This research aims to 1) to study in the Development of public relations for school of computer and informationtechnology Chiangrai Rajabhat University Using Virtual Reality technology 2) to design the Development of...
详细信息
Local causal structure learning(LCS) efficiently identifies a set of direct neighbors of a specified variable from observational data. Additionally, it distinguishes direct causes and direct effects of this variable w...
详细信息
Local causal structure learning(LCS) efficiently identifies a set of direct neighbors of a specified variable from observational data. Additionally, it distinguishes direct causes and direct effects of this variable without learning the entire causal structure. While many LCS algorithms have been proposed, they do not consider the data privacy-preserving problem,which has attracted extensive attention from academia and industry. To address this issue, we propose a federated local causal structure learning(FedLCS) algorithm to learn local causal structures in privacy-preserving data in a federated ***, FedLCS introduces a layer-wise federated local skeleton learning algorithm to construct the local skeleton. Based on this skeleton, it introduces a federated local skeleton orientation algorithm and an extension-and-backtracking orientation algorithm to orient the edges. Finally, FedLCS uses a federated local extension-and-backtracking orientation algorithm to orient the remaining edges. Extensive experiments on benchmark, synthetic, and real datasets demonstrate that FedLCS can learn the local causal structure of a given variable in a federated setting.
Witness encryption(WE) is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance. Anyone who possesses a solution to this instance(i.e., a witness) can then recover the messa...
详细信息
Witness encryption(WE) is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance. Anyone who possesses a solution to this instance(i.e., a witness) can then recover the message from the *** introduce a variant of WE that allows ciphertext updates, referred to as ciphertext updateable WE(CUWE). With CUWE,a user can encrypt a message using an instance x and a tag t, and those who possess a valid witness w for x and match the access policy defined by tag t can decrypt the message. Furthermore, CUWE allows for the use of an update token to change the tag t of ciphertext to a different tag. This feature enables fine-grained access control, even after the ciphertext has been created, thereby significantly increasing the usefulness of the WE scheme. We demonstrate that such a WE framework with an updatable ciphertext scheme can be constructed using our puncturable instance-based deterministic encryption(PIDE) and indistinguishability obfuscation(iO). We also propose an instantiation of PIDE utilizing puncturable pseudorandom functions(PRFs) that provide(selectively) indistinguishable security. Finally, we expand our CUWE to ciphertext-updatable functional WE(CUFWE), which offers enhanced data access control.
Clustering is a fundamental technique widely used for exploring the inherent data structure. Many studies indicate that an appropriate feature representation can effectively improve clustering performance. However, th...
详细信息
State-of-the-art recommender systems are increasingly focused on optimizing implementation efficiency, such as enabling on-device recommendations under memory constraints. Current methods commonly use lightweight embe...
详细信息
State-of-the-art recommender systems are increasingly focused on optimizing implementation efficiency, such as enabling on-device recommendations under memory constraints. Current methods commonly use lightweight embeddings for users and items or employ compact embeddings to enhance reusability and reduce memory usage. However, these approaches consider only the coarse-grained aspects of embeddings, overlooking subtle semantic nuances. This limitation results in an adversarial degradation of meta-embedding performance, impeding the system's ability to capture intricate relationships between users and items, leading to suboptimal recommendations. To address this, we propose a novel approach to efficiently learn meta-embeddings with varying grained and apply fine-grained meta-embeddings to strengthen the representation of their coarse-grained counterparts. Specifically, we introduce a recommender system based on a graph neural network, where each user and item is represented as a node. These nodes are directly connected to coarse-grained virtual nodes and indirectly linked to fine-grained virtual nodes, facilitating learning of multi-grained semantics. Fine-grained semantics are captured through sparse meta-embeddings, which dynamically balance embedding uniqueness and memory constraints. To ensure their sparseness, we rely on initialization methods such as sparse principal component analysis combined with a soft thresholding activation function. Moreover, we propose a weight-bridging update strategy that aligns coarse-grained meta-embedding with several fine-grained meta-embeddings based on the underlying semantic properties of users and items. Comprehensive experiments demonstrate that our method outperforms existing baselines. The code of our proposal is available at https://***/htyjers/C2F-MetaEmbed.
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. Howeve...
详细信息
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. However, the traditional ISAC schemes are highly dependent on the accurate mathematical model and suffer from the challenges of high complexity and poor performance in practical scenarios. Recently, artificial intelligence (AI) has emerged as a viable technique to address these issues due to its powerful learning capabilities, satisfactory generalization capability, fast inference speed, and high adaptability for dynamic environments, facilitating a system design shift from model-driven to data-driven. Intelligent ISAC, which integrates AI into ISAC, has been a hot topic that has attracted many researchers to investigate. In this paper, we provide a comprehensive overview of intelligent ISAC, including its motivation, typical applications, recent trends, and challenges. In particular, we first introduce the basic principle of ISAC, followed by its key techniques. Then, an overview of AI and a comparison between model-based and AI-based methods for ISAC are provided. Furthermore, the typical applications of AI in ISAC and the recent trends for AI-enabled ISAC are reviewed. Finally, the future research issues and challenges of intelligent ISAC are discussed.
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
Thanks to its ubiquity,using radio frequency (RF) signals for sensing has found widespread *** traditional integrated sensing and communication systems,such as joint radar-communication systems,common sensing tasks in...
Thanks to its ubiquity,using radio frequency (RF) signals for sensing has found widespread *** traditional integrated sensing and communication systems,such as joint radar-communication systems,common sensing tasks include target localization and ***,increasingly intelligent systems,such as smart agriculture,lowaltitude economy,and smart healthcare,have demanded more comprehensive and continuous information sensing capabilities to support higher-level *** sensing has the potential to offer both spatial and temporal continuity,meeting the multi-dimensional sensing needs of these intelligent ***,numerous advanced systems have been proposed,expanding the application scope of RF sensing to be more pervasive,including discrete state ubiquitous sensing tasks (such as material identification [1]),and continuous state ubiquitous sensing tasks (such as health monitoring [2]).With the advent of the 6G era,it is anticipated that the sensing potential of RF systems will be further unleashed.
Predicting the metastatic direction of primary breast cancer (BC), thus assisting physicians in precise treatment, strict follow-up, and effectively improving the prognosis. The clinical data of 293,946 patients with ...
详细信息
The evolution of edge computing has advanced the accessibility of E-health recommendation services, encompassing areas such as medical consultations, prescription guidance, and diagnostic assessments. Traditional meth...
详细信息
The evolution of edge computing has advanced the accessibility of E-health recommendation services, encompassing areas such as medical consultations, prescription guidance, and diagnostic assessments. Traditional methodologies predominantly utilize centralized recommendations, relying on servers to store client data and dispatch advice to ***, these conventional approaches raise significant concerns regarding data privacy and often result in computational inefficiencies. E-health recommendation services, distinct from other recommendation domains, demand not only precise and swift analyses but also a stringent adherence to privacy safeguards, given the users' reluctance to disclose their identities or health information. In response to these challenges, we explore a new paradigm called on-device recommendation tailored to E-health diagnostics, where diagnostic support(such as biomedical image diagnostics), is computed at the client *** leverage the advances of federated learning to deploy deep learning models capable of delivering expert-level diagnostic suggestions on clients. However, existing federated learning frameworks often deploy a singular model across all edge devices, overlooking their heterogeneous computational capabilities. In this work, we propose an adaptive federated learning framework utilizing BlockNets, a modular design rooted in the layers of deep neural networks, for diagnostic recommendation across heterogeneous devices. Our framework offers the flexibility for users to adjust local model configurations according to their device's computational power. To further handle the capacity skewness of edge devices, we develop a data-free knowledge distillation mechanism to ensure synchronized parameters of local models with the global model, enhancing the overall accuracy. Through comprehensive experiments across five real-world datasets, against six baseline models, within six experimental setups, and various data distribution scenario
暂无评论