Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Rain detection algorithm based on event camera
Junyu YANG, Yan DONG, Zhennan LONG, Xin YANG, Bin HAN
Journal of Computer Applications    2023, 43 (9): 2904-2909.   DOI: 10.11772/j.issn.1001-9081.2022091360
Abstract385)   HTML8)    PDF (1427KB)(158)       Save

To reduce the harmful effects of rain for visual tasks, rain removal algorithms are commonly utilized on single frame images or video streams to remove rain. However, since rain falls extremely fast, frame-based cameras cannot capture the temporal continuity of rain, and the fixed exposure time and motion blur further reduce the sharpness of the rain on images, as a result, the traditional image rain removal algorithms cannot detect rain coverage areas accurately. In order to explore the new idea of image rain removal, a rain event generation model was constructed and a rain detection algorithm for event camera based on spatial-temporal relevance was proposed by using the characteristics of event camera: extremely high sampling rate and no motion blur. In this algorithm, the probability of each event generated by rain movement was calculated by analyzing the spatial-temporal relationship between each event recorded by the event camera and adjacent events, so as to achieve rain detection. Experimental results on three rainfall scenes show that when the camera is static, the proposed algorithm can reach more than 95% rain detection true positive rate, and the false positive rate less than 5%, and when the camera moves, the proposed algorithm can still reach more than 95% true positive rate and no more than 20% false positive rate. The above shows that the rain can be detected effectively by the proposed algorithm.

Table and Figures | Reference | Related Articles | Metrics
Deep graph matching model based on self-attention network
Zhoubo XU, Puqing CHEN, Huadong LIU, Xin YANG
Journal of Computer Applications    2023, 43 (4): 1005-1012.   DOI: 10.11772/j.issn.1001-9081.2022030345
Abstract466)   HTML54)    PDF (2118KB)(280)       Save

Node feature representation was learned by Graph Convolutional Network (GCN) by deep graph matching models in the stage of node feature extraction. However, GCN was limited by the learning ability for node feature representation, affecting the distinguishability of node features, which causes poor measurement of node similarity, and leads to the loss of model matching accuracy. To solve the problem, a deep graph matching model based on self-attention network was proposed. In the stage of node feature extraction, a new self-attention network was used to learn node features. The principle of the network is improving the feature description of nodes by utilizing spatial encoder to learn the spatial structures of nodes, and using self-attention mechanism to learn the relations among all the nodes. In addition, in order to reduce the loss of accuracy caused by relaxed graph matching problem, the graph matching problem was modelled to an integer linear programming problem. At the same time, structural matching constraints were added to graph matching problem on the basis of node matching, and an efficient combinatorial optimization solver was introduced to calculate the local optimal solution of graph matching problem. Experimental results show that on PASCAL VOC dataset, compared with Permutation loss and Cross-graph Affinity based Graph Matching (PCA-GM), the proposed model has the average matching precision on 20 classes of images increased by 14.8 percentage points, on Willow Object dataset, the proposed model has the average matching precision on 5 classes of images improved by 7.3 percentage points, and achieves the best results on object matching tasks such as bicycles and plants.

Table and Figures | Reference | Related Articles | Metrics
Positive influence maximization based on reverse influence sampling
Shuxin YANG, Jingfeng XU
Journal of Computer Applications    2022, 42 (8): 2609-2616.   DOI: 10.11772/j.issn.1001-9081.2021071185
Abstract379)   HTML7)    PDF (746KB)(134)       Save

Existing works on influence maximization mainly focus on unsigned network and neglect the hostile relationship between the individuals in the network. Aiming at the positive influence maximization problem in signed network, based on Polarity-related Independent Cascade (IC-P) model, a Reverse Influence Sampling in Signed network (RIS-S) algorithm was proposed to maximize positive influence. Firstly, in order to apply to the signed network, the polarity relationships of nodes in the stage of generating reverse reachable sets were considered. Secondly, to improve the effectiveness of reverse reachable sets, the traversal depth of sampling was limited. Finally, the positive influence ranges and running times of RIS-S, Influence Maximization via Martingales (IMM), Positive Out-Degree (POD) and Effective Degree algorithm were compared on three real signed network data sets to verify the effectiveness of the proposed algorithm. Experimental results show that RIS-S algorithm can obtain wider positive influence range by selecting more accurate seeds, and the proposed algorithm has the running time less than the same type algorithm IMM.It can be thought that RIS-S algorithm can solve the problem of positive influence maximization in signed network.

Table and Figures | Reference | Related Articles | Metrics
Camouflaged object detection based on progressive feature enhancement aggregation
Xiangyue TAN, Xiao HU, Jiaxin YANG, Junjiang XIANG
Journal of Computer Applications    2022, 42 (7): 2192-2200.   DOI: 10.11772/j.issn.1001-9081.2021060900
Abstract420)   HTML9)    PDF (2588KB)(110)       Save

Camouflaged Object Detection (COD) aims to detect objects hidden in complex environments. The existing COD algorithms ignore the influence of feature expression and fusion methods on detection performance when combining multi-level features. Therefore, a COD algorithm based on progressive feature enhancement aggregation was proposed. Firstly, multi-level features were extracted through the backbone network. Then, in order to improve the expression ability of features, an enhancement network composed of Feature Enhancement Module (FEM) was used to enhance the multi-level features. Finally, Adjacency Aggregation Module (AAM) was designed in the aggregation network to achieve information fusion between adjacent features to highlight the features of the camouflaged object area, and a new Progressive Aggregation Strategy (PAS) was proposed to aggregate adjacent features in a progressive way to achieve effective multi-level feature fusion while suppressing noise. Experimental results on 3 public datasets show that the proposed algorithm achieves the best performance on 4 objective evaluation indexes compared with 12 state-of-the-art algorithms, especially on COD10K dataset, the weighted F-measure and the Mean Absolute Error (MAE) of the proposed algorithm reach 0.809 and 0.037 respectively. It can be seen that the proposed algorithm achieves better performance on COD tasks.

Table and Figures | Reference | Related Articles | Metrics
Secure energy transaction scheme based on alliance blockchain
LONG Yangyang, CHEN Yuling, XIN Yang, DOU Hui
Journal of Computer Applications    2020, 40 (6): 1668-1673.   DOI: 10.11772/j.issn.1001-9081.2019101784
Abstract505)      PDF (763KB)(476)       Save
Blockchain technology is widely used in vehicular network, energy internet, smart grid, etc., but attackers can combine social engineering and data mining algorithms to obtain users’ privacy data recorded in the blockchain; especially in microgrid, data generated by games between neighboring energy nodes are more likely to leak user privacy. In order to solve such a problem, based on the alliance blockchain, a secure energy transaction model with a one-to-many energy node account matching mechanism was proposed. The proposed model mainly uses the generation of new accounts to prevent attackers from using data mining algorithms to obtain private data such as energy node accounts, geographical locations, and energy usage from transaction records. The simulation experiment combines the characteristics of the alliance chain, the number of new accounts generated by energy nodes, and the change of transaction verification time to give the analysis results of privacy protection performance, transaction efficiency, and security efficiency. The experimental results show that, the proposed model requires less time during the stage of transaction initiation and verification, has higher security, and the model can hide the transaction trend between adjacent users. The proposed scheme can be well applied to the energy internet transaction scenario.
Reference | Related Articles | Metrics
Intrusion prevention system against SIP distributed flooding attacks
LI Hong-bin LIN Hu Lü Xin YANG Xue-hua
Journal of Computer Applications    2011, 31 (10): 2660-2664.   DOI: 10.3724/SP.J.1087.2011.02660
Abstract1366)      PDF (694KB)(626)       Save
According to the research of distributed SIP flooding attack detection and defense, in combination with the characteristics of IP-based distributed flood attack and SIP messages, the two-level defense architecture against SIP distributed flooding attacks (TDASDFA) was presented. Two-level defensive components made up TDASDFA logically: the First level Defense Subsystem (FDS) and the Second level Defense Subsystem (SDS). FDS coarse-grained detected and defended SIP signaling stream to filter out non-VoIP messages and discard SIP messages of the IP addresses exceeding the specified rate to ensure service availability| SDS fine-grained detected and defended SIP messages using a mitigation method based on security level to identify the cunning attacks and low-flow attacks with obvious features of malicious DoS attacks. FDS and SDS detected and defended network status in real-time together to weaken SIP distributed flooding attacks. The experimental results show that TDASDFA can detect and defend SIP distributed flooding attacks, and reduces the probability of SIP proxy server or IMS server being attacked when the network is on the abnormity.
Related Articles | Metrics
Niederreiter public-key cryptosystem based on QC-LDPC
Lei-Xin YANG Wei-zhang DU
Journal of Computer Applications    2011, 31 (07): 1906-1908.   DOI: 10.3724/SP.J.1087.2011.01906
Abstract1095)      PDF (564KB)(910)       Save
A Niederreiter public-key cryptosystem based on QC-LDPC codes was proposed. As the check matrix of QC-LDPC codes is spare,who has the structure of circulative blocks and high error correction capability, compared with other public-key cryptosystem,the key sizes of the new cryptosystem is reduced and transmission rate is improved. A new parity-check matrix was mapped by invertible transformation matrix Q with diagonal form. The sparse characteristic of is countervailed. Through analyzing existing attacking methods,the security of the cryptosystem is confirmed to be improved.
Reference | Related Articles | Metrics