Second-order optimization has been developed to accelerate the training of deep neural networks and it is being applied to increasingly larger-scale models. In this study, towards training on further larger scales, we...
详细信息
In the realm of data mining, the presence of missing values poses significant challenges that can undermine the accuracy and reliability of analytical outcomes. This study delves into the critical task of addressing m...
详细信息
This paper studies the fair influence maximization problem with efficient algorithms. In particular, given a graph G, a community structure C consisting of disjoint communities, and a budget k, the problem asks to sel...
详细信息
This paper studies the fair influence maximization problem with efficient algorithms. In particular, given a graph G, a community structure C consisting of disjoint communities, and a budget k, the problem asks to select a seed set S (||S|| = k) that maximizes the influence spread while narrowing the influence gap between different communities. This problem derives from some significant social scenarios, such as health interventions (e.g. suicide/HIV prevention) where individuals from racial minorities or LGBTQ communities may be disproportionately excluded from the benefits of the intervention. To depict the concept of fairness in the context of influence maximization, researchers have proposed various notions of fairness, where the welfare fairness notion that better balances fairness level and influence spread has shown promising effectiveness. However, the lack of efficient algorithms for optimizing the objective function under welfare fairness restricts its application to networks of only a few hundred nodes. In this paper, we modify the objective function of welfare fairness to maximize the exponentially weighted sum and the logarithmically weighted sum over all communities' influenced fractions (utility). To achieve efficient algorithms with theoretical guarantees, we first introduce two unbiased estimators: one for the fractional power of the arithmetic mean and the other for the logarithm of the arithmetic mean. Then, by adapting the Reverse Influence Sampling (RIS) approach, we convert the optimization problem to a weighted maximum coverage problem. We also analyze the number of reverse reachable sets needed to approximate the fair influence at a high probability. Finally, we present an efficient algorithm that guarantees 1 - 1/e - ϵ (positive objective function) or 1 + 1/e + ϵ (negative objective function) approximation for any small ϵ > 0. Experiments demonstrate that our proposed algorithm could efficiently handle large-scale networks with good performa
The integration of IoT devices in smart cities enhances urban infrastructure, services, and governance but also introduces significant cybersecurity challenges. Traditional centralized Intrusion Detection Systems (IDS...
详细信息
ISBN:
(纸本)9798331508692
The integration of IoT devices in smart cities enhances urban infrastructure, services, and governance but also introduces significant cybersecurity challenges. Traditional centralized Intrusion Detection Systems (IDS) face several issues, including data privacy concerns and high-power consumption due to centralized data processing. These challenges increase the risks of unauthorized access, data breaches, and privacy violations, undermining user trust and compliance with privacy regulations. Additionally, the centralization of data and processing leads to higher power consumption, making these systems less sustainable for widespread deployment in smart cities. This research addresses these issues by proposing a Federated Learning (FL)based intrusion detection framework for smart cities. FL enables collaborative and privacy-preserving model training across distributed IoT devices, mitigating the need to share sensitive data centrally. By aggregating local model updates, FL ensures data privacy and distributes the computational workload, significantly reducing power consumption compared to traditional centralized systems. The proposed model leverages advanced AI techniques and is trained using the IoTID20 dataset. The Flower framework, utilizing the FedAvg algorithm, facilitates the federated learning process. Our experimental results demonstrate that the global model achieves 98% accuracy, with individual clients achieving accuracies of around 85% to 98%. This approach provides continuous learning mechanisms, anomaly detection, and ensemble learning capabilities, enhancing the resilience of federated intrusion detection systems against emerging threats and adversarial attacks. This research systematically investigates the application of federated learning for intrusion detection in smart city networks, addressing key challenges and advancing the state-of-the-art in decentralized cybersecurity solutions. The proposed framework offers a robust, scalable, and privacyco
We used camera, light, door, and window sensors, and day of the week, duration, and activation time parameters for a Naïve Bayesian approach to intruder detection in a smart home. A nine-week normal and a two-wee...
详细信息
Typing tests list out words for the user to repeat. These tests measure metrics that quantify the user’s ability to type. However, conventional typing metrics do not measure correct finger placement. This aspect of t...
详细信息
In recent years, with the development of technology, the shopping approach of people has moved towards pervasive online social shopping. As a result, how to create a recommendation algorithm that offers products based...
详细信息
Large Language Models(LLMs) have become widely recognized in recent years for their exceptional performance in language generation capabilities. As a result, an unprecedented rise is seen in its use cases in various d...
详细信息
ISBN:
(纸本)9798331508692
Large Language Models(LLMs) have become widely recognized in recent years for their exceptional performance in language generation capabilities. As a result, an unprecedented rise is seen in its use cases in various domains specifically involving Natural Language Processing(NLP). These models however perform suboptimally when exploited in the field of studies where authenticity of the generated content is a critical aspect. One such domain is usage of LLM for exploration of the life of Prophet Muhammad S.A.W(commonly referred to as Seerah). It is of utmost significance to ensure the authenticity and reliability in the sources used and reported by the LLM due to the sensitive nature of the domain. The contemporary LLMs, however, lack the explainability in their response due to their inherent black-box nature. In our study, we have presented a novel LLM named SeerahGPT that addresses this challenge with the help of retrieval-augmented generation (RAG). This technique enables the model to utilize both parametric and nonparametric memories for generating response of queries. Our model, built on the Llama-2-7b architecture, employs Sentence Transformer embedding to effectively retrieve relevant information. The model's capabilities are augmented by integrating it with a corpus having Islamic texts such as the Quranic translation and Hadith collections, and historical accounts. The model's performance is benchmarked against its base model using both quantitative and qualitative metrics. The comparative analysis with Llama-2-7b revealed that SeerahGPT incorporation with external knowledge sources, provided more authentic and verifiable responses, despite the others exhibiting greater fluency. Performance metrics such as BLEU, ROUGE, and METEOR indicated SeerahGPT's better accuracy and contextual handling. This study paves way for analysis of such sensitive domains in more efficient way that can be utilized in other complex domains such as Islamic theology and Fiqh or legal
In this paper, a stabilizing feedback law for a coupled discrete dynamic system with two parameters is proposed based on the use of asymptotic approximations in powers of two parameters and the decomposition of the or...
详细信息
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate wi...
详细信息
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate with each *** one party refuses to do so,the channel is unstable.A stable channel is thus *** nodes may show uncooperative behavior,they may have a negative impact on the stability of such *** order to address this issue,this work proposes a dynamic evolutionary game model based on node *** model considers various defense strategies'cost and attack success ratio under *** can dynamically adjust their strategies according to the behavior of attackers to achieve their effective *** equilibrium stability of the proposed model can be *** proposed model can be applied to general channel *** is compared with two state-of-the-art blockchain channels:Lightning network and Spirit *** experimental results show that the proposed model can be used to improve a channel's stability and keep it in a good cooperative stable *** its use enables a blockchain to enjoy higher transaction success ratio and lower transaction transmission delay than the use of its two peers.
暂无评论