作者:
Zhou, ZhengyuLiu, WeiweiSchool of Computer Science
National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
Goodness-of-fit testing, a classical statistical tool, has been extensively explored in the batch setting, where the sample size is ***, practitioners often prefer methods that adapt to the complexity of a problem rat...
Goodness-of-fit testing, a classical statistical tool, has been extensively explored in the batch setting, where the sample size is ***, practitioners often prefer methods that adapt to the complexity of a problem rather than fixing the sample size *** batch tests are generally unsuitable for streaming data, as valid inference after data peeking requires multiple testing corrections, resulting in reduced statistical *** address this issue, we delve into the design of consistent sequential goodness-of-fit *** the principle of testing by betting, we reframe this task as selecting a sequence of payoff functions that maximize the wealth of a fictitious bettor, betting against the null in a repeated *** conduct experiments to demonstrate the adaptability of our sequential test across varying difficulty levels of problems while maintaining control over type-I errors. Copyright 2024 by the author(s)
Autonomous spacecraft rendezvous poses significant challenges in increasingly complex space missions. Recently, Reinforcement Learning (RL) has proven effective in the domain of spacecraft rendezvous, owing to its hig...
详细信息
The Linux kernel adopts a large number of security checks to prevent security-sensitive operations from being executed under unsafe *** a security-sensitive operation is unchecked,a missing-check issue *** check is a ...
详细信息
The Linux kernel adopts a large number of security checks to prevent security-sensitive operations from being executed under unsafe *** a security-sensitive operation is unchecked,a missing-check issue *** check is a class of severe bugs in software programs especially in operating system kernels,which may cause a variety of security issues,such as out-of-bound accesses,permission bypasses,and privilege *** to the lack of security specifications,how to automatically identify security-sensitive operations and their required security checks in the Linux kernel becomes a challenge for missing-check *** this paper,we present an accurate missing-check analysis method for Linux kernel,which can automatically infer possible security-sensitive ***,we first automatically identify all possible security check functions of *** according to their callsites,a two-direction analysis method is leveraged to identify possible security-sensitive operations.A missing-check bug is reported when the security-sensitive operation is not protected by its corresponding security *** have implemented our method as a tool,named AMCheX,on top of the LLVM(Low Level Virtual Machine)framework and evaluated it on the Linux *** reported 12 new missing-check bugs which can cause security *** of them have been confirmed by Linux maintainers.
作者:
Li, BoqiLiu, WeiweiSchool of Computer Science
National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
The rising threat of backdoor poisoning attacks (BPAs) on Deep Neural Networks (DNNs) has become a significant concern in recent years. In such attacks, the adversaries strategically target a specific class and genera...
详细信息
The rising threat of backdoor poisoning attacks (BPAs) on Deep Neural Networks (DNNs) has become a significant concern in recent years. In such attacks, the adversaries strategically target a specific class and generate a poisoned training set. The neural network (NN), well-trained on the poisoned training set, is able to predict any input with the trigger pattern as the targeted label, while maintaining accurate outputs for clean inputs. However, why the BPAs work remains less explored. To fill this gap, we employ a dirty-label attack and conduct a detailed analysis of BPAs in a two-layer convolutional neural network. We provide theoretical insights and results on the effectiveness of BPAs. Our experimental results on two real-world datasets validate our theoretical findings. Copyright 2024 by the author(s)
Conventional machine learning methods for software effort estimation (SEE) have seen an increase in research interest. Conversely, there are few research that try to evaluate how well deep learning techniques work in ...
详细信息
Within the realm of multimodal neural machine translation(MNMT),addressing the challenge of seamlessly integrating textual data with corresponding image data to enhance translation accuracy has become a pressing *** s...
详细信息
Within the realm of multimodal neural machine translation(MNMT),addressing the challenge of seamlessly integrating textual data with corresponding image data to enhance translation accuracy has become a pressing *** saw that discrepancies between textual content and associated images can lead to visual noise,potentially diverting the model’s focus away from the textual data and so affecting the translation’s comprehensive *** solve this visual noise problem,we propose an innovative KDNR-MNMT *** combines the knowledge distillation technique with an anti-noise interaction mechanism,which makes full use of the synthesized graphic knowledge and local image interaction masks,aiming to extract more effective visual ***,the KDNR-MNMT model adopts a multimodal adaptive gating fusion strategy to enhance the constructive interaction of different modal *** integrating a perceptual attention mechanism,which uses cross-modal interaction cues within the Transformer framework,our approach notably enhances the quality of machine translation *** confirmthemodel’s performance,we carried out extensive testing and assessment on the extensively utilized Multi30K *** outcomes of our experiments prove substantial enhancements in our model’s BLEU and METEOR scores,with respective increases of 0.78 and 0.99 points over prevailing *** accomplishment affirms the potency of our strategy for mitigating visual interference and heralds groundbreaking advancements within themultimodal NMT domain,further propelling the evolution of this scholarly pursuit.
In this paper, we propose LOL, a general framework for designing blockwise stream ciphers. The proposed framework achieves ultrafast software implementations for ubiquitous virtual networks in 5G/6G environments and h...
详细信息
In this paper, we propose LOL, a general framework for designing blockwise stream ciphers. The proposed framework achieves ultrafast software implementations for ubiquitous virtual networks in 5G/6G environments and high-security levels for post-quantum cryptography. The LOL framework is structurally strong; furthermore, this framework and all its components enjoy high flexibility with various extensions. On the basis of the LOL framework, we propose new stream-cipher designs called LOL-MINI and LOL-DOUBLE with the support of the AES-NI and single instruction multiple data instructions. The former applies the basic LOL single mode, while the latter uses the extended parallel-dual mode. LOL-MINI and LOL-DOUBLE support 256-bit key length. Our thorough evaluations revealed that these cipher designs have 256-bit security margins against all existing cryptanalysis methods, including differential, linear, and integral. The software performances of LOL-MINI and LOL-DOUBLE can reach 89 and 135 Gbps. In addition to pure encryptions,the LOL-MINI and LOL-DOUBLE stream ciphers can be applied in a stream-cipher-then-MAC strategy to make AEAD schemes.
Lake level,area and volume are sensitive indicators of climate *** present,many studies have focused on the interannual water balance of lakes,but lake level and area can change remarkably with seasons,especially for ...
详细信息
Lake level,area and volume are sensitive indicators of climate *** present,many studies have focused on the interannual water balance of lakes,but lake level and area can change remarkably with seasons,especially for lakes with seasonal ice *** Namco,a seasonal frozen lake,was selected as an example to investigate its seasonal water ***-source altimetry and Landsat data were used to obtain the seasonal lake level and area from 1992 to 2019,and seasonal lake volume variations were also *** results indicated the average lake level,area and volume in autumn were the *** lake level,area,and volume experienced three turning points approximately in 2000,2010,and 2016,and showed an overall increasing trend from 1992 to 2019,with slopes of 0.15 m/year,2.17 km^(2)/year,and 0.14 km^(3)/year,*** lake area expanded significantly in autumn,which was related to the abundant *** time of land surface runoff,increased temperature,and evaporation may be the reason for the low lake level and volume in *** precipitation was the dominant factor of water balance,which explained 62.09%,62.43%,and 62.10%of the variations in lake level,area,and volume,respectively.
Grid-based path planning is one of the classic problems in AI, and a popular topic in application areas such as computer games and robotics. Compressed Path Databases (CPDs) are recognized as a state-of-the-art method...
详细信息
The continuous miniaturization and high-power development of electronic devices have given rise to severe interface thermal issues,which urgently demand highly thermally conductive thermal interface materials(TIMs)to ...
详细信息
The continuous miniaturization and high-power development of electronic devices have given rise to severe interface thermal issues,which urgently demand highly thermally conductive thermal interface materials(TIMs)to eliminate excessive heat accumulation and ensure the normal operation of devices[1].
暂无评论