This paper presents a novel approach to compute DCT-I, DCT-III, and DCT-IV. By using a modular mapping and truncating, DCTs are approximated by linear sums of discrete moments computed fast only through additions. Thi...
详细信息
Reweighting adversarial examples during training plays an essential role in improving the robustness of neural networks,which lies in the fact that examples closer to the decision boundaries are much more vulnerable t...
详细信息
Reweighting adversarial examples during training plays an essential role in improving the robustness of neural networks,which lies in the fact that examples closer to the decision boundaries are much more vulnerable to being attacked and should be given larger *** probability margin(PM)method is a promising approach to continuously and path-independently mea-suring such closeness between the example and decision ***,the performance of PM is limited due to the fact that PM fails to effectively distinguish the examples having only one misclassified category and the ones with multiple misclassified categories,where the latter is closer to multi-classification decision boundaries and is supported to be more critical in our *** tackle this problem,this paper proposed an improved PM criterion,called confused-label-based PM(CL-PM),to measure the closeness mentioned above and reweight adversarial examples during ***-cally,a confused label(CL)is defined as the label whose prediction probability is greater than that of the ground truth label given a specific adversarial *** of considering the discrepancy between the probability of the true label and the probability of the most misclassified label as the PM method does,we evaluate the closeness by accumulating the probability differences of all the CLs and ground truth ***-PM shares a negative correlation with data vulnerability:data with larger/smaller CL-PM is safer/riskier and should have a smaller/larger *** demonstrated that CL-PM is more reliable in indicating the closeness regarding multiple misclassified categories,and reweighting adversarial training based on CL-PM outperformed state-of-the-art counterparts.
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false d...
详细信息
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control *** quantified false data injection attacks,this paper establishes an effective defense framework from the energy conversion ***,we design an energy controller to dynamically adjust the system energy changes caused by unknown *** designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping ***,with the disturbance attenuation technique,the burden of control system design is simplified because there is no need to design an attack *** addition,this secure control method is simple to implement because it avoids complicated mathematical *** effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor.
The multi-compartment electric vehicle routing problem(EVRP)with soft time window and multiple charging types(MCEVRP-STW&MCT)is studied,in which electric multi-compartment vehicles that are environmentally friendl...
详细信息
The multi-compartment electric vehicle routing problem(EVRP)with soft time window and multiple charging types(MCEVRP-STW&MCT)is studied,in which electric multi-compartment vehicles that are environmentally friendly but need to be recharged in course of transport process,are employed.A mathematical model for this optimization problem is established with the objective of minimizing the function composed of vehicle cost,distribution cost,time window penalty cost and charging service *** solve the problem,an estimation of the distribution algorithm based on Lévy flight(EDA-LF)is proposed to perform a local search at each iteration to prevent the algorithm from falling into local *** results demonstrate that the EDA-LF algorithm can find better solutions and has stronger robustness than the basic EDA *** addition,when comparing with existing algorithms,the result shows that the EDA-LF can often get better solutions in a relatively short time when solving medium and large-scale *** experiments show that using electric multi-compartment vehicles to deliver incompatible products can produce better results than using traditional fuel vehicles.
Transfer learning(TL)utilizes data or knowledge from one or more source domains to facilitate learning in a target *** is particularly useful when the target domain has very few or no labeled data,due to annotation ex...
详细信息
Transfer learning(TL)utilizes data or knowledge from one or more source domains to facilitate learning in a target *** is particularly useful when the target domain has very few or no labeled data,due to annotation expense,privacy concerns,***,the effectiveness of TL is not always *** transfer(NT),i.e.,leveraging source domain data/knowledge undesirably reduces learning performance in the target domain,and has been a long-standing and challenging problem in *** approaches have been proposed in the literature to address this ***,there does not exist a systematic *** paper fills this gap,by first introducing the definition of NT and its causes,and reviewing over fifty representative approaches for overcoming NT,which fall into three categories:domain similarity estimation,safe transfer,and NT *** areas,including computer vision,bioinformatics,natural language processing,recommender systems,and robotics,that use NT mitigation strategies to facilitate positive transfers,are also ***,we give guidelines on NT task construction and baseline algorithms,benchmark existing TL and NT mitigation approaches on three NT-specific datasets,and point out challenges and future research *** ensure reproducibility,our code is publicized at https://***/chamwen/NT-Benchmark.
The work presented in this paper mainly focuses on designing a monolithic current-mode boost DC-DC converter with integrated 22V DMOS FET power switch and control circuits. The boost converter operating at fixed frequ...
详细信息
The work presented in this paper mainly focuses on designing a monolithic current-mode boost DC-DC converter with integrated 22V DMOS FET power switch and control circuits. The boost converter operating at fixed frequency of 1.6MHz has been fabricated with a 1.5μm Bipolar-CMOS-DMOS (BCD) process. The chip with features of wide input voltage range (2.7V to 14V), high efficiency over large load range (1mA to 500mA), low shutdown current, fast transient response and low power, was designed for mobile power management applications. Besides issues such as technology choice, power switch optimization and ramp compensation, the paper also copes with the monolithic switching noise in switching power IC circuits.
This article studies the consensus problem for multiagent systems with transmission constraints. A novel model of multiagent systems is proposed where the information transmissions between agents are disturbed by irre...
详细信息
The manufacturing sector is envisioned to be heavily influenced by artificial-intelligence-based technologies with the extraordinary increases in computational power and data volumes. A central challenge in the manufa...
详细信息
The manufacturing sector is envisioned to be heavily influenced by artificial-intelligence-based technologies with the extraordinary increases in computational power and data volumes. A central challenge in the manufacturing sector lies in the requirement of a general framework to ensure satisfied diagnosis and monitoring performances in different manufacturing applications. Here, we propose a general data-driven,end-to-end framework for the monitoring of manufacturing systems. This framework, derived from deep-learning techniques, evaluates fused sensory measurements to detect and even predict faults and wearing conditions. This work exploits the predictive power of deep learning to automatically extract hidden degradation features from noisy, time-course data. We have experimented the proposed framework on 10 representative data sets drawn from a wide variety of manufacturing applications. Results reveal that the framework performs well in examined benchmark applications and can be applied in diverse contexts,indicating its potential use as a critical cornerstone in smart manufacturing.
The operation condition of aluminum electrolytic cells is critical to the stability of the aluminum electrolysis process. Under the tough working environment, there will be many abnormal states in the cells, detriment...
详细信息
This paper performs research on adaptation analysis based on large amount of multi-source remote sensing *** view of different demands from different task background,the research is firstly focused on how to analyze t...
详细信息
ISBN:
(纸本)9781467383196
This paper performs research on adaptation analysis based on large amount of multi-source remote sensing *** view of different demands from different task background,the research is firstly focused on how to analyze the data in computer *** achieve this,the feature parameters of target areas are extracted from different target area geographic *** combination of ORACLE database engine,data mining technology is used to carry out the target area adaptation assessment,and extract corresponding adaptation *** test the trained adaptation criteria on multi-source geographic information data of different target *** results show that the resulting criterion has certain coincidence rate and robustness.
暂无评论