6 research outputs found

    Physical, physiological demands and movement profiles of elite men’s field hockey games

    Get PDF
    The aim of this study was to investigate physical demands, physiological demands, and movement profiles of different positions across four quarters in professional men’s field hockey games. Eighteen professional male field hockey players participated in the study, and data were collected in eleven official matches. Players wore global positioning system units and heart rate monitors to collect physical, physiological, and movement profile data. Defenders had significantly higher absolute total distance covered, player load, acceleration and deceleration count, and forward-backward initial movement analysis (IMA) count, but lower high speed running distance, compared with midfielders and forwards (p<.05). However, when using relative metrics (normalised by playing time), defenders had the lowest physical and physiological outputs, and forwards had the highest (p<.05). Total distance covered per minute, high-speed running distance per minute, player load per minute, acceleration and deceleration count per minute, and repeated high-intensity efforts per minute were all significantly higher in quarter 1 than in other three quarters (p<.05). The percentages of linear running and non-linear dynamic movement duration decreased quarter by quarter. Modified training impulse per minute reached its peak in quarter 2 (p<.05). It was concluded that defenders had the highest volume in terms of the game demands due to their high playing minutes; however, they had the lowest relative volume compared with the other two positions. Forwards had the highest linear running intensity, while midfielders were required to perform more multi-directional, non-linear movements. Quarter 1 was the most active quarter and players became fatigued in quarter 2. IMA counts were not sensitive to fatigue compared to movement profile and modified training impulse variables

    FDINet: Protecting against DNN Model Extraction via Feature Distortion Index

    Full text link
    Machine Learning as a Service (MLaaS) platforms have gained popularity due to their accessibility, cost-efficiency, scalability, and rapid development capabilities. However, recent research has highlighted the vulnerability of cloud-based models in MLaaS to model extraction attacks. In this paper, we introduce FDINET, a novel defense mechanism that leverages the feature distribution of deep neural network (DNN) models. Concretely, by analyzing the feature distribution from the adversary's queries, we reveal that the feature distribution of these queries deviates from that of the model's training set. Based on this key observation, we propose Feature Distortion Index (FDI), a metric designed to quantitatively measure the feature distribution deviation of received queries. The proposed FDINET utilizes FDI to train a binary detector and exploits FDI similarity to identify colluding adversaries from distributed extraction attacks. We conduct extensive experiments to evaluate FDINET against six state-of-the-art extraction attacks on four benchmark datasets and four popular model architectures. Empirical results demonstrate the following findings FDINET proves to be highly effective in detecting model extraction, achieving a 100% detection accuracy on DFME and DaST. FDINET is highly efficient, using just 50 queries to raise an extraction alarm with an average confidence of 96.08% for GTSRB. FDINET exhibits the capability to identify colluding adversaries with an accuracy exceeding 91%. Additionally, it demonstrates the ability to detect two types of adaptive attacks.Comment: 13 pages, 7 figure

    How ChatGPT is Solving Vulnerability Management Problem

    Full text link
    Recently, ChatGPT has attracted great attention from the code analysis domain. Prior works show that ChatGPT has the capabilities of processing foundational code analysis tasks, such as abstract syntax tree generation, which indicates the potential of using ChatGPT to comprehend code syntax and static behaviors. However, it is unclear whether ChatGPT can complete more complicated real-world vulnerability management tasks, such as the prediction of security relevance and patch correctness, which require an all-encompassing understanding of various aspects, including code syntax, program semantics, and related manual comments. In this paper, we explore ChatGPT's capabilities on 6 tasks involving the complete vulnerability management process with a large-scale dataset containing 78,445 samples. For each task, we compare ChatGPT against SOTA approaches, investigate the impact of different prompts, and explore the difficulties. The results suggest promising potential in leveraging ChatGPT to assist vulnerability management. One notable example is ChatGPT's proficiency in tasks like generating titles for software bug reports. Furthermore, our findings reveal the difficulties encountered by ChatGPT and shed light on promising future directions. For instance, directly providing random demonstration examples in the prompt cannot consistently guarantee good performance in vulnerability management. By contrast, leveraging ChatGPT in a self-heuristic way -- extracting expertise from demonstration examples itself and integrating the extracted expertise in the prompt is a promising research direction. Besides, ChatGPT may misunderstand and misuse the information in the prompt. Consequently, effectively guiding ChatGPT to focus on helpful information rather than the irrelevant content is still an open problem
    corecore