Recently, Multimodal Learning (MML) has gained significant interest as it compensates for single-modality limitations through comprehensive complementary information within multimodal data. However, traditional MML me...
详细信息
With the rapid development of information technology,IoT devices play a huge role in physiological health data *** exponential growth of medical data requires us to reasonably allocate storage space for cloud servers ...
详细信息
With the rapid development of information technology,IoT devices play a huge role in physiological health data *** exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge *** storage capacity of edge nodes close to users is *** should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging *** paper proposes a redundant data detection method that meets the privacy protection *** scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot *** has the same effect as zero-knowledge proof,and it will not reveal the privacy of *** addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the *** use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is *** feasibility of the scheme is proved through safety analysis and efficiency analysis.
Real-world data consistently exhibits a long-tailed distribution, often spanning multiple categories. This complexity underscores the challenge of content comprehension, particularly in scenarios requiring Long-Tailed...
详细信息
The long-tailed data distribution poses an enormous challenge for training neural networks in classification.A classification network can be decoupled into a feature extractor and a *** paper takes a semi-discrete opt...
详细信息
The long-tailed data distribution poses an enormous challenge for training neural networks in classification.A classification network can be decoupled into a feature extractor and a *** paper takes a semi-discrete opti-mal transport(OT)perspective to analyze the long-tailed classification problem,where the feature space is viewed as a continuous source domain,and the classifier weights are viewed as a discrete target *** classifier is indeed to find a cell decomposition of the feature space with each cell corresponding to one *** imbalanced training set causes the more frequent classes to have larger volume cells,which means that the classifier's decision boundary is biased towards less frequent classes,resulting in reduced classification performance in the inference ***,we propose a novel OT-dynamic softmax loss,which dynamically adjusts the decision boundary in the training phase to avoid overfitting in the tail *** addition,our method incorporates the supervised contrastive loss so that the feature space can satisfy the uniform distribution *** and comprehensive experiments demonstrate that our method achieves state-of-the-art performance on multiple long-tailed recognition benchmarks,including CIFAR-LT,ImageNet-LT,iNaturalist 2018,and Places-LT.
This study proposes a laboratory intelligent facial recognition system based on improved CNN, which significantly improves the accuracy of facial recognition by optimising the portrait recognition algorithm, improving...
详细信息
Code search can recommend relevant source code according to the development intention (query statement) of the demander, thereby improving the efficiency of software development. In the research of deep code search mo...
详细信息
Due to the advantages of decentralization, traceability and non deletion, blockchain technology can be well combined with differential privacy algorithm to protect data privacy. Therefore, it effectively ensures the p...
详细信息
In recent years,Approximate Computing Circuits(ACCs)have been widely used in applications with intrinsic tolerance to *** the increased availability of approximate computing circuit approaches,reliability analysis met...
详细信息
In recent years,Approximate Computing Circuits(ACCs)have been widely used in applications with intrinsic tolerance to *** the increased availability of approximate computing circuit approaches,reliability analysis methods for assessing their fault vulnerability have become highly *** this study,two accurate reliability evaluation methods for approximate computing circuits are *** reliability of approximate computing circuits is calculated on the basis of the iterative Probabilistic Transfer Matrix(PTM)*** the calculation,the correlation coefficients are derived and combined to deal with the correlation problem caused by fanout *** accuracy and scalability of the two methods are verified using three sets of approximate computing circuit instances and more circuits in Evo Approx8 b,which is an approximate computing circuit open source *** results show that relative to the Monte Carlo simulation,the two methods achieve average error rates of 0.46%and 1.29%and time overheads of 0.002%and 0.1%.Different from the existing approaches to reliability estimation for approximate computing circuits based on the original PTM model,the proposed methods reduce the space overheads by nearly 50%and achieve time overheads of 1.78%and 2.19%.
Vision-language retrieval (VLR) has attracted significant attention in both academia and industry, which involves using text (or images) as queries to retrieve corresponding images (or text). However, existing methods...
详细信息
暂无评论