Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical...
详细信息
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical *** paper analyzes two fundamental failure cases in the baseline AD model and identifies key reasons that limit the recognition accuracy of existing approaches. Specifically, by Case-1, we found that the main reason detrimental to current AD methods is that the inputs to the recovery model contain a large number of detailed features to be recovered, which leads to the normal/abnormal area has not/has been recovered into its original state. By Case-2, we surprisingly found that the abnormal area that cannot be recognized in image-level representations can be easily recognized in the feature-level representation. Based on the above observations, we propose a novel recover-then-discriminate(ReDi) framework for *** takes a self-generated feature map(e.g., histogram of oriented gradients) and a selected prompted image as explicit input information to address the identified in Case-1. Additionally, a feature-level discriminative network is introduced to amplify abnormal differences between the recovered and input representations. Extensive experiments on two widely used yet challenging AD datasets demonstrate that ReDi achieves state-of-the-art recognition accuracy.
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
Human activity recognition (HAR) techniques pick out and interpret human behaviors and actions by analyzing data gathered from various sensor devices. HAR aims to recognize and automatically categorize human activitie...
详细信息
Unmanned aerial vehicles(UAVs)are widely used in situations with uncertain and risky areas lacking network *** natural disasters,timely delivery of first aid supplies is *** UAVs face risks such as crashing into birds...
详细信息
Unmanned aerial vehicles(UAVs)are widely used in situations with uncertain and risky areas lacking network *** natural disasters,timely delivery of first aid supplies is *** UAVs face risks such as crashing into birds or unexpected *** systems with parachutes risk dispersing payloads away from target *** objective here is to use multiple UAVs to distribute payloads cooperatively to assigned *** civil defense department must balance coverage,accurate landing,and flight safety while considering battery power and *** Q-network(DQN)models are commonly used in multi-UAV path planning to effectively represent the surroundings and action *** strategies focused on advanced DQNs for UAV path planning in different configurations,but rarely addressed non-cooperative scenarios and disaster *** paper introduces a new DQN framework to tackle challenges in disaster *** considers unforeseen structures and birds that could cause UAV crashes and assumes urgent landing zones and winch-based airdrop systems for precise delivery and return.A new DQN model is developed,which incorporates the battery life,safe flying distance between UAVs,and remaining delivery points to encode surrounding hazards into the state space and ***,a unique reward system is created to improve UAV action sequences for better delivery coverage and safe *** experimental results demonstrate that multi-UAV first aid delivery in disaster environments can achieve advanced performance.
This paper presents Secure Orchestration, a novel framework meticulously planned to uphold rigorous security measures over the profound security concerns that lie within the container orchestration platforms, especial...
详细信息
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context ...
详细信息
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context of IoT fog *** suggested framework,called"BlocFogSec",secures key management and data sharing through blockchain consensus and smart *** existing solutions,BlocFogSec utilizes two types of smart contracts for secure key exchange and data sharing,while employing a consensus protocol to validate transactions and maintain blockchain *** process and store data effectively at the network edge,the framework makes use of fog computing,notably reducing latency and raising *** successfully blocks unauthorized access and data breaches by restricting transactions to authorized *** addition,the framework uses a consensus protocol to validate and add transactions to the blockchain,guaranteeing data accuracy and *** compare BlocFogSec's performance to that of other models,a number of simulations are *** simulation results indicate that BlocFogSec consistently outperforms existing models,such as Security Services for Fog Computing(SSFC)and Blockchain-based Key Management Scheme(BKMS),in terms of throughput(up to 5135 bytes per second),latency(as low as 7 ms),and resource utilization(70%to 92%).The evaluation also takes into account attack defending accuracy(up to 100%),precision(up to 100%),and recall(up to 99.6%),demonstrating BlocFogSec's effectiveness in identifying and preventing potential attacks.
Accurate monitoring of urban waterlogging contributes to the city’s normal operation and the safety of residents’daily ***,due to feedback delays or high costs,existing methods make large-scale,fine-grained waterlog...
详细信息
Accurate monitoring of urban waterlogging contributes to the city’s normal operation and the safety of residents’daily ***,due to feedback delays or high costs,existing methods make large-scale,fine-grained waterlogging monitoring impossible.A common method is to forecast the city’s global waterlogging status using its partial waterlogging *** method has two challenges:first,existing predictive algorithms are either driven by knowledge or data alone;and second,the partial waterlogging data is not collected selectively,resulting in poor *** overcome the aforementioned challenges,this paper proposes a framework for large-scale and fine-grained spatiotemporal waterlogging monitoring based on the opportunistic sensing of limited bus *** framework follows the Sparse Crowdsensing and mainly comprises a pair of iterative predictor and *** predictor uses the collected waterlogging status and the predicted status of the uncollected area to train the graph convolutional neural *** combines both knowledge-driven and data-driven approaches and can be used to forecast waterlogging status in all regions for the upcoming *** selector consists of a two-stage selection procedure that can select valuable bus routes while satisfying budget *** experimental results on real waterlogging and bus routes in Shenzhen show that the proposed framework could easily perform urban waterlogging monitoring with low cost,high accuracy,wide coverage,and fine granularity.
Intelligent education is a significant application of artificial intelligence. One of the key research topics in intelligence education is cognitive diagnosis, which aims to gauge the level of proficiency among studen...
详细信息
Intelligent education is a significant application of artificial intelligence. One of the key research topics in intelligence education is cognitive diagnosis, which aims to gauge the level of proficiency among students on specific knowledge concepts(e.g., Geometry). To the best of our knowledge, most of the existing cognitive models primarily focus on improving diagnostic accuracy while rarely considering fairness issues; for instance, the diagnosis of students may be affected by various sensitive attributes(e.g., region). In this paper,we aim to explore fairness in cognitive diagnosis and answer two questions:(1) Are the results of existing cognitive diagnosis models affected by sensitive attributes?(2) If yes, how can we mitigate the impact of sensitive attributes to ensure fair diagnosis results? To this end, we first empirically reveal that several wellknown cognitive diagnosis methods usually lead to unfair performances, and the trend of unfairness varies among different cognitive diagnosis models. Then, we make a theoretical analysis to explain the reasons behind this phenomenon. To resolve the unfairness problem in existing cognitive diagnosis models, we propose a general fairness-aware cognitive diagnosis framework, FairCD. Our fundamental principle involves eliminating the effect of sensitive attributes on student proficiency. To achieve this, we divide student proficiency in existing cognitive diagnosis models into two components: bias proficiency and fair *** design two orthogonal tasks for each of them to ensure that fairness in proficiency remains independent of sensitive attributes and take it as the final diagnosed result. Extensive experiments on the Program for International Student Assessment(PISA) dataset clearly show the effectiveness of our framework.
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection b...
详细信息
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection between cyberspace and physical processes results in the exposure of industrial production information to unprecedented security risks. It is imperative to develop suitable strategies to ensure cyber security while meeting basic performance *** the perspective of control engineering, this review presents the most up-to-date results for privacy-preserving filtering,control, and optimization in industrial cyber-physical systems. Fashionable privacy-preserving strategies and mainstream evaluation metrics are first presented in a systematic manner for performance evaluation and engineering *** discussion discloses the impact of typical filtering algorithms on filtering performance, specifically for privacy-preserving Kalman filtering. Then, the latest development of industrial control is systematically investigated from consensus control of multi-agent systems, platoon control of autonomous vehicles as well as hierarchical control of power systems. The focus thereafter is on the latest privacy-preserving optimization algorithms in the framework of consensus and their applications in distributed economic dispatch issues and energy management of networked power systems. In the end, several topics for potential future research are highlighted.
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inher...
详细信息
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inherent biases and computational burdens, especially when used to relax the rank function, making them less effective and efficient in real-world scenarios. To address these challenges, our research focuses on generalized nonconvex rank regularization problems in robust matrix completion, low-rank representation, and robust matrix regression. We introduce innovative approaches for effective and efficient low-rank matrix learning, grounded in generalized nonconvex rank relaxations inspired by various substitutes for the ?0-norm relaxed functions. These relaxations allow us to more accurately capture low-rank structures. Our optimization strategy employs a nonconvex and multi-variable alternating direction method of multipliers, backed by rigorous theoretical analysis for complexity and *** algorithm iteratively updates blocks of variables, ensuring efficient convergence. Additionally, we incorporate the randomized singular value decomposition technique and/or other acceleration strategies to enhance the computational efficiency of our approach, particularly for large-scale constrained minimization problems. In conclusion, our experimental results across a variety of image vision-related application tasks unequivocally demonstrate the superiority of our proposed methodologies in terms of both efficacy and efficiency when compared to most other related learning methods.
暂无评论