期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Review on application progress of federated learning model and security hazard protection 被引量:2
1
作者 Aimin Yang Zezhong Ma +5 位作者 Chunying Zhang Yang Han Zhibin Hu Wei Zhang Xiangdong Huang Yafeng Wu 《Digital Communications and Networks》 SCIE CSCD 2023年第1期146-158,共13页
Federated learning is a new type of distributed learning framework that allows multiple participants to share training results without revealing their data privacy.As data privacy becomes more important,it becomes dif... Federated learning is a new type of distributed learning framework that allows multiple participants to share training results without revealing their data privacy.As data privacy becomes more important,it becomes difficult to collect data from multiple data owners to make machine learning predictions due to the lack of data security.Data is forced to be stored independently between companies,creating“data silos”.With the goal of safeguarding data privacy and security,the federated learning framework greatly expands the amount of training data,effectively improving the shortcomings of traditional machine learning and deep learning,and bringing AI algorithms closer to our reality.In the context of the current international data security issues,federated learning is developing rapidly and has gradually moved from the theoretical to the applied level.The paper first introduces the federated learning framework,analyzes its advantages,reviews the results of federated learning applications in industries such as communication and healthcare,then analyzes the pitfalls of federated learning and discusses the security issues that should be considered in applications,and finally looks into the future of federated learning and the application layer. 展开更多
关键词 Data silos Machine learning Federated learning Privacy protection Learning framework
下载PDF
Application of meta-learning in cyberspace security:a survey 被引量:1
2
作者 Aimin Yang Chaomeng Lu +4 位作者 Jie Li Xiangdong Huang Tianhao Ji Xichang Li Yichao Sheng 《Digital Communications and Networks》 SCIE CSCD 2023年第1期67-78,共12页
In recent years,machine learning has made great progress in intrusion detection,network protection,anomaly detection,and other issues in cyberspace.However,these traditional machine learning algorithms usually require... In recent years,machine learning has made great progress in intrusion detection,network protection,anomaly detection,and other issues in cyberspace.However,these traditional machine learning algorithms usually require a lot of data to learn and have a low recognition rate for unknown attacks.Among them,“one-shot learning”,“few-shot learning”,and“zero-shot learning”are challenges that cannot be ignored for traditional machine learning.The more intractable problem in cyberspace security is the changeable attack mode.When a new attack mode appears,there are few or even zero samples that can be learned.Meta-learning comes from imitating human problem-solving methods as humans can quickly learn unknown things based on their existing knowledge when learning.Its purpose is to quickly obtain a model with high accuracy and strong generalization through less data training.This article first divides the meta-learning model into five research directions based on different principles of use.They are model-based,metric-based,optimization-based,online-learning-based,or stacked ensemble-based.Then,the current problems in the field of cyberspace security are categorized into three branches:cyber security,information security,and artificial intelligence security according to different perspectives.Then,the application research results of various meta-learning models on these three branches are reviewed.At the same time,based on the characteristics of strong generalization,evolution,and scalability of meta-learning,we contrast and summarize its advantages in solving problems.Finally,the prospect of future deep application of meta-learning in the field of cyberspace security is summarized. 展开更多
关键词 META-LEARNING Cyberspace security Machine learning Few-shot learning
下载PDF
Set pair three-way overlapping community discovery algorithm for weighted social internet of things 被引量:1
3
作者 Chunying Zhang Jing Ren +3 位作者 Lu Liu Shouyue Liu Xiaoqi Li Liya Wang 《Digital Communications and Networks》 SCIE CSCD 2023年第1期3-13,共11页
There are many problems in Social Internet of Things(IoTs),such as complex topology information,different degree of association between nodes and overlapping communities.The idea of set pair information grain computin... There are many problems in Social Internet of Things(IoTs),such as complex topology information,different degree of association between nodes and overlapping communities.The idea of set pair information grain computing and clustering is introduced to solve the above problems so as to accurately describe the similarity between nodes and fully explore the multi-community structure.A Set Pair Three-Way Overlapping Community Discovery Algorithm for Weighted Social Internet of Things(WSIoT-SPTOCD)is proposed.In the local network structure,which fully considers the topological information between nodes,the set pair connection degree is used to analyze the identity,difference and reverse of neighbor nodes.The similarity degree of different neighbor nodes is defined from network edge weight and node degree,and the similarity measurement method of set pair between nodes based on the local information structure is proposed.According to the number of nodes'neighbors and the connection degree of adjacent edges,the clustering intensity of nodes is defined,and an improved algorithm for initial value selection of k-means is proposed.The nodes are allocated according to the set pair similarity between nodes and different communities.Three-way community structures composed of a positive domain,boundary domain and negative domain are generated iteratively.Next,the overlapping node set is generated according to the calculation results of community node membership.Finally,experiments are carried out on artificial networks and real networks.The results show that WSIoT-SPTOCD performs well in terms of standardized mutual information,overlapping community modularity and F1. 展开更多
关键词 Social internet of things Set pair analysis K-MEANS Local information structure Overlapping community
下载PDF
Research on θ -Intuitionistic Fuzzy Homomorphism Theory
4
作者 Yue Wang Yan Yan Xinru Shang 《Journal of Applied Mathematics and Physics》 2024年第10期3579-3589,共11页
Fuzzy homomorphism is an important research content of fuzzy group theory, different fuzzy mappings will produce different fuzzy homomorphisms. In this paper, the fuzzy homomorphism of groups is generalized. Firstly, ... Fuzzy homomorphism is an important research content of fuzzy group theory, different fuzzy mappings will produce different fuzzy homomorphisms. In this paper, the fuzzy homomorphism of groups is generalized. Firstly, the θ-intuitionistic fuzzy mapping is defined, and the θ-intuitionistic fuzzy homomorphism of groups is obtained. The properties of intuitionistic fuzzy subgroups and intuitionistic fuzzy normal subgroups are studied under the θ-intuitionistic fuzzy homomorphism of groups, and the fundamental theorem of θ-intuitionistic fuzzy homomorphism is proved. 展开更多
关键词 -Intuitionistic Fuzzy Homomorphism Intuitionistic Fuzzy Subgroup Intuitionistic Fuzzy Normal Subgroup
下载PDF
Non-rigid registration of medical images based on S^(1/2)(Δ_(mn)^((2)))non-tensor product Bspline
5
作者 Qi Zheng Chaoyue Liu Jincai Chang 《Visual Computing for Industry,Biomedicine,and Art》 EI 2022年第1期57-70,共14页
In this study,a non-tensor product B-spline algorithm is applied to the search space of the registration process,and a new method of image non-rigid registration is proposed.The tensor product B-spline is a function d... In this study,a non-tensor product B-spline algorithm is applied to the search space of the registration process,and a new method of image non-rigid registration is proposed.The tensor product B-spline is a function defined in the two directions of x and y,while the non-tensor product B-spline S^(1/2)(Δ_(mn)^((2)))is defined in four directions on the 2-type triangulation.For certain problems,using non-tensor product B-splines to describe the non-rigid deformation of an image can more accurately extract the four-directional information of the image,thereby describing the global or local non-rigid deformation of the image in more directions.Indeed,it provides a method to solve the problem of image deformation in multiple directions.In addition,the region of interest of medical images is irregular,and usually no value exists on the boundary triangle.The value of the basis function of the non-tensor product B-spline on the boundary triangle is only 0.The algorithm process is optimized.The algorithm performs completely automatic non-rigid registration of computed tomography and magnetic resonance imaging images of patients.In particular,this study compares the performance of the proposed algorithm with the tensor product B-spline registration algorithm.The results elucidate that the proposed algorithm clearly improves the accuracy. 展开更多
关键词 Non-rigid registration Diagonal direction Non-tensor product type B-spline Boundary triangle domain
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部