We consider the multiobjective optimization problem for the resource allocation of the multiagent network, where each agent contains multiple conflicting local objective functions. The goal is to find compromise solut...
详细信息
We consider the multiobjective optimization problem for the resource allocation of the multiagent network, where each agent contains multiple conflicting local objective functions. The goal is to find compromise solutions minimizing all local objective functions subject to resource constraints as much as possible, i.e., the Pareto optimums. To this end, we first reformulate the multiobjective optimization problem into one single-objective distributed optimization problem by using the weighted Lppreference index,where the weighting factors of all local objective functions are obtained from the optimization procedure so that the optimizer of the latter is the desired Pareto optimum of the former. Next, we propose novel predefined-time algorithms to solve the reformulated problem by time-based generators. We show that the reformulated problem is solved within a predefined time if the local objective functions are strongly convex and smooth. Moreover, the settling time can be arbitrarily preset since it does not depend on the initial values and designed parameters. Finally, numerical simulations are presented to illustrate the effectiveness of the proposed algorithms.
Photobiomodulation (PBM) therapy using red- and near-infrared (NIR) light has shown beneficial regenerative effects on cell functionalities and consequently on health applications. Light parameter values, particularly...
详细信息
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). E...
详细信息
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). Eliminating DolphinAttacks is challenging if ever possible since it requires to modify the microphone hardware. In this paper, we design EarArray, a lightweight method that can not only detect such attacks but also identify the direction of attackers without requiring any extra hardware or hardware modification. Essentially, inaudible voice commands are modulated on ultrasounds that inherently attenuate faster than the one of audible sounds. By inspecting the command sound signals via the built-in multiple microphones on smart devices, EarArray is able to estimate the attenuation rate and thus detect the attacks. We propose a model of the propagation of audible sounds and ultrasounds from the sound source to a voice assistant, e.g., a smart speaker, and illustrate the underlying principle and its feasibility. We implemented EarArray using two specially-designed microphone arrays and our experiments show that EarArray can detect inaudible voice commands with an accuracy of above 99% and recognize the direction of the attackers with an accuracy of 97.89% and can also detect the laser-based attack with an accuracy of 100%. IEEE
When I started working on analog computing for neural network systems in the 1980s, the question everyone feared to be asked at the end of their presentation was "couldn't this be done on a DSP processor?&quo...
详细信息
Knowledge distillation has demonstrated significant potential in addressing the challenge of unsupervised anomaly detection (AD). The representation discrepancy of anomalies in the teacher–student (T-S) model pr...
详细信息
With the increasing number of edited videos, many robust video fingerprinting schemes have been proposed to solve the problem of video content authentication. However, most of them either deal with the temporal and sp...
详细信息
By replacing the exponential decay function in the circular Airy beam (CAB) with a super-Gaussian function, we propose a novel abruptly autofocusing beam, the circular super-Gaussian Airy beam (CSGAB). Similar to CAB,...
详细信息
A reconfigurable photonic integrated circuit was developed to operate as an ultra-broadband spectrometer on SiN chip resolving spectral lines with picometer precision and thermal stability of±2℃.
A reconfigurable photonic integrated circuit was developed to operate as an ultra-broadband spectrometer on SiN chip resolving spectral lines with picometer precision and thermal stability of±2℃.
The rapid development of deep learning provides great convenience for production and ***,the massive labels required for training models limits further ***-shot learning which can obtain a high-performance model by le...
详细信息
The rapid development of deep learning provides great convenience for production and ***,the massive labels required for training models limits further ***-shot learning which can obtain a high-performance model by learning few samples in new tasks,providing a solution for many scenarios that lack *** paper summarizes few-shot learning algorithms in recent years and proposes a ***,we introduce the few-shot learning task and its ***,according to different implementation strategies,few-shot learning methods in recent years are divided into five categories,including data augmentation-based methods,metric learning-based methods,parameter optimization-based methods,external memory-based methods,and other ***,We investigate the application of few-shot learning methods and summarize them from three directions,including computer vision,human-machine language interaction,and robot ***,we analyze the existing few-shot learning methods by comparing evaluation results on mini Image Net,and summarize the whole paper.
Cryptocurrencies, particularly Bitcoin, have garnered attention for their potential in anonymous transactions. However, their anonymity has often been compromised by deanonymization attacks. To counter this, mixing se...
详细信息
暂无评论