6 research outputs found
Physical, physiological demands and movement profiles of elite men’s field hockey games
The aim of this study was to investigate physical demands, physiological demands, and movement profiles of different positions across four quarters in professional men’s field hockey games. Eighteen professional male field hockey players participated in the study, and data were collected in eleven official matches. Players wore global positioning system units and heart rate monitors to collect physical, physiological, and movement profile data. Defenders had significantly higher absolute total distance covered, player load, acceleration and deceleration count, and forward-backward initial movement analysis (IMA) count, but lower high speed running distance, compared with midfielders and forwards (p<.05). However, when using relative metrics (normalised by playing time), defenders had the lowest physical and physiological outputs, and forwards had the highest (p<.05). Total distance covered per minute, high-speed running distance per minute, player load per minute, acceleration and deceleration count per minute, and repeated high-intensity efforts per minute were all significantly higher in quarter 1 than in other three quarters (p<.05). The percentages of linear running and non-linear dynamic movement duration decreased quarter by quarter. Modified training impulse per minute reached its peak in quarter 2 (p<.05). It was concluded that defenders had the highest volume in terms of the game demands due to their high playing minutes; however, they had the lowest relative volume compared with the other two positions. Forwards had the highest linear running intensity, while midfielders were required to perform more multi-directional, non-linear movements. Quarter 1 was the most active quarter and players became fatigued in quarter 2. IMA counts were not sensitive to fatigue compared to movement profile and modified training impulse variables
FDINet: Protecting against DNN Model Extraction via Feature Distortion Index
Machine Learning as a Service (MLaaS) platforms have gained popularity due to
their accessibility, cost-efficiency, scalability, and rapid development
capabilities. However, recent research has highlighted the vulnerability of
cloud-based models in MLaaS to model extraction attacks. In this paper, we
introduce FDINET, a novel defense mechanism that leverages the feature
distribution of deep neural network (DNN) models. Concretely, by analyzing the
feature distribution from the adversary's queries, we reveal that the feature
distribution of these queries deviates from that of the model's training set.
Based on this key observation, we propose Feature Distortion Index (FDI), a
metric designed to quantitatively measure the feature distribution deviation of
received queries. The proposed FDINET utilizes FDI to train a binary detector
and exploits FDI similarity to identify colluding adversaries from distributed
extraction attacks. We conduct extensive experiments to evaluate FDINET against
six state-of-the-art extraction attacks on four benchmark datasets and four
popular model architectures. Empirical results demonstrate the following
findings FDINET proves to be highly effective in detecting model extraction,
achieving a 100% detection accuracy on DFME and DaST. FDINET is highly
efficient, using just 50 queries to raise an extraction alarm with an average
confidence of 96.08% for GTSRB. FDINET exhibits the capability to identify
colluding adversaries with an accuracy exceeding 91%. Additionally, it
demonstrates the ability to detect two types of adaptive attacks.Comment: 13 pages, 7 figure
How ChatGPT is Solving Vulnerability Management Problem
Recently, ChatGPT has attracted great attention from the code analysis
domain. Prior works show that ChatGPT has the capabilities of processing
foundational code analysis tasks, such as abstract syntax tree generation,
which indicates the potential of using ChatGPT to comprehend code syntax and
static behaviors. However, it is unclear whether ChatGPT can complete more
complicated real-world vulnerability management tasks, such as the prediction
of security relevance and patch correctness, which require an all-encompassing
understanding of various aspects, including code syntax, program semantics, and
related manual comments.
In this paper, we explore ChatGPT's capabilities on 6 tasks involving the
complete vulnerability management process with a large-scale dataset containing
78,445 samples. For each task, we compare ChatGPT against SOTA approaches,
investigate the impact of different prompts, and explore the difficulties. The
results suggest promising potential in leveraging ChatGPT to assist
vulnerability management. One notable example is ChatGPT's proficiency in tasks
like generating titles for software bug reports. Furthermore, our findings
reveal the difficulties encountered by ChatGPT and shed light on promising
future directions. For instance, directly providing random demonstration
examples in the prompt cannot consistently guarantee good performance in
vulnerability management. By contrast, leveraging ChatGPT in a self-heuristic
way -- extracting expertise from demonstration examples itself and integrating
the extracted expertise in the prompt is a promising research direction.
Besides, ChatGPT may misunderstand and misuse the information in the prompt.
Consequently, effectively guiding ChatGPT to focus on helpful information
rather than the irrelevant content is still an open problem