65,383 research outputs found

    ‘Getting stuck’ in analogue electronics: Threshold concepts as an explanatory model

    Get PDF
    Could the challenge of mastering threshold concepts be a potential factor that influences a student's decision to continue in electronics engineering? This was the question that led to a collaborative research project between educational researchers and the Faculty of Engineering in a New Zealand university. This paper deals exclusively with the qualitative data from this project, which was designed to investigate the high attrition rate of students taking introductory electronics in a New Zealand university. The affordances of the various teaching opportunities and the barriers that students perceived are examined in the light of recent international research in the area of threshold concepts and transformational learning. Suggestions are made to help students move forward in their thinking, without compromising the need for maintaining the element of intellectual uncertainty that is crucial for tertiary teaching. The issue of the timing of assessments as a measure of conceptual development or the crossing of thresholds is raised

    Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning

    Full text link
    Deep neural networks are susceptible to various inference attacks as they remember information about their training data. We design white-box inference attacks to perform a comprehensive privacy analysis of deep learning models. We measure the privacy leakage through parameters of fully trained models as well as the parameter updates of models during training. We design inference algorithms for both centralized and federated learning, with respect to passive and active inference attackers, and assuming different adversary prior knowledge. We evaluate our novel white-box membership inference attacks against deep learning algorithms to trace their training data records. We show that a straightforward extension of the known black-box attacks to the white-box setting (through analyzing the outputs of activation functions) is ineffective. We therefore design new algorithms tailored to the white-box setting by exploiting the privacy vulnerabilities of the stochastic gradient descent algorithm, which is the algorithm used to train deep neural networks. We investigate the reasons why deep learning models may leak information about their training data. We then show that even well-generalized models are significantly susceptible to white-box membership inference attacks, by analyzing state-of-the-art pre-trained and publicly available models for the CIFAR dataset. We also show how adversarial participants, in the federated learning setting, can successfully run active membership inference attacks against other participants, even when the global model achieves high prediction accuracies.Comment: 2019 IEEE Symposium on Security and Privacy (SP

    Information Theoretic Principles of Universal Discrete Denoising

    Full text link
    Today, the internet makes tremendous amounts of data widely available. Often, the same information is behind multiple different available data sets. This lends growing importance to latent variable models that try to learn the hidden information from the available imperfect versions. For example, social media platforms can contain an abundance of pictures of the same person or object, yet all of which are taken from different perspectives. In a simplified scenario, one may consider pictures taken from the same perspective, which are distorted by noise. This latter application allows for a rigorous mathematical treatment, which is the content of this contribution. We apply a recently developed method of dependent component analysis to image denoising when multiple distorted copies of one and the same image are available, each being corrupted by a different and unknown noise process. In a simplified scenario, we assume that the distorted image is corrupted by noise that acts independently on each pixel. We answer completely the question of how to perform optimal denoising, when at least three distorted copies are available: First we define optimality of an algorithm in the presented scenario, and then we describe an aymptotically optimal universal discrete denoising algorithm (UDDA). In the case of binary data and binary symmetric noise, we develop a simplified variant of the algorithm, dubbed BUDDA, which we prove to attain universal denoising uniformly.Comment: 10 pages, 6 figure

    Load-aware Channel Selection for 802.11 WLANs with Limited Measurement

    Full text link
    It has been known that load unaware channel selection in 802.11 networks results in high level interference, and can significantly reduce the network throughput. In current implementation, the only way to determine the traffic load on a channel is to measure that channel for a certain duration of time. Therefore, in order to find the best channel with the minimum load all channels have to be measured, which is costly and can cause unacceptable communication interruptions between the AP and the stations. In this paper, we propose a learning based approach which aims to find the channel with the minimum load by measuring only limited number of channels. Our method uses Gaussian Process Regressing to accurately track the traffic load on each channel based on the previous measured load. We confirm the performance of our algorithm by using experimental data, and show that the time consumed for the load measurement can be reduced up to 46% compared to the case where all channels are monitored.Comment: accepted to IC

    Delineating groundwater-surface water exchange flux using temperature-time series analysis methods

    Get PDF
    Groundwater-surface water interactions can play a crucial role in river-, riparian and wetland management. Their delineation and quantification at various spatial and temporal scales has become an important aspect in the study of contaminant transport and attenuation processes at the groundwater-surface water interface. One of the main parameters of interest is the groundwater-surface water exchange flux, which provides indications regarding stream-aquifer connectivity, the local flow regime as well as hydrogeological properties of the streambed. One of the methods to assess vertical exchange flux is through the analysis of temperature time-series. In this paper we delineate vertical exchange flux from temperature-time series collected at a Belgian River by comparing established numerical and analytical techniques with a novel approach. Results indicate a spatial variability of vertical fluxes over two orders of magnitude at the site
    corecore