首页 > 最新文献

IEEE transactions on artificial intelligence最新文献

英文 中文
Get Rid of Your Trail: Remotely Erasing Backdoors in Federated Learning 消除你的痕迹:远程清除联合学习中的后门
Pub Date : 2024-09-23 DOI: 10.1109/TAI.2024.3465441
Manaar Alam;Hithem Lamri;Michail Maniatakos
Federated learning (FL) enables collaborative learning across multiple participants without exposing sensitive personal data. However, the distributed nature of FL and unvetted participants’ data makes it vulnerable to backdoor attacks. In these attacks, adversaries selectively inject malicious functionality into the centralized model during training, leading to intentional misclassifications for specific adversary-chosen inputs. While previous research has demonstrated successful injections of persistent backdoors in FL, the persistence also poses a challenge, as their existence in the centralized model can prompt the central aggregation server to take preventive measures for penalizing the adversaries. Therefore, this article proposes a method that enables adversaries to effectively remove backdoors from the centralized model upon achieving their objectives or upon suspicion of possible detection. The proposed approach extends the concept of machine unlearning and presents strategies to preserve the performance of the centralized model and simultaneously prevent over-unlearning of information unrelated to backdoor patterns, making adversaries stealthy while removing backdoors. To the best of our knowledge, this is the first work exploring machine unlearning in FL to remove backdoors to the benefit of adversaries. Exhaustive evaluation considering various image classification scenarios demonstrates the efficacy of the proposed method for efficient backdoor removal from the centralized model, injected by state-of-the-art attacks across multiple configurations.
联合学习(FL)可实现多人协作学习,而不会暴露敏感的个人数据。然而,FL 的分布式性质和未经审查的参与者数据使其容易受到后门攻击。在这些攻击中,敌方会在训练过程中选择性地向集中模型注入恶意功能,从而导致对敌方选择的特定输入进行有意的错误分类。虽然之前的研究已经证明在 FL 中成功注入了持久性后门,但这种持久性也带来了挑战,因为它们在集中模型中的存在会促使中央聚合服务器采取预防措施来惩罚对手。因此,本文提出了一种方法,使对手能够在达到目的或怀疑可能被检测到时,有效地从集中模型中删除后门。所提出的方法扩展了机器未学习的概念,并提出了一些策略,以保持集中模型的性能,同时防止过度未学习与后门模式无关的信息,从而使对手在删除后门的同时保持隐秘。据我们所知,这是第一项在 FL 中探索机器非学习以清除后门从而使对手获益的研究。对各种图像分类场景进行的详尽评估表明,所提出的方法能有效地从集中模型中清除后门,并能在多种配置中使用最先进的攻击手段。
{"title":"Get Rid of Your Trail: Remotely Erasing Backdoors in Federated Learning","authors":"Manaar Alam;Hithem Lamri;Michail Maniatakos","doi":"10.1109/TAI.2024.3465441","DOIUrl":"https://doi.org/10.1109/TAI.2024.3465441","url":null,"abstract":"Federated learning (FL) enables collaborative learning across multiple participants without exposing sensitive personal data. However, the distributed nature of FL and unvetted participants’ data makes it vulnerable to \u0000<italic>backdoor attacks</i>\u0000. In these attacks, adversaries selectively inject malicious functionality into the centralized model during training, leading to intentional misclassifications for specific adversary-chosen inputs. While previous research has demonstrated successful injections of persistent backdoors in FL, the persistence also poses a challenge, as their existence in the centralized model can prompt the central aggregation server to take preventive measures for penalizing the adversaries. Therefore, this article proposes a method \u0000<italic>that enables adversaries to effectively remove backdoors from the centralized model</i>\u0000 upon achieving their objectives or upon suspicion of possible detection. The proposed approach extends the concept of \u0000<italic>machine unlearning</i>\u0000 and presents strategies to preserve the performance of the centralized model and simultaneously prevent over-unlearning of information unrelated to backdoor patterns, making adversaries stealthy while removing backdoors. To the best of our knowledge, this is the first work exploring machine unlearning in FL to remove backdoors to the benefit of adversaries. Exhaustive evaluation considering various image classification scenarios demonstrates the efficacy of the proposed method for efficient backdoor removal from the centralized model, injected by state-of-the-art attacks across multiple configurations.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 12","pages":"6683-6698"},"PeriodicalIF":0.0,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RATs-NAS: Redirection of Adjacent Trails on Graph Convolutional Networks for Predictor-Based Neural Architecture Search 基于预测器的神经结构搜索中图卷积网络相邻轨迹的重定向
Pub Date : 2024-09-23 DOI: 10.1109/TAI.2024.3465433
Yu-Ming Zhang;Jun-Wei Hsieh;Chun-Chieh Lee;Kuo-Chin Fan
Manually designed convolutional neural networks (CNNs) architectures such as visual geometry group network (VGG), ResNet, DenseNet, and MobileNet have achieved high performance across various tasks, but design them is time-consuming and costly. Neural architecture search (NAS) automates the discovery of effective CNN architectures, reducing the need for experts. However, evaluating candidate architectures requires significant graphics processing unit (GPU) resources, leading to the use of predictor-based NAS, such as graph convolutional networks (GCN), which is the popular option to construct predictors. However, we discover that, even though the ability of GCN mimics the propagation of features of real architectures, the binary nature of the adjacency matrix limits its effectiveness. To address this, we propose redirection of adjacent trails (RATs), which adaptively learns trail weights within the adjacency matrix. Our RATs-GCN outperform other predictors by dynamically adjusting trail weights after each graph convolution layer. Additionally, the proposed divide search sampling (DSS) strategy, based on the observation of cell-based NAS that architectures with similar floating point operations (FLOPs) perform similarly, enhances search efficiency. Our RATs-NAS, which combine RATs-GCN and DSS, shows significant improvements over other predictor-based NAS methods on NASBench-101, NASBench-201, and NASBench-301.
人工设计的卷积神经网络(cnn)架构,如视觉几何组网络(VGG)、ResNet、DenseNet和MobileNet,已经在各种任务中实现了高性能,但设计它们耗时且成本高。神经结构搜索(NAS)自动发现有效的CNN结构,减少了对专家的需求。然而,评估候选体系结构需要大量的图形处理单元(GPU)资源,导致使用基于预测器的NAS,例如图卷积网络(GCN),这是构建预测器的流行选择。然而,我们发现,尽管GCN的能力模仿了真实架构的特征传播,但邻接矩阵的二进制性质限制了它的有效性。为了解决这个问题,我们提出了邻接轨迹重定向(rat),它自适应地学习邻接矩阵内的轨迹权重。我们的RATs-GCN通过在每个图卷积层后动态调整轨迹权重来优于其他预测器。此外,基于对具有类似浮点运算(flop)的架构的基于cell的NAS的观察,提出的分割搜索抽样(DSS)策略提高了搜索效率。我们的RATs-NAS结合了RATs-GCN和DSS,在NASBench-101、NASBench-201和NASBench-301上比其他基于预测因子的NAS方法有了显著的改进。
{"title":"RATs-NAS: Redirection of Adjacent Trails on Graph Convolutional Networks for Predictor-Based Neural Architecture Search","authors":"Yu-Ming Zhang;Jun-Wei Hsieh;Chun-Chieh Lee;Kuo-Chin Fan","doi":"10.1109/TAI.2024.3465433","DOIUrl":"https://doi.org/10.1109/TAI.2024.3465433","url":null,"abstract":"Manually designed convolutional neural networks (CNNs) architectures such as visual geometry group network (VGG), ResNet, DenseNet, and MobileNet have achieved high performance across various tasks, but design them is time-consuming and costly. Neural architecture search (NAS) automates the discovery of effective CNN architectures, reducing the need for experts. However, evaluating candidate architectures requires significant graphics processing unit (GPU) resources, leading to the use of predictor-based NAS, such as graph convolutional networks (GCN), which is the popular option to construct predictors. However, we discover that, even though the ability of GCN mimics the propagation of features of real architectures, the binary nature of the adjacency matrix limits its effectiveness. To address this, we propose redirection of adjacent trails (RATs), which adaptively learns trail weights within the adjacency matrix. Our RATs-GCN outperform other predictors by dynamically adjusting trail weights after each graph convolution layer. Additionally, the proposed divide search sampling (DSS) strategy, based on the observation of cell-based NAS that architectures with similar floating point operations (FLOPs) perform similarly, enhances search efficiency. Our RATs-NAS, which combine RATs-GCN and DSS, shows significant improvements over other predictor-based NAS methods on NASBench-101, NASBench-201, and NASBench-301.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 12","pages":"6672-6682"},"PeriodicalIF":0.0,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatio-temporal Graph-Based Generation and Detection of Adversarial False Data Injection Evasion Attacks in Smart Grids 基于时空图的智能电网虚假数据注入规避攻击生成与检测
Pub Date : 2024-09-20 DOI: 10.1109/TAI.2024.3464511
Abdulrahman Takiddin;Muhammad Ismail;Rachad Atat;Erchin Serpedin
Smart power grids are vulnerable to security threats due to their cyber-physical nature. Existing data-driven detectors aim to address simple traditional false data injection attacks (FDIAs). However, adversarial false data injection evasion attacks (FDIEAs) present a more serious threat as adversaries, with different levels of knowledge about the system, inject adversarial samples to circumvent the grid's attack detection system. The robustness of state-of-the-art graph-based detectors has not been investigated against sophisticated FDIEAs. Hence, this article answers three research questions. 1) What is the impact of utilizing spatio-temporal features to craft adversarial samples and how to select attack nodes? 2) How can adversaries generate surrogate spatio-temporal data when they lack knowledge about the system topology? 3) What are the required model characteristics for a robust detection against adversarial FDIEAs? To answer the questions, we examine the robustness of several detectors against five attack cases and conclude the following: 1) Attack generation with full knowledge using spatio-temporal features leads to 5%–26% and 2%–5% higher degradation in detection rate (DR) compared to traditional FDIAs and using temporal features, respectively, whereas centrality analysis-based attack node selection leads to 3%–11% higher degradation in DR compared to a random selection; 2) Stochastic geometry-based graph generation to create surrogate adversarial topologies and samples leads to 3%–13% higher degradation in DR compared to traditional FDIAs; and 3) Adopting an unsupervised spatio-temporal graph autoencoder (STGAE)-based detector enhances the DR by 5$-$53% compared to benchmark detectors against FDIEAs.
智能电网由于其网络物理特性,容易受到安全威胁。现有的数据驱动检测器旨在解决简单的传统假数据注入攻击(FDIAs)。然而,对抗性虚假数据注入逃避攻击(FDIEAs)带来了更严重的威胁,因为攻击者对系统的了解程度不同,可以注入对抗性样本来绕过网格的攻击检测系统。最先进的基于图形的检测器的鲁棒性尚未针对复杂的fdea进行研究。因此,本文回答了三个研究问题。1)利用时空特征制作对抗性样本的影响是什么,如何选择攻击节点?2)攻击者在缺乏系统拓扑知识的情况下如何生成代理时空数据?3)对对抗性FDIEAs进行鲁棒检测所需的模型特征是什么?为了回答这些问题,我们检查了几种检测器对五种攻击案例的鲁棒性,并得出以下结论:1)与传统的fdia和使用时间特征相比,使用充分知识的攻击生成使用时空特征分别导致检测率(DR)下降5%-26%和2%-5%,而基于中心性分析的攻击节点选择与随机选择相比导致DR下降3%-11%;2)基于随机几何的图形生成,以创建替代对抗拓扑和样本,与传统的fdia相比,DR的退化率提高了3%-13%;3)采用基于无监督时空图自编码器(STGAE)的检测器,与FDIEAs的基准检测器相比,DR提高了5 ~ 53%。
{"title":"Spatio-temporal Graph-Based Generation and Detection of Adversarial False Data Injection Evasion Attacks in Smart Grids","authors":"Abdulrahman Takiddin;Muhammad Ismail;Rachad Atat;Erchin Serpedin","doi":"10.1109/TAI.2024.3464511","DOIUrl":"https://doi.org/10.1109/TAI.2024.3464511","url":null,"abstract":"Smart power grids are vulnerable to security threats due to their cyber-physical nature. Existing data-driven detectors aim to address simple traditional false data injection attacks (FDIAs). However, adversarial false data injection evasion attacks (FDIEAs) present a more serious threat as adversaries, with different levels of knowledge about the system, inject adversarial samples to circumvent the grid's attack detection system. The robustness of state-of-the-art graph-based detectors has not been investigated against sophisticated FDIEAs. Hence, this article answers three research questions. 1) What is the impact of utilizing spatio-temporal features to craft adversarial samples and how to select attack nodes? 2) How can adversaries generate surrogate spatio-temporal data when they lack knowledge about the system topology? 3) What are the required model characteristics for a robust detection against adversarial FDIEAs? To answer the questions, we examine the robustness of several detectors against five attack cases and conclude the following: 1) Attack generation with full knowledge using spatio-temporal features leads to 5%–26% and 2%–5% higher degradation in detection rate (DR) compared to traditional FDIAs and using temporal features, respectively, whereas centrality analysis-based attack node selection leads to 3%–11% higher degradation in DR compared to a random selection; 2) Stochastic geometry-based graph generation to create surrogate adversarial topologies and samples leads to 3%–13% higher degradation in DR compared to traditional FDIAs; and 3) Adopting an unsupervised spatio-temporal graph autoencoder (STGAE)-based detector enhances the DR by 5\u0000<inline-formula><tex-math>$-$</tex-math></inline-formula>\u000053% compared to benchmark detectors against FDIEAs.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 12","pages":"6601-6616"},"PeriodicalIF":0.0,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NPE-DRL: Enhancing Perception Constrained Obstacle Avoidance With Nonexpert Policy Guided Reinforcement Learning NPE-DRL:用非专家策略引导的强化学习增强感知约束的避障
Pub Date : 2024-09-20 DOI: 10.1109/TAI.2024.3464510
Yuhang Zhang;Chao Yan;Jiaping Xiao;Mir Feroskhan
Obstacle avoidance under constrained visual perception presents a significant challenge, requiring rapid detection and decision-making within partially observable environments, particularly for unmanned aerial vehicles (UAVs) maneuvering agilely in 3-D space. Compared with traditional methods, obstacle avoidance algorithms based on deep reinforcement learning (DRL) offer a better comprehension of the uncertain operational environment in an end-to-end manner, reducing computational complexity, and enhancing flexibility and scalability. However, the inherent trial-and-error learning mechanism of DRL necessitates numerous iterations for policy convergence, leading to sample inefficiency issues. Meanwhile, existing sample-efficient obstacle avoidance approaches that leverage imitation learning often heavily rely on offline expert demonstrations, which are not always feasible in hazardous environments. To address these challenges, we propose a novel obstacle avoidance approach based on nonexpert policy enhanced DRL (NPE-DRL). This approach integrates a fundamental DRL framework with prior knowledge derived from a nonexpert policy-guided imitation learning. During the training phase, the agent starts by online imitating the actions generated by the nonexpert policy during interactions and progressively shifts toward autonomously exploring the environment to generate the optimal policy. Both simulation and physical experiments validate that our approach improves sample efficiency and achieves a better exploration–exploitation balance in both virtual and real-world flights. Additionally, our NPE-DRL-based obstacle avoidance approach shows better adaptability in complex environments characterized by larger scales and denser obstacle configurations, demonstrating a significant improvement in UAVs’ obstacle avoidance capability. Code available at https://github.com/zzzzzyh111/NonExpert-Guided-Visual-UAV-Navigation-Gazebo.
在受限视觉感知条件下避障是一项重大挑战,需要在部分可观测环境中快速检测和决策,特别是对于在三维空间中灵活机动的无人机。与传统避障方法相比,基于深度强化学习(DRL)的避障算法能够端到端更好地理解不确定的运行环境,降低了计算复杂度,增强了灵活性和可扩展性。然而,DRL固有的试错学习机制需要大量的迭代来进行策略收敛,从而导致样本效率低下的问题。同时,现有的利用模仿学习的样本高效避障方法通常严重依赖于离线专家演示,这在危险环境中并不总是可行的。为了解决这些问题,我们提出了一种基于非专家策略增强DRL (NPE-DRL)的避障方法。该方法将基本DRL框架与源自非专家策略引导模仿学习的先验知识集成在一起。在训练阶段,智能体从在线模仿非专家策略在交互过程中产生的动作开始,逐步转向自主探索环境以产生最优策略。仿真和物理实验都验证了我们的方法提高了样本效率,并在虚拟和现实世界的飞行中实现了更好的勘探-开采平衡。此外,基于npe - drl的避障方法在更大尺度和更密集障碍物配置的复杂环境中表现出更好的适应性,显著提高了无人机的避障能力。代码可从https://github.com/zzzzzyh111/NonExpert-Guided-Visual-UAV-Navigation-Gazebo获得。
{"title":"NPE-DRL: Enhancing Perception Constrained Obstacle Avoidance With Nonexpert Policy Guided Reinforcement Learning","authors":"Yuhang Zhang;Chao Yan;Jiaping Xiao;Mir Feroskhan","doi":"10.1109/TAI.2024.3464510","DOIUrl":"https://doi.org/10.1109/TAI.2024.3464510","url":null,"abstract":"Obstacle avoidance under constrained visual perception presents a significant challenge, requiring rapid detection and decision-making within partially observable environments, particularly for unmanned aerial vehicles (UAVs) maneuvering agilely in 3-D space. Compared with traditional methods, obstacle avoidance algorithms based on deep reinforcement learning (DRL) offer a better comprehension of the uncertain operational environment in an end-to-end manner, reducing computational complexity, and enhancing flexibility and scalability. However, the inherent trial-and-error learning mechanism of DRL necessitates numerous iterations for policy convergence, leading to sample inefficiency issues. Meanwhile, existing sample-efficient obstacle avoidance approaches that leverage imitation learning often heavily rely on offline expert demonstrations, which are not always feasible in hazardous environments. To address these challenges, we propose a novel obstacle avoidance approach based on nonexpert policy enhanced DRL (NPE-DRL). This approach integrates a fundamental DRL framework with prior knowledge derived from a nonexpert policy-guided imitation learning. During the training phase, the agent starts by online imitating the actions generated by the nonexpert policy during interactions and progressively shifts toward autonomously exploring the environment to generate the optimal policy. Both simulation and physical experiments validate that our approach improves sample efficiency and achieves a better exploration–exploitation balance in both virtual and real-world flights. Additionally, our NPE-DRL-based obstacle avoidance approach shows better adaptability in complex environments characterized by larger scales and denser obstacle configurations, demonstrating a significant improvement in UAVs’ obstacle avoidance capability. Code available at <uri>https://github.com/zzzzzyh111/NonExpert-Guided-Visual-UAV-Navigation-Gazebo</uri>.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"6 1","pages":"184-198"},"PeriodicalIF":0.0,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142976089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement Learning for Solving Colored Traveling Salesman Problems: An Entropy-Insensitive Attention Approach 解决彩色旅行推销员问题的强化学习:对熵不敏感的注意力方法
Pub Date : 2024-09-19 DOI: 10.1109/TAI.2024.3461630
Tianyu Zhu;Xinli Shi;Xiangping Xu;Jinde Cao
The utilization of neural network models for solving combinatorial optimization problems (COPs) has gained significant attention in recent years and has demonstrated encouraging outcomes in addressing analogous problems such as the traveling salesman problem (TSP). The multiple TSP (MTSP) has sparked the interest of researchers as a special kind of COPs. The colored TSP (CTSP) is a variation of the MTSP, which utilizes colors to distinguish the accessibility of cities to salesmen. This article proposes a gated entropy-insensitive attention model (GEIAM) to solve CTSP. In specific, the original problem is first modeled as a sequence and preprocessed by the problem feature extraction network of the model, and then solved by the autoregressive solution constructor subsequently. The policy (parameters of the neural network model) is trained via reinforcement learning (RL). The proposed approach is compared with several commercial solvers as well as heuristics and demonstrates superior solving speed with comparable solution quality.
近年来,利用神经网络模型求解组合优化问题(cop)得到了广泛的关注,并在解决旅行商问题(TSP)等类似问题方面取得了令人鼓舞的成果。多重TSP (MTSP)作为一种特殊类型的cop引起了研究人员的兴趣。彩色TSP (CTSP)是MTSP的变体,它利用颜色来区分城市对销售人员的可达性。本文提出了一种门控熵不敏感注意力模型(GEIAM)来解决CTSP问题。具体而言,首先将原始问题建模为序列,通过模型的问题特征提取网络进行预处理,然后使用自回归解构造器进行求解。策略(神经网络模型的参数)通过强化学习(RL)进行训练。将该方法与几种商业求解器以及启发式算法进行了比较,结果表明该方法具有较高的求解速度和相当的解质量。
{"title":"Reinforcement Learning for Solving Colored Traveling Salesman Problems: An Entropy-Insensitive Attention Approach","authors":"Tianyu Zhu;Xinli Shi;Xiangping Xu;Jinde Cao","doi":"10.1109/TAI.2024.3461630","DOIUrl":"https://doi.org/10.1109/TAI.2024.3461630","url":null,"abstract":"The utilization of neural network models for solving combinatorial optimization problems (COPs) has gained significant attention in recent years and has demonstrated encouraging outcomes in addressing analogous problems such as the traveling salesman problem (TSP). The multiple TSP (MTSP) has sparked the interest of researchers as a special kind of COPs. The colored TSP (CTSP) is a variation of the MTSP, which utilizes colors to distinguish the accessibility of cities to salesmen. This article proposes a gated entropy-insensitive attention model (GEIAM) to solve CTSP. In specific, the original problem is first modeled as a sequence and preprocessed by the problem feature extraction network of the model, and then solved by the autoregressive solution constructor subsequently. The policy (parameters of the neural network model) is trained via reinforcement learning (RL). The proposed approach is compared with several commercial solvers as well as heuristics and demonstrates superior solving speed with comparable solution quality.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 12","pages":"6699-6708"},"PeriodicalIF":0.0,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Model-Free Learning Versus Learning With External Rewards in Information Constrained Environments 信息受限环境下的无自我模型学习与外部奖励学习
Pub Date : 2024-09-18 DOI: 10.1109/TAI.2024.3433614
Prachi Pratyusha Sahoo;Kyriakos G. Vamvoudakis
In this article, we provide a model-free reinforcement learning (RL) framework that relies on internal reinforcement signals, called self-model-free RL, for learning agents that experience loss of the reinforcement signals in the form of packet drops and/or jamming attacks by malicious agents. The framework embeds a correcting mechanism in the form of a goal network to compensate for information loss and produce optimal and stabilizing policies. It also provides a trade-off scheme that reconstructs the reward using a goal network whenever the reinforcement signals are lost but utilizes true reinforcement signals when they are available. The stability of the equilibrium point is guaranteed despite fractional information loss in the reinforcement signals. Finally, simulation results validate the efficacy of the proposed work.
在本文中,我们提供了一个无模型强化学习(RL)框架,该框架依赖于内部强化信号,称为自无模型强化学习(self-model-free RL),用于学习代理,这些代理会以丢包和/或恶意代理的干扰攻击的形式丢失强化信号。该框架以目标网络的形式嵌入了一种纠正机制,以补偿信息损失并产生最优和稳定的策略。它还提供了一种权衡方案,当强化信号丢失时,使用目标网络重建奖励,而当真正的强化信号可用时,使用真正的强化信号。尽管强化信号中存在部分信息损失,但仍能保证平衡点的稳定性。最后,仿真结果验证了所提工作的有效性。
{"title":"Self-Model-Free Learning Versus Learning With External Rewards in Information Constrained Environments","authors":"Prachi Pratyusha Sahoo;Kyriakos G. Vamvoudakis","doi":"10.1109/TAI.2024.3433614","DOIUrl":"https://doi.org/10.1109/TAI.2024.3433614","url":null,"abstract":"In this article, we provide a model-free reinforcement learning (RL) framework that relies on internal reinforcement signals, called self-model-free RL, for learning agents that experience loss of the reinforcement signals in the form of packet drops and/or jamming attacks by malicious agents. The framework embeds a correcting mechanism in the form of a goal network to compensate for information loss and produce optimal and stabilizing policies. It also provides a trade-off scheme that reconstructs the reward using a goal network whenever the reinforcement signals are lost but utilizes true reinforcement signals when they are available. The stability of the equilibrium point is guaranteed despite fractional information loss in the reinforcement signals. Finally, simulation results validate the efficacy of the proposed work.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 12","pages":"6566-6579"},"PeriodicalIF":0.0,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OAFuser: Toward Omni-Aperture Fusion for Light Field Semantic Segmentation 面向全孔径融合的光场语义分割
Pub Date : 2024-09-11 DOI: 10.1109/TAI.2024.3457931
Fei Teng;Jiaming Zhang;Kunyu Peng;Yaonan Wang;Rainer Stiefelhagen;Kailun Yang
Light field cameras are capable of capturing intricate angular and spatial details. This allows for acquiring complex light patterns and details from multiple angles, significantly enhancing the precision of image semantic segmentation. However, two significant issues arise: 1) The extensive angular information of light field cameras contains a large amount of redundant data, which is overwhelming for the limited hardware resources of intelligent agents. 2) A relative displacement difference exists in the data collected by different microlenses. To address these issues, we propose an omni-aperture fusion model (OAFuser) that leverages dense context from the central view and extracts the angular information from subaperture images to generate semantically consistent results. To simultaneously streamline the redundant information from the light field cameras and avoid feature loss during network propagation, we present a simple yet very effective subaperture fusion module (SAFM). This module efficiently embeds subaperture images in angular features, allowing the network to process each subaperture image with a minimal computational demand of only (${sim}1rm GFlops$). Furthermore, to address the mismatched spatial information across viewpoints, we present a center angular rectification module (CARM) to realize feature resorting and prevent feature occlusion caused by misalignment. The proposed OAFuser achieves state-of-the-art performance on four UrbanLF datasets in terms of all evaluation metrics and sets a new record of $84.93%$ in mIoU on the UrbanLF-Real Extended dataset, with a gain of ${+}3.69%$. The source code for OAFuser is available at https://github.com/FeiBryantkit/OAFuser.
光场相机能够捕捉到复杂的角度和空间细节。这允许从多个角度获取复杂的光模式和细节,大大提高了图像语义分割的精度。但是存在两个重要的问题:1)光场相机广泛的角度信息包含了大量的冗余数据,这对于智能体有限的硬件资源来说是压倒性的。2)不同微透镜采集的数据存在相对位移差异。为了解决这些问题,我们提出了一种全孔径融合模型(OAFuser),该模型利用中心视图的密集上下文并从子孔径图像中提取角度信息以生成语义一致的结果。为了同时精简来自光场相机的冗余信息并避免网络传播过程中的特征丢失,我们提出了一种简单但非常有效的子孔径融合模块(SAFM)。该模块有效地将子孔径图像嵌入到角度特征中,使网络能够以最小的计算需求(${sim}1rm GFlops$)处理每个子孔径图像。此外,为了解决视点间空间信息不匹配的问题,我们提出了圆心角校正模块(CARM),实现特征求助,防止因不对准导致的特征遮挡。根据所有评估指标,提出的OAFuser在四个UrbanLF数据集上实现了最先进的性能,并在UrbanLF- real扩展数据集上创造了84.93%$的mIoU新记录,增益为${+}3.69%$。OAFuser的源代码可从https://github.com/FeiBryantkit/OAFuser获得。
{"title":"OAFuser: Toward Omni-Aperture Fusion for Light Field Semantic Segmentation","authors":"Fei Teng;Jiaming Zhang;Kunyu Peng;Yaonan Wang;Rainer Stiefelhagen;Kailun Yang","doi":"10.1109/TAI.2024.3457931","DOIUrl":"https://doi.org/10.1109/TAI.2024.3457931","url":null,"abstract":"Light field cameras are capable of capturing intricate angular and spatial details. This allows for acquiring complex light patterns and details from multiple angles, significantly enhancing the precision of image semantic segmentation. However, two significant issues arise: 1) The extensive angular information of light field cameras contains a large amount of redundant data, which is overwhelming for the limited hardware resources of intelligent agents. 2) A relative displacement difference exists in the data collected by different microlenses. To address these issues, we propose an \u0000<italic>omni-aperture fusion model (OAFuser)</i>\u0000 that leverages dense context from the central view and extracts the angular information from subaperture images to generate semantically consistent results. To simultaneously streamline the redundant information from the light field cameras and avoid feature loss during network propagation, we present a simple yet very effective \u0000<italic>subaperture fusion module (SAFM)</i>\u0000. This module efficiently embeds subaperture images in angular features, allowing the network to process each subaperture image with a minimal computational demand of only (\u0000<inline-formula><tex-math>${sim}1rm GFlops$</tex-math></inline-formula>\u0000). Furthermore, to address the mismatched spatial information across viewpoints, we present a \u0000<italic>center angular rectification module (CARM)</i>\u0000 to realize feature resorting and prevent feature occlusion caused by misalignment. The proposed OAFuser achieves state-of-the-art performance on four UrbanLF datasets in terms of \u0000<italic>all evaluation metrics</i>\u0000 and sets a new record of \u0000<inline-formula><tex-math>$84.93%$</tex-math></inline-formula>\u0000 in mIoU on the UrbanLF-Real Extended dataset, with a gain of \u0000<inline-formula><tex-math>${+}3.69%$</tex-math></inline-formula>\u0000. The source code for OAFuser is available at \u0000<uri>https://github.com/FeiBryantkit/OAFuser</uri>\u0000.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 12","pages":"6225-6239"},"PeriodicalIF":0.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142810372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: From Explainable Artificial Intelligence (xAI) to Understandable Artificial Intelligence (uAI) 社论:从可解释的人工智能(xAI)到可理解的人工智能(uAI)
Pub Date : 2024-09-10 DOI: 10.1109/TAI.2024.3439048
Hussein Abbass;Keeley Crockett;Jonathan Garibaldi;Alexander Gegov;Uzay Kaymak;Joao Miguel C. Sousa
{"title":"Editorial: From Explainable Artificial Intelligence (xAI) to Understandable Artificial Intelligence (uAI)","authors":"Hussein Abbass;Keeley Crockett;Jonathan Garibaldi;Alexander Gegov;Uzay Kaymak;Joao Miguel C. Sousa","doi":"10.1109/TAI.2024.3439048","DOIUrl":"https://doi.org/10.1109/TAI.2024.3439048","url":null,"abstract":"","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4310-4314"},"PeriodicalIF":0.0,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10673750","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142165008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Artificial Intelligence Publication Information IEEE Transactions on Artificial Intelligence 出版信息
Pub Date : 2024-09-10 DOI: 10.1109/TAI.2024.3449732
{"title":"IEEE Transactions on Artificial Intelligence Publication Information","authors":"","doi":"10.1109/TAI.2024.3449732","DOIUrl":"https://doi.org/10.1109/TAI.2024.3449732","url":null,"abstract":"","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"C2-C2"},"PeriodicalIF":0.0,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10673746","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142165009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiobjective Dynamic Flexible Job Shop Scheduling With Biased Objectives via Multitask Genetic Programming 基于多任务遗传规划的有偏目标柔性作业车间动态调度
Pub Date : 2024-09-09 DOI: 10.1109/TAI.2024.3456086
Fangfang Zhang;Gaofeng Shi;Yi Mei;Mengjie Zhang
Dynamic flexible job shop scheduling is an important combinatorial optimization problem that has rich real-world applications such as product processing in manufacturing. Genetic programming has been successfully used to learn scheduling heuristics for dynamic flexible job shop scheduling. Intuitively, users prefer small and effective scheduling heuristics that can not only generate promising schedules but also are computationally efficient and easy to be understood. However, a scheduling heuristic with better effectiveness tends to have a larger size, and the effectiveness of rules and rule size are potentially conflicting objectives. With the traditional dominance relation-based multiobjective algorithms, there is a search bias toward rule size, since rule size is much easier to optimized than effectiveness, and larger rules are easily abandoned, resulting in the loss of effectiveness. To address this issue, this article develops a novel multiobjective genetic programming algorithm that takes size and effectiveness of scheduling heuristics for optimization via multitask learning mechanism. Specifically, we construct two tasks for the multiobjective optimization with biased objectives using different search mechanisms for each task. The focus of the proposed algorithm is to improve the effectiveness of learned small rules by knowledge sharing between constructed tasks which is implemented with the crossover operator. The results show that our proposed algorithm performs significantly better, i.e., with smaller and more effective scheduling heuristics, than the state-of-the-art algorithms in the examined scenarios. By analyzing the population diversity, we find that the proposed algorithm has a good balance between exploration and exploitation during the evolutionary process.
动态柔性作业车间调度是一个重要的组合优化问题,具有丰富的实际应用,如制造业中的产品加工。利用遗传规划成功地学习了动态柔性作业车间调度的启发式算法。直观上,用户更喜欢小而有效的调度启发式算法,这种算法不仅可以生成有希望的调度,而且计算效率高,易于理解。然而,具有更好有效性的调度启发式往往具有更大的大小,并且规则的有效性和规则大小可能是相互冲突的目标。传统的基于优势关系的多目标算法存在对规则大小的搜索偏差,因为规则大小比有效性更容易优化,较大的规则容易被抛弃,从而导致有效性的丧失。为了解决这一问题,本文开发了一种新的多目标遗传规划算法,该算法利用多任务学习机制来优化调度启发式算法的规模和有效性。具体来说,我们构建了两个带有偏置目标的多目标优化任务,每个任务使用不同的搜索机制。该算法的重点是通过交叉算子实现任务间的知识共享,提高学习到的小规则的有效性。结果表明,我们提出的算法在测试场景中表现明显更好,即具有更小和更有效的调度启发式,而不是最先进的算法。通过对种群多样性的分析,我们发现该算法在进化过程中能够很好地平衡探索和利用。
{"title":"Multiobjective Dynamic Flexible Job Shop Scheduling With Biased Objectives via Multitask Genetic Programming","authors":"Fangfang Zhang;Gaofeng Shi;Yi Mei;Mengjie Zhang","doi":"10.1109/TAI.2024.3456086","DOIUrl":"https://doi.org/10.1109/TAI.2024.3456086","url":null,"abstract":"Dynamic flexible job shop scheduling is an important combinatorial optimization problem that has rich real-world applications such as product processing in manufacturing. Genetic programming has been successfully used to learn scheduling heuristics for dynamic flexible job shop scheduling. Intuitively, users prefer small and effective scheduling heuristics that can not only generate promising schedules but also are computationally efficient and easy to be understood. However, a scheduling heuristic with better effectiveness tends to have a larger size, and the effectiveness of rules and rule size are potentially conflicting objectives. With the traditional dominance relation-based multiobjective algorithms, there is a search bias toward rule size, since rule size is much easier to optimized than effectiveness, and larger rules are easily abandoned, resulting in the loss of effectiveness. To address this issue, this article develops a novel multiobjective genetic programming algorithm that takes size and effectiveness of scheduling heuristics for optimization via multitask learning mechanism. Specifically, we construct two tasks for the multiobjective optimization with biased objectives using different search mechanisms for each task. The focus of the proposed algorithm is to improve the effectiveness of learned small rules by knowledge sharing between constructed tasks which is implemented with the crossover operator. The results show that our proposed algorithm performs significantly better, i.e., with smaller and more effective scheduling heuristics, than the state-of-the-art algorithms in the examined scenarios. By analyzing the population diversity, we find that the proposed algorithm has a good balance between exploration and exploitation during the evolutionary process.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"6 1","pages":"169-183"},"PeriodicalIF":0.0,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142976034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE transactions on artificial intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1