Deep neural networks(DNNs)have found extensive applications in safety-critical artificial intelligence systems,such as autonomous driving and facial recognition systems.However,recent research has revealed their susce...Deep neural networks(DNNs)have found extensive applications in safety-critical artificial intelligence systems,such as autonomous driving and facial recognition systems.However,recent research has revealed their susceptibility to backdoors maliciously injected by adversaries.This vulnerability arises due to the intricate architecture and opacity of DNNs,resulting in numerous redundant neurons embedded within the models.Adversaries exploit these vulnerabilities to conceal malicious backdoor information within DNNs,thereby causing erroneous outputs and posing substantial threats to the efficacy of DNN-based applications.This article presents a comprehensive survey of backdoor attacks against DNNs and the countermeasure methods employed to mitigate them.Initially,we trace the evolution of the concept from traditional backdoor attacks to backdoor attacks against DNNs,highlighting the feasibility and practicality of generating backdoor attacks against DNNs.Subsequently,we provide an overview of notable works encompassing various attack and defense strategies,facilitating a comparative analysis of their approaches.Through these discussions,we offer constructive insights aimed at refining these techniques.Finally,we extend our research perspective to the domain of large language models(LLMs)and synthesize the characteristics and developmental trends of backdoor attacks and defense methods targeting LLMs.Through a systematic review of existing studies on backdoor vulnerabilities in LLMs,we identify critical open challenges in this field and propose actionable directions for future research.展开更多
The defense mechanisms induced in wild Chinese pine(Pinus tabuliformis)in response to herbivores are not well characterized,especially in the field.To address this knowledge gap,we established a biological model syste...The defense mechanisms induced in wild Chinese pine(Pinus tabuliformis)in response to herbivores are not well characterized,especially in the field.To address this knowledge gap,we established a biological model system to evaluate proteome variations in pine needles after feeding by the Chinese pine caterpillar(Dendrolimus tabulaeformis),a major natural enemy and dominant herbivore.Quantitative tandem mass tag(TMT)proteomics and bioinformatics were utilized to systematically identify differentially abundant proteins implicated in the induced defense response of Chinese pine.We validated key protein changes using parallel reaction monitoring(PRM)technology.Pathway analysis revealed that the induced defenses involved phenylpropanoid,coumarin,and flavonoid biosynthesis,among other processes.To elucidate the regulatory patterns underlying pine resistance,we determined the activities of defense enzymes and levels of physiological and biochemical compounds.In addition,the expression of upstream genes for key proteins was validated by qRT-PCR.Our results provide new molecular insights into the induced defense mechanisms in Chinese pine against this caterpillar in the field.A better understanding of these defense strategies will inform efforts to breed more-resistant pine varieties.展开更多
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become ...As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and industry.However,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial attacks.Adversarial examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong results.Therefore,the security of AI models for the digital communication signals identification is the premise of its efficient and credible applications.In this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial principle.Next we present more detailed adversarial indicators to evaluate attack and defense behavior.Finally,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.展开更多
The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system efficiency.Federated learning o...The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system efficiency.Federated learning offers a promising solution by allowing multiple clients to train models collaboratively without sharing private data.However,despite its privacy benefits,federated learning systems are vulnerable to poisoning attacks,where adversaries alter local model parameters on compromised clients and send malicious updates to the server,potentially compromising the global model’s accuracy.In this study,we introduce PMM(Perturbation coefficient Multiplied by Maximum value),a new poisoning attack method that perturbs model updates layer by layer,demonstrating the threat of poisoning attacks faced by federated learning.Extensive experiments across three distinct datasets have demonstrated PMM’s ability to significantly reduce the global model’s accuracy.Additionally,we propose an effective defense method,namely CLBL(Cluster Layer By Layer).Experiment results on three datasets have confirmed CLBL’s effectiveness.展开更多
The Nicotiana genus, commonly known as tobacco, holds significant importance as a crucial economic crop. Confrontedwith an abundance of herbivorous insects that pose a substantial threat to yield, tobacco has develope...The Nicotiana genus, commonly known as tobacco, holds significant importance as a crucial economic crop. Confrontedwith an abundance of herbivorous insects that pose a substantial threat to yield, tobacco has developed adiverse and sophisticated array of mechanisms, establishing itself as a model of plant ecological defense. Thisreview provides a concise overview of the current understanding of tobacco’s defense strategies against herbivores.Direct defenses, exemplified by its well-known tactic of secreting the alkaloid nicotine, serve as a potent toxinagainst a broad spectrum of herbivorous pests. Moreover, in response to herbivore attacks, tobacco enhancesthe discharge of volatile compounds, harnessing an indirect strategy that attracts the predators of the herbivores.The delicate balance between defense and growth leads to the initiation of most defense strategies only after aherbivore attack. Among plant hormones, notably jasmonic acid (JA), play central roles in coordinating thesedefense processes. JA signaling interacts with other plant hormone signaling pathways to facilitate the extensivetranscriptional and metabolic adjustments in plants following herbivore assault. By shedding light on these ecologicaldefense strategies, this review emphasizes not only tobacco’s remarkable adaptability in its natural habitatbut also offers insights beneficial for enhancing the resilience of current crops.展开更多
Deep neural networks(DNN)have achieved unprecedented success in numerous machine learning tasks in various domains.However,the existence of adversarial examples raises our concerns in adopting deep learning to safety-...Deep neural networks(DNN)have achieved unprecedented success in numerous machine learning tasks in various domains.However,the existence of adversarial examples raises our concerns in adopting deep learning to safety-critical applications.As a result,we have witnessed increasing interests in studying attack and defense mechanisms for DNN models on different data types,such as images,graphs and text.Thus,it is necessary to provide a systematic and comprehensive overview of the main threats of attacks and the success of corresponding countermeasures.In this survey,we review the state of the art algorithms for generating adversarial examples and the countermeasures against adversarial examples,for three most popular data types,including images,graphs and text.展开更多
The study was conducted to investigate fasting effects on flesh composition and antioxidant defenses of market-size Sparus macrocephalus. Two hundred fish (main initial weight 580 g) were divided into two groups (cont...The study was conducted to investigate fasting effects on flesh composition and antioxidant defenses of market-size Sparus macrocephalus. Two hundred fish (main initial weight 580 g) were divided into two groups (control and fasted) and reared in 6 cages. After two weeks of adaptation, group I fasted for 28 d; group II was fed normally as a control. In 3, 7, 14, 21 and 28 d, 6 fish per group were sampled for proximate flesh composition, liver antioxidant enzyme activities and malondialdehyde flesh content analyses. In fasted fish, the reduction of lipid content in muscle occurred after day 3, and, compared to controls, the content of protein decreased from day 14, the activities of liver antioxidative enzymes superoxide dismutase (SOD) and glutathione peroxidase (GPX) increased from day 3, and flesh malondialdehyde levels increased from day 21. Flesh fat reduction shows that fasting may be used as a technique to reduce flesh lipid content in Sparus macrocephalus. However, considering flesh protein loss and the subsequent oxidative stress, the fasting technique should be used with precautions.展开更多
Abstract Many rodents exhibit inducible defenses when exposed to chemical cues from mammalian predators. These responses may include delays in sexual maturation, smaller adult body size and decreases in litter size an...Abstract Many rodents exhibit inducible defenses when exposed to chemical cues from mammalian predators. These responses may include delays in sexual maturation, smaller adult body size and decreases in litter size and pup weight. We exposed the hybrid juvenile offspring of field-caught and lab-descended house mice Mus musculus to the chemical cues of mouse-fed or chick-fed kingsnakes, Lampropeltis getula, for 20 days after weaning, to examine the effects of ophidian predator cues on prey development. We hypothesized that these cues would elicit inducible defenses such as alteration of growth rates, and/or the timing of reproductive development in mice. Once mature, the reproductive effort of the mice might also be impacted by producing smaller litter sizes or lighter pups or not reproducing at all. We found no effect of kingsnake cues on any of the measures. These findings support the hypothesis that inducible defenses may have evolved as a strategy to deal with specific predators.展开更多
In recent years,machine learning has become more and more popular,especially the continuous development of deep learning technology,which has brought great revolutions to many fields.In tasks such as image classificat...In recent years,machine learning has become more and more popular,especially the continuous development of deep learning technology,which has brought great revolutions to many fields.In tasks such as image classification,natural language processing,information hiding,multimedia synthesis,and so on,the performance of deep learning has far exceeded the traditional algorithms.However,researchers found that although deep learning can train an accurate model through a large amount of data to complete various tasks,the model is vulnerable to the example which is modified artificially.This technology is called adversarial attacks,while the examples are called adversarial examples.The existence of adversarial attacks poses a great threat to the security of the neural network.Based on the brief introduction of the concept and causes of adversarial example,this paper analyzes the main ideas of adversarial attacks,studies the representative classical adversarial attack methods and the detection and defense methods.展开更多
China enterprises should develop dynamic strategic alliances if they want to participate in global contests and share strategic targets of global resources. The effective risk defenses system must be set up to make dy...China enterprises should develop dynamic strategic alliances if they want to participate in global contests and share strategic targets of global resources. The effective risk defenses system must be set up to make dynamic strategic alliances run successfully. This paper puts forward a mode of risk defenses internal system through analyzing the facts of China enterprises dynamic strategic alliances' creative models.展开更多
Objective: Humans are increasingly exposed to artificial light and electromagnetic wave radiation, in addition to solar radiation. Many studies have shown the biological effects of ultra-violet and near-infrared expos...Objective: Humans are increasingly exposed to artificial light and electromagnetic wave radiation, in addition to solar radiation. Many studies have shown the biological effects of ultra-violet and near-infrared exposure, but few have extensively investigated the innate biological defenses within human tissues against visible light and near-infrared exposure. Herein, we investigated spectral properties of endogenous human biological defenses against ultra-violet to near-infrared. Methods: A double-beam spectrophotometer (190 - 2700 nm) was used to measure the transmission spectra of a saline solution used to imitate perspiration, and oil to imitate sebum, as well as human skin, blood, adipose tissue, and muscle. Results: Saline (thickness, 0.5 mm) blocked 27.5% - 98.6% of ultra-violet, 13.2% - 34.3% of visible light, and 10.7% - 99.8% of near-infrared. Oil (thickness, 0.5 mm) blocked 50.5% - 100% of ultra-violet, 28.7% - 54.8% of visible light, and 19.0% - 98.3% of near-infrared. Blood thicknesses of 0.05 and 0.5 mm blocked over 97.8%, 100% of ultra-violet, over 94.6%, 99.7% of visible light, and over 75.8%, 99.4% of near-infrared, respectively. Skin thicknesses of 0.25 and 0.5 mm blocked over 99.4%, 100% of ultra-violet and over 94.3%, 99.7% of visible light, and over 74.7%, 93.5% of near-infrared, respectively. Adipose tissue thickness of 0.25 and0.5 mm blocked over 98.3%, 100% of ultra-violet, over 94.7%, 99.7% of visible light, and over 88.1%, 98.6% of near-infrared, respectively. Muscle thickness of 0.25 and0.5 mm blocked over 95.4%, 99.8% of ultra-violet, over 93.1%, 99.5% of visible light, and over 86.9%, 98.3% of near-infrared, respectively. Conclusions: Humans possess endogenous biological protection against ultra-violet, visible light and near-infrared exposure on multiple levels, including through perspiration, sebum, blood, skin, adipose tissue, and muscle. Since solar and artificial radiation affects human tissues, biological defenses made of biological materials may be induced to protect subcutaneous tissues against these wavelengths.展开更多
Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.Howe...Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.However,security problems in cyberspace are becoming serious,and traditional defense measures(e.g.,firewall,intrusion detection systems,and security audits)often fall into a passive situation of being prone to attacks and difficult to take effect when responding to new types of network attacks with a higher and higher degree of coordination and intelligence.By constructing and implementing the diverse strategy of dynamic transformation,the configuration characteristics of systems are constantly changing,and the probability of vulnerability exposure is increasing.Therefore,the difficulty and cost of attack are increasing,which provides new ideas for reversing the asymmetric situation of defense and attack in cyberspace.Nonetheless,few related works systematically introduce dynamic defense mechanisms for cyber security.The related concepts and development strategies of dynamic defense are rarely analyzed and summarized.To bridge this gap,we conduct a comprehensive and concrete survey of recent research efforts on dynamic defense in cyber security.Specifically,we firstly introduce basic concepts and define dynamic defense in cyber security.Next,we review the architectures,enabling techniques and methods for moving target defense and mimic defense.This is followed by taxonomically summarizing the implementation and evaluation of dynamic defense.Finally,we discuss some open challenges and opportunities for dynamic defense in cyber security.展开更多
With the rapid developments of artificial intelligence(AI)and deep learning(DL)techniques,it is critical to ensure the security and robustness of the deployed algorithms.Recently,the security vulnerability of DL algor...With the rapid developments of artificial intelligence(AI)and deep learning(DL)techniques,it is critical to ensure the security and robustness of the deployed algorithms.Recently,the security vulnerability of DL algorithms to adversarial samples has been widely recognized.The fabricated samples can lead to various misbehaviors of the DL models while being perceived as benign by humans.Successful implementations of adversarial attacks in real physical-world scenarios further demonstrate their practicality.Hence,adversarial attack and defense techniques have attracted increasing attention from both machine learning and security communities and have become a hot research topic in recent years.In this paper,we first introduce the theoretical foundations,algorithms,and applications of adversarial attack techniques.We then describe a few research efforts on the defense techniques,which cover the broad frontier in the field.Several open problems and challenges are subsequently discussed,which we hope will provoke further research efforts in this critical area.展开更多
Plants release large amounts of volatile organic compounds(VOCs)in response to attackers.Several VOCs can serve as volatile signals to elicit defense responses in undamaged tissues and neighboring plants,but many ques...Plants release large amounts of volatile organic compounds(VOCs)in response to attackers.Several VOCs can serve as volatile signals to elicit defense responses in undamaged tissues and neighboring plants,but many questions about the ecological functions of VOCs remain unanswered.Tea plants are impacted by two harmful invaders,the piercing herbivore Empoasca(Matsumurasca)onukii Matsuda and the pathogen Colletotrichum fructicola.To determine the VOC signals in tea,we confirmed CsOPR3 as a marker gene and set up a rapid screening method based on a 1.51 kb CsOPR3 promoter fused with aβ-glucuronidase(GUS)reporter construct(OPR3p::GUS)in Arabidopsis.Using this screening system,a terpenoid volatile(E)-nerolidol was identified as a potent signal that elicits plant defenses.The early responses triggered by(E)-nerolidol included the activation of a mitogen-activated protein kinase and WRKY,an H2O2 burst,and the induction of jasmonic acid and abscisic acid signaling.The induced plants accumulated high levels of defenserelated chemicals,which possessed broad-spectrum anti-herbivore or anti-pathogen properties,and ultimately triggered resistance against Empoasca onukii and Colletotrichum fructicola in tea.We propose that these findings can supply an environmentally friendly management strategy for controlling an insect pest and a disease of tea plants.展开更多
Jasmonic acid(JA)plays important roles in plant resistance to insect herbivores.One important derivative of JA is 12-OH-JA,which is produced by two independent pathways:direct hydroxylation of JA by jasmonate-induced ...Jasmonic acid(JA)plays important roles in plant resistance to insect herbivores.One important derivative of JA is 12-OH-JA,which is produced by two independent pathways:direct hydroxylation of JA by jasmonate-induced oxygenases(JOXs)or hydrolyzation of 12-OH-JA-Ile.Yet the function of 12-OH-JA in plant-herbivore interactions remains largely unknown.In this study,we silenced four JOX homologs independently in the wild tobacco Nicotiana attenuata by virus-induced gene silencing(VIGS),and found that all four JOX homologs are involved in JA hydroxylation.Simultaneously silencing the four JA hydroxylases in VIGS-NaJOXs plants decreased herbivory-induced 12-OH-JA by 33%,but JA and JA-Ile levels increased by 45%and 30%,respectively,compared to those in control plants.Compared to direct hydroxylation from JA,hydrolyzation from 12-OH-JA-Ile is equally important for herbivory-induced 12-OHJA accumulation:in the 12-OH-JA-Ile deficient irJAR4/6 plants,12-OH-JA decreased 34%.Moreover,VIGSNaJOXs plants exhibited enhanced resistance to the generalist herbivore Spodoptera litura.The poor larval performance was strongly correlated with high levels of several JA-Ile-dependent direct defense metabolites in the VIGS-NaJOXs plants.When we simultaneously silenced all four JA hydroxylases in the JAIle-deficient irJAR4/6 background,the enhanced herbivore resistance diminished,demonstrating that enhanced herbivore resistance resulted from elevated JA-Ile levels.Given that silencing these NaJOX-like genes did not detectably alter plant growth but highly increased plant defense levels,we propose that JOX genes are potential targets for genetic improvement of herbivore-resistant crops.展开更多
Three crucial hurdles hinder studies on human cytomegalovirus(HCMV): strict species specificity, differences between in vivo and in vitro infection, and the complexity of gene regulation. Ever since the sequencing of ...Three crucial hurdles hinder studies on human cytomegalovirus(HCMV): strict species specificity, differences between in vivo and in vitro infection, and the complexity of gene regulation. Ever since the sequencing of the whole genome was first accomplished, functional studies on individual genes have been the mainstream in the CMV field. Gene regulation has therefore been elucidated in a more detailed fashion. However, viral gene regulation is largely controlled by both cellular and viral components. In other words, viral gene expression is determined by the virus–host interaction. Generally, cells respond to viral infection in a defensive pattern; at the same time, viruses try to counteract the cellular defense or else hide in the host(latency). Viruses evolve effective strategies against cellular defense in order to achieve replicative success. Whether or not they are successful, cellular defenses remain in the whole viral replication cycle: entry, immediate–early(IE) gene expression, early gene expression, DNA replication, late gene expression, and viral egress. Many viral strategies against cellular defense, and which occur in the immediate–early time of viral infection, have been documented. In this review, we will summarize the documented biological functions of IE1 and pp71 proteins, especially with regard to how they counteract cellular intrinsic defenses.展开更多
Plants have to cope with several abiotic stresses,including salinity and heavymetals(HMs).Under these stresses,several extracts have been used as effective natural biostimulants,however,the use of Spirulina platensis(...Plants have to cope with several abiotic stresses,including salinity and heavymetals(HMs).Under these stresses,several extracts have been used as effective natural biostimulants,however,the use of Spirulina platensis(SP)extract(SPE)remains elusive.The effects of SPE were evaluated as soil addition(SA)and/or foliar spraying(FS)on antioxidant defenses and HMs content of common bean grown in saline soil contaminated with HMs.Individual(40 or 80 mg SPE/hill added as SA or 20 or 40 mg SPE/plant added as FS)or integrative(SA+FS)applications of SPE showed significant improvements in the following order:SA-80+FS-40>SA-80+FS-20>SA-40+FS-40>SA-40+FS-20>SA-80>SA-40>FS-40>FS-20>control.Therefore,the integrative SA+FS with 40 mg SP/plant was the most effective treatment in increasing plant growth and production,overcoming stress effects and minimizing contamination of the edible part.It significantly increased plant growth(74%–185%)and yield(107%–227%)by enhancing net photosynthetic rate(78.5%),stomatal conductance(104%),transpiration rate(124%),and contents of carotenoids(60.0%),chlorophylls(49%–51%),and NPK(271%–366%).These results were concurrent with the marked reductions in malondialdehyde(61.6%),hydrogen peroxide(42.2%),nickel(91%–94%),lead(80%–9%),and cadmium(74%–91%)contents due to the improved contents of glutathione(87.1%),ascorbate(37.0%),andα-tocopherol(77.2%),and the activities of catalase(18.1%),ascorbate peroxidase(18.3%),superoxide dismutase(192%),and glutathione reductase(52.2%)as reinforcing mechanisms.Therefore,this most effective treatment is recommended to mitigate the stress effects of salinity and HMs on common bean production while minimizing HMs in the edible part.展开更多
Obligate brood parasitism,which refers to parasitic birds,fish,and insects that lay eggs in host nests,imposes strong selective pressure on hosts because the reproductive output of hosts is reduced considerably or eli...Obligate brood parasitism,which refers to parasitic birds,fish,and insects that lay eggs in host nests,imposes strong selective pressure on hosts because the reproductive output of hosts is reduced considerably or eliminated completely while the foster parents provide extra-parental care to unrelated nestlings(Soler 2016).After parasites succeed in laying eggs,egg rejection by hosts plays an important role in avoiding parasitism by recognition and rejection of parasite eggs from host nests(Yang et al.2014).展开更多
Conversion of inorganic nitrogen by mutualistic nitrogen-fixing bacteria is essential for plant growth and reproduction, as well as the development of chemical and mechanical defenses. It is unclear, however, how thes...Conversion of inorganic nitrogen by mutualistic nitrogen-fixing bacteria is essential for plant growth and reproduction, as well as the development of chemical and mechanical defenses. It is unclear, however, how these bacteria alter co-occurring symbioses at higher trophic levels;e.g., extrafloral nectary (EFN) induction, in response to herbivory, to attract defensive mutualists. We hypothesized that plants colonized by nitrogen-fixing bacteria would mount a larger inducible, defensive response than plants lacking symbioses, as defensive traits are costly. We predicted that bean plants, Vicia faba L., harboring Rhizobium leguminosarum bv. viciae Frank would produce more EFNs upon leaf damage, than plants lacking the symbionts, as EFN induction in V. faba is resource-dependent. Here we report that V. faba colonized by R. leguminosarum produced similar numbers of EFNs as did plants without symbionts. Plants with symbionts, however, produced significantly fewer EFNs over 1 week in response to leaf damage, than those without leaf damage. As such, nitrogen-fixing bacteria may not always benefit the host plant, but rather, the utility of these bacteria may be dependent on the prevailing ecological conditions.展开更多
A class of phenolic compounds, ortho-dihydroxyphenols (hereafter “o-DHP”), has been implicated with seed survival. Based on expectations of the growth-differentiation balance hypothesis, we predicted that seed o-DHP...A class of phenolic compounds, ortho-dihydroxyphenols (hereafter “o-DHP”), has been implicated with seed survival. Based on expectations of the growth-differentiation balance hypothesis, we predicted that seed o-DHP concentration exhibits a curvilinear response to increasing resource availability in the maternal environment, with maximum o-DHP occurring at moderate resource levels. To test this hypothesis, Abutilon theophrasti seeds were produced under field conditions at two locations. Each location included twelve maternal environments established through factorial combinations of soil compost (+/-), species assemblage (A. theophrasti with and without maize), and soil nitrogen fertilizer (0, 0.5× or 1× local recommendations for maize). Resource availability with respect to A. theophrasti growth was summarized by above-ground biomass at seed harvest (maternal biomass). Results indicated that seed o-DHP concentrations increased then decreased in response to increasing maternal biomass. This relationship was modeled with a unimodal function specific to location (Location 1, y = 1.18 + 0.03xe-0.02x, pseudo-R2 = 0.59, p = 0.003;Location 2, y = 1.40 + 0.006xe-0.005x;pseudo-R2 = 0.34, p = 0.05). Seed protein concentrations remained constant across maternal biomass levels. Because inherent vulnerability to predation and decay is considered a consequence of chemical protection relative to nutritional offering, our results suggest that A. theophrasti seed susceptibility to lethal attack is influenced by resource levels in the maternal environment. More broadly, our results suggest that the growth-differentiation balance hypothesis can be extended to maternal effects on seed phenolics.展开更多
基金supported in part by the National Natural Science Foundation of China under Grants No.62372087 and No.62072076the Research Fund of State Key Laboratory of Processors under Grant No.CLQ202310the CSC scholarship.
文摘Deep neural networks(DNNs)have found extensive applications in safety-critical artificial intelligence systems,such as autonomous driving and facial recognition systems.However,recent research has revealed their susceptibility to backdoors maliciously injected by adversaries.This vulnerability arises due to the intricate architecture and opacity of DNNs,resulting in numerous redundant neurons embedded within the models.Adversaries exploit these vulnerabilities to conceal malicious backdoor information within DNNs,thereby causing erroneous outputs and posing substantial threats to the efficacy of DNN-based applications.This article presents a comprehensive survey of backdoor attacks against DNNs and the countermeasure methods employed to mitigate them.Initially,we trace the evolution of the concept from traditional backdoor attacks to backdoor attacks against DNNs,highlighting the feasibility and practicality of generating backdoor attacks against DNNs.Subsequently,we provide an overview of notable works encompassing various attack and defense strategies,facilitating a comparative analysis of their approaches.Through these discussions,we offer constructive insights aimed at refining these techniques.Finally,we extend our research perspective to the domain of large language models(LLMs)and synthesize the characteristics and developmental trends of backdoor attacks and defense methods targeting LLMs.Through a systematic review of existing studies on backdoor vulnerabilities in LLMs,we identify critical open challenges in this field and propose actionable directions for future research.
基金supported by the Science and Technology Development Program of Hebei Agricultural University,the Research on Molecular Mechanisms of Population Differentiation and Adaptation of Forest Pests and Insects under Environmental Stress(grant No.:30771739)Forest Pests and Diseases(grant No.:1528003)the National Natural Science Foundation of China for the study of community regulatory mechanisms of insect pest pandemics in larch plantation forests(Grant No.:32371882).
文摘The defense mechanisms induced in wild Chinese pine(Pinus tabuliformis)in response to herbivores are not well characterized,especially in the field.To address this knowledge gap,we established a biological model system to evaluate proteome variations in pine needles after feeding by the Chinese pine caterpillar(Dendrolimus tabulaeformis),a major natural enemy and dominant herbivore.Quantitative tandem mass tag(TMT)proteomics and bioinformatics were utilized to systematically identify differentially abundant proteins implicated in the induced defense response of Chinese pine.We validated key protein changes using parallel reaction monitoring(PRM)technology.Pathway analysis revealed that the induced defenses involved phenylpropanoid,coumarin,and flavonoid biosynthesis,among other processes.To elucidate the regulatory patterns underlying pine resistance,we determined the activities of defense enzymes and levels of physiological and biochemical compounds.In addition,the expression of upstream genes for key proteins was validated by qRT-PCR.Our results provide new molecular insights into the induced defense mechanisms in Chinese pine against this caterpillar in the field.A better understanding of these defense strategies will inform efforts to breed more-resistant pine varieties.
基金supported by the National Natural Science Foundation of China(61771154)the Fundamental Research Funds for the Central Universities(3072022CF0601)supported by Key Laboratory of Advanced Marine Communication and Information Technology,Ministry of Industry and Information Technology,Harbin Engineering University,Harbin,China.
文摘As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and industry.However,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial attacks.Adversarial examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong results.Therefore,the security of AI models for the digital communication signals identification is the premise of its efficient and credible applications.In this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial principle.Next we present more detailed adversarial indicators to evaluate attack and defense behavior.Finally,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
基金supported by Systematic Major Project of China State Railway Group Corporation Limited(Grant Number:P2023W002).
文摘The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system efficiency.Federated learning offers a promising solution by allowing multiple clients to train models collaboratively without sharing private data.However,despite its privacy benefits,federated learning systems are vulnerable to poisoning attacks,where adversaries alter local model parameters on compromised clients and send malicious updates to the server,potentially compromising the global model’s accuracy.In this study,we introduce PMM(Perturbation coefficient Multiplied by Maximum value),a new poisoning attack method that perturbs model updates layer by layer,demonstrating the threat of poisoning attacks faced by federated learning.Extensive experiments across three distinct datasets have demonstrated PMM’s ability to significantly reduce the global model’s accuracy.Additionally,we propose an effective defense method,namely CLBL(Cluster Layer By Layer).Experiment results on three datasets have confirmed CLBL’s effectiveness.
基金the Project of China National Tobacco Corporation(Grant Number 110202102007)the Project of Hubei Tobacco Company(Grant Number 027Y2021-005).
文摘The Nicotiana genus, commonly known as tobacco, holds significant importance as a crucial economic crop. Confrontedwith an abundance of herbivorous insects that pose a substantial threat to yield, tobacco has developed adiverse and sophisticated array of mechanisms, establishing itself as a model of plant ecological defense. Thisreview provides a concise overview of the current understanding of tobacco’s defense strategies against herbivores.Direct defenses, exemplified by its well-known tactic of secreting the alkaloid nicotine, serve as a potent toxinagainst a broad spectrum of herbivorous pests. Moreover, in response to herbivore attacks, tobacco enhancesthe discharge of volatile compounds, harnessing an indirect strategy that attracts the predators of the herbivores.The delicate balance between defense and growth leads to the initiation of most defense strategies only after aherbivore attack. Among plant hormones, notably jasmonic acid (JA), play central roles in coordinating thesedefense processes. JA signaling interacts with other plant hormone signaling pathways to facilitate the extensivetranscriptional and metabolic adjustments in plants following herbivore assault. By shedding light on these ecologicaldefense strategies, this review emphasizes not only tobacco’s remarkable adaptability in its natural habitatbut also offers insights beneficial for enhancing the resilience of current crops.
基金supported by National Science Foundation(NSF),USA(Nos.IIS-1845081 and CNS-1815636).
文摘Deep neural networks(DNN)have achieved unprecedented success in numerous machine learning tasks in various domains.However,the existence of adversarial examples raises our concerns in adopting deep learning to safety-critical applications.As a result,we have witnessed increasing interests in studying attack and defense mechanisms for DNN models on different data types,such as images,graphs and text.Thus,it is necessary to provide a systematic and comprehensive overview of the main threats of attacks and the success of corresponding countermeasures.In this survey,we review the state of the art algorithms for generating adversarial examples and the countermeasures against adversarial examples,for three most popular data types,including images,graphs and text.
基金Project (No. 2006C12098) supported by the Science and Technology Department of Zhejiang Province, China
文摘The study was conducted to investigate fasting effects on flesh composition and antioxidant defenses of market-size Sparus macrocephalus. Two hundred fish (main initial weight 580 g) were divided into two groups (control and fasted) and reared in 6 cages. After two weeks of adaptation, group I fasted for 28 d; group II was fed normally as a control. In 3, 7, 14, 21 and 28 d, 6 fish per group were sampled for proximate flesh composition, liver antioxidant enzyme activities and malondialdehyde flesh content analyses. In fasted fish, the reduction of lipid content in muscle occurred after day 3, and, compared to controls, the content of protein decreased from day 14, the activities of liver antioxidative enzymes superoxide dismutase (SOD) and glutathione peroxidase (GPX) increased from day 3, and flesh malondialdehyde levels increased from day 21. Flesh fat reduction shows that fasting may be used as a technique to reduce flesh lipid content in Sparus macrocephalus. However, considering flesh protein loss and the subsequent oxidative stress, the fasting technique should be used with precautions.
文摘Abstract Many rodents exhibit inducible defenses when exposed to chemical cues from mammalian predators. These responses may include delays in sexual maturation, smaller adult body size and decreases in litter size and pup weight. We exposed the hybrid juvenile offspring of field-caught and lab-descended house mice Mus musculus to the chemical cues of mouse-fed or chick-fed kingsnakes, Lampropeltis getula, for 20 days after weaning, to examine the effects of ophidian predator cues on prey development. We hypothesized that these cues would elicit inducible defenses such as alteration of growth rates, and/or the timing of reproductive development in mice. Once mature, the reproductive effort of the mice might also be impacted by producing smaller litter sizes or lighter pups or not reproducing at all. We found no effect of kingsnake cues on any of the measures. These findings support the hypothesis that inducible defenses may have evolved as a strategy to deal with specific predators.
文摘In recent years,machine learning has become more and more popular,especially the continuous development of deep learning technology,which has brought great revolutions to many fields.In tasks such as image classification,natural language processing,information hiding,multimedia synthesis,and so on,the performance of deep learning has far exceeded the traditional algorithms.However,researchers found that although deep learning can train an accurate model through a large amount of data to complete various tasks,the model is vulnerable to the example which is modified artificially.This technology is called adversarial attacks,while the examples are called adversarial examples.The existence of adversarial attacks poses a great threat to the security of the neural network.Based on the brief introduction of the concept and causes of adversarial example,this paper analyzes the main ideas of adversarial attacks,studies the representative classical adversarial attack methods and the detection and defense methods.
基金This paper is supported by Natural Science Foundation of China (No. 70172042).
文摘China enterprises should develop dynamic strategic alliances if they want to participate in global contests and share strategic targets of global resources. The effective risk defenses system must be set up to make dynamic strategic alliances run successfully. This paper puts forward a mode of risk defenses internal system through analyzing the facts of China enterprises dynamic strategic alliances' creative models.
文摘Objective: Humans are increasingly exposed to artificial light and electromagnetic wave radiation, in addition to solar radiation. Many studies have shown the biological effects of ultra-violet and near-infrared exposure, but few have extensively investigated the innate biological defenses within human tissues against visible light and near-infrared exposure. Herein, we investigated spectral properties of endogenous human biological defenses against ultra-violet to near-infrared. Methods: A double-beam spectrophotometer (190 - 2700 nm) was used to measure the transmission spectra of a saline solution used to imitate perspiration, and oil to imitate sebum, as well as human skin, blood, adipose tissue, and muscle. Results: Saline (thickness, 0.5 mm) blocked 27.5% - 98.6% of ultra-violet, 13.2% - 34.3% of visible light, and 10.7% - 99.8% of near-infrared. Oil (thickness, 0.5 mm) blocked 50.5% - 100% of ultra-violet, 28.7% - 54.8% of visible light, and 19.0% - 98.3% of near-infrared. Blood thicknesses of 0.05 and 0.5 mm blocked over 97.8%, 100% of ultra-violet, over 94.6%, 99.7% of visible light, and over 75.8%, 99.4% of near-infrared, respectively. Skin thicknesses of 0.25 and 0.5 mm blocked over 99.4%, 100% of ultra-violet and over 94.3%, 99.7% of visible light, and over 74.7%, 93.5% of near-infrared, respectively. Adipose tissue thickness of 0.25 and0.5 mm blocked over 98.3%, 100% of ultra-violet, over 94.7%, 99.7% of visible light, and over 88.1%, 98.6% of near-infrared, respectively. Muscle thickness of 0.25 and0.5 mm blocked over 95.4%, 99.8% of ultra-violet, over 93.1%, 99.5% of visible light, and over 86.9%, 98.3% of near-infrared, respectively. Conclusions: Humans possess endogenous biological protection against ultra-violet, visible light and near-infrared exposure on multiple levels, including through perspiration, sebum, blood, skin, adipose tissue, and muscle. Since solar and artificial radiation affects human tissues, biological defenses made of biological materials may be induced to protect subcutaneous tissues against these wavelengths.
基金supported by the Financial and Science Technology Plan Project of Xinjiang Production and Construction Corps,under grants No.2020DB005 and No.2017DB005supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions fund.
文摘Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.However,security problems in cyberspace are becoming serious,and traditional defense measures(e.g.,firewall,intrusion detection systems,and security audits)often fall into a passive situation of being prone to attacks and difficult to take effect when responding to new types of network attacks with a higher and higher degree of coordination and intelligence.By constructing and implementing the diverse strategy of dynamic transformation,the configuration characteristics of systems are constantly changing,and the probability of vulnerability exposure is increasing.Therefore,the difficulty and cost of attack are increasing,which provides new ideas for reversing the asymmetric situation of defense and attack in cyberspace.Nonetheless,few related works systematically introduce dynamic defense mechanisms for cyber security.The related concepts and development strategies of dynamic defense are rarely analyzed and summarized.To bridge this gap,we conduct a comprehensive and concrete survey of recent research efforts on dynamic defense in cyber security.Specifically,we firstly introduce basic concepts and define dynamic defense in cyber security.Next,we review the architectures,enabling techniques and methods for moving target defense and mimic defense.This is followed by taxonomically summarizing the implementation and evaluation of dynamic defense.Finally,we discuss some open challenges and opportunities for dynamic defense in cyber security.
基金Ant Financial,Zhejiang University Financial Technology Research Center.
文摘With the rapid developments of artificial intelligence(AI)and deep learning(DL)techniques,it is critical to ensure the security and robustness of the deployed algorithms.Recently,the security vulnerability of DL algorithms to adversarial samples has been widely recognized.The fabricated samples can lead to various misbehaviors of the DL models while being perceived as benign by humans.Successful implementations of adversarial attacks in real physical-world scenarios further demonstrate their practicality.Hence,adversarial attack and defense techniques have attracted increasing attention from both machine learning and security communities and have become a hot research topic in recent years.In this paper,we first introduce the theoretical foundations,algorithms,and applications of adversarial attack techniques.We then describe a few research efforts on the defense techniques,which cover the broad frontier in the field.Several open problems and challenges are subsequently discussed,which we hope will provoke further research efforts in this critical area.
基金sponsored by the Central Public-interest Scientific Institution Basal Research Fund(1610212016019 and 1610212018015)the Modern Agricultural Industry Technology System(CARS-23)the National Natural Science Foundation of China(31401758).
文摘Plants release large amounts of volatile organic compounds(VOCs)in response to attackers.Several VOCs can serve as volatile signals to elicit defense responses in undamaged tissues and neighboring plants,but many questions about the ecological functions of VOCs remain unanswered.Tea plants are impacted by two harmful invaders,the piercing herbivore Empoasca(Matsumurasca)onukii Matsuda and the pathogen Colletotrichum fructicola.To determine the VOC signals in tea,we confirmed CsOPR3 as a marker gene and set up a rapid screening method based on a 1.51 kb CsOPR3 promoter fused with aβ-glucuronidase(GUS)reporter construct(OPR3p::GUS)in Arabidopsis.Using this screening system,a terpenoid volatile(E)-nerolidol was identified as a potent signal that elicits plant defenses.The early responses triggered by(E)-nerolidol included the activation of a mitogen-activated protein kinase and WRKY,an H2O2 burst,and the induction of jasmonic acid and abscisic acid signaling.The induced plants accumulated high levels of defenserelated chemicals,which possessed broad-spectrum anti-herbivore or anti-pathogen properties,and ultimately triggered resistance against Empoasca onukii and Colletotrichum fructicola in tea.We propose that these findings can supply an environmentally friendly management strategy for controlling an insect pest and a disease of tea plants.
基金supported by the Key Project of Applied Basic Research Program of Yunnan(2017FA015)the Young Academic and Technical Leader Raising Foundation of Yunnan Province(no. 2017HB063)+1 种基金the Yunnan Academy of Tobacco Agricultural Sciences(2018530000241002 and 2019530000241003)the Biotechnology Experimental Center at the Kunming Institute of Botany,CAS,for supporting plant cultivation.
文摘Jasmonic acid(JA)plays important roles in plant resistance to insect herbivores.One important derivative of JA is 12-OH-JA,which is produced by two independent pathways:direct hydroxylation of JA by jasmonate-induced oxygenases(JOXs)or hydrolyzation of 12-OH-JA-Ile.Yet the function of 12-OH-JA in plant-herbivore interactions remains largely unknown.In this study,we silenced four JOX homologs independently in the wild tobacco Nicotiana attenuata by virus-induced gene silencing(VIGS),and found that all four JOX homologs are involved in JA hydroxylation.Simultaneously silencing the four JA hydroxylases in VIGS-NaJOXs plants decreased herbivory-induced 12-OH-JA by 33%,but JA and JA-Ile levels increased by 45%and 30%,respectively,compared to those in control plants.Compared to direct hydroxylation from JA,hydrolyzation from 12-OH-JA-Ile is equally important for herbivory-induced 12-OHJA accumulation:in the 12-OH-JA-Ile deficient irJAR4/6 plants,12-OH-JA decreased 34%.Moreover,VIGSNaJOXs plants exhibited enhanced resistance to the generalist herbivore Spodoptera litura.The poor larval performance was strongly correlated with high levels of several JA-Ile-dependent direct defense metabolites in the VIGS-NaJOXs plants.When we simultaneously silenced all four JA hydroxylases in the JAIle-deficient irJAR4/6 background,the enhanced herbivore resistance diminished,demonstrating that enhanced herbivore resistance resulted from elevated JA-Ile levels.Given that silencing these NaJOX-like genes did not detectably alter plant growth but highly increased plant defense levels,we propose that JOX genes are potential targets for genetic improvement of herbivore-resistant crops.
基金supported by a pilot grant from the Research Center for Minority Institutes (RCMI) program (2G12RR003050-24/8G12MD007579-27) (Q.T.)an American Cancer Society grant (RSG-090289-01MPC) (Q.T)+1 种基金NIH/NIAID SC1AI112785 (Q.T.)the Ponce Health Sciences University/RCMI Publications Office (G12 RR003050/8G12MD007579-27)
文摘Three crucial hurdles hinder studies on human cytomegalovirus(HCMV): strict species specificity, differences between in vivo and in vitro infection, and the complexity of gene regulation. Ever since the sequencing of the whole genome was first accomplished, functional studies on individual genes have been the mainstream in the CMV field. Gene regulation has therefore been elucidated in a more detailed fashion. However, viral gene regulation is largely controlled by both cellular and viral components. In other words, viral gene expression is determined by the virus–host interaction. Generally, cells respond to viral infection in a defensive pattern; at the same time, viruses try to counteract the cellular defense or else hide in the host(latency). Viruses evolve effective strategies against cellular defense in order to achieve replicative success. Whether or not they are successful, cellular defenses remain in the whole viral replication cycle: entry, immediate–early(IE) gene expression, early gene expression, DNA replication, late gene expression, and viral egress. Many viral strategies against cellular defense, and which occur in the immediate–early time of viral infection, have been documented. In this review, we will summarize the documented biological functions of IE1 and pp71 proteins, especially with regard to how they counteract cellular intrinsic defenses.
基金This work was funded by Abu Dhabi Award for Research Excellence-Department of Education and Knowledge(No.21S105)to Khaled A.El-Tarabily.
文摘Plants have to cope with several abiotic stresses,including salinity and heavymetals(HMs).Under these stresses,several extracts have been used as effective natural biostimulants,however,the use of Spirulina platensis(SP)extract(SPE)remains elusive.The effects of SPE were evaluated as soil addition(SA)and/or foliar spraying(FS)on antioxidant defenses and HMs content of common bean grown in saline soil contaminated with HMs.Individual(40 or 80 mg SPE/hill added as SA or 20 or 40 mg SPE/plant added as FS)or integrative(SA+FS)applications of SPE showed significant improvements in the following order:SA-80+FS-40>SA-80+FS-20>SA-40+FS-40>SA-40+FS-20>SA-80>SA-40>FS-40>FS-20>control.Therefore,the integrative SA+FS with 40 mg SP/plant was the most effective treatment in increasing plant growth and production,overcoming stress effects and minimizing contamination of the edible part.It significantly increased plant growth(74%–185%)and yield(107%–227%)by enhancing net photosynthetic rate(78.5%),stomatal conductance(104%),transpiration rate(124%),and contents of carotenoids(60.0%),chlorophylls(49%–51%),and NPK(271%–366%).These results were concurrent with the marked reductions in malondialdehyde(61.6%),hydrogen peroxide(42.2%),nickel(91%–94%),lead(80%–9%),and cadmium(74%–91%)contents due to the improved contents of glutathione(87.1%),ascorbate(37.0%),andα-tocopherol(77.2%),and the activities of catalase(18.1%),ascorbate peroxidase(18.3%),superoxide dismutase(192%),and glutathione reductase(52.2%)as reinforcing mechanisms.Therefore,this most effective treatment is recommended to mitigate the stress effects of salinity and HMs on common bean production while minimizing HMs in the edible part.
基金Financial support has been provided by Hainan Provincial Natural Science Foundation of China(320CXTD437 to C.Y.)the National Natural Science Foundation of China(Nos.31672303 to CY,and 31772453 and 31970427 to W.L.).
文摘Obligate brood parasitism,which refers to parasitic birds,fish,and insects that lay eggs in host nests,imposes strong selective pressure on hosts because the reproductive output of hosts is reduced considerably or eliminated completely while the foster parents provide extra-parental care to unrelated nestlings(Soler 2016).After parasites succeed in laying eggs,egg rejection by hosts plays an important role in avoiding parasitism by recognition and rejection of parasite eggs from host nests(Yang et al.2014).
文摘Conversion of inorganic nitrogen by mutualistic nitrogen-fixing bacteria is essential for plant growth and reproduction, as well as the development of chemical and mechanical defenses. It is unclear, however, how these bacteria alter co-occurring symbioses at higher trophic levels;e.g., extrafloral nectary (EFN) induction, in response to herbivory, to attract defensive mutualists. We hypothesized that plants colonized by nitrogen-fixing bacteria would mount a larger inducible, defensive response than plants lacking symbioses, as defensive traits are costly. We predicted that bean plants, Vicia faba L., harboring Rhizobium leguminosarum bv. viciae Frank would produce more EFNs upon leaf damage, than plants lacking the symbionts, as EFN induction in V. faba is resource-dependent. Here we report that V. faba colonized by R. leguminosarum produced similar numbers of EFNs as did plants without symbionts. Plants with symbionts, however, produced significantly fewer EFNs over 1 week in response to leaf damage, than those without leaf damage. As such, nitrogen-fixing bacteria may not always benefit the host plant, but rather, the utility of these bacteria may be dependent on the prevailing ecological conditions.
文摘A class of phenolic compounds, ortho-dihydroxyphenols (hereafter “o-DHP”), has been implicated with seed survival. Based on expectations of the growth-differentiation balance hypothesis, we predicted that seed o-DHP concentration exhibits a curvilinear response to increasing resource availability in the maternal environment, with maximum o-DHP occurring at moderate resource levels. To test this hypothesis, Abutilon theophrasti seeds were produced under field conditions at two locations. Each location included twelve maternal environments established through factorial combinations of soil compost (+/-), species assemblage (A. theophrasti with and without maize), and soil nitrogen fertilizer (0, 0.5× or 1× local recommendations for maize). Resource availability with respect to A. theophrasti growth was summarized by above-ground biomass at seed harvest (maternal biomass). Results indicated that seed o-DHP concentrations increased then decreased in response to increasing maternal biomass. This relationship was modeled with a unimodal function specific to location (Location 1, y = 1.18 + 0.03xe-0.02x, pseudo-R2 = 0.59, p = 0.003;Location 2, y = 1.40 + 0.006xe-0.005x;pseudo-R2 = 0.34, p = 0.05). Seed protein concentrations remained constant across maternal biomass levels. Because inherent vulnerability to predation and decay is considered a consequence of chemical protection relative to nutritional offering, our results suggest that A. theophrasti seed susceptibility to lethal attack is influenced by resource levels in the maternal environment. More broadly, our results suggest that the growth-differentiation balance hypothesis can be extended to maternal effects on seed phenolics.