Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 4 de 4
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
IEEE Trans Cybern ; PP2024 Jan 08.
Artigo em Inglês | MEDLINE | ID: mdl-38190687

RESUMO

The goal of constrained multiobjective evolutionary optimization is to obtain a set of well-converged and well-distributed feasible solutions. To achieve this goal, a delicate tradeoff must be struck among feasibility, diversity, and convergence. However, balancing these three elements simultaneously through a single tradeoff model is nontrivial, mainly because the significance of each element varies in different evolutionary phases. As an alternative approach, we adapt distinct tradeoff models in various phases and introduce a novel algorithm named adaptive tradeoff model with reference points (ATM-R). In the infeasible phase, ATM-R takes the tradeoff between diversity and feasibility into account, aiming to move the population toward feasible regions from diverse search directions. In the semi-feasible phase, ATM-R promotes the transition from "the tradeoff between feasibility and diversity" to "the tradeoff between diversity and convergence." This transition is instrumental in discovering an adequate number of feasible regions and accelerating the search for feasible Pareto optima in succession. In the feasible phase, ATM-R places an emphasis on balancing diversity and convergence to obtain a set of feasible solutions that are both well-converged and well-distributed. It is worth noting that the merits of reference points are leveraged in ATM-R to accomplish these tradeoff models. Also, in ATM-R, a multiphase mating selection strategy is developed to generate promising solutions beneficial to different evolutionary phases. Systemic experiments on a diverse set of benchmark test functions and real-world problems demonstrate that ATM-R is effective. When compared to eight state-of-the-art constrained multiobjective optimization evolutionary algorithms, ATM-R consistently demonstrates its competitive performance.

2.
Artigo em Inglês | MEDLINE | ID: mdl-37224361

RESUMO

The construction of undetectable adversarial examples with few perturbances remains a difficult problem in adversarial attacks. At present, most solutions use the standard gradient optimization algorithm to build adversarial examples by applying global perturbations to benign samples and then launch attacks on the targets (e.g., face recognition systems). However, when the perturbance size is limited, the performance of these approaches suffers substantially. The content of crucial places in an image, on the other hand, will impact the final prediction; if these areas can be investigated and limited perturbances introduced, an acceptable adversarial example will be constructed. Based on the foregoing research, this article offers a dual attention adversarial network (DAAN) to produce adversarial examples with limited perturbations. DAAN initially searches for effective areas in an input image using the spatial attention network and channel attention network, and then creates space and channel weights. Following that, these weights direct an encoder and a decoder to generate effective perturbation, which is then combined with the input to produce an adversarial example. Finally, the discriminator determines if the created adversarial examples are true or false, and the attacked model is utilized to determine whether the generated samples fit the attack targets. Extensive studies on various datasets show that DAAN not only delivers the best attack performance across all comparison algorithms with few perturbations, but it can also significantly improve the defensiveness of the attacked models.

3.
Neural Comput Appl ; : 1-11, 2022 Jun 28.
Artigo em Inglês | MEDLINE | ID: mdl-35789916

RESUMO

Graphs are widespread in many real-life practical applications. One of a graph's fundamental and popular researches is investigating the relations between two given vertices. The relationship between nodes in the graph can be measured by the shortest distance. Moreover, the number of paths is also a popular metric to assess the relationship of different nodes. In many location-based services, users make decisions on the basis of both the two metrics. To address this problem, we propose a new hybrid-metric based on the number of paths with a distance constraint for road networks, which are special graphs. Based on it, a most relevant node query on road networks is identified. To handle this problem, we first propose a Shortest-Distance Constrained DFS, which uses the shortest distance to prune unqualified nodes. To further improve query efficiency, we present Batch Query DFS algorithm, which only needs only one DFS search. Our experiments on four real-life road networks demonstrate the performance of the proposed algorithms.

4.
Sensors (Basel) ; 20(7)2020 Apr 01.
Artigo em Inglês | MEDLINE | ID: mdl-32244647

RESUMO

The smart robot is playing an increasingly important role in the social economy, and multi-robot systems will be an important development in robotics. With smart sensing systems, the communications between sensors, actuators, and edge computing systems and robots are prone to be attacked due to the highly dynamic and distributed environment. Since smart robots are often distributed in open environments, as well as due to their limited hardware resources and security protection capabilities, the security requirements of their keys cannot be met with traditional key distribution algorithms. In this paper, we propose a new mechanism of key establishment based on high-order polynomials to ensure the safe key generation and key distribution. Experiments show that the key establishment mechanism proposed in this paper guarantees the security of keys; its storage cost and communication cost are smaller than state-of-the-art mechanisms; and it allows robot components to join and leave the network dynamically, which is more suitable for multi-robot systems.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...