Mobile wireless sensor networks are crucial in several applications, such as environmental monitoring, disaster management, and military surveillance. Nevertheless, utilizing these devices in remote and hostile settin...
详细信息
This paper introduces a distributed data acquisition architecture for track geometry measurement system(TGMS) to address the evolving needs in inspection environments and enhance the flexibility and scalability of the...
详细信息
In contrast to fully-supervised models, self-supervised representation learning only needs a fraction of data to be labeled and often achieves the same or even higher downstream performance. The goal is to pre-train d...
详细信息
ISBN:
(纸本)9783031585463;9783031585470
In contrast to fully-supervised models, self-supervised representation learning only needs a fraction of data to be labeled and often achieves the same or even higher downstream performance. The goal is to pre-train deep neural networks on a self-supervised task, making them able to extract meaningful features from raw input data afterwards. Previously, autoencoders and Siamese networks have been successfully employed as feature extractors for tasks such as image classification. However, both have their individual shortcomings and benefits. In this paper, we combine their complementary strengths by proposing a new method called SidAE (Siamese denoising autoencoder). Using an image classification downstream task, we show that our model outperforms two self-supervised baselines across multiple data sets and scenarios. Crucially, this includes conditions in which only a small amount of labeled data is available. Empirically, the Siamese component has more impact, but the denoising autoencoder is nevertheless necessary to improve performance.
With the expanding applicability of the Internet of Things (IoT), novel IoT network security challenges also appear more frequently. Host-based Mimicry Attacks (HMA) are one of them that is difficult to detect by trad...
详细信息
Broadcast and Consensus are most fundamental tasks in distributed computing. These tasks are particularly challenging in dynamic networks where communication across the network links may be unreliable, e.g., due to mo...
详细信息
ISBN:
(纸本)9783959773522
Broadcast and Consensus are most fundamental tasks in distributed computing. These tasks are particularly challenging in dynamic networks where communication across the network links may be unreliable, e.g., due to mobility or failures. Over the last years, researchers have derived several impossibility results and high time complexity lower bounds for these tasks. Specifically for the setting where in each round of communication the adversary is allowed to choose one rooted tree along which the information is disseminated, there is a lower as well as an upper bound that is linear in the number n of nodes for Broadcast and for n ≥ 3 the adversary can guarantee that Consensus never happens. This setting is called the oblivious message adversary for rooted trees. Also note that if the adversary is allowed to choose a graph that does not contain a rooted tree, then it can guarantee that Broadcast and Consensus will never happen. However, such deterministic adversarial models may be overly pessimistic, as many processes in real-world settings are stochastic in nature rather than worst-case. This paper studies Broadcast on stochastic dynamic networks and shows that the situation is very different to the deterministic case. In particular, we show that if information dissemination occurs along random rooted trees and directed Erdős–Rényi graphs, Broadcast completes in O(log n) rounds of communication with high probability. The fundamental insight in our analysis is that key variables are mutually independent. We then study two adversarial models, (a) one with Byzantine nodes and (b) one where an adversary controls the edges. (a) Our techniques without Byzantine nodes are general enough so that they can be extended to Byzantine nodes. (b) In the spirit of smoothed analysis, we introduce the notion of randomized oblivious message adversary, where in each round, an adversary picks k ≤ 2n/3 edges to appear in the communication network, and then a graph (e.g. rooted tree or dir
Pelvic bone cancer is a type of cancer that effects the hip(pelvis). Doctor use various methods to diagnose pelvic bone cancer, including imaging test like X-ray, CT scans, MRI scans, and PET scans. Sometimes, doctors...
详细信息
Edge-assisted wireless sensing is increasingly popular, where complex neural network models perform inference tasks on wireless channel state information (CSI) data streamed from IoT devices. However large volumes of ...
详细信息
Online social media (OSM) have become the primary global news source, but because of the distributed nature of the web, it has increased the risk of misinformation spread. Fake news is misinformation that masquerades ...
详细信息
ISBN:
(纸本)9798350322392
Online social media (OSM) have become the primary global news source, but because of the distributed nature of the web, it has increased the risk of misinformation spread. Fake news is misinformation that masquerades as genuine (real) information. Consequently, it is an active topic for researchers and OSM companies to find ways to identify and flag fake news, as well as detect the responsible sources that generate them. Bots, artificial users designed for various purposes, contribute to the dissemination of information on OSM. Regrettably, bots exhibit faster propagation of information compared to real users, often leading to the spread of inaccurate and low-quality information [1]. Differentiating between bots and real users solely based only on content poses a formidable task. This paper explores and expands techniques for bot detection based on news content as well as the spread diffusion process dynamics as a countermeasure for misinformation.
In the realm of cloud security, intrusion detection systems (IDSs) play a pivotal role as they are instrumental in identifying vulnerable activities occurring across networks and computersystems. Developing a novel I...
详细信息
Disasters can be mitigated by an early warning signal and proper communication within the hazardous environment using the MANET technology. However, the exact prediction of disaster situation is needed for the timely ...
详细信息
暂无评论