Deep learning methods have played a prominent role in the development of computer visualization in recent years. Hyperspectral imaging (HSI) is a popular analytical technique based on spectroscopy and visible imaging ...
详细信息
The Internet of Things (IoT), which enables seamless connectivity and effective data exchange between physical items and digital systems, has completely changed the way we interact with our surroundings. This study ev...
详细信息
Federated Learning(FL),as an emergent paradigm in privacy-preserving machine learning,has garnered significant interest from scholars and engineers across both academic and industrial *** its innovative approach to mo...
详细信息
Federated Learning(FL),as an emergent paradigm in privacy-preserving machine learning,has garnered significant interest from scholars and engineers across both academic and industrial *** its innovative approach to model training across distributed networks,FL has its vulnerabilities;the centralized server-client architecture introduces risks of single-point ***,the integrity of the global model—a cornerstone of FL—is susceptible to compromise through poisoning attacks by malicious *** attacks and the potential for privacy leakage via inference starkly undermine FL’s foundational privacy and security *** these reasons,some participants unwilling use their private data to train a model,which is a bottleneck in the development and industrialization of federated *** technology,characterized by its decentralized ledger system,offers a compelling solution to these *** inherently prevents single-point failures and,through its incentive mechanisms,motivates participants to contribute computing ***,blockchain-based FL(BCFL)emerges as a natural progression to address FL’s *** study begins with concise introductions to federated learning and blockchain technologies,followed by a formal analysis of the specific problems that FL *** discusses the challenges of combining the two technologies and presents an overview of the latest cryptographic solutions that prevent privacy leakage during communication and incentives in *** addition,this research examines the use of BCFL in various fields,such as the Internet of Things and the Internet of ***,it assesses the effectiveness of these solutions.
SaaS (Software-as-a-Service) is a service model provided by cloud computing. It has a high requirement for QoS (Quality of Software) due to its method of providing software service. However, manual identification and ...
详细信息
SaaS (Software-as-a-Service) is a service model provided by cloud computing. It has a high requirement for QoS (Quality of Software) due to its method of providing software service. However, manual identification and diagnosis for performance issues is typically expensive and laborious because of the complexity of the application software and the dynamic nature of the deployment environment. Recently, substantial research efforts have been devoted to automatically identifying and diagnosing performance issues of SaaS software. In this survey, we comprehensively review the different methods about automatically identifying and diagnosing performance issues of SaaS software. We divide them into three steps according to their function: performance log generation, performance issue identification and performance issue diagnosis. We then comprehensively review these methods by their development history. Meanwhile, we give our proposed solution for each step. Finally, the effectiveness of our proposed methods is shown by experiments.
Along with the progression of Internet of Things(IoT)technology,network terminals are becoming continuously more *** has been widely applied in various scenarios,including urban infrastructure,transportation,industry,...
详细信息
Along with the progression of Internet of Things(IoT)technology,network terminals are becoming continuously more *** has been widely applied in various scenarios,including urban infrastructure,transportation,industry,personal life,and other socio-economic *** introduction of deep learning has brought new security challenges,like an increment in abnormal traffic,which threatens network *** feature extraction leads to less accurate classification *** abnormal traffic detection,the data of network traffic is high-dimensional and *** data not only increases the computational burden of model training but also makes information extraction more *** address these issues,this paper proposes an MD-MRD-ResNeXt model for abnormal network traffic *** fully utilize the multi-scale information in network traffic,a Multi-scale Dilated feature extraction(MD)block is *** module can effectively understand and process information at various scales and uses dilated convolution technology to significantly broaden the model’s receptive *** proposed Max-feature-map Residual with Dual-channel pooling(MRD)block integrates the maximum feature map with the residual *** module ensures the model focuses on key information,thereby optimizing computational efficiency and reducing unnecessary information *** results show that compared to the latest methods,the proposed abnormal traffic detection model improves accuracy by about 2%.
Offline handwritten mathematical expression recognition is a challenging optical character recognition(OCR)task due to various ambiguities of handwritten symbols and complicated two-dimensional *** work in this area u...
详细信息
Offline handwritten mathematical expression recognition is a challenging optical character recognition(OCR)task due to various ambiguities of handwritten symbols and complicated two-dimensional *** work in this area usually constructs deeper and deeper neural networks trained with end-to-end approaches to improve the ***,the higher the complexity of the network,the more the computing resources and time *** improve the performance without more computing requirements,we concentrate on the training data and the training strategy in this *** propose a data augmentation method which can generate synthetic samples with new LaTeX notations by only using the official training data of ***,we propose a novel training strategy called Shuffled Multi-Round Training(SMRT)to regularize the *** the generated data and the shuffled multi-round training strategy,we achieve the state-of-the-art result in expression accuracy,i.e.,59.74%and 61.57%on CROHME 2014 and 2016,respectively,by using attention-based encoder-decoder models for offline handwritten mathematical expression recognition.
Capacitive pressure sensors (CPSs) have attracted considerable interest due to their high sensitivity, low energy consumption, and potential for miniaturization, making them suitable for applications in automotive sys...
详细信息
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing huma...
详细信息
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing human users from automated ***-based CAPTCHAs,designed to be easily decipherable by humans yet challenging for machines,are a common form of this ***,advancements in deep learning have facilitated the creation of models adept at recognizing these text-based CAPTCHAs with surprising *** our comprehensive investigation into CAPTCHA recognition,we have tailored the renowned UpDown image captioning model specifically for this *** approach innovatively combines an encoder to extract both global and local features,significantly boosting the model’s capability to identify complex details within CAPTCHA *** the decoding phase,we have adopted a refined attention mechanism,integrating enhanced visual attention with dual layers of Long Short-Term Memory(LSTM)networks to elevate CAPTCHA recognition *** rigorous testing across four varied datasets,including those from Weibo,BoC,Gregwar,and Captcha 0.3,demonstrates the versatility and effectiveness of our *** results not only highlight the efficiency of our approach but also offer profound insights into its applicability across different CAPTCHA types,contributing to a deeper understanding of CAPTCHA recognition technology.
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy conce...
详细信息
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy concerns within smart ***,existing methods struggle with efficiency and security when processing large-scale *** efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent *** paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data *** approach optimizes data preprocessing,integrates Long Short-Term Memory(LSTM)networks for handling time-series data,and employs homomorphic encryption to safeguard user *** also explores the application of Boneh Lynn Shacham(BLS)signatures for user *** proposed scheme’s efficiency,security,and privacy protection capabilities are validated through rigorous security proofs and experimental analysis.
Imposing data-driven with physical laws for user activity prediction could effectively solve various physical problems such as smart care, surveillance, and human-robot. In the growing field of artificial intelligence...
详细信息
Imposing data-driven with physical laws for user activity prediction could effectively solve various physical problems such as smart care, surveillance, and human-robot. In the growing field of artificial intelligence, the application of activity prediction based on the physical coupled hidden Markov model (CHMM) and tensor theory with physical properties has attracted increasing attentions. However, existing CHMMs usually only consider the time-series characteristic of data, while ignoring physical characteristics of user activity such as periodicity, timing, and correlation. Moreover, they are all matrix-based models, which could not holistically analyze the dependencies among physical states. The aforementioned disadvantages lead to lower prediction accuracy of the CHMM. To remove these disadvantages, three physics-informed tensor-based CHMMs are first constructed by incorporating prior physical knowledge. Then, the corresponding forward-backward algorithms are designed for resolving the evaluation problem of the CHMM. These algorithms could overall model multiple physical features by imposing physics and prior knowledge into the CHMM during training to improve the precision of probabilistic computing. The algorithms reduce the dependence of the model on training data by adding physical features. Finally, the comparative experiments show that our algorithms have better performances than existing prediction methods in precision and efficiency. In addition, further self-comparison experiments verify that our algorithms are effective and practical. Impact Statement-Through the analysis of users' behavior habits, consumption habits, preferences, etc., users? potential needs may be discovered. This discovery could help predict users' activities. If a waiter predicts the user's next activity. He gives her/him unexpected services to meet users' next needs. Obviously, it would significantly improve user satisfaction. In addition, connecting the front and rear products co
暂无评论