Fog Function: Serverless Fog Computing for Data Intensive IoT Services DOI
Bin Cheng,

Jonathan Fuerst,

Gürkan Solmaz

et al.

Published: July 1, 2019

Fog computing can support IoT services with fast response time and low bandwidth usage by moving computation from the cloud to edge devices. However, existing fog frameworks have limited flexibility dynamic service composition a data-oriented approach. Function-as-a-Service (FaaS) is promising programming model for enhance flexibility, but current event-or topic-based design of function triggering separation data management execution result in inefficiency data-intensive services. To achieve both efficiency, we propose data-centric called Function also introduce its underlying orchestration mechanism that leverages three types contexts: context, system context. Moreover, showcase concrete use case smart parking where allows developers easily their logic reduced learning efforts compared static topology. Our performance evaluation results show be scaled hundreds nodes. improve efficiency saving 95% internal traffic over it reduce latency 30% function.

Language: Английский

Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing DOI Open Access
Zhi Zhou, Xu Chen,

En Li

et al.

Proceedings of the IEEE, Journal Year: 2019, Volume and Issue: 107(8), P. 1738 - 1762

Published: June 12, 2019

With the breakthroughs in deep learning, recent years have witnessed a booming of artificial intelligence (AI) applications and services, spanning from personal assistant to recommendation systems video/audio surveillance. More recently, with proliferation mobile computing Internet Things (IoT), billions IoT devices are connected Internet, generating zillions bytes data at network edge. Driving by this trend, there is an urgent need push AI frontiers edge so as fully unleash potential big data. To meet demand, computing, emerging paradigm that pushes tasks services core edge, has been widely recognized promising solution. The resulted new interdiscipline, or (EI), beginning receive tremendous amount interest. However, research on EI still its infancy stage, dedicated venue for exchanging advances highly desired both computer system communities. end, we conduct comprehensive survey efforts EI. Specifically, first review background motivation running We then provide overview overarching architectures, frameworks, key technologies learning model toward training/inference Finally, discuss future opportunities believe will elicit escalating attentions, stimulate fruitful discussions, inspire further ideas

Language: Английский

Citations

1649

Federated Learning via Over-the-Air Computation DOI Creative Commons
Kai Yang, Tao Jiang, Yuanming Shi

et al.

IEEE Transactions on Wireless Communications, Journal Year: 2020, Volume and Issue: 19(3), P. 2022 - 2035

Published: Jan. 8, 2020

The stringent requirements for low-latency and privacy of the emerging high-stake applications with intelligent devices such as drones smart vehicles make cloud computing inapplicable in these scenarios. Instead, edge machine learning becomes increasingly attractive performing training inference directly at network edges without sending data to a centralized center. This stimulates nascent field termed federated model on computation, storage, energy bandwidth limited mobile distributed manner. To preserve address issues unbalanced non-IID points across different devices, averaging algorithm has been proposed global aggregation by weighted average locally updated each selected device. However, communication main bottleneck aggregating computed updates. We thus propose novel over-the-air computation based approach fast via exploring superposition property wireless multiple-access channel. is achieved joint device selection beamforming design, which modeled sparse low-rank optimization problem support efficient algorithms design. achieve this goal, we provide difference-of-convex-functions (DC) representation function enhance sparsity accurately detect fixed-rank constraint procedure selection. A DC further developed solve resulting program convergence guarantees. algorithmic advantages admirable performance methodologies are demonstrated through extensive numerical results.

Language: Английский

Citations

815

Deep Reinforcement Learning: An Overview DOI Creative Commons
Yuxi Li

arXiv (Cornell University), Journal Year: 2017, Volume and Issue: unknown

Published: Jan. 1, 2017

We give an overview of recent exciting achievements deep reinforcement learning (RL). discuss six core elements, important mechanisms, and twelve applications. start with background machine learning, learning. Next we RL including value function, in particular, Deep Q-Network (DQN), policy, reward, model, planning, exploration. After that, mechanisms for RL, attention memory, unsupervised transfer multi-agent hierarchical to learn. Then various applications games, AlphaGo, robotics, natural language processing, dialogue systems, translation, text generation, computer vision, neural architecture design, business management, finance, healthcare, Industry 4.0, smart grid, intelligent transportation systems. mention topics not reviewed yet, list a collection resources. presenting brief summary, close discussions. Please see Reinforcement Learning, arXiv:1810.06339, significant update.

Language: Английский

Citations

485

Artificial Intelligence, Machine Learning, Automation, Robotics, Future of Work and Future of Humanity DOI
Weiyu Wang, Keng Siau

Journal of Database Management, Journal Year: 2019, Volume and Issue: 30(1), P. 61 - 79

Published: Jan. 1, 2019

The exponential advancement in artificial intelligence (AI), machine learning, robotics, and automation are rapidly transforming industries societies across the world. way we work, live, interact with others expected to be transformed at a speed scale beyond anything have observed human history. This new industrial revolution is expected, on one hand, enhance improve our lives societies. On other it has potential cause major upheavals of life societal norms. window opportunity understand impact these technologies preempt their negative effects closing rapidly. Humanity needs proactive, rather than reactive, managing this revolution. article looks promises, challenges, future research directions transformative technologies. Not only technological aspects investigated, but behavioral, societal, policy, governance issues reviewed as well. contributes ongoing discussions debates about AI, automation, robotics. It hoped that will heighten awareness importance understanding disruptive basis for formulating policies regulations can maximize benefits advancements humanity and, same time, curtail dangers impacts.

Language: Английский

Citations

312

Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware DOI Creative Commons
Florian Tramèr, Dan Boneh

arXiv (Cornell University), Journal Year: 2018, Volume and Issue: unknown

Published: Jan. 1, 2018

As Machine Learning (ML) gets applied to security-critical or sensitive domains, there is a growing need for integrity and privacy outsourced ML computations. A pragmatic solution comes from Trusted Execution Environments (TEEs), which use hardware software protections isolate computations the untrusted stack. However, these isolation guarantees come at price in performance, compared alternatives. This paper initiates study of high performance execution Deep Neural Networks (DNNs) TEEs by efficiently partitioning DNN between trusted devices. Building upon an efficient outsourcing scheme matrix multiplication, we propose Slalom, framework that securely delegates all linear layers TEE (e.g., Intel SGX Sanctum) faster, yet untrusted, co-located processor. We evaluate Slalom running DNNs enclave, selectively work GPU. For canonical (VGG16, MobileNet ResNet variants) obtain 6x 20x increases throughput verifiable inference, 4x 11x private inference.

Language: Английский

Citations

202

A human-centric perspective exploring the readiness towards smart warehousing: The case of a large retail distribution warehouse DOI
Kamran Mahroof

International Journal of Information Management, Journal Year: 2018, Volume and Issue: 45, P. 176 - 190

Published: Dec. 1, 2018

Language: Английский

Citations

172

Deep Reinforcement Learning DOI
Chong Li

Chapman and Hall/CRC eBooks, Journal Year: 2019, Volume and Issue: unknown, P. 125 - 154

Published: Feb. 22, 2019

We discuss deep reinforcement learning in an overview style.We draw a big picture, filled with details.We six core elements, important mechanisms, and twelve applications, focusing on contemporary work, historical contexts.We start background of artificial intelligence, machine learning, (RL), resources.Next we RL including value function, policy, reward, model, exploration vs. exploitation, representation.Then mechanisms for RL, attention memory, unsupervised hierarchical multiagent relational to learn.After that, games, robotics, natural language processing (NLP), computer vision, finance,

Language: Английский

Citations

165

POSEIDON: Privacy-Preserving Federated Neural Network Learning DOI Open Access
Sinem Sav, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza

et al.

Published: Jan. 1, 2021

Furthermore, the trusted party becomes a single point of failure, thus both data and model privacy could be compromised by breaches, hacking, leaks, etc.Hence, solutions originating from cryptographic community replace emulate with group computing servers.In particular, to enable privacy-preserving training NNs, several studies employ multiparty computation (MPC) techniques operate on two [83], [28], three [82], [110],[111], or four [26], [27] server models.Such approaches, however, limit number parties among which trust is split, often assume an honest majority servers, require communicate (i.e., secret share) their outside premises.This might not acceptable due confidentiality requirements strict protection regulations.Furthermore, servers do own benefit training; hence, only incentive reputation harm if they are caught, increases possibility malicious behavior.A recently proposed alternative for NNs -without outsourcing -is federated learning.Instead bringing model, brought (via coordinating server) clients, who perform updates local data.The updated models averaged obtain global NN [75], [63].Although learning retains sensitive input locally eliminates need outsourcing, that also sensitive, e.g., proprietary reasons, available server, placing latter in position power respect remaining parties.Recent research demonstrates sharing intermediate lead various attacks, such as extracting parties' inputs [53], [113], [120] membership inference [78], [86].Consequently, works differential exchanges values free adversarial inferences settings [67], [101], [76].Although differentially private partially attacks learning, decrease utility resulting ML model.Furthermore, robust accurate requires high budgets, such, level achieved practice remains unclear [55].Therefore, distributed deep approach strong during training, well final weights.Recent approaches [119], [42], have limited functionalities, i.e., regularized generalized linear models, but traditional encryption schemes make them vulnerable post-quantum attacks.This should cautiously considered, recent advances quantum [47], [87], [105], [116], increase deploying quantum-resilient eliminate Abstract-In this paper, we address problem privacypreserving evaluation neural networks N-party, setting.We propose novel system, POSEIDON, first its kind regime network training.It employs lattice-based cryptography preserve data, under passive-adversary collusions between up N -1 parties.To efficiently execute secure backpropagation algorithm networks, provide generic packing enables Single Instruction, Multiple Data (SIMD) operations encrypted data.We introduce arbitrary transformations within bootstrapping operation, optimizing costly computations over parties, define constrained optimization choosing parameters.Our experimental results show POSEIDON achieves accuracy similar centralized decentralized non-private communication overhead scales linearly parties.POSEIDON trains 3-layer MNIST dataset 784 features 60K samples 10 less than 2 hours.

Language: Английский

Citations

105

Explainable AI for 6G Use Cases: Technical Aspects and Research Challenges DOI Creative Commons
Shen Wang, M. Atif Qureshi, Luis Miralles‐Pechuán

et al.

IEEE Open Journal of the Communications Society, Journal Year: 2024, Volume and Issue: 5, P. 2490 - 2540

Published: Jan. 1, 2024

Around 2020, 5G began its commercialization journey, and discussions about the next-generation networks (such as 6G) emerged. Researchers predict that 6G will have higher bandwidth, coverage, reliability, energy efficiency, lower latency, be an integrated "human-centric" network system powered by artificial intelligence (AI). This lead to many real-time automated decisions, ranging from resource allocation collision avoidance for self-driving cars. However, there is a risk of losing control over decision-making due high-speed, data-intensive AI may go beyond designers' users' comprehension. To mitigate this risk, explainable (XAI) methods can used enhance transparency black-box process. paper surveys application XAI towards upcoming age, including technologies intelligent radio zero-touch management) use cases industry 5.0). Additionally, summarizes lessons learned recent attempts outlines important research challenges in applying soon.

Language: Английский

Citations

22

Deep learning of multi-element abundances from high-resolution spectroscopic data DOI
Henry Leung, Jo Bovy

Monthly Notices of the Royal Astronomical Society, Journal Year: 2018, Volume and Issue: unknown

Published: Nov. 27, 2018

Deep learning with artificial neural networks is increasingly gaining attention, because of its potential for data-driven astronomy. However, this methodology usually does not provide uncertainties and deal incompleteness noise in the training data. In work, we design a network high-resolution spectroscopic analysis using APOGEE data that mimics standard analyses: stellar parameters are determined full wavelength range, but individual element abundances use censored portions spectrum. We train customized objective function deals incomplete noisy apply dropout variational inference to derive on our predictions. determine 18 elements at $\approx 0.03$ dex level, even low signal-to-noise ratio. demonstrate returned by method realistic estimate precision they automatically blow up when inputs or outputs outside set encountered, thus shielding users from unwanted extrapolation. By deep-learning tools GPU acceleration, extremely fast, allowing entire $\approx250,000$ spectra ten minutes single, low-cost GPU. release individual-element associated uncertainty DR14 dataset. Simultaneously, astroNN, well-tested, open-source python package developed also designed be general deep astroNN available https://github.com/henrysky/astroNN extensive documentation http://astroNN.readthedocs.io.

Language: Английский

Citations

152