Since the open character of the Internet of Things (IoT), IoT devices are vulnerable to various attacks. Compromised devices may maliciously provide unreliable data to the cloud. Furthermore, existing trust evaluation...
详细信息
A new feature fusion network called 'MedLeafNet' is presented in this study specifically for the categorization of Indian medicinal leaves. Using a hybrid architecture, MedLeafNet integrates the best features ...
详细信息
To achieve breakthrough performance in the task of dense crowd counting for unmanned aerial vehicles (UAVs) in complex environments, this paper introduces a multi-scale feature fusion crowd counting network model call...
详细信息
Agriculture is a significant source of energy that includes several well-known crops that supply food for the population and income for agronomists in India. Cotton is one of the attractive, drought-tolerant crops tha...
详细信息
With the rapid proliferation of various cloud storage services in recent years, the development of technology to efficiently search data while ensuring its confidentiality during cloud usage is an important issue. The...
In this article, the potential of low-terahertz (THz) technology is discussed to present high data rates in future biomedical systems, and also in the 6G mobile system. However, due to the loss, the design of high-gai...
详细信息
The Segment Anything Model (SAM) has demonstrated remarkable capabilities in its performance on natural images. However, it faces considerable challenges when applied to medical datasets. Specifically, the performance...
详细信息
With the development of information technology,a mass of data are generated every *** and analysing these data help service providers improve their services and gain an advantage in the fierce market competition.K-mea...
详细信息
With the development of information technology,a mass of data are generated every *** and analysing these data help service providers improve their services and gain an advantage in the fierce market competition.K-means clustering has been widely used for cluster analysis in real ***,these analyses are based on users’data,which disclose users’*** differential privacy has attracted lots of attention recently due to its strong privacy guarantee and has been applied for clustering ***,existing K-means clustering methods with local differential privacy protection cannot get an ideal clustering result due to the large amount of noise introduced to the whole dataset to ensure the privacy *** solve this problem,we propose a novel method that provides local distance privacy for users who participate in the clustering *** of making the users’records in-distinguish from each other in high-dimensional space,we map the user’s record into a one-dimensional distance space and make the records in such a distance space not be distinguished from each *** be specific,we generate a noisy distance first and then synthesize the high-dimensional data *** propose a Bounded Laplace Method(BLM)and a Cluster Indistinguishable Method(CIM)to sample such a noisy distance,which satisfies the local differential privacy guarantee and local dE-privacy guarantee,***,we introduce a way to generate synthetic data records in high-dimensional *** experimental evaluation results show that our methods outperform the traditional methods significantly.
This paper proposes a method for face expression recognition that combines multi-scale region awareness with multi-level feature fusion. It aims to overcome the challenge of extracting features from face regions that ...
详细信息
With the fast development of 3D scanners such as LiDAR and RGB-D cameras, point clouds have become the prevalent data modality to represent and analyze 3D circumstances. Point cloud registration is a fundamental task ...
详细信息
暂无评论