新兴的六代(6G)是异质无线网络的集成,它们可以在任何地方和任何时间网络中无缝支持。但是,6G应提供高质量的信任,以满足移动用户的期望。人工智能(AI)被认为是6G中最重要的组成部分之一。然后,基于AI的信任管理是提供可信赖和可靠的服务的有希望的范式。在本文中,为6G无线网络提供了一种生成的对抗性学习信任管理方法。首先审查了一些基于AI的典型信任管理方案,然后引入了潜在的异质和智能6G架构。接下来,开发了AI和信任管理的集成以优化情报和安全性。最后,提出的基于AI的信任管理方法用于确保聚类以实现可靠和实时的通信。仿真结果表明了其在保证网络安全和服务质量方面的出色性能。
translated by 谷歌翻译
由于独特的特征和约束,可信赖和可靠的数据传输是无线传感器网络(WSN)的一项艰巨任务。为了获取安全的数据传输并解决安全性和能源之间的冲突,在本文中,我们提出了一种基于进化游戏的安全聚类协议,具有模糊信任评估和WSN的离群检测。首先,提出了一种模糊的信任评估方法,以将传输证据转化为信任价值,同时有效地减轻了信任的不确定性。然后,提出了基于K-均值的离群检测方案,以进一步分析通过模糊信任评估或信任建议获得的大量信任值。它可以发现传感器节点之间的共同点和差异,同时提高异常检测的准确性。最后,我们提出了一种基于进化游戏的安全群集协议,以在选举群集头时进行安全保证和节能节能节省之间的权衡。失败的传感器节点可以通过隔离可疑节点来安全地选择自己的头部。仿真结果验证了我们的安全聚类协议可以有效地捍卫网络免受内部自私或折衷节点的攻击。相应地,及时的数据传输速率可以显着提高。
translated by 谷歌翻译
安全是工业无线传感器网络(IWSN)的主要问题之一。为了确保群集IWSN中的安全性,本文通过模糊信任评估和离群值检测(SCFTO)提出了一个安全的聚类协议(SCFTO)。首先,为了处理开放无线介质中的传输不确定性,采用间隔2型模糊逻辑控制器来估计信托。然后引入了基于密度的离群检测机制,以获取用于隔离群集头的自适应信任阈值。最后,提出了一种基于模糊的集群头选举方法,以在节能和安全保证之间达到平衡,以便具有更多残留能量或对其他节点置信度更高的正常传感器节点具有更高的概率,使其成为群集头。广泛的实验验证我们的安全聚类协议可以有效地捍卫网络免受内部恶意或受损节点的攻击。
translated by 谷歌翻译
5G边缘计算启用医学互联网(IOMT)是一项有效的技术,可提供分散的医疗服务,而设备到设备(D2D)通信是未来5G网络的有希望的范式。为了确保5G边缘计算中的安全可靠的通信和启用D2D的IOMT系统,本文介绍了一种智能的信任云管理方法。首先,提出了一种积极的培训机制来构建标准信任云。其次,可以通过推断和推荐来建立IOMT设备的个人信任云。第三,提出了一种信任分类方案来确定IOMT设备是否恶意。最后,提出了一种信任云更新机制,以使所提出的信任管理方法适应性和智能在开放的无线介质下。仿真结果表明,所提出的方法可以有效解决信任不确定性问题并提高恶意设备的检测准确性。
translated by 谷歌翻译
启用边缘的工业互联网(IIOT)平台对于加速智能行业的发展具有重要意义。但是,随着实时IIOT应用程序的急剧增加,支持快速响应时间,低延迟和有效的带宽利用率是一个巨大的挑战。为了解决这个问题,最近研究了时间敏感网络(TSN),以通过确定性调度来实现低延迟通信。据我们所知,以前从未对多个流量的可组合性(可能会严重影响计划表现)进行系统分析。在本文中,我们首先分析可组合性问题。然后提出了基于非碰撞理论的确定性调度(NDS)方法,以实现时间敏感流的超低延迟通信。此外,为了提高带宽利用率,为最佳富度流提供了动态队列调度(DQS)方法。实验结果表明,NDS/DQ可以很好地支持确定性的超低潜伏期服务并确保有效的带宽利用率。
translated by 谷歌翻译
Due to the increasing usage of machine learning (ML) techniques in security- and safety-critical domains, such as autonomous systems and medical diagnosis, ensuring correct behavior of ML systems, especially for different corner cases, is of growing importance. In this paper, we propose a generic framework for evaluating security and robustness of ML systems using different real-world safety properties. We further design, implement and evaluate VeriVis, a scalable methodology that can verify a diverse set of safety properties for state-of-the-art computer vision systems with only blackbox access. VeriVis leverage different input space reduction techniques for efficient verification of different safety properties. VeriVis is able to find thousands of safety violations in fifteen state-of-the-art computer vision systems including ten Deep Neural Networks (DNNs) such as Inception-v3 and Nvidia's Dave self-driving system with thousands of neurons as well as five commercial third-party vision APIs including Google vision and Clarifai for twelve different safety properties. Furthermore, VeriVis can successfully verify local safety properties, on average, for around 31.7% of the test images. VeriVis finds up to 64.8x more violations than existing gradient-based methods that, unlike VeriVis, cannot ensure non-existence of any violations. Finally, we show that retraining using the safety violations detected by VeriVis can reduce the average number of violations up to 60.2%.
translated by 谷歌翻译
Deep learning (DL) systems are increasingly deployed in safety-and security-critical domains including self-driving cars and malware detection, where the correctness and predictability of a system's behavior for corner case inputs are of great importance. Existing DL testing depends heavily on manually labeled data and therefore often fails to expose erroneous behaviors for rare inputs.We design, implement, and evaluate DeepXplore, the first whitebox framework for systematically testing real-world DL systems. First, we introduce neuron coverage for systematically measuring the parts of a DL system exercised by test inputs. Next, we leverage multiple DL systems with similar functionality as cross-referencing oracles to avoid manual checking. Finally, we demonstrate how finding inputs for DL systems that both trigger many differential behaviors and achieve high neuron coverage can be represented as a joint optimization problem and solved efficiently using gradientbased search techniques.DeepXplore efficiently finds thousands of incorrect corner case behaviors (e.g., self-driving cars crashing into guard rails and malware masquerading as benign software) in stateof-the-art DL models with thousands of neurons trained on five popular datasets including ImageNet and Udacity selfdriving challenge data. For all tested DL models, on average, DeepXplore generated one test input demonstrating incorrect behavior within one second while running only on a commodity laptop. We further show that the test inputs generated by DeepXplore can also be used to retrain the corresponding DL model to improve the model's accuracy by up to 3%.
translated by 谷歌翻译
In this chapter, we review and discuss the transformation of AI technology in HCI/UX work and assess how AI technology will change how we do the work. We first discuss how AI can be used to enhance the result of user research and design evaluation. We then discuss how AI technology can be used to enhance HCI/UX design. Finally, we discuss how AI-enabled capabilities can improve UX when users interact with computing systems, applications, and services.
translated by 谷歌翻译
An increasing number of public datasets have shown a marked clinical impact on assessing anatomical structures. However, each of the datasets is small, partially labeled, and rarely investigates severe tumor subjects. Moreover, current models are limited to segmenting specific organs/tumors, which can not be extended to novel domains and classes. To tackle these limitations, we introduce embedding learned from Contrastive Language-Image Pre-training (CLIP) to segmentation models, dubbed the CLIP-Driven Universal Model. The Universal Model can better segment 25 organs and 6 types of tumors by exploiting the semantic relationship between abdominal structures. The model is developed from an assembly of 14 datasets with 3,410 CT scans and evaluated on 6,162 external CT scans from 3 datasets. We rank first on the public leaderboard of the Medical Segmentation Decathlon (MSD) and achieve the state-of-the-art results on Beyond The Cranial Vault (BTCV). Compared with dataset-specific models, the Universal Model is computationally more efficient (6x faster), generalizes better to CT scans from varying sites, and shows stronger transfer learning performance on novel tasks. The design of CLIP embedding enables the Universal Model to be easily extended to new classes without catastrophically forgetting the previously learned classes.
translated by 谷歌翻译
Recent advances in self-supervised learning (SSL) in computer vision are primarily comparative, whose goal is to preserve invariant and discriminative semantics in latent representations by comparing siamese image views. However, the preserved high-level semantics do not contain enough local information, which is vital in medical image analysis (e.g., image-based diagnosis and tumor segmentation). To mitigate the locality problem of comparative SSL, we propose to incorporate the task of pixel restoration for explicitly encoding more pixel-level information into high-level semantics. We also address the preservation of scale information, a powerful tool in aiding image understanding but has not drawn much attention in SSL. The resulting framework can be formulated as a multi-task optimization problem on the feature pyramid. Specifically, we conduct multi-scale pixel restoration and siamese feature comparison in the pyramid. In addition, we propose non-skip U-Net to build the feature pyramid and develop sub-crop to replace multi-crop in 3D medical imaging. The proposed unified SSL framework (PCRLv2) surpasses its self-supervised counterparts on various tasks, including brain tumor segmentation (BraTS 2018), chest pathology identification (ChestX-ray, CheXpert), pulmonary nodule detection (LUNA), and abdominal organ segmentation (LiTS), sometimes outperforming them by large margins with limited annotations.
translated by 谷歌翻译