期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Transformer architecture based on mutual attention for image-anomaly detection
1
作者 Mengting ZHANG xiuxia tian 《Virtual Reality & Intelligent Hardware》 2023年第1期57-67,共11页
Image-anomaly detection, which is widely used in industrial fields. Previous studies that attempted to address this problem often trained convolutional neural network-based models(e.g., autoencoders and generative adv... Image-anomaly detection, which is widely used in industrial fields. Previous studies that attempted to address this problem often trained convolutional neural network-based models(e.g., autoencoders and generative adversarial networks) to reconstruct covered parts of input images and calculate the difference between the input and reconstructed images. However, convolutional operations are effective at extracting local features, making it difficult to identify larger image anomalies. Method To this end, we propose a transformer architecture based on mutual attention for image-anomaly separation. This architecture can capture long-term dependencies and fuse local and global features to facilitate better image-anomaly detection. Result Our method was extensively evaluated on several benchmarks, and experimental results showed that it improved the detection capability by 3.1% and localization capability by 1.0% compared with state-of-the-art reconstruction-based methods. 展开更多
关键词 Anomaly detection Swin transformer Feature fusion Attentional mechanism Unsupervised learning
下载PDF
Budget analysis of mesoscale available potential energy in a heavy rainfall event over the eastern Tibetan Plateau
2
作者 Kuo Zhou Lingkun Ran +1 位作者 Yi Liu xiuxia tian 《Atmospheric and Oceanic Science Letters》 CSCD 2021年第2期53-59,共7页
Using model simulated data,the distribution characteristics,genesis,and impacts on precipitation of available potential energy(APE)are analyzed for a heavy rainfall event that took place over the eastern Tibetan Plate... Using model simulated data,the distribution characteristics,genesis,and impacts on precipitation of available potential energy(APE)are analyzed for a heavy rainfall event that took place over the eastern Tibetan Plateau during 10–11 July 2018.Results show that APE was mainly distributed below 4 km and within 8–14 km.The APE distribution in the upper level had a better correspondence with precipitation.Northwestern cold advection and evaporation of falling raindrops were primary factors leading to positive anomalies of APE in the lower level,while positive anomalies of APE in the upper level were caused by a combination of thermal disturbances driven by latent heat and potential temperature perturbations resulting from the orography of the Tibetan Plateau.Budget analysis of APE indicated that APE fluxes and conversion between APE and kinetic energy(KE)were the main source and sink terms.Meridional fluxes of APE and conversion of KE to APE fed the dissipation of APE in the lower level.Vertical motion enhanced by conversion of APE to KE in the upper level was the major factor that promoted precipitation evolution.A positive feedback between APE and vertical motion in the upper level generated a powerful correlation between them.Conversion of KE to APE lasted longer in the lower level,which weakened vertical motion;whereas,northwestern cold advection brought an enhanced trend to the APE,resulting in a weak correlation between APE and vertical motion. 展开更多
关键词 Heavy rainfall Available potential energy Budget analysis Vertical motion
下载PDF
Image copy-move forgery passive detection based on improved PCNN and self-selected sub-images
3
作者 Guoshuai Zhou xiuxia tian Aoying Zhou 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第4期131-146,共16页
Image forgery detection remains a challenging problem.For the most common copy-move forgery detection,the robustness and accuracy of existing methods can still be further improved.To the best of our knowledge,we are t... Image forgery detection remains a challenging problem.For the most common copy-move forgery detection,the robustness and accuracy of existing methods can still be further improved.To the best of our knowledge,we are the first to propose an image copy-move forgery passive detection method by combining the improved pulse coupled neural network(PCNN)and the self-selected sub-images.Our method has the following steps:First,contour detection is performed on the input color image,and bounding boxes are drawn to frame the contours to form suspected forgery sub-images.Second,by improving PCNN to perform feature extraction of sub-images,the feature invariance of rotation,scaling,noise adding,and so on can be achieved.Finally,the dual feature matching is used to match the features and locate the forgery regions.What’s more,the self-selected sub-images can quickly obtain suspected forgery sub-images and lessen the workload of feature extraction,and the improved PCNN can extract image features with high robustness.Through experiments on the standard image forgery datasets CoMoFoD and CASIA,it is effectively verified that the robustness score and accuracy of proposed method are much higher than the current best method,which is a more efficient image copy-move forgery passive detection method. 展开更多
关键词 image copy-move forgery passive detection self-selected sub-images pulse coupled neural network(PCNN) dual feature matching
原文传递
A privacy-enhancing scheme against contextual knowledge-based attacks in location-based services
4
作者 Jiaxun HUA Yu LIU +3 位作者 Yibin SHEN xiuxia tian Yifeng LUO Cheqing JIN 《Frontiers of Computer Science》 SCIE EI CSCD 2020年第3期225-227,共3页
1 Introduction and main contributions Location-based services are springing up around us,while leakages of users'privacy are inevitable during services.Even worse,adversaries may analyze intercepted service data,a... 1 Introduction and main contributions Location-based services are springing up around us,while leakages of users'privacy are inevitable during services.Even worse,adversaries may analyze intercepted service data,and extract more privacy like health and property.Therefore,privacy preservation is an indispensable guarantee on LBS security.Among the previous approaches to privacy preservation,k-anonymity-based ones have drawn much research attention[1-3].However,some privacy concern will be aroused if these schemes are adopted directly.For instance,Ut issues a query"Find the nearest hotel around me"in such an area as Fig.1(privacy profile k=4).DLS algorithm[2]constructs anonymity set A because these four cells have similar probabilities of being queried in the past.However,experienced adversaries can exclude some cells if they have learned rich contextual knowledge(side information)from historical data,such as features of each cell and LBS users. 展开更多
关键词 LBS services knowledge
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部