Open Access
ARTICLE
Lei Zhao*, Ming Zhao
Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 1-8, 2021, DOI:10.32604/jihpp.2021.010065
Abstract Object detection has been studied for many years. The convolutional
neural network has made great progress in the accuracy and speed of object
detection. However, due to the low resolution of small objects and the
representation of fuzzy features, one of the challenges now is how to effectively
detect small objects in images. Existing target detectors for small objects: one is
to use high-resolution images as input, the other is to increase the depth of the
CNN network, but these two methods will undoubtedly increase the cost of
calculation and time-consuming. In this paper, based on the RefineDet network
framework,… More >
Open Access
ARTICLE
Yuanmin Shi1,2, Siran Yin1,2, Ze Chen1,2, Leiming Yan1,2,*
Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 9-16, 2021, DOI:10.32604/jihpp.2021.012193
Abstract Privacy protection is a hot research topic in information security field.
An improved XGBoost algorithm is proposed to protect the privacy in
classification tasks. By combining with differential privacy protection, the
XGBoost can improve the classification accuracy while protecting privacy
information. When using CART regression tree to build a single decision tree,
noise is added according to Laplace mechanism. Compared with random forest
algorithm, this algorithm can reduce computation cost and prevent overfitting to a
certain extent. The experimental results show that the proposed algorithm is more
effective than other traditional algorithms while protecting the privacy information
in training data. More >
Open Access
ARTICLE
Yabin Xu1,2,*, Meishu Zhang2, Xiaowei Xu3
Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 17-28, 2021, DOI:10.32604/jihpp.2021.017497
Abstract In order to quickly and accurately find the implementer of the network
crime, based on the user portrait technology, a rapid detection method for users
with abnormal behaviorsis proposed. This method needs to construct the abnormal
behavior rule base on various kinds of abnormal behaviors in advance, and
construct the user portrait including basic attribute tags, behavior attribute tags and
abnormal behavior similarity tagsfor network users who have abnormal behaviors.
When a network crime occurs, firstly get the corresponding tag values in all user
portraits according to the category of the network crime. Then, use the Naive
Bayesian method matching… More >
Open Access
REVIEW
Jun Wang1, Suncheng Feng2,*, Yong Cheng3, Najla Al-Nabhan4
Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 29-45, 2021, DOI:10.32604/jihpp.2021.016835
Abstract With the continuous development of face recognition network, the
selection of loss function plays an increasingly important role in improving
accuracy. The loss function of face recognition network needs to minimize the
intra-class distance while expanding the inter-class distance. So far, one of our
mainstream loss function optimization methods is to add penalty terms, such as
orthogonal loss, to further constrain the original loss function. The other is to
optimize using the loss based on angular/cosine margin. The last is Triplet loss
and a new type of joint optimization based on HST Loss and ACT Loss. In this
paper, based… More >
Open Access
ARTICLE
Zhe Zhu1, Mingjian Zhang2, Yong Liu1, Lan Ma1, Xin Liu1,*
Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 47-54, 2021, DOI:10.32604/jihpp.2021.016690
Abstract At present, the research of blockchain is very popular, but the
practical application of blockchain is very few. The main reason is that the
concurrency of blockchain is not enough to support application scenarios. After
that, applications such as Intervalue increase the concurrency of blockchain
transactions. However, due to the problems of network bandwidth and algorithm
performance, there is always a broadcast storm, which affects the normal use of
nodes in the whole network. However, the emergence of broadcast storms needs
to rely on the node itself, which may be very slow. Even if developers debug the
corresponding code, they… More >