In this paper the authors consider the operational problem of optimal signalling and control,called control-coding capacity(with feedback),C_(FB) in bits/second,of discrete-time nonlinear partially observable stochast...
详细信息
In this paper the authors consider the operational problem of optimal signalling and control,called control-coding capacity(with feedback),C_(FB) in bits/second,of discrete-time nonlinear partially observable stochastic systems in state space form,subject to an average cost constraint.C_(FB) is the maximum rate of encoding signals or messages into randomized controller-encoder strategies with feedback,which control the state of the system,and reproducing the messages at the output of the system using a decoder or estimator with arbitrary small asymptotic error *** the first part of the paper,the authors characterize C_(FB) by an information theoretic optimization problem of maximizing directed information from the inputs to the outputs of the system,over randomized strategies(controller-encoders).The authors derive equivalent characterizations of C_(FB),using randomized strategies generated by either uniform or arbitrary distributed random variables(RVs),sufficient statistics,and a posteriori distributions of nonlinear filtering *** the second part of the paper,the authors analyze C_(FB) for linear-quadratic Gaussian partially observable stochastic systems(LQG-POSSs).The authors show that randomized strategies consist of control,estimation and signalling parts,and the sufficient statistics are,two Kalman-filters and an orthogonal innovations *** authors prove a semi-separation principle which states,the optimal control strategy is determined explicitly from the solution of a control matrix difference Riccati equation(DRE),independently of the estimation and signalling ***,the authors express the optimization problem of C_(FB) in terms of two filtering matrix DREs,a control matrix DRE,and the covariance of the innovations *** the paper,the authors illustrate that the expression of C_(FB) includes as degenerate cases,problems of stochastic optimal control and channel capacity of information transmission.
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context ...
详细信息
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context of IoT fog *** suggested framework,called"BlocFogSec",secures key management and data sharing through blockchain consensus and smart *** existing solutions,BlocFogSec utilizes two types of smart contracts for secure key exchange and data sharing,while employing a consensus protocol to validate transactions and maintain blockchain *** process and store data effectively at the network edge,the framework makes use of fog computing,notably reducing latency and raising *** successfully blocks unauthorized access and data breaches by restricting transactions to authorized *** addition,the framework uses a consensus protocol to validate and add transactions to the blockchain,guaranteeing data accuracy and *** compare BlocFogSec's performance to that of other models,a number of simulations are *** simulation results indicate that BlocFogSec consistently outperforms existing models,such as Security Services for Fog Computing(SSFC)and Blockchain-based Key Management Scheme(BKMS),in terms of throughput(up to 5135 bytes per second),latency(as low as 7 ms),and resource utilization(70%to 92%).The evaluation also takes into account attack defending accuracy(up to 100%),precision(up to 100%),and recall(up to 99.6%),demonstrating BlocFogSec's effectiveness in identifying and preventing potential attacks.
The growing prevalence of Internet of Things (IoT) devices has heightened vulnerabilities to botnet-based cyberattacks, necessitating robust detection mechanisms. This paper proposes DenseRSE-ASPPNet, an advanced deep...
详细信息
In the setting of error-correcting codes with feedback, Alice wishes to communicate a k-bit message x to Bob by sending a sequence of bits over a channel while noiselessly receiving feedback from Bob. It has been long...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
Large language models (LLMs) have recently shown remarkable performance in a variety of natural language processing (NLP) *** further explore LLMs'reasoning abilities in solving complex problems,recent research [1...
Large language models (LLMs) have recently shown remarkable performance in a variety of natural language processing (NLP) *** further explore LLMs'reasoning abilities in solving complex problems,recent research [1-3]has investigated chain-of-thought (CoT) reasoning in complex multimodal scenarios,such as science question answering (scienceQA) tasks [4],by fine-tuning multimodal models through human-annotated CoT ***,collected CoT rationales often miss the necessary rea-soning steps and specific expertise.
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
This brief presents a novel multi-bit Capacitance-to-Digital converter (CDC) using unipolar single-gate amorphous-Indium-Gallium-Zinc-Oxide thin-film transistors (a-IGZO TFTs). This circuit is fabricated on a 30 μm t...
详细信息
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data i...
详细信息
Integrated terrestrial-nonterrestrial networks have recently gained much attention because they can bridge the gap between the conventional terrestrial infrastructure and nonterrestrial networks. In addition to seamle...
详细信息
暂无评论