Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
Large number of antennas and higher bandwidth usage in massive multiple-input-multipleoutput(MIMO)systems create immense burden on receiver in terms of higher power *** power consumption at the receiver radio frequenc...
详细信息
Large number of antennas and higher bandwidth usage in massive multiple-input-multipleoutput(MIMO)systems create immense burden on receiver in terms of higher power *** power consumption at the receiver radio frequency(RF)circuits can be significantly reduced by the application of analog-to-digital converter(ADC)of low *** this paper we investigate bandwidth efficiency(BE)of massive MIMO with perfect channel state information(CSI)by applying low resolution ADCs with Rician *** start our analysis by deriving the additive quantization noise model,which helps to understand the effects of ADC resolution on BE by keeping the power constraint at the receiver in *** also investigate deeply the effects of using higher bit rates and the number of BS antennas on bandwidth efficiency(BE)of the *** emphasize that good bandwidth efficiency can be achieved by even using low resolution ADC by using regularized zero-forcing(RZF)combining *** also provide a generic analysis of energy efficiency(EE)with different options of bits by calculating the energy efficiencies(EE)using the achievable *** emphasize that satisfactory BE can be achieved by even using low-resolution ADC/DAC in massive MIMO.
In recent years, unmanned aerial vehicles (UAVs) have proven their effectiveness in surveillance due to their superior mobility. By utilizing multiple UAVs with collaborated learning, surveillance of a huge area while...
详细信息
Large language models (LLMs) have recently shown remarkable performance in a variety of natural language processing (NLP) *** further explore LLMs'reasoning abilities in solving complex problems,recent research [1...
Large language models (LLMs) have recently shown remarkable performance in a variety of natural language processing (NLP) *** further explore LLMs'reasoning abilities in solving complex problems,recent research [1-3]has investigated chain-of-thought (CoT) reasoning in complex multimodal scenarios,such as science question answering (scienceQA) tasks [4],by fine-tuning multimodal models through human-annotated CoT ***,collected CoT rationales often miss the necessary rea-soning steps and specific expertise.
Virtual reality (VR) systems are susceptible to cybersickness, significantly hindering user immersion. Very recently, researchers introduced explainable artificial intelligence (XAI) enabled methods for detecting and ...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
Developing manufacturing methods for flexible electronics will enable and improve the large-scale production of flexible, spatially efficient, and lightweight devices. Laser sintering is a promising postprocessing met...
详细信息
The concept of the digital twin,also known colloquially as the DT,is a fundamental principle within Industry 4.0 *** recent years,the concept of digital siblings has generated considerable academic and practical ***,a...
详细信息
The concept of the digital twin,also known colloquially as the DT,is a fundamental principle within Industry 4.0 *** recent years,the concept of digital siblings has generated considerable academic and practical ***,academia and industry have used a variety of interpretations,and the scientific literature lacks a unified and consistent definition of this *** purpose of this study is to systematically examine the definitional landscape of the digital twin concept as outlined in scholarly literature,beginning with its origins in the aerospace domain and extending to its contemporary interpretations in the manufacturing ***,this investigationwill focus on the research conducted on Industry 4.0 and smartmanufacturing,elucidating the diverse applications of digital twins in fields including aerospace,intelligentmanufacturing,intelligent transportation,and intelligent cities,among others.
Multi-path avoidance routing for wireless sensor networks (WSNs) is a secure routing paradigm against adversaries with unbounded computational power. The key idea of avoidance routing is to encode a message into sever...
详细信息
Multi-path avoidance routing for wireless sensor networks (WSNs) is a secure routing paradigm against adversaries with unbounded computational power. The key idea of avoidance routing is to encode a message into several pieces by the XOR coding, and each piece is routed via different paths. Then, an adversary cannot obtain the original message unless she eavesdrops on all message pieces from all the paths. In this paper, we extend such an approach into secure multicast routing, which is a one-to-many communication primitive. To this end, we propose the multi-tree-based avoidance multicast routing protocol (AMRP) for WSNs, in which a set of adversary disjoint trees is discovered, i.e., a set of multicast trees with no common adversaries. When a set of multicast trees is adversary disjoint, no adversary can eavesdrop on all message pieces to recover the original message. In addition, optimized AMRP (OAMRP) is proposed in order to reduce the control overhead of AMRP, where additional multicast trees are used for only a subset of destination nodes with no single safe tree. The simulation results demonstrate that the proposed protocols achieve higher secure delivery rates than a simple extension of the existing unicast avoidance routing protocol. IEEE
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data i...
详细信息
暂无评论