Fault diagnosis is difficult to determine intrinsic locality relationships of multi-modal fault data. Aiming at the issue, we propose a novel cross-modal hyperbolic subspace fault diagnosis method. In the method, we c...
详细信息
Optical data storage(ODS)is a low-cost and high-durability counterpart of traditional electronic or mag-netic *** a means of enhancing ODS capacity,the multiple recording layer(MRL)method is more promising than other ...
详细信息
Optical data storage(ODS)is a low-cost and high-durability counterpart of traditional electronic or mag-netic *** a means of enhancing ODS capacity,the multiple recording layer(MRL)method is more promising than other approaches such as reducing the recording volume and multiplexing ***,the architecture of current MRLs is identical to that of recording data into physical layers with rigid space,which leads to either severe interlayer crosstalk or finite recording layers constrained by the short working distances of the ***,we propose the concept of hybrid-layer ODS,which can record optical information into a physical layer and multiple virtual layers by using high-orthogonality random *** the virtual layer,32 images are experimentally reconstructed through holog-raphy,where their holographic phases are encoded into 16 printed images and complementary images in the physical layer,yielding a capacity of 2.5 Tbit cm^(-3).A higher capacity is achievable with more virtual layers,suggesting hybrid-layer ODS as a possible candidate for next-generation ODS.
Bismuth dysprosium (BiDy) composite oxide nanoflakes with a thickness of about 50 nm were synthesized using a one-step hydrothermal method. Electrodes modified with BiDy composite oxide nanoflakes exhibited a superior...
详细信息
Due to their biological interpretability,memristors are widely used to simulate synapses between artificial neural *** a type of neural network whose dynamic behavior can be explained,the coupling of resonant tunnelin...
详细信息
Due to their biological interpretability,memristors are widely used to simulate synapses between artificial neural *** a type of neural network whose dynamic behavior can be explained,the coupling of resonant tunneling diode-based cellular neural networks(RTD-CNNs)with memristors has rarely been reported in the ***,this paper designs a coupled RTD-CNN model with memristors(RTD-MCNN),investigating and analyzing the dynamic behavior of the *** on this model,a simple encryption scheme for the protection of digital images in police forensic applications is *** results show that the RTD-MCNN can have two positive Lyapunov exponents,and its output is influenced by the initial values,exhibiting ***,a set of amplitudes in its output sequence is affected by the internal parameters of the memristor,leading to nonlinear ***,the rich dynamic behaviors described above make the RTD-MCNN highly suitable for the design of chaos-based encryption schemes in the field of privacy *** tests and security analyses validate the effectiveness of this scheme.
Early fire Due to the small target and the occurrence of early scene complexity, the existing fire detection methods make it very easy to miss the detection of false detection phenomena. To address the above problems,...
详细信息
The fabrication of advanced graphene-based microwave absorbing materials with thin thickness,wide bandwidth,strong absorption strength,and low filling ratio remains a huge *** this paper,nitrogen-doped reduced graphen...
详细信息
The fabrication of advanced graphene-based microwave absorbing materials with thin thickness,wide bandwidth,strong absorption strength,and low filling ratio remains a huge *** this paper,nitrogen-doped reduced graphene oxide/tricobalt tetraoxide(NRGO/Co_(3)O_(4))composite aerogels were syn-thesized by a three-step method of solvothermal reaction,high-temperature calcination,and hydrother-mal *** results showed that the attained NRGO/Co_(3)O_(4)composite aerogels had a unique three-dimensional porous network structure,extremely low bulk density,and good compression ***,the effect of the addition amounts of flower-like Co_(3)O_(4)on the complex dielectric con-stant and microwave absorption properties of NRGO/Co_(3)O_(4)composite aerogels was *** the addition amount of Co_(3)O_(4)was equal to 15 mg,the prepared binary composite aerogel showed the strongest absorption strength of-62.78 dB and a wide absorption bandwidth of 5.5 GHz at a thin thick-ness of 2.13 mm and a low filling ratio of 15 wt.%.It was worth noting that the maximum absorption bandwidth could reach 6.32 GHz(11.68-18 GHz,spanning the entire Ku-band)at a thickness of 2.24 *** addition,the possible microwave absorption mechanism of NRGO/Co_(3)O_(4)composite aerogels was also ***,this paper will provide a new and simple strategy for preparing RGO-based porous nanocomposites as lightweight,efficient,and broadband microwave absorbers.
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed ***,the open system architecture inherent to federated learning systems raises concer...
详细信息
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed ***,the open system architecture inherent to federated learning systems raises concerns regarding their vulnerability to potential *** attacks turn into a major menace to federated learning on account of their concealed property and potent destructive *** altering the local model during routine machine learning training,attackers can easily contaminate the global *** detection and aggregation solutions mitigate certain threats,but they are still insufficient to completely eliminate the influence generated by ***,federated unlearning that can remove unreliable models while maintaining the accuracy of the global model has become a *** some existing federated unlearning approaches are rather difficult to be applied in large neural network models because of their high computational ***,we propose SlideFU,an efficient anti-poisoning attack federated unlearning *** primary concept of SlideFU is to employ sliding window to construct the training process,where all operations are confined within the *** design a malicious detection scheme based on principal component analysis(PCA),which calculates the trust factors between compressed models in a low-cost way to eliminate unreliable *** confirming that the global model is under attack,the system activates the federated unlearning process,calibrates the gradients based on the updated direction of the calibration *** on two public datasets demonstrate that our scheme can recover a robust model with extremely high efficiency.
This paper introduces a new network model - the Image Guidance Encoder-Decoder Model (IG-ED), designed to enhance the efficiency of image captioning and improve predictive accuracy. IG-ED, a fusion of the convolutiona...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***,attackers have used advanced techniques to evade defenses by transforming their malware into functionality-preserving *** systematically analyze such evasion attacks and conduct a large-scale empirical study in this paper to evaluate their impact on *** specifically,we focus on two forms of evasion attacks:obfuscation and adversarial *** the best of our knowledge,this paper is the first to investigate and contrast the two families of evasion attacks *** apply 10 obfuscation attacks and 9 adversarial attacks to 2870 malware *** obtained findings are as follows.(1)Commercial Off-The-Shelf(COTS)malware detectors are vulnerable to evasion attacks.(2)Adversarial attacks affect COTS malware detectors slightly more effectively than obfuscated malware examples.(3)Code similarity detection approaches can be affected by obfuscated examples and are barely affected by adversarial attacks.(4)These attacks can preserve the functionality of original malware examples.
In recent years, deep learning has significantly advanced skin lesion segmentation. However, annotating medical image data is specialized and costly, while obtaining unlabeled medical data is easier. To address this c...
详细信息
暂无评论