448 research outputs found

    Credit Risk Measurement with Wrong Way Risk

    Get PDF
    I will start with introducing the corporate bond and several important components of it. The existing credit risk model can be categorized into two groups — Structural (Firm Value) Model and Reduced-form (Intensity-based) Models, followed by the risk measure and the risk measure—Value at Risk and its computation. Then I applied the previously introduced material to the given portfolio to calculate its credit VaR using two methods, S-critical and the Monte Carlo simulation. Finally, I present some advanced credit risk models with stochastic interest rate

    Stealing Links from Graph Neural Networks

    Full text link
    Graph data, such as chemical networks and social networks, may be deemed confidential/private because the data owner often spends lots of resources collecting the data or the data contains sensitive information, e.g., social relationships. Recently, neural networks were extended to graph data, which are known as graph neural networks (GNNs). Due to their superior performance, GNNs have many applications, such as healthcare analytics, recommender systems, and fraud detection. In this work, we propose the first attacks to steal a graph from the outputs of a GNN model that is trained on the graph. Specifically, given a black-box access to a GNN model, our attacks can infer whether there exists a link between any pair of nodes in the graph used to train the model. We call our attacks link stealing attacks. We propose a threat model to systematically characterize an adversary's background knowledge along three dimensions which in total leads to a comprehensive taxonomy of 8 different link stealing attacks. We propose multiple novel methods to realize these 8 attacks. Extensive experiments on 8 real-world datasets show that our attacks are effective at stealing links, e.g., AUC (area under the ROC curve) is above 0.95 in multiple cases. Our results indicate that the outputs of a GNN model reveal rich information about the structure of the graph used to train the model.Comment: To appear in the 30th Usenix Security Symposium, August 2021, Vancouver, B.C., Canad

    A Stronger Stitching Algorithm for Fisheye Images based on Deblurring and Registration

    Full text link
    Fisheye lens, which is suitable for panoramic imaging, has the prominent advantage of a large field of view and low cost. However, the fisheye image has a severe geometric distortion which may interfere with the stage of image registration and stitching. Aiming to resolve this drawback, we devise a stronger stitching algorithm for fisheye images by combining the traditional image processing method with deep learning. In the stage of fisheye image correction, we propose the Attention-based Nonlinear Activation Free Network (ANAFNet) to deblur fisheye images corrected by Zhang calibration method. Specifically, ANAFNet adopts the classical single-stage U-shaped architecture based on convolutional neural networks with soft-attention technique and it can restore a sharp image from a blurred image effectively. In the part of image registration, we propose the ORB-FREAK-GMS (OFG), a comprehensive image matching algorithm, to improve the accuracy of image registration. Experimental results demonstrate that panoramic images of superior quality stitching by fisheye images can be obtained through our method.Comment: 6 pages, 5 figure

    Architecture design of Jing Gangshan virtual tourism system based on WebVR

    Get PDF
    In view of the current mainstream VR virtual tourism system, because of the heavy virtual scenes and limited network bandwidth, tourists can't browse the WEB pages directly, and they need to download plugins or client systems to browse. This paper studies the lightweight architecture of virtual tourism roaming system. Research technologies such as lightweight modeling of 3D scenes, 3D engine call and lightweight script design, build a cloud storage transmission platform, integrate key technologies such as tour guides, and construct the online Jinggangshan WebVR system. The system based on this architecture will enable visitors to browse Web pages directly, online and quickly in real time, and improve the sense of interaction and immersion of the system

    Breaking Modality Disparity: Harmonized Representation for Infrared and Visible Image Registration

    Full text link
    Since the differences in viewing range, resolution and relative position, the multi-modality sensing module composed of infrared and visible cameras needs to be registered so as to have more accurate scene perception. In practice, manual calibration-based registration is the most widely used process, and it is regularly calibrated to maintain accuracy, which is time-consuming and labor-intensive. To cope with these problems, we propose a scene-adaptive infrared and visible image registration. Specifically, in regard of the discrepancy between multi-modality images, an invertible translation process is developed to establish a modality-invariant domain, which comprehensively embraces the feature intensity and distribution of both infrared and visible modalities. We employ homography to simulate the deformation between different planes and develop a hierarchical framework to rectify the deformation inferred from the proposed latent representation in a coarse-to-fine manner. For that, the advanced perception ability coupled with the residual estimation conducive to the regression of sparse offsets, and the alternate correlation search facilitates a more accurate correspondence matching. Moreover, we propose the first ground truth available misaligned infrared and visible image dataset, involving three synthetic sets and one real-world set. Extensive experiments validate the effectiveness of the proposed method against the state-of-the-arts, advancing the subsequent applications.Comment: 10 pages, 11 figure

    Rebounding through the pandemic:towards the digitized and digitalized small hospitality business in China

    Get PDF
    Purpose Grappling with the sweeping pandemic, the small hospitality business (SHB), smaller in scale and weaker in risk mitigation, has been seriously affected. The purpose of this study aims to supplement the unrepresented area of SHB in China from the digital perspective by drawing on instrumentalization theory (IT). Design/methodology/approach Based on two appropriate and detailed SHB cases, this paper adopted a qualitative approach to understand and conceptualize the focal issue. Findings This study identified the factors affecting SHB at operational, managerial and transformational levels amidst the crisis. It further developed a theoretical framework of the SHB rebound matrix, highlighting the importance of digitization and digitalization. Research limitations/implications The research theoretically confirmed that SHB is internally, externally and essentially restricted and developed a corresponding rebound matrix. It practically supports SHB’s transformation by making recommendations to unleash the potential of digital business. Originality/value This study complements extant descriptive and atheoretical research by focusing on SHB’s underlying digital nature through the lens of IT, providing an evidenced theoretical understanding of SHB’s development amidst and after the pandemic
    • …
    corecore