Biosignal representation learning (BRL) plays a crucial role in emotion recognition for game users (ERGU). Unsupervised BRL has garnered attention considering the difficulty in obtaining ground truth emotion labels fr...
详细信息
Biosignal representation learning (BRL) plays a crucial role in emotion recognition for game users (ERGU). Unsupervised BRL has garnered attention considering the difficulty in obtaining ground truth emotion labels from game users. However, unsupervised BRL in ERGU faces challenges, including overfitting caused by limited data and performance degradation due to unbalanced sample distributions. Faced with the above challenges, we propose a novel method of biosignal contrastive representation learning (BCRL) for ERGU, which not only serves as a unified representation learning approach applicable to various modalities of biosignals but also derives generalized biosignals representations suitable for different downstream tasks. Specifically, we solve the overfitting by introducing perturbations at the embedding layer based on the projected gradient descent (PGD) adversarial attacks and develop the sample balancing strategy (SBS) to mitigate the negative impact of the unbalanced sample on the performance. Further, we have conducted comprehensive validation experiments on the public dataset, yielding the following key observations: 1) BCRL outperforms all other methods, achieving average accuracies of 76.67%, 71.83%, and 63.58% in 1D-2C Valence, 1D-2C Arousal and 2D-4C Valence/Arousal, respectively;2) The ablation study shows that both the PGD module (+7.58% in accuracy on average) and the SBS module (+14.60% in accuracy on average) have a positive effect on the performance of different classifications;3) BCRL model exhibits the certain generalization ability across the different games, subjects and classifiers. IEEE
To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security,retrieval efficiency,and retrieval *** research suggests a searchable encryption and deep hashing-base...
详细信息
To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security,retrieval efficiency,and retrieval *** research suggests a searchable encryption and deep hashing-based secure image retrieval technique that extracts more expressive image features and constructs a secure,searchable encryption ***,a deep learning framework based on residual network and transfer learn-ing model is designed to extract more representative image deep ***,the central similarity is used to quantify and construct the deep hash sequence of *** Paillier homomorphic encryption encrypts the deep hash sequence to build a high-security and low-complexity searchable ***,according to the additive homomorphic property of Paillier homomorphic encryption,a similarity measurement method suitable for com-puting in the retrieval system’s security is ensured by the encrypted *** experimental results,which were obtained on Web Image Database from the National University of Singapore(NUS-WIDE),Microsoft Common Objects in Context(MS COCO),and ImageNet data sets,demonstrate the system’s robust security and precise retrieval,the proposed scheme can achieve efficient image retrieval without revealing user *** retrieval accuracy is improved by at least 37%compared to traditional hashing *** the same time,the retrieval time is saved by at least 9.7%compared to the latest deep hashing schemes.
Existing speech retrieval systems are frequently confronted with expanding volumes of speech *** dynamic updating strategy applied to construct the index can timely process to add or remove unnecessary speech data to ...
详细信息
Existing speech retrieval systems are frequently confronted with expanding volumes of speech *** dynamic updating strategy applied to construct the index can timely process to add or remove unnecessary speech data to meet users’real-time retrieval *** study proposes an efficient method for retrieving encryption speech,using unsupervised deep hashing and B+ tree dynamic index,which avoid privacy leak-age of speech data and enhance the accuracy and efficiency of *** cloud’s encryption speech library is constructed by using the multi-threaded Dijk-Gentry-Halevi-Vaikuntanathan(DGHV)Fully Homomorphic Encryption(FHE)technique,which encrypts the original *** addition,this research employs Residual Neural Network18-Gated Recurrent Unit(ResNet18-GRU),which is used to learn the compact binary hash codes,store binary hash codes in the designed B+tree index table,and create a mapping relation of one to one between the binary hash codes and the corresponding encrypted *** B+tree index technology is applied to achieve dynamic index updating of the B+tree index table,thereby satisfying users’needs for real-time *** experimental results on THCHS-30 and TIMIT showed that the retrieval accuracy of the proposed method is more than 95.84%compared to the existing unsupervised hashing *** retrieval efficiency is greatly *** to the method of using hash index tables,and the speech data’s security is effectively guaranteed.
This paper proposes a Markov decision process based service migration algorithm to satisfy quality of service(QoS) requirements when the terminals leave the original server. Services were divided into real-time servic...
详细信息
This paper proposes a Markov decision process based service migration algorithm to satisfy quality of service(QoS) requirements when the terminals leave the original server. Services were divided into real-time services and non-real-time services, each type of them has different requirements on transmission bandwidth and latency,which were considered in the revenue function. Different values were assigned to the weight coefficients of QoS parameters for different service types in the revenue and cost functions so as to distinguish the differences between the two service types. The overall revenue was used for migration decisions, rather than fixed threshold or instant *** Markov decision process was used to maximize the overall revenue of the system. Simulation results show that the proposed algorithm obtained more revenue compared with the existing works.
In the digital era, the escalation of data generation and cyber threats has heightened the importance of network security. Machine Learning-based Intrusion Detection Systems (IDS) play a crucial role in combating thes...
详细信息
Interrupted Sampling Repeater Jamming (ISRJ) can produce several false targets through intermittent sampling and forwarding of the intercepted signals. The paper proposes an interference identification and suppression...
详细信息
Accurate prediction of the state-of-charge(SOC)of battery energy storage system(BESS)is critical for its safety and lifespan in electric *** overcome the imbalance of existing methods between multi-scale feature fusio...
详细信息
Accurate prediction of the state-of-charge(SOC)of battery energy storage system(BESS)is critical for its safety and lifespan in electric *** overcome the imbalance of existing methods between multi-scale feature fusion and global feature extraction,this paper introduces a novel multi-scale fusion(MSF)model based on gated recurrent unit(GRU),which is specifically designed for complex multi-step SOC prediction in practical *** correlation analysis is first employed to identify SOC-related *** parameters are then input into a multi-layer GRU for point-wise feature ***,the parameters undergo patching before entering a dual-stage multi-layer GRU,thus enabling the model to capture nuanced information across varying time ***,by means of adaptive weight fusion and a fully connected network,multi-step SOC predictions are *** extensive validation over multiple days,it is illustrated that the proposed model achieves an absolute error of less than 1.5%in real-time SOC prediction.
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. Howeve...
详细信息
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. However, the traditional ISAC schemes are highly dependent on the accurate mathematical model and suffer from the challenges of high complexity and poor performance in practical scenarios. Recently, artificial intelligence (AI) has emerged as a viable technique to address these issues due to its powerful learning capabilities, satisfactory generalization capability, fast inference speed, and high adaptability for dynamic environments, facilitating a system design shift from model-driven to data-driven. Intelligent ISAC, which integrates AI into ISAC, has been a hot topic that has attracted many researchers to investigate. In this paper, we provide a comprehensive overview of intelligent ISAC, including its motivation, typical applications, recent trends, and challenges. In particular, we first introduce the basic principle of ISAC, followed by its key techniques. Then, an overview of AI and a comparison between model-based and AI-based methods for ISAC are provided. Furthermore, the typical applications of AI in ISAC and the recent trends for AI-enabled ISAC are reviewed. Finally, the future research issues and challenges of intelligent ISAC are discussed.
Traffic flow forecasting plays a crucial role and is the key technology to realize dynamic traffic guidance and active traffic control in intelligent traffic systems(ITS).Aiming at the complex local and global spatial...
详细信息
Traffic flow forecasting plays a crucial role and is the key technology to realize dynamic traffic guidance and active traffic control in intelligent traffic systems(ITS).Aiming at the complex local and global spatial-temporal dynamic characteristics of traffic flow,this paper proposes a new traffic flow forecasting model spatial-temporal attention graph neural network(STA-GNN)by combining at-tention mechanism(AM)and spatial-temporal convolutional *** model learns the hidden dynamic local spatial correlations of the traffic network by combining the dynamic adjacency matrix constructed by the graph learning layer with the graph convolutional network(GCN).The local tem-poral correlations of traffic flow at different scales are extracted by stacking multiple convolutional kernels in temporal convolutional network(TCN).And the global spatial-temporal dependencies of long-time sequences of traffic flow are captured by the spatial-temporal attention mechanism(STAtt),which enhances the global spatial-temporal modeling and the representational ability of *** experimental results on two datasets,METR-LA and PEMS-BAY,show the proposed STA-GNN model outperforms the common baseline models in forecasting accuracy.
Federated recommender systems(FedRecs) have garnered increasing attention recently, thanks to their privacypreserving benefits. However, the decentralized and open characteristics of current FedRecs present at least t...
详细信息
Federated recommender systems(FedRecs) have garnered increasing attention recently, thanks to their privacypreserving benefits. However, the decentralized and open characteristics of current FedRecs present at least two ***, the performance of FedRecs is compromised due to highly sparse on-device data for each client. Second, the system's robustness is undermined by the vulnerability to model poisoning attacks launched by malicious users. In this paper, we introduce a novel contrastive learning framework designed to fully leverage the client's sparse data through embedding augmentation, referred to as CL4FedRec. Unlike previous contrastive learning approaches in FedRecs that necessitate clients to share their private parameters, our CL4FedRec aligns with the basic FedRec learning protocol, ensuring compatibility with most existing FedRec implementations. We then evaluate the robustness of FedRecs equipped with CL4FedRec by subjecting it to several state-of-the-art model poisoning attacks. Surprisingly, our observations reveal that contrastive learning tends to exacerbate the vulnerability of FedRecs to these attacks. This is attributed to the enhanced embedding uniformity, making the polluted target item embedding easily proximate to popular items. Based on this insight, we propose an enhanced and robust version of CL4FedRec(rCL4FedRec) by introducing a regularizer to maintain the distance among item embeddings with different popularity levels. Extensive experiments conducted on four commonly used recommendation datasets demonstrate that rCL4FedRec significantly enhances both the model's performance and the robustness of FedRecs.
暂无评论