首页 > 最新文献

2020 16th International Conference on Computational Intelligence and Security (CIS)最新文献

英文 中文
Graph-based Bayesian Meta Relation Extraction 基于图的贝叶斯元关系提取
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00028
Zhen Wang, Zhenting Zhang
Meta-learning methods accomplish rapid adaptation to a new task using few samples by first learning an internal representation that matches with similar tasks. In this paper, we focus on few-shot relation extraction. Previous works in few-shot relation extraction aim at predicting the relation for a pair of entities in a sentence by training with a few labeled examples in each relation. However, these algorithms implicitly require that the meta-training tasks be mutually-exclusive, such that no single model can solve all of the tasks at once, which hampers the generalization ability of these methods. To more effectively generalize to new relations, in this paper we address this challenge by designing a meta-regularization objective. We propose a novel Bayesian meta-learning approach to effectively learn the prototype vectors of relations via regularization on weights, and a graph neural network (GNN) is used to parameterize the initial prior of the prototype vectors on the global relation graph. Our approach substantially outperforms standard algorithms, and experiments demonstrate the effectiveness of our proposed approach.
元学习方法通过首先学习与类似任务匹配的内部表示,使用少量样本实现对新任务的快速适应。本文主要研究少镜头关系的提取。以往的小样本关系抽取的目的是通过在每个关系中使用几个标记的示例进行训练来预测句子中一对实体的关系。然而,这些算法隐含地要求元训练任务是互斥的,因此没有一个模型可以一次解决所有任务,这阻碍了这些方法的泛化能力。为了更有效地推广到新的关系,在本文中,我们通过设计一个元正则化目标来解决这个挑战。提出了一种新的贝叶斯元学习方法,通过对权值的正则化来有效地学习关系的原型向量,并利用图神经网络(GNN)在全局关系图上参数化原型向量的初始先验。我们的方法大大优于标准算法,实验证明了我们提出的方法的有效性。
{"title":"Graph-based Bayesian Meta Relation Extraction","authors":"Zhen Wang, Zhenting Zhang","doi":"10.1109/CIS52066.2020.00028","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00028","url":null,"abstract":"Meta-learning methods accomplish rapid adaptation to a new task using few samples by first learning an internal representation that matches with similar tasks. In this paper, we focus on few-shot relation extraction. Previous works in few-shot relation extraction aim at predicting the relation for a pair of entities in a sentence by training with a few labeled examples in each relation. However, these algorithms implicitly require that the meta-training tasks be mutually-exclusive, such that no single model can solve all of the tasks at once, which hampers the generalization ability of these methods. To more effectively generalize to new relations, in this paper we address this challenge by designing a meta-regularization objective. We propose a novel Bayesian meta-learning approach to effectively learn the prototype vectors of relations via regularization on weights, and a graph neural network (GNN) is used to parameterize the initial prior of the prototype vectors on the global relation graph. Our approach substantially outperforms standard algorithms, and experiments demonstrate the effectiveness of our proposed approach.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128567004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Differential Evolution for Constrained Multi-Objective Optimization Problems 约束多目标优化问题的改进差分进化
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00064
Erping Song, Hecheng Li, Cuo Wanma
The constrained multi-objective optimization problems (CMOPs) is widely used in real-world applications and always hard to handle especially when the objective number becomes more or the constraints are too stringent. In this manuscript, an improved differential evolution method (IDEM) is proposed based on CMOEA/D as well as newly designed mutation operators. Firstly, one mutation operator is presented to improve infeasible points, in which any infeasible point is taken to divide other points into three groups by using the constraint violation information, and based on the division, a potential better point can be found and utilized to improve other infeasible points by the mutation operation. Then the other mutation operator is provided by designing an objective sorting scheme as well as an individual selection method. These two mutation operators are alternately and self- adaptively adopted in evolution process. Finally, the proposed algorithm is executed on some recent benchmark functions and compared with four state-of-the-art EMO algorithms. The experimental results show that IDEM can efficiently solve the CMOPs.
约束多目标优化问题在实际应用中有着广泛的应用,但在目标数量较多或约束条件过于严格的情况下往往难以处理。本文提出了一种基于CMOEA/D和新设计的突变算子的改进差分进化方法(IDEM)。首先,提出一种改进不可行点的变异算子,其中任意一个不可行点利用约束违反信息将其他不可行点分成三组,在此基础上找到一个可能更好的点,并通过变异操作对其他不可行点进行改进。然后通过设计一种客观排序方案和个体选择方法来提供另一个突变算子。这两种变异算子在进化过程中是交替自适应的。最后,在一些最新的基准函数上执行了该算法,并与四种最先进的EMO算法进行了比较。实验结果表明,IDEM可以有效地求解cmp问题。
{"title":"An Improved Differential Evolution for Constrained Multi-Objective Optimization Problems","authors":"Erping Song, Hecheng Li, Cuo Wanma","doi":"10.1109/CIS52066.2020.00064","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00064","url":null,"abstract":"The constrained multi-objective optimization problems (CMOPs) is widely used in real-world applications and always hard to handle especially when the objective number becomes more or the constraints are too stringent. In this manuscript, an improved differential evolution method (IDEM) is proposed based on CMOEA/D as well as newly designed mutation operators. Firstly, one mutation operator is presented to improve infeasible points, in which any infeasible point is taken to divide other points into three groups by using the constraint violation information, and based on the division, a potential better point can be found and utilized to improve other infeasible points by the mutation operation. Then the other mutation operator is provided by designing an objective sorting scheme as well as an individual selection method. These two mutation operators are alternately and self- adaptively adopted in evolution process. Finally, the proposed algorithm is executed on some recent benchmark functions and compared with four state-of-the-art EMO algorithms. The experimental results show that IDEM can efficiently solve the CMOPs.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122412252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of the EfficientDet Algorithm in Traffic Flow Statistics EfficientDet算法在交通流统计中的应用
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00038
Kaihao Lin, Junyan Chen, Aoge Chen, Hu Huang
With the continuous development of artificial intelligence technology, deep learning technology is used to process a large number of real-time traffic scene information helping the management of public transportation, and traffic flow statistics can reflect the real-time traffic conditions. The paper uses the EfficientDet target detection algorithm to detect and analyze the traffic video frame information and carry out statistics of vehicle and pedestrian flow at traffic intersections.The system can calculate the vehicle speed and perceive the degree of traffic congestion in real-time. It's convenient for the traffic department to increase the utilization rate of the road.
随着人工智能技术的不断发展,利用深度学习技术处理大量的实时交通场景信息,帮助公共交通的管理,交通流量统计可以反映实时的交通状况。本文采用EfficientDet目标检测算法对交通视频帧信息进行检测和分析,对交通路口的车辆流量和行人流量进行统计。该系统可以实时计算车辆行驶速度,感知交通拥堵程度。这有利于交通部门提高道路的利用率。
{"title":"Application of the EfficientDet Algorithm in Traffic Flow Statistics","authors":"Kaihao Lin, Junyan Chen, Aoge Chen, Hu Huang","doi":"10.1109/CIS52066.2020.00038","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00038","url":null,"abstract":"With the continuous development of artificial intelligence technology, deep learning technology is used to process a large number of real-time traffic scene information helping the management of public transportation, and traffic flow statistics can reflect the real-time traffic conditions. The paper uses the EfficientDet target detection algorithm to detect and analyze the traffic video frame information and carry out statistics of vehicle and pedestrian flow at traffic intersections.The system can calculate the vehicle speed and perceive the degree of traffic congestion in real-time. It's convenient for the traffic department to increase the utilization rate of the road.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127703460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attacking FPGA-based Dual Complementary AES Implementation Using HD and SD Models 利用高清和SD模型攻击基于fpga的双互补AES实现
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00066
Wenlong Cao, Fan Huang, Mengce Zheng, Honggang Hu
Field-programmable gate arrays (FPGAs) are widely used in many fields because of their low power consumption, easy design and good performance. For applications running on FPGAs, security is very important. A lot of researches have been done on the security issue of FPGA implementations, many attacks and countermeasures have been proposed. The dual complementary strategy is a countermeasure designed to thwart side channel attacks. In this paper, we perform Correlation Power Analysis (CPA) against dual complementary AES implemented on the SAKURA-G FPGA board. For dual complementary AES with constant Hamming Weight (HW) value, which is demonstrated to be robust against CPA based on HW model, we successfully recover the secret key using Hamming Distance (HD) and Switching Distance (SD) models with 2,000 power traces. For dual complementary AES with constant HD, 16,000 resp. 10,000 power traces are required to recover the key with HD resp. SD model.
现场可编程门阵列(fpga)具有功耗低、设计简单、性能优良等优点,被广泛应用于许多领域。对于在fpga上运行的应用程序,安全性是非常重要的。人们对FPGA实现的安全问题进行了大量的研究,提出了许多攻击和对策。双互补策略是一种旨在阻止侧信道攻击的对策。在本文中,我们对SAKURA-G FPGA板上实现的双互补AES进行相关功率分析(CPA)。对于具有恒定汉明权值(HW)的双互补AES,基于HW模型证明了其对CPA的鲁棒性,我们使用2000个功率走线的汉明距离(HD)和交换距离(SD)模型成功地恢复了密钥。对于具有恒定高清的双互补AES, 16000帧。需要10000根电源走线才能用高清信号恢复密钥。SD模型。
{"title":"Attacking FPGA-based Dual Complementary AES Implementation Using HD and SD Models","authors":"Wenlong Cao, Fan Huang, Mengce Zheng, Honggang Hu","doi":"10.1109/CIS52066.2020.00066","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00066","url":null,"abstract":"Field-programmable gate arrays (FPGAs) are widely used in many fields because of their low power consumption, easy design and good performance. For applications running on FPGAs, security is very important. A lot of researches have been done on the security issue of FPGA implementations, many attacks and countermeasures have been proposed. The dual complementary strategy is a countermeasure designed to thwart side channel attacks. In this paper, we perform Correlation Power Analysis (CPA) against dual complementary AES implemented on the SAKURA-G FPGA board. For dual complementary AES with constant Hamming Weight (HW) value, which is demonstrated to be robust against CPA based on HW model, we successfully recover the secret key using Hamming Distance (HD) and Switching Distance (SD) models with 2,000 power traces. For dual complementary AES with constant HD, 16,000 resp. 10,000 power traces are required to recover the key with HD resp. SD model.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132842993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Connected Domain Algorithm Based on Asymmetric Square NAM 基于非对称方形NAM的连通域算法
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00085
Cen Caichun, He Jie, Guo Hui
Aiming at the problem concerning low determination efficiency of sub-mode position caused by asymmetry in image segmentation with an algorithm in the asymmetric square NAM model image representation, with the aim to realize rapid image marking, the present study improves a peculiar rasterized array data structure, so as to make it satisfy geometric computation. Then, based on the neighbor search algorithm by employing SNAM, a connected domain marking algorithm based on SNAM is proposed. Through comparison of experimental results concerning handling of different binary images with the pixel scanning based connected domain marking algorithm, the connected domain marking algorithm based on quadtree scanning and the connected domain marking algorithm based on SNAM, it is proved that the connected domain marking algorithm based on asymmetric square NAM has high efficiency.
针对非对称方形NAM模型图像表示算法在图像分割中由于不对称导致子模位置确定效率低的问题,为了实现快速图像标记,本研究改进了一种特殊的栅格化阵列数据结构,使其满足几何计算。然后,在采用SNAM的邻域搜索算法的基础上,提出了一种基于SNAM的连通域标记算法。通过对基于像素扫描的连通域标记算法、基于四叉树扫描的连通域标记算法和基于SNAM的连通域标记算法处理不同二值图像的实验结果进行比较,证明了基于非对称方形NAM的连通域标记算法具有较高的效率。
{"title":"Connected Domain Algorithm Based on Asymmetric Square NAM","authors":"Cen Caichun, He Jie, Guo Hui","doi":"10.1109/CIS52066.2020.00085","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00085","url":null,"abstract":"Aiming at the problem concerning low determination efficiency of sub-mode position caused by asymmetry in image segmentation with an algorithm in the asymmetric square NAM model image representation, with the aim to realize rapid image marking, the present study improves a peculiar rasterized array data structure, so as to make it satisfy geometric computation. Then, based on the neighbor search algorithm by employing SNAM, a connected domain marking algorithm based on SNAM is proposed. Through comparison of experimental results concerning handling of different binary images with the pixel scanning based connected domain marking algorithm, the connected domain marking algorithm based on quadtree scanning and the connected domain marking algorithm based on SNAM, it is proved that the connected domain marking algorithm based on asymmetric square NAM has high efficiency.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134319461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A differential evolution SAF-DE algorithm which jumps out of local optimal 一种跳出局部最优的微分进化SAF-DE算法
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00077
HuChunAn, WenHao
The principle of differential evolutionary algorithm is easy to understand, and it has the advantages of fast convergence, simple operation and good stability, which has been favored by many researchers. However, the differential evolution algorithm is easy to fall into the local optimum, and even cause the algorithm to stagnate, the low efficiency, and the unstable convergence speed of algorithm. This paper proposes an improved differential evolution (SAF-DE) algorithm, which uses the perturbation formula to perturb the individual values in the population to make individual more diversified. So as to achieve the purpose of improving the accuracy and convergence speed in the optimization process of the differential evolution algorithm. algorithm, the improved algorithm has higher convergence speed and accuracy on some standard functions.
差分进化算法原理简单易懂,具有收敛快、操作简单、稳定性好等优点,受到众多研究者的青睐。然而,差分进化算法容易陷入局部最优,甚至导致算法停滞不前,效率低下,算法收敛速度不稳定。本文提出了一种改进的差分进化算法(SAF-DE),该算法利用摄动公式对种群中的个体值进行摄动,使个体更加多样化。从而达到提高差分进化算法在优化过程中的精度和收敛速度的目的。改进后的算法在某些标准函数上具有更高的收敛速度和精度。
{"title":"A differential evolution SAF-DE algorithm which jumps out of local optimal","authors":"HuChunAn, WenHao","doi":"10.1109/CIS52066.2020.00077","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00077","url":null,"abstract":"The principle of differential evolutionary algorithm is easy to understand, and it has the advantages of fast convergence, simple operation and good stability, which has been favored by many researchers. However, the differential evolution algorithm is easy to fall into the local optimum, and even cause the algorithm to stagnate, the low efficiency, and the unstable convergence speed of algorithm. This paper proposes an improved differential evolution (SAF-DE) algorithm, which uses the perturbation formula to perturb the individual values in the population to make individual more diversified. So as to achieve the purpose of improving the accuracy and convergence speed in the optimization process of the differential evolution algorithm. algorithm, the improved algorithm has higher convergence speed and accuracy on some standard functions.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133204279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Kernel Non-Negative Matrix Factorization Using Self-Constructed Cosine Kernel 基于自构造余弦核的核非负矩阵分解
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00047
Huihui Qian, Wensheng Chen, Binbin Pan, Bo Chen
Kernel-based non-negative matrix factorization (KNMF) can non-linearly extract non-negative features for image-data representation and classification. However, different kernel functions would lead to different performance. This means that selecting an appropriate kernel function plays an important role in KNMF algorithms. In this paper, we construct a novel Mercer kernel function, called cosine kernel function, which has the advantages of translation invariance and robustness to noise. Based on the self-constructed cosine kernel, we further propose a cosine kernel-based NMF (CKNMF) approach. The iterative formulas of CKNMF are deduced using the gradient descent method. We empirically validate that our CKNMF algorithm is convergent. Compared with some state of the art kernel-based algorithms, experimental results indicate that the proposed CKNMF algorithm achieves superior performance on face recognition.
基于核函数的非负矩阵分解(KNMF)可以非线性地提取非负特征,用于图像数据的表示和分类。然而,不同的内核函数会导致不同的性能。这意味着选择合适的核函数在KNMF算法中起着重要的作用。本文构造了一种新的Mercer核函数,称为余弦核函数,它具有平移不变性和对噪声的鲁棒性。在自构造余弦核的基础上,我们进一步提出了一种基于余弦核的NMF方法。采用梯度下降法推导了CKNMF的迭代公式。经验验证了我们的CKNMF算法是收敛的。实验结果表明,与现有的基于核的人脸识别算法相比,CKNMF算法在人脸识别方面取得了较好的效果。
{"title":"Kernel Non-Negative Matrix Factorization Using Self-Constructed Cosine Kernel","authors":"Huihui Qian, Wensheng Chen, Binbin Pan, Bo Chen","doi":"10.1109/CIS52066.2020.00047","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00047","url":null,"abstract":"Kernel-based non-negative matrix factorization (KNMF) can non-linearly extract non-negative features for image-data representation and classification. However, different kernel functions would lead to different performance. This means that selecting an appropriate kernel function plays an important role in KNMF algorithms. In this paper, we construct a novel Mercer kernel function, called cosine kernel function, which has the advantages of translation invariance and robustness to noise. Based on the self-constructed cosine kernel, we further propose a cosine kernel-based NMF (CKNMF) approach. The iterative formulas of CKNMF are deduced using the gradient descent method. We empirically validate that our CKNMF algorithm is convergent. Compared with some state of the art kernel-based algorithms, experimental results indicate that the proposed CKNMF algorithm achieves superior performance on face recognition.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133225216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Review of Image Classification Method Based on Deep Transfer Learning 基于深度迁移学习的图像分类方法综述
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00031
Chuanzi Li, Jining Feng, Li Hu, Junhong Li, Haibin Ma
With the continuous development of deep learning technology, neural networks such as convolutional neural network (CNN) have shown good performance in many fields, such as image processing. Meanwhile, the relevant algorithm has made great progress. But the experiment results show that the deeper the network layers, the more the number of parameters that need to be trained in neural network, and the massive computing resources will be consumed to reconstruct and train the deep convolutional neural network (DCNN) model. These parameters often need to be trained in large dataset. But in many practical applications, the effective sample dataset that can be collected are usually small and lack of annotated samples. It is a pity that models that perform well on large datasets often have overfitting problems when applied to small datasets. And transfer learning can recognize and apply knowledge and skills learned in previous domains/tasks to novel domains/tasks. Combining deep convolutional neural network learning with transfer learning can make full use of existing models with good performance to solve problems in new fields, so has received considerable attentions due to its high research value and wide application prospect. This paper focuses on the combination of CNN and transfer learning, analyzes their characteristics, summarizes the relevant models, methods and applications, so as to promote their effective fusion in image classification.
随着深度学习技术的不断发展,卷积神经网络(CNN)等神经网络在图像处理等诸多领域都表现出了良好的性能。同时,相关算法也取得了很大的进步。但实验结果表明,网络层越深,神经网络中需要训练的参数越多,重构和训练深度卷积神经网络(DCNN)模型需要消耗大量的计算资源。这些参数通常需要在大型数据集中进行训练。但在许多实际应用中,能够收集到的有效样本数据集通常很小,而且缺乏带注释的样本。遗憾的是,在大数据集上表现良好的模型在应用于小数据集时往往存在过拟合问题。迁移学习可以识别和应用在以前的领域/任务中学到的知识和技能到新的领域/任务。将深度卷积神经网络学习与迁移学习相结合,可以充分利用已有的性能良好的模型来解决新领域的问题,具有很高的研究价值和广阔的应用前景,受到了广泛的关注。本文重点研究了CNN与迁移学习的结合,分析了两者的特点,总结了相关的模型、方法和应用,从而促进两者在图像分类中的有效融合。
{"title":"Review of Image Classification Method Based on Deep Transfer Learning","authors":"Chuanzi Li, Jining Feng, Li Hu, Junhong Li, Haibin Ma","doi":"10.1109/CIS52066.2020.00031","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00031","url":null,"abstract":"With the continuous development of deep learning technology, neural networks such as convolutional neural network (CNN) have shown good performance in many fields, such as image processing. Meanwhile, the relevant algorithm has made great progress. But the experiment results show that the deeper the network layers, the more the number of parameters that need to be trained in neural network, and the massive computing resources will be consumed to reconstruct and train the deep convolutional neural network (DCNN) model. These parameters often need to be trained in large dataset. But in many practical applications, the effective sample dataset that can be collected are usually small and lack of annotated samples. It is a pity that models that perform well on large datasets often have overfitting problems when applied to small datasets. And transfer learning can recognize and apply knowledge and skills learned in previous domains/tasks to novel domains/tasks. Combining deep convolutional neural network learning with transfer learning can make full use of existing models with good performance to solve problems in new fields, so has received considerable attentions due to its high research value and wide application prospect. This paper focuses on the combination of CNN and transfer learning, analyzes their characteristics, summarizes the relevant models, methods and applications, so as to promote their effective fusion in image classification.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131782748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A novel additive consistency for intuitionistic fuzzy preference relations 直觉模糊偏好关系的一种新的加性一致性
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00059
Xiaona Lu, He Li
Intuitionistic fuzzy preference relations (IFPRs), as an effective tool for expressing pair-wise comparisons between alternatives, has a great advantage in group decision making (GDM). The manuscript first compares and analyzes the existing definitions of additive consistency for IFPRs and points out the shortcomings of the existing definitions of additive consistency for IFPRs. To fill these gaps, a new definition of additive consistency for IFPRs is proposed Meanwhile, a mathematical programming model is presented to check whether an IFPR is additively consistent or not. In addition, for an inconsistent IFPR, a mathematical programming model is put forward to improve the consistent level. Furthermore, based on the mathematical programming model, a new individual marking decision method with IFPR is proposed, and the merits of the proposed method is analyzed through a associated example.
直觉模糊偏好关系作为一种表达方案间两两比较的有效工具,在群体决策中具有很大的优势。本文首先比较和分析了ifrs中现有的可加性一致性定义,并指出了ifrs中现有的可加性一致性定义的不足。为了填补这些空白,提出了IFPR的加性一致性的新定义,并提出了一个数学规划模型来检验IFPR是否具有加性一致性。此外,对于不一致的IFPR,提出了一种数学规划模型来提高其一致性水平。在数学规划模型的基础上,提出了一种新的基于IFPR的个体标记决策方法,并通过实例分析了该方法的优点。
{"title":"A novel additive consistency for intuitionistic fuzzy preference relations","authors":"Xiaona Lu, He Li","doi":"10.1109/CIS52066.2020.00059","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00059","url":null,"abstract":"Intuitionistic fuzzy preference relations (IFPRs), as an effective tool for expressing pair-wise comparisons between alternatives, has a great advantage in group decision making (GDM). The manuscript first compares and analyzes the existing definitions of additive consistency for IFPRs and points out the shortcomings of the existing definitions of additive consistency for IFPRs. To fill these gaps, a new definition of additive consistency for IFPRs is proposed Meanwhile, a mathematical programming model is presented to check whether an IFPR is additively consistent or not. In addition, for an inconsistent IFPR, a mathematical programming model is put forward to improve the consistent level. Furthermore, based on the mathematical programming model, a new individual marking decision method with IFPR is proposed, and the merits of the proposed method is analyzed through a associated example.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123029568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Feature Selection Method for Intrusion Detection System Dataset – TSDR method 一种新的入侵检测系统数据集特征选择方法——TSDR方法
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00083
Tao Yu, Zhen Liu, Yuaning Liu, Huai-bin Wang, N. Adilov
In recent years, due to the increased frequency of cyber-attacks, the negative impacts of cyber-attacks on society have increased. Therefore, the research on cyber-security and prevention of cyber-attacks, including intrusion detection as an effective means of defense against cyber-attacks, is warranted. Both in the research and in the development of the systems for intrusion detection, the machine learning and deep learning methods are widely utilized, and the NSL-KDD dataset is frequently used in algorithm research and verification. In this paper, we propose a new two-stage dimensionality reduction (TSDR) feature selection method and verified by NSL-KDD dataset. The method reduces the dimensionality of the dataset and significantly improves the calculation efficiency. The KNN algorithm is used to verify that the new feature selection method improves the calculation efficiency. The accuracy rate is only slightly reduced when compared to the full feature calculation.
近年来,由于网络攻击的频率越来越高,网络攻击对社会的负面影响也越来越大。因此,对网络安全和网络攻击预防的研究,包括入侵检测作为防御网络攻击的有效手段,是有必要的。无论是在入侵检测系统的研究和开发中,机器学习和深度学习方法都得到了广泛的应用,NSL-KDD数据集在算法研究和验证中被频繁使用。本文提出了一种新的两阶段降维(TSDR)特征选择方法,并通过NSL-KDD数据集进行了验证。该方法降低了数据集的维数,显著提高了计算效率。通过KNN算法验证了新的特征选择方法提高了计算效率。与全特征计算相比,准确率仅略有降低。
{"title":"A New Feature Selection Method for Intrusion Detection System Dataset – TSDR method","authors":"Tao Yu, Zhen Liu, Yuaning Liu, Huai-bin Wang, N. Adilov","doi":"10.1109/CIS52066.2020.00083","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00083","url":null,"abstract":"In recent years, due to the increased frequency of cyber-attacks, the negative impacts of cyber-attacks on society have increased. Therefore, the research on cyber-security and prevention of cyber-attacks, including intrusion detection as an effective means of defense against cyber-attacks, is warranted. Both in the research and in the development of the systems for intrusion detection, the machine learning and deep learning methods are widely utilized, and the NSL-KDD dataset is frequently used in algorithm research and verification. In this paper, we propose a new two-stage dimensionality reduction (TSDR) feature selection method and verified by NSL-KDD dataset. The method reduces the dimensionality of the dataset and significantly improves the calculation efficiency. The KNN algorithm is used to verify that the new feature selection method improves the calculation efficiency. The accuracy rate is only slightly reduced when compared to the full feature calculation.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128795507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2020 16th International Conference on Computational Intelligence and Security (CIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1