Insomnia,whether situational or chronic,affects over a third of the general population in today’s ***,given the lack of non-contact and non-inductive quantitative evaluation approaches,most insomniacs are often unrec...
详细信息
Insomnia,whether situational or chronic,affects over a third of the general population in today’s ***,given the lack of non-contact and non-inductive quantitative evaluation approaches,most insomniacs are often unrecognized and *** Polysomnographic(PSG)is considered as one of the assessment methods,it is poorly tolerated and *** this paper,with the recent development of Internet-of-Things devices and edge computing techniques,we propose a detrended fractal dimension(DFD)feature for the analysis of heart-rate signals,which can be easily acquired by many wearables,of good sleepers and *** feature was derived by calculating the fractal dimension(FD)of detrended *** the trend component removal,we improved the null space pursuit algorithm and proposed an adaptive trend extraction *** experimental results demonstrated the efficacy of the proposed DFD index through numerical statistics and significance testing for healthy and insomnia groups,which renders it a potential biomarker for insomnia assessment and management.
The continuous revolution in Artificial Intelligence (AI) has played a significant role in the development of key consumer applications, including Industry 5.0, autonomous decision-making, fault diagnosis, etc. In pra...
详细信息
Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts,by performing binary *** it remains an unso...
详细信息
Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts,by performing binary *** it remains an unsolved problem and poses a significant threat to the security of cyberspace when various categories of non-steganographic or steganographic texts *** this paper,we propose a general linguistic steganalysis framework named LS-MTL,which introduces the idea of multi-task learning to deal with the classification of various categories of steganographic and non-steganographic ***-MTL captures sensitive linguistic features from multiple related linguistic steganalysis tasks and can concurrently handle diverse tasks with a constructed *** the proposed framework,convolutional neural networks(CNNs)are utilized as private base models to extract sensitive features for each steganalysis ***,a shared CNN is built to capture potential interaction information and share linguistic features among all ***,LS-MTL incorporates the private and shared sensitive features to identify the detected text as steganographic or *** results demonstrate that the proposed framework LS-MTL outperforms the baseline in the multi-category linguistic steganalysis task,while average Acc,Pre,and Rec are increased by 0.5%,1.4%,and 0.4%,*** ablation experimental results show that LS-MTL with the shared module has robust generalization capability and achieves good detection performance even in the case of spare data.
We experimentally analyze the effect of the optical power on the time delay signature identification and the random bit generation in chaotic semiconductor laser with optical *** to the inevitable noise during the pho...
详细信息
We experimentally analyze the effect of the optical power on the time delay signature identification and the random bit generation in chaotic semiconductor laser with optical *** to the inevitable noise during the photoelectric detection and analog-digital conversion,the varying of output optical power would change the signal to noise ratio,then impact time delay signature identification and the random bit *** results show that,when the optical power is less than-14 dBm,with the decreasing of the optical power,the actual identified time delay signature degrades and the entropy of the chaotic signal ***,the extracted random bit sequence with lower optical power is more easily pass through the randomness testing.
Cloud services have attracted extensive attention due to low cost, agility and mobility. However, when processing data on cloud servers, users may worry about semi-honest third parties stealing private information fro...
详细信息
Long Short-Term Memory (LSTM) networks are particularly useful in recommender systems since user preferences change over time. Unlike traditional recommender models which assume static user-item interactions, LSTM mod...
详细信息
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). E...
详细信息
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). Eliminating DolphinAttacks is challenging if ever possible since it requires to modify the microphone hardware. In this paper, we design EarArray, a lightweight method that can not only detect such attacks but also identify the direction of attackers without requiring any extra hardware or hardware modification. Essentially, inaudible voice commands are modulated on ultrasounds that inherently attenuate faster than the one of audible sounds. By inspecting the command sound signals via the built-in multiple microphones on smart devices, EarArray is able to estimate the attenuation rate and thus detect the attacks. We propose a model of the propagation of audible sounds and ultrasounds from the sound source to a voice assistant, e.g., a smart speaker, and illustrate the underlying principle and its feasibility. We implemented EarArray using two specially-designed microphone arrays and our experiments show that EarArray can detect inaudible voice commands with an accuracy of above 99% and recognize the direction of the attackers with an accuracy of 97.89% and can also detect the laser-based attack with an accuracy of 100%. IEEE
Mammography screening is one of the important applications for the intelligent Internet of Things (IoT). Due to the efficient and personalized cyber-medicine system, early diagnosis can successfully reduce the breast ...
详细信息
Mammography screening is one of the important applications for the intelligent Internet of Things (IoT). Due to the efficient and personalized cyber-medicine system, early diagnosis can successfully reduce the breast cancer mortality rate by AI-driven healthcare. However, it is a huge challenge to extend the conventional single-center into the multicenter mammography screening, thus improving the effectiveness and robustness of intelligent IoT-based devices. To address this problem, we utilize multicenter mammograms by the modified capsule neural network and propose a novel framework called multicenter transformation between unified capsules (MLT-UniCaps) in this article. The proposed MLT-UniCaps is composed of Attentional Pose Embedding, Dynamic Source Capsule Traversal, and Adaptive Target Capsule Fusion to realize an intelligent remote assistant diagnosis. Attentional Pose Embedding extracts feature vectors via variations in position, orientation, scale, and lighting as the poses through an adversarial convolutional neural network with an attention-based layer. Based on the pose presentation, Dynamic Source Capsule Traversal deploys a dynamic routing mechanism between neurons to build a source cancer classifier for single-center mammography screening. Using the source cancer classifier, Adaptive Target Capsule Fusion integrates various centers of mammograms as the universal cancer detectors and optimizes heterogeneous distribution among them by the transformation-likelihood maximization. Owing to the three components, MLT-UniCaps effectively improves the results of single-center mammography screening and works in the multicenter breast cancer diagnosis. By comprehensive experiments on 58 965 samples, the proposed MLT-UniCaps obtains 90.1% of overall classification accuracy on single-center trials and 73.8% of overall F1 score on multicenter trials. All the experimental results illustrated that our MLT-UniCaps, an intelligent IoT-based clinical tool, inures the be
Network embedding aspires to learn a low-dimensional vector of each node in networks,which can apply to diverse data mining *** real-life,many networks include rich attributes and temporal ***,most existing embedding ...
详细信息
Network embedding aspires to learn a low-dimensional vector of each node in networks,which can apply to diverse data mining *** real-life,many networks include rich attributes and temporal ***,most existing embedding approaches ignore either temporal information or network attributes.A self-attention based architecture using higher-order weights and node attributes for both static and temporal attributed network embedding is presented in this article.A random walk sampling algorithm based on higher-order weights and node attributes to capture network topological features is *** static attributed networks,the algorithm incorporates first-order to k-order weights,and node attribute similarities into one weighted graph to preserve topological features of *** temporal attribute networks,the algorithm incorporates previous snapshots of networks containing first-order to k-order weights,and nodes attribute similarities into one weighted *** addition,the algorithm utilises a damping factor to ensure that the more recent snapshots allocate a greater *** features are then incorporated into topological ***,the authors adopt the most advanced architecture,Self-Attention Networks,to learn node *** results on node classification of static attributed networks and link prediction of temporal attributed networks reveal that our proposed approach is competitive against diverse state-of-the-art baseline approaches.
With the speedy growth in the technology and automation sectors, different techniques have been developed which can easily manipulate multimedia content such as videos and images with the ultimate level of realism. It...
详细信息
暂无评论