Handwritten signatures hold paramount importance in legal, financial, and administrative domains, necessitating the development of robust signature recognition tools for forensic applications. This paper introduces a ...
详细信息
ISBN:
(数字)9798350373974
ISBN:
(纸本)9798350373981
Handwritten signatures hold paramount importance in legal, financial, and administrative domains, necessitating the development of robust signature recognition tools for forensic applications. This paper introduces a handwritten signature recognition (HSR) model employing Parallel Convolutional Neural Networks (CNN) tailored for forensic endeavors. Utilizing the parallel processing capabilities of CNN, our proposed approach adeptly analyzes and extracts discriminative features from handwritten signature images to facilitate precise recognition. In addition, we leverage several transfer learning techniques by parallelizing proven pre-trained CNNs. Extensive experimentation validates the efficacy of our approach on a standard dataset, demonstrating high accuracy and resilience in signature recognition tasks. The proposed approach exhibits substantial promise in augmenting forensic investigations by automating signature verification processes, thereby bolstering fraud detection efforts and upholding the integrity of legal documentation.
Flexible capacitive pressure sensors have shown excellent application potential in human-machine interactions, wearable electronic devices, biological and medical, and electronic skin. Compared with piezoresistive and...
Flexible capacitive pressure sensors have shown excellent application potential in human-machine interactions, wearable electronic devices, biological and medical, and electronic skin. Compared with piezoresistive and piezoelectric pressure sensors, capacitive pressure sensors with advantages such as high flexibility, high stability, low consumption, and simple construction. Because of these advantages, flexible capacitive pressure sensors have become the key research direction of pressure sensors in recent years. This paper introduces the working principle of flexible capacitive pressure sensors and discusses numerous research on improving the performance of flexible capacitive pressure sensors. Then two methods of improving the dielectric layer structures to improve the sensitivity of the sensor and some related works are reviewed. Finally, the flexible capacitive pressure sensors' huge potential for advances in human-machine interactions areas such as health care and motion monitoring is also discussed. The paper concludes with an overview of future research directions of improving the performance of flexible capacitive pressure sensors.
The increasing popularity of crowdsourcing has resulted in the emergence of multiple crowdsourcing service providers (CSPs), such as Mechnical Turk and Crowdflower, which compete to attract crowd workers (CWs). CWs ca...
The increasing popularity of crowdsourcing has resulted in the emergence of multiple crowdsourcing service providers (CSPs), such as Mechnical Turk and Crowdflower, which compete to attract crowd workers (CWs). CWs can share their experience working for various CSPs, which forms the basis of CSP reputation score. This information can be used for trust building and facilitating future CWs’ decisions on which CSP to work for. Existing reputation management research in crowdsourcing has mainly focused on controlling task quality and improving revenue from the perspective of CSPs. Little attention has been paid to helping CSPs manage their reputation to attract and retain CWs. In this paper, we propose the Crowdsourcing Service Provider Reputation Management (CSP-RM) framework to bridge this important gap. Based on the current reputation of CSPs, it dynamically balances the trade-off between the reputation maintenance cost and the long-term profit for a given CSP. It performs dynamic commission allocation for a CSP based on Lyapunov optimization to guide the recruitment of CWs, while considering the revenue and the changes in the number of CWs. Extensive experiments based on highly competitive crowdsourcing market demonstrate that CSP-RM makes the most advantageous cost-benefit trade-off compared to existing approaches, outperforming the best baseline by 23.83%, 39.21% and 3.36% in terms of average cumulative revenue, average number of CWs and public reputation, respectively. To the best of our knowledge, it is the first decision support framework for enabling CSPs to recruit more CWs in a highly competitive market, while maintaining their reputation and ensuring long-term benefit.
In the context where social media is increasingly becoming a significant platform for social movements and the formation of public opinion, accurately simulating and predicting the dynamics of user opinions is of grea...
详细信息
At the beginning of 2020,epidemic of COrona VIrus Disease 19(COVID-19) broke *** the epidemic prevention and control,artificial intelligence,big data and other technologies have become powerful weapons against the epi...
详细信息
At the beginning of 2020,epidemic of COrona VIrus Disease 19(COVID-19) broke *** the epidemic prevention and control,artificial intelligence,big data and other technologies have become powerful weapons against the epidemic,and have been widely used in the fields of epidemic tracing,confirming virus transmission path,resource allocation and so *** this study,BiLSTM-CRF model,Bootstrap and Tornado frameworks are used to implement a neural network-based semantic trajectory mining system for the COVID-19 *** the basis of collecting the data published by the health committees of various provinces and cities,the semantic trajectories of the patients are extracted to ensure the accuracy of the data and then establish mapping relationship between the real space and the text description of the trajectories of the patients,while taking the time and space factors into account and excavating the dynamic changes of the patients.
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. [Quantum Inf. Process. 13, 2391(2014)]. However, Zhu et al. pointed out that there are some security f...
详细信息
Model heterogeneous federated learning is a realistic and challenging problem. However, due to the limitations of data collection, storage, and transmission conditions, as well as the existence of free-rider participa...
Model heterogeneous federated learning is a realistic and challenging problem. However, due to the limitations of data collection, storage, and transmission conditions, as well as the existence of free-rider participants, the clients may suffer from data corruption. This paper starts the first attempt to investigate the problem of data corruption in the model heterogeneous federated learning framework. We design a novel method named Augmented Heterogeneous Federated Learning (AugHFL), which consists of two stages: 1) In the local update stage, a corruption-robust data augmentation strategy is adopted to minimize the adverse effects of local corruption while enabling the models to learn rich local knowledge. 2) In the collaborative update stage, we design a robust re-weighted communication approach, which implements communication between heterogeneous models while mitigating corrupted knowledge transfer from others. Extensive experiments demonstrate the effectiveness of our method in coping with various corruption patterns in the model heterogeneous federated learning setting.
Personalized federated learning with differential privacy has been considered a feasible solution to address non-IID distribution of data and privacy leakage risks. However, current personalized federated learning met...
Personalized federated learning with differential privacy has been considered a feasible solution to address non-IID distribution of data and privacy leakage risks. However, current personalized federated learning methods suffer from inflexible personalization and convergence difficulties due to two main factors: 1) Firstly, we observe that the prevailing personalization methods mainly achieve this by personalizing a fixed portion of the model, which lacks flexibility. 2) Moreover, we further demonstrate that the default gradient calculation is sensitive to the widely-used clipping operations in differential privacy, resulting in difficulties in convergence. Considering that Fisher information values can serve as an effective measure for estimating the information content of parameters by reflecting the model sensitivity to parameters, we aim to leverage this property to address the aforementioned challenges. In this paper, we propose a novel federated learning method with Dynamic Fisher Personalization and Adaptive Constraint (FedDPA) to handle these challenges. Firstly, by using layer-wise Fisher information to measure the information content of local parameters, we retain local parameters with high Fisher values during the personalization process, which are considered informative, simultaneously prevent these parameters from noise perturbation. Secondly, we introduce an adaptive approach by applying differential constraint strategies to personalized parameters and shared parameters identified in the previous for better convergence. Our method boosts performance through flexible personalization while mitigating the slow convergence caused by clipping operations. Experimental results on CIFAR-10, FEMNIST and SVHN dataset demonstrate the effectiveness of our approach in achieving better performance and robustness against clipping, under personalized federated learning with differential privacy.
We study the challenging task of malware recognition on both known and novel unknown malware families, called malware open-set recognition (MOSR). Previous works usually assume the malware families are known to the cl...
详细信息
We study the challenging task of malware recognition on both known and novel unknown malware families, called malware open-set recognition (MOSR). Previous works usually assume the malware families are known to the classifier in a close-set scenario, i.e., testing families are the subset or at most identical to training families. However, novel unknown malware families frequently emerge in real-world applications, and as such, require to recognize malware instances in an open-set scenario, i.e., some unknown families are also included in the test-set, which has been rarely and non-thoroughly investigated in the cyber-security domain. One practical solution for MOSR may consider jointly classifying known and detecting unknown malware families by a single classifier (e.g., neural network) from the variance of the predicted probability distribution on known families. However, conventional well-trained classifiers usually tend to obtain overly high recognition probabilities in the outputs, especially when the instance feature distributions are similar to each other, e.g., unknown v.s. known malware families, and thus dramatically degrades the recognition on novel unknown malware families. To address the problem and construct an applicable MOSR system, we propose a novel model that can conservatively synthesize malware instances to mimic unknown malware families and support a more robust training of the classifier. More specifically, we build upon the generative adversarial networks (GANs) to explore and obtain marginal malware instances that are close to known families while falling into mimical unknown ones to guide the classifier to lower and flatten the recognition probabilities of unknown families and relatively raise that of known ones to rectify the performance of classification and detection. A cooperative training scheme involving the classification, synthesizing and rectification are further constructed to facilitate the training and jointly improve the model p
Since the pandemic of COVID-19, several deep learning methods were proposed to analyze the chest Computed Tomography (CT) for diagnosis. In the current situation, the disease course classification is significant for m...
详细信息
暂无评论