Cloud computing, as a promising service platform, has gained significant popularity in addressing emerging data privacy issues in applications such as machine learning and data mining. Researchers have proposed the ve...
详细信息
Federated learning is a widely used distributed learning approach in recent years,however,despite model training from collecting data become to gathering parameters,privacy violations may occur when publishing and sha...
详细信息
Federated learning is a widely used distributed learning approach in recent years,however,despite model training from collecting data become to gathering parameters,privacy violations may occur when publishing and sharing models.A dynamic approach is pro-posed to add Gaussian noise more effectively and apply differential privacy to federal deep ***,it is abandoning the traditional way of equally distributing the privacy budget e and adjusting the privacy budget to accommodate gradient descent federation learning dynamically,where the parameters depend on computation derived to avoid the impact on the algorithm that hyperparameters are created *** also incorporates adaptive threshold cropping to control the sensitivity,and finally,moments accountant is used to counting the∈consumed on the privacy‐preserving,and learning is stopped only if the∈_(total)by clients setting is reached,this allows the privacy budget to be adequately explored for model *** experimental results on real datasets show that the method training has almost the same effect as the model learning of non‐privacy,which is significantly better than the differential privacy method used by TensorFlow.
Towards optimal k-prototype discovery,k-means-like algorithms give us inspirations of central samples collection,yet the unstable seed samples selection,the hypothesis of a circle-like pattern,and the unknown K are st...
详细信息
Towards optimal k-prototype discovery,k-means-like algorithms give us inspirations of central samples collection,yet the unstable seed samples selection,the hypothesis of a circle-like pattern,and the unknown K are still challenges,particularly for non-predetermined data *** propose an adaptive k-prototype clustering method(kProtoClust)which launches cluster exploration with a sketchy division of K clusters and finds evidence for splitting and *** behalf of a group of data samples,support vectors and outliers from the perspective of support vector data description are not the appropriate candidates for prototypes,while inner samples become the first candidates for instability reduction of *** from the representation of samples in traditional,we extend sample selection by encouraging fictitious samples to emphasize the representativeness of *** get out of the circle-like pattern limitation,we introduce a convex decomposition-based strategy of one-cluster-multiple-prototypes in which convex hulls of varying sizes are prototypes,and accurate connection analysis makes the support of arbitrary cluster shapes *** by geometry,the three presented strategies make kProtoClust bypassing the K dependence well with the global and local position relationship analysis for data *** results on twelve datasets of irregular cluster shape or high dimension suggest that kProtoClust handles arbitrary cluster shapes with prominent accuracy even without the prior knowledge K.
The superior performance of large-scale pre-Trained models, such as Bidirectional Encoder Representations from Transformers (BERT) and Generative Pre-Trained Transformer (GPT), has received increasing attention in bot...
详细信息
Modern recommendation systems are widely used in modern data *** random and sparse embedding lookup operations are the main performance bottleneck for processing recommendation systems on traditional platforms as they...
详细信息
Modern recommendation systems are widely used in modern data *** random and sparse embedding lookup operations are the main performance bottleneck for processing recommendation systems on traditional platforms as they induce abundant data movements between computing units and ***-based processing-in-memory(PIM)can resolve this problem by processing embedding vectors where they are ***,the embedding table can easily exceed the capacity limit of a monolithic ReRAM-based PIM chip,which induces off-chip accesses that may offset the PIM ***,we deploy the decomposed model on-chip and leverage the high computing efficiency of ReRAM to compensate for the decompression performance *** this paper,we propose ARCHER,a ReRAM-based PIM architecture that implements fully yon-chip recommendations under resource ***,we make a full analysis of the computation pattern and access pattern on the decomposed *** on the computation pattern,we unify the operations of each layer of the decomposed model in multiply-and-accumulate *** on the access observation,we propose a hierarchical mapping schema and a specialized hardware design to maximize resource *** the unified computation and mapping strategy,we can coordinatethe inter-processing elements *** evaluation shows that ARCHER outperforms the state-of-the-art GPU-based DLRM system,the state-of-the-art near-memory processing recommendation system RecNMP,and the ReRAM-based recommendation accelerator REREC by 15.79×,2.21×,and 1.21× in terms of performance and 56.06×,6.45×,and 1.71× in terms of energy savings,respectively.
Recent decades have witnessed several infectious disease outbreaks,including the coronavirus disease(COVID-19)pandemic,which had catastrophic impacts on societies around the *** the same time,the twenty-first century ...
详细信息
Recent decades have witnessed several infectious disease outbreaks,including the coronavirus disease(COVID-19)pandemic,which had catastrophic impacts on societies around the *** the same time,the twenty-first century has experienced an unprecedented era of techno-logical development and demographic changes:exploding population growth,increased air-line flights,and increased rural-to-urban migration,with an estimated 281 million international migrants worldwide in 2020,despite COVID-19 movement *** this review,we synthesized 195 research articles that examined the association between human movement and infectious disease outbreaks to understand the extent to which human mobility has increased the risk of infectious disease *** article covers eight infectious diseases,ranging from respiratory illnesses to sexually transmitted and vector-borne *** review revealed a strong association between human mobility and infectious disease spread,particularly strong for respiratory illnesses like COVID-19 and *** significant research into the relationship between infectious diseases and human mobility,four knowl-edge gaps were identified based on reviewed literature in this study:1)although some studies have used bigdata in investigating infectious diseases,the efforts are limited(with the exception of COVID-19 disease),2)while some research has explored the use of multiple data sources,there has been limited focus on fully integrating these data into comprehensive analyses,3)limited research on the global impact of mobility on the spread of infectious disease with most studies focusing on local or regional outbreaks,and 4)lack of standardiza-tion in the methodology for measuring the impacts of human mobility on infectious disease *** tackling the recognized knowledge gaps and adopting holistic,interdisciplinary methods,forthcoming research has the potential to substantially enhance our comprehension of the intricate inter
This paper investigates the convergence, noise-tolerance, and filtering performance of a tracking differentiator in the presence of multiple stochastic disturbances for the first time. We consider a general case where...
详细信息
This paper investigates the convergence, noise-tolerance, and filtering performance of a tracking differentiator in the presence of multiple stochastic disturbances for the first time. We consider a general case wherein the input signal is corrupted by additive colored noise, and the tracking differentiator is disturbed by additive colored noise and white noise. The tracking differentiator is shown to track the input signal and its generalized derivatives in the mean square sense. Further, the almost sure convergence can be achieved when the stochastic noise affecting the input signal is vanishing. Herein, numerical simulations are performed to validate the theoretical results.
This paper aims to investigate the problem of gaze object prediction in single images. We propose an application-friendly network based on CLIP for gaze object prediction. To avoid domain bias, we utilize a shallow fe...
详细信息
Partial label learning (PLL) is a particular problem setting within weakly supervised learning. In PLL, each sample corresponds to a candidate label set in which only one label is true. However, in some practical appl...
详细信息
The Advanced Metering Infrastructure(AMI),as a crucial subsystem in the smart grid,is responsible for measuring user electricity consumption and plays a vital role in communication between providers and ***,with the a...
详细信息
The Advanced Metering Infrastructure(AMI),as a crucial subsystem in the smart grid,is responsible for measuring user electricity consumption and plays a vital role in communication between providers and ***,with the advancement of information and communication technology,new security and privacy challenges have emerged for *** address these challenges and enhance the security and privacy of user data in the smart grid,a Hierarchical Privacy Protection Model in Advanced Metering Infrastructure based on Cloud and Fog Assistance(HPPM-AMICFA)is proposed in this *** proposed model integrates cloud and fog computing with hierarchical threshold encryption,offering a flexible and efficient privacy protection solution that significantly enhances data security in the smart *** methodology involves setting user protection levels by processing missing data and utilizing fuzzy comprehensive analysis to evaluate user importance,thereby assigning appropriate protection ***,a hierarchical threshold encryption algorithm is developed to provide differentiated protection strategies for fog nodes based on user IDs,ensuring secure aggregation and encryption of user *** results demonstrate that HPPM-AMICFA effectively resists various attack strategies while minimizing time costs,thereby safeguarding user data in the smart grid.
暂无评论