Dear Editor,The optic nerve,which belongs to the central nervous system(CNS),cannot regenerate when injured in adult mammals.1 Up to now,no readily translatable measures are available for repairing a severely injured ...
详细信息
Dear Editor,The optic nerve,which belongs to the central nervous system(CNS),cannot regenerate when injured in adult mammals.1 Up to now,no readily translatable measures are available for repairing a severely injured optic *** we demonstrated that ciliary neurotrophic factor(CNTF)-chitosan enabled the reconstruction and functional recovery of the adult rat visual system,thus shedding light on the clinical potential for repairing the severely injured optic nerve.
Multi-behavioral recommender systems have emerged as a solution to address data sparsity and cold-start issues by incorporating auxiliary behaviors alongside target behaviors. However, existing models struggle to accu...
详细信息
Multi-behavioral recommender systems have emerged as a solution to address data sparsity and cold-start issues by incorporating auxiliary behaviors alongside target behaviors. However, existing models struggle to accurately capture varying user preferences across different behaviors and fail to account for diverse item preferences within behaviors. Various user preference factors (such as price or quality) entangled in the behavior may lead to sub-optimization problems. Furthermore, these models overlook the personalized nature of user behavioral preferences by employing uniform transformation networks for all users and items. To tackle these challenges, we propose the Disentangled Cascaded Graph Convolutional Network (Disen-CGCN), a novel multi-behavior recommendation model. Disen-CGCN employs disentangled representation techniques to effectively separate factors within user and item representations, ensuring their independence. In addition, it incorporates a multi-behavioral meta-network, enabling personalized feature transformation across user and item behaviors. Furthermore, an attention mechanism captures user preferences for different item factors within each behavior. By leveraging attention weights, we aggregate user and item embeddings separately for each behavior, computing preference scores that predict overall user preferences for items. Our evaluation of benchmark datasets demonstrates the superiority of Disen-CGCN over state-of-the-art models, showcasing an average performance improvement of 7.07% and 9.00% on respective datasets. These results highlight Disen-CGCN’s ability to effectively leverage multi-behavioral data, leading to more accurate recommendations.
Graph anomaly detection is crucial for identifying nodes that deviate from regular behavior within graphs, benefiting various domains such as fraud detection and social network. Although existing reconstruction-based ...
详细信息
In the field of binocular stereo matching, remarkable progress has been made by iterative methods like RAFT-Stereo and CREStereo. However, most of these methods lose information during the iterative process, making it...
In the field of binocular stereo matching, remarkable progress has been made by iterative methods like RAFT-Stereo and CREStereo. However, most of these methods lose information during the iterative process, making it difficult to generate more detailed difference maps that take full advantage of high-frequency information. We propose the Decouple module to alleviate the problem of data coupling and allow features containing subtle details to transfer across the iterations which proves to alleviate the problem significantly in the ablations. To further capture high-frequency details, we propose a Normalization Refinement module that unifies the disparities as a proportion of the disparities over the width of the image, which address the problem of module failure in cross-domain scenarios. Further, with the above improvements, the ResNet-like feature extractor that has not been changed for years becomes a bottleneck. Towards this end, we proposed a multi-scale and multi-stage feature extractor that introduces the channel-wise self-attention mechanism which greatly addresses this bottleneck. Our method (DLNR) ranks 1st on the Middlebury leaderboard, significantly outperforming the next best method by 13.04%. Our method also achieves SOTA performance on the KITTI-2015 benchmark for D1-fg. Code and demos are available at: https://***/David-Zhao-1997/High-frequency-Stereo-Matching-Network.
Zero-shot learning (ZSL) is machine learning task to recognize samples from classes that are not observed during training. Transductive ZSL (TZSL) is a more realistic and effective paradigm that leverages unlabeled un...
详细信息
Regarding the passive WiFi sensing based crowd analysis, this paper first theoretically investigates its limitations, and then proposes a deep learning based scheme targeted for returning fine-grained crowd states in ...
详细信息
The Internet of Things (IoT) connects numerous de-vices and sensors, generating data with significant informational and economic value. However, data silos hinder effective data utilization and trading, leading to the...
详细信息
ISBN:
(数字)9798331513054
ISBN:
(纸本)9798331513061
The Internet of Things (IoT) connects numerous de-vices and sensors, generating data with significant informational and economic value. However, data silos hinder effective data utilization and trading, leading to the dispersion of data across various devices and systems. Additionally, traditional third-party trading models face challenges related to data security and trust. To address these issues, this paper proposes a secure data trading framework based on a consortium blockchain and designs a corresponding solution. Specifically, it introduces the integration of zero-knowledge proofs into the smart contract scheme for authenticity and integrity verification of transaction data. From the perspective of IoT device users, this paper aims to enable secure data trading through a decentralized platform, using off-chain storage methods to reduce the blockchain's data burden while ensuring security and privacy. Off-chain storage encrypts and securely stores sensitive data, recording only necessary information on the blockchain, effectively protecting user privacy. To validate the practicality of the proposed solution, experiments were conducted using Hyperledger Fabric, demonstrating its feasibility in facilitating secure storage and trustworthy trading of IoT data. Finally, this study analyzes the experimental results and offers valuable insights for future research.
In Internet of Things(IoT) systems, ensuring the secure exchange of information between devices from different domains is crucial. Current cross-domain authentication schemes based on a single blockchain struggle to m...
详细信息
ISBN:
(数字)9798331513054
ISBN:
(纸本)9798331513061
In Internet of Things(IoT) systems, ensuring the secure exchange of information between devices from different domains is crucial. Current cross-domain authentication schemes based on a single blockchain struggle to meet the confidentiality requirements for data and information exchange in large-scale IoT systems. This paper proposes a blockchain-based identity authentication scheme (BCPPAS) for IoT, featuring dual-chain collaboration, and designs a novel certificateless aggregate signature algorithm to address complex certificate management and key escrow issues. The edge server is capable of aggregating different signatures to achieve batch authentication, markedly improving authentication efficiency and reducing computational and storage overhead. Also, BCPPAS is designed to avoid costly bilinear pairing operations, providing less computational overhead for IoT devices with limited resources. To protect the privacy of IoT devices, BCPPAS uses the pseudonym instead of the real identity. Finally, efficiency of BCPPAS are demonstrated through theoretical analysis and experiments.
Recommender systems are critical for mitigating information overload, assisting users in uncovering their latent interests, and enhancing their overall experience. Sequential recommendation leverages users' histor...
详细信息
ISBN:
(数字)9798331513054
ISBN:
(纸本)9798331513061
Recommender systems are critical for mitigating information overload, assisting users in uncovering their latent interests, and enhancing their overall experience. Sequential recommendation leverages users' historical interaction sequences to predict dynamic interests more effectively than traditional rec-ommendation approaches. However, existing models-including RNN-based and Transformer-based methods-face significant limitations. RNNs struggle with vanishing gradients and long-term dependency capture, while Transformers, though effective for long-range relationships, suffer from computational inefficiency due to their quadratic attention complexity. Recent advancements have employed contrastive learning for sequential recommendation, aiming to enhance the consistency between augmented views and improve self-supervised learning signals. Despite their promise, these methods often lack diversity in data augmentation strategies, which restricts their capacity for bias mitigation, resulting in augmented data that still retains inherent biases. To address these challenges, we propose MDEC, a novel sequential modeling framework that leverages State Space Models (SSM) combined with unbiased contrastive learning. MDEC utilizes Mamba to efficiently model user preferences as an alternative to Transformer-based models. Additionally, it integrates graph-based information, including item transition and co-interaction data, to improve data augmentation comprehensively. Finally, we introduce adaptive anchor-enhanced contrastive learning, which adaptively utilizes augmented samples to improve representation quality and bias mitigation. Extensive experiments on multiple datasets demonstrate that MDEC significantly out-performs existing models, showcasing improved efficiency, better mitigation of biases, and enhanced recommendation quality. Code is available at https://***/Echohuangyan/CSLP.
To learn camera-view invariant features for person Re-IDentification (Re-ID), the cross-camera image pairs of each person play an important role. However, such cross-view training samples could be unavailable under th...
详细信息
暂无评论