Constructing an effective common latent embedding by aligning the latent spaces of cross-modal variational autoencoders(VAEs) is a popular strategy for generalized zero-shot learning(GZSL). However, due to the lac...
详细信息
Constructing an effective common latent embedding by aligning the latent spaces of cross-modal variational autoencoders(VAEs) is a popular strategy for generalized zero-shot learning(GZSL). However, due to the lack of fine-grained instance-wise annotations, existing VAE methods can easily suffer from the posterior collapse problem. In this paper, we propose an innovative asymmetric VAE network by aligning enhanced feature representation(AEFR) for GZSL. Distinguished from general VAE structures, we designed two asymmetric encoders for visual and semantic observations and one decoder for visual reconstruction. Specifically, we propose a simple yet effective gated attention mechanism(GAM) in the visual encoder for enhancing the information interaction between observations and latent variables, alleviating the possible posterior collapse problem effectively. In addition, we propose a novel distributional decoupling-based contrastive learning(D2-CL) to guide learning classification-relevant information while aligning the representations at the taxonomy level in the latent representation space. Extensive experiments on publicly available datasets demonstrate the state-of-the-art performance of our method. The source code is available at https://***/seeyourmind/AEFR.
Recently, redactable blockchain has been proposed and leveraged in a wide range of real systems for its unique properties of decentralization, traceability, and transparency while ensuring controllable on-chain data r...
详细信息
Recently, redactable blockchain has been proposed and leveraged in a wide range of real systems for its unique properties of decentralization, traceability, and transparency while ensuring controllable on-chain data redaction. However, the development of redactable blockchain is now obstructed by three limitations, which are data privacy breaches, high communication overhead, and low searching efficiency, respectively. In this paper, we propose PriChain, the first efficient privacy-preserving fine-grained redactable blockchain in decentralized settings. PriChain provides data owners with rights to control who can read and redact on-chain data while maintaining downward compatibility, ensuring the one who can redact will be able to read. Specifically, inspired by the concept of multi-authority attribute-based encryption, we utilize the isomorphism of the access control tree, realizing fine-grained redaction mechanism, downward compatibility, and collusion resistance. With the newly designed structure, PriChain can realize O(n) communication and storage overhead compared to prior O(n2) schemes. Furthermore, we integrate multiple access trees into a tree-based dictionary, optimizing searching efficiency. Theoretical analysis proves that PriChain is secure against the chosen-plaintext attack and has competitive complexity. The experimental evaluations show that PriChain realizes 10× efficiency improvement of searching and 100× lower communication and storage overhead on average compared with existing schemes.
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
This paper first estimated the infectious capacity of COVID-19 based on the time series evolution data of confirmed cases in multiple countries. Then, a method to infer the cross-regional spread speed of COVID-19 was ...
详细信息
This paper first estimated the infectious capacity of COVID-19 based on the time series evolution data of confirmed cases in multiple countries. Then, a method to infer the cross-regional spread speed of COVID-19 was introduced in this paper, which took the gross domestic product(GDP) of each region as one of the factors that affect the spread speed of COVID-19 and studied the relationship between the GDP and the infection density of each region(China's Mainland, the United States, and EU countries). In addition, the geographic distance between regions was also considered in this method and the effect of geographic distance on the spread speed of COVID-19 was studied. Studies have shown that the probability of mutual infection of these two regions decreases with increasing geographic distance. Therefore, this paper proposed an epidemic disease spread index based on GDP and geographic distance to quantify the spread speed of COVID-19 in a region. The analysis results showed a strong correlation between the epidemic disease spread index in a region and the number of confirmed cases. This finding provides reasonable suggestions for the control of epidemics. Strengthening the control measures in regions with higher epidemic disease spread index can effectively control the spread of epidemics.
With the rapid development of information technologies,industrial Internet has become more open,and security issues have become more *** endogenous security mechanism can achieve the autonomous immune mechanism withou...
详细信息
With the rapid development of information technologies,industrial Internet has become more open,and security issues have become more *** endogenous security mechanism can achieve the autonomous immune mechanism without prior ***,endogenous security lacks a scientific and formal definition in industrial ***,firstly we give a formal definition of endogenous security in industrial Internet and propose a new industrial Internet endogenous security architecture with cost ***,the endogenous security innovation mechanism is clearly ***,an improved clone selection algorithm based on federated learning is ***,we analyze the threat model of the industrial Internet identity authentication scenario,and propose cross-domain authentication mechanism based on endogenous key and zero-knowledge *** conduct identity authentication experiments based on two types of blockchains and compare their experimental *** on the experimental analysis,Ethereum alliance blockchain can be used to provide the identity resolution services on the industrial *** of Things Application(IOTA)public blockchain can be used for data aggregation analysis of Internet of Things(IoT)edge ***,we propose three core challenges and solutions of endogenous security in industrial Internet and give future development directions.
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed ***,the open system architecture inherent to federated learning systems raises concer...
详细信息
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed ***,the open system architecture inherent to federated learning systems raises concerns regarding their vulnerability to potential *** attacks turn into a major menace to federated learning on account of their concealed property and potent destructive *** altering the local model during routine machine learning training,attackers can easily contaminate the global *** detection and aggregation solutions mitigate certain threats,but they are still insufficient to completely eliminate the influence generated by ***,federated unlearning that can remove unreliable models while maintaining the accuracy of the global model has become a *** some existing federated unlearning approaches are rather difficult to be applied in large neural network models because of their high computational ***,we propose SlideFU,an efficient anti-poisoning attack federated unlearning *** primary concept of SlideFU is to employ sliding window to construct the training process,where all operations are confined within the *** design a malicious detection scheme based on principal component analysis(PCA),which calculates the trust factors between compressed models in a low-cost way to eliminate unreliable *** confirming that the global model is under attack,the system activates the federated unlearning process,calibrates the gradients based on the updated direction of the calibration *** on two public datasets demonstrate that our scheme can recover a robust model with extremely high efficiency.
Due to their biological interpretability,memristors are widely used to simulate synapses between artificial neural *** a type of neural network whose dynamic behavior can be explained,the coupling of resonant tunnelin...
详细信息
Due to their biological interpretability,memristors are widely used to simulate synapses between artificial neural *** a type of neural network whose dynamic behavior can be explained,the coupling of resonant tunneling diode-based cellular neural networks(RTD-CNNs)with memristors has rarely been reported in the ***,this paper designs a coupled RTD-CNN model with memristors(RTD-MCNN),investigating and analyzing the dynamic behavior of the *** on this model,a simple encryption scheme for the protection of digital images in police forensic applications is *** results show that the RTD-MCNN can have two positive Lyapunov exponents,and its output is influenced by the initial values,exhibiting ***,a set of amplitudes in its output sequence is affected by the internal parameters of the memristor,leading to nonlinear ***,the rich dynamic behaviors described above make the RTD-MCNN highly suitable for the design of chaos-based encryption schemes in the field of privacy *** tests and security analyses validate the effectiveness of this scheme.
Federated learning is widely used to solve the problem of data decentralization and can provide privacy protectionfor data owners. However, since multiple participants are required in federated learning, this allows a...
详细信息
Federated learning is widely used to solve the problem of data decentralization and can provide privacy protectionfor data owners. However, since multiple participants are required in federated learning, this allows attackers tocompromise. Byzantine attacks pose great threats to federated learning. Byzantine attackers upload maliciouslycreated local models to the server to affect the prediction performance and training speed of the global model. Todefend against Byzantine attacks, we propose a Byzantine robust federated learning scheme based on backdoortriggers. In our scheme, backdoor triggers are embedded into benign data samples, and then malicious localmodels can be identified by the server according to its validation dataset. Furthermore, we calculate the adjustmentfactors of local models according to the parameters of their final layers, which are used to defend against datapoisoning-based Byzantine attacks. To further enhance the robustness of our scheme, each localmodel is weightedand aggregated according to the number of times it is identified as malicious. Relevant experimental data showthat our scheme is effective against Byzantine attacks in both independent identically distributed (IID) and nonindependentidentically distributed (non-IID) scenarios.
With its untameable and traceable properties,blockchain technology has been widely used in the field of data *** to preserve individual privacy while enabling efficient data queries is one of the primary issues with s...
详细信息
With its untameable and traceable properties,blockchain technology has been widely used in the field of data *** to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data *** this paper,we study verifiable keyword frequency(KF)queries with local differential privacy in *** the numerical and the keyword attributes are present in data objects;the latter are sensitive and require privacy ***,prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF *** propose an efficient framework that protects data owners’privacy on keyword attributes while enabling quick and verifiable query processing for KF *** framework computes an estimate of a keyword’s frequency and is efficient in query time and verification object(VO)size.A utility-optimized local differential privacy technique is used for privacy *** data owner adds noise locally into data based on local differential privacy so that the attacker cannot infer the owner of the keywords while keeping the difference in the probability distribution of the KF within the privacy *** propose the VB-cm tree as the authenticated data structure(ADS).The VB-cm tree combines the Verkle tree and the Count-Min sketch(CM-sketch)to lower the VO size and query *** VB-cm tree uses the vector commitment to verify the query *** fixed-size CM-sketch,which summarizes the frequency of multiple keywords,is used to estimate the KF via hashing *** conduct an extensive evaluation of the proposed *** experimental results show that compared to theMerkle B+tree,the query time is reduced by 52.38%,and the VO size is reduced by more than one order of magnitude.
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the...
详细信息
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the generated counterfeit facial images have become increasingly challenging to distinguish. There is an urgent need for a more robust and convincing detection method. Current detection methods mainly operate in the spatial domain and transform the spatial domain into other domains for analysis. With the emergence of transformers, some researchers have also combined traditional convolutional networks with transformers for detection. This paper explores the artifacts left by Deepfakes in various domains and, based on this exploration, proposes a detection method that utilizes the steganalysis rich model to extract high-frequency noise to complement spatial features. We have designed two main modules to fully leverage the interaction between these two aspects based on traditional convolutional neural networks. The first is the multi-scale mixed feature attention module, which introduces artifacts from high-frequency noise into spatial textures, thereby enhancing the model's learning of spatial texture features. The second is the multi-scale channel attention module, which reduces the impact of background noise by weighting the features. Our proposed method was experimentally evaluated on mainstream datasets, and a significant amount of experimental results demonstrate the effectiveness of our approach in detecting Deepfake forged faces, outperforming the majority of existing methods.
暂无评论