internet of Vehicles(IoV).With AI support,represented by machine learning technology,vehicles gain the ...
详细信息
The rapid evolution of artificial intelligence(AI)technologies has significantly propelled the advancement of the Internet of Vehicles(IoV).With AI support,represented by machine learning technology,vehicles gain the capability to make intelligent *** a distributed learning paradigm,federated learning(FL)has emerged as a preferred solution in *** to traditional centralized machine learning,FL reduces communication overhead and improves privacy *** these benefits,FL still faces some security and privacy concerns,such as poisoning attacks and inference attacks,prompting exploration into blockchain integration to enhance its security *** paper introduces a novel blockchain-enabled federated learning(BCFL)scheme with differential privacy(DP)tailored for *** order to meet the performance demanding IoV environment,the proposed methodology integrates a consortium blockchain with Practical Byzantine Fault Tolerance(PBFT)consensus,which offers superior efficiency over the conventional public *** addition,the proposed approach utilizes the Differentially Private Stochastic Gradient Descent(DP-SGD)algorithm in the local training process of FL for enhanced privacy *** results indicate that the integration of blockchain elevates the security level of FL in that the proposed approach effectively safeguards FL against poisoning *** the other hand,the additional overhead associated with blockchain integration is also limited to a moderate level to meet the efficiency criteria of ***,by incorporating DP,the proposed approach is shown to have the(ε-δ)privacy guarantee while maintaining an acceptable level of model *** enhancement effectively mitigates the threat of inference attacks on private information.
Predicting Coronary Artery Disease (CAD) presents a critical and intricate challenge within medical science. Late-stage detection of CAD can gravely affect cardiac and vascular health, often leading to obstructions in...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this ***,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its ***,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation ***,it is used toward secure communication application *** it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)***,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.
Variational autoencoder is a generative deep learning model with a probabilistic structure, which makes it tolerant to process uncertainties and more suitable for process monitoring. However, the probabilistic model m...
详细信息
False data injection attack(FDIA)is an attack that affects the stability of grid cyber-physical system(GCPS)by evading the detecting mechanism of bad *** FDIA detection methods usually employ complex neural networkmod...
详细信息
False data injection attack(FDIA)is an attack that affects the stability of grid cyber-physical system(GCPS)by evading the detecting mechanism of bad *** FDIA detection methods usually employ complex neural networkmodels to detect FDIA ***,they overlook the fact that FDIA attack samples at public-private network edges are extremely sparse,making it difficult for neural network models to obtain sufficient samples to construct a robust detection *** address this problem,this paper designs an efficient sample generative adversarial model of FDIA attack in public-private network edge,which can effectively bypass the detectionmodel to threaten the power grid system.A generative adversarial network(GAN)framework is first constructed by combining residual networks(ResNet)with fully connected networks(FCN).Then,a sparse adversarial learning model is built by integrating the time-aligned data and normal data,which is used to learn the distribution characteristics between normal data and attack data through iterative ***,we introduce a Gaussian hybrid distributionmatrix by aggregating the network structure of attack data characteristics and normal data characteristics,which can connect and calculate FDIA data with normal ***,efficient FDIA attack samples can be sequentially generated through interactive adversarial *** simulation experiments are conducted with IEEE 14-bus and IEEE 118-bus system data,and the results demonstrate that the generated attack samples of the proposed model can present superior performance compared to state-of-the-art models in terms of attack strength,robustness,and covert capability.
In this work, initially a rectangular microstrip patch antenna measuring (94.8 × 110 × 10) μm3 with a polyamide substrate has been analyzed and developed. The antenna has a bandwidth of 170 GHz (1.98 - 2.15...
详细信息
The boundary conduction mode (BCM) flyback power factor correction (PFC) converter is well-suited for low to medium power-level applications. It isolates input and output voltages while improving the power factor (PF)...
详细信息
Cyber-attacks pose a significant challenge to the security of Internet of Things(IoT)sensor networks,necessitating the development of robust countermeasures tailored to their unique characteristics and *** prevention ...
详细信息
Cyber-attacks pose a significant challenge to the security of Internet of Things(IoT)sensor networks,necessitating the development of robust countermeasures tailored to their unique characteristics and *** prevention and detection techniques have been proposed to mitigate these *** this paper,we propose an integrated security framework using blockchain and Machine Learning(ML)to protect IoT sensor *** framework consists of two modules:a blockchain prevention module and an ML detection *** blockchain prevention module has two lightweight mechanisms:identity management and trust *** management employs a lightweight Smart Contract(SC)to manage node registration and authentication,ensuring that unauthorized entities are prohibited from engaging in any tasks,while trust management uses a lightweight SC that is responsible for maintaining trust and credibility between sensor nodes throughout the network’s lifetime and tracking historical node *** and transaction validation are achieved through a Verifiable Byzantine Fault Tolerance(VBFT)mechanism to ensure network reliability and *** ML detection module utilizes the Light Gradient Boosting Machine(LightGBM)algorithm to classify malicious nodes and notify the blockchain network if it must make decisions to mitigate their *** investigate the performance of several off-the-shelf ML algorithms,including Logistic Regression,Complement Naive Bayes,Nearest Centroid,and Stacking,using the WSN-DS *** is selected following a detailed comparative analysis conducted using accuracy,precision,recall,F1-score,processing time,training time,prediction time,computational complexity,and Matthews Correlation Coefficient(MCC)evaluation metrics.
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,...
详细信息
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,manual screening has several limitations,including the propensity for errors,and raises concerns about passenger *** address these drawbacks,researchers have leveraged recent advances in deep learning to design threatsegmentation ***,these models require extensive training data and labour-intensive dense pixelwise annotations and are finetuned separately for each dataset to account for inter-dataset ***,this study proposes a semi-supervised contour-driven broad learning system(BLS)for X-ray baggage security threat instance segmentation referred to as *** research methodology involved enhancing representation learning and achieving faster training capability to tackle severe occlusion and class imbalance using a single training routine with limited baggage *** proposed framework was trained with minimal supervision using resource-efficient image-level labels to localize illegal items in multi-vendor baggage *** specifically,the framework generated candidate region segments from the input X-ray scans based on local intensity transition cues,effectively identifying concealed prohibited items without entire baggage *** multi-convolutional BLS exploits the rich complementary features extracted from these region segments to predict object categories,including threat and benign *** contours corresponding to the region segments predicted as threats were then utilized to yield the segmentation *** proposed C-BLX system was thoroughly evaluated on three highly imbalanced public datasets and surpassed other competitive approaches in baggage-threat segmentation,yielding 90.04%,78.92%,and 59.44%in terms of mIoU on GDXray,SIXray,and Compass-XP,***,the lim
暂无评论