-
121
Stealthy graph backdoor attack based on feature trigger
Published 2025-06-01“…This approach effectively removes useless or harmful edges, thereby enhancing the homogeneity of the nodes. Then, BAFT uses optimization constraints to ensure the invisibility of the attack. …”
Get full text
Article -
122
Analysis of the Impact of Renewable Energy Sources and Energy Storage Systems on Multi-Stage Transmission Network Expansion Planning
Published 2025-01-01“…Furthermore, the MILP model incorporates active power losses through piecewise linearization and <inline-formula> <tex-math notation="LaTeX">$N-1$ </tex-math></inline-formula> security constraints. A method is developed to reduce the combinatorial search space to deal with high-dimensional problems. …”
Get full text
Article -
123
A dynamic service migration strategy based on mobility prediction in edge computing
Published 2021-02-01“…Furthermore, we build a network model and propose a based on Lyapunov optimization method with long-term cost constraints. …”
Get full text
Article -
124
Energy Efficiency Maximization for Device-to-Device Communication Underlaying Cellular Networks on Multiple Bands
Published 2016-01-01“…Then, we formulate the optimization problem of maximizing the EE subject to four constraints regarding to transmission power and outage probabilities, and the non-convexity of this problem is also verified. …”
Get full text
Article -
125
Agent Selection Framework for Federated Learning in Resource-Constrained Wireless Networks
Published 2024-01-01“…Leveraging this importance metric, we formulate a general agent selection optimization problem, which can be adapted to different environments with latency or resource-oriented constraints. …”
Get full text
Article -
126
Jumping knowledge graph attention network for resource allocation in wireless cellular system
Published 2025-05-01“…The realization of these features hinges on the development of rational resource allocation strategies to optimize the utilization of radio resources. This study addresses the beamforming design problem for downlink transmission in multi-cell cellular networks, with a focus on maximizing user data rates while adhering to stringent power constraints. …”
Get full text
Article -
127
A Scalable Multi-Target Tracking Algorithm for Wireless Sensor Networks
Published 2012-09-01“…The algorithm is based on a rigorous probabilistic model and an approximation scheme for the optimal Bayesian filter. In particular, an extensive simulation study shows that there is no performance loss up to an average localization error of 0.7 times the separation between sensors and the algorithm tolerates up to 50% lost-to-total packet ratio and 90% delayed-to-total packet ratio. …”
Get full text
Article -
128
A parallel multi-objective genetic algorithm for scheduling scientific workflows in cloud computing
Published 2020-08-01“…The problem has been extensively studied in the literature. …”
Get full text
Article -
129
Beyond Single-User Scheduling: Exploiting Massive MIMO for Concurrent Data Delivery With Minimum Age of Information
Published 2025-01-01“…We handle the non-convexity of the resulting problem by utilizing successive convex approximation to specifically reformulate the binary/integer and non-convex constraints of the problem. …”
Get full text
Article -
130
Entropy-driven multi agent deep reinforcement learning for resilient distribution networks: coordinating MESS and microgrids
Published 2025-09-01“…Subsequently, the coordinated optimization problem is formulated as a Markov Decision Process (MDP). …”
Get full text
Article -
131
A Self-Adaptive Improved Slime Mold Algorithm for Multi-UAV Path Planning
Published 2025-03-01“…These conditions transform multi-UAV path planning into a complex optimization problem with multiple constraints, significantly reducing the number of feasible solutions and complicating the generation of optimal flight trajectories. …”
Get full text
Article -
132
NAVA: A Network-Adaptive View-Aware Volumetric Video Streaming Framework
Published 2025-01-01“…In our framework, multiple versions with different quality of individual volumetric video are prepared and stored on the server in advance. The rate allocation problem is formulated as a optimization problem by taking into account the visible area of individual sequences as well as the network constraint. …”
Get full text
Article -
133
Improving Secrecy Capacity in the Face of Eavesdropping in SWIPT CIoT Networks With Actor-Critic DRL
Published 2025-01-01“…We formulate the challenging non-convex optimization problem to maximize secrecy capacity while ensuring spectrum sharing and energy constraints and model the CIoT agent’s decision-making as a model-free Markov decision process (MDP). …”
Get full text
Article -
134
Toward Proactive, Secure and Efficient Space-Air-Ground Communications: Generative AI-Based DRL Framework
Published 2025-01-01“…To tackle the demands of secrecy energy efficiency (SEE) in this dynamic and complex network, we formulate a non-convex optimization problem that jointly considers HAP trajectory, user-HAP association, and beamforming. …”
Get full text
Article -
135
Time-Dependent Vehicle Routing of Free Pickup and Delivery Service in Flight Ticket Sales Companies Based on Carbon Emissions
Published 2017-01-01“…The time-dependent pollution-routing problem of free pickup and delivery of passengers to the airport service (TDFPDS) is an extension of the time-dependent pollution-routing problems, arising in flight ticket sales companies for the service of free pickup and delivery of airline passengers to the airport. …”
Get full text
Article -
136
Clustering-based energy-aware virtual network embedding
Published 2017-08-01“…In this article, to bridge this gap, we design a heuristic energy-aware virtual network embedding algorithm called EA-VNE-C, to coordinate the dynamic electricity price and energy consumption to further optimize the energy cost. Extensive simulations demonstrate that this algorithm significantly reduces the energy cost by up to 14% over the state-of-the-art algorithm while maintaining similar revenue.…”
Get full text
Article -
137
An Adversarial Attack via Penalty Method
Published 2025-01-01“…To solve the optimization problem for generating adversarial examples, the latter approach incorporates a misclassifying constraint into the objective using a Lagrangian multiplier or penalty parameter, usually determined by binary search. …”
Get full text
Article -
138
Integrated transportation system planning with gravitational search algorithm approach based on fuzzy mutant controller
Published 2025-03-01“…Considering these three constraints simultaneously brings the problem closer to reality.…”
Get full text
Article -
139
Physics-Informed Neural Network-Based Input Shaping for Vibration Suppression of Flexible Single-Link Robots
Published 2025-01-01“…This paper presents a novel physics-informed neural network (PINN)-based input-shaping method for the vibration suppression problem. Through a two-phase training process of a neural network based on a loss function that follows both the physical model constraints and the vibration modal conditions, we identify optimal input-shaping parameters to minimize residual vibration. …”
Get full text
Article -
140
Multiradar Collaborative Task Scheduling Algorithm Based on Graph Neural Networks with Model Knowledge Embedding
Published 2025-04-01“…This method frames the radar task collaborative scheduling problem as a heterogeneous network graph, leveraging model knowledge to optimize the training process of the Graph Neural Network (GNN) algorithm. …”
Get full text
Article