{"title":"CW-YOLO: joint learning for mask wearing detection in low-light conditions","authors":"Mingqiang Guo, Hongting Sheng, Zhizheng Zhang, Ying Huang, Xueye Chen, Cunjin Wang, Jiaming Zhang","doi":"10.1007/s11704-023-3351-y","DOIUrl":"https://doi.org/10.1007/s11704-023-3351-y","url":null,"abstract":"<p>Comprehensive comparison results on the above two datasets indicate that the detection improvements proposed in CWYOLO framework for low-light conditions are effective and can stand out among the existing excellent method. In future work, we would explore a more efficient and lightweight network architecture with group convolution to advance the mobile deployment of the detection framework.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"137 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yang Yang, Jinyi Guo, Guangyu Li, Lanyu Li, Wenjie Li, Jian Yang
{"title":"Alignment efficient image-sentence retrieval considering transferable cross-modal representation learning","authors":"Yang Yang, Jinyi Guo, Guangyu Li, Lanyu Li, Wenjie Li, Jian Yang","doi":"10.1007/s11704-023-3186-6","DOIUrl":"https://doi.org/10.1007/s11704-023-3186-6","url":null,"abstract":"<p>Traditional image-sentence cross-modal retrieval methods usually aim to learn consistent representations of heterogeneous modalities, thereby to search similar instances in one modality according to the query from another modality in result. The basic assumption behind these methods is that parallel multi-modal data (i.e., different modalities of the same example are aligned) can be obtained in prior. In other words, the image-sentence cross-modal retrieval task is a supervised task with the alignments as ground-truths. However, in many real-world applications, it is difficult to realign a large amount of parallel data for new scenarios due to the substantial labor costs, leading the non-parallel multi-modal data and existing methods cannot be used directly. On the other hand, there actually exists auxiliary parallel multi-modal data with similar semantics, which can assist the non-parallel data to learn the consistent representations. Therefore, in this paper, we aim at “Alignment Efficient Image-Sentence Retrieval” (AEIR), which recurs to the auxiliary parallel image-sentence data as the source domain data, and takes the non-parallel data as the target domain data. Unlike single-modal transfer learning, AEIR learns consistent image-sentence cross-modal representations of target domain by transferring the alignments of existing parallel data. Specifically, AEIR learns the image-sentence consistent representations in source domain with parallel data, while transferring the alignment knowledge across domains by jointly optimizing a novel designed cross-domain cross-modal metric learning based constraint with intra-modal domain adversarial loss. Consequently, we can effectively learn the consistent representations for target domain considering both the structure and semantic transfer. Furthermore, extensive experiments on different transfer scenarios validate that AEIR can achieve better retrieval results comparing with the baselines.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"21 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fengxia Liu, Zhiming Zheng, Yexuan Shi, Yongxin Tong, Yi Zhang
{"title":"A survey on federated learning: a perspective from multi-party computation","authors":"Fengxia Liu, Zhiming Zheng, Yexuan Shi, Yongxin Tong, Yi Zhang","doi":"10.1007/s11704-023-3282-7","DOIUrl":"https://doi.org/10.1007/s11704-023-3282-7","url":null,"abstract":"<p>Federated learning is a promising learning paradigm that allows collaborative training of models across multiple data owners without sharing their raw datasets. To enhance privacy in federated learning, multi-party computation can be leveraged for secure communication and computation during model training. This survey provides a comprehensive review on how to integrate mainstream multi-party computation techniques into diverse federated learning setups for guaranteed privacy, as well as the corresponding optimization techniques to improve model accuracy and training efficiency. We also pinpoint future directions to deploy federated learning to a wider range of applications.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"21 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved differential-neural cryptanalysis for round-reduced SIMECK32/64","authors":"Liu Zhang, Jinyu Lu, Zilong Wang, Chao Li","doi":"10.1007/s11704-023-3261-z","DOIUrl":"https://doi.org/10.1007/s11704-023-3261-z","url":null,"abstract":"<p>In this study, we have developed a neural network aimed at enhancing the precision of neural distinguishers, demonstrating its capability to surpass DDT-based distinguishers in certain rounds. To extend the scope of our key recovery attack to additional rounds, we have diligently focused on improving both classical differentials and neural distinguishers. Consequently, we have successfully executed practical key recovery attacks on SIMECK32/64, effectively advancing the practical attack threshold by two additional rounds, allowing us to reach up to 17 rounds.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"25 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive fusion of structure and attribute guided polarized communities search","authors":"Fanyi Yang, Huifang Ma, Wentao Wang, Zhixin Li, Liang Chang","doi":"10.1007/s11704-023-2776-7","DOIUrl":"https://doi.org/10.1007/s11704-023-2776-7","url":null,"abstract":"<p>In this paper, we propose the community search framework searching polarized communities via adaptively fusing structure and attribute in attributed signed networks, which searches for two polarized subgraphs on an attributed signed network for given query nodes. We first conduct a analysis by the similarity of attributes between nodes. And we adaptively integrate topology and node attributes into an augmented signed network. Then, a spectral method based on generalized Rayleigh quotient is proposed. Finally, a linear programming problem is designed to detect polarized communities by local eigenspace. Experiments on real-world datasets demonstrate the effectiveness of our method.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"14 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Announcement of the 2023 FCS Paper Awards","authors":"","doi":"10.1007/s11704-023-3998-4","DOIUrl":"https://doi.org/10.1007/s11704-023-3998-4","url":null,"abstract":"","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":" 10","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138617965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scattering-based hybrid network for facial attribute classification","authors":"Na Liu, Fan Zhang, Liang Chang, Fuqing Duan","doi":"10.1007/s11704-023-2570-6","DOIUrl":"https://doi.org/10.1007/s11704-023-2570-6","url":null,"abstract":"<p>Face attribute classification (FAC) is a high-profile problem in biometric verification and face retrieval. Although recent research has been devoted to extracting more delicate image attribute features and exploiting the inter-attribute correlations, significant challenges still remain. Wavelet scattering transform (WST) is a promising non-learned feature extractor. It has been shown to yield more discriminative representations and outperforms the learned representations in certain tasks. Applied to the image classification task, WST can enhance subtle image texture information and create local deformation stability. This paper designs a scattering-based hybrid block, to incorporate frequency-domain (WST) and image-domain features in a channel attention manner (Squeeze-and-Excitation, SE), termed WS-SE block. Compared with CNN, WS-SE achieves a more efficient FAC performance and compensates for the model sensitivity of the small-scale affine transform. In addition, to further exploit the relationships among the attribute labels, we propose a learning strategy from a causal view. The cause attributes defined using the causality-related information can be utilized to infer the <i>effect attributes</i> with a high confidence level. Ablative analysis experiments demonstrate the effectiveness of our model, and our hybrid model obtains state-of-the-art results in two public datasets.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"27 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation study on the security of consensus algorithms in DAG-based distributed ledger","authors":"Shuzhe Li, Hongwei Xu, Qiong Li, Qi Han","doi":"10.1007/s11704-023-2497-y","DOIUrl":"https://doi.org/10.1007/s11704-023-2497-y","url":null,"abstract":"<p>Due to the advantages of high volume of transactions and low resource consumption, Directed Acyclic Graph (DAG)-based Distributed Ledger Technology (DLT) has been considered a possible next-generation alternative to block-chain. However, the security of the DAG-based system has yet to be comprehensively understood. Aiming at verifying and evaluating the security of DAG-based DLT, we develop a <b>M</b>ulti-<b>A</b>gent based <b>IOTA Sim</b>ulation platform called <b>MAIOTASim</b>. In MAIOTASim, we model honest and malicious nodes and simulate the configurable network environment, including network topology and delay. The double-spending attack is a particular security issue related to DLT. We perform the security verification of the consensus algorithms under multiple double-spending attack strategies. Our simulations show that the consensus algorithms can resist the parasite chain attack and partially resist the splitting attack, but they are ineffective under the large weight attack. We take the cumulative weight difference of transactions as the evaluation criterion and analyze the effect of different consensus algorithms with parameters under each attack strategy. Besides, MAIOTASim enables users to perform large-scale simulations with multiple nodes and tens of thousands of transactions more efficiently than state-of-the-art ones.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"19 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2023-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138534580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}