首页 > 最新文献

IEEE transactions on artificial intelligence最新文献

英文 中文
Knowledge Probabilization in Ensemble Distillation: Improving Accuracy and Uncertainty Quantification for Object Detectors 集成蒸馏中的知识概率化:提高目标检测器的精度和不确定度量化
Pub Date : 2024-10-07 DOI: 10.1109/TAI.2024.3474654
Yang Yang;Chao Wang;Lei Gong;Min Wu;Zhenghua Chen;Xiang Li;Xianglan Chen;Xuehai Zhou
Ensemble object detectors have demonstrated remarkable effectiveness in enhancing prediction accuracy and uncertainty quantification. However, their widespread adoption is hindered by significant computational and storage demands, limiting their feasibility in resource-constrained settings. To overcome this, researchers have focused on distilling the knowledge from ensemble object detectors into a single model. In this article, we introduce probabilization based ensemble distillation (ProbED), an innovative ensemble distillation framework that consolidates knowledge from multiple object detectors into a single, resource-efficient model. Unlike traditional ensemble distillation methods that average the outputs of subteachers, ProbED captures comprehensive outcome distributions from all subteachers, providing a more nuanced approach to knowledge transfer. ProbED employs knowledge probabilization to achieve a sophisticated and refined aggregation of teacher knowledge, including feature knowledge, semantic knowledge, and localization knowledge, resulting in dual improvements in prediction accuracy and uncertainty quantification for the student model. In particular, ProED's novel knowledge probabilization-based approach to aggregating teacher knowledge is inspired by our empirical observations, which demonstrate that knowledge probabilization excels in effectively representing uncertainty, improving prediction, and facilitating robust knowledge transfer. Furthermore, we introduce a random smoothing perturbation technique to modify inputs within ProbED, further enhancing the distillation process. Extensive experiments highlight ProbED's ability to significantly enhance the prediction accuracy and uncertainty quantification of various object detectors, demonstrating its superior performance compared to other state-of-the-art techniques.
集成目标检测器在提高预测精度和不确定度量化方面显示出显著的效果。然而,它们的广泛采用受到大量计算和存储需求的阻碍,限制了它们在资源受限环境下的可行性。为了克服这个问题,研究人员专注于将集合物体探测器的知识提炼成一个单一的模型。在本文中,我们介绍了基于概率的集成蒸馏(ProbED),这是一种创新的集成蒸馏框架,它将来自多个对象检测器的知识整合到一个单一的资源高效模型中。与传统的集成蒸馏方法不同,该方法平均了副教师的输出,probe捕获了所有副教师的综合结果分布,为知识转移提供了更细致的方法。ProbED通过知识概率化实现了对教师知识(包括特征知识、语义知识和定位知识)的精细聚合,从而在学生模型的预测精度和不确定性量化方面实现了双重提升。特别是,ProED基于知识概率的新方法聚合教师知识的灵感来自于我们的经验观察,这些观察表明,知识概率在有效地表示不确定性、改进预测和促进稳健的知识转移方面表现出色。此外,我们引入了随机平滑摄动技术来修改探针内的输入,进一步提高了蒸馏过程。大量的实验表明,probe能够显著提高各种目标探测器的预测精度和不确定性量化,与其他最先进的技术相比,显示出其优越的性能。
{"title":"Knowledge Probabilization in Ensemble Distillation: Improving Accuracy and Uncertainty Quantification for Object Detectors","authors":"Yang Yang;Chao Wang;Lei Gong;Min Wu;Zhenghua Chen;Xiang Li;Xianglan Chen;Xuehai Zhou","doi":"10.1109/TAI.2024.3474654","DOIUrl":"https://doi.org/10.1109/TAI.2024.3474654","url":null,"abstract":"Ensemble object detectors have demonstrated remarkable effectiveness in enhancing prediction accuracy and uncertainty quantification. However, their widespread adoption is hindered by significant computational and storage demands, limiting their feasibility in resource-constrained settings. To overcome this, researchers have focused on distilling the knowledge from ensemble object detectors into a single model. In this article, we introduce probabilization based ensemble distillation (ProbED), an innovative ensemble distillation framework that consolidates knowledge from multiple object detectors into a single, resource-efficient model. Unlike traditional ensemble distillation methods that average the outputs of subteachers, ProbED captures comprehensive outcome distributions from all subteachers, providing a more nuanced approach to knowledge transfer. ProbED employs knowledge probabilization to achieve a sophisticated and refined aggregation of teacher knowledge, including feature knowledge, semantic knowledge, and localization knowledge, resulting in dual improvements in prediction accuracy and uncertainty quantification for the student model. In particular, ProED's novel knowledge probabilization-based approach to aggregating teacher knowledge is inspired by our empirical observations, which demonstrate that knowledge probabilization excels in effectively representing uncertainty, improving prediction, and facilitating robust knowledge transfer. Furthermore, we introduce a random smoothing perturbation technique to modify inputs within ProbED, further enhancing the distillation process. Extensive experiments highlight ProbED's ability to significantly enhance the prediction accuracy and uncertainty quantification of various object detectors, demonstrating its superior performance compared to other state-of-the-art techniques.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"6 1","pages":"221-233"},"PeriodicalIF":0.0,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142975973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Under the Influence: A Survey of Large Language Models in Fake News Detection
Pub Date : 2024-10-02 DOI: 10.1109/TAI.2024.3471735
Soveatin Kuntur;Anna Wróblewska;Marcin Paprzycki;Maria Ganzha
Research into fake news detection has a long history, although it gained significant attention following the 2016 U.S. election. During this time, the widespread use of social media and the resulting increase in interpersonal communication led to the extensive spread of ambiguous and potentially misleading news. Traditional approaches, relying solely on pre-large language model (LLM) techniques and addressing the issue as a simple classification problem, have shown to be insufficient for improving detection accuracy. In this context, LLMs have become crucial, as their advanced architectures overcome the limitations of pre-LLM methods, which often fail to capture the subtleties of fake news. This literature review aims to shed light on the field of fake news detection by providing a brief historical overview, defining fake news, reviewing detection methods used before the advent of LLMs, and discussing the strengths and weaknesses of these models in an increasingly complex landscape. Furthermore, it will emphasize the importance of using multimodal datasets in the effort to detect fake news.
{"title":"Under the Influence: A Survey of Large Language Models in Fake News Detection","authors":"Soveatin Kuntur;Anna Wróblewska;Marcin Paprzycki;Maria Ganzha","doi":"10.1109/TAI.2024.3471735","DOIUrl":"https://doi.org/10.1109/TAI.2024.3471735","url":null,"abstract":"Research into fake news detection has a long history, although it gained significant attention following the 2016 U.S. election. During this time, the widespread use of social media and the resulting increase in interpersonal communication led to the extensive spread of ambiguous and potentially misleading news. Traditional approaches, relying solely on pre-large language model (LLM) techniques and addressing the issue as a simple classification problem, have shown to be insufficient for improving detection accuracy. In this context, LLMs have become crucial, as their advanced architectures overcome the limitations of pre-LLM methods, which often fail to capture the subtleties of fake news. This literature review aims to shed light on the field of fake news detection by providing a brief historical overview, defining fake news, reviewing detection methods used before the advent of LLMs, and discussing the strengths and weaknesses of these models in an increasingly complex landscape. Furthermore, it will emphasize the importance of using multimodal datasets in the effort to detect fake news.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"6 2","pages":"458-476"},"PeriodicalIF":0.0,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143535459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolution of Web API Cooperation Network via Exploring Community Structure and Popularity 基于社区结构和流行度的Web API合作网络演进
Pub Date : 2024-10-02 DOI: 10.1109/TAI.2024.3472614
Guosheng Kang;Yang Wang;Jianxun Liu;Buqing Cao;Yong Xiao;Yu Xu
With the growing popularity of the Internet, Web applications have become increasingly essential in our daily lives. Web application programming interfaces (Web APIs) play a crucial role in facilitating interaction between applications. However, most Web service platforms are suffering from the imbalance of Web services now, many services of good quality but low popularity are difficult to be invoked even once and do not create direct connections with the users. Some graph-based Web service recommendation methods also often present a long-tailed distribution of recommended Web services due to limited Mashup–API invocation relationships. To relieve this problem and promote service recommendation, in this article, we propose a community structure and popularity-based approach by constructing an evolving cooperation network for Web APIs. We leverage the Louvain algorithm in community detection to assign community structure to each Web API and consider both the popularity and community structure in constructing the network. By optimizing the Barabάsi–Albert (BA) evolving network model, we demonstrate that our approach outperforms the BA, Bianconi–Barabάsi (BB), and popularity-similarity optimization (PSO) models in Web service clustering. Based on our proposed evolutionary network model for the evolutionary extension of API cooperation network and used for downstream Web service recommendation tasks, the experimental results also show that our recommended approach outperforms some other baseline models for Web service recommendation.
随着Internet的日益普及,Web应用程序在我们的日常生活中变得越来越重要。Web应用程序编程接口(Web api)在促进应用程序之间的交互方面起着至关重要的作用。然而,目前大多数Web服务平台都存在着Web服务不均衡的问题,许多质量好的但知名度不高的服务甚至很难被调用一次,也无法与用户建立直接连接。由于Mashup-API调用关系有限,一些基于图的Web服务推荐方法也经常呈现推荐的Web服务的长尾分布。为了缓解这一问题并促进服务推荐,本文通过构建Web api的演进合作网络,提出了一种基于社区结构和流行度的方法。我们利用社区检测中的Louvain算法为每个Web API分配社区结构,并在构建网络时考虑流行度和社区结构。通过优化barab si - albert (BA)进化网络模型,我们证明了我们的方法在Web服务聚类中优于BA、bianconi - barab si (BB)和流行度相似度优化(PSO)模型。基于我们提出的API协作网络进化扩展的进化网络模型,并将其用于下游Web服务推荐任务,实验结果还表明,我们的推荐方法优于其他一些Web服务推荐基线模型。
{"title":"Evolution of Web API Cooperation Network via Exploring Community Structure and Popularity","authors":"Guosheng Kang;Yang Wang;Jianxun Liu;Buqing Cao;Yong Xiao;Yu Xu","doi":"10.1109/TAI.2024.3472614","DOIUrl":"https://doi.org/10.1109/TAI.2024.3472614","url":null,"abstract":"With the growing popularity of the Internet, Web applications have become increasingly essential in our daily lives. Web application programming interfaces (Web APIs) play a crucial role in facilitating interaction between applications. However, most Web service platforms are suffering from the imbalance of Web services now, many services of good quality but low popularity are difficult to be invoked even once and do not create direct connections with the users. Some graph-based Web service recommendation methods also often present a long-tailed distribution of recommended Web services due to limited Mashup–API invocation relationships. To relieve this problem and promote service recommendation, in this article, we propose a community structure and popularity-based approach by constructing an evolving cooperation network for Web APIs. We leverage the Louvain algorithm in community detection to assign community structure to each Web API and consider both the popularity and community structure in constructing the network. By optimizing the Barabάsi–Albert (BA) evolving network model, we demonstrate that our approach outperforms the BA, Bianconi–Barabάsi (BB), and popularity-similarity optimization (PSO) models in Web service clustering. Based on our proposed evolutionary network model for the evolutionary extension of API cooperation network and used for downstream Web service recommendation tasks, the experimental results also show that our recommended approach outperforms some other baseline models for Web service recommendation.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 12","pages":"6659-6671"},"PeriodicalIF":0.0,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Control of Stochastic Markovian Jump Systems With Wiener and Poisson Noises: Two Reinforcement Learning Approaches 具有维纳和泊松噪声的随机马尔可夫跳跃系统的最优控制:两种强化学习方法
Pub Date : 2024-10-02 DOI: 10.1109/TAI.2024.3471729
Zhiguo Yan;Tingkun Sun;Guolin Hu
This article investigates the infinite horizon optimal control problem for stochastic Markovian jump systems with Wiener and Poisson noises. First, a new policy iteration algorithm is designed by using integral reinforcement learning approach and subsystems transformation technique, which obtains the optimal solution without solving stochastic coupled algebraic Riccati equation (SCARE) directly. Second, through the transformation and substitution of the SCARE and feedback gain matrix, a policy iteration algorithm is devised to determine the optimal control strategy. This algorithm leverages only state trajectory information to obtain the optimal solution, and is updated in an unfixed form. Additionally, the algorithm remains unaffected by variations in Poisson jump intensity. Finally, an numerical example is given to verify the effectiveness and convergence of the proposed algorithms.
研究了具有维纳噪声和泊松噪声的随机马尔可夫跳跃系统的无限视界最优控制问题。首先,利用积分强化学习方法和子系统转换技术设计了一种新的策略迭代算法,该算法无需直接求解随机耦合代数Riccati方程(SCARE),即可得到最优解;其次,通过对SCARE和反馈增益矩阵的变换和替换,设计了策略迭代算法来确定最优控制策略。该算法仅利用状态轨迹信息获取最优解,并以不固定的形式更新。此外,该算法不受泊松跳强度变化的影响。最后通过一个算例验证了所提算法的有效性和收敛性。
{"title":"Optimal Control of Stochastic Markovian Jump Systems With Wiener and Poisson Noises: Two Reinforcement Learning Approaches","authors":"Zhiguo Yan;Tingkun Sun;Guolin Hu","doi":"10.1109/TAI.2024.3471729","DOIUrl":"https://doi.org/10.1109/TAI.2024.3471729","url":null,"abstract":"This article investigates the infinite horizon optimal control problem for stochastic Markovian jump systems with Wiener and Poisson noises. First, a new policy iteration algorithm is designed by using integral reinforcement learning approach and subsystems transformation technique, which obtains the optimal solution without solving stochastic coupled algebraic Riccati equation (SCARE) directly. Second, through the transformation and substitution of the SCARE and feedback gain matrix, a policy iteration algorithm is devised to determine the optimal control strategy. This algorithm leverages only state trajectory information to obtain the optimal solution, and is updated in an unfixed form. Additionally, the algorithm remains unaffected by variations in Poisson jump intensity. Finally, an numerical example is given to verify the effectiveness and convergence of the proposed algorithms.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 12","pages":"6591-6600"},"PeriodicalIF":0.0,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Get Rid of Your Trail: Remotely Erasing Backdoors in Federated Learning 消除你的痕迹:远程清除联合学习中的后门
Pub Date : 2024-09-23 DOI: 10.1109/TAI.2024.3465441
Manaar Alam;Hithem Lamri;Michail Maniatakos
Federated learning (FL) enables collaborative learning across multiple participants without exposing sensitive personal data. However, the distributed nature of FL and unvetted participants’ data makes it vulnerable to backdoor attacks. In these attacks, adversaries selectively inject malicious functionality into the centralized model during training, leading to intentional misclassifications for specific adversary-chosen inputs. While previous research has demonstrated successful injections of persistent backdoors in FL, the persistence also poses a challenge, as their existence in the centralized model can prompt the central aggregation server to take preventive measures for penalizing the adversaries. Therefore, this article proposes a method that enables adversaries to effectively remove backdoors from the centralized model upon achieving their objectives or upon suspicion of possible detection. The proposed approach extends the concept of machine unlearning and presents strategies to preserve the performance of the centralized model and simultaneously prevent over-unlearning of information unrelated to backdoor patterns, making adversaries stealthy while removing backdoors. To the best of our knowledge, this is the first work exploring machine unlearning in FL to remove backdoors to the benefit of adversaries. Exhaustive evaluation considering various image classification scenarios demonstrates the efficacy of the proposed method for efficient backdoor removal from the centralized model, injected by state-of-the-art attacks across multiple configurations.
联合学习(FL)可实现多人协作学习,而不会暴露敏感的个人数据。然而,FL 的分布式性质和未经审查的参与者数据使其容易受到后门攻击。在这些攻击中,敌方会在训练过程中选择性地向集中模型注入恶意功能,从而导致对敌方选择的特定输入进行有意的错误分类。虽然之前的研究已经证明在 FL 中成功注入了持久性后门,但这种持久性也带来了挑战,因为它们在集中模型中的存在会促使中央聚合服务器采取预防措施来惩罚对手。因此,本文提出了一种方法,使对手能够在达到目的或怀疑可能被检测到时,有效地从集中模型中删除后门。所提出的方法扩展了机器未学习的概念,并提出了一些策略,以保持集中模型的性能,同时防止过度未学习与后门模式无关的信息,从而使对手在删除后门的同时保持隐秘。据我们所知,这是第一项在 FL 中探索机器非学习以清除后门从而使对手获益的研究。对各种图像分类场景进行的详尽评估表明,所提出的方法能有效地从集中模型中清除后门,并能在多种配置中使用最先进的攻击手段。
{"title":"Get Rid of Your Trail: Remotely Erasing Backdoors in Federated Learning","authors":"Manaar Alam;Hithem Lamri;Michail Maniatakos","doi":"10.1109/TAI.2024.3465441","DOIUrl":"https://doi.org/10.1109/TAI.2024.3465441","url":null,"abstract":"Federated learning (FL) enables collaborative learning across multiple participants without exposing sensitive personal data. However, the distributed nature of FL and unvetted participants’ data makes it vulnerable to \u0000<italic>backdoor attacks</i>\u0000. In these attacks, adversaries selectively inject malicious functionality into the centralized model during training, leading to intentional misclassifications for specific adversary-chosen inputs. While previous research has demonstrated successful injections of persistent backdoors in FL, the persistence also poses a challenge, as their existence in the centralized model can prompt the central aggregation server to take preventive measures for penalizing the adversaries. Therefore, this article proposes a method \u0000<italic>that enables adversaries to effectively remove backdoors from the centralized model</i>\u0000 upon achieving their objectives or upon suspicion of possible detection. The proposed approach extends the concept of \u0000<italic>machine unlearning</i>\u0000 and presents strategies to preserve the performance of the centralized model and simultaneously prevent over-unlearning of information unrelated to backdoor patterns, making adversaries stealthy while removing backdoors. To the best of our knowledge, this is the first work exploring machine unlearning in FL to remove backdoors to the benefit of adversaries. Exhaustive evaluation considering various image classification scenarios demonstrates the efficacy of the proposed method for efficient backdoor removal from the centralized model, injected by state-of-the-art attacks across multiple configurations.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 12","pages":"6683-6698"},"PeriodicalIF":0.0,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RATs-NAS: Redirection of Adjacent Trails on Graph Convolutional Networks for Predictor-Based Neural Architecture Search 基于预测器的神经结构搜索中图卷积网络相邻轨迹的重定向
Pub Date : 2024-09-23 DOI: 10.1109/TAI.2024.3465433
Yu-Ming Zhang;Jun-Wei Hsieh;Chun-Chieh Lee;Kuo-Chin Fan
Manually designed convolutional neural networks (CNNs) architectures such as visual geometry group network (VGG), ResNet, DenseNet, and MobileNet have achieved high performance across various tasks, but design them is time-consuming and costly. Neural architecture search (NAS) automates the discovery of effective CNN architectures, reducing the need for experts. However, evaluating candidate architectures requires significant graphics processing unit (GPU) resources, leading to the use of predictor-based NAS, such as graph convolutional networks (GCN), which is the popular option to construct predictors. However, we discover that, even though the ability of GCN mimics the propagation of features of real architectures, the binary nature of the adjacency matrix limits its effectiveness. To address this, we propose redirection of adjacent trails (RATs), which adaptively learns trail weights within the adjacency matrix. Our RATs-GCN outperform other predictors by dynamically adjusting trail weights after each graph convolution layer. Additionally, the proposed divide search sampling (DSS) strategy, based on the observation of cell-based NAS that architectures with similar floating point operations (FLOPs) perform similarly, enhances search efficiency. Our RATs-NAS, which combine RATs-GCN and DSS, shows significant improvements over other predictor-based NAS methods on NASBench-101, NASBench-201, and NASBench-301.
人工设计的卷积神经网络(cnn)架构,如视觉几何组网络(VGG)、ResNet、DenseNet和MobileNet,已经在各种任务中实现了高性能,但设计它们耗时且成本高。神经结构搜索(NAS)自动发现有效的CNN结构,减少了对专家的需求。然而,评估候选体系结构需要大量的图形处理单元(GPU)资源,导致使用基于预测器的NAS,例如图卷积网络(GCN),这是构建预测器的流行选择。然而,我们发现,尽管GCN的能力模仿了真实架构的特征传播,但邻接矩阵的二进制性质限制了它的有效性。为了解决这个问题,我们提出了邻接轨迹重定向(rat),它自适应地学习邻接矩阵内的轨迹权重。我们的RATs-GCN通过在每个图卷积层后动态调整轨迹权重来优于其他预测器。此外,基于对具有类似浮点运算(flop)的架构的基于cell的NAS的观察,提出的分割搜索抽样(DSS)策略提高了搜索效率。我们的RATs-NAS结合了RATs-GCN和DSS,在NASBench-101、NASBench-201和NASBench-301上比其他基于预测因子的NAS方法有了显著的改进。
{"title":"RATs-NAS: Redirection of Adjacent Trails on Graph Convolutional Networks for Predictor-Based Neural Architecture Search","authors":"Yu-Ming Zhang;Jun-Wei Hsieh;Chun-Chieh Lee;Kuo-Chin Fan","doi":"10.1109/TAI.2024.3465433","DOIUrl":"https://doi.org/10.1109/TAI.2024.3465433","url":null,"abstract":"Manually designed convolutional neural networks (CNNs) architectures such as visual geometry group network (VGG), ResNet, DenseNet, and MobileNet have achieved high performance across various tasks, but design them is time-consuming and costly. Neural architecture search (NAS) automates the discovery of effective CNN architectures, reducing the need for experts. However, evaluating candidate architectures requires significant graphics processing unit (GPU) resources, leading to the use of predictor-based NAS, such as graph convolutional networks (GCN), which is the popular option to construct predictors. However, we discover that, even though the ability of GCN mimics the propagation of features of real architectures, the binary nature of the adjacency matrix limits its effectiveness. To address this, we propose redirection of adjacent trails (RATs), which adaptively learns trail weights within the adjacency matrix. Our RATs-GCN outperform other predictors by dynamically adjusting trail weights after each graph convolution layer. Additionally, the proposed divide search sampling (DSS) strategy, based on the observation of cell-based NAS that architectures with similar floating point operations (FLOPs) perform similarly, enhances search efficiency. Our RATs-NAS, which combine RATs-GCN and DSS, shows significant improvements over other predictor-based NAS methods on NASBench-101, NASBench-201, and NASBench-301.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 12","pages":"6672-6682"},"PeriodicalIF":0.0,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatio-temporal Graph-Based Generation and Detection of Adversarial False Data Injection Evasion Attacks in Smart Grids 基于时空图的智能电网虚假数据注入规避攻击生成与检测
Pub Date : 2024-09-20 DOI: 10.1109/TAI.2024.3464511
Abdulrahman Takiddin;Muhammad Ismail;Rachad Atat;Erchin Serpedin
Smart power grids are vulnerable to security threats due to their cyber-physical nature. Existing data-driven detectors aim to address simple traditional false data injection attacks (FDIAs). However, adversarial false data injection evasion attacks (FDIEAs) present a more serious threat as adversaries, with different levels of knowledge about the system, inject adversarial samples to circumvent the grid's attack detection system. The robustness of state-of-the-art graph-based detectors has not been investigated against sophisticated FDIEAs. Hence, this article answers three research questions. 1) What is the impact of utilizing spatio-temporal features to craft adversarial samples and how to select attack nodes? 2) How can adversaries generate surrogate spatio-temporal data when they lack knowledge about the system topology? 3) What are the required model characteristics for a robust detection against adversarial FDIEAs? To answer the questions, we examine the robustness of several detectors against five attack cases and conclude the following: 1) Attack generation with full knowledge using spatio-temporal features leads to 5%–26% and 2%–5% higher degradation in detection rate (DR) compared to traditional FDIAs and using temporal features, respectively, whereas centrality analysis-based attack node selection leads to 3%–11% higher degradation in DR compared to a random selection; 2) Stochastic geometry-based graph generation to create surrogate adversarial topologies and samples leads to 3%–13% higher degradation in DR compared to traditional FDIAs; and 3) Adopting an unsupervised spatio-temporal graph autoencoder (STGAE)-based detector enhances the DR by 5$-$53% compared to benchmark detectors against FDIEAs.
智能电网由于其网络物理特性,容易受到安全威胁。现有的数据驱动检测器旨在解决简单的传统假数据注入攻击(FDIAs)。然而,对抗性虚假数据注入逃避攻击(FDIEAs)带来了更严重的威胁,因为攻击者对系统的了解程度不同,可以注入对抗性样本来绕过网格的攻击检测系统。最先进的基于图形的检测器的鲁棒性尚未针对复杂的fdea进行研究。因此,本文回答了三个研究问题。1)利用时空特征制作对抗性样本的影响是什么,如何选择攻击节点?2)攻击者在缺乏系统拓扑知识的情况下如何生成代理时空数据?3)对对抗性FDIEAs进行鲁棒检测所需的模型特征是什么?为了回答这些问题,我们检查了几种检测器对五种攻击案例的鲁棒性,并得出以下结论:1)与传统的fdia和使用时间特征相比,使用充分知识的攻击生成使用时空特征分别导致检测率(DR)下降5%-26%和2%-5%,而基于中心性分析的攻击节点选择与随机选择相比导致DR下降3%-11%;2)基于随机几何的图形生成,以创建替代对抗拓扑和样本,与传统的fdia相比,DR的退化率提高了3%-13%;3)采用基于无监督时空图自编码器(STGAE)的检测器,与FDIEAs的基准检测器相比,DR提高了5 ~ 53%。
{"title":"Spatio-temporal Graph-Based Generation and Detection of Adversarial False Data Injection Evasion Attacks in Smart Grids","authors":"Abdulrahman Takiddin;Muhammad Ismail;Rachad Atat;Erchin Serpedin","doi":"10.1109/TAI.2024.3464511","DOIUrl":"https://doi.org/10.1109/TAI.2024.3464511","url":null,"abstract":"Smart power grids are vulnerable to security threats due to their cyber-physical nature. Existing data-driven detectors aim to address simple traditional false data injection attacks (FDIAs). However, adversarial false data injection evasion attacks (FDIEAs) present a more serious threat as adversaries, with different levels of knowledge about the system, inject adversarial samples to circumvent the grid's attack detection system. The robustness of state-of-the-art graph-based detectors has not been investigated against sophisticated FDIEAs. Hence, this article answers three research questions. 1) What is the impact of utilizing spatio-temporal features to craft adversarial samples and how to select attack nodes? 2) How can adversaries generate surrogate spatio-temporal data when they lack knowledge about the system topology? 3) What are the required model characteristics for a robust detection against adversarial FDIEAs? To answer the questions, we examine the robustness of several detectors against five attack cases and conclude the following: 1) Attack generation with full knowledge using spatio-temporal features leads to 5%–26% and 2%–5% higher degradation in detection rate (DR) compared to traditional FDIAs and using temporal features, respectively, whereas centrality analysis-based attack node selection leads to 3%–11% higher degradation in DR compared to a random selection; 2) Stochastic geometry-based graph generation to create surrogate adversarial topologies and samples leads to 3%–13% higher degradation in DR compared to traditional FDIAs; and 3) Adopting an unsupervised spatio-temporal graph autoencoder (STGAE)-based detector enhances the DR by 5\u0000<inline-formula><tex-math>$-$</tex-math></inline-formula>\u000053% compared to benchmark detectors against FDIEAs.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 12","pages":"6601-6616"},"PeriodicalIF":0.0,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NPE-DRL: Enhancing Perception Constrained Obstacle Avoidance With Nonexpert Policy Guided Reinforcement Learning NPE-DRL:用非专家策略引导的强化学习增强感知约束的避障
Pub Date : 2024-09-20 DOI: 10.1109/TAI.2024.3464510
Yuhang Zhang;Chao Yan;Jiaping Xiao;Mir Feroskhan
Obstacle avoidance under constrained visual perception presents a significant challenge, requiring rapid detection and decision-making within partially observable environments, particularly for unmanned aerial vehicles (UAVs) maneuvering agilely in 3-D space. Compared with traditional methods, obstacle avoidance algorithms based on deep reinforcement learning (DRL) offer a better comprehension of the uncertain operational environment in an end-to-end manner, reducing computational complexity, and enhancing flexibility and scalability. However, the inherent trial-and-error learning mechanism of DRL necessitates numerous iterations for policy convergence, leading to sample inefficiency issues. Meanwhile, existing sample-efficient obstacle avoidance approaches that leverage imitation learning often heavily rely on offline expert demonstrations, which are not always feasible in hazardous environments. To address these challenges, we propose a novel obstacle avoidance approach based on nonexpert policy enhanced DRL (NPE-DRL). This approach integrates a fundamental DRL framework with prior knowledge derived from a nonexpert policy-guided imitation learning. During the training phase, the agent starts by online imitating the actions generated by the nonexpert policy during interactions and progressively shifts toward autonomously exploring the environment to generate the optimal policy. Both simulation and physical experiments validate that our approach improves sample efficiency and achieves a better exploration–exploitation balance in both virtual and real-world flights. Additionally, our NPE-DRL-based obstacle avoidance approach shows better adaptability in complex environments characterized by larger scales and denser obstacle configurations, demonstrating a significant improvement in UAVs’ obstacle avoidance capability. Code available at https://github.com/zzzzzyh111/NonExpert-Guided-Visual-UAV-Navigation-Gazebo.
在受限视觉感知条件下避障是一项重大挑战,需要在部分可观测环境中快速检测和决策,特别是对于在三维空间中灵活机动的无人机。与传统避障方法相比,基于深度强化学习(DRL)的避障算法能够端到端更好地理解不确定的运行环境,降低了计算复杂度,增强了灵活性和可扩展性。然而,DRL固有的试错学习机制需要大量的迭代来进行策略收敛,从而导致样本效率低下的问题。同时,现有的利用模仿学习的样本高效避障方法通常严重依赖于离线专家演示,这在危险环境中并不总是可行的。为了解决这些问题,我们提出了一种基于非专家策略增强DRL (NPE-DRL)的避障方法。该方法将基本DRL框架与源自非专家策略引导模仿学习的先验知识集成在一起。在训练阶段,智能体从在线模仿非专家策略在交互过程中产生的动作开始,逐步转向自主探索环境以产生最优策略。仿真和物理实验都验证了我们的方法提高了样本效率,并在虚拟和现实世界的飞行中实现了更好的勘探-开采平衡。此外,基于npe - drl的避障方法在更大尺度和更密集障碍物配置的复杂环境中表现出更好的适应性,显著提高了无人机的避障能力。代码可从https://github.com/zzzzzyh111/NonExpert-Guided-Visual-UAV-Navigation-Gazebo获得。
{"title":"NPE-DRL: Enhancing Perception Constrained Obstacle Avoidance With Nonexpert Policy Guided Reinforcement Learning","authors":"Yuhang Zhang;Chao Yan;Jiaping Xiao;Mir Feroskhan","doi":"10.1109/TAI.2024.3464510","DOIUrl":"https://doi.org/10.1109/TAI.2024.3464510","url":null,"abstract":"Obstacle avoidance under constrained visual perception presents a significant challenge, requiring rapid detection and decision-making within partially observable environments, particularly for unmanned aerial vehicles (UAVs) maneuvering agilely in 3-D space. Compared with traditional methods, obstacle avoidance algorithms based on deep reinforcement learning (DRL) offer a better comprehension of the uncertain operational environment in an end-to-end manner, reducing computational complexity, and enhancing flexibility and scalability. However, the inherent trial-and-error learning mechanism of DRL necessitates numerous iterations for policy convergence, leading to sample inefficiency issues. Meanwhile, existing sample-efficient obstacle avoidance approaches that leverage imitation learning often heavily rely on offline expert demonstrations, which are not always feasible in hazardous environments. To address these challenges, we propose a novel obstacle avoidance approach based on nonexpert policy enhanced DRL (NPE-DRL). This approach integrates a fundamental DRL framework with prior knowledge derived from a nonexpert policy-guided imitation learning. During the training phase, the agent starts by online imitating the actions generated by the nonexpert policy during interactions and progressively shifts toward autonomously exploring the environment to generate the optimal policy. Both simulation and physical experiments validate that our approach improves sample efficiency and achieves a better exploration–exploitation balance in both virtual and real-world flights. Additionally, our NPE-DRL-based obstacle avoidance approach shows better adaptability in complex environments characterized by larger scales and denser obstacle configurations, demonstrating a significant improvement in UAVs’ obstacle avoidance capability. Code available at <uri>https://github.com/zzzzzyh111/NonExpert-Guided-Visual-UAV-Navigation-Gazebo</uri>.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"6 1","pages":"184-198"},"PeriodicalIF":0.0,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142976089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement Learning for Solving Colored Traveling Salesman Problems: An Entropy-Insensitive Attention Approach 解决彩色旅行推销员问题的强化学习:对熵不敏感的注意力方法
Pub Date : 2024-09-19 DOI: 10.1109/TAI.2024.3461630
Tianyu Zhu;Xinli Shi;Xiangping Xu;Jinde Cao
The utilization of neural network models for solving combinatorial optimization problems (COPs) has gained significant attention in recent years and has demonstrated encouraging outcomes in addressing analogous problems such as the traveling salesman problem (TSP). The multiple TSP (MTSP) has sparked the interest of researchers as a special kind of COPs. The colored TSP (CTSP) is a variation of the MTSP, which utilizes colors to distinguish the accessibility of cities to salesmen. This article proposes a gated entropy-insensitive attention model (GEIAM) to solve CTSP. In specific, the original problem is first modeled as a sequence and preprocessed by the problem feature extraction network of the model, and then solved by the autoregressive solution constructor subsequently. The policy (parameters of the neural network model) is trained via reinforcement learning (RL). The proposed approach is compared with several commercial solvers as well as heuristics and demonstrates superior solving speed with comparable solution quality.
近年来,利用神经网络模型求解组合优化问题(cop)得到了广泛的关注,并在解决旅行商问题(TSP)等类似问题方面取得了令人鼓舞的成果。多重TSP (MTSP)作为一种特殊类型的cop引起了研究人员的兴趣。彩色TSP (CTSP)是MTSP的变体,它利用颜色来区分城市对销售人员的可达性。本文提出了一种门控熵不敏感注意力模型(GEIAM)来解决CTSP问题。具体而言,首先将原始问题建模为序列,通过模型的问题特征提取网络进行预处理,然后使用自回归解构造器进行求解。策略(神经网络模型的参数)通过强化学习(RL)进行训练。将该方法与几种商业求解器以及启发式算法进行了比较,结果表明该方法具有较高的求解速度和相当的解质量。
{"title":"Reinforcement Learning for Solving Colored Traveling Salesman Problems: An Entropy-Insensitive Attention Approach","authors":"Tianyu Zhu;Xinli Shi;Xiangping Xu;Jinde Cao","doi":"10.1109/TAI.2024.3461630","DOIUrl":"https://doi.org/10.1109/TAI.2024.3461630","url":null,"abstract":"The utilization of neural network models for solving combinatorial optimization problems (COPs) has gained significant attention in recent years and has demonstrated encouraging outcomes in addressing analogous problems such as the traveling salesman problem (TSP). The multiple TSP (MTSP) has sparked the interest of researchers as a special kind of COPs. The colored TSP (CTSP) is a variation of the MTSP, which utilizes colors to distinguish the accessibility of cities to salesmen. This article proposes a gated entropy-insensitive attention model (GEIAM) to solve CTSP. In specific, the original problem is first modeled as a sequence and preprocessed by the problem feature extraction network of the model, and then solved by the autoregressive solution constructor subsequently. The policy (parameters of the neural network model) is trained via reinforcement learning (RL). The proposed approach is compared with several commercial solvers as well as heuristics and demonstrates superior solving speed with comparable solution quality.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 12","pages":"6699-6708"},"PeriodicalIF":0.0,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Model-Free Learning Versus Learning With External Rewards in Information Constrained Environments 信息受限环境下的无自我模型学习与外部奖励学习
Pub Date : 2024-09-18 DOI: 10.1109/TAI.2024.3433614
Prachi Pratyusha Sahoo;Kyriakos G. Vamvoudakis
In this article, we provide a model-free reinforcement learning (RL) framework that relies on internal reinforcement signals, called self-model-free RL, for learning agents that experience loss of the reinforcement signals in the form of packet drops and/or jamming attacks by malicious agents. The framework embeds a correcting mechanism in the form of a goal network to compensate for information loss and produce optimal and stabilizing policies. It also provides a trade-off scheme that reconstructs the reward using a goal network whenever the reinforcement signals are lost but utilizes true reinforcement signals when they are available. The stability of the equilibrium point is guaranteed despite fractional information loss in the reinforcement signals. Finally, simulation results validate the efficacy of the proposed work.
在本文中,我们提供了一个无模型强化学习(RL)框架,该框架依赖于内部强化信号,称为自无模型强化学习(self-model-free RL),用于学习代理,这些代理会以丢包和/或恶意代理的干扰攻击的形式丢失强化信号。该框架以目标网络的形式嵌入了一种纠正机制,以补偿信息损失并产生最优和稳定的策略。它还提供了一种权衡方案,当强化信号丢失时,使用目标网络重建奖励,而当真正的强化信号可用时,使用真正的强化信号。尽管强化信号中存在部分信息损失,但仍能保证平衡点的稳定性。最后,仿真结果验证了所提工作的有效性。
{"title":"Self-Model-Free Learning Versus Learning With External Rewards in Information Constrained Environments","authors":"Prachi Pratyusha Sahoo;Kyriakos G. Vamvoudakis","doi":"10.1109/TAI.2024.3433614","DOIUrl":"https://doi.org/10.1109/TAI.2024.3433614","url":null,"abstract":"In this article, we provide a model-free reinforcement learning (RL) framework that relies on internal reinforcement signals, called self-model-free RL, for learning agents that experience loss of the reinforcement signals in the form of packet drops and/or jamming attacks by malicious agents. The framework embeds a correcting mechanism in the form of a goal network to compensate for information loss and produce optimal and stabilizing policies. It also provides a trade-off scheme that reconstructs the reward using a goal network whenever the reinforcement signals are lost but utilizes true reinforcement signals when they are available. The stability of the equilibrium point is guaranteed despite fractional information loss in the reinforcement signals. Finally, simulation results validate the efficacy of the proposed work.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 12","pages":"6566-6579"},"PeriodicalIF":0.0,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE transactions on artificial intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1