Existing deep clustering approaches often struggle with redundant feature learning, which limits their effectiveness. The primary goal of this study is to address these issues by developing a more robust deep clusteri...
详细信息
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit...
详细信息
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining ***,these tools suffer from some *** terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search ***,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information *** this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation *** leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion *** combination allows for the unified handling of binary programs across various architectures,compilers,and compilation ***,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)***,the graph embedding network is utilized to evaluate the similarity of program *** on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target *** solved content serves as the initial seed for targeted *** binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity *** approach facilitates
A new meaningful image encryption algorithm based on compressive sensing(CS)and integer wavelet transformation(IWT)is proposed in this *** of all,the initial values of chaotic system are encrypted by RSA algorithm,and...
详细信息
A new meaningful image encryption algorithm based on compressive sensing(CS)and integer wavelet transformation(IWT)is proposed in this *** of all,the initial values of chaotic system are encrypted by RSA algorithm,and then they are open as public *** make the chaotic sequence more random,a mathematical model is constructed to improve the random ***,the plain image is compressed and encrypted to obtain the secret ***,the secret image is inserted with numbers zero to extend its size same to the plain *** applying IWT to the carrier image and discrete wavelet transformation(DWT)to the inserted image,the secret image is embedded into the carrier ***,a meaningful carrier image embedded with secret plain image can be obtained by inverse ***,the measurement matrix is built by both chaotic system and Hadamard matrix,which not only retains the characteristics of Hadamard matrix,but also has the property of control and synchronization of chaotic ***,information entropy of the plain image is employed to produce the initial conditions of chaotic *** a result,the proposed algorithm can resist known-plaintext attack(KPA)and chosen-plaintext attack(CPA).By the help of asymmetric cipher algorithm RSA,no extra transmission is needed in the *** simulations show that the normalized correlation(NC)values between the host image and the cipher image are *** is to say,the proposed encryption algorithm is imperceptible and has good hiding effect.
Skin cancer is a serious and potentially life-threatening condition caused by DNA damage in the skin cells, leading to genetic mutations and abnormal cell growth. These mutations can cause the cells to divide and grow...
详细信息
Skin cancer is a serious and potentially life-threatening condition caused by DNA damage in the skin cells, leading to genetic mutations and abnormal cell growth. These mutations can cause the cells to divide and grow uncontrollably, forming a tumor on the skin. To prevent skin cancer from spreading and potentially leading to serious complications, it's critical to identify and treat it as early as possible. An innovative two-fold deep learning based skin cancer detection model is presented in this research work. Five main stages make up the proposed model: Preprocessing, segmentation, feature extraction, feature selection, and skin cancer detection. Initially, the Min–max contrast stretching and median filtering used to pre-process the collected raw image. From the pre-processed image, the Region of Intertest (ROI) is identified via optimized mask Region-based Convolutional Neural Network (R-CNN). Then, from the identified ROI areas, the texture features like Illumination-invariant Binary Gabor Pattern (II-BGP), Local Binary Pattern (LBP), Gray-Level Co-occurrence Matrix (GLCM), Color feature such as Color Correlogram and Histogram Intersection, and Shape feature including Moments, Area, Perimeter, Eccentricity, Average bending energy are extracted. To choose the optimal features from the extracted ones, the Golden Eagle Mutated Leader Optimization (GEMLO) is used. The proposed Golden Eagle Mutated Leader Optimization (GEMLO) is the conceptual amalgamation of the standard Mutated Leader Algorithm (MLA) and Golden Eagle Optimizer are used to select best features (GEO). The skin cancer detection is accomplished via two-fold-deep-learning-classifiers, that includes the Fully Convolutional Neural Networks (FCNs) and Multi-Layer Perception (MLP). The final outcome is the combination of the outcomes acquired from Fully Convolutional Neural Networks (FCNs) and Multi-Layer Perception (MLP). The PYTHON platform is being used to implement the suggested model. Using the curre
1 Introduction In recent years,foundation Vision-Language Models(VLMs),such as CLIP[1],which empower zero-shot transfer to a wide variety of domains without fine-tuning,have led to a significant shift in machine learn...
详细信息
1 Introduction In recent years,foundation Vision-Language Models(VLMs),such as CLIP[1],which empower zero-shot transfer to a wide variety of domains without fine-tuning,have led to a significant shift in machine learning *** the impressive capabilities,it is concerning that the VLMs are prone to inheriting biases from the uncurated datasets scraped from the Internet[2–5].We examine these biases from three perspectives.(1)Label bias,certain classes(words)appear more frequently in the pre-training data.(2)Spurious correlation,non-target features,e.g.,image background,that are correlated with labels,resulting in poor group robustness.(3)Social bias,which is a special form of spurious correlation,focuses on societal *** image-text pairs might contain human prejudice,e.g.,gender,ethnicity,and age,that are correlated with *** biases are subsequently propagated to downstream tasks,leading to biased predictions.
With the advancement of the manufacturing industry,the investigation of the shop floor scheduling problem has gained increasing *** Job shop Scheduling Problem(JSP),as a fundamental scheduling problem,holds considerab...
详细信息
With the advancement of the manufacturing industry,the investigation of the shop floor scheduling problem has gained increasing *** Job shop Scheduling Problem(JSP),as a fundamental scheduling problem,holds considerable theoretical research ***,finding a satisfactory solution within a given time is difficult due to the NP-hard nature of the JSP.A co-operative-guided ant colony optimization algorithm with knowledge learning(namely KLCACO)is proposed to address this *** algorithm integrates a data-based swarm intelligence optimization algorithm with model-based JSP schedule knowledge.A solution construction scheme based on scheduling knowledge learning is proposed for *** problem model and algorithm data are fused by merging scheduling and planning knowledge with individual scheme construction to enhance the quality of the generated individual solutions.A pheromone guidance mechanism,which is based on a collaborative machine strategy,is used to simplify information learning and the problem space by collaborating with different machine processing ***,the KLCACO algorithm utilizes the classical neighborhood structure to optimize the solution,expanding the search space of the algorithm and accelerating its *** KLCACO algorithm is compared with other highperformance intelligent optimization algorithms on four public benchmark datasets,comprising 48 benchmark test cases in *** effectiveness of the proposed algorithm in addressing JSPs is validated,demonstrating the feasibility of the KLCACO algorithm for knowledge and data fusion in complex combinatorial optimization problems.
Images are used widely nowadays. Images are used in many fields such as medicine to terrain mapping. There is a need to compress the images and represent them in shorter form for effective transmission. Several techni...
详细信息
Deep neural networks (DNNs) are crucial in autonomous driving systems (ADSs) for tasks like steering control, but model inaccuracies, biased training data, and incorrect runtime parameters can compromise their reliabi...
详细信息
Deep neural networks (DNNs) are crucial in autonomous driving systems (ADSs) for tasks like steering control, but model inaccuracies, biased training data, and incorrect runtime parameters can compromise their reliability. Metamorphic testing (MT) enhances reliability by generating follow-up tests from mutated DNN source inputs, identifying inconsistencies as defects. Various MT techniques for ADSs include generative/transfer models, neuron-based coverage maximization, and adaptive test selection. Despite these efforts, significant challenges remain, including the ambiguity of neuron coverage’s correlation with misbehaviour detection, a lack of focus on DNN critical pathways, inadequate use of search-based methods, and the absence of an integrated method that effectively selects sources and generates follow-ups. This paper addresses such challenges by introducing DeepDomain, a grey-box multi-objective test generation approach for DNN models. It involves adaptively selecting diverse source inputs and generating domain-oriented follow-up tests. Such follow-ups explore critical pathways, extracted by neuron contribution, with broader coverage compared to their source tests (inter-behavioural domain) and attaining high neural boundary coverage of the misbehaviour regions detected in previous follow-ups (intra-behavioural domain). An empirical evaluation of the proposed approach on three DNN models used in the Udacity self-driving car challenge, and 18 different MRs demonstrates that relying on behavioural domain adequacy is a more reliable indicator than coverage criteria for effectively guiding the testing of DNNs. Additionally, DeepDomain significantly outperforms selected baselines in misbehaviour detection by up to 94 times, fault-revealing capability by up to 79%, output diversity by 71%, corner-case detection by up to 187 times, identification of robustness subdomains of MRs by up to 33 percentage points, and naturalness by two times. The results confirm that stat
Recently,Generative Adversarial Networks(GANs)have become the mainstream text-to-image(T2I)***,a standard normal distribution noise of inputs cannot provide sufficient information to synthesize an image that approache...
详细信息
Recently,Generative Adversarial Networks(GANs)have become the mainstream text-to-image(T2I)***,a standard normal distribution noise of inputs cannot provide sufficient information to synthesize an image that approaches the ground-truth image ***,the multistage generation strategy results in complex T2I ***,this study proposes a novel feature-grounded single-stage T2I model,which considers the“real”distribution learned from training images as one input and introduces a worst-case-optimized similarity measure into the loss function to enhance the model's generation *** results on two benchmark datasets demonstrate the competitive performance of the proposed model in terms of the Frechet inception distance and inception score compared to those of some classical and state-of-the-art models,showing the improved similarities among the generated image,text,and ground truth.
Knowledge graph can assist in improving recommendation performance and is widely applied in various person-alized recommendation ***,existing knowledge-aware recommendation methods face challenges such as weak user-it...
详细信息
Knowledge graph can assist in improving recommendation performance and is widely applied in various person-alized recommendation ***,existing knowledge-aware recommendation methods face challenges such as weak user-item interaction supervisory signals and noise in the knowledge *** tackle these issues,this paper proposes a neighbor information contrast-enhanced recommendation method by adding subtle noise to construct contrast views and employing contrastive learning to strengthen supervisory signals and reduce knowledge ***,first,this paper adopts heterogeneous propagation and knowledge-aware attention networks to obtain multi-order neighbor embedding of users and items,mining the high-order neighbor informa-tion of users and ***,in the neighbor information,this paper introduces weak noise following a uniform distribution to construct neighbor contrast views,effectively reducing the time overhead of view *** paper then performs contrastive learning between neighbor views to promote the uniformity of view information,adjusting the neighbor structure,and achieving the goal of reducing the knowledge noise in the knowledge ***,this paper introduces multi-task learning to mitigate the problem of weak supervisory *** validate the effectiveness of our method,experiments are conducted on theMovieLens-1M,MovieLens-20M,Book-Crossing,and Last-FM *** results showthat compared to the best baselines,our method shows significant improvements in AUC and F1.
暂无评论