117,191 research outputs found
Video Captioning with Guidance of Multimodal Latent Topics
The topic diversity of open-domain videos leads to various vocabularies and
linguistic expressions in describing video contents, and therefore, makes the
video captioning task even more challenging. In this paper, we propose an
unified caption framework, M&M TGM, which mines multimodal topics in
unsupervised fashion from data and guides the caption decoder with these
topics. Compared to pre-defined topics, the mined multimodal topics are more
semantically and visually coherent and can reflect the topic distribution of
videos better. We formulate the topic-aware caption generation as a multi-task
learning problem, in which we add a parallel task, topic prediction, in
addition to the caption task. For the topic prediction task, we use the mined
topics as the teacher to train a student topic prediction model, which learns
to predict the latent topics from multimodal contents of videos. The topic
prediction provides intermediate supervision to the learning process. As for
the caption task, we propose a novel topic-aware decoder to generate more
accurate and detailed video descriptions with the guidance from latent topics.
The entire learning procedure is end-to-end and it optimizes both tasks
simultaneously. The results from extensive experiments conducted on the MSR-VTT
and Youtube2Text datasets demonstrate the effectiveness of our proposed model.
M&M TGM not only outperforms prior state-of-the-art methods on multiple
evaluation metrics and on both benchmark datasets, but also achieves better
generalization ability.Comment: ACM Multimedia 201
Message Authentication Code over a Wiretap Channel
Message Authentication Code (MAC) is a keyed function such that when
Alice, who shares the secret with Bob, sends to the latter, Bob
will be assured of the integrity and authenticity of . Traditionally, it is
assumed that the channel is noiseless. However, Maurer showed that in this case
an attacker can succeed with probability after
authenticating messages. In this paper, we consider the setting where
the channel is noisy. Specifically, Alice and Bob are connected by a discrete
memoryless channel (DMC) and a noiseless but insecure channel. In
addition, an attacker Oscar is connected with Alice through DMC and with
Bob through a noiseless channel. In this setting, we study the framework that
sends over the noiseless channel and the traditional MAC over
channel . We regard the noisy channel as an expensive resource and
define the authentication rate as the ratio of message length to
the number of channel uses. The security of this framework depends on
the channel coding scheme for . A natural coding scheme is to use the
secrecy capacity achieving code of Csisz\'{a}r and K\"{o}rner. Intuitively,
this is also the optimal strategy. However, we propose a coding scheme that
achieves a higher Our crucial point for this is that in the
secrecy capacity setting, Bob needs to recover while in our coding
scheme this is not necessary. How to detect the attack without recovering
is the main contribution of this work. We achieve this through random
coding techniques.Comment: Formulation of model is change
- …
