Zobrazeno 1 - 10
of 692
pro vyhledávání: '"Shen, Yulong"'
Multi-robot swarms utilize swarm intelligence to collaborate on tasks and play an increasingly significant role in a variety of practical scenarios. However, due to the complex design, multi-robot swarm systems often have vulnerabilities caused by lo
Externí odkaz:
http://arxiv.org/abs/2409.04736
Autor:
Zheng, Lele, Cao, Yang, Jiang, Renhe, Taura, Kenjiro, Shen, Yulong, Li, Sheng, Yoshikawa, Masatoshi
Spatiotemporal federated learning has recently raised intensive studies due to its ability to train valuable models with only shared gradients in various location-based services. On the other hand, recent studies have shown that shared gradients may
Externí odkaz:
http://arxiv.org/abs/2407.08529
Covert communication's effectiveness critically depends on precise channel state information (CSI). This paper investigates the impact of imperfect CSI on achievable covert communication performance in a two-hop relay system. Firstly, we introduce a
Externí odkaz:
http://arxiv.org/abs/2404.05983
Unmanned Aerial Vehicle (UAV) networking is increasingly used in field environments such as power inspection, agricultural plant protection, and emergency rescue. To guarantee UAV networking security, UAV identity authentication attracts wide attenti
Externí odkaz:
http://arxiv.org/abs/2312.12381
Autor:
Shen, Yulong, Zhou, Nengji
Publikováno v:
Computer Physics Communications 293 (2023) 108895
With extensive variational simulations, dissipative quantum phase transitions in the sub-Ohmic spin-boson model are numerically studied in a dense limit of environmental modes. By employing a generalized trial wave function composed of coherent-state
Externí odkaz:
http://arxiv.org/abs/2309.00797
Autor:
Niu, Jun, Zhu, Xiaoyan, Zeng, Moxuan, Zhang, Ge, Zhao, Qingyang, Huang, Chunhui, Zhang, Yangming, An, Suyu, Wang, Yangzhong, Yue, Xinghui, He, Zhipeng, Guo, Weihao, Shen, Kuo, Liu, Peng, Shen, Yulong, Jiang, Xiaohong, Ma, Jianfeng, Zhang, Yuqing
Membership inference (MI) attacks threaten user privacy through determining if a given data example has been used to train a target model. However, it has been increasingly recognized that the "comparing different MI attacks" methodology used in the
Externí odkaz:
http://arxiv.org/abs/2307.06123
Autor:
Yang, Lingxiao, Dong, Xuewen, Gao, Sheng, Qu, Qiang, Zhang, Xiaodong, Tian, Wensheng, Shen, Yulong
As a promising implementation model of payment channel network (PCN), payment channel hub (PCH) could achieve high throughput by providing stable off-chain transactions through powerful hubs. However, existing PCH schemes assume hubs preplaced in adv
Externí odkaz:
http://arxiv.org/abs/2305.19182
The rapid development and integration of automotive manufacturing, sensor, and communication technologies have facilitated the emergence of the Internet of Vehicles (IoV). However, the explosive growing demand for parking spots has become a challengi
Externí odkaz:
http://arxiv.org/abs/2305.14678
This paper investigates the covert communication in an air-to-ground (A2G) system, where a UAV (Alice) can adopt the omnidirectional microwave (OM) or directional mmWave (DM) transmission mode to transmit covert data to a ground user (Bob) while suff
Externí odkaz:
http://arxiv.org/abs/2302.00301
Graph analysts cannot directly obtain the global structure in decentralized social networks, and analyzing such a network requires collecting local views of the social graph from individual users. Since the edges between users may reveal sensitive so
Externí odkaz:
http://arxiv.org/abs/2212.05253