Frequency conversion is pivotal in nonlinear optics and quantum optics for manipulating and translating light signals across different wavelength *** frequency conversion between two light beams with a small frequency...
详细信息
Frequency conversion is pivotal in nonlinear optics and quantum optics for manipulating and translating light signals across different wavelength *** frequency conversion between two light beams with a small frequency interval is a central *** this work,we design a pair of coupled silicon microrings wherein coupled-induced modesplitting exists to achieve a small frequency shift by the process of four-wave mixing Bragg *** an example,the signal can be up or down converted to the idler which is 15.5 GHz spaced when two pumps align with another pair of split *** results unveil the potential of coupled microring resonators for small interval frequency conversion in a high-fidelity,all-optical,and signal processing quantum frequency interface.
In today’s information age,eavesdropping has been one of the most serious privacy threats in information security,such as exodus spyware(Rudie et al.,2021)and pegasus spyware(Anatolyevich,2020).And the main one of th...
详细信息
In today’s information age,eavesdropping has been one of the most serious privacy threats in information security,such as exodus spyware(Rudie et al.,2021)and pegasus spyware(Anatolyevich,2020).And the main one of them is acoustic *** eavesdropping(George and Sagayarajan,2023)is a technology that uses microphones,sensors,or other devices to collect and process sound signals and convert them into readable *** much research has been done in this area,there is still a lack of comprehensive investigation into the timeliness of this technology,given the continuous advancement of technology and the rapid development of eavesdropping *** this article,we have given a selective overview of acoustic eavesdropping,focusing on the methods of acoustic *** specifically,we divide acoustic eavesdropping into three categories:motion sensor-based acoustic eavesdropping,optical sensor-based acoustic eavesdropping,and RFbased acoustic *** these three representative frameworks,we review the results of acoustic eavesdropping according to the type of equipment they use and the physical principles of ***,we also introduce several important but challenging applications of these acoustic eavesdropping *** addition,we compared the systems that meet the requirements of acoustic eavesdropping in real-world scenarios from multiple perspectives,including whether they are nonintrusive,whether they can achieve unconstrained word eavesdropping,and whether they use machine learning,*** general template of our article is as follows:firstly,we systematically review and classify the existing eavesdropping technologies,elaborate on their working mechanisms,and give corresponding ***,these eavesdropping methods were compared and analyzed,and each method’s effectiveness and technical difficulty were evaluated from multiple *** addition to an assessment of the current state of the field,we dis
作者:
M, BhanumathiB, ArthiDepartment of Computing Technologies
College of Engineering and Technology SRM Institute of Science and Technology Chengalpattu Tamil Nadu Kattankulathur Chennai603203 India Department of Computing Technologies
College of Engineering and Technology Faculty of Engineering and Technology SRM Institute of Science and Technology Chengalpattu Tamil Nadu Kattankulathur Chennai603203 India
Visualizing the behavior of fish variants is the primary significance for obtaining biological insights in the marine ecological system. Several computer vision and machine learning-based approaches are introduced to ...
详细信息
Die-stacked dynamic random access memory(DRAM)caches are increasingly advocated to bridge the performance gap between the on-chip cache and the main *** fully realize their potential,it is essential to improve DRAM ca...
详细信息
Die-stacked dynamic random access memory(DRAM)caches are increasingly advocated to bridge the performance gap between the on-chip cache and the main *** fully realize their potential,it is essential to improve DRAM cache hit rate and lower its cache hit *** order to take advantage of the high hit-rate of set-association and the low hit latency of direct-mapping at the same time,we propose a partial direct-mapped die-stacked DRAM cache called *** design is motivated by a key observation,i.e.,applying a unified mapping policy to different types of blocks cannot achieve a high cache hit rate and low hit latency *** address this problem,P3DC classifies data blocks into leading blocks and following blocks,and places them at static positions and dynamic positions,respectively,in a unified set-associative *** also propose a replacement policy to balance the miss penalty and the temporal locality of different *** addition,P3DC provides a policy to mitigate cache thrashing due to block type *** results demonstrate that P3DC can reduce the cache hit latency by 20.5%while achieving a similar cache hit rate compared with typical set-associative caches.P3DC improves the instructions per cycle(IPC)by up to 66%(12%on average)compared with the state-of-the-art direct-mapped cache—BEAR,and by up to 19%(6%on average)compared with the tag-data decoupled set-associative cache—DEC-A8.
Federated recommender systems(FedRecs) have garnered increasing attention recently, thanks to their privacypreserving benefits. However, the decentralized and open characteristics of current FedRecs present at least t...
详细信息
Federated recommender systems(FedRecs) have garnered increasing attention recently, thanks to their privacypreserving benefits. However, the decentralized and open characteristics of current FedRecs present at least two ***, the performance of FedRecs is compromised due to highly sparse on-device data for each client. Second, the system's robustness is undermined by the vulnerability to model poisoning attacks launched by malicious users. In this paper, we introduce a novel contrastive learning framework designed to fully leverage the client's sparse data through embedding augmentation, referred to as CL4FedRec. Unlike previous contrastive learning approaches in FedRecs that necessitate clients to share their private parameters, our CL4FedRec aligns with the basic FedRec learning protocol, ensuring compatibility with most existing FedRec implementations. We then evaluate the robustness of FedRecs equipped with CL4FedRec by subjecting it to several state-of-the-art model poisoning attacks. Surprisingly, our observations reveal that contrastive learning tends to exacerbate the vulnerability of FedRecs to these attacks. This is attributed to the enhanced embedding uniformity, making the polluted target item embedding easily proximate to popular items. Based on this insight, we propose an enhanced and robust version of CL4FedRec(rCL4FedRec) by introducing a regularizer to maintain the distance among item embeddings with different popularity levels. Extensive experiments conducted on four commonly used recommendation datasets demonstrate that rCL4FedRec significantly enhances both the model's performance and the robustness of FedRecs.
Telemedicine is the field that uses medical images for diagnosing various diseases. The transmitting and storing of medical images via the cloud-based network must meet several stringent criteria, including confidenti...
详细信息
Internet of things (IoT) devices make up 30%of all network-connected endpoints,introducing vulnerabilities and novel attacks that make many companies as primary targets for *** address this increasing threat surface,e...
详细信息
Internet of things (IoT) devices make up 30%of all network-connected endpoints,introducing vulnerabilities and novel attacks that make many companies as primary targets for *** address this increasing threat surface,every organization deploying IoT devices needs to consider security risks to ensure those devices are secure and *** all the solutions for security risks,firmware security analysis is essential to fix software bugs,patch vulnerabilities,or add new security features to protect users of those vulnerable ***,firmware security analysis has never been an easy job due to the diversity of the execution environment and the close source of *** two distinct features complicate the operations to unpack firmware samples for detailed *** also make it difficult to create visual environments to emulate the running of device *** researchers have developed many novel methods to overcome various challenges in the past decade,critical barriers impede firmware security analysis in ***,this survey is motivated to systematically review and analyze the research challenges and their solutions,considering both breadth and ***,based on the analysis perspectives,various methods that perform security analysis on IoT devices are introduced and classified into four *** challenges in each category are discussed in detail,and potential solutions are proposed *** then discuss the flaws of these solutions and provide future directions for this research *** survey can be utilized by a broad range of readers,including software developers,cyber security researchers,and software security engineers,to better understand firmware security analysis.
A maximal photon number entangled state,namely NOON state,can be adopted for sensing with a quantum *** this work,we designed silicon quantum photonic chips containing two types of Mach-Zehnder interferometerswherein ...
详细信息
A maximal photon number entangled state,namely NOON state,can be adopted for sensing with a quantum *** this work,we designed silicon quantum photonic chips containing two types of Mach-Zehnder interferometerswherein the two-photon NOON state,sensing element for temperature or humidity,is *** with classicallight or single photon case,two-photon NOON state sensing shows a solid enhancement in the sensing resolution *** the first demonstration of on-chip quantum photonic sensing,it reveals the advantages of photonic chips forhigh integration density,small-size,stability for multiple-parameter sensing serviceability.A higher sensing precision isexpected to beat the standard quantum limit with a higher photon number NOON state.
This paper presents a random forest-feature sensitivity and feature correlation (RF-FSFC) technique for enhanced heart disease prediction. The proposed methodology is implemented using the Cleveland heart disease data...
详细信息
Container orchestration systems, such as Kubernetes, streamline containerized application deployment. As more and more applications are being deployed in Kubernetes, there is an increasing need for rescheduling - relo...
详细信息
暂无评论