Abstract
Reservoir computing (RC) has been widely applied in the fields of time series data processing and time series prediction due to its powerful data representation capability. The reservoir exhibits nonlinear dynamics, and its internal dynamics have infinitely long correlations when the system settles at the edge of chaos, rendering the system to achieve excellent computational performance. However, the encoding and decoding performance of RC is still unclear. This paper investigates the encoding and decoding abilities of the classic RC model, Echo State Network (ESN), on an image reconstruction task. The results show that ESN could greatly reconstruct grey images as well as color images, and demonstrate excellent generalization. Furthermore, a deep neural network based on ESN is proposed to resist the attacks on the trained model in experiments, showing that ESN enables the model to have excellent privacy protection ability. Our results demonstrate that the ESN’s powerful encoding and decoding computational performance makes it highly promising in facilitating tasks, such as few-shot learning and privacy computing.
Supported by the National Natural Science Foundation of China under Grant 12175242
Supported by Youth Foundation Project of Zhejiang Lab (No. 111012-AA2306).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Redmon J., Divvala S., Girshick R., et al.: You only look once: unified, real-time object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 779–788. IEEE, Las Vegas, NV, USA (2016)
Deng, L., Li, J., Huang, J.T., et al.: Recent advances in deep learning for speech research at Microsoft. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 8604–8608. IEEE, Vancouver, BC, Canada (2013)
Chen, C., Seff, A., Kornhauser, A., et al.: Deepdriving: learning affordance for direct perception in autonomous driving. In: Proceedings of the IEEE International Conference on Computer Vision (ICCV), pp. 2722–2730. IEEE, Santiago, Chile (2015)
Dosovitskiy, A., Beyer, L., Kolesnikov, A., et al.: An image is worth 16x16 words: transformers for image recognition at scale. eprint arXiv: 2010.11929 (2020)
Chen Z., Xie L., Niu J., et al.: Visformer: the vision-friendly transformer. In: Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), pp. 589–598. IEEE, virtually (2021)
Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)
Schrauwen B., Verstraeten D., Van Campenhout J.: An overview of reservoir computing: theory, applications, and implementations. In: Proceedings of the 15th European Symposium on Artificial Neural Networks (ESANN), pp. 471–482. DBLP, Bruges, Belgium (2007)
Skowronski, M.D., Harris, J.G.: Automatic speech recognition using a predictive echo state network classifier. Neural Netw. 20(3), 414–423 (2007)
Lukoševičius, M., Jaeger, H., Schrauwen, B.: Reservoir computing trends. Künstl Intell. 26(4), 365–371 (2012)
Lukoševičius, M., Jaeger, H.: Reservoir computing approaches to recurrent neural network training. Comput. Sci. Rev. 3(3), 127–149 (2009)
Jaeger, H.: Echo state network. Scholarpedia 2(9), 2330 (2007)
Karras T., Laine S., Aila T.: A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4401–4410. IEEE, Long Beach (2019)
Hadaeghi, F.: Neuromorphic electronic systems for reservoir computing. In: Nakajima, K., Fischer, I. (eds.) Reservoir Computing. Natural Computing Series, pp. 221–237. Springer, Singapore (2021)
Jaeger, H.: Long short-term memory in echo state networks: details of a simulation study. Jacobs University Bremen (2012)
Abdi, H.: Singular value decomposition (SVD) and generalized singular value decomposition. In: Encyclopedia of Measurement and Statistics, pp. 907–912 (2007)
Kolda, T.G., Bader, B.W.: Tensor decompositions and applications. SIAM Rev. Soc. Ind. Appl. Math. 51(3), 455–500 (2009)
Yang, H., Lam, K.Y., Xiao, L., et al.: Lead federated neuromorphic learning for wireless edge artificial intelligence. Nat. Commun. 13(1), 4269 (2022)
Lindell, Y.: Secure multiparty computation for privacy preserving data mining. In: Wang, J. (eds.) Encyclopedia of Data Warehousing and Mining, pp. 1005–1009. IGI Global (2005)
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-first annual ACM Symposium on Theory of Computing (STOC), pp. 169–178. Association for Computing Machinery, NY (2009)
Dwork, C.: Differential privacy: a survey of results. In: Theory and Applications of Models of Computation: 5th International Conference (TAMC), pp. 25–29. DBLP, Xi’an, China (2008)
Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4401–4410. IEEE, Long Beach (2019)
Acknowledgment
Weian and Dongping’s work is supported in part by the National Natural Science Foundation of China (Grant No. 12175242). Huiwen’s work is supported in part by the Youth Foundation Project of Zhejiang Lab (Grant No. 111012-AA2306).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, W., Wu, H., Yang, D. (2023). Powerful Encoding and Decoding Computation of Reservoir Computing. In: Yang, H., et al. Intelligent Robotics and Applications. ICIRA 2023. Lecture Notes in Computer Science(), vol 14267. Springer, Singapore. https://doi.org/10.1007/978-981-99-6483-3_16
Download citation
DOI: https://doi.org/10.1007/978-981-99-6483-3_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-6482-6
Online ISBN: 978-981-99-6483-3
eBook Packages: Computer ScienceComputer Science (R0)