Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 3 de 3
Filter
Add more filters










Database
Language
Publication year range
1.
Entropy (Basel) ; 25(4)2023 Apr 16.
Article in English | MEDLINE | ID: mdl-37190454

ABSTRACT

Temporal knowledge graphs (KGs) have recently attracted increasing attention. The temporal KG forecasting task, which plays a crucial role in such applications as event prediction, predicts future links based on historical facts. However, current studies pay scant attention to the following two aspects. First, the interpretability of current models is manifested in providing reasoning paths, which is an essential property of path-based models. However, the comparison of reasoning paths in these models is operated in a black-box fashion. Moreover, contemporary models utilize separate networks to evaluate paths at different hops. Although the network for each hop has the same architecture, each network achieves different parameters for better performance. Different parameters cause identical semantics to have different scores, so models cannot measure identical semantics at different hops equally. Inspired by the observation that reasoning based on multi-hop paths is akin to answering questions step by step, this paper designs an Interpretable Multi-Hop Reasoning (IMR) framework based on consistent basic models for temporal KG forecasting. IMR transforms reasoning based on path searching into stepwise question answering. In addition, IMR develops three indicators according to the characteristics of temporal KGs and reasoning paths: the question matching degree, answer completion level, and path confidence. IMR can uniformly integrate paths of different hops according to the same criteria; IMR can provide the reasoning paths similarly to other interpretable models and further explain the basis for path comparison. We instantiate the framework based on common embedding models such as TransE, RotatE, and ComplEx. While being more explainable, these instantiated models achieve state-of-the-art performance against previous models on four baseline datasets.

2.
Entropy (Basel) ; 24(7)2022 Jun 21.
Article in English | MEDLINE | ID: mdl-35885074

ABSTRACT

Specific emitter identification (SEI) refers to distinguishing emitters using individual features extracted from wireless signals. The current SEI methods have proven to be accurate in tackling large labeled data sets at a high signal-to-noise ratio (SNR). However, their performance declines dramatically in the presence of small samples and a significant noise environment. To address this issue, we propose a complex self-supervised learning scheme to fully exploit the unlabeled samples, comprised of a pretext task adopting the contrastive learning concept and a downstream task. In the former task, we design an optimized data augmentation method based on communication signals to serve the contrastive conception. Then, we embed a complex-valued network in the learning to improve the robustness to noise. The proposed scheme demonstrates the generality of handling the small and sufficient samples cases across a wide range from 10 to 400 being labeled in each group. The experiment also shows a promising accuracy and robustness where the recognition results increase at 10-16% from 10-15 SNR.

3.
Sensors (Basel) ; 22(7)2022 Mar 30.
Article in English | MEDLINE | ID: mdl-35408275

ABSTRACT

The Internet of Things (IoT) is promising to transform a wide range of fields. However, the open nature of IoT makes it exposed to cybersecurity threats, among which identity spoofing is a typical example. Physical layer authentication, which identifies IoT devices based on the physical layer characteristics of signals, serves as an effective way to counteract identity spoofing. In this paper, we propose a deep learning-based framework for the open-set authentication of IoT devices. Specifically, additive angular margin softmax (AAMSoftmax) was utilized to enhance the discriminability of learned features and a modified OpenMAX classifier was employed to adaptively identify authorized devices and distinguish unauthorized ones. The experimental results for both simulated data and real ADS-B (Automatic Dependent Surveillance-Broadcast) data indicate that our framework achieved superior performance compared to current approaches, especially when the number of devices used for training is limited.


Subject(s)
Internet of Things , Computer Security
SELECTION OF CITATIONS
SEARCH DETAIL
...