2,884 Result(s)
-
Article
A multi-scale no-reference video quality assessment method based on transformer
Video quality assessment is essential for optimizing user experience, enhancing network efficiency, supporting video production and editing, improving advertising effectiveness, and strengthening security in m...
-
Article
Multi-party codebook distribution strategy based on secret sharing
The paper addresses the issue of secure distribution of codebooks in the field of information security, particularly in the domain of covert communication. We propose a codebook distribution technique based on...
-
Article
An effective recognition of moving target seismic anomaly for security region based on deep bidirectional LSTM combined CNN
Ground motion target recognition based on seismic signals is more convenient and efficient than traditional manual patrol identification. However, current high-precision identification methods are limited to s...
-
Article
Dual-attention-based semantic-aware self-supervised monocular depth estimation
Based on the assumption of photometric consistency, self-supervised monocular depth estimation has been widely studied due to the advantage of avoiding costly annotations. However, it is sensitive to noise, oc...
-
Article
GFSCompNet: remote sensing image compression network based on global feature-assisted segmentation
The proliferation of remote sensing image data in recent years has posed a pressing need for efficient compression techniques due to constrained transmission bandwidth. While lossless compression preserves ima...
-
Article
Improving the generalization of face forgery detection via single domain augmentation
In recent years, significant progress has been made in the field of face forgery and face forgery detection. However, the performance of the detection methods in the unknown environment is far beyond satisfact...
-
Article
FARLut: a two-stage tobacco foreign body detection model incorporating color information and attention mechanism
Accurate detection and rejection of debris in tobacco products play an essential part in ensuring the quality of tobacco products. In recent years, the detection of detritus in the production process has been ...
-
Article
Dual enhanced semantic hashing for fast image retrieval
As a highly promising technique in the field of similarity search, the hashing-based image retrieval algorithm has received continued attention in recent years because of its strong ability to efficiently prov...
-
Article
A survey on privacy-preserving federated learning against poisoning attacks
Federated learning (FL) is designed to protect privacy of participants by not allowing direct access to the participants’ local datasets and training processes. This limitation hinders the server’s ability to ...
-
Article
Retraction Note: Towards an adaptive human-centric computing resource management framework based on resource prediction and multi-objective genetic algorithm
-
Article
An improved density peaks clustering algorithm using similarity assignment strategy with K-nearest neighbors
Some particular shaped datasets, such as manifold datasets, have restrictions on density peak clustering (DPC) performance. The main reason of variations in sample densities between clusters of data and uneven...
-
Article
An image segmentation fusion algorithm based on density peak clustering and Markov random field
Image segmentation is a crucial task in the field of computer vision. Markov random fields (MRF) based image segmentation method can effectively capture intricate relationships among pixels. However, MRF typic...
-
Article
Tile-size aware bitrate allocation for adaptive 360 \(^{\circ }\) video streaming
360 \(^{\circ }\) ∘ videos have becom...
-
Article
Adaptive interactive network for RGB-T salient object detection with double map** transformer
The purpose of RGB-Thermal salient object detection (RGB-T SOD) is to segment the common salient objects or regions of the visible light image and the corresponding thermal-infrared image. Thermal-infrared inf...
-
Article
Medical image segmentation model based on caputo fractional differential
Medical image segmentation technology, as a key work of modern medical such as intelligent medical diagnosis, has attracted a lot of attention. However, the gray heterogeneity of medical images makes accurate ...
-
Article
An efficient and secure opto-cryptosystem for color medical images using 2D-SICM based fractional fourier transform
Medical images contain sensitive information and are prone to various attacks during network transmission. Therefore, it is essential to develop a robust algorithm to ensure the safety of transmitting medical ...
-
Article
MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile
In recent years, Censorship and anti-censorship technology is develo** rapidly. The censorship and surveillance systems track traffic on the network; they identify protocols and traffic, block malicious and ...
-
Article
Open AccessABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction
Digital twin network (DTN) as an emerging network paradigm, have garnered growing attention. For large-scale networks, a crucial problem is how to effectively map physical networks onto the infrastructure plat...
-
Article
MTKGR: multi-task knowledge graph reasoning for food and ingredient recognition
Food and ingredient recognition emerges as a pivotal challenge in the domain of computer vision, particularly pertinent to multimedia systems applications. To exploit the intricate relationships between foods ...
-
Article
MA-VLAD: a fine-grained local feature aggregation scheme for action recognition
A recent trend in action recognition involves aggregating local features into a more compact representation to eliminate redundancy in video features while retaining essential components for recognition. An ex...