Adaptive steganography emplaces the message into the hard-to-detect noise area or the complex texture area of the image, so the steganography analysis method based on artificial design features needs to design a very ...
详细信息
Texture defect detection has wide applications in both textiles and industry, where traditional defect detection methods focus on costly manual labeling and defect samples are complex to collect in real-world industri...
详细信息
作者:
Guo, XiaotaoLi, JiangSu, XiangdongZhang, FujunCollege of Computer Science
Inner Mongolia University Hohhot China National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Hohhot China Inner Mongolia Key Laboratory of Multilingual Artificial Intelligence Technology Hohhot China
Sentence ordering is the task of rearranging a set of unordered sentences into a coherent and logically consistent sequence. Recent work has primarily used pre-trained language models, achieving significant success in...
详细信息
The limited number of labeled samples can significantly affect the accuracy of speech lie detection systems. However, semi-supervised algorithms have been shown to effectively improve detection performance under such ...
详细信息
This paper investigates the group formation control problem for cyber-physical systems (CPSs) with random communication constraints. The distributed cloud computing system is constructed to divide agents into groups a...
详细信息
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ...
详细信息
Quaternion contains one real part and three imaginary parts, which provided a more expressive hypercomplex space for learning knowledge graph. Existing quaternion embedding models measure the plausibility of a triplet...
详细信息
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ...
详细信息
With the deepening of informatization, the incidence of cybercrimes utilizing malicious software for attacks is on the rise. This paper addresses the detection issue of symmetric encryption in malicious software from ...
详细信息
We developed a mixed-strategy gaming approach for distributed and real-time optical subscarrier management in point-to-multipoint networks, achieving traffic loss rates close to those by ILP-based centralized optimiza...
暂无评论