期刊文献+
共找到1,270篇文章
< 1 2 64 >
每页显示 20 50 100
Reliable Space Pursuing for Reliability-based Design Optimization with Black-box Performance Functions 被引量:2
1
作者 SHAN Songqing WANG G Gary 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2009年第1期27-35,共9页
Reliability-based design optimization (RBDO) is intrinsically a double-loop procedure since it involves an overall optimization and an iterative reliability assessment at each search point. Due to the double-loop pr... Reliability-based design optimization (RBDO) is intrinsically a double-loop procedure since it involves an overall optimization and an iterative reliability assessment at each search point. Due to the double-loop procedure, the computational expense of RBDO is normally very high. Current RBDO research focuses on problems with explicitly expressed performance functions and readily available gradients. This paper addresses a more challenging type of RBDO problem in which the performance functions are computation intensive. These computation intensive functions are often considered as a "black-box" and their gradients are not available or not reliable. On the basis of the reliable design space (RDS) concept proposed earlier by the authors, this paper proposes a Reliable Space Pursuing (RSP) approach, in which RDS is first identified and then gradually refined while optimization is performed. It fundamentally avoids the nested optimization and probabilistic assessment loop. Three well known RBDO problems from the literature are used for testing and demonstrating the effectiveness of the proposed RSP method. 展开更多
关键词 Reliability based design optimization black-box function reliable design space
在线阅读 下载PDF
AN ALGORITHM FOR AUTOMATICALLY GENERATING BLACK-BOX TEST CASES 被引量:3
2
作者 Xu Baowen Nie Changhai +1 位作者 Shi Qunfeng Lu Hong 《Journal of Electronics(China)》 2003年第1期74-77,共4页
Selection of test cases plays a key role in improving testing efficiency.Black-box testing is an important way of testing,and its validity lies on the selection of test cases in some sense.A reasonable and effective m... Selection of test cases plays a key role in improving testing efficiency.Black-box testing is an important way of testing,and its validity lies on the selection of test cases in some sense.A reasonable and effective method about the selection and generation of test cases is urgently needed.This letter first introduces some usualmethods on black-box test case generation,then proposes a new algorithm based on interface parameters and discusses its properties,finally shows the effectiveness of the algorithm. 展开更多
关键词 Software testing black-box testing Test case Interface parameters Combination coverage
在线阅读 下载PDF
A Fast Two-Stage Black-Box Deep Learning Network Attacking Method Based on Cross-Correlation 被引量:1
3
作者 Deyin Li Mingzhi Cheng +2 位作者 Yu Yang Min Lei Linfeng Shen 《Computers, Materials & Continua》 SCIE EI 2020年第7期623-635,共13页
Deep learning networks are widely used in various systems that require classification.However,deep learning networks are vulnerable to adversarial attacks.The study on adversarial attacks plays an important role in de... Deep learning networks are widely used in various systems that require classification.However,deep learning networks are vulnerable to adversarial attacks.The study on adversarial attacks plays an important role in defense.Black-box attacks require less knowledge about target models than white-box attacks do,which means black-box attacks are easier to launch and more valuable.However,the state-of-arts black-box attacks still suffer in low success rates and large visual distances between generative adversarial images and original images.This paper proposes a kind of fast black-box attack based on the cross-correlation(FBACC)method.The attack is carried out in two stages.In the first stage,an adversarial image,which would be missclassified as the target label,is generated by using gradient descending learning.By far the image may look a lot different than the original one.Then,in the second stage,visual quality keeps getting improved on the condition that the label keeps being missclassified.By using the cross-correlation method,the error of the smooth region is ignored,and the number of iterations is reduced.Compared with the proposed black-box adversarial attack methods,FBACC achieves a better fooling rate and fewer iterations.When attacking LeNet5 and AlexNet respectively,the fooling rates are 100%and 89.56%.When attacking them at the same time,the fooling rate is 69.78%.FBACC method also provides a new adversarial attack method for the study of defense against adversarial attacks. 展开更多
关键词 black-box adversarial attack CROSS-CORRELATION two-module
在线阅读 下载PDF
<i>PP</i>and <i>P<span style='text-decoration:overline;'>P</span></i>Multi-Particles Production Investigation Based on CCNN Black-Box Approach
4
作者 El-Sayed A. El-Dahshan 《Journal of Applied Mathematics and Physics》 2017年第6期1398-1409,共12页
The multiplicity distribution (P(nch)) of charged particles produced in a high energy collision is a key quantity to understand the mechanism of multiparticle production. This paper describes the novel application of ... The multiplicity distribution (P(nch)) of charged particles produced in a high energy collision is a key quantity to understand the mechanism of multiparticle production. This paper describes the novel application of an artificial neural network (ANN) black-box modeling approach based on the cascade correlation (CC) algorithm formulated to calculate and predict multiplicity distribution of proton-proton (antiproton) (PP and PP ) inelastic interactions full phase space at a wide range of center-mass of energy . In addition, the formulated cascade correlation neural network (CCNN) model is used to empirically calculate the average multiplicity distribution nch> as a function of . The CCNN model was designed based on available experimental data for = 30.4 GeV, 44.5 GeV, 52.6 GeV, 62.2 GeV, 200 GeV, 300 GeV, 540 GeV, 900 GeV, 1000 GeV, 1800 GeV, and 7 TeV. Our obtained empirical results for P(nch), as well as nch> for (PP and PP) collisions are compared with the corresponding theoretical ones which obtained from other models. This comparison shows a good agreement with the available experimental data (up to 7 TeV) and other theoretical ones. At full large hadron collider (LHC) energy ( = 14 TeV) we have predicted P(nch) and nch> which also, show a good agreement with different theoretical models. 展开更多
关键词 Proton-Proton and Proton-Antiproton Collisions Multiparticle PRODUCTION Multiplicity Distributions Intelligent Computational Techniques CCNN-Neural Networks black-box Modeling Approach
在线阅读 下载PDF
Investigating Black-Box Model for Wind Power Forecasting Using Local Interpretable Model-Agnostic Explanations Algorithm 被引量:1
5
作者 Mao Yang Chuanyu Xu +2 位作者 Yuying Bai Miaomiao Ma Xin Su 《CSEE Journal of Power and Energy Systems》 2025年第1期227-242,共16页
Wind power forecasting(WPF)is important for safe,stable,and reliable integration of new energy technologies into power systems.Machine learning(ML)algorithms have recently attracted increasing attention in the field o... Wind power forecasting(WPF)is important for safe,stable,and reliable integration of new energy technologies into power systems.Machine learning(ML)algorithms have recently attracted increasing attention in the field of WPF.However,opaque decisions and lack of trustworthiness of black-box models for WPF could cause scheduling risks.This study develops a method for identifying risky models in practical applications and avoiding the risks.First,a local interpretable model-agnostic explanations algorithm is introduced and improved for WPF model analysis.On that basis,a novel index is presented to quantify the level at which neural networks or other black-box models can trust features involved in training.Then,by revealing the operational mechanism for local samples,human interpretability of the black-box model is examined under different accuracies,time horizons,and seasons.This interpretability provides a basis for several technical routes for WPF from the viewpoint of the forecasting model.Moreover,further improvements in accuracy of WPF are explored by evaluating possibilities of using interpretable ML models that use multi-horizons global trust modeling and multi-seasons interpretable feature selection methods.Experimental results from a wind farm in China show that error can be robustly reduced. 展开更多
关键词 black-box model correlation analysis feature trust index local interpretability local interpretable modelagnostic explanations(LIME) wind power forecasting
原文传递
Black-Box Rare-Event Simulation for Safety Testing of AI Agents:An Overview
6
作者 Yuan-Lu Bai Zhi-Yuan Huang +1 位作者 Henry Lam Ding Zhao 《Journal of the Operations Research Society of China》 2025年第3期750-774,共25页
This paper provides an overview of black-box rare-event simulation methods applicable to the safety testing of artificial intelligence agents.We explore the challenges and efficiency criteria in black-box simulation,e... This paper provides an overview of black-box rare-event simulation methods applicable to the safety testing of artificial intelligence agents.We explore the challenges and efficiency criteria in black-box simulation,especially emphasizing the subtle occurrence and control of underestimation errors.The paper reviews various adaptive methods,such as the cross-entropy method and adaptive multilevel splitting,highlighting both their empirical effectiveness and theoretical limitations.Additionally,it offers a comparative analysis of different confidence interval constructions for crude Monte Carlo methods,aiming to mitigate underestimation errors through effective uncertainty quantification.The paper concludes with a certifiable deep importance sampling approach,using deep neural networks to develop conservative estimators that address underestimation issues. 展开更多
关键词 Rare-event simulation black-box systems AI system safety UNDERESTIMATION
原文传递
智能综合找矿模型:理论构建、方法集成与找矿实践
7
作者 肖克炎 王瑶 +6 位作者 李楠 唐瑞 王政尧 宋相龙 孙莉 邹伟 丛源 《地学前缘》 北大核心 2026年第4期12-24,共13页
随着找矿工作全面向深部与隐伏区拓展,传统预测方法与单一机器学习模型面临泛化能力弱、缺乏地质可解释性等严峻挑战。为破解上述难题,本文系统梳理了“数据与知识双驱动”智能找矿范式的发展脉络,并构建了包含“数据知识融合层、智能... 随着找矿工作全面向深部与隐伏区拓展,传统预测方法与单一机器学习模型面临泛化能力弱、缺乏地质可解释性等严峻挑战。为破解上述难题,本文系统梳理了“数据与知识双驱动”智能找矿范式的发展脉络,并构建了包含“数据知识融合层、智能建模解构层、应用验证反馈层”的三层理论架构。本文深入剖析并凝练了打破“黑箱”壁垒的关键技术路径,指出基于知识图谱嵌入与图注意力机制的协同约束是当前实现数据与知识深度融合的核心机制。研究系统阐明了该机制的工作逻辑:通过地质本体的硬约束剔除空间无关噪声,并利用协同赋权的软约束引导模型自适应关注高致矿特征,从而建立了从野外实证到模型迭代优化的完整反馈闭环。综合分析表明,双驱动模式有效实现了人类专家成矿逻辑与机器算力的高效协同,显著提升了找矿模型的可解释性与预测精度。本研究可为推动地质找矿向智能化决策跨越、培育矿业新质生产力提供系统的理论参考与指引。 展开更多
关键词 智能找矿模型 数据与知识双驱动 动态自进化 黑箱解构 机器学习 知识图谱
在线阅读 下载PDF
基于模型反演的深度强化学习黑盒迁移攻击
8
作者 陈晋音 翟建乐 +1 位作者 陈思毅 王诚熠 《小型微型计算机系统》 北大核心 2026年第3期743-750,共8页
近年来,深度强化学习(Deep Reinforcement Learning,DRL)技术在自动驾驶、智能机器人、金融交易等领域得到了广泛应用.然而,针对DRL智能体的黑盒对抗攻击仍然面临诸多挑战,例如计算成本高和迁移性有限等问题.为了解决上述问题,本文提出... 近年来,深度强化学习(Deep Reinforcement Learning,DRL)技术在自动驾驶、智能机器人、金融交易等领域得到了广泛应用.然而,针对DRL智能体的黑盒对抗攻击仍然面临诸多挑战,例如计算成本高和迁移性有限等问题.为了解决上述问题,本文提出了一种新型的黑盒迁移攻击方法.首先,通过行为克隆技术对目标智能体进行模型反演,得到影子智能体;随后,针对影子智能体设计并生成对抗样本;最后,将这些对抗样本应用于目标智能体,实现对目标的高效攻击.相比现有方法,本文的攻击方法具有以下显著优势:1)计算成本低:通过专家轨迹数据集训练影子智能体,无需复杂模型生成伪装数据;2)迁移性优越:生成的对抗样本可直接作用于未知目标模型,在不同任务和环境中均表现出稳定的攻击效果.通过在自动驾驶网络场景和OpenAI Gym仿真环境中进行大量实验,验证了所提方法的有效性和鲁棒性.本研究不仅揭示了DRL智能体潜在的安全威胁,也为提升黑盒攻击技术提供了新的思路和方向. 展开更多
关键词 深度强化学习 模仿学习 对抗攻击 黑盒攻击
在线阅读 下载PDF
面向Transformer语音识别模型的高迁移通用对抗样本生成方法
9
作者 王振 韩纪庆 +2 位作者 何勇军 郑铁然 郑贵滨 《数据采集与处理》 北大核心 2026年第1期109-116,共8页
Transformer模型的出现使得语音识别的正确率有了巨大提升。随着深度学习技术的发展,通过对抗样本来攻击语音识别系统,以了解该系统的脆弱性并进行完善,进而提高识别系统的鲁棒性。由于通用语音对抗样本对于任意语音都有效,更是受到了... Transformer模型的出现使得语音识别的正确率有了巨大提升。随着深度学习技术的发展,通过对抗样本来攻击语音识别系统,以了解该系统的脆弱性并进行完善,进而提高识别系统的鲁棒性。由于通用语音对抗样本对于任意语音都有效,更是受到了广泛关注,其关键问题是如何提高对抗样本的迁移性,进而实现高攻击成功率。本文利用Transformer类语音识别模型结构特征的相似性,通过使扰动后的语音与原始语音的中间层特征尽可能不同,以改变其中间层特征表示的规律,实现有效的通用对抗攻击。鉴于通用对抗样本需要利用与样本无关的底层声学信息,而与样本依赖的语义信息会抑制其性能,因而通过控制注意力梯度以减弱通用对抗样本对于语义上下文特征的学习,进而实现通用对抗样本的高迁移性。实验结果表明,本文所提出的通用对抗样本生成方法可以有效地提高对抗样本在Transformer类语音识别模型之间的迁移性。 展开更多
关键词 语音识别 对抗样本 黑盒攻击 注意力机制
在线阅读 下载PDF
基于CVT黑盒逆模型的电网宽频电压在线测量方法与装置开发
10
作者 周原 林硕彦 +3 位作者 彭向阳 杨鸣 司马文霞 张忠 《高电压技术》 北大核心 2026年第1期225-234,共10页
在电力系统中,电压互感器作为电压测量的主要数据来源,其在工频电压测量中展现出较高的精度。然而,面对电网中日益严峻的谐波污染问题,传统电压互感器难以提供所需的准确数据。针对这一挑战,该文提出了一种基于黑盒逆模型的电容式电压... 在电力系统中,电压互感器作为电压测量的主要数据来源,其在工频电压测量中展现出较高的精度。然而,面对电网中日益严峻的谐波污染问题,传统电压互感器难以提供所需的准确数据。针对这一挑战,该文提出了一种基于黑盒逆模型的电容式电压互感器(CVT)二次电压补偿方法,并且开发了相应的在线监测装置,以实现对电网电压的实时监测。首先,采用黑盒逆模型对CVT二次侧畸变电压进行补偿,并提出其离散求解方法与“谐波-散射参数”联合激励的模型参数获取方法;接着,完成电网宽频电压在线监测装置的硬件制作、软件设计与上位机界面开发;最后,搭建宽频电压测试平台进行高次谐波试验以验证所研制装置的准确性与实时性。提出的宽频电压在线测量装置及其相应的黑盒逆模型补偿方法,在4 kHz频率范围内,装置反演一次电压的总矢量误差(total vector error,TVE)平均值为1.51%,而折算电压的TVE平均值为23.98%,为电力系统的动态防护和优化调控提供新的技术手段和方法论支持。 展开更多
关键词 电容式电压互感器 黑盒逆模型 离散状态空间方程 谐波分析 在线测量
原文传递
可解释机器学习及其生态学应用
11
作者 石亚飞 牛富荣 +5 位作者 黄晓敏 洪星 龚相文 王艳莉 林栋 柳小妮 《生物多样性》 北大核心 2026年第1期85-98,共14页
近年来,机器学习在生态学领域的应用日益广泛,尤其在复杂的非线性数据建模方面展现出强大优势。然而,机器学习的“黑箱属性”使其难以提供清晰的结果解释,这限制了其应用范围。为解决机器学习的不透明问题,可解释机器学习(interpretable... 近年来,机器学习在生态学领域的应用日益广泛,尤其在复杂的非线性数据建模方面展现出强大优势。然而,机器学习的“黑箱属性”使其难以提供清晰的结果解释,这限制了其应用范围。为解决机器学习的不透明问题,可解释机器学习(interpretable machine learning,IML)应运而生,它致力于提高模型透明度并增强结果的可解释性。本文系统梳理了可解释机器学习中的白盒模型与黑盒模型、全局解释与局部解释、内在可解释与事后解释模型等基本概念,并基于案例数据分别应用于线性回归、决策树与随机森林等模型,展示了包括回归系数、置换特征重要性、部分依赖图、累积局部效应图、Shapley加性解释(SHAP)以及局部模型无关解释(LIME)等多种主流可解释机器学习的实现方法与生态学解释能力。研究表明,尽管白盒模型的解释也属于可解释机器学习的范畴,但当前其主要是一系列针对黑盒模型的事后解释方法的集成。其次,不同方法在解释层级、适用模型及可视化表达方面各具优势。可解释机器学习能在一定程度上填补了复杂模型预测性能与生态学解释需求之间的鸿沟,但需要基于数据情况和研究问题进行选择性应用。本文可为生态学研究人员提供可操作的分析框架,并强调可解释机器学习应当作为当前主流统计建模的重要补充,将在未来生态学研究中具有广阔的应用前景。 展开更多
关键词 机器学习 生态学解释 随机森林 黑盒模型 植物多样性
原文传递
基于全局-局部扰动协同的对抗样本增强算法
12
作者 陈润泽 叶锋 +3 位作者 黄丽清 卢晨浩 陈家祯 黄光樑 《福建师范大学学报(自然科学版)》 北大核心 2026年第2期33-42,共10页
为提升输入变换攻击中扰动的多样性、局部自适应性与迁移能力,提出一种动态全局-局部自适应扰动框架(dynamic global-local adaptive perturbations,DGLAP)。该框架集成3个核心模块用于生成并优化对抗性扰动:全局分块重组模块(global bl... 为提升输入变换攻击中扰动的多样性、局部自适应性与迁移能力,提出一种动态全局-局部自适应扰动框架(dynamic global-local adaptive perturbations,DGLAP)。该框架集成3个核心模块用于生成并优化对抗性扰动:全局分块重组模块(global block shuffling,GBS)通过跨尺度与随机扩散策略重组输入信息,以挖掘模型不变特征;局部自适应扰动模块(local adaptive perturbation,LAP)基于动态区域划分与边缘连续性约束,在图像敏感区域自适应地施加多样化变换;动态权重随机游走(dynamic weighted random walk,DWRW)机制则通过平衡探索与利用的随机策略,自适应调节各变换的权重。在ImageNet数据集上的实验结果表明,DGLAP在ResNet18、ResNet101等主流模型上的攻击成功率优于基准方法,并在对抗训练模型上展现出更强的迁移性能。 展开更多
关键词 对抗样本迁移 对抗攻击 黑盒攻击 计算机视觉 输入变换攻击
在线阅读 下载PDF
一种频率驱动的黑盒对抗攻击方法
13
作者 张准 曾逸 +2 位作者 刘启和 叶飞 周世杰 《电子科技大学学报》 北大核心 2026年第2期263-274,共12页
深入理解对抗样本的特性对保障机器学习模型安全具有重要意义。针对现有对对抗性扰动与频率成分关系认识不足的问题,对对抗性扰动在频率域中的表征进行了研究,并提出一种高效的黑盒对抗攻击方法。通过小波包分解技术对对抗样本进行多尺... 深入理解对抗样本的特性对保障机器学习模型安全具有重要意义。针对现有对对抗性扰动与频率成分关系认识不足的问题,对对抗性扰动在频率域中的表征进行了研究,并提出一种高效的黑盒对抗攻击方法。通过小波包分解技术对对抗样本进行多尺度频率分解,发现对抗性扰动主要集中于低频段的高频成分。为此设计了一种结合特定频段信息的黑盒对抗攻击算法,并引入归一化扰动可见性指数(NDV)以解决传统范数在评估连续和离散扰动时的局限性。在多个基准数据集和模型上的实验表明,该多频带组合攻击方法平均攻击成功率达99%,优于单一频段攻击方法,并在7项评估指标上表现出优越的综合性能。此外,验证了NDV指标能够有效克服传统L2范数在扰动评估中的不足. 展开更多
关键词 黑盒对抗攻击 频域 机器学习 小波包分解
在线阅读 下载PDF
基于遥感图像场景分类的频域量化对抗攻击
14
作者 王熠 李智 +3 位作者 张丽 石雪丽 刘登波 卢妤 《计算机工程》 北大核心 2026年第1期266-281,共16页
深度神经网络在遥感图像的场景分类任务中取得巨大成功。然而,由于对抗样本具有较强的可迁移性,基于遥感图像的场景分类网络的脆弱性不容忽视。为了增强遥感图像场景分类网络的鲁棒性,确保其在各种环境和条件下的可靠性和安全性,有效提... 深度神经网络在遥感图像的场景分类任务中取得巨大成功。然而,由于对抗样本具有较强的可迁移性,基于遥感图像的场景分类网络的脆弱性不容忽视。为了增强遥感图像场景分类网络的鲁棒性,确保其在各种环境和条件下的可靠性和安全性,有效提高其实际应用价值,提出一种频域的量化对抗攻击(FDQ)方法。首先,将输入图像进行离散余弦变换(DCT),在频域中利用量化筛选器有效捕捉使图像正确分类的关键特征在频域中的突出区域;然后,提出一个基于类的注意力损失,使得量化筛选器逐渐丢失这些使图像正确分类的关键特征,模型的注意力逐渐偏离与原始类别毫不相干的特征和区域。所提方法利用模型的注意力分布实现特征层级的黑盒攻击,通过找到不同网络中的共同防御漏洞,实现针对遥感图像生成且具有通用性的对抗样本。实验结果表明,FDQ方法可在遥感图像场景分类任务中成功攻击大多数最先进的深度神经网络,与目前最先进的基于遥感图像场景分类任务的攻击方法相比,FDQ在基准数据集UCM和AID上基于RegNetX-400MF架构的攻击成功率分别提高了35.43%和23.63%。实验表明FDQ具有良好的攻击性和可迁移性,很难被防御系统抵御。 展开更多
关键词 对抗攻击 对抗样本 深度神经网络 遥感图像 场景分类 黑盒攻击
在线阅读 下载PDF
基于双重引导的目标对抗攻击方法
15
作者 孙月 张兴兰 《浙江大学学报(工学版)》 北大核心 2026年第1期81-89,共9页
为了提升目标对抗样本的迁移性能,提出基于目标类别印象和正则化对抗样本双重引导的生成式对抗攻击方法.利用UNet模型的跳跃连接机制生成浅层特征的对抗扰动,增强对抗样本的攻击性.将目标类别的类印象图和标签作为输入,引导生成器生成... 为了提升目标对抗样本的迁移性能,提出基于目标类别印象和正则化对抗样本双重引导的生成式对抗攻击方法.利用UNet模型的跳跃连接机制生成浅层特征的对抗扰动,增强对抗样本的攻击性.将目标类别的类印象图和标签作为输入,引导生成器生成含有目标类别特征的对抗扰动,提高目标攻击成功率.在训练阶段对生成的对抗扰动使用Dropout技术,降低生成器对替代模型的依赖,以提升对抗样本的泛化性能.实验结果表明,在MNIST、CIFAR10以及SVHN数据集上,所提方法生成的对抗样本在ResNet18、DenseNet等分类模型上均有较好的目标迁移攻击效果,平均黑盒目标攻击成功率比基准攻击方法 MIM提高了1.6%以上,说明所提方法生成的对抗样本可以更有效地评估深度模型的鲁棒性. 展开更多
关键词 深度学习 对抗攻击 对抗样本 黑盒攻击 目标攻击
在线阅读 下载PDF
Inferring the dynamics of “black-box” systems using a learning machine 被引量:1
16
作者 Hong Zhao 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2021年第7期72-81,共10页
Given a segment of a time series of a system at a particular set of parameter values, is it possible to infer the dynamic behavior of the system in its parameter space? Here, we show that this goal can be achieved to ... Given a segment of a time series of a system at a particular set of parameter values, is it possible to infer the dynamic behavior of the system in its parameter space? Here, we show that this goal can be achieved to a certain extent using a self-evolution learning machine. It is found that following an appropriate training strategy that monotonously decreases the cost function, the learning machine in different training stages is just like the system at different parameter sets. Consequently, the dynamic properties of the system are, in turn, usually revealed in the simple-to-complex order. The underlying mechanism can be attributed to the training strategy, which results in the learning machine collapsing to a qualitatively equivalent system of the system behind the time series. Thus, the learning machine enables a novel way of probing the dynamic properties of a “black-box” system without artificially establishing the equations of motion. The given illustrative examples include a representative model of low-dimensional nonlinear dynamical systems and a spatiotemporal model of reaction-diffusion systems. 展开更多
关键词 PREDICTION learning machine inverse problems black-box”system nonlinear dynamics
原文传递
Probabilistic movement primitive based motion learning for a lower limb exoskeleton with black-box optimization 被引量:1
17
作者 Jiaqi WANG Yongzhuo GAO +1 位作者 Dongmei WU Wei DONG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第1期104-116,共13页
As a wearable robot,an exoskeleton provides a direct transfer of mechanical power to assist or augment the wearer’s movement with an anthropomorphic configuration.When an exoskeleton is used to facilitate the wearer... As a wearable robot,an exoskeleton provides a direct transfer of mechanical power to assist or augment the wearer’s movement with an anthropomorphic configuration.When an exoskeleton is used to facilitate the wearer’s movement,a motion generation process often plays an important role in high-level control.One of the main challenges in this area is to generate in real time a reference trajectory that is parallel with human intention and can adapt to different situations.In this paper,we first describe a novel motion modeling method based on probabilistic movement primitive(ProMP)for a lower limb exoskeleton,which is a new and powerful representative tool for generating motion trajectories.To adapt the trajectory to different situations when the exoskeleton is used by different wearers,we propose a novel motion learning scheme based on black-box optimization(BBO)PIBB combined with ProMP.The motion model is first learned by ProMP offline,which can generate reference trajectories for use by exoskeleton controllers online.PIBB is adopted to learn and update the model for online trajectory generation,which provides the capability of adaptation of the system and eliminates the effects of uncertainties.Simulations and experiments involving six subjects using the lower limb exoskeleton HEXO demonstrate the effectiveness of the proposed methods. 展开更多
关键词 Lower limb exoskeleton Human-robot interaction Motion learning Trajectory generation Movement primitive black-box optimization
原文传递
Optimization of operating conditions in the steam turbine blade cascade using the black-box method 被引量:1
18
作者 Vahid Sadrian Esmail Lakzian +3 位作者 Davood Hoseinzade Behrad Haghighi M.M.Rashidi Heuy Dong Kim 《Propulsion and Power Research》 SCIE 2023年第4期467-485,共19页
Water droplets cause corrosion and erosion,condensation loss,and thermal efficiency reduction in low-pressure steam turbines.In this study,multi-objective optimization was carried out using the black-box method throug... Water droplets cause corrosion and erosion,condensation loss,and thermal efficiency reduction in low-pressure steam turbines.In this study,multi-objective optimization was carried out using the black-box method through the automatic linking of a genetic algorithm(GA)and a computational fluid dynamics(CFD)code to find the optimal values of two design variables(inlet stagnation temperature and cascade pressure ratio)to reduce wetness in the last stages of turbines.The wet steam flow numerical model was used to calculate the optimization parameters,including wetness fraction rate,mean droplet radius,erosion rate,condensation loss rate,kinetic energy rate,and mass flow rate.Examining the validation results showed a good agreement between the experimental data and the numerical outcomes.According to the optimization results,the inlet stagnation temperature and the cascade pressure ratio were proposed to be 388.67(K)and 0.55(-),respectively.In particular,the suggested optimaltemperature and pressure ratio improved the liquid mass fraction and mean droplet radius by about 32%and 29%,respectively.Also,in the identified optimal operating state,the ratios of erosion,condensation loss,and kinetic energy fell by 76%,32.7%,and 15.85%,respectively,while the mass flow rate ratio rose by 0.68%. 展开更多
关键词 black-box optimization Wet steam flow Steam turbine cascade Erosion rate Condensation loss
原文传递
Black-box membership inference attacks based on shadow model 被引量:1
19
作者 Han Zhen Zhou Wen'an +1 位作者 Han Xiaoxuan Wu Jie 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2024年第4期1-16,共16页
Membership inference attacks on machine learning models have drawn significant attention.While current research primarily utilizes shadow modeling techniques,which require knowledge of the target model and training da... Membership inference attacks on machine learning models have drawn significant attention.While current research primarily utilizes shadow modeling techniques,which require knowledge of the target model and training data,practical scenarios involve black-box access to the target model with no available information.Limited training data further complicate the implementation of these attacks.In this paper,we experimentally compare common data enhancement schemes and propose a data synthesis framework based on the variational autoencoder generative adversarial network(VAE-GAN)to extend the training data for shadow models.Meanwhile,this paper proposes a shadow model training algorithm based on adversarial training to improve the shadow model's ability to mimic the predicted behavior of the target model when the target model's information is unknown.By conducting attack experiments on different models under the black-box access setting,this paper verifies the effectiveness of the VAE-GAN-based data synthesis framework for improving the accuracy of membership inference attack.Furthermore,we verify that the shadow model,trained by using the adversarial training approach,effectively improves the degree of mimicking the predicted behavior of the target model.Compared with existing research methods,the method proposed in this paper achieves a 2%improvement in attack accuracy and delivers better attack performance. 展开更多
关键词 machine learning membership inference attack shadow model black-box model
原文传递
自动黑箱优化算法设计:进展与挑战
20
作者 邱文杰 郭泓树 +2 位作者 马泽原 张军 龚月姣 《计算机学报》 北大核心 2026年第4期855-884,共30页
工程与科学计算等领域中优化任务的规模和复杂性不断增长,传统依赖专家经验的人工优化算法设计在开发成本与泛化能力方面面临瓶颈。作为一种新兴的自动黑箱优化算法设计范式,元黑箱优化(MetaBBO)旨在从问题分布中学习可泛化的设计策略,... 工程与科学计算等领域中优化任务的规模和复杂性不断增长,传统依赖专家经验的人工优化算法设计在开发成本与泛化能力方面面临瓶颈。作为一种新兴的自动黑箱优化算法设计范式,元黑箱优化(MetaBBO)旨在从问题分布中学习可泛化的设计策略,逐渐成为智能优化与进化计算领域的研究热点。本文首先定义了元黑箱优化的基本概念与双层优化架构。随后,基于优化器空间与决策空间两类互补视角,系统化地梳理了五类核心元任务的研究进展:优化器空间中的算法“选择”、“配置”、“组装”与“生成”,以及决策空间中的“求解操作”。进一步,本文深入探讨了大语言模型在元黑箱优化中的应用前景与挑战,指出其在实现端到端一体化优化流程中的潜力与局限。最后,针对当前方法在问题理解、模型构建与训练机制等方面的不足,本文提出了构建多样化问题集、引入高效学习机制以及发展混合任务基座模型等多项研究展望,旨在推动元黑箱优化朝向更高程度的通用性、自动化,灵活性与实用性发展,从而为现实复杂优化问题的高效求解提供先进算法支持。 展开更多
关键词 黑箱优化 元黑箱优化 元学习 自动算法设计 进化计算
在线阅读 下载PDF
上一页 1 2 64 下一页 到第
使用帮助 返回顶部