Vehicle Color Recognition(VCR)plays a vital role in intelligent traffic management and criminal investigation ***,the existing vehicle color datasets only cover 13 classes,which can not meet the current actual ***,alt...
详细信息
Vehicle Color Recognition(VCR)plays a vital role in intelligent traffic management and criminal investigation ***,the existing vehicle color datasets only cover 13 classes,which can not meet the current actual ***,although lots of efforts are devoted to VCR,they suffer from the problem of class imbalance in *** address these challenges,in this paper,we propose a novel VCR method based on Smooth Modulation Neural Network with Multi-Scale Feature Fusion(SMNN-MSFF).Specifically,to construct the benchmark of model training and evaluation,we first present a new VCR dataset with 24 vehicle classes,Vehicle Color-24,consisting of 10091 vehicle images from a 100-hour urban road surveillance ***,to tackle the problem of long-tail distribution and improve the recognition performance,we propose the SMNN-MSFF model with multiscale feature fusion and smooth *** former aims to extract feature information from local to global,and the latter could increase the loss of the images of tail class instances for training with ***,comprehensive experimental evaluation on Vehicle Color-24 and previously three representative datasets demonstrate that our proposed SMNN-MSFF outperformed state-of-the-art VCR *** extensive ablation studies also demonstrate that each module of our method is effective,especially,the smooth modulation efficiently help feature learning of the minority or tail *** Color-24 and the code of SMNN-MSFF are publicly available and can contact the author to obtain.
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many *** by the self-nonself discrimination par...
详细信息
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many *** by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network ***,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called ***,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept ***,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social *** evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social *** experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding *** experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components.
As a class of effective methods for incomplete multi-view clustering,graph-based algorithms have recently drawn wide ***,most of them could use further improvement regarding the following ***,in some graph-based model...
详细信息
As a class of effective methods for incomplete multi-view clustering,graph-based algorithms have recently drawn wide ***,most of them could use further improvement regarding the following ***,in some graph-based models,all views are forced to share a common similarity graph regardless of the severe consistency degeneration due to incomplete ***,similarity graph construction and cluster analysis are sometimes performed ***,the contribution difference of individual views is not always carefully *** address these issues simultaneously,this paper proposes an incomplete multi-view clustering algorithm based on auto-weighted fusion in partition *** our algorithm,the information of cluster structure is introduced into the process of similarity learning to construct a desirable similarity graph,information fusion is performed in partition space to alleviate the negative impact brought about by consistency degradation,and all views are adaptively weighted to reflect their different contributions to clustering ***,all the subtasks are collaboratively optimized in a united framework to reach an overall optimal *** results show that the proposed method compares favorably with the state-of-the-art methods.
The wireless signals emitted by base stations serve as a vital link connecting people in today’s society and have been occupying an increasingly important role in real *** development of the Internet of Things(IoT)re...
详细信息
The wireless signals emitted by base stations serve as a vital link connecting people in today’s society and have been occupying an increasingly important role in real *** development of the Internet of Things(IoT)relies on the support of base stations,which provide a solid foundation for achieving a more intelligent way of *** a specific area,achieving higher signal coverage with fewer base stations has become an urgent ***,this article focuses on the effective coverage area of base station signals and proposes a novel Evolutionary Particle Swarm Optimization(EPSO)algorithm based on collective prediction,referred to herein as *** a new strategy called neighbor-based evolution prediction(NEP)addresses the issue of premature convergence often encountered by *** also employs a strengthening evolution(SE)strategy to enhance the algorithm’s global search capability and efficiency,ensuring enhanced robustness and a faster convergence speed when solving complex optimization *** better adapt to the actual communication needs of base stations,this article conducts simulation experiments by changing the number of base *** experimental results demonstrate thatunder the conditionof 50 ormore base stations,ECPPSOconsistently achieves the best coverage rate exceeding 95%,peaking at 99.4400%when the number of base stations reaches *** results validate the optimization capability of the ECPPSO algorithm,proving its feasibility and *** ablative experiments and comparisons with other algorithms highlight the advantages of ECPPSO.
Generative text-to-image models, which allow users to create appealing images through a text prompt, have seen a dramatic increase in popularity in recent years. However, most users have a limited understanding of how...
详细信息
Generative text-to-image models, which allow users to create appealing images through a text prompt, have seen a dramatic increase in popularity in recent years. However, most users have a limited understanding of how such models work and often rely on trial and error strategies to achieve satisfactory results. The prompt history contains a wealth of information that could provide users with insights into what has been explored and how the prompt changes impact the output image, yet little research attention has been paid to the visual analysis of such process to support users. We propose the Image Variant Graph, a novel visual representation designed to support comparing prompt-image pairs and exploring the editing history. The Image Variant Graph models prompt differences as edges between corresponding images and presents the distances between images through projection. Based on the graph, we developed the PrompTHis system through co-design with artists. Based on the review and analysis of the prompting history, users can better understand the impact of prompt changes and have a more effective control of image generation. A quantitative user study and qualitative interviews demonstrate that PrompTHis can help users review the prompt history, make sense of the model, and plan their creative process. IEEE
Scene text recognition(STR) is drawing increasing attention nowadays due to its wide application in real life. Character counting information, as auxiliary information, has been shown to be effective in boosting text ...
详细信息
Scene text recognition(STR) is drawing increasing attention nowadays due to its wide application in real life. Character counting information, as auxiliary information, has been shown to be effective in boosting text recognition performance. However, most previous methods only utilize it for visual feature enhancement [1, 2].
Skin cancer is one of the most prevalent forms of human cancer. It is recognized mainly visually, beginning with clinical screening and continuing with the dermoscopic examination, histological assessment, and specime...
详细信息
Real-time 3-D view reconstruction in an unfamiliar environment poses complexity for various applications due to varying conditions such as occlusion, latency, precision, etc. This article thoroughly examines and tests...
详细信息
We present SinGRAV, an attempt to learn a generative radiance volume from multi-view observations of a single natural scene, in stark contrast to existing category-level 3D generative models that learn from images of ...
详细信息
We present SinGRAV, an attempt to learn a generative radiance volume from multi-view observations of a single natural scene, in stark contrast to existing category-level 3D generative models that learn from images of many object-centric scenes. Inspired by SinGAN, we also learn the internal distribution of the input scene, which necessitates our key designs w.r.t. the scene representation and network architecture. Unlike popular multi-layer perceptrons (MLP)-based architectures, we particularly employ convolutional generators and discriminators, which inherently possess spatial locality bias, to operate over voxelized volumes for learning the internal distribution over a plethora of overlapping regions. On the other hand, localizing the adversarial generators and discriminators over confined areas with limited receptive fields easily leads to highly implausible geometric structures in the spatial. Our remedy is to use spatial inductive bias and joint discrimination on geometric clues in the form of 2D depth maps. This strategy is effective in improving spatial arrangement while incurring negligible additional computational cost. Experimental results demonstrate the ability of SinGRAV in generating plausible and diverse variations from a single scene, the merits of SinGRAV over state-of-the-art generative neural scene models, and the versatility of SinGRAV by its use in a variety of applications. Code and data will be released to facilitate further research.
Many existing coverless steganography methods establish a mapping relationship between cover images and hidden *** issue with these methods is that as the steganographic capacity increases,the number of images stored ...
详细信息
Many existing coverless steganography methods establish a mapping relationship between cover images and hidden *** issue with these methods is that as the steganographic capacity increases,the number of images stored in the database grows *** makes it challenging to build and manage a large image *** improve the image library utilization and anti-attack capability of the steganography system,we propose an efficient coverless scheme based on dynamically matched *** utilize You Only Look Once(YOLO)for selecting optimal objects and create a mapping dictionary between these objects and scrambling *** this dictionary,each image is effectively assigned to a specific scrambling factor,which is then used to scramble the receiver’s sequence *** achieve sufficient steganography capability with a limited image library,all substrings of the scrambled sequences have the potential to hide *** matching the secret information,the ideal number of stego images will be obtained from the *** to experimental results,this technology outperforms most previous works in terms of data load,transmission security,and hiding *** can recover an average of 79.85%of secret information under typical geometric attacks,and only approximately 200 random images are needed to achieve a capacity of 19 bits per image.
暂无评论