Adding subtle perturbations to an image can cause the classification model to misclassify, and such images are called adversarial examples. Adversarial examples threaten the safe use of deep neural networks, but when ...
Adding subtle perturbations to an image can cause the classification model to misclassify, and such images are called adversarial examples. Adversarial examples threaten the safe use of deep neural networks, but when combined with reversible data hiding(RDH) technology, they can protect images from being correctly identified by unauthorized models and recover the image lossless under authorized models. Based on this, the reversible adversarial example(RAE) is rising. However, existing RAE technology focuses on feasibility, attack success rate and image quality, but ignores transferability and time complexity. In this paper,we optimize the data hiding structure and combine data augmentation technology,which flips the input image in probability to avoid overfitting phenomenon on the dataset. On the premise of maintaining a high success rate of white-box attacks and the image's visual quality, the proposed method improves the transferability of reversible adversarial examples by approximately 16% and reduces the computational cost by approximately 43% compared to the state-of-the-art method. In addition, the appropriate flip probability can be selected for different application scenarios.
Membrane algorithms are a new class of heuristic algorithms, which attempt to incorporate some components of membrane computing models (also called P systems) for designing efficient optimization algorithms, such as t...
详细信息
Membrane algorithms are a new class of heuristic algorithms, which attempt to incorporate some components of membrane computing models (also called P systems) for designing efficient optimization algorithms, such as the structure of P systems, the way of communication between cells, etc. Membrane algorithms are a kind of parallel methods, where many operations can be performed in parallel. Although the importance of the parallelism of such algorithms is recognized, membrane algorithms were often implemented on the serial computing device Central processing Unit (CPU), which makes the algorithms cannot work in a more efficient way. In this work, we consider the implementation of membrane algorithms on the parallel computing device Graphics processing Unit (GPU). Under such implementation, all cells of membrane algorithms can work simultaneously. Experiment results on two classical intractable problems, point set matching problem and TSP, show that GPU implementation of membrane algorithms is much more efficient than CPU implementation in terms of runtime, especially for solving the problems with a high complexity.
In the theory of compressive sensing, the selection of the basis functions directly affects the sparse transformation, observation number and reconstruction accuracy. In this paper, we introduce the structure of three...
详细信息
A new incident source with different angles was constructed for dealing with wide-angle scattering problems. Considering the impendence matrix in method of moments (MOM) is independent from incident angles, the equiv...
A new incident source with different angles was constructed for dealing with wide-angle scattering problems. Considering the impendence matrix in method of moments (MOM) is independent from incident angles, the equivalent relationship between induced current and the measured CS-current was build, while the CS-current can be computed directly under the new incident source. Finally, we can reconstruct the induce current by utilizing the theory of compressive sensing (CS). Compared with traditional MOM, the computational complexity can be greatly reduced.
Collaboration among authors is a pervasive phenomenon currently. Mining useful information from cooperation is a significant study to unravel relationships underneath these papers and predict potential collaborations ...
详细信息
Collaboration among authors is a pervasive phenomenon currently. Mining useful information from cooperation is a significant study to unravel relationships underneath these papers and predict potential collaborations or future popular academic topics. This paper demonstrates the change of Structural Holes in the whole network and for some individual authors from 2009 to 2012 in ICML. This paper is going to study the biggest subset in 2009, which separates into several smaller subsets with less structural holes in 2010 and 2011, while the number of structural holes in 2012 increases. The graphs of the whole networks from 2009 to 2012 drawn by Ucinet are going to demonstrate the changes of structural holes from 2009 to 2012 and expl the reason why there are more structural holes in 2012 compared to 2010 and 2011. The reason is that the ainnumber of authors in 2012 increases about 50 percent compared to 2011, which results in that authors need to find new collaborations and leaders may become intermediaries to connect new authors and existing authors occupying structural holes. And some authors whose papers are published on ICML continuously from 2009 to 2012 are going to be analysed to indicate the changes of their position in the network. Some authors are increasingly constrained in certain groups, while some other authors become bridges connecting different groups and some other authors changes are correspond to the changes of the whole network. They are constrained in certain subset with less structural holes in 2010 and 2011 but, due to large number of authors joining in ICML, more likely to occupy more structural holes.
The transformational and spatial proximities are important cues for identifying inliers from an appearance based match set because correct matches generally stay close in input images and share similar local transform...
详细信息
This letter presents the graphic processor unit (GPU)implementation of the finite-difference time-domain (FDTD)method for the solution of the two-dimensional electromagnetic fields inside dispersive *** improved Z-tra...
详细信息
This letter presents the graphic processor unit (GPU)implementation of the finite-difference time-domain (FDTD)method for the solution of the two-dimensional electromagnetic fields inside dispersive *** improved Z-transform-based finite-difference time-domain (ZTFDTD) method was presented for simulating the interaction of electromagnetic wave with unmagnetized *** using the newly introduced Compute Unified Device Architecture (CUDA) technology, we illustrate the efficacy of GPU in accelerating the FDTD computations by achieving significant speedups with great ease and at no extra hardware *** effect of the GPU-CPU memory transfers on the speedup will be also studied.
Aiming at the traditional blind source separation for the received single-channel mixed radar signal makes it difficult to accurately recover the source signal, a single-channel radar signal comprehensive separation m...
ISBN:
(数字)9781837240982
Aiming at the traditional blind source separation for the received single-channel mixed radar signal makes it difficult to accurately recover the source signal, a single-channel radar signal comprehensive separation method based on the combination of the FastICA algorithm and the variational modal decomposition (VMD) algorithm is proposed. The method utilizes VMD to first perform modal separation of single-channel mixed Linear Frequency Modulation (LFM) signal, then selects the modal component signal with the largest correlation coefficient with the mixed signal and expands it with single-channel mixed LFM signal into a virtual multi-channel mixed signal, and finally inputs it into FastICA algorithm to obtain the source signal. The simulation experiment results show that the comprehensive separation algorithm can accurately separate the LFM signal, overcoming the limitation that the FastICA algorithm cannot directly separate the single-channel mixed radar signal.
Empirical mode decomposition (EMD) provides a powerful tool for adaptive multiscale analysis of nonstationary signals. Bidimensional empirical mode decomposition (BEMD) techniques decompose an image into several bidim...
详细信息
ISBN:
(纸本)9781467391672
Empirical mode decomposition (EMD) provides a powerful tool for adaptive multiscale analysis of nonstationary signals. Bidimensional empirical mode decomposition (BEMD) techniques decompose an image into several bidimensional intrinsic mode functions (BIMFs) and a bidimensional residue (BR). Firstly, several polarization images can be decomposed into several BIMFs with multi-scales using BEMD. For the BIMF coefficients, the teager energy-based method is used. For the each BIMF coefficients, the area-based teager energy larger value of information measurement is used to select the better coefficients for fusion. At last the fused image can be obtained by utilizing inverse transform for fused image. Experimental results show that the proposed algorithm gives more satisfactory results than the traditional image fusion algorithms in preserving the edges and texture information.
Reversible data hiding in encrypted domain (RDH-ED) has received tremendous attention from the research community because data can be embedded into cover media without exposing it to the third party data hider and the...
详细信息
暂无评论