1,510 research outputs found

    Security enhancement using a novel two-slot cooperative NOMA scheme

    Get PDF
    In this letter, we propose a novel cooperative non-orthogonal multiple access (NOMA) scheme to guarantee the secure transmission of a specific user via two time slots. During the first time slot, the base station (BS) transmits the superimposed signal to the first user and the relay via NOMA. Meanwhile, the signal for the first user is also decoded at the second user from the superimposed signal due to its high transmit power. In the second time slot, the relay forwards the signal to the second user while the BS retransmits the signal for the first user as interference to disrupt the eavesdropping. Due to the fact that the second user has obtained the signal for the first user in the first slot, the interference can be eliminated at the second user. To measure the performance of the proposed cooperative NOMA scheme, the outage probability for the first user and the secrecy outage probability for the second user are analyzed. Simulation results are presented to show the effectiveness of the proposed scheme

    Exploiting Rich Syntactic Information for Semantic Parsing with Graph-to-Sequence Model

    Full text link
    Existing neural semantic parsers mainly utilize a sequence encoder, i.e., a sequential LSTM, to extract word order features while neglecting other valuable syntactic information such as dependency graph or constituent trees. In this paper, we first propose to use the \textit{syntactic graph} to represent three types of syntactic information, i.e., word order, dependency and constituency features. We further employ a graph-to-sequence model to encode the syntactic graph and decode a logical form. Experimental results on benchmark datasets show that our model is comparable to the state-of-the-art on Jobs640, ATIS and Geo880. Experimental results on adversarial examples demonstrate the robustness of the model is also improved by encoding more syntactic information.Comment: EMNLP'1

    Table Search Using a Deep Contextualized Language Model

    Full text link
    Pretrained contextualized language models such as BERT have achieved impressive results on various natural language processing benchmarks. Benefiting from multiple pretraining tasks and large scale training corpora, pretrained models can capture complex syntactic word relations. In this paper, we use the deep contextualized language model BERT for the task of ad hoc table retrieval. We investigate how to encode table content considering the table structure and input length limit of BERT. We also propose an approach that incorporates features from prior literature on table retrieval and jointly trains them with BERT. In experiments on public datasets, we show that our best approach can outperform the previous state-of-the-art method and BERT baselines with a large margin under different evaluation metrics.Comment: Accepted at SIGIR 2020 (Long

    Fuzzy Determination of Target Shifting Time and Torque Control of Shifting Phase for Dry Dual Clutch Transmission

    Get PDF
    Based on the independently developed five-speed dry dual clutch transmission (DDCT), the paper proposes the torque coordinating control strategy between engine and two clutches, which obtains engine speed and clutch transferred torque in the shifting process, adequately reflecting the driver intention and improving the shifting quality. Five-degree-of-freedom (DOF) shifting dynamics model of DDCT with single intermediate shaft is firstly established according to its physical characteristics. Then the quantitative control objectives of the shifting process are presented. The fuzzy decision of shifting time and the model-based torque coordinating control strategy are proposed and also verified by simulating under different driving intentions in up-/downshifting processes with the DCT model established on the MATLAB/Simulink. Simulation results validate that the shifting control algorithm proposed in this paper can not only meet the shifting quality requirements, but also adapt to the various shifting intentions, having a strong robustness

    The Model Inversion Eavesdropping Attack in Semantic Communication Systems

    Full text link
    In recent years, semantic communication has been a popular research topic for its superiority in communication efficiency. As semantic communication relies on deep learning to extract meaning from raw messages, it is vulnerable to attacks targeting deep learning models. In this paper, we introduce the model inversion eavesdropping attack (MIEA) to reveal the risk of privacy leaks in the semantic communication system. In MIEA, the attacker first eavesdrops the signal being transmitted by the semantic communication system and then performs model inversion attack to reconstruct the raw message, where both the white-box and black-box settings are considered. Evaluation results show that MIEA can successfully reconstruct the raw message with good quality under different channel conditions. We then propose a defense method based on random permutation and substitution to defend against MIEA in order to achieve secure semantic communication. Our experimental results demonstrate the effectiveness of the proposed defense method in preventing MIEA.Comment: Accepted by 2023 IEEE Global Communications Conference (GLOBECOM
    • …
    corecore