Backdoor attacks pose great threats to deep neural network models. All existing backdoor attacks are designed for unstructured data(image, voice, and text), but not structured tabular data, which has wide real-world a...
详细信息
Backdoor attacks pose great threats to deep neural network models. All existing backdoor attacks are designed for unstructured data(image, voice, and text), but not structured tabular data, which has wide real-world applications, e.g., recommendation systems, fraud detection, and click-through rate prediction. To bridge this research gap, we make the first attempt to design a backdoor attack framework, named BAD-FM, for tabular data prediction models. Unlike images or voice samples composed of homogeneous pixels or signals with continuous values, tabular data samples contain well-defined heterogeneous fields that are usually sparse and discrete. Tabular data prediction models do not solely rely on deep networks but combine shallow components(e.g., factorization machine, FM) with deep components to capture sophisticated feature interactions among fields. To tailor the backdoor attack framework to tabular data models, we carefully design field selection and trigger formation algorithms to intensify the influence of the trigger on the backdoored model. We evaluate BAD-FM with extensive experiments on four datasets, i.e.,HUAWEI, Criteo, Avazu, and KDD. The results show that BAD-FM can achieve an attack success rate as high as 100%at a poisoning ratio of 0.001%, outperforming baselines adapted from existing backdoor attacks against unstructured data models. As tabular data prediction models are widely adopted in finance and commerce, our work may raise alarms on the potential risks of these models and spur future research on defenses.
The partial differential equation(PDE)solution of the telegrapher is a promising fault location method among time-domain and model-based *** research works have shown that the leap-frog process is superior to other ex...
详细信息
The partial differential equation(PDE)solution of the telegrapher is a promising fault location method among time-domain and model-based *** research works have shown that the leap-frog process is superior to other explicit methods for the PDE ***,its implementation is challenged by determining the initial conditions in time and the boundary conditions in *** letter proposes two implicit solution methods for determining the initial conditions and an analytical way to obtain the boundary conditions founded on the signal *** results show that the proposal gives fault location accuracy superior to the existing leap-frog scheme,particularly in the presence of harmonics.
The development of public transportation is considered a vital issue in reducing traffic as well as urban pollution. City buses play an important role in the city transportation system. In Iran, due to the high averag...
详细信息
Research has demonstrated the positive influence of Undergraduate Research Experience (URE) programs in Science, Technology, engineering, and Mathematics (STEM) on students' educational journey and their developme...
详细信息
There have been growing interests in characterizing system-wide aggregate flexibility to support transmission-side ancillary services and promote large-scale integration of distributed energy resources (DERs). However...
详细信息
Edge computing devices in Internet-of-Things (IoT) systems are being widely used in diverse application domains including industrial automation, surveillance, and smart housing. These applications typically employ a l...
详细信息
Purpose: This study aims to investigate and compare three nonplanar (NP) slicing algorithms. The algorithms aim to control the layer thickness variation (LTV), which is a common issue in supportless fabrication of fre...
详细信息
Present study deals with the acquisition and analysis of different types of incipient discharges in transformer by adopting Ultra-High Frequency (UHF) technique. The Nyquist rate sampling method generates a large numb...
详细信息
Model stealing attacks on AI/ML devices undermine intellectual property rights, compromise the competitive advantage of the original model developers, and potentially expose sensitive data embedded in the model’s beh...
详细信息
This paper proposes a coordinated frequency control scheme for emergency frequency regulation of isolated power systems with a high penetration of wind *** proposed frequency control strategy is based on the novel non...
详细信息
This paper proposes a coordinated frequency control scheme for emergency frequency regulation of isolated power systems with a high penetration of wind *** proposed frequency control strategy is based on the novel nonlinear regulator theory,which takes advantage of nonlinearity of doubly fed induction generators(DFIGs)and generators to regulate the frequency of the power *** deviations and power imbalances are used to design nonlinear feedback controllers that achieve the reserve power distribution between generators and DFIGs,in various wind speed *** effectiveness and dynamic performance of the proposed nonlinear coordinated frequency control method are validated through simulations in an actual isolated power grid.
暂无评论