The proliferation of Large Language Models (LLMs) across various sectors underscored the urgency of addressing potential privacy breaches. Vulnerabilities, such as prompt injection attacks and other adversarial tactic...The proliferation of Large Language Models (LLMs) across various sectors underscored the urgency of addressing potential privacy breaches. Vulnerabilities, such as prompt injection attacks and other adversarial tactics, could make these models inadvertently disclose their training data. Such disclosures could compromise personal identifiable information, posing significant privacy risks. In this paper, we proposed a novel multi-faceted approach called Whispered Tuning to address privacy leaks in large language models (LLMs). We integrated a PII redaction model, differential privacy techniques, and an output filter into the LLM fine-tuning process to enhance confidentiality. Additionally, we introduced novel ideas like the Epsilon Dial for adjustable privacy budgeting for differentiated Training Phases per data handler role. Through empirical validation, including attacks on non-private models, we demonstrated the robustness of our proposed solution SecureNLP in safeguarding privacy without compromising utility. This pioneering methodology significantly fortified LLMs against privacy infringements, enabling responsible adoption across sectors.展开更多
In this paper we study the higher-order differential variational principle and differential equations of motion for mechanical systems in event space. Based on the higher-order d'Alembert principle of the system, the...In this paper we study the higher-order differential variational principle and differential equations of motion for mechanical systems in event space. Based on the higher-order d'Alembert principle of the system, the higher-order velocity energy and the higher-order acceleration energy of the system in event space are defined, the higher-order d'Alembert- Lagrange principle of the system in event space is established, and the parametric forms of Euler-Lagrange, Nielsen and Appell for this principle are given. Finally, the higher-order differential equations of motion for holonomic systems in event space are obtained.展开更多
This paper presents a method for differen- tial collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has...This paper presents a method for differen- tial collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has a precomputation phase, but it can be obtained before attack and computed once for all. This attack on the reduced to 4-round FOX64 requires only 7 chosen plaintexts, and performs 242.8 4-round FOX64 encryptions. It could be extended to 5 (6, 7)-round FOX64 by a key exhaustive search behind the fourth round.展开更多
The purpose of this paper is to add some complements to the general theory of higher-order types of asymptotic variation developed in two previous papers so as to complete our elementary (but not too much!) theory in ...The purpose of this paper is to add some complements to the general theory of higher-order types of asymptotic variation developed in two previous papers so as to complete our elementary (but not too much!) theory in view of applications to the theory of finite asymptotic expansions in the real domain, the asymptotic study of ordinary differential equations and the like. The main results concern: 1) a detailed study of the types of asymptotic variation of an infinite series so extending the results known for the sole power series;2) the type of asymptotic variation of a Wronskian completing the many already-published results on the asymptotic behaviors of Wronskians;3) a comparison between the two main standard approaches to the concept of “type of asymptotic variation”: via an asymptotic differential equation or an asymptotic functional equation;4) a discussion about the simple concept of logarithmic variation making explicit and completing the results which, in the literature, are hidden in a quite-complicated general theory.展开更多
This case report investigates the manifestation of cerebral amyloid angiopathy (CAA) through recurrent Transient Ischemic Attacks (TIAs) in an 82-year-old patient. Despite initial diagnostic complexities, cerebral ang...This case report investigates the manifestation of cerebral amyloid angiopathy (CAA) through recurrent Transient Ischemic Attacks (TIAs) in an 82-year-old patient. Despite initial diagnostic complexities, cerebral angiography-MRI revealed features indicative of CAA. Symptomatic treatment resulted in improvement, but the patient later developed a fatal hematoma. The discussion navigates the intricate therapeutic landscape of repetitive TIAs in the elderly with cardiovascular risk factors, emphasizing the pivotal role of cerebral MRI and meticulous bleeding risk management. The conclusion stresses the importance of incorporating SWI sequences, specifically when suspecting a cardioembolic TIA, as a diagnostic measure to explore and exclude CAA in the differential diagnosis. This case report provides valuable insights into these challenges, highlighting the need to consider CAA in relevant cases.展开更多
Network attack detection and mitigation require packet collection,pre-processing,feature analysis,classification,and post-processing.Models for these tasks sometimes become complex or inefficient when applied to real-...Network attack detection and mitigation require packet collection,pre-processing,feature analysis,classification,and post-processing.Models for these tasks sometimes become complex or inefficient when applied to real-time data samples.To mitigate hybrid assaults,this study designs an efficient forensic layer employing deep learning pattern analysis and multidomain feature extraction.In this paper,we provide a novel multidomain feature extraction method using Fourier,Z,Laplace,Discrete Cosine Transform(DCT),1D Haar Wavelet,Gabor,and Convolutional Operations.Evolutionary method dragon fly optimisation reduces feature dimensionality and improves feature selection accuracy.The selected features are fed into VGGNet and GoogLeNet models using binary cascaded neural networks to analyse network traffic patterns,detect anomalies,and warn network administrators.The suggested model tackles the inadequacies of existing approaches to hybrid threats,which are growing more common and challenge conventional security measures.Our model integrates multidomain feature extraction,deep learning pattern analysis,and the forensic layer to improve intrusion detection and prevention systems.In diverse attack scenarios,our technique has 3.5% higher accuracy,4.3% higher precision,8.5% higher recall,and 2.9% lower delay than previous models.展开更多
A typical adaptive neural control methodology is used for the rigid body model of the hypersonic vehicle. The rigid body model is divided into the altitude subsystem and the velocity subsystem. The proportional integr...A typical adaptive neural control methodology is used for the rigid body model of the hypersonic vehicle. The rigid body model is divided into the altitude subsystem and the velocity subsystem. The proportional integral differential(PID) controller is introduced to control the velocity track. The backstepping design is applied for constructing the controllers for the altitude subsystem.To avoid the explosion of differentiation from backstepping, the higher-order filter dynamic is used for replacing the virtual controller in the backstepping design steps. In the design procedure,the radial basis function(RBF) neural network is investigated to approximate the unknown nonlinear functions in the system dynamic of the hypersonic vehicle. The simulations show the effectiveness of the design method.展开更多
A differential quadrature (DQ) method for orthotropic plates was proposed based on Reddy' s theory of plates with the effects of the higher-order transverse shear deformations. Wang-Bert's DQ approach was also...A differential quadrature (DQ) method for orthotropic plates was proposed based on Reddy' s theory of plates with the effects of the higher-order transverse shear deformations. Wang-Bert's DQ approach was also further extended to handle the boundary conditions of plates. The computational convergence was studied, and the numerical results were obtained for different grid spacings and compared with the existing results. The results show that the DQ method is fairly reliable and effective.展开更多
In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly prominent.The research on the privacy protectio...In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly prominent.The research on the privacy protection of the IoV has become the focus of the society.This paper analyzes the advantages and disadvantages of the existing location privacy protection system structure and algorithms,proposes a privacy protection system structure based on untrusted data collection server,and designs a vehicle location acquisition algorithm based on a local differential privacy and game model.The algorithm first meshes the road network space.Then,the dynamic game model is introduced into the game user location privacy protection model and the attacker location semantic inference model,thereby minimizing the possibility of exposing the regional semantic privacy of the k-location set while maximizing the availability of the service.On this basis,a statistical method is designed,which satisfies the local differential privacy of k-location sets and obtains unbiased estimation of traffic density in different regions.Finally,this paper verifies the algorithm based on the data set of mobile vehicles in Shanghai.The experimental results show that the algorithm can guarantee the user’s location privacy and location semantic privacy while satisfying the service quality requirements,and provide better privacy protection and service for the users of the IoV.展开更多
This study was suggested by previous work on the simulation of evolution equations with scale-dependent processes,e.g.,wave-propagation or heat-transfer,that are modeled by wave equations or heat equations.Here,we stu...This study was suggested by previous work on the simulation of evolution equations with scale-dependent processes,e.g.,wave-propagation or heat-transfer,that are modeled by wave equations or heat equations.Here,we study both parabolic and hyperbolic equations.We focus on ADI (alternating direction implicit) methods and LOD (locally one-dimensional) methods,which are standard splitting methods of lower order,e.g.second-order.Our aim is to develop higher-order ADI methods,which are performed by Richardson extrapolation,Crank-Nicolson methods and higher-order LOD methods,based on locally higher-order methods.We discuss the new theoretical results of the stability and consistency of the ADI methods.The main idea is to apply a higher- order time discretization and combine it with the ADI methods.We also discuss the dis- cretization and splitting methods for first-order and second-order evolution equations. The stability analysis is given for the ADI method for first-order time derivatives and for the LOD (locally one-dimensional) methods for second-order time derivatives.The higher-order methods are unconditionally stable.Some numerical experiments verify our results.展开更多
Based on the Reddy's theory of plates with the effect of higher-order shear deformations, the governing equations for bending of orthotropic plates with finite deformations were established. The differential quadr...Based on the Reddy's theory of plates with the effect of higher-order shear deformations, the governing equations for bending of orthotropic plates with finite deformations were established. The differential quadrature (DQ) method of nonlinear analysis to the problem was presented. New DQ approach, presented by Wang and Bert (DQWB), is extended to handle the multiple boundary conditions of plates. The techniques were also further extended to simplify nonlinear computations. The numerical convergence and comparison of solutions were studied. The results show that the DQ method presented is very reliable and valid. Moreover, the influences of geometric and material parameters as well as the transverse shear deformations on nonlinear bending were investigated. Numerical results show the influence of the shear deformation on the static bending of orthotropic moderately thick plate is significant.展开更多
The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) at...The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) attack and BS (beam splitting) attack. The result indicates that the PNS attack and BS attack will not limit the transmission distance as long as we select an appropriate mean photon number. Also, the maximum mean photon number under BS attack in practical DPS-QKD system and the set of practical assumptions about Eve's capabilities are presented.展开更多
We introduce a new parallel evolutionary algorithm in modeling dynamic systems by nonlinear higher-order ordinary differential equations (NHODEs). The NHODEs models are much more universal than the traditional linear ...We introduce a new parallel evolutionary algorithm in modeling dynamic systems by nonlinear higher-order ordinary differential equations (NHODEs). The NHODEs models are much more universal than the traditional linear models. In order to accelerate the modeling process, we propose and realize a parallel evolutionary algorithm using distributed CORBA object on the heterogeneous networking. Some numerical experiments show that the new algorithm is feasible and efficient.展开更多
Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phas...Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol.展开更多
文摘The proliferation of Large Language Models (LLMs) across various sectors underscored the urgency of addressing potential privacy breaches. Vulnerabilities, such as prompt injection attacks and other adversarial tactics, could make these models inadvertently disclose their training data. Such disclosures could compromise personal identifiable information, posing significant privacy risks. In this paper, we proposed a novel multi-faceted approach called Whispered Tuning to address privacy leaks in large language models (LLMs). We integrated a PII redaction model, differential privacy techniques, and an output filter into the LLM fine-tuning process to enhance confidentiality. Additionally, we introduced novel ideas like the Epsilon Dial for adjustable privacy budgeting for differentiated Training Phases per data handler role. Through empirical validation, including attacks on non-private models, we demonstrated the robustness of our proposed solution SecureNLP in safeguarding privacy without compromising utility. This pioneering methodology significantly fortified LLMs against privacy infringements, enabling responsible adoption across sectors.
基金Project supported by the Science and Technology Program of Xi’an City,China(Grant No.CXY1352WL34)
文摘In this paper we study the higher-order differential variational principle and differential equations of motion for mechanical systems in event space. Based on the higher-order d'Alembert principle of the system, the higher-order velocity energy and the higher-order acceleration energy of the system in event space are defined, the higher-order d'Alembert- Lagrange principle of the system in event space is established, and the parametric forms of Euler-Lagrange, Nielsen and Appell for this principle are given. Finally, the higher-order differential equations of motion for holonomic systems in event space are obtained.
基金This work has been performed in the Project "The Research on the New Analysis in Block Ciphers" supported by the Fundamental Research Funds for the Central Universities of China,the National Natural Science Foundation of China,the 111 Project of China,the Scientific Research Foundation of Education Department of Shaanxi Provincial Government of China
文摘This paper presents a method for differen- tial collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has a precomputation phase, but it can be obtained before attack and computed once for all. This attack on the reduced to 4-round FOX64 requires only 7 chosen plaintexts, and performs 242.8 4-round FOX64 encryptions. It could be extended to 5 (6, 7)-round FOX64 by a key exhaustive search behind the fourth round.
文摘The purpose of this paper is to add some complements to the general theory of higher-order types of asymptotic variation developed in two previous papers so as to complete our elementary (but not too much!) theory in view of applications to the theory of finite asymptotic expansions in the real domain, the asymptotic study of ordinary differential equations and the like. The main results concern: 1) a detailed study of the types of asymptotic variation of an infinite series so extending the results known for the sole power series;2) the type of asymptotic variation of a Wronskian completing the many already-published results on the asymptotic behaviors of Wronskians;3) a comparison between the two main standard approaches to the concept of “type of asymptotic variation”: via an asymptotic differential equation or an asymptotic functional equation;4) a discussion about the simple concept of logarithmic variation making explicit and completing the results which, in the literature, are hidden in a quite-complicated general theory.
文摘This case report investigates the manifestation of cerebral amyloid angiopathy (CAA) through recurrent Transient Ischemic Attacks (TIAs) in an 82-year-old patient. Despite initial diagnostic complexities, cerebral angiography-MRI revealed features indicative of CAA. Symptomatic treatment resulted in improvement, but the patient later developed a fatal hematoma. The discussion navigates the intricate therapeutic landscape of repetitive TIAs in the elderly with cardiovascular risk factors, emphasizing the pivotal role of cerebral MRI and meticulous bleeding risk management. The conclusion stresses the importance of incorporating SWI sequences, specifically when suspecting a cardioembolic TIA, as a diagnostic measure to explore and exclude CAA in the differential diagnosis. This case report provides valuable insights into these challenges, highlighting the need to consider CAA in relevant cases.
文摘Network attack detection and mitigation require packet collection,pre-processing,feature analysis,classification,and post-processing.Models for these tasks sometimes become complex or inefficient when applied to real-time data samples.To mitigate hybrid assaults,this study designs an efficient forensic layer employing deep learning pattern analysis and multidomain feature extraction.In this paper,we provide a novel multidomain feature extraction method using Fourier,Z,Laplace,Discrete Cosine Transform(DCT),1D Haar Wavelet,Gabor,and Convolutional Operations.Evolutionary method dragon fly optimisation reduces feature dimensionality and improves feature selection accuracy.The selected features are fed into VGGNet and GoogLeNet models using binary cascaded neural networks to analyse network traffic patterns,detect anomalies,and warn network administrators.The suggested model tackles the inadequacies of existing approaches to hybrid threats,which are growing more common and challenge conventional security measures.Our model integrates multidomain feature extraction,deep learning pattern analysis,and the forensic layer to improve intrusion detection and prevention systems.In diverse attack scenarios,our technique has 3.5% higher accuracy,4.3% higher precision,8.5% higher recall,and 2.9% lower delay than previous models.
基金supported by the National Natural Science Foundation of China (61903374)。
文摘A typical adaptive neural control methodology is used for the rigid body model of the hypersonic vehicle. The rigid body model is divided into the altitude subsystem and the velocity subsystem. The proportional integral differential(PID) controller is introduced to control the velocity track. The backstepping design is applied for constructing the controllers for the altitude subsystem.To avoid the explosion of differentiation from backstepping, the higher-order filter dynamic is used for replacing the virtual controller in the backstepping design steps. In the design procedure,the radial basis function(RBF) neural network is investigated to approximate the unknown nonlinear functions in the system dynamic of the hypersonic vehicle. The simulations show the effectiveness of the design method.
基金key Project of the Municipal Commission of Science and Technology of Shanghai
文摘A differential quadrature (DQ) method for orthotropic plates was proposed based on Reddy' s theory of plates with the effects of the higher-order transverse shear deformations. Wang-Bert's DQ approach was also further extended to handle the boundary conditions of plates. The computational convergence was studied, and the numerical results were obtained for different grid spacings and compared with the existing results. The results show that the DQ method is fairly reliable and effective.
基金This work is supported by Major Scientific and Technological Special Project of Guizhou Province(20183001)Research on the education mode for complicate skill students in new media with cross specialty integration(22150117092)+2 种基金Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ014)Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ019)Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ022).
文摘In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly prominent.The research on the privacy protection of the IoV has become the focus of the society.This paper analyzes the advantages and disadvantages of the existing location privacy protection system structure and algorithms,proposes a privacy protection system structure based on untrusted data collection server,and designs a vehicle location acquisition algorithm based on a local differential privacy and game model.The algorithm first meshes the road network space.Then,the dynamic game model is introduced into the game user location privacy protection model and the attacker location semantic inference model,thereby minimizing the possibility of exposing the regional semantic privacy of the k-location set while maximizing the availability of the service.On this basis,a statistical method is designed,which satisfies the local differential privacy of k-location sets and obtains unbiased estimation of traffic density in different regions.Finally,this paper verifies the algorithm based on the data set of mobile vehicles in Shanghai.The experimental results show that the algorithm can guarantee the user’s location privacy and location semantic privacy while satisfying the service quality requirements,and provide better privacy protection and service for the users of the IoV.
文摘This study was suggested by previous work on the simulation of evolution equations with scale-dependent processes,e.g.,wave-propagation or heat-transfer,that are modeled by wave equations or heat equations.Here,we study both parabolic and hyperbolic equations.We focus on ADI (alternating direction implicit) methods and LOD (locally one-dimensional) methods,which are standard splitting methods of lower order,e.g.second-order.Our aim is to develop higher-order ADI methods,which are performed by Richardson extrapolation,Crank-Nicolson methods and higher-order LOD methods,based on locally higher-order methods.We discuss the new theoretical results of the stability and consistency of the ADI methods.The main idea is to apply a higher- order time discretization and combine it with the ADI methods.We also discuss the dis- cretization and splitting methods for first-order and second-order evolution equations. The stability analysis is given for the ADI method for first-order time derivatives and for the LOD (locally one-dimensional) methods for second-order time derivatives.The higher-order methods are unconditionally stable.Some numerical experiments verify our results.
文摘Based on the Reddy's theory of plates with the effect of higher-order shear deformations, the governing equations for bending of orthotropic plates with finite deformations were established. The differential quadrature (DQ) method of nonlinear analysis to the problem was presented. New DQ approach, presented by Wang and Bert (DQWB), is extended to handle the multiple boundary conditions of plates. The techniques were also further extended to simplify nonlinear computations. The numerical convergence and comparison of solutions were studied. The results show that the DQ method presented is very reliable and valid. Moreover, the influences of geometric and material parameters as well as the transverse shear deformations on nonlinear bending were investigated. Numerical results show the influence of the shear deformation on the static bending of orthotropic moderately thick plate is significant.
文摘The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) attack and BS (beam splitting) attack. The result indicates that the PNS attack and BS attack will not limit the transmission distance as long as we select an appropriate mean photon number. Also, the maximum mean photon number under BS attack in practical DPS-QKD system and the set of practical assumptions about Eve's capabilities are presented.
基金the National Natural Science Foundation of China(No.70 0 710 42 and No.60 0 73 0 43 )
文摘We introduce a new parallel evolutionary algorithm in modeling dynamic systems by nonlinear higher-order ordinary differential equations (NHODEs). The NHODEs models are much more universal than the traditional linear models. In order to accelerate the modeling process, we propose and realize a parallel evolutionary algorithm using distributed CORBA object on the heterogeneous networking. Some numerical experiments show that the new algorithm is feasible and efficient.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61505261 and 11304397)the National Basic Research Program of China(Grant No.2013CB338002)
文摘Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol.