The pixel-wise dense prediction tasks based on weakly supervisions currently use Class Attention Maps(CAMs)to generate pseudo masks as ***,existing methods often incorporate trainable modules to expand the immature cl...
详细信息
The pixel-wise dense prediction tasks based on weakly supervisions currently use Class Attention Maps(CAMs)to generate pseudo masks as ***,existing methods often incorporate trainable modules to expand the immature class activation maps,which can result in significant computational overhead and complicate the training *** this work,we investigate the semantic structure information concealed within the CNN network,and propose a semantic structure aware inference(SSA)method that utilizes this information to obtain high-quality CAM without any additional training ***,the semantic structure modeling module(SSM)is first proposed to generate the classagnostic semantic correlation representation,where each item denotes the affinity degree between one category of objects and all the ***,the immature CAM are refined through a dot product operation that utilizes semantic structure ***,the polished CAMs from different backbone stages are fused as the *** advantage of SSA lies in its parameter-free nature and the absence of additional training costs,which makes it suitable for various weakly supervised pixel-dense prediction *** conducted extensive experiments on weakly supervised object localization and weakly supervised semantic segmentation,and the results confirm the effectiveness of SSA.
Demand response has recently become an essential means for businesses to reduce production costs in industrial ***,the current industrial chain structure has also become increasingly complex,forming new characteristic...
详细信息
Demand response has recently become an essential means for businesses to reduce production costs in industrial ***,the current industrial chain structure has also become increasingly complex,forming new characteristics of multiplex networked industrial *** in real-time electricity prices in demand response propagate through the coupling and cascading relationships within and among these network layers,resulting in negative impacts on the overall energy management ***,existing demand response methods based on reinforcement learning typically focus only on individual agents without considering the influence of dynamic factors on intra and inter-network *** paper proposes a Layered Temporal Spatial Graph Attention(LTSGA)reinforcement learning algorithm suitable for demand response in multiplex networked industrial chains to address this *** algorithm first uses Long Short-Term Memory(LSTM)to learn the dynamic temporal characteristics of electricity prices for ***,LTSGA incorporates a layered spatial graph attention model to evaluate the impact of dynamic factors on the complex multiplex networked industrial chain *** demonstrate that the proposed LTSGA approach effectively characterizes the influence of dynamic factors on intra-and inter-network relationships within the multiplex industrial chain,enhancing convergence speed and algorithm performance compared with existing state-of-the-art algorithms.
Constructing an effective common latent embedding by aligning the latent spaces of cross-modal variational autoencoders(VAEs) is a popular strategy for generalized zero-shot learning(GZSL). However, due to the lac...
详细信息
Constructing an effective common latent embedding by aligning the latent spaces of cross-modal variational autoencoders(VAEs) is a popular strategy for generalized zero-shot learning(GZSL). However, due to the lack of fine-grained instance-wise annotations, existing VAE methods can easily suffer from the posterior collapse problem. In this paper, we propose an innovative asymmetric VAE network by aligning enhanced feature representation(AEFR) for GZSL. Distinguished from general VAE structures, we designed two asymmetric encoders for visual and semantic observations and one decoder for visual reconstruction. Specifically, we propose a simple yet effective gated attention mechanism(GAM) in the visual encoder for enhancing the information interaction between observations and latent variables, alleviating the possible posterior collapse problem effectively. In addition, we propose a novel distributional decoupling-based contrastive learning(D2-CL) to guide learning classification-relevant information while aligning the representations at the taxonomy level in the latent representation space. Extensive experiments on publicly available datasets demonstrate the state-of-the-art performance of our method. The source code is available at https://***/seeyourmind/AEFR.
Implementing quantum wireless multi-hop network communication is essential to improve the global quantum network system. In this paper, we employ eight-level GHZ states as quantum channels to realize multi-hop quantum...
详细信息
Implementing quantum wireless multi-hop network communication is essential to improve the global quantum network system. In this paper, we employ eight-level GHZ states as quantum channels to realize multi-hop quantum communication, and utilize the logical relationship between the measurements of each node to derive the unitary operation performed by the end node. The hierarchical simultaneous entanglement switching(HSES) method is adopted, resulting in a significant reduction in the consumption of classical information compared to multi-hop quantum teleportation(QT)based on general simultaneous entanglement switching(SES). In addition, the proposed protocol is simulated on the IBM Quantum Experiment platform(IBM QE). Then, the data obtained from the experiment are analyzed using quantum state tomography, which verifies the protocol's good fidelity and accuracy. Finally, by calculating fidelity, we analyze the impact of four different types of noise(phase-damping, amplitude-damping, phase-flip and bit-flip) in this protocol.
The proliferation of internet traffic encryption has become a double-edged sword. While it significantly enhances user privacy, it also inadvertently shields cyber-attacks from detection, presenting a formidable chall...
详细信息
The proliferation of internet traffic encryption has become a double-edged sword. While it significantly enhances user privacy, it also inadvertently shields cyber-attacks from detection, presenting a formidable challenge to cybersecurity. Traditional machine learning and deep learning techniques often fall short in identifying encrypted malicious traffic due to their inability to fully extract and utilize the implicit relational and positional information embedded within data packets. This limitation has led to an unresolved challenge in the cybersecurity community: how to effectively extract valuable insights from the complex patterns of traffic packet transmission. Consequently, this paper introduces the TB-Graph model, an encrypted malicious traffic classification model based on a relational graph attention network. The model is a heterogeneous traffic burst graph that embeds side-channel features, which are unaffected by encryption, into the graph nodes and connects them with three different types of burst edges. Subsequently, we design a relational positional coding that prevents the loss of temporal relationships between the original traffic flows during graph transformation. Ultimately, TB-Graph leverages the powerful graph representation learning capabilities of Relational Graph Attention Network (RGAT) to extract latent behavioral features from the burst graph nodes and edge relationships. Experimental results show that TB-Graph outperforms various state-of-the-art methods in fine-grained encrypted malicious traffic classification tasks on two public datasets, indicating its enhanced capability for identifying encrypted malicious traffic.
The data asset is emerging as a crucial component in both industrial and commercial *** valuable knowledge from the data benefits decision-making and ***,the usage of data assets raises tension between sensitive infor...
详细信息
The data asset is emerging as a crucial component in both industrial and commercial *** valuable knowledge from the data benefits decision-making and ***,the usage of data assets raises tension between sensitive information protection and value *** an emerging machine learning paradigm,Federated Learning(FL)allows multiple clients to jointly train a global model based on their data without revealing *** approach harnesses the power of multiple data assets while ensuring their *** the benefits,it relies on a central server to manage the training process and lacks quantification of the quality of data assets,which raises privacy and fairness *** this work,we present a novel framework that combines Federated Learning and Blockchain by Shapley value(FLBS)to achieve a good trade-off between privacy and ***,we introduce blockchain in each training round to elect aggregation and evaluation nodes for training,enabling decentralization and contribution-aware incentive distribution,with these nodes functionally separated and able to supervise each *** experimental results validate the effectiveness of FLBS in estimating contribution even in the presence of heterogeneity and noisy data.
Nowadays, online reviews have a significant impact on customers who purchase products or evaluate services, as well as merchants who do business. Unfortunately, there are a lot of fake reviews included in them, which ...
详细信息
Self-healing group key distribution (SGKD) protocols guarantee the security of group communications by allowing authorized users to independently recover missed previous session keys from the current broadcast without...
详细信息
In physical-layer secret key generation, key generation performance is susceptible to hardware impairments (HIs), which can degrade channel reciprocity. Additionally, the security of loop-back mechanism based schemes ...
详细信息
Privacy-preserving statistical analysis enables the data center to analyze datasets from multiple data owners, extracting valuable insights while safeguarding privacy. However, the observation of microdata involvement...
详细信息
暂无评论