Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp...
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comprehensive overview of data poisoning including attack techniques, adversary incentives, impacts on security and reliability, detection methods, defenses, and key research gaps. We examine label flipping, instance injection, backdoors, and other attack categories that enable malicious outcomes ranging from IP theft to accidents in autonomous systems. Promising detection approaches include statistical tests, robust learning, and forensics. However, significant challenges remain in translating academic defenses like adversarial training and sanitization into practical tools ready for operational use. With safety and trustworthiness at stake, more research on benchmarking evaluations, adaptive attacks, fundamental tradeoffs, and real-world deployment of defenses is urgently needed. Understanding vulnerabilities and developing resilient machine learning pipelines will only grow in importance as data integrity is fundamental to developing safe artificial intelligence.
Distributional reinforcement learning (DRL) enhances the understanding of the effects of the randomness in the environment by letting agents learn the distribution of a random return, rather than its expected value as...
详细信息
The paper studies the problem of leakage localization in water distribution networks. For the case of a single pipe that suffers from a single leak, by taking recourse to pressure and flow measurements, and assuming t...
详细信息
The output feedback problem of finite-time command filtering for nonlinear systems with random disturbance is addressed in this paper. This is the first time that command filtering and output feedback are integrated s...
详细信息
Many organizations are looking for how to automate repetitive tasks to reduce manual work and free up resources for innovation. Machine Learning, especially Deep Learning, increases the chance of achieving this goal w...
Many organizations are looking for how to automate repetitive tasks to reduce manual work and free up resources for innovation. Machine Learning, especially Deep Learning, increases the chance of achieving this goal while working with technical documentation. Highly costly engineering hours can be saved, for example, by empowering the manual check with AI, which helps to reduce the total time for technical documents review. This paper proposes a way to substantially reduce the hours spent by process engineers reviewing P&IDs (Piping & Instrumentation Diagrams). The developed solution is based on a deep learning model for analyzing complex real-life engineering diagrams to find design errors - patterns that are combinations of high-level objects. Through the research on an extensive collection of P&ID files provided by McDermott, we prove that our model recognizes patterns representing engineering mistakes with high accuracy. We also describe our experience dealing with class-imbalance problems, labelling, and model architecture selection. The developed model is domain agnostic and can be re-trained on various schematic diagrams within engineering fields and, as well, could be used as an idea for other researchers to see whether similar solutions could be built for different industries.
In this paper, a novel method based on Artificial Potential Field (APF) theory is presented, for optimal motion planning in fully-known, static workspaces, for multiple final goal configurations. Optimization is achie...
In this paper, a novel method based on Artificial Potential Field (APF) theory is presented, for optimal motion planning in fully-known, static workspaces, for multiple final goal configurations. Optimization is achieved through a Reinforcement Learning (RL) framework. More specifically, the parameters of the underlying potential field are adjusted through a policy gradient algorithm in order to minimize a cost function. The main novelty of the proposed scheme lies in the method that provides optimal policies for multiple final positions, in contrast to most existing methodologies that consider a single final configuration. An assessment of the optimality of our results is conducted by comparing our novel motion planning scheme against a RRT* method.
The flow of quasi-direct currents (QDCs) in AC electrical networks, is a disturbing factor that mainly prevails upon mutual impacts between different system components or due to geophysical phenomena. These QDCs can a...
详细信息
ISBN:
(数字)9781665485371
ISBN:
(纸本)9781665485388
The flow of quasi-direct currents (QDCs) in AC electrical networks, is a disturbing factor that mainly prevails upon mutual impacts between different system components or due to geophysical phenomena. These QDCs can alter the normal behavior of the system components, e.g., power transformer inrush currents. In this paper, an analysis of the inrush current phenomenon in power transformers under the influence of QDCs has been performed. The effect of QDCs on power transformer inrush currents is first mathematically analyzed, and then investigated by computer simulations in EMTP-RV software. Results show that power transformer inrush currents can severely increase in the presence of QDCs.
This study addresses linear attacks on remote state estimation within the context of a constrained alarm rate. Smart sensors, which are equipped with local Kalman filters, transmit innovations instead of raw measureme...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
This study addresses linear attacks on remote state estimation within the context of a constrained alarm rate. Smart sensors, which are equipped with local Kalman filters, transmit innovations instead of raw measurements through a wireless communication network. This transmission is vulnerable to malicious data interception and manipulation by attackers. The aim of this research is to identify the optimal attack strategy that degrades the system performance while adhering to stealthiness constraints. A notable innovation of this paper is the direct association of the attack’s stealthiness with the alarm rate, diverging from traditional approaches that rely on the covariance of the innovation or the Kullback–Leibler divergence, which are conventional metrics that have been extensively explored in previous studies. Our findings reveal that the optimal attack strategy exhibits some structural characteristics in systems of low dimensions. The performance of the proposed attack strategy is demonstrated through numerical examples.
Understanding and controlling the mechanisms behind synchronization phenomena is of paramount importance in nonlinear science. In particular, the emergence of chimera states, patterns in which order and disorder coexi...
详细信息
This paper focuses on two inverse problems of the Kalman filter in which the process and measurement noises are correlated. The unknown covariance matrix in a stochastic system is reconstructed from observations of it...
This paper focuses on two inverse problems of the Kalman filter in which the process and measurement noises are correlated. The unknown covariance matrix in a stochastic system is reconstructed from observations of its posterior beliefs. For the standard inverse Kalman filtering problem, a novel duality-based formulation is proposed, where a well-defined inverse optimal control (IOC) problem is solved instead. Identifiability of the underlying model is proved, and a least squares estimator is designed that is statistically consistent. The time-invariant case using the steady-state Kalman gain is further studied. Since this inverse problem is ill-posed, a canonical class of covariance matrices is constructed, which can be uniquely identified from the dataset with asymptotic convergence. Finally, the performances of the proposed methods are illustrated by numerical examples.
暂无评论