Pub Date : 2024-09-05DOI: 10.1007/s00521-024-10314-y
Mona Elattar, Ahmed Younes, Ibrahim Gad, Islam Elkabani
Portable document formats (PDFs) are widely used for document exchange due to their widespread usage and versatility. However, PDFs are highly vulnerable to malware attacks, which pose significant security risks. Existing defense mechanisms often struggle to effectively detect and mitigate these threats, highlighting the need for more robust solutions. This paper introduces a robust framework that uses advanced tree-based ensemble models to detect malicious PDFs using the Evasive-PDFMal2022 dataset. The proposed model achieves a recall rate of 100%, an accuracy rate of 99.95%, and a fast inference time of 0.1723 s. Furthermore, the framework exhibits minimal false positive and false negative rates, ensuring a high level of precision in distinguishing between malicious and benign PDFs. Shapley additive explanations are used to improve the interpretability and reliability of the model’s predictions. The results highlight the effectiveness of the proposed model in improving PDF document security and addressing the challenges posed by malware attacks.
便携式文档格式(PDF)因其广泛的用途和多功能性而被广泛用于文档交换。然而,PDF 极易受到恶意软件的攻击,从而带来巨大的安全风险。现有的防御机制往往难以有效地检测和缓解这些威胁,因此需要更强大的解决方案。本文介绍了一种稳健的框架,该框架使用先进的基于树的集合模型,利用 Evasive-PDFMal2022 数据集检测恶意 PDF。此外,该框架的假阳性和假阴性率极低,确保了区分恶意 PDF 和良性 PDF 的高精确度。沙普利加法解释用于提高模型预测的可解释性和可靠性。结果凸显了所提模型在提高 PDF 文档安全性和应对恶意软件攻击带来的挑战方面的有效性。
{"title":"Explainable AI model for PDFMal detection based on gradient boosting model","authors":"Mona Elattar, Ahmed Younes, Ibrahim Gad, Islam Elkabani","doi":"10.1007/s00521-024-10314-y","DOIUrl":"https://doi.org/10.1007/s00521-024-10314-y","url":null,"abstract":"<p>Portable document formats (PDFs) are widely used for document exchange due to their widespread usage and versatility. However, PDFs are highly vulnerable to malware attacks, which pose significant security risks. Existing defense mechanisms often struggle to effectively detect and mitigate these threats, highlighting the need for more robust solutions. This paper introduces a robust framework that uses advanced tree-based ensemble models to detect malicious PDFs using the Evasive-PDFMal2022 dataset. The proposed model achieves a recall rate of 100%, an accuracy rate of 99.95%, and a fast inference time of 0.1723 s. Furthermore, the framework exhibits minimal false positive and false negative rates, ensuring a high level of precision in distinguishing between malicious and benign PDFs. Shapley additive explanations are used to improve the interpretability and reliability of the model’s predictions. The results highlight the effectiveness of the proposed model in improving PDF document security and addressing the challenges posed by malware attacks.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-04DOI: 10.1007/s00521-024-10291-2
Vít Škvára, Václav Šmídl, Tomáš Pevný
In anomaly detection applications, anomalies might come from multiple sources and there might be many reasons why a sample is considered to be anomalous. However, most novel anomaly detection methods do not consider this. In our work, we describe a novel approach that is demonstrated on the problem of detection of anomalies in image data. We propose the SGVAEGAN model, which decomposes the image into three independent components—the shape of an object and its foreground and background textures—and provides anomaly scores for each of those factors separately. The overall anomaly score of an image is a weighted combination of the individual factor scores. The anomaly scores are learned in an unsupervised manner, and the weights are considered as hyperparameters that can be learned in the validation stage. The approach allows the identification of the source of the anomaly using factor scores, as well as the detection of semantic anomalies where the semantic meaning is encoded in the weights and learned from very few samples of validation anomalies. On classical anomaly detection benchmarks, the proposed model outperforms all baseline models. This is shown in a rigorous experimental study that covers the behavior of the model under a varying range of conditions.
{"title":"Anomaly detection in multifactor data","authors":"Vít Škvára, Václav Šmídl, Tomáš Pevný","doi":"10.1007/s00521-024-10291-2","DOIUrl":"https://doi.org/10.1007/s00521-024-10291-2","url":null,"abstract":"<p>In anomaly detection applications, anomalies might come from multiple sources and there might be many reasons why a sample is considered to be anomalous. However, most novel anomaly detection methods do not consider this. In our work, we describe a novel approach that is demonstrated on the problem of detection of anomalies in image data. We propose the SGVAEGAN model, which decomposes the image into three independent components—the shape of an object and its foreground and background textures—and provides anomaly scores for each of those factors separately. The overall anomaly score of an image is a weighted combination of the individual factor scores. The anomaly scores are learned in an unsupervised manner, and the weights are considered as hyperparameters that can be learned in the validation stage. The approach allows the identification of the source of the anomaly using factor scores, as well as the detection of semantic anomalies where the semantic meaning is encoded in the weights and learned from very few samples of validation anomalies. On classical anomaly detection benchmarks, the proposed model outperforms all baseline models. This is shown in a rigorous experimental study that covers the behavior of the model under a varying range of conditions. </p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":"60 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-04DOI: 10.1007/s00521-024-10305-z
Leopoldo Lusquino Filho, Rafael de Oliveira Werneck, Manuel Castro, Pedro Ribeiro Mendes Júnior, Augusto Lustosa, Marcelo Zampieri, Oscar Linares, Renato Moura, Elayne Morais, Murilo Amaral, Soroor Salavati, Ashish Loomba, Ahmed Esmin, Maiara Gonçalves, Denis José Schiozer, Alexandre Ferreira, Alessandra Davólio, Anderson Rocha
This study proposes a novel multimodal approach for mixed-frequency time series forecasting in the oil industry, enabling the use of high-frequency (HF) data in their original frequency. We specifically address the challenge of integrating HF data streams, such as pressure and temperature measurements, with daily time series without introducing noise. Our approach was compared with existing econometric regression model mixed-data sampling (MIDAS) and with the data-driven models N-HiTS and a GRU-based network, across short-, medium-, and long-term prediction horizons. Additionally, we validated the proposed method on datasets from other domains beyond the oil industry. The experimental results indicate that our multimodal approach significantly improves long-term prediction accuracy.
{"title":"A multi-modal approach for mixed-frequency time series forecasting","authors":"Leopoldo Lusquino Filho, Rafael de Oliveira Werneck, Manuel Castro, Pedro Ribeiro Mendes Júnior, Augusto Lustosa, Marcelo Zampieri, Oscar Linares, Renato Moura, Elayne Morais, Murilo Amaral, Soroor Salavati, Ashish Loomba, Ahmed Esmin, Maiara Gonçalves, Denis José Schiozer, Alexandre Ferreira, Alessandra Davólio, Anderson Rocha","doi":"10.1007/s00521-024-10305-z","DOIUrl":"https://doi.org/10.1007/s00521-024-10305-z","url":null,"abstract":"<p>This study proposes a novel multimodal approach for mixed-frequency time series forecasting in the oil industry, enabling the use of high-frequency (HF) data in their original frequency. We specifically address the challenge of integrating HF data streams, such as pressure and temperature measurements, with daily time series without introducing noise. Our approach was compared with existing econometric regression model mixed-data sampling (MIDAS) and with the data-driven models N-HiTS and a GRU-based network, across short-, medium-, and long-term prediction horizons. Additionally, we validated the proposed method on datasets from other domains beyond the oil industry. The experimental results indicate that our multimodal approach significantly improves long-term prediction accuracy.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-04DOI: 10.1007/s00521-024-10161-x
Tanweer Alam, Ruchi Gupta, N. Nasurudeen Ahamed, Arif Ullah
Decision-making is crucial in fully autonomous vehicle operations and is expected to greatly influence future transportation systems. Observing the current driving status of autonomous vehicles is vital for its decision-making process. The autonomous connected vehicles on the road send significant data about their movements to the server to maintain continuous training. With the Proof of Authority (PoA) consensus process, blockchain technology provides a valid, decentralised and secure option to improve transactions throughput and minimise delay. The limited computational capacity of vehicles poses a challenge in achieving high accuracy and low latency while training self-driving algorithms. GPT-4V surpassed challenging autonomous systems in scene interpretation and causal thinking. GPT-4V has ability to navigate circumstances without access to database, interpret intentions, and make sound decisions in real-world driving scenarios. The reward function and different driving conditions are organised to allow an optimal search to find the most efficient driving style while ensuring safety. The consequences of the Blockchain-enabled decision-making model (DMM) for Self-Driving Vehicles (SDV) primarily based on GPT-4V and Federated Reinforcement Learning (FRL) would, likely, upgrades in decision-making accuracy, operational performance, statistics integrity, and potentially enhanced learning skills in SDV. Integrating blockchain technology, superior language modelling GPT-4V and FRL may lead to multiplied safety, reliability, and decision-making ability in SDV. This study utilised the Simulation of Urban MObility (SUMO) simulator to assess the ability of SDV to maintain its desired speed consistently and securely in a highway setting using proposed DMM. This study indicates that the suggested DMM, utilising the driving state evaluation approach for SDV, can help these vehicles operate safely and effectively. The performance of the proposed model, such as CPU utilisation, bandwidth and latency, are evaluated through multiple tests.
{"title":"A decision-making model for self-driving vehicles based on GPT-4V, federated reinforcement learning, and blockchain","authors":"Tanweer Alam, Ruchi Gupta, N. Nasurudeen Ahamed, Arif Ullah","doi":"10.1007/s00521-024-10161-x","DOIUrl":"https://doi.org/10.1007/s00521-024-10161-x","url":null,"abstract":"<p>Decision-making is crucial in fully autonomous vehicle operations and is expected to greatly influence future transportation systems. Observing the current driving status of autonomous vehicles is vital for its decision-making process. The autonomous connected vehicles on the road send significant data about their movements to the server to maintain continuous training. With the Proof of Authority (PoA) consensus process, blockchain technology provides a valid, decentralised and secure option to improve transactions throughput and minimise delay. The limited computational capacity of vehicles poses a challenge in achieving high accuracy and low latency while training self-driving algorithms. GPT-4V surpassed challenging autonomous systems in scene interpretation and causal thinking. GPT-4V has ability to navigate circumstances without access to database, interpret intentions, and make sound decisions in real-world driving scenarios. The reward function and different driving conditions are organised to allow an optimal search to find the most efficient driving style while ensuring safety. The consequences of the Blockchain-enabled decision-making model (DMM) for Self-Driving Vehicles (SDV) primarily based on GPT-4V and Federated Reinforcement Learning (FRL) would, likely, upgrades in decision-making accuracy, operational performance, statistics integrity, and potentially enhanced learning skills in SDV. Integrating blockchain technology, superior language modelling GPT-4V and FRL may lead to multiplied safety, reliability, and decision-making ability in SDV. This study utilised the Simulation of Urban MObility (SUMO) simulator to assess the ability of SDV to maintain its desired speed consistently and securely in a highway setting using proposed DMM. This study indicates that the suggested DMM, utilising the driving state evaluation approach for SDV, can help these vehicles operate safely and effectively. The performance of the proposed model, such as CPU utilisation, bandwidth and latency, are evaluated through multiple tests.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-03DOI: 10.1007/s00521-024-10321-z
Jiao Wang, Jay Weitzen, Oguz Bayat, Volkan Sevindik
Fifth generation (5G) mobile networks enable ultra-reliable low-latency communication (URLLC) applications, ushering in an era of endless possibilities for 5G. URLLC supports emerging 5G services and applications with stringent requirements for latency and reliability. Factory automation (FA) is a URLLC application that automates and optimizes workflows and processes in factories. To accommodate diversified FA services, 5G networks employ the “network slicing” technique, which divides the network into slices tailored to different service requirements. Designing a sliced network and translating diversified service-level agreements (SLAs) into network attributes necessitates advanced automation techniques to enhance human–machine collaboration, increase efficiency, minimize manual errors, reduce operating costs, and, most importantly, provide adequate service quality economically and reliably. To apply autonomic computing to FA network design, new architectures and software components have been envisioned. These include information extraction, domain knowledge representation, rule-based reasoning, performance model calculation, and querying using simulators and neural networks (NNs), among others. This paper proposes an innovative approach to network slicing design using advanced automation methods. This approach can be easily extended to include new services or to integrate cutting-edge 5G techniques.
第五代(5G)移动网络支持超可靠低延迟通信(URLLC)应用,为 5G 带来了一个充满无限可能的时代。URLLC 支持对延迟和可靠性有严格要求的新兴 5G 服务和应用。工厂自动化(FA)是一种 URLLC 应用,可实现工厂工作流和流程的自动化和优化。为了适应多样化的 FA 服务,5G 网络采用了 "网络切片 "技术,根据不同的服务要求将网络划分为不同的片区。设计切片网络并将多样化的服务级别协议(SLA)转化为网络属性需要先进的自动化技术,以加强人机协作、提高效率、减少人工错误、降低运营成本,最重要的是经济可靠地提供足够的服务质量。为了将自主计算应用于 FA 网络设计,人们设想了新的架构和软件组件。其中包括信息提取、领域知识表示、基于规则的推理、性能模型计算以及使用模拟器和神经网络(NN)进行查询等。本文提出了一种利用先进自动化方法进行网络切片设计的创新方法。这种方法可以很容易地扩展到新服务或集成最前沿的 5G 技术。
{"title":"AI for industrial: automate the network design for 5G URLLC services","authors":"Jiao Wang, Jay Weitzen, Oguz Bayat, Volkan Sevindik","doi":"10.1007/s00521-024-10321-z","DOIUrl":"https://doi.org/10.1007/s00521-024-10321-z","url":null,"abstract":"<p>Fifth generation (5G) mobile networks enable ultra-reliable low-latency communication (URLLC) applications, ushering in an era of endless possibilities for 5G. URLLC supports emerging 5G services and applications with stringent requirements for latency and reliability. Factory automation (FA) is a URLLC application that automates and optimizes workflows and processes in factories. To accommodate diversified FA services, 5G networks employ the “network slicing” technique, which divides the network into slices tailored to different service requirements. Designing a sliced network and translating diversified service-level agreements (SLAs) into network attributes necessitates advanced automation techniques to enhance human–machine collaboration, increase efficiency, minimize manual errors, reduce operating costs, and, most importantly, provide adequate service quality economically and reliably. To apply autonomic computing to FA network design, new architectures and software components have been envisioned. These include information extraction, domain knowledge representation, rule-based reasoning, performance model calculation, and querying using simulators and neural networks (NNs), among others. This paper proposes an innovative approach to network slicing design using advanced automation methods. This approach can be easily extended to include new services or to integrate cutting-edge 5G techniques.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-28DOI: 10.1007/s00521-024-10304-0
Alaa Fkirin, Ahmed Samy Moursi, Gamal Attiya, Ayman El-Sayed, Marwa A. Shouman
Recent advancements in deep neural networks (DNNs) have made them indispensable for numerous commercial applications. These include healthcare systems and self-driving cars. Training DNN models typically demands substantial time, vast datasets and high computational costs. However, these valuable models face significant risks. Attackers can steal and sell pre-trained DNN models for profit. Unauthorised sharing of these models poses a serious threat. Once sold, they can be easily copied and redistributed. Therefore, a well-built pre-trained DNN model is a valuable asset that requires protection. This paper introduces a robust hybrid two-level protection system for safeguarding the ownership of pre-trained DNN models. The first-level employs zero-bit watermarking. The second-level incorporates an adversarial attack as a watermark by using a perturbation technique to embed the watermark. The robustness of the proposed system is evaluated against seven types of attacks. These are Fast Gradient Method Attack, Auto Projected Gradient Descent Attack, Auto Conjugate Gradient Attack, Basic Iterative Method Attack, Momentum Iterative Method Attack, Square Attack and Auto Attack. The proposed two-level protection system withstands all seven attack types. It maintains accuracy and surpasses current state-of-the-art methods.
{"title":"Hybrid two-level protection system for preserving pre-trained DNN models ownership","authors":"Alaa Fkirin, Ahmed Samy Moursi, Gamal Attiya, Ayman El-Sayed, Marwa A. Shouman","doi":"10.1007/s00521-024-10304-0","DOIUrl":"https://doi.org/10.1007/s00521-024-10304-0","url":null,"abstract":"<p>Recent advancements in deep neural networks (DNNs) have made them indispensable for numerous commercial applications. These include healthcare systems and self-driving cars. Training DNN models typically demands substantial time, vast datasets and high computational costs. However, these valuable models face significant risks. Attackers can steal and sell pre-trained DNN models for profit. Unauthorised sharing of these models poses a serious threat. Once sold, they can be easily copied and redistributed. Therefore, a well-built pre-trained DNN model is a valuable asset that requires protection. This paper introduces a robust hybrid two-level protection system for safeguarding the ownership of pre-trained DNN models. The first-level employs zero-bit watermarking. The second-level incorporates an adversarial attack as a watermark by using a perturbation technique to embed the watermark. The robustness of the proposed system is evaluated against seven types of attacks. These are Fast Gradient Method Attack, Auto Projected Gradient Descent Attack, Auto Conjugate Gradient Attack, Basic Iterative Method Attack, Momentum Iterative Method Attack, Square Attack and Auto Attack. The proposed two-level protection system withstands all seven attack types. It maintains accuracy and surpasses current state-of-the-art methods.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-28DOI: 10.1007/s00521-024-10347-3
Kuljeet Singh, Deepti Malhotra
In the recent years, neuroimaging and deep learning have received notable scientific attention for the diagnosis of grade IV tumor de novo glioblastoma in the central nervous system. However, the scarce amount of neuroimaging data for training has resulted in significant overfitting issues for numerous deep learning models. To address these challenges, we propose the implementation of a meta-learning-based IRAM–NET model that utilizes the ResNet-50 as a deep learning-based model and incorporates the e-MAML ensemble technique from meta-learning for the early diagnosis of glioblastoma. The methodology developed was trained and validated using brain MRI images taken from numerous national and international cancer initiative data repositories. In the training phase, this study employed detailed procedures, including the handling of exceptions and the application of normalization techniques. These measures were implemented to guarantee precise data representation, mitigate the risk of overfitting, and enhance the proposed model’s capacity for making meaningful generalizations. The proposed IRAM–NET model surpasses the most recent studies in accurately predicting glioblastoma diagnosis, achieving a training, testing and validation accuracy of 97.22%, 96.10%, and 94.74%, respectively. Overall, the research not only enhances the diagnosis of rare disorders like glioblastoma, but also promotes the wider inclusion of meta-learning in healthcare. This underlines the importance of adaptation and efficiency in situations with limited data availability.
{"title":"IRAM–NET model: image residual agnostics meta-learning-based network for rare de novo glioblastoma diagnosis","authors":"Kuljeet Singh, Deepti Malhotra","doi":"10.1007/s00521-024-10347-3","DOIUrl":"https://doi.org/10.1007/s00521-024-10347-3","url":null,"abstract":"<p>In the recent years, neuroimaging and deep learning have received notable scientific attention for the diagnosis of grade IV tumor de novo glioblastoma in the central nervous system. However, the scarce amount of neuroimaging data for training has resulted in significant overfitting issues for numerous deep learning models. To address these challenges, we propose the implementation of a meta-learning-based IRAM–NET model that utilizes the ResNet-50 as a deep learning-based model and incorporates the <i>e-</i>MAML ensemble technique from meta-learning for the early diagnosis of glioblastoma. The methodology developed was trained and validated using brain MRI images taken from numerous national and international cancer initiative data repositories. In the training phase, this study employed detailed procedures, including the handling of exceptions and the application of normalization techniques. These measures were implemented to guarantee precise data representation, mitigate the risk of overfitting, and enhance the proposed model’s capacity for making meaningful generalizations. The proposed IRAM–NET model surpasses the most recent studies in accurately predicting glioblastoma diagnosis, achieving a training, testing and validation accuracy of 97.22%, 96.10%, and 94.74%, respectively. Overall, the research not only enhances the diagnosis of rare disorders like glioblastoma, but also promotes the wider inclusion of meta-learning in healthcare. This underlines the importance of adaptation and efficiency in situations with limited data availability.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-28DOI: 10.1007/s00521-024-10317-9
Fatma M. Talaat, Mai Ramadan Ibraheem
Individuals who are younger and have dementia often start experiencing its symptoms before they turn 65, with cases even documented in people as young as their thirties. Researchers strive for accurate dementia diagnosis to slow or halt its progression. This paper presents a novel Enhanced Dementia Detection and Classification Model (EDCM) comprised of four modules: data acquisition, preprocessing, hyperparameter optimization, and feature extraction/classification. Notably, the model uses texture information from segmented brain images for improved feature extraction, leading to significant gains in both binary and multi-class classification. This is achieved by selecting optimal features via a Gray Wolf Optimization (GWO)-driven enhancement model. Results demonstrate substantial accuracy improvements after optimization. For instance, using an Extra Tree Classifier for "normal" cases, the model achieves 85% accuracy before optimization. However, with GWO-optimized features and hyperparameters, the accuracy jumps to 97%.
患有痴呆症的年轻人往往在 65 岁之前就开始出现痴呆症症状,甚至在 30 多岁时就有病例记录。研究人员致力于准确诊断痴呆症,以减缓或阻止其发展。本文介绍了一种新型的增强痴呆症检测和分类模型(EDCM),该模型由四个模块组成:数据采集、预处理、超参数优化和特征提取/分类。值得注意的是,该模型利用大脑图像分割后的纹理信息改进特征提取,从而显著提高了二元分类和多类分类的效率。这是通过灰狼优化(GWO)驱动的增强模型选择最佳特征实现的。结果表明,优化后的准确率大幅提高。例如,对 "正常 "病例使用 Extra Tree 分类器,该模型在优化前的准确率为 85%。然而,经过 GWO 优化的特征和超参数后,准确率跃升至 97%。
{"title":"Dementia diagnosis in young adults: a machine learning and optimization approach","authors":"Fatma M. Talaat, Mai Ramadan Ibraheem","doi":"10.1007/s00521-024-10317-9","DOIUrl":"https://doi.org/10.1007/s00521-024-10317-9","url":null,"abstract":"<p>Individuals who are younger and have dementia often start experiencing its symptoms before they turn 65, with cases even documented in people as young as their thirties. Researchers strive for accurate dementia diagnosis to slow or halt its progression. This paper presents a novel Enhanced Dementia Detection and Classification Model (EDCM) comprised of four modules: data acquisition, preprocessing, hyperparameter optimization, and feature extraction/classification. Notably, the model uses texture information from segmented brain images for improved feature extraction, leading to significant gains in both binary and multi-class classification. This is achieved by selecting optimal features via a Gray Wolf Optimization (GWO)-driven enhancement model. Results demonstrate substantial accuracy improvements after optimization. For instance, using an Extra Tree Classifier for \"normal\" cases, the model achieves 85% accuracy before optimization. However, with GWO-optimized features and hyperparameters, the accuracy jumps to 97%.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-28DOI: 10.1007/s00521-024-10145-x
Amna Altaf, Muhammad Waqas Anwar, Muhammad Hasan Jamal, Usama Ijaz Bajwa, Sadaf Rani
With the advancement in web interactions and increased use of Online Social Networks, sentiment analysis has gained popularity. Topics like sports, health, music, and technology are widely debated on in OSN, especially on twitter. People share their activities, views, and feelings toward different events in their native languages that can be analyzed using sentiment analysis to understand the sentiments of the people toward these events. For English language, studies on sentiment analysis are vastly available. However, very little work exists on sentiment analysis for resource-scarce language like Urdu. For this study, we perform aspect-based sentiment analysis on sports tweets in Urdu language by extracting the following information from a sentence, i.e., aspect terms, aspect term polarity, aspect category, and aspect category polarity, using machine learning and deep learning classifiers. This work is the first effort in aspect-based sentiment analysis for Urdu language using classical machine learning and deep learning approach. Additionally, we also identify implicit aspects from a sentence. Our proposed approach shows classical machine learning approach performed better on the tasks of aspect term polarity, aspect category, and aspect category polarity, while deep learning model outperformed classical machine learning classifiers for the task of aspect term/s.
{"title":"Aspect-based sentiment analysis in Urdu language: resource creation and evaluation","authors":"Amna Altaf, Muhammad Waqas Anwar, Muhammad Hasan Jamal, Usama Ijaz Bajwa, Sadaf Rani","doi":"10.1007/s00521-024-10145-x","DOIUrl":"https://doi.org/10.1007/s00521-024-10145-x","url":null,"abstract":"<p>With the advancement in web interactions and increased use of Online Social Networks, sentiment analysis has gained popularity. Topics like sports, health, music, and technology are widely debated on in OSN, especially on twitter. People share their activities, views, and feelings toward different events in their native languages that can be analyzed using sentiment analysis to understand the sentiments of the people toward these events. For English language, studies on sentiment analysis are vastly available. However, very little work exists on sentiment analysis for resource-scarce language like Urdu. For this study, we perform aspect-based sentiment analysis on sports tweets in Urdu language by extracting the following information from a sentence, i.e., aspect terms, aspect term polarity, aspect category, and aspect category polarity, using machine learning and deep learning classifiers. This work is the first effort in aspect-based sentiment analysis for Urdu language using classical machine learning and deep learning approach. Additionally, we also identify implicit aspects from a sentence. Our proposed approach shows classical machine learning approach performed better on the tasks of aspect term polarity, aspect category, and aspect category polarity, while deep learning model outperformed classical machine learning classifiers for the task of aspect term/s.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-28DOI: 10.1007/s00521-024-10350-8
Amine Sallah, El Arbi Abdellaoui Alaoui, Abdelaaziz Hessane, Said Agoujil, Anand Nayyar
The widespread use of online social networks (OSNs) has made them prime targets for cyber attackers, who exploit these platforms for various malicious activities. As a result, a whole industry of black-market services has emerged, selling services based on the sale of fake accounts. Because of the massive rise of OSNs, the number of fraudulent accounts rapidly expands. Hence, this research focuses on detecting fraudulent profiles on Instagram and Facebook and aims to find an optimal subset of features that can effectively differentiate between real and fake accounts. The problem has been formulated as a multiobjective optimization task, aiming to maximize the classification accuracy while minimizing the number of selected features. NSGA-II (non-dominated sorting genetic algorithm II) is employed as the optimization algorithm to explore the trade-offs between these conflicting objectives. In the current study, a novel approach for feature selection using the NSGA-II optimization algorithm to detect fake accounts is proposed. The proposed methodology relies on input data comprising features characterizing the profiles under investigation. The selected features are utilized to train a machine learning model. The model’s performance is evaluated using various metrics, including precision, recall, F1-score, and receiver operating characteristic (ROC) curve. The final prediction model achieved accuracy values ranging from 90 to 99.88%. The results indicated that the model, utilizing features selected by the NSGA-II algorithm, delivered high prediction accuracy while using less than 31% of the total feature space. This efficient feature selection allowed for the precise differentiation between fake and real users, demonstrating the model’s effectiveness with a minimal number of input variables. Furthermore, the results of experiments demonstrate that the proposed approach achieves better performance as compared to other existing approaches. This research paper focuses on explainability, which refers to the ability to understand and interpret the decisions and outcomes of machine learning models.
{"title":"An efficient fake account identification in social media networks: Facebook and Instagram using NSGA-II algorithm","authors":"Amine Sallah, El Arbi Abdellaoui Alaoui, Abdelaaziz Hessane, Said Agoujil, Anand Nayyar","doi":"10.1007/s00521-024-10350-8","DOIUrl":"https://doi.org/10.1007/s00521-024-10350-8","url":null,"abstract":"<p>The widespread use of online social networks (OSNs) has made them prime targets for cyber attackers, who exploit these platforms for various malicious activities. As a result, a whole industry of black-market services has emerged, selling services based on the sale of fake accounts. Because of the massive rise of OSNs, the number of fraudulent accounts rapidly expands. Hence, this research focuses on detecting fraudulent profiles on Instagram and Facebook and aims to find an optimal subset of features that can effectively differentiate between real and fake accounts. The problem has been formulated as a multiobjective optimization task, aiming to maximize the classification accuracy while minimizing the number of selected features. NSGA-II (non-dominated sorting genetic algorithm II) is employed as the optimization algorithm to explore the trade-offs between these conflicting objectives. In the current study, a novel approach for feature selection using the NSGA-II optimization algorithm to detect fake accounts is proposed. The proposed methodology relies on input data comprising features characterizing the profiles under investigation. The selected features are utilized to train a machine learning model. The model’s performance is evaluated using various metrics, including precision, recall, <i>F</i>1-score, and receiver operating characteristic (ROC) curve. The final prediction model achieved accuracy values ranging from 90 to 99.88%. The results indicated that the model, utilizing features selected by the NSGA-II algorithm, delivered high prediction accuracy while using less than 31% of the total feature space. This efficient feature selection allowed for the precise differentiation between fake and real users, demonstrating the model’s effectiveness with a minimal number of input variables. Furthermore, the results of experiments demonstrate that the proposed approach achieves better performance as compared to other existing approaches. This research paper focuses on explainability, which refers to the ability to understand and interpret the decisions and outcomes of machine learning models.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}