This article focuses on enhancing the cybersecurity of cyber-physical systems, with a particular emphasis on the False Data Injection (FDI) attack within the Demand Response (DR) mechanism in smart grids. DR seeks to ...
详细信息
The accurate, extended period prediction of individual customer energy consumption is critical for utility providers. Machine learning techniques, particularly neural networks, have proven effective in predicting hous...
详细信息
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the ...
详细信息
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the longitudinal OAM and the transverse OAM carried by a three-dimensional(3D)spatiotemporal optical vortex(STOV)in the process of tight *** 3D STOV possesses orthogonal OAMs in the x-y,t-x,and y-t planes,and is preconditioned to overcome the spatiotemporal astigmatism effect.x,y,and t are the axes in the spatiotemporal *** corresponding focused wavepacket is calculated by employing the Debye diffraction theory,showing that a phase singularity ring is generated by the interactions among the transverse and longitudinal vortices in the highly confined *** Fourier-transform decomposition of the Debye integral is employed to analyze the mechanism of the orbit-orbit *** is the first revelation of coupling between the longitudinal OAM and the transverse OAM,paving the way for potential applications in optical trapping,laser machining,nonlinear light-matter interactions,and more.
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
This article presents a novel method for point target detection in remote sensing imagery, focusing on the development of an innovative approach to enhance detection accuracy and reduce false positives. The core contr...
详细信息
Modern automobiles are equipped with connectivity features to enhance the user's *** is one such communication technology that is used to pair a personal device with an automotive infotainment *** pairing,the user...
详细信息
Modern automobiles are equipped with connectivity features to enhance the user's *** is one such communication technology that is used to pair a personal device with an automotive infotainment *** pairing,the user could access the personal information on the phone through the automotive head unit with minimum distraction while ***,such connectivity introduces a possibility for privacy ***,performing an in-depth analysis of the system with privacy constraints is extremely important to prevent unauthorized access to personal *** this work,we perform a systematic analysis of the Bluetooth network of an automotive infotainment unit to exploit security and privacy-related *** model the identifed threat with respect to privacy constraints of the system,emphasize the severity of attacks through a standardized rating metric and then provide potential countermeasures to prevent the *** perform System Theoretic Process Analysis for Privacy as a part of the systematic analysis and use the Common Vulnerability Scoring System to derive attack *** identifed vulnerabilities are due to design flaws and assumptions on Bluetooth protocol implementation on automotive infotainment *** then elicit the vulnerability by performing a privacy attack on the Automotive system in an actual *** use Android Open-Source Project to report our findings and propose defense strategies.
Rate-splitting multiple access(RSMA) has recently gained attention as a potential robust multiple access(MA)scheme for upcoming wireless networks. Given its ability to efficiently utilize wireless resources and design...
详细信息
Rate-splitting multiple access(RSMA) has recently gained attention as a potential robust multiple access(MA)scheme for upcoming wireless networks. Given its ability to efficiently utilize wireless resources and design interference management strategies, it can be applied to unmanned aerial vehicle(UAV) networks to provide convenient services for large-scale access ground users. However, due to the line-of-sight(LoS) broadcast nature of UAV transmission, information is susceptible to eavesdropping in RSMA-based UAV networks. Moreover, the superposition of signals at the receiver in such networks becomes complicated. To cope with the challenge, we propose a two-user multi-input single-output(MISO) RSMA-based UAV secure transmission framework in downlink communication networks. In a passive eavesdropping scenario, our goal is to maximize the sum secrecy rate by optimizing the transmit beamforming and deployment location of the UAV-base station(UAV-BS),while considering quality-of-service(QoS) constraints, maximum transmit power, and flight space limitations. To address the non-convexity of the proposed problem, the optimization problem is first decoupled into two subproblems. Then, the successive convex approximation(SCA) method is employed to solve each subproblem using different propositions. In addition, an alternating optimization(AO)-based location RSMA(L-RSMA) beamforming algorithm is developed to implement joint optimization to obtain the suboptimal solution. Numerical results demonstrate that(1) the proposed L-RSMA scheme yields a28.97% higher sum secrecy rate than the baseline L-space division multiple access(SDMA) scheme;(2) the proposed L-RSMA scheme improves the security performance by 42.61% compared to the L-non-orthogonal multiple access(NOMA) scheme.
Predictability is an essential challenge for autonomous vehicles(AVs)’*** neural networks have been widely deployed in the AV’s perception ***,it is still an open question on how to guarantee the perception predicta...
详细信息
Predictability is an essential challenge for autonomous vehicles(AVs)’*** neural networks have been widely deployed in the AV’s perception ***,it is still an open question on how to guarantee the perception predictability for AV because there are millions of deep neural networks(DNNs)model combinations and system configurations when deploying DNNs in *** paper proposes configurable predictability testbed(CPT),a configurable testbed for quantifying the predictability in AV’s perception *** provides flexible configurations of the perception pipeline on data,DNN models,fusion policy,scheduling policies,and predictability *** top of CPT,the researchers can profile and optimize the predictability issue caused by different application and system *** has been open-sourced at:https://***/Torreskai0722/CPT.
The technology of facial expression reconstruction has paved the way for various face-centric applications such as virtual reality (VR) modeling, human-computer interaction, and affective computing. Existing vision-ba...
详细信息
Hydrocephalus is characterized by the accumulation of excess cerebrospinal fluid(CSF)in the cranium due to an imbalance between production and absorption of *** standard treatment involves the implantation of a shunt ...
详细信息
Hydrocephalus is characterized by the accumulation of excess cerebrospinal fluid(CSF)in the cranium due to an imbalance between production and absorption of *** standard treatment involves the implantation of a shunt to divert excess CSF into the peritoneal cavity,but these shunts exhibit high failure rates over *** pursuit of improved reliability and performance,this study proposes a miniaturized valve designed to mimic the natural one-way valve function of the arachnoid granulations and thereby replace the shunts.A benchtop testing setup was employed to characterize the behavior of the fabricated ***,an animal study was conducted to assess the valve’s in vivo *** involved the injection of saline into the lateral ventricle to elevate intracranial pressure(ICP),followed by the drainage of the saline through the valve inserted into the cisterna magna(CM)to reduce *** prototype features a silicone duckbill valve design combined with a silicone tube as an *** benchtop testing,the valve exhibited unidirectional flow with negligible reverse leakage,revealing that critical parameters such as the width of the fluid channel(W)and bill length(L)could be controlled to optimize valve ***,the valve configuration with W=0.8mm and L<0.5mm achieved the lowest cracking pressure(2.22±0.07 mmHg)and outflow resistance(22.00±0.70 mmHg/mL/min)within the low cracking pressure range of conventional *** observations of the in vivo test demonstrated that when untreated states,pressure differences from baseline to peak exceeded 20 mmHg due to the absence of drainage,resulting in sustained pressure ***,upon treating states by removing the clamp,pressure differences from baseline to peak remained below 5 mmHg,indicating effective drainage of injected saline through the *** promising results highlight the potential of the miniaturized duckbill valve as an alternative for ICP management in hydr
暂无评论