Federated learning has been used extensively in business inno-vation scenarios in various *** research adopts the federated learning approach for the first time to address the issue of bank-enterprise information asym...
详细信息
Federated learning has been used extensively in business inno-vation scenarios in various *** research adopts the federated learning approach for the first time to address the issue of bank-enterprise information asymmetry in the credit assessment ***,this research designs a credit risk assessment model based on federated learning and feature selection for micro and small enterprises(MSEs)using multi-dimensional enterprise data and multi-perspective enterprise *** proposed model includes four main processes:namely encrypted entity alignment,hybrid feature selection,secure multi-party computation,and global model ***,a two-step feature selection algorithm based on wrapper and filter is designed to construct the optimal feature set in multi-source heterogeneous data,which can provide excellent accuracy and *** addition,a local update screening strategy is proposed to select trustworthy model parameters for aggregation each time to ensure the quality of the global *** results of the study show that the model error rate is reduced by 6.22%and the recall rate is improved by 11.03%compared to the algorithms commonly used in credit risk research,significantly improving the ability to identify ***,the business operations of commercial banks are used to confirm the potential of the proposed model for real-world implementation.
Road sign detection and recognition play a critical role in improving driver safety and awareness in the modern traffic era. This paper describes the development and evaluation of a Road Sign Detection and Recognition...
详细信息
Multi-focus image fusion is a technique that combines multiple out-of-focus images to enhance the overall image quality. It has gained significant attention in recent years, thanks to the advancements in deep learning...
详细信息
Graph neural networks (GNNs) have recently gained significant attention for their ability to model and analyze complex relationships, leading to numerous applications in a variety of fields. In line with this, explain...
详细信息
We study the maximum weight convex polytope problem, in which the goal is to find a convex polytope maximizing the total weight of enclosed points. Prior to this work, the only known result for this problem was an O(n...
Human beings have gone through stages that have made significant contributions to their lives with technological developments. One of the most important of these close to the present day is the introduction of IoTs, a...
详细信息
In recent years,the growing popularity of social media platforms has led to several interesting natural language processing(NLP)***,these social media-based NLP applications are subject to different types of adversari...
详细信息
In recent years,the growing popularity of social media platforms has led to several interesting natural language processing(NLP)***,these social media-based NLP applications are subject to different types of adversarial attacks due to the vulnerabilities of machine learning(ML)and NLP *** work presents a new low-level adversarial attack recipe inspired by textual variations in online social media *** variations are generated to convey the message using out-of-vocabulary words based on visual and phonetic similarities of characters and words in the shortest possible *** intuition of the proposed scheme is to generate adversarial examples influenced by human cognition in text generation on social media platforms while preserving human robustness in text understanding with the fewest possible *** intentional textual variations introduced by users in online communication motivate us to replicate such trends in attacking text to see the effects of such widely used textual variations on the deep learning *** this work,the four most commonly used textual variations are chosen to generate adversarial ***,this article introduced a word importance ranking-based beam search algorithm as a searching method for the best possible perturbation *** effectiveness of the proposed adversarial attacks has been demonstrated on four benchmark datasets in an extensive experimental setup.
Cloud computing becomes an important application development platform for processing user data with high *** providers are accustomed to providing storage centers outside the trusted location preferred by the data ***...
详细信息
Cloud computing becomes an important application development platform for processing user data with high *** providers are accustomed to providing storage centers outside the trusted location preferred by the data ***,ensuring the security and confidentiality of the data while processing in the centralized network is very *** secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud *** are very active over the network like real authenticated user to hack the personal sensitive data,such as bank balance,health data,personal data,and confidential documents over the cloud *** this research,a secured key agreement between the sender and the receiver using Kerberos authentication protocol with fingerprint is proposed to ensure security in *** of patients are monitored using wireless sensor devices and are then transferred to the *** protocol helps in avoiding unnecessary communication of authenticated data over the cloud *** security process is a procedure with the best security in most of the authentication *** node is responsible in carrying data packets from the sender to the receiver in the cloud *** Kerberos protocol is used in trust node to ensure *** communication between the local health center and the healthcare server is ensured by using a fingerprint feature called minutiae form,which refers to the fingerprint image of both sender and *** computational and communicational cost of the proposed system is lesser when compared with other existing authentication methods.
To overcome the limitations of examining blood cells under a microscope, several investigations have been carried out using artificial intelligence techniques. These investigations aim to automate the processes of det...
详细信息
Code smell detection is one of the most significant issues in the software industry. Metric-based static code analysis tools are used to detect undesirable coding practices known as code smells and guide refactoring r...
详细信息
暂无评论