Securing data transmission in a digital era is a difficult one due to the broad application of the Internet, personal computers, and mobile phones for communication. Traditional video steganography techniques sometime...
详细信息
Tuberculosis (TB) remains a significant global health challenge, especially in remote areas with limited medical resources. Early and accurate diagnosis is crucial to control its spread. This project harnesses high-pe...
详细信息
Detecting sarcasm in social media presents challenges in natural language processing (NLP) due to the informal language, contextual complexities, and nuanced expression of sentiment. Integrating sentiment analysis (SA...
详细信息
Estimating the suitability of individuals for a vocation via leveraging the knowledge within cognitive factors comes with numerous applications: employment resourcing, occupation counseling, and workload management. A...
详细信息
A developing technology that can be highly helpful for both intelligent transportation services and safety and security is the Automobile ad hoc network, or VANET. Nevertheless because of the great mobility and wirele...
详细信息
Asthma diagnosis remains a major clinical concern since it has diverse symptoms and is caused by various contributory causes. Machine learning was applied in this study to solve these complications in order to analyze...
详细信息
Test-time adaptation (TTA) seeks to tackle potential distribution shifts between training and testing data by adapting a given model w.r.t. any testing sample. This task is particularly important when the test environ...
详细信息
Test-time adaptation (TTA) seeks to tackle potential distribution shifts between training and testing data by adapting a given model w.r.t. any testing sample. This task is particularly important when the test environment changes frequently. Although some recent attempts have been made to handle this task, we still face two key challenges: 1) prior methods have to perform backpropagation for each test sample, resulting in unbearable optimization costs to many applications;2) while existing TTA solutions can significantly improve the test performance on out-of-distribution data, they often suffer from severe performance degradation on in-distribution data after TTA (known as catastrophic forgetting). To this end, we have proposed an Efficient Anti-Forgetting Test-Time Adaptation (EATA) method which develops an active sample selection criterion to identify reliable and non-redundant samples for test-time entropy minimization. To alleviate forgetting, EATA introduces a Fisher regularizer estimated from test samples to constrain important model parameters from drastic changes. However, in EATA, the adopted entropy loss consistently assigns higher confidence to predictions even when the samples are underlying uncertain, leading to overconfident predictions that underestimate the data uncertainty. To tackle this, we further propose EATA with Calibration (EATA-C) to separately exploit the reducible model uncertainty and the inherent data uncertainty for calibrated TTA. Specifically, we compare the divergence between predictions from the full network and its sub-networks to measure the reducible model uncertainty, on which we propose a test-time uncertainty reduction strategy with divergence minimization loss to encourage consistent predictions instead of overconfident ones. To further re-calibrate predicting confidence on different samples, we utilize the disagreement among predicted labels as an indicator of the data uncertainty. Based on this, we devise a min-max entropy
The Traffic Analysis System utilizes machine learning for real-time traffic insights at a junction. It provides instant stats like vehicle count, density, and FPS, while summarizing average vehicle crossings, densitie...
详细信息
Integrating autonomous vehicles (AVs) within our transportation ecosystem presents exciting possibilities and introduces intricate challenges. Systemic failures due to cyberattacks on AVs could have far-reaching conse...
详细信息
According to the boot process of modern computer systems,whoever boots first will gain control *** advantage of this feature,a malicious code called bootkit can hijack the control before the OS bootloader and bypass s...
详细信息
According to the boot process of modern computer systems,whoever boots first will gain control *** advantage of this feature,a malicious code called bootkit can hijack the control before the OS bootloader and bypass security mechanisms in boot *** makes bootkits difficult to detect or clean up *** the improvement of security mechanisms and the emergence of UEFI,the attack and defense techniques for bootkits have constantly been *** first introduce two boot modes of modern computer systems and present an attack model of bootkits by some sophistical *** we discuss some classic attack techniques used by bootkits from their initial appearance to the present on two axes,including boot mode axis and attack phase ***,we evaluate the race to the bottom of the system and the evolution process between bootkits and security *** last,we present the possible future direction for bootkits in the context of continuous improvement of OS and firmware security mechanisms.
暂无评论