A survey on resource management in joint communication and computing-embedded SAGIN
The advent of the 6G era aims for ubiquitous connectivity, with the integration of non-
terrestrial networks (NTN) offering extensive coverage and enhanced capacity. As …
terrestrial networks (NTN) offering extensive coverage and enhanced capacity. As …
Bi-real net: Enhancing the performance of 1-bit cnns with improved representational capability and advanced training algorithm
In this work, we study the 1-bit convolutional neural networks (CNNs), of which both the
weights and activations are binary. While being efficient, the classification accuracy of the …
weights and activations are binary. While being efficient, the classification accuracy of the …
Unsupervised deep hashing with similarity-adaptive and discrete optimization
Recent vision and learning studies show that learning compact hash codes can facilitate
massive data processing with significantly reduced storage and computation. Particularly …
massive data processing with significantly reduced storage and computation. Particularly …
Peer-to-peer joint electricity and carbon trading based on carbon-aware distribution locational marginal pricing
Z Lu, L Bai, J Wang, J Wei, Y Xiao… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
This paper proposes a novel Peer-to-Peer (P2P) joint electricity and carbon (E&C) trading
model to co-optimize the energy and carbon emissions permit transactions considering the …
model to co-optimize the energy and carbon emissions permit transactions considering the …
Top-k Feature Selection Framework Using Robust 0–1 Integer Programming
Feature selection (FS), which identifies the relevant features in a data set to facilitate
subsequent data analysis, is a fundamental problem in machine learning and has been …
subsequent data analysis, is a fundamental problem in machine learning and has been …
Sparse adversarial attack via perturbation factorization
This work studies the sparse adversarial attack, which aims to generate adversarial
perturbations onto partial positions of one benign image, such that the perturbed image is …
perturbations onto partial positions of one benign image, such that the perturbed image is …
A two-timescale duplex neurodynamic approach to mixed-integer optimization
This article presents a two-timescale duplex neurodynamic approach to mixed-integer
optimization, based on a biconvex optimization problem reformulation with additional …
optimization, based on a biconvex optimization problem reformulation with additional …
Compressing convolutional neural networks via factorized convolutional filters
This work studies the model compression for deep convolutional neural networks (CNNs)
via filter pruning. The workflow of a traditional pruning consists of three sequential stages …
via filter pruning. The workflow of a traditional pruning consists of three sequential stages …
A survey on high-dimensional subspace clustering
W Qu, X Xiu, H Chen, L Kong - Mathematics, 2023 - mdpi.com
With the rapid development of science and technology, high-dimensional data have been
widely used in various fields. Due to the complex characteristics of high-dimensional data, it …
widely used in various fields. Due to the complex characteristics of high-dimensional data, it …
Deep hashing with minimal-distance-separated hash centers
Deep hashing is an appealing approach for large-scale image retrieval. Most existing
supervised deep hashing methods learn hash functions using pairwise or triple image …
supervised deep hashing methods learn hash functions using pairwise or triple image …