Partial multi-label learning(PML) allows learning from rich-semantic objects with inaccurate annotations, where a set of candidate labels are assigned to each training example but only some of them are valid. Existi...
详细信息
Partial multi-label learning(PML) allows learning from rich-semantic objects with inaccurate annotations, where a set of candidate labels are assigned to each training example but only some of them are valid. Existing approaches rely on disambiguation to tackle the PML problem, which aims to correct noisy candidate labels by recovering the ground-truth labeling information ahead of prediction model induction. However, this dominant strategy might be suboptimal as it usually needs extra assumptions that cannot be fully satisfied in real-world scenarios. Instead of label correction, we investigate another strategy to tackle the PML problem, where the potential ambiguity in PML data is eliminated by correcting instance features in a label-specific manner. Accordingly, a simple yet effective approach named PASE, i.e., partial multi-label learning via label-specific feature corrections, is proposed. Under a meta-learning framework, PASElearns to exert label-specific feature corrections so that potential ambiguity specific to each class label can be eliminated and the desired prediction model can be induced on these corrected instance features with the provided candidate labels. Comprehensive experiments on a wide range of synthetic and real-world data sets validate the effectiveness of the proposed approach.
Rate-splitting multiple access(RSMA) has recently gained attention as a potential robust multiple access(MA)scheme for upcoming wireless networks. Given its ability to efficiently utilize wireless resources and design...
详细信息
Rate-splitting multiple access(RSMA) has recently gained attention as a potential robust multiple access(MA)scheme for upcoming wireless networks. Given its ability to efficiently utilize wireless resources and design interference management strategies, it can be applied to unmanned aerial vehicle(UAV) networks to provide convenient services for large-scale access ground users. However, due to the line-of-sight(LoS) broadcast nature of UAV transmission, information is susceptible to eavesdropping in RSMA-based UAV networks. Moreover, the superposition of signals at the receiver in such networks becomes complicated. To cope with the challenge, we propose a two-user multi-input single-output(MISO) RSMA-based UAV secure transmission framework in downlink communication networks. In a passive eavesdropping scenario, our goal is to maximize the sum secrecy rate by optimizing the transmit beamforming and deployment location of the UAV-base station(UAV-BS),while considering quality-of-service(QoS) constraints, maximum transmit power, and flight space limitations. To address the non-convexity of the proposed problem, the optimization problem is first decoupled into two subproblems. Then, the successive convex approximation(SCA) method is employed to solve each subproblem using different propositions. In addition, an alternating optimization(AO)-based location RSMA(L-RSMA) beamforming algorithm is developed to implement joint optimization to obtain the suboptimal solution. Numerical results demonstrate that(1) the proposed L-RSMA scheme yields a28.97% higher sum secrecy rate than the baseline L-space division multiple access(SDMA) scheme;(2) the proposed L-RSMA scheme improves the security performance by 42.61% compared to the L-non-orthogonal multiple access(NOMA) scheme.
Constructing an effective common latent embedding by aligning the latent spaces of cross-modal variational autoencoders(VAEs) is a popular strategy for generalized zero-shot learning(GZSL). However, due to the lac...
详细信息
Constructing an effective common latent embedding by aligning the latent spaces of cross-modal variational autoencoders(VAEs) is a popular strategy for generalized zero-shot learning(GZSL). However, due to the lack of fine-grained instance-wise annotations, existing VAE methods can easily suffer from the posterior collapse problem. In this paper, we propose an innovative asymmetric VAE network by aligning enhanced feature representation(AEFR) for GZSL. Distinguished from general VAE structures, we designed two asymmetric encoders for visual and semantic observations and one decoder for visual reconstruction. Specifically, we propose a simple yet effective gated attention mechanism(GAM) in the visual encoder for enhancing the information interaction between observations and latent variables, alleviating the possible posterior collapse problem effectively. In addition, we propose a novel distributional decoupling-based contrastive learning(D2-CL) to guide learning classification-relevant information while aligning the representations at the taxonomy level in the latent representation space. Extensive experiments on publicly available datasets demonstrate the state-of-the-art performance of our method. The source code is available at https://***/seeyourmind/AEFR.
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. Howeve...
详细信息
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. However, the traditional ISAC schemes are highly dependent on the accurate mathematical model and suffer from the challenges of high complexity and poor performance in practical scenarios. Recently, artificial intelligence (AI) has emerged as a viable technique to address these issues due to its powerful learning capabilities, satisfactory generalization capability, fast inference speed, and high adaptability for dynamic environments, facilitating a system design shift from model-driven to data-driven. Intelligent ISAC, which integrates AI into ISAC, has been a hot topic that has attracted many researchers to investigate. In this paper, we provide a comprehensive overview of intelligent ISAC, including its motivation, typical applications, recent trends, and challenges. In particular, we first introduce the basic principle of ISAC, followed by its key techniques. Then, an overview of AI and a comparison between model-based and AI-based methods for ISAC are provided. Furthermore, the typical applications of AI in ISAC and the recent trends for AI-enabled ISAC are reviewed. Finally, the future research issues and challenges of intelligent ISAC are discussed.
After the global pandemic,DaaS(desktop as a service)has become the first choice of many companies’remote working *** the desktops are usually deployed in the public cloud when using DaaS,customers are more cost-sensi...
详细信息
After the global pandemic,DaaS(desktop as a service)has become the first choice of many companies’remote working *** the desktops are usually deployed in the public cloud when using DaaS,customers are more cost-sensitive which boosts the requirement of proactive power *** researches in this area focus on virtual desktop infrastructure(VDI)session logon behavior modeling,but for the remote desktop service host(RDSH)-shared desktop pools,logoff optimization is also *** systems place sessions by round-robin or in a pre-defined order without considering their logoff ***,these approaches usually suffer from the situation that few left sessions prevent RDSH servers from being powered-off which introduces cost *** this paper,we propose session placement via adaptive user logoff prediction(SODA),an innovative compound model towards proactive RDSH session ***,an ensemble machine learning model that can predict session logoff time is combined with a statistical session placement bucket model to place RDSH sessions with similar logoff time in a more centralized manner on RDSH ***,the infrastructure cost-saving can be improved by reducing the resource waste introduced by those RDSH hosts with very few hanging sessions left for a long *** on real RDSH pool data demonstrate the effectiveness of the proposed proactive session placement approach against existing static placement techniques.
Recently, multirobot systems(MRSs) have found extensive applications across various domains, including industrial manufacturing, collaborative formation of unmanned equipment, emergency disaster relief, and war scenar...
详细信息
Recently, multirobot systems(MRSs) have found extensive applications across various domains, including industrial manufacturing, collaborative formation of unmanned equipment, emergency disaster relief, and war scenarios [1]. These advancements are largely supported by the development of consistency control theory. However, traditional dynamicsfree models may cause instability in complex robotic systems. Lagrangian dynamics offers a better approach for modeling these systems, as it facilitates controller design and optimization analysis. Despite this, challenges persist with unknown parameters and nonlinear friction within the systems.
The Internet of Things(IoT)has orchestrated various domains in numerous applications,contributing significantly to the growth of the smart world,even in regions with low literacy rates,boosting socio-economic *** stud...
详细信息
The Internet of Things(IoT)has orchestrated various domains in numerous applications,contributing significantly to the growth of the smart world,even in regions with low literacy rates,boosting socio-economic *** study provides valuable insights into optimizing wireless communication,paving the way for a more connected and productive future in the mining *** IoT revolution is advancing across industries,but harsh geometric environments,including open-pit mines,pose unique challenges for reliable *** advent of IoT in the mining industry has significantly improved communication for critical operations through the use of Radio Frequency(RF)protocols such as Bluetooth,Wi-Fi,GSM/GPRS,Narrow Band(NB)-IoT,SigFox,ZigBee,and Long Range Wireless Area network(LoRaWAN).This study addresses the optimization of network implementations by comparing two leading free-spreading IoT-based RF protocols such as ZigBee and *** field tests are conducted in various opencast mines to investigate coverage potential and signal *** is tested in the Tadicherla open-cast coal mine in ***,LoRaWAN field tests are conducted at one of the associated cement companies(ACC)in the limestone mine in Bargarh,India,covering both Indoor-toOutdoor(I2O)and Outdoor-to-Outdoor(O2O)environments.A robust framework of path-loss models,referred to as Free space,Egli,Okumura-Hata,Cost231-Hata and Ericsson models,combined with key performance metrics,is employed to evaluate the patterns of signal *** field testing and careful data analysis revealed that the Egli model is the most consistent path-loss model for the ZigBee protocol in an I2O environment,with a coefficient of determination(R^(2))of 0.907,balanced error metrics such as Normalized Root Mean Square Error(NRMSE)of 0.030,Mean Square Error(MSE)of 4.950,Mean Absolute Percentage Error(MAPE)of 0.249 and Scatter Index(SI)of *** the O2O scenario,the Ericsson model
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inher...
详细信息
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inherent biases and computational burdens, especially when used to relax the rank function, making them less effective and efficient in real-world scenarios. To address these challenges, our research focuses on generalized nonconvex rank regularization problems in robust matrix completion, low-rank representation, and robust matrix regression. We introduce innovative approaches for effective and efficient low-rank matrix learning, grounded in generalized nonconvex rank relaxations inspired by various substitutes for the ?0-norm relaxed functions. These relaxations allow us to more accurately capture low-rank structures. Our optimization strategy employs a nonconvex and multi-variable alternating direction method of multipliers, backed by rigorous theoretical analysis for complexity and *** algorithm iteratively updates blocks of variables, ensuring efficient convergence. Additionally, we incorporate the randomized singular value decomposition technique and/or other acceleration strategies to enhance the computational efficiency of our approach, particularly for large-scale constrained minimization problems. In conclusion, our experimental results across a variety of image vision-related application tasks unequivocally demonstrate the superiority of our proposed methodologies in terms of both efficacy and efficiency when compared to most other related learning methods.
5G technology has endowed mobile communication terminals with features such as ultrawideband access, low latency, and high reliability transmission, which can complete the network access and interconnection of a large...
5G technology has endowed mobile communication terminals with features such as ultrawideband access, low latency, and high reliability transmission, which can complete the network access and interconnection of a large number of devices, thus realizing richer application scenarios and constructing 5G-enabled vehicular networks. However, due to the vulnerability of wireless communication, vehicle privacy and communication security have become the key problems to be solved in vehicular networks. Moreover, the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement. In order to achieve efficient and secure communication while protecting vehicle privacy, this paper proposes a lightweight key agreement and key update scheme for5G vehicular networks based on blockchain. Firstly,the key agreement is accomplished using certificateless public key cryptography, and based on the aggregate signature and the cooperation between the vehicle and the trusted authority, an efficient key updating method is proposed, which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security. Secondly, by introducing blockchain and using smart contracts to load the vehicle public key table for key management, this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles. Finally, the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks. Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation.
Researchers have recently achieved significant advances in deep learning techniques, which in turn has substantially advanced other research disciplines, such as natural language processing, image processing, speech r...
详细信息
Researchers have recently achieved significant advances in deep learning techniques, which in turn has substantially advanced other research disciplines, such as natural language processing, image processing, speech recognition, and software engineering. Various deep learning techniques have been successfully employed to facilitate software engineering tasks, including code generation, software refactoring, and fault localization. Many studies have also been presented in top conferences and journals, demonstrating the applications of deep learning techniques in resolving various software engineering tasks. However,although several surveys have provided overall pictures of the application of deep learning techniques in software engineering,they focus more on learning techniques, that is, what kind of deep learning techniques are employed and how deep models are trained or fine-tuned for software engineering tasks. We still lack surveys explaining the advances of subareas in software engineering driven by deep learning techniques, as well as challenges and opportunities in each subarea. To this end, in this study, we present the first task-oriented survey on deep learning-based software engineering. It covers twelve major software engineering subareas significantly impacted by deep learning techniques. Such subareas spread out through the whole lifecycle of software development and maintenance, including requirements engineering, software development, testing, maintenance, and developer collaboration. As we believe that deep learning may provide an opportunity to revolutionize the whole discipline of software engineering, providing one survey covering as many subareas as possible in software engineering can help future research push forward the frontier of deep learning-based software engineering more systematically. For each of the selected subareas,we highlight the major advances achieved by applying deep learning techniques with pointers to the available datasets i
暂无评论