This paper considers a distributed optimization problem in the presence of Byzantine agents capable of introducing untrustworthy information into the communication network. A resilient distributed subgradient algorith...
This paper considers a distributed optimization problem in the presence of Byzantine agents capable of introducing untrustworthy information into the communication network. A resilient distributed subgradient algorithm is proposed based on graph redundancy and objective redundancy. It is shown that the algorithm causes all non-Byzantine agents’ states to asymptotically converge to the same optimal point under appropriate assumptions. A partial convergence rate result is also provided.
We present an expectation-maximization (EM) regularized deep learning (EMReDL) approach for weakly supervised tumor segmentation using partially labelled MRI. The proposed framework is demonstrated on glioblastoma, ch...
We present an expectation-maximization (EM) regularized deep learning (EMReDL) approach for weakly supervised tumor segmentation using partially labelled MRI. The proposed framework is demonstrated on glioblastoma, characterized by diffusion infiltration. Physiological MRI provides specific information regarding infiltration over structural MRI but is hindered by its low resolution for precise labeling. To exploit partial labels, we design two components in EMReDL: 1) a physiological prior prediction model: a neural network-based binary classifier trained by the labels of core tumor and normal-appearing regions. The trained classifier generates a physiological prior map passed to 2) a segmentation model regularized under an EM framework for weakly supervised learning. We evaluate the performance on a dataset with preoperative multiparametric and recurrence MRI. Results show that EMReDL can effectively segment the infiltrated tumor from the partially labeled MRI, with an accuracy higher than the model trained without physiological MRI and other competing approaches. We will publish the code with example data soon.
In recent years, the effective utilization of edge servers to assist vehicles in handling compute-intensive and latency-sensitive tasks has emerged as a pivotal concern in Vehicular Edge Computing (VEC). In this paper...
详细信息
ISBN:
(数字)9798350351255
ISBN:
(纸本)9798350351262
In recent years, the effective utilization of edge servers to assist vehicles in handling compute-intensive and latency-sensitive tasks has emerged as a pivotal concern in Vehicular Edge Computing (VEC). In this paper, we adopt a cooperative approach that leverages the collective capabilities of multiple edge servers. This strategy is designed to effectively manage tasks and alleviate the computational burden imposed on these servers. Specifically, Graph Neural Network (GNN) is applied to extract and classify features such as the geographical locations and communication statuses of multiple edge servers, enabling the selection of the most suitable servers for collaborative task execution. We have utilized solar energy for local computing, effectively achieving environmental protection and reducing the local energy burden on vehicles. Moreover, a novel edge attraction formula is defined to refine the rationality of clustering. In addition, Deep Reinforcement Learning (DRL) is employed to make real-time offloading decisions. To ensure experimental accuracy while mitigating costs, we establish a corresponding digital twin environment to acquire experimental data. By conducting a comparative analysis against three other baseline methods, we effectively reduce task completion time and thus meet the stringent demands of time-sensitive tasks.
Multisequences over finite fields play an important role in applications that related to parallelization, such as word-based stream ciphers and pseudorandom vector generators. It is interesting to study complexity mea...
详细信息
Electric Road Systems (ERS) offer a promising solution for mobile charging, reducing the need for mandatory stops to recharge electric vehicles. However, the operational efficiency of ERS is constrained by the limitat...
详细信息
Visual cryptography encrypts the secret image into n shares (transparency) so that only stacking a qualified number of shares can recover the secret image by the human visual system while no information can be reveale...
详细信息
The paper examines an approach to arrange marine autonomous surface ships (both with and without crew) traffic surveillance illustrated with the Amur Bay and the Golden Horn Bay water area of the city of Vladivostok. ...
详细信息
Software-defined networking(SDN)is a new paradigm that promises to change by breaking vertical integration,decoupling network control logic from the underlying routers and switches,promoting(logical)network control ce...
详细信息
Software-defined networking(SDN)is a new paradigm that promises to change by breaking vertical integration,decoupling network control logic from the underlying routers and switches,promoting(logical)network control centralization,and introducing network ***,the controller is similarly vulnerable to a“single point of failure”,an attacker can execute a distributed denial of service(DDoS)attack that invalidates the controller and compromises the network security in *** address the problem of DDoS traffic detection in SDN,a novel detection approach based on information entropy and deep neural network(DNN)is *** approach contains a DNN-based DDoS traffic detection module and an information-based entropy initial inspection *** initial inspection module detects the suspicious network traffic by computing the information entropy value of the data packet’s source and destination Internet Protocol(IP)addresses,and then identifies it using the DDoS detection module based on *** assaults were found when suspected irregular traffic was *** reveal that the algorithm recognizes DDoS activity at a rate of more than 99%,with a much better accuracy *** false alarm rate(FAR)is much lower than that of the information entropy-based detection ***,the proposed framework can shorten the detection time and improve the resource utilization efficiency.
Smart grid management is an emerging research topic that recently has adopted artificial intelligence algorithms to assist in the task. However, as more and more data is used, data insecurity and cyber-physical attack...
Smart grid management is an emerging research topic that recently has adopted artificial intelligence algorithms to assist in the task. However, as more and more data is used, data insecurity and cyber-physical attacks hinder the performance of intelligent systems. In this paper, we propose a fuzzy electricity management system (FEMS) consisting of an attention-based anomaly detection module for attack classification and a fuzzy Q-learning decision module for grid management. Experimental results show that the proposed anomaly detection module achieves high accuracy and F1 scores, significantly outperforming state-of-the-art systems. As for the management evaluation, FEMS achieves extremely low convergence days and mean absolute error (MAE) of supply distribution, which proves the effectiveness of the proposed FEMS in shaping supply distribution. Moreover, FEMS achieves the lowest failure rate (highest stability) but a slightly higher MAE of operating reserve rate due to the unavoidable trade-off between grid stability and energy efficiency.
暂无评论