• 제목/요약/키워드: Communication Model

검색결과 8,231건 처리시간 0.032초

Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System

  • Khosravy, Mahdi;Nakamura, Kazuaki;Hirose, Yuki;Nitta, Naoko;Babaguchi, Noboru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권3호
    • /
    • pp.1100-1118
    • /
    • 2021
  • In a wide range of ML applications, the training data contains privacy-sensitive information that should be kept secure. Training the ML systems by privacy-sensitive data makes the ML model inherent to the data. As the structure of the model has been fine-tuned by training data, the model can be abused for accessing the data by the estimation in a reverse process called model inversion attack (MIA). Although, MIA has been applied to shallow neural network models of recognizers in literature and its threat in privacy violation has been approved, in the case of a deep learning (DL) model, its efficiency was under question. It was due to the complexity of a DL model structure, big number of DL model parameters, the huge size of training data, big number of registered users to a DL model and thereof big number of class labels. This research work first analyses the possibility of MIA on a deep learning model of a recognition system, namely a face recognizer. Second, despite the conventional MIA under the white box scenario of having partial access to the users' non-sensitive information in addition to the model structure, the MIA is implemented on a deep face recognition system by just having the model structure and parameters but not any user information. In this aspect, it is under a semi-white box scenario or in other words a gray-box scenario. The experimental results in targeting five registered users of a CNN-based face recognition system approve the possibility of regeneration of users' face images even for a deep model by MIA under a gray box scenario. Although, for some images the evaluation recognition score is low and the generated images are not easily recognizable, but for some other images the score is high and facial features of the targeted identities are observable. The objective and subjective evaluations demonstrate that privacy cyber-attack by MIA on a deep recognition system not only is feasible but also is a serious threat with increasing alert state in the future as there is considerable potential for integration more advanced ML techniques to MIA.

Development of a Scattering Model for Soybean Fields and Verification with Scatterometer and SAR Data at X-Band

  • Kweon, Soon-Koo;Hwang, Ji-Hwan;Oh, Yi-Sok
    • Journal of electromagnetic engineering and science
    • /
    • 제12권1호
    • /
    • pp.115-121
    • /
    • 2012
  • This paper presents a scattering model and measurements of backscattering coefficients for soybean fields. The polarimetric radar backscatters of a soybean field were measured using the ground-based X-band polarimetric scatterometer in an angular range from $20^{\circ}$ to $60^{\circ}$. The backscattering coefficients were also obtained using the COSMO-SkyMed (Spotlight mode, HH-polarization) from July to October 2010. The backscattering coefficients of the soybean field were computed using the 1st-order radiative transfer model (RTM) with field-measured input parameters. The soybean layer is composed of the stems, branches, leaves, and soybean pods. The stems, branches, and pods are modeled with lossy dielectric cylinders, the leaves are modeled with lossy dielectric disks. The estimated backscattering coefficients agree quite well with the field-measured radar backscattering coefficients.

Simulation of Power Line Communication Slient Node Problem Using OPNET

  • Huh, Jun-Ho;Seo, Kyungryong
    • 한국멀티미디어학회논문지
    • /
    • 제20권3호
    • /
    • pp.491-499
    • /
    • 2017
  • The Information & Communication Technology (ICT) and the Internet of Things (IoT) have become the major issues in Republic of Korea recently. While RS-232, Zigbee, and WiFi-related technologies are used in the ICT-based systems, we focus on the Power Line Communication (PLC) in this paper. By carrying out OPNET simulations, we've implemented the PLC Router Node Model, PLC Terminal Node Model, PLC Link Model, and PLC Palette Model and executed the simulations arranging 20 holds within the range of 400m (20m apart). As a result, we confirmed that the slient node problem had occurred at the point of 200m-2000m (as of 2016) distance preventing further communications. However, the control group, by contrast, was able to carry out the communications by installing a router. We expect that this paper will contribute to the development of a foundation technology which will saves costs by performing the simulation prior to building actual large-scale ICT Complex in the future work.

3차원 모델을 이용한 한-일 수화 영상통신 시스템의 구현 (An implementation of sign language communication sytem between korean and japanese using 3D model)

  • 오지영;김상운
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1998년도 하계종합학술대회논문집
    • /
    • pp.925-928
    • /
    • 1998
  • In this paper, we implemented a sign language communication system between korean and japanese using 3D model. Unitl now, we have developed the system through 2D image. The system, however, has some drawbacks base don the limitations of 2D model. Especially it is not comprehensive in the sign language gesture including forward or backward movements becasue it can only display a front view. Therefore, we employed a 3D model for the representation of sign language. The proposed communication system si implemented with windows 95 visual C++ 5.0 imported open inventor library on pentium 233 system. Experimented results show that the 3D system can solve the problems in 2D representation.

  • PDF

트리거 기반의 형성뷰 관리기법을 이용한 실시간 보고서 생성 모델 (A Realtime Report Generation Model using Mterialized View Management Technique Based on Database Trigger)

  • 최미란;전근환;현득창;신예호
    • 한국컴퓨터산업교육학회:학술대회논문집
    • /
    • 한국컴퓨터산업교육학회 2003년도 제4회 종합학술대회 논문집
    • /
    • pp.33-38
    • /
    • 2003
  • Reports have a significant meaning in time-constrained large transaction environments, such as airplane control systems or wargame simulations. This is due to the necessity of generating reports within a limited scope of time without restraining the operation performance of large transaction environments. In order to generate reports in large transaction environments while satisfying time - constrained requirements, this paper propose a model which combines the incremental operation mechanism and materialized view mechanism using triggers and stored procedures. Further, the implementation and evaluation of the preposed model provides analysis for model characteristics.

  • PDF

Brain-Operated Typewriter using the Language Prediction Model

  • Lee, Sae-Byeok;Lim, Heui-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권10호
    • /
    • pp.1770-1782
    • /
    • 2011
  • A brain-computer interface (BCI) is a communication system that translates brain activity into commands for computers or other devices. In other words, BCIs create a new communication channel between the brain and an output device by bypassing conventional motor output pathways consisting of nerves and muscles. This is particularly useful for facilitating communication for people suffering from paralysis. Due to the low bit rate, it takes much more time to translate brain activity into commands. Especially it takes much time to input characters by using BCI-based typewriters. In this paper, we propose a brain-operated typewriter which is accelerated by a language prediction model. The proposed system uses three kinds of strategies to improve the entry speed: word completion, next-syllable prediction, and next word prediction. We found that the entry speed of BCI-based typewriter improved about twice as much through our demonstration which utilized the language prediction model.

Propagation Measurements and Estimation of Channel Propagation Models in Urban Environment

  • Zakaria, Yahia;Ivanek, Lubomir;Glesk, Ivan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권5호
    • /
    • pp.2453-2467
    • /
    • 2017
  • Wireless communication is a telecommunication technology, which enables wireless transmission between the portable devices to provide wireless access in all types of environments. In this research, the measurements and various empirical models are analysed and compared in order to find out a suitable propagation model to provide guidelines for cell planning of wireless communication systems. The measured data was taken in urban region with low vegetation and some trees at 900 MHz frequency band. Path loss models are useful planning tools, which permit the designers of cellular communication to obtain optimal levels for the base station deployment and meeting the expected service level requirements. Outcomes show that these empirical models tend to overestimate the propagation loss. As one of the key outputs, it was observed that the calculations of Weissberger model fit with the measured data in urban environment.

웹 기반 실시간 모니터링 시스템의 구조 (Architecture of Web-Based Real-Time Monitoring Systems)

  • 박홍성;정명순;김봉순
    • 제어로봇시스템학회논문지
    • /
    • 제7권7호
    • /
    • pp.632-639
    • /
    • 2001
  • This paper proposes an improved architecture of web-based monitoring systems for monitor of processes in plants from the soft real-time point of view. The suggested model is designed to be able to guarantee the temporal and spatial consistency and transmit the monitoring data periodically via the intranet and the Internet. The model generates one thread for monitoring management, one DB thread, one common memory, and corresponding monitoring threads to clients. The monitoring thread is executed during the smaller time than the execution time of the process used in the conventional methods such as CGI and servlet method. The Java API for the server API, VRML, EAI(External Authoring Interface) and Java Applets for efficient dimensional WEB monitoring are used. The proposed model is implemented and tested for a FMS plant, Some examples show that the proposed model is useful one.

  • PDF

PSPICE Modeling of Commercial ICs for Switch-Mode Power Supply (SMPS) Design and Simulation

  • Yi, Yun-Jae;Yu, Yun-Seop
    • Journal of information and communication convergence engineering
    • /
    • 제9권1호
    • /
    • pp.74-77
    • /
    • 2011
  • PSPICE modeling of a commercial LED driver IC (TOP245P) and PC817A optocoupler is proposed for the switch-mode power supply (SMPS) (applicable to LED driver) design and simulation. An analog behavioral model of the TOP245P IC including the shunt regulator, under-voltage(UV) detection, over-voltage(OV) shut-down and SR flip-flop is developed by using PSPICE. The empirical equation of PC817A current transfer ratio (CTR) is fitted from the datasheet of PC817A. Two types of SMPSs are simulated with the averaged-model and switching-model. The simulation results by the proposed PSPICE models are in good agreement with those in the data sheet and an experimental data.

Use case model의 상세화에 따른 consistency checking 방법에 관한 연구 (Automated consistency checking method in use case model at the level of abstraction)

  • 이은영;백인섭;심우곤
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2003년도 추계학술발표논문집 (하)
    • /
    • pp.1685-1688
    • /
    • 2003
  • 객체지향 환경에서 복잡한 소프트웨어 시스템을 개발하기 위해서는, 그것의 복잡성과 대규모성 때문에 추상화에 의한 다계층적인 use case model 의 사용이 불가피하다. 이러한 경우 모델의 consistency 유지가 매우 주요하고 어려운 이슈가 된다. 본 논문에서는 각 추상화 단계에 따른 use case model 들 사이에서 자동적으로 형식적인 consistency 를 체킹할 수 있는 방법을 제안한다. 이 접근 방법은 rule 을 기반으로 하여 actor tree, use cose composition diagram를 use case description을 활용한다. 본 접근법을 검증하기 위하여, ITS 아키텍처 (Intelligent Transportation System architecture)의 한 파트를 예로 들어 적용하였다.

  • PDF