116 research outputs found
Focus on Hiders: Exploring Hidden Threats for Enhancing Adversarial Training
Adversarial training is often formulated as a min-max problem, however,
concentrating only on the worst adversarial examples causes alternating
repetitive confusion of the model, i.e., previously defended or correctly
classified samples are not defensible or accurately classifiable in subsequent
adversarial training. We characterize such non-ignorable samples as "hiders",
which reveal the hidden high-risk regions within the secure area obtained
through adversarial training and prevent the model from finding the real worst
cases. We demand the model to prevent hiders when defending against adversarial
examples for improving accuracy and robustness simultaneously. By rethinking
and redefining the min-max optimization problem for adversarial training, we
propose a generalized adversarial training algorithm called Hider-Focused
Adversarial Training (HFAT). HFAT introduces the iterative evolution
optimization strategy to simplify the optimization problem and employs an
auxiliary model to reveal hiders, effectively combining the optimization
directions of standard adversarial training and prevention hiders. Furthermore,
we introduce an adaptive weighting mechanism that facilitates the model in
adaptively adjusting its focus between adversarial examples and hiders during
different training periods. We demonstrate the effectiveness of our method
based on extensive experiments, and ensure that HFAT can provide higher
robustness and accuracy
Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition
Classical adversarial attacks for Face Recognition (FR) models typically
generate discrete examples for target identity with a single state image.
However, such paradigm of point-wise attack exhibits poor generalization
against numerous unknown states of identity and can be easily defended. In this
paper, by rethinking the inherent relationship between the face of target
identity and its variants, we introduce a new pipeline of Generalized Manifold
Adversarial Attack (GMAA) to achieve a better attack performance by expanding
the attack range. Specifically, this expansion lies on two aspects - GMAA not
only expands the target to be attacked from one to many to encourage a good
generalization ability for the generated adversarial examples, but it also
expands the latter from discrete points to manifold by leveraging the domain
knowledge that face expression change can be continuous, which enhances the
attack effect as a data augmentation mechanism did. Moreover, we further design
a dual supervision with local and global constraints as a minor contribution to
improve the visual quality of the generated adversarial examples. We
demonstrate the effectiveness of our method based on extensive experiments, and
reveal that GMAA promises a semantic continuous adversarial space with a higher
generalization ability and visual qualityComment: Accepted by CVPR202
Exploring Blockchain Technology through a Modular Lens: A Survey
Blockchain has attracted significant attention in recent years due to its potential to revolutionize various industries by providing trustlessness. To comprehensively examine blockchain systems, this article presents both a macro-level overview on the most popular blockchain systems, and a micro-level analysis on a general blockchain framework and its crucial components. The macro-level exploration provides a big picture on the endeavors made by blockchain professionals over the years to enhance the blockchain performance while the micro-level investigation details the blockchain building blocks for deep technology comprehension. More specifically, this article introduces a general modular blockchain analytic framework that decomposes a blockchain system into interacting modules and then examines the major modules to cover the essential blockchain components of network, consensus, and distributed ledger at the micro-level. The framework as well as the modular analysis jointly build a foundation for designing scalable, flexible, and application-adaptive blockchains that can meet diverse requirements. Additionally, this article explores popular technologies that can be integrated with blockchain to expand functionality and highlights major challenges. Such a study provides critical insights to overcome the obstacles in designing novel blockchain systems and facilitates the further development of blockchain as a digital infrastructure to service new applications
Simulating the 1998 spring bloom in Lake Michigan using a coupled physical‐biological model
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/95047/1/jgrc12526.pd
FileDES: A Secure, Scalable and Succinct Decentralized Encrypted Storage Network
Decentralized Storage Network (DSN) is an emerging technology that challenges traditional cloud-based storage systems by consolidating storage capacities from independent providers and coordinating to provide decentralized storage and retrieval services. However, current DSNs face several challenges associated with data privacy and efficiency of the proof systems. To address these issues, we propose FileDES (Decentralized Encrypted Storage), which incorporates three essential elements: privacy preservation, scalable storage proof, and batch verification. FileDES provides encrypted data storage while maintaining data availability, with a scalable Proof of Encrypted Storage (PoES) algorithm that is resilient to Sybil and Generation attacks. Additionally, we introduce a rollup-based batch verification approach to simultaneously verify multiple files using publicly verifiable succinct proofs. We conducted a comparative evaluation on FileDES, Filecoin, Storj and Sia under various conditions, including a WAN composed of up to 120 geographically dispersed nodes. Our protocol outperforms the others in terms of proof generation/verification efficiency, storage costs, and scalability
Adjuvant Chemotherapy Versus Adjuvant Concurrent Chemoradiotherapy After Radical Surgery for Early-Stage Cervical Cancer: A Randomized, Non-Inferiority, Multicenter Trial
We conducted a prospective study to assess the non-inferiority of adjuvant chemotherapy alone versus adjuvant concurrent chemoradiotherapy (CCRT) as an alternative strategy for patients with early-stage (FIGO 2009 stage IB-IIA) cervical cancer having risk factors after surgery. The condition was assessed in terms of prognosis, adverse effects, and quality of life. This randomized trial involved nine centers across China. Eligible patients were randomized to receive adjuvant chemotherapy or CCRT after surgery. The primary end-point was progression-free survival (PFS). From December 2012 to December 2014, 337 patients were subjected to randomization. Final analysis included 329 patients, including 165 in the adjuvant chemotherapy group and 164 in the adjuvant CCRT group. The median follow-up was 72.1 months. The three-year PFS rates were both 91.9%, and the five-year OS was 90.6% versus 90.0% in adjuvant chemotherapy and CCRT groups, respectively. No significant differences were observed in the PFS or OS between groups. The adjusted HR for PFS was 0.854 (95% confidence interval 0.415-1.757; P = 0.667) favoring adjuvant chemotherapy, excluding the predefined non-inferiority boundary of 1.9. The chemotherapy group showed a tendency toward good quality of life. In comparison with post-operative adjuvant CCRT, adjuvant chemotherapy treatment showed non-inferior efficacy in patients with early-stage cervical cancer having pathological risk factors. Adjuvant chemotherapy alone is a favorable alternative post-operative treatment
Computational Detection and Functional Analysis of Human Tissue-Specific A-to-I RNA Editing
A-to-I RNA editing is a widespread post-transcriptional modification event in vertebrates. It could increase transcriptome and proteome diversity through recoding the genomic information and cross-linking other regulatory events, such as those mediated by alternative splicing, RNAi and microRNA (miRNA). Previous studies indicated that RNA editing can occur in a tissue-specific manner in response to the requirements of the local environment. We set out to systematically detect tissue-specific A-to-I RNA editing sites in 43 human tissues using bioinformatics approaches based on the Fisher's exact test and the Benjamini & Hochberg false discovery rate (FDR) multiple testing correction. Twenty-three sites in total were identified to be tissue-specific. One of them resulted in an altered amino acid residue which may prevent the phosphorylation of PARP-10 and affect its activity. Eight and two tissue-specific A-to-I RNA editing sites were predicted to destroy putative exonic splicing enhancers (ESEs) and exonic splicing silencers (ESSs), respectively. Brain-specific and ovary-specific A-to-I RNA editing sites were further verified by comparing the cDNA sequences with their corresponding genomic templates in multiple cell lines from brain, colon, breast, bone marrow, lymph, liver, ovary and kidney tissue. Our findings help to elucidate the role of A-to-I RNA editing in the regulation of tissue-specific development and function, and the approach utilized here can be broadened to study other types of tissue-specific substitution editing
- …