The advent of 5G technology introduces significant advancements in communication, marked by high speed, low latency, and massive connectivity. These attributes position 5G as a promising technology for military applic...
详细信息
As the deployment of fifth generation (5G) mobile wireless networks continues to gain momentum, researchers are already focusing on the challenges and opportunities of the next sixth generation (6G). To meet the ever-...
详细信息
ISBN:
(数字)9798350387957
ISBN:
(纸本)9798350387964
As the deployment of fifth generation (5G) mobile wireless networks continues to gain momentum, researchers are already focusing on the challenges and opportunities of the next sixth generation (6G). To meet the ever-increasing demand for higher data rates and support the development of new services, 6G is expected to exploit millimeter wave (mmWave) frequencies. However, the complex propagation characteristics at mmWave require beamforming technology, which introduces significant complexity in the communication system. Herein, we propose a real-time testbed platform to evaluate beamforming and other communication solutions designed for multiple-input multiple-output (MIMO) mmWave-based 6G networks. This platform serves as an enabler for 6G technologies evaluation under realistic propagation conditions, accelerating the development and deployment of robust and efficient 6G networks. To demonstrate the capabilities of our platform, we have implemented a smart relay with real-time beam control and tracking. The platform is able to perform an exhaustive search of 64 reception beams in less than 256 μs. Additionally, the platform can maintain the optimal beam even in mobility scenarios using a gradient-based tracking system that achieves a low overhead of less than 5%, with an update rate of 100 Hz.
Blockchain technology is heralded for its ability to provide transparent and immutable audit trails for data shared among semi-trusted parties. With the addition of smart contracts, blockchains can track and verify ar...
详细信息
ISBN:
(数字)9781665471770
ISBN:
(纸本)9781665471770
Blockchain technology is heralded for its ability to provide transparent and immutable audit trails for data shared among semi-trusted parties. With the addition of smart contracts, blockchains can track and verify arbitrary computations - which enables blockchain users to verify the provenance of information derived from data through the blockchain. This provenance comes at the cost of data confidentiality and user privacy, however, which is unacceptable for many sensitive applications. The need for verifiable yet confidential data sharing and computation has led some to add trusted execution environment (TEE) hardware to blockchain platforms. By moving sensitive operations (e.g., data decryption and analysis) off of the blockchain and into a TEE, they get both the confidentiality of TEEs and the transparency of blockchains without the need to completely trust any one party in the data-sharing ecosystem. In this paper, we build on our TEE-enabled blockchain datasharing system, Amanuensis, to ensure the freshness of accesscontrol lists shared between the blockchain and TEE, and to improve the privacy of users interacting within the system. We also detail how TEE-based remote attestation help us to achieve information provenance - specifically, how to achieve information provenance in the context of the Intel SGX trusted execution environment. Finally, we present an evaluation of our system, in which we test several real-world machine-learning applications (logistic regression, kNN, SVM) to determine the run-time overhead of information confidentiality and provenance. Each machine-learning program exhibited a slowdown between 1.1 and 2.8x when run inside of our confidential environment, and took an average of 59 milliseconds to verify the provenance of an input data set.
Federated Learning (FL) is a new distributed machine learning framework that enables reliable collaborative training without collecting users' private data, it can successfully address the issue of data silos. How...
详细信息
The integration of cloud computing and Internet of Things (IoT) technologies has brought significant advancements in the agriculture domain. However, the implementation of such systems often requires significant time ...
详细信息
The proceedings contain 27 papers. The topics discussed include: a general-purpose analog computer to population protocol compiler;compile-time optimization of the energy consumption of numerical computations;effectiv...
ISBN:
(纸本)9798400704925
The proceedings contain 27 papers. The topics discussed include: a general-purpose analog computer to population protocol compiler;compile-time optimization of the energy consumption of numerical computations;effective HPC programming via domain specific abstractions and compilation;high-level synthesis for complex applications: the Bambu approach;relaxed threshold implementations;using a performance model to implement a superscalar CVA6;seeing beyond the order: a LEN5 to sharpen edge microprocessors with dynamic scheduling;integrating SystemC-AMS power modeling with a RISC-V ISS for virtual prototyping of battery-operated embedded devices;a gigabit, DMA-enhanced open-source ethernet controller for mixed-criticality systems;and model theft attack against a tinyML application running on an ultra-low-power open-source SoC.
Arid Amir, bathroom Fat Hang and Shall Husain that discusses the capability of the use of machine gaining knowledge of to decorate automatic real-time facts analysis structures. The authors present an overview of syst...
详细信息
The task of deepfakes detection is far from being solved by speech or vision researchers. Several publicly available databases of fake synthetic video and speech were built to aid the development of detection methods....
详细信息
ISBN:
(纸本)9798350337266
The task of deepfakes detection is far from being solved by speech or vision researchers. Several publicly available databases of fake synthetic video and speech were built to aid the development of detection methods. However, existing databases typically focus on visual or voice modalities and provide no proof that their deepfakes can in fact impersonate any real person. In this paper, we present the first realistic audio-visual database of deepfakes SWAN-DF, where lips and speech are well synchronized and video have high visual and audio qualities. We took the publicly available SWAN dataset of real videos with different identities to create audio-visual deepfakes using several models from DeepFaceLab and blending techniques for face swapping and HiFiVC, DiffVC, YourTTS, and FreeVC models for voice conversion. From the publicly available speech dataset LibriTTS, we also created a separate database of only audio deepfakes LibriTTS-DF using several latest text to speech methods: YourTTS, Adaspeech, and TorToiSe. We demonstrate the vulnerability of a state of the art speaker recognition system, such as ECAPA-TDNN-based model from SpeechBrain, to the synthetic voices. Similarly, we tested face recognition system based on the MobileFaceNet architecture to several variants of our visual deepfakes. The vulnerability assessment show that by tuning the existing pretrained deepfake models to specific identities, one can successfully spoof the face and speaker recognition systems in more than 90% of the time and achieve a very realistic looking and sounding fake video of a given person.
Traditional recommender systems often face challenges such as the cold-start problem and data sparsity, especially in cross-domain scenarios. These issues limit their ability to provide accurate recommendations for ne...
详细信息
With the increasing demand for real-timecomputingapplications on energy-harvesting embedded devices which are deployed wherever it is not possible or practical to recharge, the worst-case performance analysis become...
详细信息
ISBN:
(纸本)9783981926361
With the increasing demand for real-timecomputingapplications on energy-harvesting embedded devices which are deployed wherever it is not possible or practical to recharge, the worst-case performance analysis becomes crucial. However, it is difficult to bound the worst-case response time of tasks under both timing and energy constraints due to the uncertainty of harvested energy. Based on this motivation, this paper studies response time analysis for Energy-Harvesting Mixed-Criticality (EHMC) systems. We present schedulability analysis algorithm to extend the Adaptive Mixed Criticality (AMC) approach to EHMC systems. Furthermore, we develop two response time bounds for it. To our best knowledge, this is the first work of response time analysis for EHMC systems. Finally, we examine both the effectiveness and the tightness of the bounds by experiments.
暂无评论