14 research outputs found

    Facial Data Minimization: Shallow Model as Your Privacy Filter

    Full text link
    Face recognition service has been used in many fields and brings much convenience to people. However, once the user's facial data is transmitted to a service provider, the user will lose control of his/her private data. In recent years, there exist various security and privacy issues due to the leakage of facial data. Although many privacy-preserving methods have been proposed, they usually fail when they are not accessible to adversaries' strategies or auxiliary data. Hence, in this paper, by fully considering two cases of uploading facial images and facial features, which are very typical in face recognition service systems, we proposed a data privacy minimization transformation (PMT) method. This method can process the original facial data based on the shallow model of authorized services to obtain the obfuscated data. The obfuscated data can not only maintain satisfactory performance on authorized models and restrict the performance on other unauthorized models but also prevent original privacy data from leaking by AI methods and human visual theft. Additionally, since a service provider may execute preprocessing operations on the received data, we also propose an enhanced perturbation method to improve the robustness of PMT. Besides, to authorize one facial image to multiple service models simultaneously, a multiple restriction mechanism is proposed to improve the scalability of PMT. Finally, we conduct extensive experiments and evaluate the effectiveness of the proposed PMT in defending against face reconstruction, data abuse, and face attribute estimation attacks. These experimental results demonstrate that PMT performs well in preventing facial data abuse and privacy leakage while maintaining face recognition accuracy.Comment: 14 pages, 11 figure

    Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention

    Full text link
    Transformer-based models, such as BERT and GPT, have been widely adopted in natural language processing (NLP) due to their exceptional performance. However, recent studies show their vulnerability to textual adversarial attacks where the model's output can be misled by intentionally manipulating the text inputs. Despite various methods that have been proposed to enhance the model's robustness and mitigate this vulnerability, many require heavy consumption resources (e.g., adversarial training) or only provide limited protection (e.g., defensive dropout). In this paper, we propose a novel method called dynamic attention, tailored for the transformer architecture, to enhance the inherent robustness of the model itself against various adversarial attacks. Our method requires no downstream task knowledge and does not incur additional costs. The proposed dynamic attention consists of two modules: (I) attention rectification, which masks or weakens the attention value of the chosen tokens, and (ii) dynamic modeling, which dynamically builds the set of candidate tokens. Extensive experiments demonstrate that dynamic attention significantly mitigates the impact of adversarial attacks, improving up to 33\% better performance than previous methods against widely-used adversarial attacks. The model-level design of dynamic attention enables it to be easily combined with other defense methods (e.g., adversarial training) to further enhance the model's robustness. Furthermore, we demonstrate that dynamic attention preserves the state-of-the-art robustness space of the original model compared to other dynamic modeling methods

    Construction of T cell exhaustion model for predicting survival and immunotherapy effect of bladder cancer based on WGCNA

    Get PDF
    IntroductionThe prognosis of bladder cancer (BLCA) and response to immune checkpoint inhibitors (ICIs) are determined by multiple factors. Existed biomarkers for predicting the effect of immunotherapy cannot accurately predict the response of BLCA patients to ICIs.MethodsTo further accurately stratify patients’ response to ICIs and identify potential novel predictive biomarkers, we used the known T cell exhaustion (TEX)-related specific pathways, including tumor necrosis factor (TNF), interleukin (IL)-2, interferon (IFN)-g, and T- cell cytotoxicpathways, combined with weighted correlation network analysis (WGCNA) to analyze the characteristics of TEX in BLCA in detail, constructed a TEX model.ResultsThis model including 28 genes can robustly predict the survival of BLCA and immunotherapeutic efficacy. This model could divide BLCA into two groups, TEXhigh and TEXlow, with significantly different prognoses, clinical features, and reactivity to ICIs. The critical characteristic genes, such as potential biomarkers Charged Multivesicular Body Protein 4C (CHMP4C), SH2 Domain Containing 2A (SH2D2A), Prickle Planar Cell Polarity Protein 3 (PRICKLE3) and Zinc Finger Protein 165 (ZNF165) were verified in BLCA clinical samples by real-time quantitative chain reaction (qPCR) and immunohistochemistry (IHC).DiscussionOur findings show that the TEX model can serve as biological markers for predicting the response to ICIs, and the involving molecules in the TEX model might provide new potential targets for immunotherapy in BLCA

    40Gb/s Secure Optical Communication Based on Symbol-by-Symbol Optical Phase Encryption

    No full text

    Key Space Enhancement in Chaotic Secure Communication Utilizing Monolithically Integrated Multi-Section Semiconductor Lasers

    No full text
    Chaotic secure communication schemes encounter a conflict of key space enhancement between the consistency and complexity of chaotic transceivers. In this paper, we propose a monolithically integrated multi-section semiconductor laser (MIMSL), used as a compact chaotic transceiver with an enhanced key space. The MIMSL consists of a distributed feedback (DFB) laser section, a semiconductor optical amplifier (SOA) section, two phase (P) sections and a passive optical waveguide. We simulate the dynamics of the MIMSL by applying the time-dependent coupled-wave equations for traveling-wave optical fields. Further, we numerically demonstrate a security enhancement of the unidirectional chaotic communication scheme using the MIMSL transceivers with independent high-speed modulation in the phase sections of the MIMSL. The security of our scheme depends not only on the difficulty of identifying the MIMSL structural parameters and the bias current of each section, but also on the phase shifts in two phase sections providing the additional dimension of security key space. Final simulation results show that a total of 248 key spaces can be achieved with a data rate of 2.5 Gb/s and an injection strength of 0.36

    Sub-40 GHz Broadband Polarization Chaos Generation Using Mutually Coupled Free-Running VCSELs

    Get PDF
    We propose a simple method to generate broadband polarization chaos using two mutually coupled free-running vertical-cavity surface-emitting lasers (VCSELs). Specifically, we quantitatively investigate the effect of critical external parameters (bias current, frequency detuning and coupling coefficient) on the polarization chaos bandwidth in the scenarios of parallel injection and orthogonal injection, and reveal the physical mechanism of bandwidth enhancement in two scenarios. Final simulation results show that the bandwidth of chaotic signals obtained from parallel and orthogonal injection can reach 35.15 GHz and 32.96 GHz, respectively

    Scalable parallel ultrafast optical random bit generation based on a single chaotic microcomb

    No full text
    Abstract Random bit generators are critical for information security, cryptography, stochastic modeling, and simulations. Speed and scalability are key challenges faced by current physical random bit generation. Herein, we propose a massively parallel scheme for ultrafast random bit generation towards rates of order 100 terabit per second based on a single micro-ring resonator. A modulation-instability-driven chaotic comb in a micro-ring resonator enables the simultaneous generation of hundreds of independent and unbiased random bit streams. A proof-of-concept experiment demonstrates that using our method, random bit streams beyond 2 terabit per second can be successfully generated with only 7 comb lines. This bit rate can be easily enhanced by further increasing the number of comb lines used. Our approach provides a chip-scale solution to random bit generation for secure communication and high-performance computation, and offers superhigh speed and large scalability

    Scalable parallel ultrafast optical random bit generation based on a single chaotic microcomb

    No full text
    Random bit generators are critical for information security, cryptography, stochastic modeling, and simulations. Speed and scalability are key challenges faced by current physical random bit generation. Herein, we propose a massively parallel scheme for ultrafast random bit generation towards rates of order 100 terabit per second based on a single micro-ring resonator. A modulation-instability-driven chaotic comb in a micro-ring resonator enables the simultaneous generation of hundreds of independent and unbiased random bit streams. A proof-of-concept experiment demonstrates that using our method, random bit streams beyond 2 terabit per second can be successfully generated with only 7 comb lines. This bit rate can be easily enhanced by further increasing the number of comb lines used. Our approach provides a chip-scale solution to random bit generation for secure communication and high-performance computation, and offers superhigh speed and large scalability
    corecore