Person Image Synthesis has been widely used in fashion with extensive application *** point of this task is how to synthesise person image from a single source image under arbitrary *** methods generate the person ima...
详细信息
Person Image Synthesis has been widely used in fashion with extensive application *** point of this task is how to synthesise person image from a single source image under arbitrary *** methods generate the person image with target pose well;however,they fail to preserve the fine style details of the source *** address this problem,a robust style injection(RSI)model is proposed,which is a coarse-to-fine framework to synthesise target the person *** develops a simple and efficient cross-attention based module to fuse the features of both source semantic styles and target pose for achieving the coarse aligned *** adaptive instance normalisation is employed to enhance the aligned features in conjunction with source semantic ***,source semantic styles are further injected into the positional normalisation scheme to avoid the fine style details erosion caused by massive *** training losses,optimal transport theory in the form of energy distance is introduced to constrain data distribution to refine the texture style ***,the authors’model is capable of editing the shape and texture of garments to the target style *** experiments demonstrate that the authors’RSI achieves better performance over the state-of-art methods.
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of ...
详细信息
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of the electronic spectrum auction network environment,the security of spectrum auction can not be *** scholars focus on researching the security of the single-sided auctions,while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and *** begin to design the secure double spectrum auction mechanisms,in which two semi-honest agents are introduced to finish the spectrum auction *** these two agents may collude with each other or be bribed by buyers and sellers,which may create security risks,therefore,a secure double spectrum auction is proposed in this *** traditional secure double spectrum auctions,the spectrum auction server with Software Guard Extensions(SGX)component is used in this paper,which is an Ethereum blockchain platform that performs spectrum auctions.A secure double spectrum protocol is also designed,using SGX technology and cryptographic tools such as Paillier cryptosystem,stealth address technology and one-time ring signatures to well protect the private information of spectrum *** addition,the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification,and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum ***,security analysis and performance evaluation of our protocol are discussed.
Federated recommender systems(FedRecs) have garnered increasing attention recently, thanks to their privacypreserving benefits. However, the decentralized and open characteristics of current FedRecs present at least t...
详细信息
Federated recommender systems(FedRecs) have garnered increasing attention recently, thanks to their privacypreserving benefits. However, the decentralized and open characteristics of current FedRecs present at least two ***, the performance of FedRecs is compromised due to highly sparse on-device data for each client. Second, the system's robustness is undermined by the vulnerability to model poisoning attacks launched by malicious users. In this paper, we introduce a novel contrastive learning framework designed to fully leverage the client's sparse data through embedding augmentation, referred to as CL4FedRec. Unlike previous contrastive learning approaches in FedRecs that necessitate clients to share their private parameters, our CL4FedRec aligns with the basic FedRec learning protocol, ensuring compatibility with most existing FedRec implementations. We then evaluate the robustness of FedRecs equipped with CL4FedRec by subjecting it to several state-of-the-art model poisoning attacks. Surprisingly, our observations reveal that contrastive learning tends to exacerbate the vulnerability of FedRecs to these attacks. This is attributed to the enhanced embedding uniformity, making the polluted target item embedding easily proximate to popular items. Based on this insight, we propose an enhanced and robust version of CL4FedRec(rCL4FedRec) by introducing a regularizer to maintain the distance among item embeddings with different popularity levels. Extensive experiments conducted on four commonly used recommendation datasets demonstrate that rCL4FedRec significantly enhances both the model's performance and the robustness of FedRecs.
The theory of network science has attracted great interest of many researchers in the realm of biomathematics and public health,and numerous valuable epidemic models have been *** previous studies,it is common to set ...
详细信息
The theory of network science has attracted great interest of many researchers in the realm of biomathematics and public health,and numerous valuable epidemic models have been *** previous studies,it is common to set up a one-to-one correspondence between the nodes of a multi-layer network,ignoring the more complex situations in *** the present work,we explore this situation by setting up a partially coupled model of a two-layer network and investigating the impact of asymptomatic infected individuals on *** propose a self-discovery mechanism for asymptomatic infected individuals,taking into account situations such as nucleic acid testing in the community and individuals performing self-antigen testing during the *** these factors together,through the microscopic Markov chain approach(MMCA)and extensive Monte Carlo(MC)numerical simulations,we find that the greater the coupling between the networks,the more information dissemination is *** order to control the epidemics,more asymptomatic infected individuals should be made aware of their *** adoption of nucleic acid testing and individual adoption of antigenic self-testing can help to contain epidemic ***,the epidemic threshold of the proposed model is derived,and then miscellaneous factors affecting the epidemic threshold are also *** results are conducive to devising the prevention and control policies of pandemics.
Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts,by performing binary *** it remains an unso...
详细信息
Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts,by performing binary *** it remains an unsolved problem and poses a significant threat to the security of cyberspace when various categories of non-steganographic or steganographic texts *** this paper,we propose a general linguistic steganalysis framework named LS-MTL,which introduces the idea of multi-task learning to deal with the classification of various categories of steganographic and non-steganographic ***-MTL captures sensitive linguistic features from multiple related linguistic steganalysis tasks and can concurrently handle diverse tasks with a constructed *** the proposed framework,convolutional neural networks(CNNs)are utilized as private base models to extract sensitive features for each steganalysis ***,a shared CNN is built to capture potential interaction information and share linguistic features among all ***,LS-MTL incorporates the private and shared sensitive features to identify the detected text as steganographic or *** results demonstrate that the proposed framework LS-MTL outperforms the baseline in the multi-category linguistic steganalysis task,while average Acc,Pre,and Rec are increased by 0.5%,1.4%,and 0.4%,*** ablation experimental results show that LS-MTL with the shared module has robust generalization capability and achieves good detection performance even in the case of spare data.
In this article, write-once-read-many-times (WORM) memory behavior of HfZrO (HZO) ferroelectric material is demonstrated. A stoichiometric Hf0.5Zr0.5O2 thin film prepared using a sol-gel process is used as a resistive...
详细信息
This paper investigates the input-to-state stabilization of discrete-time Markov jump systems. A quantized control scheme that includes coding and decoding procedures is proposed. The relationship between the error in...
详细信息
In the digital era, e-platforms ubiquitously deploy recommendation systems, utilizing machine learning paradigms to tailor content according to user preferences and needs. Yet, the integrity of these systems is often ...
详细信息
Airplanes play a critical role in global transportation, ensuring the efficient movement of people and goods. Although generally safe, aviation systems occasionally encounter incidents and accidents that underscore th...
详细信息
Anemia detection using multimodal approaches leverages the integration of multiple data sources, such as imaging, clinical records, and hematological parameters, to improve diagnostic accuracy. Such methods can captur...
详细信息
暂无评论