Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Saliency-Guided Fine-Grained Temporal Mask Learning for Few-Shot Action Recognition
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 1024–1033https://doi.org/10.1145/3664647.3681200Temporal relation modeling is one of the core aspects of few-shot action recognition. Most previous works mainly focus on temporal relation modeling based on coarse-level actions, without considering the atomic action details and fine-grained temporal ...
- ArticleNovember 2024
A Privacy-Preserving Source Code Vulnerability Detection Method
AbstractVulnerability detection is a crucial aspect of achieving system and software security. Small and micro enterprises, lacking technical reserves and computing power, may need to entrust security companies to perform vulnerability detection. However, ...
- research-articleJuly 2024
CIDF:Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDP
Internetware '24: Proceedings of the 15th Asia-Pacific Symposium on InternetwarePages 417–426https://doi.org/10.1145/3671016.3674812Industrial Control System (ICS) is vital to critical infrastructures, yet it faces increasing security threats. Current Intrusion Detection System (IDS) designed for ICS often overlooks the unbalanced resource distribution among devices at different ...
- research-articleMarch 2024
Discriminative Action Snippet Propagation Network for Weakly Supervised Temporal Action Localization
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 20, Issue 6Article No.: 180, Pages 1–21https://doi.org/10.1145/3643815Weakly supervised temporal action localization (WTAL) aims to classify and localize actions in untrimmed videos with only video-level labels. Recent studies have attempted to obtain more accurate temporal boundaries by exploiting latent action instances ...
- research-articleApril 2024
An effective iris biometric privacy protection scheme with renewability
Journal of Information Security and Applications (JISA), Volume 80, Issue Chttps://doi.org/10.1016/j.jisa.2023.103684AbstractIris is considered a unique, robust biometric that can be used as an authentication factor. Privacy protection of individuals’ iris templates is an essential requirement. The essential attributes needed to ensure privacy of biometrics are ...
-
- research-articleJanuary 2024
Motion-Aware Memory Network for Fast Video Salient Object Detection
IEEE Transactions on Image Processing (TIP), Volume 33Pages 709–721https://doi.org/10.1109/TIP.2023.3348659Previous methods based on 3DCNN, convLSTM, or optical flow have achieved great success in video salient object detection (VSOD). However, these methods still suffer from high computational costs or poor quality of the generated saliency maps. To address ...
- research-articleDecember 2023
A Distributed and Parallel Accelerator Design for 3-D Acoustic Imaging on FPGA-Based Systems
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 43, Issue 5Pages 1401–1414https://doi.org/10.1109/TCAD.2023.33401283-D imaging sonar is crucial in the exploration of marine resources, and the development of portable device with high-imaging quality and high-real-time performance is the general trend. However, traditional framework methods are limited by the huge ...
- ArticleNovember 2023
Cancellable Iris Recognition Scheme Based on Inversion Fusion and Local Ranking
AbstractIris recognition has gained significant attention and application in real-life and financial scenarios in recent years due to its importance as a biometric data source. While many proposed solutions boast high recognition accuracy, one major ...
- ArticleNovember 2023
Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification
AbstractIn cancelable biometric (CB) schemes, secure biometric templates are generated by applying, mainly non-linear, transformations to the origin data. The cancelable templates should satisfy the requirements of irreversibility, unlinkability, and ...
- ArticleApril 2024
An Investigation of the Effectiveness of Template Protection Methods on Protecting Privacy During Iris Spoof Detection
AbstractWith the development of iris biometrics, more and more industries and fields begin to apply iris recognition methods. However, as technology advances, attackers try to use printed iris images or artifacts and so on to spoof iris recognition ...
- research-articleOctober 2023
A negative survey based privacy preservation method for topology of social networks
AbstractWith the development of social platforms, the social network has aroused wide attention. Since social networks contain a lot of personal sensitive information, many privacy preservation methods have been designed for social networks to ...
Highlights- A negative survey based method, called NetNS, is designed to disturb the topology of social networks, so that the personal social relationship can be ...
- research-articleJuly 2023
Spatial–Temporal Synchronous Transformer for Skeleton-Based Hand Gesture Recognition
IEEE Transactions on Circuits and Systems for Video Technology (IEEETCSVT), Volume 34, Issue 3Pages 1403–1412https://doi.org/10.1109/TCSVT.2023.3295084Capturing the long-range spatial-temporal correlation among joints of dynamic skeletal data efficiently is very challenging in hand gesture recognition (HGR). The flexibility of Transformer in modeling global dependencies among elements of any sequence ...
- articleMay 2023
Generating Random SAT Instances: Multiple Solutions could be Predefined and Deeply Hidden
The generation of SAT instances is an important issue in computer science, and it is useful for researchers to verify the effectiveness of SAT solvers. Addressing this issue could inspire researchers to propose new search strategies. SAT problems exist in ...
- research-articleFebruary 2022
Throughput maximisation for multi‐channel energy harvesting cognitive radio networks with hybrid overlay/underlay transmission
AbstractThis paper focuses on the issue of joint time and power allocation in multi‐channel energy harvesting CR networks (EH‐CRNs), where the multi‐antenna secondary transmitter (ST) opportunistically accesses the licensed subchannels by a hybrid overlay/...
- research-articleOctober 2021
k-means clustering and kNN classification based on negative databases
AbstractNowadays, privacy protection has become an important issue in data mining. k-means clustering and kNN classification are two popular data mining algorithms, which have been widely studied in the past decade. In this paper, we mainly ...
Highlights- An algorithm (named QK-hidden) is designed for generating NDBs in a fine-grained manner.
- research-articleOctober 2020
A Novel Diagnosis Method of Proton Exchange Membrane Fuel Cells Based on the PCA and XGBoost Algorithm
IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics SocietyPages 3951–3956https://doi.org/10.1109/IECON43393.2020.9255167As a renewable and efficient power source, proton exchange membrane fuel cells (PEMFCs) are receiving more and more attention from the world, but it still has shortcomings with poor durability and insufficient reliability, so the purpose of this paper is ...
- research-articleOctober 2020
An Improved State Machine Strategy for Fuel-Cell-Based Hybrid Electric Vehicles
IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics SocietyPages 3957–3962https://doi.org/10.1109/IECON43393.2020.9254705In this paper, a hybrid power system for electric vehicle with fuel cell stack and Lithium-ion battery is designed and power converters transferring power are modeled. Besides, an improved state machine strategy is developed to split the power produced by ...
- research-articleJuly 2020
Domain Adaptation Based Person-Specific Face Anti-spoofing Using Color Texture Features
ICMLT '20: Proceedings of the 2020 5th International Conference on Machine Learning TechnologiesPages 79–85https://doi.org/10.1145/3409073.3409087Face anti-spoofing technology is indispensable for the face recognition system, which is vulnerable to malicious spoofing attacks such as printed attacks and replayed video attacks. In this paper, we focus on more challenging cross-database ...
- research-articleMarch 2020
Software aging and rejuvenation in android: new models and metrics
Software Quality Journal (KLU-SQJO), Volume 28, Issue 1Pages 85–106https://doi.org/10.1007/s11219-019-09475-0AbstractAndroid users are occasionally troubled by the slow UI responses and sudden application/OS crashes. These problems are mainly caused by software aging, a phenomenon of progressive degradation of performance and dependability typically observed in ...
- research-articleSeptember 2019
CVSkSA: cross-architecture vulnerability search in firmware based on kNN-SVM and attributed control flow graph
Software Quality Journal (KLU-SQJO), Volume 27, Issue 3Pages 1045–1068https://doi.org/10.1007/s11219-018-9435-5AbstractTo prevent the same known vulnerabilities from affecting different firmware, searching known vulnerabilities in binary firmware across different architectures is crucial. Because the accuracy of existing cross-architecture vulnerability search ...