Smart supermarkets are a recent innovation that allows customers to have a seamless shopping experience. The Internet of Things (IoT) is a key component of smart supermarkets. Take AmazonGo as an example, it successfu...
详细信息
Biometric systems are vulnerable to Presentation Attacks (PA) performed using various Presentation Attack Instruments (PAIs). Even though there are numerous Presentation Attack Detection (PAD) techniques based on both...
详细信息
Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an attacker uses a chain of hos...
详细信息
ISBN:
(数字)9781728198293
ISBN:
(纸本)9781728198309
Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an attacker uses a chain of hosts on the Internet as relay machines and remotely login these hosts using tools such as SSH. An effective method to detect stepping-stone intrusion is to estimate the length of a connection chain. In this paper, we develop an efficient algorithm to detect stepping-stone intrusion by mining network traffic using the k-Means clustering algorithm. Our proposed detection algorithm does not require a large number of TCP packets to be captured and processed. The length of a connection chain can be accurately determined by using our proposed detection method. Our proposed detection algorithm is more efficient and easier to implement than all of the existing connection-chain based approaches for stepping-stone intrusion detection. The effectiveness and correctness of our proposed detection algorithm are verified through well-designed network experiments.
A method to use for mapping VR-Box joystick with shooting game input controls that include key mapping of every joystick key from the joystick with the game itself. Key mapping was observed and then the source code ke...
详细信息
Wearable signal analysis is an important technology for monitoring physiological signals without interfering with an individual's daily behavior. As detecting cardiovascular diseases can dramatically reduce mortal...
详细信息
Wearable signal analysis is an important technology for monitoring physiological signals without interfering with an individual's daily behavior. As detecting cardiovascular diseases can dramatically reduce mortality, arrhythmia recognition using ECG signals has attracted much attention. In this paper, we propose a single-channel convolutional neural network to detect Atrial Fibrillation (AF) based on ECG signals collected by wearable devices. It contains 3 primary modules. All recordings are firstly uniformly sized, normalized, and Butterworth low-pass filtered for noise removal. Then the preprocessed ECG signals are fed into convolutional layers for feature extraction. In the classification module, the preprocessed signals are fed into convolutional layers containing large kernels for feature extraction, and the fully connected layer provides probabilities. During the training process, the output of the previous pooling layer is concatenated with the vectors of the convolutional layer as a new feature map to reduce feature loss. Numerous comparison and ablation experiments are performed on the 2017 PhysioNet/CinC Challenge dataset, demonstrating the superiority of the proposed method.
Capturing the 3D geometry of transparent objects is a challenging task, ill-suited for general-purpose scanning and reconstruction techniques, since these cannot handle specular light transport phenomena. Existing sta...
详细信息
Diabetic retinopathy (DR) is one of the major causes of blindness in the western world. Effective treatment of DR is available, when detected early enough, which makes this a vital process. computers are able to obtai...
详细信息
Breast cancer is the most common malignant tumor in women worldwide. Early detection and timely treatment are crucial for improving survival rates and ensuring effective treatment planning. While existing methods prim...
Breast cancer is the most common malignant tumor in women worldwide. Early detection and timely treatment are crucial for improving survival rates and ensuring effective treatment planning. While existing methods primarily focus on classifying benign versus malignant tumors, accurate tumor grading remains underexplored. The scarcity of high-quality annotated datasets for advanced tumor grades, combined with their inherent similarity, limits model robustness and precise grading. To address these challenges, we propose a novel framework for breast tumor grading diagnosis that leverages multi-scale feature fusion with dual-adaptive attention mechanisms. This framework enhances grading performance by capturing both local and global information. It integrates information across multiple scales, improves feature representation, and enables the detection of subtle differences between grades. The framework consists of three primary modules: deep hybrid feature extraction, multi-scale feature fusion, and dual-adaptive attention mechanisms. Together, these modules enhance feature representation, capture salient information, and highlight discriminative features, ultimately improving grading accuracy. In addition, we constructed two distinct image datasets consisting of 17,058 ultrasound images and 1571 MRI images for breast tumor grading. Experimental results demonstrated the effectiveness of our framework, achieving a test accuracy of 0.89, a macro-average F1-score of 0.82, and a micro-average precision of 0.93, outperforming existing state-of-the-art methods.
作者:
Chen YangWei YanSchool of Software
Dalian University of Foreign Languages Dalian China School of Computer Science and Technology Harbin Engineering University Harbin China Department of Information
Liaoning Police College Dalian China School of Software Dalian University of Technology Dalian China
Location-based services (LBS) in the mobile internet applications are very important and provide a great convenience. However, at the same time it brings the threat of privacy leak. For location services, a location p...
详细信息
ISBN:
(纸本)9781450376624
Location-based services (LBS) in the mobile internet applications are very important and provide a great convenience. However, at the same time it brings the threat of privacy leak. For location services, a location privacy protection scheme is proposed, which includes location hiding algorithm and query privacy protection algorithm. Q-Tree storage ensures that anonymous location units are as dispersed as possible. The point of interest (POI) with higher query probability is selected as the query content of anonymous location unit, which protects the user's query privacy. At the same time, private information retrieval technology (PIR) is used to provide users with higher privacy and security protection. Finally, the effectiveness of the scheme is proved by privacy analysis and experimental results.
The network information system is a military information network system with evolution characteristics. Evolution is a process of replacement between disorder and order, chaos and equilibrium. Given that the concept o...
详细信息
暂无评论