Bidirectional electric vehicle (EV) charging enables stored energy to reduce peak loads for buildings (V2B) and the grid (V2G). However, building owners investing in V2B infrastructure while generating revenue from V2...
详细信息
Photovoltaic arrays receive varying levels of solar radiation due to factors such as shadows created by clouds, surrounding buildings, and other obstructions. Therefore, an effective Maximum Power Point Tracking (MPPT...
详细信息
Backdoor attacks pose great threats to deep neural network models. All existing backdoor attacks are designed for unstructured data(image, voice, and text), but not structured tabular data, which has wide real-world a...
详细信息
Backdoor attacks pose great threats to deep neural network models. All existing backdoor attacks are designed for unstructured data(image, voice, and text), but not structured tabular data, which has wide real-world applications, e.g., recommendation systems, fraud detection, and click-through rate prediction. To bridge this research gap, we make the first attempt to design a backdoor attack framework, named BAD-FM, for tabular data prediction models. Unlike images or voice samples composed of homogeneous pixels or signals with continuous values, tabular data samples contain well-defined heterogeneous fields that are usually sparse and discrete. Tabular data prediction models do not solely rely on deep networks but combine shallow components(e.g., factorization machine, FM) with deep components to capture sophisticated feature interactions among fields. To tailor the backdoor attack framework to tabular data models, we carefully design field selection and trigger formation algorithms to intensify the influence of the trigger on the backdoored model. We evaluate BAD-FM with extensive experiments on four datasets, i.e.,HUAWEI, Criteo, Avazu, and KDD. The results show that BAD-FM can achieve an attack success rate as high as 100%at a poisoning ratio of 0.001%, outperforming baselines adapted from existing backdoor attacks against unstructured data models. As tabular data prediction models are widely adopted in finance and commerce, our work may raise alarms on the potential risks of these models and spur future research on defenses.
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
Non-linear optics is a branch of optics that studies the intriguing and sometimes unexpected ways in which light and matter interact at high intensities, when the polarization density does not respond linearly to the ...
Non-linear optics is a branch of optics that studies the intriguing and sometimes unexpected ways in which light and matter interact at high intensities, when the polarization density does not respond linearly to the electric field of the light. The pursuit of the perfect non-linear optical material has been ongoing ever since the pioneering experiment on second harmonic generation carried out by Franken in 1961 [1]. Indeed,
The growing prevalence of Internet of Things (IoT) devices has heightened vulnerabilities to botnet-based cyberattacks, necessitating robust detection mechanisms. This paper proposes DenseRSE-ASPPNet, an advanced deep...
详细信息
Photovoltaic(PV)modules age with time for various reasons such as corroded joints and terminals and glass coating defects,and their ageing degrades the PV array *** the help of the PV array numerical model,this paper ...
详细信息
Photovoltaic(PV)modules age with time for various reasons such as corroded joints and terminals and glass coating defects,and their ageing degrades the PV array *** the help of the PV array numerical model,this paper explores the effects of PV module ageing on the PV array power,and the power gains and costs of rearranging and recabling aged PV modules in a PV *** numerical PV array model is first revised to account for module ageing,rearrangement and recabling,with the relevant equations presented *** updated numerical model is then used to obtain the array powers for seven different PV *** power results are then analysed in view of the attributes of the seven PV array examples.A guiding method to recommend recabling after rearranging aged modules is then proposed,leading to further significant power gains,while eliminating intra-row *** certain conditions are met,it was shown that recabling PV modules after rearranging them may lead to further significant power gains,reaching 57%and 98%in two considered PV array *** gains are possible in other arrays.A cost-benefit analysis weighing annual power gains versus estimated recabling costs is also given for the seven considered PV array examples to guide recabling decisions based on technical and economic *** the considered examples,recabling costs can be recovered in<4 *** with the powers of the aged arrays,power gains due to our proposed rearranging and recabling the PV arrays ranged between 73%and 131%in the considered examples—well over the gains reported in the ***,the cost of our static module rearrangement and recabling method outshines the costs of dynamic reconfiguration methods recently published in the literature.
The steady-state security region(SSR)offers ro-bust support for the security assessment and control of new power systems with high uncertainty and ***,accurately solving the steady-state security region boundary(SS-RB...
详细信息
The steady-state security region(SSR)offers ro-bust support for the security assessment and control of new power systems with high uncertainty and ***,accurately solving the steady-state security region boundary(SS-RB),which is high-dimensional,non-convex,and non-linear,presents a significant *** address this problem,this paper proposes a method for approximating the SSRB in power systems using the feature non-linear converter and improved oblique decision ***,to better characterize the SSRB,boundary samples are generated using the proposed sampling *** samples are distributed within a limited distance near the ***,to handle the high-dimensionality,non-convexity and non-linearity of the SSRB,boundary samples are converted from the original power injection space to a new fea-ture space using the designed feature non-linear ***-sequently,in this feature space,boundary samples are linearly separated using the proposed information gain rate based weighted oblique decision ***,the effectiveness and generality of the proposed sampling method are verified on the WECC 3-machine 9-bus system and IEEE 118-bus system.
The integration of technologies like artificial intelligence,6G,and vehicular ad-hoc networks holds great potential to meet the communication demands of the Internet of Vehicles and drive the advancement of vehicle **...
详细信息
The integration of technologies like artificial intelligence,6G,and vehicular ad-hoc networks holds great potential to meet the communication demands of the Internet of Vehicles and drive the advancement of vehicle ***,these advancements also generate a surge in data processing requirements,necessitating the offloading of vehicular tasks to edge servers due to the limited computational capacity of *** recent advancements,the robustness and scalability of the existing approaches with respect to the number of vehicles and edge servers and their resources,as well as privacy,remain a *** this paper,a lightweight offloading strategy that leverages ubiquitous connectivity through the Space Air Ground Integrated Vehicular Network architecture while ensuring privacy preservation is *** Internet of Vehicles(IoV)environment is first modeled as a graph,with vehicles and base stations as nodes,and their communication links as ***,vehicular applications are offloaded to suitable servers based on latency using an attention-based heterogeneous graph neural network(HetGNN)***,a differential privacy stochastic gradient descent trainingmechanism is employed for privacypreserving of vehicles and offloading ***,the simulation results demonstrated that the proposedHetGNN method shows good performance with 0.321 s of inference time,which is 42.68%,63.93%,30.22%,and 76.04% less than baseline methods such as Deep Deterministic Policy Gradient,Deep Q Learning,Deep Neural Network,and Genetic Algorithm,respectively.
With the rise of artificial intelligence and cloud computing, machine-learning-as-a-service platforms,such as Google, Amazon, and IBM, have emerged to provide sophisticated tasks for cloud applications. These propriet...
详细信息
With the rise of artificial intelligence and cloud computing, machine-learning-as-a-service platforms,such as Google, Amazon, and IBM, have emerged to provide sophisticated tasks for cloud applications. These proprietary models are vulnerable to model extraction attacks due to their commercial value. In this paper, we propose a time-efficient model extraction attack framework called Swift Theft that aims to steal the functionality of cloud-based deep neural network models. We distinguish Swift Theft from the existing works with a novel distribution estimation algorithm and reference model settings, finding the most informative query samples without querying the victim model. The selected query samples can be applied to various cloud models with a one-time selection. We evaluate our proposed method through extensive experiments on three victim models and six datasets, with up to 16 models for each dataset. Compared to the existing attacks, Swift Theft increases agreement(i.e., similarity) by 8% while consuming 98% less selecting time.
暂无评论