Graph neural networks (GNNs) have gained increasing popularity, while usually suffering from unaffordable computations for real-world large-scale applications. Hence, pruning GNNs is of great need but largely unexplor...
详细信息
Graph neural networks (GNNs) have gained increasing popularity, while usually suffering from unaffordable computations for real-world large-scale applications. Hence, pruning GNNs is of great need but largely unexplored. The recent work Unified GNN Sparsification (UGS) studies lottery ticket learning for GNNs, aiming to find a subset of model parameters and graph structures that can best maintain the GNN performance. However, it is tailed for the transductive setting, failing to generalize to unseen graphs, which are common in inductive tasks like graph classification. In this work, we propose a simple and effective learning paradigm, Inductive Co-Pruning of GNNs (ICPG), to endow graph lottery tickets with inductive pruning capacity. To prune the input graphs, we design a predictive model to generate importance scores for each edge based on the input. To prune the model parameters, it views the weight’s magnitude as their importance scores. Then we design an iterative co-pruning strategy to trim the graph edges and GNN weights based on their importance scores. Although it might be strikingly simple, ICPG surpasses the existing pruning method and can be universally applicable in both inductive and transductive learning settings. On 10 graph-classification and two node-classification benchmarks, ICPG achieves the same performance level with 14.26%–43.12% sparsity for graphs and 48.80%–91.41% sparsity for the GNN model.
As cryptocurrencies become more popular as investment vehicles, bitcoin draws interest from businesses, consumers, and computer scientists all across the world. Bitcoin is a computer file stored in digital wallet appl...
详细信息
This article proposes a proactive crowdsourced monitoring and sensing (PCMS) framework with the designed Smart iBeacon device to accurately recognize the activities of an equipped target, exclusively customize the rec...
详细信息
The agriculture industry's production and food quality have been impacted by plant leaf diseases in recent years. Hence, it is vital to have a system that can automatically identify and diagnose diseases at an ini...
详细信息
Rate-splitting multiple access(RSMA) has recently gained attention as a potential robust multiple access(MA)scheme for upcoming wireless networks. Given its ability to efficiently utilize wireless resources and design...
详细信息
Rate-splitting multiple access(RSMA) has recently gained attention as a potential robust multiple access(MA)scheme for upcoming wireless networks. Given its ability to efficiently utilize wireless resources and design interference management strategies, it can be applied to unmanned aerial vehicle(UAV) networks to provide convenient services for large-scale access ground users. However, due to the line-of-sight(LoS) broadcast nature of UAV transmission, information is susceptible to eavesdropping in RSMA-based UAV networks. Moreover, the superposition of signals at the receiver in such networks becomes complicated. To cope with the challenge, we propose a two-user multi-input single-output(MISO) RSMA-based UAV secure transmission framework in downlink communication networks. In a passive eavesdropping scenario, our goal is to maximize the sum secrecy rate by optimizing the transmit beamforming and deployment location of the UAV-base station(UAV-BS),while considering quality-of-service(QoS) constraints, maximum transmit power, and flight space limitations. To address the non-convexity of the proposed problem, the optimization problem is first decoupled into two subproblems. Then, the successive convex approximation(SCA) method is employed to solve each subproblem using different propositions. In addition, an alternating optimization(AO)-based location RSMA(L-RSMA) beamforming algorithm is developed to implement joint optimization to obtain the suboptimal solution. Numerical results demonstrate that(1) the proposed L-RSMA scheme yields a28.97% higher sum secrecy rate than the baseline L-space division multiple access(SDMA) scheme;(2) the proposed L-RSMA scheme improves the security performance by 42.61% compared to the L-non-orthogonal multiple access(NOMA) scheme.
With the enhanced usage of artificial-intelligence-driven applications, the researchers often face challenges in improving the accuracy of data classification models, while trading off the complexity. In this article,...
详细信息
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)*** networks give a safe and more effective driving experie...
详细信息
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)*** networks give a safe and more effective driving experience by presenting time-sensitive and location-aware *** communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with ***,the scheme of an effectual routing protocol for reliable and stable communications is *** research demonstrates that clustering is an intelligent method for effectual routing in a mobile ***,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in *** FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the *** accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust *** the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR *** experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods.
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various ***,the adoption of cloud storage poses significant risks to data secrecy and *** article presents an effec...
详细信息
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various ***,the adoption of cloud storage poses significant risks to data secrecy and *** article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic *** proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced *** preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing *** extensive performance analysis is conducted to illustrate the efficiency of the proposed ***,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running *** security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious *** proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems.
Now-a-days, the generation of videos has increased dramatically due to the quick growth of multimedia and the internet. The need for effective ways to store, manage, and index the massive numbers of videos has become ...
详细信息
Human pose estimation aims at locating the specific joints of humans from the images or videos. While existing deep learning-based methods have achieved high positioning accuracy, they often struggle with generalizati...
详细信息
暂无评论