Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inher...
详细信息
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inherent biases and computational burdens, especially when used to relax the rank function, making them less effective and efficient in real-world scenarios. To address these challenges, our research focuses on generalized nonconvex rank regularization problems in robust matrix completion, low-rank representation, and robust matrix regression. We introduce innovative approaches for effective and efficient low-rank matrix learning, grounded in generalized nonconvex rank relaxations inspired by various substitutes for the ?0-norm relaxed functions. These relaxations allow us to more accurately capture low-rank structures. Our optimization strategy employs a nonconvex and multi-variable alternating direction method of multipliers, backed by rigorous theoretical analysis for complexity and *** algorithm iteratively updates blocks of variables, ensuring efficient convergence. Additionally, we incorporate the randomized singular value decomposition technique and/or other acceleration strategies to enhance the computational efficiency of our approach, particularly for large-scale constrained minimization problems. In conclusion, our experimental results across a variety of image vision-related application tasks unequivocally demonstrate the superiority of our proposed methodologies in terms of both efficacy and efficiency when compared to most other related learning methods.
The magnetic flux in a permanent magnet transverse flux generator(PMTFG) is three-dimensional(3D), therefore, its efficacy is evaluated using 3D magnetic field analysis. Although the 3D finite-element method(FEM) is h...
详细信息
The magnetic flux in a permanent magnet transverse flux generator(PMTFG) is three-dimensional(3D), therefore, its efficacy is evaluated using 3D magnetic field analysis. Although the 3D finite-element method(FEM) is highly accurate and reliable for machine simulation, it requires a long computation time, which is crucial when it is to be used in an iterative optimization process. Therefore, an alternative to 3DFEM is required as a rapid and accurate analytical technique. This paper presents an analytical model for PMTFG analysis using winding function method. To obtain the air gap MMF distribution, the excitation magneto-motive force(MMF) and the turn function are determined based on certain assumptions. The magnetizing inductance, flux density, and back-electro-magnetomotive force of the winding are then determined. To assess the accuracy of the proposed method, the analytically calculated parameters of the generator are compared to those obtained by a 3D-FEM. The presented method requires significantly shorter computation time than the 3D-FEM with comparable accuracy.
The steady-state security region(SSR)offers ro-bust support for the security assessment and control of new power systems with high uncertainty and ***,accurately solving the steady-state security region boundary(SS-RB...
详细信息
The steady-state security region(SSR)offers ro-bust support for the security assessment and control of new power systems with high uncertainty and ***,accurately solving the steady-state security region boundary(SS-RB),which is high-dimensional,non-convex,and non-linear,presents a significant *** address this problem,this paper proposes a method for approximating the SSRB in power systems using the feature non-linear converter and improved oblique decision ***,to better characterize the SSRB,boundary samples are generated using the proposed sampling *** samples are distributed within a limited distance near the ***,to handle the high-dimensionality,non-convexity and non-linearity of the SSRB,boundary samples are converted from the original power injection space to a new fea-ture space using the designed feature non-linear ***-sequently,in this feature space,boundary samples are linearly separated using the proposed information gain rate based weighted oblique decision ***,the effectiveness and generality of the proposed sampling method are verified on the WECC 3-machine 9-bus system and IEEE 118-bus system.
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. Howeve...
详细信息
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. However, the traditional ISAC schemes are highly dependent on the accurate mathematical model and suffer from the challenges of high complexity and poor performance in practical scenarios. Recently, artificial intelligence (AI) has emerged as a viable technique to address these issues due to its powerful learning capabilities, satisfactory generalization capability, fast inference speed, and high adaptability for dynamic environments, facilitating a system design shift from model-driven to data-driven. Intelligent ISAC, which integrates AI into ISAC, has been a hot topic that has attracted many researchers to investigate. In this paper, we provide a comprehensive overview of intelligent ISAC, including its motivation, typical applications, recent trends, and challenges. In particular, we first introduce the basic principle of ISAC, followed by its key techniques. Then, an overview of AI and a comparison between model-based and AI-based methods for ISAC are provided. Furthermore, the typical applications of AI in ISAC and the recent trends for AI-enabled ISAC are reviewed. Finally, the future research issues and challenges of intelligent ISAC are discussed.
Over-the-air computation(AirComp)enables federated learning(FL)to rapidly aggregate local models at the central server using waveform superposition property of wireless *** this paper,a robust transmission scheme for ...
详细信息
Over-the-air computation(AirComp)enables federated learning(FL)to rapidly aggregate local models at the central server using waveform superposition property of wireless *** this paper,a robust transmission scheme for an AirCompbased FL system with imperfect channel state information(CSI)is *** model CSI uncertainty,an expectation-based error model is *** main objective is to maximize the number of selected devices that meet mean-squared error(MSE)requirements for model broadcast and model *** problem is formulated as a combinatorial optimization problem and is solved in two ***,the priority order of devices is determined by a sparsity-inducing ***,a feasibility detection scheme is used to select the maximum number of devices to guarantee that the MSE requirements are *** alternating optimization(AO)scheme is used to transform the resulting nonconvex problem into two convex *** results illustrate the effectiveness and robustness of the proposed scheme.
This paper presents the design, discussions, and characterization of a low-cost printed slotted substrate integrated waveguide traveling wave antenna. The antenna exhibits an omnidirectional pattern in the azimuth pla...
详细信息
With the rise of artificial intelligence and cloud computing, machine-learning-as-a-service platforms,such as Google, Amazon, and IBM, have emerged to provide sophisticated tasks for cloud applications. These propriet...
详细信息
With the rise of artificial intelligence and cloud computing, machine-learning-as-a-service platforms,such as Google, Amazon, and IBM, have emerged to provide sophisticated tasks for cloud applications. These proprietary models are vulnerable to model extraction attacks due to their commercial value. In this paper, we propose a time-efficient model extraction attack framework called Swift Theft that aims to steal the functionality of cloud-based deep neural network models. We distinguish Swift Theft from the existing works with a novel distribution estimation algorithm and reference model settings, finding the most informative query samples without querying the victim model. The selected query samples can be applied to various cloud models with a one-time selection. We evaluate our proposed method through extensive experiments on three victim models and six datasets, with up to 16 models for each dataset. Compared to the existing attacks, Swift Theft increases agreement(i.e., similarity) by 8% while consuming 98% less selecting time.
The subsynchronous oscillations(SSOs)related to renewable generation seriously affect the stability and safety of the power *** realize the dynamic monitoring of SSOs by utilizing the high computational efficiency and...
详细信息
The subsynchronous oscillations(SSOs)related to renewable generation seriously affect the stability and safety of the power *** realize the dynamic monitoring of SSOs by utilizing the high computational efficiency and noise-resilient features of the matrix pencil method(MPM),this paper propos es an improved MPM-based parameter identification with syn *** MPM is enhanced by the angular frequency fitting equations based on the characteristic polynomial coeffi cients of the matrix pencil to ensure the accuracy of the identi fied parameters,since the existing eigenvalue solution of the MPM ignores the angular frequency conjugation constraints of the two fundamental modes and two oscillation ***,the identification and recovery of bad data are proposed by uti lizing the difference in temporal continuity of the synchropha sors before and after noise *** proposed parameter identification is verified with synthetic,simulated,and actual measured phase measurement unit(PMU)*** with the existing MPM,the improved MPM achieves better accuracy for parameter identification of each component in SSOs,better real-time performance,and significantly reduces the effect of bad data.
Backdoor attacks pose great threats to deep neural network models. All existing backdoor attacks are designed for unstructured data(image, voice, and text), but not structured tabular data, which has wide real-world a...
详细信息
Backdoor attacks pose great threats to deep neural network models. All existing backdoor attacks are designed for unstructured data(image, voice, and text), but not structured tabular data, which has wide real-world applications, e.g., recommendation systems, fraud detection, and click-through rate prediction. To bridge this research gap, we make the first attempt to design a backdoor attack framework, named BAD-FM, for tabular data prediction models. Unlike images or voice samples composed of homogeneous pixels or signals with continuous values, tabular data samples contain well-defined heterogeneous fields that are usually sparse and discrete. Tabular data prediction models do not solely rely on deep networks but combine shallow components(e.g., factorization machine, FM) with deep components to capture sophisticated feature interactions among fields. To tailor the backdoor attack framework to tabular data models, we carefully design field selection and trigger formation algorithms to intensify the influence of the trigger on the backdoored model. We evaluate BAD-FM with extensive experiments on four datasets, i.e.,HUAWEI, Criteo, Avazu, and KDD. The results show that BAD-FM can achieve an attack success rate as high as 100%at a poisoning ratio of 0.001%, outperforming baselines adapted from existing backdoor attacks against unstructured data models. As tabular data prediction models are widely adopted in finance and commerce, our work may raise alarms on the potential risks of these models and spur future research on defenses.
Photovoltaic(PV)inverter,as a promising voltage/var control(VVC)resource,can supply flexible reactive power to reduce microgrid power loss and regulate bus ***,active power plays a significant role in microgrid voltag...
详细信息
Photovoltaic(PV)inverter,as a promising voltage/var control(VVC)resource,can supply flexible reactive power to reduce microgrid power loss and regulate bus ***,active power plays a significant role in microgrid voltage ***-based demand response(PBDR)can shift load demand via determining time-varying prices,which can be regarded as an effective means for active power ***,due to the different characteristics,PBDR and inverter-based VVC lack systematic ***,this paper proposes a PBDR-supported three-stage hierarchically coordinated voltage control method,including day-ahead PBDR price scheduling,hour-ahead reactive power dispatch of PV inverters,and realtime local droop control of PV *** their mutual influence,a stochastic optimization method is utilized to centrally or hierarchically coordinate adjacent two *** solve the bilinear constraints of droop control function,the problem is reformulated into a second-order cone programming relaxation ***,the concave constraints are convexified,forming a penalty convex-concave model for feasible solution ***,a convex-concave procedure-based solution algorithm is proposed to iteratively solve the penalty *** proposed method is tested on 33-bus and IEEE 123-bus distribution networks and compared with other *** results verify the high efficiency of the proposed method to achieve power loss reduction and voltage regulation.
暂无评论