Visual emotion analysis holds significant research value in both computer vision and psychology. However, existing methods for visual emotion analysis suffer from limited generalizability due to the ambiguity of emoti...
详细信息
Over the past six decades, the computing systems field has experienced significant transformations, profoundly impacting society with transformational developments, such as the Internet and the commodification of comp...
详细信息
Reversible face anonymization, unlike traditional face pixelization, seeks to replace sensitive identity information in facial images with synthesized alternatives, preserving privacy without sacrificing image clarity...
详细信息
Voice authentication has been widely used on smartphones. However, it remains vulnerable to spoofing attacks, where the attacker replays recorded voice samples from authentic humans using loudspeakers to bypass the vo...
详细信息
—With the rapid development of technology and the acceleration of digitalisation, the frequency and complexity of cyber security threats are increasing. Traditional cybersecurity approaches, often based on static rul...
详细信息
Software reuse, as a means to develop new software products with similar functions by virtue of existing software components, has become a popular way during the software development process. In particular, as the ser...
详细信息
Software reuse, as a means to develop new software products with similar functions by virtue of existing software components, has become a popular way during the software development process. In particular, as the service-oriented architecture became popular, web services turned into an indispensable part in modem software development web services provide a basic composition with high cohesion and loose coupling to support responses among heterogeneous software components, which is the valuable resources for software reuse. The popular web service repositories, such as Programmable web, contain a mass of web services for beginners and developers to choose from. Nevertheless, the large number of web services also makes it difficult to select the suitable services. Thus, the key to reuse software components lies in how to find appropriate web services from repositories to meet developers requirements in specific application scenarios.
As the Internet of Things (IoT) rapidly evolves, security concerns have become increasingly prominent. Machine learning-based network intrusion detection systems can identify and respond to malicious traffic with mini...
详细信息
ISBN:
(数字)9798331513054
ISBN:
(纸本)9798331513061
As the Internet of Things (IoT) rapidly evolves, security concerns have become increasingly prominent. Machine learning-based network intrusion detection systems can identify and respond to malicious traffic with minimal latency. However, building an effective IoT malicious traffic detection system requires specialized knowledge, and the limited computational resources of IoT devices pose a trade-off between utility and security. Addressing these challenges, this study presents research on an IoT malicious traffic detection model based on traditional machine learning techniques. Compared to other methods, traditional machine learning models have fewer parameters and lower storage requirements. This study optimized the construction process of traditional machine learning models, using feature reduction and recursive feature elimination to minimize the number of features, thereby further reducing model parameters. Bayesian optimization was employed to mitigate performance errors from manual tuning, leading to the selection of the most optimal model. This research focuses on flow-level data classification, specifically selecting flow-level statistical features as model inputs. These features enable the model to conduct detailed analysis of data flows, accurately classifying them into different categories, such as benign traffic, DDoS attacks, and botnets. In experimental evaluations, the model demonstrated high accuracy, with an F1 score exceeding 0.75, validating its effectiveness and reliability in real-world applications.
With the improvement of the national economic level,the number of vehicles is still increasing year by *** to the statistics of National Bureau of Statics,the number is approximately up to 327 million in China by the ...
详细信息
With the improvement of the national economic level,the number of vehicles is still increasing year by *** to the statistics of National Bureau of Statics,the number is approximately up to 327 million in China by the end of 2018,which makes urban traffic pressure continues to rise so that the negative impact of urban traffic order is *** parking-the common problem in the field of transportation security is urgent to be solved and traditional methods to address it are mainly based on ground loop and manual supervision,which may miss detection and cost much *** to the rapidly developing deep learning sweeping the world in recent years,object detection methods relying on background segmentation cannot meet the requirements of complex and various scenes on speed and ***,an improved Single Shot MultiBox Detector(SSD)based on deep learning is proposed in our study,we introduce attention mechanism by spatial transformer module which gives neural networks the ability to actively spatially transform feature maps and add contextual information transmission in specified ***,we found out the best connection layer in the detection model by repeated experiments especially for small objects and increased the precision by 1.5%than the baseline SSD without extra training ***,we designed an illegal parking vehicle detection method by the improved SSD,reaching a high precision up to 97.3%and achieving a speed of 40FPS,superior to most of vehicle detection methods,will make contributions to relieving the negative impact of illegal parking.
Median filtering is a nonlinear signal processing technique and has an advantage in the field of image ***,more attention has been paid to the forensics research of median *** this paper,a median filtering forensics m...
详细信息
Median filtering is a nonlinear signal processing technique and has an advantage in the field of image ***,more attention has been paid to the forensics research of median *** this paper,a median filtering forensics method based on quaternion convolutional neural network(QCNN)is *** median filtering residuals(MFR)are used to preprocess the *** the output of MFR is expanded to four channels and used as the input of *** QCNN,quaternion convolution is designed that can better mix the information of different channels than traditional *** quaternion pooling layer is designed to evaluate the result of quaternion *** is proposed to features well combine the three-channel information of color image and fully extract forensics *** show that the proposed method has higher accuracy and shorter training time than the traditional convolutional neural network with the same convolution depth.
The integration of edge computing with deep neural networks (DNNs) is crucial for intelligent industrial cyber-physical systems. Typically, deploying DNNs on heterogeneous edge devices relies on methods like model com...
详细信息
暂无评论