Computer Science, Software Engineering

Review Computer Science, Software Engineering

Attention mechanisms in computer vision: A survey

Meng-Hao Guo, Tian-Xing Xu, Jiang-Jiang Liu, Zheng-Ning Liu, Peng-Tao Jiang, Tai-Jiang Mu, Song-Hai Zhang, Ralph R. Martin, Ming-Ming Cheng, Shi-Min Hu

Summary: Attention mechanisms, inspired by the human visual system, have been successfully applied in various computer vision tasks. This survey provides a comprehensive review of different types of attention mechanisms and suggests future research directions.

COMPUTATIONAL VISUAL MEDIA (2022)

Article Computer Science, Interdisciplinary Applications

Honey Badger Algorithm: New metaheuristic algorithm for solving optimization problems

Fatma A. Hashim, Essam H. Houssein, Kashif Hussain, Mai S. Mabrouk, Walid Al-Atabany

Summary: This paper introduces a new metaheuristic optimization algorithm called Honey Badger Algorithm (HBA), inspired by the intelligent foraging behavior of honey badgers, to develop an efficient search strategy for solving optimization problems. Experimental results demonstrate the effectiveness and superiority of HBA in solving optimization problems with complex search-space.

MATHEMATICS AND COMPUTERS IN SIMULATION (2022)

Article Computer Science, Software Engineering

Machine Learning Testing: Survey, Landscapes and Horizons

Jie M. Zhang, Mark Harman, Lei Ma, Yang Liu

Summary: This paper provides a comprehensive survey of techniques for testing machine learning systems and analyzes trends and challenges in ML testing, offering promising research directions for the future.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2022)

Article Computer Science, Hardware & Architecture

NeRF: Representing Scenes as Neural Radiance Fields for View Synthesis

Ben Mildenhall, Pratul P. Srinivasan, Matthew Tancik, Jonathan T. Barron, Ravi Ramamoorthi, Ren Ng

Summary: This method achieves state-of-the-art results for synthesizing novel views of complex scenes by optimizing an underlying continuous volumetric scene function using a sparse set of input views. The algorithm represents a scene using a fully connected deep network and synthesizes views by querying 5D coordinates and using volume rendering techniques.

COMMUNICATIONS OF THE ACM (2022)

Article Computer Science, Software Engineering

PVT v2: Improved baselines with Pyramid Vision Transformer

Wenhai Wang, Enze Xie, Xiang Li, Deng-Ping Fan, Kaitao Song, Ding Liang, Tong Lu, Ping Luo, Ling Shao

Summary: This work presents the improved Pyramid Vision Transformer v2 (PVT v2) by adding three designs, achieving significant improvements in fundamental vision tasks. PVT v2 performs comparably or better than recent work such as the Swin transformer.

COMPUTATIONAL VISUAL MEDIA (2022)

Article Computer Science, Information Systems

Task Failure Prediction in Cloud Data Centers Using Deep Learning

Jiechao Gao, Haoyu Wang, Haiying Shen

Summary: Large-scale cloud data centers often face high failure rates due to hardware and software failures, which can greatly reduce service reliability and require significant resources for recovery. Predicting task and job failures with high accuracy is crucial to avoid wastage. This article proposes a failure prediction algorithm based on multi-layer Bi-LSTM, which outperforms other methods with 93% accuracy for task failure and 87% accuracy for job failures.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features

Xin Liao, Jiaojiao Yin, Mingliang Chen, Zheng Qin

Summary: This article introduces the application of multiple image steganography in the era of cloud storage, discusses payload distribution strategies for enhancing security performance, and provides supporting evidence through experiments.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Software Engineering

Instant Neural Graphics Primitives with a Multiresolution Hash Encoding

Thomas Mueller, Alex Evans, Christoph Schied, Alexander Keller

Summary: The research introduces a versatile new input encoding that allows for a reduction in the cost of training and evaluation by using a multiresolution hash table in neural networks.

ACM TRANSACTIONS ON GRAPHICS (2022)

Article Computer Science, Hardware & Architecture

SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities

Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen

Summary: This article introduces a systematic framework for using deep learning to detect vulnerabilities in C/C++ programs. Through experiments, the practicality of the framework is demonstrated, and several previously unreported vulnerabilities are successfully detected.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing

Yao Liu, Tanping Zhou, Zelun Yue, Wenchao Liu, Yiliang Han, Qi Li, Xiaoyuan Yang

Summary: Privacy protection of biometrics-based on cloud computing is attracting attention. An efficient and privacy-preserving online fingerprint authentication scheme called e-Finga was proposed. However, the temporary fingerprint in this scheme was found to have the risk of leaking the user's fingerprint characteristics. To counter this, a temporary fingerprint attack method was proposed and a secure e-finger scheme was developed. Experiments showed that the secure e-finger scheme can resist the temporary fingerprint attack.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Hardware & Architecture

Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices

Shuming Qiu, Ding Wang, Guoai Xu, Saru Kumari

Summary: This article proposes a provably secure three-factor AKA protocol based on extended chaotic-maps for mobile lightweight devices. By utilizing Fuzzy-Verifiers and Honeywords techniques, the protocol achieves a good balance between security and usability.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

Natural language processing: state of the art, current trends and challenges

Diksha Khurana, Aditya Koli, Kiran Khatter, Sukhdev Singh

Summary: This paper discusses the different levels and components of NLP, introduces the history and application fields of NLP, and provides a detailed discussion on the current state, trends, and challenges of NLP. It also discusses available datasets, models, and evaluation metrics in NLP.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Extended Feature Pyramid Network for Small Object Detection

Chunfang Deng, Mengmeng Wang, Liang Liu, Yong Liu, Yunliang Jiang

Summary: In this paper, the authors propose an extended feature pyramid network (EFPN) for small object detection. They introduce a feature texture transfer (FTT) module for super-resolving features and extracting regional details, as well as a cross resolution distillation mechanism to enhance the network's ability to perceive details. Experimental results show that the proposed EFPN is computationally and memory efficient, and achieves state-of-the-art results on small object detection datasets.

IEEE TRANSACTIONS ON MULTIMEDIA (2022)

Review Computer Science, Information Systems

A review on extreme learning machine

Jian Wang, Siyuan Lu, Shui-Hua Wang, Yu-Dong Zhang

Summary: Extreme learning machine (ELM) is a training algorithm for single hidden layer feedforward neural network (SLFN) that converges faster than traditional methods with promising performance. This paper provides a comprehensive review on ELM, focusing on theoretical analysis, improvements for stability, efficiency, and accuracy, as well as its applications in medical imaging and discussions on controversies. The aim is to report advances and explore future perspectives.

MULTIMEDIA TOOLS AND APPLICATIONS (2022)

Article Computer Science, Hardware & Architecture

Intelligent Diagnosis Using Continuous Wavelet Transform and Gauss Convolutional Deep Belief Network

Huimin Zhao, Jie Liu, Huayue Chen, Jie Chen, Yang Li, Junjie Xu, Wu Deng

Summary: This paper proposes a novel method for extracting vibration amplitude spectrum imaging features using continuous wavelet transform and image conversion, as well as a new CDBN for bearing fault classification. The proposed method outperforms traditional methods in performance, as shown in experiments on motor bearing datasets.

IEEE TRANSACTIONS ON RELIABILITY (2023)

Article Computer Science, Information Systems

Beyond Triplet Loss: Person Re-Identification With Fine-Grained Difference-Aware Pairwise Loss

Cheng Yan, Guansong Pang, Xiao Bai, Changhong Liu, Xin Ning, Lin Gu, Jun Zhou

Summary: Person Re-Identification aims to re-identify individuals from different viewpoints using fine-grained appearance differences. A novel pairwise loss function is introduced to enable learning of fine-grained features by penalizing small differences exponentially and large differences moderately. Experimental results show that the proposed loss outperforms popular loss functions and enhances data efficiency.

IEEE TRANSACTIONS ON MULTIMEDIA (2022)

Article Computer Science, Hardware & Architecture

SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System

Jinrong Chen, Lin Liu, Rongmao Chen, Wei Peng, Xinyi Huang

Summary: This article introduces a method for preserving privacy in a context-aware recommendation system in a two-cloud model. The author adjusts the additive secret sharing scheme and designs secure comparison and division protocols to propose a secure and efficient recommendation system. Experimental results demonstrate the effectiveness of the scheme.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Hardware & Architecture

LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue

Zhou Su, Yuntao Wang, Qichao Xu, Ning Zhang

Summary: This article proposes a lightweight vehicular blockchain-enabled secure (LVBS) data sharing framework for UAV-aided IoV in disaster rescue. The framework utilizes the collaboration between UAVs and blockchain to enable data sharing and secure driving in disaster areas. The research shows that this framework improves the security of the consensus phase and promotes high-quality data sharing.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

Enabling Verifiable and Dynamic Ranked Search over Outsourced Data

Qin Liu, Yue Tian, Jie Wu, Tao Peng, Guojun Wang

Summary: The study proposes a Verifiable Dynamic Encryption with Ranked Search (VDERS) scheme that enables top-K searches on cloud computing while ensuring result correctness through verification. It also supports efficient updates and deletions.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Blockchain Security: A Survey of Techniques and Research Directions

Jiewu Leng, Man Zhou, J. Leon Zhao, Yongfeng Huang, Yiyang Bian

Summary: This article introduces the basic principles and security issues of blockchain, pointing out the problem of previous research being too technical and overlooking business and organizational aspects. Through reviewing the research status and proposing future directions, it provides insights for further research and addressing blockchain security issues.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)