Adversarial attacks reveal the vulnerability of classifiers based on deep neural networks to well-designed perturbations. Most existing attack methods focus on adding perturbations directly to the pixel space. However...
详细信息
Deep learning on graphs, specifically graph convolutional networks (GCNs), has exhibited exceptional efficacy in the domain of recommender systems. Most GCNs have a message-passing architecture that enables nodes to a...
详细信息
Tropical Cyclone (TC) estimation aims to estimate various attributes of TC in real-time to alleviate and prevent disasters caused by violent TCs. As artificial intelligence technology advances, various deep learning-b...
详细信息
Deep neural networks, especially face recognition models, have been shown to be vulnerable to adversarial examples. However, existing attack methods for face recognition systems either cannot attack black-box models, ...
详细信息
We investigate the problem of deceiving a malicious agent employing an identification method to estimate the closed-loop dynamics of a cyber-physical system. In particular, we propose a moving target defense mechanism...
详细信息
As an application of fine-grained wireless sensing, RF-based material identification follows the paradigm of RF computing that fetches the information during RF signal propagation. Specifically, the RF signal accesses...
详细信息
With the rapid development of information technology,the development of blockchain technology has also been deeply *** performing block verification in the blockchain network,if all transactions are verified on the ch...
详细信息
With the rapid development of information technology,the development of blockchain technology has also been deeply *** performing block verification in the blockchain network,if all transactions are verified on the chain,this will cause the accumulation of data on the chain,resulting in data storage *** the same time,the security of data is also challenged,which will put enormous pressure on the block,resulting in extremely low communication efficiency of the *** traditional blockchain system uses theMerkle Tree method to store *** verifying the integrity and correctness of the data,the amount of proof is large,and it is impossible to verify the data in batches.A large amount of data proof will greatly impact the verification efficiency,which will cause end-to-end communication delays and seriously affect the blockchain system’s stability,efficiency,and *** order to solve this problem,this paper proposes to replace the Merkle tree with polynomial commitments,which take advantage of the properties of polynomials to reduce the proof size and communication *** realizing the ingenious use of aggregated proof and smart contracts,the verification efficiency of blocks is improved,and the pressure of node communication is reduced.
Lung cancer is the deadliest form of cancer, with most cases originating from small malignant nodules. However, the early symptoms of malignant nodules are not obvious, which can lead to misdiagnosis and delay the opt...
详细信息
Automated diagnosis has always been a challenging task to AI. When model-based diagnosis is adopted, a model of the system is required in order to generate a set of diagnoses based on a collection of observations, whe...
详细信息
Automated diagnosis has always been a challenging task to AI. When model-based diagnosis is adopted, a model of the system is required in order to generate a set of diagnoses based on a collection of observations, where a diagnosis is a set of faulty components or, more generally, a set of faults ascribed to components. An active system (AS) is an asynchronous, distributed discrete-event system, whose model consists of a topology (how components are connected to one another), and a communicating automaton for each component (the mode in which a component reacts to events). A problem afflicting all model-based approaches to diagnosis is a possibly large number of diagnoses explaining the observations, which may jeopardize the task of a diagnostician in charge of monitoring the system, owing to the cognitive overload raised by an overwhelming number of faulty scenarios to examine. This is exacerbated in critical application domains, where, under uncertain conditions, an artificial agent is supposed to perform recovery actions in real-time, even in the order of milliseconds, to possibly restore the system. To make diagnosis of ASs viable in critical, real-time application domains, a Smart Diagnosis Engine is presented, which is grounded on two heuristics: (1) if a diagnosis δ is a superset of a diagnosis δ′, then δ is ignored (minimality);(2) if the cardinality (number of faults) of a diagnosis δ is lower than the cardinality of a diagnosis δ′, then δ is generated before δ′ (sorting). Consequently, the diagnosis output consists in a sequence of minimal diagnoses that are generated in ascending order by cardinality. As indicated by the experimental results, the overall improvement is twofold: most likely diagnoses are generated upfront, thereby supporting real-time recovery actions;also, the abductive search in the behavior space of the AS is reduced considerably, owing to the pruning of the trajectories that will not generate minimal diagnoses, thereby resulting in an
In high mobility beyond 5G communications, orthogonal time frequency space (OTFS) is a promising alternative to orthogonal frequency division multiplexing. In addition to the superior communication performance, OTFS i...
详细信息
暂无评论