In environments lacking infrastructure, such as the battlefield, a diverse array of intelligent devices continues to evolve. These devices face challenges in flexibly addressing resource allocation and information tra...
详细信息
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data *** speaking,EHRs are widely used in blockchain-based medical data *** are valuable private assets of patients,and th...
详细信息
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data *** speaking,EHRs are widely used in blockchain-based medical data *** are valuable private assets of patients,and the ownership belongs to *** recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals,it does not address the challenge of record sharing when patients revisit *** order to solve this problem,this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate *** paper uses cross-chain technology to connect the Medical Certificate Blockchain and the Hospital Blockchain to real-ize the recovery of deleted *** the same time,this paper uses the Medical Certificate Blockchain and the InterPlanetary File System(IPFS)to store Personal Health Records,which are generated by patients visiting different medical *** addition,this paper also combines digital watermarking technology to ensure the authenticity of the restored electronic medical *** the combined effect of blockchain technology and digital watermarking,our proposal will not be affected by any other rights throughout the *** analysis and security analysis illustrate the completeness and feasibility of the scheme.
Vertical Federated Learning (VFL) is an emerging paradigm that enables collaborators to build machine learning models together in a distributed fashion. However, the security of the VFL model remains underexplored, pa...
详细信息
Vertical Federated Learning (VFL) is an emerging paradigm that enables collaborators to build machine learning models together in a distributed fashion. However, the security of the VFL model remains underexplored, particularly regarding the Byzantine Generals Problem (BGP), which is a well-known issue in distributed systems. This paper focuses on revealing the threat of BGP in VFL systems. Specifically, we propose two attacks, the replay attack and the generation attack, to evaluate the vulnerability of VFL when there is only one malicious party. The goal of the adversary is to hijack the VFL model to give desired predictions. Moreover, considering the uneven distribution of importance among parties, we combine data poisoning with the aforementioned attacks to explore whether they can bypass the situation where the adversary has few features. The evaluation results demonstrate the effectiveness of our attacks. For instance, the adversary holding only 10 90 capability is limited and usually at the cost of performance loss of the VFL task. Our work highlights the need for advanced defenses to protect the prediction results of a VFL model and calls for more exploration of VFL's security issues. IEEE
Concept drift refers to the probability distribution of data generation changes over time in a data stream environment. In recent years, there has been an increasing interest in drift detection models. However, due to...
As a broadly applied technique in numerous optimization problems, recently, local search has been employed to solve Pseudo-Boolean Optimization (PBO) problem. A representative local search solver for PBO is LS-PBO. In...
详细信息
Online testing is critical to ensuring reliable operations of the next generation of supercomputers based on a kilo-core network-on-chip(NoC)interconnection *** present a parallel software-based self-testing(SBST)solu...
详细信息
Online testing is critical to ensuring reliable operations of the next generation of supercomputers based on a kilo-core network-on-chip(NoC)interconnection *** present a parallel software-based self-testing(SBST)solution that makes use of the bounded model checking(BMC)technique to generate test sequences and parallel *** this method,the parallel SBST with BMC derives the leading sequence for each router’s internal function and detects all functionally-testable faults related to the function.A Monte-Carlo simulation algorithm is then used to search for the approximately optimum configuration of the parallel packets,which guarantees the test quality and minimizes the test ***,a multi-threading technology is used to ensure that the Monte-Carlo simulation can reach the approximately optimum configuration in a large random space and reduce the generating time of the parallel *** results show that the proposed method achieves a high fault coverage with a reduced test ***,by performing online testing in the functional mode with SBST,it effectively avoids the over-testing problem caused by functionally untestable turns in kilo-core NoCs.
Factors have always played an important role in stock analysis, but they are only effective for specific problems in specific scenarios. Therefore, constructing factors timely and quickly for different scenarios is an...
详细信息
The article discusses the research on automated essay scoring based on data augmentation, focusing on the use of data augmentation methods to improve the performance of automated essay scoring systems. In previous stu...
详细信息
As digital transformation continues, enterprises are generating, managing, and storing vast amounts of data, while artificial intelligence technology is rapidly advancing. However, it brings challenges in information ...
详细信息
The conventional Levenberg-Marquardt (LM) algorithm is a state-of-the-art trust-region optimization method for solving bundle adjustment problems in the Structure-from-Motion community, which not only takes advantage ...
详细信息
暂无评论