The ever-increasing number of Internet-of-Thing devices requires the development of edge-computing platforms to address the associated demand for big data processing at low power consumption while minimizing cloud com...
详细信息
Machine learning techniques have become ubiquitous both in industry and academic *** model sizes and training data volumes necessitate fast and efficient distributed training *** communications greatly simplify inter-...
详细信息
Machine learning techniques have become ubiquitous both in industry and academic *** model sizes and training data volumes necessitate fast and efficient distributed training *** communications greatly simplify inter-and intra-node data transfer and are an essential part of the distributed training process as information such as gradients must be shared between processing *** this paper,we survey the current state-of-the-art collective communication libraries(namely xCCL,including NCCL,oneCCL,RCCL,MSCCL,ACCL,and Gloo),with a focus on the industry-led ones for deep learning *** investigate the design features of these xCCLs,discuss their use cases in the industry deep learning workloads,compare their performance with industry-made benchmarks(i.e.,NCCL Tests and PARAM),and discuss key take-aways and interesting *** believe our survey sheds light on potential research directions of future designs for xCCLs.
The Music to Score Conversion (MSC) project focuses on bridging the gap between auditory and visual representations of music. It uses signal processing techniques for the conversion such as pitch estimation, onset det...
详细信息
作者:
Yao, YuhangJafar, Syed A.
Department of Electrical Engineering and Computer Science IrvineCA92697 United States
The optimal quantum communication cost of computing a classical sum of distributed sources is studied over a quantum erasure multiple access channel (QEMAC). K classical messages comprised of finite-field symbols are ...
详细信息
This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting-based secret *** trustfulness of shares utilised secret-sharing as an applicable privacy crea...
详细信息
This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting-based secret *** trustfulness of shares utilised secret-sharing as an applicable privacy creation tool for the authentication of real-life complex *** research adjusts embedding the watermarking data over the images by innovative redistribution of shares to be embedded spread over all the *** anticipated watermarking technique guaranteed to scatter the share bits implanting at different least significant bits of image pixels as boosting up the trust overall authentication *** paper experimentation performance analysis shows that this improved image watermarking authentication(capacity)is averagely better by 33%–67%than other related exclusive-OR oriented and octagon ***,these measurement improvements did not degrade the robustness and security of the system,inspiring our research for opening novel track of related future counting-based secret-sharing authentication progresses to come.
One of the leading causes of early health detriment is the increasing levels of air pollution in major cities and eventually in indoor spaces. Monitoring the air quality effectively in closed spaces like educational i...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
The existing cloud model unable to handle abundant amount of Internet of Things (IoT) services placed by the end users due to its far distant location from end user and centralized nature. The edge and fog computing a...
详细信息
With the advancing technology, it becomes difficult to cope up with novel trends and configurations. Similarly, it is difficult to secure the systems against each emerging threat. With this the loopholes in convention...
详细信息
Collaborative filtering (CF) is a traditional and popular technique in the recommendation system (RS) paradigm. Notably, one specific form of item-based collaborative filtering (IBCF), known as the slope one algorithm...
详细信息
暂无评论