Group activities are becoming more and more common on the Internet in the big data environment. Which makes many scholars focus on how to recommend items or activities to a group. However, conventional recommendation ...
详细信息
In recent years, with the rapid development of deep learning and computer vision technology, the forgery technology of images and videos has become increasingly mature, posing new challenges to information security an...
详细信息
Graffiti detection is essential in historic building protection and urban neighborhood management. Graffiti detection has made significant progress in recent years based on the development of deep learning. However, s...
详细信息
Long-tailed semi-supervised learning poses a significant challenge in training models with limited labeled data exhibiting a long-tailed label distribution. Current state-of-the-art LTSSL approaches heavily rely on hi...
This paper introduces a new one-dimensional chaotic system and a new image encryption algorithm. Firstly, the new chaotic system is analyzed. The bifurcation diagram and Lyapunov exponent show that the system has stro...
详细信息
Secret sharing (SS) is a threshold technology that shares a secret value by generating and distributing n shares in the way that a set of any k shares can recover the secret. On the other hand, blockchain is a decentr...
详细信息
Deep learning (DL) techniques hold immense promise for revolutionizing medical diagnostics, including brain tumor detection. Detecting malignancies in the brain is fraught with challenges that carry critical implicati...
详细信息
AI is black-box and non-explainable, in other words, due to the complexity of the decision-making process of AI, people are unable to know why and how AI makes the decision. For these reasons, people will question and...
详细信息
This paper addresses the issue of creating and applying mathematical models and methods for finding generalized solutions when working with structured collections of 'big data'. We reviewed the modern methodol...
详细信息
With the widespread application of blockchain technology, various range proof protocols based on zero-knowledge proofs have been proposed. However, existing range proof protocols suffer from issues such as high commun...
详细信息
暂无评论