Dear Editor, In order to accommodate the effects of false data injection attacks(FDIAs), the moving target defense(MTD) strategy is recently proposed to enhance the security of the smart grid by perturbing branch susc...
详细信息
Dear Editor, In order to accommodate the effects of false data injection attacks(FDIAs), the moving target defense(MTD) strategy is recently proposed to enhance the security of the smart grid by perturbing branch susceptances. However, most pioneer work only focus on the defending performance of MTD in terms of detecting FDIAs and the impact of MTD on the static factors such as the power and economic losses.
The existence of adversarial example reveals the fragility in neural networks, and the exploration of their theoretical origins increases the interpretability of deep learning, enhances researchers’ understanding of ...
详细信息
ISBN:
(纸本)9789819785391
The existence of adversarial example reveals the fragility in neural networks, and the exploration of their theoretical origins increases the interpretability of deep learning, enhances researchers’ understanding of neural networks, and contributes to the development of next-generation artificial intelligence, which has attracted widespread research in various fields. The targeted adversarial attack problem based on sample features faces two problems: on the one hand, the difference in the model’s attention to different features in the example;On the other hand, the bias that occurs in adversarial attacks can have an impact on targeted attacks. The mechanism of the human eye relies more on the shape information of the image. However, in the past, artificial intelligence models based on convolutional neural networks often relied on the texture features of image examples to make decisions. At present, general optimize adversarial attack algorithms do not distinguish different types of features based on different parts of the image, but only process the entire example in a general manner, making it difficult to effectively utilize the effective features in the example, resulting in poor algorithm performance and interpretability. This article optimizes the adversarial attack algorithm based on optimization iteration, as follows: Firstly, different types of information in adversarial examples are studied, and fourier transform technology is used to process the attacked original image and obtain its low-frequency information. The obtained low-frequency examples are randomly cropped to obtain some feature examples. Then, the clustering effect was studied when the examples were attacked without targets, and an inter-class smoothing loss was designed to improve the success rate of target attacks. This Rebalance Universal Feature Method (RFM) is based on fourier low pass filtering and inter-class smoothing, which effectively improves the ability of optimization iteration bas
Precipitation forecasting plays an important role in disaster warning,agricultural production,and other *** solve this issue,some deep learning methods are proposed to forecast future radar echo images and convert the...
详细信息
Precipitation forecasting plays an important role in disaster warning,agricultural production,and other *** solve this issue,some deep learning methods are proposed to forecast future radar echo images and convert them into rainfall *** spatiotemporal sequence prediction methods are usually based on a ConvRNN structure that combines a Convolutional Neural Network and Recurrent Neural ***,these existing methods ignore the image change prediction,which causes the coherence of the predicted image has ***,these approaches mainly focus on complicating model structure to exploit more historical spatiotemporal ***,they ignore introducing other valuable information to improve *** tackle these two issues,we propose GCMT‐ConvRNN,a multi‐ask framework of *** for precipitation nowcasting as the main task,it combines the motion field estimation and sub‐regression as auxiliary *** this framework,the motion field estimation task can provide motion information,and the sub‐regression task offers future ***,to reduce the negative transfer between the auxiliary tasks and the main task,we propose a new loss function based on the correlation of gradients in different *** experiments show that all models applied in our framework achieve stable and effective improvement.
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-laye...
详细信息
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-layer aggregation federated learning architecture,which lack the consideration of cross-domain and asynchronous robustness of federated learning,and rarely integrate verification mechanisms from the perspective of *** address the above challenges,we propose a Blockchain and Signcryption enabled Asynchronous Federated Learning(BSAFL)framework based on dual aggregation for cross-domain *** particular,we first design two types of signcryption schemes to secure the interaction and access control of collaborative learning between ***,we construct a differential privacy approach that adaptively adjusts privacy budgets to ensure data privacy and local models'availability of intra-domain ***,we propose an asynchronous aggregation solution that incorporates consensus verification and elastic participation using ***,security analysis demonstrates the security and privacy effectiveness of BSAFL,and the evaluation on real datasets further validates the high model accuracy and performance of BSAFL.
Backdoor attacks involve the injection of a limited quantity of poisoned samples containing triggers into the training dataset. During the inference stage, backdoor attacks can uphold a high level of accuracy for norm...
详细信息
When matching similarity among pedestrians in images, pedestrian re-identification algorithms are often disturbed by occlusions. A typical tactic is to improve the robustness of occlusion features in the model. Howeve...
详细信息
Cloud-based services have powerful storage functions and can provide accurate ***,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research *** t...
详细信息
Cloud-based services have powerful storage functions and can provide accurate ***,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research *** the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression *** address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the ***,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of ***,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all ***,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the ***,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.
The application of contrastive learning (CL) to collaborative filtering (CF) in recommender systems has achieved remarkable success. CL-based recommendation models mainly focus on creating multiple augmented views by ...
详细信息
The video grounding(VG) task aims to locate the queried action or event in an untrimmed video based on rich linguistic descriptions. Existing proposal-free methods are trapped in the complex interaction between video ...
详细信息
The video grounding(VG) task aims to locate the queried action or event in an untrimmed video based on rich linguistic descriptions. Existing proposal-free methods are trapped in the complex interaction between video and query, overemphasizing cross-modal feature fusion and feature correlation for VG. In this paper, we propose a novel boundary regression paradigm that performs regression token learning in a transformer. Particularly, we present a simple but effective proposal-free framework, namely video grounding transformer(ViGT), which predicts the temporal boundary using a learnable regression token rather than multi-modal or cross-modal features. In ViGT, the benefits of a learnable token are manifested as follows.(1) The token is unrelated to the video or the query and avoids data bias toward the original video and query.(2) The token simultaneously performs global context aggregation from video and query ***, we employed a sharing feature encoder to project both video and query into a joint feature space before performing cross-modal co-attention(i.e., video-to-query attention and query-to-video attention) to highlight discriminative features in each modality. Furthermore, we concatenated a learnable regression token [REG] with the video and query features as the input of a vision-language transformer. Finally, we utilized the token [REG] to predict the target moment and visual features to constrain the foreground and background probabilities at each timestamp. The proposed ViGT performed well on three public datasets:ANet-Captions, TACoS, and YouCookⅡ. Extensive ablation studies and qualitative analysis further validated the interpretability of ViGT.
We propose a new quantum-walk-based hash function QHF2M by combining two types of quantum walks with two-step memory and numerically test its statistical performance. The test result shows that QHF2M is on a par with ...
详细信息
暂无评论