首页 > 最新文献

Journal of Intelligent & Fuzzy Systems最新文献

英文 中文
Model extraction via active learning by fusing prior and posterior knowledge from unlabeled data 从无标记数据中融合先验知识和后验知识,通过主动学习提取模型
Pub Date : 2024-03-19 DOI: 10.3233/jifs-239504
Lijun Gao, Kai Liu, Wenjun Liu, Jiehong Wu, Xiao Jin
As machine learning models become increasingly integrated into practical applications and are made accessible via public APIs, the risk of model extraction attacks has gained prominence. This study presents an innovative and efficient approach to model extraction attacks, aimed at reducing query costs and enhancing attack effectiveness. The method begins by leveraging a pre-trained model to identify high-confidence samples from unlabeled datasets. It then employs unsupervised contrastive learning to thoroughly dissect the structural nuances of these samples, constructing a dataset of high quality that precisely mirrors a variety of features. A mixed information confidence strategy is employed to refine the query set, effectively probing the decision boundaries of the target model. By integrating consistency regularization and pseudo-labeling techniques, reliance on authentic labels is minimized, thus improving the feature extraction capabilities and predictive precision of the surrogate models. Evaluation on four major datasets reveals that the models crafted through this method bear a close functional resemblance to the original models, with a real-world API test success rate of 62.35%, which vouches for the method’s validity.
随着机器学习模型越来越多地集成到实际应用中,并可通过公共应用程序接口访问,模型提取攻击的风险日益突出。本研究针对模型提取攻击提出了一种创新而高效的方法,旨在降低查询成本并提高攻击效果。该方法首先利用预先训练好的模型,从未标明的数据集中识别出高信度样本。然后,它采用无监督对比学习,彻底剖析这些样本结构上的细微差别,构建一个精确反映各种特征的高质量数据集。采用混合信息置信策略来完善查询集,从而有效探测目标模型的决策边界。通过整合一致性正则化和伪标签技术,最大限度地减少了对真实标签的依赖,从而提高了特征提取能力和代用模型的预测精度。在四个主要数据集上进行的评估表明,通过这种方法制作的模型在功能上与原始模型非常相似,实际 API 测试成功率高达 62.35%,这证明了该方法的有效性。
{"title":"Model extraction via active learning by fusing prior and posterior knowledge from unlabeled data","authors":"Lijun Gao, Kai Liu, Wenjun Liu, Jiehong Wu, Xiao Jin","doi":"10.3233/jifs-239504","DOIUrl":"https://doi.org/10.3233/jifs-239504","url":null,"abstract":"As machine learning models become increasingly integrated into practical applications and are made accessible via public APIs, the risk of model extraction attacks has gained prominence. This study presents an innovative and efficient approach to model extraction attacks, aimed at reducing query costs and enhancing attack effectiveness. The method begins by leveraging a pre-trained model to identify high-confidence samples from unlabeled datasets. It then employs unsupervised contrastive learning to thoroughly dissect the structural nuances of these samples, constructing a dataset of high quality that precisely mirrors a variety of features. A mixed information confidence strategy is employed to refine the query set, effectively probing the decision boundaries of the target model. By integrating consistency regularization and pseudo-labeling techniques, reliance on authentic labels is minimized, thus improving the feature extraction capabilities and predictive precision of the surrogate models. Evaluation on four major datasets reveals that the models crafted through this method bear a close functional resemblance to the original models, with a real-world API test success rate of 62.35%, which vouches for the method’s validity.","PeriodicalId":509313,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140230004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of the influence of pre-crack number on acoustic emission characterization of red-sandstone short-term creep damage and failure precursors 研究裂缝前数量对红砂岩短期蠕变损伤和破坏前兆的声发射特征的影响
Pub Date : 2024-03-19 DOI: 10.3233/jifs-238964
Tao Li, Zhongyu Zhang, Zhigang Tao, Xinyu Jia, Xiaolong Wang, Jian Wang
Rock crack is one of the main factors responsible for rock failure. Uniaxial compression creep tests are performed using acoustic emission techniques, a high-sensitivity, non-radiative, non-destructive testing method to understand the influence of crack number on the precursor characteristics of short-term creep damage in the fractured rock mass. Based on the Grassberger-Procaccia (G-P) algorithm, the calculation step size for the correlation dimension value (D 2) of the acoustic emission ringing count rate is consistent with that for the acoustic emission b-value. The influence of the number of pre-cracks on the Acoustic emission precursor characteristics of red sandstone creep is analyzed. The results show that near the destabilization of the specimen, the Acoustic emission accumulative ringing count surges in a stepwise manner, the Acoustic emission b-value decreases, the D 2-value increases, the Acoustic emission amplitude shows high intensity and high frequency, and the ringing count increases sharply, all with the characteristics of failure precursors. During the accelerated creep stage of the specimens, with the increase of pre-cracks number, the precursory time points of acoustic emission b-value and D 2-value advance, and their acoustic emission ringing counts increase sharply.
岩石裂缝是造成岩石破坏的主要因素之一。利用声发射技术这种高灵敏度、非辐射、无损检测方法进行单轴压缩蠕变试验,以了解裂缝数量对断裂岩体短期蠕变破坏前兆特征的影响。基于 Grassberger-Procaccia (G-P) 算法,声发射振铃计数率相关维度值 (D 2) 的计算步长与声发射 b 值的计算步长一致。分析了前裂缝数量对红砂岩蠕变声发射前兆特征的影响。结果表明,在试样失稳附近,声发射累积振铃数呈阶梯状激增,声发射 b 值减小,D 2 值增大,声发射振幅呈现高强度和高频率,振铃数急剧增加,这些都具有破坏前兆的特征。在试样的加速蠕变阶段,随着预裂纹数量的增加,声发射 b 值和 D 2 值的前兆时间点提前,声发射振铃数急剧增加。
{"title":"Investigation of the influence of pre-crack number on acoustic emission characterization of red-sandstone short-term creep damage and failure precursors","authors":"Tao Li, Zhongyu Zhang, Zhigang Tao, Xinyu Jia, Xiaolong Wang, Jian Wang","doi":"10.3233/jifs-238964","DOIUrl":"https://doi.org/10.3233/jifs-238964","url":null,"abstract":"Rock crack is one of the main factors responsible for rock failure. Uniaxial compression creep tests are performed using acoustic emission techniques, a high-sensitivity, non-radiative, non-destructive testing method to understand the influence of crack number on the precursor characteristics of short-term creep damage in the fractured rock mass. Based on the Grassberger-Procaccia (G-P) algorithm, the calculation step size for the correlation dimension value (D 2) of the acoustic emission ringing count rate is consistent with that for the acoustic emission b-value. The influence of the number of pre-cracks on the Acoustic emission precursor characteristics of red sandstone creep is analyzed. The results show that near the destabilization of the specimen, the Acoustic emission accumulative ringing count surges in a stepwise manner, the Acoustic emission b-value decreases, the D 2-value increases, the Acoustic emission amplitude shows high intensity and high frequency, and the ringing count increases sharply, all with the characteristics of failure precursors. During the accelerated creep stage of the specimens, with the increase of pre-cracks number, the precursory time points of acoustic emission b-value and D 2-value advance, and their acoustic emission ringing counts increase sharply.","PeriodicalId":509313,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140228737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adaptive ranking teaching learning-based optimization algorithm to solve sensor deployment in harsh environments 解决恶劣环境中传感器部署问题的基于自适应排序教学学习的优化算法
Pub Date : 2024-03-19 DOI: 10.3233/jifs-240215
Xiaobing Yu, Yuexin Zhang, Xuming Wang
Sensors are often deployed in harsh environments, in which some threats may endanger the safety of sensors. In this paper, a sensor deployment model is developed in Wireless Sensor Networks (WSNs), in which the coverage rate and the threat risk are considered simultaneously. The model is established as an optimization problem. An adaptive ranking teaching learning-based optimization algorithm (ARTLBO) is proposed to solve the problem. Learners are divided into inferior and superior groups. The teacher phase is boosted by replacing the teacher with the top three learners, and the learner phase is improved by providing some guidance for inferior learners. The experimental results show that the proposed ARTLBO algorithm can effectively optimize the model. The fitness values of the proposed model found by the proposed ARTLBO are 0.4894, 0.4886, which are better than its competitors. The algorithm can provide a higher coverage rate and lower threat risk.
传感器通常部署在恶劣的环境中,其中一些威胁可能会危及传感器的安全。本文在无线传感器网络(WSN)中建立了一个传感器部署模型,其中同时考虑了覆盖率和威胁风险。该模型被建立为一个优化问题。为解决该问题,提出了一种基于学习的自适应排名教学优化算法(ARTLBO)。学习者被分为劣等组和高等组。通过用学习成绩前三名的学生代替教师来提高教师阶段的教学效果,并通过为劣等学生提供一些指导来改善学生阶段的教学效果。实验结果表明,所提出的 ARTLBO 算法能有效优化模型。所提出的 ARTLBO 算法发现的拟合度值分别为 0.4894、0.4886,优于其竞争对手。该算法可以提供更高的覆盖率和更低的威胁风险。
{"title":"An adaptive ranking teaching learning-based optimization algorithm to solve sensor deployment in harsh environments","authors":"Xiaobing Yu, Yuexin Zhang, Xuming Wang","doi":"10.3233/jifs-240215","DOIUrl":"https://doi.org/10.3233/jifs-240215","url":null,"abstract":"Sensors are often deployed in harsh environments, in which some threats may endanger the safety of sensors. In this paper, a sensor deployment model is developed in Wireless Sensor Networks (WSNs), in which the coverage rate and the threat risk are considered simultaneously. The model is established as an optimization problem. An adaptive ranking teaching learning-based optimization algorithm (ARTLBO) is proposed to solve the problem. Learners are divided into inferior and superior groups. The teacher phase is boosted by replacing the teacher with the top three learners, and the learner phase is improved by providing some guidance for inferior learners. The experimental results show that the proposed ARTLBO algorithm can effectively optimize the model. The fitness values of the proposed model found by the proposed ARTLBO are 0.4894, 0.4886, which are better than its competitors. The algorithm can provide a higher coverage rate and lower threat risk.","PeriodicalId":509313,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140231117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An intelligent stock trading decision system based on ensemble classifier through multimodal perturbation 基于多模态扰动集合分类器的智能股票交易决策系统
Pub Date : 2024-03-19 DOI: 10.3233/jifs-237087
Xiaoyu Hou, Chao Luo, Baozhong Gao
Candlesticks are widely used as an effective technical analysis tool in financial markets. Traditionally, different combinations of candlesticks have formed specific bullish/bearish patterns providing investors with increased opportunities for profitable trades. However, most patterns derived from subjective expertise without quantitative analysis. In this article, combining bullish/bearish patterns with ensemble learning, we present an intelligent system for making stock trading decisions. The Ensemble Classifier through Multimodal Perturbation (ECMP) is designed to generate a diverse set of precise base classifiers to further determine the candlestick patterns. It achieves this by: first, introducing perturbations to the sample space through bootstrap sampling; second, employing an attribute reduction algorithm based on neighborhood rough set theory to select relevant features; third, perturbing the feature space through random subspace selection. Ultimately, the trading decisions are guided by the classification outcomes of this procedure. To evaluate the proposed model, we apply it to empirical investigations within the context of the Chinese stock market. The results obtained from our experiments clearly demonstrate the effectiveness of the approach.
蜡烛图在金融市场中被广泛用作有效的技术分析工具。传统上,蜡烛图的不同组合形成了特定的看涨/看跌形态,为投资者提供了更多盈利交易的机会。然而,大多数形态都来自于主观的专业知识,而没有进行定量分析。在本文中,我们将看涨/看跌形态与集合学习相结合,提出了一种用于做出股票交易决策的智能系统。多模态扰动集合分类器(ECMP)旨在生成一组多样化的精确基础分类器,以进一步确定蜡烛图形态。它通过以下方法实现这一目标:首先,通过引导采样对样本空间进行扰动;其次,采用基于邻域粗糙集理论的属性缩减算法来选择相关特征;第三,通过随机子空间选择对特征空间进行扰动。最终,交易决策将以这一过程的分类结果为指导。为了评估所提出的模型,我们将其应用于中国股市的实证调查。实验结果清楚地证明了该方法的有效性。
{"title":"An intelligent stock trading decision system based on ensemble classifier through multimodal perturbation","authors":"Xiaoyu Hou, Chao Luo, Baozhong Gao","doi":"10.3233/jifs-237087","DOIUrl":"https://doi.org/10.3233/jifs-237087","url":null,"abstract":"Candlesticks are widely used as an effective technical analysis tool in financial markets. Traditionally, different combinations of candlesticks have formed specific bullish/bearish patterns providing investors with increased opportunities for profitable trades. However, most patterns derived from subjective expertise without quantitative analysis. In this article, combining bullish/bearish patterns with ensemble learning, we present an intelligent system for making stock trading decisions. The Ensemble Classifier through Multimodal Perturbation (ECMP) is designed to generate a diverse set of precise base classifiers to further determine the candlestick patterns. It achieves this by: first, introducing perturbations to the sample space through bootstrap sampling; second, employing an attribute reduction algorithm based on neighborhood rough set theory to select relevant features; third, perturbing the feature space through random subspace selection. Ultimately, the trading decisions are guided by the classification outcomes of this procedure. To evaluate the proposed model, we apply it to empirical investigations within the context of the Chinese stock market. The results obtained from our experiments clearly demonstrate the effectiveness of the approach.","PeriodicalId":509313,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140229078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A collaborative filtering method by fusion of facial information features 融合面部信息特征的协同过滤方法
Pub Date : 2024-03-19 DOI: 10.3233/jifs-232718
Shuo Wang, Jing Yang, Yue Yang
Personalized recommendation systems fundamentally assess user preferences as a reflection of their emotional responses to items. Traditional recommendation algorithms, focusing primarily on numerical processing, often overlook emotional factors, leading to reduced accuracy and limited application scenarios. This paper introduces a collaborative filtering recommendation method that integrates features of facial information, derived from emotions extracted from such data. Upon user authorization for camera usage, the system captures facial information features. Owing to the diversity in facial information, deep learning methods classify these features, employing the classification results as emotional labels. This approach calculates the similarity between emotional and item labels, reducing the ambiguity inherent in facial information features. The fusion process of facial information takes into account the user’s emotional state prior to item interaction, which might influence the emotions generated during the interaction. Variance is utilized to measure emotional fluctuations, thereby circumventing misjudgments caused by sustained non-interactive emotions. In selecting the nearest neighboring users, the method considers not only the similarity in user ratings but also in their emotional responses. Tests conducted using the Movielens dataset reveal that the proposed method, modeling facial features, more effectively aligns recommendations with user preferences and significantly enhances the algorithm’s performance.
个性化推荐系统从根本上评估了用户的偏好,反映了他们对物品的情感反应。传统的推荐算法主要侧重于数字处理,往往忽略了情感因素,导致准确性降低,应用场景有限。本文介绍了一种协同过滤推荐方法,该方法整合了面部信息的特征,并从这些数据中提取了情感因素。在用户授权使用摄像头后,系统会捕捉面部信息特征。由于面部信息的多样性,深度学习方法对这些特征进行分类,并将分类结果作为情感标签。这种方法计算情感标签和项目标签之间的相似性,减少了面部信息特征固有的模糊性。面部信息的融合过程考虑到了用户在项目交互前的情绪状态,这可能会影响交互过程中产生的情绪。利用方差来衡量情绪波动,从而避免因持续的非互动情绪而造成的误判。在选择最近的相邻用户时,该方法不仅考虑了用户评分的相似性,还考虑了他们情绪反应的相似性。使用 Movielens 数据集进行的测试表明,所提出的方法以面部特征为模型,更有效地使推荐符合用户偏好,并显著提高了算法的性能。
{"title":"A collaborative filtering method by fusion of facial information features","authors":"Shuo Wang, Jing Yang, Yue Yang","doi":"10.3233/jifs-232718","DOIUrl":"https://doi.org/10.3233/jifs-232718","url":null,"abstract":"Personalized recommendation systems fundamentally assess user preferences as a reflection of their emotional responses to items. Traditional recommendation algorithms, focusing primarily on numerical processing, often overlook emotional factors, leading to reduced accuracy and limited application scenarios. This paper introduces a collaborative filtering recommendation method that integrates features of facial information, derived from emotions extracted from such data. Upon user authorization for camera usage, the system captures facial information features. Owing to the diversity in facial information, deep learning methods classify these features, employing the classification results as emotional labels. This approach calculates the similarity between emotional and item labels, reducing the ambiguity inherent in facial information features. The fusion process of facial information takes into account the user’s emotional state prior to item interaction, which might influence the emotions generated during the interaction. Variance is utilized to measure emotional fluctuations, thereby circumventing misjudgments caused by sustained non-interactive emotions. In selecting the nearest neighboring users, the method considers not only the similarity in user ratings but also in their emotional responses. Tests conducted using the Movielens dataset reveal that the proposed method, modeling facial features, more effectively aligns recommendations with user preferences and significantly enhances the algorithm’s performance.","PeriodicalId":509313,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140229627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid short-term load forecasting method using CEEMDAN-RCMSE and improved BiLSTM error correction 使用 CEEMDAN-RCMSE 和改进型 BiLSTM 误差修正的混合短期负荷预测方法
Pub Date : 2024-03-19 DOI: 10.3233/jifs-237993
Yi Ning, Meiyu Liu, Xifeng Guo, Zhiyong Liu, Xinlu Wang
Accurate load forecasting is an important issue for safe and economic operation of power system. However, load data often has strong non-stationarity, nonlinearity and randomness, which increases the difficulty of load forecasting. To improve the prediction accuracy, a hybrid short-term load forecasting method using load feature extraction based on complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN) and refined composite multi-scale entropy (RCMSE) and improved bidirectional long short time memory (BiLSTM) error correction is proposed. Firstly, CEEMDAN is used to separate the detailed information and trend information of the original load series, RCMSE is used to reconstruct the feature information, and Spearman is used to screen the features. Secondly, an improved butterfly optimization algorithm (IBOA) is proposed to optimize BiLSTM, and the reconstructed components are predicted respectively. Finally, an error correction model is constructed to mine the hidden information contained in error sequence. The experimental results show that the MAE, MAPE and RMSE of the proposed method are 645 kW, 0.96% and 827.3 kW respectively, and MAPE is improved by about 10% compared with other hybrid models. Therefore, the proposed method can overcome the problem of inaccurate prediction caused by data and inherent defects of models and improve the prediction accuracy.
准确的负荷预测是电力系统安全和经济运行的一个重要问题。然而,负荷数据往往具有很强的非平稳性、非线性和随机性,这增加了负荷预测的难度。为了提高预测精度,本文提出了一种基于自适应噪声的完全集合经验模态分解(CEEMDAN)和精炼复合多尺度熵(RCMSE)的负荷特征提取以及改进的双向长短时间记忆(BiLSTM)误差修正的混合短期负荷预测方法。首先,利用 CEEMDAN 分离原始负荷序列的详细信息和趋势信息,利用 RCMSE 重构特征信息,利用 Spearman 筛选特征。其次,提出一种改进的蝶式优化算法(IBOA)来优化 BiLSTM,并分别预测重建的成分。最后,构建误差修正模型,挖掘误差序列中包含的隐藏信息。实验结果表明,所提方法的 MAE、MAPE 和 RMSE 分别为 645 kW、0.96% 和 827.3 kW,与其他混合模型相比,MAPE 提高了约 10%。因此,所提出的方法可以克服数据和模型固有缺陷导致的预测不准确问题,提高预测精度。
{"title":"A hybrid short-term load forecasting method using CEEMDAN-RCMSE and improved BiLSTM error correction","authors":"Yi Ning, Meiyu Liu, Xifeng Guo, Zhiyong Liu, Xinlu Wang","doi":"10.3233/jifs-237993","DOIUrl":"https://doi.org/10.3233/jifs-237993","url":null,"abstract":"Accurate load forecasting is an important issue for safe and economic operation of power system. However, load data often has strong non-stationarity, nonlinearity and randomness, which increases the difficulty of load forecasting. To improve the prediction accuracy, a hybrid short-term load forecasting method using load feature extraction based on complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN) and refined composite multi-scale entropy (RCMSE) and improved bidirectional long short time memory (BiLSTM) error correction is proposed. Firstly, CEEMDAN is used to separate the detailed information and trend information of the original load series, RCMSE is used to reconstruct the feature information, and Spearman is used to screen the features. Secondly, an improved butterfly optimization algorithm (IBOA) is proposed to optimize BiLSTM, and the reconstructed components are predicted respectively. Finally, an error correction model is constructed to mine the hidden information contained in error sequence. The experimental results show that the MAE, MAPE and RMSE of the proposed method are 645 kW, 0.96% and 827.3 kW respectively, and MAPE is improved by about 10% compared with other hybrid models. Therefore, the proposed method can overcome the problem of inaccurate prediction caused by data and inherent defects of models and improve the prediction accuracy.","PeriodicalId":509313,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140228165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An empirical analysis of evolutionary computing approaches for IoT security assessment 对用于物联网安全评估的进化计算方法的实证分析
Pub Date : 2024-03-16 DOI: 10.3233/jifs-233759
Vinay Kumar Sahu, Dhirendra Pandey, Priyanka Singh, Md Shamsul Haque Ansari, Asif Khan, Naushad Varish, Mohd Waris Khan
The Internet of Things (IoT) strategy enables physical objects to easily produce, receive, and exchange data. IoT devices are getting more common in our daily lives, with diverse applications ranging from consumer sector to industrial and commercial systems. The rapid expansion and widespread use of IoT devices highlight the critical significance of solid and effective cybersecurity standards across the device development life cycle. Therefore, if vulnerability is exploited directly affects the IoT device and the applications. In this paper we investigated and assessed the various real-world critical IoT attacks/vulnerabilities that have affected IoT deployed in the commercial, industrial and consumer sectors since 2010. Subsequently, we evoke the vulnerabilities or type of attack, exploitation techniques, compromised security factors, intensity of vulnerability and impacts of the expounded real-world attacks/vulnerabilities. We first categorise how each attack affects information security parameters, and then we provide a taxonomy based on the security factors that are affected. Next, we perform a risk assessment of the security parameters that are encountered, using two well-known multi-criteria decision-making (MCDM) techniques namely Fuzzy-Analytic Hierarchy Process (F-AHP) and Fuzzy-Analytic Network Process (F-ANP) to determine the severity of severely impacted information security measures.
物联网(IoT)战略使物理对象能够轻松地生产、接收和交换数据。物联网设备在我们的日常生活中越来越常见,应用范围从消费领域到工业和商业系统。物联网设备的快速扩展和广泛应用凸显了在设备开发生命周期中制定可靠有效的网络安全标准的重要意义。因此,如果漏洞被利用,将直接影响物联网设备和应用程序。在本文中,我们调查并评估了自 2010 年以来影响商业、工业和消费领域部署的物联网的各种真实世界关键物联网攻击/漏洞。随后,我们唤起了所阐述的真实世界攻击/漏洞的漏洞或攻击类型、利用技术、受损安全因素、漏洞强度和影响。我们首先对每种攻击如何影响信息安全参数进行分类,然后根据受影响的安全因素进行分类。接下来,我们使用两种著名的多标准决策(MCDM)技术,即模糊分析层次过程(F-AHP)和模糊分析网络过程(F-ANP),对所遇到的安全参数进行风险评估,以确定受到严重影响的信息安全措施的严重程度。
{"title":"An empirical analysis of evolutionary computing approaches for IoT security assessment","authors":"Vinay Kumar Sahu, Dhirendra Pandey, Priyanka Singh, Md Shamsul Haque Ansari, Asif Khan, Naushad Varish, Mohd Waris Khan","doi":"10.3233/jifs-233759","DOIUrl":"https://doi.org/10.3233/jifs-233759","url":null,"abstract":"The Internet of Things (IoT) strategy enables physical objects to easily produce, receive, and exchange data. IoT devices are getting more common in our daily lives, with diverse applications ranging from consumer sector to industrial and commercial systems. The rapid expansion and widespread use of IoT devices highlight the critical significance of solid and effective cybersecurity standards across the device development life cycle. Therefore, if vulnerability is exploited directly affects the IoT device and the applications. In this paper we investigated and assessed the various real-world critical IoT attacks/vulnerabilities that have affected IoT deployed in the commercial, industrial and consumer sectors since 2010. Subsequently, we evoke the vulnerabilities or type of attack, exploitation techniques, compromised security factors, intensity of vulnerability and impacts of the expounded real-world attacks/vulnerabilities. We first categorise how each attack affects information security parameters, and then we provide a taxonomy based on the security factors that are affected. Next, we perform a risk assessment of the security parameters that are encountered, using two well-known multi-criteria decision-making (MCDM) techniques namely Fuzzy-Analytic Hierarchy Process (F-AHP) and Fuzzy-Analytic Network Process (F-ANP) to determine the severity of severely impacted information security measures.","PeriodicalId":509313,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140236391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel neutrosophic cubic MADM method based on Aczel-Alsina operator and MEREC and its application for supplier selection 基于 Aczel-Alsina 算子和 MEREC 的新型中性立方 MADM 方法及其在供应商选择中的应用
Pub Date : 2024-03-16 DOI: 10.3233/jifs-235274
Shanshan Zhai, Jianping Fan, Lin Liu
Neutrosophic cubic set (NCS) can process complex information by choosing both interval value and single value membership and indeterminacy and falsehood components. The aggregation operators based on Aczel-Alsina t-norm and t-corm are quite effective for evaluating the interrelationship among attributes. The purpose of this paper is to diagnose the interrelationship among attributes with neutrosophic cubic information, and propose a multi-attribute decision-making(MADM) method for supplier selection problem with unknown weight under neutrosophic cubic environment. We defined neutrosophic cubic Aczel-Alsina (NC-AA) operator and neutrosophic cubic Aczel–Alsina weighted arithmetic average (NCAAWAA) operator, then we discussed various important results and some properties of the proposed operators. Additionally, we proposed a MADM method under the presence of the NC-AAWAA operator. When the weights of attributes are unknown, we use the MEREC method to determine the weights. Later, the NC-AAWAA operator and MEREC method are applied to address the supplier selection problem. Finally, a sensitivity analysis and a comparative analysis are conducted to illustrate the stability and superiority of the proposed method. The results show the NC-AAWAA operator can handle the interrelationship among complex information more effectively, and MEREC method can weight the attributes based on the removal effect of a neutrosophic cubic attribute.
中值立方集(NCS)可以通过选择区间值和单值成员资格以及不确定性和虚假成分来处理复杂信息。基于 Aczel-Alsina t-norm 和 t-corm 的聚合算子对评估属性间的相互关系非常有效。本文旨在利用中性三次方信息诊断属性间的相互关系,并针对中性三次方环境下权重未知的供应商选择问题提出一种多属性决策(MADM)方法。我们定义了中性立方阿克塞尔-阿尔西纳(NC-AA)算子和中性立方阿克塞尔-阿尔西纳加权算术平均(NCAAWAA)算子,然后讨论了所提算子的各种重要结果和一些特性。此外,我们还提出了一种存在 NC-AAWAA 算子的 MADM 方法。当属性权重未知时,我们使用 MEREC 方法来确定权重。随后,我们应用 NC-AAWAA 算子和 MEREC 方法来解决供应商选择问题。最后,我们进行了敏感性分析和比较分析,以说明所提方法的稳定性和优越性。结果表明,NC-AAWAA 算子能更有效地处理复杂信息之间的相互关系,MEREC 方法能根据中性立方属性的去除效果对属性进行加权。
{"title":"A novel neutrosophic cubic MADM method based on Aczel-Alsina operator and MEREC and its application for supplier selection","authors":"Shanshan Zhai, Jianping Fan, Lin Liu","doi":"10.3233/jifs-235274","DOIUrl":"https://doi.org/10.3233/jifs-235274","url":null,"abstract":"Neutrosophic cubic set (NCS) can process complex information by choosing both interval value and single value membership and indeterminacy and falsehood components. The aggregation operators based on Aczel-Alsina t-norm and t-corm are quite effective for evaluating the interrelationship among attributes. The purpose of this paper is to diagnose the interrelationship among attributes with neutrosophic cubic information, and propose a multi-attribute decision-making(MADM) method for supplier selection problem with unknown weight under neutrosophic cubic environment. We defined neutrosophic cubic Aczel-Alsina (NC-AA) operator and neutrosophic cubic Aczel–Alsina weighted arithmetic average (NCAAWAA) operator, then we discussed various important results and some properties of the proposed operators. Additionally, we proposed a MADM method under the presence of the NC-AAWAA operator. When the weights of attributes are unknown, we use the MEREC method to determine the weights. Later, the NC-AAWAA operator and MEREC method are applied to address the supplier selection problem. Finally, a sensitivity analysis and a comparative analysis are conducted to illustrate the stability and superiority of the proposed method. The results show the NC-AAWAA operator can handle the interrelationship among complex information more effectively, and MEREC method can weight the attributes based on the removal effect of a neutrosophic cubic attribute.","PeriodicalId":509313,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140236971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anti-attack algorithm of cloud storage attribute base based on dynamic authorized access 基于动态授权访问的云存储属性库防攻击算法
Pub Date : 2024-03-16 DOI: 10.3233/jifs-237409
Xixi Zhao, Liang Gu, Xiaorong Duan, Liguo Wang, Zhenxi Li
Cloud storage attribute libraries usually store a large amount of sensitive data such as personal information and trade secrets. Attackers adopt diverse and complex attack methods to target the cloud storage attribute database, which makes the defense work more challenging. In order to realize the secure storage of information, an attribute based cloud storage anti-attack algorithm based on dynamic authorization access is proposed. According to the characteristic variables of the sample, the data correlation matrix is calculated, and the principal component analysis method is adopted to reduce the dimension of the data, build the anti-attack code model, simulate the dynamic authorization access rights, and calculate the packet loss rate according to the anti-attack flow. Design the initialization stage, cluster stage and cluster center update stage to realize the attack prevention of cloud storage attribute database. The experimental results show that the proposed algorithm can accurately classify the anti-attack code, has good packet processing ability, relatively short page request time, and anti-attack success rate is higher than 90%, which can effectively ensure the stability of the algorithm.
云存储属性库通常存储大量敏感数据,如个人信息和商业机密。攻击者针对云存储属性库采用多样、复杂的攻击手段,使得防御工作更具挑战性。为了实现信息的安全存储,本文提出了一种基于动态授权访问的云存储属性防攻击算法。根据样本的特征变量,计算数据相关矩阵,采用主成分分析方法降低数据维度,建立防攻击代码模型,模拟动态授权访问权限,根据防攻击流程计算丢包率。设计初始化阶段、聚类阶段和聚类中心更新阶段,实现云存储属性数据库的防攻击。实验结果表明,所提出的算法能对防攻击代码进行准确分类,具有良好的数据包处理能力,页面请求时间相对较短,防攻击成功率高于90%,能有效保证算法的稳定性。
{"title":"Anti-attack algorithm of cloud storage attribute base based on dynamic authorized access","authors":"Xixi Zhao, Liang Gu, Xiaorong Duan, Liguo Wang, Zhenxi Li","doi":"10.3233/jifs-237409","DOIUrl":"https://doi.org/10.3233/jifs-237409","url":null,"abstract":"Cloud storage attribute libraries usually store a large amount of sensitive data such as personal information and trade secrets. Attackers adopt diverse and complex attack methods to target the cloud storage attribute database, which makes the defense work more challenging. In order to realize the secure storage of information, an attribute based cloud storage anti-attack algorithm based on dynamic authorization access is proposed. According to the characteristic variables of the sample, the data correlation matrix is calculated, and the principal component analysis method is adopted to reduce the dimension of the data, build the anti-attack code model, simulate the dynamic authorization access rights, and calculate the packet loss rate according to the anti-attack flow. Design the initialization stage, cluster stage and cluster center update stage to realize the attack prevention of cloud storage attribute database. The experimental results show that the proposed algorithm can accurately classify the anti-attack code, has good packet processing ability, relatively short page request time, and anti-attack success rate is higher than 90%, which can effectively ensure the stability of the algorithm.","PeriodicalId":509313,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140237158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fusion of GBDT and neural network for click-through rate estimation 融合 GBDT 和神经网络估算点击率
Pub Date : 2024-03-16 DOI: 10.3233/jifs-234713
Bin Zhao, Wei Cao, Jiqun Zhang, Yilong Gao, Bin Li, Fengmei Chen
Aiming at the issue that the current click-through rate prediction methods ignore the varying impacts of different input features on prediction accuracy and exhibit low accuracy when dealing with large-scale data, a click-through rate prediction method (GBIFM) which combines Gradient Boosting Decision Tree (GBDT) and Input-aware Factorization Machine (IFM) is proposed in this paper. The proposed GBIFM method employs GBDT for data processing, which can flexibly handle various types of data without the need for one-hot encoding of discrete features. An Input-aware strategy is introduced to refine the weight vector and embedding vector of each feature for different instances, adaptively learning the impact of each input vector on feature representation. Furthermore, a fully connected network is incorporated to capture high-order features in a non-linear manner, enhancing the method’s ability to express and generalize complex structured data. A comprehensive experiment is conducted on the Criteo and Avazu datasets, the results show that compared to typical methods such as DeepFM, AFM, and IFM, the proposed method GBIFM can increase the AUC value by 10% –12% and decrease the Logloss value by 6% –20%, effectively improving the accuracy of click-through rate prediction.
针对目前的点击率预测方法忽视了不同输入特征对预测精度的不同影响,在处理大规模数据时表现出较低的精度这一问题,本文提出了一种结合梯度提升决策树(GBDT)和输入感知因式分解机(IFM)的点击率预测方法(GBIFM)。所提出的 GBIFM 方法采用 GBDT 进行数据处理,可灵活处理各种类型的数据,而无需对离散特征进行一次性编码。本文引入了输入感知策略,针对不同的实例细化每个特征的权重向量和嵌入向量,自适应地学习每个输入向量对特征表示的影响。此外,还加入了全连接网络,以非线性方式捕捉高阶特征,从而增强了该方法表达和概括复杂结构数据的能力。在 Criteo 和 Avazu 数据集上进行了综合实验,结果表明,与 DeepFM、AFM 和 IFM 等典型方法相比,所提出的方法 GBIFM 可以将 AUC 值提高 10% -12% 并将 Logloss 值降低 6% -20%,有效提高了点击率预测的准确性。
{"title":"Fusion of GBDT and neural network for click-through rate estimation","authors":"Bin Zhao, Wei Cao, Jiqun Zhang, Yilong Gao, Bin Li, Fengmei Chen","doi":"10.3233/jifs-234713","DOIUrl":"https://doi.org/10.3233/jifs-234713","url":null,"abstract":"Aiming at the issue that the current click-through rate prediction methods ignore the varying impacts of different input features on prediction accuracy and exhibit low accuracy when dealing with large-scale data, a click-through rate prediction method (GBIFM) which combines Gradient Boosting Decision Tree (GBDT) and Input-aware Factorization Machine (IFM) is proposed in this paper. The proposed GBIFM method employs GBDT for data processing, which can flexibly handle various types of data without the need for one-hot encoding of discrete features. An Input-aware strategy is introduced to refine the weight vector and embedding vector of each feature for different instances, adaptively learning the impact of each input vector on feature representation. Furthermore, a fully connected network is incorporated to capture high-order features in a non-linear manner, enhancing the method’s ability to express and generalize complex structured data. A comprehensive experiment is conducted on the Criteo and Avazu datasets, the results show that compared to typical methods such as DeepFM, AFM, and IFM, the proposed method GBIFM can increase the AUC value by 10% –12% and decrease the Logloss value by 6% –20%, effectively improving the accuracy of click-through rate prediction.","PeriodicalId":509313,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140235959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Intelligent & Fuzzy Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1