Skip to main content

Powerful Encoding and Decoding Computation of Reservoir Computing

  • Conference paper
  • First Online:
Intelligent Robotics and Applications (ICIRA 2023)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 14267))

Included in the following conference series:

  • 497 Accesses

Abstract

Reservoir computing (RC) has been widely applied in the fields of time series data processing and time series prediction due to its powerful data representation capability. The reservoir exhibits nonlinear dynamics, and its internal dynamics have infinitely long correlations when the system settles at the edge of chaos, rendering the system to achieve excellent computational performance. However, the encoding and decoding performance of RC is still unclear. This paper investigates the encoding and decoding abilities of the classic RC model, Echo State Network (ESN), on an image reconstruction task. The results show that ESN could greatly reconstruct grey images as well as color images, and demonstrate excellent generalization. Furthermore, a deep neural network based on ESN is proposed to resist the attacks on the trained model in experiments, showing that ESN enables the model to have excellent privacy protection ability. Our results demonstrate that the ESN’s powerful encoding and decoding computational performance makes it highly promising in facilitating tasks, such as few-shot learning and privacy computing.

Supported by the National Natural Science Foundation of China under Grant 12175242

Supported by Youth Foundation Project of Zhejiang Lab (No. 111012-AA2306).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Redmon J., Divvala S., Girshick R., et al.: You only look once: unified, real-time object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 779–788. IEEE, Las Vegas, NV, USA (2016)

    Google Scholar 

  2. Deng, L., Li, J., Huang, J.T., et al.: Recent advances in deep learning for speech research at Microsoft. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 8604–8608. IEEE, Vancouver, BC, Canada (2013)

    Google Scholar 

  3. Chen, C., Seff, A., Kornhauser, A., et al.: Deepdriving: learning affordance for direct perception in autonomous driving. In: Proceedings of the IEEE International Conference on Computer Vision (ICCV), pp. 2722–2730. IEEE, Santiago, Chile (2015)

    Google Scholar 

  4. Dosovitskiy, A., Beyer, L., Kolesnikov, A., et al.: An image is worth 16x16 words: transformers for image recognition at scale. eprint arXiv: 2010.11929 (2020)

  5. Chen Z., Xie L., Niu J., et al.: Visformer: the vision-friendly transformer. In: Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), pp. 589–598. IEEE, virtually (2021)

    Google Scholar 

  6. Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)

    Article  Google Scholar 

  7. Schrauwen B., Verstraeten D., Van Campenhout J.: An overview of reservoir computing: theory, applications, and implementations. In: Proceedings of the 15th European Symposium on Artificial Neural Networks (ESANN), pp. 471–482. DBLP, Bruges, Belgium (2007)

    Google Scholar 

  8. Skowronski, M.D., Harris, J.G.: Automatic speech recognition using a predictive echo state network classifier. Neural Netw. 20(3), 414–423 (2007)

    Article  MATH  Google Scholar 

  9. Lukoševičius, M., Jaeger, H., Schrauwen, B.: Reservoir computing trends. Künstl Intell. 26(4), 365–371 (2012)

    Article  Google Scholar 

  10. Lukoševičius, M., Jaeger, H.: Reservoir computing approaches to recurrent neural network training. Comput. Sci. Rev. 3(3), 127–149 (2009)

    Article  MATH  Google Scholar 

  11. Jaeger, H.: Echo state network. Scholarpedia 2(9), 2330 (2007)

    Google Scholar 

  12. Karras T., Laine S., Aila T.: A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4401–4410. IEEE, Long Beach (2019)

    Google Scholar 

  13. Hadaeghi, F.: Neuromorphic electronic systems for reservoir computing. In: Nakajima, K., Fischer, I. (eds.) Reservoir Computing. Natural Computing Series, pp. 221–237. Springer, Singapore (2021)

    Google Scholar 

  14. Jaeger, H.: Long short-term memory in echo state networks: details of a simulation study. Jacobs University Bremen (2012)

    Google Scholar 

  15. Abdi, H.: Singular value decomposition (SVD) and generalized singular value decomposition. In: Encyclopedia of Measurement and Statistics, pp. 907–912 (2007)

    Google Scholar 

  16. Kolda, T.G., Bader, B.W.: Tensor decompositions and applications. SIAM Rev. Soc. Ind. Appl. Math. 51(3), 455–500 (2009)

    MathSciNet  MATH  Google Scholar 

  17. Yang, H., Lam, K.Y., Xiao, L., et al.: Lead federated neuromorphic learning for wireless edge artificial intelligence. Nat. Commun. 13(1), 4269 (2022)

    Article  Google Scholar 

  18. Lindell, Y.: Secure multiparty computation for privacy preserving data mining. In: Wang, J. (eds.) Encyclopedia of Data Warehousing and Mining, pp. 1005–1009. IGI Global (2005)

    Google Scholar 

  19. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-first annual ACM Symposium on Theory of Computing (STOC), pp. 169–178. Association for Computing Machinery, NY (2009)

    Google Scholar 

  20. Dwork, C.: Differential privacy: a survey of results. In: Theory and Applications of Models of Computation: 5th International Conference (TAMC), pp. 25–29. DBLP, Xi’an, China (2008)

    Google Scholar 

  21. Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4401–4410. IEEE, Long Beach (2019)

    Google Scholar 

Download references

Acknowledgment

Weian and Dongping’s work is supported in part by the National Natural Science Foundation of China (Grant No. 12175242). Huiwen’s work is supported in part by the Youth Foundation Project of Zhejiang Lab (Grant No. 111012-AA2306).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongping Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, W., Wu, H., Yang, D. (2023). Powerful Encoding and Decoding Computation of Reservoir Computing. In: Yang, H., et al. Intelligent Robotics and Applications. ICIRA 2023. Lecture Notes in Computer Science(), vol 14267. Springer, Singapore. https://doi.org/10.1007/978-981-99-6483-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-6483-3_16

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-6482-6

  • Online ISBN: 978-981-99-6483-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics