Organizations are using AI and ML to identify the opportunities in various domains. This paper examines the effect of incorporating Environment, Social, and Governance (ESG) criteria in evaluation of the long-term val...
详细信息
Automatic dependent surveillance broadcast (ADS -B) system sends messages over unencrypted wireless channels without any information integrity protection measures, and its messages are at risk of interception and tamp...
详细信息
ISBN:
(纸本)9798350312935
Automatic dependent surveillance broadcast (ADS -B) system sends messages over unencrypted wireless channels without any information integrity protection measures, and its messages are at risk of interception and tampering, which can easily lead to impersonation and forgery attacks. At present, although the ADS -B data anomaly detection model based on machinelearning has excellent performance in predicting normal samples, the machinelearning model may face different degrees of risk in each stage of its life cycle due to the existence of a large number of attackers in real scenes. To build secure and reliable machinelearning systems, exploit potential vulnerabilities. Aiming at the ADS -B abnormal data detection model based on machinelearning, this paper studies a construction method of poisoning data with strong applicability and establishes attack model. By injecting malicious data generated by the Generative adversarial network into the machinelearning model, the performance of the trained model deteriorates and data misclassification occurs. Experimental results show that the malicious ADS -B data generation method proposed in this paper achieves good results, which lays a foundation for optimizing system defense technology and guaranteeing ADS -B security.
Noisy gradient descent and its variants are the predominant algorithms for differentially private machinelearning. It is a fundamental question to quantify their privacy leakage, yet tight characterizations remain op...
详细信息
Noisy gradient descent and its variants are the predominant algorithms for differentially private machinelearning. It is a fundamental question to quantify their privacy leakage, yet tight characterizations remain open even in the foundational setting of convex losses. This paper improves over previous analyses by establishing (and refining) the "privacy amplification by iteration" phenomenon in the unifying framework of f-differential privacy-which tightly captures all aspects of the privacy loss and immediately implies tighter privacy accounting in other notions of differential privacy, e.g., (epsilon, delta)-DP and Renyi DP. Our key technical insight is the construction of shifted interpolated processes that unravel the popular shifted-divergences argument, enabling generalizations beyond divergence-based relaxations of DP. Notably, this leads to the first exact privacy analysis in the foundational setting of strongly convex optimization. Our techniques extend to many settings: convex/strongly convex, constrained/unconstrained, full/cyclic/stochastic batches, and all combinations thereof. As an immediate corollary, we recover the f-DP characterization of the exponential mechanism for strongly convex optimization in Gopi et al. (2022), and moreover extend this result to more general settings.
Transformers have demonstrated effectiveness in in-context solving data-fitting problems from various (latent) models, as reported by Garg et al. (2022). However, the absence of an inherent iterative structure in the ...
详细信息
Road crashes are the sixth leading cause of death in India. At present, most of the metropolitan cities of India are going through the burden of rising road accidents and an associated increase in fatalities. Among th...
详细信息
In this manuscript, we investigate the problem of how two-layer neural networks learn features from data, and improve over the kernel regime, after being trained with a single gradient descent step. Leveraging the ins...
详细信息
In this manuscript, we investigate the problem of how two-layer neural networks learn features from data, and improve over the kernel regime, after being trained with a single gradient descent step. Leveraging the insight from (Ba et al., 2022), we model the trained network by a spiked Random Features (sRF) model. Further building on recent progress on Gaussian universality (Dandi et al., 2023), we provide an exact asymptotic description of the generalization error of the sRF in the high-dimensional limit where the number of samples, the width, and the input dimension grow at a proportional rate. The resulting characterization for sRFs also captures closely the learning curves of the original network model. This enables us to understand how adapting to the data is crucial for the network to efficiently learn nonlinear functions in the direction of the gradient - where at initialization it can only express linear functions in this regime. Copyright 2024 by the author(s)
Purpose Climate-induced damage is a pressing problem for the preservation of cultural properties. Their physical deterioration is often the cumulative effect of different environmental hazards of variable intensity. A...
详细信息
Purpose Climate-induced damage is a pressing problem for the preservation of cultural properties. Their physical deterioration is often the cumulative effect of different environmental hazards of variable intensity. Among these, fluctuations of temperature and relative humidity may cause nonrecoverable physical changes in building envelopes and artifacts made of hygroscopic materials, such as wood. Microclimatic fluctuations may be caused by several factors, including the presence of many visitors within the historical building. Within this framework, the current work is focused on detecting events taking place in two Norwegian stave churches, by identifying the fluctuations in temperature and relative humidity caused by the presence of people attending the public events. Design/methodology/approach The identification of such fluctuations and, so, of the presence of people within the churches has been carried out through three different methods. The first is an unsupervised clustering algorithm here termed "density peak," the second is a supervised deep learning model based on a standard convolutional neural network (CNN) and the third is a novel ad hoc engineering feature approach "unexpected mixing ratio (UMR) peak." Findings While the first two methods may have some instabilities (in terms of precision, recall and normal mutual information [NMI]), the last one shows a promising performance in the detection of microclimatic fluctuations induced by the presence of visitors. Originality/value The novelty of this work stands in using both well-established and in-house ad hoc machinelearning algorithms in the field of heritage science, proving that these smart approaches could be of extreme usefulness and could lead to quick data analyses, if used properly.
The presence of toxic comments on online platforms creates significant barriers to encouraging positive conversation and user involvement. The present research introduces a novel hybrid deep learning methodology that ...
详细信息
Customers are essential to the operation of business. Customer churn can have a variety of effects. Predicting customer attrition must be a key component of every business. This aids in identifying clients who are abo...
详细信息
In today’s world knowing the opinion of people is a widely used research topic in natural language processing, and context-aware sentiment analysis has emerged as an important research area in recent years. This chap...
详细信息
暂无评论