Review
Computer Science, Software Engineering
Meng-Hao Guo, Tian-Xing Xu, Jiang-Jiang Liu, Zheng-Ning Liu, Peng-Tao Jiang, Tai-Jiang Mu, Song-Hai Zhang, Ralph R. Martin, Ming-Ming Cheng, Shi-Min Hu
Summary: Attention mechanisms, inspired by the human visual system, have been successfully applied in various computer vision tasks. This survey provides a comprehensive review of different types of attention mechanisms and suggests future research directions.
COMPUTATIONAL VISUAL MEDIA
(2022)
Article
Computer Science, Interdisciplinary Applications
Fatma A. Hashim, Essam H. Houssein, Kashif Hussain, Mai S. Mabrouk, Walid Al-Atabany
Summary: This paper introduces a new metaheuristic optimization algorithm called Honey Badger Algorithm (HBA), inspired by the intelligent foraging behavior of honey badgers, to develop an efficient search strategy for solving optimization problems. Experimental results demonstrate the effectiveness and superiority of HBA in solving optimization problems with complex search-space.
MATHEMATICS AND COMPUTERS IN SIMULATION
(2022)
Article
Computer Science, Software Engineering
Jie M. Zhang, Mark Harman, Lei Ma, Yang Liu
Summary: This paper provides a comprehensive survey of techniques for testing machine learning systems and analyzes trends and challenges in ML testing, offering promising research directions for the future.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
(2022)
Article
Computer Science, Hardware & Architecture
Ben Mildenhall, Pratul P. Srinivasan, Matthew Tancik, Jonathan T. Barron, Ravi Ramamoorthi, Ren Ng
Summary: This method achieves state-of-the-art results for synthesizing novel views of complex scenes by optimizing an underlying continuous volumetric scene function using a sparse set of input views. The algorithm represents a scene using a fully connected deep network and synthesizes views by querying 5D coordinates and using volume rendering techniques.
COMMUNICATIONS OF THE ACM
(2022)
Article
Computer Science, Software Engineering
Wenhai Wang, Enze Xie, Xiang Li, Deng-Ping Fan, Kaitao Song, Ding Liang, Tong Lu, Ping Luo, Ling Shao
Summary: This work presents the improved Pyramid Vision Transformer v2 (PVT v2) by adding three designs, achieving significant improvements in fundamental vision tasks. PVT v2 performs comparably or better than recent work such as the Swin transformer.
COMPUTATIONAL VISUAL MEDIA
(2022)
Article
Computer Science, Information Systems
Jiechao Gao, Haoyu Wang, Haiying Shen
Summary: Large-scale cloud data centers often face high failure rates due to hardware and software failures, which can greatly reduce service reliability and require significant resources for recovery. Predicting task and job failures with high accuracy is crucial to avoid wastage. This article proposes a failure prediction algorithm based on multi-layer Bi-LSTM, which outperforms other methods with 93% accuracy for task failure and 87% accuracy for job failures.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Xin Liao, Jiaojiao Yin, Mingliang Chen, Zheng Qin
Summary: This article introduces the application of multiple image steganography in the era of cloud storage, discusses payload distribution strategies for enhancing security performance, and provides supporting evidence through experiments.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Software Engineering
Thomas Mueller, Alex Evans, Christoph Schied, Alexander Keller
Summary: The research introduces a versatile new input encoding that allows for a reduction in the cost of training and evaluation by using a multiresolution hash table in neural networks.
ACM TRANSACTIONS ON GRAPHICS
(2022)
Article
Computer Science, Hardware & Architecture
Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen
Summary: This article introduces a systematic framework for using deep learning to detect vulnerabilities in C/C++ programs. Through experiments, the practicality of the framework is demonstrated, and several previously unreported vulnerabilities are successfully detected.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Information Systems
Yao Liu, Tanping Zhou, Zelun Yue, Wenchao Liu, Yiliang Han, Qi Li, Xiaoyuan Yang
Summary: Privacy protection of biometrics-based on cloud computing is attracting attention. An efficient and privacy-preserving online fingerprint authentication scheme called e-Finga was proposed. However, the temporary fingerprint in this scheme was found to have the risk of leaking the user's fingerprint characteristics. To counter this, a temporary fingerprint attack method was proposed and a secure e-finger scheme was developed. Experiments showed that the secure e-finger scheme can resist the temporary fingerprint attack.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)
Article
Computer Science, Hardware & Architecture
Shuming Qiu, Ding Wang, Guoai Xu, Saru Kumari
Summary: This article proposes a provably secure three-factor AKA protocol based on extended chaotic-maps for mobile lightweight devices. By utilizing Fuzzy-Verifiers and Honeywords techniques, the protocol achieves a good balance between security and usability.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Information Systems
Diksha Khurana, Aditya Koli, Kiran Khatter, Sukhdev Singh
Summary: This paper discusses the different levels and components of NLP, introduces the history and application fields of NLP, and provides a detailed discussion on the current state, trends, and challenges of NLP. It also discusses available datasets, models, and evaluation metrics in NLP.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Chunfang Deng, Mengmeng Wang, Liang Liu, Yong Liu, Yunliang Jiang
Summary: In this paper, the authors propose an extended feature pyramid network (EFPN) for small object detection. They introduce a feature texture transfer (FTT) module for super-resolving features and extracting regional details, as well as a cross resolution distillation mechanism to enhance the network's ability to perceive details. Experimental results show that the proposed EFPN is computationally and memory efficient, and achieves state-of-the-art results on small object detection datasets.
IEEE TRANSACTIONS ON MULTIMEDIA
(2022)
Review
Computer Science, Information Systems
Jian Wang, Siyuan Lu, Shui-Hua Wang, Yu-Dong Zhang
Summary: Extreme learning machine (ELM) is a training algorithm for single hidden layer feedforward neural network (SLFN) that converges faster than traditional methods with promising performance. This paper provides a comprehensive review on ELM, focusing on theoretical analysis, improvements for stability, efficiency, and accuracy, as well as its applications in medical imaging and discussions on controversies. The aim is to report advances and explore future perspectives.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Computer Science, Hardware & Architecture
Huimin Zhao, Jie Liu, Huayue Chen, Jie Chen, Yang Li, Junjie Xu, Wu Deng
Summary: This paper proposes a novel method for extracting vibration amplitude spectrum imaging features using continuous wavelet transform and image conversion, as well as a new CDBN for bearing fault classification. The proposed method outperforms traditional methods in performance, as shown in experiments on motor bearing datasets.
IEEE TRANSACTIONS ON RELIABILITY
(2023)
Article
Computer Science, Information Systems
Cheng Yan, Guansong Pang, Xiao Bai, Changhong Liu, Xin Ning, Lin Gu, Jun Zhou
Summary: Person Re-Identification aims to re-identify individuals from different viewpoints using fine-grained appearance differences. A novel pairwise loss function is introduced to enable learning of fine-grained features by penalizing small differences exponentially and large differences moderately. Experimental results show that the proposed loss outperforms popular loss functions and enhances data efficiency.
IEEE TRANSACTIONS ON MULTIMEDIA
(2022)
Article
Computer Science, Hardware & Architecture
Jinrong Chen, Lin Liu, Rongmao Chen, Wei Peng, Xinyi Huang
Summary: This article introduces a method for preserving privacy in a context-aware recommendation system in a two-cloud model. The author adjusts the additive secret sharing scheme and designs secure comparison and division protocols to propose a secure and efficient recommendation system. Experimental results demonstrate the effectiveness of the scheme.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Zhou Su, Yuntao Wang, Qichao Xu, Ning Zhang
Summary: This article proposes a lightweight vehicular blockchain-enabled secure (LVBS) data sharing framework for UAV-aided IoV in disaster rescue. The framework utilizes the collaboration between UAVs and blockchain to enable data sharing and secure driving in disaster areas. The research shows that this framework improves the security of the consensus phase and promotes high-quality data sharing.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Information Systems
Qin Liu, Yue Tian, Jie Wu, Tao Peng, Guojun Wang
Summary: The study proposes a Verifiable Dynamic Encryption with Ranked Search (VDERS) scheme that enables top-K searches on cloud computing while ensuring result correctness through verification. It also supports efficient updates and deletions.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Information Systems
Jiewu Leng, Man Zhou, J. Leon Zhao, Yongfeng Huang, Yiyang Bian
Summary: This article introduces the basic principles and security issues of blockchain, pointing out the problem of previous research being too technical and overlooking business and organizational aspects. Through reviewing the research status and proposing future directions, it provides insights for further research and addressing blockchain security issues.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)