17,823 results on '"Yang, Kun"'
Search Results
2. Transformers as Game Players: Provable In-context Game-playing Capabilities of Pre-trained Models
- Author
-
Shi, Chengshuai, Yang, Kun, Yang, Jing, and Shen, Cong
- Subjects
Statistics - Machine Learning ,Computer Science - Computer Science and Game Theory ,Computer Science - Information Theory ,Computer Science - Machine Learning ,Computer Science - Multiagent Systems - Abstract
The in-context learning (ICL) capability of pre-trained models based on the transformer architecture has received growing interest in recent years. While theoretical understanding has been obtained for ICL in reinforcement learning (RL), the previous results are largely confined to the single-agent setting. This work proposes to further explore the in-context learning capabilities of pre-trained transformer models in competitive multi-agent games, i.e., in-context game-playing (ICGP). Focusing on the classical two-player zero-sum games, theoretical guarantees are provided to demonstrate that pre-trained transformers can provably learn to approximate Nash equilibrium in an in-context manner for both decentralized and centralized learning settings. As a key part of the proof, constructional results are established to demonstrate that the transformer architecture is sufficiently rich to realize celebrated multi-agent game-playing algorithms, in particular, decentralized V-learning and centralized VI-ULCB., Comment: Accepted to NeurIPS 2024
- Published
- 2024
3. GAI-Enabled Explainable Personalized Federated Semi-Supervised Learning
- Author
-
Peng, Yubo, Jiang, Feibo, Dong, Li, Wang, Kezhi, and Yang, Kun
- Subjects
Computer Science - Machine Learning ,Computer Science - Information Theory - Abstract
Federated learning (FL) is a commonly distributed algorithm for mobile users (MUs) training artificial intelligence (AI) models, however, several challenges arise when applying FL to real-world scenarios, such as label scarcity, non-IID data, and unexplainability. As a result, we propose an explainable personalized FL framework, called XPFL. First, we introduce a generative AI (GAI) assisted personalized federated semi-supervised learning, called GFed. Particularly, in local training, we utilize a GAI model to learn from large unlabeled data and apply knowledge distillation-based semi-supervised learning to train the local FL model using the knowledge acquired from the GAI model. In global aggregation, we obtain the new local FL model by fusing the local and global FL models in specific proportions, allowing each local model to incorporate knowledge from others while preserving its personalized characteristics. Second, we propose an explainable AI mechanism for FL, named XFed. Specifically, in local training, we apply a decision tree to match the input and output of the local FL model. In global aggregation, we utilize t-distributed stochastic neighbor embedding (t-SNE) to visualize the local models before and after aggregation. Finally, simulation results validate the effectiveness of the proposed XPFL framework.
- Published
- 2024
4. Temporal-Assisted Dynamic Beampattern Optimization in Integrated Sensing and Communication Systems
- Author
-
Zhou, Shengcai, Xiang, Luping, and Yang, Kun
- Subjects
Computer Science - Computational Geometry - Abstract
In this paper, an integrated sensing and communication (ISAC) system is investigated. Initially, we introduce a design criterion wherein sensing data acquired from the preceding time slot is employed for instantaneous optimal beamforming in the succeeding time slot, aiming to enhance the communication rate. Subsequently, the development of optimal beamforming is addressed, and a high-caliber suboptimal resolution is derived utilizing successive convex approximation (SCA) techniques combined with the iterative rank minimization (IRM) methodology. Our evaluations, grounded on numerical analyses, reveal that the communication rate of the introduced beamforming strategy surpasses that of conventional omnidirectional sensing and pilot based approaches.
- Published
- 2024
5. A Seesaw Model Attack Algorithm for Distributed Learning
- Author
-
Yang, Kun, Luo, Tianyi, Dong, Yanjie, and Li, Aohan
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
We investigate the Byzantine attack problem within the context of model training in distributed learning systems. While ensuring the convergence of current model training processes, common solvers (e.g. SGD, Adam, RMSProp, etc.) can be easily compromised by malicious nodes in these systems. Consequently, the training process may either converge slowly or even diverge. To develop effective secure distributed learning solvers, it is crucial to first examine attack methods to assess the robustness of these solvers. In this work, we contribute to the design of attack strategies by initially highlighting the limitations of finite-norm attacks. We then introduce the seesaw attack, which has been demonstrated to be more effective than the finite-norm attack. Through numerical experiments, we evaluate the efficacy of the seesaw attack across various gradient aggregation rules., Comment: Accepted for presentation at IEEE SmartIoT 2024
- Published
- 2024
6. Personalized Federated Learning for Generative AI-Assisted Semantic Communications
- Author
-
Peng, Yubo, Jiang, Feibo, Dong, Li, Wang, Kezhi, and Yang, Kun
- Subjects
Computer Science - Machine Learning ,Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Information Theory - Abstract
Semantic Communication (SC) focuses on transmitting only the semantic information rather than the raw data. This approach offers an efficient solution to the issue of spectrum resource utilization caused by the various intelligent applications on Mobile Users (MUs). Generative Artificial Intelligence (GAI) models have recently exhibited remarkable content generation and signal processing capabilities, presenting new opportunities for enhancing SC. Therefore, we propose a GAI-assisted SC (GSC) model deployed between MUs and the Base Station (BS). Then, to train the GSC model using the local data of MUs while ensuring privacy and accommodating heterogeneous requirements of MUs, we introduce Personalized Semantic Federated Learning (PSFL). This approach incorporates a novel Personalized Local Distillation (PLD) and Adaptive Global Pruning (AGP). In PLD, each MU selects a personalized GSC model as a mentor tailored to its local resources and a unified Convolutional Neural Networks (CNN)-based SC (CSC) model as a student. This mentor model is then distilled into the student model for global aggregation. In AGP, we perform network pruning on the aggregated global model according to real-time communication environments, reducing communication energy. Finally, numerical results demonstrate the feasibility and efficiency of the proposed PSFL scheme.
- Published
- 2024
7. Precise Interception Flight Targets by Image-based Visual Servoing of Multicopter
- Author
-
Yan, Hailong, Yang, Kun, Cheng, Yixiao, Wang, Zihao, and Li, Dawei
- Subjects
Computer Science - Robotics - Abstract
Interception of low-altitude intruding targets with low-cost drones equipped strapdown camera presents a competitive option. However, the malicious maneuvers by the non-cooperative target and the coupling of the camera make the task challenging. To solve this problem, an Image-Based Visual Servoing (IBVS) control algorithm based on proportional navigation guidance with field-of-view holding capability is designed. The proposed controller reduces the miss distance while improving the stability of the visual servo system during interception. Software-in-the-loop (SITL) simulation experiments show a 72.8% reduction in the circular error probability (CEP) compared to the most recent study. This improvement enhances interception accuracy from the decimeter to the centimeter level. Real-world experiments further validate the effectiveness of the proposed algorithm., Comment: 9 pages, 15 figures, In the process of being submitted to the Journal of IEEE Transactions on Industrial Electronics
- Published
- 2024
8. Electric Space-time Translation and Floquet-Bloch Wavefunction
- Author
-
Ke, Chenhang, Yang, Kun, and Wu, Congjun
- Subjects
Condensed Matter - Mesoscale and Nanoscale Physics ,Condensed Matter - Strongly Correlated Electrons - Abstract
As for the study of Landau level wavefunctions for the quantum Hall effect, the magnetic Bloch wavefunctions based on the magnetic translation symmetry have been extensively investigated in the past few decades. In this article, the electric Floquet-Bloch wavefunctions based on the electric translation symmetry are studied as well as the momentum-frequency Brillouin zone, which is applied to the problem of one dimensional tight-binding model under an external electric field. The spectrum of electric Floquet-Bloch states can be generated by the projective representation of electric translation group, and the topological properties of these states are investigated., Comment: 5 pages, 2 figures
- Published
- 2024
9. SemAI: Semantic Artificial Intelligence-enhanced DNA storage for Internet-of-Things
- Author
-
Wu, Wenfeng, Xiang, Luping, Liu, Qiang, and Yang, Kun
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence - Abstract
In the wake of the swift evolution of technologies such as the Internet of Things (IoT), the global data landscape undergoes an exponential surge, propelling DNA storage into the spotlight as a prospective medium for contemporary cloud storage applications. This paper introduces a Semantic Artificial Intelligence-enhanced DNA storage (SemAI-DNA) paradigm, distinguishing itself from prevalent deep learning-based methodologies through two key modifications: 1) embedding a semantic extraction module at the encoding terminus, facilitating the meticulous encoding and storage of nuanced semantic information; 2) conceiving a forethoughtful multi-reads filtering model at the decoding terminus, leveraging the inherent multi-copy propensity of DNA molecules to bolster system fault tolerance, coupled with a strategically optimized decoder's architectural framework. Numerical results demonstrate the SemAI-DNA's efficacy, attaining 2.61 dB Peak Signal-to-Noise Ratio (PSNR) gain and 0.13 improvement in Structural Similarity Index (SSIM) over conventional deep learning-based approaches.
- Published
- 2024
10. Frequency Diverse RIS (FD-RIS) Enhanced Wireless Communications via Joint Distance-Angle Beamforming
- Author
-
Xiao, Han, Hu, Xiaoyan, Wang, Wenjie, Wong, Kai-Kit, and Yang, Kun
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
The conventional reconfigurable intelligent surface (RIS) assisted far-field communication systems can only implement angle beamforming, which actually limits the capability for reconfiguring the wireless propagation environment. To overcome this limitation, this paper proposes a newly designed frequency diverse RIS (FD-RIS), which can achieve joint distance-angle beamforming with the assistance of the time modulation technology. The signal processing model for FD-RIS-aided wireless communications is first derived. Then, an optimization problem aimed at maximizing the achievable rate is formulated where the frequency-time modulations are jointly optimized to achieve distance-angle beamforming. Furthermore, a novel iterative algorithm based on the cross-entropy optimization (CEO) framework is proposed to effectively handle the non-convex optimization problem. The numerical results validate that the proposed FD-RIS assisted communication scheme can achieve a notable performance improvement compared with the baseline scheme utilizing traditional RIS. In addition, the effectiveness of the proposed CEO algorithm is further verified by comparing with the benchmark using the genetic algorithm (GA).
- Published
- 2024
11. Optimizing Placement and Power Allocation in Reconfigurable Intelligent Sensing Surfaces for Enhanced Sensing and Communication Performance
- Author
-
Luo, Cheng, Hu, Jie, Xiang, Luping, Yang, Kun, and Lei, Bo
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
In this letter, we investigate the design of multiple reconfigurable intelligent sensing surfaces (RISSs) that enhance both communication and sensing tasks. An RISS incorporates additional active elements tailored to improve sensing accuracy. Our initial task involves optimizing placement of RISSs to mitigate signal interference. Subsequently, we establish power allocation schemes for sensing and communication within the system. Our final consideration involves examining how sensing results can be utilized to enhance communication, alongside an evaluation of communication performance under the impact of sensing inaccuracies. Numerical results reveal that the sensing task reaches its optimal performance with a finite number of RISSs, while the communication task exhibits enhanced performance with an increasing number of RISSs. Additionally, we identify an optimal communication spot under user movement.
- Published
- 2024
12. Exciton crystal melting and destruction by disorder in bilayer quantum hall system with total filling factor one
- Author
-
Hu, Zhengfei and Yang, Kun
- Subjects
Condensed Matter - Mesoscale and Nanoscale Physics ,Condensed Matter - Strongly Correlated Electrons - Abstract
Bilayer quantum hall system with total filling factor 1 was studied in the regime of heavy layer imbalance in a recent transport experiment (Ref. 1), with intriguing new findings. We demonstrate in this paper that 1) the exciton Wigner crystal in this regime can melt into a superfluid phase, giving rise to re-entrant superfluid behavior; 2) in the presence of disorder, electron and hole Wigner crystals in the two layers go through a locking/decoupling transition as layer separation increases, resulting in a sudden change in the counter flow conductance. Comparison will be made with the findings of Ref. 1., Comment: 12 pages, 3 figures
- Published
- 2024
13. Exploring Hannan Limitation for 3D Antenna Array
- Author
-
Ji, Ran, Huang, Chongwen, Chen, Xiaoming, Sha, Wei E. I., Zhang, Zhaoyang, Yang, Jun, Yang, Kun, Yuen, Chau, and Debbah, Mérouane
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Hannan Limitation successfully links the directivity characteristics of 2D arrays with the aperture gain limit, providing the radiation efficiency upper limit for large 2D planar antenna arrays. This demonstrates the inevitable radiation efficiency degradation caused by mutual coupling effects between array elements. However, this limitation is derived based on the assumption of infinitely large 2D arrays, which means that it is not an accurate law for small-size arrays. In this paper, we extend this theory and propose an estimation formula for the radiation efficiency upper limit of finite-sized 2D arrays. Furthermore, we analyze a 3D array structure consisting of two parallel 2D arrays. Specifically, we provide evaluation formulas for the mutual coupling strengths for both infinite and finite size arrays and derive the fundamental efficiency limit of 3D arrays. Moreover, based on the established gain limit of antenna arrays with fixed aperture sizes, we derive the achievable gain limit of finite size 3D arrays. Besides the performance analyses, we also investigate the spatial radiation characteristics of the considered 3D array structure, offering a feasible region for 2D phase settings under a given energy attenuation threshold. Through simulations, we demonstrate the effectiveness of our proposed theories and gain advantages of 3D arrays for better spatial coverage under various scenarios., Comment: 13 pages, 16 figures
- Published
- 2024
14. Information Scrambling at Quantum Hall Interfaces and Their Analog to Black Hole Event Horizon
- Author
-
Ma, Ken K. W. and Yang, Kun
- Subjects
Condensed Matter - Mesoscale and Nanoscale Physics ,Condensed Matter - Strongly Correlated Electrons ,General Relativity and Quantum Cosmology - Abstract
The black hole information paradox has been hotly debated for the last few decades without a full resolution. This makes it desirable to find analogues of this paradox in simple and experimentally accessible systems, whose resolutions may shed light on this longstanding and fundamental problem. Here, we review and resolve the apparent "information paradox" in two different interfaces separating Abelian and non-Abelian quantum Hall states. In both cases, the information carried by the pseudospin degree of freedom of the Abelian anyons get scrambled when they cross the interface and enter the non-Abelian quantum Hall liquid. Nevertheless, it is found that the scrambling mechanism depends on the nature of the interface. The corresponding analogues of different concepts in black hole physics such as event horizon, black hole interior, Hawking radiation, and Page curve will also be discussed., Comment: 44 pages, 5 figures. An invited book chapter for "The Black Hole Information Paradox", to be published by Springer Singapore in 2025. arXiv admin note: substantial text overlap with arXiv:2209.11119, arXiv:2106.11306
- Published
- 2024
15. Explain EEG-based End-to-end Deep Learning Models in the Frequency Domain
- Author
-
Wang, Hanqi, Yang, Kun, Zhang, Jingyu, Chen, Tao, and Song, Liang
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
The recent rise of EEG-based end-to-end deep learning models presents a significant challenge in elucidating how these models process raw EEG signals and generate predictions in the frequency domain. This challenge limits the transparency and credibility of EEG-based end-to-end models, hindering their application in security-sensitive areas. To address this issue, we propose a mask perturbation method to explain the behavior of end-to-end models in the frequency domain. Considering the characteristics of EEG data, we introduce a target alignment loss to mitigate the out-of-distribution problem associated with perturbation operations. Additionally, we develop a perturbation generator to define perturbation generation in the frequency domain. Our explanation method is validated through experiments on multiple representative end-to-end deep learning models in the EEG decoding field, using an established EEG benchmark dataset. The results demonstrate the effectiveness and superiority of our method, and highlight its potential to advance research in EEG-based end-to-end models.
- Published
- 2024
16. Towards Context-Aware Emotion Recognition Debiasing from a Causal Demystification Perspective via De-confounded Training
- Author
-
Yang, Dingkang, Yang, Kun, Kuang, Haopeng, Chen, Zhaoyu, Wang, Yuzheng, and Zhang, Lihua
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Understanding emotions from diverse contexts has received widespread attention in computer vision communities. The core philosophy of Context-Aware Emotion Recognition (CAER) is to provide valuable semantic cues for recognizing the emotions of target persons by leveraging rich contextual information. Current approaches invariably focus on designing sophisticated structures to extract perceptually critical representations from contexts. Nevertheless, a long-neglected dilemma is that a severe context bias in existing datasets results in an unbalanced distribution of emotional states among different contexts, causing biased visual representation learning. From a causal demystification perspective, the harmful bias is identified as a confounder that misleads existing models to learn spurious correlations based on likelihood estimation, limiting the models' performance. To address the issue, we embrace causal inference to disentangle the models from the impact of such bias, and formulate the causalities among variables in the CAER task via a customized causal graph. Subsequently, we present a Contextual Causal Intervention Module (CCIM) to de-confound the confounder, which is built upon backdoor adjustment theory to facilitate seeking approximate causal effects during model training. As a plug-and-play component, CCIM can easily integrate with existing approaches and bring significant improvements. Systematic experiments on three datasets demonstrate the effectiveness of our CCIM., Comment: TPAMI 2024
- Published
- 2024
17. Asynchronous Multimodal Video Sequence Fusion via Learning Modality-Exclusive and -Agnostic Representations
- Author
-
Yang, Dingkang, Li, Mingcheng, Qu, Linhao, Yang, Kun, Zhai, Peng, Wang, Song, and Zhang, Lihua
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Understanding human intentions (e.g., emotions) from videos has received considerable attention recently. Video streams generally constitute a blend of temporal data stemming from distinct modalities, including natural language, facial expressions, and auditory clues. Despite the impressive advancements of previous works via attention-based paradigms, the inherent temporal asynchrony and modality heterogeneity challenges remain in multimodal sequence fusion, causing adverse performance bottlenecks. To tackle these issues, we propose a Multimodal fusion approach for learning modality-Exclusive and modality-Agnostic representations (MEA) to refine multimodal features and leverage the complementarity across distinct modalities. On the one hand, MEA introduces a predictive self-attention module to capture reliable context dynamics within modalities and reinforce unique features over the modality-exclusive spaces. On the other hand, a hierarchical cross-modal attention module is designed to explore valuable element correlations among modalities over the modality-agnostic space. Meanwhile, a double-discriminator strategy is presented to ensure the production of distinct representations in an adversarial manner. Eventually, we propose a decoupled graph fusion mechanism to enhance knowledge exchange across heterogeneous modalities and learn robust multimodal representations for downstream tasks. Numerous experiments are implemented on three multimodal datasets with asynchronous sequences. Systematic analyses show the necessity of our approach., Comment: Accepted by TCSVT 2024
- Published
- 2024
18. Timely Requesting for Time-Critical Content Users in Decentralized F-RANs
- Author
-
Chen, Xingran, Li, Kai, and Yang, Kun
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
With the rising demand for high-rate and timely communications, fog radio access networks (F-RANs) offer a promising solution. This work investigates age of information (AoI) performance in F-RANs, consisting of multiple content users (CUs), enhanced remote radio heads (eRRHs), and content providers (CPs). Time-critical CUs need rapid content updates from CPs but cannot communicate directly with them; instead, eRRHs act as intermediaries. CUs decide whether to request content from a CP and which eRRH to send the request to, while eRRHs decide whether to command CPs to update content or use cached content. We study two general classes of policies: (i) oblivious policies, where decision-making is independent of historical information, and (ii) non-oblivious policies, where decisions are influenced by historical information. First, we obtain closed-form expressions for the average AoI of eRRHs under both policy types. Due to the complexity of calculating closed-form expressions for CUs, we then derive general upper bounds for their average AoI. Next, we identify optimal policies for both types. Under both optimal policies, each CU requests content from each CP at an equal rate, consolidating all requests to a single eRRH when demand is low or resources are limited, and distributing requests evenly among eRRHs when demand is high and resources are ample. eRRHs command content from each CP at an equal rate under an optimal oblivious policy, while prioritize the CP with the highest age under an optimal non-oblivious policy. Our numerical results validate these theoretical findings.
- Published
- 2024
19. End-to-End Design of Polar Coded Integrated Data and Energy Networking
- Author
-
Hu, Jie, Cui, Jingwen, Xiang, Luping, and Yang, Kun
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
In order to transmit data and transfer energy to the low-power Internet of Things (IoT) devices, integrated data and energy networking (IDEN) system may be harnessed. In this context, we propose a bitwise end-to-end design for polar coded IDEN systems, where the conventional encoding/decoding, modulation/demodulation, and energy harvesting (EH) modules are replaced by the neural networks (NNs). In this way, the entire system can be treated as an AutoEncoder (AE) and trained in an end-to-end manner. Hence achieving global optimization. Additionally, we improve the common NN-based belief propagation (BP) decoder by adding an extra hypernetwork, which generates the corresponding NN weights for the main network under different number of iterations, thus the adaptability of the receiver architecture can be further enhanced. Our numerical results demonstrate that our BP-based end-to-end design is superior to conventional BP-based counterparts in terms of both the BER and power transfer, but it is inferior to the successive cancellation list (SCL)-based conventional IDEN system, which may be due to the inherent performance gap between the BP and SCL decoders.
- Published
- 2024
20. Non-invasive ventral cervical magnetoneurography as a proxy of in vivo lipopolysaccharide-induced inflammation.
- Author
-
Bu, Yifeng, Burks, Jamison, Yang, Kun, Prince, Jacob, Borna, Amir, Coe, Christopher, Simmons, Alan, Tu, Xin, Baker, Dewleen, Kimball, Donald, Rao, Ramesh, Shah, Vishal, Huang, Mingxiong, Schwindt, Peter, Coleman, Todd, and Lerman, Imanuel
- Subjects
Humans ,Lipopolysaccharides ,Male ,Female ,Inflammation ,Adult ,Action Potentials ,Young Adult ,Carotid Arteries ,Magnetometry - Abstract
Maintenance of autonomic homeostasis is continuously calibrated by sensory fibers of the vagus nerve and sympathetic chain that convey compound action potentials (CAPs) to the central nervous system. Lipopolysaccharide (LPS) intravenous challenge reliably elicits a robust inflammatory response that can resemble systemic inflammation and acute endotoxemia. Here, we administered LPS intravenously in nine healthy subjects while recording ventral cervical magnetoneurography (vcMNG)-derived CAPs at the rostral Right Nodose Ganglion (RNG) and the caudal Right Carotid Artery (RCA) with optically pumped magnetometers (OPM). We observed vcMNG RNG and RCA neural firing rates that tracked changes in TNF-α levels in the systemic circulation. Further, endotype subgroups based on high and low IL-6 responders segregate RNG CAP frequency (at 30-120 min) and based on high and low IL-10 response discriminate RCA CAP frequency (at 0-30 min). These vcMNG tools may enhance understanding and management of the neuroimmune axis that can guide personalized treatment based on an individuals distinct endophenotype.
- Published
- 2024
21. Visual Language Model based Cross-modal Semantic Communication Systems
- Author
-
Jiang, Feibo, Tang, Chuanguo, Dong, Li, Wang, Kezhi, Yang, Kun, and Pan, Cunhua
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence ,Computer Science - Computation and Language ,Computer Science - Information Theory ,Computer Science - Machine Learning - Abstract
Semantic Communication (SC) has emerged as a novel communication paradigm in recent years, successfully transcending the Shannon physical capacity limits through innovative semantic transmission concepts. Nevertheless, extant Image Semantic Communication (ISC) systems face several challenges in dynamic environments, including low semantic density, catastrophic forgetting, and uncertain Signal-to-Noise Ratio (SNR). To address these challenges, we propose a novel Vision-Language Model-based Cross-modal Semantic Communication (VLM-CSC) system. The VLM-CSC comprises three novel components: (1) Cross-modal Knowledge Base (CKB) is used to extract high-density textual semantics from the semantically sparse image at the transmitter and reconstruct the original image based on textual semantics at the receiver. The transmission of high-density semantics contributes to alleviating bandwidth pressure. (2) Memory-assisted Encoder and Decoder (MED) employ a hybrid long/short-term memory mechanism, enabling the semantic encoder and decoder to overcome catastrophic forgetting in dynamic environments when there is a drift in the distribution of semantic features. (3) Noise Attention Module (NAM) employs attention mechanisms to adaptively adjust the semantic coding and the channel coding based on SNR, ensuring the robustness of the CSC system. The experimental simulations validate the effectiveness, adaptability, and robustness of the CSC system., Comment: 12 pages, 10 figures
- Published
- 2024
22. Defect Image Sample Generation With Diffusion Prior for Steel Surface Defect Recognition
- Author
-
Tai, Yichun, Yang, Kun, Peng, Tao, Huang, Zhenzhen, and Zhang, Zhijiang
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
The task of steel surface defect recognition is an industrial problem with great industry values. The data insufficiency is the major challenge in training a robust defect recognition network. Existing methods have investigated to enlarge the dataset by generating samples with generative models. However, their generation quality is still limited by the insufficiency of defect image samples. To this end, we propose Stable Surface Defect Generation (StableSDG), which transfers the vast generation distribution embedded in Stable Diffusion model for steel surface defect image generation. To tackle with the distinctive distribution gap between steel surface images and generated images of the diffusion model, we propose two processes. First, we align the distribution by adapting parameters of the diffusion model, adopted both in the token embedding space and network parameter space. Besides, in the generation process, we propose image-oriented generation rather than from pure Gaussian noises. We conduct extensive experiments on steel surface defect dataset, demonstrating state-of-the-art performance on generating high-quality samples and training recognition models, and both designed processes are significant for the performance.
- Published
- 2024
23. Correlation-Decoupled Knowledge Distillation for Multimodal Sentiment Analysis with Incomplete Modalities
- Author
-
Li, Mingcheng, Yang, Dingkang, Zhao, Xiao, Wang, Shuaibing, Wang, Yan, Yang, Kun, Sun, Mingyang, Kou, Dongliang, Qian, Ziyun, and Zhang, Lihua
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Multimodal sentiment analysis (MSA) aims to understand human sentiment through multimodal data. Most MSA efforts are based on the assumption of modality completeness. However, in real-world applications, some practical factors cause uncertain modality missingness, which drastically degrades the model's performance. To this end, we propose a Correlation-decoupled Knowledge Distillation (CorrKD) framework for the MSA task under uncertain missing modalities. Specifically, we present a sample-level contrastive distillation mechanism that transfers comprehensive knowledge containing cross-sample correlations to reconstruct missing semantics. Moreover, a category-guided prototype distillation mechanism is introduced to capture cross-category correlations using category prototypes to align feature distributions and generate favorable joint representations. Eventually, we design a response-disentangled consistency distillation strategy to optimize the sentiment decision boundaries of the student network through response disentanglement and mutual information maximization. Comprehensive experiments on three datasets indicate that our framework can achieve favorable improvements compared with several baselines., Comment: Accepted by CVPR 2024
- Published
- 2024
24. Personalized Wireless Federated Learning for Large Language Models
- Author
-
Jiang, Feibo, Dong, Li, Tu, Siwei, Peng, Yubo, Wang, Kezhi, Yang, Kun, Pan, Cunhua, and Niyato, Dusit
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Computation and Language - Abstract
Large Language Models (LLMs) have revolutionized natural language processing tasks. However, their deployment in wireless networks still face challenges, i.e., a lack of privacy and security protection mechanisms. Federated Learning (FL) has emerged as a promising approach to address these challenges. Yet, it suffers from issues including inefficient handling with big and heterogeneous data, resource-intensive training, and high communication overhead. To tackle these issues, we first compare different learning stages and their features of LLMs in wireless networks. Next, we introduce two personalized wireless federated fine-tuning methods with low communication overhead, i.e., (1) Personalized Federated Instruction Tuning (PFIT), which employs reinforcement learning to fine-tune local LLMs with diverse reward models to achieve personalization; (2) Personalized Federated Task Tuning (PFTT), which can leverage global adapters and local Low-Rank Adaptations (LoRA) to collaboratively fine-tune local LLMs, where the local LoRAs can be applied to achieve personalization without aggregation. Finally, we perform simulations to demonstrate the effectiveness of the proposed two methods and comprehensively discuss open issues., Comment: 8 pages, 5 figures
- Published
- 2024
25. High-Speed Interception Multicopter Control by Image-based Visual Servoing
- Author
-
Yang, Kun, Bai, Chenggang, She, Zhikun, and Quan, Quan
- Subjects
Computer Science - Robotics - Abstract
In recent years, reports of illegal drones threatening public safety have increased. For the invasion of fully autonomous drones, traditional methods such as radio frequency interference and GPS shielding may fail. This paper proposes a scheme that uses an autonomous multicopter with a strapdown camera to intercept a maneuvering intruder UAV. The interceptor multicopter can autonomously detect and intercept intruders moving at high speed in the air. The strapdown camera avoids the complex mechanical structure of the electro-optical pod, making the interceptor multicopter compact. However, the coupling of the camera and multicopter motion makes interception tasks difficult. To solve this problem, an Image-Based Visual Servoing (IBVS) controller is proposed to make the interception fast and accurate. Then, in response to the time delay of sensor imaging and image processing relative to attitude changes in high-speed scenarios, a Delayed Kalman Filter (DKF) observer is generalized to predict the current image position and increase the update frequency. Finally, Hardware-in-the-Loop (HITL) simulations and outdoor flight experiments verify that this method has a high interception accuracy and success rate. In the flight experiments, a high-speed interception is achieved with a terminal speed of 20 m/s.
- Published
- 2024
- Full Text
- View/download PDF
26. Holographic Integrated Data and Energy Transfer
- Author
-
Huang, Qingxiao, Hu, Jie, Zhao, Yizhe, and Yang, Kun
- Subjects
Computer Science - Information Theory - Abstract
Thanks to the application of metamaterials, holographic multiple-input multiple-output (H-MIMO) is expected to achieve a higher spatial diversity gain by enabling the ability to generate any current distribution on the surface. With the aid of electromagnetic (EM) manipulation capability of H-MIMO, integrated data and energy transfer (IDET) system can fully exploits the EM channel to realize energy focusing and eliminate inter-user interference, which yields the concept of holographic IDET (H-IDET). In this paper, we invetigate the beamforming designs for H-IDET systems, where the sum-rate of data users (DUs) are maximized by guaranteeing the energy harvesting requirements of energy users (EUs). In order to solve the non-convex functional programming, a block coordinate descent (BCD) based scheme is proposed, wherein the Fourier transform and the equivalence between the signal-to-interference-plus-noise ratio (SINR) and the mean-square error (MSE) are also conceived, followed by the successive convex approximation (SCA) and an initialization scheme to enhance robustness. Numerical results illustrate that our proposed H-IDET scheme outperforms benchmark schemes, especially the one adopting traditional discrete antennas. Besides, the near-field focusing using EM channel model achieves better performance compared to that using the traditional channel model, especially for WPT where the EUs are usually close to the transmitter.
- Published
- 2024
27. Blockchain for Energy Market: A Comprehensive Survey
- Author
-
Jiang, Tianqi, Luo, Haoxiang, Yang, Kun, Sun, Gang, Yu, Hongfang, Huang, Qi, and Vasilakos, Athanasios V.
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
The energy market encompasses the behavior of energy supply and trading within a platform system. By utilizing centralized or distributed trading, energy can be effectively managed and distributed across different regions, thereby achieving market equilibrium and satisfying both producers and consumers. However, recent years have presented unprecedented challenges and difficulties for the development of the energy market. These challenges include regional energy imbalances, volatile energy pricing, high computing costs, and issues related to transaction information disclosure. Researchers widely acknowledge that the security features of blockchain technology can enhance the efficiency of energy transactions and establish the fundamental stability and robustness of the energy market. This type of blockchain-enabled energy market is commonly referred to as an energy blockchain. Currently, there is a burgeoning amount of research in this field, encompassing algorithm design, framework construction, and practical application. It is crucial to organize and compare these research efforts to facilitate the further advancement of energy blockchain. This survey aims to comprehensively review the fundamental characteristics of blockchain and energy markets, highlighting the significant advantages of combining the two. Moreover, based on existing research outcomes, we will categorize and compare the current energy market research supported by blockchain in terms of algorithm design, market framework construction, and the policies and practical applications adopted by different countries. Finally, we will address current issues and propose potential future directions for improvement, to provide guidance for the practical implementation of blockchain in the energy market.
- Published
- 2024
28. Robust Emotion Recognition in Context Debiasing
- Author
-
Yang, Dingkang, Yang, Kun, Li, Mingcheng, Wang, Shunli, Wang, Shuaibing, and Zhang, Lihua
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning - Abstract
Context-aware emotion recognition (CAER) has recently boosted the practical applications of affective computing techniques in unconstrained environments. Mainstream CAER methods invariably extract ensemble representations from diverse contexts and subject-centred characteristics to perceive the target person's emotional state. Despite advancements, the biggest challenge remains due to context bias interference. The harmful bias forces the models to rely on spurious correlations between background contexts and emotion labels in likelihood estimation, causing severe performance bottlenecks and confounding valuable context priors. In this paper, we propose a counterfactual emotion inference (CLEF) framework to address the above issue. Specifically, we first formulate a generalized causal graph to decouple the causal relationships among the variables in CAER. Following the causal graph, CLEF introduces a non-invasive context branch to capture the adverse direct effect caused by the context bias. During the inference, we eliminate the direct context effect from the total causal effect by comparing factual and counterfactual outcomes, resulting in bias mitigation and robust prediction. As a model-agnostic framework, CLEF can be readily integrated into existing methods, bringing consistent performance gains., Comment: Accepted by CVPR 2024
- Published
- 2024
29. Large Generative Model Assisted 3D Semantic Communication
- Author
-
Jiang, Feibo, Peng, Yubo, Dong, Li, Wang, Kezhi, Yang, Kun, Pan, Cunhua, and You, Xiaohu
- Subjects
Computer Science - Information Theory ,Computer Science - Machine Learning - Abstract
Semantic Communication (SC) is a novel paradigm for data transmission in 6G. However, there are several challenges posed when performing SC in 3D scenarios: 1) 3D semantic extraction; 2) Latent semantic redundancy; and 3) Uncertain channel estimation. To address these issues, we propose a Generative AI Model assisted 3D SC (GAM-3DSC) system. Firstly, we introduce a 3D Semantic Extractor (3DSE), which employs generative AI models, including Segment Anything Model (SAM) and Neural Radiance Field (NeRF), to extract key semantics from a 3D scenario based on user requirements. The extracted 3D semantics are represented as multi-perspective images of the goal-oriented 3D object. Then, we present an Adaptive Semantic Compression Model (ASCM) for encoding these multi-perspective images, in which we use a semantic encoder with two output heads to perform semantic encoding and mask redundant semantics in the latent semantic space, respectively. Next, we design a conditional Generative adversarial network and Diffusion model aided-Channel Estimation (GDCE) to estimate and refine the Channel State Information (CSI) of physical channels. Finally, simulation results demonstrate the advantages of the proposed GAM-3DSC system in effectively transmitting the goal-oriented 3D scenario., Comment: 13 pages,13 figures,1 table
- Published
- 2024
30. Towards Multimodal Sentiment Analysis Debiasing via Bias Purification
- Author
-
Yang, Dingkang, Li, Mingcheng, Xiao, Dongling, Liu, Yang, Yang, Kun, Chen, Zhaoyu, Wang, Yuzheng, Zhai, Peng, Li, Ke, and Zhang, Lihua
- Subjects
Computer Science - Computation and Language ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Multimodal Sentiment Analysis (MSA) aims to understand human intentions by integrating emotion-related clues from diverse modalities, such as visual, language, and audio. Unfortunately, the current MSA task invariably suffers from unplanned dataset biases, particularly multimodal utterance-level label bias and word-level context bias. These harmful biases potentially mislead models to focus on statistical shortcuts and spurious correlations, causing severe performance bottlenecks. To alleviate these issues, we present a Multimodal Counterfactual Inference Sentiment (MCIS) analysis framework based on causality rather than conventional likelihood. Concretely, we first formulate a causal graph to discover harmful biases from already-trained vanilla models. In the inference phase, given a factual multimodal input, MCIS imagines two counterfactual scenarios to purify and mitigate these biases. Then, MCIS can make unbiased decisions from biased observations by comparing factual and counterfactual outcomes. We conduct extensive experiments on several standard MSA benchmarks. Qualitative and quantitative results show the effectiveness of the proposed framework., Comment: Accepted by ECCV 2024
- Published
- 2024
31. Age of Computing: A Metric of Computation Freshness in Communication and Computation Cooperative Networks
- Author
-
Chen, Xingran, Zhuang, Yi, and Yang, Kun
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
In communication and computation cooperative networks (3CNs), timely computation is crucial but not always guaranteed. There is a strong demand for a computational task to be completed within a given deadline. The time taken involves both processing time, communication time, and the impact of the deadline. However, a measure of such timeliness in 3CNs is lacking. In this paper, we introduce the novel concept, Age of Computing (AoC), to capture computation freshness in 3CNs. We analyze AoC in a line topology consisting of a source, a transmitter, a receiver, and a computational node. Tasks generated by the source are immediately available at the transmitter, where they enter a communication queue. These tasks then pass to the receiver and subsequently to a computation queue at the computational node for processing. Each task has a deadline, requiring completion within this timeframe. AoC is evaluated under two types of deadlines: (i) soft deadline, tasks can be fed back to the source if delayed beyond the deadline, but with additional latency; (ii) hard deadline, tasks delayed beyond the deadline are discarded. Under both deadlines, we derive the AoC formula and a general expression for the time-average AoC. For the first-come, first-serve discipline, we obtain a closed-form expression for the average AoC under the soft deadline and an approximation for the hard deadline. In addition to freshness, we define computation throughput, providing a general expression and an approximation. To explore the relationship between freshness and throughput, we construct an optimization problem and prove that the objective pair is a weakly Pareto-optimal point. Numerical results validate all the theoretical findings. Additionally, they reveal that under the hard deadline, the computation throughput serves as a reliable proxy for the average AoC.
- Published
- 2024
32. Higher dietary inflammatory index linked to increased risk of hypertension: a systematic review and dose-response meta-analysis
- Author
-
Song, Xiaoru, Yang, Kun, Cheng, Cheng, Hu, Quanman, Zhao, Fei, Lu, Saiwei, Long, Jinzhao, Yang, Haiyan, and Chen, Shuaiyin
- Published
- 2024
- Full Text
- View/download PDF
33. Sodium Hydroxide Leaching of Germanium from Lead Slag
- Author
-
Dai, Jie, Song, Leiting, Yang, Kun, and Zhang, Libo
- Published
- 2024
- Full Text
- View/download PDF
34. Design and Experimentation of Mountain-type Pre-cutting Sugarcane Planter and Its Key Components Based on DEM
- Author
-
Zhang, Shunsheng, Gao, Xinxin, Liu, Gaoyuan, Guo, Jiawen, Li, Xiaoyu, Yang, Kun, Li, Mingchun, Liu, Kai, and Kong, Yixun
- Published
- 2024
- Full Text
- View/download PDF
35. Development of Multi-source Information Fusion Based Novel Energy Management Strategy for 4WD PHEV
- Author
-
Ma, Chao, Yan, Dechao, Sun, Tong, Yang, Kun, and Tan, Di
- Published
- 2024
- Full Text
- View/download PDF
36. Assessing clinical pathological characteristics and gene expression patterns associated with hepatoid adenocarcinoma of the stomach
- Author
-
Ge, Dong-Feng, Wang, Yang-Kun, Li, Ying-Ying, Liao, Xing-Hai, Zhu, Chao-Ya, Jiang, Bo, and Wang, Su-Nan
- Published
- 2024
- Full Text
- View/download PDF
37. Parental marital status and anxiety symptoms in adolescents: the mediating effect of childhood maltreatment
- Author
-
Wen, Lulu, Yang, Kun, Cao, Yujia, Qu, Miao, and Xiu, Meihong
- Published
- 2024
- Full Text
- View/download PDF
38. Bifilm Defects in AlSi10MgMn Alloy Castings
- Author
-
Hu, Mei-Lan, Guo, Hong-Min, Yang, Kun-Yi, Chang, Wei-jie, Deng, Ben, and Luo, Jin-tao
- Published
- 2024
- Full Text
- View/download PDF
39. Study on the efficient precipitation of germanium by Fe(OH)3 colloid generated by neutralization precipitation method
- Author
-
Dai, Jie, Yang, Kun, and Zhang, Libo
- Published
- 2024
- Full Text
- View/download PDF
40. RNA helicase SKIV2L limits antiviral defense and autoinflammation elicited by the OAS-RNase L pathway
- Author
-
Yang, Kun, Dong, Beihua, Asthana, Abhishek, Silverman, Robert H, and Yan, Nan
- Published
- 2024
- Full Text
- View/download PDF
41. PRELP inhibits colorectal cancer progression by suppressing epithelial-mesenchymal transition and angiogenesis via the inactivation of the FGF1/PI3K/AKT pathway
- Author
-
Li, Xiaoqing, Jiang, Zhongxiang, Li, Junfeng, Yang, Kun, He, Jin, Deng, Qianxi, Xu, Shuman, Jiang, Zhihang, Liu, Fuqiang, and Jiang, Zheng
- Published
- 2024
- Full Text
- View/download PDF
42. Unraveling the catalytic redox mechanism of lithium–sulfur batteries through advanced in-situ/operando characterizations
- Author
-
Zeng, Pan, Yuan, Cheng, Su, Bin, Liu, Genlin, Gao, Jiechang, Yang, Kun, Wang, Qingyuan, and Zhang, Liang
- Published
- 2024
- Full Text
- View/download PDF
43. Factors affecting the interest of students with special needs in physical education participation in colleges and universities: a grounded theory study of the special physical education classroom
- Author
-
Liu, Xinyi, Zhou, Xiangyi, Li, Zhendong, Yang, Kun, Huang, Shouzhen, Zeng, Miaolin, Lai, Xiangdeng, Han, Haijun, Li, Wei, and Sun, Jingquan
- Published
- 2024
- Full Text
- View/download PDF
44. Network working capital management, supply chain concentration, and corporate performance of focal companies: Empirical evidence from Chinese companies that implement supply chain finance
- Author
-
Piao, Zhefan, Yang, Kun, Su, Ning, and Zheng, Zihan
- Published
- 2024
- Full Text
- View/download PDF
45. 3D printer vision calibration system based on embedding Sobel bilateral filter in least squares filtering algorithm
- Author
-
Kang, Rihui, Sang, Luxiao, Yang, Le, Yang, Kun, Hao, Runfang, Zhang, Hulin, and Sang, Shengbo
- Published
- 2024
- Full Text
- View/download PDF
46. Efficient Prompt Optimization Through the Lens of Best Arm Identification
- Author
-
Shi, Chengshuai, Yang, Kun, Chen, Zihan, Li, Jundong, Yang, Jing, and Shen, Cong
- Subjects
Statistics - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Computation and Language ,Computer Science - Machine Learning - Abstract
The remarkable instruction-following capability of large language models (LLMs) has sparked a growing interest in automatically finding good prompts, i.e., prompt optimization. Most existing works follow the scheme of selecting from a pre-generated pool of candidate prompts. However, these designs mainly focus on the generation strategy, while limited attention has been paid to the selection method. Especially, the cost incurred during the selection (e.g., accessing LLM and evaluating the responses) is rarely explicitly considered. To overcome this limitation, this work provides a principled framework, TRIPLE, to efficiently perform prompt selection under an explicit budget constraint. TRIPLE is built on a novel connection established between prompt optimization and fixed-budget best arm identification (BAI-FB) in multi-armed bandits (MAB); thus, it is capable of leveraging the rich toolbox from BAI-FB systematically and also incorporating unique characteristics of prompt optimization. Extensive experiments on multiple well-adopted tasks using various LLMs demonstrate the remarkable performance improvement of TRIPLE over baselines while satisfying the limited budget constraints. As an extension, variants of TRIPLE are proposed to efficiently select examples for few-shot prompts, also achieving superior empirical performance.
- Published
- 2024
47. 'Life' of dust originating from the irregular satellites of Jupiter
- Author
-
Chen, Zhenghan, Yang, Kun, and Liu, Xiaodong
- Subjects
Astrophysics - Earth and Planetary Astrophysics - Abstract
The irregular satellites of Jupiter produce dust particles through the impact of interplanetary micrometeoroids. In this paper, the dynamics of these particles is studied by both high-accuracy numerical simulation and analytical theory, in order to learn their transport, final fate, and spatial distribution. The perturbation forces that are considered in our dynamical model include the solar radiation pressure, solar gravity, Poynting-Robertson drag, Jovian oblateness, and the Galilean satellites' gravity. The trajectories of different size particles are simulated until they hit Jupiter, the Galilean satellites, or escape from the Jovian system. The average dynamical lifetimes of dust with different grain sizes are calculated, and the final fate of dust particles is reported and analysed. The steady-state spatial number density of particles is estimated by integrating the trajectories of dust particles over their initial size distribution, and compared to the previous work. The impact sites of dust on Callisto's surface are recorded and provide an important clue for the study of the hemisphere asymmetry of Callisto. Besides, the mass accretion rate, cross-sectional area influx, and mass influx density of dust on Callisto are calculated. A ring outside the orbit of Callisto dominated by dust between 2 and 25 ${\mu}$m from Jupiter's irregular satellites is suggested, with the average normal geometric optical depth of the order of $10^{-8}$ and the configuration of the ring ansae similar to Jupiter's gossamer rings., Comment: 11 pages, 14 figures
- Published
- 2024
- Full Text
- View/download PDF
48. Energy-Efficient STAR-RIS Enhanced UAV-Enabled MEC Networks with Bi-Directional Task Offloading
- Author
-
Xiao, Han, Hu, Xiaoyan, Zhang, Weile, Wang, Wenjie, Wong, Kai-Kit, and Yang, Kun
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
This paper introduces a novel multi-user mobile edge computing (MEC) scheme facilitated by the simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) and the unmanned aerial vehicle (UAV). Unlike existing MEC approaches, the proposed scheme enables bidirectional offloading, allowing users to concurrently offload tasks to the MEC servers located at the ground base station (BS) and UAV with STAR-RIS support. Specifically, we formulate an optimization problem aiming at maximizing the energy efficiency of the system while ensuring the quality of service (QoS) constraints by jointly optimizing the resource allocation, user scheduling, passive beamforming of the STAR-RIS, and the UAV trajectory. A block coordinate descent (BCD) iterative algorithm designed with the Dinkelbach's algorithm and the successive convex approximation (SCA) technique is proposed to effectively handle the formulated non-convex optimization problem with significant coupling among variables. Simulation results indicate that the proposed STAR-RIS enhanced UAV-enabled MEC scheme possesses significant advantages in enhancing the system energy efficiency over other baseline schemes including the conventional RIS-aided scheme.
- Published
- 2024
49. Harnessing the Power of Federated Learning in Federated Contextual Bandits
- Author
-
Shi, Chengshuai, Zhou, Ruida, Yang, Kun, and Shen, Cong
- Subjects
Statistics - Machine Learning ,Computer Science - Information Theory ,Computer Science - Machine Learning ,Computer Science - Multiagent Systems - Abstract
Federated learning (FL) has demonstrated great potential in revolutionizing distributed machine learning, and tremendous efforts have been made to extend it beyond the original focus on supervised learning. Among many directions, federated contextual bandits (FCB), a pivotal integration of FL and sequential decision-making, has garnered significant attention in recent years. Despite substantial progress, existing FCB approaches have largely employed their tailored FL components, often deviating from the canonical FL framework. Consequently, even renowned algorithms like FedAvg remain under-utilized in FCB, let alone other FL advancements. Motivated by this disconnection, this work takes one step towards building a tighter relationship between the canonical FL study and the investigations on FCB. In particular, a novel FCB design, termed FedIGW, is proposed to leverage a regression-based CB algorithm, i.e., inverse gap weighting. Compared with existing FCB approaches, the proposed FedIGW design can better harness the entire spectrum of FL innovations, which is concretely reflected as (1) flexible incorporation of (both existing and forthcoming) FL protocols; (2) modularized plug-in of FL analyses in performance guarantees; (3) seamless integration of FL appendages (such as personalization, robustness, and privacy). We substantiate these claims through rigorous theoretical analyses and empirical evaluations., Comment: Accepted to Transactions on Machine Learning Research (07/2024); a preliminary version appeared in the Multi-Agent Security Workshop at NeurIPS 2023
- Published
- 2023
50. Advancing RAN Slicing with Offline Reinforcement Learning
- Author
-
Yang, Kun, Yeh, Shu-ping, Zhang, Menglei, Sydir, Jerry, Yang, Jing, and Shen, Cong
- Subjects
Computer Science - Information Theory ,Computer Science - Machine Learning ,Computer Science - Networking and Internet Architecture ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Dynamic radio resource management (RRM) in wireless networks presents significant challenges, particularly in the context of Radio Access Network (RAN) slicing. This technology, crucial for catering to varying user requirements, often grapples with complex optimization scenarios. Existing Reinforcement Learning (RL) approaches, while achieving good performance in RAN slicing, typically rely on online algorithms or behavior cloning. These methods necessitate either continuous environmental interactions or access to high-quality datasets, hindering their practical deployment. Towards addressing these limitations, this paper introduces offline RL to solving the RAN slicing problem, marking a significant shift towards more feasible and adaptive RRM methods. We demonstrate how offline RL can effectively learn near-optimal policies from sub-optimal datasets, a notable advancement over existing practices. Our research highlights the inherent flexibility of offline RL, showcasing its ability to adjust policy criteria without the need for additional environmental interactions. Furthermore, we present empirical evidence of the efficacy of offline RL in adapting to various service-level requirements, illustrating its potential in diverse RAN slicing scenarios., Comment: 9 pages. 6 figures
- Published
- 2023
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.