Supply chain management and Hyperledger are two interconnected domains. They leverage blockchain technology to enhance efficiency, transparency, and security in supply chain operations. Together, they provide a decent...
详细信息
The pursuit of enhanced interactive visual experiences has created growing interest in 360-degree video streaming. However, transmitting such content requires significant bandwidth compared to conventional planar vide...
详细信息
A high gain, circularly polarized array antenna is proposed with low profile and compact size using T-shaped top loading, t-matching, and a reflector. Composed of 4 individual elements, the array has a −3-dB impedance...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
The need for renewable energy access has led to the use of variable input converter approaches because renewable energy sources often generate electricity in an unpredictable manner. A high-performance multi-input boo...
详细信息
The need for renewable energy access has led to the use of variable input converter approaches because renewable energy sources often generate electricity in an unpredictable manner. A high-performance multi-input boost converter is developed to provide the necessary output voltage and power while accommodating variations in input sources. This converter is specifically designed for the efficient usage of renewable energy. The proposed architecture integrates three separate unidirectional input power sources: photovoltaics, fuel cells, and storage system batteries. The architecture has five switches, and the implementation of each switch in the converter is achieved by applying the calculated duty ratios in various operating states. The closed-loop response of the converter with a proportional-integral (PI) controller-based switching system is examined by analyzing the Matlab-Simulink model utilizing a proportional-integral derivative (PID) tuner. The controller can deliver the desired output voltage of 400 V and an average power of 2 kW while exhibiting low switching transient effects. Therefore, the proposed multi-input interleaved boost converter demonstrates robust results for real-time applications by effectively harnessing renewable power sources.
Human Activity Recognition (HAR) has become a significant area of study in the fields of health, human behavior analysis, the Internet of Things, and human–machine interaction in recent years. Smartphones are a popul...
详细信息
Image retargeting aims to alter the size of the image with attention to the contents. One of the main obstacles to training deep learning models for image retargeting is the need for a vast labeled dataset. Labeled da...
详细信息
The article wants to draw attention to the potential occurrence of Braess-like phenomena in the context of cascade failures, where certain networked system configurations, which might appear more resilient than others...
详细信息
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data i...
详细信息
Graph alignment refers to the task of finding the vertex correspondence between two correlated graphs of n vertices. Extensive study has been done on polynomial time algorithms for the graph alignment problem under th...
详细信息
暂无评论