We propose a novel deep learned video compression technique, named scalable motion estimation (SME), which is designed for video data generated by sensor systems in smart devices. These devices face unique challenges ...
详细信息
The security issues brought by third-party components in software are becoming increasingly prominent. However, current component analysis tools only analyze the existence of the vulnerabilities introduced by componen...
详细信息
Long-tailed multi-label text classification aims to identify a subset of relevant labels from a large candidate label set, where the training datasets usually follow long-tailed label distributions. Many of the previo...
详细信息
Long-tailed multi-label text classification aims to identify a subset of relevant labels from a large candidate label set, where the training datasets usually follow long-tailed label distributions. Many of the previous studies have treated head and tail labels equally, resulting in unsatisfactory performance for identifying tail labels. To address this issue, this paper proposes a novel learning method that combines arbitrary models with two steps. The first step is the “diverse ensemble” that encourages diverse predictions among multiple shallow classifiers, particularly on tail labels, and can improve the generalization of tail *** second is the “error correction” that takes advantage of accurate predictions on head labels by the base model and approximates its residual errors for tail labels. Thus, it enables the “diverse ensemble” to focus on optimizing the tail label performance. This overall procedure is called residual diverse ensemble(RDE). RDE is implemented via a single-hidden-layer perceptron and can be used for scaling up to hundreds of thousands of labels. We empirically show that RDE consistently improves many existing models with considerable performance gains on benchmark datasets, especially with respect to the propensity-scored evaluation ***, RDE converges in less than 30 training epochs without increasing the computational overhead.
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are ha...
详细信息
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are handy to use,but they are susceptible to stolen smart card attacks and few other notable security *** prefer to use Web applications that guarantee for security against several security attacks,especially insider attacks,which is *** of several existing schemes prove the security pitfalls of the protocols from preventing security attacks,specifically insider *** paper introduces LAPUP:a novel lightweight authentication protocol using physically unclonable function(PUF)to prevent security attacks,principally insider *** PUFs are used to generate the security keys,challenge-response pair(CRP)and hardware signature for designing the *** transmitted messages are shared as hash values and encrypted by the keys generated by *** messages are devoid of all possible attacks executed by any attacker,including insider *** is also free from stolen verifier attacks,as the databases are secured by using the hardware signature generated by *** analysis of the protocol exhibits the strength of LAPUP in preventing insider attacks and its resistance against several other security *** evaluation results of the communication and computation costs of LAPUP clearly shows that it achieves better performance than existing protocols,despite providing enhanced security.
As a component of Wireless Sensor Network(WSN),Visual-WSN(VWSN)utilizes cameras to obtain relevant data including visual recordings and static *** from the camera is sent to energy efficient sink to extract key-inform...
详细信息
As a component of Wireless Sensor Network(WSN),Visual-WSN(VWSN)utilizes cameras to obtain relevant data including visual recordings and static *** from the camera is sent to energy efficient sink to extract key-information out of *** applications range from health care monitoring to military *** a network with VWSN,there are multiple challenges to move high volume data from a source location to a target and the key challenges include energy,memory and I/O *** this case,Mobile Sinks(MS)can be employed for data collection which not only collects information from particular chosen nodes called Cluster Head(CH),it also collects data from nearby nodes as *** innovation of our work is to intelligently decide on a particular node as CH whose selection criteria would directly have an impact on QoS parameters of the ***,making an appropriate choice during CH selection is a daunting task as the dynamic and mobile nature of MSs has to be taken into *** propose Genetic Machine Learning based Fuzzy system for clustering which has the potential to simulate human cognitive behavior to observe,learn and understand things from manual *** architecture is designed based on Mamdani’s fuzzy *** parameters are derived based on the model residual energy,node centrality,distance between the sink and current position,node centrality,node density,node history,and mobility of sink as input variables for decision making in CH *** inputs received have a direct impact on the Fuzzy logic rules mechanism which in turn affects the accuracy of *** proposed work creates a mechanism to learn the fuzzy rules using Genetic Algorithm(GA)and to optimize the fuzzy rules base in order to eliminate irrelevant and repetitive *** algorithmbased machine learning optimizes the interpretability aspect of fuzzy *** results are obtained using *** result shows that the classification acc
作者:
Ma, HaoYang, JingyuanHuang, HuiShenzhen University
Visual Computing Research Center College of Computer Science and Software Engineering Shenzhen China (GRID:grid.263488.3) (ISNI:0000 0001 0472 9649)
Exemplar-based image translation involves converting semantic masks into photorealistic images that adopt the style of a given ***,most existing GAN-based translation methods fail to produce photorealistic *** this st...
详细信息
Exemplar-based image translation involves converting semantic masks into photorealistic images that adopt the style of a given ***,most existing GAN-based translation methods fail to produce photorealistic *** this study,we propose a new diffusion model-based approach for generating high-quality images that are semantically aligned with the input mask and resemble an exemplar in *** proposed method trains a conditional denoising diffusion probabilistic model(DDPM)with a SPADE module to integrate the semantic *** then used a novel contextual loss and auxiliary color loss to guide the optimization process,resulting in images that were visually pleasing and semantically *** demonstrate that our method outperforms state-of-the-art approaches in terms of both visual quality and quantitative metrics.
Samples collected from most industrial processes have two challenges: one is contaminated by the non-Gaussian noise, and the other is gradually *** feature can obviously reduce the accuracy and generalization of model...
详细信息
Samples collected from most industrial processes have two challenges: one is contaminated by the non-Gaussian noise, and the other is gradually *** feature can obviously reduce the accuracy and generalization of models. To handle these challenges, a novel method, named the robust online extreme learning machine(RO-ELM), is proposed in this paper, in which the least mean p-power criterion is employed as the cost function which is to boost the robustness of the ELM, and the forgetting mechanism is introduced to discard the obsolescence samples. To investigate the performance of the ROELM, experiments on artificial and real-world datasets with the non-Gaussian noise are performed, and the datasets are from regression or classification problems. Results show that the RO-ELM is more robust than the ELM, the online sequential ELM(OS-ELM) and the OSELM with forgetting mechanism(FOS-ELM). The accuracy and generalization of the RO-ELM models are better than those of other models for online learning.
Traffic flow forecasting (TFF) is crucial for effective urban planning and traffic management. Most modeling approaches in TFF ignore the dynamic characteristics of the transportation network topology, which results i...
详细信息
Artificial Intelligence, including machine learning and deep convolutional neural networks (DCNNs), relies on complex algorithms and neural networks to process and analyze data. DCNNs for visual recognition often requ...
详细信息
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit...
详细信息
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining ***,these tools suffer from some *** terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search ***,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information *** this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation *** leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion *** combination allows for the unified handling of binary programs across various architectures,compilers,and compilation ***,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)***,the graph embedding network is utilized to evaluate the similarity of program *** on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target *** solved content serves as the initial seed for targeted *** binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity *** approach facilitates
暂无评论