The generation of large-scale graphs encounters unique challenges compared to the exploration of the same large-scale graphs. Attack graphs and compliance graphs can be useful applications of large-scale graphs in ord...
详细信息
Graph Neural Networks (GNNs) have demonstrated robust performance in various graph-based machine learning tasks, especially in homophilous graphs, where edges tend to connect nodes with the same label. However, achiev...
详细信息
With the rapid development of automated visual analysis,visual analysis systems have become a popular research topic in the field of computer vision and automated *** analysis systems can assist humans to detect anoma...
详细信息
With the rapid development of automated visual analysis,visual analysis systems have become a popular research topic in the field of computer vision and automated *** analysis systems can assist humans to detect anomalous events(e.g.,fighting,walking alone on the grass,etc).In general,the existing methods for visual anomaly detection are usually based on an autoencoder architecture,i.e.,reconstructing the current frame or predicting the future ***,the reconstruction error is adopted as the evaluation metric to identify whether an input is abnormal or *** flaws of the existing methods are that abnormal samples can also be reconstructed *** this paper,inspired by the human memory ability,we propose a novel deep neural network(DNN)based model termed cognitive memory-augmented network(CMAN)for the visual anomaly detection *** proposed CMAN model assumes that the visual analysis system imitates humans to remember normal samples and then distinguishes abnormal events from the collected ***,in the proposed CMAN model,we introduce a memory module that is able to simulate the memory capacity of humans and a density estimation network that can learn the data *** reconstruction errors and the novelty scores are used to distinguish abnormal events from *** addition,we develop a two-step scheme to train the proposed model so that the proposed memory module and the density estimation network can cooperate to improve *** experiments evaluated on various popular benchmarks show the superiority and effectiveness of the proposed CMAN model for visual anomaly detection comparing with the state-of-the-arts *** implementation code of our CMAN method can be accessed at https://***/CMANcode/CMAN_pytorch.
Clustered Federated Learning (CFL) is an innovative architecture that effectively tackles the challenge of data heterogeneity in Federated Learning (FL). However, such a setup also introduces vulnerabilities that can ...
详细信息
As more business transactions and information services have been implemented via communication networks,both personal and organization assets encounter a higher risk of *** safeguard these,a perimeter defence likeNIDS...
详细信息
As more business transactions and information services have been implemented via communication networks,both personal and organization assets encounter a higher risk of *** safeguard these,a perimeter defence likeNIDS(network-based intrusion detection system)can be effective for known *** has been a great deal of attention within the joint community of security and data science to improve machine-learning based NIDS such that it becomes more accurate for adversarial attacks,where obfuscation techniques are applied to disguise patterns of intrusive *** current research focuses on non-payload connections at the TCP(transmission control protocol)stack level that is applicable to different network *** contrary to the wrapper method introduced with the benchmark dataset,three new filter models are proposed to transform the feature space without knowledge of class *** ECT(ensemble clustering based transformation)techniques,i.e.,ECT-Subspace,ECT-Noise and ECT-Combined,are developed using the concept of ensemble clustering and three different ensemble generation strategies,i.e.,random feature subspace,feature noise injection and their *** on the empirical study with published dataset and four classification algorithms,new models usually outperform that original wrapper and other filter alternatives found in the *** is similarly summarized from the first experiment with basic classification of legitimate and direct attacks,and the second that focuses on recognizing obfuscated *** addition,analysis of algorithmic parameters,i.e.,ensemble size and level of noise,is provided as a guideline for a practical use.
In many deep learning tasks, feature extraction and fusion in multivariate time series is an indispensable part of passenger flow prediction. Because there is also a certain correlation between passenger flow time ser...
详细信息
Person Re-Identification (ReID) is a crucial task in computer vision that aims to match persons captured from non-overlapping camera views. In this paper, to alleviate the impacts of background and occlusion, we propo...
详细信息
Cell nucleus segmentation plays a significant role in computer-Aided systems for cancer diagnosis. However, the nuclear images are characterized by different sizes, overlap, adhesion, and similarities between nuclei a...
详细信息
Clustered Federated Learning (CFL), as a type of Federated Learning (FL) paradigm, divides the clients into multiple clusters through the clustering process and trains them within the clusters, thus improving the over...
详细信息
Transformers have increasingly become the de facto method to model sequential data with state-of-the-art performance. Due to its widespread use, being able to estimate and calibrate its modeling uncertainty is importa...
详细信息
暂无评论