期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
A Privacy-Preserving Mechanism Based on Local Differential Privacy in Edge Computing 被引量:11
1
作者 Mengnan Bi Yingjie Wang +1 位作者 zhipeng cai Xiangrong Tong 《China Communications》 SCIE CSCD 2020年第9期50-65,共16页
With the development of Internet of Things(IoT),the delay caused by network transmission has led to low data processing efficiency.At the same time,the limited computing power and available energy consumption of IoT t... With the development of Internet of Things(IoT),the delay caused by network transmission has led to low data processing efficiency.At the same time,the limited computing power and available energy consumption of IoT terminal devices are also the important bottlenecks that would restrict the application of blockchain,but edge computing could solve this problem.The emergence of edge computing can effectively reduce the delay of data transmission and improve data processing capacity.However,user data in edge computing is usually stored and processed in some honest-but-curious authorized entities,which leads to the leakage of users’privacy information.In order to solve these problems,this paper proposes a location data collection method that satisfies the local differential privacy to protect users’privacy.In this paper,a Voronoi diagram constructed by the Delaunay method is used to divide the road network space and determine the Voronoi grid region where the edge nodes are located.A random disturbance mechanism that satisfies the local differential privacy is utilized to disturb the original location data in each Voronoi grid.In addition,the effectiveness of the proposed privacy-preserving mechanism is verified through comparison experiments.Compared with the existing privacy-preserving methods,the proposed privacy-preserving mechanism can not only better meet users’privacy needs,but also have higher data availability. 展开更多
关键词 Io T edge computing local differential privacy Voronoi diagram PRIVACY-PRESERVING
在线阅读 下载PDF
Multi-stage online task assignment driven by offline data under spatio-temporal crowdsourcing 被引量:3
2
作者 Qi Zhang Yingjie Wang +1 位作者 zhipeng cai Xiangrong Tong 《Digital Communications and Networks》 SCIE CSCD 2022年第4期516-530,共15页
In the era of the Internet of Things(IoT),the crowdsourcing process is driven by data collected by devices that interact with each other and with the physical world.As a part of the IoT ecosystem,task assignment has b... In the era of the Internet of Things(IoT),the crowdsourcing process is driven by data collected by devices that interact with each other and with the physical world.As a part of the IoT ecosystem,task assignment has become an important goal of the research community.Existing task assignment algorithms can be categorized as offline(performs better with datasets but struggles to achieve good real-life results)or online(works well with real-life input but is difficult to optimize regarding in-depth assignments).This paper proposes a Cross-regional Online Task(CROT)assignment problem based on the online assignment model.Given the CROT problem,an Online Task Assignment across Regions based on Prediction(OTARP)algorithm is proposed.OTARP is a two-stage graphics-driven bilateral assignment strategy that uses edge cloud and graph embedding to complete task assignments.The first stage uses historical data to make offline predictions,with a graph-driven method for offline bipartite graph matching.The second stage uses a bipartite graph to complete the online task assignment process.This paper proposes accelerating the task assignment process through multiple assignment rounds and optimizing the process by combining offline guidance and online assignment strategies.To encourage crowd workers to complete crowd tasks across regions,an incentive strategy is designed to encourage crowd workers’movement.To avoid the idle problem in the process of crowd worker movement,a drop-by-rider problem is used to help crowd workers accept more crowd tasks,optimize the number of assignments,and increase utility.Finally,through comparison experiments on real datasets,the performance of the proposed algorithm on crowd worker utility value and the matching number is evaluated. 展开更多
关键词 Spatiotemporal crowdsourcing Cross-regional Edge cloud Offline prediction Oline task assignment
在线阅读 下载PDF
Oxidation Behaviors of Different Grades of Ferritic Heat Resistant Steels in High-Temperature Steam and Flue Gas Environments 被引量:1
3
作者 Xiaogang Li Qu Liu +4 位作者 Shanlin Li Yu Zhang zhipeng cai Kejian Li Jiluan Pan 《Acta Metallurgica Sinica(English Letters)》 SCIE EI CAS CSCD 2022年第7期1103-1116,共14页
For steam tubes used in thermal power plant,the inner and outer walls were operated in high-temperature steam and flue gas environments respectively.In this study,structure,microstructure and chemical composition of o... For steam tubes used in thermal power plant,the inner and outer walls were operated in high-temperature steam and flue gas environments respectively.In this study,structure,microstructure and chemical composition of oxide films on inner and outer walls of exservice low Cr ferritic steel G102 tube and exservice high Cr ferritic steel T91 tube were analyzed.The oxide film was composed of outer oxide layer,inner oxide layer and internal oxidation zone.The outer oxide layer on the original surface of tube had a porous structure containing Fe oxides formed by diffusion and oxidation of Fe.More specially,the outer oxide layer formed in flue gas environment would mix with coal combustion products during the growth process.The inner oxide layer below the original surface of tube was made of Fe–Cr spinel.The internal oxidation zone was believed to be the precursor stage of inner oxide layer.The formation of internal oxidation zone was due to O diffusing along grain boundaries to form oxide.There were Fe–Cr–Si oxides discontinuously distributed along grain boundaries in the internal oxidation zone of G102,while there were Fe–Cr oxides continuously distributed along grain boundaries in that of T91. 展开更多
关键词 Ferritic heat resistant steels High temperature service Oxide layer STEAM Flue gas Oxidation evolution
原文传递
Microstructure and high temperature fracture toughness of NG-TIG welded Inconel 617B superalloy
4
作者 Xiaogang Li Kejian Li +3 位作者 Shanlin Li Yao Wu zhipeng cai Jiluan Pan 《Journal of Materials Science & Technology》 SCIE EI CAS CSCD 2020年第4期173-182,共10页
In the present study,the microstructure,fracture toughness,and fracture behavior of Inconel 617 B narrow gap tungsten inert gas(NG-TIG)welded joint were investigated systematically at the designed service temperature ... In the present study,the microstructure,fracture toughness,and fracture behavior of Inconel 617 B narrow gap tungsten inert gas(NG-TIG)welded joint were investigated systematically at the designed service temperature of 700℃.Fracture toughness(J0.2)of base metal(BM)and heat affected zone(HAZ)was higher than that of weld metal(WM).In HAZ and BM,strain mainly loc alised at grain boundaries with large misorientation and there were lots of coincidence site lattice(CSL)∑3 boundaries related to twins inside grains,which led to the much higher fracture toughness of BM and HAZ than WM.The high numbers of twins as well as the less serious strain localization at grain boundaries resulted in the most outstanding fracture toughness of BM. 展开更多
关键词 Nickel alloys Welding Fracture behavior MICROSTRUCTURE MISORIENTATION
原文传递
Novel chemical-and protein-mediated methods for glucosamine detection
5
作者 Linshu Chen Pedro Laborda +4 位作者 zhipeng cai Andrew Kevin Hagan Aimin Lu Josef Voglmeir Li Liu 《Food Materials Research》 2022年第1期175-182,共8页
We describe two novel approaches for the determination of glucosamine(GlcN).The first approach is based on the chemical derivatization of GlcN with the non-fluorophor 1,3-diphenyl-1,3-propanedione(DPPD),which results ... We describe two novel approaches for the determination of glucosamine(GlcN).The first approach is based on the chemical derivatization of GlcN with the non-fluorophor 1,3-diphenyl-1,3-propanedione(DPPD),which results in a condensation product with interesting fluorescent properties.The obtained compound was isolated by silica-gel chromatography and its structure elucidated by NMR and mass spectrometry.The second approach is based on a previously undescribed sensitivity of the enzyme glucosamine-6-phosphate deaminase(GPDA)towards GlcN,which resulted in the precipitation of the enzyme.Using a rational enzyme engineering approach and both liquid-based and plate-based screening methods,mutational GPDA variants with significantly improved precipitation properties were identified and characterized.These novel glucosamine detection methods may be a useful addition to the repertoire of currently available glucosamine detection sensors. 展开更多
关键词 PROPERTIES CHEMICAL RATIONAL
在线阅读 下载PDF
Multiscale analysis on the wear process of cemented carbide tools during titanium alloy machining
6
作者 Wenmeng Zhou Pingfa Feng +6 位作者 Wen Ji Zhongyu Wang Yuan Ma Enlai Jiang Huiting Zha zhipeng cai Feng Feng 《Friction》 2025年第3期127-139,共13页
Cemented carbide tools are widely utilized in titanium alloy machining.However,severe tool wear usually occurs during machining;thus,the wear process has attracted widespread attention.Electromagnetic treatment was ap... Cemented carbide tools are widely utilized in titanium alloy machining.However,severe tool wear usually occurs during machining;thus,the wear process has attracted widespread attention.Electromagnetic treatment was applied in our previous study to significantly improve the tool life of cemented carbide tools in Ti6Al4V machining.To investigate the effect of electromagnetic treatment on wear performance,a multiscale analysis of the wear process of cemented carbide tools in the turning process,including microdefects and wear topography at various scales,was conducted in the present study.The distribution of dislocations in the tool material was measured through electron backscatter diffraction,and the surface topographies in the wear area during the Ti6Al4V cutting process were recorded via white light interferometry.Fractal analysis based on the scaling property of surface roughness was carried out to further quantify the wear performance of the tools.The results revealed that the wear mechanism of the cutting tools was mainly adhesion and diffusion,and the diffusion wear of the electromagnetically treated tools was less than that of the untreated tools.Based on the multiscale analysis of flank wear,the effect of electromagnetic treatment on the enhancement of the wear resistance of cemented carbide cutting tools was demonstrated.The multiscale analysis of the wear performance of cutting tools in this study effectively revealed the mechanism by which electromagnetic treatment enhances wear resistance,thus contributing to filling the research gap of traditional studies on tool wear that generally employ single scales. 展开更多
关键词 tool wear multiscale analysis fractal dimension MICRODEFECTS electromagnetic treatment
原文传递
Security and Privacy in Metaverse: A Comprehensive Survey 被引量:14
7
作者 Yan Huang Yi(Joy)Li zhipeng cai 《Big Data Mining and Analytics》 EI CSCD 2023年第2期234-247,共14页
Metaverse describes a new shape of cyberspace and has become a hot-trending word since 2021.There are many explanations about what Meterverse is and attempts to provide a formal standard or definition of Metaverse.How... Metaverse describes a new shape of cyberspace and has become a hot-trending word since 2021.There are many explanations about what Meterverse is and attempts to provide a formal standard or definition of Metaverse.However,these definitions could hardly reach universal acceptance.Rather than providing a formal definition of the Metaverse,we list four must-have characteristics of the Metaverse:socialization,immersive interaction,real world-building,and expandability.These characteristics not only carve the Metaverse into a novel and fantastic digital world,but also make it suffer from all security/privacy risks,such as personal information leakage,eavesdropping,unauthorized access,phishing,data injection,broken authentication,insecure design,and more.This paper first introduces the four characteristics,then the current progress and typical applications of the Metaverse are surveyed and categorized into four economic sectors.Based on the four characteristics and the findings of the current progress,the security and privacy issues in the Metaverse are investigated.We then identify and discuss more potential critical security and privacy issues that can be caused by combining the four characteristics.Lastly,the paper also raises some other concerns regarding society and humanity. 展开更多
关键词 Metaverse CYBERSECURITY privacy protection cyber infrastructure extended reality
原文传递
Collaborative City Digital Twin for the COVID-19 Pandemic:A Federated Learning Solution 被引量:4
8
作者 Junjie Pang Yan Huang +2 位作者 Zhenzhen Xie Jianbo Li zhipeng cai 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第5期759-771,共13页
The novel coronavirus,COVID-19,has caused a crisis that affects all segments of the population.As the knowledge and understanding of COVID-19 evolve,an appropriate response plan for this pandemic is considered one of ... The novel coronavirus,COVID-19,has caused a crisis that affects all segments of the population.As the knowledge and understanding of COVID-19 evolve,an appropriate response plan for this pandemic is considered one of the most effective methods for controlling the spread of the virus.Recent studies indicate that a city Digital Twin(DT)is beneficial for tackling this health crisis,because it can construct a virtual replica to simulate factors,such as climate conditions,response policies,and people's trajectories,to help plan efficient and inclusive decisions.However,a city DTsystem relies on long-term and high-quality data collection to make appropriate decisions,limiting its advantages when facing urgent crises,such as the COVID-19 pandemic.Federated Learning(FL),in which all clients can learn a shared model while retaining all training data locally,emerges as a promising solution for accumulating the insights from multiple data sources efficiently.Furthermore,the enhanced privacy protection settings removing the privacy barriers lie in this collaboration.In this work,we propose a framework that fused city DT with FL to achieve a novel collaborative paradigm that allows multiple city DTs to share the local strategy and status quickly.In particular,an FL central server manages the local updates of multiple collaborators(city DTs),providing a global model that is trained in multiple iterations at different city DT systems until the model gains the correlations between various response plans and infection trends.This approach means a collaborative city DT paradigm fused with FL techniques can obtain knowledge and patterns from multiple DTs and eventually establish a"global view"of city crisis management.Meanwhile,it also helps improve each city's DT by consolidating other DT's data without violating privacy rules.In this paper,we use the COVID-19 pandemic as the use case of the proposed framework.The experimental results on a real dataset with various response plans validate our proposed solution and demonstrate its superior performance. 展开更多
关键词 COVID-19 Digital Twin(DT) Federated Learning(FL) deep learning
原文传递
Link-Privacy Preserving Graph Embedding Data Publication with Adversarial Learning 被引量:5
9
作者 Kainan Zhang Zhi Tian +1 位作者 zhipeng cai Daehee Seo 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2022年第2期244-256,共13页
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph,which is amenable to be adopted in tra... The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph,which is amenable to be adopted in traditional machine learning algorithms in favor of vector representations.Graph embedding methods build an important bridge between social network analysis and data analytics,as social networks naturally generate an unprecedented volume of graph data continuously.Publishing social network data not only brings benefit for public health,disaster response,commercial promotion,and many other applications,but also gives birth to threats that jeopardize each individual’s privacy and security.Unfortunately,most existing works in publishing social graph embedding data only focus on preserving social graph structure with less attention paid to the privacy issues inherited from social networks.To be specific,attackers can infer the presence of a sensitive relationship between two individuals by training a predictive model with the exposed social network embedding.In this paper,we propose a novel link-privacy preserved graph embedding framework using adversarial learning,which can reduce adversary’s prediction accuracy on sensitive links,while persevering sufficient non-sensitive information,such as graph topology and node attributes in graph embedding.Extensive experiments are conducted to evaluate the proposed framework using ground truth social network datasets. 展开更多
关键词 graph embedding privacy preservation adversarial learning
原文传递
Survey on Data Analysis in Social Media:A Practical Application Aspect 被引量:4
10
作者 Qixuan Hou Meng Han zhipeng cai 《Big Data Mining and Analytics》 EI 2020年第4期259-279,共21页
Social media has more than three billion users sharing events,comments,and feelings throughout the world.It serves as a critical information source with large volumes,high velocity,and a wide variety of data.The previ... Social media has more than three billion users sharing events,comments,and feelings throughout the world.It serves as a critical information source with large volumes,high velocity,and a wide variety of data.The previous studies on information spreading,relationship analyzing,and individual modeling,etc.,have been heavily conducted to explore the tremendous social and commercial values of social media data.This survey studies the previous literature and the existing applications from a practical perspective.We outline a commonly used pipeline in building social media-based applications and focus on discussing available analysis techniques,such as topic analysis,time series analysis,sentiment analysis,and network analysis.After that,we present the impacts of such applications in three different areas,including disaster management,healthcare,and business.Finally,we list existing challenges and suggest promising future research directions in terms of data privacy,5 G wireless network,and multilingual support. 展开更多
关键词 social media topic analysis time series analysis sentiment analysis network analysis disaster management bio-surveillance business intelligence
原文传递
vip Editorial: Special Issue on Internet of Things 被引量:2
11
作者 zhipeng cai Anu Bourgeois Weitian Tong 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第4期343-344,共2页
Internet of Things(IoT)is a new paradigm that the ubiquitous smart objects,such as devices,vehicles,buildings,etc.,interact and exchange data through emerging wireless technology with the intention of improving peo... Internet of Things(IoT)is a new paradigm that the ubiquitous smart objects,such as devices,vehicles,buildings,etc.,interact and exchange data through emerging wireless technology with the intention of improving people’s quality of lives in variety areas,such as transportation,manufacturing industry,health care industry,etc:Besides benefits, 展开更多
关键词 interact lives intention ubiquitous transportation paradigm benefits emerging unprecedented routing
原文传递
Fast Skyline Community Search in Multi-Valued Networks 被引量:2
12
作者 Dongxiao Yu Lifang Zhang +3 位作者 Qi Luo Xiuzhen Cheng Jiguo Yu zhipeng cai 《Big Data Mining and Analytics》 EI 2020年第3期171-180,共10页
Community search has been extensively studied in large networks,such as Protein-Protein Interaction(PPI)networks,citation graphs,and collaboration networks.However,in terms of widely existing multi-valued networks,whe... Community search has been extensively studied in large networks,such as Protein-Protein Interaction(PPI)networks,citation graphs,and collaboration networks.However,in terms of widely existing multi-valued networks,where each node has d(d 1)numerical attributes,almost all existing algorithms either completely ignore the attributes of node at all or only consider one attribute.To solve this problem,the concept of skyline community was presented,based on the concepts of k-core and skyline recently.The skyline community is defined as a maximal k-core that satisfies some influence constraints,which is very useful in depicting the communities that are not dominated by other communities in multi-valued networks.However,the algorithms proposed on skyline community search can only work in the special case that the nodes have different values on each attribute,and the computation complexity degrades exponentially as the number of attributes increases.In this work,we turn our attention to the general scenario where multiple nodes may have the same attribute value.Specifically,we first present an algorithm,called MICS,which can find all skyline communities in a multi-valued network.To improve computation efficiency,we then propose a dimension reduction based algorithm,called P-MICS,using the maximum entropy method.Our algorithm can significantly reduce the skyline community searching time,while is still able to find almost all cohesive skyline communities.Extensive experiments on real-world datasets demonstrate the efficiency and effectiveness of our algorithms. 展开更多
关键词 multi-valued graph community search skyline community
原文传递
A survey on blockchain systems:Attacks,defenses,and privacy preservation 被引量:1
13
作者 Yourong Chen Hao Chen +3 位作者 Yang Zhang Meng Han Madhuri Siddula zhipeng cai 《High-Confidence Computing》 2022年第2期7-26,共20页
Owing to the incremental and diverse applications of cryptocurrencies and the continuous development of distributed system technology,blockchain has been broadly used in fintech,smart homes,public health,and intellige... Owing to the incremental and diverse applications of cryptocurrencies and the continuous development of distributed system technology,blockchain has been broadly used in fintech,smart homes,public health,and intelligent transportation due to its properties of decentralization,collective maintenance,and immutability.Although the dynamism of blockchain abounds in various fields,concerns in terms of network communication interference and privacy leakage are gradually increasing.Because of the lack of reliable attack analysis systems,fully understanding some attacks on the blockchain,such as mining,network communication,smart contract,and privacy theft attacks,has remained challenging.Therefore,in this study,we examine the security and privacy of the blockchain and analyze possible solutions.We systematical classify the blockchain attack techniques into three categories,then discuss the corresponding attack and defense methods based on these categories.We focus on(1)the attack and defense methods of mining pool attacks for blockchain security issues,such as block withholding,51%,pool hopping,selfish mining,and fork after withholding attacks,in the attack type of consensus excitation;(2)the attack and defense methods of network communication and smart contracts for blockchain security issues,such as distributed denial-of-service,Sybil,eclipse,and reentrancy attacks,in the attack type of middle protocol;and(3)the attack and defense methods of privacy thefts for blockchain privacy issues,such as identity privacy and transaction information attacks,in the attack type of application service.Finally,we discuss future research directions for blockchain security. 展开更多
关键词 Blockchain System DEFENSE ATTACK PRIVACY
在线阅读 下载PDF
Secure verifiable aggregation for blockchain-based federated averaging 被引量:1
14
作者 Saide Zhu Ruinian Li +3 位作者 zhipeng cai Donghyun Kim Daehee Seo Wei Li 《High-Confidence Computing》 2022年第1期54-61,共8页
IoT devices’storage and computation capacities are constantly increasing in recent years,which brings critical challenges in data privacy protection.Federated learning(FL)and blockchain technology are two popular tec... IoT devices’storage and computation capacities are constantly increasing in recent years,which brings critical challenges in data privacy protection.Federated learning(FL)and blockchain technology are two popular tech-niques used in IoT data aggregation,where FL enables data training with privacy protection,and blockchain provides a decentralized architecture for data storage and mining.However,very few the state-of-the-art works consider the applicability of the combination of FL and blockchain.In this paper,we adopt the federated aver-aging algorithm to reduce the communication overhead between the blockchain and end users to achieve higher performance.We also apply the double-mask-then-encrypt approach for end users to submit their local updates in order to protect data privacy.Finally,we propose and implement a non-interactive Public Verifiable Secret Sharing(PVSS)algorithm with Distributed Hash Table(DHT)that solves the user-drop-out problem and improves the communication efficiency between blockchain and end-users.At last,we theoretically analyze the security strengths of the proposed solution and conduct experiments to measure the execution time of PVSS on both the server and clients sides. 展开更多
关键词 Blockchain Federated learning Secret sharing PRIVACY
在线阅读 下载PDF
Mechanism and application of mechanical property improvements in engineering materials by pulsed magnetic treatment:A review
15
作者 zhipeng cai Chengkai QIAN +3 位作者 Xu ZHANG Ning DAI Yao WU Wen JI 《Friction》 SCIE EI CAS CSCD 2024年第10期2139-2166,共28页
Pulsed magnetic treatment(PMT)has been adopted as an effective strengthening method for engineering materials and components in recent years,and the development of its application depends on the comprehensive understa... Pulsed magnetic treatment(PMT)has been adopted as an effective strengthening method for engineering materials and components in recent years,and the development of its application depends on the comprehensive understanding of the nature of PMT.The deep mechanism was thought initially to be the magnetostrictive effect,while further investigation found that the magnetic field could lead to the change of the defect states in the crystal,which is called the magnetoplastic effect.Due to the complexity of the engineering materials,manifestations of the magnetoplastic effect become more diverse,and they were reviewed in the form of microstructure homogenization and interfacial stabilization.Further,the mechanism of the magnetoplastic effect was discussed,focusing on the changes in the spin states under the external magnetic field.Microstructure modifications could also alter material performances,especially the residual stress,plasticity,and fatigue properties.Therefore,PMT with specific parameters can be utilized to obtain an ideal combination of microstructure,residual stress,and mechanical properties for better service performance of different mechanical parts,and its applications on machining tools and bearings are perfect examples.This work reviews the effect of PMT on the microstructure and properties of different materials and the mechanism,and it also summarizes the fundamental applications of PMT on essential mechanical parts. 展开更多
关键词 pulsed magnetic treatment wear resistance microstructure modifications mechanical properties magnetoplastic effect
原文传递
Core Decomposition and Maintenance in Bipartite Graphs
16
作者 Dongxiao Yu Lifang Zhang +2 位作者 Qi Luo Xiuzhen Cheng zhipeng cai 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第2期292-309,共18页
The prevalence of graph data has brought a lot of attention to cohesive and dense subgraph mining.In contrast with the large number of indexes proposed to help mine dense subgraphs in general graphs,only very few inde... The prevalence of graph data has brought a lot of attention to cohesive and dense subgraph mining.In contrast with the large number of indexes proposed to help mine dense subgraphs in general graphs,only very few indexes are proposed for the same in bipartite graphs.In this work,we present the index called˛.ˇ/-core number on vertices,which reflects the maximal cohesive and dense subgraph a vertex can be in,to help enumerate the(α,β)-cores,a commonly used dense structure in bipartite graphs.To address the problem of extremely high time and space cost for enumerating the(α,β)-cores,we first present a linear time and space algorithm for computing the˛.ˇ/-core numbers of vertices.We further propose core maintenance algorithms,to update the core numbers of vertices when a graph changes by avoiding recalculations.Experimental results on different real-world and synthetic datasets demonstrate the effectiveness and efficiency of our algorithms. 展开更多
关键词 core decomposition core maintenance bipartite graph dense subgraph mining
原文传递
Lightweight Super-Resolution Model for Complete Model Copyright Protection
17
作者 Bingyi Xie Honghui Xu +2 位作者 YongJoon Joe Daehee Seo zhipeng cai 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第4期1194-1205,共12页
Deep learning based techniques are broadly used in various applications, which exhibit superior performance compared to traditional methods. One of the mainstream topics in computer vision is the image super-resolutio... Deep learning based techniques are broadly used in various applications, which exhibit superior performance compared to traditional methods. One of the mainstream topics in computer vision is the image super-resolution task. In recent deep learning neural networks, the number of parameters in each convolution layer has increased along with more layers and feature maps, resulting in better image super-resolution performance. In today’s era, numerous service providers offer super-resolution services to users, providing them with remarkable convenience. However, the availability of open-source super-resolution services exposes service providers to the risk of copyright infringement, as the complete model could be vulnerable to leakage. Therefore, safeguarding the copyright of the complete model is a non-trivial concern. To tackle this issue, this paper presents a lightweight model as a substitute for the original complete model in image super-resolution. This research has identified smaller networks that can deliver impressive performance, while protecting the original model’s copyright. Finally, comprehensive experiments are conducted on multiple datasets to demonstrate the superiority of the proposed approach in generating super-resolution images even using lightweight neural networks. 展开更多
关键词 LIGHTWEIGHT adversarial learning image super-resolution copyright protection
原文传递
Few-Shot Graph Classification with Structural-Enhanced Contrastive Learning for Graph Data Copyright Protection
18
作者 Kainan Zhang DongMyung Shin +1 位作者 Daehee Seo zhipeng cai 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第2期605-616,共12页
Open-source licenses can promote the development of machine learning by allowing others to access,modify,and redistribute the training dataset.However,not all open-source licenses may be appropriate for data sharing,a... Open-source licenses can promote the development of machine learning by allowing others to access,modify,and redistribute the training dataset.However,not all open-source licenses may be appropriate for data sharing,as some may not provide adequate protections for sensitive or personal information such as social network data.Additionally,some data may be subject to legal or regulatory restrictions that limit its sharing,regardless of the licensing model used.Hence,obtaining large amounts of labeled data can be difficult,time-consuming,or expensive in many real-world scenarios.Few-shot graph classification,as one application of meta-learning in supervised graph learning,aims to classify unseen graph types by only using a small amount of labeled data.However,the current graph neural network methods lack full usage of graph structures on molecular graphs and social network datasets.Since structural features are known to correlate with molecular properties in chemistry,structure information tends to be ignored with sufficient property information provided.Nevertheless,the common binary classification task of chemical compounds is unsuitable in the few-shot setting requiring novel labels.Hence,this paper focuses on the graph classification tasks of a social network,whose complex topology has an uncertain relationship with its nodes'attributes.With two multi-class graph datasets with large node-attribute dimensions constructed to facilitate the research,we propose a novel learning framework that integrates both meta-learning and contrastive learning to enhance the utilization of graph topological information.Extensive experiments demonstrate the competitive performance of our framework respective to other state-of-the-art methods. 展开更多
关键词 few-shot learning contrastive learning data copyright protection
原文传递
Neural-based inexact graph de-anonymization
19
作者 Guangxi Lu Kaiyang Li +3 位作者 Xiaotong Wang Ziyue Liu zhipeng cai Wei Li 《High-Confidence Computing》 EI 2024年第1期52-59,共8页
Graph de-anonymization is a technique used to reveal connections between entities in anonymized graphs,which is crucial in detecting malicious activities,network analysis,social network analysis,and more.Despite its p... Graph de-anonymization is a technique used to reveal connections between entities in anonymized graphs,which is crucial in detecting malicious activities,network analysis,social network analysis,and more.Despite its paramount importance,conventional methods often grapple with inefficiencies and challenges tied to obtaining accurate query graph data.This paper introduces a neural-based inexact graph de-anonymization,which comprises an embedding phase,a comparison phase,and a matching procedure.The embedding phase uses a graph convolutional network to generate embedding vectors for both the query and anonymized graphs.The comparison phase uses a neural tensor network to ascertain node resemblances.The matching procedure employs a refined greedy algorithm to discern optimal node pairings.Additionally,we comprehensively evaluate its performance via well-conducted experiments on various real datasets.The results demonstrate the effectiveness of our proposed approach in enhancing the efficiency and performance of graph de-anonymization through the use of graph embedding vectors. 展开更多
关键词 Graph de-anonymization Graph convolutional network Neural tensor network
在线阅读 下载PDF
Editorial:Special Section on Edge AI Empowered Giant Model Training
20
作者 Dongxiao Yu Xu Chen zhipeng cai 《Big Data Mining and Analytics》 CSCD 2024年第4期1015-1016,共2页
The realm of Artificial Intelligence(AI)has seen monumental shifts in recent years,particularly with the advent of large-scale models such as GPT-3,which have pushed the boundaries of natural language processing(NLP)a... The realm of Artificial Intelligence(AI)has seen monumental shifts in recent years,particularly with the advent of large-scale models such as GPT-3,which have pushed the boundaries of natural language processing(NLP)and other AI applications.These models,while offering unprecedented capabilities,also present significant challenges in terms of the immense computational resources and energy required for training and deployment.The sheer scale of these models—175 billion parameters and over 3 million GPU hours in the case of GPT-3—places their development and use beyond the reach of many organizations and individuals. 展开更多
关键词 INTELLIGENCE offering PUSH
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部