Although many classical IP geolocation algorithms are suitable to rich-connected networks, their performances are seriously affected in poor-connected networks with weak delay-distance correlation. This paper tries to...
详细信息
Recently published graph neural networks (GNNs) show promising performance at social event detection tasks. However, most studies are oriented toward monolingual data in languages with abundant training samples. This ...
详细信息
This paper proposes a robust watermarking algorithm based on dual watermarking and robust affine transformation. First, the color image is divided into three channels, feature point extraction, watermark embedding, an...
This paper proposes a robust watermarking algorithm based on dual watermarking and robust affine transformation. First, the color image is divided into three channels, feature point extraction, watermark embedding, and location watermark extraction will be performed respectively. Feature points are used for image reconstruction when extracting watermarks. The watermark embedding needs to select a square area not at the edge of the image as the watermark embedding position, and then embed the watermark in the frequency domain of the corresponding area. According to the watermark embedding position, extract the zero watermark in another channel as the location watermark. Because the zero watermark does not modify the original image information, it has good robustness and can assist the attacked image to locate the watermark embedding position.
Hypothesis Emerging energy-related technologies deal with multiscale hierarchical structures, intricate surface morphology, non-axisymmetric interfaces, and complex contact lines where wetting is difficult to quantify...
详细信息
This paper proposes a sub-channel image reconstruction algorithm based on Delaunay triangle. First, according to the different sensitivity of the human eye to the three color channels, different channels are used to a...
This paper proposes a sub-channel image reconstruction algorithm based on Delaunay triangle. First, according to the different sensitivity of the human eye to the three color channels, different channels are used to avoid the influence of watermark embedding on pixels around the feature points. Then, feature points should be selected on the selected channel to make them have sufficient robustness. At this time, the location of the feature points extracted on the corresponding channel can be used as the watermark embedding position. Finally, considering the influence of geometric attacks such as affine transformation, this paper proposes a reconstruction algorithm based on Delaunay triangle, which uses feature point information to reconstruct the image before the watermark extraction, and extract the watermark on the reconstructed image. The effect of watermark extraction has been improved.
Fuzzing is a widely used technology to find vulnerabilities, but the current technology is mostly based on coverage and there are relatively few research in the field of directed fuzzing. In this paper, a parallelized...
详细信息
Intra-pulse features extraction of radar is of great research significance in electronic reconnaissance technology. With continuous development and equipment of the new system radar, the characteristics of the modern ...
详细信息
The article puts forward a 3-dimensional searching approach that can factorize odd composite integers. The article first proves that, an odd composite number can be expressed by a trivariate function, then demonstrate...
详细信息
The run-time security guarantee is a hotspot in current cyberspace security research, especially on embedded terminals, such as smart hardware as well as wearable and mobile devices. Typically, these devices use unive...
详细信息
The run-time security guarantee is a hotspot in current cyberspace security research, especially on embedded terminals, such as smart hardware as well as wearable and mobile devices. Typically, these devices use universal hardware and software to connect with public networks via the Internet, and are probably open to security threats from Trojan viruses and other malware. As a result, the security of sensitive personal data is threatened and economic interests in the industry are compromised. To address the run-time security problems efficiently, first, a TrustEnclave-based secure architecture is proposed, and the trusted execution environment is constructed by hardware isolation technology. Then the prototype system is implemented on real TrustZone-enabled hardware devices. Finally, both analytical and experimental evaluations are provided. The experimental results demonstrate the effectiveness and feasibility of the proposed security scheme.
The first Water Cherenkov detector of the LHAASO experiment(WCDA-1)has been operating since April *** data for the first year have been analyzed to test its performance by observing the Crab Nebula as a standard *** W...
详细信息
The first Water Cherenkov detector of the LHAASO experiment(WCDA-1)has been operating since April *** data for the first year have been analyzed to test its performance by observing the Crab Nebula as a standard *** WCDA-1 achieves a sensitivity of 65 mCU per year,with a statistical threshold of 5 *** accomplish this,a 97.7%cosmic-ray background rejection rate around 1 TeV and 99.8%around 6 TeV with an ap proximate photon acceptance of 50%is achieved after applying an algorithm to separate gamma-induced *** angular resolution is measured using the Crab Nebula as a point source to be approximately 0.45°at 1 TeV and better than 0.2°above 6 TeV,with a pointing accuracy better than 0.05°.These values all match the design *** energy resolution is found to be 33%for gamma rays around 6 *** spectral energy distribution of the Crab Nebula in the range from 500 GeV to 15.8 TeV is measured and found to be in agreement with the results from other TeV gamma ray observatories.
暂无评论