期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Secure Content Based Image Retrieval Scheme Based on Deep Hashing and Searchable Encryption
1
作者 Zhen Wang Qiu-yu Zhang +1 位作者 Ling-tao Meng Yi-lin Liu 《Computers, Materials & Continua》 SCIE EI 2023年第6期6161-6184,共24页
To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security,retrieval efficiency,and retrieval accuracy.This research suggests a searchable encryption and deep ha... To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security,retrieval efficiency,and retrieval accuracy.This research suggests a searchable encryption and deep hashing-based secure image retrieval technique that extracts more expressive image features and constructs a secure,searchable encryption scheme.First,a deep learning framework based on residual network and transfer learn-ing model is designed to extract more representative image deep features.Secondly,the central similarity is used to quantify and construct the deep hash sequence of features.The Paillier homomorphic encryption encrypts the deep hash sequence to build a high-security and low-complexity searchable index.Finally,according to the additive homomorphic property of Paillier homomorphic encryption,a similarity measurement method suitable for com-puting in the retrieval system’s security is ensured by the encrypted domain.The experimental results,which were obtained on Web Image Database from the National University of Singapore(NUS-WIDE),Microsoft Common Objects in Context(MS COCO),and ImageNet data sets,demonstrate the system’s robust security and precise retrieval,the proposed scheme can achieve efficient image retrieval without revealing user privacy.The retrieval accuracy is improved by at least 37%compared to traditional hashing schemes.At the same time,the retrieval time is saved by at least 9.7%compared to the latest deep hashing schemes. 展开更多
关键词 Content-based image retrieval deep supervised hashing central similarity quantification searchable encryption Paillier homomorphic encryption
下载PDF
A Systematic Literature Review of Deep Learning Algorithms for Segmentation of the COVID-19 Infection
2
作者 Shroog Alshomrani Muhammad Arif Mohammed A.Al Ghamdi 《Computers, Materials & Continua》 SCIE EI 2023年第6期5717-5742,共26页
Coronavirus has infected more than 753 million people,ranging in severity from one person to another,where more than six million infected people died worldwide.Computer-aided diagnostic(CAD)with artificial intelligenc... Coronavirus has infected more than 753 million people,ranging in severity from one person to another,where more than six million infected people died worldwide.Computer-aided diagnostic(CAD)with artificial intelligence(AI)showed outstanding performance in effectively diagnosing this virus in real-time.Computed tomography is a complementary diagnostic tool to clarify the damage of COVID-19 in the lungs even before symptoms appear in patients.This paper conducts a systematic literature review of deep learning methods for classifying the segmentation of COVID-19 infection in the lungs.We used the methodology of systematic reviews and meta-analyses(PRISMA)flow method.This research aims to systematically analyze the supervised deep learning methods,open resource datasets,data augmentation methods,and loss functions used for various segment shapes of COVID-19 infection from computerized tomography(CT)chest images.We have selected 56 primary studies relevant to the topic of the paper.We have compared different aspects of the algorithms used to segment infected areas in the CT images.Limitations to deep learning in the segmentation of infected areas still need to be developed to predict smaller regions of infection at the beginning of their appearance. 展开更多
关键词 COVID-19 segmentation chest CT images deep learning systematic review 2D and 3D supervised deep learning
下载PDF
ATFF: Advanced Transformer with Multiscale Contextual Fusion for Medical Image Segmentation
3
作者 Xinping Guo Lei Wang +2 位作者 Zizhen Huang Yukun Zhang Yaolong Han 《Journal of Computer and Communications》 2024年第3期238-251,共14页
Deep convolutional neural network (CNN) greatly promotes the automatic segmentation of medical images. However, due to the inherent properties of convolution operations, CNN usually cannot establish long-distance inte... Deep convolutional neural network (CNN) greatly promotes the automatic segmentation of medical images. However, due to the inherent properties of convolution operations, CNN usually cannot establish long-distance interdependence, which limits the segmentation performance. Transformer has been successfully applied to various computer vision, using self-attention mechanism to simulate long-distance interaction, so as to capture global information. However, self-attention lacks spatial location and high-performance computing. In order to solve the above problems, we develop a new medical transformer, which has a multi-scale context fusion function and can be used for medical image segmentation. The proposed model combines convolution operation and attention mechanism to form a u-shaped framework, which can capture both local and global information. First, the traditional converter module is improved to an advanced converter module, which uses post-layer normalization to obtain mild activation values, and uses scaled cosine attention with a moving window to obtain accurate spatial information. Secondly, we also introduce a deep supervision strategy to guide the model to fuse multi-scale feature information. It further enables the proposed model to effectively propagate feature information across layers, Thanks to this, it can achieve better segmentation performance while being more robust and efficient. The proposed model is evaluated on multiple medical image segmentation datasets. Experimental results demonstrate that the proposed model achieves better performance on a challenging dataset (ETIS) compared to existing methods that rely only on convolutional neural networks, transformers, or a combination of both. The mDice and mIou indicators increased by 2.74% and 3.3% respectively. 展开更多
关键词 Medical Image Segmentation Advanced Transformer deep supervision Attention Mechanism
下载PDF
DeepIoT.IDS:Hybrid Deep Learning for Enhancing IoT Network Intrusion Detection 被引量:1
4
作者 Ziadoon K.Maseer Robiah Yusof +3 位作者 Salama A.Mostafa Nazrulazhar Bahaman Omar Musa Bander Ali Saleh Al-rimy 《Computers, Materials & Continua》 SCIE EI 2021年第12期3945-3966,共22页
With an increasing number of services connected to the internet,including cloud computing and Internet of Things(IoT)systems,the prevention of cyberattacks has become more challenging due to the high dimensionality of... With an increasing number of services connected to the internet,including cloud computing and Internet of Things(IoT)systems,the prevention of cyberattacks has become more challenging due to the high dimensionality of the network traffic data and access points.Recently,researchers have suggested deep learning(DL)algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks.However,due to the high dynamics and imbalanced nature of the data,the existing DL classifiers are not completely effective at distinguishing between abnormal and normal behavior line connections for modern networks.Therefore,it is important to design a self-adaptive model for an intrusion detection system(IDS)to improve the detection of attacks.Consequently,in this paper,a novel hybrid weighted deep belief network(HW-DBN)algorithm is proposed for building an efficient and reliable IDS(DeepIoT.IDS)model to detect existing and novel cyberattacks.The HW-DBN algorithm integrates an improved Gaussian–Bernoulli restricted Boltzmann machine(Deep GB-RBM)feature learning operator with a weighted deep neural networks(WDNN)classifier.The CICIDS2017 dataset is selected to evaluate the DeepIoT.IDS model as it contains multiple types of attacks,complex data patterns,noise values,and imbalanced classes.We have compared the performance of the DeepIoT.IDS model with three recent models.The results show the DeepIoT.IDS model outperforms the three other models by achieving a higher detection accuracy of 99.38%and 99.99%for web attack and bot attack scenarios,respectively.Furthermore,it can detect the occurrence of low-frequency attacks that are undetectable by other models. 展开更多
关键词 Cyberattacks internet of things intrusion detection system deep learning neural network supervised and unsupervised deep learning
下载PDF
Liver Tumor Segmentation Based on Multi-Scale and Self-Attention Mechanism
5
作者 Fufang Li Manlin Luo +2 位作者 Ming Hu Guobin Wang Yan Chen 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2835-2850,共16页
Liver cancer has the second highest incidence rate among all types of malignant tumors,and currently,its diagnosis heavily depends on doctors’manual labeling of CT scan images,a process that is time-consuming and sus... Liver cancer has the second highest incidence rate among all types of malignant tumors,and currently,its diagnosis heavily depends on doctors’manual labeling of CT scan images,a process that is time-consuming and susceptible to subjective errors.To address the aforementioned issues,we propose an automatic segmentation model for liver and tumors called Res2Swin Unet,which is based on the Unet architecture.The model combines Attention-Res2 and Swin Transformer modules for liver and tumor segmentation,respectively.Attention-Res2 merges multiple feature map parts with an Attention gate via skip connections,while Swin Transformer captures long-range dependencies and models the input globally.And the model uses deep supervision and a hybrid loss function for faster convergence.On the LiTS2017 dataset,it achieves better segmentation performance than other models,with an average Dice coefficient of 97.0%for liver segmentation and 81.2%for tumor segmentation. 展开更多
关键词 Liver and tumor segmentation unet attention gate swin transformer deep supervision hybrid loss function
下载PDF
A new method for the extraction of tailing ponds from very high-resolution remotely sensed images:PSVED
6
作者 Chengye Zhang Jianghe Xing +2 位作者 Jun Li Shouhang Du Qiming Qin 《International Journal of Digital Earth》 SCIE EI 2023年第1期2681-2703,共23页
Automatic extraction of tailing ponds from Very High-Resolution(VHR)remotely sensed images is vital for mineral resource management.This study proposes a Pseudo-Siamese Visual Geometry Group Encoder-Decoder network(PS... Automatic extraction of tailing ponds from Very High-Resolution(VHR)remotely sensed images is vital for mineral resource management.This study proposes a Pseudo-Siamese Visual Geometry Group Encoder-Decoder network(PSVED)to achieve high accuracy tailing ponds extraction from VHR images.First,handcrafted feature(HCF)images are calculated from VHR images based on the index calculation algorithm,highlighting the tailing ponds'signals.Second,considering the information gap between VHR images and HCF images,the Pseudo-Siamese Visual Geometry Group(Pseudo-Siamese VGG)is utilized to extract independent and representative deep semantic features from VHR images and HCF images,respectively.Third,the deep supervision mechanism is attached to handle the optimization problem of gradients vanishing or exploding.A self-made tailing ponds extraction dataset(TPSet)produced with the Gaofen-6 images of part of Hebei province,China,was employed to conduct experiments.The results show that the proposed'method_achieves the best visual performance and accuracy for tailing ponds extraction in all the tested methods,whereas the running time of the proposed method maintains at the same level as other methods.This study has practical significance in automatically extracting tailing ponds from VHR images which is beneficial to tailing ponds management and monitoring. 展开更多
关键词 Semantic segmentation tailing storage facilities Pseudo-Siamese network VHR images deep supervision mechanism
原文传递
A novel predict-prevention quality control method of multi-stage manufacturing process towards zero defect manufacturing
7
作者 Li-Ping Zhao Bo-Hao Li Yi-Yong Yao 《Advances in Manufacturing》 SCIE EI CAS CSCD 2023年第2期280-294,共15页
Zero defection manufacturing (ZDM) is the pursuit of the manufacturing industry. However, there is a lack of the implementation method of ZDM in the multi-stage manufacturing process (MMP). Implementing ZDM and contro... Zero defection manufacturing (ZDM) is the pursuit of the manufacturing industry. However, there is a lack of the implementation method of ZDM in the multi-stage manufacturing process (MMP). Implementing ZDM and controlling product quality in MMP remains an urgent problem in intelligent manufacturing. A novel predict-prevention quality control method in MMP towards ZDM is proposed, including quality characteristics monitoring, key quality characteristics prediction, and assembly quality optimization. The stability of the quality characteristics is detected by analyzing the distribution of quality characteristics. By considering the correlations between different quality characteristics, a deep supervised long-short term memory (SLSTM) prediction network is built for time series prediction of quality characteristics. A long-short term memory-genetic algorithm (LSTM-GA) network is proposed to optimize the assembly quality. By utilizing the proposed quality control method in MMP, unqualified products can be avoided, and ZDM of MMP is implemented. Extensive empirical evaluations on the MMP of compressors validate the applicability and practicability of the proposed method. 展开更多
关键词 Zero defection manufacturing(ZDM) Multi-stage manufacturing process(MMP) Moving window deep supervised long-short term memory(SLSTM)network Assembly quality optimization
原文传递
Adaptive Marine Predator Optimization Algorithm(AOMA)-Deep Supervised Learning Classification(DSLC)based IDS framework for MANET security
8
作者 M.Sahaya Sheela A.Gnana Soundari +4 位作者 Aditya Mudigonda C.Kalpana K.Suresh K.Somasundaram Yousef Farhaoui 《Intelligent and Converged Networks》 EI 2024年第1期1-18,共18页
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks today.In MANET,the Intrusion Detection System(IDS)is crucial because it a... Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks today.In MANET,the Intrusion Detection System(IDS)is crucial because it aids in the identification and detection of malicious attacks that impair the network’s regular operation.Different machine learning and deep learning methodologies are used for this purpose in the conventional works to ensure increased security of MANET.However,it still has significant flaws,including increased algorithmic complexity,lower system performance,and a higher rate of misclassification.Therefore,the goal of this paper is to create an intelligent IDS framework for significantly enhancing MANET security through the use of deep learning models.Here,the min-max normalization model is applied to preprocess the given cyber-attack datasets for normalizing the attributes or fields,which increases the overall intrusion detection performance of classifier.Then,a novel Adaptive Marine Predator Optimization Algorithm(AOMA)is implemented to choose the optimal features for improving the speed and intrusion detection performance of classifier.Moreover,the Deep Supervise Learning Classification(DSLC)mechanism is utilized to predict and categorize the type of intrusion based on proper learning and training operations.During evaluation,the performance and results of the proposed AOMA-DSLC based IDS methodology is validated and compared using various performance measures and benchmarking datasets. 展开更多
关键词 Intrusion Detection System(IDS) Security Mobile Ad-hoc Network(MANET) min-max normalization Adaptive Marine Predator Optimization Algorithm(AOMA) deep Supervise Learning Classification(DSLC)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部