首页 > 最新文献

Security and Safety最新文献

英文 中文
On Cultivation of Cybersecurity and Safety talents and Responsible Developers 关于培养网络安全人才和负责任的开发人员
Pub Date : 2024-07-19 DOI: 10.1051/sands/2024010
Jiaxi Chen, Hong Zou, Jiangxing Wu, Fan Zhang, Yuting Shang, Xinsheng JI
To address the serious imbalance between the supply and demand of cybersecurity workforce, this paper proposes to embrace the latest trend of a fundamental shift in the "underlying dynamics of the digital ecosystem", focusing on a shared liability for cybersecurity between the application side and the manufacturing side. Assuming that product providers shall take more responsibility by implementing secure defaults, this paper explores the establishment of an S&S talent cultivation system to strike the right balance of cybersecurity liabilities by nurturing more responsible developers. This paper proposes a Knowledge, Skill, and Awareness(KSA) model for Security and Safety (S&S) talent cultivation, and proves the feasibility of this model by analyzing the theoretical, disciplinary, methodological, practical, and societal foundations of S&S talent cultivation. Additionally, this paper also proposes principles and strategies for building a S&S talent cultivation system based on its unique characteristics and patterns. It gives a talent cultivation scheme, supported by "Independent Knowledge System, Education and Cultivation System, Practice and Training system, Evaluation and Certification system, and Awareness Popularization System". Finally, this paper puts forward a proposal for coordinating efforts and adopting multiple measures to accelerate the cultivation of S&S talents.
为解决网络安全人才供需严重失衡的问题,本文建议顺应 "数字生态系统底层动力 "发生根本性转变的最新趋势,重点关注应用方和制造方之间的网络安全责任分担问题。假定产品提供商应通过实施安全默认来承担更多责任,本文探讨了如何建立 S&S 人才培养体系,通过培养更多负责任的开发人员来实现网络安全责任的适当平衡。本文提出了安全与保安(S&S)人才培养的知识、技能和意识(KSA)模型,并通过分析安全与保安人才培养的理论、学科、方法、实践和社会基础,证明了该模型的可行性。此外,本文还根据安全与安保人才培养的特点和规律,提出了构建安全与安保人才培养体系的原则和策略。它给出了以 "自主知识体系、教育培养体系、实践培训体系、评价认证体系、宣传普及体系 "为支撑的人才培养方案。最后,本文提出了统筹协调、多措并举加快科技人才培养的建议。
{"title":"On Cultivation of Cybersecurity and Safety talents and Responsible Developers","authors":"Jiaxi Chen, Hong Zou, Jiangxing Wu, Fan Zhang, Yuting Shang, Xinsheng JI","doi":"10.1051/sands/2024010","DOIUrl":"https://doi.org/10.1051/sands/2024010","url":null,"abstract":"To address the serious imbalance between the supply and demand of cybersecurity workforce, this paper proposes to embrace the latest trend of a fundamental shift in the \"underlying dynamics of the digital ecosystem\", focusing on a shared liability for cybersecurity between the application side and the manufacturing side. Assuming that product providers shall take more responsibility by implementing secure defaults, this paper explores the establishment of an S&S talent cultivation system to strike the right balance of cybersecurity liabilities by nurturing more responsible developers. This paper proposes a Knowledge, Skill, and Awareness(KSA) model for Security and Safety (S&S) talent cultivation, and proves the feasibility of this model by analyzing the theoretical, disciplinary, methodological, practical, and societal foundations of S&S talent cultivation. Additionally, this paper also proposes principles and strategies for building a S&S talent cultivation system based on its unique characteristics and patterns. It gives a talent cultivation scheme, supported by \"Independent Knowledge System, Education and Cultivation System, Practice and Training system, Evaluation and Certification system, and Awareness Popularization System\". Finally, this paper puts forward a proposal for coordinating efforts and adopting multiple measures to accelerate the cultivation of S&S talents.","PeriodicalId":513337,"journal":{"name":"Security and Safety","volume":"117 38","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141822172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RiskTree: Decision Trees for Asset and Process Risk Assessment Quantification in Big Data Platforms RiskTree:在大数据平台中量化资产和流程风险评估的决策树
Pub Date : 2024-07-03 DOI: 10.1051/sands/2024009
Zhenyang Guo, Haomou Zhan, Jiawei Yang, Jin Cao, Wei You, X. Zhao, Hui Li, Dong Zhang
The inherent characteristics of big data lies in its voluminous scale, varied data formats, and swift processing velocity. The intrinsic characteristics of big data undermine the efficacy of conventional data security techniques and data management standards, consequently compromising the security of big data. As a consequence, big data possesses susceptibilities to security incidents, including unauthorized data access, data manipulation, and data compromise throughout the transmission, storage, and processing stages. Conventional information system security risk assessment methodologies are constrained by human resources and computational techniques, rendering them unsuitable for direct application to big data platforms. Consequently, there is an urgent necessity to develop a risk assessment framework tailored specifically for big data environments, capable of quantifying potential risks and losses. In response to this need, we have devised an automated risk assessment theory that assimilates the unique characteristics of big data with traditional quantitative methods, introducing a risk metric system suited to the big data context. Utilizing the risk-related data generated during operations on the big data platform, we train a decision tree model to derive the weights for each risk indicator. These weights are then employed to conduct a weighted summation of the operational risk indicators, thereby achieving a quantitative evaluation of the platform's risk profile. To substantiate the proposed framework, experiments were conducted on a simulated big data platform. The experimental outcomes demonstrate that, compared to existing quantitative risk assessment methodologies, our approach enables an automatic, objective, and efficient assessment and quantification of the risks associated with tangible assets and data processing operations within the big data platform.
大数据的固有特征在于其庞大的规模、多样的数据格式和快速的处理速度。大数据的固有特征削弱了传统数据安全技术和数据管理标准的效力,从而危及大数据的安全。因此,大数据在整个传输、存储和处理阶段都容易发生安全事件,包括未经授权的数据访问、数据篡改和数据泄露。传统的信息系统安全风险评估方法受到人力资源和计算技术的限制,不适合直接应用于大数据平台。因此,迫切需要开发一个专门针对大数据环境的风险评估框架,能够量化潜在的风险和损失。针对这一需求,我们设计了一套自动风险评估理论,将大数据的独特特征与传统量化方法相融合,引入了一套适合大数据环境的风险度量系统。利用大数据平台运行过程中产生的风险相关数据,我们训练了一个决策树模型,以得出每个风险指标的权重。然后利用这些权重对运营风险指标进行加权求和,从而实现对平台风险状况的量化评估。为了证实所提出的框架,我们在一个模拟大数据平台上进行了实验。实验结果表明,与现有的量化风险评估方法相比,我们的方法能够自动、客观、高效地评估和量化大数据平台内有形资产和数据处理操作的相关风险。
{"title":"RiskTree: Decision Trees for Asset and Process Risk Assessment Quantification in Big Data Platforms","authors":"Zhenyang Guo, Haomou Zhan, Jiawei Yang, Jin Cao, Wei You, X. Zhao, Hui Li, Dong Zhang","doi":"10.1051/sands/2024009","DOIUrl":"https://doi.org/10.1051/sands/2024009","url":null,"abstract":"The inherent characteristics of big data lies in its voluminous scale, varied data formats, and swift processing velocity. The intrinsic characteristics of big data undermine the efficacy of conventional data security techniques and data management standards, consequently compromising the security of big data. As a consequence, big data possesses susceptibilities to security incidents, including unauthorized data access, data manipulation, and data compromise throughout the transmission, storage, and processing stages. Conventional information system security risk assessment methodologies are constrained by human resources and computational techniques, rendering them unsuitable for direct application to big data platforms. Consequently, there is an urgent necessity to develop a risk assessment framework tailored specifically for big data environments, capable of quantifying potential risks and losses. In response to this need, we have devised an automated risk assessment theory that assimilates the unique characteristics of big data with traditional quantitative methods, introducing a risk metric system suited to the big data context. Utilizing the risk-related data generated during operations on the big data platform, we train a decision tree model to derive the weights for each risk indicator. These weights are then employed to conduct a weighted summation of the operational risk indicators, thereby achieving a quantitative evaluation of the platform's risk profile. To substantiate the proposed framework, experiments were conducted on a simulated big data platform. The experimental outcomes demonstrate that, compared to existing quantitative risk assessment methodologies, our approach enables an automatic, objective, and efficient assessment and quantification of the risks associated with tangible assets and data processing operations within the big data platform.","PeriodicalId":513337,"journal":{"name":"Security and Safety","volume":"186 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141681648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preface: Security and Privacy for Space-Air-Ground Integrated Networks 前言:天-空-地一体化网络的安全与隐私
Pub Date : 2024-05-07 DOI: 10.1051/sands/2024008
Cheng Huang, Jiangzhou Wang, Yue Gao, Haojin Zhu
{"title":"Preface: Security and Privacy for Space-Air-Ground Integrated Networks","authors":"Cheng Huang, Jiangzhou Wang, Yue Gao, Haojin Zhu","doi":"10.1051/sands/2024008","DOIUrl":"https://doi.org/10.1051/sands/2024008","url":null,"abstract":"","PeriodicalId":513337,"journal":{"name":"Security and Safety","volume":"31 52","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141005321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VAEFL: Integrating Variational Autoencoders for Privacy Preservation and Performance Retention in Federated Learning VAEFL:在联合学习中整合变异自动编码器以保护隐私和保持性能
Pub Date : 2024-04-25 DOI: 10.1051/sands/2024005
Zhixin Li, Yicun Liu, Jiale Li, Guangnan Ye, Hongfeng Chai, Zhihui Lu, Jie Wu
Federated Learning (FL) heralds a paradigm shift in the training of artificial intelligence (AI) models by fostering collaborative model training while safeguarding client data privacy. In sectors where data sensitivity and AI model security are of paramount importance, such as fintech and biomedicine, maintaining the utility of models without compromising privacy is crucial with the growing application of artificial intelligence technologies. Therefore, the adoption of FL is attracting significant attention. However, traditional Federated Learning methods are vulnerable to Deep Leakage from Gradients (DLG) attacks, and typical defensive strategies often result in excessive computational costs or substantial decreases in model accuracy. To navigate these challenges, this research introduces VAEFL, an innovative FL framework that incorporates Variational Autoencoders (VAEs) to bolster privacy protection without undermining the predictive prowess of the models. VAEFL strategically partitions the model into a private encoder and a public decoder. The private encoder, remaining local, transmutes sensitive data into a latent space fortified for privacy, while the public decoder and classifier, through collaborative training across clients, learn to derive precise predictions from the encoded data. This bifurcation ensures that sensitive data attributes are not disclosed, circumventing gradient leakage attacks and simultaneously allowing the global model to benefit from the diverse knowledge of client datasets. Comprehensive experiments demonstrate that VAEFL not only surpasses standard FL benchmarks in privacy preservation but also maintains competitive performance in predictive tasks. VAEFL thus establishes a novel equilibrium between data privacy and model utility, offering a secure and efficient federated learning approach for the sensitive application of FL in the financial domain.
联合学习(FL)通过促进协作式模型训练,同时保护客户数据隐私,预示着人工智能(AI)模型训练模式的转变。在金融科技和生物医学等对数据敏感性和人工智能模型安全性要求极高的领域,随着人工智能技术的应用日益广泛,在不损害隐私的情况下保持模型的实用性至关重要。因此,FL 的采用备受关注。然而,传统的联合学习方法很容易受到来自梯度的深度泄漏(DLG)攻击,而典型的防御策略往往会导致过高的计算成本或模型准确性的大幅下降。为了应对这些挑战,本研究引入了 VAEFL,这是一种创新的集合学习框架,它结合了变异自动编码器(VAE),在不削弱模型预测能力的情况下加强了隐私保护。VAEFL 从战略上将模型分为私人编码器和公共解码器。私人编码器保持本地化,将敏感数据转换到一个加强隐私保护的潜空间,而公共解码器和分类器则通过跨客户端的协作训练,学习从编码数据中得出精确的预测结果。这种分叉可确保敏感数据属性不被泄露,规避梯度泄漏攻击,同时让全局模型从客户数据集的多样化知识中获益。综合实验证明,VAEFL 不仅在隐私保护方面超越了标准 FL 基准,而且在预测任务中也保持了极具竞争力的性能。因此,VAEFL 在数据隐私和模型效用之间建立了一种新的平衡,为金融领域对 FL 的敏感应用提供了一种安全高效的联合学习方法。
{"title":"VAEFL: Integrating Variational Autoencoders for Privacy Preservation and Performance Retention in Federated Learning","authors":"Zhixin Li, Yicun Liu, Jiale Li, Guangnan Ye, Hongfeng Chai, Zhihui Lu, Jie Wu","doi":"10.1051/sands/2024005","DOIUrl":"https://doi.org/10.1051/sands/2024005","url":null,"abstract":"Federated Learning (FL) heralds a paradigm shift in the training of artificial intelligence (AI) models by fostering collaborative model training while safeguarding client data privacy. In sectors where data sensitivity and AI model security are of paramount importance, such as fintech and biomedicine, maintaining the utility of models without compromising privacy is crucial with the growing application of artificial intelligence technologies. Therefore, the adoption of FL is attracting significant attention. However, traditional Federated Learning methods are vulnerable to Deep Leakage from Gradients (DLG) attacks, and typical defensive strategies often result in excessive computational costs or substantial decreases in model accuracy. To navigate these challenges, this research introduces VAEFL, an innovative FL framework that incorporates Variational Autoencoders (VAEs) to bolster privacy protection without undermining the predictive prowess of the models. VAEFL strategically partitions the model into a private encoder and a public decoder. The private encoder, remaining local, transmutes sensitive data into a latent space fortified for privacy, while the public decoder and classifier, through collaborative training across clients, learn to derive precise predictions from the encoded data. This bifurcation ensures that sensitive data attributes are not disclosed, circumventing gradient leakage attacks and simultaneously allowing the global model to benefit from the diverse knowledge of client datasets. Comprehensive experiments demonstrate that VAEFL not only surpasses standard FL benchmarks in privacy preservation but also maintains competitive performance in predictive tasks. VAEFL thus establishes a novel equilibrium between data privacy and model utility, offering a secure and efficient federated learning approach for the sensitive application of FL in the financial domain.","PeriodicalId":513337,"journal":{"name":"Security and Safety","volume":"10 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140658619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving Location Authentication for Low-altitude UAVs: A Blockchain-based Approach 低空无人机的隐私保护定位认证:基于区块链的方法
Pub Date : 2024-03-19 DOI: 10.1051/sands/2024004
Hengchang Pan, Yuanshuo Wang, Wei Wang, Ping Cao, Fangwei Ye, Qihui Wu
Efficient and trusted regulation of unmanned aerial vehicles (UAVs) is an essential but challenging issue in the future era of Internet of Low-altitude Intelligence, due to the difficulties in UAVs' identity recognition and location matching, potential for falsified information reporting, etc. To address this challenging issue, in this paper, we propose a blockchain-based UAV location authentication scheme, which employs a distance bounding protocol to establish a location proof, ensuring the authenticity of UAV positions. To preserve the privacy of UAVs, anonymous certificates and zero-knowledge proof are used. The security of the proposed scheme is analyzed. Experiments demonstrate the efficiency and feasibility of the proposed scheme.
由于无人机的身份识别和位置匹配困难、信息上报可能造假等原因,对无人机(UAV)进行高效可信的监管是未来低空智能互联网时代必不可少但又极具挑战性的问题。针对这一难题,本文提出了一种基于区块链的无人机位置认证方案,该方案采用距离绑定协议建立位置证明,确保无人机位置的真实性。为了保护无人机的隐私,使用了匿名证书和零知识证明。本文分析了所提方案的安全性。实验证明了所提方案的效率和可行性。
{"title":"Privacy-Preserving Location Authentication for Low-altitude UAVs: A Blockchain-based Approach","authors":"Hengchang Pan, Yuanshuo Wang, Wei Wang, Ping Cao, Fangwei Ye, Qihui Wu","doi":"10.1051/sands/2024004","DOIUrl":"https://doi.org/10.1051/sands/2024004","url":null,"abstract":"Efficient and trusted regulation of unmanned aerial vehicles (UAVs) is an essential but challenging issue in the future era of Internet of Low-altitude Intelligence, due to the difficulties in UAVs' identity recognition and location matching, potential for falsified information reporting, etc. To address this challenging issue, in this paper, we propose a blockchain-based UAV location authentication scheme, which employs a distance bounding protocol to establish a location proof, ensuring the authenticity of UAV positions. To preserve the privacy of UAVs, anonymous certificates and zero-knowledge proof are used. The security of the proposed scheme is analyzed. Experiments demonstrate the efficiency and feasibility of the proposed scheme.","PeriodicalId":513337,"journal":{"name":"Security and Safety","volume":"56 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140231075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Object Detection for Autonomous Driving Based on Semi-supervised Learning 基于半监督学习的自主驾驶鲁棒性目标检测
Pub Date : 2024-02-05 DOI: 10.1051/sands/2024002
Huilin Yin, Wenwen Chen, Jun Yan, Weiquan Huang, Wancheng Ge, Huaping Liu
Deep learning based on labeled data has brought massive success in computer vision, speech recognition, and natural language processing. Nevertheless, labeled data is just a drop in the ocean compared with unlabeled data. How can people utilize the unlabeled data effectively? Research has focused on unsupervised and semi-supervised learning to solve such a problem. Some theoretical and empirical studies have proved that unlabeled data can help boost the generalization ability and robustness under adversarial attacks.However, current theoretical research on the relationship between robustness and unlabeled data limits its scope to toy datasets. Meanwhile, the visual models in autonomous driving need a significant improvement in robustness to guarantee security and safety. This paper proposes a semi-supervised learning framework for object detection in autonomous vehicles, improving the robustness with unlabeled data. Firstly, we build a baseline with the transfer learning of an unsupervised contrastive learning method—Momentum Contrast(MoCo). Secondly, we propose a semi-supervised co-training method to label the unlabeled data for retraining, which improves generalization on the autonomous driving dataset. Thirdly, we apply the unsupervised Bounding Box data augmentation (BBAug) method based on a search algorithm, which uses reinforcement learning to improve the robustness of object detection for autonomous driving. We present an empirical study on the KITTI dataset with diverse adversarial attack methods. Our proposed method realizesthe state-of-the-art generalization and robustness under white-box attacks (DPatch and Contextual Patch) and black-box attacks (Gaussian noise, Rain, Fog, and so on). Our proposed method and empirical study show that using more unlabeled data benefits the robustness of perception systems in all-weather autonomous driving. Code is available at: https://github.com/CHENWenwen19/co-training_for_autonomous-driving.
基于标记数据的深度学习在计算机视觉、语音识别和自然语言处理领域取得了巨大成功。然而,与无标签数据相比,有标签数据只是沧海一粟。如何才能有效利用无标记数据呢?为解决这一问题,研究重点放在了无监督和半监督学习上。一些理论和实证研究证明,无标记数据有助于提高泛化能力和对抗攻击时的鲁棒性。然而,目前关于鲁棒性与无标记数据之间关系的理论研究仅限于玩具数据集。同时,自动驾驶中的视觉模型需要显著提高鲁棒性,以保证安全性。本文提出了一种半监督学习框架,用于自动驾驶汽车中的物体检测,提高无标记数据的鲁棒性。首先,我们利用无监督对比学习方法--动量对比(MoCo)的迁移学习建立了一个基线。其次,我们提出了一种半监督联合训练方法,对未标注数据进行标注以进行再训练,从而提高了自动驾驶数据集的泛化能力。第三,我们应用了基于搜索算法的无监督边界盒数据增强(BBAug)方法,该方法使用强化学习来提高自动驾驶物体检测的鲁棒性。我们在 KITTI 数据集上使用多种对抗攻击方法进行了实证研究。我们提出的方法在白盒攻击(DPatch 和 Contextual Patch)和黑盒攻击(高斯噪声、雨、雾等)下实现了最先进的泛化和鲁棒性。我们提出的方法和实证研究表明,在全天候自动驾驶中使用更多无标记数据有利于提高感知系统的鲁棒性。代码见:https://github.com/CHENWenwen19/co-training_for_autonomous-driving。
{"title":"Robust Object Detection for Autonomous Driving Based on Semi-supervised Learning","authors":"Huilin Yin, Wenwen Chen, Jun Yan, Weiquan Huang, Wancheng Ge, Huaping Liu","doi":"10.1051/sands/2024002","DOIUrl":"https://doi.org/10.1051/sands/2024002","url":null,"abstract":"Deep learning based on labeled data has brought massive success in computer vision, speech recognition, and natural language processing. Nevertheless, labeled data is just a drop in the ocean compared with unlabeled data. How can people utilize the unlabeled data effectively? Research has focused on unsupervised and semi-supervised learning to solve such a problem. Some theoretical and empirical studies have proved that unlabeled data can help boost the generalization ability and robustness under adversarial attacks.\u0000However, current theoretical research on the relationship between robustness and unlabeled data limits its scope to toy datasets. Meanwhile, the visual models in autonomous driving need a significant improvement in robustness to guarantee security and safety. This paper proposes a semi-supervised learning framework for object detection in autonomous vehicles, improving the robustness with unlabeled data. Firstly, we build a baseline with the transfer learning of an unsupervised contrastive learning method—Momentum Contrast\u0000(MoCo). Secondly, we propose a semi-supervised co-training method to label the unlabeled data for retraining, which improves generalization on the autonomous driving dataset. Thirdly, we apply the unsupervised Bounding Box data augmentation (BBAug) method based on a search algorithm, which uses reinforcement learning to improve the robustness of object detection for autonomous driving. We present an empirical study on the KITTI dataset with diverse adversarial attack methods. Our proposed method realizes\u0000the state-of-the-art generalization and robustness under white-box attacks (DPatch and Contextual Patch) and black-box attacks (Gaussian noise, Rain, Fog, and so on). Our proposed method and empirical study show that using more unlabeled data benefits the robustness of perception systems in all-weather autonomous driving. Code is available at: https://github.com/CHENWenwen19/co-training_for_autonomous-driving.","PeriodicalId":513337,"journal":{"name":"Security and Safety","volume":"30 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139864975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Object Detection for Autonomous Driving Based on Semi-supervised Learning 基于半监督学习的自主驾驶鲁棒性目标检测
Pub Date : 2024-02-05 DOI: 10.1051/sands/2024002
Huilin Yin, Wenwen Chen, Jun Yan, Weiquan Huang, Wancheng Ge, Huaping Liu
Deep learning based on labeled data has brought massive success in computer vision, speech recognition, and natural language processing. Nevertheless, labeled data is just a drop in the ocean compared with unlabeled data. How can people utilize the unlabeled data effectively? Research has focused on unsupervised and semi-supervised learning to solve such a problem. Some theoretical and empirical studies have proved that unlabeled data can help boost the generalization ability and robustness under adversarial attacks.However, current theoretical research on the relationship between robustness and unlabeled data limits its scope to toy datasets. Meanwhile, the visual models in autonomous driving need a significant improvement in robustness to guarantee security and safety. This paper proposes a semi-supervised learning framework for object detection in autonomous vehicles, improving the robustness with unlabeled data. Firstly, we build a baseline with the transfer learning of an unsupervised contrastive learning method—Momentum Contrast(MoCo). Secondly, we propose a semi-supervised co-training method to label the unlabeled data for retraining, which improves generalization on the autonomous driving dataset. Thirdly, we apply the unsupervised Bounding Box data augmentation (BBAug) method based on a search algorithm, which uses reinforcement learning to improve the robustness of object detection for autonomous driving. We present an empirical study on the KITTI dataset with diverse adversarial attack methods. Our proposed method realizesthe state-of-the-art generalization and robustness under white-box attacks (DPatch and Contextual Patch) and black-box attacks (Gaussian noise, Rain, Fog, and so on). Our proposed method and empirical study show that using more unlabeled data benefits the robustness of perception systems in all-weather autonomous driving. Code is available at: https://github.com/CHENWenwen19/co-training_for_autonomous-driving.
基于标记数据的深度学习在计算机视觉、语音识别和自然语言处理领域取得了巨大成功。然而,与无标签数据相比,有标签数据只是沧海一粟。如何才能有效利用无标记数据呢?为解决这一问题,研究重点放在了无监督和半监督学习上。一些理论和实证研究证明,无标记数据有助于提高泛化能力和对抗攻击时的鲁棒性。然而,目前关于鲁棒性与无标记数据之间关系的理论研究仅限于玩具数据集。同时,自动驾驶中的视觉模型需要显著提高鲁棒性,以保证安全性。本文提出了一种半监督学习框架,用于自动驾驶汽车中的物体检测,提高无标记数据的鲁棒性。首先,我们利用无监督对比学习方法--动量对比(MoCo)的迁移学习建立了一个基线。其次,我们提出了一种半监督联合训练方法,对未标注数据进行标注以进行再训练,从而提高了自动驾驶数据集的泛化能力。第三,我们应用了基于搜索算法的无监督边界盒数据增强(BBAug)方法,该方法使用强化学习来提高自动驾驶物体检测的鲁棒性。我们在 KITTI 数据集上使用多种对抗攻击方法进行了实证研究。我们提出的方法在白盒攻击(DPatch 和 Contextual Patch)和黑盒攻击(高斯噪声、雨、雾等)下实现了最先进的泛化和鲁棒性。我们提出的方法和实证研究表明,在全天候自动驾驶中使用更多无标记数据有利于提高感知系统的鲁棒性。代码见:https://github.com/CHENWenwen19/co-training_for_autonomous-driving。
{"title":"Robust Object Detection for Autonomous Driving Based on Semi-supervised Learning","authors":"Huilin Yin, Wenwen Chen, Jun Yan, Weiquan Huang, Wancheng Ge, Huaping Liu","doi":"10.1051/sands/2024002","DOIUrl":"https://doi.org/10.1051/sands/2024002","url":null,"abstract":"Deep learning based on labeled data has brought massive success in computer vision, speech recognition, and natural language processing. Nevertheless, labeled data is just a drop in the ocean compared with unlabeled data. How can people utilize the unlabeled data effectively? Research has focused on unsupervised and semi-supervised learning to solve such a problem. Some theoretical and empirical studies have proved that unlabeled data can help boost the generalization ability and robustness under adversarial attacks.\u0000However, current theoretical research on the relationship between robustness and unlabeled data limits its scope to toy datasets. Meanwhile, the visual models in autonomous driving need a significant improvement in robustness to guarantee security and safety. This paper proposes a semi-supervised learning framework for object detection in autonomous vehicles, improving the robustness with unlabeled data. Firstly, we build a baseline with the transfer learning of an unsupervised contrastive learning method—Momentum Contrast\u0000(MoCo). Secondly, we propose a semi-supervised co-training method to label the unlabeled data for retraining, which improves generalization on the autonomous driving dataset. Thirdly, we apply the unsupervised Bounding Box data augmentation (BBAug) method based on a search algorithm, which uses reinforcement learning to improve the robustness of object detection for autonomous driving. We present an empirical study on the KITTI dataset with diverse adversarial attack methods. Our proposed method realizes\u0000the state-of-the-art generalization and robustness under white-box attacks (DPatch and Contextual Patch) and black-box attacks (Gaussian noise, Rain, Fog, and so on). Our proposed method and empirical study show that using more unlabeled data benefits the robustness of perception systems in all-weather autonomous driving. Code is available at: https://github.com/CHENWenwen19/co-training_for_autonomous-driving.","PeriodicalId":513337,"journal":{"name":"Security and Safety","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139805107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preface: Security and safety in physical layer systems 前言物理层系统的安全保障
Pub Date : 2024-01-19 DOI: 10.1051/sands/2024001
Aiqun Hu, Liang Jin, Xiangyun Zhou, Feng Shu, Xiangwei Zhou
{"title":"Preface: Security and safety in physical layer systems","authors":"Aiqun Hu, Liang Jin, Xiangyun Zhou, Feng Shu, Xiangwei Zhou","doi":"10.1051/sands/2024001","DOIUrl":"https://doi.org/10.1051/sands/2024001","url":null,"abstract":"","PeriodicalId":513337,"journal":{"name":"Security and Safety","volume":"75 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139612873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Security and Safety
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1