The pixel-wise dense prediction tasks based on weakly supervisions currently use Class Attention Maps(CAMs)to generate pseudo masks as ***,existing methods often incorporate trainable modules to expand the immature cl...
详细信息
The pixel-wise dense prediction tasks based on weakly supervisions currently use Class Attention Maps(CAMs)to generate pseudo masks as ***,existing methods often incorporate trainable modules to expand the immature class activation maps,which can result in significant computational overhead and complicate the training *** this work,we investigate the semantic structure information concealed within the CNN network,and propose a semantic structure aware inference(SSA)method that utilizes this information to obtain high-quality CAM without any additional training ***,the semantic structure modeling module(SSM)is first proposed to generate the classagnostic semantic correlation representation,where each item denotes the affinity degree between one category of objects and all the ***,the immature CAM are refined through a dot product operation that utilizes semantic structure ***,the polished CAMs from different backbone stages are fused as the *** advantage of SSA lies in its parameter-free nature and the absence of additional training costs,which makes it suitable for various weakly supervised pixel-dense prediction *** conducted extensive experiments on weakly supervised object localization and weakly supervised semantic segmentation,and the results confirm the effectiveness of SSA.
Implementing quantum wireless multi-hop network communication is essential to improve the global quantum network system. In this paper, we employ eight-level GHZ states as quantum channels to realize multi-hop quantum...
详细信息
Implementing quantum wireless multi-hop network communication is essential to improve the global quantum network system. In this paper, we employ eight-level GHZ states as quantum channels to realize multi-hop quantum communication, and utilize the logical relationship between the measurements of each node to derive the unitary operation performed by the end node. The hierarchical simultaneous entanglement switching(HSES) method is adopted, resulting in a significant reduction in the consumption of classical information compared to multi-hop quantum teleportation(QT)based on general simultaneous entanglement switching(SES). In addition, the proposed protocol is simulated on the IBM Quantum Experiment platform(IBM QE). Then, the data obtained from the experiment are analyzed using quantum state tomography, which verifies the protocol's good fidelity and accuracy. Finally, by calculating fidelity, we analyze the impact of four different types of noise(phase-damping, amplitude-damping, phase-flip and bit-flip) in this protocol.
The widespread use of deepfake technology has created previously unheard-of difficulties for digital media's credibility and authenticity. We describe a unique deepfake detection model that addresses this urgent p...
详细信息
Creating descriptive captions for images is now becoming a mission-critical application area in the intersection of natural language processing and computer vision. This work provides the hybrid model VisionGPT2, comb...
详细信息
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection b...
详细信息
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection between cyberspace and physical processes results in the exposure of industrial production information to unprecedented security risks. It is imperative to develop suitable strategies to ensure cyber security while meeting basic performance *** the perspective of control engineering, this review presents the most up-to-date results for privacy-preserving filtering,control, and optimization in industrial cyber-physical systems. Fashionable privacy-preserving strategies and mainstream evaluation metrics are first presented in a systematic manner for performance evaluation and engineering *** discussion discloses the impact of typical filtering algorithms on filtering performance, specifically for privacy-preserving Kalman filtering. Then, the latest development of industrial control is systematically investigated from consensus control of multi-agent systems, platoon control of autonomous vehicles as well as hierarchical control of power systems. The focus thereafter is on the latest privacy-preserving optimization algorithms in the framework of consensus and their applications in distributed economic dispatch issues and energy management of networked power systems. In the end, several topics for potential future research are highlighted.
Cloud Computing (CC) is widely adopted in sectors like education, healthcare, and banking due to its scalability and cost-effectiveness. However, its internet-based nature exposes it to cyber threats, necessitating ad...
详细信息
Recently,weak supervision has received growing attention in the field of salient object detection due to the convenience of ***,there is a large performance gap between weakly supervised and fully supervised salient o...
详细信息
Recently,weak supervision has received growing attention in the field of salient object detection due to the convenience of ***,there is a large performance gap between weakly supervised and fully supervised salient object detectors because the scribble annotation can only provide very limited foreground/background ***,an intuitive idea is to infer annotations that cover more complete object and background regions for *** this end,a label inference strategy is proposed based on the assumption that pixels with similar colours and close positions should have consistent ***,k-means clustering algorithm was first performed on both colours and coordinates of original annotations,and then assigned the same labels to points having similar colours with colour cluster centres and near coordinate cluster ***,the same annotations for pixels with similar colours within each kernel neighbourhood was set *** experiments on six benchmarks demonstrate that our method can significantly improve the performance and achieve the state-of-the-art results.
Machine learning (ML) with data analysis has many successful applications and is widely employed daily. Additionally, they have played a significant role in combating the global coronavirus (COVID-19) outbreak. Intern...
详细信息
Breast cancer is a major health concern for women worldwide, and early detection is vital to improve treatment outcomes. While existing techniques in mammogram classification have demonstrated promising results, their...
详细信息
Breast cancer is a major health concern for women worldwide, and early detection is vital to improve treatment outcomes. While existing techniques in mammogram classification have demonstrated promising results, their limitations become apparent when applied to larger datasets. The decline in performance with increased dataset size highlights the need for further research and advancements in the field to enhance the scalability and generalizability of these techniques. In this study, we propose a framework to classify breast cancer from mammograms using techniques such as mammogram enhancement, discrete cosine transform (DCT) dimensionality reduction, and deep convolutional neural network (DCNN). The first step is to improve the mammogram display to improve the visibility of key features and reduce noise. For this, we use 2-stage Contrast Limited Adaptive Histogram Equalization (CLAHE). DCT is then used to enhance mammograms to reduce residual data. It can provide effective reduction while preserving important diagnostic information. In this way, we reduce the computational complexity and increase the results of subsequent classification algorithms. Finally, DCNN is used on size-reduced DCT coefficients to learn feature discrimination and classification of mammograms. DCNN architectures have been optimized with various techniques to improve their performance, including regularization and hyperparameter tuning. We perform experiments on the DDSM dataset, a large dataset containing approximately 55,000 mammogram images, and demonstrate the effectiveness of the proposed method. We assess the proposed model’s performance by computing the precision, recall, accuracy, F1-Score, and area under the receiver operating characteristic curve (AUC). We achieve Precision and Recall values of 0.929 and 0.963, respectively. The classification accuracy of the proposed models is 0.963. Moreover, the F1-Score and AUC values are 0.962 and 0.987, respectively. These results are better a
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
暂无评论