Fog
computing
can
support
IoT
services
with
fast
response
time
and
low
bandwidth
usage
by
moving
computation
from
the
cloud
to
edge
devices.
However,
existing
fog
frameworks
have
limited
flexibility
dynamic
service
composition
a
data-oriented
approach.
Function-as-a-Service
(FaaS)
is
promising
programming
model
for
enhance
flexibility,
but
current
event-or
topic-based
design
of
function
triggering
separation
data
management
execution
result
in
inefficiency
data-intensive
services.
To
achieve
both
efficiency,
we
propose
data-centric
called
Function
also
introduce
its
underlying
orchestration
mechanism
that
leverages
three
types
contexts:
context,
system
context.
Moreover,
showcase
concrete
use
case
smart
parking
where
allows
developers
easily
their
logic
reduced
learning
efforts
compared
static
topology.
Our
performance
evaluation
results
show
be
scaled
hundreds
nodes.
improve
efficiency
saving
95%
internal
traffic
over
it
reduce
latency
30%
function.
Proceedings of the IEEE,
Journal Year:
2019,
Volume and Issue:
107(8), P. 1738 - 1762
Published: June 12, 2019
With
the
breakthroughs
in
deep
learning,
recent
years
have
witnessed
a
booming
of
artificial
intelligence
(AI)
applications
and
services,
spanning
from
personal
assistant
to
recommendation
systems
video/audio
surveillance.
More
recently,
with
proliferation
mobile
computing
Internet
Things
(IoT),
billions
IoT
devices
are
connected
Internet,
generating
zillions
bytes
data
at
network
edge.
Driving
by
this
trend,
there
is
an
urgent
need
push
AI
frontiers
edge
so
as
fully
unleash
potential
big
data.
To
meet
demand,
computing,
emerging
paradigm
that
pushes
tasks
services
core
edge,
has
been
widely
recognized
promising
solution.
The
resulted
new
interdiscipline,
or
(EI),
beginning
receive
tremendous
amount
interest.
However,
research
on
EI
still
its
infancy
stage,
dedicated
venue
for
exchanging
advances
highly
desired
both
computer
system
communities.
end,
we
conduct
comprehensive
survey
efforts
EI.
Specifically,
first
review
background
motivation
running
We
then
provide
overview
overarching
architectures,
frameworks,
key
technologies
learning
model
toward
training/inference
Finally,
discuss
future
opportunities
believe
will
elicit
escalating
attentions,
stimulate
fruitful
discussions,
inspire
further
ideas
IEEE Transactions on Wireless Communications,
Journal Year:
2020,
Volume and Issue:
19(3), P. 2022 - 2035
Published: Jan. 8, 2020
The
stringent
requirements
for
low-latency
and
privacy
of
the
emerging
high-stake
applications
with
intelligent
devices
such
as
drones
smart
vehicles
make
cloud
computing
inapplicable
in
these
scenarios.
Instead,
edge
machine
learning
becomes
increasingly
attractive
performing
training
inference
directly
at
network
edges
without
sending
data
to
a
centralized
center.
This
stimulates
nascent
field
termed
federated
model
on
computation,
storage,
energy
bandwidth
limited
mobile
distributed
manner.
To
preserve
address
issues
unbalanced
non-IID
points
across
different
devices,
averaging
algorithm
has
been
proposed
global
aggregation
by
weighted
average
locally
updated
each
selected
device.
However,
communication
main
bottleneck
aggregating
computed
updates.
We
thus
propose
novel
over-the-air
computation
based
approach
fast
via
exploring
superposition
property
wireless
multiple-access
channel.
is
achieved
joint
device
selection
beamforming
design,
which
modeled
sparse
low-rank
optimization
problem
support
efficient
algorithms
design.
achieve
this
goal,
we
provide
difference-of-convex-functions
(DC)
representation
function
enhance
sparsity
accurately
detect
fixed-rank
constraint
procedure
selection.
A
DC
further
developed
solve
resulting
program
convergence
guarantees.
algorithmic
advantages
admirable
performance
methodologies
are
demonstrated
through
extensive
numerical
results.
arXiv (Cornell University),
Journal Year:
2017,
Volume and Issue:
unknown
Published: Jan. 1, 2017
We
give
an
overview
of
recent
exciting
achievements
deep
reinforcement
learning
(RL).
discuss
six
core
elements,
important
mechanisms,
and
twelve
applications.
start
with
background
machine
learning,
learning.
Next
we
RL
including
value
function,
in
particular,
Deep
Q-Network
(DQN),
policy,
reward,
model,
planning,
exploration.
After
that,
mechanisms
for
RL,
attention
memory,
unsupervised
transfer
multi-agent
hierarchical
to
learn.
Then
various
applications
games,
AlphaGo,
robotics,
natural
language
processing,
dialogue
systems,
translation,
text
generation,
computer
vision,
neural
architecture
design,
business
management,
finance,
healthcare,
Industry
4.0,
smart
grid,
intelligent
transportation
systems.
mention
topics
not
reviewed
yet,
list
a
collection
resources.
presenting
brief
summary,
close
discussions.
Please
see
Reinforcement
Learning,
arXiv:1810.06339,
significant
update.
Journal of Database Management,
Journal Year:
2019,
Volume and Issue:
30(1), P. 61 - 79
Published: Jan. 1, 2019
The
exponential
advancement
in
artificial
intelligence
(AI),
machine
learning,
robotics,
and
automation
are
rapidly
transforming
industries
societies
across
the
world.
way
we
work,
live,
interact
with
others
expected
to
be
transformed
at
a
speed
scale
beyond
anything
have
observed
human
history.
This
new
industrial
revolution
is
expected,
on
one
hand,
enhance
improve
our
lives
societies.
On
other
it
has
potential
cause
major
upheavals
of
life
societal
norms.
window
opportunity
understand
impact
these
technologies
preempt
their
negative
effects
closing
rapidly.
Humanity
needs
proactive,
rather
than
reactive,
managing
this
revolution.
article
looks
promises,
challenges,
future
research
directions
transformative
technologies.
Not
only
technological
aspects
investigated,
but
behavioral,
societal,
policy,
governance
issues
reviewed
as
well.
contributes
ongoing
discussions
debates
about
AI,
automation,
robotics.
It
hoped
that
will
heighten
awareness
importance
understanding
disruptive
basis
for
formulating
policies
regulations
can
maximize
benefits
advancements
humanity
and,
same
time,
curtail
dangers
impacts.
arXiv (Cornell University),
Journal Year:
2018,
Volume and Issue:
unknown
Published: Jan. 1, 2018
As
Machine
Learning
(ML)
gets
applied
to
security-critical
or
sensitive
domains,
there
is
a
growing
need
for
integrity
and
privacy
outsourced
ML
computations.
A
pragmatic
solution
comes
from
Trusted
Execution
Environments
(TEEs),
which
use
hardware
software
protections
isolate
computations
the
untrusted
stack.
However,
these
isolation
guarantees
come
at
price
in
performance,
compared
alternatives.
This
paper
initiates
study
of
high
performance
execution
Deep
Neural
Networks
(DNNs)
TEEs
by
efficiently
partitioning
DNN
between
trusted
devices.
Building
upon
an
efficient
outsourcing
scheme
matrix
multiplication,
we
propose
Slalom,
framework
that
securely
delegates
all
linear
layers
TEE
(e.g.,
Intel
SGX
Sanctum)
faster,
yet
untrusted,
co-located
processor.
We
evaluate
Slalom
running
DNNs
enclave,
selectively
work
GPU.
For
canonical
(VGG16,
MobileNet
ResNet
variants)
obtain
6x
20x
increases
throughput
verifiable
inference,
4x
11x
private
inference.
Chapman and Hall/CRC eBooks,
Journal Year:
2019,
Volume and Issue:
unknown, P. 125 - 154
Published: Feb. 22, 2019
We
discuss
deep
reinforcement
learning
in
an
overview
style.We
draw
a
big
picture,
filled
with
details.We
six
core
elements,
important
mechanisms,
and
twelve
applications,
focusing
on
contemporary
work,
historical
contexts.We
start
background
of
artificial
intelligence,
machine
learning,
(RL),
resources.Next
we
RL
including
value
function,
policy,
reward,
model,
exploration
vs.
exploitation,
representation.Then
mechanisms
for
RL,
attention
memory,
unsupervised
hierarchical
multiagent
relational
to
learn.After
that,
games,
robotics,
natural
language
processing
(NLP),
computer
vision,
finance,
Furthermore,
the
trusted
party
becomes
a
single
point
of
failure,
thus
both
data
and
model
privacy
could
be
compromised
by
breaches,
hacking,
leaks,
etc.Hence,
solutions
originating
from
cryptographic
community
replace
emulate
with
group
computing
servers.In
particular,
to
enable
privacy-preserving
training
NNs,
several
studies
employ
multiparty
computation
(MPC)
techniques
operate
on
two
[83],
[28],
three
[82],
[110],[111],
or
four
[26],
[27]
server
models.Such
approaches,
however,
limit
number
parties
among
which
trust
is
split,
often
assume
an
honest
majority
servers,
require
communicate
(i.e.,
secret
share)
their
outside
premises.This
might
not
acceptable
due
confidentiality
requirements
strict
protection
regulations.Furthermore,
servers
do
own
benefit
training;
hence,
only
incentive
reputation
harm
if
they
are
caught,
increases
possibility
malicious
behavior.A
recently
proposed
alternative
for
NNs
-without
outsourcing
-is
federated
learning.Instead
bringing
model,
brought
(via
coordinating
server)
clients,
who
perform
updates
local
data.The
updated
models
averaged
obtain
global
NN
[75],
[63].Although
learning
retains
sensitive
input
locally
eliminates
need
outsourcing,
that
also
sensitive,
e.g.,
proprietary
reasons,
available
server,
placing
latter
in
position
power
respect
remaining
parties.Recent
research
demonstrates
sharing
intermediate
lead
various
attacks,
such
as
extracting
parties'
inputs
[53],
[113],
[120]
membership
inference
[78],
[86].Consequently,
works
differential
exchanges
values
free
adversarial
inferences
settings
[67],
[101],
[76].Although
differentially
private
partially
attacks
learning,
decrease
utility
resulting
ML
model.Furthermore,
robust
accurate
requires
high
budgets,
such,
level
achieved
practice
remains
unclear
[55].Therefore,
distributed
deep
approach
strong
during
training,
well
final
weights.Recent
approaches
[119],
[42],
have
limited
functionalities,
i.e.,
regularized
generalized
linear
models,
but
traditional
encryption
schemes
make
them
vulnerable
post-quantum
attacks.This
should
cautiously
considered,
recent
advances
quantum
[47],
[87],
[105],
[116],
increase
deploying
quantum-resilient
eliminate
Abstract-In
this
paper,
we
address
problem
privacypreserving
evaluation
neural
networks
N-party,
setting.We
propose
novel
system,
POSEIDON,
first
its
kind
regime
network
training.It
employs
lattice-based
cryptography
preserve
data,
under
passive-adversary
collusions
between
up
N
-1
parties.To
efficiently
execute
secure
backpropagation
algorithm
networks,
provide
generic
packing
enables
Single
Instruction,
Multiple
Data
(SIMD)
operations
encrypted
data.We
introduce
arbitrary
transformations
within
bootstrapping
operation,
optimizing
costly
computations
over
parties,
define
constrained
optimization
choosing
parameters.Our
experimental
results
show
POSEIDON
achieves
accuracy
similar
centralized
decentralized
non-private
communication
overhead
scales
linearly
parties.POSEIDON
trains
3-layer
MNIST
dataset
784
features
60K
samples
10
less
than
2
hours.
IEEE Open Journal of the Communications Society,
Journal Year:
2024,
Volume and Issue:
5, P. 2490 - 2540
Published: Jan. 1, 2024
Around
2020,
5G
began
its
commercialization
journey,
and
discussions
about
the
next-generation
networks
(such
as
6G)
emerged.
Researchers
predict
that
6G
will
have
higher
bandwidth,
coverage,
reliability,
energy
efficiency,
lower
latency,
be
an
integrated
"human-centric"
network
system
powered
by
artificial
intelligence
(AI).
This
lead
to
many
real-time
automated
decisions,
ranging
from
resource
allocation
collision
avoidance
for
self-driving
cars.
However,
there
is
a
risk
of
losing
control
over
decision-making
due
high-speed,
data-intensive
AI
may
go
beyond
designers'
users'
comprehension.
To
mitigate
this
risk,
explainable
(XAI)
methods
can
used
enhance
transparency
black-box
process.
paper
surveys
application
XAI
towards
upcoming
age,
including
technologies
intelligent
radio
zero-touch
management)
use
cases
industry
5.0).
Additionally,
summarizes
lessons
learned
recent
attempts
outlines
important
research
challenges
in
applying
soon.
Monthly Notices of the Royal Astronomical Society,
Journal Year:
2018,
Volume and Issue:
unknown
Published: Nov. 27, 2018
Deep
learning
with
artificial
neural
networks
is
increasingly
gaining
attention,
because
of
its
potential
for
data-driven
astronomy.
However,
this
methodology
usually
does
not
provide
uncertainties
and
deal
incompleteness
noise
in
the
training
data.
In
work,
we
design
a
network
high-resolution
spectroscopic
analysis
using
APOGEE
data
that
mimics
standard
analyses:
stellar
parameters
are
determined
full
wavelength
range,
but
individual
element
abundances
use
censored
portions
spectrum.
We
train
customized
objective
function
deals
incomplete
noisy
apply
dropout
variational
inference
to
derive
on
our
predictions.
determine
18
elements
at
$\approx
0.03$
dex
level,
even
low
signal-to-noise
ratio.
demonstrate
returned
by
method
realistic
estimate
precision
they
automatically
blow
up
when
inputs
or
outputs
outside
set
encountered,
thus
shielding
users
from
unwanted
extrapolation.
By
deep-learning
tools
GPU
acceleration,
extremely
fast,
allowing
entire
$\approx250,000$
spectra
ten
minutes
single,
low-cost
GPU.
release
individual-element
associated
uncertainty
DR14
dataset.
Simultaneously,
astroNN,
well-tested,
open-source
python
package
developed
also
designed
be
general
deep
astroNN
available
https://github.com/henrysky/astroNN
extensive
documentation
http://astroNN.readthedocs.io.