16 Hits in 6.2 sec

Quantized and Distributed Subgradient Optimization Method with Malicious Attack [article]

Iyanuoluwa Emiola, Chinwendu Enyioha
2022 arXiv   pre-print
We propose a distributed gradient-based optimization algorithm in which the non-malicious agents exchange quantized information with one another.  ...  We prove convergence of the solution to a neighborhood of the optimal solution, and characterize the solutions obtained under the communication-constrained environment and presence of malicious agents.  ...  To solve this, we propose a distributed subgradient with quantized and adversarial attack method (DISQAAM) where non-adversarial agents send quantized information and adversarial agents send perturbed  ... 
arXiv:2206.02272v1 fatcat:zbauuhnb75abbetkwkrsx3p4mm

Byzantine Fault Tolerance in Distributed Machine Learning : a Survey [article]

Djamila Bouhata, Hamouma Moumen
2022 arXiv   pre-print
This classification is established on specific criteria such as communication process, optimization method, and topology setting, which characterize future work methods examining the current challenges  ...  Mainly in first-order optimization methods, especially Stochastic Gradient Descent (SGD). We highlight the key techniques as well as fundamental approaches.  ...  the robustness of distributed optimization methods used in DML.  ... 
arXiv:2205.02572v1 fatcat:h2hkcgz3w5cvrnro6whl2rpvby

A Survey of Decentralized Online Learning [article]

Xiuxian Li, Lihua Xie, Na Li
2022 arXiv   pre-print
., decentralized online optimization) or noncooperative (i.e., online game) through local information exchanges, and the local cost function of each agent is often time-varying in dynamic and even adversarial  ...  ., decentralized target tracking and formation control), smart grids, deep learning, and so forth.  ...  ' subgradients (and sensitive raw data) cannot be reconstructed by a malicious learner in networks with greater-than-one connectivity.  ... 
arXiv:2205.00473v1 fatcat:irnm46esfvhe5mj2a7v3tqjh4u

Channel assignment schemes for cooperative spectrum sensing in multi-channel cognitive radio networks

Weiwei Wang, Behzad Kasiri, Jun Cai, Attahiru S. Alfa
2013 Wireless Communications and Mobile Computing  
New counterattacks are proposed to combat attacks comprising coalition head and CRs as Byzantine attackers, which target to reduce the number of available channels for sensing in distributed MCCRNs.  ...  Finally, a more powerful and intelligent distributed cooperative Byzantine attack on the proposed multi-channel cooperative spectrum sensing is proposed, where attackers collude by applying coalitional  ...  Acknowledgments First and foremost, I would like to thank God for all blessings that He has given to me in my life.  ... 
doi:10.1002/wcm.2442 fatcat:dnjyz4sdwbh7fpokkgctw2u6we

2011 Index IEEE Transactions on Automatic Control Vol. 56

2011 IEEE Transactions on Automatic Control  
., +, TAC Oct. 2011 2445-2455 Distributed Subgradient Methods for Convex Optimization Over Random Networks.  ...  ., +, TAC June 2011 1436-1441 Distributed Subgradient Methods for Convex Optimization Over Random Networks.  ...  Pipes Stochastic Tubes in Model Predictive Control With Probabilistic Constraints. Cannon, M., +, Poles and zeros Computation of the General -Lossless Factorization.  ... 
doi:10.1109/tac.2011.2179989 fatcat:6qqqyveptjhjngqqzclzq7cxym

Applications of Economic and Pricing Models for Resource Management in 5G Wireless Networks: A Survey [article]

Nguyen Cong Luong, Ping Wang, Dusit Niyato, Ying-Chang Liang, Fen Hou, Zhu Han
2017 arXiv   pre-print
Furthermore, we present applications of economic and pricing models for wireless caching and mobile data offloading.  ...  In this paper, we review economic and pricing approaches proposed to address resource management issues in the 5G wireless networks including user association, spectrum allocation, and interference and  ...  Two common attacks that the users face are eavesdropping attack and Distributed Denial-of-Service (DoS) attack.  ... 
arXiv:1710.04771v1 fatcat:zs3bbrmbzrfjzfjs5cgpwu2kpm

Design of large polyphase filters in the Quadratic Residue Number System

Gian Carlo Cardarilli, Alberto Nannarelli, Yann Oster, Massimo Petricca, Marco Re
2010 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers  
TA1b-3 11:05 AM Convergence-optimal Quantizer Design of Distributed Contraction-based iterative Algorithms with Quantized Message passing Ying Cui, Vincent K. N.  ...  As a result the proposed algorithm is robust to link and node failures, unlike previously suggested distributed subgradient methods that rely on formation and maintenance of a stable network infrastructure  ... 
doi:10.1109/acssc.2010.5757589 fatcat:ccxnu5owr5fyrcjcqukumerueq

Stochastic, Distributed and Federated Optimization for Machine Learning [article]

Jakub Konečný
2017 arXiv   pre-print
In this case, traditional methods are inefficient, as the communication costs inherent in distributed optimization become the bottleneck.  ...  Second, we study distributed setting, in which the data describing the optimization problem does not fit into a single computing node.  ...  Comparison with other distributed methods Finally, we compare the CoCoA + framework with several competing distributed optimization algorithms.  ... 
arXiv:1707.01155v1 fatcat:t6uqrmnssrafze6l6c7gk5vcyu

Robust Distributed Optimization With Randomly Corrupted Gradients [article]

Berkay Turan, Cesar A. Uribe, Hoi-To Wai, Mahnoosh Alizadeh
2022 arXiv   pre-print
In this paper, we propose a first-order distributed optimization algorithm that is provably robust to Byzantine failures-arbitrary and potentially adversarial behavior, where all the participating agents  ...  We provide convergence guarantees of our method for strongly convex and smooth non-convex cost functions.  ...  attacks are important to defend against for distributed optimization algorithms.  ... 
arXiv:2106.14956v2 fatcat:zfk6mzgtmreadaaxm4vy3du6x4

Radio Resource Management in Joint Radar and Communication: A Comprehensive Survey [article]

Nguyen Cong Luong, Xiao Lu, Dinh Thai Hoang, Dusit Niyato, Dong In Kim
2021 arXiv   pre-print
In particular, sharing the spectrum imposes the interference caused by the systems, and sharing the hardware platform and energy resource complicates the design of the JRC transmitter and compromises the  ...  The first reason is that JRC allows individual radar and communication systems to share spectrum bands and thus improves the spectrum utilization.  ...  The optimization problem is proved to be convex, that can be solved, e.g., by using subgradient projection method.  ... 
arXiv:2007.13146v3 fatcat:aq5ti5uruvgczpfcrtulcfehf4

A Survey of Multi-Access Edge Computing in 5G and Beyond: Fundamentals, Technology Integration, and State-of-the-Art

Quoc-Viet Pham, Fang Fang, Vu Nguyen Ha, Md. Jalil Piran, Mai Le, Long Bao Le, Won-Joo Hwang, Zhiguo Ding
2020 IEEE Access  
However, it is hard to guarantee the solution optimality with distributed approaches due to the lack of complete information.  ...  Since DRL with discretized states suffers from the curse of dimensionality and slow convergence when a high quantization accuracy is required, a continuous control with DRL based framework of computation  ... 
doi:10.1109/access.2020.3001277 fatcat:isme7xwfejf4pfnowosljxnzja

Analog-to-Digital Cognitive Radio: Sampling, Detection, and Hardware

Deborah Cohen, Shahar Tsiper, Yonina C. Eldar
2018 IEEE Signal Processing Magazine  
The CR application revisits this traditional task with specific and severe requirements in terms of spectrum sensing and detection performance, real-time processing, robustness to noise and more.  ...  To enhance the efficiency of the available spectral bands detection, we present joint spectrum sensing and direction of arrival estimation methods.  ...  Additional issues of security against malicious users and various attacks to the network are discussed in [16] , [19] , [20] .  ... 
doi:10.1109/msp.2017.2740966 fatcat:4nziqzlpmfcwjdmxmssozqrm2a

CCC 2020 Contents

2020 2020 39th Chinese Control Conference (CCC)   unpublished
WANG Shujie, GAO Feng, WU Jiang, ZHENG Chao, FU Xingbo, DUAN Fangwei 4341 Malicious Attack Design for Cyber Physical Systems: a Novel Sparse Sensor Attack Strategy . . . . . . . . . . . . . . . . . . .  ...  LIU Xi, ZHAO Jun, HOU Jin, LIU Yong 4907 On the Boundedness of Subgradients in Distributed Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.23919/ccc50068.2020.9188973 fatcat:7t2dwrbc3zdcjnyijypuga7yhe

A New Calibration Method for SAR Analog-to-Digital Converters Based on All Digital Dithering

Ali Jalali, Shabnam Rahbar, Ebrahim Farshidi
1997 unpublished
Simulation results with MATLAB software show great improvement in static and dynamic characteristics in applied analog to digital converter after calibration.  ...  It unlike split calibration, does not need two independent converters for production of two specified paths and it just have one capacitor array which makes it possible with simple architecture.  ...  On arrival at a malicious place, the mobile agent is subject to an attack effort from the place.  ... 

REST: Robust and Efficient Neural Networks for Sleep Monitoring in the Wild [article]

Rahul Duggal, Scott Freitas, Cao Xiao, Duen Horng Chau, Jimeng Sun
2020 pre-print
We open-source the code repository with this paper:  ...  We propose REST, a new method that simultaneously tackles both issues via 1) adversarial training and controlling the Lipschitz constant of the neural network through spectral regularization while 2) enabling  ...  Recently there has been an attempt to bridge the area of model compression with adversarial robustness through connection pruning [18] and quantization [25] .  ... 
doi:10.1145/3366423.3380241 arXiv:2001.11363v1 fatcat:fj2gpnzrejgsxbmopydbi6jyoa
« Previous Showing results 1 — 15 out of 16 results