Home / Journals / JIHPP / Vol.3, No.1, 2021
  • Open AccessOpen Access

    ARTICLE

    Feature-Enhanced RefineDet: Fast Detection of Small Objects

    Lei Zhao*, Ming Zhao
    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 1-8, 2021, DOI:10.32604/jihpp.2021.010065
    Abstract Object detection has been studied for many years. The convolutional neural network has made great progress in the accuracy and speed of object detection. However, due to the low resolution of small objects and the representation of fuzzy features, one of the challenges now is how to effectively detect small objects in images. Existing target detectors for small objects: one is to use high-resolution images as input, the other is to increase the depth of the CNN network, but these two methods will undoubtedly increase the cost of calculation and time-consuming. In this paper, based on the RefineDet network framework,… More >

  • Open AccessOpen Access

    ARTICLE

    XGBoost Algorithm under Differential Privacy Protection

    Yuanmin Shi1,2, Siran Yin1,2, Ze Chen1,2, Leiming Yan1,2,*
    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 9-16, 2021, DOI:10.32604/jihpp.2021.012193
    Abstract Privacy protection is a hot research topic in information security field. An improved XGBoost algorithm is proposed to protect the privacy in classification tasks. By combining with differential privacy protection, the XGBoost can improve the classification accuracy while protecting privacy information. When using CART regression tree to build a single decision tree, noise is added according to Laplace mechanism. Compared with random forest algorithm, this algorithm can reduce computation cost and prevent overfitting to a certain extent. The experimental results show that the proposed algorithm is more effective than other traditional algorithms while protecting the privacy information in training data. More >

  • Open AccessOpen Access

    ARTICLE

    A Fast Detection Method of Network Crime Based on User Portrait

    Yabin Xu1,2,*, Meishu Zhang2, Xiaowei Xu3
    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 17-28, 2021, DOI:10.32604/jihpp.2021.017497
    Abstract In order to quickly and accurately find the implementer of the network crime, based on the user portrait technology, a rapid detection method for users with abnormal behaviorsis proposed. This method needs to construct the abnormal behavior rule base on various kinds of abnormal behaviors in advance, and construct the user portrait including basic attribute tags, behavior attribute tags and abnormal behavior similarity tagsfor network users who have abnormal behaviors. When a network crime occurs, firstly get the corresponding tag values in all user portraits according to the category of the network crime. Then, use the Naive Bayesian method matching… More >

  • Open AccessOpen Access

    REVIEW

    Survey on the Loss Function of Deep Learning in Face Recognition

    Jun Wang1, Suncheng Feng2,*, Yong Cheng3, Najla Al-Nabhan4
    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 29-45, 2021, DOI:10.32604/jihpp.2021.016835
    Abstract With the continuous development of face recognition network, the selection of loss function plays an increasingly important role in improving accuracy. The loss function of face recognition network needs to minimize the intra-class distance while expanding the inter-class distance. So far, one of our mainstream loss function optimization methods is to add penalty terms, such as orthogonal loss, to further constrain the original loss function. The other is to optimize using the loss based on angular/cosine margin. The last is Triplet loss and a new type of joint optimization based on HST Loss and ACT Loss. In this paper, based… More >

  • Open AccessOpen Access

    ARTICLE

    A Broadcast Storm Detection and Treatment Method Based on Situational Awareness

    Zhe Zhu1, Mingjian Zhang2, Yong Liu1, Lan Ma1, Xin Liu1,*
    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 47-54, 2021, DOI:10.32604/jihpp.2021.016690
    Abstract At present, the research of blockchain is very popular, but the practical application of blockchain is very few. The main reason is that the concurrency of blockchain is not enough to support application scenarios. After that, applications such as Intervalue increase the concurrency of blockchain transactions. However, due to the problems of network bandwidth and algorithm performance, there is always a broadcast storm, which affects the normal use of nodes in the whole network. However, the emergence of broadcast storms needs to rely on the node itself, which may be very slow. Even if developers debug the corresponding code, they… More >

Per Page:

Share Link