Smart meters are an important component of the smart grid, and the large-scale deployment of meters on the user side generates a large amount of data that brings huge expenses to the smart grid. In addition, attackers...
详细信息
Non-maximum suppression (NMS) is an essential post-processing module in many 3D object detection frameworks to remove overlapping candidate bounding boxes. However, an overreliance on classification scores and difficu...
详细信息
Non-maximum suppression (NMS) is an essential post-processing module in many 3D object detection frameworks to remove overlapping candidate bounding boxes. However, an overreliance on classification scores and difficulties in determining appropriate thresholds can affect the resulting accuracy directly. To address these issues, we introduce fuzzy learning into NMS and propose a novel generalized Fuzzy-NMS module to achieve finer candidate bounding box filtering. The proposed Fuzzy-NMS module combines the volume and clustering density of candidate bounding boxes, refining them with a fuzzy classification method and optimizing the appropriate suppression thresholds to reduce uncertainty in the NMS process. Adequate validation experiments use the mainstream KITTI and large-scale Waymo 3D object detection benchmarks. The results of these tests demonstrate the proposed Fuzzy-NMS module can improve the accuracy of numerous recently NMS-based detectors significantly, including PointPillars, PV-RCNN, and IA-SSD, etc. This effect is particularly evident for small objects such as pedestrians and bicycles. As a plug-and-play module, Fuzzy-NMS does not need to be retrained and produces no obvious increases in inference time. IEEE
Vision Transformer (ViT) has been successfully applied to various vision tasks, outperforming convolutional neural networks due to their ability to capture global dependencies through the self-attention mechanism. How...
详细信息
作者:
Makur, AnuranSingh, JapneetPurdue University
School of Electrical and Computer Engineering Department of Computer Science West LafayetteIN47907 United States Purdue University
School of Electrical and Computer Engineering West LafayetteIN47907 United States
Doeblin coefficients are a classical tool to study the ergodicity of Markov chains. Propelled by recent works on contraction coefficients of strong data processing inequalities, we investigate whether Doeblin coeffici...
详细信息
We have developed HEARTS, a dementia care training system using augmented reality based on Humanitude. Humanitude is a multimodal comprehensive care technique for dementia, and has attracted attention as a method to r...
详细信息
The problem of speech separation, also known as the cocktail party problem, refers to the task of isolating a single speech signal from a mixture of speech signals. Previous work on source separation derived an upper ...
详细信息
The proliferation of ultra-low-latency and faster convergence applications in sixth-generation (6G) networks necessitates mobile edge computing (MEC) for offloading computationally intensive tasks from user devices to...
详细信息
In the 6G era,Space-Air-Ground Integrated Network(SAGIN)are anticipated to deliver global coverage,necessitating support for a diverse array of emerging applications in high-mobility,hostile *** such conditions,conven...
详细信息
In the 6G era,Space-Air-Ground Integrated Network(SAGIN)are anticipated to deliver global coverage,necessitating support for a diverse array of emerging applications in high-mobility,hostile *** such conditions,conventional orthogonal frequency division multiplexing(OFDM)modulation,widely employed in cellular and Wi-Fi communication systems,experiences performance degradation due to significant Doppler *** overcome this obstacle,a novel twodimensional(2D)modulation approach,namely orthogonal time frequency space(OTFS),has emerged as a key enabler for future high-mobility use ***,OTFS modulates information within the delay-Doppler(DD)domain,as opposed to the timefrequency(TF)domain utilized by *** offers advantages such as Doppler and delay resilience,reduced signaling latency,a lower peak-to-average ratio(PAPR),and a reduced-complexity *** studies further indicate that the direct interplay between information and the physical world in the DD domain positions OTFS as a promising waveform for achieving integrated sensing and communications(ISAC).In this article,we present an in-depth review of OTFS technology in the context of the 6G era,encompassing fundamentals,recent advancements,and future *** objective is to provide a helpful resource for researchers engaged in the field of OTFS.
We develop a technique to design efficiently computable estimators for sparse linear regression in the simultaneous presence of two adversaries: oblivious and adaptive. Consider the model y∗ = X∗β∗ + η where X∗ is a...
We develop a technique to design efficiently computable estimators for sparse linear regression in the simultaneous presence of two adversaries: oblivious and adaptive. Consider the model y∗ = X∗β∗ + η where X∗ is an n × d random design matrix, β∗ ∈ Rd is a k-sparse vector, and the noise η is independent of X∗ and chosen by the oblivious adversary. Apart from the independence of X∗, we only require a small fraction entries of η to have magnitude at most 1. The adaptive adversary is allowed to arbitrarily corrupt an Ε-fraction of the samples (X1∗, y1∗), ..., (Xn∗, yn∗ ). Given the Ε-corrupted samples (X1, y1), ..., (Xn, yn), the goal is to estimate β∗. We assume that the rows of X∗ are iid samples from some d-dimensional distribution D with zero mean and (unknown) covariance matrix Σ with bounded condition number. We design several robust algorithms that outperform the state of the art even in the special case of Gaussian noise η ∼ N(0, 1)n. In particular, we provide a polynomial-time algorithm that with high probability recovers β∗ up to error O(√Ε) as long as n ≥ O∼ (k2/Ε), only assuming some bounds on the third and the fourth moments of D. In addition, prior to this work, even in the special case of Gaussian design D = N(0, Σ) and noise η ∼ N(0, 1), no polynomial time algorithm was known to achieve error o(√Ε) in the sparse setting n 2. We show that under some assumptions on the fourth and the eighth moments of D, there is a polynomial-time algorithm that achieves error o(√Ε) as long as n ≥ O∼ (k4/Ε3). For Gaussian distribution D = N(0, Σ), this algorithm achieves error O(Ε3/4). Moreover, our algorithm achieves error o(√Ε) for all log-concave distributions if Ε ≤ 1/polylog(d). Our algorithms are based on the filtering of the covariates that uses sum-of-squares relaxations, and weighted Huber loss minimization with 1 regularizer. We provide a novel analysis of weighted penalized Huber loss that is suitable for heavy-tailed designs in the presence of two adversaries
A(t,n)threshold secret sharing scheme is a fundamental tool in many security applications such as cloud computing and multiparty *** conventional threshold secret sharing schemes,like Shamir’s scheme based on a univa...
详细信息
A(t,n)threshold secret sharing scheme is a fundamental tool in many security applications such as cloud computing and multiparty *** conventional threshold secret sharing schemes,like Shamir’s scheme based on a univariate polynomial,additional communication key share scheme is needed for shareholders to protect the secrecy of their shares if secret reconstruction is performed over a *** the secret reconstruction,the threshold changeable secret sharing(TCSS)allows the threshold to be a dynamic value so that if some shares have been compromised in a given time,it needs more shares to reconstruct the ***,a new secret sharing scheme based on a bivariate polynomial is proposed in which shares generated initially by a dealer can be used not only to reconstruct the secret but also to protect the secrecy of shares when the secret reconstruction is performed over a *** this paper,we further extend this scheme to enable it to be a TCSS without any *** proposed TCSS is dealer-free and *** generated by a dealer in our scheme can serve for three purposes,(a)to reconstruct a secret;(b)to protect the secrecy of shares if secret reconstruction is performed over a network;and(c)to enable the threshold changeable property.
暂无评论