后门数据中毒攻击是一种对抗的攻击,其中攻击者将几个水印,误标记的训练示例注入训练集中。水印不会影响典型数据模型的测试时间性能;但是,该模型在水印示例中可靠地错误。为获得对后门数据中毒攻击的更好的基础认识,我们展示了一个正式的理论框架,其中一个人可以讨论对分类问题的回溯数据中毒攻击。然后我们使用它来分析这些攻击的重要统计和计算问题。在统计方面,我们识别一个参数,我们称之为记忆能力,捕捉到后门攻击的学习问题的内在脆弱性。这使我们能够争论几个自然学习问题的鲁棒性与后门攻击。我们的结果,攻击者涉及介绍后门攻击的明确建设,我们的鲁棒性结果表明,一些自然问题设置不能产生成功的后门攻击。从计算的角度来看,我们表明,在某些假设下,对抗训练可以检测训练集中的后门的存在。然后,我们表明,在类似的假设下,我们称之为呼叫滤波和鲁棒概括的两个密切相关的问题几乎等同。这意味着它既是渐近必要的,并且足以设计算法,可以识别训练集中的水印示例,以便获得既广泛概念的学习算法,以便在室外稳健。
translated by 谷歌翻译
Edge computing is changing the face of many industries and services. Common edge computing models offload computing which is prone to security risks and privacy violation. However, advances in deep learning enabled Internet of Things (IoTs) to take decisions and run cognitive tasks locally. This research introduces a decentralized-control edge model where most computation and decisions are moved to the IoT level. The model aims at decreasing communication to the edge which in return enhances efficiency and decreases latency. The model also avoids data transfer which raises security and privacy risks. To examine the model, we developed SAFEMYRIDES, a scene-aware ridesharing monitoring system where smart phones are detecting violations at the runtime. Current real-time monitoring systems are costly and require continuous network connectivity. The system uses optimized deep learning that run locally on IoTs to detect violations in ridesharing and record violation incidences. The system would enhance safety and security in ridesharing without violating privacy.
translated by 谷歌翻译
Cognitive Computing (COC) aims to build highly cognitive machines with low computational resources that respond in real-time. However, scholarly literature shows varying research areas and various interpretations of COC. This calls for a cohesive architecture that delineates the nature of COC. We argue that if Herbert Simon considered the design science is the science of artificial, cognitive systems are the products of cognitive science or 'the newest science of the artificial'. Therefore, building a conceptual basis for COC is an essential step into prospective cognitive computing-based systems. This paper proposes an architecture of COC through analyzing the literature on COC using a myriad of statistical analysis methods. Then, we compare the statistical analysis results with previous qualitative analysis results to confirm our findings. The study also comprehensively surveys the recent research on COC to identify the state of the art and connect the advances in varied research disciplines in COC. The study found that there are three underlaying computing paradigms, Von-Neuman, Neuromorphic Engineering and Quantum Computing, that comprehensively complement the structure of cognitive computation. The research discuss possible applications and open research directions under the COC umbrella.
translated by 谷歌翻译
Explainability has been widely stated as a cornerstone of the responsible and trustworthy use of machine learning models. With the ubiquitous use of Deep Neural Network (DNN) models expanding to risk-sensitive and safety-critical domains, many methods have been proposed to explain the decisions of these models. Recent years have also seen concerted efforts that have shown how such explanations can be distorted (attacked) by minor input perturbations. While there have been many surveys that review explainability methods themselves, there has been no effort hitherto to assimilate the different methods and metrics proposed to study the robustness of explanations of DNN models. In this work, we present a comprehensive survey of methods that study, understand, attack, and defend explanations of DNN models. We also present a detailed review of different metrics used to evaluate explanation methods, as well as describe attributional attack and defense methods. We conclude with lessons and take-aways for the community towards ensuring robust explanations of DNN model predictions.
translated by 谷歌翻译
Through their transfer learning abilities, highly-parameterized large pre-trained language models have dominated the NLP landscape for a multitude of downstream language tasks. Though linguistically proficient, the inability of these models to incorporate the learning of non-linguistic entities (numerals and arithmetic reasoning) limits their usage for tasks that require numeric comprehension or strict mathematical reasoning. However, as we illustrate in this paper, building a general purpose language model that also happens to be proficient in mathematical reasoning is not as straight-forward as training it on a numeric dataset. In this work, we develop a novel framework that enables language models to be mathematically proficient while retaining their linguistic prowess. Specifically, we offer information-theoretic interventions to overcome the catastrophic forgetting of linguistic skills that occurs while injecting non-linguistic skills into language models.
translated by 谷歌翻译
引入逻辑混淆是针对集成电路(IC)的多个硬件威胁的关键防御,包括反向工程(RE)和知识产权(IP)盗窃。逻辑混淆的有效性受到最近引入的布尔满意度(SAT)攻击及其变体的挑战。还提出了大量对策,以挫败SAT袭击。不论针对SAT攻击的实施防御,大型权力,性能和领域的开销是必不可少的。相比之下,我们提出了一种认知解决方案:基于神经网络的UNSAT子句翻译器Satconda,它会造成最小的区域和开销,同时以无法穿透的安全性保留原始功能。 SATCONDA与UNSAT子句生成器一起孵育,该生成器通过最小的扰动(例如包含一对逆变器或缓冲液)转换现有的结合性正常形式(CNF),或者根据提供的CNF添加新的轻巧UNSAT块。为了有效的Unsat子句生成,Satconda配备了多层神经网络,该网络首先了解特征(文字和条款)的依赖性,然后是一个长期 - 长期内存(LSTM)网络,以验证和回溯SAT-硬度,以更好地学习和翻译。我们拟议的Satconda在ISCAS85和ISCAS89基准上进行了评估,并被认为可以防御为硬件RE设计的多个最先进的SAT攻击。此外,我们还评估了针对Minisat,Lingeling和葡萄糖SAT求解器的拟议SATCONDAS经验性能,这些溶剂构成了许多现有的Deobfuscation SAT攻击。
translated by 谷歌翻译
在这项研究中,提出了一种集成检测模型,即Swin-Transformer-Yolov5或Swin-T-Yolov5,用于实时葡萄酒葡萄束检测,以继承Yolov5和Swin-Transformer的优势。该研究是针对2019年7月至9月的两种不同的霞多丽(始终白色或白色混合浆果皮肤)和梅洛(白色或白色混合浆果皮肤)的研究。从2019年7月至9月。 -yolov5,其性能与几个常用/竞争性对象探测器进行了比较,包括更快的R-CNN,Yolov3,Yolov4和Yolov5。在不同的测试条件下评估了所有模型,包括两个不同的天气条件(阳光和多云),两个不同的浆果成熟度(不成熟和成熟)以及三个不同的阳光方向/强度(早晨,中午和下午)进行全面比较。此外,Swin-t-Yolov5的预测葡萄束数量与地面真实值进行了比较,包括在注释过程中的现场手动计数和手动标记。结果表明,拟议的SWIN-T-YOLOV5的表现优于所有其他研究的葡萄束检测模型,当天气多云时,最高平均平均精度(MAP)和0.89的F1得分的97%。该地图分别比更快的R-CNN,Yolov3,Yolov4和Yolov5大约大约44%,18%,14%和4%。当检测到未成熟的浆果时,Swin-T-Yolov5获得了最低的地图(90%)和F1分数(0.82),其中该地图大约比相同的浆果大约40%,5%,3%和1%。此外,在将预测与地面真相进行比较时,Swin-T-Yolov5在Chardonnay品种上的表现更好,最多可达到R2的0.91和2.36根均方根误差(RMSE)。但是,它在Merlot品种上的表现不佳,仅达到R2和3.30的RMSE的0.70。
translated by 谷歌翻译
空间优化问题(SOP)的特征是管理决策变量,目标和/或约束功能的空间关系。在本文中,我们关注一种称为空间分区的特定类型的SOP,这是一个组合问题,这是由于存在离散空间单元。精确的优化方法不会随着问题的大小而扩展,尤其是在可行的时间限制内。这促使我们开发基于人群的元启发式学来解决此类SOP。但是,这些基于人群的方法采用的搜索操作员主要是为实参与者连续优化问题而设计的。为了使这些方法适应SOP,我们将域知识应用于设计空间感知的搜索操作员,以在保留空间约束的同时有效地通过离散搜索空间进行有效搜索。为此,我们提出了一种简单而有效的算法,称为基于群的空间模因算法(空间),并在学校(RE)区域问题上进行测试。对现实世界数据集进行了详细的实验研究,以评估空间的性能。此外,进行消融研究以了解空间各个组成部分的作用。此外,我们讨论空间〜如何在现实生活计划过程及其对不同方案的适用性并激发未来的研究方向有帮助。
translated by 谷歌翻译
用木材制成的木材和森林产品,例如家具,是宝贵的商品,就像许多高估的自然资源的全球贸易一样,面临腐败,欺诈和非法收获的挑战。木材和森林产品部门的这些灰色和黑色市场活动不仅限于收获木材的国家,而是在整个全球供应链中扩展,并与非法金融流有关,例如基于贸易的洗钱,记录欺诈,种类标签和其他非法活动。在没有地面真理的情况下,使用贸易数据找到此类欺诈活动的任务可以作为无监督的异常检测问题进行建模。但是,现有的方法在其对大规模贸易数据的适用性方面存在某些缺点。贸易数据是异质的,具有表格格式的分类和数值属性。总体挑战在于数据的复杂性,数量和速度,具有大量实体和缺乏地面真相标签。为了减轻这些方法,我们提出了一种新型的无监督异常检测 - 基于对比度学习的异质异常检测(CHAD),通常适用于大规模的异质表格数据。我们证明,我们的模型CHAD对公共基准数据集的多个可比较基线表现出色,并且在贸易数据的情况下优于它们。更重要的是,我们证明我们的方法减少了假设和努力所需的高参数调整,这在无监督的培训范式中是一个关键的挑战。具体而言,我们的总体目标涉及使用提单贸易记录数据账单来检测可疑的木材运输和模式。在运输记录中检测异常交易可以使政府机构和供应链成分进一步调查。
translated by 谷歌翻译
在过去十年中引发了自然语言处理(NLP)研究的神经繁荣,同样导致了数据之间的大量创新(DTG)。这项调查提供了对神经DTG范式的合并视图,对方法,基准数据集和评估协议进行了结构化检查。这项调查划出了将DTG与其余自然语言产生(NLG)景观分开的边界,涵盖了文献的最新综合,并突出了更大的NLG伞内外的技术采用阶段。通过这种整体观点,我们重点介绍了DTG研究的有希望的途径,不仅关注具有语言能力的系统的设计,而且还集中在表现出公平和问责制的系统上。
translated by 谷歌翻译