the privacy of machine learning models has become a significant concern in many emerging Machine-learning-as-a-Service applications, where prediction services based on welltrained models are offered to users via the p...
详细信息
ISBN:
(纸本)9781665474085
the privacy of machine learning models has become a significant concern in many emerging Machine-learning-as-a-Service applications, where prediction services based on welltrained models are offered to users via the pay-per-query scheme. However, the lack of a defense mechanism can impose a high risk on the privacy of the server's model since an adversary could efficiently steal the model by querying only a few `good' data points. the game between a server's defense and an adversary's attack inevitably leads to an arms race dilemma, as commonly seen in Adversarial Machine learning. To study the fundamental tradeoffs between model utility from a benign user's view and privacy from an adversary's view, we develop new metrics to quantify such tradeoffs, analyze their theoretical properties, and develop an optimization problem to understand the optimal adversarial attack and defense strategies. the developed concepts and theory match the empirical findings on the `equilibrium' between privacy and utility. In terms of optimization, the key ingredient that enables our results is a unified representation of the attack-defense problem as a min-max bi-level problem. the developed results are demonstrated by examples and empirical experiments.
this paper presents a smart parking system to reduce traffic congestion in urban areas. It provides real-time information about parking space availability in accordance with various vehicles and their sizes. Using Art...
详细信息
To improve the problem that traditional algorithms cannot evaluate the security situation of complex office networks, this paper studies a deep learning based office digital situation assessment method to address the ...
详细信息
the process of automatically categorizing services is crucial for identifying, choosing, and integrating services. Lately, in this field the use of algorithms for machine learning has proliferated. While these techniq...
详细信息
Aiming at the personalized online learning needs of teachers and students, this paper proposes an intelligent push system based on user profile. the system first accurately depicts user profiles from different dimensi...
详细信息
Ransomware attacks threaten organizations by encrypting files or locking systems and keeping them inaccessible unless a ransom is paid. Early detection of ransomware attacks helps organizations avoid financial losses,...
详细信息
Withthe application of vision algorithms in multitask scenarios such as image classification, object detection and object tracking, the traditional software reliability measurement scheme is difficult to meet the nee...
详细信息
Manual perusal of capsule endoscopic videos is laborious due to their length, redundancy, and poor quality frames, risking misdetection. Limited representation of diverse anomalies and subtle lesions led to less gener...
详细信息
ISBN:
(纸本)9798350349467;9798350349450
Manual perusal of capsule endoscopic videos is laborious due to their length, redundancy, and poor quality frames, risking misdetection. Limited representation of diverse anomalies and subtle lesions led to less generalized approaches targeting only individual or few anomalous findings. To deploy automated analysis in clinical settings effectively, a holistic, end-to-end approach is crucial, distinguishing between frame-level analysis and disease-level diagnosis. this study proposes a holistic framework for frame-level analysis based on a taxonomy of findings, leveraging clinical consensus. Clinical knowledge implicit in the taxonomy can enhance Computer Aided Diagnostics (CAD) systems. Convolutional Neural Networks (CNNs) trained at appropriate granularity levels in the taxonomy show improved performance metrics. Validation on the Kvasir-capsule dataset demonstrates a 2-4% performance boost. Taxonomy-based inference scores effectively resolve mimicked anomalies without additional learning.
An uncountable number of computational resources are shared for various applications using a transformative technology called Cloud Computing. It is an emerging technology that can offer scalable and on-demand resourc...
详细信息
Withthe rapid development of renewable energy, independent microgrids integrating distributed energy sources such as wind and solar power have become a research focus due to their excellent cost-effectiveness and ene...
详细信息
暂无评论