Federated Graph Learning (FedGL) is an emerging Federated Learning (FL) framework that learns the graph data from various clients to train better Graph Neural Networks(GNNs) model. Owing to concerns regarding the secu...
详细信息
ISBN:
(纸本)9798400712746
Federated Graph Learning (FedGL) is an emerging Federated Learning (FL) framework that learns the graph data from various clients to train better Graph Neural Networks(GNNs) model. Owing to concerns regarding the security of such framework, numerous studies have attempted to execute backdoor attacks on FedGL, with a particular focus on distributed backdoor attacks. However, all existing methods posting distributed backdoor attack on FedGL only focus on injecting distributed backdoor triggers into the training data of each malicious client, which will cause model performance degradation on original task and is not always effective when confronted with robust federated learning defense algorithms, leading to low success rate of attack. What’s more, the backdoor signals introduced by the malicious clients may be smoothed out by other clean signals from the honest clients, which potentially undermining the performance of the attack. To address the above significant shortcomings, we propose a non-intrusive graph distributed backdoor attack(NI-GDBA) that does not require backdoor triggers to be injected in the training data. Our attack trains an adaptive perturbation trigger generator model for each malicious client to learn the natural backdoor from the GNN model downloading from the server with the malicious client’s local data. In contrast to traditional distributed backdoor attacks on FedGL via trigger injection in training data, our attack on different datasets such as Molecules and Bioinformatics have higher attack success rate, stronger persistence and stealth, and has no negative impact on the performance of the global GNN model. We also explore the robustness of NI-GDBA under different defense strategies, and based on our extensive experimental studies, we show that our attack method is robust to current federated learning defense methods, thus it is necessary to consider non-intrusive distributed backdoor attacks on FedGL as a novel threat that requires custom d
Multimodal Sentiment Analysis (MSA) aims to identify human attitudes from diverse modalities such as visual, audio and text modalities. Recent studies suggest that the text modality tends to be the most effective, whi...
详细信息
For mitigating the libration angle fluctuation of the tethered satellite system,this paper discusses how to make the uniform velocity-deceleration separation scheme achieve the best ***,a judgment condition is establi...
详细信息
For mitigating the libration angle fluctuation of the tethered satellite system,this paper discusses how to make the uniform velocity-deceleration separation scheme achieve the best ***,a judgment condition is established to determine the tether state by comparing the tether length and the relative distance of the sub-satellite and the parent *** on the tethered satellite system dynamics equation and Clohessy-Wiltshire equation,dynamic models are given for four cases of tether ***,the influence of the uniform velocity-deceleration separation scheme on the libration angle is analyzed by taking the libration angle at the separation ending time and the mean absolute value of the libration angle as index ***,the optimality problem of the uniform velocity-deceleration separation scheme is formulated as an optimization problem with constraints,and an approximate solution algorithm is given by combining the back propagation neural network and Newton-Raphson method of multiple initial ***,the effectiveness of the proposed method is verified by a numerical simulation.
Cell association is a significant research issue in future mobile communication systems due to the unacceptably large computational time of traditional *** article proposes a polynomial-time cell association scheme wh...
详细信息
Cell association is a significant research issue in future mobile communication systems due to the unacceptably large computational time of traditional *** article proposes a polynomial-time cell association scheme which not only completes the association in polynomial time but also fits for a generic optimization objective *** the one hand,traditional cell association as a non-deterministic polynomial(NP)hard problem with a generic utility function is heuristically transformed into a 2-dimensional assignment optimization and solved by a certain polynomial-time algorithm,which significantly saves computational *** the other hand,the scheme jointly considers utility maximization and load balancing among multiple base stations(BSs)by maintaining an experience pool storing a set of weighting factor values and their corresponding *** an association optimization is required,a suitable weighting factor value is taken from the pool to calculate a long square utility matrix and a certain polynomial-time algorithm will be applied for the *** with several representative schemes,the proposed scheme achieves large system capacity and high fairness within a relatively short computational time.
With the increase in the complexity of industrial system, simply detecting and diagnosing a fault may be insufficient in some cases, and prognosing the fault ahead of time could have a certain necessity. Accurate pred...
详细信息
With the increase in the complexity of industrial system, simply detecting and diagnosing a fault may be insufficient in some cases, and prognosing the fault ahead of time could have a certain necessity. Accurate prediction of key alarm variables in chemical process can indicate the possible change to reduce the probability of abnormal conditions. According to the characteristics of chemical process data, this work proposed a key alarm variables prediction model in chemical process based on dynamic-inner principal component analysis(DiPCA) and long short-term memory(LSTM). DiPCA is used to extract the most dynamic components for prediction. While LSTM is used to learn the relationship and predict the key alarm variables. This work used a simulation data set and a real hydrogenation process data set for applications and explained the model validity from the essential characteristics. Comparison of results with different models shows that our model has better prediction accuracy and performance, which can provide the basis for fault prognosis and health management.
Manganese dioxide(MnO_(2))electrode material possesses the advantages of high energy density,structural diversity and high modification *** allows it become one of the important cathodes for aqueous zinc ion ***,the a...
详细信息
Manganese dioxide(MnO_(2))electrode material possesses the advantages of high energy density,structural diversity and high modification *** allows it become one of the important cathodes for aqueous zinc ion ***,the applications are limited by the poor electrical conductivity,narrow layer spacing and the ease of ***,we prepare MnO_(2)-PVP@0.03GO composites by the co-modification of polyvinylpyrrolidone(PVP)pre-insertion layer and graphene oxide(GO)self-assembly *** Zn//MnO_(2)-PVP@0.03GO cells deliver a discharge specific capacity of 442 mAh/g at a current density of 0.2 A/*** also maintains 100%capacity for 1000 times cycling at 1 A/*** assembled soft package batteries demonstrate superior flexibility and adaptability under different bending conditions.
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequ...
详细信息
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequent identification presents a formidable *** existing models have predominantly relied on direct extraction of encrypted traffic data from imbalanced datasets,with the dataset’s imbalance significantly affecting the model’s *** the present study,a new model,referred to as UD-VLD(Unbalanced dataset-VAE-LSTM-DRN),was proposed to address above *** proposed model is an encrypted traffic identification model for handling unbalanced *** encoder of the variational autoencoder(VAE)is combined with the decoder and Long-short term Memory(LSTM)in UD-VLD model to realize the data enhancement processing of the original unbalanced *** enhanced data is processed by transforming the deep residual network(DRN)to address neural network gradient-related ***,the data is classified and *** UD-VLD model integrates the related techniques of deep learning into the encrypted traffic recognition technique,thereby solving the processing problem for unbalanced *** UD-VLD model was tested using the publicly available Tor dataset and VPN *** UD-VLD model is evaluated against other comparative models in terms of accuracy,loss rate,precision,recall,F1-score,total time,and ROC *** results reveal that the UD-VLD model exhibits better performance in both binary and multi classification,being higher than other encrypted traffic recognition models that exist for unbalanced ***,the evaluation performance indicates that the UD-VLD model effectivelymitigates the impact of unbalanced data on traffic *** can serve as a novel solution for encrypted traffic identification.
Interconnection of all things challenges the traditional communication methods,and Semantic Communication and Computing(SCC)will become new *** is a challenging task to accurately detect,extract,and represent semantic...
详细信息
Interconnection of all things challenges the traditional communication methods,and Semantic Communication and Computing(SCC)will become new *** is a challenging task to accurately detect,extract,and represent semantic information in the research of SCC-based *** previous research,researchers usually use convolution to extract the feature information of a graph and perform the corresponding task of node ***,the content of semantic information is quite *** graph convolutional neural networks provide an effective solution for node classification tasks,due to their limitations in representing multiple relational patterns and not recognizing and analyzing higher-order local structures,the extracted feature information is subject to varying degrees of ***,this paper extends from a single-layer topology network to a multi-layer heterogeneous topology *** Bidirectional Encoder Representations from Transformers(BERT)training word vector is introduced to extract the semantic features in the network,and the existing graph neural network is improved by combining the higher-order local feature module of the network model representation network.A multi-layer network embedding algorithm on SCC-based networks with motifs is proposed to complete the task of end-to-end node *** verify the effectiveness of the algorithm on a real multi-layer heterogeneous network.
Intelligent fault recognition techniques are essential to ensure the long-term reliability of *** to the variations in material,equipment and environment,the process variables monitored by sensors contain diverse data...
详细信息
Intelligent fault recognition techniques are essential to ensure the long-term reliability of *** to the variations in material,equipment and environment,the process variables monitored by sensors contain diverse data characteristics at different time scales or in multiple operating *** much progress in statistical learning and deep learning for fault recognition,most models are constrained by abundant diagnostic expertise,inefficient multiscale feature extraction and unruly multimode *** overcome the above issues,a novel fault diagnosis model called adaptive multiscale convolutional neural network(AMCNN)is developed in this paper.A new multiscale convolutional learning structure is designed to automatically mine multiple-scale features from time-series data,embedding the adaptive attention module to adjust the selection of relevant fault pattern *** triplet loss optimization is adopted to increase the discrimination capability of the model under the multimode *** benchmarks CSTR simulation and Tennessee Eastman process are utilized to verify and illustrate the feasibility and efficiency of the proposed *** with other common models,AMCNN shows its outstanding fault diagnosis performance and great generalization ability.
Anomaly detection is crucial to the flight safety and maintenance of unmanned aerial vehicles(UAVs)and has attracted extensive attention from ***-based approaches rely on prior knowledge,while model-based approaches a...
详细信息
Anomaly detection is crucial to the flight safety and maintenance of unmanned aerial vehicles(UAVs)and has attracted extensive attention from ***-based approaches rely on prior knowledge,while model-based approaches are challenging for constructing accurate and complex physical models of unmanned aerial systems(UASs).Although data-driven methods do not require extensive prior knowledge and accurate physical UAS models,they often lack parameter selection and are limited by the cost of labeling anomalous ***,flight data with random noise pose a significant challenge for anomaly *** work proposes a spatiotemporal correlation based on long short-term memory and autoencoder(STCLSTM-AE)neural network data-driven method for unsupervised anomaly detection and recovery of UAV flight ***,UAV flight data are preprocessed by combining the Savitzky-Golay filter data processing technique to mitigate the effect of noise in the original historical flight data on the ***-based feature subset selection is subsequently performed to reduce the reliance on expert ***,the extracted features are used as the input of the designed LSTM-AE model to achieve the anomaly detection and recovery of UAV flight data in an unsupervised ***,the method's effectiveness is validated on real UAV flight data.
暂无评论