In recent years, the combination of deep reinforcement learning and unmanned aerial vehicle (UAV) to achieve autonomous flight has been a hot research field. In this paper, an obstacle avoidance navigation algorithm (...
详细信息
Data augmentation plays an important role in training deep neural model by expanding the size and diversity of the ***,data augmentation mainly involved some simple transformations of ***,in order to increase the dive...
详细信息
Data augmentation plays an important role in training deep neural model by expanding the size and diversity of the ***,data augmentation mainly involved some simple transformations of ***,in order to increase the diversity and complexity of data,more advanced methods appeared and evolved to sophisticated generative ***,these methods required a mass of computation of training or *** this paper,a novel training-free method that utilises the Pre-Trained Segment Anything Model(SAM)model as a data augmentation tool(PTSAM-DA)is proposed to generate the augmented annotations for *** the need for training,it obtains prompt boxes from the original annotations and then feeds the boxes to the pre-trained SAM to generate diverse and improved *** this way,annotations are augmented more ingenious than simple manipulations without incurring huge computation for training a data augmentation *** comparative experiments on three datasets are conducted,including an in-house dataset,ADE20K and *** this in-house dataset,namely Agricultural Plot Segmentation Dataset,maximum improvements of 3.77%and 8.92%are gained in two mainstream metrics,mIoU and mAcc,***,large vision models like SAM are proven to be promising not only in image segmentation but also in data augmentation.
The field of sequential recommendation plays a crucial role in personalized recommendation systems, aiming to model users' past interactions and predict their future interactions with items or behaviors. Tradition...
详细信息
Multi-person pose estimation based on monocular cameras is one of the hot research topics in computer vision. Current monocular multi-person 3D pose estimation methods often treat individuals as independent entities f...
详细信息
The Corona Virus Disease 2019(COVID-19)effect has made telecommuting and remote learning the *** growing number of Internet-connected devices provides cyber attackers with more attack *** development of malware by cri...
详细信息
The Corona Virus Disease 2019(COVID-19)effect has made telecommuting and remote learning the *** growing number of Internet-connected devices provides cyber attackers with more attack *** development of malware by criminals also incorporates a number of sophisticated obfuscation techniques,making it difficult to classify and detect malware using conventional ***,this paper proposes a novel visualization-based malware classification system using transfer and ensemble learning(VMCTE).VMCTE has a strong anti-interference *** if malware uses obfuscation,fuzzing,encryption,and other techniques to evade detection,it can be accurately classified into its corresponding malware *** traditional dynamic and static analysis techniques,VMCTE does not require either reverse engineering or the aid of domain expert *** proposed classification system combines three strong deep convolutional neural networks(ResNet50,MobilenetV1,and MobilenetV2)as feature extractors,lessens the dimension of the extracted features using principal component analysis,and employs a support vector machine to establish the classification *** semantic representations of malware images can be extracted using various convolutional neural network(CNN)architectures,obtaining higher-quality features than traditional *** fine-tuned and non-fine-tuned classification models based on transfer learning can greatly enhance the capacity to classify various families *** experimental findings on the Malimg dataset demonstrate that VMCTE can attain 99.64%,99.64%,99.66%,and 99.64%accuracy,F1-score,precision,and recall,respectively.
Many topics in pattern recognition and machine learning, such as subspace learning, image restoration, background modeling, can be viewed as the matrix decomposing problem. Double nuclear norm-based matrix decompositi...
详细信息
Unsupervised feature selection attempts to select a small number of discriminative features from original high-dimensional data and preserve the intrinsic data structure without using data labels. As an unsupervised l...
详细信息
Unsupervised feature selection attempts to select a small number of discriminative features from original high-dimensional data and preserve the intrinsic data structure without using data labels. As an unsupervised learning task, most previous methods often use a coefficient matrix for feature reconstruction or feature projection, and a certain similarity graph is widely utilized to regularize the intrinsic structure preservation of original data in a new feature space. However, a similarity graph with poor quality could inevitably afect the final results. In addition, designing a rational and efective feature reconstruction/projection model is not easy. In this paper, we introduce a novel and efective unsupervised feature selection method via multiple graph fusion and feature weight learning(MGF2WL) to address these issues. Instead of learning the feature coefficient matrix, we directly learn the weights of diferent feature dimensions by introducing a feature weight matrix, and the weighted features are projected into the label space. Aiming to exploit sufficient relation of data samples, we develop a graph fusion term to fuse multiple predefined similarity graphs for learning a unified similarity graph, which is then deployed to regularize the local data structure of original data in a projected label space. Finally, we design a block coordinate descent algorithm with a convergence guarantee to solve the resulting optimization problem. Extensive experiments with sufficient analyses on various datasets are conducted to validate the efficacy of our proposed MGF2WL.
Several newly developed techniques and tools for manipulating images, audio, and videos have been introduced as an outcome of the recent and rapid breakthroughs in AI, machine learning, and deep learning. While most a...
详细信息
Drones have become an indispensable tool in our daily lives. While fixed-wing and rotary-wing drones are common types, each comes with its own set of advantages and disadvantages. Hybrid drones, however, combine the s...
详细信息
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov...
详细信息
暂无评论