data aggregation masks individual entries by summing values, thus preventing the disclosure of private information. Multi-subset data aggregation divides subsets according to the range of data and collects the aggrega...
详细信息
This paper tackle the challenges associated with low recognition accuracy and the detection of occlusions when identifying long-range and diminutive targets (such as UAVs). We introduce a sophisticated detection frame...
详细信息
Wearables play an important role in parallel with IoT towards the era of healthcare and it has to be designed effectively providing workable solutions for all areas of other medical scopes. The fundamental objective o...
详细信息
In recent years, detecting objects in aerial images has emerged as a crucial area of study within the domain of computer vision. However, due to obstacles like the limited size of objects, dense distributions, and cla...
详细信息
Solutions to time-varying problems are crucial for research areas such as predicting changes in human body shape over time. While recurrent neural networks have made significant advancements in this field, their relia...
详细信息
Software vulnerabilities pose significant security threats to modern systems, particularly those involving complex execution sequences and intricate call relationships across multiple execution *** instance, in a scen...
详细信息
Software vulnerabilities pose significant security threats to modern systems, particularly those involving complex execution sequences and intricate call relationships across multiple execution *** instance, in a scenario where a software system integrates legacy code in a low-resource programming language like PHP, detecting vulnerabilities becomes challenging due to data scarcity and the complexity of temporal relationships among code fragments. This scarcity hampers the ability to capture critical temporal features essential for identifying vulnerabilities spanning multiple execution ***, existing approaches face major limitations, including neglecting temporal information in code fragments and lacking sufficient data to enable effective generalization for models in low-resource *** address these challenges, we introduce, a novel approach that enhances vulnerability detection in low-resource languages by extracting complex temporal features from code fragments and employing parameter-efficient transfer learning to leverage shared knowledge from resource-rich languages. comprises two key components: 1) Code Vulnerability Detection Component: This component models temporal dependencies by leveraging execution paths extracted from Abstract Syntax Trees (ASTs), capturing both short-term variations and long-term dependencies among code fragments. This enables comprehensive extraction of complex temporal features, significantly enhancing the accuracy of vulnerability detection. 2) Cross-Lingual Transfer Component: This component learns generalizable features from resource-rich languages and efficiently transfers them to low-resource languages. By updating a small number of downstream parameters, it enhances model generalization and achieves precise vulnerability detection. We evaluated using a diverse set of programming languages from publicly available GitHub repositories, employing C as the resource-rich source language and Java, Pytho
Drug substructure plays a crucial role in predicting drug-drug interaction (DDI) with combination drugs for disease therapies. In order to exploit the effect of drug substructure on DDI prediction, we propose a Key Su...
详细信息
In order to solve the issue of inaccurate recognition of time series of badminton action by 2D networks and the high cost of using skeleton data for badminton action recognition, this article aims to explore the use o...
详细信息
Images with complementary spectral information can be recorded using image sensors that can identify visible and near-infrared *** fusion of visible and nearinfrared(NIR)aims to enhance the quality of images acquired ...
详细信息
Images with complementary spectral information can be recorded using image sensors that can identify visible and near-infrared *** fusion of visible and nearinfrared(NIR)aims to enhance the quality of images acquired by video monitoring systems for the ease of user observation and data ***,current fusion algorithms produce artefacts and colour distortion since they cannot make use of spectrum properties and are lacking in information ***,an information complementarity fusion(ICF)model is designed based on physical *** order to separate high-frequency noise from important information in distinct frequency layers,the authors first extracted texture-scale and edge-scale layers using a two-scale ***,the difference map between visible and near-infrared was filtered using the extended-DoG filter to produce the initial visible-NIR complementary weight ***,to generate a guide map,the near-infrared image with night adjustment was processed as *** final complementarity weight map was subsequently derived via an arctanI function mapping using the guide map and the initial weight ***,fusion images were generated with the complementarity weight *** experimental results demonstrate that the proposed approach outperforms the state-of-the-art in both avoiding artificial colours as well as effectively utilising information complementarity.
Firewall is the first defense line for network security. Packet filtering is a basic function in firewall, it filter network packets according to a series of rules, which is called firewall policy. The design of firew...
详细信息
暂无评论