يعرض 1 - 10 نتائج من 568 نتيجة بحث عن '"Wu, Bang"', وقت الاستعلام: 1.53s تنقيح النتائج
  1. 1
    تقرير

    مصطلحات موضوعية: Computer Science - Cryptography and Security

    الوصف: The prosperity of Decentralized Finance (DeFi) unveils underlying risks, with reported losses surpassing 3.2 billion USD between 2018 and 2022 due to vulnerabilities in Decentralized Applications (DApps). One significant threat is the Price Manipulation Attack (PMA) that alters asset prices during transaction execution. As a result, PMA accounts for over 50 million USD in losses. To address the urgent need for efficient PMA detection, this paper introduces a novel detection service, DeFiGuard, using Graph Neural Networks (GNNs). In this paper, we propose cash flow graphs with four distinct features, which capture the trading behaviors from transactions. Moreover, DeFiGuard integrates transaction parsing, graph construction, model training, and PMA detection. Evaluations on a dataset of 208 PMA and 2,080 non-PMA transactions show that DeFiGuard with GNN models outperforms the baseline in Accuracy, TPR, FPR, and AUC-ROC. The results of ablation studies suggest that the combination of the four proposed node features enhances DeFiGuard's efficacy. Moreover, DeFiGuard classifies transactions within 0.892 to 5.317 seconds, which provides sufficient time for the victims (DApps and users) to take action to rescue their vulnerable funds. In conclusion, this research offers a significant step towards safeguarding the DeFi landscape from PMAs using GNNs.
    Comment: 13 pages, 7 figures

    الوصول الحر: http://arxiv.org/abs/2406.11157Test

  2. 2
    تقرير

    مصطلحات موضوعية: Computer Science - Machine Learning

    الوصف: Graph unlearning has emerged as an essential tool for safeguarding user privacy and mitigating the negative impacts of undesirable data. Meanwhile, the advent of dynamic graph neural networks (DGNNs) marks a significant advancement due to their superior capability in learning from dynamic graphs, which encapsulate spatial-temporal variations in diverse real-world applications (e.g., traffic forecasting). With the increasing prevalence of DGNNs, it becomes imperative to investigate the implementation of dynamic graph unlearning. However, current graph unlearning methodologies are designed for GNNs operating on static graphs and exhibit limitations including their serving in a pre-processing manner and impractical resource demands. Furthermore, the adaptation of these methods to DGNNs presents non-trivial challenges, owing to the distinctive nature of dynamic graphs. To this end, we propose an effective, efficient, model-agnostic, and post-processing method to implement DGNN unlearning. Specifically, we first define the unlearning requests and formulate dynamic graph unlearning in the context of continuous-time dynamic graphs. After conducting a role analysis on the unlearning data, the remaining data, and the target DGNN model, we propose a method called Gradient Transformation and a loss function to map the unlearning request to the desired parameter update. Evaluations on six real-world datasets and state-of-the-art DGNN backbones demonstrate its effectiveness (e.g., limited performance drop even obvious improvement) and efficiency (e.g., at most 7.23$\times$ speed-up) outperformance, and potential advantages in handling future unlearning requests (e.g., at most 32.59$\times$ speed-up).

    الوصول الحر: http://arxiv.org/abs/2405.14407Test

  3. 3
    دورية أكاديمية

    المصدر: Brazilian Journal of Medical and Biological Research. January 2019 52(1)

    مصطلحات موضوعية: YAP, Fibroblast, Cardiac remodeling, Dilated cardiomyopathy

    الوصف: Yes-associated protein (YAP) is an important regulator of cellular proliferation and transdifferentiation. However, little is known about the mechanisms underlying myofibroblast transdifferentiation in dilated cardiomyopathy (DCM). We investigated the role of YAP in the pathological process of cardiac matrix remodeling. A classic model of DCM was established in BALB/c mice by immunization with porcine cardiac myosin. Cardiac fibroblasts were isolated from neonatal Sprague-Dawley rats by density gradient centrifugation. The expression levels of α-smooth muscle actin (α-SMA) and collagen volume fraction (CVF) were significantly increased in DCM mice. Angiotensin II (Ang II)-mediated YAP activation promoted the proliferation and transdifferentiation of neonatal rat cardiac fibroblasts, and this effect was significantly suppressed in the shRNA YAP + Ang II group compared with the shRNA Control + Ang II group in vitro (2.98±0.34 ×105 vs 5.52±0.82 ×105, P<0.01). Inhibition of endogenous Ang II-stimulated YAP improved the cardiac function by targeting myofibroblast transdifferentiation to attenuate matrix remodeling in vivo. In the valsartan group, left ventricular ejection fraction and fractional shortening were significantly increased compared with the DCM group (52.72±5.51% vs 44.46±3.01%, P<0.05; 34.84±3.85% vs 26.65±3.12%, P<0.01). Our study demonstrated that YAP was a regulator of cardiac myofibroblast differentiation, and regulation of YAP signaling pathway contributed to improve cardiac function of DCM mice, possibly in part by decreasing myofibroblast transdifferentiation to inhibit matrix remodeling.

    وصف الملف: text/html

  4. 4
    تقرير

    الوصف: Resonance fluorescence (RF) of a two-level emitter displays persistently anti-bunching irrespective of the excitation intensity, but inherits the driving laser's linewidth under weak excitation. These properties are commonly explained disjoinedly as the emitter's single photon saturation or passively scattering light, until a recent theory attributes anti-bunching to the laser-like spectrum's interference with the incoherently scattered light. However, the theory implies higher-order scattering processes, and led to an experiment purporting to validate an atom's simultaneous scattering of two photons. If true, it could complicate RF's prospects in quantum information applications. Here, we propose a unified model that treats all RF photons as spontaneous emission, one at a time, and can explain simultaneously both the RF's spectral and correlation properties. We theoretically derive the excitation power dependencies, with the strongest effects measurable at the single-photon incidence level, of the first-order coherence of the whole RF and super-bunching of the spectrally filtered, followed by experimental confirmation on a semiconductor quantum dot micro-pillar device. Furthermore, our model explains peculiar coincidence bunching observed in phase-dependent two-photon interference experiments. Our work provides novel understandings of coherent light-matter interaction and may stimulate new applications.
    Comment: Equation 4 is updated to cover all two-level emitters, with or without a cavity

    الوصول الحر: http://arxiv.org/abs/2312.13743Test

  5. 5
    تقرير

    مصطلحات موضوعية: Computer Science - Cryptography and Security

    الوصف: The deployment of Graph Neural Networks (GNNs) within Machine Learning as a Service (MLaaS) has opened up new attack surfaces and an escalation in security concerns regarding model-centric attacks. These attacks can directly manipulate the GNN model parameters during serving, causing incorrect predictions and posing substantial threats to essential GNN applications. Traditional integrity verification methods falter in this context due to the limitations imposed by MLaaS and the distinct characteristics of GNN models. In this research, we introduce a groundbreaking approach to protect GNN models in MLaaS from model-centric attacks. Our approach includes a comprehensive verification schema for GNN's integrity, taking into account both transductive and inductive GNNs, and accommodating varying pre-deployment knowledge of the models. We propose a query-based verification technique, fortified with innovative node fingerprint generation algorithms. To deal with advanced attackers who know our mechanisms in advance, we introduce randomized fingerprint nodes within our design. The experimental evaluation demonstrates that our method can detect five representative adversarial model-centric attacks, displaying 2 to 4 times greater efficiency compared to baselines.

    الوصول الحر: http://arxiv.org/abs/2312.07870Test

  6. 6
    تقرير

    الوصف: The emergence of Graph Neural Networks (GNNs) in graph data analysis and their deployment on Machine Learning as a Service platforms have raised critical concerns about data misuse during model training. This situation is further exacerbated due to the lack of transparency in local training processes, potentially leading to the unauthorized accumulation of large volumes of graph data, thereby infringing on the intellectual property rights of data owners. Existing methodologies often address either data misuse detection or mitigation, and are primarily designed for local GNN models rather than cloud-based MLaaS platforms. These limitations call for an effective and comprehensive solution that detects and mitigates data misuse without requiring exact training data while respecting the proprietary nature of such data. This paper introduces a pioneering approach called GraphGuard, to tackle these challenges. We propose a training-data-free method that not only detects graph data misuse but also mitigates its impact via targeted unlearning, all without relying on the original training data. Our innovative misuse detection technique employs membership inference with radioactive data, enhancing the distinguishability between member and non-member data distributions. For mitigation, we utilize synthetic graphs that emulate the characteristics previously learned by the target model, enabling effective unlearning even in the absence of exact graph data. We conduct comprehensive experiments utilizing four real-world graph datasets to demonstrate the efficacy of GraphGuard in both detection and unlearning. We show that GraphGuard attains a near-perfect detection rate of approximately 100% across these datasets with various GNN models. In addition, it performs unlearning by eliminating the impact of the unlearned graph with a marginal decrease in accuracy (less than 5%).

    الوصول الحر: http://arxiv.org/abs/2312.07861Test

  7. 7
    تقرير

    المصدر: Optica 10, 1118 (2023)

    مصطلحات موضوعية: Quantum Physics, Condensed Matter - Materials Science

    الوصف: Resonant excitation is an essential tool in the development of semiconductor quantum dots (QDs) for quantum information processing. One central challenge is to enable a transparent access to the QD signal without post-selection information loss. A viable path is through cavity enhancement, which has successfully lifted the resonantly scattered field strength over the laser background under \emph{weak} excitation. Here, we extend this success to the \emph{saturation} regime using a QD-micropillar device with a Purcell factor of 10.9 and an ultra-low background cavity reflectivity of just 0.0089. We achieve a signal to background ratio of 50 and an overall system responsivity of 3~\%, i.e., we detect on average 0.03 resonantly scattered single photons for every incident laser photon. Raising the excitation to the few-photon level, the QD response is brought into saturation where we observe the Mollow triplets as well as the associated cascade single photon emissions, without resort to any laser background rejection technique. Our work offers a new perspective toward QD cavity interface that is not restricted by the laser background.
    Comment: 8 Figures and 9 Pages. Comments are welcome

    الوصول الحر: http://arxiv.org/abs/2305.12719Test

  8. 8
    تقرير

    مصطلحات موضوعية: Computer Science - Software Engineering

    الوصف: The function call graph (FCG) based Android malware detection methods have recently attracted increasing attention due to their promising performance. However, these methods are susceptible to adversarial examples (AEs). In this paper, we design a novel black-box AE attack towards the FCG based malware detection system, called BagAmmo. To mislead its target system, BagAmmo purposefully perturbs the FCG feature of malware through inserting "never-executed" function calls into malware code. The main challenges are two-fold. First, the malware functionality should not be changed by adversarial perturbation. Second, the information of the target system (e.g., the graph feature granularity and the output probabilities) is absent. To preserve malware functionality, BagAmmo employs the try-catch trap to insert function calls to perturb the FCG of malware. Without the knowledge about feature granularity and output probabilities, BagAmmo adopts the architecture of generative adversarial network (GAN), and leverages a multi-population co-evolution algorithm (i.e., Apoem) to generate the desired perturbation. Every population in Apoem represents a possible feature granularity, and the real feature granularity can be achieved when Apoem converges. Through extensive experiments on over 44k Android apps and 32 target models, we evaluate the effectiveness, efficiency and resilience of BagAmmo. BagAmmo achieves an average attack success rate of over 99.9% on MaMaDroid, APIGraph and GCN, and still performs well in the scenario of concept drift and data imbalance. Moreover, BagAmmo outperforms the state-of-the-art attack SRL in attack success rate.

    الوصول الحر: http://arxiv.org/abs/2303.08509Test

  9. 9
    تقرير

    الوصف: Graph neural networks (GNNs) have emerged as a series of competent graph learning methods for diverse real-world scenarios, ranging from daily applications like recommendation systems and question answering to cutting-edge technologies such as drug discovery in life sciences and n-body simulation in astrophysics. However, task performance is not the only requirement for GNNs. Performance-oriented GNNs have exhibited potential adverse effects like vulnerability to adversarial attacks, unexplainable discrimination against disadvantaged groups, or excessive resource consumption in edge computing environments. To avoid these unintentional harms, it is necessary to build competent GNNs characterised by trustworthiness. To this end, we propose a comprehensive roadmap to build trustworthy GNNs from the view of the various computing technologies involved. In this survey, we introduce basic concepts and comprehensively summarise existing efforts for trustworthy GNNs from six aspects, including robustness, explainability, privacy, fairness, accountability, and environmental well-being. Additionally, we highlight the intricate cross-aspect relations between the above six aspects of trustworthy GNNs. Finally, we present a thorough overview of trending directions for facilitating the research and industrialisation of trustworthy GNNs.
    Comment: 42 pages, 7 tables, 4 figures, double columns, accepted by Proceedings of the IEEE

    الوصول الحر: http://arxiv.org/abs/2205.07424Test

  10. 10
    دورية أكاديمية