期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
A Secure and Cost-Effective Training Framework Atop Serverless Computing for Object Detection in Blasting
1
作者 Tianming Zhang Zebin Chen +4 位作者 Haonan Guo Bojun Ren Quanmin Xie Mengke Tian Yong Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2139-2154,共16页
The data analysis of blasting sites has always been the research goal of relevant researchers.The rise of mobile blasting robots has aroused many researchers’interest in machine learning methods for target detection ... The data analysis of blasting sites has always been the research goal of relevant researchers.The rise of mobile blasting robots has aroused many researchers’interest in machine learning methods for target detection in the field of blasting.Serverless Computing can provide a variety of computing services for people without hardware foundations and rich software development experience,which has aroused people’s interest in how to use it in the field ofmachine learning.In this paper,we design a distributedmachine learning training application based on the AWS Lambda platform.Based on data parallelism,the data aggregation and training synchronization in Function as a Service(FaaS)are effectively realized.It also encrypts the data set,effectively reducing the risk of data leakage.We rent a cloud server and a Lambda,and then we conduct experiments to evaluate our applications.Our results indicate the effectiveness,rapidity,and economy of distributed training on FaaS. 展开更多
关键词 Serverless computing object detection BLASTING
在线阅读 下载PDF
VRS-DB:preserve confidentiality of users'data using encryption approach 被引量:2
2
作者 J.S.Rauthan K.S.Vaisla 《Digital Communications and Networks》 SCIE CSCD 2021年第1期62-71,共10页
We focus on security and privacy problems within a cloud database framework,exploiting the DataBase as a Service(DBaaS).In this framework,an information proprietor drives out its information to a cloud database profes... We focus on security and privacy problems within a cloud database framework,exploiting the DataBase as a Service(DBaaS).In this framework,an information proprietor drives out its information to a cloud database professional company.The Data-Owner(DO)encrypts the delicate information before transmission at the cloud database professional company end to offer information security.Current encryption ideas,nonetheless,are just halfway homomorphic as all of them intend to enable an explicit kind of calculation,which is accomplished on scrambled information.These current plans can't be coordinated to solve genuine functional queries that include activities of various types.We propose and evaluate a Verifiable Reliable Secure-DataBase(VRS-DB)framework on shared tables along with many primary operations on scrambled information,which enables information interoperability,and permits an extensive possibility of Structured Query Language(SQL)queries to be prepared by the service provider on the encoded data.We show that our security and privacy idea is protected from two forms of threats and are fundamentally proficient. 展开更多
关键词 PRIVACY Security Cloud storage Encrypted query CRYPTOGRAPHY Sensitive data
在线阅读 下载PDF
Avoiding BGP Security Holes by MPLS
3
作者 Shi,Chuangming 《微计算机信息》 北大核心 2006年第01X期47-48,46,共3页
The border gateway protocol, a widely used technology for efficiently routing data through the Internet, is rife with security holes. There’ll only be an improvement if the majority of routers use a secure protocol--... The border gateway protocol, a widely used technology for efficiently routing data through the Internet, is rife with security holes. There’ll only be an improvement if the majority of routers use a secure protocol--but the high cost of implementing Secure BGP means that few companies will adopt it.This paper put forward a simple method for avoiding BGP security holes by use of MPLS. 展开更多
关键词 MPLS BGP 网络黑洞 网络安全
在线阅读 下载PDF
CHAOTIC BEHAVIOR OF SELF-MAPPINGS OF THE INTERVAL
4
作者 周作领 《Chinese Science Bulletin》 SCIE EI CAS 1986年第12期861-862,共2页
Li and Yorke (Amer. Math.Monthly, 82(1975)) proved the following remarkable Theorem L-Y. Let f∈C^0(I,I).If f has a period 3, then f is chaotic,
关键词 CHAOTIC remarkable SUBSET satis
在线阅读 下载PDF
THE CHAOTIC BEHAVIOR OF THE SHIFT
5
作者 周作领 《Chinese Science Bulletin》 SCIE EI CAS 1986年第11期787-788,共2页
In the recent twenty years, chaos was discovered in many natural sciences. The definitions of chaos have been given first by Li and Yorke (Amer. Math. Monthly, 82(1975)) for self-mappings of the interval and then by M... In the recent twenty years, chaos was discovered in many natural sciences. The definitions of chaos have been given first by Li and Yorke (Amer. Math. Monthly, 82(1975)) for self-mappings of the interval and then by Marotto (J. Math. Anal. Appl., 63(1978)) for self-mappings of R^n. Recently, we have proved that 展开更多
关键词 CHAOS twenty stronger
在线阅读 下载PDF
Common knowledge learning for generating transferable adversarial examples
6
作者 Ruijie YANG Yuanfang GUO +2 位作者 Junfu WANG Jiantao ZHOU Yunhong WANG 《Frontiers of Computer Science》 2025年第10期73-86,共14页
This paper focuses on an important type of black-box attacks,i.e.,transfer-based adversarial attacks,where the adversary generates adversarial examples using a substitute(source)model and utilizes them to attack an un... This paper focuses on an important type of black-box attacks,i.e.,transfer-based adversarial attacks,where the adversary generates adversarial examples using a substitute(source)model and utilizes them to attack an unseen target model,without knowing its information.Existing methods tend to give unsatisfactory adversarial transferability when the source and target models are from different types of DNN architectures(e.g.,ResNet-18 and Swin Transformer).In this paper,we observe that the above phenomenon is induced by the output inconsistency problem.To alleviate this problem while effectively utilizing the existing DNN models,we propose a common knowledge learning(CKL)framework to learn better network weights to generate adversarial examples with better transferability,under fixed network architectures.Specifically,to reduce the model-specific features and obtain better output distributions,we construct a multi-teacher framework,where the knowledge is distilled from different teacher architectures into one student network.By considering that the gradient of input is usually utilized to generate adversarial examples,we impose constraints on the gradients between the student and teacher models,to further alleviate the output inconsistency problem and enhance the adversarial transferability.Extensive experiments demonstrate that our proposed work can significantly improve the adversarial transferability. 展开更多
关键词 black-box attack adversarial transferability deep neural networks
原文传递
Two-Scale Picard Stabilized Finite Volume Method for the Incompressible Flow
7
作者 Jianhong Yang Gang Lei Jianwei Yang 《Advances in Applied Mathematics and Mechanics》 SCIE 2014年第5期663-679,共17页
In this paper,we consider a two-scale stabilized finite volume method for the two-dimensional stationary incompressible flow approximated by the lowest equalorder element pair P_(1)−P_(1)which do not satisfy the inf-s... In this paper,we consider a two-scale stabilized finite volume method for the two-dimensional stationary incompressible flow approximated by the lowest equalorder element pair P_(1)−P_(1)which do not satisfy the inf-sup condition.The two-scale method consist of solving a small non-linear system on the coarse mesh and then solving a linear Stokes equations on the fine mesh.Convergence of the optimal order in the H1-norm for velocity and the L^(2)-norm for pressure are obtained.The error analysis shows there is the same convergence rate between the two-scale stabilized finite volume solution and the usual stabilized finite volume solution on a fine mesh with relation h=O(H^(2)).Numerical experiments completely confirm theoretic results.Therefore,this method presented in this paper is of practical importance in scientific computation. 展开更多
关键词 Incompressible flow stabilized finite volume method inf-sup condition local Gauss integral two-scale method
在线阅读 下载PDF
An Agent-Based Solution Framework for Inter-Block Yard Crane Scheduling Problems
8
作者 Omor Sharif Nathan Huynh +1 位作者 Mashrur Chowdhury Jose M.Vidal 《International Journal of Transportation Science and Technology》 2012年第2期109-130,共22页
The efficiency of yard operations is critical to the overall productivity of a container terminal because the yard serves as the interface between the landside and waterside operations.Most container terminals use yar... The efficiency of yard operations is critical to the overall productivity of a container terminal because the yard serves as the interface between the landside and waterside operations.Most container terminals use yard cranes to transfer containers between the yard and trucks(both external and internal).To facilitate vessel operations,an efficient work schedule for the yard cranes is necessary given varying work volumes among yard blocks with different planning periods.This paper investigated an agent-based approach to assign and relocate yard cranes among yard blocks based on the forecasted work volumes.The goal of our study is to reduce the work volume that remains incomplete at the end of a planning period.We offered several preference functions for yard cranes and blocks which are modeled as agents.These preference functions are designed to find effective schedules for yard cranes.In addition,we examined various rules for the initial assignment of yard cranes to blocks.Our analysis demonstrated that our model can effectively and efficiently reduce the percentage of incomplete work volume for any real-world sized problem. 展开更多
关键词 Yard crane scheduling container terminals multi-agent systems deferred acceptance algorithm
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部