Unsupervised learning methods such as graph contrastive learning have been used for dynamic graph represen-tation learning to eliminate the dependence of ***,existing studies neglect positional information when learni...
详细信息
Unsupervised learning methods such as graph contrastive learning have been used for dynamic graph represen-tation learning to eliminate the dependence of ***,existing studies neglect positional information when learning discrete snapshots,resulting in insufficient network topology *** the same time,due to the lack of appropriate data augmentation methods,it is difficult to capture the evolving patterns of the network *** address the above problems,a position-aware and subgraph enhanced dynamic graph contrastive learning method is proposed for discrete-time dynamic ***,the global snapshot is built based on the historical snapshots to express the stable pattern of the dynamic graph,and the random walk is used to obtain the position representation by learning the positional information of the ***,a new data augmentation method is carried out from the perspectives of short-term changes and long-term stable structures of dynamic ***,subgraph sampling based on snapshots and global snapshots is used to obtain two structural augmentation views,and node structures and evolving patterns are learned by combining graph neural network,gated recurrent unit,and attention ***,the quality of node representation is improved by combining the contrastive learning between different structural augmentation views and between the two representations of structure and *** results on four real datasets show that the performance of the proposed method is better than the existing unsupervised methods,and it is more competitive than the supervised learning method under a semi-supervised setting.
In the wake of rapid advancements in artificial intelligence(AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB(AI×DB) promises a new generation of data systems,...
详细信息
In the wake of rapid advancements in artificial intelligence(AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB(AI×DB) promises a new generation of data systems, which will relieve the burden on end-users across all industry sectors by featuring AI-enhanced functionalities, such as personalized and automated in-database AI-powered analytics, and selfdriving capabilities for improved system performance. In this paper, we explore the evolution of data systems with a focus on deepening the fusion of AI and DB. We present NeurDB, an AI-powered autonomous data system designed to fully embrace AI design in each major system component and provide in-database AI-powered analytics. We outline the conceptual and architectural overview of NeurDB, discuss its design choices and key components, and report its current development and future plan.
Bandwidth limitations require transmitting the original video in a compressed format, leading to video artifacts and quality degradation. Therefore, compressed video enhancement is very important. In recent years, dee...
详细信息
In the swiftly advancing realm of information retrieval, unsupervised cross-modal hashing has emerged as a focal point of research, taking advantage of the inherent advantages of the multifaceted and dynamism inherent...
详细信息
The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of *** guarantee the network's overall security,we present a network defense resour...
详细信息
The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of *** guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall ***,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and ***,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of ***,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference ***,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility.
Eutrophication is a significant challenge for surface water,with sediment phosphorus(P)release being a key *** biological aluminum-based P-inactivation agent(BA-PIA)has shown effectiveness in controlling P release fro...
详细信息
Eutrophication is a significant challenge for surface water,with sediment phosphorus(P)release being a key *** biological aluminum-based P-inactivation agent(BA-PIA)has shown effectiveness in controlling P release from sediment,the efficiency and mechanism by BA-PIA capping is still not fully *** study explored the efficiency and mechanism of using BA-PIA capping controlling P release from *** main mechanisms controlling P release from sediment via BA-PIA capping involved transforming mobile and less stable fractions into stable ones,passivating DGT-labile P and establishing a 13 mm’P static layer’within the ***,BA-PIA’s impact on Fe redox processes significantly influenced P release from the *** BA-PIA capping,notable reductionswere observed in total P,soluble reactive P(SRP),and diffusive gradient in thin-films(DGT)-measured labile P(DGT-labile P)concentration in the overlying water,with reduction rates of 95.6%,92.7%,and 96.5%,*** BA-PIA capping,the diffusion flux of SRP across the sediment-water interface and the apparent P diffusion flux decreased by 91.3%and 97.8%,***,BA-PIA capping led to reduced concentrations of SRP,DGT-labile P,and DGT-measured labile Fe(II)in the sediment interstitial ***,BA-PIA capping significantly reduced P content and facilitated transformation in the 0∼30 mm sediment layers but not in the 30∼45 mm and 45∼60 mm sediment layers for NaOH-extractable inorganic P and HCl-extracted *** findings offer a theoretical basis and technical support for the practical application of BA-PIA capping to control P release from sediment.
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical *** is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is es...
详细信息
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical *** is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart ***,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be ***,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue ***,most existing SE schemes cannot solve the vector dominance threshold *** response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this *** use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold ***,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme.
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and ***,traditional DL methods compromise client privacy by collecting...
详细信息
The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and ***,traditional DL methods compromise client privacy by collecting sensitive data,underscoring the necessity for privacy-preserving solutions like Federated Learning(FL).FL effectively addresses escalating privacy concerns by facilitating collaborative model training without necessitating the sharing of raw *** that FL clients autonomously manage training data,encouraging client engagement is pivotal for successful model *** overcome challenges like unreliable communication and budget constraints,we present ENTIRE,a contract-based dynamic participation incentive mechanism for *** ensures impartial model training by tailoring participation levels and payments to accommodate diverse client *** approach involves several key ***,we examine how random client participation impacts FL convergence in non-convex scenarios,establishing the correlation between client participation levels and model ***,we reframe model performance optimization as an optimal contract design challenge to guide the distribution of rewards among clients with varying participation *** balancing budget considerations with model effectiveness,we craft optimal contracts for different budgetary constraints,prompting clients to disclose their participation preferences and select suitable contracts for contributing to model ***,we conduct a comprehensive experimental evaluation of ENTIRE using three real *** results demonstrate a significant 12.9%enhancement in model performance,validating its adherence to anticipated economic properties.
As one of the most promising paradigms of integrated circuit design,the approximate circuit has aroused widespread concern in the scientific *** takes advantage of the inherent error tolerance of some applications and...
详细信息
As one of the most promising paradigms of integrated circuit design,the approximate circuit has aroused widespread concern in the scientific *** takes advantage of the inherent error tolerance of some applications and relaxes the accuracy for reductions in area and power *** paper aims to provide a comprehensive survey of reliability issues related to approximate circuits,which covers three concerns:error characteristic analysis,reliability and test,and reliable design involving approximate *** error characteristic analysis is used to compare the outputs of the approximate circuit with those of its precise counterpart,which can help to find the most appropriate approximate design for a specific application in the large design *** the approximate design getting close to physical realization,manufacturing defects and operational faults are inevitable;therefore,the reliability prediction and vulnerability test become increasingly ***,the research on approximate circuit reliability and test is insufficient and needs more ***,although there is some existing work combining the approximate design with fault tolerant techniques,the reliability-enhancement approaches for approximate circuits are lacking.
暂无评论