Adversarial distillation(AD)has emerged as a potential solution to tackle the challenging optimization problem of loss with hard labels in adversarial training.However,fixed sample-agnostic and student-egocentric atta...Adversarial distillation(AD)has emerged as a potential solution to tackle the challenging optimization problem of loss with hard labels in adversarial training.However,fixed sample-agnostic and student-egocentric attack strategies are unsuitable for distillation.Additionally,the reliability of guidance from static teachers diminishes as target models become more robust.This paper proposes an AD method called Learnable Distillation Attack Strategies and Evolvable Teachers Adversarial Distillation(LDAS&ET-AD).Firstly,a learnable distillation attack strategies generating mechanism is developed to automatically generate sample-dependent attack strategies tailored for distillation.A strategy model is introduced to produce attack strategies that enable adversarial examples(AEs)to be created in areas where the target model significantly diverges from the teachers by competing with the target model in minimizing or maximizing the AD loss.Secondly,a teacher evolution strategy is introduced to enhance the reliability and effectiveness of knowledge in improving the generalization performance of the target model.By calculating the experimentally updated target model’s validation performance on both clean samples and AEs,the impact of distillation from each training sample and AE on the target model’s generalization and robustness abilities is assessed to serve as feedback to fine-tune standard and robust teachers accordingly.Experiments evaluate the performance of LDAS&ET-AD against different adversarial attacks on the CIFAR-10 and CIFAR-100 datasets.The experimental results demonstrate that the proposed method achieves a robust precision of 45.39%and 42.63%against AutoAttack(AA)on the CIFAR-10 dataset for ResNet-18 and MobileNet-V2,respectively,marking an improvement of 2.31%and 3.49%over the baseline method.In comparison to state-of-the-art adversarial defense techniques,our method surpasses Introspective Adversarial Distillation,the top-performing method in terms of robustness under AA attack for the CIFAR-10 dataset,with enhancements of 1.40%and 1.43%for ResNet-18 and MobileNet-V2,respectively.These findings demonstrate the effectiveness of our proposed method in enhancing the robustness of deep learning networks(DNNs)against prevalent adversarial attacks when compared to other competing methods.In conclusion,LDAS&ET-AD provides reliable and informative soft labels to one of the most promising defense methods,AT,alleviating the limitations of untrusted teachers and unsuitable AEs in existing AD techniques.We hope this paper promotes the development of DNNs in real-world trust-sensitive fields and helps ensure a more secure and dependable future for artificial intelligence systems.展开更多
This study aimed to explore the influence of pyrazinamide (PZA) monoresistance on the treatment outcome of otherwise drug susceptible tuberculosis (TB). A cohort of 194 TB patients that were infected with strains susc...This study aimed to explore the influence of pyrazinamide (PZA) monoresistance on the treatment outcome of otherwise drug susceptible tuberculosis (TB). A cohort of 194 TB patients that were infected with strains susceptible to isoniazid (INH), rifampin (RIF) and ethambutol (EMB) were included in a retrospective study at the Guangzhou Chest Hospital. We reported 148 (76.3%) PZA- susceptible TB cases and 46 (23.7%) PZA-monoresistance TB cases identified by the BACTEC MGIT 960 system. All patients were treated with the standard 6 months WHO recommended regimen, which included 2 months of INH + RIF + EMB + PZA in the intensive-phase, and the subsequent 4 months of INH + RIF during continuation-phase. Bacterial burden in the lungs was estimated using sputum smear acid-fast bacillary count while the lung lesions and cavitations were examined by X-ray at the end of first 2 months of chemotherapy. After intensive-phase treatment, there were 164 (84.5%) cases of smear-negative conversion and 151 (77.9%) cases of total or partial lesion elimination. The rates of smear-negative conversion (78.3%) and lesion elimination (39.1%) of the PZA-monoresistant patients were similar with the PZA-sensitive group (P > 0.05). However, lung cavitation was more likely to be resolved in PZA-sensitive patients than in the PZA-patients (X2 = 9.623, P = 0.002). The smear-negative conversion rates were 95.9% for the PZA-sensitive patients and 87.0% for the PZA-monoresistant patients after 6 months of treatment (X2 = 3.461, P = 0.063). Together, our data suggest that PZA-monoresistance contributes to the delay of resolution of the lung cavitations in the Southern China population without affecting the sputum conversion and lesion elimination rates.展开更多
Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immedi...Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immediate deployment due to their requirement for modification of virtualization structure, we adopt dynamic migration, an inherent mechanism of the cloud platform, as a general defense against this kind of threats. To this end, we first set up a unified practical information leakage model which shows the factors affecting side channels and describes the way they influence the damage due to side-channel attacks. Since migration is adopted to limit the time duration of co-residency, we envision this defense as an optimization problem by setting up an Integer Linear Programming(ILP) to calculate optimal migration strategy, which is intractable due to high computational complexity. Therefore, we approximate the ILP with a baseline genetic algorithm, which is further improved for its optimality and scalability. Experimental results show that our migration-based defense can not only provide excellent security guarantees and affordable performance cost in both theoretical simulation and practical cloud environment, but also achieve better optimality and scalability than previous countermeasures.展开更多
Precise localization techniques for indoor Wi-Fi access points(APs)have important application in the security inspection.However,due to the interference of environment factors such as multipath propagation and NLOS(No...Precise localization techniques for indoor Wi-Fi access points(APs)have important application in the security inspection.However,due to the interference of environment factors such as multipath propagation and NLOS(Non-Line-of-Sight),the existing methods for localization indoor Wi-Fi access points based on RSS ranging tend to have lower accuracy as the RSS(Received Signal Strength)is difficult to accurately measure.Therefore,the localization algorithm of indoor Wi-Fi access points based on the signal strength relative relationship and region division is proposed in this paper.The algorithm hierarchically divide the room where the target Wi-Fi AP is located,on the region division line,a modified signal collection device is used to measure RSS in two directions of each reference point.All RSS values are compared and the region where the RSS value has the relative largest signal strength is located as next candidate region.The location coordinate of the target Wi-Fi AP is obtained when the localization region of the target Wi-Fi AP is successively approximated until the candidate region is smaller than the accuracy threshold.There are 360 experiments carried out in this paper with 8 types of Wi-Fi APs including fixed APs and portable APs.The experimental results show that the average localization error of the proposed localization algorithm is 0.30 meters,and the minimum localization error is 0.16 meters,which is significantly higher than the localization accuracy of the existing typical indoor Wi-Fi access point localization methods.展开更多
Quantitative evaluations are of great importance in network security decision-making.In recent years,moving target defense(MTD)has appeared to be a promising defense approach that blocks asymmetrical advantage of atta...Quantitative evaluations are of great importance in network security decision-making.In recent years,moving target defense(MTD)has appeared to be a promising defense approach that blocks asymmetrical advantage of attackers and favors the defender-notwithstanding,it has a limited deployment due to its uncertain efficiency and effectiveness in defense.In that case,quantitative metrics and evaluations of MTD are essential to prove its capability and impulse its further research.This article presents a comprehensive survey on state-of-the-art quantitative evaluations.First,taxonomy of MTD techniques is stated according to the software stack model.Then,a concrete review and comparison on existing quantitative evaluations of MTD is presented.Finally,notice-worthy open issues regarding this topic are proposed along with the conclusions of previous studies.展开更多
Background: Different visual acuity chart can be targeted to evaluate the visual function of patients with different eye diseases. We conducted a comparative analysis of the digital logarithm of the minimum angle of r...Background: Different visual acuity chart can be targeted to evaluate the visual function of patients with different eye diseases. We conducted a comparative analysis of the digital logarithm of the minimum angle of resolution(Log MAR) vision chart and the standard logarithmic vision chart for the measurement of visual acuity after retinal detachment surgery.Methods: We used the digital Log MAR vision chart and the standard logarithmic vision chart to measure the visual acuity of 100 patients(100 eyes) who underwent retinal detachment surgery at our hospital using the Log MAR recording method and compared the dif erences between the mean measurements obtained by both methods for all patients and for different age groups.Results: When all of the patients were analyzed, the mean visual acuity dif ered between the digital Log MAR vision chart and the standard logarithmic vision chart by –0.07 Log MAR units. No signii cant difference was observed in the mean visual acuity between the two vision charts in the 10-20 year and 21-40 year age groups(P>0.05), while a signii cant difference was observed in post-operative mean visual acuity between the two vision charts for patients aged 41-65 years(P<0.05).Conclusions: Both the digital Log MAR vision chart and the standard vision chart were effective and reliable for the measurement of visual acuity. The visual acuity measured by the standard vision chart was higher than that measured by the digital Log MAR vision chart. We recommend using the digital Log MAR vision chart as the preferred chart for measuring visual acuity after retinal detachment surgery.展开更多
As more and more large-scale scientific workflows are delivered to clouds,the business model of workflow-as-a-service is emerging.But there are many kinds of threats in the cloud environment,which can interrupt the ta...As more and more large-scale scientific workflows are delivered to clouds,the business model of workflow-as-a-service is emerging.But there are many kinds of threats in the cloud environment,which can interrupt the task execution and extend the workflow completion time.As an important QoS parameter,the workflow completion time is determined by the critical task path.Therefore,critical path redundancy method is proposed to create a redundant path having the interact parallel relationship with the critical path,which can provide the protection for the tasks in the critical path and reduce the probability of the critical path interruption.Computing instance allocation is an essential part of the cloud workflow execution,since only the tasks assigned the instance can begin execution.In order to further reduce the workflow completion time,computing instance allocation algorithm based on HEFT(heterogeneous earliest finish time)is proposed.The algorithm considers diverse task dependency relationships and takes full advantages of the critical path redundancy method,which can improve the efficiency of workflow execution.Experimental results demonstrate that the proposed method can effectively reduce the cloud workflow completion time under the task interruption.展开更多
In recent years,the incidence of myopia has increased at an alarming rate among children and adolescents in China.The exploration of an effective prevention and control method for myopia is in urgent need.With the dev...In recent years,the incidence of myopia has increased at an alarming rate among children and adolescents in China.The exploration of an effective prevention and control method for myopia is in urgent need.With the development of information technology in the past decade,artificial intelligence with the Internet of Things technology(AIoT)is characterized by strong computing power,advanced algorithm,continuous monitoring,and accurate prediction of long-term progression.Therefore,big data and artificial intelligence technology have the potential to be applied to data mining of myopia etiology and prediction of myopia occurrence and development.More recently,there has been a growing recognition that myopia study involving AIoT needs to undergo a rigorous evaluation to demonstrate robust results.展开更多
基金the National Key Research and Development Program of China(2021YFB1006200)Major Science and Technology Project of Henan Province in China(221100211200).Grant was received by S.Li.
文摘Adversarial distillation(AD)has emerged as a potential solution to tackle the challenging optimization problem of loss with hard labels in adversarial training.However,fixed sample-agnostic and student-egocentric attack strategies are unsuitable for distillation.Additionally,the reliability of guidance from static teachers diminishes as target models become more robust.This paper proposes an AD method called Learnable Distillation Attack Strategies and Evolvable Teachers Adversarial Distillation(LDAS&ET-AD).Firstly,a learnable distillation attack strategies generating mechanism is developed to automatically generate sample-dependent attack strategies tailored for distillation.A strategy model is introduced to produce attack strategies that enable adversarial examples(AEs)to be created in areas where the target model significantly diverges from the teachers by competing with the target model in minimizing or maximizing the AD loss.Secondly,a teacher evolution strategy is introduced to enhance the reliability and effectiveness of knowledge in improving the generalization performance of the target model.By calculating the experimentally updated target model’s validation performance on both clean samples and AEs,the impact of distillation from each training sample and AE on the target model’s generalization and robustness abilities is assessed to serve as feedback to fine-tune standard and robust teachers accordingly.Experiments evaluate the performance of LDAS&ET-AD against different adversarial attacks on the CIFAR-10 and CIFAR-100 datasets.The experimental results demonstrate that the proposed method achieves a robust precision of 45.39%and 42.63%against AutoAttack(AA)on the CIFAR-10 dataset for ResNet-18 and MobileNet-V2,respectively,marking an improvement of 2.31%and 3.49%over the baseline method.In comparison to state-of-the-art adversarial defense techniques,our method surpasses Introspective Adversarial Distillation,the top-performing method in terms of robustness under AA attack for the CIFAR-10 dataset,with enhancements of 1.40%and 1.43%for ResNet-18 and MobileNet-V2,respectively.These findings demonstrate the effectiveness of our proposed method in enhancing the robustness of deep learning networks(DNNs)against prevalent adversarial attacks when compared to other competing methods.In conclusion,LDAS&ET-AD provides reliable and informative soft labels to one of the most promising defense methods,AT,alleviating the limitations of untrusted teachers and unsuitable AEs in existing AD techniques.We hope this paper promotes the development of DNNs in real-world trust-sensitive fields and helps ensure a more secure and dependable future for artificial intelligence systems.
文摘This study aimed to explore the influence of pyrazinamide (PZA) monoresistance on the treatment outcome of otherwise drug susceptible tuberculosis (TB). A cohort of 194 TB patients that were infected with strains susceptible to isoniazid (INH), rifampin (RIF) and ethambutol (EMB) were included in a retrospective study at the Guangzhou Chest Hospital. We reported 148 (76.3%) PZA- susceptible TB cases and 46 (23.7%) PZA-monoresistance TB cases identified by the BACTEC MGIT 960 system. All patients were treated with the standard 6 months WHO recommended regimen, which included 2 months of INH + RIF + EMB + PZA in the intensive-phase, and the subsequent 4 months of INH + RIF during continuation-phase. Bacterial burden in the lungs was estimated using sputum smear acid-fast bacillary count while the lung lesions and cavitations were examined by X-ray at the end of first 2 months of chemotherapy. After intensive-phase treatment, there were 164 (84.5%) cases of smear-negative conversion and 151 (77.9%) cases of total or partial lesion elimination. The rates of smear-negative conversion (78.3%) and lesion elimination (39.1%) of the PZA-monoresistant patients were similar with the PZA-sensitive group (P > 0.05). However, lung cavitation was more likely to be resolved in PZA-sensitive patients than in the PZA-patients (X2 = 9.623, P = 0.002). The smear-negative conversion rates were 95.9% for the PZA-sensitive patients and 87.0% for the PZA-monoresistant patients after 6 months of treatment (X2 = 3.461, P = 0.063). Together, our data suggest that PZA-monoresistance contributes to the delay of resolution of the lung cavitations in the Southern China population without affecting the sputum conversion and lesion elimination rates.
基金supported by the National Key Research and Development Program of China (2018YFB0804004)the Foundation of the National Natural Science Foundation of China (61602509)+1 种基金the Foundation for Innovative Research Groups of the National Natural Science Foundation of China (61521003)the Key Technologies Research and Development Program of Henan Province of China (172102210615)
文摘Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immediate deployment due to their requirement for modification of virtualization structure, we adopt dynamic migration, an inherent mechanism of the cloud platform, as a general defense against this kind of threats. To this end, we first set up a unified practical information leakage model which shows the factors affecting side channels and describes the way they influence the damage due to side-channel attacks. Since migration is adopted to limit the time duration of co-residency, we envision this defense as an optimization problem by setting up an Integer Linear Programming(ILP) to calculate optimal migration strategy, which is intractable due to high computational complexity. Therefore, we approximate the ILP with a baseline genetic algorithm, which is further improved for its optimality and scalability. Experimental results show that our migration-based defense can not only provide excellent security guarantees and affordable performance cost in both theoretical simulation and practical cloud environment, but also achieve better optimality and scalability than previous countermeasures.
基金The work presented in this paper is supported by the National Key R&D Program of China(No.2016YFB0801303,2016QY01W0105)the National Natural Science Foundation of China(No.U1636219,61602508,61772549,U1736214,61572052)+1 种基金Plan for Scientific Innovation Talent of Henan Province(No.2018JR0018)the Key Technologies R&D Program of Henan Province(No.162102210032).
文摘Precise localization techniques for indoor Wi-Fi access points(APs)have important application in the security inspection.However,due to the interference of environment factors such as multipath propagation and NLOS(Non-Line-of-Sight),the existing methods for localization indoor Wi-Fi access points based on RSS ranging tend to have lower accuracy as the RSS(Received Signal Strength)is difficult to accurately measure.Therefore,the localization algorithm of indoor Wi-Fi access points based on the signal strength relative relationship and region division is proposed in this paper.The algorithm hierarchically divide the room where the target Wi-Fi AP is located,on the region division line,a modified signal collection device is used to measure RSS in two directions of each reference point.All RSS values are compared and the region where the RSS value has the relative largest signal strength is located as next candidate region.The location coordinate of the target Wi-Fi AP is obtained when the localization region of the target Wi-Fi AP is successively approximated until the candidate region is smaller than the accuracy threshold.There are 360 experiments carried out in this paper with 8 types of Wi-Fi APs including fixed APs and portable APs.The experimental results show that the average localization error of the proposed localization algorithm is 0.30 meters,and the minimum localization error is 0.16 meters,which is significantly higher than the localization accuracy of the existing typical indoor Wi-Fi access point localization methods.
基金The National Natural Science Foundation of China(No.61521003)The National Key R&D Program of China(No.2016YFB0800100,No.2016YFB0800101)+1 种基金The National Natural Science Foundation of China(No.61602509)The Key Technologies Research and Development Program of Henan Province(172102210615)
文摘Quantitative evaluations are of great importance in network security decision-making.In recent years,moving target defense(MTD)has appeared to be a promising defense approach that blocks asymmetrical advantage of attackers and favors the defender-notwithstanding,it has a limited deployment due to its uncertain efficiency and effectiveness in defense.In that case,quantitative metrics and evaluations of MTD are essential to prove its capability and impulse its further research.This article presents a comprehensive survey on state-of-the-art quantitative evaluations.First,taxonomy of MTD techniques is stated according to the software stack model.Then,a concrete review and comparison on existing quantitative evaluations of MTD is presented.Finally,notice-worthy open issues regarding this topic are proposed along with the conclusions of previous studies.
文摘Background: Different visual acuity chart can be targeted to evaluate the visual function of patients with different eye diseases. We conducted a comparative analysis of the digital logarithm of the minimum angle of resolution(Log MAR) vision chart and the standard logarithmic vision chart for the measurement of visual acuity after retinal detachment surgery.Methods: We used the digital Log MAR vision chart and the standard logarithmic vision chart to measure the visual acuity of 100 patients(100 eyes) who underwent retinal detachment surgery at our hospital using the Log MAR recording method and compared the dif erences between the mean measurements obtained by both methods for all patients and for different age groups.Results: When all of the patients were analyzed, the mean visual acuity dif ered between the digital Log MAR vision chart and the standard logarithmic vision chart by –0.07 Log MAR units. No signii cant difference was observed in the mean visual acuity between the two vision charts in the 10-20 year and 21-40 year age groups(P>0.05), while a signii cant difference was observed in post-operative mean visual acuity between the two vision charts for patients aged 41-65 years(P<0.05).Conclusions: Both the digital Log MAR vision chart and the standard vision chart were effective and reliable for the measurement of visual acuity. The visual acuity measured by the standard vision chart was higher than that measured by the digital Log MAR vision chart. We recommend using the digital Log MAR vision chart as the preferred chart for measuring visual acuity after retinal detachment surgery.
基金The National Key R&D Program of China(2018YFB0804004)The Foundation for Innovative Research Groups of the National Natural Science Foundation of China(61521003)。
文摘As more and more large-scale scientific workflows are delivered to clouds,the business model of workflow-as-a-service is emerging.But there are many kinds of threats in the cloud environment,which can interrupt the task execution and extend the workflow completion time.As an important QoS parameter,the workflow completion time is determined by the critical task path.Therefore,critical path redundancy method is proposed to create a redundant path having the interact parallel relationship with the critical path,which can provide the protection for the tasks in the critical path and reduce the probability of the critical path interruption.Computing instance allocation is an essential part of the cloud workflow execution,since only the tasks assigned the instance can begin execution.In order to further reduce the workflow completion time,computing instance allocation algorithm based on HEFT(heterogeneous earliest finish time)is proposed.The algorithm considers diverse task dependency relationships and takes full advantages of the critical path redundancy method,which can improve the efficiency of workflow execution.Experimental results demonstrate that the proposed method can effectively reduce the cloud workflow completion time under the task interruption.
基金The Science and Technology Planning Projects of Guangdong Province(Grant No.2018B010109008)National Key R&D Program of China(Grant No.2018YFC0116500).
文摘In recent years,the incidence of myopia has increased at an alarming rate among children and adolescents in China.The exploration of an effective prevention and control method for myopia is in urgent need.With the development of information technology in the past decade,artificial intelligence with the Internet of Things technology(AIoT)is characterized by strong computing power,advanced algorithm,continuous monitoring,and accurate prediction of long-term progression.Therefore,big data and artificial intelligence technology have the potential to be applied to data mining of myopia etiology and prediction of myopia occurrence and development.More recently,there has been a growing recognition that myopia study involving AIoT needs to undergo a rigorous evaluation to demonstrate robust results.