14 research outputs found
Facial Data Minimization: Shallow Model as Your Privacy Filter
Face recognition service has been used in many fields and brings much
convenience to people. However, once the user's facial data is transmitted to a
service provider, the user will lose control of his/her private data. In recent
years, there exist various security and privacy issues due to the leakage of
facial data. Although many privacy-preserving methods have been proposed, they
usually fail when they are not accessible to adversaries' strategies or
auxiliary data. Hence, in this paper, by fully considering two cases of
uploading facial images and facial features, which are very typical in face
recognition service systems, we proposed a data privacy minimization
transformation (PMT) method. This method can process the original facial data
based on the shallow model of authorized services to obtain the obfuscated
data. The obfuscated data can not only maintain satisfactory performance on
authorized models and restrict the performance on other unauthorized models but
also prevent original privacy data from leaking by AI methods and human visual
theft. Additionally, since a service provider may execute preprocessing
operations on the received data, we also propose an enhanced perturbation
method to improve the robustness of PMT. Besides, to authorize one facial image
to multiple service models simultaneously, a multiple restriction mechanism is
proposed to improve the scalability of PMT. Finally, we conduct extensive
experiments and evaluate the effectiveness of the proposed PMT in defending
against face reconstruction, data abuse, and face attribute estimation attacks.
These experimental results demonstrate that PMT performs well in preventing
facial data abuse and privacy leakage while maintaining face recognition
accuracy.Comment: 14 pages, 11 figure
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention
Transformer-based models, such as BERT and GPT, have been widely adopted in
natural language processing (NLP) due to their exceptional performance.
However, recent studies show their vulnerability to textual adversarial attacks
where the model's output can be misled by intentionally manipulating the text
inputs. Despite various methods that have been proposed to enhance the model's
robustness and mitigate this vulnerability, many require heavy consumption
resources (e.g., adversarial training) or only provide limited protection
(e.g., defensive dropout). In this paper, we propose a novel method called
dynamic attention, tailored for the transformer architecture, to enhance the
inherent robustness of the model itself against various adversarial attacks.
Our method requires no downstream task knowledge and does not incur additional
costs. The proposed dynamic attention consists of two modules: (I) attention
rectification, which masks or weakens the attention value of the chosen tokens,
and (ii) dynamic modeling, which dynamically builds the set of candidate
tokens. Extensive experiments demonstrate that dynamic attention significantly
mitigates the impact of adversarial attacks, improving up to 33\% better
performance than previous methods against widely-used adversarial attacks. The
model-level design of dynamic attention enables it to be easily combined with
other defense methods (e.g., adversarial training) to further enhance the
model's robustness. Furthermore, we demonstrate that dynamic attention
preserves the state-of-the-art robustness space of the original model compared
to other dynamic modeling methods
Construction of T cell exhaustion model for predicting survival and immunotherapy effect of bladder cancer based on WGCNA
IntroductionThe prognosis of bladder cancer (BLCA) and response to immune checkpoint inhibitors (ICIs) are determined by multiple factors. Existed biomarkers for predicting the effect of immunotherapy cannot accurately predict the response of BLCA patients to ICIs.MethodsTo further accurately stratify patients’ response to ICIs and identify potential novel predictive biomarkers, we used the known T cell exhaustion (TEX)-related specific pathways, including tumor necrosis factor (TNF), interleukin (IL)-2, interferon (IFN)-g, and T- cell cytotoxicpathways, combined with weighted correlation network analysis (WGCNA) to analyze the characteristics of TEX in BLCA in detail, constructed a TEX model.ResultsThis model including 28 genes can robustly predict the survival of BLCA and immunotherapeutic efficacy. This model could divide BLCA into two groups, TEXhigh and TEXlow, with significantly different prognoses, clinical features, and reactivity to ICIs. The critical characteristic genes, such as potential biomarkers Charged Multivesicular Body Protein 4C (CHMP4C), SH2 Domain Containing 2A (SH2D2A), Prickle Planar Cell Polarity Protein 3 (PRICKLE3) and Zinc Finger Protein 165 (ZNF165) were verified in BLCA clinical samples by real-time quantitative chain reaction (qPCR) and immunohistochemistry (IHC).DiscussionOur findings show that the TEX model can serve as biological markers for predicting the response to ICIs, and the involving molecules in the TEX model might provide new potential targets for immunotherapy in BLCA
Key Space Enhancement in Chaotic Secure Communication Utilizing Monolithically Integrated Multi-Section Semiconductor Lasers
Chaotic secure communication schemes encounter a conflict of key space enhancement between the consistency and complexity of chaotic transceivers. In this paper, we propose a monolithically integrated multi-section semiconductor laser (MIMSL), used as a compact chaotic transceiver with an enhanced key space. The MIMSL consists of a distributed feedback (DFB) laser section, a semiconductor optical amplifier (SOA) section, two phase (P) sections and a passive optical waveguide. We simulate the dynamics of the MIMSL by applying the time-dependent coupled-wave equations for traveling-wave optical fields. Further, we numerically demonstrate a security enhancement of the unidirectional chaotic communication scheme using the MIMSL transceivers with independent high-speed modulation in the phase sections of the MIMSL. The security of our scheme depends not only on the difficulty of identifying the MIMSL structural parameters and the bias current of each section, but also on the phase shifts in two phase sections providing the additional dimension of security key space. Final simulation results show that a total of 248 key spaces can be achieved with a data rate of 2.5 Gb/s and an injection strength of 0.36
Sub-40 GHz Broadband Polarization Chaos Generation Using Mutually Coupled Free-Running VCSELs
We propose a simple method to generate broadband polarization chaos using two mutually coupled free-running vertical-cavity surface-emitting lasers (VCSELs). Specifically, we quantitatively investigate the effect of critical external parameters (bias current, frequency detuning and coupling coefficient) on the polarization chaos bandwidth in the scenarios of parallel injection and orthogonal injection, and reveal the physical mechanism of bandwidth enhancement in two scenarios. Final simulation results show that the bandwidth of chaotic signals obtained from parallel and orthogonal injection can reach 35.15 GHz and 32.96 GHz, respectively
Scalable parallel ultrafast optical random bit generation based on a single chaotic microcomb
Abstract Random bit generators are critical for information security, cryptography, stochastic modeling, and simulations. Speed and scalability are key challenges faced by current physical random bit generation. Herein, we propose a massively parallel scheme for ultrafast random bit generation towards rates of order 100 terabit per second based on a single micro-ring resonator. A modulation-instability-driven chaotic comb in a micro-ring resonator enables the simultaneous generation of hundreds of independent and unbiased random bit streams. A proof-of-concept experiment demonstrates that using our method, random bit streams beyond 2 terabit per second can be successfully generated with only 7 comb lines. This bit rate can be easily enhanced by further increasing the number of comb lines used. Our approach provides a chip-scale solution to random bit generation for secure communication and high-performance computation, and offers superhigh speed and large scalability
Scalable parallel ultrafast optical random bit generation based on a single chaotic microcomb
Random bit generators are critical for information security, cryptography, stochastic modeling, and simulations. Speed and scalability are key challenges faced by current physical random bit generation. Herein, we propose a massively parallel scheme for ultrafast random bit generation towards rates of order 100 terabit per second based on a single micro-ring resonator. A modulation-instability-driven chaotic comb in a micro-ring resonator enables the simultaneous generation of hundreds of independent and unbiased random bit streams. A proof-of-concept experiment demonstrates that using our method, random bit streams beyond 2 terabit per second can be successfully generated with only 7 comb lines. This bit rate can be easily enhanced by further increasing the number of comb lines used. Our approach provides a chip-scale solution to random bit generation for secure communication and high-performance computation, and offers superhigh speed and large scalability
Synthesis and characterization of red phosphorescent-conjugated polymers containing charged iridium complexes and carbazole unit
10.1016/j.synthmet.2007.07.017Synthetic Metals15721813-822SYME