Federated learning is a new type of distributed learning framework that allows multiple participants to share training results without revealing their data privacy.As data privacy becomes more important,it becomes dif...Federated learning is a new type of distributed learning framework that allows multiple participants to share training results without revealing their data privacy.As data privacy becomes more important,it becomes difficult to collect data from multiple data owners to make machine learning predictions due to the lack of data security.Data is forced to be stored independently between companies,creating“data silos”.With the goal of safeguarding data privacy and security,the federated learning framework greatly expands the amount of training data,effectively improving the shortcomings of traditional machine learning and deep learning,and bringing AI algorithms closer to our reality.In the context of the current international data security issues,federated learning is developing rapidly and has gradually moved from the theoretical to the applied level.The paper first introduces the federated learning framework,analyzes its advantages,reviews the results of federated learning applications in industries such as communication and healthcare,then analyzes the pitfalls of federated learning and discusses the security issues that should be considered in applications,and finally looks into the future of federated learning and the application layer.展开更多
As an emerging discipline,machine learning has been widely used in artificial intelligence,education,meteorology and other fields.In the training of machine learning models,trainers need to use a large amount of pract...As an emerging discipline,machine learning has been widely used in artificial intelligence,education,meteorology and other fields.In the training of machine learning models,trainers need to use a large amount of practical data,which inevitably involves user privacy.Besides,by polluting the training data,a malicious adversary can poison the model,thus compromising model security.The data provider hopes that the model trainer can prove to them the confidentiality of the model.Trainer will be required to withdraw data when the trust collapses.In the meantime,trainers hope to forget the injected data to regain security when finding crafted poisoned data after the model training.Therefore,we focus on forgetting systems,the process of which we call machine unlearning,capable of forgetting specific data entirely and efficiently.In this paper,we present the first comprehensive survey of this realm.We summarize and categorize existing machine unlearning methods based on their characteristics and analyze the relation between machine unlearning and relevant fields(e.g.,inference attacks and data poisoning attacks).Finally,we briefly conclude the existing research directions.展开更多
Software-defined network(SDN)becomes a new revolutionary paradigm in networks because it provides more control and network operation over a network infrastructure.The SDN controller is considered as the operating syst...Software-defined network(SDN)becomes a new revolutionary paradigm in networks because it provides more control and network operation over a network infrastructure.The SDN controller is considered as the operating system of the SDN based network infrastructure,and it is responsible for executing the different network applications and maintaining the network services and functionalities.Despite all its tremendous capabilities,the SDN face many security issues due to the complexity of the SDN architecture.Distributed denial of services(DDoS)is a common attack on SDN due to its centralized architecture,especially at the control layer of the SDN that has a network-wide impact.Machine learning is now widely used for fast detection of these attacks.In this paper,some important feature selection methods for machine learning on DDoS detection are evaluated.The selection of optimal features reflects the classification accuracy of the machine learning techniques and the performance of the SDN controller.A comparative analysis of feature selection and machine learning classifiers is also derived to detect SDN attacks.The experimental results show that the Random forest(RF)classifier trains the more accurate model with 99.97%accuracy using features subset by the Recursive feature elimination(RFE)method.展开更多
As the specialty of the product and the dim conscio us ness of environmental protection, the status of dirty, chaos and difference is l ong-term existed in the machine process factory. It seriously affects workers’ w...As the specialty of the product and the dim conscio us ness of environmental protection, the status of dirty, chaos and difference is l ong-term existed in the machine process factory. It seriously affects workers’ work and living environment, and restricts the total level of the environment p rotection in our country. The project is the fatal scientific research task of H enan province in 2001. As the members’ endeavor of task group, we have finished the total plan of green project system and some other key equipment to the mach ine process factory, such as the design of conveyer of chip, hydraulic former of chip, rough conveyer and dirt collector. And the green project system is made i nto model that the manufacturer can select. This item is a fire-new work. We ho pe that the expert of machine, environment protection and government official ca n put forward some advices by lodging this article. We contribute for our countr y’ environment protection and make it attain a new level.展开更多
Symmetrical components method is employed in analysis of the characteristic motor faults.Motor protection method is put forward based on detecting positive sequence,negative sequence and zero sequence current.And prob...Symmetrical components method is employed in analysis of the characteristic motor faults.Motor protection method is put forward based on detecting positive sequence,negative sequence and zero sequence current.And problems of lack of motor overload capacity in existing mining motor protection system,impact of dynamic current on stage and definite-time delay operation and inaccuracy of criterion phase failure protection are analyzed.The unbalanced faults protection and inverse-time overload protection,which can make protection time change with the current movement,are proposed.The above problems can be solved,and the reliability and intelligent of coal shearer are improved.展开更多
Because the leakage protection circuit in traction motor of coal mining machine is impacted by frequency converter devices,malfunctions appear frequently.This paper makes an in-depth analysis,proposes a solution of us...Because the leakage protection circuit in traction motor of coal mining machine is impacted by frequency converter devices,malfunctions appear frequently.This paper makes an in-depth analysis,proposes a solution of using the subtraction circuit to offset interference signals and conducts a simulation analysis.The above scheme,which is simple and easily realized,can improve the reliability of leakage protection device in traction motor.展开更多
Studies on ballistic penetration to laminates is complicated,but important for design effective protection of structures.Experimental means of study is expensive and can often be dangerous.Numerical simulation has bee...Studies on ballistic penetration to laminates is complicated,but important for design effective protection of structures.Experimental means of study is expensive and can often be dangerous.Numerical simulation has been an excellent supplement,but the computation is time-consuming.Main aim of this thesis was to develop and test an effective tool for real-time prediction of projectile penetrations to laminates by training a neural network and a decision tree regression model.A large number of finite element models were developed;the residual velocities of projectiles from finite element simulations were used as the target data and processed to produce sufficient number of training samples.Study focused on steel 4340tpolyurea laminates with various configurations.Four different 3D shapes of the projectiles were modeled and used in the training.The trained neural network and decision tree model was tested using independently generated test samples using finite element models.The predicted projectile velocity values using the trained machine learning models are then compared with the finite element simulation to verify the effectiveness of the models.Additionally,both models were trained using a published experimental data of projectile impacts to predict residual velocity of projectiles for the unseen samples.Performance of both the models was evaluated and compared.Models trained with Finite element simulation data samples were found capable to give more accurate predication,compared to the models trained with experimental data,because finite element modeling can generate much larger training set,and thus finite element solvers can serve as an excellent teacher.This study also showed that neural network model performs better with small experimental dataset compared to decision tree regression model.展开更多
基金supported by National Natural Science Foundation of China (NO.51974131)Hebei Province Natural Science Fund for Distinguished Young Scholars (NO.E2020209082).
文摘Federated learning is a new type of distributed learning framework that allows multiple participants to share training results without revealing their data privacy.As data privacy becomes more important,it becomes difficult to collect data from multiple data owners to make machine learning predictions due to the lack of data security.Data is forced to be stored independently between companies,creating“data silos”.With the goal of safeguarding data privacy and security,the federated learning framework greatly expands the amount of training data,effectively improving the shortcomings of traditional machine learning and deep learning,and bringing AI algorithms closer to our reality.In the context of the current international data security issues,federated learning is developing rapidly and has gradually moved from the theoretical to the applied level.The paper first introduces the federated learning framework,analyzes its advantages,reviews the results of federated learning applications in industries such as communication and healthcare,then analyzes the pitfalls of federated learning and discusses the security issues that should be considered in applications,and finally looks into the future of federated learning and the application layer.
基金supported by the National Key Research and Development Program of China(2020YFC2003404)the National Natura Science Foundation of China(No.62072465,62172155,62102425,62102429)+1 种基金the Science and Technology Innovation Program of Hunan Province(Nos.2022RC3061,2021RC2071)the Natural Science Foundation of Hunan Province(No.2022JJ40564).
文摘As an emerging discipline,machine learning has been widely used in artificial intelligence,education,meteorology and other fields.In the training of machine learning models,trainers need to use a large amount of practical data,which inevitably involves user privacy.Besides,by polluting the training data,a malicious adversary can poison the model,thus compromising model security.The data provider hopes that the model trainer can prove to them the confidentiality of the model.Trainer will be required to withdraw data when the trust collapses.In the meantime,trainers hope to forget the injected data to regain security when finding crafted poisoned data after the model training.Therefore,we focus on forgetting systems,the process of which we call machine unlearning,capable of forgetting specific data entirely and efficiently.In this paper,we present the first comprehensive survey of this realm.We summarize and categorize existing machine unlearning methods based on their characteristics and analyze the relation between machine unlearning and relevant fields(e.g.,inference attacks and data poisoning attacks).Finally,we briefly conclude the existing research directions.
文摘Software-defined network(SDN)becomes a new revolutionary paradigm in networks because it provides more control and network operation over a network infrastructure.The SDN controller is considered as the operating system of the SDN based network infrastructure,and it is responsible for executing the different network applications and maintaining the network services and functionalities.Despite all its tremendous capabilities,the SDN face many security issues due to the complexity of the SDN architecture.Distributed denial of services(DDoS)is a common attack on SDN due to its centralized architecture,especially at the control layer of the SDN that has a network-wide impact.Machine learning is now widely used for fast detection of these attacks.In this paper,some important feature selection methods for machine learning on DDoS detection are evaluated.The selection of optimal features reflects the classification accuracy of the machine learning techniques and the performance of the SDN controller.A comparative analysis of feature selection and machine learning classifiers is also derived to detect SDN attacks.The experimental results show that the Random forest(RF)classifier trains the more accurate model with 99.97%accuracy using features subset by the Recursive feature elimination(RFE)method.
文摘As the specialty of the product and the dim conscio us ness of environmental protection, the status of dirty, chaos and difference is l ong-term existed in the machine process factory. It seriously affects workers’ work and living environment, and restricts the total level of the environment p rotection in our country. The project is the fatal scientific research task of H enan province in 2001. As the members’ endeavor of task group, we have finished the total plan of green project system and some other key equipment to the mach ine process factory, such as the design of conveyer of chip, hydraulic former of chip, rough conveyer and dirt collector. And the green project system is made i nto model that the manufacturer can select. This item is a fire-new work. We ho pe that the expert of machine, environment protection and government official ca n put forward some advices by lodging this article. We contribute for our countr y’ environment protection and make it attain a new level.
文摘Symmetrical components method is employed in analysis of the characteristic motor faults.Motor protection method is put forward based on detecting positive sequence,negative sequence and zero sequence current.And problems of lack of motor overload capacity in existing mining motor protection system,impact of dynamic current on stage and definite-time delay operation and inaccuracy of criterion phase failure protection are analyzed.The unbalanced faults protection and inverse-time overload protection,which can make protection time change with the current movement,are proposed.The above problems can be solved,and the reliability and intelligent of coal shearer are improved.
文摘Because the leakage protection circuit in traction motor of coal mining machine is impacted by frequency converter devices,malfunctions appear frequently.This paper makes an in-depth analysis,proposes a solution of using the subtraction circuit to offset interference signals and conducts a simulation analysis.The above scheme,which is simple and easily realized,can improve the reliability of leakage protection device in traction motor.
文摘Studies on ballistic penetration to laminates is complicated,but important for design effective protection of structures.Experimental means of study is expensive and can often be dangerous.Numerical simulation has been an excellent supplement,but the computation is time-consuming.Main aim of this thesis was to develop and test an effective tool for real-time prediction of projectile penetrations to laminates by training a neural network and a decision tree regression model.A large number of finite element models were developed;the residual velocities of projectiles from finite element simulations were used as the target data and processed to produce sufficient number of training samples.Study focused on steel 4340tpolyurea laminates with various configurations.Four different 3D shapes of the projectiles were modeled and used in the training.The trained neural network and decision tree model was tested using independently generated test samples using finite element models.The predicted projectile velocity values using the trained machine learning models are then compared with the finite element simulation to verify the effectiveness of the models.Additionally,both models were trained using a published experimental data of projectile impacts to predict residual velocity of projectiles for the unseen samples.Performance of both the models was evaluated and compared.Models trained with Finite element simulation data samples were found capable to give more accurate predication,compared to the models trained with experimental data,because finite element modeling can generate much larger training set,and thus finite element solvers can serve as an excellent teacher.This study also showed that neural network model performs better with small experimental dataset compared to decision tree regression model.