Biometric methods have been widely used for privacy protection. Biometric recognition has unique and random characteristics, which can better protect people's privacy and security. In this paper, a biometric syste...
详细信息
In the last decades,metasurfaces have attracted much attention because of their extraordinary light-scattering ***,their inherently static geometry is an obstacle to many applications where dynamic tunability in their...
详细信息
In the last decades,metasurfaces have attracted much attention because of their extraordinary light-scattering ***,their inherently static geometry is an obstacle to many applications where dynamic tunability in their optical behaviour is ***,there is a quest to enable dynamic tuning of metasurface properties,particularly with fast tuning rate,large modulation by small electrical signals,solid state and programmable across multiple ***,we demonstrate electrically tunable metasurfaces driven by thermo-optic effect and flash-heating in *** show a 9-fold change in transmission by<5 V biasing voltage and the modulation rise-time of<625µ*** device consists of a silicon hole array metasurface encapsulated by transparent conducting oxide as a localised *** allows for video frame rate optical switching over multiple pixels that can be electrically *** of the advantages of the proposed tuning method compared with other methods are the possibility to apply it for modulation in the visible and near-infrared region,large modulation depth,working at transmission regime,exhibiting low optical loss,low input voltage requirement,and operating with higher than video-rate switching *** device is furthermore compatible with modern electronic display technologies and could be ideal for personal electronic devices such as flat displays,virtual reality holography and light detection and ranging,where fast,solid-state and transparent optical switches are required.
Software defect prediction is the methodical process of identifying code segments that are likely to have problems. This is done by analyzing software metrics and using categorization algorithms. This work introduces ...
详细信息
ISBN:
(数字)9798350390025
ISBN:
(纸本)9798350390032
Software defect prediction is the methodical process of identifying code segments that are likely to have problems. This is done by analyzing software metrics and using categorization algorithms. This work introduces an alternate approach that utilizes ensemble learning techniques to improve the effectiveness of fault detection models. The models utilized in this study are CodeGPT and CodeBERT, both of which are transformer-based deep learning models that can extract code features from source code. The models are trained using the PROMISE dataset, which consists of Java projects that have been labeled with defects. The test results show that using ensemble learning methods can improve the accuracy, precision, recall, and F1 score of a single model by around 1-3%. This study contributes to the progress of software dependability and quality by utilizing advanced software fault prediction algorithms.
With the continuous development of manufacturing intelligence, the focus of industrial research has gradually shifted from quantity to quality. There have been technical difficulties in the detection of surface defect...
详细信息
With the continuous development of renewable energy technologies and intelligent control systems, DC microgrids have become a popular direction for the development of future energy systems with the advantages of high ...
详细信息
Healthcare cybersecurity is crucial for protecting hospitals' networks and computing systems from malicious cyber-attacks. With the increasing motivation and capability of cyber attackers, it is necessary to secur...
详细信息
—Federated learning (FL) trains a global model across a number of decentralized users, each with a local dataset. Compared to traditional centralized learning, FL does not require direct access to local datasets and ...
ISBN:
(纸本)1891562835
—Federated learning (FL) trains a global model across a number of decentralized users, each with a local dataset. Compared to traditional centralized learning, FL does not require direct access to local datasets and thus aims to mitigate data privacy concerns. However, data privacy leakage in FL still exists due to inference attacks, including membership inference, property inference, and data inversion. In this work, we propose a new type of privacy inference attack, coined Preference Profiling A ttack (PPA), t hat accurately profiles t he p rivate p references o f a l ocal u ser, e .g., m ost liked (disliked) items from the client’s online shopping and most common expressions from the user’s selfies. I n g eneral, P PA can profile t op-k (i.e., k = 1, 2, 3 a nd k = 1 i n p articular) preferences contingent on the local client (user)’s characteristics. Our key insight is that the gradient variation of a local user’s model has a distinguishable sensitivity to the sample proportion of a given class, especially the majority (minority) class. By observing a user model’s gradient sensitivity to a class, PPA can profile the sample proportion of the class in the user’s local dataset, and thus the user’s preference of the class is exposed. The inherent statistical heterogeneity of FL further facilitates PPA. We have extensively evaluated the PPA’s effectiveness using four datasets (MNIST, CIFAR10, RAF-DB and Products-10K). Our results show that PPA achieves 90% and 98% top-1 attack accuracy to the MNIST and CIFAR10, respectively. More importantly, in real-world commercial scenarios of shopping (i.e., Products-10K) and social network (i.e., RAF-DB), PPA gains a top-1 attack accuracy of 78% in the former case to infer the most ordered items (i.e., as a commercial competitor), and 88% in the latter case to infer a victim user’s most often facial expressions, e.g., disgusted. The top-3 attack accuracy and top-2 accuracy is up to 88% and 100% for the Products-10K and RAF-DB, re
The Controller Area Network with flexible data-rate (CAN-FD) is thought to be a good replacement for the CAN. The CAN-FD has a faster transmission rate and more data capacity than the CAN. Network security is critical...
详细信息
Drag-based image editing using generative models provides precise control over image contents, enabling users to manipulate anything in an image with a few clicks. However, prevailing methods typically adopt n-step it...
Currently, scheduling plastic production is a big challenge. That is due to the emergence of complex features of small batches and more varieties. At present, two issues arise when it comes to production scheduling. T...
详细信息
暂无评论