In this paper, we investigate the problem of securing a system against actuator attacks. Specifically, we employ an unpredictability-based defense algorithm according to the principles of Moving Target Defense, while ...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
In this paper, we investigate the problem of securing a system against actuator attacks. Specifically, we employ an unpredictability-based defense algorithm according to the principles of Moving Target Defense, while explicitly considering the worst-case attack that can be launched into the system. Consequently, we allow the system to alternate between different actuating modes, but also between optimal and robust control schemes. Via game-theoretic methods, we derive mixed strategies dictating the probabilities of utilizing different controllers for a given mode of operation, whereas an entropy-augmented optimization problem gives the probabilities of using these different modes. Finally, the overall stability of the system is analyzed, and simulation results showcase the efficacy of our proposed method.
As Large Language Models (LLMs) become increasingly prevalent in various domains, their ability to process inputs of any length and maintain a degree of memory becomes essential. However, the one-off input of overly l...
Fault localization and diagnosis of Integrated Circuits (ICs) are essential for maintaining dependability in contemporary electronic systems. This research presents a sophisticated system utilizing Data Augmentation, ...
详细信息
While the emerging Augmented Reality (AR) technique allows a lot of new application opportunities, from education and communication to gaming, current augmented apps often have complaints about their usability and/or ...
详细信息
ISBN:
(纸本)9781450394758
While the emerging Augmented Reality (AR) technique allows a lot of new application opportunities, from education and communication to gaming, current augmented apps often have complaints about their usability and/or user experience due to placement errors of virtual objects. Therefore, identifying noticeable placement errors is an important goal in the testing of AR apps. However, placement errors can only be perceived by human beings and may need to be confirmed by multiple users, making automatic testing very challenging. In this paper, we propose PredART, a novel approach to predict human ratings of virtual object placements that can be used as test oracles in automated AR testing. PredART is based on automatic screenshot sampling, crowd sourcing, and a hybrid neural network for image regression. The evaluation on a test set of 480 screenshots shows that our approach can achieve an accuracy of 85.0% and a mean absolute error, mean squared error, and root mean squared error of 0.047, 0.008, and 0.091, respectively.
The integration of Internet-of-Things, artificial intelligence, and other emerging technologies is driving the transition from traditional electricity consumers to energy prosumers in smart grids. To encourage flexibl...
详细信息
Indoor positioning is a significant and intriguing topic in navigation systems that present numerous use cases for investigation. Researchers are exploring technologies capable of providing accurate locations in indoo...
Indoor positioning is a significant and intriguing topic in navigation systems that present numerous use cases for investigation. Researchers are exploring technologies capable of providing accurate locations in indoor spaces where GNSS positioning systems are ineffective. In the numerous solutions available for indoor location services, Ultra-wideband (UWB) technology was chosen for its ability to provide high-precision positioning information for multiple points in real-time. This paper presents a UWB indoor positioning system that utilizes time of flight (TOF) algorithm. At times, time difference of arrival (TDOA) algorithms compute range measurements, this facilitates the trans-receiver (TAG) plane position algorithm's location determination. UWB technology was chosen because it is the latest technology available on Android 12 and further also offers high accuracy, resistance to interference and minimal signal reflection from walls. UltraWide Band(UWB) localization encounters various obstacles, such as multipath distortions, additional signal delays, time discrepancies in clocks, signal interference, and the computational resources necessary to determine the user's location.
Training neural networks is a fundamental problem in theoretical machine learning. Second-order methods are rarely used in practice due to their high computational cost, even they converge much faster than first-order...
详细信息
ISBN:
(数字)9798350362480
ISBN:
(纸本)9798350362497
Training neural networks is a fundamental problem in theoretical machine learning. Second-order methods are rarely used in practice due to their high computational cost, even they converge much faster than first-order methods. The state-of-the-art result for the second-order method to train an over-parameterized neural network can run in O(log(1/ϵ)) iterations and each iteration has O(mnd + n 3 ) running time, where n represent the number of data points, d is the dimension of the feature space of each data and m is the width of the neural network [Brand, Peng, Song and Weinstein ITCS 2021]. In this work, we further improve the convergence rate and the running time for each iteration to O(loglog(1/ϵ)) and O(mdτ 2 ) respectively, where m = Ω(n 4 ) and τ is the treewidth of the data matrix and usually very small. Our algorithm has a quadratic convergence rate, so it can be regarded as a truly second-order algorithm. To the best of our knowledge, our algorithm is the first to achieve a quadratic convergence rate for neural network training, with a per-iteration running time of O(mdτ 2 ).
The article presents the concept of a hybrid network topology in the enterprises with the use of a solar power plant and energy storage as well as a drive frequency converter for charging of transportation battery of ...
详细信息
The Knowledge Graph (KGs) have profoundly impacted many research fields. However, there is a problem of low data integrity in KGs. The binary-relational knowledge graph is more common in KGs but is limited by less inf...
详细信息
Price and quality level of products are two important decisions of any business. This paper provides equilibrium solutions for these decisions of two players for a cybersecurity ecosystem, including a solution provide...
详细信息
暂无评论