The Access control scheme is an effective method to protect user data *** access control scheme based on blockchain and ciphertext policy attribute encryption(CP–ABE)can solve the problems of single—point of failure...
详细信息
The Access control scheme is an effective method to protect user data *** access control scheme based on blockchain and ciphertext policy attribute encryption(CP–ABE)can solve the problems of single—point of failure and lack of trust in the centralized ***,it also brings new problems to the health information in the cloud storage environment,such as attribute leakage,low consensus efficiency,complex permission updates,and so *** paper proposes an access control scheme with fine-grained attribute revocation,keyword search,and traceability of the attribute private key distribution *** technology tracks the authorization of attribute private *** credit scoring method improves the Raft protocol in consensus ***,the interplanetary file system(IPFS)addresses the capacity deficit of *** the premise of hiding policy,the research proposes a fine-grained access control method based on users,user attributes,and file *** optimizes the data-sharing *** the same time,Proxy Re-Encryption(PRE)technology is used to update the access *** proposed scheme proved to be *** analysis and experimental results show that the proposed scheme has higher efficiency and more *** can meet the needs of medical institutions.
Effective communication is crucial for promoting team cooperation in multi-agent reinforcement learning tasks. Human intention plays a key role in facilitating effective communication, driving individuals to communica...
详细信息
Accurate localization ability is fundamental in autonomous driving. Traditional visual localization frameworks approach the semantic map-matching problem with geometric models, which rely on complex parameter tuning a...
详细信息
Accurate localization ability is fundamental in autonomous driving. Traditional visual localization frameworks approach the semantic map-matching problem with geometric models, which rely on complex parameter tuning and thus hinder large-scale deployment. In this paper, we propose BEV-Locator: an end-to-end visual semantic localization neural network using multi-view camera images. Specifically, a visual BEV(bird-eye-view) encoder extracts and flattens the multi-view images into BEV space. While the semantic map features are structurally embedded as map query sequences. Then a cross-model transformer associates the BEV features and semantic map queries. The localization information of ego-car is recursively queried out by cross-attention modules. Finally, the ego pose can be inferred by decoding the transformer outputs. This end-to-end model speaks to its broad applicability across different driving environments, including high-speed scenarios. We evaluate the proposed method in large-scale nuScenes and Qcraft datasets. The experimental results show that the BEV-Locator is capable of estimating the vehicle poses under versatile scenarios, which effectively associates the cross-model information from multi-view images and global semantic maps. The experiments report satisfactory accuracy with mean absolute errors of 0.052 m, 0.135 m and 0.251° in lateral, longitudinal translation and heading angle degree.
With the popularization and development of social software, more and more people join the social network, which produces a lot of valuable information, but also contains plenty of sensitive privacy information. To ach...
详细信息
With the popularization and development of social software, more and more people join the social network, which produces a lot of valuable information, but also contains plenty of sensitive privacy information. To achieve the personalized privacy protection of massive social network relational data, a privacy enhancement method for social networks relational data based on personalized differential privacy is proposed. And a dimensionality reduction segmentation sampling(DRS-S)algorithm is proposed to implement this method. First, in order to solve the problem of inefficiency caused by the excessive amount of data in social networks, dimension reduction and segmentation are carried out to divide the data into groups. According to the privacy protection requirements of different users, we adopt sampling method to protect users with different privacy requirements at different levels, so as to realize personalized different privacy. After that, the noise is added to the protected data to satisfy the privacy budget. Then publish the social network data. Finally, the proposed algorithm is compared with the traditional personalized differential privacy(PDP) algorithm and privacy preserving approach based on clustering and noise(PBCN) in real data set, the experimental results demonstrate that the quality of privacy protection and data availability of DRS-S are better than that of PDP algorithm and PBCN algorithm.
Air pollution is a severe environmental problem in urban *** air quality prediction can help governments and individuals make proper decisions to cope with potential air *** a classic time series forecasting model,the...
详细信息
Air pollution is a severe environmental problem in urban *** air quality prediction can help governments and individuals make proper decisions to cope with potential air *** a classic time series forecasting model,the AutoRegressive Integrated Moving Average(ARIMA)has been widely adopted in air quality ***,because of the volatility of air quality and the lack of additional context information,i.e.,the spatial relationships among monitor stations,traditional ARIMA models suffer from unstable prediction *** some deep networks can achieve higher accuracy,a mass of training data,heavy computing,and time cost are *** this paper,we propose a hybrid model to simultaneously predict seven air pollution indicators from multiple monitoring *** proposed model consists of three components:(1)an extended ARIMA to predict matrix series of multiple air quality indicators from several adjacent monitoring stations;(2)the Empirical Mode Decomposition(EMD)to decompose the air quality time series data into multiple smooth sub-series;and(3)the truncated Singular Value Decomposition(SvD)to compress and denoise the expanded *** results on the public dataset show that our proposed model outperforms the state-of-art air quality forecasting models in both accuracy and time cost.
A credit risk prediction model named KM-ADASYN-TL-FLLightGBM(KADT-FLightGBM)is proposed in this ***,to overcome the limitation of traditional sampling methods in dealing with imbalanced datasets,an improved ADASYN sam...
详细信息
A credit risk prediction model named KM-ADASYN-TL-FLLightGBM(KADT-FLightGBM)is proposed in this ***,to overcome the limitation of traditional sampling methods in dealing with imbalanced datasets,an improved ADASYN sampling with K-means clustering algorithm is ***,the Tomek Links method is used to filter the generated ***,an utilized an optimized LightGBM algorithm with the Focal Loss is employed to training the model using the datasets obtained by the improved ADASYN ***,the comparative analysis between the ensemble model and other different sampling methodologies is conducted on the Lending Club *** results demonstrate that the proposed model effectively minimizes the misclassification of minority classes in credit risk prediction and can be used as a reference for similar studies.
At present,the entity and relation joint extraction task has attracted more and more scholars'attention in the field of natural language processing(NLP).However,most of their methods rely on NLP tools to construct...
详细信息
At present,the entity and relation joint extraction task has attracted more and more scholars'attention in the field of natural language processing(NLP).However,most of their methods rely on NLP tools to construct dependency trees to obtain sentence structure *** adjacency matrix constructed by the dependency tree can convey syntactic *** trees obtained through NLP tools are too dependent on the tools and may not be very accurate in contextual semantic *** the same time,a large amount of irrelevant information will cause *** paper presents a novel end-to-end entity and relation joint extraction based on the multihead attention graph convolutional network model(MAGCN),which does not rely on external *** generates an adjacency matrix through a multi-head attention mechanism to form an attention graph convolutional network model,uses head selection to identify multiple relations,and effectively improve the prediction result of overlapping *** authors extensively experiment and prove the method's effectiveness on three public datasets:NYT,WebNLG,and *** results show that the authors’method outperforms the state-of-the-art research results for the task of entities and relation extraction.
Knowledge distillation,as a pivotal technique in the field of model compression,has been widely applied across various ***,the problem of student model performance being limited due to inherent biases in the teacher m...
详细信息
Knowledge distillation,as a pivotal technique in the field of model compression,has been widely applied across various ***,the problem of student model performance being limited due to inherent biases in the teacher model during the distillation process still *** address the inherent biases in knowledge distillation,we propose a de-biased knowledge distillation framework tailored for binary classification *** the pre-trained teacher model,biases in the soft labels are mitigated through knowledge infusion and label de-biasing *** on this,a de-biased distillation loss is introduced,allowing the de-biased labels to replace the soft labels as the fitting target for the student *** approach enables the student model to learn from the corrected model information,achieving high-performance deployment on lightweight student *** conducted on multiple real-world datasets demonstrate that deep learning models compressed under the de-biased knowledge distillation framework significantly outperform traditional response-based and feature-based knowledge distillation models across various evaluation metrics,highlighting the effectiveness and superiority of the de-biased knowledge distillation framework in model compression.
Speech emotion recognition(SER)uses acoustic analysis to find features for emotion recognition and examines variations in voice that are caused by *** number of features acquired with acoustic analysis is extremely hi...
详细信息
Speech emotion recognition(SER)uses acoustic analysis to find features for emotion recognition and examines variations in voice that are caused by *** number of features acquired with acoustic analysis is extremely high,so we introduce a hybrid filter-wrapper feature selection algorithm based on an improved equilibrium optimizer for constructing an emotion recognition *** proposed algorithm implements multi-objective emotion recognition with the minimum number of selected features and maximum ***,we use the information gain and Fisher Score to sort the features extracted from ***,we employ a multi-objective ranking method to evaluate these features and assign different importance to *** with high rankings have a large probability of being ***,we propose a repair strategy to address the problem of duplicate solutions in multi-objective feature selection,which can improve the diversity of solutions and avoid falling into local *** random forest and K-nearest neighbor classifiers,four English speech emotion datasets are employed to test the proposed algorithm(MBEO)as well as other multi-objective emotion identification *** results illustrate that it performs well in inverted generational distance,hypervolume,Pareto solutions,and execution time,and MBEO is appropriate for high-dimensional English SER.
Current methods for Music Emotion Recognition (MER) face challenges in effectively extracting features sensitive to emotions, especially those rich in temporal detail. Moreover, the narrow scope of music-related modal...
详细信息
暂无评论