Alert button
Picture for Zhou Su

Zhou Su

Alert button

Towards Practical Multi-Robot Hybrid Tasks Allocation for Autonomous Cleaning

Apr 04, 2023
Yabin Wang, Xiaopeng Hong, Zhiheng Ma, Tiedong Ma, Baoxing Qin, Zhou Su

Figure 1 for Towards Practical Multi-Robot Hybrid Tasks Allocation for Autonomous Cleaning
Figure 2 for Towards Practical Multi-Robot Hybrid Tasks Allocation for Autonomous Cleaning
Figure 3 for Towards Practical Multi-Robot Hybrid Tasks Allocation for Autonomous Cleaning
Figure 4 for Towards Practical Multi-Robot Hybrid Tasks Allocation for Autonomous Cleaning

Task allocation plays a vital role in multi-robot autonomous cleaning systems, where multiple robots work together to clean a large area. However, most current studies mainly focus on deterministic, single-task allocation for cleaning robots, without considering hybrid tasks in uncertain working environments. Moreover, there is a lack of datasets and benchmarks for relevant research. In this paper, to address these problems, we formulate multi-robot hybrid-task allocation under the uncertain cleaning environment as a robust optimization problem. Firstly, we propose a novel robust mixed-integer linear programming model with practical constraints including the task order constraint for different tasks and the ability constraints of hybrid robots. Secondly, we establish a dataset of \emph{100} instances made from floor plans, each of which has 2D manually-labeled images and a 3D model. Thirdly, we provide comprehensive results on the collected dataset using three traditional optimization approaches and a deep reinforcement learning-based solver. The evaluation results show that our solution meets the needs of multi-robot cleaning task allocation and the robust solver can protect the system from worst-case scenarios with little additional cost. The benchmark will be available at {https://github.com/iamwangyabin/Multi-robot-Cleaning-Task-Allocation}.

Viaarxiv icon

Social-Aware Clustered Federated Learning with Customized Privacy Preservation

Dec 25, 2022
Yuntao Wang, Zhou Su, Yanghe Pan, Tom H Luan, Ruidong Li, Shui Yu

Figure 1 for Social-Aware Clustered Federated Learning with Customized Privacy Preservation
Figure 2 for Social-Aware Clustered Federated Learning with Customized Privacy Preservation
Figure 3 for Social-Aware Clustered Federated Learning with Customized Privacy Preservation
Figure 4 for Social-Aware Clustered Federated Learning with Customized Privacy Preservation

A key feature of federated learning (FL) is to preserve the data privacy of end users. However, there still exist potential privacy leakage in exchanging gradients under FL. As a result, recent research often explores the differential privacy (DP) approaches to add noises to the computing results to address privacy concerns with low overheads, which however degrade the model performance. In this paper, we strike the balance of data privacy and efficiency by utilizing the pervasive social connections between users. Specifically, we propose SCFL, a novel Social-aware Clustered Federated Learning scheme, where mutually trusted individuals can freely form a social cluster and aggregate their raw model updates (e.g., gradients) inside each cluster before uploading to the cloud for global aggregation. By mixing model updates in a social group, adversaries can only eavesdrop the social-layer combined results, but not the privacy of individuals. We unfold the design of SCFL in three steps. \emph{i) Stable social cluster formation. Considering users' heterogeneous training samples and data distributions, we formulate the optimal social cluster formation problem as a federation game and devise a fair revenue allocation mechanism to resist free-riders. ii) Differentiated trust-privacy mapping}. For the clusters with low mutual trust, we design a customizable privacy preservation mechanism to adaptively sanitize participants' model updates depending on social trust degrees. iii) Distributed convergence}. A distributed two-sided matching algorithm is devised to attain an optimized disjoint partition with Nash-stable convergence. Experiments on Facebook network and MNIST/CIFAR-10 datasets validate that our SCFL can effectively enhance learning utility, improve user payoff, and enforce customizable privacy protection.

Viaarxiv icon

Isolation and Impartial Aggregation: A Paradigm of Incremental Learning without Interference

Nov 29, 2022
Yabin Wang, Zhiheng Ma, Zhiwu Huang, Yaowei Wang, Zhou Su, Xiaopeng Hong

Figure 1 for Isolation and Impartial Aggregation: A Paradigm of Incremental Learning without Interference
Figure 2 for Isolation and Impartial Aggregation: A Paradigm of Incremental Learning without Interference
Figure 3 for Isolation and Impartial Aggregation: A Paradigm of Incremental Learning without Interference
Figure 4 for Isolation and Impartial Aggregation: A Paradigm of Incremental Learning without Interference

This paper focuses on the prevalent performance imbalance in the stages of incremental learning. To avoid obvious stage learning bottlenecks, we propose a brand-new stage-isolation based incremental learning framework, which leverages a series of stage-isolated classifiers to perform the learning task of each stage without the interference of others. To be concrete, to aggregate multiple stage classifiers as a uniform one impartially, we first introduce a temperature-controlled energy metric for indicating the confidence score levels of the stage classifiers. We then propose an anchor-based energy self-normalization strategy to ensure the stage classifiers work at the same energy level. Finally, we design a voting-based inference augmentation strategy for robust inference. The proposed method is rehearsal free and can work for almost all continual learning scenarios. We evaluate the proposed method on four large benchmarks. Extensive results demonstrate the superiority of the proposed method in setting up new state-of-the-art overall performance. \emph{Code is available at} \url{https://github.com/iamwangyabin/ESN}.

* This is the accepted version of the Paper & Supp to appear in AAAI 2023. Please cite the final published version. Code is available at https://github.com/iamwangyabin/ESN 
Viaarxiv icon

Semi-supervised Crowd Counting via Density Agency

Sep 07, 2022
Hui Lin, Zhiheng Ma, Xiaopeng Hong, Yaowei Wang, Zhou Su

Figure 1 for Semi-supervised Crowd Counting via Density Agency
Figure 2 for Semi-supervised Crowd Counting via Density Agency
Figure 3 for Semi-supervised Crowd Counting via Density Agency
Figure 4 for Semi-supervised Crowd Counting via Density Agency

In this paper, we propose a new agency-guided semi-supervised counting approach. First, we build a learnable auxiliary structure, namely the density agency to bring the recognized foreground regional features close to corresponding density sub-classes (agents) and push away background ones. Second, we propose a density-guided contrastive learning loss to consolidate the backbone feature extractor. Third, we build a regression head by using a transformer structure to refine the foreground features further. Finally, an efficient noise depression loss is provided to minimize the negative influence of annotation noises. Extensive experiments on four challenging crowd counting datasets demonstrate that our method achieves superior performance to the state-of-the-art semi-supervised counting methods by a large margin. Code is available.

* This is the accepted version of the Paper & Supp to appear in ACM MM 2022. Please cite the final published version. Code is available at https://github.com/LoraLinH/Semi-supervised-Crowd-Counting-via-Density-Agency 
Viaarxiv icon

Continuous Temporal Graph Networks for Event-Based Graph Data

May 31, 2022
Jin Guo, Zhen Han, Zhou Su, Jiliang Li, Volker Tresp, Yuyi Wang

Figure 1 for Continuous Temporal Graph Networks for Event-Based Graph Data
Figure 2 for Continuous Temporal Graph Networks for Event-Based Graph Data
Figure 3 for Continuous Temporal Graph Networks for Event-Based Graph Data
Figure 4 for Continuous Temporal Graph Networks for Event-Based Graph Data

There has been an increasing interest in modeling continuous-time dynamics of temporal graph data. Previous methods encode time-evolving relational information into a low-dimensional representation by specifying discrete layers of neural networks, while real-world dynamic graphs often vary continuously over time. Hence, we propose Continuous Temporal Graph Networks (CTGNs) to capture the continuous dynamics of temporal graph data. We use both the link starting timestamps and link duration as evolving information to model the continuous dynamics of nodes. The key idea is to use neural ordinary differential equations (ODE) to characterize the continuous dynamics of node representations over dynamic graphs. We parameterize ordinary differential equations using a novel graph neural network. The existing dynamic graph networks can be considered as a specific discretization of CTGNs. Experiment results on both transductive and inductive tasks demonstrate the effectiveness of our proposed approach over competitive baselines.

Viaarxiv icon

Energy-Efficient and Physical Layer Secure Computation Offloading in Blockchain-Empowered Internet of Things

Mar 25, 2022
Yiliang Liu, Zhou Su, Yuntao Wang

Figure 1 for Energy-Efficient and Physical Layer Secure Computation Offloading in Blockchain-Empowered Internet of Things
Figure 2 for Energy-Efficient and Physical Layer Secure Computation Offloading in Blockchain-Empowered Internet of Things
Figure 3 for Energy-Efficient and Physical Layer Secure Computation Offloading in Blockchain-Empowered Internet of Things
Figure 4 for Energy-Efficient and Physical Layer Secure Computation Offloading in Blockchain-Empowered Internet of Things

This paper investigates computation offloading in blockchain-empowered Internet of Things (IoT), where the task data uploading link from sensors to a base station (BS) is protected by intelligent reflecting surface (IRS)-assisted physical layer security (PLS). After receiving task data, the BS allocates computational resources provided by mobile edge computing (MEC) servers to help sensors perform tasks. Existing blockchain-based computation offloading schemes usually focus on network performance improvements, such as energy consumption minimization or latency minimization, and neglect the Gas fee for computation offloading, resulting in the dissatisfaction of high Gas providers. Also, the secrecy rate during the data uploading process can not be measured by a steady value because of the time-varying characteristics of IRS-based wireless channels, thereby computational resources allocation with a secrecy rate measured before data uploading is inappropriate. In this paper, we design a Gas-oriented computation offloading scheme that guarantees a low degree of dissatisfaction of sensors, while reducing energy consumption. Also, we deduce the ergodic secrecy rate of IRS-assisted PLS transmission that can represent the global secrecy performance to allocate computational resources. The simulations show that the proposed scheme has lower energy consumption compared to existing schemes, and ensures that the node paying higher Gas gets stronger computational resources.

* arXiv admin note: text overlap with arXiv:2203.01621 
Viaarxiv icon

Mobile Wireless Rechargeable UAV Networks: Challenges and Solutions

Mar 24, 2022
Yuntao Wang, Zhou Su, Ning Zhang, Ruidong Li

Figure 1 for Mobile Wireless Rechargeable UAV Networks: Challenges and Solutions
Figure 2 for Mobile Wireless Rechargeable UAV Networks: Challenges and Solutions
Figure 3 for Mobile Wireless Rechargeable UAV Networks: Challenges and Solutions
Figure 4 for Mobile Wireless Rechargeable UAV Networks: Challenges and Solutions

Unmanned aerial vehicles (UAVs) can help facilitate cost-effective and flexible service provisioning in future smart cities. Nevertheless, UAV applications generally suffer severe flight time limitations due to constrained onboard battery capacity, causing a necessity of frequent battery recharging or replacement when performing persistent missions. Utilizing wireless mobile chargers, such as vehicles with wireless charging equipment for on-demand self-recharging has been envisioned as a promising solution to address this issue. In this article, we present a comprehensive study of \underline{v}ehicle-assisted \underline{w}ireless rechargeable \underline{U}AV \underline{n}etworks (VWUNs) to promote on-demand, secure, and efficient UAV recharging services. Specifically, we first discuss the opportunities and challenges of deploying VWUNs and review state-of-the-art solutions in this field. We then propose a secure and privacy-preserving VWUN framework for UAVs and ground vehicles based on differential privacy (DP). Within this framework, an online double auction mechanism is developed for optimal charging scheduling, and a two-phase DP algorithm is devised to preserve the sensitive bidding and energy trading information of participants. Experimental results demonstrate that the proposed framework can effectively enhance charging efficiency and security. Finally, we outline promising directions for future research in this emerging field.

* IEEE Communication Magazine 2022  
* Accepted by IEEE Communication Magazine 
Viaarxiv icon

Endogenous Security of Computation Offloading in Blockchain-Empowered Internet of Things

Mar 03, 2022
Yiliang Liu, Zhou Su, Bobo Yu

Figure 1 for Endogenous Security of Computation Offloading in Blockchain-Empowered Internet of Things
Figure 2 for Endogenous Security of Computation Offloading in Blockchain-Empowered Internet of Things

This paper investigates an endogenous security architecture for computation offloading in the Internet of Things (IoT), where the blockchain technology enables the traceability of malicious behaviors, and the task data uploading link from sensors to small base station (SBS) is protected by intelligent reflecting surface (IRS)-assisted physical layer security (PLS). After receiving task data, the SBS allocates computational resources to help sensors perform the task. The existing computation offloading schemes usually focus on network performance improvement, such as energy consumption minimization, and neglect the Gas fee paid by sensors, resulting in the discontent of high Gas payers. Here, we design a Gas-oriented computation offloading scheme that guarantees the degree of satisfaction of sensors, while aiming to reduce energy consumption. Also, we deduce the ergodic secrecy rate of IRS-assisted PLS transmission that can represent the global secrecy performance to allocate computational resources. The simulations show that the proposed scheme ensures that the node paying higher Gas gets stronger computational resources, and just raises $4\%$ energy consumption in comparison with energy consumption minimization schemes.

Viaarxiv icon

Learning Visual Knowledge Memory Networks for Visual Question Answering

Jun 13, 2018
Zhou Su, Chen Zhu, Yinpeng Dong, Dongqi Cai, Yurong Chen, Jianguo Li

Figure 1 for Learning Visual Knowledge Memory Networks for Visual Question Answering
Figure 2 for Learning Visual Knowledge Memory Networks for Visual Question Answering
Figure 3 for Learning Visual Knowledge Memory Networks for Visual Question Answering
Figure 4 for Learning Visual Knowledge Memory Networks for Visual Question Answering

Visual question answering (VQA) requires joint comprehension of images and natural language questions, where many questions can't be directly or clearly answered from visual content but require reasoning from structured human knowledge with confirmation from visual content. This paper proposes visual knowledge memory network (VKMN) to address this issue, which seamlessly incorporates structured human knowledge and deep visual features into memory networks in an end-to-end learning framework. Comparing to existing methods for leveraging external knowledge for supporting VQA, this paper stresses more on two missing mechanisms. First is the mechanism for integrating visual contents with knowledge facts. VKMN handles this issue by embedding knowledge triples (subject, relation, target) and deep visual features jointly into the visual knowledge features. Second is the mechanism for handling multiple knowledge facts expanding from question and answer pairs. VKMN stores joint embedding using key-value pair structure in the memory networks so that it is easy to handle multiple facts. Experiments show that the proposed method achieves promising results on both VQA v1.0 and v2.0 benchmarks, while outperforms state-of-the-art methods on the knowledge-reasoning related questions.

* Supplementary to CVPR 2018 version 
Viaarxiv icon