Frontiers of Computer Science最新文献

筛选
英文 中文
CW-YOLO: joint learning for mask wearing detection in low-light conditions CW-YOLO:微光条件下口罩佩戴检测联合学习
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2023-12-02 DOI: 10.1007/s11704-023-3351-y
Mingqiang Guo, Hongting Sheng, Zhizheng Zhang, Ying Huang, Xueye Chen, Cunjin Wang, Jiaming Zhang
{"title":"CW-YOLO: joint learning for mask wearing detection in low-light conditions","authors":"Mingqiang Guo, Hongting Sheng, Zhizheng Zhang, Ying Huang, Xueye Chen, Cunjin Wang, Jiaming Zhang","doi":"10.1007/s11704-023-3351-y","DOIUrl":"https://doi.org/10.1007/s11704-023-3351-y","url":null,"abstract":"<p>Comprehensive comparison results on the above two datasets indicate that the detection improvements proposed in CWYOLO framework for low-light conditions are effective and can stand out among the existing excellent method. In future work, we would explore a more efficient and lightweight network architecture with group convolution to advance the mobile deployment of the detection framework.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"137 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alignment efficient image-sentence retrieval considering transferable cross-modal representation learning 考虑可转移跨模态表示学习的对齐高效图像句子检索
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2023-12-02 DOI: 10.1007/s11704-023-3186-6
Yang Yang, Jinyi Guo, Guangyu Li, Lanyu Li, Wenjie Li, Jian Yang
{"title":"Alignment efficient image-sentence retrieval considering transferable cross-modal representation learning","authors":"Yang Yang, Jinyi Guo, Guangyu Li, Lanyu Li, Wenjie Li, Jian Yang","doi":"10.1007/s11704-023-3186-6","DOIUrl":"https://doi.org/10.1007/s11704-023-3186-6","url":null,"abstract":"<p>Traditional image-sentence cross-modal retrieval methods usually aim to learn consistent representations of heterogeneous modalities, thereby to search similar instances in one modality according to the query from another modality in result. The basic assumption behind these methods is that parallel multi-modal data (i.e., different modalities of the same example are aligned) can be obtained in prior. In other words, the image-sentence cross-modal retrieval task is a supervised task with the alignments as ground-truths. However, in many real-world applications, it is difficult to realign a large amount of parallel data for new scenarios due to the substantial labor costs, leading the non-parallel multi-modal data and existing methods cannot be used directly. On the other hand, there actually exists auxiliary parallel multi-modal data with similar semantics, which can assist the non-parallel data to learn the consistent representations. Therefore, in this paper, we aim at “Alignment Efficient Image-Sentence Retrieval” (AEIR), which recurs to the auxiliary parallel image-sentence data as the source domain data, and takes the non-parallel data as the target domain data. Unlike single-modal transfer learning, AEIR learns consistent image-sentence cross-modal representations of target domain by transferring the alignments of existing parallel data. Specifically, AEIR learns the image-sentence consistent representations in source domain with parallel data, while transferring the alignment knowledge across domains by jointly optimizing a novel designed cross-domain cross-modal metric learning based constraint with intra-modal domain adversarial loss. Consequently, we can effectively learn the consistent representations for target domain considering both the structure and semantic transfer. Furthermore, extensive experiments on different transfer scenarios validate that AEIR can achieve better retrieval results comparing with the baselines.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"21 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on federated learning: a perspective from multi-party computation 联邦学习研究综述:多方计算视角
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2023-12-02 DOI: 10.1007/s11704-023-3282-7
Fengxia Liu, Zhiming Zheng, Yexuan Shi, Yongxin Tong, Yi Zhang
{"title":"A survey on federated learning: a perspective from multi-party computation","authors":"Fengxia Liu, Zhiming Zheng, Yexuan Shi, Yongxin Tong, Yi Zhang","doi":"10.1007/s11704-023-3282-7","DOIUrl":"https://doi.org/10.1007/s11704-023-3282-7","url":null,"abstract":"<p>Federated learning is a promising learning paradigm that allows collaborative training of models across multiple data owners without sharing their raw datasets. To enhance privacy in federated learning, multi-party computation can be leveraged for secure communication and computation during model training. This survey provides a comprehensive review on how to integrate mainstream multi-party computation techniques into diverse federated learning setups for guaranteed privacy, as well as the corresponding optimization techniques to improve model accuracy and training efficiency. We also pinpoint future directions to deploy federated learning to a wider range of applications.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"21 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved differential-neural cryptanalysis for round-reduced SIMECK32/64 SIMECK32/64的改进差分神经密码分析
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2023-12-02 DOI: 10.1007/s11704-023-3261-z
Liu Zhang, Jinyu Lu, Zilong Wang, Chao Li
{"title":"Improved differential-neural cryptanalysis for round-reduced SIMECK32/64","authors":"Liu Zhang, Jinyu Lu, Zilong Wang, Chao Li","doi":"10.1007/s11704-023-3261-z","DOIUrl":"https://doi.org/10.1007/s11704-023-3261-z","url":null,"abstract":"<p>In this study, we have developed a neural network aimed at enhancing the precision of neural distinguishers, demonstrating its capability to surpass DDT-based distinguishers in certain rounds. To extend the scope of our key recovery attack to additional rounds, we have diligently focused on improving both classical differentials and neural distinguishers. Consequently, we have successfully executed practical key recovery attacks on SIMECK32/64, effectively advancing the practical attack threshold by two additional rounds, allowing us to reach up to 17 rounds.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"25 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive fusion of structure and attribute guided polarized communities search 结构与属性自适应融合引导极化群落搜索
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2023-12-02 DOI: 10.1007/s11704-023-2776-7
Fanyi Yang, Huifang Ma, Wentao Wang, Zhixin Li, Liang Chang
{"title":"Adaptive fusion of structure and attribute guided polarized communities search","authors":"Fanyi Yang, Huifang Ma, Wentao Wang, Zhixin Li, Liang Chang","doi":"10.1007/s11704-023-2776-7","DOIUrl":"https://doi.org/10.1007/s11704-023-2776-7","url":null,"abstract":"<p>In this paper, we propose the community search framework searching polarized communities via adaptively fusing structure and attribute in attributed signed networks, which searches for two polarized subgraphs on an attributed signed network for given query nodes. We first conduct a analysis by the similarity of attributes between nodes. And we adaptively integrate topology and node attributes into an augmented signed network. Then, a spectral method based on generalized Rayleigh quotient is proposed. Finally, a linear programming problem is designed to detect polarized communities by local eigenspace. Experiments on real-world datasets demonstrate the effectiveness of our method.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"14 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A sampling method based on forecasting and combinatorial optimization for high performance A/B testing 基于预测和组合优化的抽样方法,用于高性能 A/B 测试
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2023-12-01 DOI: 10.1007/s11704-023-3460-7
Fan Li, Tiancheng Zhang, Shengjia Cui, Hengyu Liu, Zhibin Ren, Donglin Di, Xiao Wang, Po Zhang, Gensitskiy Yu.
{"title":"A sampling method based on forecasting and combinatorial optimization for high performance A/B testing","authors":"Fan Li, Tiancheng Zhang, Shengjia Cui, Hengyu Liu, Zhibin Ren, Donglin Di, Xiao Wang, Po Zhang, Gensitskiy Yu.","doi":"10.1007/s11704-023-3460-7","DOIUrl":"https://doi.org/10.1007/s11704-023-3460-7","url":null,"abstract":"","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":" 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138615208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic traveling time forecasting based on spatial-temporal graph convolutional networks 基于时空图卷积网络的动态旅行时间预测
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2023-12-01 DOI: 10.1007/s11704-023-2704-x
Fangshu Chen, Yufei Zhang, Lu Chen, Xiankai Meng, Yanqiang Qi, Jiahui Wang
{"title":"Dynamic traveling time forecasting based on spatial-temporal graph convolutional networks","authors":"Fangshu Chen, Yufei Zhang, Lu Chen, Xiankai Meng, Yanqiang Qi, Jiahui Wang","doi":"10.1007/s11704-023-2704-x","DOIUrl":"https://doi.org/10.1007/s11704-023-2704-x","url":null,"abstract":"","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":" 40","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138614364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Announcement of the 2023 FCS Paper Awards 宣布 2023 年 FCS 论文奖
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2023-12-01 DOI: 10.1007/s11704-023-3998-4
{"title":"Announcement of the 2023 FCS Paper Awards","authors":"","doi":"10.1007/s11704-023-3998-4","DOIUrl":"https://doi.org/10.1007/s11704-023-3998-4","url":null,"abstract":"","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":" 10","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138617965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scattering-based hybrid network for facial attribute classification 基于散射的人脸属性分类混合网络
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2023-11-25 DOI: 10.1007/s11704-023-2570-6
Na Liu, Fan Zhang, Liang Chang, Fuqing Duan
{"title":"Scattering-based hybrid network for facial attribute classification","authors":"Na Liu, Fan Zhang, Liang Chang, Fuqing Duan","doi":"10.1007/s11704-023-2570-6","DOIUrl":"https://doi.org/10.1007/s11704-023-2570-6","url":null,"abstract":"<p>Face attribute classification (FAC) is a high-profile problem in biometric verification and face retrieval. Although recent research has been devoted to extracting more delicate image attribute features and exploiting the inter-attribute correlations, significant challenges still remain. Wavelet scattering transform (WST) is a promising non-learned feature extractor. It has been shown to yield more discriminative representations and outperforms the learned representations in certain tasks. Applied to the image classification task, WST can enhance subtle image texture information and create local deformation stability. This paper designs a scattering-based hybrid block, to incorporate frequency-domain (WST) and image-domain features in a channel attention manner (Squeeze-and-Excitation, SE), termed WS-SE block. Compared with CNN, WS-SE achieves a more efficient FAC performance and compensates for the model sensitivity of the small-scale affine transform. In addition, to further exploit the relationships among the attribute labels, we propose a learning strategy from a causal view. The cause attributes defined using the causality-related information can be utilized to infer the <i>effect attributes</i> with a high confidence level. Ablative analysis experiments demonstrate the effectiveness of our model, and our hybrid model obtains state-of-the-art results in two public datasets.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"27 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation study on the security of consensus algorithms in DAG-based distributed ledger 基于dag的分布式账本共识算法安全性仿真研究
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2023-11-25 DOI: 10.1007/s11704-023-2497-y
Shuzhe Li, Hongwei Xu, Qiong Li, Qi Han
{"title":"Simulation study on the security of consensus algorithms in DAG-based distributed ledger","authors":"Shuzhe Li, Hongwei Xu, Qiong Li, Qi Han","doi":"10.1007/s11704-023-2497-y","DOIUrl":"https://doi.org/10.1007/s11704-023-2497-y","url":null,"abstract":"<p>Due to the advantages of high volume of transactions and low resource consumption, Directed Acyclic Graph (DAG)-based Distributed Ledger Technology (DLT) has been considered a possible next-generation alternative to block-chain. However, the security of the DAG-based system has yet to be comprehensively understood. Aiming at verifying and evaluating the security of DAG-based DLT, we develop a <b>M</b>ulti-<b>A</b>gent based <b>IOTA Sim</b>ulation platform called <b>MAIOTASim</b>. In MAIOTASim, we model honest and malicious nodes and simulate the configurable network environment, including network topology and delay. The double-spending attack is a particular security issue related to DLT. We perform the security verification of the consensus algorithms under multiple double-spending attack strategies. Our simulations show that the consensus algorithms can resist the parasite chain attack and partially resist the splitting attack, but they are ineffective under the large weight attack. We take the cumulative weight difference of transactions as the evaluation criterion and analyze the effect of different consensus algorithms with parameters under each attack strategy. Besides, MAIOTASim enables users to perform large-scale simulations with multiple nodes and tens of thousands of transactions more efficiently than state-of-the-art ones.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"19 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信