Variational autoencoder (VAE) is known as a classic and effective method in modeling users’ homogeneous behaviors in recommender systems. In recent years, graph neural networks (GNNs) have achieved promising performa...
详细信息
SfM can reconstruct the 3D shape of an object with high accuracy if there are many feature points on the surface to be measured. However, in the field of architecture, there is a problem that building surfaces are bea...
详细信息
Depth images play a crucial role in fields such as 3D reconstruction, simultaneous localization and mapping (SLAM), and virtual reality. However, depth sensors are often affected by environmental factors when capturin...
详细信息
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an *** cryptography is th...
详细信息
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an *** cryptography is the best way to transmit data in a secure and reliable *** researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data *** algorithm has some data security *** some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original *** this paper,various data security techniques are developed,which can be used to protect the data from attackers ***,a customized American Standard Code for Information Interchange(ASCII)table is *** value of each Index is defined in a customized ASCII *** an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the *** that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original *** the number of cipher values is double the original data,the attacker tries to decrypt each *** of getting the original data,the attacker gets such data that has no relation to the original *** that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain *** boundaries of each Hill text work up to that *** techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorit
Existing sequence recommendation models usually ignore the time interval of the sequence when modeling long-term preferences and short-term interests, which may lead to bias in user interests and fail to model user in...
详细信息
E-commerce, also known as electronic commerce or internet commerce, refers to the exchange of money and data for the purpose of business operations through the internet. The term 'ecommerce' is commonly used t...
详细信息
The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT *** learning(DL)-based intrusion detection(ID)has emerged...
详细信息
The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT *** learning(DL)-based intrusion detection(ID)has emerged as a vital method for protecting IoT *** rectify the deficiencies of current detection methodologies,we proposed and developed an IoT cyberattacks detection system(IoT-CDS)based on DL models for detecting bot attacks in IoT *** DL models—long short-term memory(LSTM),gated recurrent units(GRUs),and convolutional neural network-LSTM(CNN-LSTM)were suggested to detect and classify IoT *** BoT-IoT dataset was used to examine the proposed IoT-CDS system,and the dataset includes six attacks with normal *** experiments conducted on the BoT-IoT network dataset reveal that the LSTM model attained an impressive accuracy rate of 99.99%.Compared with other internal and external methods using the same dataset,it is observed that the LSTM model achieved higher accuracy *** are more efficient than GRUs and CNN-LSTMs in real-time performance and resource efficiency for cyberattack *** method,without feature selection,demonstrates advantages in training time and detection ***,the proposed approach can be extended to improve the security of various IoT applications,representing a significant contribution to IoT security.
Automatically detecting and locating remote occlusion small objects from the images of complex traffic environments is a valuable and challenging *** the boundary box location is not sufficiently accurate and it is di...
详细信息
Automatically detecting and locating remote occlusion small objects from the images of complex traffic environments is a valuable and challenging *** the boundary box location is not sufficiently accurate and it is difficult to distinguish overlapping and occluded objects,the authors propose a network model with a second-order term attention mechanism and occlusion ***,the backbone network is built on *** a method is designed for the feature extraction network based on an item-wise attention mechanism,which uses the filtered weighted feature vector to replace the original residual fusion and adds a second-order term to reduce the information loss in the process of fusion and accelerate the convergence of the ***,an objected occlusion regression loss function is studied to reduce the problems of missed detections caused by dense *** experimental results demonstrate that the authors’method achieved state-of-the-art performance without reducing the detection *** mAP@.5 of the method is 85.8%on the Foggy_cityscapes dataset and the mAP@.5 of the method is 97.8%on the KITTI dataset.
Predicting and controlling crowd dynamics in emergencies is one of the main objectives of simulated emergency exercises. However, during emergency exercises, there is often a lack of sense of danger by the actors invo...
详细信息
作者:
Wu, XiaotianSong, BofanFang, JiaYan, WeiQiPeng, Qing-YuJinan University
College of Cyber Security The College of Information Science and Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou510632 China Auckland University of Technology
Department of Computer and Information Systems Auckland1010 New Zealand Jinan University
Dynamics and Space Science Department of Computer Science The Sino-French Joint Laboratory for Astrometry Guangzhou510632 China
Most visual cryptography schemes (VCSs) are condition-oriented which implies their designs focus on satisfying the contrast and security conditions in VCS. In this paper, we explore a new architecture of VCS: contrast...
详细信息
暂无评论