307 research outputs found

    Bifurcation and dynamic response analysis of rotating blade excited by upstream vortices

    Get PDF
    Acknowledgements The authors acknowledge the projects supported by the National Basic Research Program of China (973 Project)(No. 2015CB057405) and the National Natural Science Foundation of China (No. 11372082) and the State Scholarship Fund of CSC. DW thanks for the hospitality of the University of Aberdeen.Peer reviewedPostprin

    Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure

    Full text link
    Since the first appearance in Fridrich's design, the usage of permutation-diffusion structure for designing digital image cryptosystem has been receiving increasing research attention in the field of chaos-based cryptography. Recently, a novel chaotic Image Cipher using one round Modified Permutation-Diffusion pattern (ICMPD) was proposed. Unlike traditional permutation-diffusion structure, the permutation is operated on bit level instead of pixel level and the diffusion is operated on masked pixels, which are obtained by carrying out the classical affine cipher, instead of plain pixels in ICMPD. Following a \textit{divide-and-conquer strategy}, this paper reports that ICMPD can be compromised by a chosen-plaintext attack efficiently and the involved data complexity is linear to the size of the plain-image. Moreover, the relationship between the cryptographic kernel at the diffusion stage of ICMPD and modulo addition then XORing is explored thoroughly

    Effect of thiosulfate on passivity and corrosion properties of stainless steels

    Get PDF
    The effect of thiosulfate on different aspects of pitting corrosion in chloride containing environments as well as the interaction between thiosulfate and stainless steels were studied in this research. Cyclic potentiodynamic polarization tests showed that the presence of thiosulfate hinders the repassivation of the pits. Preferential dissolution of ferrite phase was found on 2101. A statistical analysis of the metastable pitting events monitored by chronoamperometry revealed that thiosulfate promotes pit initiation and stabilizes the growth of metastable pits. Microstructure influenced the pitting corrosion behavior of 2101. The repassivation of metastable pits were closely related to the arrest of pit growth by phase boundaries. Mechanical scratch tests, designed to study the repassivation kinetics and interactions between a bare metal and thiosulfate, showed the effect of potential and microstructure on the growth of pitting in presence of thiosulfate. Interaction of alloying elements such as chromium, nickel, and molybdenum with thiosulfates were also evaluated. XPS showed formation of reduced sulfur species on the surface of pure alloying elements, and provided information regarding the overall corrosion process. Based on these results, a mechanism of pitting in the presence of thiosulfate was proposed.Ph.D

    Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations

    Full text link
    The training and creation of deep learning model is usually costly, thus it can be regarded as an intellectual property (IP) of the model creator. However, malicious users who obtain high-performance models may illegally copy, redistribute, or abuse the models without permission. To deal with such security threats, a few deep neural networks (DNN) IP protection methods have been proposed in recent years. This paper attempts to provide a review of the existing DNN IP protection works and also an outlook. First, we propose the first taxonomy for DNN IP protection methods in terms of six attributes: scenario, mechanism, capacity, type, function, and target models. Then, we present a survey on existing DNN IP protection works in terms of the above six attributes, especially focusing on the challenges these methods face, whether these methods can provide proactive protection, and their resistances to different levels of attacks. After that, we analyze the potential attacks on DNN IP protection methods from the aspects of model modifications, evasion attacks, and active attacks. Besides, a systematic evaluation method for DNN IP protection methods with respect to basic functional metrics, attack-resistance metrics, and customized metrics for different application scenarios is given. Lastly, future research opportunities and challenges on DNN IP protection are presented

    Detect and remove watermark in deep neural networks via generative adversarial networks

    Full text link
    Deep neural networks (DNN) have achieved remarkable performance in various fields. However, training a DNN model from scratch requires a lot of computing resources and training data. It is difficult for most individual users to obtain such computing resources and training data. Model copyright infringement is an emerging problem in recent years. For instance, pre-trained models may be stolen or abuse by illegal users without the authorization of the model owner. Recently, many works on protecting the intellectual property of DNN models have been proposed. In these works, embedding watermarks into DNN based on backdoor is one of the widely used methods. However, when the DNN model is stolen, the backdoor-based watermark may face the risk of being detected and removed by an adversary. In this paper, we propose a scheme to detect and remove watermark in deep neural networks via generative adversarial networks (GAN). We demonstrate that the backdoor-based DNN watermarks are vulnerable to the proposed GAN-based watermark removal attack. The proposed attack method includes two phases. In the first phase, we use the GAN and few clean images to detect and reverse the watermark in the DNN model. In the second phase, we fine-tune the watermarked DNN based on the reversed backdoor images. Experimental evaluations on the MNIST and CIFAR10 datasets demonstrate that, the proposed method can effectively remove about 98% of the watermark in DNN models, as the watermark retention rate reduces from 100% to less than 2% after applying the proposed attack. In the meantime, the proposed attack hardly affects the model's performance. The test accuracy of the watermarked DNN on the MNIST and the CIFAR10 datasets drops by less than 1% and 3%, respectively

    A framework to design interaction control of aerial slung load systems: transfer from existing flight control of under-actuated aerial vehicles

    Get PDF
    This paper establishes a framework within which interaction control is designed for the aerial slung load system composed of an underactuated aerial vehicle, a cable and a load. Instead of developing a new control law for the system, we propose the interaction control scheme by the controllers for under-actuated aerial systems. By selecting the deferentially flat output as the configuration, the equations of motion of the two systems are described in an identical form. The flight control task of the under-actuated aerial vehicle is thus converted into the control of the aerial slung load system. With the help of an admittance filter, the compliant trajectory is generated for the load subject to external interaction force. Moreover, the convergence of the whole system is proved by using the boundedness of the tracking error of vehicle attitude tracking as well as the estimation error of external force. Based on the developed theoretical results, an example is provided to illustrate the design algorithm of interaction controller for the aerial slung load via an existing flight controller directly. The correctness and applicability of the obtained results are demonstrated via the illustrative numerical example
    corecore