Industrial robots have significantly transformed manufacturing processes and are increasingly revolutionizing sectors such as logistics, healthcare, agriculture, and construction by enhancing efficiency, quality, and ...
详细信息
This paper introduces an innovative method for automating the proposal merging process in e-deliberation systems, utilizing advanced natural language processing (NLP) and machine learning algorithms. The primary goal ...
详细信息
Trajectory prediction module in an autonomous driving system is crucial for the decision-making and safety of the autonomous agent car and its surroundings. This work presents a novel scheme called AiGem (Agent-Intera...
详细信息
As a technique to bridge logit matching and probability distribution matching, temperature scaling plays a pivotal role in knowledge distillation (KD). Conventionally, temperature scaling is applied to both teacher...
详细信息
This paper proposes a new cluster method combined with Dynamic Mode Decomposition with Control (DMDc), and the Proper Orthogonal Decomposition (POD) to construct more accurate reduced order models. DMDc and POD are po...
This paper proposes a novel anomaly detection system to identify combustion process irregularities, in real-time, within individual cylinders of marine engines. The system monitors the instantaneous speed of the crank...
详细信息
This paper addresses the challenge of preserving privacy in Federated Learning (FL) within centralized systems, focusing on both trusted and untrusted server scenarios. We analyze this setting within the Stochastic Co...
详细信息
This paper addresses the challenge of preserving privacy in Federated Learning (FL) within centralized systems, focusing on both trusted and untrusted server scenarios. We analyze this setting within the Stochastic Convex Optimization (SCO) framework, and devise methods that ensure Differential Privacy (DP) while maintaining optimal convergence rates for homogeneous and heterogeneous data distributions. Our approach, based on a recent stochastic optimization technique, offers linear computational complexity, comparable to non-private FL methods, and reduced gradient obfuscation. This work enhances the practicality of DP in FL, balancing privacy, efficiency, and robustness in a variety of server trust environments. Copyright 2024 by the author(s)
FDI (False Data Injection) attacks are critical to address as they can compromise the integrity and reliability of data in cyber-physical systems, leading to potentially severe consequences in sectors such as power sy...
详细信息
The use of Internet of Things (IoT) technology in military settings has introduced the notion of "Internet of Battle Things" (IoBT), transforming modern warfare by interconnecting various equipment and syste...
详细信息
Crossover is a key component of evolutionary algorithms and has been the focus of numerous studies. Its effectiveness depends on the operator’s properties to mix information, the specific characteristics of the probl...
详细信息
暂无评论