The widespread availability of GPS has opened up a whole new market that provides a plethora of location-based ***-based social networks have become very popular as they provide end users like us with several such ser...
详细信息
The widespread availability of GPS has opened up a whole new market that provides a plethora of location-based ***-based social networks have become very popular as they provide end users like us with several such services utilizing GPS through our ***,when users utilize these services,they inevitably expose personal information such as their ID and sensitive location to the *** to untrustworthy servers and malicious attackers with colossal background knowledge,users'personal information is at risk on these ***,many privacy-preserving solutions for protecting trajectories have significantly decreased utility after *** have come up with a new trajectory privacy protection solution that contraposes the area of interest for ***,Staying Points Detection Method based on Temporal-Spatial Restrictions(SPDM-TSR)is an interest area mining method based on temporal-spatial restrictions,which can clearly distinguish between staying and moving ***,our privacy protection mechanism focuses on the user's areas of interest rather than the entire ***,our proposed mechanism does not rely on third-party service providers and the attackers'background knowledge *** test our models on real datasets,and the results indicate that our proposed algorithm can provide a high standard privacy guarantee as well as data availability.
Cryogenic ion traps offer substantial advantages over their room-temperature counterparts,particularly in terms of stable ion confinement and ***,this technological advancement has introduced a significant challenge,n...
详细信息
Cryogenic ion traps offer substantial advantages over their room-temperature counterparts,particularly in terms of stable ion confinement and ***,this technological advancement has introduced a significant challenge,namely the generation of additional vibrational *** noise is pronounced during the compression and expansion phases of the Gifford–McMahon cycle refrigerator and stems from the mechanical operation of the cold *** residual vibrational noise can modulate the Rabi oscillation frequency,thereby compromising the fidelity of the quantum logic *** this study,we quantitatively assess the impact of residual vibrational noise and introduce an innovative strategy for its *** strategy was designed to reduce superimposed potential fluctuations within a cryogenic surface electrode ion *** measured residual vibrational noise was used for real-time feedback *** the inverse determination of the compensating potential for a stable superimposed trapping potential is an inherently ill-posed problem considering known measurement noise *** applying quadratic programming,we numerically calculated the optimal time series for the compensation *** ensemble of these compensation voltages was applied in real time to the static compensation *** this method is in the theoretical stage,we believe that it can effectively suppress the translation induced by vibrational noise and foster the creation of a stable superimposed harmonic *** deployment of this technique is expected to substantially improve the accuracy of quantum operations,thereby fueling the evolution of quantum technologies.
In the wake of rapid advancements in artificial intelligence(AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB(AI×DB) promises a new generation of data systems,...
详细信息
In the wake of rapid advancements in artificial intelligence(AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB(AI×DB) promises a new generation of data systems, which will relieve the burden on end-users across all industry sectors by featuring AI-enhanced functionalities, such as personalized and automated in-database AI-powered analytics, and selfdriving capabilities for improved system performance. In this paper, we explore the evolution of data systems with a focus on deepening the fusion of AI and DB. We present NeurDB, an AI-powered autonomous data system designed to fully embrace AI design in each major system component and provide in-database AI-powered analytics. We outline the conceptual and architectural overview of NeurDB, discuss its design choices and key components, and report its current development and future plan.
The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and ***,traditional DL methods compromise client privacy by collecting...
详细信息
The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and ***,traditional DL methods compromise client privacy by collecting sensitive data,underscoring the necessity for privacy-preserving solutions like Federated Learning(FL).FL effectively addresses escalating privacy concerns by facilitating collaborative model training without necessitating the sharing of raw *** that FL clients autonomously manage training data,encouraging client engagement is pivotal for successful model *** overcome challenges like unreliable communication and budget constraints,we present ENTIRE,a contract-based dynamic participation incentive mechanism for *** ensures impartial model training by tailoring participation levels and payments to accommodate diverse client *** approach involves several key ***,we examine how random client participation impacts FL convergence in non-convex scenarios,establishing the correlation between client participation levels and model ***,we reframe model performance optimization as an optimal contract design challenge to guide the distribution of rewards among clients with varying participation *** balancing budget considerations with model effectiveness,we craft optimal contracts for different budgetary constraints,prompting clients to disclose their participation preferences and select suitable contracts for contributing to model ***,we conduct a comprehensive experimental evaluation of ENTIRE using three real *** results demonstrate a significant 12.9%enhancement in model performance,validating its adherence to anticipated economic properties.
Fusion-based hyperspectral image super-resolution has recently attracted increasing interest due to its superior reconstruction quality. This approach enhances the spatial resolution of low-resolution hyperspectral im...
详细信息
In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of *** studies focus on optimizing base station deployment under t...
详细信息
In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of *** studies focus on optimizing base station deployment under the assumption of static obstacles,aiming to maximize the perception coverage of wireless RF(Radio Frequency)signals and reduce positioning blind ***,in practical security systems,obstacles are subject to change,necessitating the consideration of base station deployment in dynamic ***,research in this area still needs to be *** paper proposes a Dynamic Indoor Environment Beacon Deployment Algorithm(DIE-BDA)to address this *** algorithm considers the dynamic alterations in obstacle locations within the designated *** determines the requisite number of base stations,the requisite time,and the area’s practical and overall signal coverage *** experimental results demonstrate that the algorithm can calculate the deployment strategy in 0.12 s following a change in obstacle *** results show that the algorithm in this paper requires 0.12 s to compute the deployment strategy after the positions of obstacles *** 13 base stations,it achieves an effective coverage rate of 93.5%and an overall coverage rate of 97.75%.The algorithm can rapidly compute a revised deployment strategy in response to changes in obstacle positions within security systems,thereby ensuring the efficacy of signal coverage.
A Multiscale-Motion Embedding Pseudo-3D (MME-P3D) gesture recognition algorithm has been proposed to tackle the issues of excessive parameters and high computational complexity encountered by existing gesture recognit...
详细信息
The Li metal battery with ultrahigh-nickel cathode(LiNi_(x)M_(1-x)O_(2),M=Mn,Co,and x≥0.9)under high-voltage is regarded as one of the most promising approaches to fulfill the ambitious target of 400 Wh/***,the pract...
详细信息
The Li metal battery with ultrahigh-nickel cathode(LiNi_(x)M_(1-x)O_(2),M=Mn,Co,and x≥0.9)under high-voltage is regarded as one of the most promising approaches to fulfill the ambitious target of 400 Wh/***,the practical application is impeded by the instability of electrode/electrolyte interface and Ni-rich cathode *** we proposed an electron-defect electrolyte additive trimethyl borate(TMB)which is paired with the commercial carbonate electrolyte to construct highly conductive fluorine-and boron-rich cathode electrolyte interface(CEI)on LiNi_(0.9)Co_(0.05)Mn_(0.05)O_(2)(NCM90)surface and solid electrolyte interphase(SEI)on lithium metal *** modified CEI effectively mitigates the structural transformation from layered to disordered rock-salt phase,and consequently alleviate the dissolution of transition metal ions(TMs)and its“cross-talk”effect,while the enhanced SEI enables stable lithium plating/striping and thus demonstrated good compatibility between electrolyte and lithium metal *** a result,the common electrolyte with 1 wt%TMB enables 4.7 V NCM90/Li cell cycle stably over 100 cycles with 70%capacity *** work highlights the significance of the electron-defect boron compounds for designing desirable interfacial chemistries to achieve high performance NCM90/Li battery under high voltage operation.
Since different kinds of face forgeries leave similar forgery traces in videos,learning the common features from different kinds of forged faces would achieve promising generalization ability of forgery ***,to accurat...
详细信息
Since different kinds of face forgeries leave similar forgery traces in videos,learning the common features from different kinds of forged faces would achieve promising generalization ability of forgery ***,to accurately detect known forgeries while ensuring high generalization ability of detecting unknown forgeries,we propose an intra-inter network(IIN)for face forgery detection(FFD)in videos with continual *** proposed IIN mainly consists of three modules,i.e.,intra-module,inter-module,and forged trace masking module(FTMM).Specifically,the intra-module is trained for each kind of face forgeries by supervised learning to extract special features,while the inter-module is trained by self-supervised learning to extract the common *** a result,the common and special features of the different forgeries are decoupled by the two feature learning modules,and then the decoupled common features can be utlized to achieve high generalization ability for ***,the FTMM is deployed for contrastive learning to further improve detection *** experimental results on FaceForensic++dataset demonstrate that the proposed IIN outperforms the state-of-the-arts in ***,the generalization ability of the IIN verified on DFDC and Celeb-DF datasets demonstrates that the proposed IIN significantly improves the generalization ability for FFD.
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of *** connection between industrial control networks and the external internet is becoming increa...
详细信息
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of *** connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security *** paper proposes a model for the industrial control *** includes a malware containment strategy that integrates intrusion detection,quarantine,and ***,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment *** addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction ***,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is *** otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control *** earlier the immunization of key nodes,the *** the time exceeds the threshold,immunizing key nodes is almost *** analysis provides a better way to contain the malware in the industrial control network.
暂无评论