• 제목/요약/키워드: ML estimation

검색결과 226건 처리시간 0.028초

Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System

  • Khosravy, Mahdi;Nakamura, Kazuaki;Hirose, Yuki;Nitta, Naoko;Babaguchi, Noboru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권3호
    • /
    • pp.1100-1118
    • /
    • 2021
  • In a wide range of ML applications, the training data contains privacy-sensitive information that should be kept secure. Training the ML systems by privacy-sensitive data makes the ML model inherent to the data. As the structure of the model has been fine-tuned by training data, the model can be abused for accessing the data by the estimation in a reverse process called model inversion attack (MIA). Although, MIA has been applied to shallow neural network models of recognizers in literature and its threat in privacy violation has been approved, in the case of a deep learning (DL) model, its efficiency was under question. It was due to the complexity of a DL model structure, big number of DL model parameters, the huge size of training data, big number of registered users to a DL model and thereof big number of class labels. This research work first analyses the possibility of MIA on a deep learning model of a recognition system, namely a face recognizer. Second, despite the conventional MIA under the white box scenario of having partial access to the users' non-sensitive information in addition to the model structure, the MIA is implemented on a deep face recognition system by just having the model structure and parameters but not any user information. In this aspect, it is under a semi-white box scenario or in other words a gray-box scenario. The experimental results in targeting five registered users of a CNN-based face recognition system approve the possibility of regeneration of users' face images even for a deep model by MIA under a gray box scenario. Although, for some images the evaluation recognition score is low and the generated images are not easily recognizable, but for some other images the score is high and facial features of the targeted identities are observable. The objective and subjective evaluations demonstrate that privacy cyber-attack by MIA on a deep recognition system not only is feasible but also is a serious threat with increasing alert state in the future as there is considerable potential for integration more advanced ML techniques to MIA.

절삭가공에서 칩포머에 의한 절삭저항 (Cutting Force by Chip Former in Machining)

  • 최원식
    • 한국산업융합학회 논문집
    • /
    • 제7권4호
    • /
    • pp.325-330
    • /
    • 2004
  • The forces acting on the tool are an important aspect of maching. For those concerned with the manufacture of machine tools, a knowledge of the forces in needed for estimation of power reguirements and for the design of machine tool elements tool-holders and fixtures, adequately rigid and free from vibration. The force reguired to form the chip is dependent on the shear yield strength of the work material un der cutting conditions which are cutting speed, workpiece, feedrate, insert type. In this study, FG, ML, MP, MC, C, RT inserts were investigated in turning using SM45C, SCM4, SKD11, SUS316, materials. The diameter of materials was 60mm, 80mm, 110mm. This paper presents MP were lowest and SKD11 were largest of the workpiece in cutting forces.

  • PDF

Estimation and Prediction-Based Connection Admission Control in Broadband Satellite Systems

  • Jang, Yeong-Min
    • ETRI Journal
    • /
    • 제22권4호
    • /
    • pp.40-50
    • /
    • 2000
  • We apply a "sliding-window" Maximum Likelihood(ML) estimator to estimate traffic parameters On-Off source and develop a method for estimating stochastic predicted individual cell arrival rates. Based on these results, we propose a simple Connection Admission Control(CAC)scheme for delay sensitive services in broadband onboard packet switching satellite systems. The algorithms are motivated by the limited onboard satellite buffer, the large propagation delay, and low computational capabilities inherent in satellite communication systems. We develop an algorithm using the predicted individual cell loss ratio instead of using steady state cell loss ratios. We demonstrate the CAC benefits of this approach over using steady state cell loss ratios as well as predicted total cell loss ratios. We also derive the predictive saturation probability and the predictive cell loss ratio and use them to control the total number of connections. Predictive congestion control mechanisms allow a satellite network to operate in the optimum region of low delay and high throughput. This is different from the traditional reactive congestion control mechanism that allows the network to recover from the congested state. Numerical and simulation results obtained suggest that the proposed predictive scheme is a promising approach for real time CAC.

  • PDF

DS/SS CDMA 시스템 하에서 유사임의 코드 획득을 위한 reference code 설계 (A reference code design for PN code acquisition in DS/SS CDMA systems)

  • 원승환;장승용;김운경
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 추계종합학술대회 논문집(1)
    • /
    • pp.65-68
    • /
    • 2000
  • In CDMA, the currently used PN code acquisition methods detect the phase of the incoming PN signal on the basis of ML estimation. In serial search strategy, it takes relatively long time for PN code acquisition. A study related to reduce processing time of PN code acquisition is important. Therefore we propose a reference code design for a new algorithm that a reference code and the received PN code are fully correlated to detect the transmitted PN code, in detail, the relative phase offset j of c⒡. After choosing two weight factors, we show the mathematical analysis and derivation for the reference code design.

  • PDF

수중음향 MIMO 채널에서 VBLAST 검파방식의 성능분석 (BER Performance Analysis of VBLAST Detection over an Underwater Acoustic MIMO Channel)

  • 강희훈
    • 전자공학회논문지
    • /
    • 제53권8호
    • /
    • pp.145-149
    • /
    • 2016
  • 수중음파통신은 지상과는 다른 환경적 문제에 의해 고속 데이터 전송률을 얻기 위해서는 여러 가지 어려움이 있다. 고속 데이터 전송을 위해서 다중안테나 전송방식에 대해서 많은 연구가 진행되고 있다. V-BLAST 알고리즘은 무선통신에서 다중안테나 전송방식에 적용되고 검파방식이다. 본 논문에서는 수중음파채널에 대해서 여 MIMO 시스템의 VBLAST 검파 방식에 대해서 성능을 분석한다.

THRESHOLD MODELING FOR BIFURCATING AUTOREGRESSION AND LARGE SAMPLE ESTIMATION

  • Hwang, S.Y.;Lee, Sung-Duck
    • Journal of the Korean Statistical Society
    • /
    • 제35권4호
    • /
    • pp.409-417
    • /
    • 2006
  • This article is concerned with threshold modeling of the bifurcating autoregressive model (BAR) originally suggested by Cowan and Staudte (1986) for tree structured data of cell lineage study where each individual $(X_t)$ gives rise to two off-spring $(X_{2t},\;X_{2t+1})$ in the next generation. The triplet $(X_t,\;X_{2t},\;X_{2t+1})$ refers to mother-daughter relationship. In this paper we propose a threshold model incorporating the difference of 'fertility' of the mother for the first and second off-springs, and thereby extending BAR to threshold-BAR (TBAR, for short). We derive a sufficient condition of stationarity for the suggested TBAR model. Also various inferential methods such as least squares (LS), maximum likelihood (ML) and quasi-likelihood (QL) methods are discussed and relevant limiting distributions are obtained.

CHAIN DEPENDENCE AND STATIONARITY TEST FOR TRANSITION PROBABILITIES OF MARKOV CHAIN UNDER LOGISTIC REGRESSION MODEL

  • Sinha Narayan Chandra;Islam M. Ataharul;Ahmed Kazi Saleh
    • Journal of the Korean Statistical Society
    • /
    • 제35권4호
    • /
    • pp.355-376
    • /
    • 2006
  • To identify whether the sequence of observations follows a chain dependent process and whether the chain dependent or repeated observations follow stationary process or not, alternative procedures are suggested in this paper. These test procedures are formulated on the basis of logistic regression model under the likelihood ratio test criterion and applied to the daily rainfall occurrence data of Bangladesh for selected stations. These test procedures indicate that the daily rainfall occurrences follow a chain dependent process, and the different types of transition probabilities and overall transition probabilities of Markov chain for the occurrences of rainfall follow a stationary process in the Mymensingh and Rajshahi areas, and non-stationary process in the Chittagong, Faridpur and Satkhira areas.

Performance of differential Space-time Block Coded MIMO System using Cyclic Delay Diversity

  • Kim, Yoon-Hyun;Yang, Jae-Soo;Kim, Jin-Young
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2007년도 학술대회
    • /
    • pp.41-45
    • /
    • 2007
  • Multi-input multi-output (MIMO) system can increase data rate, capacity and bit error rate (BER) performance compare to traditional single antenna system. However MIMO technique is pointed out the problem that has high complexity to design receiver. So a recent trend of research on the MIMO system pays more attention to simplified implementation of receiver structure. In this paper, we propose differential space time block code (STBC) for MIMO system with cyclic delay diversity (CDD). This structure can provide a very close performance to that of the conventional diversity scheme with maximum likelihood (ML) detection without channel estimation block while the receiver structure is highly simplified. Bit error rate (BER) performance of the proposed system is simulated for an AWGN channel by theoretical and simulated approaches. The results of this paper can be applicable to the 4G mobile multimedia communication systems.

  • PDF

Lattice형 공간정보의 선형모형 추정방법 (Estimation Methods for Linear Spatial Model on Lattice)

  • 권오룡;염준근
    • 한국정보처리학회논문지
    • /
    • 제3권1호
    • /
    • pp.153-159
    • /
    • 1996
  • 공간자료의 선형모형은 지역적 특성과 해당지역의 격자형태의 통계량을 처리하여 추정하는 방법을 제시하고, 이에 대한 사례연구를 통하여 공간모형을 추정하여, 희귀 분석방법과의 효율성을 비교 분석하였다. 공간정보의 모형추정은 최근에 국내 소개 되 었으며, 격자형 공간정보의 자기상관 여부는 Moran의 지수 및 이에 대한 Correlograms를 통하여 자료간의 인접성 유무를 식별할 수 있다. 따라서 공간 모형의 희귀추정에서 상관 계수 $ ho$의 최우추정방법은 많은 컴퓨터 시간 및 경비가 소요되어 eigenvalue에 의한 방법으로 개선하였다. 캘리포니아주의 해안선과 육지지역의 식물종수에 대한 공간정 보의 희귀모형을 추정하였다.

  • PDF

최적화된 PN Code Acquisition에 대한 연구 (On Optimal PN Code Acquisition)

  • Jang, U-Jin
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1998년도 하계종합학술대회논문집
    • /
    • pp.23-25
    • /
    • 1998
  • Many of the currently used PN code acquisition algorithms detect the phase of the incoming PN signal on the basis of ML estimation principle and utilize statistics grounded in taking inner products. By showing that any set of 2n-1 PN sequences arising in SSRG or MSRG (those typically used in IS'95 implementations) configuration constitutes a linearly independent set and that the number of candidate PN sequences has to equal the dimension of the span of the candidate PN sequences, we prove that the lowerbounding computational complexity involved in any PN code acquistion, utilizing (only) inner product computations at each stage of acquisition, corresponds precisely to those, such as double dwell acquistion circuitries, currently used.

  • PDF