The incentive mechanism of federated learning has been a hot topic,but little research has been done on the compensation of privacy *** this end,this study uses the Local SGD federal learning framework and gives a the...
详细信息
The incentive mechanism of federated learning has been a hot topic,but little research has been done on the compensation of privacy *** this end,this study uses the Local SGD federal learning framework and gives a theoretical analysis under the use of differential privacy *** on the analysis,a multi‐attribute reverse auction model is proposed to be used for user selection as well as payment calculation for participation in federal *** model uses a mixture of economic and non‐economic attributes in making choices for users and is transformed into an optimisation equation to solve the user choice *** addition,a post‐auction negotiation model that uses the Rubinstein bargaining model as well as optimisation equations to describe the negotiation process and theoretically demonstrate the improvement of social welfare is *** the experimental part,the authors find that their algorithm improves both the model accuracy and the F1‐score values relative to the comparison algorithms to varying degrees.
In the assessment of car insurance claims,the claim rate for car insurance presents a highly skewed probability distribution,which is typically modeled using Tweedie *** traditional approach to obtaining the Tweedie r...
详细信息
In the assessment of car insurance claims,the claim rate for car insurance presents a highly skewed probability distribution,which is typically modeled using Tweedie *** traditional approach to obtaining the Tweedie regression model involves training on a centralized dataset,when the data is provided by multiple parties,training a privacy-preserving Tweedie regression model without exchanging raw data becomes a *** address this issue,this study introduces a novel vertical federated learning-based Tweedie regression algorithm for multi-party auto insurance rate setting in data *** algorithm can keep sensitive data locally and uses privacy-preserving techniques to achieve intersection operations between the two parties holding the *** determining which entities are shared,the participants train the model locally using the shared entity data to obtain the local generalized linear model intermediate *** homomorphic encryption algorithms are introduced to interact with and update the model intermediate parameters to collaboratively complete the joint training of the car insurance rate-setting *** tests on two publicly available datasets show that the proposed federated Tweedie regression algorithm can effectively generate Tweedie regression models that leverage the value of data fromboth partieswithout exchanging *** assessment results of the scheme approach those of the Tweedie regressionmodel learned fromcentralized data,and outperformthe Tweedie regressionmodel learned independently by a single party.
The performance of deep learning models is heavily reliant on the quality and quantity of train-ing *** training data will lead to ***,in the task of alert-situation text classification,it is usually difficult to obta...
详细信息
The performance of deep learning models is heavily reliant on the quality and quantity of train-ing *** training data will lead to ***,in the task of alert-situation text classification,it is usually difficult to obtain a large amount of training *** paper proposes a text data augmentation method based on masked language model(MLM),aiming to enhance the generalization capability of deep learning models by expanding the training *** method em-ploys a Mask strategy to randomly conceal words in the text,effectively leveraging contextual infor-mation to predict and replace masked words based on MLM,thereby generating new training *** Mask strategies of character level,word level and N-gram are designed,and the performance of each Mask strategy under different Mask ratios is analyzed and *** experimental results show that the performance of the word-level Mask strategy is better than the traditional data augmen-tation method.
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and *** special structure of WSN brings both convenience and *** example,a malicious participa...
详细信息
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and *** special structure of WSN brings both convenience and *** example,a malicious participant can launch attacks by capturing a physical ***,node authentication that can resist malicious attacks is very important to network ***,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for *** our scheme,all nodes are managed by utilizing the identity information stored on the ***,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection *** experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie...
详细信息
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achieved secure outsourced computing,but they suffer from low computational accuracy,difficult-to-handle heterogeneous distribution of data from multiple sources,and high computational cost,which result in extremely poor user experience and expensive cloud computing *** address the above problems,we propose amulti-precision,multi-sourced,andmulti-key outsourcing neural network training ***,we design a multi-precision functional encryption computation based on Euclidean ***,we design the outsourcing model training algorithm based on a multi-precision functional encryption with multi-sourced ***,we conduct experiments on three *** results indicate that our framework achieves an accuracy improvement of 6%to 30%.Additionally,it offers a memory space optimization of 1.0×2^(24) times compared to the previous best approach.
The existence of adversarial example reveals the fragility in neural networks, and the exploration of their theoretical origins increases the interpretability of deep learning, enhances researchers’ understanding of ...
详细信息
ISBN:
(纸本)9789819785391
The existence of adversarial example reveals the fragility in neural networks, and the exploration of their theoretical origins increases the interpretability of deep learning, enhances researchers’ understanding of neural networks, and contributes to the development of next-generation artificial intelligence, which has attracted widespread research in various fields. The targeted adversarial attack problem based on sample features faces two problems: on the one hand, the difference in the model’s attention to different features in the example;On the other hand, the bias that occurs in adversarial attacks can have an impact on targeted attacks. The mechanism of the human eye relies more on the shape information of the image. However, in the past, artificial intelligence models based on convolutional neural networks often relied on the texture features of image examples to make decisions. At present, general optimize adversarial attack algorithms do not distinguish different types of features based on different parts of the image, but only process the entire example in a general manner, making it difficult to effectively utilize the effective features in the example, resulting in poor algorithm performance and interpretability. This article optimizes the adversarial attack algorithm based on optimization iteration, as follows: Firstly, different types of information in adversarial examples are studied, and fourier transform technology is used to process the attacked original image and obtain its low-frequency information. The obtained low-frequency examples are randomly cropped to obtain some feature examples. Then, the clustering effect was studied when the examples were attacked without targets, and an inter-class smoothing loss was designed to improve the success rate of target attacks. This Rebalance Universal Feature Method (RFM) is based on fourier low pass filtering and inter-class smoothing, which effectively improves the ability of optimization iteration bas
Neural network models face two highly destructive threats in real-world applications: membership inference attacks (MIAs) and adversarial attacks (AAs). One compromises the model's confidentiality, leading to memb...
详细信息
Dear editor, keysecurity is of great practical significance and demand to guarantee the security of digital assets in the blockchain system. At present, users prefer to escrow their assets on centralized institutions...
Dear editor, keysecurity is of great practical significance and demand to guarantee the security of digital assets in the blockchain system. At present, users prefer to escrow their assets on centralized institutions, but this phenomenon has gone against the unique characteristics of decentralization and anonymity in the blockchain. Among them, the suspense incidents of assets lock or lost are enough to prove that the security of escrowed keys on the exchanges is questionable.
With the rapid development of Internet of Things (loT) technology, the vast amount of data generated by its devices has raised widespread concern for user privacy pro-tection. Differential Privacy, as a stringent priv...
详细信息
Dear Editor, In order to accommodate the effects of false data injection attacks(FDIAs), the moving target defense(MTD) strategy is recently proposed to enhance the security of the smart grid by perturbing branch susc...
详细信息
Dear Editor, In order to accommodate the effects of false data injection attacks(FDIAs), the moving target defense(MTD) strategy is recently proposed to enhance the security of the smart grid by perturbing branch susceptances. However, most pioneer work only focus on the defending performance of MTD in terms of detecting FDIAs and the impact of MTD on the static factors such as the power and economic losses.
暂无评论