Internet of things (IoT) technology is an essential enabler to realize ubiquitous connections and pervasive intelli-gence for the future wireless communication system. The energy self-sustainability based on the wirel...
详细信息
ISBN:
(纸本)9781728181059
Internet of things (IoT) technology is an essential enabler to realize ubiquitous connections and pervasive intelli-gence for the future wireless communication system. The energy self-sustainability based on the wireless power transfer technique and the coexistence with heterogeneous networks will become two predominant attributes of IoT networks. In this paper we consider the system design in a context of coexistence of a wireless powered sensor network and a cellular system, both of which share common spectrum bandwidth and are assisted by intelligent reflecting surface (IRS). Specifically, the wireless sensors exploit the harvested energy from the cellular base station (BS) to transfer information to a data sink. We aim to design a cooperation scheme via jointly optimizing the time allocation of channel use, collab.rative beamforming across networks and IRS phase-shifting control to improve the sensing network's throughput while guaranteeing the cellular users' quality of service. This design problem leads to a highly nonconvex and difficult mathematical optimization problem. Via utilizing the penalty-duality-decomposition (PDD) and successive convex approximation (SCA) methods, we have managed to develop an alternative optimization solution. Nu-merical results verify the effectiveness of our algorithm and demonstrate the benefits that come from the cooperative network design.
In this article, we study the formation problem for a group of mobile agents in a plane, in which the agents are required to maintain a distribution pattern, as well as to rotate around or remain static relative to a ...
详细信息
Electroencephalogram (EEG) is a precise reflection of the brain activities and has been widely studied in clinical medicine, neuroscience, brain interface, etc. Intelligent prediction of the EEG’s evolution accuratel...
详细信息
ISBN:
(纸本)9781665429825
Electroencephalogram (EEG) is a precise reflection of the brain activities and has been widely studied in clinical medicine, neuroscience, brain interface, etc. Intelligent prediction of the EEG’s evolution accurately plays important roles in several application areas, such as epilepsy seizure forecasting and neonatal brain monitoring. Nevertheless, when the prediction service is deployed as a business service on the Cloud and open for public usage, there are several problems that need to be resolved: (i) how to design a computation platform to process the high-throughput multi-source EEG data, which arrives sequentially and increases rapidly when the services are rapidly promoted, namely tackling the ‘high-throughput computing’ problem; (ii) how to develop a deep learning model to capture the complex EEG distribution as well as the anomaly patterns that could evolve dynamically, namely tackling the ‘concept drift’ problem for non-stationary EEG signals. To tackle these challenges, we propose an Evolutive Convolutional Neural Network (ECNN) and the corresponding supercomputer supported distributed computation system. The ECNN model can dynamically reweighting the sub-structure of the model from data streams in an online learning fashion, by which the capacity scalab.lity and sustainability are introduced into the model. As far as we know, it is the first work that introduce supercomputer supported online deep learning techniques into EEG prediction research.
This paper investigates distributed computing and cooperative control of connected and automated vehicles (CAVs) in ramp merging scenario under transportation cyber-physical system. Firstly, a centralized cooperative ...
详细信息
With the rapid progress of generative models, the current challenge in face forgery detection is how to effectively detect realistic manipulated faces from different unseen domains. Though previous studies show that p...
详细信息
In recent years, data-driven approaches have become popular for software vulnerability assessment (SVA). However, these approaches need a large amount of lab.led SVA data to construct effective SVA models. This proces...
详细信息
Collab.rative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collab.rative Filtering. Following the convention of RS, existin...
详细信息
In this paper, we propose an effective and compact image-based pose representation named Poseimage Pyramid, which encodes the spatial and temporal information of human pose or hand pose as an image pyramid. Poseimage ...
详细信息
ISBN:
(数字)9781728130798
ISBN:
(纸本)9781728130804
In this paper, we propose an effective and compact image-based pose representation named Poseimage Pyramid, which encodes the spatial and temporal information of human pose or hand pose as an image pyramid. Poseimage is constructed by the normalized distance between pairwise joints, and it has the advantage of its invariant to similarity transformations. With our Poseimage representation we can design the pose based action recognition or hand gesture recognition model using existing image or video classification models. In order to adapt to different actions with a variety of movement speed, we design Poseimage Pyramid to encode the multi-scale temporal information of human pose or hand pose. Experiments demonstrate that our pose representation is effective, and we achieve state-of-the-art performance on the action recognition datasets and the hand gesture recognition datasets. Our pose presentation is also complementary to video and optical flow streams in the seminal action recognition network I3D, and we achieve the state-of-the-art performance on the JHMDB, HMDB and UCF101 datasets by integrating our pose representation with I3D.
It is necessary to improve the performance of some special classes or to particularly protect them from attacks in adversarial learning. This paper proposes a framework combining cost-sensitive classification and adve...
详细信息
One major problem in black-box adversarial attacks is the high query complexity in the hard-lab.l attack setting, where only the top-1 predicted lab.l is availab.e. In this paper, we propose a novel geometric-based ap...
ISBN:
(纸本)9781713845393
One major problem in black-box adversarial attacks is the high query complexity in the hard-lab.l attack setting, where only the top-1 predicted lab.l is availab.e. In this paper, we propose a novel geometric-based approach called Tangent Attack (TA), which identifies an optimal tangent point of a virtual hemisphere located on the decision boundary to reduce the distortion of the attack. Assuming the decision boundary is locally flat, we theoretically prove that the minimum ℓ2 distortion can be obtained by reaching the decision boundary along the tangent line passing through such tangent point in each iteration. To improve the robustness of our method, we further propose a generalized method which replaces the hemisphere with a semi-ellipsoid to adapt to curved decision boundaries. Our approach is free of pre-training. Extensive experiments conducted on the ImageNet and CIFAR-10 datasets demonstrate that our approach can consume only a small number of queries to achieve the low-magnitude distortion.
暂无评论