As modern vehicular communication systems advance, the demand for robust security measures becomes increasingly critical. A misbehavior detection systems (MDS) is a tool developed to detect if a vehicular network is b...
As modern vehicular communication systems advance, the demand for robust security measures becomes increasingly critical. A misbehavior detection systems (MDS) is a tool developed to detect if a vehicular network is being attacked so that the system can take steps to mitigate harm from the attacker. Vehicular communication systems face significant risks from distributed denial of service (DDoS) attacks. During a DDoS attack, multiple nodes are used to flood the target with an overwhelming amount of communication packets. In this paper, we first survey the current MDS literature and how it is used to detect and mitigate DDoS attacks. We then propose a new distributed multilayer perceptron classifier (MLPC) for DDoS detection and evaluate the performance of the proposed detection scheme in vehicular communication systems. For the evaluations using simulations, two specific implementations of the attacks are conducted. Apache Spark is then used to create the distributed MLPC. The median F1-score for this MLPC method was 95%. The proposed method outperformed linear regression and support vector machines, which achieved 89% and 88% respectively, but is unable to perform better than random forests and gradient boosted trees which both achieved a 97% F1-score. Using Amazon Web Services (AWS), it is determined that model training and detection time are not significantly increased with the inclusion of additional nodes after three nodes including the master.
Heterogeneity is common in parallel and distributed environments used for extensive computations such as MapReduce. Stragglers are the tasks that are running on inferior performing nodes in the cluster. Early detectio...
详细信息
Heterogeneity is common in parallel and distributed environments used for extensive computations such as MapReduce. Stragglers are the tasks that are running on inferior performing nodes in the cluster. Early detection of stragglers is always challenging in such environments. In the previously proposed approaches, late detection of straggler tasks and estimation of time to end (TTE) for all the tasks running in a heterogeneous environment delays the entire job execution. Early straggler detection help to speculate a task at the early stages of task execution which indirectly improves the complete job execution. This article proposed early straggler detection by a recurrent neuralnetwork (ESDRNN) that collects the task and node information every three seconds from ApplicationMaster to train the RNN. It classifies the straggler tasks pretty early by RNN, between thirty to forty seconds of task execution, and transfers a list of classified tasks to an agent running on ResourceManager. RNN is a type of artificial neuralnetwork that is prevalent for processing sequential time-series data. Then, the agent predicts the TTE of these classified tasks by the Autoregressive integrated moving average (ARIMA) model. Finally, it sorts and refreshes the list with higher TTE after every ten seconds and speculates the tasks for the early completion of the MapReduce job. This proposed technique's performance is evaluated on the HiBench benchmark suite of Hadoop's most popular benchmark. Finally, compared with the default speculation technique and different techniques, the proposed speculation technique detects the stragglers early within 35 to 40 seconds of task execution. As a result, it decreases the job execution time by an average of 21% to 38% significantly for different workloads in a heterogeneous Hadoop cluster.
neuralnetworks are one of the most popular methods nowadays given their high performance on diverse tasks, such as computer vision, anomaly detection, computer-aided disease detection and diagnosis or natural languag...
详细信息
neuralnetworks are one of the most popular methods nowadays given their high performance on diverse tasks, such as computer vision, anomaly detection, computer-aided disease detection and diagnosis or natural language processing. While neuralnetworks are known for their high performance, they often suffer from the so-called “black-box” problem, which means that it is difficult to understand how the model makes decisions. We introduce a neuralnetwork topology based on Generalized Additive Models. By training an independent neuralnetwork to estimate the contribution of each feature to the output variable, we obtain a highly accurate and explainable deep learning model, providing a flexible framework for training Generalized Additive neuralnetworks which does not impose any restriction on the neuralnetwork architecture. The proposed algorithm is evaluated through different simulation studies with synthetic datasets, as well as a real-world use case of distributed Denial of Service cyberattack detection on an Industrial Control System. The results show that our proposal outperforms other GAM-based neuralnetwork implementations while providing higher interpretability, making it a promising approach for high-risk AI applications where transparency and accountability are crucial.
This work showed the capability of handling large number of classes for classification with human cognition inspired methods. A cognition based techniques for both feature extraction, (self-similarity feature, Intensi...
详细信息
This work showed the capability of handling large number of classes for classification with human cognition inspired methods. A cognition based techniques for both feature extraction, (self-similarity feature, Intensity Level Multi Fractal Dimension (ILMFD)) as well as classification purpose (decision tree clustering based multi-level Artificial neuralnetwork classifier-MLANN-DTC) were employed to implement facial recognition based object detection system. A DTC based approach reduces the search space time and also provides opportunity for very less amount of classes (a smaller part of the large number of classes) to be handled by the respective classifier for classification. It also mimics fast recognition capability of humans. In this work, two different databases were used for experiment, first one is our own collected facial images from rotation based video clips (117 persons and 40 facial images per person) named as NS database, and other is standard ORL database (40 persons and 10 facial images per person). In pre-processing step, the facial images were segmented to obtain facial part using context window based texture of pixels (CWTP) & back-propagation neuralnetwork (BPNN) based model and then a scale and rotation independent ILMFD feature was computed from each segmented image. Further, a combination of K-means and hierarchal clustering was used to build super classes. All classes' data were distributed among these 6 super classes (heuristically chosen) for own NS database and 3 for ORL database as per their similarity based on ILMFD features. Multi-level ANNs models were employed for all super classes and further their classification results were fed into decision clustering based model to obtain fine-tuned results, which showed significant improvement in terms of classification efficiency. This approach believes in center tendency of largest cluster to refer the actual class decision from multiple decisions obtain corresponding to multiple input data of
This article proposes a distributed stochastic algorithm with variance reduction for general smooth non-convex finite-sum optimization, which has wide applications in signal processing and machine learning communities...
详细信息
This article proposes a distributed stochastic algorithm with variance reduction for general smooth non-convex finite-sum optimization, which has wide applications in signal processing and machine learning communities. In distributed setting, a large number of samples are allocated to multiple agents in the network. Each agent computes local stochastic gradient and communicates with its neighbors to seek for the global optimum. In this article, we develop a modified variance reduction technique to deal with the variance introduced by stochastic gradients. Combining gradient tracking and variance reduction techniques, this article proposes a distributed stochastic algorithm, gradient tracking algorithm with variance reduction (GT-VR), to solve large-scale non-convex finite-sum optimization over multiagent networks. A complete and rigorous proof shows that the GT-VR algorithm converges to the first-order stationary points with O(1/k) convergence rate. In addition, we provide the complexity analysis of the proposed algorithm. Compared with some existing first-order methods, the proposed algorithm has a lower O(PM epsilon b;(1)) gradient complexity under some mild condition. By comparing state-of-the-art algorithms and GT-VR in numerical simulations, we verify the efficiency of the proposed algorithm.
Recently, graph neuralnetworks (GNNs) have gained much attention as a growing area of deep learning capable of learning on graph-structured data. However, the computational and memory requirements for training GNNs o...
详细信息
In recent years, deep convolutional neuralnetworks (DCNNs) have become increasingly prevalent in image processing applications. However, DCNNs are vulnerable to adversarial attacks, which are generated by adding impe...
详细信息
In recent years, deep convolutional neuralnetworks (DCNNs) have become increasingly prevalent in image processing applications. However, DCNNs are vulnerable to adversarial attacks, which are generated by adding imperceptible perturbations to the input that can cause the network to misclassify the image. In this study, we propose a black-box transferable adversarial attack method. The goal is to enhance the understanding of the vulnerability of these networks. Meanwhile, it could help develop more robust defenses against such attacks. This attack efficiently generates adversarial examples by manipulating the singular value matrix instead of directly perturbing pixels with complex noise. We utilize soft actor-critic to explore an optimal perturbation strategy. We perform extensive evaluations with VOC 2012, MS Coco 2017 datasets on object detection models, the MNIST dataset on image classification models, as well as the TT-100K dataset on a real-world case study to evaluate the proposed singular value manipulating attack (SVMA). Comparison results demonstrate that SVMA achieves a consistent query efficiency and attack ability on both one-stage detector Yolo and two-stage detector Faster R-CNN. Additionally, our case study demonstrates the adversarial examples of SVMA are effective in real-world scenarios. In the end, we propose a defense against such attacks.
The distillation tower is a crucial component of the refining process. Its energy efficiency has been a major area of research, especially following the oil crisis. This study focuses on optimizing energy consumption ...
详细信息
In today's information society, the demand for intelligence is increasing daily. English speech translation recognition technology based on the LSTM (long short-term memory) recurrent neuralnetwork (RNN) algorith...
详细信息
In today's information society, the demand for intelligence is increasing daily. English speech translation recognition technology based on the LSTM (long short-term memory) recurrent neuralnetwork (RNN) algorithm is an important manifestations of computer intelligence. In recent years, many scholars have conducted research on speech translation recognition technology, including template matching and statistical pattern recognition. Each of these methods has its drawbacks. This paper discusses English speech recognition techniques by utilizing the basic RNN principles. Moreover, its application and construction in practice, which can provide some useful reference for future researchers, are analysed. LSTM RNN is an intelligent system that is different from traditional pattern recognition methods. The greatest difference is that it simulates the information processing of the human brain and realizes the intelligent information processing in a distributed manner. It has a variety of automatic recognition and extraction functions, such as storage, association, and retrieval, especially for speech translation and recognition problems with high perception ability. This new neuralnetwork recognition system has a strong scientific nature and can store sound information in a decentralized manner, similar to the human brain. The LSTM RNN has been widely used in the speech recognition field due to its excellent performance in extraction and classification. The study found that the recognition accuracy of the original RNN was generally maintained between 48 and 54%, and the data loss rate was relatively high. The accuracy rate of speech recognition based on LSTM RNN was as high as 94%, and the information storage efficiency was high, which greatly avoided repetitive processes. The voice data processing speed can be completed in 4.5 s at the fastest, which plays an important role in terms of mass satisfaction and social development needs.
In this paper we cast the problem of training a graph neuralnetwork based on labeled graph data in a "federated learning" scenario where different agents have access to data from a subset of the network nod...
详细信息
ISBN:
(纸本)9798350344820;9798350344813
In this paper we cast the problem of training a graph neuralnetwork based on labeled graph data in a "federated learning" scenario where different agents have access to data from a subset of the network nodes. The learning problem is not decomposable, therefore it does not lend itself to a straightforward mapping onto a distributed multi-agent protocol. We propose a multi-agent federated learning scheme which leverages the local and sparse structure of graph filters to limit the information sharing while emulating the performance of centralized training. Even though we preserve data locality and agent communication is restricted to the neighborhood level, the proposed method still converges in simulation.
暂无评论