-
Formal Security Analysis on dBFT Protocol of NEO
Authors:
Qin Wang,
Rujia Li,
Shiping Chen,
Yang Xiang
Abstract:
NEO is one of the top public chains worldwide. We focus on its backbone consensus protocol, called delegated Byzantine Fault Tolerance (dBFT). The dBFT protocol has been adopted by a variety of blockchain systems such as ONT. dBFT claims to guarantee the security when no more than $f = \lfloor \frac{n}{3} \rfloor$ nodes are Byzantine, where $n$ is the total number of consensus participants. Howeve…
▽ More
NEO is one of the top public chains worldwide. We focus on its backbone consensus protocol, called delegated Byzantine Fault Tolerance (dBFT). The dBFT protocol has been adopted by a variety of blockchain systems such as ONT. dBFT claims to guarantee the security when no more than $f = \lfloor \frac{n}{3} \rfloor$ nodes are Byzantine, where $n$ is the total number of consensus participants. However, we identify attacks to break the claimed security. In this paper, we show our results by providing a security analysis on its dBFT protocol. First, we evaluate NEO's source code and formally present the procedures of dBFT via the state machine replication (SMR) model. Next, we provide a theoretical analysis with two example attacks. These attacks break the security of dBFT with no more than $f$ nodes. Then, we provide recommendations on how to fix the system against the identified attacks. The suggested fixes have been accepted by the NEO official team. Finally, we further discuss the reasons causing such issues, the relationship with current permissioned blockchain systems, and the scope of potential influence.
△ Less
Submitted 19 June, 2022; v1 submitted 16 May, 2021;
originally announced May 2021.
-
An Extension of BIM Using AI: a Multi Working-Machines Pathfinding Solution
Authors:
Yusheng Xiang,
Kailun Liu,
Tianqing Su,
Jun Li,
Shirui Ouyang,
Samuel S. Mao,
Marcus Geimer
Abstract:
Multi working-machines pathfinding solution enables more mobile machines simultaneously to work inside of a working site so that the productivity can be expected to increase evolutionary. To date, the potential cooperation conflicts among construction machinery limit the amount of construction machinery investment in a concrete working site. To solve the cooperation problem, civil engineers optimi…
▽ More
Multi working-machines pathfinding solution enables more mobile machines simultaneously to work inside of a working site so that the productivity can be expected to increase evolutionary. To date, the potential cooperation conflicts among construction machinery limit the amount of construction machinery investment in a concrete working site. To solve the cooperation problem, civil engineers optimize the working site from a logistic perspective while computer scientists improve pathfinding algorithms' performance on the given benchmark maps. In the practical implementation of a construction site, it is sensible to solve the problem with a hybrid solution; therefore, in our study, we proposed an algorithm based on a cutting-edge multi-pathfinding algorithm to enable the massive number of machines cooperation and offer the advice to modify the unreasonable part of the working site in the meantime. Using the logistic information from BIM, such as unloading and loading point, we added a pathfinding solution for multi machines to improve the whole construction fleet's productivity. In the previous study, the experiments were limited to no more than ten participants, and the computational time to gather the solution was not given; thus, we publish our pseudo-code, our tested map, and benchmark our results. Our algorithm's most extensive feature is that it can quickly replan the path to overcome the emergency on a construction site.
△ Less
Submitted 14 May, 2021;
originally announced May 2021.
-
Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey
Authors:
Xiaoyu Zhang,
Chao Chen,
Yi Xie,
Xiaofeng Chen,
Jun Zhang,
Yang Xiang
Abstract:
Deep Neural Network (DNN), one of the most powerful machine learning algorithms, is increasingly leveraged to overcome the bottleneck of effectively exploring and analyzing massive data to boost advanced scientific development. It is not a surprise that cloud computing providers offer the cloud-based DNN as an out-of-the-box service. Though there are some benefits from the cloud-based DNN, the int…
▽ More
Deep Neural Network (DNN), one of the most powerful machine learning algorithms, is increasingly leveraged to overcome the bottleneck of effectively exploring and analyzing massive data to boost advanced scientific development. It is not a surprise that cloud computing providers offer the cloud-based DNN as an out-of-the-box service. Though there are some benefits from the cloud-based DNN, the interaction mechanism among two or multiple entities in the cloud inevitably induces new privacy risks. This survey presents the most recent findings of privacy attacks and defenses appeared in cloud-based neural network services. We systematically and thoroughly review privacy attacks and defenses in the pipeline of cloud-based DNN service, i.e., data manipulation, training, and prediction. In particular, a new theory, called cloud-based ML privacy game, is extracted from the recently published literature to provide a deep understanding of state-of-the-art research. Finally, the challenges and future work are presented to help researchers to continue to push forward the competitions between privacy attackers and defenders.
△ Less
Submitted 13 May, 2021;
originally announced May 2021.
-
Unsupervised Knowledge Graph Alignment by Probabilistic Reasoning and Semantic Embedding
Authors:
Zhiyuan Qi,
Ziheng Zhang,
Jiaoyan Chen,
Xi Chen,
Yuejia Xiang,
Ningyu Zhang,
Yefeng Zheng
Abstract:
Knowledge Graph (KG) alignment is to discover the mappings (i.e., equivalent entities, relations, and others) between two KGs. The existing methods can be divided into the embedding-based models, and the conventional reasoning and lexical matching based systems. The former compute the similarity of entities via their cross-KG embeddings, but they usually rely on an ideal supervised learning settin…
▽ More
Knowledge Graph (KG) alignment is to discover the mappings (i.e., equivalent entities, relations, and others) between two KGs. The existing methods can be divided into the embedding-based models, and the conventional reasoning and lexical matching based systems. The former compute the similarity of entities via their cross-KG embeddings, but they usually rely on an ideal supervised learning setting for good performance and lack appropriate reasoning to avoid logically wrong mappings; while the latter address the reasoning issue but are poor at utilizing the KG graph structures and the entity contexts. In this study, we aim at combining the above two solutions and thus propose an iterative framework named PRASE which is based on probabilistic reasoning and semantic embedding. It learns the KG embeddings via entity mappings from a probabilistic reasoning system named PARIS, and feeds the resultant entity mappings and embeddings back into PARIS for augmentation. The PRASE framework is compatible with different embedding-based models, and our experiments on multiple datasets have demonstrated its state-of-the-art performance.
△ Less
Submitted 11 June, 2021; v1 submitted 12 May, 2021;
originally announced May 2021.
-
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference
Authors:
Xiaotao Feng,
Ruoxi Sun,
Xiaogang Zhu,
Minhui Xue,
Sheng Wen,
Dongxi Liu,
Surya Nepal,
Yang Xiang
Abstract:
The proliferation of Internet of Things (IoT) devices has made people's lives more convenient, but it has also raised many security concerns. Due to the difficulty of obtaining and emulating IoT firmware, the black-box fuzzing of IoT devices has become a viable option. However, existing black-box fuzzers cannot form effective mutation optimization mechanisms to guide their testing processes, mainl…
▽ More
The proliferation of Internet of Things (IoT) devices has made people's lives more convenient, but it has also raised many security concerns. Due to the difficulty of obtaining and emulating IoT firmware, the black-box fuzzing of IoT devices has become a viable option. However, existing black-box fuzzers cannot form effective mutation optimization mechanisms to guide their testing processes, mainly due to the lack of feedback. It is difficult or even impossible to apply existing grammar-based fuzzing strategies. Therefore, an efficient fuzzing approach with syntax inference is required in the IoT fuzzing domain. To address these critical problems, we propose a novel automatic black-box fuzzing for IoT firmware, termed Snipuzz. Snipuzz runs as a client communicating with the devices and infers message snippets for mutation based on the responses. Each snippet refers to a block of consecutive bytes that reflect the approximate code coverage in fuzzing. This mutation strategy based on message snippets considerably narrows down the search space to change the probing messages. We compared Snipuzz with four state-of-the-art IoT fuzzing approaches, i.e., IoTFuzzer, BooFuzz, Doona, and Nemesys. Snipuzz not only inherits the advantages of app-based fuzzing (e.g., IoTFuzzer, but also utilizes communication responses to perform efficient mutation. Furthermore, Snipuzz is lightweight as its execution does not rely on any prerequisite operations, such as reverse engineering of apps. We also evaluated Snipuzz on 20 popular real-world IoT devices. Our results show that Snipuzz could identify 5 zero-day vulnerabilities, and 3 of them could be exposed only by Snipuzz. All the newly discovered vulnerabilities have been confirmed by their vendors.
△ Less
Submitted 21 May, 2021; v1 submitted 12 May, 2021;
originally announced May 2021.
-
Evaluation of Hadronic Emission in Starburst Galaxies and Star-forming Galaxies
Authors:
Yun-chuan Xiang,
Ze-jun Jiang,
Yun-yong Tang
Abstract:
In this work, we reanalyzed 11 years of spectral data from the \textit{Fermi} Large Area Telescope (\textit{Fermi}-LAT) of currently observed starburst galaxies (SBGs) and star-forming galaxies (SFGs). We used a one-zone model provided by \textbf{NAIMA} and the hadronic origin to explain the GeV observation data of the SBGs and SFGs. We found that a protonic distribution of a power-law form with a…
▽ More
In this work, we reanalyzed 11 years of spectral data from the \textit{Fermi} Large Area Telescope (\textit{Fermi}-LAT) of currently observed starburst galaxies (SBGs) and star-forming galaxies (SFGs). We used a one-zone model provided by \textbf{NAIMA} and the hadronic origin to explain the GeV observation data of the SBGs and SFGs. We found that a protonic distribution of a power-law form with an exponential cutoff can explain the spectra of most SBGs and SFGs. However, it cannot explain the spectral hardening components of NGC 1068 and NGC 4945 in the GeV energy band. Therefore, we considered the two-zone model to well explain these phenomena.
We summarized the features of various model parameters, including the spectral index, cutoff energy, and protonic total energy. Similar to the evolution of supernova remnants (SNRs) in the Milky Way, we estimated the protonic acceleration limitation inside the SBGs to be likely in the order of 10$^{2}$ TeV using the one-zone model; this is close to those of SNRs in the Milky Way.
△ Less
Submitted 28 July, 2021; v1 submitted 6 May, 2021;
originally announced May 2021.
-
On the Optimality of Nuclear-norm-based Matrix Completion for Problems with Smooth Non-linear Structure
Authors:
Yunhua Xiang,
Tianyu Zhang,
Xu Wang,
Ali Shojaie,
Noah Simon
Abstract:
Originally developed for imputing missing entries in low rank, or approximately low rank matrices, matrix completion has proven widely effective in many problems where there is no reason to assume low-dimensional linear structure in the underlying matrix, as would be imposed by rank constraints. In this manuscript, we build some theoretical intuition for this behavior. We consider matrices which a…
▽ More
Originally developed for imputing missing entries in low rank, or approximately low rank matrices, matrix completion has proven widely effective in many problems where there is no reason to assume low-dimensional linear structure in the underlying matrix, as would be imposed by rank constraints. In this manuscript, we build some theoretical intuition for this behavior. We consider matrices which are not necessarily low-rank, but lie in a low-dimensional non-linear manifold. We show that nuclear-norm penalization is still effective for recovering these matrices when observations are missing completely at random. In particular, we give upper bounds on the rate of convergence as a function of the number of rows, columns, and observed entries in the matrix, as well as the smoothness and dimension of the non-linear embedding. We additionally give a minimax lower bound: This lower bound agrees with our upper bound (up to a logarithmic factor), which shows that nuclear-norm penalization is (up to log terms) minimax rate optimal for these problems.
△ Less
Submitted 5 May, 2021;
originally announced May 2021.
-
Likely GeV emission from an old Supernova Remnant: SNR G206.9+2.3
Authors:
Yunchuan Xiang,
Zejun Jiang
Abstract:
A novel $γ$-ray supernova remnant (SNR) G206.9+2.3 is first reported in this study. We arrived at this conclusion after analyzing 12.4 years of observation data of the Fermi Large Area Telescope (Fermi-LAT). The photon flux of the remnant was (1.19$\pm$0.59) 10$^{-9}$ cm$^{-2}$ s$^{-1}$, and its power-law spectral index was 2.22$\pm$0.19 in the 0.2-500 GeV energy band. Moreover, we found that the…
▽ More
A novel $γ$-ray supernova remnant (SNR) G206.9+2.3 is first reported in this study. We arrived at this conclusion after analyzing 12.4 years of observation data of the Fermi Large Area Telescope (Fermi-LAT). The photon flux of the remnant was (1.19$\pm$0.59) 10$^{-9}$ cm$^{-2}$ s$^{-1}$, and its power-law spectral index was 2.22$\pm$0.19 in the 0.2-500 GeV energy band. Moreover, we found that the test statistic values of the global fit from the four different energy bands were greater than 9. We identified that this was a real $γ$-ray signal. Furthermore, we found that its GeV spatial location was in good agreement with that of its radio band. Its spectral energy distribution and light curve properties were similar to those of SNRs. We suggest that the novel $γ$-ray source is a likely counterpart to SNR G206.9+2.3. Consequently, we discuss its likely leptonic or hadronic origin.
△ Less
Submitted 19 May, 2021; v1 submitted 21 April, 2021;
originally announced April 2021.
-
Twofold symmetry of $c$-axis resistivity in topological kagome superconductor CsV$_3$Sb$_5$ with in-plane rotating magnetic field
Authors:
Ying Xiang,
Qing Li,
Yongkai Li,
Wei Xie,
Huan Yang,
Zhiwei Wang,
Yugui Yao,
Hai-Hu Wen
Abstract:
In transition metal compounds, due to the interplay of charge, spin, lattice and orbital degrees of freedom, many intertwined orders exist with close energies. One of the commonly observed states is the so-called nematic electron state, which breaks the in-plane rotational symmetry. This nematic state appears in cuprates, iron-based superconductor, etc. Nematicity may coexist, affect, cooperate or…
▽ More
In transition metal compounds, due to the interplay of charge, spin, lattice and orbital degrees of freedom, many intertwined orders exist with close energies. One of the commonly observed states is the so-called nematic electron state, which breaks the in-plane rotational symmetry. This nematic state appears in cuprates, iron-based superconductor, etc. Nematicity may coexist, affect, cooperate or compete with other orders. Here we show the anisotropic in-plane electronic state and superconductivity in a recently discovered kagome metal CsV$_3$Sb$_5$ by measuring $c$-axis resistivity with the in-plane rotation of magnetic field. We observe a twofold symmetry of superconductivity in the superconducting state and a unique in-plane nematic electronic state in normal state when rotating the in-plane magnetic field. Interestingly these two orders are orthogonal to each other in terms of the field direction of the minimum resistivity. Our results shed new light in understanding non-trivial physical properties of CsV$_3$Sb$_5$.
△ Less
Submitted 30 April, 2021; v1 submitted 14 April, 2021;
originally announced April 2021.
-
likely Detection of GeV gamma-Ray Emission from the composite supernova remnant COMP G327.1+1.1 with Fermi-LAT
Authors:
Yunchuan Xiang,
Yi Xing,
Zejun Jiang
Abstract:
We report the likely GeV $γ$-ray emission from the composite supernova remnant (SNR) COMP G327.1+1.1 by analyzing $\sim$12.2 years of the \textit{Fermi} Large Area Telescope (\textit{Fermi}-LAT) Pass 8 data. We found the features of its \textbf{ranges of} spectrum and luminosity are well consistent with those of the observed COMP SNRs in the Milky Way. Moreover, the position of the source matches…
▽ More
We report the likely GeV $γ$-ray emission from the composite supernova remnant (SNR) COMP G327.1+1.1 by analyzing $\sim$12.2 years of the \textit{Fermi} Large Area Telescope (\textit{Fermi}-LAT) Pass 8 data. We found the features of its \textbf{ranges of} spectrum and luminosity are well consistent with those of the observed COMP SNRs in the Milky Way. Moreover, the position of the source matches those in radio and TeV energy bands, we propose that the $γ$-ray source is likely to be a GeV counterpart of COMP G327.1+1.1. Considering the case of the association from COMP G327.1+1.1 and the $γ$-ray source, we interpreted its broadband spectral energy distribution (SED) by using three simple stationary models including one-zone and two-zone leptonic models and one-zone leptohadronic model. We found that the simple two-zone model dominated by leptons can better explain its SED.
More high-energy data are expected to firmly confirm the association between the $γ$-ray source and COMP G327.1+1.1 in the future.
△ Less
Submitted 12 April, 2021;
originally announced April 2021.
-
DexYCB: A Benchmark for Capturing Hand Grasping of Objects
Authors:
Yu-Wei Chao,
Wei Yang,
Yu Xiang,
Pavlo Molchanov,
Ankur Handa,
Jonathan Tremblay,
Yashraj S. Narang,
Karl Van Wyk,
Umar Iqbal,
Stan Birchfield,
Jan Kautz,
Dieter Fox
Abstract:
We introduce DexYCB, a new dataset for capturing hand grasping of objects. We first compare DexYCB with a related one through cross-dataset evaluation. We then present a thorough benchmark of state-of-the-art approaches on three relevant tasks: 2D object and keypoint detection, 6D object pose estimation, and 3D hand pose estimation. Finally, we evaluate a new robotics-relevant task: generating saf…
▽ More
We introduce DexYCB, a new dataset for capturing hand grasping of objects. We first compare DexYCB with a related one through cross-dataset evaluation. We then present a thorough benchmark of state-of-the-art approaches on three relevant tasks: 2D object and keypoint detection, 6D object pose estimation, and 3D hand pose estimation. Finally, we evaluate a new robotics-relevant task: generating safe robot grasps in human-to-robot object handover. Dataset and code are available at https://dex-ycb.github.io.
△ Less
Submitted 9 April, 2021;
originally announced April 2021.
-
RGB-D Local Implicit Function for Depth Completion of Transparent Objects
Authors:
Luyang Zhu,
Arsalan Mousavian,
Yu Xiang,
Hammad Mazhar,
Jozef van Eenbergen,
Shoubhik Debnath,
Dieter Fox
Abstract:
Majority of the perception methods in robotics require depth information provided by RGB-D cameras. However, standard 3D sensors fail to capture depth of transparent objects due to refraction and absorption of light. In this paper, we introduce a new approach for depth completion of transparent objects from a single RGB-D image. Key to our approach is a local implicit neural representation built o…
▽ More
Majority of the perception methods in robotics require depth information provided by RGB-D cameras. However, standard 3D sensors fail to capture depth of transparent objects due to refraction and absorption of light. In this paper, we introduce a new approach for depth completion of transparent objects from a single RGB-D image. Key to our approach is a local implicit neural representation built on ray-voxel pairs that allows our method to generalize to unseen objects and achieve fast inference speed. Based on this representation, we present a novel framework that can complete missing depth given noisy RGB-D input. We further improve the depth estimation iteratively using a self-correcting refinement model. To train the whole pipeline, we build a large scale synthetic dataset with transparent objects. Experiments demonstrate that our method performs significantly better than the current state-of-the-art methods on both synthetic and real world data. In addition, our approach improves the inference speed by a factor of 20 compared to the previous best method, ClearGrasp. Code and dataset will be released at https://research.nvidia.com/publication/2021-03_RGB-D-Local-Implicit.
△ Less
Submitted 1 April, 2021;
originally announced April 2021.
-
Quantification of Wigner Negativity Remotely Generated via Einstein-Podolsky-Rosen Steering
Authors:
Yu Xiang,
Shuheng Liu,
Jiajie Guo,
Qihuang Gong,
Nicolas Treps,
Qiongyi He,
Mattia Walschaers
Abstract:
Wigner negativity, as a well-known indicator of nonclassicality, plays an essential role in quantum computing and simulation using continuous-variable systems. Recently, it has been proven that Einstein-Podolsky-Rosen steering is a prerequisite to generate Wigner negativity between two remote modes. Motivated by the demand of real-world quantum network, here we investigate the shareability of gene…
▽ More
Wigner negativity, as a well-known indicator of nonclassicality, plays an essential role in quantum computing and simulation using continuous-variable systems. Recently, it has been proven that Einstein-Podolsky-Rosen steering is a prerequisite to generate Wigner negativity between two remote modes. Motivated by the demand of real-world quantum network, here we investigate the shareability of generated Wigner negativity in the multipartite scenario from a quantitative perspective. By establishing a monogamy relation akin to the generalized Coffman-Kundu-Wootters inequality, we show that the amount of Wigner negativity cannot be freely distributed among different modes. Moreover, for photon subtraction -- one of the main experimentally realized non-Gaussian operations -- we provide a general method to quantify the remotely generated Wigner negativity. With this method, we find that there is no direct quantitative relation between the Gaussian steerability and the amount of generated Wigner negativity. Our results pave the way for exploiting Wigner negativity as a valuable resource for numerous quantum information protocols based on non-Gaussian scenario.
△ Less
Submitted 5 April, 2021; v1 submitted 1 April, 2021;
originally announced April 2021.
-
Fermi-LAT detection of GeV $γ$-ray emission from Type Ia supernova remnant G272.2-3.2
Authors:
Yun-Chuan Xiang,
Ze-Jun Jiang
Abstract:
A new $γ$-ray source with a significance level of approximately 5$σ$ was reported in the region of SNR G272.2-3.2, analysing the approximately 12.4 years of observation data from the Fermi Large Area Telescope (Fermi-LAT). Its $γ$-ray spatial distribution did not show extended feature, and it had a soft spectrum with the spectral index of 2.56$\pm$0.01 of a power-law model. No significant variabil…
▽ More
A new $γ$-ray source with a significance level of approximately 5$σ$ was reported in the region of SNR G272.2-3.2, analysing the approximately 12.4 years of observation data from the Fermi Large Area Telescope (Fermi-LAT). Its $γ$-ray spatial distribution did not show extended feature, and it had a soft spectrum with the spectral index of 2.56$\pm$0.01 of a power-law model. No significant variability of its light curve (LC) with 10 time bins was identified, and its spatial positions in the X-ray and GeV bands overlapped. We suggest that the new $γ$-ray source is a likely counterpart of SNR G272.2-3.2. Analysing its spectrum, we discussed the likely origins of the $γ$-ray emission.
△ Less
Submitted 28 June, 2021; v1 submitted 29 March, 2021;
originally announced March 2021.
-
An Offline Delegatable Cryptocurrency System
Authors:
Rujia Li,
Qin Wang,
Xinrui Zhang,
Qi Wang,
David Galindo,
Yang Xiang
Abstract:
Blockchain-based cryptocurrencies, facilitating the convenience of payment by providing a decentralized online solution, have not been widely adopted so far due to slow confirmation of transactions. Offline delegation offers an efficient way to exchange coins. However, in such an approach, the coins that have been delegated confront the risk of being spent twice since the delegator's behaviour can…
▽ More
Blockchain-based cryptocurrencies, facilitating the convenience of payment by providing a decentralized online solution, have not been widely adopted so far due to slow confirmation of transactions. Offline delegation offers an efficient way to exchange coins. However, in such an approach, the coins that have been delegated confront the risk of being spent twice since the delegator's behaviour cannot be restricted easily on account of the absence of effective supervision. Even if a third party can be regarded as a judge between the delegator and delegatee to secure transactions, she still faces the threat of being compromised or providing misleading assure. Moreover, the approach equipped with a third party contradicts the real intention of decentralized cryptocurrency systems. In this paper, we propose \textit{DelegaCoin}, an offline delegatable cryptocurrency system to mitigate such an issue. We exploit trusted execution environments (TEEs) as decentralized "virtual agents" to prevent malicious delegation. In DelegaCoin, an owner can delegate his coins through offline-transactions without interacting with the blockchain network. A formal model and analysis, prototype implementation, and further evaluation demonstrate that our scheme is provably secure and practically feasible.
△ Less
Submitted 23 March, 2021;
originally announced March 2021.
-
Robust Remanufacturing Planning with Parameter Uncertainty
Authors:
Zhicheng Zhu,
Yisha Xiang,
Ming Zhao,
Yue Shi
Abstract:
We consider the problem of remanufacturing planning in the presence of statistical estimation errors. Determining the optimal remanufacturing timing, first and foremost, requires modeling of the state transitions of a system. The estimation of these probabilities, however, often suffers from data inadequacy and is far from accurate, resulting in serious degradation in performance. To mitigate the…
▽ More
We consider the problem of remanufacturing planning in the presence of statistical estimation errors. Determining the optimal remanufacturing timing, first and foremost, requires modeling of the state transitions of a system. The estimation of these probabilities, however, often suffers from data inadequacy and is far from accurate, resulting in serious degradation in performance. To mitigate the impacts of the uncertainty in transition probabilities, we develop a novel data-driven modeling framework for remanufacturing planning in which decision makers can remain robust with respect to statistical estimation errors. We model the remanufacturing planning problem as a robust Markov decision process, and construct ambiguity sets that contain the true transition probability distributions with high confidence. We further establish structural properties of optimal robust policies and insights for remanufacturing planning. A computational study on the NASA turbofan engine shows that our data-driven decision framework consistently yields better worst-case performances and higher reliability of the performance guarantee
△ Less
Submitted 17 March, 2021;
originally announced March 2021.
-
Convergence from Atomistic Model to Peierls-Nabarro Model for Dislocations in Bilayer System with Complex Lattice
Authors:
Yahong Yang,
Tao Luo,
Yang Xiang
Abstract:
In this paper, we prove the convergence from the atomistic model to the Peierls--Nabarro (PN) model of two-dimensional bilayer system with complex lattice. We show that the displacement field of the dislocation solution of the PN model converges to the dislocation solution of the atomistic model with second-order accuracy. The consistency of PN model and the stability of atomistic model are essent…
▽ More
In this paper, we prove the convergence from the atomistic model to the Peierls--Nabarro (PN) model of two-dimensional bilayer system with complex lattice. We show that the displacement field of the dislocation solution of the PN model converges to the dislocation solution of the atomistic model with second-order accuracy. The consistency of PN model and the stability of atomistic model are essential in our proof. The main idea of our approach is to use several low-degree polynomials to approximate the energy due to atomistic interactions of different groups of atoms of the complex lattice.
△ Less
Submitted 16 March, 2021;
originally announced March 2021.
-
Existence, uniqueness, and energy scaling of 2+1 dimensional continuum model for stepped epitaxial surfaces with elastic effects
Authors:
Ganghua Fan,
Tao Luo,
Yang Xiang
Abstract:
We study the 2+1 dimensional continuum model for the evolution of stepped epitaxial surface under long-range elastic interaction proposed by Xu and Xiang (SIAM J. Appl. Math. 69, 1393-1414, 2009). The long-range interaction term and the two length scales in this model makes PDE analysis challenging. Moreover, unlike in the 1+1 dimensional case, there is a nonconvexity contribution in the total ene…
▽ More
We study the 2+1 dimensional continuum model for the evolution of stepped epitaxial surface under long-range elastic interaction proposed by Xu and Xiang (SIAM J. Appl. Math. 69, 1393-1414, 2009). The long-range interaction term and the two length scales in this model makes PDE analysis challenging. Moreover, unlike in the 1+1 dimensional case, there is a nonconvexity contribution in the total energy in the 2+1 dimensional case, and it is not easy to prove that the solution is always in the well-posed regime during the evolution. In this paper, we propose a modified 2+1 dimensional continuum model based on the underlying physics. This modification fixes the problem of possible illposedness due to the nonconvexity of the energy functional. We prove the existence and uniqueness of both the static and dynamic solutions and derive a minimum energy scaling law for them. We show that the minimum energy surface profile is mainly attained by surfaces with step meandering instability. This is essentially different from the energy scaling law for the 1+1 dimensional epitaxial surfaces under elastic effects attained by step bunching surface profiles. We also discuss the transition from the step bunching instability to the step meandering instability in 2+1 dimensions.
△ Less
Submitted 16 July, 2022; v1 submitted 16 March, 2021;
originally announced March 2021.
-
Detection of GeV $γ$-Ray Emission from supernova remnant SNR G15.9+0.2 with Fermi-LAT
Authors:
Yunchuan Xiang,
Zejun Jiang,
Mengyao Tang
Abstract:
We first report GeV $γ$-ray emission from supernova remnant (SNR) G15.9+0.2 in this work. The results show that its power-law spectral index is 2.94$\pm$0.25 with a 6.47$σ$ significance level, and the $γ$-ray emission can be characterized by a two-dimensional (2D) Gaussian spatial distribution, which has a better improvement than the case of a point source. Moreover, we find that its likely counte…
▽ More
We first report GeV $γ$-ray emission from supernova remnant (SNR) G15.9+0.2 in this work. The results show that its power-law spectral index is 2.94$\pm$0.25 with a 6.47$σ$ significance level, and the $γ$-ray emission can be characterized by a two-dimensional (2D) Gaussian spatial distribution, which has a better improvement than the case of a point source. Moreover, we find that its likely counterparts from the radio, X-ray, and TeV energy bands are well coincident with its spatial location. We suggest that the new $γ$-ray emission may originate from SNR G15.9+0.2. Analyzing the variability from 12.4 years of the light curve (LC), we identify that this LC exists weak variability with a 2.69$σ$ variability significance level. We investigated the 2D Gaussian extended region and did not identify certified active galactic nuclei from the region of this SNR; thus, we suggest that the new $γ$-ray emission may originate from SNR G15.9+0.2. On this basis, we discussed the probable origins of its $γ$-ray radiation from leptonic and hadronic scenarios, respectively.
△ Less
Submitted 25 October, 2021; v1 submitted 13 March, 2021;
originally announced March 2021.
-
Internal Wasserstein Distance for Adversarial Attack and Defense
Authors:
Qicheng Wang,
Shuhai Zhang,
Jiezhang Cao,
Jincheng Li,
Mingkui Tan,
Yang Xiang
Abstract:
Deep neural networks (DNNs) are known to be vulnerable to adversarial attacks that would trigger misclassification of DNNs but may be imperceptible to human perception. Adversarial defense has been an important way to improve the robustness of DNNs. Existing attack methods often construct adversarial examples relying on some metrics like the $\ell_p$ distance to perturb samples. However, these met…
▽ More
Deep neural networks (DNNs) are known to be vulnerable to adversarial attacks that would trigger misclassification of DNNs but may be imperceptible to human perception. Adversarial defense has been an important way to improve the robustness of DNNs. Existing attack methods often construct adversarial examples relying on some metrics like the $\ell_p$ distance to perturb samples. However, these metrics can be insufficient to conduct adversarial attacks due to their limited perturbations. In this paper, we propose a new internal Wasserstein distance (IWD) to capture the semantic similarity of two samples, and thus it helps to obtain larger perturbations than currently used metrics such as the $\ell_p$ distance. We then apply the internal Wasserstein distance to perform adversarial attack and defense. In particular, we develop a novel attack method relying on IWD to calculate the similarities between an image and its adversarial examples. In this way, we can generate diverse and semantically similar adversarial examples that are more difficult to defend by existing defense methods. Moreover, we devise a new defense method relying on IWD to learn robust models against unseen adversarial examples. We provide both thorough theoretical and empirical evidence to support our methods.
△ Less
Submitted 20 February, 2023; v1 submitted 12 March, 2021;
originally announced March 2021.
-
SCEI: A Smart-Contract Driven Edge Intelligence Framework for IoT Systems
Authors:
Chenhao Xu,
Jiaqi Ge,
Yong Li,
Yao Deng,
Longxiang Gao,
Mengshi Zhang,
Yong Xiang,
Xi Zheng
Abstract:
Federated learning (FL) enables collaborative training of a shared model on edge devices while maintaining data privacy. FL is effective when dealing with independent and identically distributed (iid) datasets, but struggles with non-iid datasets. Various personalized approaches have been proposed, but such approaches fail to handle underlying shifts in data distribution, such as data distribution…
▽ More
Federated learning (FL) enables collaborative training of a shared model on edge devices while maintaining data privacy. FL is effective when dealing with independent and identically distributed (iid) datasets, but struggles with non-iid datasets. Various personalized approaches have been proposed, but such approaches fail to handle underlying shifts in data distribution, such as data distribution skew commonly observed in real-world scenarios (e.g., driver behavior in smart transportation systems changing across time and location). Additionally, trust concerns among unacquainted devices and security concerns with the centralized aggregator pose additional challenges. To address these challenges, this paper presents a dynamically optimized personal deep learning scheme based on blockchain and federated learning. Specifically, the innovative smart contract implemented in the blockchain allows distributed edge devices to reach a consensus on the optimal weights of personalized models. Experimental evaluations using multiple models and real-world datasets demonstrate that the proposed scheme achieves higher accuracy and faster convergence compared to traditional federated and personalized learning approaches.
△ Less
Submitted 5 July, 2023; v1 submitted 11 March, 2021;
originally announced March 2021.
-
App's Auto-Login Function Security Testing via Android OS-Level Virtualization
Authors:
Wenna Song,
Jiang Ming,
Lin Jiang,
Han Yan,
Yi Xiang,
Yuan Chen,
Jianming Fu,
Guojun Peng
Abstract:
Limited by the small keyboard, most mobile apps support the automatic login feature for better user experience. Therefore, users avoid the inconvenience of retyping their ID and password when an app runs in the foreground again. However, this auto-login function can be exploited to launch the so-called "data-clone attack": once the locally-stored, auto-login depended data are cloned by attackers a…
▽ More
Limited by the small keyboard, most mobile apps support the automatic login feature for better user experience. Therefore, users avoid the inconvenience of retyping their ID and password when an app runs in the foreground again. However, this auto-login function can be exploited to launch the so-called "data-clone attack": once the locally-stored, auto-login depended data are cloned by attackers and placed into their own smartphones, attackers can break through the login-device number limit and log in to the victim's account stealthily. A natural countermeasure is to check the consistency of devicespecific attributes. As long as the new device shows different device fingerprints with the previous one, the app will disable the auto-login function and thus prevent data-clone attacks. In this paper, we develop VPDroid, a transparent Android OS-level virtualization platform tailored for security testing. With VPDroid, security analysts can customize different device artifacts, such as CPU model, Android ID, and phone number, in a virtual phone without user-level API hooking. VPDroid's isolation mechanism ensures that user-mode apps in the virtual phone cannot detect device-specific discrepancies. To assess Android apps' susceptibility to the data-clone attack, we use VPDroid to simulate data-clone attacks with 234 most-downloaded apps. Our experiments on five different virtual phone environments show that VPDroid's device attribute customization can deceive all tested apps that perform device-consistency checks, such as Twitter, WeChat, and PayPal. 19 vendors have confirmed our report as a zero-day vulnerability. Our findings paint a cautionary tale: only enforcing a device-consistency check at client side is still vulnerable to an advanced data-clone attack.
△ Less
Submitted 30 March, 2021; v1 submitted 5 March, 2021;
originally announced March 2021.
-
Fermi-LAT Detection of GeV Gamma-Ray Emission from The Highly Asymmetric Shell Supernova Remnant: SNR G317.3-0.2
Authors:
Yunchuan Xiang,
Zejun Jiang,
Yunyong Tang
Abstract:
In this paper, we report the first extended GeV $γ$-ray emission, at a significant level of $\sim$ 8.13$σ$, from the region of the supernova remnant (SNR) SNR G317.3-0.2 by analyzing $\sim$ 12.2 years of Fermi Large Area Telescope (Fermi-LAT) Pass 8 data in the work. The best-fit position of the new $γ$-ray source matches that of the 843 MHz radio energy band of SNR G317.3-0.2, and there is no sig…
▽ More
In this paper, we report the first extended GeV $γ$-ray emission, at a significant level of $\sim$ 8.13$σ$, from the region of the supernova remnant (SNR) SNR G317.3-0.2 by analyzing $\sim$ 12.2 years of Fermi Large Area Telescope (Fermi-LAT) Pass 8 data in the work. The best-fit position of the new $γ$-ray source matches that of the 843 MHz radio energy band of SNR G317.3-0.2, and there is no significant variability of the photon flux of the corresponding light curve (LC) in the data for the 12.2 year period; therefore, by excluding other known $γ$-ray sources or candidates within a 2$σ$ error radius from the best-fit position of SNR G317.3-0.2, we suggest that the $γ$-ray source is likely to be a GeV counterpart of SNR G317.3-0.2.
△ Less
Submitted 7 March, 2021; v1 submitted 4 March, 2021;
originally announced March 2021.
-
Graphfool: Targeted Label Adversarial Attack on Graph Embedding
Authors:
Jinyin Chen,
Xiang Lin,
Dunjie Zhang,
Wenrong Jiang,
Guohan Huang,
Hui Xiong,
Yun Xiang
Abstract:
Deep learning is effective in graph analysis. It is widely applied in many related areas, such as link prediction, node classification, community detection, and graph classification etc. Graph embedding, which learns low-dimensional representations for vertices or edges in the graph, usually employs deep models to derive the embedding vector. However, these models are vulnerable. We envision that…
▽ More
Deep learning is effective in graph analysis. It is widely applied in many related areas, such as link prediction, node classification, community detection, and graph classification etc. Graph embedding, which learns low-dimensional representations for vertices or edges in the graph, usually employs deep models to derive the embedding vector. However, these models are vulnerable. We envision that graph embedding methods based on deep models can be easily attacked using adversarial examples. Thus, in this paper, we propose Graphfool, a novel targeted label adversarial attack on graph embedding. It can generate adversarial graph to attack graph embedding methods via classifying boundary and gradient information in graph convolutional network (GCN). Specifically, we perform the following steps: 1),We first estimate the classification boundaries of different classes. 2), We calculate the minimal perturbation matrix to misclassify the attacked vertex according to the target classification boundary. 3), We modify the adjacency matrix according to the maximal absolute value of the disturbance matrix. This process is implemented iteratively. To the best of our knowledge, this is the first targeted label attack technique. The experiments on real-world graph networks demonstrate that Graphfool can derive better performance than state-of-art techniques. Compared with the second best algorithm, Graphfool can achieve an average improvement of 11.44% in attack success rate.
△ Less
Submitted 24 February, 2021;
originally announced February 2021.
-
Learning Composable Behavior Embeddings for Long-horizon Visual Navigation
Authors:
Xiangyun Meng,
Yu Xiang,
Dieter Fox
Abstract:
Learning high-level navigation behaviors has important implications: it enables robots to build compact visual memory for repeating demonstrations and to build sparse topological maps for planning in novel environments. Existing approaches only learn discrete, short-horizon behaviors. These standalone behaviors usually assume a discrete action space with simple robot dynamics, thus they cannot cap…
▽ More
Learning high-level navigation behaviors has important implications: it enables robots to build compact visual memory for repeating demonstrations and to build sparse topological maps for planning in novel environments. Existing approaches only learn discrete, short-horizon behaviors. These standalone behaviors usually assume a discrete action space with simple robot dynamics, thus they cannot capture the intricacy and complexity of real-world trajectories. To this end, we propose Composable Behavior Embedding (CBE), a continuous behavior representation for long-horizon visual navigation. CBE is learned in an end-to-end fashion; it effectively captures path geometry and is robust to unseen obstacles. We show that CBE can be used to performing memory-efficient path following and topological mapping, saving more than an order of magnitude of memory than behavior-less approaches.
△ Less
Submitted 19 February, 2021;
originally announced February 2021.
-
HVAQ: A High-Resolution Vision-Based Air Quality Dataset
Authors:
Zuohui Chen,
Tony Zhang,
Zhuangzhi Chen,
Yun Xiang,
Qi Xuan,
Robert P. Dick
Abstract:
Air pollutants, such as particulate matter, negatively impact human health. Most existing pollution monitoring techniques use stationary sensors, which are typically sparsely deployed. However, real-world pollution distributions vary rapidly with position and the visual effects of air pollution can be used to estimate concentration, potentially at high spatial resolution. Accurate pollution monito…
▽ More
Air pollutants, such as particulate matter, negatively impact human health. Most existing pollution monitoring techniques use stationary sensors, which are typically sparsely deployed. However, real-world pollution distributions vary rapidly with position and the visual effects of air pollution can be used to estimate concentration, potentially at high spatial resolution. Accurate pollution monitoring requires either densely deployed conventional point sensors, at-a-distance vision-based pollution monitoring, or a combination of both.
The main contribution of this paper is that to the best of our knowledge, it is the first publicly available, high temporal and spatial resolution air quality dataset containing simultaneous point sensor measurements and corresponding images. The dataset enables, for the first time, high spatial resolution evaluation of image-based air pollution estimation algorithms. It contains PM2.5, PM10, temperature, and humidity data. We evaluate several state-of-art vision-based PM concentration estimation algorithms on our dataset and quantify the increase in accuracy resulting from higher point sensor density and the use of images. It is our intent and belief that this dataset can enable advances by other research teams working on air quality estimation. Our dataset is available at https://github.com/implicitDeclaration/HVAQ-dataset/tree/master.
△ Less
Submitted 16 October, 2021; v1 submitted 18 February, 2021;
originally announced February 2021.
-
Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey
Authors:
Yuantian Miao,
Chao Chen,
Lei Pan,
Qing-Long Han,
Jun Zhang,
Yang Xiang
Abstract:
Stealing attack against controlled information, along with the increasing number of information leakage incidents, has become an emerging cyber security threat in recent years. Due to the booming development and deployment of advanced analytics solutions, novel stealing attacks utilize machine learning (ML) algorithms to achieve high success rate and cause a lot of damage. Detecting and defending…
▽ More
Stealing attack against controlled information, along with the increasing number of information leakage incidents, has become an emerging cyber security threat in recent years. Due to the booming development and deployment of advanced analytics solutions, novel stealing attacks utilize machine learning (ML) algorithms to achieve high success rate and cause a lot of damage. Detecting and defending against such attacks is challenging and urgent so that governments, organizations, and individuals should attach great importance to the ML-based stealing attacks. This survey presents the recent advances in this new type of attack and corresponding countermeasures. The ML-based stealing attack is reviewed in perspectives of three categories of targeted controlled information, including controlled user activities, controlled ML model-related information, and controlled authentication information. Recent publications are summarized to generalize an overarching attack methodology and to derive the limitations and future directions of ML-based stealing attacks. Furthermore, countermeasures are proposed towards developing effective protections from three aspects -- detection, disruption, and isolation.
△ Less
Submitted 14 November, 2021; v1 submitted 16 February, 2021;
originally announced February 2021.
-
MITNet: GAN Enhanced Magnetic Induction Tomography Based on Complex CNN
Authors:
Zuohui Chen,
Qing Yuan,
Xujie Song,
Cheng Chen,
Dan Zhang,
Yun Xiang,
Ruigang Liu,
Qi Xuan
Abstract:
Magnetic induction tomography (MIT) is an efficient solution for long-term brain disease monitoring, which focuses on reconstructing bio-impedance distribution inside the human brain using non-intrusive electromagnetic fields. However, high-quality brain image reconstruction remains challenging since reconstructing images from the measured weak signals is a highly non-linear and ill-conditioned pr…
▽ More
Magnetic induction tomography (MIT) is an efficient solution for long-term brain disease monitoring, which focuses on reconstructing bio-impedance distribution inside the human brain using non-intrusive electromagnetic fields. However, high-quality brain image reconstruction remains challenging since reconstructing images from the measured weak signals is a highly non-linear and ill-conditioned problem. In this work, we propose a generative adversarial network (GAN) enhanced MIT technique, named MITNet, based on a complex convolutional neural network (CNN). The experimental results on the real-world dataset validate the performance of our technique, which outperforms the state-of-art method by 25.27%.
△ Less
Submitted 15 February, 2021;
originally announced February 2021.
-
Anomaly Detection for Scenario-based Insider Activities using CGAN Augmented Data
Authors:
R G Gayathri,
Atul Sajjanhar,
Yong Xiang,
Xingjun Ma
Abstract:
Insider threats are the cyber attacks from within the trusted entities of an organization. Lack of real-world data and issue of data imbalance leave insider threat analysis an understudied research area. To mitigate the effect of skewed class distribution and prove the potential of multinomial classification algorithms for insider threat detection, we propose an approach that combines generative m…
▽ More
Insider threats are the cyber attacks from within the trusted entities of an organization. Lack of real-world data and issue of data imbalance leave insider threat analysis an understudied research area. To mitigate the effect of skewed class distribution and prove the potential of multinomial classification algorithms for insider threat detection, we propose an approach that combines generative model with supervised learning to perform multi-class classification using deep learning. The generative adversarial network (GAN) based insider detection model introduces Conditional Generative Adversarial Network (CGAN) to enrich minority class samples to provide data for multi-class anomaly detection. The comprehensive experiments performed on the benchmark dataset demonstrates the effectiveness of introducing GAN derived synthetic data and the capability of multi-class anomaly detection in insider activity analysis. Moreover, the method is compared with other existing methods against different parameters and performance metrics.
△ Less
Submitted 8 July, 2021; v1 submitted 14 February, 2021;
originally announced February 2021.
-
A Three-Dimensional Continuum Simulation Method for Grain Boundary Motion Incorporating Dislocation Structure
Authors:
Xiaoxue Qin,
Luchan Zhang,
Yang Xiang
Abstract:
We develop a continuum model for the dynamics of grain boundaries in three dimensions that incorporates the motion and reaction of the constituent dislocations. The continuum model is based on a simple representation of densities of curved dislocations on the grain boundary. Illposedness due to nonconvexity of the total energy is fixed by a numerical treatment based on a projection method that mai…
▽ More
We develop a continuum model for the dynamics of grain boundaries in three dimensions that incorporates the motion and reaction of the constituent dislocations. The continuum model is based on a simple representation of densities of curved dislocations on the grain boundary. Illposedness due to nonconvexity of the total energy is fixed by a numerical treatment based on a projection method that maintains the connectivity of the constituent dislocations. An efficient simulation method is developed, in which the critical but computationally expensive long-range interaction of dislocations is replaced by another projection formulation that maintains the constraint of equilibrium of the dislocation structure described by the Frank's formula. This continuum model is able to describe the grain boundary motion and grain rotation due to both coupling and sliding effects, to which the classical motion by mean curvature model does not apply. Comparisons with atomistic simulation results show that our continuum model is able to give excellent predictions of evolutions of low angle grain boundaries and their dislocation structures.
△ Less
Submitted 5 November, 2021; v1 submitted 31 January, 2021;
originally announced February 2021.
-
Chaotic-to-Fine Clustering for Unlabeled Plant Disease Images
Authors:
Uno Fang,
Jianxin Li,
Xuequan Lu,
Mumtaz Ali,
Longxiang Gao,
Yong Xiang
Abstract:
Current annotation for plant disease images depends on manual sorting and handcrafted features by agricultural experts, which is time-consuming and labour-intensive. In this paper, we propose a self-supervised clustering framework for grouping plant disease images based on the vulnerability of Kernel K-means. The main idea is to establish a cross iterative under-clustering algorithm based on Kerne…
▽ More
Current annotation for plant disease images depends on manual sorting and handcrafted features by agricultural experts, which is time-consuming and labour-intensive. In this paper, we propose a self-supervised clustering framework for grouping plant disease images based on the vulnerability of Kernel K-means. The main idea is to establish a cross iterative under-clustering algorithm based on Kernel K-means to produce the pseudo-labeled training set and a chaotic cluster to be further classified by a deep learning module. In order to verify the effectiveness of our proposed framework, we conduct extensive experiments on three different plant disease datatsets with five plants and 17 plant diseases. The experimental results show the high superiority of our method to do image-based plant disease classification over balanced and unbalanced datasets by comparing with five state-of-the-art existing works in terms of different metrics.
△ Less
Submitted 17 January, 2021;
originally announced January 2021.
-
A Vehicles Control Model to Alleviate Traffic Instability
Authors:
Jiancheng Fang,
Yu Xiang,
Yu Huang,
Yilong Cui,
Wenyong Wang
Abstract:
While bringing convenience to people, the growing number of vehicles on road already cause inevitable traffic congestion. Some traffic congestion happen with observable reasons, but others occur without apparent reasons or bottlenecks, which referred to as phantom jams, are caused by traditional vehicle following model. In order to alleviate the traffic instability caused by phantom jam, several m…
▽ More
While bringing convenience to people, the growing number of vehicles on road already cause inevitable traffic congestion. Some traffic congestion happen with observable reasons, but others occur without apparent reasons or bottlenecks, which referred to as phantom jams, are caused by traditional vehicle following model. In order to alleviate the traffic instability caused by phantom jam, several models have been proposed with the development of intelligent transportation system (ITS). these have been proved to be able to suppress traffic instability in the ideal situation. But in road scenarios, uncertainties of vehicle state measurements and time delay caused by on-board sensors, inter-vehicle communications and control system of vehicles will affect the performance of the existing models severely, and cannot be ignored. In this paper, a novel predictable bilateral control model-PBCM, which consists of best estimation and state prediction is proposed to determine accurate acceleration values of the host vehicle in traffic flow to alleviate traffic instability. Theoretical analysis and simulation results show that our model could reduce the influence of the measurement errors and the delay caused by communication and control system effectively, control the state of the vehicles in traffic flow accurately, thus achieve the goal of restrain the instability of traffic flow.
△ Less
Submitted 15 January, 2021;
originally announced January 2021.
-
Van Hove Singularity Arising from Mexican-Hat-Shaped Inverted Bands in the Topological Insulator Sn-doped Bi$_{1.1}$Sb$_{0.9}$Te$_{2}$S
Authors:
Wenchao Jiang,
Bowen Li,
Xiaomeng Wang,
Guanyu Chen,
Tong Chen,
Ying Xiang,
Wei Xie,
Yaomin Dai,
Xiyu Zhu,
Huan Yang,
Jian Sun,
Hai-Hu Wen
Abstract:
The optical properties of Sn-doped Bi$_{1.1}$Sb$_{0.9}$Te$_{2}$S, the most bulk-insulating topological insulator thus far, have been examined at different temperatures over a broad frequency range. No Drude response is detected in the low-frequency range down to 30~cm$^{-1}$, corroborating the excellent bulk-insulating property of this material. Intriguingly, we observe a sharp peak at about 2\,20…
▽ More
The optical properties of Sn-doped Bi$_{1.1}$Sb$_{0.9}$Te$_{2}$S, the most bulk-insulating topological insulator thus far, have been examined at different temperatures over a broad frequency range. No Drude response is detected in the low-frequency range down to 30~cm$^{-1}$, corroborating the excellent bulk-insulating property of this material. Intriguingly, we observe a sharp peak at about 2\,200~cm$^{-1}$ in the optical conductivity at 5~K. Further quantitative analyses of the line shape and temperature dependence of this sharp peak, in combination with first-principles calculations, suggest that it corresponds to a van Hove singularity arising from Mexican-hat-shaped inverted bands. Such a van Hove singularity is a pivotal ingredient of various strongly correlated phases.
△ Less
Submitted 8 January, 2021;
originally announced January 2021.
-
Continuum Model and Numerical Method for Dislocation Structure and Energy of Grain Boundaries
Authors:
Xiaoxue Qin,
Yejun Gu,
Luchan Zhang,
Yang Xiang
Abstract:
We present a continuum model to determine the dislocation structure and energy of low angle grain boundaries in three dimensions. The equilibrium dislocation structure is obtained by minimizing the grain boundary energy that is associated with the constituent dislocations subject to the constraint of Frank's formula. The orientation-dependent continuous distributions of dislocation lines on grain…
▽ More
We present a continuum model to determine the dislocation structure and energy of low angle grain boundaries in three dimensions. The equilibrium dislocation structure is obtained by minimizing the grain boundary energy that is associated with the constituent dislocations subject to the constraint of Frank's formula. The orientation-dependent continuous distributions of dislocation lines on grain boundaries are described conveniently using the dislocation density potential functions, whose contour lines on the grain boundaries represent the dislocations. The energy of a grain boundary is the total energy of the constituent dislocations derived from discrete dislocation dynamics model, incorporating both the dislocation line energy and reactions of dislocations. The constrained energy minimization problem is solved by the augmented Lagrangian method and projection method. Comparisons with atomistic simulation results show that our continuum model is able to give excellent predictions of the energy and dislocation densities of both planar and curved low angle grain boundaries.
△ Less
Submitted 5 November, 2021; v1 submitted 7 January, 2021;
originally announced January 2021.
-
Deterministic distribution of multipartite entanglement and steering in a quantum network by separable states
Authors:
Meihong Wang,
Yu Xiang,
Haijun Kang,
Dongmei Han,
Yang Liu,
Qiongyi He,
Qihuang Gong,
Xiaolong Su,
Kunchi Peng
Abstract:
As two valuable quantum resources, Einstein-Podolsky-Rosen entanglement and steering play important roles in quantum-enhanced communication protocols. Distributing such quantum resources among multiple remote users in a network is a crucial precondition underlying various quantum tasks. We experimentally demonstrate the deterministic distribution of two- and three-mode Gaussian entanglement and st…
▽ More
As two valuable quantum resources, Einstein-Podolsky-Rosen entanglement and steering play important roles in quantum-enhanced communication protocols. Distributing such quantum resources among multiple remote users in a network is a crucial precondition underlying various quantum tasks. We experimentally demonstrate the deterministic distribution of two- and three-mode Gaussian entanglement and steering by transmitting separable states in a network consisting of a quantum server and multiple users. In our experiment, entangled states are not prepared solely by the quantum server, but are created among independent users during the distribution process. More specifically, the quantum server prepares separable squeezed states and applies classical displacements on them before spreading out, and users simply perform local beam-splitter operations and homodyne measurements after they receive separable states. We show that the distributed Gaussian entanglement and steerability are robust against channel loss. Furthermore, one-way Gaussian steering is achieved among users that is useful for further directional or highly asymmetric quantum information processing.
△ Less
Submitted 5 January, 2021;
originally announced January 2021.
-
Causal Inference from Slowly Varying Nonstationary Processes
Authors:
Kang Du,
Yu Xiang
Abstract:
Causal inference from observational data following the restricted structural causal model (SCM) framework hinges largely on the asymmetry between cause and effect from the data generating mechanisms, such as non-Gaussianity or nonlinearity. This methodology can be adapted to stationary time series, yet inferring causal relationships from nonstationary time series remains a challenging task. In thi…
▽ More
Causal inference from observational data following the restricted structural causal model (SCM) framework hinges largely on the asymmetry between cause and effect from the data generating mechanisms, such as non-Gaussianity or nonlinearity. This methodology can be adapted to stationary time series, yet inferring causal relationships from nonstationary time series remains a challenging task. In this work, we propose a new class of restricted SCM, via a time-varying filter and stationary noise, and exploit the asymmetry from nonstationarity for causal identification in both bivariate and network settings. We propose efficient procedures by leveraging powerful estimates of the bivariate evolutionary spectra for slowly varying processes. Various synthetic and real datasets that involve high-order and non-smooth filters are evaluated to demonstrate the effectiveness of our proposed methodology.
△ Less
Submitted 3 September, 2021; v1 submitted 23 December, 2020;
originally announced December 2020.
-
Magnetic reconnection between loops accelerated by a nearby filament eruption
Authors:
Leping Li,
Hardi Peter,
Lakshmi Pradeep Chitta,
Hongqiang Song,
Kaifan Ji,
Yongyuan Xiang
Abstract:
Magnetic reconnection modulated by non-local disturbances in the solar atmosphere has been investigated theoretically, but rarely observed. In this study, employing Ha and extreme ultraviolet (EUV) images and line of sight magnetograms, we report acceleration of reconnection by adjacent filament eruption. In Ha images, four groups of chromospheric fibrils are observed to form a saddle-like structu…
▽ More
Magnetic reconnection modulated by non-local disturbances in the solar atmosphere has been investigated theoretically, but rarely observed. In this study, employing Ha and extreme ultraviolet (EUV) images and line of sight magnetograms, we report acceleration of reconnection by adjacent filament eruption. In Ha images, four groups of chromospheric fibrils are observed to form a saddle-like structure. Among them, two groups of fibrils converge and reconnect. Two newly reconnected fibrils then form, and retract away from the reconnection region. In EUV images, similar structures and evolution of coronal loops are identified. Current sheet forms repeatedly at the interface of reconnecting loops, with width and length of 1-2 and 5.3-7.2 Mm, and reconnection rate of 0.18-0.3. It appears in the EUV low-temperature channels, with average differential emission measure (DEM) weighed temperature and EM of 2 MK and 2.5*10^27 cm-5. Plasmoids appear in the current sheet and propagate along it, and then further along the reconnection loops. The filament, located at the southeast of reconnection region, erupts, and pushes away the loops covering the reconnection region. Thereafter, the current sheet has width and length of 2 and 3.5 Mm, and reconnection rate of 0.57. It becomes much brighter, and appears in the EUV high-temperature channels, with average DEM-weighed temperature and EM of 5.5 MK and 1.7*10^28 cm-5. In the current sheet, more hotter plasmoids form. More thermal and kinetic energy is hence converted. These results suggest that the reconnection is significantly accelerated by the propagating disturbance caused by the nearby filament eruption.
△ Less
Submitted 3 February, 2021; v1 submitted 15 December, 2020;
originally announced December 2020.
-
SoK: Diving into DAG-based Blockchain Systems
Authors:
Qin Wang,
Jiangshan Yu,
Shiping Chen,
Yang Xiang
Abstract:
Blockchain plays an important role in cryptocurrency markets and technology services. However, limitations on high latency and low scalability retard their adoptions and applications in classic designs. Reconstructed blockchain systems have been proposed to avoid the consumption of competitive transactions caused by linear sequenced blocks. These systems, instead, structure transactions/blocks in…
▽ More
Blockchain plays an important role in cryptocurrency markets and technology services. However, limitations on high latency and low scalability retard their adoptions and applications in classic designs. Reconstructed blockchain systems have been proposed to avoid the consumption of competitive transactions caused by linear sequenced blocks. These systems, instead, structure transactions/blocks in the form of Directed Acyclic Graph (DAG) and consequently re-build upper layer components including consensus, incentives, \textit{etc.} The promise of DAG-based blockchain systems is to enable fast confirmation (complete transactions within million seconds) and high scalability (attach transactions in parallel) without significantly compromising security. However, this field still lacks systematic work that summarises the DAG technique. To bridge the gap, this Systematization of Knowledge (SoK) provides a comprehensive analysis of DAG-based blockchain systems. Through deconstructing open-sourced systems and reviewing academic researches, we conclude the main components and featured properties of systems, and provide the approach to establish a DAG. With this in hand, we analyze the security and performance of several leading systems, followed by discussions and comparisons with concurrent (scaling blockchain) techniques. We further identify open challenges to highlight the potentiality of DAG-based solutions and indicate their promising directions for future research.
△ Less
Submitted 29 October, 2022; v1 submitted 11 December, 2020;
originally announced December 2020.
-
Continuum model for dislocation structures of semicoherent interfaces
Authors:
Luchan Zhang,
Xiaoxue Qin,
Yang Xiang
Abstract:
In order to relieve the misfitting elastic energy, the hetero-interfaces become semicoherent by forming networks of dislocations. These microscopic structures strongly influence the materials properties associated with the development of advanced materials. We develop a continuum model for the dislocation structures of semicoherent interfaces. The classical Frank-Bilby equation that governs the di…
▽ More
In order to relieve the misfitting elastic energy, the hetero-interfaces become semicoherent by forming networks of dislocations. These microscopic structures strongly influence the materials properties associated with the development of advanced materials. We develop a continuum model for the dislocation structures of semicoherent interfaces. The classical Frank-Bilby equation that governs the dislocation structures on semicoherent interfaces is not able to determine a unique solution. The available methods in the literature either use further information from atomistic simulations or consider only special cases (dislocations with no more than two Burgers vectors) where the Frank-Bilby equation has a unique solution. In our continuum model,the dislocation structure of a semicoherent interface is obtained by minimizing the energy of the equilibrium dislocation network with respect to all the possible Burgers vectors, subject to the constraint of the Frank-Bilby equation. The continuum model is validated by comparisons with atomistic simulation results.
△ Less
Submitted 17 December, 2020; v1 submitted 6 December, 2020;
originally announced December 2020.
-
P3-LOAM: PPP/LiDAR Loosely Coupled SLAM with Accurate Covariance Estimation and Robust RAIM in Urban Canyon Environment
Authors:
Tao Li,
Ling Pei,
Yan Xiang,
Qi Wu,
Songpengcheng Xia,
Lihao Tao,
Wenxian Yu
Abstract:
Light Detection and Ranging (LiDAR) based Simultaneous Localization and Mapping (SLAM) has drawn increasing interests in autonomous driving. However, LiDAR-SLAM suffers from accumulating errors which can be significantly mitigated by Global Navigation Satellite System (GNSS). Precise Point Positioning (PPP), an accurate GNSS operation mode independent of base stations, gains more popularity in unm…
▽ More
Light Detection and Ranging (LiDAR) based Simultaneous Localization and Mapping (SLAM) has drawn increasing interests in autonomous driving. However, LiDAR-SLAM suffers from accumulating errors which can be significantly mitigated by Global Navigation Satellite System (GNSS). Precise Point Positioning (PPP), an accurate GNSS operation mode independent of base stations, gains more popularity in unmanned systems. Considering the features of the two technologies, LiDAR-SLAM and PPP, this paper proposes a SLAM system, namely P3-LOAM (PPP based LiDAR Odometry and Mapping) which couples LiDAR-SLAM and PPP. For better integration, we derive LiDAR-SLAM positioning covariance by using Singular Value Decomposition (SVD) Jacobian model, since SVD provides an explicit analytic solution of Iterative Closest Point (ICP), which is a key issue in LiDAR-SLAM. A novel method is then proposed to evaluate the estimated LiDAR-SLAM covariance. In addition, to increase the reliability of GNSS in urban canyon environment, we develop a LiDAR-SLAM assisted GNSS Receiver Autonomous Integrity Monitoring (RAIM) algorithm. Finally, we validate P$^3$-LOAM with UrbanNav, a challenging public dataset in urban canyon environment. Comprehensive test results prove that P3-LOAM outperforms benchmarks such as Single Point Positioning (SPP), PPP, LeGO-LOAM, SPP-LOAM, and loosely coupled navigation system proposed by the publisher of UrbanNav in terms of accuracy and availability.
△ Less
Submitted 3 December, 2020;
originally announced December 2020.
-
Phase field model for self-climb of prismatic dislocation loops by vacancy pipe diffusion
Authors:
Xiaohua Niu,
Yang Xiang,
Xiaodong Yan
Abstract:
In this paper, we present a phase field model for the self-climb motion of prismatic dislocation loops via vacancy pipe diffusion driven by elastic interactions. This conserved dynamics model is developed under the framework of the Cahn-Hilliard equation with incorporation of the climb force on dislocations, and is based on the dislocation self-climb velocity formulation established in Ref.[1]. Th…
▽ More
In this paper, we present a phase field model for the self-climb motion of prismatic dislocation loops via vacancy pipe diffusion driven by elastic interactions. This conserved dynamics model is developed under the framework of the Cahn-Hilliard equation with incorporation of the climb force on dislocations, and is based on the dislocation self-climb velocity formulation established in Ref.[1]. The phase field model has the advantage of being able to handle the topological and geometrical changes automatically during the simulations. Asymptotic analysis shows that the proposed phase field model gives the dislocation self-climb velocity accurately in the sharp interface limit. Numerical simulations of evolution, translation, coalescence and repelling of prismatic loops by self-climb show excellent agreement with discrete dislocation dynamics simulation results and the experimental observation.
△ Less
Submitted 2 December, 2020;
originally announced December 2020.
-
Indium Antimonide, constraints on practicality as a magneto-optical platform for topological surface plasmon polaritons
Authors:
Samaneh Pakniyat,
Yi Liang,
Yinxiao Xiang,
Cheng Cen,
Jun Chen,
George W. Hanson
Abstract:
Magnetic-field-biased indium antimonide (InSb) is one of the most widely-discussed materials for supporting nonreciprocal surface plasmon polaritons (SPPs), which have recently been shown to be topological. In this work, we provide a critical assessment of InSb as a magneto-optical SPP platform, and show that it is only viable under a narrow set of conditions.
Magnetic-field-biased indium antimonide (InSb) is one of the most widely-discussed materials for supporting nonreciprocal surface plasmon polaritons (SPPs), which have recently been shown to be topological. In this work, we provide a critical assessment of InSb as a magneto-optical SPP platform, and show that it is only viable under a narrow set of conditions.
△ Less
Submitted 11 November, 2020;
originally announced November 2020.
-
Where am I? SLAM for Mobile Machines on A Smart Working Site
Authors:
Yusheng Xiang,
Dianzhao Li,
Tianqing Su,
Quan Zhou,
Christine Brach,
Samuel S. Mao,
Marcus Geimer
Abstract:
The current optimization approaches of construction machinery are mainly based on internal sensors. However, the decision of a reasonable strategy is not only determined by its intrinsic signals, but also very strongly by environmental information, especially the terrain. Due to the dynamically changing of the construction site and the consequent absence of a high definition map, the Simultaneous…
▽ More
The current optimization approaches of construction machinery are mainly based on internal sensors. However, the decision of a reasonable strategy is not only determined by its intrinsic signals, but also very strongly by environmental information, especially the terrain. Due to the dynamically changing of the construction site and the consequent absence of a high definition map, the Simultaneous Localization and Mapping (SLAM) offering the terrain information for construction machines is still challenging. Current SLAM technologies proposed for mobile machines are strongly dependent on costly or computationally expensive sensors, such as RTK GPS and cameras, so that commercial use is rare. In this study, we proposed an affordable SLAM method to create a multi-layer gird map for the construction site so that the machine can have the environmental information and be optimized accordingly. Concretely, after the machine passes by, we can get the local information and record it. Combining with positioning technology, we then create a map of the interesting places of the construction site. As a result of our research gathered from Gazebo, we showed that a suitable layout is the combination of 1 IMU and 2 differential GPS antennas using the unscented Kalman filter, which keeps the average distance error lower than 2m and the mapping error lower than 1.3% in the harsh environment. As an outlook, our SLAM technology provides the cornerstone to activate many efficiency improvement approaches.
△ Less
Submitted 5 November, 2020; v1 submitted 3 November, 2020;
originally announced November 2020.
-
DeFuzz: Deep Learning Guided Directed Fuzzing
Authors:
Xiaogang Zhu,
Shigang Liu,
Xian Li,
Sheng Wen,
Jun Zhang,
Camtepe Seyit,
Yang Xiang
Abstract:
Fuzzing is one of the most effective technique to identify potential software vulnerabilities. Most of the fuzzers aim to improve the code coverage, and there is lack of directedness (e.g., fuzz the specified path in a software). In this paper, we proposed a deep learning (DL) guided directed fuzzing for software vulnerability detection, named DeFuzz. DeFuzz includes two main schemes: (1) we emplo…
▽ More
Fuzzing is one of the most effective technique to identify potential software vulnerabilities. Most of the fuzzers aim to improve the code coverage, and there is lack of directedness (e.g., fuzz the specified path in a software). In this paper, we proposed a deep learning (DL) guided directed fuzzing for software vulnerability detection, named DeFuzz. DeFuzz includes two main schemes: (1) we employ a pre-trained DL prediction model to identify the potentially vulnerable functions and the locations (i.e., vulnerable addresses). Precisely, we employ Bidirectional-LSTM (BiLSTM) to identify attention words, and the vulnerabilities are associated with these attention words in functions. (2) then we employ directly fuzzing to fuzz the potential vulnerabilities by generating inputs that tend to arrive the predicted locations. To evaluate the effectiveness and practical of the proposed DeFuzz technique, we have conducted experiments on real-world data sets. Experimental results show that our DeFuzz can discover coverage more and faster than AFL. Moreover, DeFuzz exposes 43 more bugs than AFL on real-world applications.
△ Less
Submitted 22 October, 2020;
originally announced October 2020.
-
An Industry Evaluation of Embedding-based Entity Alignment
Authors:
Ziheng Zhang,
Jiaoyan Chen,
Xi Chen,
Hualuo Liu,
Yuejia Xiang,
Bo Liu,
Yefeng Zheng
Abstract:
Embedding-based entity alignment has been widely investigated in recent years, but most proposed methods still rely on an ideal supervised learning setting with a large number of unbiased seed mappings for training and validation, which significantly limits their usage. In this study, we evaluate those state-of-the-art methods in an industrial context, where the impact of seed mappings with differ…
▽ More
Embedding-based entity alignment has been widely investigated in recent years, but most proposed methods still rely on an ideal supervised learning setting with a large number of unbiased seed mappings for training and validation, which significantly limits their usage. In this study, we evaluate those state-of-the-art methods in an industrial context, where the impact of seed mappings with different sizes and different biases is explored. Besides the popular benchmarks from DBpedia and Wikidata, we contribute and evaluate a new industrial benchmark that is extracted from two heterogeneous knowledge graphs (KGs) under deployment for medical applications. The experimental results enable the analysis of the advantages and disadvantages of these alignment methods and the further discussion of suitable strategies for their industrial deployment.
△ Less
Submitted 7 November, 2020; v1 submitted 22 October, 2020;
originally announced October 2020.
-
Aerodynamic Data Predictions Based on Multi-task Learning
Authors:
Liwei Hu,
Yu Xiang,
Jun Zhan,
Zifang Shi,
Wenzheng Wang
Abstract:
The quality of datasets is one of the key factors that affect the accuracy of aerodynamic data models. For example, in the uniformly sampled Burgers' dataset, the insufficient high-speed data is overwhelmed by massive low-speed data. Predicting high-speed data is more difficult than predicting low-speed data, owing to that the number of high-speed data is limited, i.e. the quality of the Burgers'…
▽ More
The quality of datasets is one of the key factors that affect the accuracy of aerodynamic data models. For example, in the uniformly sampled Burgers' dataset, the insufficient high-speed data is overwhelmed by massive low-speed data. Predicting high-speed data is more difficult than predicting low-speed data, owing to that the number of high-speed data is limited, i.e. the quality of the Burgers' dataset is not satisfactory. To improve the quality of datasets, traditional methods usually employ the data resampling technology to produce enough data for the insufficient parts in the original datasets before modeling, which increases computational costs. Recently, the mixtures of experts have been used in natural language processing to deal with different parts of sentences, which provides a solution for eliminating the need for data resampling in aerodynamic data modeling. Motivated by this, we propose the multi-task learning (MTL), a datasets quality-adaptive learning scheme, which combines task allocation and aerodynamic characteristics learning together to disperse the pressure of the entire learning task. The task allocation divides a whole learning task into several independent subtasks, while the aerodynamic characteristics learning learns these subtasks simultaneously to achieve better precision. Two experiments with poor quality datasets are conducted to verify the data quality-adaptivity of the MTL to datasets. The results show than the MTL is more accurate than FCNs and GANs in poor quality datasets.
△ Less
Submitted 14 October, 2020;
originally announced October 2020.
-
Goal-Auxiliary Actor-Critic for 6D Robotic Grasping with Point Clouds
Authors:
Lirui Wang,
Yu Xiang,
Wei Yang,
Arsalan Mousavian,
Dieter Fox
Abstract:
6D robotic grasping beyond top-down bin-picking scenarios is a challenging task. Previous solutions based on 6D grasp synthesis with robot motion planning usually operate in an open-loop setting, which are sensitive to grasp synthesis errors. In this work, we propose a new method for learning closed-loop control policies for 6D grasping. Our policy takes a segmented point cloud of an object from a…
▽ More
6D robotic grasping beyond top-down bin-picking scenarios is a challenging task. Previous solutions based on 6D grasp synthesis with robot motion planning usually operate in an open-loop setting, which are sensitive to grasp synthesis errors. In this work, we propose a new method for learning closed-loop control policies for 6D grasping. Our policy takes a segmented point cloud of an object from an egocentric camera as input, and outputs continuous 6D control actions of the robot gripper for grasping the object. We combine imitation learning and reinforcement learning and introduce a goal-auxiliary actor-critic algorithm for policy learning. We demonstrate that our learned policy can be integrated into a tabletop 6D grasping system and a human-robot handover system to improve the grasping performance of unseen objects. Our videos and code can be found at https://sites.google.com/view/gaddpg .
△ Less
Submitted 30 June, 2021; v1 submitted 2 October, 2020;
originally announced October 2020.
-
Multivariate analysis of Brillouin imaging data by supervised and unsupervised learning
Authors:
YuChen Xiang,
Kai Ling C. Seow,
Carl Paterson,
Peter Török
Abstract:
Brillouin imaging relies on the reliable extraction of subtle spectral information from hyperspectral datasets. To date, the mainstream practice has been using line fitting of spectral features to retrieve the average peak shift and linewidth parameters. Good results, however, depend heavily on sufficient SNR and may not be applicable in complex samples that consist of spectral mixtures. In this w…
▽ More
Brillouin imaging relies on the reliable extraction of subtle spectral information from hyperspectral datasets. To date, the mainstream practice has been using line fitting of spectral features to retrieve the average peak shift and linewidth parameters. Good results, however, depend heavily on sufficient SNR and may not be applicable in complex samples that consist of spectral mixtures. In this work, we thus propose the use of various multivariate algorithms that can be used to perform supervised or unsupervised analysis of the hyperspectral data, with which we explore advanced image analysis applications, namely unmixing, classification and segmentation in a phantom and live cells. The resulting images are shown to provide more contrast and detail, and obtained on a timescale $10^2$ faster than fitting. The estimated spectral parameters are consistent with those calculated from pure fitting.
△ Less
Submitted 15 September, 2020;
originally announced September 2020.
-
Information Laundering for Model Privacy
Authors:
Xinran Wang,
Yu Xiang,
Jun Gao,
Jie Ding
Abstract:
In this work, we propose information laundering, a novel framework for enhancing model privacy. Unlike data privacy that concerns the protection of raw data information, model privacy aims to protect an already-learned model that is to be deployed for public use. The private model can be obtained from general learning methods, and its deployment means that it will return a deterministic or random…
▽ More
In this work, we propose information laundering, a novel framework for enhancing model privacy. Unlike data privacy that concerns the protection of raw data information, model privacy aims to protect an already-learned model that is to be deployed for public use. The private model can be obtained from general learning methods, and its deployment means that it will return a deterministic or random response for a given input query. An information-laundered model consists of probabilistic components that deliberately maneuver the intended input and output for queries to the model, so the model's adversarial acquisition is less likely. Under the proposed framework, we develop an information-theoretic principle to quantify the fundamental tradeoffs between model utility and privacy leakage and derive the optimal design.
△ Less
Submitted 13 September, 2020;
originally announced September 2020.
-
Generating Image Adversarial Examples by Embedding Digital Watermarks
Authors:
Yuexin Xiang,
Tiantian Li,
Wei Ren,
Tianqing Zhu,
Kim-Kwang Raymond Choo
Abstract:
With the increasing attention to deep neural network (DNN) models, attacks are also upcoming for such models. For example, an attacker may carefully construct images in specific ways (also referred to as adversarial examples) aiming to mislead the DNN models to output incorrect classification results. Similarly, many efforts are proposed to detect and mitigate adversarial examples, usually for cer…
▽ More
With the increasing attention to deep neural network (DNN) models, attacks are also upcoming for such models. For example, an attacker may carefully construct images in specific ways (also referred to as adversarial examples) aiming to mislead the DNN models to output incorrect classification results. Similarly, many efforts are proposed to detect and mitigate adversarial examples, usually for certain dedicated attacks. In this paper, we propose a novel digital watermark-based method to generate image adversarial examples to fool DNN models. Specifically, partial main features of the watermark image are embedded into the host image almost invisibly, aiming to tamper with and damage the recognition capabilities of the DNN models. We devise an efficient mechanism to select host images and watermark images and utilize the improved discrete wavelet transform (DWT) based Patchwork watermarking algorithm with a set of valid hyperparameters to embed digital watermarks from the watermark image dataset into original images for generating image adversarial examples. The experimental results illustrate that the attack success rate on common DNN models can reach an average of 95.47% on the CIFAR-10 dataset and the highest at 98.71%. Besides, our scheme is able to generate a large number of adversarial examples efficiently, concretely, an average of 1.17 seconds for completing the attacks on each image on the CIFAR-10 dataset. In addition, we design a baseline experiment using the watermark images generated by Gaussian noise as the watermark image dataset that also displays the effectiveness of our scheme. Similarly, we also propose the modified discrete cosine transform (DCT) based Patchwork watermarking algorithm. To ensure repeatability and reproducibility, the source code is available on GitHub.
△ Less
Submitted 3 August, 2022; v1 submitted 14 August, 2020;
originally announced September 2020.