期刊文献+
共找到463篇文章
< 1 2 24 >
每页显示 20 50 100
Defending against Backdoor Attacks in Federated Learning by Using Differential Privacy and OOD Data Attributes
1
作者 Qingyu Tan Yan Li Byeong-Seok Shin 《Computer Modeling in Engineering & Sciences》 2025年第5期2417-2428,共12页
Federated Learning(FL),a practical solution that leverages distributed data across devices without the need for centralized data storage,which enables multiple participants to jointly train models while preserving dat... Federated Learning(FL),a practical solution that leverages distributed data across devices without the need for centralized data storage,which enables multiple participants to jointly train models while preserving data privacy and avoiding direct data sharing.Despite its privacy-preserving advantages,FL remains vulnerable to backdoor attacks,where malicious participants introduce backdoors into local models that are then propagated to the global model through the aggregation process.While existing differential privacy defenses have demonstrated effectiveness against backdoor attacks in FL,they often incur a significant degradation in the performance of the aggregated models on benign tasks.To address this limitation,we propose a novel backdoor defense mechanism based on differential privacy.Our approach first utilizes the inherent out-of-distribution characteristics of backdoor samples to identify and exclude malicious model updates that significantly deviate from benign models.By filtering out models that are clearly backdoor-infected before applying differential privacy,our method reduces the required noise level for differential privacy,thereby enhancing model robustness while preserving performance.Experimental evaluations on the CIFAR10 and FEMNIST datasets demonstrate that our method effectively limits the backdoor accuracy to below 15%across various backdoor scenarios while maintaining high main task accuracy. 展开更多
关键词 Federated learning backdoor attacks differential privacy out-of-distribution data
在线阅读 下载PDF
Higher-order differential variational principle and differential equations of motion for mechanical systems in event space
2
作者 张相武 李院院 +1 位作者 赵小侠 罗文峰 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第10期292-298,共7页
In this paper we study the higher-order differential variational principle and differential equations of motion for mechanical systems in event space. Based on the higher-order d'Alembert principle of the system, the... In this paper we study the higher-order differential variational principle and differential equations of motion for mechanical systems in event space. Based on the higher-order d'Alembert principle of the system, the higher-order velocity energy and the higher-order acceleration energy of the system in event space are defined, the higher-order d'Alembert- Lagrange principle of the system in event space is established, and the parametric forms of Euler-Lagrange, Nielsen and Appell for this principle are given. Finally, the higher-order differential equations of motion for holonomic systems in event space are obtained. 展开更多
关键词 event space the higher-order d'Alembert-Lagrange principle the higher-order time rate of changeof force the higher-order differential equations of motion
原文传递
Differential Collision Attack on Reduced FOX Block Cipher 被引量:6
3
作者 Chen Jie Hu Yupu +1 位作者 Zhang Yueyu Dong Xiaoli 《China Communications》 SCIE CSCD 2012年第7期71-76,共6页
This paper presents a method for differen- tial collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has... This paper presents a method for differen- tial collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has a precomputation phase, but it can be obtained before attack and computed once for all. This attack on the reduced to 4-round FOX64 requires only 7 chosen plaintexts, and performs 242.8 4-round FOX64 encryptions. It could be extended to 5 (6, 7)-round FOX64 by a key exhaustive search behind the fourth round. 展开更多
关键词 CRYPTOGRAPHY block cipher FOX differential collision attack
在线阅读 下载PDF
Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32 被引量:1
4
作者 张文英 刘枫 +1 位作者 刘宣 孟帅 《Journal of Shanghai Jiaotong university(Science)》 EI 2013年第2期147-152,共6页
We investigate the lightweight block cipher KATAN family which consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64 respectively. However, three variants all have the same... We investigate the lightweight block cipher KATAN family which consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64 respectively. However, three variants all have the same key length of 80 bits. On the basis of the bit-oriented faulty model and the differential analysis principle, we describe the attack that combines differential fault attack with the meet-in-the-middle (MITM) attack on the KATAN32. More precisely, inducing a fault at a bit, we can recover some linear differential fault equations on the key bits. During solving equations, without the help of computer, we need only algebraic deduction to obtain relations of some key bits. The complexity in this process is neglectable. The secret key of the full cipher can be recovered faster than exhaustive search for all three block sizes in the KATAN family. Our result describes that KATAN32 is vulnerable. 展开更多
关键词 KATAN32 differential FAULT analysis meet-in-the-middle (MITM) attack BLOCK CIPHER LIGHTWEIGHT CIPHER
原文传递
Complements to the Theory of Higher-Order Types of Asymptotic Variation for Differentiable Functions 被引量:1
5
作者 Antonio Granata 《Advances in Pure Mathematics》 2019年第5期434-479,共46页
The purpose of this paper is to add some complements to the general theory of higher-order types of asymptotic variation developed in two previous papers so as to complete our elementary (but not too much!) theory in ... The purpose of this paper is to add some complements to the general theory of higher-order types of asymptotic variation developed in two previous papers so as to complete our elementary (but not too much!) theory in view of applications to the theory of finite asymptotic expansions in the real domain, the asymptotic study of ordinary differential equations and the like. The main results concern: 1) a detailed study of the types of asymptotic variation of an infinite series so extending the results known for the sole power series;2) the type of asymptotic variation of a Wronskian completing the many already-published results on the asymptotic behaviors of Wronskians;3) a comparison between the two main standard approaches to the concept of “type of asymptotic variation”: via an asymptotic differential equation or an asymptotic functional equation;4) a discussion about the simple concept of logarithmic variation making explicit and completing the results which, in the literature, are hidden in a quite-complicated general theory. 展开更多
关键词 higher-order Regularly-Varying FUNCTIONS higher-order Rapidly-Varying FUNCTIONS Smoothly-Varying FUNCTIONS Exponentially-Varying FUNCTIONS Logarithmically-Varying FUNCTIONS ASYMPTOTIC differential EQUATIONS As-ymptotic Functional EQUATIONS ASYMPTOTIC VARIATION of Wronskians
在线阅读 下载PDF
Magneto-Electro-Elastic Analysis of Doubly-Curved Shells: Higher-Order Equivalent Layer-Wise Formulation
6
作者 Francesco Tornabene Matteo Viscoti Rossana Dimitri 《Computer Modeling in Engineering & Sciences》 2025年第2期1767-1838,共72页
Recent engineering applications increasingly adopt smart materials,whose mechanical responses are sensitive to magnetic and electric fields.In this context,new and computationally efficient modeling strategies are ess... Recent engineering applications increasingly adopt smart materials,whose mechanical responses are sensitive to magnetic and electric fields.In this context,new and computationally efficient modeling strategies are essential to predict the multiphysic behavior of advanced structures accurately.Therefore,the manuscript presents a higher-order formulation for the static analysis of laminated anisotropic magneto-electro-elastic doubly-curved shell structures.The fundamental relations account for the full coupling between the electric field,magnetic field,and mechanical elasticity.The configuration variables are expanded along the thickness direction using a generalized formulation based on the Equivalent Layer-Wise approach.Higher-order polynomials are selected,allowing for the assessment of prescribed values of the configuration variables at the top and bottom sides of solids.In addition,an effective strategy is provided for modeling general surface distributions of mechanical pressures and electromagnetic external fluxes.The model is based on a continuum-based formulation which employs an analytical homogenization of the multifield material properties,based on Mori&Tanaka approach,of a magneto-electro-elastic composite material obtained from a piezoelectric and a piezomagnetic phase,with coupled magneto-electro-elastic effects.A semi-analytical Navier solution is applied to the fundamental equations,and an efficient post-processing equilibrium-based procedure is here used,based on the numerical assessment with the Generalized Differential Quadrature(GDQ)method,to recover the response of three-dimensional shells.The formulation is validated through various examples,investigating the multifield response of panels of different curvatures and lamination schemes.An efficient homogenization procedure,based on the Mori&Tanaka approach,is employed to obtain the three-dimensional constitutive relation of magneto-electro-elastic materials.Each model is validated against three-dimensional finite-element simulations,as developed in commercial codes.Furthermore,the full coupling effect between the electric and magnetic response is evaluated via a parametric investigation,with useful insights for design purposes of many engineering applications.The paper,thus,provides a formulation for the magneto-electro-elastic analysis of laminated structures,with a high computational efficiency,since it provides results with three-dimensional capabilities with a two-dimensional formulation.The adoption of higher-order theories,indeed,allows us to efficiently predict not only the mechanical response of the structure as happens in existing literature,but also the through-the-thickness distribution of electric and magnetic variables.A novel higher-order theory has been proposed in this work for the magneto-electro-elastic analysis of laminated shell structures with varying curvatures.This theory employs a generalized method to model the distribution of the displacement field components,electrostatic,and magneto-static potential,accounting for higher-order polynomials.The thickness functions have been defined to prescribe the arbitrary values of configuration variables at the top and bottom surfaces,even though the model is ESL-based.The fundamental governing equations have been derived in curvilinear principal coordinates,considering all coupling effects among different physical phenomena,including piezoelectric,piezomagnetic,and magneto-electric effects.A homogenization algorithm based on a Mori&Tanaka approach has been adopted to obtain the equivalent magneto-electro-mechanical properties of a two-phase transversely isotropic composite.In addition,an effective method has been adopted involving the external loads in terms of surface tractions,as well as the electric and magnetic fluxes.In the post-processing stage,a GDQ-based procedure provides the actual 3D response of a doubly-curved solid.The model has been validated through significant numerical examples,showing that the results of this semi-analytical theory align well with those obtained from 3D numerical models from commercial codes.In particular,the accuracy of the model has been verified for lamination schemes with soft layers and various curvatures under different loading conditions.Moreover,this formulation has been used to predict the effect of combined electric and magnetic loads on the mechanical response of panels with different curvatures and lamination schemes.As a consequence,this theory can be applied in engineering applications where the combined effect of electric and magnetic loads is crucial,thus facilitating their study and design.An existing limitation of this study is that the solution is that it is derived only for structures with uniform curvature,cross-ply lamination scheme,and simply supported boundary conditions.Furthermore,it requires that each lamina within the stacking sequence exhibits magneto-electro-elastic behavior.Therefore,at the present stage,it cannot be used for multifield analysis of classical composite structures with magneto-electric patches.A further enhancement of the research work could be the derivation of a solution employing a numerical technique,to overcome the limitations of the Navier method.In this way,the same theory may be adopted to predict the multifield response of structures with variable curvatures and thickness,as well as anisotropic materials and more complicated boundary conditions.Acknowledgement:The authors are grateful to the Department of Innovation Engineering of Univer-sity of Salento for the support. 展开更多
关键词 Magneto-electro-elastic materials equivalent layer-wise generalized differential quadrature higher-order theories navier solution recovery procedure smart structures
在线阅读 下载PDF
Improved Differential Attack on 30-Round SIMON64
7
作者 WANG Gaoli GAN Nan LI Yue 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期75-83,共9页
In this paper we present an attack on 30-round SIMON64, which improves the best results on SIMON64 by 1 round. We use a 23-round differential characteristic which was proposed by Itai et al in 2015 to construct a 30-r... In this paper we present an attack on 30-round SIMON64, which improves the best results on SIMON64 by 1 round. We use a 23-round differential characteristic which was proposed by Itai et al in 2015 to construct a 30-round extended differential characteristized by adding 4 rounds on the top and 3 round on the bottom. Furthermore, we utilize all of the sufficient bit-conditions of the 30-round differential to compute a set of corresponding subkeys. Then we distribute the plaintext pairs over the 286 lists corresponding to the 86-bit subkeys. If a list contains two or more pairs, we regard the subkeys corresponding to the list as candidate subkeys. The time complexity of our attack on 30-round SIMON64/96 (SIMON64/128) is 286.2 (21182) with a success probability of 0.61, while the data complexity and the memory complexity are 263.3 and 290 bytes, respectively. 展开更多
关键词 SIMON lightweight block cipher differential attack bit condition
原文传递
Typical adaptive neural control for hypersonic vehicle based on higher-order filters 被引量:4
8
作者 ZHAO Hewei LI Rui 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第5期1031-1040,共10页
A typical adaptive neural control methodology is used for the rigid body model of the hypersonic vehicle. The rigid body model is divided into the altitude subsystem and the velocity subsystem. The proportional integr... A typical adaptive neural control methodology is used for the rigid body model of the hypersonic vehicle. The rigid body model is divided into the altitude subsystem and the velocity subsystem. The proportional integral differential(PID) controller is introduced to control the velocity track. The backstepping design is applied for constructing the controllers for the altitude subsystem.To avoid the explosion of differentiation from backstepping, the higher-order filter dynamic is used for replacing the virtual controller in the backstepping design steps. In the design procedure,the radial basis function(RBF) neural network is investigated to approximate the unknown nonlinear functions in the system dynamic of the hypersonic vehicle. The simulations show the effectiveness of the design method. 展开更多
关键词 hypersonic vehicle adaptive neural control higher-order filter differential explosion
在线阅读 下载PDF
Differential Quadrature Method for Bending Problem of Plates with Transverse Shear Effects 被引量:4
9
作者 李晶晶 程昌钧 《Journal of Shanghai University(English Edition)》 CAS 2003年第3期228-233,共6页
A differential quadrature (DQ) method for orthotropic plates was proposed based on Reddy' s theory of plates with the effects of the higher-order transverse shear deformations. Wang-Bert's DQ approach was also... A differential quadrature (DQ) method for orthotropic plates was proposed based on Reddy' s theory of plates with the effects of the higher-order transverse shear deformations. Wang-Bert's DQ approach was also further extended to handle the boundary conditions of plates. The computational convergence was studied, and the numerical results were obtained for different grid spacings and compared with the existing results. The results show that the DQ method is fairly reliable and effective. 展开更多
关键词 differential quadrature method higher-order transverse shear deformation effect of grid spacing numerical convergence.
在线阅读 下载PDF
Privacy Protection Algorithm for the Internet of Vehicles Based on Local Differential Privacy and Game Model 被引量:5
10
作者 Wenxi Han Mingzhi Cheng +3 位作者 Min Lei Hanwen Xu Yu Yang Lei Qian 《Computers, Materials & Continua》 SCIE EI 2020年第8期1025-1038,共14页
In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly prominent.The research on the privacy protectio... In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly prominent.The research on the privacy protection of the IoV has become the focus of the society.This paper analyzes the advantages and disadvantages of the existing location privacy protection system structure and algorithms,proposes a privacy protection system structure based on untrusted data collection server,and designs a vehicle location acquisition algorithm based on a local differential privacy and game model.The algorithm first meshes the road network space.Then,the dynamic game model is introduced into the game user location privacy protection model and the attacker location semantic inference model,thereby minimizing the possibility of exposing the regional semantic privacy of the k-location set while maximizing the availability of the service.On this basis,a statistical method is designed,which satisfies the local differential privacy of k-location sets and obtains unbiased estimation of traffic density in different regions.Finally,this paper verifies the algorithm based on the data set of mobile vehicles in Shanghai.The experimental results show that the algorithm can guarantee the user’s location privacy and location semantic privacy while satisfying the service quality requirements,and provide better privacy protection and service for the users of the IoV. 展开更多
关键词 The Internet of Vehicles privacy protection local differential privacy location semantic inference attack game theory
在线阅读 下载PDF
Fourth-Order Splitting Methods for Time-Dependant Differential Equations 被引量:2
11
作者 Jürgen Geiser 《Numerical Mathematics(Theory,Methods and Applications)》 SCIE 2008年第3期321-339,共19页
This study was suggested by previous work on the simulation of evolution equations with scale-dependent processes,e.g.,wave-propagation or heat-transfer,that are modeled by wave equations or heat equations.Here,we stu... This study was suggested by previous work on the simulation of evolution equations with scale-dependent processes,e.g.,wave-propagation or heat-transfer,that are modeled by wave equations or heat equations.Here,we study both parabolic and hyperbolic equations.We focus on ADI (alternating direction implicit) methods and LOD (locally one-dimensional) methods,which are standard splitting methods of lower order,e.g.second-order.Our aim is to develop higher-order ADI methods,which are performed by Richardson extrapolation,Crank-Nicolson methods and higher-order LOD methods,based on locally higher-order methods.We discuss the new theoretical results of the stability and consistency of the ADI methods.The main idea is to apply a higher- order time discretization and combine it with the ADI methods.We also discuss the dis- cretization and splitting methods for first-order and second-order evolution equations. The stability analysis is given for the ADI method for first-order time derivatives and for the LOD (locally one-dimensional) methods for second-order time derivatives.The higher-order methods are unconditionally stable.Some numerical experiments verify our results. 展开更多
关键词 Partial differential equations operator-splitting methods evolution equations ADImethods LOD methods stability analysis higher-order methods.
在线阅读 下载PDF
DIFFERENTIAL QUADRATURE METHOD FOR BENDING OF ORTHOTROPIC PLATES WITH FINITE DEFORMATION AND TRANSVERSE SHEAR EFFECTS 被引量:1
12
作者 李晶晶 程昌钧 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2004年第8期878-886,共9页
Based on the Reddy's theory of plates with the effect of higher-order shear deformations, the governing equations for bending of orthotropic plates with finite deformations were established. The differential quadr... Based on the Reddy's theory of plates with the effect of higher-order shear deformations, the governing equations for bending of orthotropic plates with finite deformations were established. The differential quadrature (DQ) method of nonlinear analysis to the problem was presented. New DQ approach, presented by Wang and Bert (DQWB), is extended to handle the multiple boundary conditions of plates. The techniques were also further extended to simplify nonlinear computations. The numerical convergence and comparison of solutions were studied. The results show that the DQ method presented is very reliable and valid. Moreover, the influences of geometric and material parameters as well as the transverse shear deformations on nonlinear bending were investigated. Numerical results show the influence of the shear deformation on the static bending of orthotropic moderately thick plate is significant. 展开更多
关键词 higher-order transverse shear deformation finite deformation differential quadrature method DQWB approach convergence and comparison study of solution
在线阅读 下载PDF
Round-robin differential quadrature phase-shift quantum key distribution 被引量:1
13
作者 Chun Zhou Ying-Ying Zhang +3 位作者 Wan-Su Bao Hong-Wei Li Yang Wang Mu-Sheng Jiang 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第2期63-67,共5页
Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phas... Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol. 展开更多
关键词 round-robin differential phase-shift protocol quantum key distribution intercept-resend attack beam-splitting attack
原文传递
Influence of multi-photon pulses on practical differential-phase-shift quantum key distribution 被引量:2
14
作者 赵峰 傅明星 +1 位作者 路轶群 刘颂豪 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第11期3402-3406,共5页
The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) at... The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) attack and BS (beam splitting) attack. The result indicates that the PNS attack and BS attack will not limit the transmission distance as long as we select an appropriate mean photon number. Also, the maximum mean photon number under BS attack in practical DPS-QKD system and the set of practical assumptions about Eve's capabilities are presented. 展开更多
关键词 multi-photon pulses differential-phase-shift quantum key distribution PNS attack BS attack
原文传递
Whispered Tuning: Data Privacy Preservation in Fine-Tuning LLMs through Differential Privacy 被引量:1
15
作者 Tanmay Singh Harshvardhan Aditya +1 位作者 Vijay K. Madisetti Arshdeep Bahga 《Journal of Software Engineering and Applications》 2024年第1期1-22,共22页
The proliferation of Large Language Models (LLMs) across various sectors underscored the urgency of addressing potential privacy breaches. Vulnerabilities, such as prompt injection attacks and other adversarial tactic... The proliferation of Large Language Models (LLMs) across various sectors underscored the urgency of addressing potential privacy breaches. Vulnerabilities, such as prompt injection attacks and other adversarial tactics, could make these models inadvertently disclose their training data. Such disclosures could compromise personal identifiable information, posing significant privacy risks. In this paper, we proposed a novel multi-faceted approach called Whispered Tuning to address privacy leaks in large language models (LLMs). We integrated a PII redaction model, differential privacy techniques, and an output filter into the LLM fine-tuning process to enhance confidentiality. Additionally, we introduced novel ideas like the Epsilon Dial for adjustable privacy budgeting for differentiated Training Phases per data handler role. Through empirical validation, including attacks on non-private models, we demonstrated the robustness of our proposed solution SecureNLP in safeguarding privacy without compromising utility. This pioneering methodology significantly fortified LLMs against privacy infringements, enabling responsible adoption across sectors. 展开更多
关键词 NLP differential Privacy Adversarial attacks Informed Decisions
在线阅读 下载PDF
Parallel Evolutionary Modeling for Nonlinear Ordinary Differential Equations
16
作者 Kang Zhuo Liu Pu Kang Li-shan 《Wuhan University Journal of Natural Sciences》 EI CAS 2001年第3期659-664,共6页
We introduce a new parallel evolutionary algorithm in modeling dynamic systems by nonlinear higher-order ordinary differential equations (NHODEs). The NHODEs models are much more universal than the traditional linear ... We introduce a new parallel evolutionary algorithm in modeling dynamic systems by nonlinear higher-order ordinary differential equations (NHODEs). The NHODEs models are much more universal than the traditional linear models. In order to accelerate the modeling process, we propose and realize a parallel evolutionary algorithm using distributed CORBA object on the heterogeneous networking. Some numerical experiments show that the new algorithm is feasible and efficient. 展开更多
关键词 parallel evolutionary algorithm higher-order ordinary differential equation CORBA
在线阅读 下载PDF
基于密度感知和差分隐私的轨迹隐私保护方案
17
作者 张磊 陈杰 +1 位作者 陈运 庞博 《计算机工程与设计》 北大核心 2026年第2期434-441,共8页
针对现有轨迹数据隐私保护方案在处理轨迹数据中的稀疏区域时,对数据可用性影响较大的问题。提出了一种基于密度感知和差分隐私的轨迹隐私保护方案。将轨迹数据集按照不同时间戳进行初始聚类,并对聚类质心应用拉普拉斯机制注入噪声,有... 针对现有轨迹数据隐私保护方案在处理轨迹数据中的稀疏区域时,对数据可用性影响较大的问题。提出了一种基于密度感知和差分隐私的轨迹隐私保护方案。将轨迹数据集按照不同时间戳进行初始聚类,并对聚类质心应用拉普拉斯机制注入噪声,有效防止数据隐私泄露。在此基础上根据聚类密度阈值,提出一种密度感知分级聚类方法,以精细化处理稀疏区域,提升轨迹数据的可用性。综合选取加噪后的初始聚类质心和分级聚类质心作为轨迹代表点,生成隐私保护的泛化轨迹,以有效抵御轨迹重构攻击和推断攻击。实验结果表明,在稀疏轨迹数据场景下,该方案在保证轨迹数据隐私性的同时显著提高数据可用性。 展开更多
关键词 轨迹隐私 密度感知 分级聚类 拉普拉斯机制 差分隐私 轨迹重构攻击 推断攻击
在线阅读 下载PDF
一种对抗GAN攻击的联邦隐私增强方法研究
18
作者 施寅生 包阳 庞晶晶 《信息网络安全》 北大核心 2026年第1期49-58,共10页
联邦学习通过分布式训练避免数据集中存储,然而,仍存在恶意客户端利用生成式对抗网络(GAN)攻击窃取隐私数据的风险。传统的差分隐私和加密机制等防御手段,存在模型性能与隐私效果权衡难或计算成本高等问题。文章针对联邦学习在图像识别... 联邦学习通过分布式训练避免数据集中存储,然而,仍存在恶意客户端利用生成式对抗网络(GAN)攻击窃取隐私数据的风险。传统的差分隐私和加密机制等防御手段,存在模型性能与隐私效果权衡难或计算成本高等问题。文章针对联邦学习在图像识别任务中面临的GAN攻击风险,提出一种基于Rényi差分隐私的隐私增强方法,旨在提升模型的数据隐私性。Rényi差分隐私的串行组合机制使得在多轮迭代中隐私预算增长速率从传统差分隐私的线性降为亚线性,可有效降低噪声添加量。文章方法利用Rényi差分隐私紧密的噪声组合特性,在客户端梯度更新参数时,通过基于权均衡权重的梯度裁剪和优化的高斯噪声添加,实现差分隐私计算,进而降低隐私泄露风险,同时平衡模型可用性。实验表明,文章方法在模型全局准确性受影响程度可接受的前提下,实现本地数据的隐私保护,增强模型的隐私保护能力,进而有效抵御GAN攻击,保障图像数据隐私性。 展开更多
关键词 联邦学习 GAN攻击 Rényi差分隐私 隐私增强
在线阅读 下载PDF
Guidance laws for attacking defended target 被引量:8
19
作者 Qilong SUN Chenfeng ZHANG +2 位作者 Ning LIU Weixue ZHOU Naiming QI 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2019年第10期2337-2353,共17页
In this paper,two new guidance laws based on differential game theory are proposed and investigated for the attacker in an attacker-defender-target scenario.The conditions for the attacker winning the game are analyze... In this paper,two new guidance laws based on differential game theory are proposed and investigated for the attacker in an attacker-defender-target scenario.The conditions for the attacker winning the game are analyzed when the target and defender using the differential game guidance law based on the linear model.The core ideas underlying the two guidance laws are the attacker evading to a critical safe boundary from the defender,and then maintaining a critical miss distance.The guidance law more appropriate for the attacker to win the game differs according to the initial parameters.Unlike other guidance laws,when using the derived guidance laws there is no need to know the target and the defender’s control efforts.The results of numerical simulations show that the attacker can evade the defender and hit the target successfully by using the proposed derived guidance laws. 展开更多
关键词 attacking Control EFFORT differential GAME theory GUIDANCE LAW MISS DISTANCE
原文传递
Secure and efficient elliptic curve cryptography resists side-channel attacks 被引量:8
20
作者 Zhang Tao Fan Mingyu Zheng Xiaoyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期660-665,共6页
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA... An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance. 展开更多
关键词 elliptic curve cryptography side channel attack simple power attack differential power attack refined power analysis zero-point power analysis.
在线阅读 下载PDF
上一页 1 2 24 下一页 到第
使用帮助 返回顶部