The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data *** speaking,EHRs are widely used in blockchain-based medical data *** are valuable private assets of patients,and th...
详细信息
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data *** speaking,EHRs are widely used in blockchain-based medical data *** are valuable private assets of patients,and the ownership belongs to *** recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals,it does not address the challenge of record sharing when patients revisit *** order to solve this problem,this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate *** paper uses cross-chain technology to connect the Medical Certificate Blockchain and the Hospital Blockchain to real-ize the recovery of deleted *** the same time,this paper uses the Medical Certificate Blockchain and the InterPlanetary File System(IPFS)to store Personal Health Records,which are generated by patients visiting different medical *** addition,this paper also combines digital watermarking technology to ensure the authenticity of the restored electronic medical *** the combined effect of blockchain technology and digital watermarking,our proposal will not be affected by any other rights throughout the *** analysis and security analysis illustrate the completeness and feasibility of the scheme.
In this paper, the finite-time stabilization of the disturbed and uncertain rotary-inverted-pendulum system is studied based on the adaptive backstepping sliding mode control procedure. For this purpose, first of all,...
详细信息
The next generation of WiFi aims to deliver highly accurate location estimation through time-of-flight measurements. While initial results show promising performance, there is a lack of studies conducted under realist...
详细信息
With the rapid development of Internet of Things technology,the sharp increase in network devices and their inherent security vulnerabilities present a stark contrast,bringing unprecedented challenges to the field of ...
详细信息
With the rapid development of Internet of Things technology,the sharp increase in network devices and their inherent security vulnerabilities present a stark contrast,bringing unprecedented challenges to the field of network security,especially in identifying malicious ***,due to the uneven distribution of network traffic data,particularly the imbalance between attack traffic and normal traffic,as well as the imbalance between minority class attacks and majority class attacks,traditional machine learning detection algorithms have significant limitations when dealing with sparse network traffic *** effectively tackle this challenge,we have designed a lightweight intrusion detection model based on diffusion mechanisms,named Diff-IDS,with the core objective of enhancing the model’s efficiency in parsing complex network traffic features,thereby significantly improving its detection speed and training *** model begins by finely filtering network traffic features and converting them into grayscale images,while also employing image-flipping techniques for data ***,these preprocessed images are fed into a diffusion model based on the Unet architecture for *** the model is trained,we fix the weights of the Unet network and propose a feature enhancement algorithm based on feature masking to further boost the model’s ***,we devise an end-to-end lightweight detection strategy to streamline the model,enabling efficient lightweight detection of imbalanced *** method has been subjected to multiple experimental tests on renowned network intrusion detection benchmarks,including CICIDS 2017,KDD 99,and *** experimental results indicate that Diff-IDS leads in terms of detection accuracy,training efficiency,and lightweight metrics compared to the current state-of-the-art models,demonstrating exceptional detection capabilities and robustness.
Domain adaptive semantic segmentation enables robust pixel- wise understanding in real-world driving scenes. Source-free domain adaptation, as a more practical technique, addresses the concerns of data privacy and sto...
详细信息
Domain adaptive semantic segmentation enables robust pixel- wise understanding in real-world driving scenes. Source-free domain adaptation, as a more practical technique, addresses the concerns of data privacy and storage limitations in typical unsupervised domain adaptation methods, making it especially relevant in the context of intelligent vehicles. It utilizes a well-trained source model and unlabeled target data to achieve adaptation in the target domain. However, in the absence of source data and target labels, current solutions cannot sufficiently reduce the impact of domain shift and fully leverage the information from the target data. In this paper, we propose an end-to-end source-free domain adaptation semantic segmentation method via Importance-Aware and Prototype-Contrast (IAPC) learning. The proposed IAPC framework effectively extracts domain-invariant knowledge from the well-trained source model and learns domain-specific knowledge from the unlabeled target domain. Specifically, considering the problem of domain shift in the prediction of the target domain by the source model, we put forward an importance-aware mechanism for the biased target prediction probability distribution to extract domain-invariant knowledge from the source model. We further introduce a prototype-contrast strategy, which includes a prototype-symmetric cross-entropy loss and a prototype-enhanced cross-entropy loss, to learn target intra-domain knowledge without relying on labels. A comprehensive variety of experiments on two domain adaptive semantic segmentation benchmarks demonstrates that the proposed end-to-end IAPC solution outperforms existing state-of-the-art methods. The source code is publicly available at https://***/yihong-97/Source-free-IAPC. IEEE
Semi-supervised semantic segmentation leverages both labeled and unlabeled images to accomplish pixel-wise classification task. Within this field, the weak-to-strong consistency regularization has been widely populari...
详细信息
Temporal Sentence Grounding (TSG), which aims to localize events in untrimmed videos with a given language query, has been widely studied in the last decades. However, recently researchers have demonstrated that previ...
详细信息
In this article, the potential of low-terahertz (THz) technology is discussed to present high data rates in future biomedical systems, and also in the 6G mobile system. However, due to the loss, the design of high-gai...
详细信息
A significant number of people in developing nations like India, when a primary source of income is farming, depend on the agriculture sector for their economy. The agricultural sector can be improved to make it more ...
详细信息
Micro-expression recognition (MER) is a critical task in affective computing, yet it remains challenging due to the subtle, brief, and involuntary nature of micro-expressions. Existing methods often find it difficult ...
详细信息
暂无评论