Federated learning is widely used to solve the problem of data decentralization and can provide privacy protectionfor data owners. However, since multiple participants are required in federated learning, this allows a...
详细信息
Federated learning is widely used to solve the problem of data decentralization and can provide privacy protectionfor data owners. However, since multiple participants are required in federated learning, this allows attackers tocompromise. Byzantine attacks pose great threats to federated learning. Byzantine attackers upload maliciouslycreated local models to the server to affect the prediction performance and training speed of the global model. Todefend against Byzantine attacks, we propose a Byzantine robust federated learning scheme based on backdoortriggers. In our scheme, backdoor triggers are embedded into benign data samples, and then malicious localmodels can be identified by the server according to its validation dataset. Furthermore, we calculate the adjustmentfactors of local models according to the parameters of their final layers, which are used to defend against datapoisoning-based Byzantine attacks. To further enhance the robustness of our scheme, each localmodel is weightedand aggregated according to the number of times it is identified as malicious. Relevant experimental data showthat our scheme is effective against Byzantine attacks in both independent identically distributed (IID) and nonindependentidentically distributed (non-IID) scenarios.
High reliability applications in dense access scenarios have become one of the main goals of 6G *** solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication systems,an inte...
详细信息
High reliability applications in dense access scenarios have become one of the main goals of 6G *** solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication systems,an intelligent cooperative secure access scheme based on multi-agent reinforcement learning and federated learning is proposed,that is,the Preamble Slice Orderly Queue Access(PSOQA)*** this scheme,the preamble arrangement is combined with the access *** preamble arrangement is realized by preamble slices which is from the virtual preamble *** access devices learn to queue orderly by deep reinforcement *** orderly queue weakens the random and avoids collision.A preamble slice is assigned to an orderly access queue at each access *** orderly queue is determined by interaction information among multiple *** the federated reinforcement learning framework,the PSOQA scheme is implemented to guarantee the privacy and security of ***,the access performance of PSOQA is compared with other random contention schemes in different load *** results show that PSOQA can not only improve the access success rate but also guarantee low-latency tolerant performances.
Palmprint recognition is an emerging biometrics technology that has attracted increasing attention in recent years. Many palmprint recognition methods have been proposed, including traditional methods and deep learnin...
详细信息
Palmprint recognition is an emerging biometrics technology that has attracted increasing attention in recent years. Many palmprint recognition methods have been proposed, including traditional methods and deep learning-based methods. Among the traditional methods, the methods based on directional features are mainstream because they have high recognition rates and are robust to illumination changes and small noises. However, to date, in these methods, the stability of the palmprint directional response has not been deeply studied. In this paper, we analyse the problem of directional response instability in palmprint recognition methods based on directional feature. We then propose a novel palmprint directional response stability measurement (DRSM) to judge the stability of the directional feature of each pixel. After filtering the palmprint image with the filter bank, we design DRSM according to the relationship between the maximum response value and other response values for each pixel. Using DRSM, we can judge those pixels with unstable directional response and use a specially designed encoding mode related to a specific method. We insert the DRSM mechanism into seven classical methods based on directional feature, and conduct many experiments on six public palmprint databases. The experimental results show that the DRSM mechanism can effectively improve the performance of these methods. In the field of palmprint recognition, this work is the first in-depth study on the stability of the palmprint directional response, so this paper has strong reference value for research on palmprint recognition methods based on directional features.
Marine container terminal(MCT)plays a key role in the marine intelligent transportation system and international logistics ***,the efficiency of resource scheduling significantly influences the operation performance o...
详细信息
Marine container terminal(MCT)plays a key role in the marine intelligent transportation system and international logistics ***,the efficiency of resource scheduling significantly influences the operation performance of *** solve the practical resource scheduling problem(RSP)in MCT efficiently,this paper has contributions to both the problem model and the algorithm ***,in the problem model,different from most of the existing studies that only consider scheduling part of the resources in MCT,we propose a unified mathematical model for formulating an integrated *** new integrated RSP model allocates and schedules multiple MCT resources simultaneously by taking the total cost minimization as the ***,in the algorithm design,a pre-selection-based ant colony system(PACS)approach is proposed based on graphic structure solution representation and a pre-selection *** the one hand,as the RSP can be formulated as the shortest path problem on the directed complete graph,the graphic structure is proposed to represent the solution encoding to consider multiple constraints and multiple factors of the RSP,which effectively avoids the generation of infeasible *** the other hand,the pre-selection strategy aims to reduce the computational burden of PACS and to fast obtain a higher-quality *** evaluate the performance of the proposed novel PACS in solving the new integrated RSP model,a set of test cases with different sizes is *** results and comparisons show the effectiveness and efficiency of the PACS algorithm,which can significantly outperform other state-of-the-art algorithms.
Images captured under severe weather conditions, such as haze and fog, suffer from image quality degradation caused by atmospheric particle diffusion. This degradation manifests as color fading, reduced contrast, and ...
详细信息
Apricot detection is a prerequisite for counting and harvesting tasks. Existing algorithms face challenges in adapting to the impacts of complex environmental factors such as lighting variations, shadows, dense foliag...
详细信息
Under the background of high-speed train production performance degradation, aiming at the problem of insufficient sensitivity of high-speed train traction system for early fault detection, we propose an early fault d...
详细信息
Under laser irradiation,photothermal therapy(PTT)effectively ablates tumors above 50℃.However,hyperthermia can cause additional damage due to the inevitable heat spread to surrounding healthy ***,nanoparticles named ...
详细信息
Under laser irradiation,photothermal therapy(PTT)effectively ablates tumors above 50℃.However,hyperthermia can cause additional damage due to the inevitable heat spread to surrounding healthy ***,nanoparticles named as GI@P NPs were designed for enhanced PTT with heat shock protein 90(HSP90)inhibition at temperatures below 50℃to achieve optimal cancer therapy and avoid surrounding ***@P NPs were done by co-loading Garcinia cambogia acid(GA)and photosensitizer IR783 in polymer PLG-g-mPEG to form a nanomedicine,where IR783 with excellent photoacoustic(PA)signal acted as an excellent photothermal therapeutic agent that converted the laser energy into heat to kill tumor cells,GA was used as antitumor drug for chemotherapy and an inhibitor of HSP90 to overcome the heat resistance of tumors for efficient cryo-photothermal therapy,and PLG-g-mPEG can encapsulate IR783 and GA to increase biocompatibility and accumulate effectively in the *** GI@P NPs were injected into the mice,we could observe that the PA signals gradually increased in the tumor region and showed the strongest PA signals at 12 *** laser irradiation,the tumor temperature of the mice could raise to about 43.5℃,and the tumor was significantly inhibited after long-term monitoring by PA *** a result,gentle PTT produced by GI@P NPs exhibited good antitumor effects at relatively low temperature and minimized nonspecific thermal damage to normal *** GI@P NPs as nanomedicine enriched our understanding of various applications of polymeric carriers,especially in the biomedical field.
Dear Editor,This letter presents a new transfer learning framework for the deep multi-agent reinforcement learning(DMARL) to reduce the convergence difficulty and training time when applying DMARL to a new scenario [1...
详细信息
Dear Editor,This letter presents a new transfer learning framework for the deep multi-agent reinforcement learning(DMARL) to reduce the convergence difficulty and training time when applying DMARL to a new scenario [1], [2].
In modern society,an increasing number of occasions need to effectively verify people's *** is the most ef-fective technology for personal *** research on automated biometrics recognition mainly started in the 196...
详细信息
In modern society,an increasing number of occasions need to effectively verify people's *** is the most ef-fective technology for personal *** research on automated biometrics recognition mainly started in the 1960s and *** the following 50 years,the research and application of biometrics have achieved fruitful *** 2014-2015,with the successful applications of some emerging information technologies and tools,such as deep learning,cloud computing,big data,mobile communication,smartphones,location-based services,blockchain,new sensing technology,the Internet of Things and federated learning,biometric technology entered a new development ***,taking 2014-2015 as the time boundary,the development of biometric technology can be divided into two *** addition,according to our knowledge and understanding of biometrics,we fur-ther divide the development of biometric technology into three phases,i.e.,biometrics 1.0,2.0 and *** 1.0 is the primary de-velopment phase,or the traditional development *** 2.0 is an explosive development phase due to the breakthroughs caused by some emerging information *** present,we are in the development phase of biometrics *** 3.0 is the future development phase of *** the biometrics 3.0 phase,biometric technology will be fully mature and can meet the needs of various *** 1.0 is the initial phase of the development of biometric technology,while biometrics 2.0 is the advanced *** this paper,we provide a brief review of biometrics ***,the concept of biometrics 2.0 is defined,and the architecture of biometrics 2.0 is *** particular,the application architecture of biometrics 2.0 in smart cities is *** challenges and perspectives of biometrics 2.0 are also discussed.
暂无评论