Although attention weights have been commonly used as a means to provide explanations for deep learning models, the approach has been widely criticized due to its lack of faithfulness. In this work, we present a simpl...
详细信息
Reconfigurable intelligent surfaces (RISs) have recently been employed to facilitate communication and improve performance by reflecting signals through configuring phase shifts toward the intended destination. This a...
详细信息
ISBN:
(数字)9798331520113
ISBN:
(纸本)9798331520120
Reconfigurable intelligent surfaces (RISs) have recently been employed to facilitate communication and improve performance by reflecting signals through configuring phase shifts toward the intended destination. This article examines the physical layer security of an underlay cognitive radio network aided by an RIS and in the presence of multiple eavesdroppers. The research is conducted under practical conditions, encompassing RIS hardware constraints and cascaded fading channels. An optimization problem is proposed with the objective of maximizing the secrecy rate of secondary users by optimizing the reflection angles of the RIS and the transmission power of the secondary user transmitter. A deep reinforcement learning method, specifically the soft actor-critic, is presented as a solution. The results section demonstrates the effect of altering the number of RIS elements on security. We also analyze the impact of hardware limitations and cascade levels on the secrecy rate. The effect of varying the number of eavesdroppers and the maximum permissible transmission power are also examined.
Recent trends in Network Function Virtualization (NFV) combined with Internet of Things (IoT) and 5G applications have reshaped the network service offering. In particular, Service Function Chains (SFCs) can associate...
详细信息
One of the most challenging problems in reinforcement learning is dealing with minimal rewards obtained from an environment. We present a combined technique of Twin Delayed Deep Deterministic Policy Gradient known as ...
详细信息
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph,which is amenable to be adopted in tra...
详细信息
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph,which is amenable to be adopted in traditional machine learning algorithms in favor of vector *** embedding methods build an important bridge between social network analysis and data analytics,as social networks naturally generate an unprecedented volume of graph data *** social network data not only brings benefit for public health,disaster response,commercial promotion,and many other applications,but also gives birth to threats that jeopardize each individual’s privacy and ***,most existing works in publishing social graph embedding data only focus on preserving social graph structure with less attention paid to the privacy issues inherited from social *** be specific,attackers can infer the presence of a sensitive relationship between two individuals by training a predictive model with the exposed social network *** this paper,we propose a novel link-privacy preserved graph embedding framework using adversarial learning,which can reduce adversary’s prediction accuracy on sensitive links,while persevering sufficient non-sensitive information,such as graph topology and node attributes in graph *** experiments are conducted to evaluate the proposed framework using ground truth social network datasets.
Context: softwareengineering (SE) community has empirically investigated software defect prediction as a proxy to benchmark it as a process improvement activity to assure software quality. In the domain of software f...
详细信息
ISBN:
(纸本)9781450396134
Context: softwareengineering (SE) community has empirically investigated software defect prediction as a proxy to benchmark it as a process improvement activity to assure software quality. In the domain of software fault prediction, the performance of classification algorithms is highly provoked with the residual effects attributed to feature irrelevance and data redundancy issues. Problem: The meta-learning-based ensemble methods are usually carried out to mitigate these noise effects and boost the software fault prediction performance. However, there is a need to benchmark the performance of meta-learning ensemble methods (as fault predictor) to assure software quality control and aid developers in their decision making. Method: We conduct an empirical and comparative study to evaluate and benchmark the improvement in the fault prediction performance via meta-learning ensemble methods as compared to their component base-level fault predictors. In this study, we perform a series of experiments with four well-known meta-level ensemble methods Vote, StackingC (i.e., Stacking), MultiScheme, and Grading. We also use five high-performance fault predictors Logistic (i.e., Logistic Regression), J48 (i.e., Decision Tree), IBK (i.e. k-nearest neighbor), NaiveBayes, and Decision Table (DT). Subsequently, we performed these experiments on public defect datasets with k-fold (k=10) cross-validation. We used F-measure and ROC-AUC (Receiver Operating Characteristic-Area Under Curve) performance measures and applied the four non-parametric tests to benchmark the fault prediction performance results of meta-learning ensemble methods. Results and Conclusion: we conclude that meta-learning ensemble methods, especially Vote could outperform the base-level fault predictors to tackle the feature irrelevance and redundancy issues in the domain of software fault prediction. Having said that, their performance is highly related to the number of base-level classifiers and the set of softwa
Hepatocellular Carcinoma (HCC) holds a record of high incidence and severe global harm. In tasks of liver cancer segmentation based on 3D medical images, the majority of methods have endeavored to enhance the 3D U-net...
详细信息
Epileptic seizures with the risk of sudden unexpected death in epilepsy affect the quality of life. Nearly, one-fourth of the individuals suffer from seizures that cannot be treated with medications. Due to the high-l...
详细信息
A flood of information has occurred with the rise of the internet and digital devices in the fourth industrial revolution era. Every millisecond, massive amounts of structured and unstructured data are generated;smart...
详细信息
The necessity of ensuring people's safety in urban conditions during gathering in a certain indoor or outdoor area, as well as during the operation of technical equipment, requires measurement of their number, wei...
详细信息
暂无评论