Thanks to its ubiquity,using radio frequency (RF) signals for sensing has found widespread *** traditional integrated sensing and communication systems,such as joint radar-communication systems,common sensing tasks in...
Thanks to its ubiquity,using radio frequency (RF) signals for sensing has found widespread *** traditional integrated sensing and communication systems,such as joint radar-communication systems,common sensing tasks include target localization and ***,increasingly intelligent systems,such as smart agriculture,lowaltitude economy,and smart healthcare,have demanded more comprehensive and continuous information sensing capabilities to support higher-level *** sensing has the potential to offer both spatial and temporal continuity,meeting the multi-dimensional sensing needs of these intelligent ***,numerous advanced systems have been proposed,expanding the application scope of RF sensing to be more pervasive,including discrete state ubiquitous sensing tasks (such as material identification [1]),and continuous state ubiquitous sensing tasks (such as health monitoring [2]).With the advent of the 6G era,it is anticipated that the sensing potential of RF systems will be further unleashed.
Secure vector dominance is a key cryptographic primitive in secure computational geometry (SCG), determining the dominance relationship of vectors between two participants without revealing their private information. ...
详细信息
Label distribution learning (LDL) suffers from the dilemma of insufficient target data in real-world applications, while domain adaptation (DA) seems to be able to provide a solution. However, most existing methods of...
详细信息
Log parsing, the process of transforming raw logs into structured data, is a key step in the complex computer system's intelligent operation and maintenance and therefore has received extensive attention. Among al...
详细信息
The self-cascade(SC) method is an effective technique for chaos enhancement and complexity increasing in chaos ***, the controllable self-cascade(CSC) method allows for more accurate control of Lyapunov exponents of t...
详细信息
The self-cascade(SC) method is an effective technique for chaos enhancement and complexity increasing in chaos ***, the controllable self-cascade(CSC) method allows for more accurate control of Lyapunov exponents of the discrete map. In this work, the SC and CSC systems of the original map are derived, which enhance the chaotic performance while preserving the fundamental dynamical characteristics of the original map. Higher Lyapunov exponent of chaotic sequences corresponding to higher frequency are obtained in SC and CSC systems. Meanwhile, the Lyapunov exponent could be linearly controlled with greater flexibility in the CSC system. The verification of the numerical simulation and theoretical analysis is carried out based on the platform of CH32.
Image deraining is a highly ill-posed *** significant progress has been made due to the use of deep convolutional neural networks,this problem still remains challenging,especially for the details restoration and gener...
详细信息
Image deraining is a highly ill-posed *** significant progress has been made due to the use of deep convolutional neural networks,this problem still remains challenging,especially for the details restoration and generalization to real rain *** this paper,we propose a deep residual channel attention network(DeRCAN)for *** channel attention mechanism is able to capture the inherent properties of the feature space and thus facilitates more accurate estimations of structures and details for image *** addition,we further propose an unsupervised learning approach to better solve real rain images based on the proposed *** qualitative and quantitative evaluation results on both synthetic and real-world images demonstrate that the proposed DeRCAN performs favorably against state-of-the-art methods.
Identification of ocean eddies from a large amount of ocean data provided by satellite measurements and numerical simulations is crucial,while the academia has invented many traditional physical methods with accurate ...
详细信息
Identification of ocean eddies from a large amount of ocean data provided by satellite measurements and numerical simulations is crucial,while the academia has invented many traditional physical methods with accurate detection capability,but their detection computational efficiency is *** recent years,with the increasing application of deep learning in ocean feature detection,many deep learning-based eddy detection models have been developed for more effective eddy detection from ocean *** it is difficult for them to precisely fit some physical features implicit in traditional methods,leading to inaccurate identification of ocean *** this study,to address the low efficiency of traditional physical methods and the low detection accuracy of deep learning models,we propose a solution that combines the target detection model Faster Region with CNN feature(Faster R-CNN)with the traditional dynamic algorithm Angular Momentum Eddy Detection and Tracking Algorithm(AMEDA).We use Faster R-CNN to detect and generate bounding boxes for eddies,allowing AMEDA to detect the eddy center within these bounding boxes,thus reducing the complexity of center *** demonstrate the detection efficiency and accuracy of this model,this paper compares the experimental results with AMEDA and the deep learning-based eddy detection method *** results show that the eddy detection results of this paper are more accurate than eddyNet and have higher execution efficiency than AMEDA.
This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of *** delve into...
详细信息
This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of *** delve into the emerging trend of machine learning on embedded devices,enabling tasks in resource-limited ***,the widespread adoption of machine learning raises significant privacy concerns,necessitating the development of privacy-preserving *** such technique,secure multi-party computation(MPC),allows collaborative computations without exposing private *** its potential,complex protocols and communication interactions hinder performance,especially on resource-constrained *** to enhance efficiency have been made,but scalability remains a *** the success of GPUs in deep learning,lever-aging embedded GPUs,such as those offered by NVIDIA,emerges as a promising ***,we propose an Embedded GPU-based Secure Two-party Computation(EG-STC)framework for Artificial Intelligence(AI)*** the best of our knowledge,this work represents the first endeavor to fully implement machine learning model training based on secure two-party computing on the Embedded GPU *** experimental results demonstrate the effectiveness of *** an embedded GPU with a power draw of 5 W,our implementation achieved a secure two-party matrix multiplication throughput of 5881.5 kilo-operations per millisecond(kops/ms),with an energy efficiency ratio of 1176.3 kops/ms/***,leveraging our EG-STC framework,we achieved an overall time acceleration ratio of 5–6 times compared to solutions running on server-grade *** solution also exhibited a reduced runtime,requiring only 60%to 70%of the runtime of previously best-known methods on the same *** summary,our research contributes to the advancement of secure and efficient machine learning implementations on resource-constrained embedded
Global illumination(GI)plays a crucial role in rendering realistic results for virtual exhibitions,such as virtual car *** scenarios usually include all-frequency bidirectional reflectance distribution functions(BRDFs...
详细信息
Global illumination(GI)plays a crucial role in rendering realistic results for virtual exhibitions,such as virtual car *** scenarios usually include all-frequency bidirectional reflectance distribution functions(BRDFs),although their geometries and light configurations may be *** allfrequency BRDFs in real time remains challenging due to the complex light *** approaches,including precomputed radiance transfer,light probes,and the most recent path-tracing-based approaches(ReSTIR PT),cannot satisfy both quality and performance requirements ***,we propose a practical hybrid global illumination approach that combines ray tracing and cached GI by caching the incoming radiance with *** approach can produce results close to those of ofline renderers at the cost of only approximately 17 ms at runtime and is robust over all-frequency *** approach is designed for applications involving static lighting and geometries,such as virtual exhibitions.
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***,attackers have used advanced techniques to evade defenses by transforming their malware into functionality-preserving *** systematically analyze such evasion attacks and conduct a large-scale empirical study in this paper to evaluate their impact on *** specifically,we focus on two forms of evasion attacks:obfuscation and adversarial *** the best of our knowledge,this paper is the first to investigate and contrast the two families of evasion attacks *** apply 10 obfuscation attacks and 9 adversarial attacks to 2870 malware *** obtained findings are as follows.(1)Commercial Off-The-Shelf(COTS)malware detectors are vulnerable to evasion attacks.(2)Adversarial attacks affect COTS malware detectors slightly more effectively than obfuscated malware examples.(3)Code similarity detection approaches can be affected by obfuscated examples and are barely affected by adversarial attacks.(4)These attacks can preserve the functionality of original malware examples.
暂无评论