3,178 research outputs found

    Mitigating Cross-client GANs-based Attack in Federated Learning

    Full text link
    Machine learning makes multimedia data (e.g., images) more attractive, however, multimedia data is usually distributed and privacy sensitive. Multiple distributed multimedia clients can resort to federated learning (FL) to jointly learn a global shared model without requiring to share their private samples with any third-party entities. In this paper, we show that FL suffers from the cross-client generative adversarial networks (GANs)-based (C-GANs) attack, in which a malicious client (i.e., adversary) can reconstruct samples with the same distribution as the training samples from other clients (i.e., victims). Since a benign client's data can be leaked to the adversary, this attack brings the risk of local data leakage for clients in many security-critical FL applications. Thus, we propose Fed-EDKD (i.e., Federated Ensemble Data-free Knowledge Distillation) technique to improve the current popular FL schemes to resist C-GANs attack. In Fed-EDKD, each client submits a local model to the server for obtaining an ensemble global model. Then, to avoid model expansion, Fed-EDKD adopts data-free knowledge distillation techniques to transfer knowledge from the ensemble global model to a compressed model. By this way, Fed-EDKD reduces the adversary's control capability over the global model, so Fed-EDKD can effectively mitigate C-GANs attack. Finally, the experimental results demonstrate that Fed-EDKD significantly mitigates C-GANs attack while only incurring a slight accuracy degradation of FL

    Unextendible Maximally Entangled Bases in CpdCqd\mathbb{C}^{pd}\otimes \mathbb{C}^{qd}

    Full text link
    The construction of unextendible maximally entangled bases is tightly related to quantum information processing like local state discrimination. We put forward two constructions of UMEBs in CpdCqd\mathbb {C}^{pd}\otimes \mathbb {C}^{qd}(pqp\leq q) based on the constructions of UMEBs in CdCd\mathbb {C}^{d}\otimes \mathbb {C}^{d} and in CpCq\mathbb {C}^{p}\otimes \mathbb {C}^{q}, which generalizes the results in [Phys. Rev. A. 94, 052302 (2016)] by two approaches. Two different 48-member UMEBs in C6C9\mathbb {C}^{6}\otimes \mathbb {C}^{9} have been constructed in detail

    Effects of low temperature and drought on the physiological and growth changes in oil palm seedlings

    Get PDF
    Water deficiency and low temperature are two important ecological factors which affect the distribution and cultivation of oil palm. To find out how oil palm adapts to the environmental conditions, the dynamics of a series of important physiological components derived from the leaves of potted oil palm seedlings under drought stress (DS) (water with holding) and low temperature stress (LTS) (10°C) were studied. The results showed that low temperature and water stress inhibited the growth of oil palm seedlings. The relative conductivity, injury index, malondialdehyde (MDA) and proline content in the leaves increased to different degrees with the extension of low temperature and drought stress. Superoxide dismutase (SOD) and peroxidase (POD) activities increased and then decreased gradually with the duration of treatment time. The variations of the earlier mentioned parameters except proline content under low temperature stress were greater than that under drought stress. Thus, oil palm possibly showed different response mechanisms under low temperature and drought stress by mediations of these substances, in order to increase plant defense capability. These data provided the information that was utilized to initiate the breeding programme used to improve drought and cold tolerance in oil palm.Keywords: Oil palm, drought stress, low temperature stress, physiological characteristic

    Suppression of proliferation, migration and invasion in non-small cell lung cancer cells via profilin 2 inhibition by microRNA-194

    Get PDF
    Purpose: To investigate the anti-tumor effect of microRNA-194 (miR-194) and possible relationship with profilin 2.Methods: The expressions of miR-194 and profilin 2 were investigated via  bioinformatic analysis and were further verified using quantitative real-time  polymerase chain reaction (qRT-PCR) in both normal and non-small cell lung cancer (NSCLC) cells. Dual luciferase reporter assay, together with transfection, was  applied to determine the effect of miR-194 and profilin 2 on proliferation, migration and invasion, and its underlying mechanisms.Results: Relatively low expression of miR-194 and high expression of profilin 2 in cancerous lung tissue were found through bioinformatic analysis and further confirmed by qRT-PCR on normal and NSCLC cell lines. Profilin 2 was the direct target of miR-194. Also, miR-194 overexpression inhibited the proliferation,  migration and invasion of NSCLC cells, and this suppressive effect was partially  reversed by transfection of pcDNA3.1-PFN2 plasmid.Conclusion: The results show that miR-194 plays a tumor suppressor role in NSCLC development. It inhibits the proliferation, migration and invasion of NSCLC cells via profilin 2 suppression. Interventions targeting the miR-194/profilin 2 axis may  therefore serve as a clinical strategy for the prevention and treatment of NSCLC metastases.Keywords: Non-small cell lung cancer, MicroRNA-194, Profilin 2, Proliferation, Migration, Invasio

    A fingerprint based crypto-biometric system for secure communication

    Full text link
    To ensure the secure transmission of data, cryptography is treated as the most effective solution. Cryptographic key is an important entity in this procedure. In general, randomly generated cryptographic key (of 256 bits) is difficult to remember. However, such a key needs to be stored in a protected place or transported through a shared communication line which, in fact, poses another threat to security. As an alternative, researchers advocate the generation of cryptographic key using the biometric traits of both sender and receiver during the sessions of communication, thus avoiding key storing and at the same time without compromising the strength in security. Nevertheless, the biometric-based cryptographic key generation possesses few concerns such as privacy of biometrics, sharing of biometric data between both communicating users (i.e., sender and receiver), and generating revocable key from irrevocable biometric. This work addresses the above-mentioned concerns. In this work, a framework for secure communication between two users using fingerprint based crypto-biometric system has been proposed. For this, Diffie-Hellman (DH) algorithm is used to generate public keys from private keys of both sender and receiver which are shared and further used to produce a symmetric cryptographic key at both ends. In this approach, revocable key for symmetric cryptography is generated from irrevocable fingerprint. The biometric data is neither stored nor shared which ensures the security of biometric data, and perfect forward secrecy is achieved using session keys. This work also ensures the long-term security of messages communicated between two users. Based on the experimental evaluation over four datasets of FVC2002 and NIST special database, the proposed framework is privacy-preserving and could be utilized onto real access control systems.Comment: 29 single column pages, 8 figure
    corecore