When some application scenarios need to use semantic segmentation technology, like automatic driving, the primary concern comes to real-time performance rather than extremely high segmentation accuracy. To achieve a g...
详细信息
Large language models (LLMs) demonstrate significant generative capabilities but often face ethical alignment and robustness challenges. Conventional alignment methods rely on extensive human-annotated data and requir...
详细信息
It is often the case that data are with multiple views in real-world applications. Fully exploring the information of each view is significant for making data more representative. However, due to various limitations a...
详细信息
Cloud-based infrastructures often leverage virtualization, but its implementation can be expensive. Traditional coding methods can lead to issues when transitioning code from one computing environment to another. In r...
详细信息
Research on 3D representation has sprung up recently. However, most existing view-based methods lack interpretability and few researchers explore to mine high-order correlation for multi-view features aggregate in 3D ...
详细信息
This article proposes a technique to create a pothole detection system that can operate both during the day and at night. This model was developed using the real-time object identification YOLO (You Only Look Once) te...
详细信息
Opinion target extraction (OTE) or aspect extraction (AE) is a fundamental task in opinion mining that aims to extract the targets (or aspects) on which opinions have been expressed. Recent work focus on cross-domain ...
详细信息
Federated Learning (FL) has emerged as a game-changing method for training machine learning (ML) models on decentralized data sources without centralizing the data itself. Conventional FL algorithms frequently exhibit...
详细信息
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things(IoT)cloud to improve transmission efficiency,which has created a novel paradigm for improving t...
详细信息
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things(IoT)cloud to improve transmission efficiency,which has created a novel paradigm for improving the speed of common connected objects in ***,although it makes it easier for ubiquitous resource-constrained equipment that outsources computing tasks to achieve high-speed transmission services,security concerns,such as a lack of reliability and collusion attacks,still exist in the outsourcing *** this paper,we propose a reliable,anti-collusion outsourcing computation and verification protocol,which uses distributed storage solutions in response to the issue of centralized storage,leverages homomorphic encryption to deal with outsourcing computation and ensures data ***,we embed outsourcing computation results and a novel polynomial factorization algorithm into the smart contract of Ethereum,which not only enables the verification of the outsourcing result without a trusted third party but also resists collusion *** results of the theoretical analysis and experimental performance evaluation demonstrate that the proposed protocol is secure,reliable,and more effective compared with state-of-the-art approaches.
Background information is very important for news reading and understanding, especially with today's rapid new media development for news production and consumption. When researchers actively develop tools to auto...
详细信息
暂无评论