首页 > 最新文献

IEEE Transactions on Emerging Topics in Computing最新文献

英文 中文
Enhancing Neural Architecture Search With Multiple Hardware Constraints for Deep Learning Model Deployment on Tiny IoT Devices 利用多种硬件限制增强神经架构搜索,以便在微型物联网设备上部署深度学习模型
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-10 DOI: 10.1109/TETC.2023.3322033
Alessio Burrello;Matteo Risso;Beatrice Alessandra Motetti;Enrico Macii;Luca Benini;Daniele Jahier Pagliari
The rapid proliferation of computing domains relying on Internet of Things (IoT) devices has created a pressing need for efficient and accurate deep-learning (DL) models that can run on low-power devices. However, traditional DL models tend to be too complex and computationally intensive for typical IoT end-nodes. To address this challenge, Neural Architecture Search (NAS) has emerged as a popular design automation technique for co-optimizing the accuracy and complexity of deep neural networks. Nevertheless, existing NAS techniques require many iterations to produce a network that adheres to specific hardware constraints, such as the maximum memory available on the hardware or the maximum latency allowed by the target application. In this work, we propose a novel approach to incorporate multiple constraints into so-called Differentiable NAS optimization methods, which allows the generation, in a single shot, of a model that respects user-defined constraints on both memory and latency in a time comparable to a single standard training. The proposed approach is evaluated on five IoT-relevant benchmarks, including the MLPerf Tiny suite and Tiny ImageNet, demonstrating that, with a single search, it is possible to reduce memory and latency by 87.4% and 54.2%, respectively (as defined by our targets), while ensuring non-inferior accuracy on state-of-the-art hand-tuned deep neural networks for TinyML.
依赖于物联网(IoT)设备的计算领域迅速激增,因此迫切需要能够在低功耗设备上运行的高效、准确的深度学习(DL)模型。然而,对于典型的物联网终端节点来说,传统的深度学习模型往往过于复杂和计算密集。为了应对这一挑战,神经架构搜索(NAS)已成为一种流行的设计自动化技术,用于共同优化深度神经网络的准确性和复杂性。然而,现有的 NAS 技术需要多次迭代才能生成符合特定硬件约束条件的网络,例如硬件可用的最大内存或目标应用允许的最大延迟。在这项工作中,我们提出了一种新方法,将多个约束条件纳入所谓的可微分 NAS 优化方法中,这样就能在与单次标准训练相当的时间内,一次性生成一个遵守用户定义的内存和延迟约束条件的模型。我们在五个物联网相关基准(包括 MLPerf Tiny 套件和 Tiny ImageNet)上对所提出的方法进行了评估,结果表明,只需一次搜索,就能将内存和延迟分别减少 87.4% 和 54.2%(根据我们的目标定义),同时确保 TinyML 的最先进手工调谐深度神经网络的准确性毫不逊色。
{"title":"Enhancing Neural Architecture Search With Multiple Hardware Constraints for Deep Learning Model Deployment on Tiny IoT Devices","authors":"Alessio Burrello;Matteo Risso;Beatrice Alessandra Motetti;Enrico Macii;Luca Benini;Daniele Jahier Pagliari","doi":"10.1109/TETC.2023.3322033","DOIUrl":"10.1109/TETC.2023.3322033","url":null,"abstract":"The rapid proliferation of computing domains relying on Internet of Things (IoT) devices has created a pressing need for efficient and accurate deep-learning (DL) models that can run on low-power devices. However, traditional DL models tend to be too complex and computationally intensive for typical IoT end-nodes. To address this challenge, Neural Architecture Search (NAS) has emerged as a popular design automation technique for co-optimizing the accuracy and complexity of deep neural networks. Nevertheless, existing NAS techniques require many iterations to produce a network that adheres to specific hardware constraints, such as the maximum memory available on the hardware or the maximum latency allowed by the target application. In this work, we propose a novel approach to incorporate multiple constraints into so-called Differentiable NAS optimization methods, which allows the generation, in a single shot, of a model that respects user-defined constraints on both memory and latency in a time comparable to a single standard training. The proposed approach is evaluated on five IoT-relevant benchmarks, including the MLPerf Tiny suite and Tiny ImageNet, demonstrating that, with a single search, it is possible to reduce memory and latency by 87.4% and 54.2%, respectively (as defined by our targets), while ensuring non-inferior accuracy on state-of-the-art hand-tuned deep neural networks for TinyML.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 3","pages":"780-794"},"PeriodicalIF":5.1,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136207718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Chaotic Maps-Based Privacy-Preserving Distributed Deep Learning for Incomplete and Non-IID Datasets 基于混沌图的不完整和非 IID 数据集隐私保护分布式深度学习
IF 5.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-05 DOI: 10.1109/TETC.2023.3320758
Irina Arévalo;Jose L. Salmeron
Federated Learning is a machine learning approach that enables the training of a deep learning model among several participants with sensitive data that wish to share their own knowledge without compromising the privacy of their data. In this research, the authors employ a secured Federated Learning method with an additional layer of privacy and proposes a method for addressing the non-IID challenge. Moreover, differential privacy is compared with chaotic-based encryption as layer of privacy. The experimental approach assesses the performance of the federated deep learning model with differential privacy using both IID and non-IID data. In each experiment, the Federated Learning process improves the average performance metrics of the deep neural network, even in the case of non-IID data.
Federated Learning 是一种机器学习方法,它可以在多个拥有敏感数据的参与者之间训练深度学习模型,这些参与者希望在不损害其数据隐私的情况下分享自己的知识。在这项研究中,作者采用了一种具有额外隐私层的安全联邦学习方法,并提出了一种应对非 IID 挑战的方法。此外,还将差分隐私与混沌加密作为隐私层进行了比较。实验方法使用 IID 和非 IID 数据评估了具有差分隐私的联合深度学习模型的性能。在每个实验中,联合学习过程都提高了深度神经网络的平均性能指标,即使在非 IID 数据的情况下也是如此。
{"title":"A Chaotic Maps-Based Privacy-Preserving Distributed Deep Learning for Incomplete and Non-IID Datasets","authors":"Irina Arévalo;Jose L. Salmeron","doi":"10.1109/TETC.2023.3320758","DOIUrl":"10.1109/TETC.2023.3320758","url":null,"abstract":"Federated Learning is a machine learning approach that enables the training of a deep learning model among several participants with sensitive data that wish to share their own knowledge without compromising the privacy of their data. In this research, the authors employ a secured Federated Learning method with an additional layer of privacy and proposes a method for addressing the non-IID challenge. Moreover, differential privacy is compared with chaotic-based encryption as layer of privacy. The experimental approach assesses the performance of the federated deep learning model with differential privacy using both IID and non-IID data. In each experiment, the Federated Learning process improves the average performance metrics of the deep neural network, even in the case of non-IID data.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 1","pages":"357-367"},"PeriodicalIF":5.9,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136002626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Memristive Crossbar Array-Based Adversarial Defense Using Compression 使用压缩技术的基于内存交叉条阵列的对抗性防御
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-03 DOI: 10.1109/TETC.2023.3319659
Bijay Raj Paudel;Spyros Tragoudas
This article shows that Memristive Crossbar Array (MCA)-based neuromorphic architectures provide a robust defense against adversarial attacks due to the stochastic behavior of memristors. Furthermore, it shows that adversarial robustness can be further improved by compression-based preprocessing steps that can be implemented on MCAs. It also evaluates the effect of inter-chip process variations on adversarial robustness using the proposed MCA implementation and studies the effect of on-chip training. It shows that adversarial attacks do not uniformly affect the classification accuracy of different chips. Experimental evidence using a variety of datasets and attack models supports the impact of MCA-based neuromorphic architectures and compression-based preprocessing implemented using MCA on defending against adversarial attacks. It is also experimentally shown that the on-chip training results in high resiliency to adversarial attacks in all chips.
本文表明,由于忆阻器的随机行为,基于忆阻器交叉条阵列(MCA)的神经形态架构可提供对对抗性攻击的稳健防御。此外,它还表明,通过在 MCA 上实施基于压缩的预处理步骤,可以进一步提高对抗鲁棒性。它还评估了芯片间工艺变化对使用拟议的 MCA 实现对抗鲁棒性的影响,并研究了片上训练的效果。研究表明,对抗性攻击对不同芯片分类准确性的影响并不一致。使用各种数据集和攻击模型进行的实验证明,基于 MCA 的神经形态架构和使用 MCA 实现的基于压缩的预处理对抵御对抗性攻击有影响。实验还表明,片上训练使所有芯片都能很好地抵御对抗性攻击。
{"title":"Memristive Crossbar Array-Based Adversarial Defense Using Compression","authors":"Bijay Raj Paudel;Spyros Tragoudas","doi":"10.1109/TETC.2023.3319659","DOIUrl":"10.1109/TETC.2023.3319659","url":null,"abstract":"This article shows that Memristive Crossbar Array (MCA)-based neuromorphic architectures provide a robust defense against adversarial attacks due to the stochastic behavior of memristors. Furthermore, it shows that adversarial robustness can be further improved by compression-based preprocessing steps that can be implemented on MCAs. It also evaluates the effect of inter-chip process variations on adversarial robustness using the proposed MCA implementation and studies the effect of on-chip training. It shows that adversarial attacks do not uniformly affect the classification accuracy of different chips. Experimental evidence using a variety of datasets and attack models supports the impact of MCA-based neuromorphic architectures and compression-based preprocessing implemented using MCA on defending against adversarial attacks. It is also experimentally shown that the on-chip training results in high resiliency to adversarial attacks in all chips.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 3","pages":"864-877"},"PeriodicalIF":5.1,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135914085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scheduling Coflows by Online Identification in Data Center Network 在数据中心网络中通过在线识别调度同向流量
IF 5.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-29 DOI: 10.1109/TETC.2023.3315512
Chang Ruan;Jianxin Wang;Wanchun Jiang;Tao Zhang
Recently, many scheduling schemes leverage coflows to improve the communication performance of jobs in distributed application frameworks deployed in data center networks, such as MapReduce and Spark. Most of them require application modification to obtain the coflow information such as the coflow ID. The latest work CODA suggests non-intrusively extracting coflow information via an identification method. However, the method depends on the historical traffic information, which may cause the identification accuracy to decrease a lot when traffic varies. To tackle the problem, we present SOCI for Scheduling coflows by the Online Coflow Identification. By observing that flows in a coflow typically communicate with a master process for starting and ending in the up-to-date distributed application frameworks, SOCI uses this characteristic for the online coflow identification. Given identification errors are inevitable, the coflow scheduler in SOCI adopts a Selectively Late Binding (SLB) mechanism, which associates the misclassified flows with coflows according to the estimation on the impact of this association on the average Coflow Completion Time (CCT). The trace-driven simulations show that SOCI can reduce CCT by up to $1.23times$ compared to CODA when the identification accuracy decreases and is comparable to schemes without coflow identification.
最近,许多调度方案利用协流来提高部署在数据中心网络中的分布式应用框架(如 MapReduce 和 Spark)中作业的通信性能。其中大多数方案都需要对应用程序进行修改,以获取协流 ID 等协流信息。最新研究成果 CODA 建议通过识别方法非侵入式地提取协流信息。然而,这种方法依赖于历史流量信息,当流量发生变化时,识别准确率可能会大大降低。为了解决这个问题,我们提出了通过在线共流识别来调度共流的 SOCI 方法。在最新的分布式应用框架中,共同流中的流通常会与主进程通信,以开始和结束共同流,SOCI 利用这一特性进行在线共同流识别。鉴于识别错误在所难免,SOCI 中的协流调度器采用了选择性延迟绑定(SLB)机制,根据这种关联对平均协流完成时间(CCT)影响的估计,将分类错误的流与协流关联起来。轨迹驱动仿真表明,当识别准确率降低时,SOCI 与 CODA 相比可将 CCT 减少多达 1.23 美元/次,与不识别同向流的方案相当。
{"title":"Scheduling Coflows by Online Identification in Data Center Network","authors":"Chang Ruan;Jianxin Wang;Wanchun Jiang;Tao Zhang","doi":"10.1109/TETC.2023.3315512","DOIUrl":"10.1109/TETC.2023.3315512","url":null,"abstract":"Recently, many scheduling schemes leverage coflows to improve the communication performance of jobs in distributed application frameworks deployed in data center networks, such as MapReduce and Spark. Most of them require application modification to obtain the coflow information such as the coflow ID. The latest work CODA suggests non-intrusively extracting coflow information via an identification method. However, the method depends on the historical traffic information, which may cause the identification accuracy to decrease a lot when traffic varies. To tackle the problem, we present SOCI for Scheduling coflows by the Online Coflow Identification. By observing that flows in a coflow typically communicate with a master process for starting and ending in the up-to-date distributed application frameworks, SOCI uses this characteristic for the online coflow identification. Given identification errors are inevitable, the coflow scheduler in SOCI adopts a Selectively Late Binding (SLB) mechanism, which associates the misclassified flows with coflows according to the estimation on the impact of this association on the average Coflow Completion Time (CCT). The trace-driven simulations show that SOCI can reduce CCT by up to \u0000<inline-formula><tex-math>$1.23times$</tex-math></inline-formula>\u0000 compared to CODA when the identification accuracy decreases and is comparable to schemes without coflow identification.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"11 4","pages":"1057-1069"},"PeriodicalIF":5.9,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135843617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Memristive Crossbar Array-Based Computing Framework via DWT for Biomedical Image Enhancement 通过 DWT 增强生物医学图像的基于 Memristive Crossbar 阵列的计算框架
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-28 DOI: 10.1109/TETC.2023.3318303
Kumari Jyoti;Mohit Kumar Gautam;Sanjay Kumar;Sai Sushma;Ram Bilas Pachori;Shaibal Mukherjee
Here, we report the fabrication of Y2O3-based memristive crossbar array (MCA) by utilizing dual ion beam sputtering system, which shows high cyclic stability in the resistive switching behavior. Further, the obtained experimental results are validated with an analytical MCA based model, which exhibits extremely well fitting with the corresponding experimental data. Moreover, the experimentally validated analytical model is further used for biomedical image analysis, specifically computed tomography (CT) scan and magnetic resonance imaging (MRI) images by utilizing the 2-dimensional image decomposition technique. The different levels of decomposition are used for different threshold values which help to analyze the quality of the reconstructed image in terms of peak signal-to-noise ratio, structural similarity index and mean square error. For the MRI and CT scan images, at the first decomposition level, the data compression ratio of 21.01%, and 47.81% with Haar and 18.82%, and 46.05% with biorthogonal wavelet are obtained. Furthermore, the impact of brightness is also analyzed which shows a sufficient increment in the quality of output image by 103.72% and 18.59% for CT scan and MRI image, respectively for Haar wavelet. The proposed MCA based model for image processing is a novel approach to reduce the computation time and storage for biomedical engineering.
在此,我们报告了利用双离子束溅射系统制造出的基于 Y2O3 的忆阻性横杆阵列(MCA),该阵列在电阻开关行为方面表现出很高的周期稳定性。此外,获得的实验结果与基于 MCA 的分析模型进行了验证,该模型与相应的实验数据具有极高的拟合度。此外,经实验验证的分析模型还被进一步用于生物医学图像分析,特别是利用二维图像分解技术对计算机断层扫描(CT)和磁共振成像(MRI)图像进行分析。不同的分解级别采用不同的阈值,这有助于从峰值信噪比、结构相似性指数和均方误差等方面分析重建图像的质量。对于核磁共振成像和 CT 扫描图像,在第一级分解时,Haar 小波的数据压缩率分别为 21.01% 和 47.81%,而 Biorthogonal 小波的数据压缩率分别为 18.82% 和 46.05%。此外,还分析了亮度的影响,结果表明,对于 CT 扫描和 MRI 图像,Haar 小波的输出图像质量分别提高了 103.72% 和 18.59%。所提出的基于 MCA 的图像处理模型是一种减少生物医学工程计算时间和存储空间的新方法。
{"title":"Memristive Crossbar Array-Based Computing Framework via DWT for Biomedical Image Enhancement","authors":"Kumari Jyoti;Mohit Kumar Gautam;Sanjay Kumar;Sai Sushma;Ram Bilas Pachori;Shaibal Mukherjee","doi":"10.1109/TETC.2023.3318303","DOIUrl":"10.1109/TETC.2023.3318303","url":null,"abstract":"Here, we report the fabrication of Y\u0000<sub>2</sub>\u0000O\u0000<sub>3</sub>\u0000-based memristive crossbar array (MCA) by utilizing dual ion beam sputtering system, which shows high cyclic stability in the resistive switching behavior. Further, the obtained experimental results are validated with an analytical MCA based model, which exhibits extremely well fitting with the corresponding experimental data. Moreover, the experimentally validated analytical model is further used for biomedical image analysis, specifically computed tomography (CT) scan and magnetic resonance imaging (MRI) images by utilizing the 2-dimensional image decomposition technique. The different levels of decomposition are used for different threshold values which help to analyze the quality of the reconstructed image in terms of peak signal-to-noise ratio, structural similarity index and mean square error. For the MRI and CT scan images, at the first decomposition level, the data compression ratio of 21.01%, and 47.81% with Haar and 18.82%, and 46.05% with biorthogonal wavelet are obtained. Furthermore, the impact of brightness is also analyzed which shows a sufficient increment in the quality of output image by 103.72% and 18.59% for CT scan and MRI image, respectively for Haar wavelet. The proposed MCA based model for image processing is a novel approach to reduce the computation time and storage for biomedical engineering.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 3","pages":"766-779"},"PeriodicalIF":5.1,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135800896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Privacy Enforcing Framework for Data Streams on the Edge 边缘数据流隐私保护框架
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-27 DOI: 10.1109/TETC.2023.3315131
Boris Sedlak;Ilir Murturi;Praveen Kumar Donta;Schahram Dustdar
Recent developments in machine learning (ML) allow for efficient data stream processing and also help in meeting various privacy requirements. Traditionally, predefined privacy policies are enforced in resource-rich and homogeneous environments such as in the cloud to protect sensitive information from being exposed. However, large amounts of data streams generated from heterogeneous IoT devices often result in high computational costs, cause network latency, and increase the chance of data interruption as data travels away from the source. Therefore, this article proposes a novel privacy-enforcing framework for transforming data streams by executing various privacy policies close to the data source. To achieve our proposed framework, we enable domain experts to specify high-level privacy policies in a human-readable form. Then, the edge-based runtime system analyzes data streams (i.e., generated from nearby IoT devices), interprets privacy policies (i.e., deployed on edge devices), and transforms data streams if privacy violations occur. Our proposed runtime mechanism uses a Deep Neural Networks (DNN) technique to detect privacy violations within the streamed data. Furthermore, we discuss the framework, processes of the approach, and the experiments carried out on a real-world testbed to validate its feasibility and applicability.
机器学习(ML)的最新发展使高效数据流处理成为可能,同时也有助于满足各种隐私要求。传统上,预定义的隐私策略在资源丰富的同构环境(如云环境)中执行,以保护敏感信息不被暴露。然而,从异构物联网设备生成的大量数据流通常会导致高昂的计算成本,造成网络延迟,并在数据远离源头时增加数据中断的几率。因此,本文提出了一种新颖的隐私强制框架,通过在数据源附近执行各种隐私策略来转换数据流。为了实现我们提出的框架,我们让领域专家以人类可读的形式指定高级隐私策略。然后,基于边缘的运行时系统分析数据流(即从附近的物联网设备生成的数据流),解释隐私策略(即部署在边缘设备上的隐私策略),并在发生隐私侵犯时转换数据流。我们提出的运行时机制使用深度神经网络(DNN)技术检测数据流中的隐私侵犯行为。此外,我们还讨论了该方法的框架、流程以及在真实世界测试平台上进行的实验,以验证其可行性和适用性。
{"title":"A Privacy Enforcing Framework for Data Streams on the Edge","authors":"Boris Sedlak;Ilir Murturi;Praveen Kumar Donta;Schahram Dustdar","doi":"10.1109/TETC.2023.3315131","DOIUrl":"10.1109/TETC.2023.3315131","url":null,"abstract":"Recent developments in machine learning (ML) allow for efficient data stream processing and also help in meeting various privacy requirements. Traditionally, predefined privacy policies are enforced in resource-rich and homogeneous environments such as in the cloud to protect sensitive information from being exposed. However, large amounts of data streams generated from heterogeneous IoT devices often result in high computational costs, cause network latency, and increase the chance of data interruption as data travels away from the source. Therefore, this article proposes a novel privacy-enforcing framework for transforming data streams by executing various privacy policies close to the data source. To achieve our proposed framework, we enable domain experts to specify high-level privacy policies in a human-readable form. Then, the edge-based runtime system analyzes data streams (i.e., generated from nearby IoT devices), interprets privacy policies (i.e., deployed on edge devices), and transforms data streams if privacy violations occur. Our proposed runtime mechanism uses a Deep Neural Networks (DNN) technique to detect privacy violations within the streamed data. Furthermore, we discuss the framework, processes of the approach, and the experiments carried out on a real-world testbed to validate its feasibility and applicability.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 3","pages":"852-863"},"PeriodicalIF":5.1,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135793727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quadtree-Based Adaptive Spatial Decomposition for Range Queries Under Local Differential Privacy 基于四叉树的自适应空间分解,用于局部差分隐私下的范围查询
IF 5.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-26 DOI: 10.1109/TETC.2023.3317393
Huiwei Wang;Yaqian Huang;Huaqing Li
Nowadays, researchers have shown significant interest in geographic location-based spatial data analysis due to its wide range of application scenarios. However, the accuracy of the grid-based quadtree range query (GT-R) algorithm, which utilizes the uniform grid method to divide the data space, is compromised by the excessive noise introduced in the divided area. In addition, the private adaptive grid (PrivAG) algorithm does not adopt any index structure, which leads to inefficient query. To address above issues, this paper presents the Quadtree-based Adaptive Spatial Decomposition (ASDQT) algorithm. ASDQT leverages reservoir sampling technology under local differential privacy (LDP) to extract spatial data as the segmentation object. By setting a reasonable threshold, ASDQT dynamically constructs the tree structure, enabling coarse-grained division of sparse regions and fine-grained division of dense regions. Extensive experiments conducted on two real-world datasets demonstrate the efficacy of ASDQT in handling large-scale spatial datasets with different distributions. The results indicate that ASDQT outperforms existing methods in terms of both accuracy and running efficiency.
如今,基于地理位置的空间数据分析因其广泛的应用场景而备受研究人员关注。然而,利用均匀网格法划分数据空间的基于网格的四叉树范围查询(GT-R)算法,由于划分区域中引入了过多噪声,其准确性大打折扣。此外,私有自适应网格(PrivAG)算法没有采用任何索引结构,导致查询效率低下。为解决上述问题,本文提出了基于四叉树的自适应空间分解(ASDQT)算法。ASDQT 利用局部差分隐私(LDP)下的水库采样技术提取空间数据作为分割对象。通过设置合理的阈值,ASDQT 可动态构建树形结构,实现稀疏区域的粗粒度分割和密集区域的细粒度分割。在两个实际数据集上进行的广泛实验证明了 ASDQT 在处理具有不同分布的大规模空间数据集时的功效。结果表明,ASDQT 在准确性和运行效率方面都优于现有方法。
{"title":"Quadtree-Based Adaptive Spatial Decomposition for Range Queries Under Local Differential Privacy","authors":"Huiwei Wang;Yaqian Huang;Huaqing Li","doi":"10.1109/TETC.2023.3317393","DOIUrl":"10.1109/TETC.2023.3317393","url":null,"abstract":"Nowadays, researchers have shown significant interest in geographic location-based spatial data analysis due to its wide range of application scenarios. However, the accuracy of the grid-based quadtree range query (GT-R) algorithm, which utilizes the uniform grid method to divide the data space, is compromised by the excessive noise introduced in the divided area. In addition, the private adaptive grid (PrivAG) algorithm does not adopt any index structure, which leads to inefficient query. To address above issues, this paper presents the Quadtree-based Adaptive Spatial Decomposition (ASDQT) algorithm. ASDQT leverages reservoir sampling technology under local differential privacy (LDP) to extract spatial data as the segmentation object. By setting a reasonable threshold, ASDQT dynamically constructs the tree structure, enabling coarse-grained division of sparse regions and fine-grained division of dense regions. Extensive experiments conducted on two real-world datasets demonstrate the efficacy of ASDQT in handling large-scale spatial datasets with different distributions. The results indicate that ASDQT outperforms existing methods in terms of both accuracy and running efficiency.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"11 4","pages":"1045-1056"},"PeriodicalIF":5.9,"publicationDate":"2023-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135755255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two Double-Node-Upset-Hardened Flip-Flop Designs for High-Performance Applications 面向高性能应用的两种双节点升位硬化触发器设计
IF 5.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-25 DOI: 10.1109/TETC.2023.3317070
Aibin Yan;Aoran Cao;Zhengfeng Huang;Jie Cui;Tianming Ni;Patrick Girard;Xiaoqing Wen;Jiliang Zhang
The continuous advancement of complementary metal-oxide-semiconductor technologies makes flip-flops (FFs) vulnerable to soft errors. Single-node upsets (SNUs), as well as double-node upsets (DNUs), are typical soft errors. This article proposes two radiation-hardened FF designs, namely DNU-tolerant FF (DUT-FF) and DNU-recoverable FF (DUR-FF). First, the DUT-FF which mainly consists of four dual-interlocked-storage-cells (DICEs) and three 2-input C-elements, is proposed. Then, to provide complete self-recovery from DNUs, the DUR-FF which mainly uses six interlocked DICEs is proposed. They have the following advantages: 1) They can completely protect against SNUs as well as DNUs; 2) the DUT-FF is cost-effective but the DUR-FF can provide complete self-recovery from any DNU. Simulations show the complete SNU/DNU tolerance of DUT-FF and the complete SNU/DNU self-recovery of DUR-FF but at the cost of indispensable area overhead when compared to the SNU hardened FFs. Besides, compared to the FFs of the same-type, the proposed FFs achieve a low delay making them suitable for high-performance applications.
互补金属氧化物半导体技术的不断进步使得触发器(FF)很容易受到软误差的影响。单节点中断(SNU)和双节点中断(DNU)是典型的软误差。本文提出了两种抗辐射的 FF 设计,即 DNU 耐受 FF(DUT-FF)和 DNU 可恢复 FF(DUR-FF)。首先,提出了主要由四个双互锁存储单元(DICE)和三个双输入 C 元件组成的 DUT-FF。然后,为了提供 DNU 的完全自我恢复,提出了主要使用六个互锁 DICE 的 DUR-FF。它们具有以下优点1) 它们可以完全防止 SNU 和 DNU;2) DUT-FF 具有成本效益,但 DUR-FF 可以从任何 DNU 中提供完全的自我恢复。仿真结果表明,DUT-FF 具有完全的 SNU/DNU 耐受能力,DUR-FF 具有完全的 SNU/DNU 自我恢复能力,但与 SNU 加固型 FF 相比,DUT-FF 要以不可或缺的面积开销为代价。此外,与同类 FF 相比,所提出的 FF 具有较低的延迟,适合高性能应用。
{"title":"Two Double-Node-Upset-Hardened Flip-Flop Designs for High-Performance Applications","authors":"Aibin Yan;Aoran Cao;Zhengfeng Huang;Jie Cui;Tianming Ni;Patrick Girard;Xiaoqing Wen;Jiliang Zhang","doi":"10.1109/TETC.2023.3317070","DOIUrl":"10.1109/TETC.2023.3317070","url":null,"abstract":"The continuous advancement of complementary metal-oxide-semiconductor technologies makes flip-flops (FFs) vulnerable to soft errors. Single-node upsets (SNUs), as well as double-node upsets (DNUs), are typical soft errors. This article proposes two radiation-hardened FF designs, namely DNU-tolerant FF (DUT-FF) and DNU-recoverable FF (DUR-FF). First, the DUT-FF which mainly consists of four dual-interlocked-storage-cells (DICEs) and three 2-input C-elements, is proposed. Then, to provide complete self-recovery from DNUs, the DUR-FF which mainly uses six interlocked DICEs is proposed. They have the following advantages: 1) They can completely protect against SNUs as well as DNUs; 2) the DUT-FF is cost-effective but the DUR-FF can provide complete self-recovery from any DNU. Simulations show the complete SNU/DNU tolerance of DUT-FF and the complete SNU/DNU self-recovery of DUR-FF but at the cost of indispensable area overhead when compared to the SNU hardened FFs. Besides, compared to the FFs of the same-type, the proposed FFs achieve a low delay making them suitable for high-performance applications.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"11 4","pages":"1070-1081"},"PeriodicalIF":5.9,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135699691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geometric Deep Learning Strategies for the Characterization of Academic Collaboration Networks 表征学术协作网络的几何深度学习策略
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22 DOI: 10.1109/TETC.2023.3315954
Daniele Pretolesi;Davide Garbarino;Daniele Giampaoli;Andrea Vian;Annalisa Barla
This paper examines how geometric deep learning techniques may be employed to analyze academic collaboration networks (ACNs) and how using textual information drawn from publications improves the overall performance of the system. The proposed experimental pipeline was used to analyze the collaboration network of the Machine Learning Genoa Center (MaLGa) research group. First, we find the optimal method for embedding the input data graph and extracting meaningful keywords for the available publications. We then use Graph Neural Networks (GNN) for node type and research topic classification. Finally, we explore how the resulting corpus can be used to create a recommender system for optimal navigation of the ACN. Our results show that the GNN-based recommender system achieved high accuracy in suggesting unexplored nodes to users. Overall, this study demonstrates the potential for using geometric deep learning and Natural Language Processing (NLP) to best represent the scientific production of ACNs. In the future, we plan to incorporate the temporal nature of the data and navigation statistics of users exploring the graph as additional input for the recommender system.
本文探讨了如何利用几何深度学习技术来分析学术协作网络(ACN),以及利用从出版物中提取的文本信息如何提高系统的整体性能。提出的实验管道被用于分析热那亚机器学习中心(MaLGa)研究小组的协作网络。首先,我们找到了嵌入输入数据图并为可用出版物提取有意义关键词的最佳方法。然后,我们使用图神经网络(GNN)进行节点类型和研究主题分类。最后,我们探讨了如何利用由此产生的语料库创建一个推荐系统,以优化 ACN 的导航。我们的研究结果表明,基于 GNN 的推荐系统在向用户推荐未探索节点方面取得了很高的准确率。总之,这项研究展示了使用几何深度学习和自然语言处理(NLP)来最好地表现 ACN 的科学生产的潜力。未来,我们计划将数据的时间性和用户探索图的导航统计作为推荐系统的额外输入。
{"title":"Geometric Deep Learning Strategies for the Characterization of Academic Collaboration Networks","authors":"Daniele Pretolesi;Davide Garbarino;Daniele Giampaoli;Andrea Vian;Annalisa Barla","doi":"10.1109/TETC.2023.3315954","DOIUrl":"10.1109/TETC.2023.3315954","url":null,"abstract":"This paper examines how geometric deep learning techniques may be employed to analyze academic collaboration networks (ACNs) and how using textual information drawn from publications improves the overall performance of the system. The proposed experimental pipeline was used to analyze the collaboration network of the Machine Learning Genoa Center (MaLGa) research group. First, we find the optimal method for embedding the input data graph and extracting meaningful keywords for the available publications. We then use Graph Neural Networks (GNN) for node type and research topic classification. Finally, we explore how the resulting corpus can be used to create a recommender system for optimal navigation of the ACN. Our results show that the GNN-based recommender system achieved high accuracy in suggesting unexplored nodes to users. Overall, this study demonstrates the potential for using geometric deep learning and Natural Language Processing (NLP) to best represent the scientific production of ACNs. In the future, we plan to incorporate the temporal nature of the data and navigation statistics of users exploring the graph as additional input for the recommender system.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 3","pages":"840-851"},"PeriodicalIF":5.1,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135599193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Attacks Assessment of Salient Object Detection via Symbolic Learning 通过符号学习评估突出物体检测的对抗性攻击
IF 5.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22 DOI: 10.1109/TETC.2023.3316549
Gustavo Olague;Roberto Pineda;Gerardo Ibarra-Vazquez;Matthieu Olague;Axel Martinez;Sambit Bakshi;Jonathan Vargas;Isnardo Reducindo
Machine learning is at the center of mainstream technology and outperforms classical approaches to handcrafted feature design. Aside from its learning process for artificial feature extraction, it has an end-to-end paradigm from input to output, reaching outstandingly accurate results. However, security concerns about its robustness to malicious and imperceptible perturbations have drawn attention since its prediction can be changed entirely. Salient object detection is a research area where deep convolutional neural networks have proven effective but whose trustworthiness represents a significant issue requiring analysis and solutions to hackers’ attacks. Brain programming is a kind of symbolic learning in the vein of good old-fashioned artificial intelligence. This work provides evidence that symbolic learning robustness is crucial in designing reliable visual attention systems since it can withstand even the most intense perturbations. We test this evolutionary computation methodology against several adversarial attacks and noise perturbations using standard databases and a real-world problem of a shorebird called the Snowy Plover portraying a visual attention task. We compare our methodology with five different deep learning approaches, proving that they do not match the symbolic paradigm regarding robustness. All neural networks suffer significant performance losses, while brain programming stands its ground and remains unaffected. Also, by studying the Snowy Plover, we remark on the importance of security in surveillance activities regarding wildlife protection and conservation.
机器学习是主流技术的核心,它优于传统的手工特征设计方法。除了人工特征提取的学习过程外,机器学习还具有从输入到输出的端到端范式,可获得出色的精确结果。然而,由于它的预测可以完全改变,因此它对恶意和不易察觉的扰动的鲁棒性引起了安全方面的关注。突出物体检测是深度卷积神经网络已被证明有效的一个研究领域,但其可信度是一个重大问题,需要分析和解决黑客攻击。大脑编程是一种与传统人工智能一脉相承的符号学习。这项研究证明,符号学习的鲁棒性对设计可靠的视觉注意力系统至关重要,因为它甚至可以承受最强烈的干扰。我们使用标准数据库和现实世界中描绘视觉注意力任务的雪鸻岸鸟问题,测试了这种进化计算方法是否能抵御几种对抗性攻击和噪声扰动。我们将我们的方法与五种不同的深度学习方法进行了比较,证明它们在鲁棒性方面与符号范式并不匹配。所有神经网络的性能都有明显下降,而大脑编程却能站稳脚跟,不受影响。此外,通过研究雪鸻,我们还指出了野生动物保护和保育监控活动中安全的重要性。
{"title":"Adversarial Attacks Assessment of Salient Object Detection via Symbolic Learning","authors":"Gustavo Olague;Roberto Pineda;Gerardo Ibarra-Vazquez;Matthieu Olague;Axel Martinez;Sambit Bakshi;Jonathan Vargas;Isnardo Reducindo","doi":"10.1109/TETC.2023.3316549","DOIUrl":"10.1109/TETC.2023.3316549","url":null,"abstract":"Machine learning is at the center of mainstream technology and outperforms classical approaches to handcrafted feature design. Aside from its learning process for artificial feature extraction, it has an end-to-end paradigm from input to output, reaching outstandingly accurate results. However, security concerns about its robustness to malicious and imperceptible perturbations have drawn attention since its prediction can be changed entirely. Salient object detection is a research area where deep convolutional neural networks have proven effective but whose trustworthiness represents a significant issue requiring analysis and solutions to hackers’ attacks. Brain programming is a kind of symbolic learning in the vein of good old-fashioned artificial intelligence. This work provides evidence that symbolic learning robustness is crucial in designing reliable visual attention systems since it can withstand even the most intense perturbations. We test this evolutionary computation methodology against several adversarial attacks and noise perturbations using standard databases and a real-world problem of a shorebird called the Snowy Plover portraying a visual attention task. We compare our methodology with five different deep learning approaches, proving that they do not match the symbolic paradigm regarding robustness. All neural networks suffer significant performance losses, while brain programming stands its ground and remains unaffected. Also, by studying the Snowy Plover, we remark on the importance of security in surveillance activities regarding wildlife protection and conservation.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"11 4","pages":"1018-1030"},"PeriodicalIF":5.9,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135650408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Emerging Topics in Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1