-
A Bayesian multiscale CNN framework to predict local stress fields in structures with microscale features
Authors:
Vasilis Krokos,
Viet Bui Xuan,
Stéphane P. A. Bordas,
Philippe Young,
Pierre Kerfriden
Abstract:
Multiscale computational modelling is challenging due to the high computational cost of direct numerical simulation by finite elements. To address this issue, concurrent multiscale methods use the solution of cheaper macroscale surrogates as boundary conditions to microscale sliding windows. The microscale problems remain a numerically challenging operation both in terms of implementation and cost…
▽ More
Multiscale computational modelling is challenging due to the high computational cost of direct numerical simulation by finite elements. To address this issue, concurrent multiscale methods use the solution of cheaper macroscale surrogates as boundary conditions to microscale sliding windows. The microscale problems remain a numerically challenging operation both in terms of implementation and cost. In this work we propose to replace the local microscale solution by an Encoder-Decoder Convolutional Neural Network that will generate fine-scale stress corrections to coarse predictions around unresolved microscale features, without prior parametrisation of local microscale problems. We deploy a Bayesian approach providing credible intervals to evaluate the uncertainty of the predictions, which is then used to investigate the merits of a selective learning framework. We will demonstrate the capability of the approach to predict equivalent stress fields in porous structures using linearised and finite strain elasticity theories.
△ Less
Submitted 19 January, 2022; v1 submitted 17 December, 2020;
originally announced December 2020.
-
Active Fuzzing for Testing and Securing Cyber-Physical Systems
Authors:
Yuqi Chen,
Bohan Xuan,
Christopher M. Poskitt,
Jun Sun,
Fan Zhang
Abstract:
Cyber-physical systems (CPSs) in critical infrastructure face a pervasive threat from attackers, motivating research into a variety of countermeasures for securing them. Assessing the effectiveness of these countermeasures is challenging, however, as realistic benchmarks of attacks are difficult to manually construct, blindly testing is ineffective due to the enormous search spaces and resource re…
▽ More
Cyber-physical systems (CPSs) in critical infrastructure face a pervasive threat from attackers, motivating research into a variety of countermeasures for securing them. Assessing the effectiveness of these countermeasures is challenging, however, as realistic benchmarks of attacks are difficult to manually construct, blindly testing is ineffective due to the enormous search spaces and resource requirements, and intelligent fuzzing approaches require impractical amounts of data and network access. In this work, we propose active fuzzing, an automatic approach for finding test suites of packet-level CPS network attacks, targeting scenarios in which attackers can observe sensors and manipulate packets, but have no existing knowledge about the payload encodings. Our approach learns regression models for predicting sensor values that will result from sampled network packets, and uses these predictions to guide a search for payload manipulations (i.e. bit flips) most likely to drive the CPS into an unsafe state. Key to our solution is the use of online active learning, which iteratively updates the models by sampling payloads that are estimated to maximally improve them. We evaluate the efficacy of active fuzzing by implementing it for a water purification plant testbed, finding it can automatically discover a test suite of flow, pressure, and over/underflow attacks, all with substantially less time, data, and network access than the most comparable approach. Finally, we demonstrate that our prediction models can also be utilised as countermeasures themselves, implementing them as anomaly detectors and early warning systems.
△ Less
Submitted 16 July, 2020; v1 submitted 28 May, 2020;
originally announced May 2020.
-
Defending Model Inversion and Membership Inference Attacks via Prediction Purification
Authors:
Ziqi Yang,
Bin Shao,
Bohan Xuan,
Ee-Chien Chang,
Fan Zhang
Abstract:
Neural networks are susceptible to data inference attacks such as the model inversion attack and the membership inference attack, where the attacker could infer the reconstruction and the membership of a data sample from the confidence scores predicted by the target classifier. In this paper, we propose a unified approach, namely purification framework, to defend data inference attacks. It purifie…
▽ More
Neural networks are susceptible to data inference attacks such as the model inversion attack and the membership inference attack, where the attacker could infer the reconstruction and the membership of a data sample from the confidence scores predicted by the target classifier. In this paper, we propose a unified approach, namely purification framework, to defend data inference attacks. It purifies the confidence score vectors predicted by the target classifier by reducing their dispersion. The purifier can be further specialized in defending a particular attack via adversarial learning. We evaluate our approach on benchmark datasets and classifiers. We show that when the purifier is dedicated to one attack, it naturally defends the other one, which empirically demonstrates the connection between the two attacks. The purifier can effectively defend both attacks. For example, it can reduce the membership inference accuracy by up to 15% and increase the model inversion error by a factor of up to 4. Besides, it incurs less than 0.4% classification accuracy drop and less than 5.5% distortion to the confidence scores.
△ Less
Submitted 20 August, 2020; v1 submitted 8 May, 2020;
originally announced May 2020.
-
Local Structure Theorems for Erdos Renyi Graphs and their Algorithmic Application
Authors:
Jan Dreier,
Philipp Kuinke,
Ba Le Xuan,
Peter Rossmanith
Abstract:
We analyze some local properties of sparse Erdos-Renyi graphs, where $d(n)/n$ is the edge probability. In particular we study the behavior of very short paths. For $d(n)=n^{o(1)}$ we show that $G(n,d(n)/n)$ has asymptotically almost surely (a.a.s.~) bounded local treewidth and therefore is a.a.s.~nowhere dense. We also discover a new and simpler proof that $G(n,d/n)$ has a.a.s.~bounded expansion f…
▽ More
We analyze some local properties of sparse Erdos-Renyi graphs, where $d(n)/n$ is the edge probability. In particular we study the behavior of very short paths. For $d(n)=n^{o(1)}$ we show that $G(n,d(n)/n)$ has asymptotically almost surely (a.a.s.~) bounded local treewidth and therefore is a.a.s.~nowhere dense. We also discover a new and simpler proof that $G(n,d/n)$ has a.a.s.~bounded expansion for constant~$d$. The local structure of sparse Erdos-Renyi Gaphs is very special: The $r$-neighborhood of a vertex is a tree with some additional edges, where the probability that there are $m$ additional edges decreases with~$m$. This implies efficient algorithms for subgraph isomorphism, in particular for finding subgraphs with small diameter. Finally we note that experiments suggest that preferential attachment graphs might have similar properties after deleting a small number of vertices.
△ Less
Submitted 25 January, 2018; v1 submitted 26 September, 2017;
originally announced September 2017.
-
Homogeneity vs. Adjacency: generalising some graph decomposition algorithms
Authors:
Binh Minh Bui Xuan,
Michel Habib,
Vincent Limouzy,
Fabien De Montgolfier
Abstract:
In this paper, a new general decomposition theory inspired from modular graph decomposition is presented. Our main result shows that, within this general theory, most of the nice algorithmic tools developed for modular decomposition are still efficient. This theory not only unifies the usual modular decomposition generalisations such as modular decomposition of directed graphs or decomposition o…
▽ More
In this paper, a new general decomposition theory inspired from modular graph decomposition is presented. Our main result shows that, within this general theory, most of the nice algorithmic tools developed for modular decomposition are still efficient. This theory not only unifies the usual modular decomposition generalisations such as modular decomposition of directed graphs or decomposition of 2-structures, but also star cutsets and bimodular decomposition. Our general framework provides a decomposition algorithm which improves the best known algorithms for bimodular decomposition.
△ Less
Submitted 13 March, 2006;
originally announced March 2006.