3,178 research outputs found
Mitigating Cross-client GANs-based Attack in Federated Learning
Machine learning makes multimedia data (e.g., images) more attractive,
however, multimedia data is usually distributed and privacy sensitive. Multiple
distributed multimedia clients can resort to federated learning (FL) to jointly
learn a global shared model without requiring to share their private samples
with any third-party entities. In this paper, we show that FL suffers from the
cross-client generative adversarial networks (GANs)-based (C-GANs) attack, in
which a malicious client (i.e., adversary) can reconstruct samples with the
same distribution as the training samples from other clients (i.e., victims).
Since a benign client's data can be leaked to the adversary, this attack brings
the risk of local data leakage for clients in many security-critical FL
applications. Thus, we propose Fed-EDKD (i.e., Federated Ensemble Data-free
Knowledge Distillation) technique to improve the current popular FL schemes to
resist C-GANs attack. In Fed-EDKD, each client submits a local model to the
server for obtaining an ensemble global model. Then, to avoid model expansion,
Fed-EDKD adopts data-free knowledge distillation techniques to transfer
knowledge from the ensemble global model to a compressed model. By this way,
Fed-EDKD reduces the adversary's control capability over the global model, so
Fed-EDKD can effectively mitigate C-GANs attack. Finally, the experimental
results demonstrate that Fed-EDKD significantly mitigates C-GANs attack while
only incurring a slight accuracy degradation of FL
Unextendible Maximally Entangled Bases in
The construction of unextendible maximally entangled bases is tightly related
to quantum information processing like local state discrimination. We put
forward two constructions of UMEBs in () based on the constructions of UMEBs in and in , which generalizes the results in [Phys. Rev. A. 94, 052302 (2016)] by
two approaches. Two different 48-member UMEBs in have been constructed in detail
Effects of low temperature and drought on the physiological and growth changes in oil palm seedlings
Water deficiency and low temperature are two important ecological factors which affect the distribution and cultivation of oil palm. To find out how oil palm adapts to the environmental conditions, the dynamics of a series of important physiological components derived from the leaves of potted oil palm seedlings under drought stress (DS) (water with holding) and low temperature stress (LTS) (10°C) were studied. The results showed that low temperature and water stress inhibited the growth of oil palm seedlings. The relative conductivity, injury index, malondialdehyde (MDA) and proline content in the leaves increased to different degrees with the extension of low temperature and drought stress. Superoxide dismutase (SOD) and peroxidase (POD) activities increased and then decreased gradually with the duration of treatment time. The variations of the earlier mentioned parameters except proline content under low temperature stress were greater than that under drought stress. Thus, oil palm possibly showed different response mechanisms under low temperature and drought stress by mediations of these substances, in order to increase plant defense capability. These data provided the information that was utilized to initiate the breeding programme used to improve drought and cold tolerance in oil palm.Keywords: Oil palm, drought stress, low temperature stress, physiological characteristic
Recommended from our members
Modulating Linker Composition of Haptens Resulted in Improved Immunoassay for Histamine.
Histamine (HA) is an important food contaminant generated during food fermentation or spoilage. However, an immunoassay for direct (derivatization free) determination of HA has rarely been reported due to its small size to induce the desired antibodies by its current hapten-protein conjugates. In this work, despite violating the classical hapten design criteria which recommend introducing a linear aliphatic (phenyl free) linker into the immunizing hapten, a novel haptens, HA-245 designed and synthesized with a phenyl-contained linker, exhibited significantly enhanced immunological properties. Thus, a quality-improved monoclonal antibody (Mab) against HA was elicited by its hapten-carrier conjugates. Then, as the linear aliphatic linker contained haptens, Hapten B was used as linker-heterologous coating haptens to eliminate the recognition of linker antibodies. Indirect competitive ELISA (ic-ELISA) was developed with a 50% inhibition concentration (IC50) of 0.21 mg/L and a limit of detection (LOD) of 0.06 mg/L in buffer solution. The average recoveries of HA from spiked food samples for this ic-ELISA ranged from 84.1% and 108.5%, and the analysis results agreed well with those of referenced LC-MS/MS. This investigation not only realized derivatization-free immunoassay for HA, but also provided a valuable guidance for hapten design and development of immunoassay for small molecules
Suppression of proliferation, migration and invasion in non-small cell lung cancer cells via profilin 2 inhibition by microRNA-194
Purpose: To investigate the anti-tumor effect of microRNA-194 (miR-194) and possible relationship with profilin 2.Methods: The expressions of miR-194 and profilin 2 were investigated via bioinformatic analysis and were further verified using quantitative real-time polymerase chain reaction (qRT-PCR) in both normal and non-small cell lung cancer (NSCLC) cells. Dual luciferase reporter assay, together with transfection, was applied to determine the effect of miR-194 and profilin 2 on proliferation, migration and invasion, and its underlying mechanisms.Results: Relatively low expression of miR-194 and high expression of profilin 2 in cancerous lung tissue were found through bioinformatic analysis and further confirmed by qRT-PCR on normal and NSCLC cell lines. Profilin 2 was the direct target of miR-194. Also, miR-194 overexpression inhibited the proliferation, migration and invasion of NSCLC cells, and this suppressive effect was partially reversed by transfection of pcDNA3.1-PFN2 plasmid.Conclusion: The results show that miR-194 plays a tumor suppressor role in NSCLC development. It inhibits the proliferation, migration and invasion of NSCLC cells via profilin 2 suppression. Interventions targeting the miR-194/profilin 2 axis may therefore serve as a clinical strategy for the prevention and treatment of NSCLC metastases.Keywords: Non-small cell lung cancer, MicroRNA-194, Profilin 2, Proliferation, Migration, Invasio
A fingerprint based crypto-biometric system for secure communication
To ensure the secure transmission of data, cryptography is treated as the
most effective solution. Cryptographic key is an important entity in this
procedure. In general, randomly generated cryptographic key (of 256 bits) is
difficult to remember. However, such a key needs to be stored in a protected
place or transported through a shared communication line which, in fact, poses
another threat to security. As an alternative, researchers advocate the
generation of cryptographic key using the biometric traits of both sender and
receiver during the sessions of communication, thus avoiding key storing and at
the same time without compromising the strength in security. Nevertheless, the
biometric-based cryptographic key generation possesses few concerns such as
privacy of biometrics, sharing of biometric data between both communicating
users (i.e., sender and receiver), and generating revocable key from
irrevocable biometric. This work addresses the above-mentioned concerns.
In this work, a framework for secure communication between two users using
fingerprint based crypto-biometric system has been proposed. For this,
Diffie-Hellman (DH) algorithm is used to generate public keys from private keys
of both sender and receiver which are shared and further used to produce a
symmetric cryptographic key at both ends. In this approach, revocable key for
symmetric cryptography is generated from irrevocable fingerprint. The biometric
data is neither stored nor shared which ensures the security of biometric data,
and perfect forward secrecy is achieved using session keys. This work also
ensures the long-term security of messages communicated between two users.
Based on the experimental evaluation over four datasets of FVC2002 and NIST
special database, the proposed framework is privacy-preserving and could be
utilized onto real access control systems.Comment: 29 single column pages, 8 figure
- …