This paper addresses the control synthesis of heterogeneous stochastic linear multi-agent systems with realtime allocation of signal temporal logic (STL) specifications. Based on previous work, we decompose specificat...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
This paper addresses the control synthesis of heterogeneous stochastic linear multi-agent systems with realtime allocation of signal temporal logic (STL) specifications. Based on previous work, we decompose specifications into subspecifications on the individual agent level. To leverage the efficiency of task allocation, a heuristic filter evaluates potential task allocation based on STL robustness, and subsequently, an auctioning algorithm determines the definitive allocation of specifications. Finally, a control strategy is synthesized for each agent-specification pair using tube-based model predictive control (MPC), ensuring provable probabilistic satisfaction. We demonstrate the efficacy of the proposed methods using a multi-shuttle scenario that highlights a promising extension to automated driving applications like vehicle routing.
This paper highlights the critical role of Machine Learning (ML) in combating the dynamic nature of cybersecurity threats. Unlike previous studies focusing mainly on static analysis, this work surveys the literature o...
详细信息
Buyer-driven commodity chains are characterized by commercial relationships between buyers and sellers that may obscure accountability due to complexity, thereby undermining sustainability efforts. Conventional method...
详细信息
Buyer-driven commodity chains are characterized by commercial relationships between buyers and sellers that may obscure accountability due to complexity, thereby undermining sustainability efforts. Conventional methods to trace production, including ineffective human-led audits, risk reorienting global corporate governance towards the interests of private business and away from social benefit by limiting the role of objective data in the process. This study examines the relevant features of private, permissioned blockchain towards harnessing the transparency challenge by demonstrating the efficacy of our proposed framework against a simulation of a real-world multi-tier apparel supply chain. The simulation integrates a set of functional and operational requirements achieved through a combination of programmable smart contracts and underlying blockchain architecture. We then evaluate the framework both qualitatively and quantitatively before discussing the limitations of our work.
In this paper, we investigate a heterogeneous network (HetNet) including sub-6GHz base stations (BSs), mmWave BSs, and THz BSs to support enhanced mobile broadband (eMBB) users and ultra-reliable low-latency communica...
详细信息
ISBN:
(数字)9798350303582
ISBN:
(纸本)9798350303599
In this paper, we investigate a heterogeneous network (HetNet) including sub-6GHz base stations (BSs), mmWave BSs, and THz BSs to support enhanced mobile broadband (eMBB) users and ultra-reliable low-latency communication (URLLC) users. We particularly investigate the user-centric network in which the users are allowed to locally and dynamically select and switch among the BSs over time to achieve their highest utility. The two types of users have different Quality of Service (QoS) requirements. Thus, we design two types of utility functions specific for the eMBB users and URLLC users. Then, to model the dynamic selection behavior of the users, we propose to use a fractional game with the power-law memory (PLM). The fractional game allows the eMBB users and URLLC users to incorporate their past strategies into their current selection, thus improving their utility. Simulation results show that the total utility obtained by the users with fractional game is higher than that obtained by the users with classical game. Moreover, the type of URLLC users in the network also affects the total utility obtained by the eMBB users.
Recent advances have heightened the interest in the adversarial transferability of Vision-Language Pre-training (VLP) models. However, most existing strategies constrained by two persistent limitations: suboptimal uti...
详细信息
Recent advances have heightened the interest in the adversarial transferability of Vision-Language Pre-training (VLP) models. However, most existing strategies constrained by two persistent limitations: suboptimal utilization of crossmodal interactive information, and inherent discrepancies across hierarchical textual representation. To address these challenges, we propose the Modality-Specific Interactive Attack (MSIAttack), a novel approach that integrates semantic-level image perturbations with embedding-level text perturbations, all while maintaining minimal inter-modal constraints. In our image attack methodology, we introduce Multi-modal Integrated Gradients (MIG) to guide perturbations toward the core semantics of images, enriched by their associated deeply text information. This technique enhances transferability by capturing consistent features across various models, thereby effectively misleading similar-model perception areas. Additionally, we employ a momentum iteration strategy in conjunction with MIG, which amalgamates current and historical gradients to expedite the perturbation updates. For text attacks, we streamline the perturbation process by operating exclusively at the embedding level. This reduces semantic gaps across hierarchical structures and significantly enhances the generalizability of adversarial text. Moreover, we delve deeper into how semantic perturbations with varying degrees of similarity affect the overall attack effectiveness. Our experimental results on image-text retrieval tasks using the multi-modal datasets Flickr30K and MSCOCO underscore the efficacy of MSI-Attack. Our method achieves superior performance, setting a new state-of-the-art benchmark, all without the need for additional mechanisms. 2005-2012 IEEE.
Federated Learning (FL) has emerged as a promising solution to address challenges in traditional machine learning (ML) regarding data privacy and security. However, training federated models in resource-constrained en...
详细信息
ISBN:
(数字)9798331522742
ISBN:
(纸本)9798331522759
Federated Learning (FL) has emerged as a promising solution to address challenges in traditional machine learning (ML) regarding data privacy and security. However, training federated models in resource-constrained environments, such as IoT devices, presents challenges due to limited computational resources and complex data. This paper proposes data sampling techniques to optimize federated training in such environments, aiming to reduce training time while maintaining model quality. The study evaluates the impact of data sampling on federated model performance and compares it with traditional approaches. The methodology involves implementing random data selection in client datasets within the context of federated learning and conducting experiments across different configurations to analyze results. The findings provide insights for practical application in real-world scenarios with computational constraints.
Internet of Things (IoT) produces massive amounts of data that need to be processed and saved securely. The strong features of Blockchain makes it as a best candidate for storing the data received from IoT sensors. Ho...
Internet of Things (IoT) produces massive amounts of data that need to be processed and saved securely. The strong features of Blockchain makes it as a best candidate for storing the data received from IoT sensors. However, there is a need of concern to take care of the challenges associated with both IoT and blockchain paradigms. Firstly, the enormous amount of data should be effortlessly handled by Blockchain network, without adding much complexity. Secondly, the heterogeneous nature of data that are received from various IoT Sensors should be stored within the blockchain. In this paper, a conceptual framework based on Multimodal Machine Learning (MML) algorithm is proposed as an interface between the IoT sensors and Blockchain networks. The MML algorithm is used to understand the different modalities of the data and provides a way to manage the heterogeneity in that data. The MML algorithms provides an intelligent data processing that allows for real-time data storage in the blockchain networks. The conceptual frame assumes that audio, video, and text are the three types of data as received from IoT. These inputs are processed in simplistic Recurrent neural network RNN that acts as MML and then passed to Blockchain networks for secure storage. Simulation of the above said conceptual framework is performed assuming all other relevant requirements of IoT, MML and Blockchain are taken into account with default parameters and values. The results obtained provide a promising note for future scope in this direction.
Integer programming problems (IPs) are challenging to be solved efficiently due to the NP-hardness, especially for large-scale IPs. To solve this type of IPs, Large neighborhood search (LNS) uses an initial feasible s...
详细信息
This article proposes a technological solution for the control and monitoring of anxiety disorder behavior in vulnerable populations that allows receiving symptomatology data, tests and manifestations in real time dur...
详细信息
Modeling uncertainty has been an active and important topic in the fields of data-driven modeling and machine learning. Uncertainty ubiquitously exists in any data modeling process, making it challenging to identify t...
详细信息
ISBN:
(数字)9798350395440
ISBN:
(纸本)9798350395457
Modeling uncertainty has been an active and important topic in the fields of data-driven modeling and machine learning. Uncertainty ubiquitously exists in any data modeling process, making it challenging to identify the optimal models among many potential candidates. This article proposes an uncertainty-informed method to address the model selection problem. The performance of the proposed method is evaluated on a dataset generated from a complex system model. The experimental results demonstrate the effectiveness of the proposed method and its superiority over conventional approaches. This method has minimal requirements for the length of training data and model types, making it applicable for various modeling frameworks.
暂无评论