Due to severe climatic circumstances exacerbated by climate change, deploying Beyond Fifth Generation (B5G) networks is critical. Unmanned Aerial Vehicles (UAVs) have become indispensable for B5G connectivity in incle...
详细信息
ISBN:
(数字)9798350354133
ISBN:
(纸本)9798350354140
Due to severe climatic circumstances exacerbated by climate change, deploying Beyond Fifth Generation (B5G) networks is critical. Unmanned Aerial Vehicles (UAVs) have become indispensable for B5G connectivity in inclement weather conditions such as snow, fog, and rain. This paper investigates energy-efficient B5G connectivity and climate-resilient UAVs. We evaluate the performance of UAV coverage and energy efficiency at different elevation angles under various weather conditions, including snow, fog, and rain. Additionally, we discuss the challenges environments and propose solutions to improve climate-resilient and energy-efficient B5G communication. Emphasizing the adverse effects of climate change on communication networks, The paper’s findings highlight the significant impact of weather conditions on UAV coverage, B5G communication networks, and energy efficiency. This research paves the way for a more resilient and sustainable future.
Defacing is often applied to head magnetic resonance image (MRI) datasets prior to public release to address privacy concerns. The alteration of facial and nearby voxels has provoked discussions about the true capabil...
详细信息
This paper proposes an online target speaker voice activity detection system for speaker diarization tasks, which does not require a priori knowledge from the clustering-based diarization system to obtain the target s...
详细信息
Existing fashion recommendation systems encounter difficulties in using visual data for accurate and personalized recommendations. This research describes an innovative end-to-end pipeline that uses artificial intelli...
详细信息
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning operations to enjoy the benefit of "large model". Despite this promising prospect, the security of pre-trained encoder has not been thoroughly investigated yet, especially when the pre-trained encoder is publicly available for commercial *** this paper, we propose AdvEncoder, the first framework for generating downstream-agnostic universal adversarial examples based on the pre-trained encoder. AdvEncoder aims to construct a universal adversarial perturbation or patch for a set of natural images that can fool all the downstream tasks inheriting the victim pre-trained encoder. Unlike traditional adversarial example works, the pre-trained encoder only outputs feature vectors rather than classification labels. Therefore, we first exploit the high frequency component information of the image to guide the generation of adversarial examples. Then we design a generative attack framework to construct adversarial perturbations/patches by learning the distribution of the attack surrogate dataset to improve their attack success rates and transferability. Our results show that an attacker can successfully attack downstream tasks without knowing either the pre-training dataset or the downstream dataset. We also tailor four defenses for pre-trained encoders, the results of which further prove the attack ability of AdvEncoder. Our codes are available at: https://***/CGCL-codes/AdvEncoder.
Streaming graph processing needs to timely evaluate continuous queries. Prior systems suffer from massive redundant computations due to the irregular order of processing vertices influenced by updates. To address this...
Streaming graph processing needs to timely evaluate continuous queries. Prior systems suffer from massive redundant computations due to the irregular order of processing vertices influenced by updates. To address this issue, we propose ACGraph, a novel streaming graph processing approach for monotonic graph algorithms. It maintains dependence trees during runtime, and makes affected vertices processed in a top-to-bottom order in the hierarchy of the dependence trees, thus normalizing the state propagation order and coalescing of multiple propagation to the same vertices. Experimental results show that ACGraph reduces the number of updates by 50% on average, and achieves the speedup of 1.75~7.43× over state-of-the-art systems.
A high-dimensional and incomplete (HDI) matrix can describe the complex interactions among numerous nodes in various big data-related applications. A stochastic gradient descent (SGD)-based latent factor analysis (LFA...
详细信息
Advancements in artificial intelligence (ai) and low-earth orbit (LEO) satellites have promoted the application of large remote sensing foundation models for various downstream tasks. However, direct downloading of th...
详细信息
The area of oil palm plantations in Indonesia increased by 7% from 14 million ha in 2017 to 15 million ha in 2021. The vast land requires the support of effective and efficient management techniques to maintain sustai...
详细信息
Flexible intelligent metasurfaces (FIMs) show great potential for improving the wireless network capacity in an energy-efficient manner. An FIM is a soft array consisting of several low-cost radiating elements. Each e...
详细信息
暂无评论