This article introduces a novel model for low-quality pedestrian trajectory prediction, the social nonstationary transformers (NSTransformers), that merges the strengths of NSTransformers and spatiotemporal graph tran...
详细信息
Emotions are a vital semantic part of human correspondence. Emotions are significant for human correspondence as well as basic for human–computer cooperation. Viable correspondence between people is possibly achieved...
详细信息
Active power decoupling (APD) converter is a power dense and reliable solution in dc-ac power conversion systems to balance the fluctuating ac-side power and constant dc-side power. In boost type APD converter, filter...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation.
A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over *** plays a key role in modern industry since it connects physical an...
详细信息
A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over *** plays a key role in modern industry since it connects physical and cyber *** order to meet ever-changing industrial requirements,its structures and functions are constantly ***,new security issues have arisen.A ubiquitous problem is the fact that cyber attacks can cause significant damage to industrial systems,and thus has gained increasing attention from researchers and *** paper presents a survey of state-of-the-art results of cyber attacks on cyber physical ***,as typical system models are employed to study these systems,time-driven and event-driven systems are ***,recent advances on three types of attacks,i.e.,those on availability,integrity,and confidentiality are *** particular,the detailed studies on availability and integrity attacks are introduced from the perspective of attackers and ***,both attack and defense strategies are discussed based on different system *** challenges and open issues are indicated to guide future research and inspire the further exploration of this increasingly important area.
Active distribution network(ADN),as a typically cyber-physical system,develops with the evolution of Internet of Things(IoTs),which makes the network vulnerable to cybersecurity *** this paper,the eavesdropping attack...
详细信息
Active distribution network(ADN),as a typically cyber-physical system,develops with the evolution of Internet of Things(IoTs),which makes the network vulnerable to cybersecurity *** this paper,the eavesdropping attacks that lead to privacy breaches are addressed for the IoT-enabled ADN.A privacy-preserving energy management system(EMS)is proposed and empowered by secure data exchange protocols based on the homomorphic *** the information transmission among distributed generators and load customers in the EMS,private information including power usage and electricity bidding price can be effectively protected against eavesdropping *** correctness of the final solutions,e.g.,optimal market clearing price and unified power utilization ratio,can be deterministically *** simulation results demonstrate the effectiveness and the computational efficiency of the proposed homomorphically encrypted EMS.
Evolutionary computation is a rapidly evolving field and the related algorithms have been successfully used to solve various real-world optimization *** past decade has also witnessed their fast progress to solve a cl...
详细信息
Evolutionary computation is a rapidly evolving field and the related algorithms have been successfully used to solve various real-world optimization *** past decade has also witnessed their fast progress to solve a class of challenging optimization problems called high-dimensional expensive problems(HEPs).The evaluation of their objective fitness requires expensive resource due to their use of time-consuming physical experiments or computer ***,it is hard to traverse the huge search space within reasonable resource as problem dimension *** evolutionary algorithms(EAs)tend to fail to solve HEPs competently because they need to conduct many such expensive evaluations before achieving satisfactory *** reduce such evaluations,many novel surrogate-assisted algorithms emerge to cope with HEPs in recent *** there lacks a thorough review of the state of the art in this specific and important *** paper provides a comprehensive survey of these evolutionary algorithms for *** start with a brief introduction to the research status and the basic concepts of ***,we present surrogate-assisted evolutionary algorithms for HEPs from four main *** also give comparative results of some representative algorithms and application ***,we indicate open challenges and several promising directions to advance the progress in evolutionary optimization algorithms for HEPs.
Fault isolation in dynamical systems is a challenging task due to modeling uncertainty and measurement noise,interactive effects of multiple faults and fault *** paper proposes a unified approach for isolation of mult...
详细信息
Fault isolation in dynamical systems is a challenging task due to modeling uncertainty and measurement noise,interactive effects of multiple faults and fault *** paper proposes a unified approach for isolation of multiple actuator or sensor faults in a class of nonlinear uncertain dynamical *** and sensor fault isolation are accomplished in two independent modules,that monitor the system and are able to isolate the potential faulty actuator(s)or sensor(s).For the sensor fault isolation(SFI)case,a module is designed which monitors the system and utilizes an adaptive isolation threshold on the output residuals computed via a nonlinear estimation scheme that allows the isolation of single/multiple faulty sensor(s).For the actuator fault isolation(AFI)case,a second module is designed,which utilizes a learning-based scheme for adaptive approximation of faulty actuator(s)and,based on a reasoning decision logic and suitably designed AFI thresholds,the faulty actuator(s)set can be *** effectiveness of the proposed fault isolation approach developed in this paper is demonstrated through a simulation example.
Deep neural networks (DNNs) have made significant strides in tackling challenging tasks in wireless systems, especially when an accurate wireless model is not available. However, when available data is limited, tradit...
详细信息
From AI-assisted art creation to large language model (LLM)-powered ChatGPT, AI-generated contents and services are becoming a transforming force. It calls for the telecom industry to embrace the prospects of AIGC ser...
详细信息
暂无评论