Text-driven human motion generation is gaining momentum lately thanks to its great potential in shaping the new pathway of interactive computer graphics in the era of AI. Despite the enormous efforts made so far, exis...
详细信息
Hierarchical clustering algorithms that provide tree-shaped results can be regarded as data summarization and thus play an important role in the application of knowledge discovery and data mining. However, such struct...
详细信息
Driving scene topology reasoning aims to understand the objects present in the current road scene and model their topology relationships to provide guidance information for downstream tasks. Previous approaches fail t...
详细信息
Federated learning(FL)is a decentralized machine learning paradigm,which has significant advantages in protecting data privacy[1].However,FL is vulnerable to poisoning attacks that malicious participants perform attac...
详细信息
Federated learning(FL)is a decentralized machine learning paradigm,which has significant advantages in protecting data privacy[1].However,FL is vulnerable to poisoning attacks that malicious participants perform attacks by injecting dirty data or abnormal model parameters during the local model training and aim to manipulate the performance of the global model[2].
Sleep posture identification is crucial for accurately assessing sleep quality and diagnosing related diseases. In the realm of non-intrusive sleep monitoring, non-contact technologies are becoming increasingly mainst...
详细信息
An eight-partition of a finite set of points (respectively, of a continuous mass distribution) in R3 consists of three planes that divide the space into 8 octants, such that each open octant contains at most 1/8 of th...
详细信息
This study investigated the characteristics of data clumps in UML class diagrams. Data clumps are group of variables which appear together in multiple locations. In this study we compared the data clumps characteristi...
详细信息
In recent years,with the great success of pre-trained language models,the pre-trained BERT model has been gradually applied to the field of source code ***,the time cost of training a language model from zero is very ...
详细信息
In recent years,with the great success of pre-trained language models,the pre-trained BERT model has been gradually applied to the field of source code ***,the time cost of training a language model from zero is very high,and how to transfer the pre-trained language model to the field of smart contract vulnerability detection is a hot research direction at *** this paper,we propose a hybrid model to detect common vulnerabilities in smart contracts based on a lightweight pre-trained languagemodel BERT and connected to a bidirectional gate recurrent *** downstream neural network adopts the bidirectional gate recurrent unit neural network model with a hierarchical attention mechanism to mine more semantic features contained in the source code of smart contracts by using their *** experiments show that our proposed hybrid neural network model SolBERT-BiGRU-Attention is fitted by a large number of data samples with smart contract vulnerabilities,and it is found that compared with the existing methods,the accuracy of our model can reach 93.85%,and the Micro-F1 Score is 94.02%.
With the extensive application of deep learning, neural network-based Visual Inertial Odometry (VIO) has demonstrated significantly better performance than traditional geometric VIO. Deep learning-based VIO fuses info...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny *** it comes to deploying IoT,everyone agrees that security is the biggest *** is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square *** research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted *** lightweight cryptography,the information sent between these gadgets may be *** order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance *** also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.
暂无评论