The past decades have witnessed a wide application of federated learning in crowd sensing,to handle the numerous data collected by the sensors and provide the users with precise and customized ***,how to protect the p...
详细信息
The past decades have witnessed a wide application of federated learning in crowd sensing,to handle the numerous data collected by the sensors and provide the users with precise and customized ***,how to protect the private information of users in federated learning has become an important research *** with the differential privacy(DP)technique and secure multiparty computation(SMC)strategy,the covert communication mechanism in federated learning is more efficient and energy-saving in training the ma-chine learning *** this paper,we study the covert communication problem for federated learning in crowd sensing Internet-of-Things *** from the previous works about covert communication in federated learning,most of which are considered in a centralized framework and experimental-based,we firstly proposes a centralized covert communication mechanism for federated learning among n learning agents,the time complexity of which is O(log n),approximating to the optimal ***,for the federated learning without parameter server,which is a harder case,we show that solving such a problem is NP-hard and prove the existence of a distributed covert communication mechanism with O(log logΔlog n)times,approximating to the optimal solution.Δis the maximum distance between any pair of learning *** analysis and nu-merical simulations are presented to show the performance of our covert communication *** hope that our covert communication work can shed some light on how to protect the privacy of federated learning in crowd sensing from the view of communications.
Matroid theory has been developed to be a mature branch of mathematics and has extensive applications in combinatorial optimization,algorithm design and so *** the other hand,quantum computing has attracted much atten...
详细信息
Matroid theory has been developed to be a mature branch of mathematics and has extensive applications in combinatorial optimization,algorithm design and so *** the other hand,quantum computing has attracted much attention and has been shown to surpass classical computing on solving some computational ***,crossover studies of the two fields seem to be missing in the *** paper initiates the study of quantum algorithms for matroid property *** is shown that quadratic quantum speedup is possible for the calculation problem of finding the girth or the number of circuits(bases,flats,hyperplanes)of a matroid,and for the decision problem of deciding whether a matroid is uniform or Eulerian,by giving a uniform lower boundΩ■on the query complexity of all these *** the other hand,for the uniform matroid decision problem,an asymptotically optimal quantum algorithm is proposed which achieves the lower bound,and for the girth problem,an almost optimal quantum algorithm is given with query complexityO■.In addition,for the paving matroid decision problem,a lower boundΩ■on the query complexity is obtained,and an O■ quantum algorithm is presented.
Lung cancer is a prevalent and deadly disease worldwide, necessitating accurate and timely detection methods for effective treatment. Deep learning-based approaches have emerged as promising solutions for automated me...
详细信息
Angesichts des dringenden Bedarfs, nachhaltiges Verhalten in der Gesellschaft zu fördern, gewinnen Technologien zur Unterstützung positiver Verhaltensänderungen an Bedeutung. Generation Z, bekannt f...
详细信息
ISBN:
(纸本)9798400709982
Angesichts des dringenden Bedarfs, nachhaltiges Verhalten in der Gesellschaft zu fördern, gewinnen Technologien zur Unterstützung positiver Verhaltensänderungen an Bedeutung. Generation Z, bekannt für ihre technologische Affinität und ihr Umweltbewusstsein, steht im Mittelpunkt unserer Betrachtung. Unser Paper berichtete den Einsatz persuasiver computing-Strategien zur Förderung ökologischer Nachhaltigkeit innerhalb dieser Generation. Im Rahmen einer Lehrveranstaltung zu User Experience für mobile Endgeräte entwickelten Studierende der Generation Z App- und haptische Prototypen anhand von Anforderungen ihrer Altersgenoss:innen. Interviews und Evaluationen zeigten Gründe für Zurückhaltung gegenüber umweltfreundlichen Lebensstilen und lieferten Implikationen für das Design persuasiver Technologien. Die Ergebnisse bieten erste Einblicke in die Gestaltung von Technologien, die Generation Z für Umwelt- und Nachhaltigkeitsthemen mobilisieren können.
Solar flares are one of the strongest outbursts of solar activity,posing a serious threat to Earth’s critical infrastructure,such as communications,navigation,power,and ***,it is essential to accurately predict solar...
详细信息
Solar flares are one of the strongest outbursts of solar activity,posing a serious threat to Earth’s critical infrastructure,such as communications,navigation,power,and ***,it is essential to accurately predict solar flares in order to ensure the safety of human ***,the research focuses on two directions:first,identifying predictors with more physical information and higher prediction accuracy,and second,building flare prediction models that can effectively handle complex observational *** terms of flare observability and predictability,this paper analyses multiple dimensions of solar flare observability and evaluates the potential of observational parameters in *** flare prediction models,the paper focuses on data-driven models and physical models,with an emphasis on the advantages of deep learning techniques in dealing with complex and high-dimensional *** reviewing existing traditional machine learning,deep learning,and fusion methods,the key roles of these techniques in improving prediction accuracy and efficiency are *** prevailing challenges,this study discusses the main challenges currently faced in solar flare prediction,such as the complexity of flare samples,the multimodality of observational data,and the interpretability of *** conclusion summarizes these findings and proposes future research directions and potential technology advancement.
As a result of its aggressive nature and late identification at advanced stages, lung cancer is one of the leading causes of cancer-related deaths. Lung cancer early diagnosis is a serious and difficult challenge that...
详细信息
Online social networks are becoming more and more popular, according to recent trends. The user's primary concern is the secure preservation of their data and privacy. A well-known method for preventing individual...
详细信息
In today’s information age,eavesdropping has been one of the most serious privacy threats in information security,such as exodus spyware(Rudie et al.,2021)and pegasus spyware(Anatolyevich,2020).And the main one of th...
详细信息
In today’s information age,eavesdropping has been one of the most serious privacy threats in information security,such as exodus spyware(Rudie et al.,2021)and pegasus spyware(Anatolyevich,2020).And the main one of them is acoustic *** eavesdropping(George and Sagayarajan,2023)is a technology that uses microphones,sensors,or other devices to collect and process sound signals and convert them into readable *** much research has been done in this area,there is still a lack of comprehensive investigation into the timeliness of this technology,given the continuous advancement of technology and the rapid development of eavesdropping *** this article,we have given a selective overview of acoustic eavesdropping,focusing on the methods of acoustic *** specifically,we divide acoustic eavesdropping into three categories:motion sensor-based acoustic eavesdropping,optical sensor-based acoustic eavesdropping,and RFbased acoustic *** these three representative frameworks,we review the results of acoustic eavesdropping according to the type of equipment they use and the physical principles of ***,we also introduce several important but challenging applications of these acoustic eavesdropping *** addition,we compared the systems that meet the requirements of acoustic eavesdropping in real-world scenarios from multiple perspectives,including whether they are nonintrusive,whether they can achieve unconstrained word eavesdropping,and whether they use machine learning,*** general template of our article is as follows:firstly,we systematically review and classify the existing eavesdropping technologies,elaborate on their working mechanisms,and give corresponding ***,these eavesdropping methods were compared and analyzed,and each method’s effectiveness and technical difficulty were evaluated from multiple *** addition to an assessment of the current state of the field,we dis
Generative adversarial networks(GANs) have drawn enormous attention due to their simple yet efective training mechanism and superior image generation quality. With the ability to generate photorealistic high-resolutio...
详细信息
Generative adversarial networks(GANs) have drawn enormous attention due to their simple yet efective training mechanism and superior image generation quality. With the ability to generate photorealistic high-resolution(e.g., 1024 × 1024) images, recent GAN models have greatly narrowed the gaps between the generated images and the real ones. Therefore, many recent studies show emerging interest to take advantage of pre-trained GAN models by exploiting the well-disentangled latent space and the learned GAN priors. In this study, we briefly review recent progress on leveraging pre-trained large-scale GAN models from three aspects, i.e.,(1) the training of large-scale generative adversarial networks,(2) exploring and understanding the pre-trained GAN models, and(3) leveraging these models for subsequent tasks like image restoration and editing.
With the widespread deployment of indoor positioning systems, an unprecedented scale of indoor trajectories is being produced. By considering the inherent uncertainties and the text information contained in such an in...
详细信息
With the widespread deployment of indoor positioning systems, an unprecedented scale of indoor trajectories is being produced. By considering the inherent uncertainties and the text information contained in such an indoor trajectory, a new definition named Indoor Uncertain Semantic Trajectory is defined in this paper. In this paper, we focus on a new primitive, yet quite essential query named Indoor Uncertain Semantic Trajectory Similarity Join (IUST-Join for short), which is to match all similar pairs of indoor uncertain semantic trajectories from two sets. IUST-Join targets a number of essential indoor applications. With these applications in mind, we provide a purposeful definition of an indoor uncertain semantic trajectory similarity metric named IUS. To process IUST-Join more efficiently, both an inverted index on indoor uncertain semantic trajectories named 3IST and the first acceleration strategy are proposed to form a filtering-and-verification framework, where most invalid pairs of indoor uncertain semantic trajectories are pruned at quite low computation cost. And based on this filtering-and-verification framework, we present a highly-efficient algorithm named Indoor Uncertain Semantic Trajectory Similarity Join Processing (USP for short). In addition, lots of novel and effective acceleration strategies are proposed and embedded in the USP algorithm. Thanks to these techniques, both the time complexity and the time overhead of the USP algorithm are further reduced. The results of extensive experiments demonstrate the superior performance of the proposed work.
暂无评论