Component trees are powerful image processing tools to analyze the connected components of an image. One attractive strategy consists in building the nested relations at first and then deriving the components' att...
详细信息
ISBN:
(数字)9781665496209
ISBN:
(纸本)9781665496209
Component trees are powerful image processing tools to analyze the connected components of an image. One attractive strategy consists in building the nested relations at first and then deriving the components' attributes afterward, such that the user can switch between different attribute functions without having to re-compute the entire tree. Only sequential algorithms allow such an approach, while no parallel algorithm is available. In this paper, we extend a recent method using distributed memory techniques to enable posterior attribute computation in a parallel or distributed manner. This novel approach significantly reduces the computational time needed for combining several attribute functions interactively in Giga and Tera-Scale data sets.
Efficient crime reporting and management is imperative for law enforcement agencies, yet conventional systems pose challenges with data integrity and accessibility. Traditional reporting processes further contribute t...
详细信息
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels...
详细信息
ISBN:
(纸本)9798350344868;9798350344851
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels in parallel execution capabilities, while the latter enjoys low dependence on edge computing resources and strong privacy protection. Split federated learning (SFL) combines the strengths of both FL and SL, making it one of the most popular distributed architectures. Furthermore, a recent study has claimed that SFL exhibits robustness against poisoning attacks, with a fivefold improvement compared to FL in terms of robustness. In this paper, we present a novel poisoning attack known as MISA. It poisons both the top and bottom models, causing a misalignment in the global model, ultimately leading to a drastic accuracy collapse. This attack unveils the vulnerabilities in SFL, challenging the conventional belief that SFL is robust against poisoning attacks. Extensive experiments demonstrate that our proposed MISA poses a significant threat to the availability of SFL, underscoring the imperative for academia and industry to accord this matter due attention.
In urban areas, geographic spread of spatial networks continually produces massive data. In fact, the analysis of these spatial networks is squarely related to the partitioning of networks into sub-networks in a balan...
详细信息
Smart agriculture is one of the most promising areas where IoT-enabled technologies have the potential to substantially improve the quality and quantity of the crops and reduce the operational cost. However, building ...
详细信息
Cloud have wide-ranging implications in several areas of computing, notably massive knowledge, cloud computing has simply up to the highest of any list of technology subjects. Furthermore, it is one of the most import...
详细信息
For many years, in the HPC data distribution scenario, as the scale of the HPC system continues to increase, manufacturers have to increase the number of data providers to improve the IO parallelism to match the data ...
详细信息
Recently there has been many studies on backdoor attacks, which involve injecting poisoned samples into the training set in order to embed backdoors into the model. Existing multiple-poisoned samples attacks usually r...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
Recently there has been many studies on backdoor attacks, which involve injecting poisoned samples into the training set in order to embed backdoors into the model. Existing multiple-poisoned samples attacks usually randomly select a subset from clean samples to generate the poisoned samples. Filtering-and-Updating Strategy (FUS) has shown that the poisoning efficiency of each poisoned sample is inconsistent and random selection is not optimal. However, FUS does not fully considered the selection of multiple poisoned samples, there are still some issues with the selection of multiple poisoned samples. In this paper, we formulate the selection of multiple types of poisoned samples as a multi-objective optimization problem and proposed a Multiple Poisoned Samples Selection Strategy (MPS) to solve the issue. Unlike FUS, we consider the potential of clean samples that are not selected as to become efficient poisoned samples. Specifically, we use a weight-based contribution approach to calculate the contribution of each sample (clean sample and poisoned sample) during the training process from multiple dimensions. Finally, based on the greedy approach, we retain a subset of samples with the largest contribution in each dimension through iterations. We evaluate the effectiveness of MPS on various attack methods, including BadNet, Blended, ISSBA, and WaNet, as well as benchmark datasets. The experimental results on CIFAR-10 and GTSRB show that MPS can increase the attack strength by 1.45% to 18.34% compared to RSS and 0.43% to 10.84% compared to FUS in multiple-poisoned samples attacks, thereby enhancing the stealthiness of the attack. Meanwhile, MPS is suitable for black-box settings, meaning that poisoned samples selected in one setiing can be applied to other settings.
The large-scale penetration of distributed photovoltaic (PV) power generation systems has brought new challenges to the topology identification and detection of traditional distribution networks. This article mainly s...
详细信息
ISBN:
(纸本)9798350375145;9798350375138
The large-scale penetration of distributed photovoltaic (PV) power generation systems has brought new challenges to the topology identification and detection of traditional distribution networks. This article mainly studies the topology identification technology (TIT) of distributed PV low-voltage (LV) distribution network lines, aiming to design a topology identification method that can adapt to the dynamic changes of the power grid, have large-scale capacity, and improve system accuracy under the same conditions. At the same time, the data processing speed has been improved. This article first constructs a system model, including node model, edge model, and parameter model. It mathematically represents the topology structure of the power grid using graph theory and designs a topology recognition algorithm based on optimization techniques and state estimation. This algorithm is used to solve the distributed characteristics of power grid topology recognition, the difficulty of data collection, the dynamic diversity of power grid structure, the uncertainty of equipment parameters, the high computational complexity of data processing, and the communication constraints of power grid topology recognition. This algorithm adopts modern programming languages and parallelcomputing frameworks, making it easy to implement efficiently. The results on the simulation platform show that the highest recall rate for 22 test cases is 93.8%, and the response time for test cases is 425 ms to 980 ms, providing a fast response to the information space of the grid.
Serverless architectures abstract resource provisioning away from the user. However, this property may be at odds with performance. One example of this is Function as a Service (FaaS), where the lack of network addres...
详细信息
ISBN:
(纸本)9798350303223
Serverless architectures abstract resource provisioning away from the user. However, this property may be at odds with performance. One example of this is Function as a Service (FaaS), where the lack of network addressability compels developers to resort to serverless storage services such as AWS S3 to share (intermediate) data between the functions. For IO-bound workflows, the literature has shown that the performance of parallel reads and writes highly depends on the level of parallelism. Simply put, both an excess or a deficiency in the number of functions may lead to longer IO times. The good news is that the provisioning of functions is fast. Consequently, it is feasible to auto-provision the serverless functions to the optimal number to minimize IO latency. For this, the performance of object storage must be predictable and consistent. We confirmed this in the past for IBM COS. And in this paper, we show that the same occurs to AWS S3. Concretely, we prove that the optimal level of parallelism for parallel reads and writes can be approximated analytically for AWS S3.
暂无评论