1,360 research outputs found
Secure Transmission for Relay Wiretap Channels in the Presence of Spatially Random Eavesdroppers
We propose a secure transmission scheme for a relay wiretap channel, where a
source communicates with a destination via a decode-and-forward relay in the
presence of spatially random-distributed eavesdroppers. We assume that the
source is equipped with multiple antennas, whereas the relay, the destination,
and the eavesdroppers are equipped with a single antenna each. In the proposed
scheme, in addition to information signals, the source transmits artificial
noise signals in order to confuse the eavesdroppers. With the target of
maximizing the secrecy throughput of the relay wiretap channel, we derive a
closed-form expression for the transmission outage probability and an
easy-to-compute expression for the secrecy outage probability. Using these
expressions, we determine the optimal power allocation factor and wiretap code
rates that guarantee the maximum secrecy throughput, while satisfying a secrecy
outage probability constraint. Furthermore, we examine the impact of source
antenna number on the secrecy throughput, showing that adding extra transmit
antennas at the source brings about a significant increase in the secrecy
throughput.Comment: 7 pages, 5 figures, accepted by IEEE Globecom 2015 Workshop on
Trusted Communications with Physical Layer Securit
Recurrent Multimodal Interaction for Referring Image Segmentation
In this paper we are interested in the problem of image segmentation given
natural language descriptions, i.e. referring expressions. Existing works
tackle this problem by first modeling images and sentences independently and
then segment images by combining these two types of representations. We argue
that learning word-to-image interaction is more native in the sense of jointly
modeling two modalities for the image segmentation task, and we propose
convolutional multimodal LSTM to encode the sequential interactions between
individual words, visual information, and spatial information. We show that our
proposed model outperforms the baseline model on benchmark datasets. In
addition, we analyze the intermediate output of the proposed multimodal LSTM
approach and empirically explain how this approach enforces a more effective
word-to-image interaction.Comment: To appear in ICCV 2017. See http://www.cs.jhu.edu/~cxliu/ for code
and supplementary materia
Certifiably Robust Reinforcement Learning through Model-Based Abstract Interpretation
We present a reinforcement learning (RL) framework in which the learned
policy comes with a machine-checkable certificate of provable adversarial
robustness. Our approach, called CAROL, learns a model of the environment. In
each learning iteration, it uses the current version of this model and an
external abstract interpreter to construct a differentiable signal for provable
robustness. This signal is used to guide learning, and the abstract
interpretation used to construct it directly leads to the robustness
certificate returned at convergence. We give a theoretical analysis that bounds
the worst-case accumulative reward of CAROL. We also experimentally evaluate
CAROL on four MuJoCo environments with continuous state and action spaces. On
these tasks, CAROL learns policies that, when contrasted with policies from the
state-of-the-art robust RL algorithms, exhibit: (i) markedly enhanced certified
performance lower bounds; and (ii) comparable performance under empirical
adversarial attacks
Predict the Future from the Past? On the Temporal Data Distribution Shift in Financial Sentiment Classifications
Temporal data distribution shift is prevalent in the financial text. How can
a financial sentiment analysis system be trained in a volatile market
environment that can accurately infer sentiment and be robust to temporal data
distribution shifts? In this paper, we conduct an empirical study on the
financial sentiment analysis system under temporal data distribution shifts
using a real-world financial social media dataset that spans three years. We
find that the fine-tuned models suffer from general performance degradation in
the presence of temporal distribution shifts. Furthermore, motivated by the
unique temporal nature of the financial text, we propose a novel method that
combines out-of-distribution detection with time series modeling for temporal
financial sentiment analysis. Experimental results show that the proposed
method enhances the model's capability to adapt to evolving temporal shifts in
a volatile financial market.Comment: EMNLP 2023 main conferenc
Wideband Anti-Jamming Based on Free Space Optical Communication and Photonic Signal Processing
We propose and demonstrate an anti-jamming system to defend against wideband jamming attack. Free space optical communication is deployed to provide a reference for jamming cancellation. The mixed signal is processed and separated with photonic signal processing method to achieve large bandwidth. As an analog signal processing method, the cancellation system introduces zero latency. The radio frequency signals are modulated on optical carriers to achieve wideband and unanimous frequency response. With wideband and zero latency, the system meets the key requirements of high speed and real-time communications in transportation systems
Training and Validation of the Fast PCRTM_Solar Model
In this work, we extended PCRTM to including the contribution from solar radiation, including the nonlocal thermal equilibrium (NLTE) effect
Study on sensible beginning divided-search enhanced Karnik-Mendel algorithms for centroid type-reduction of general type-2 fuzzy logic systems
General type-2 fuzzy logic systems (GT2 FLSs) on the basis of alpha-plane representation of GT2 fuzzy sets (FSs) have attracted considerable attention in recent years. For the kernel type-reduction (TR) block of GT2 FLSs, the enhanced Karnik-Mendel (EKM) algorithm is the most popular approach. This paper proposes the sensible beginning divided-search EKM (SBDEKM) algorithms for completing the centroid TR of GT2 FLSs. Computer simulations are provided to show the performances of the SBDEKM algorithms. Compared with EKM algorithms and sensible beginning EKM (SBEKM) algorithms, the SBDEKM algorithms have almost the same accuracies and better computational efficiency
- …