Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
RDLNet: A Novel and Accurate Real-world Document Localization Method
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 9847–9855https://doi.org/10.1145/3664647.3681655The increasing use of smartphones for capturing documents in various real-world conditions has underscored the need for robust document localization technologies. Current challenges in this domain include handling diverse document types, complex ...
- ArticleNovember 2024
CoMoFusion: Fast and High-Quality Fusion of Infrared and Visible Image with Consistency Model
AbstractGenerative models are widely utilized to model the distribution of fused images in the field of infrared and visible image fusion. However, current generative models based fusion methods often suffer from unstable training and slow inference ...
- research-articleOctober 2024
An uncertain bi-objective mean-entropy model for portfolio selection with realistic factors
Mathematics and Computers in Simulation (MCSC), Volume 225, Issue CPages 216–231https://doi.org/10.1016/j.matcom.2024.05.013AbstractIn the imprecise investment environment, there are many indeterminate factors impacting security returns. This paper introduces a portfolio optimization problem where cross-entropy is utilized to control portfolio risk within the framework of ...
- surveyOctober 2024
Vulnerabilities and Security Patches Detection in OSS: A Survey
ACM Computing Surveys (CSUR), Volume 57, Issue 1Article No.: 23, Pages 1–37https://doi.org/10.1145/3694782Over the past decade, Open Source Software (OSS) has experienced rapid growth and widespread adoption, attributed to its openness and editability. However, this expansion has also brought significant security challenges, particularly introducing and ...
- research-articleOctober 2024
Density peaks clustering based on density voting and neighborhood diffusion
- Wenke Zang,
- Jing Che,
- Linlin Ma,
- Xincheng Liu,
- Aoyu Song,
- Jingwen Xiong,
- Yuzhen Zhao,
- Xiyu Liu,
- Yawen Chen,
- Hui Li
Information Sciences: an International Journal (ISCI), Volume 681, Issue Chttps://doi.org/10.1016/j.ins.2024.121209AbstractDensity Peaks Clustering (DPC) is a well-known clustering technique in the data mining field with fewer parameters as well as no iteration. However, when dealing with datasets containing multiple peaks, DPC may subjectively choose the wrong ...
-
- ArticleSeptember 2024
ProGEO: Generating Prompts Through Image-Text Contrastive Learning for Visual Geo-Localization
Artificial Neural Networks and Machine Learning – ICANN 2024Pages 448–462https://doi.org/10.1007/978-3-031-72338-4_30AbstractVisual Geo-localization (VG) refers to the process to identify the location described in query images, which is widely applied in robotics field and computer vision tasks, such as autonomous driving, metaverse, augmented reality, and SLAM. In fine-...
- ArticleSeptember 2024
Alignment-Enhanced Network for Temporal Language Grounding in Videos
Artificial Neural Networks and Machine Learning – ICANN 2024Pages 177–192https://doi.org/10.1007/978-3-031-72338-4_13AbstractTemporal language grounding in videos aims to ground one video segment in an untrimmed video based on a given sentence query. The main challenge in this task lies in how to align the video and textual modalities effectively. Most existing methods ...
- research-articleSeptember 2024
A robust PID and RLS controller for TCP/AQM system
Journal of Network and Computer Applications (JNCA), Volume 229, Issue Chttps://doi.org/10.1016/j.jnca.2024.103947AbstractTransmission Control Protocol (TCP) controlling congestion by peer-to-peer is challenging to handle communication with numerous concurrent TCP flows and heavy traffic loads. Therefore, TCP requires the active queue management (AQM) to assist in ...
- research-articleSeptember 2024
Achieving federated logistic regression training towards model confidentiality with semi-honest TEE
Information Sciences: an International Journal (ISCI), Volume 679, Issue Chttps://doi.org/10.1016/j.ins.2024.121115AbstractIn the distributed machine learning field, federated learning (FL) serves as a highly effective framework for dismantling data silos and integrating data from multiple sources. However, the flourishing of FL still encounters significant ...
Highlights- A fine-grained Cryptography-TEE hybrid security model for multi-party cooperative computation scenario is defined.
- A series of TEE-assisted secure computation protocols are designed to achieve secure and lossless non-linear operations.
- research-articleSeptember 2024
iDP-FL: A fine-grained and privacy-aware federated learning framework for deep neural networks
Information Sciences: an International Journal (ISCI), Volume 679, Issue Chttps://doi.org/10.1016/j.ins.2024.121035AbstractFederated learning (FL), as a distributed machine learning paradigm, essentially promises that multiple parties can jointly train the model collaboratively without sharing local data. Recent research demonstrates that the adversary can deduce the ...
- research-articleSeptember 2024
A stabilized peridynamic correspondence material model for axisymmetric ablation and fracture problems
Highlights- A stabilized peridynamic correspondence material model for axisymmetric ablation and fracture problems is proposed.
- A strain energy density decomposition method is adopted to distinguish effect of different deformations.
- A novel ...
A stabilized peridynamic correspondence material model for axisymmetric problems (SPD-CMM-A) is proposed in this work to effectively simulate the ablation and ductile fracture behaviors of metals under high temperatures. To quantify the damage ...
- research-articleAugust 2024
BDS multiple satellite clock offset parallel prediction based on multivariate CNN-LSTM model
AbstractReal-time service (RTS) products are an important guarantee for real-time precise point positioning (RT-PPP), and the RTS outages caused by loss of network connection are a concern. In this paper, a multivariate CNN-LSTM model is proposed for ...
- ArticleAugust 2024
Identity Authentication Methods Based on User Profiling
AbstractIn today’s digital and intelligent environment, the research on authentication technology has become an important branch in the field of information security. This paper introduces an identity verification method that utilizes user profiles on the ...
- research-articleAugust 2024
Single-frequency cycle slip detection and repair for a standalone GNSS receiver using a common-antenna-based dual-board design
AbstractLow-cost single-frequency receivers are increasingly applied to high-precision positioning in support of high-performance GNSS market applications. However, frequent and multiple small cycle slips (CS) detection and repair is a limiting factor for ...
- research-articleAugust 2024JUST ACCEPTED
MMICT: Boosting Multi-Modal Fine-Tuning with In-Context Examples
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Just Accepted https://doi.org/10.1145/3688804Although In-Context Learning (ICL) brings remarkable performance gains to Large Language Models (LLMs), the improvements remain lower than fine-tuning on downstream tasks. This paper introduces Multi-Modal In-Context Tuning (MMICT), a novel multi-modal ...
- research-articleOctober 2024
Research on performance evaluation of equipment maintenance cost based on BSC-improved efficacy coefficient method
ICBDDM '24: Proceedings of the 2024 International Conference on Big Data and Digital ManagementPages 387–392https://doi.org/10.1145/3696500.3696564As an important fund for equipment support, the use effect of equipment maintenance expenses directly affects the generation of military combat effectiveness. In view of the shortcomings in the current research on the performance evaluation of military ...
- research-articleOctober 2024
Risk Identification of Equipment Maintenance Cost Supervision based on HHM-RFRM
ICBDDM '24: Proceedings of the 2024 International Conference on Big Data and Digital ManagementPages 342–349https://doi.org/10.1145/3696500.3696558As an important fund to support the maintenance and restoration of combat effectiveness of equipment, strengthening the risk management of equipment maintenance costs is of great significance. As the top priority of risk management, risk identification ...
- research-articleAugust 2024
Achieving High Efficiency for Datacenter Multicast using Skewed Bloom Filter
ICPP '24: Proceedings of the 53rd International Conference on Parallel ProcessingPages 1227–1236https://doi.org/10.1145/3673038.3673126Multicast serves as an important approach for one-to-many communication in data center networks. To reduce overhead and improve scalability, bloom filters are employed in current multicast approaches to store forwarding ports of switches. However, the ...
- ArticleAugust 2024
BiLETCR: An Efficient PMHC-TCR Combined Forecasting Method
Advanced Intelligent Computing in BioinformaticsPages 25–37https://doi.org/10.1007/978-981-97-5692-6_3AbstractThis paper introduces a method incorporating a multi-attention mechanism with a Bidirectional Long Short-Term Memory Network (BiLSTM) structure, aimed at predicting the binding probability between peptides and major histocompatibility complex (...
- ArticleAugust 2024
Diagonal-Angle-Foreground IoU Loss Function for Small Object Detection
Advanced Intelligent Computing Technology and ApplicationsPages 108–120https://doi.org/10.1007/978-981-97-5612-4_10AbstractBoundary box regression is a crucial step in object detection, directly influencing the model's ability to accurately locate objects. Traditional Intersection over Union (IoU) loss functions struggle to provide effective gradient information when ...