Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation.
The research community has traditionally concentrated on emotion detection in emotion modeling, while emotion generation has garnered less focus. With the rise of artificial intelligence, numerous chatbots have been d...
详细信息
In today’s fast-paced world,many elderly individuals struggle to adhere to their medication schedules,especially those with memory-related conditions like Alzheimer’s disease,leading to serious health risks,hospital...
详细信息
In today’s fast-paced world,many elderly individuals struggle to adhere to their medication schedules,especially those with memory-related conditions like Alzheimer’s disease,leading to serious health risks,hospital-izations,and increased healthcare *** reminder systems often fail due to a lack of personalization and real-time *** address this critical challenge,we introduce MediServe,an advanced IoT-enabled medication management system that seamlessly integrates deep learning techniques to provide a personalized,secure,and adaptive *** features a smart medication box equipped with biometric authentication,such as fingerprint recognition,ensuring authorized access to prescribed medication while preventing misuse.A user-friendly mobile application complements the system,offering real-time notifications,adherence tracking,and emergency alerts for caregivers and healthcare *** system employs predictive deep learning models,achieving an impressive classification accuracy of 98%,to analyze user behavior,detect anomalies in medication adherence,and optimize scheduling based on an individual’s habits and health ***,MediServe enhances accessibility by employing natural language processing(NLP)models for voice-activated interactions and text-to-speech capabilities,making it especially beneficial for visually impaired users and those with cognitive ***-based data analytics and wireless connectivity facilitate remote monitoring,ensuring that caregivers receive instant alerts in case of missed doses or medication ***,machine learning-based clustering and anomaly detection refine medication reminders by adapting to users’changing health *** combining IoT,deep learning,and advanced security protocols,MediServe delivers a comprehensive,intelligent,and inclusive solution for medication *** innovative approach not only improves the quality of life for elderly
More than 150 cellular networks worldwide have rolled out LTE-M (LTE-Machine Type Communication) and/or NB-IoT (Narrow Band Internet of Things) technologies to support massive IoT services such as smart metering and e...
详细信息
Recently, there has been interest in classifying emotions using audio inputs and machine learning methods. Because a single statement might be delivered in a variety of emotional circumstances, textual data alone is i...
详细信息
Network virtualization (NV) plays a crucial role in modern network management. One of the fundamental challenges in NV is allocating physical network (PN) resources to the demands of the virtual network requests (VNRs...
详细信息
In this paper, we consider the distributed generalized Nash equilibrium(GNE) seeking problem in strongly monotone games. The transmission among players is implemented through a digital communication network with limit...
详细信息
In this paper, we consider the distributed generalized Nash equilibrium(GNE) seeking problem in strongly monotone games. The transmission among players is implemented through a digital communication network with limited bandwidth. For improving communication efficiency or/and security, an event-triggered coding-decoding-based communication is first proposed, where the data(decision variable) are first mapped to a series of finite-level codewords and, only when an event condition is satisfied, then sent to the neighboring agents. Moreover, a distributed communication-efficient GNE seeking algorithm is constructed accordingly,and the overrelaxation scheme is further taken into consideration. Through primal-dual analysis, the proposed algorithm is proven to converge to a variational GNE with fixed step-sizes by recasting it as an inexact forward-backward iteration. Finally, numerical simulations illustrate the benefit of the proposed algorithms in terms of saving communication resources.
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t...
详细信息
The complexity and diversity of polymer topologies,or chain architectures,present substantial challenges in predicting and engineering polymer *** machine learning is increasingly used in polymer science,applications ...
详细信息
The complexity and diversity of polymer topologies,or chain architectures,present substantial challenges in predicting and engineering polymer *** machine learning is increasingly used in polymer science,applications to address architecturally complex polymers are ***,we use a generative machine learning model based on variational autoencoders and data generated from molecular dynamics simulations to design polymer topologies that exhibit target properties.
The goal of privacy-preserving social graph release is to protect individual privacy while preserving data *** structure,which is an important global pattern of nodes,is a crucial data utility as it is fundamental to ...
详细信息
The goal of privacy-preserving social graph release is to protect individual privacy while preserving data *** structure,which is an important global pattern of nodes,is a crucial data utility as it is fundamental to many graph analysis ***,most existing methods with differential privacy(DP)commonly fall into edge-DP to sacri-fice security in exchange for ***,they reconstruct graphs from the local feature-extraction of nodes,resulting in poor community *** by this,we develop PrivCom,a strict node-DP graph release algorithm to maximize the utility on the community structure while maintaining a higher level of *** this algorithm,to reduce the huge sensitivity,we devise a Katz index based private graph feature extraction method,which can capture global graph structure features while greatly reducing the global sensitivity via a sensitivity regulation ***,under the condition that the sensitivity is fixed,the feature captured by the Katz index,which is presented in matrix form,requires privacy budget *** a result,plenty of noise is injected,mitigating global structural *** bridge this gap,we de-sign a private eigenvector estimation method,which yields noisy eigenvectors from extracted low-dimensional ***,a dynamic privacy budget allocation method with provable utility guarantees is developed to preserve the inherent relationship between eigenvalues and eigenvectors,so that the utility of the generated noise Katz matrix is well ***,we reconstruct the synthetic graph via calculating its Laplacian with the noisy Katz *** results confirm our theoretical findings and the efficacy of PrivCom.
暂无评论