期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
An efficient approach for shadow detection based on Gaussian mixture model 被引量:2
1
作者 韩延祥 张志胜 +1 位作者 陈芳 陈恺 《Journal of Central South University》 SCIE EI CAS 2014年第4期1385-1395,共11页
An efficient approach was proposed for discriminating shadows from moving objects. In the background subtraction stage, moving objects were extracted. Then, the initial classification for moving shadow pixels and fore... An efficient approach was proposed for discriminating shadows from moving objects. In the background subtraction stage, moving objects were extracted. Then, the initial classification for moving shadow pixels and foreground object pixels was performed by using color invariant features. In the shadow model learning stage, instead of a single Gaussian distribution, it was assumed that the density function computed on the values of chromaticity difference or bright difference, can be modeled as a mixture of Gaussian consisting of two density functions. Meanwhile, the Gaussian parameter estimation was performed by using EM algorithm. The estimates were used to obtain shadow mask according to two constraints. Finally, experiments were carried out. The visual experiment results confirm the effectiveness of proposed method. Quantitative results in terms of the shadow detection rate and the shadow discrimination rate(the maximum values are 85.79% and 97.56%, respectively) show that the proposed approach achieves a satisfying result with post-processing step. 展开更多
关键词 shadow detection Gaussian mixture model EM algorithm
在线阅读 下载PDF
Black-box membership inference attacks based on shadow model 被引量:1
2
作者 Han Zhen Zhou Wen'an +1 位作者 Han Xiaoxuan Wu Jie 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2024年第4期1-16,共16页
Membership inference attacks on machine learning models have drawn significant attention.While current research primarily utilizes shadow modeling techniques,which require knowledge of the target model and training da... Membership inference attacks on machine learning models have drawn significant attention.While current research primarily utilizes shadow modeling techniques,which require knowledge of the target model and training data,practical scenarios involve black-box access to the target model with no available information.Limited training data further complicate the implementation of these attacks.In this paper,we experimentally compare common data enhancement schemes and propose a data synthesis framework based on the variational autoencoder generative adversarial network(VAE-GAN)to extend the training data for shadow models.Meanwhile,this paper proposes a shadow model training algorithm based on adversarial training to improve the shadow model's ability to mimic the predicted behavior of the target model when the target model's information is unknown.By conducting attack experiments on different models under the black-box access setting,this paper verifies the effectiveness of the VAE-GAN-based data synthesis framework for improving the accuracy of membership inference attack.Furthermore,we verify that the shadow model,trained by using the adversarial training approach,effectively improves the degree of mimicking the predicted behavior of the target model.Compared with existing research methods,the method proposed in this paper achieves a 2%improvement in attack accuracy and delivers better attack performance. 展开更多
关键词 machine learning membership inference attack shadow model black-box model
原文传递
New approach to calculating tree height at the regional scale
3
作者 Congrong Li Jinling Song Jindi Wang 《Forest Ecosystems》 SCIE CSCD 2021年第2期311-329,共19页
Background:Determining the spatial distribution of tree heights at the regional area scale is significant when performing forest above-ground biomass estimates in forest resource management research.The geometric-opti... Background:Determining the spatial distribution of tree heights at the regional area scale is significant when performing forest above-ground biomass estimates in forest resource management research.The geometric-optical mutual shadowing(GOMS)model can be used to invert the forest canopy structural parameters at the regional scale.However,this method can obtain only the ratios among the horizontal canopy diameter(CD),tree height,clear height,and vertical CD.In this paper,we used a semi-variance model to calculate the CD using high spatial resolution images and expanded this method to the regional scale.We then combined the CD results with the forest canopy structural parameter inversion results from the GOMS model to calculate tree heights at the regional scale.Results:The semi-variance model can be used to calculate the CD at the regional scale that closely matches(mainly with in a range from-1 to 1 m)the CD derived from the canopy height model(CHM)data.The difference between tree heights calculated by the GOMS model and the tree heights derived from the CHM data was small,with a root mean square error(RMSE)of 1.96 for a 500-m area with high fractional vegetation cover(FVC)(i.e.,forest area coverage index values greater than 0.8).Both the inaccuracy of the tree height derived from the CHM data and the unmatched spatial resolution of different datasets will influence the accuracy of the inverted tree height.And the error caused by the unmatched spatial resolution is small in dense forest.Conclusions:The semi-variance model can be used to calculate the CD at the regional scale,together with the canopy structure parameters inverted by the GOMS model,the mean tree height at the regional scale can be obtained.Our study provides a new approach for calculating tree height and provides further directions for the application of the GOMS model. 展开更多
关键词 Geometric-optical mutual shadowing(GOMS)model Semi-variance model Canopy diameter Tree height Regional scale
在线阅读 下载PDF
Shadow regions detection algorithm by adaptive narrowband two-phase Chan-Vese model 被引量:2
4
作者 WANG Xingmei YIN Guisheng +2 位作者 LIU Guangyu LIU Zhipeng WANG Xiaowei 《Chinese Journal of Acoustics》 CSCD 2016年第3期292-308,共17页
An adaptive narrowband two-phase Chan-Vese (ANBCV) model is proposed for improving the shadow regions detection performance of sonar images. In the first noise smoothing step, the anisotropic second-order neighborho... An adaptive narrowband two-phase Chan-Vese (ANBCV) model is proposed for improving the shadow regions detection performance of sonar images. In the first noise smoothing step, the anisotropic second-order neighborhood MRF (Markov Random Field, MRF) is used to describe the image texture feature parameters. Then, initial two-class segmentation is processed with the block mode k-means clustering algorithm, to estimate the approximate position of the shadow regions. On this basis, the zero level set function is adaptively initialized by the approximate position of shadow regions. ANBCV model is provided to complete local optimization for eliminating the image global interference and obtaining more accurate results. Experimental results show that the new algorithm can efficiently remove partial noise, increase detection speed and accuracy, and with less human intervention. 展开更多
关键词 MRF Shadow regions detection algorithm by adaptive narrowband two-phase Chan-Vese model
原文传递
SecureWeb: Protecting Sensitive Information Through the Web Browser Extension with a Security Token 被引量:3
5
作者 Shuang Liang Yue Zhang +3 位作者 Bo Li Xiaojie Guo Chunfu Jia Zheli Liu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第5期526-538,共13页
The leakage of sensitive data occurs on a large scale and with increasingly serious impact. It may cause privacy disclosure or even property damage. Password leakage is one of the fundamental reasons for information l... The leakage of sensitive data occurs on a large scale and with increasingly serious impact. It may cause privacy disclosure or even property damage. Password leakage is one of the fundamental reasons for information leakage, and its importance is must be emphasized because users are likely to use the same passwords for different Web application accounts. Existing approaches use a password manager and encrypted Web application to protect passwords and other sensitive data; however, they may be compromised or lack accessibility. The paper presents SecureWeb, which is a secure, practical, and user-controllable framework for mitigating the leakage of sensitive data. SecureWeb protects users' passwords and aims to provide a unified protection solution to diverse sensitive data. The efficiency of the developed schemes is demonstrated and the results indicate that it has a low overhead and are of practical use. 展开更多
关键词 password manager data privacy format-preserving encryption Shadow Document Object model(DOM)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部