This paper concerns the integration of demand balance control and traffic flow coordination control in a hierarchical framework for complex urban traffic networks. At the first level, a complex traffic network is firs...
详细信息
Participating in market trading is an essential step to promote the sustainable development of renewable energy. To properly deal with the uncertainty of renewable energy, it is important to establish a reasonable bid...
详细信息
This paper proposes a security defense scheme for industrial wireless sensor networks that utilizes the uniqueness and stability of clock slope characteristics to address the security defense challenges faced by indus...
详细信息
As the chemical processes become more and more complicated, it is crucial but also difficult to detect and diagnose faults in the system than ever. With the development of machine learning algorithms and cloud computi...
详细信息
Personal identification has been used more and more widely in information society. Iris recognition, as one of numerous identification methods, has already been applied in many situations, because the iris patterns ha...
详细信息
This paper is concerned with the path following guidance problem at kinematic level for a maritime autonomous surface ship (MASS) sailing in a constrained water with static and dynamic obstacles. A safety-critical lin...
详细信息
Due to dramatically increasing information published in social networks,privacy issues have given rise to public *** the presence of differential privacy provides privacy protection with theoretical foundations,the tr...
详细信息
Due to dramatically increasing information published in social networks,privacy issues have given rise to public *** the presence of differential privacy provides privacy protection with theoretical foundations,the trade-off between privacy and data utility still demands further ***,most existing studies do not consider the quantitative impact of the adversary when measuring data *** this paper,we firstly propose a personalized differential privacy method based on social ***,we analyze the maximum data utility when users and adversaries are blind to the strategy sets of each *** formalize all the payoff functions in the differential privacy sense,which is followed by the establishment of a static Bayesian *** trade-off is calculated by deriving the Bayesian Nash equilibrium with a modified reinforcement learning *** proposed method achieves fast convergence by reducing the cardinality from n to *** addition,the in-place trade-off can maximize the user's data utility if the action sets of the user and the adversary are public while the strategy sets are *** extensive experiments on the real-world dataset prove the proposed model is effective and feasible.
UAVs are used widely in all works and life, and their operation forms and application scenarios are more complex than ever before. In order to deal with various disturbances faced by operational UAVs in application sc...
详细信息
The idea of local learning, i.e., classifying a particular example based on its neighbors, has been successfully applied to many semi-supervised and clustering problems recently. However, the local learning methods de...
详细信息
Object detection has always played a major role in the field of computer vision. With the development of faster region-based convolutional neural network (faster-RCNN), single shot multi-box detector (SSD), You Only L...
详细信息
暂无评论