Sketch-based 3D model retrieval is a challenging task in computer vision, requiring simultaneous solutions to discriminative feature learning and cross-modal semantic *** methods typically project sketches and 3D mode...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network *** paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key ***,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use *** paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
Temporal knowledge graph (TKG) reasoning aims to predict missing facts or future events at given timestamps and has attracted more and more attention in recent years. Existing TKG reasoning methods mainly focus on the...
详细信息
Temporal knowledge graph (TKG) reasoning aims to predict missing facts or future events at given timestamps and has attracted more and more attention in recent years. Existing TKG reasoning methods mainly focus on the interactions between entities and ignore the associations between events where the entities involve. In addition, the characteristics of different types of events have not been studied and exploited, which reduces the performance of event prediction. To address these problems, this paper proposes a combination model of periodic and non-periodic events (CM-PNP). Specifically, there are two basic components designed to process different types of events. The periodic component of CM-PNP learns the recurrent pattern of periodic events and encodes the temporal information in the manner of timespan to prevent the unseen timestamp issue. The non-periodic component of CM-PNP introduces extra information (e.g., entity attributes) to represent non-periodic events, and predicts this type of events according to the related historical events. A combination model of multiple sub-models that focus on encoding different parts of the event is used to improve the performance of single model. The periodic and non-periodic components are combined by a gate block. The experimental results on three real-world datasets demonstrate that CM-PNP outperforms the existing baselines.
The recent large-scale text-to-image generative models have attained unprecedented performance, while people established adaptor modules like LoRA and DreamBooth to extend this performance to even more unseen concept ...
This paper introduces an innovative and efficient multi-scale Vision Transformer (ViT) for the task of image classification. The proposed model leverages the inherent power of transformer architecture and combines it ...
详细信息
Multimedia database online integration system plays an important role in today's information age. However, the performance of the integrated system is limited by the problems of low accuracy, insufficient recall r...
详细信息
Detecting anomalies in HTTP request data is a vital security task. With big data becoming ubiquitous, techniques for structured graph data have been focused on recent years. As nodes in graphs have long-distance corre...
详细信息
The dissemination of articles in social networks is not only related to the centrality of nodes, but also to the reading effect and delay of nodes. In order to more accurately measure the influence of nodes in the pro...
详细信息
In recent years, cloud computing has been widely used. Cloud computing refers to the centralized computing resources, users through the access to the centralized resources to complete the calculation, the cloud comput...
详细信息
The brain-computer interface (BCI) and eye-tracking technologies can potentially improve the learning environment in education. Cognitive BCIs can give a deep knowledge of brain functioning, enabling the creation of m...
详细信息
暂无评论