Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Image analysis by fractional-order weighted spherical Bessel-Fourier moments
Pattern Recognition (PATT), Volume 157, Issue Chttps://doi.org/10.1016/j.patcog.2024.110872Highlights- We propose a new fractional-order moments named as FRSBFMS.
- We integrate FRSBFMS and quaternion theory to develop QFrSBFMs.
- The rotation invariance and parameter α are discussed in detail.
Moment and moment invariants as effective feature descriptors have been widely applied in image analysis, pattern recognition and computer vision applications. Scholars have demonstrated that fractional-order orthogonal moments outperform their ...
- research-articleOctober 2024
R4D-planes: Remapping Planes For Novel View Synthesis and Self-Supervised Decoupling of Monocular Videos
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 6569–6577https://doi.org/10.1145/3664647.3681281The tasks of view synthesis and decoupling dynamic objects from the static environment for monocular scenes are both long-standing challenges in CV and CG. Most of the previous NeRF-based methods rely on implicit representation, which require additional ...
- research-articleOctober 2024
Two in One Go: Single-stage Emotion Recognition with Decoupled Subject-context Transformer
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 9340–9349https://doi.org/10.1145/3664647.3680623Emotion recognition aims to discern the emotional state of subjects within an image, relying on subject-centric and contextual visual cues. Current approaches typically follow a two-stage pipeline: first localize subjects by off-the-shelf detectors, then ...
- research-articleAugust 2024
Selective privacy-preserving framework for large language models fine-tuning
Information Sciences: an International Journal (ISCI), Volume 678, Issue Chttps://doi.org/10.1016/j.ins.2024.121000AbstractFine-tuning pre-trained large language models (LLMs) helps various downstream tasks, but brings serious privacy leaks when relying on large amounts of data for training. Differentially private stochastic gradient descent (DPSGD) has been designed ...
- research-articleOctober 2024
SSM-Net: Semi-supervised multi-task network for joint lesion segmentation and classification from pancreatic EUS images
Artificial Intelligence in Medicine (AIIM), Volume 154, Issue Chttps://doi.org/10.1016/j.artmed.2024.102919AbstractPancreatic cancer does not show specific symptoms, which makes the diagnosis of early stages difficult with established image-based screening methods and therefore has the worst prognosis among all cancers. Although endoscopic ultrasonography (...
Highlights- A semi-supervised network is designed to classify and segment pancreatic mass.
- Saliency-aware contrastive loss is introduce to capture unlabeled data features.
- Attention modules are proposed to classify and segment pancreatic ...
-
- research-articleSeptember 2024
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103803AbstractCloud file sharing (CFS) in cloud storage is one of the essential tools for enterprises to improve their core competitiveness. In the sharing process, user dynamic management and players/readers abuse has always been a problem that needs to be ...
Highlights- Prevent malicious encryptors. We use the feature of uniform distribution of hash output to hash random numbers, which makes it impossible to embed the random trapdoor.
- Dynamic management of users. We incorporate puncture encryption ...
- research-articleSeptember 2024
An intelligent task offloading method based on multi-agent deep reinforcement learning in ultra-dense heterogeneous network with mobile edge computing
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 250, Issue Chttps://doi.org/10.1016/j.comnet.2024.110555AbstractWith the rapid development of IoT technology, various computation-intensive and latency-sensitive tasks have emerged in large numbers, which impose higher requirements on the processing efficiency of the tasks. In this paper, by fusing mobile ...
- research-articleJune 2024
DGMem: learning visual navigation policy without any labels by dynamic graph memory
Applied Intelligence (KLU-APIN), Volume 54, Issue 17-18Pages 8442–8453https://doi.org/10.1007/s10489-024-05323-2AbstractIn recent years, learning-based approaches have demonstrated significant promise in addressing intricate navigation tasks. Traditional methods for training deep neural network navigation policies rely on meticulously designed reward functions or ...
- research-articleSeptember 2024
Identification of Key Factors for Efficient Operation of the Company's Wholly-owned and Majority-owned Overseas Assets
CMNM '24: Proceedings of the International Conference on Modeling, Natural Language Processing and Machine LearningPages 109–114https://doi.org/10.1145/3677779.3677797According to a series of guiding documents on overseas asset management of central enterprises, led by the Guiding Opinions on Strengthening the Prevention and Control of Overseas Integrity Risks of Central Enterprises, issued by the Discipline ...
- research-articleMay 2024
Intelligent detection method of microparticle virus in silkworm based on YOLOv8 improved algorithm
The Journal of Supercomputing (JSCO), Volume 80, Issue 12Pages 18118–18141https://doi.org/10.1007/s11227-024-06159-wAbstractThe presence of microparticle viruses significantly impacts the quality of silkworm seeds for domestic sericulture, making their exclusion from detection in silkworm seed production crucial. Traditional methods for detecting microparticle viruses ...
- research-articleApril 2024
Applying Kumaraswamy distribution on stick-breaking process: a Dirichlet neural topic model approach
Neural Computing and Applications (NCAA), Volume 36, Issue 22Pages 13731–13744https://doi.org/10.1007/s00521-024-09783-yAbstractIn recent years, neural topic modeling has increasingly raised extensive attention due to its capacity on generating coherent topics and flexible deep neural structures. However, the widely used Dirichlet distribution in shallow topic models is ...
- research-articleMay 2024
MissConf: LLM-Enhanced Reproduction of Configuration-Triggered Bugs
ICSE-Companion '24: Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion ProceedingsPages 484–495https://doi.org/10.1145/3639478.3647635Bug reproduction stands as a pivotal phase in software development, but the absence of configuration information emerges as the main obstacle to effective bug reproduction. Since configuration options generally control critical branches of the software, ...
- research-articleAugust 2024
Multi-Edge Computing Collaboration Based On QoS-QoE Model
CAICE '24: Proceedings of the 3rd International Conference on Computer, Artificial Intelligence and Control EngineeringPages 329–333https://doi.org/10.1145/3672758.3672812In recent years, along with the development and application of 5G technology, the field of industrial Internet has been rapidly developed. Accompanied by massive heterogeneity and unstructured data, it may cause the traditional relatively closed network ...
- research-articleJanuary 2024
Enhancing Graph Random Walk Acceleration via Efficient Dataflow and Hybrid Memory Architecture
IEEE Transactions on Computers (ITCO), Volume 73, Issue 3Pages 887–901https://doi.org/10.1109/TC.2023.3347674Graph random walk sampling is becoming increasingly important with the widespread popularity of graph applications. It aims to capture the desirable graph properties by launching multiple walkers to collect feature paths. However, previous research ...
- research-articleFebruary 2024
Multi-mobile vehicles task offloading for vehicle-edge-cloud collaboration: A dependency-aware and deep reinforcement learning approach
Computer Communications (COMS), Volume 213, Issue CPages 359–371https://doi.org/10.1016/j.comcom.2023.11.013AbstractThe wide application of edge cloud computing in the Internet of Vehicles (IoV) provides lower latency, more efficient computing power, and more reliable data transmission services for vehicle applications. Realistic vehicle applications ...
- ArticleFebruary 2024
Strict Differentially Private Support Vector Machines with Dimensionality Reduction
Artificial Intelligence Security and PrivacyPages 142–155https://doi.org/10.1007/978-981-99-9785-5_11AbstractWith the widespread data collection and processing, privacy-preserving machine learning has become increasingly important in addressing privacy risks related to individuals. Support vector machine (SVM) is one of the most elementary learning ...
- ArticleNovember 2023
Predicting Effect and Cost of Microservice System Evolution Using Graph Neural Network
Service-Oriented ComputingPages 103–118https://doi.org/10.1007/978-3-031-48421-6_8AbstractWith the increasing prevalence of microservice technology, the architectural flexibility and scalability of software systems have witnessed notable advancements. However, this progress has also brought about a challenge in meeting the frequent ...
- ArticleNovember 2023
ServiceSim: A Modelling and Simulation Toolkit of Microservice Systems in Cloud-Edge Environment
Service-Oriented ComputingPages 258–272https://doi.org/10.1007/978-3-031-48421-6_18AbstractWith the utilization of edge servers, cloud-native microservice systems are gradually evolving to the network edge, and large-scale distributed microservice systems in cloud-edge environments are emerging. Due to the limited resources of edge ...
- research-articleSeptember 2024
ConfTainter: Static Taint Analysis For Configuration Options
ASE '23: Proceedings of the 38th IEEE/ACM International Conference on Automated Software EngineeringPages 1640–1651https://doi.org/10.1109/ASE56229.2023.00067The prevalence and severity of software configuration-induced issues have driven the design and development of a number of detection and diagnosis techniques. Many of these techniques need to perform static taint analysis on configuration-related ...