Due to their biological interpretability,memristors are widely used to simulate synapses between artificial neural *** a type of neural network whose dynamic behavior can be explained,the coupling of resonant tunnelin...
详细信息
Due to their biological interpretability,memristors are widely used to simulate synapses between artificial neural *** a type of neural network whose dynamic behavior can be explained,the coupling of resonant tunneling diode-based cellular neural networks(RTD-CNNs)with memristors has rarely been reported in the ***,this paper designs a coupled RTD-CNN model with memristors(RTD-MCNN),investigating and analyzing the dynamic behavior of the *** on this model,a simple encryption scheme for the protection of digital images in police forensic applications is *** results show that the RTD-MCNN can have two positive Lyapunov exponents,and its output is influenced by the initial values,exhibiting ***,a set of amplitudes in its output sequence is affected by the internal parameters of the memristor,leading to nonlinear ***,the rich dynamic behaviors described above make the RTD-MCNN highly suitable for the design of chaos-based encryption schemes in the field of privacy *** tests and security analyses validate the effectiveness of this scheme.
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed ***,the open system architecture inherent to federated learning systems raises concer...
详细信息
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed ***,the open system architecture inherent to federated learning systems raises concerns regarding their vulnerability to potential *** attacks turn into a major menace to federated learning on account of their concealed property and potent destructive *** altering the local model during routine machine learning training,attackers can easily contaminate the global *** detection and aggregation solutions mitigate certain threats,but they are still insufficient to completely eliminate the influence generated by ***,federated unlearning that can remove unreliable models while maintaining the accuracy of the global model has become a *** some existing federated unlearning approaches are rather difficult to be applied in large neural network models because of their high computational ***,we propose SlideFU,an efficient anti-poisoning attack federated unlearning *** primary concept of SlideFU is to employ sliding window to construct the training process,where all operations are confined within the *** design a malicious detection scheme based on principal component analysis(PCA),which calculates the trust factors between compressed models in a low-cost way to eliminate unreliable *** confirming that the global model is under attack,the system activates the federated unlearning process,calibrates the gradients based on the updated direction of the calibration *** on two public datasets demonstrate that our scheme can recover a robust model with extremely high efficiency.
This paper introduces a new network model - the Image Guidance Encoder-Decoder Model (IG-ED), designed to enhance the efficiency of image captioning and improve predictive accuracy. IG-ED, a fusion of the convolutiona...
详细信息
Now object detection based on deep learning tries different *** uses fewer data training networks to achieve the effect of large dataset ***,the existing methods usually do not achieve the balance between network para...
详细信息
Now object detection based on deep learning tries different *** uses fewer data training networks to achieve the effect of large dataset ***,the existing methods usually do not achieve the balance between network parameters and training *** makes the information provided by a small amount of picture data insufficient to optimize model parameters,resulting in unsatisfactory detection *** improve the accuracy of few shot object detection,this paper proposes a network based on the transformer and high-resolution feature extraction(THR).High-resolution feature extractionmaintains the resolution representation of the *** and spatial attention are used to make the network focus on features that are more useful to the *** addition,the recently popular transformer is used to fuse the features of the existing *** compensates for the previous network failure by making full use of existing object *** on the Pascal VOC and MS-COCO datasets prove that the THR network has achieved better results than previous mainstream few shot object detection.
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***,attackers have used advanced techniques to evade defenses by transforming their malware into functionality-preserving *** systematically analyze such evasion attacks and conduct a large-scale empirical study in this paper to evaluate their impact on *** specifically,we focus on two forms of evasion attacks:obfuscation and adversarial *** the best of our knowledge,this paper is the first to investigate and contrast the two families of evasion attacks *** apply 10 obfuscation attacks and 9 adversarial attacks to 2870 malware *** obtained findings are as follows.(1)Commercial Off-The-Shelf(COTS)malware detectors are vulnerable to evasion attacks.(2)Adversarial attacks affect COTS malware detectors slightly more effectively than obfuscated malware examples.(3)Code similarity detection approaches can be affected by obfuscated examples and are barely affected by adversarial attacks.(4)These attacks can preserve the functionality of original malware examples.
In recent years, deep learning has significantly advanced skin lesion segmentation. However, annotating medical image data is specialized and costly, while obtaining unlabeled medical data is easier. To address this c...
详细信息
Image captioning is an interdisciplinary research hotspot at the intersection of computer vision and natural language processing, representing a multimodal task that integrates core technologies from both fields. This...
详细信息
Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle *** and propagation processes are illustrated for pentadisperse and triadisperse particle systems,*** these proce...
详细信息
Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle *** and propagation processes are illustrated for pentadisperse and triadisperse particle systems,*** these processes,particles involved in the avalanche grow slowly in the early stage and explosively in the later stage,which is clearly different from the continuous and steady growth trend in the monodisperse *** examining the avalanche propagation,the number growth of particles involved in the avalanche and the slope of the number growth,the initial state can be divided into three stages:T1(nucleation stage),T2(propagation stage),T3(overall avalanche stage).We focus on the characteristics of the avalanche in the T2 stage,and find that propagation distances increase almost linearly in both axial and radial directions in polydisperse *** also consider the distribution characteristics of the average coordination number and average velocity for the moving *** results support that the polydisperse particle systems are more stable in the T2 stage.
Dear Editor,This letter presents a new transfer learning framework for the deep multi-agent reinforcement learning(DMARL) to reduce the convergence difficulty and training time when applying DMARL to a new scenario [1...
详细信息
Dear Editor,This letter presents a new transfer learning framework for the deep multi-agent reinforcement learning(DMARL) to reduce the convergence difficulty and training time when applying DMARL to a new scenario [1], [2].
With the development of artificial intelligence, deep learning has been increasingly used to achieve automatic detection of geographic information, replacing manual interpretation and improving efficiency. However, re...
详细信息
暂无评论