Artificial Intelligence
We define personal risk detection as the timely identification of when someone is in the midst of a dangerous situation, for example, a health crisis or a car accident, events that may jeopardize a person’s physical integrity. We work under the hypothesis that a risk-prone situation produces sudden and significant deviations in standard physiological and behavioural user patterns. These changes can be captured by a group of sensors, such as the accelerometer, gyroscope, and heart rate.
- Categories:
UTERUS: The uterus dataset (Huang et al. 2021) collected from the treatment device HIFU Pro2008 of Shenzhen ProHuiren Company. The dataset comprises 495 HIFU treatment ultrasound monitoring images of uterus, with 330 images randomly selected for training, 50 images for validating and 115 images for testing. The target region for treatment is the tumor region in the ultrasound image, as marked by professional doctors, and the image size is 448×544 pixels.
- Categories:
To evaluate the proposed odometry method based on 360-degree cameras, we build a new dataset using an Insta-360 One X2 device, which provided high-resolution 4K images captured at a rate of 30 frames per second and 500\,Hz IMU measurements from its built-in IMU.Different from previous datasets, we have set the illumination brightness and the camera movements as the condition variable. The sequence can be classified based on changes in illumination speed or camera movement intensity.
- Categories:
Activities of daily living (ADLs) monitoring is essenitial in elderly field as it provides daily activities information for caregivers. In human daily life, different activities occur in various locations and generate distinct sounds and body movement. We can combine this kind of information to recognize the activities.
- Categories:
The Internet Graphs (IGraphs) dataset is a substantial collection of real intra-AS (Autonomous System) graphs sourced from the Internet Topology Data Kit (ITDK) project. Comprising a total of 90,326 graphs, each ranging from 12 to 250 nodes, this dataset provides a diverse and extensive resource for the exploration and analysis of network structures within autonomous systems.
- Categories:
We looked at 10,269 users on Twitter and collected their tweets and the follower network from April 2019 to October 2019. We organized tweets with the same hashtag into 29,192 cascades. To find an active community, we first selected 500 popular seed users. Subsequently, we added users who followed these seed users to the target group. After adding more users iteratively for five rounds, we locked the target group.
- Categories:
This dataset has been specially curated to demonstrate various image anonymization techniques for protecting privacy-sensitive areas. Gaussian blurring is used to selectively blur parts of the image, creating a blend of the original and blurred visuals. The pixelation process reduces the image to small pixel blocks and then resizes them back to their original dimensions, creating a pixelated appearance in designated areas. Distortion is implemented through elastic deformation, adding displacement fields generated by combining a Gaussian filter with a uniform random field to the image.
- Categories:
This paper conducts a systematic bibliometric analysis in the Artificial Intelligence (AI) domain to explore privacy protection research as AI technologies integrate and data privacy concerns rise. Understanding evolutionary patterns and current trends in this research is crucial. Leveraging bibliometric techniques, the authors analyze 8,322 papers from the Web of Science (WoS) database, spanning 1990 to 2023.
- Categories:
Smart contract vulnerabilities have led to substantial disruptions, ranging from the DAO attack
to the recent Poolz Finance arithmetic overflow incident. While historically, the definition of smart contract
vulnerabilities lacked standardization, even with the current advancements in Solidity smart contracts, the
potential for deploying malicious contracts to exploit legitimate ones persists.
The abstract Syntax Tree (AST ), Opcodes, and Control Flow Graph (CFG) are the intermediate representa-
- Categories:
Automatic white balance (AWB) is an important module for color constancy of cameras. The classification of the normal image and the color-distorted image is critical to realize intelligent AWB. One tenth of ImageNet is utilized as the normal image dataset for training, validating and testing. The distorted dataset is constructed by the proposed theory for generation of color distortion. To generate various distorted color, histogram shifting and matching are proposed to randomly adjust the histogram position or shape.
- Categories: