Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in t...
详细信息
Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in these studies often have shortcomings in terms of data privacy breach or efficiency. Additionally,these methods typically only apply to symmetric frameworks, which consist of two or more parties with equal privilege, and are not suitable for asymmetric scenarios where parties have unequal privilege. In this paper,we propose SecureCART, a three-party privacy-preserving decision tree training scheme with a privileged party. We adopt the existing pMPL framework and design novel secure interactive protocols for division,comparison, and asymmetric multiplication. Compared to similar schemes, our division protocol is 93.5–560.4× faster, with the communication overhead reduced by over 90%; further, our multiplication protocol is approximately 1.5× faster, with the communication overhead reduced by around 20%. Our comparison protocol based on function secret sharing maintains good performance when adapted to pMPL. Based on the proposed secure protocols, we implement SecureCART in C++ and analyze its performance using three real-world datasets in both LAN and WAN environments. he experimental results indicate that SecureCART is significantly faster than similar schemes proposed in past studies, and that the loss of accuracy while using SecureCART remains within an acceptable range.
As the use of physical instruments grows,control algorithms are being increasingly deployed to enhance efficiency and reliability through digital twin *** load management is central to energy systems within digital tw...
详细信息
As the use of physical instruments grows,control algorithms are being increasingly deployed to enhance efficiency and reliability through digital twin *** load management is central to energy systems within digital twins,which significantly impacts operational *** demand loads can lead to substantial monthly utility expenses without proper ***,a randomised online algorithm incorporating machine-learned insights is introduced to optimise battery operations and mitigate peak demand *** leverages limited-bit information from ma-chine learning models to inform its online decision-making process for cost-effective load *** provide theoretical evidence demonstrating that AMPAMOD maintains minimal advice complexity,has a linear computational cost,and achieves a bounded competitive *** trace-driven experiments with real-world household data reveal that AMPAMOD successfully reduces peak loads by over 90%,outperforming other benchmarks by at least 50%.These experimental findings align with our theoretical assertions,showcasing the effectiveness of AMPAMOD.
Breast cancer remains a leading cause of mortality among women, with millions of new cases diagnosed annually. Early detection through screening is crucial. Using neural networks to improve the accuracy of breast canc...
详细信息
Instant delivery has become a fundamental service in people's daily lives. Different from the traditional express service, the instant delivery has a strict shipping time constraint after being ordered. However, t...
详细信息
ISBN:
(数字)9798350317152
ISBN:
(纸本)9798350317169
Instant delivery has become a fundamental service in people's daily lives. Different from the traditional express service, the instant delivery has a strict shipping time constraint after being ordered. However, the labor shortage makes it challenging to realize efficient instant delivery. To tackle the problem, researchers have studied to introduce vehicles (i.e., taxis) or Unmanned Aerial Vehicles (UAVs or drones) into instant delivery tasks. Unfortunately, the delivery detour of taxis and the limited battery of UAVs make it hard to meet the rapidly increasing instant delivery demands. Under this circumstance, this paper proposes an air-ground cooperative instant delivery paradigm to maximize the delivery performance and meanwhile minimize the negative effects on the taxi passengers. Specifically, a data-driven delivery potential-demands-aware cooperative strategy is designed to improve the overall delivery performance of both UAVs and taxis as well as the taxi passengers' experience. The experimental results show that the proposed method improves the delivery number by 30.1% and 114.5% compared to the taxi-based and UAV-based instant delivery respectively, and shortens the delivery time by 35.7% compared to the taxi-based instant delivery.
Artificial intelligence (AI) has immense potential in time series prediction, but most explainable tools have limited capabilities in providing a systematic understanding of important features over time. These tools t...
详细信息
With the deep integration of cyber tools, control algorithms are increasingly employed in cyber-physical energy systems to enhance management, cost efficiency, and robustness. Effective demand load management is cruci...
With the deep integration of cyber tools, control algorithms are increasingly employed in cyber-physical energy systems to enhance management, cost efficiency, and robustness. Effective demand load management is crucial in cyber-physical energy systems as it directly impacts operational costs. Failure to adequately manage spiky or seasonal demand loads can lead to significant expenses on monthly utility bills. In this study, we propose AMPAMOD, a randomized online algorithm with machine-learned advice, to optimize battery operations and mitigate highly dynamic peak loads. AMPAMOD utilizes limited advice from machine learning algorithms to guide our online algorithm and ensure cost-effective peak load management. The theoretical analysis shows that our solution has minimal advice complexity, a linear computational cost, and an improved competitive ratio. Finally, we conduct extensive trace-driven experiments on real-world datasets. AMPAMOD achieves a peak shaving success rate of over 90%, outperforming baselines by at least 50%. These experimental results confirm theoretical findings and demonstrate the potential of AMPAMOD.
Isolation forest (iForest) has been emerging as arguably the most popular anomaly detector in recent years due to its general effectiveness across different benchmarks and strong scalability. Nevertheless, its linear ...
详细信息
Due to the flexibility and scalability, the increasing number of mobile edge computing applications involves Mobile Edge Servers (MES). MES introduces the new challenge of online resource scheduling to serve different...
详细信息
ISBN:
(纸本)9781665400633
Due to the flexibility and scalability, the increasing number of mobile edge computing applications involves Mobile Edge Servers (MES). MES introduces the new challenge of online resource scheduling to serve different requests under limited energy to offer similar functionalities of the immobile edge servers. The previous studies consider the case of the identical server, which has poor scalability and is hard to apply to real-world applications. This work proposes a novel model named the distributed k-server problem that formulates the MES resource scheduling to address the heterogeneity issues in both servers and requests. We design an algorithm named DWFA based on the efficient network flow-based Work Function Algorithm (WFA) to the classic k-server problem as an immediate solution to the proposed problem. DWFA inher-its the competitiveness of WFA but has high computational complexity. To further increase scalability via the computing power of MES, we parallelise DWFA to design a distributed algorithm named FD-WFA as a distributed execution of DWFA, which significantly reduces the computational complexity and increases the practicality. Extensive simulations have been con-ducted to verify the theoretical results and show the advantages of FD-WFA over the benchmarks.
Knowledge Tracing (KT) is a critical but challenging problem for many educational applications. As an essential part of educational psychology, the propagated influence among pedagogical concepts (i.e., learning trans...
详细信息
In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of th...
详细信息
In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of the SDN controller is sophisticated for the centralized control system of the entire ***,it creates a significant loophole for the manifestation of a distributed denial of service(DDoS)attack ***,recently a distributed Reflected Denial of Service(DRDoS)attack,an unusual DDoS attack,has been ***,minimal deliberation has given to this forthcoming single point of SDN infrastructure failure ***,recently the high frequencies of DDoS attacks have increased *** this paper,a smart algorithm for planning SDN smart backup controllers under DDoS attack scenarios has *** proposed smart algorithm can recommend single or multiple smart backup controllers in the event of DDoS *** obtained simulated results demonstrate that the validation of the proposed algorithm and the performance analysis achieved 99.99%accuracy in placing the smart backup controller under DDoS attacks within 0.125 to 46508.7 s in SDN.
暂无评论