首页 > 最新文献

Neural Computing and Applications最新文献

英文 中文
Explainable AI model for PDFMal detection based on gradient boosting model 基于梯度提升模型的用于 PDFMal 检测的可解释人工智能模型
Pub Date : 2024-09-05 DOI: 10.1007/s00521-024-10314-y
Mona Elattar, Ahmed Younes, Ibrahim Gad, Islam Elkabani

Portable document formats (PDFs) are widely used for document exchange due to their widespread usage and versatility. However, PDFs are highly vulnerable to malware attacks, which pose significant security risks. Existing defense mechanisms often struggle to effectively detect and mitigate these threats, highlighting the need for more robust solutions. This paper introduces a robust framework that uses advanced tree-based ensemble models to detect malicious PDFs using the Evasive-PDFMal2022 dataset. The proposed model achieves a recall rate of 100%, an accuracy rate of 99.95%, and a fast inference time of 0.1723 s. Furthermore, the framework exhibits minimal false positive and false negative rates, ensuring a high level of precision in distinguishing between malicious and benign PDFs. Shapley additive explanations are used to improve the interpretability and reliability of the model’s predictions. The results highlight the effectiveness of the proposed model in improving PDF document security and addressing the challenges posed by malware attacks.

便携式文档格式(PDF)因其广泛的用途和多功能性而被广泛用于文档交换。然而,PDF 极易受到恶意软件的攻击,从而带来巨大的安全风险。现有的防御机制往往难以有效地检测和缓解这些威胁,因此需要更强大的解决方案。本文介绍了一种稳健的框架,该框架使用先进的基于树的集合模型,利用 Evasive-PDFMal2022 数据集检测恶意 PDF。此外,该框架的假阳性和假阴性率极低,确保了区分恶意 PDF 和良性 PDF 的高精确度。沙普利加法解释用于提高模型预测的可解释性和可靠性。结果凸显了所提模型在提高 PDF 文档安全性和应对恶意软件攻击带来的挑战方面的有效性。
{"title":"Explainable AI model for PDFMal detection based on gradient boosting model","authors":"Mona Elattar, Ahmed Younes, Ibrahim Gad, Islam Elkabani","doi":"10.1007/s00521-024-10314-y","DOIUrl":"https://doi.org/10.1007/s00521-024-10314-y","url":null,"abstract":"<p>Portable document formats (PDFs) are widely used for document exchange due to their widespread usage and versatility. However, PDFs are highly vulnerable to malware attacks, which pose significant security risks. Existing defense mechanisms often struggle to effectively detect and mitigate these threats, highlighting the need for more robust solutions. This paper introduces a robust framework that uses advanced tree-based ensemble models to detect malicious PDFs using the Evasive-PDFMal2022 dataset. The proposed model achieves a recall rate of 100%, an accuracy rate of 99.95%, and a fast inference time of 0.1723 s. Furthermore, the framework exhibits minimal false positive and false negative rates, ensuring a high level of precision in distinguishing between malicious and benign PDFs. Shapley additive explanations are used to improve the interpretability and reliability of the model’s predictions. The results highlight the effectiveness of the proposed model in improving PDF document security and addressing the challenges posed by malware attacks.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly detection in multifactor data 多因素数据中的异常检测
Pub Date : 2024-09-04 DOI: 10.1007/s00521-024-10291-2
Vít Škvára, Václav Šmídl, Tomáš Pevný

In anomaly detection applications, anomalies might come from multiple sources and there might be many reasons why a sample is considered to be anomalous. However, most novel anomaly detection methods do not consider this. In our work, we describe a novel approach that is demonstrated on the problem of detection of anomalies in image data. We propose the SGVAEGAN model, which decomposes the image into three independent components—the shape of an object and its foreground and background textures—and provides anomaly scores for each of those factors separately. The overall anomaly score of an image is a weighted combination of the individual factor scores. The anomaly scores are learned in an unsupervised manner, and the weights are considered as hyperparameters that can be learned in the validation stage. The approach allows the identification of the source of the anomaly using factor scores, as well as the detection of semantic anomalies where the semantic meaning is encoded in the weights and learned from very few samples of validation anomalies. On classical anomaly detection benchmarks, the proposed model outperforms all baseline models. This is shown in a rigorous experimental study that covers the behavior of the model under a varying range of conditions.

在异常检测应用中,异常可能来自多个来源,一个样本被认为是异常的原因可能有很多。然而,大多数新型异常检测方法都没有考虑到这一点。在我们的工作中,我们描述了一种新型方法,并针对图像数据中的异常检测问题进行了演示。我们提出了 SGVAEGAN 模型,该模型将图像分解为三个独立的组成部分--物体的形状及其前景和背景纹理,并分别为每个因素提供异常分数。图像的总体异常得分是各个因素得分的加权组合。异常分数是以无监督方式学习的,权重被视为超参数,可在验证阶段学习。这种方法可以利用因子得分识别异常源,也可以检测语义异常,其中语义被编码在权重中,并从极少的验证异常样本中学习。在经典异常检测基准上,所提出的模型优于所有基准模型。一项严格的实验研究表明了这一点,该研究涵盖了模型在各种条件下的行为。
{"title":"Anomaly detection in multifactor data","authors":"Vít Škvára, Václav Šmídl, Tomáš Pevný","doi":"10.1007/s00521-024-10291-2","DOIUrl":"https://doi.org/10.1007/s00521-024-10291-2","url":null,"abstract":"<p>In anomaly detection applications, anomalies might come from multiple sources and there might be many reasons why a sample is considered to be anomalous. However, most novel anomaly detection methods do not consider this. In our work, we describe a novel approach that is demonstrated on the problem of detection of anomalies in image data. We propose the SGVAEGAN model, which decomposes the image into three independent components—the shape of an object and its foreground and background textures—and provides anomaly scores for each of those factors separately. The overall anomaly score of an image is a weighted combination of the individual factor scores. The anomaly scores are learned in an unsupervised manner, and the weights are considered as hyperparameters that can be learned in the validation stage. The approach allows the identification of the source of the anomaly using factor scores, as well as the detection of semantic anomalies where the semantic meaning is encoded in the weights and learned from very few samples of validation anomalies. On classical anomaly detection benchmarks, the proposed model outperforms all baseline models. This is shown in a rigorous experimental study that covers the behavior of the model under a varying range of conditions. </p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A decision-making model for self-driving vehicles based on GPT-4V, federated reinforcement learning, and blockchain 基于 GPT-4V、联合强化学习和区块链的自动驾驶汽车决策模型
Pub Date : 2024-09-04 DOI: 10.1007/s00521-024-10161-x
Tanweer Alam, Ruchi Gupta, N. Nasurudeen Ahamed, Arif Ullah

Decision-making is crucial in fully autonomous vehicle operations and is expected to greatly influence future transportation systems. Observing the current driving status of autonomous vehicles is vital for its decision-making process. The autonomous connected vehicles on the road send significant data about their movements to the server to maintain continuous training. With the Proof of Authority (PoA) consensus process, blockchain technology provides a valid, decentralised and secure option to improve transactions throughput and minimise delay. The limited computational capacity of vehicles poses a challenge in achieving high accuracy and low latency while training self-driving algorithms. GPT-4V surpassed challenging autonomous systems in scene interpretation and causal thinking. GPT-4V has ability to navigate circumstances without access to database, interpret intentions, and make sound decisions in real-world driving scenarios. The reward function and different driving conditions are organised to allow an optimal search to find the most efficient driving style while ensuring safety. The consequences of the Blockchain-enabled decision-making model (DMM) for Self-Driving Vehicles (SDV) primarily based on GPT-4V and Federated Reinforcement Learning (FRL) would, likely, upgrades in decision-making accuracy, operational performance, statistics integrity, and potentially enhanced learning skills in SDV. Integrating blockchain technology, superior language modelling GPT-4V and FRL may lead to multiplied safety, reliability, and decision-making ability in SDV. This study utilised the Simulation of Urban MObility (SUMO) simulator to assess the ability of SDV to maintain its desired speed consistently and securely in a highway setting using proposed DMM. This study indicates that the suggested DMM, utilising the driving state evaluation approach for SDV, can help these vehicles operate safely and effectively. The performance of the proposed model, such as CPU utilisation, bandwidth and latency, are evaluated through multiple tests.

决策对于完全自动驾驶车辆的运行至关重要,预计将极大地影响未来的交通系统。观察自动驾驶车辆当前的行驶状态对其决策过程至关重要。道路上的自动互联车辆会向服务器发送有关其运动的重要数据,以保持持续训练。区块链技术通过权力证明(PoA)共识过程,提供了一种有效、分散和安全的选择,以提高交易吞吐量并最大限度地减少延迟。在训练自动驾驶算法时,车辆有限的计算能力对实现高精度和低延迟提出了挑战。GPT-4V 在场景解读和因果思维方面超越了具有挑战性的自动驾驶系统。GPT-4V 有能力在无法访问数据库的情况下进行导航,解读意图,并在实际驾驶场景中做出正确决策。奖励功能和不同的驾驶条件被组织起来,以实现最优搜索,在确保安全的前提下找到最有效的驾驶方式。基于区块链的自动驾驶汽车(SDV)决策模型(DMM)主要以 GPT-4V 和联合强化学习(FRL)为基础,其结果可能会提升 SDV 的决策准确性、操作性能、统计完整性,并有可能增强 SDV 的学习技能。将区块链技术、GPT-4V 高级语言建模和 FRL 相结合,可能会成倍提高 SDV 的安全性、可靠性和决策能力。本研究利用城市交通能力仿真(SUMO)模拟器,评估了 SDV 在高速公路环境中使用建议的 DMM 持续、安全地保持所需速度的能力。研究表明,建议的 DMM 采用 SDV 驾驶状态评估方法,可帮助这些车辆安全有效地运行。建议模型的性能,如 CPU 利用率、带宽和延迟,均通过多项测试进行了评估。
{"title":"A decision-making model for self-driving vehicles based on GPT-4V, federated reinforcement learning, and blockchain","authors":"Tanweer Alam, Ruchi Gupta, N. Nasurudeen Ahamed, Arif Ullah","doi":"10.1007/s00521-024-10161-x","DOIUrl":"https://doi.org/10.1007/s00521-024-10161-x","url":null,"abstract":"<p>Decision-making is crucial in fully autonomous vehicle operations and is expected to greatly influence future transportation systems. Observing the current driving status of autonomous vehicles is vital for its decision-making process. The autonomous connected vehicles on the road send significant data about their movements to the server to maintain continuous training. With the Proof of Authority (PoA) consensus process, blockchain technology provides a valid, decentralised and secure option to improve transactions throughput and minimise delay. The limited computational capacity of vehicles poses a challenge in achieving high accuracy and low latency while training self-driving algorithms. GPT-4V surpassed challenging autonomous systems in scene interpretation and causal thinking. GPT-4V has ability to navigate circumstances without access to database, interpret intentions, and make sound decisions in real-world driving scenarios. The reward function and different driving conditions are organised to allow an optimal search to find the most efficient driving style while ensuring safety. The consequences of the Blockchain-enabled decision-making model (DMM) for Self-Driving Vehicles (SDV) primarily based on GPT-4V and Federated Reinforcement Learning (FRL) would, likely, upgrades in decision-making accuracy, operational performance, statistics integrity, and potentially enhanced learning skills in SDV. Integrating blockchain technology, superior language modelling GPT-4V and FRL may lead to multiplied safety, reliability, and decision-making ability in SDV. This study utilised the Simulation of Urban MObility (SUMO) simulator to assess the ability of SDV to maintain its desired speed consistently and securely in a highway setting using proposed DMM. This study indicates that the suggested DMM, utilising the driving state evaluation approach for SDV, can help these vehicles operate safely and effectively. The performance of the proposed model, such as CPU utilisation, bandwidth and latency, are evaluated through multiple tests.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-modal approach for mixed-frequency time series forecasting 混合频率时间序列预测的多模式方法
Pub Date : 2024-09-04 DOI: 10.1007/s00521-024-10305-z
Leopoldo Lusquino Filho, Rafael de Oliveira Werneck, Manuel Castro, Pedro Ribeiro Mendes Júnior, Augusto Lustosa, Marcelo Zampieri, Oscar Linares, Renato Moura, Elayne Morais, Murilo Amaral, Soroor Salavati, Ashish Loomba, Ahmed Esmin, Maiara Gonçalves, Denis José Schiozer, Alexandre Ferreira, Alessandra Davólio, Anderson Rocha

This study proposes a novel multimodal approach for mixed-frequency time series forecasting in the oil industry, enabling the use of high-frequency (HF) data in their original frequency. We specifically address the challenge of integrating HF data streams, such as pressure and temperature measurements, with daily time series without introducing noise. Our approach was compared with existing econometric regression model mixed-data sampling (MIDAS) and with the data-driven models N-HiTS and a GRU-based network, across short-, medium-, and long-term prediction horizons. Additionally, we validated the proposed method on datasets from other domains beyond the oil industry. The experimental results indicate that our multimodal approach significantly improves long-term prediction accuracy.

本研究为石油行业的混合频率时间序列预测提出了一种新颖的多模式方法,使高频(HF)数据在其原始频率下得以使用。我们特别解决了将压力和温度测量等高频数据流与日时间序列整合而不引入噪声的难题。我们的方法与现有的计量回归模型混合数据采样(MIDAS)以及数据驱动模型 N-HiTS 和基于 GRU 的网络进行了短期、中期和长期预测范围的比较。此外,我们还在石油行业以外的其他领域的数据集上验证了所提出的方法。实验结果表明,我们的多模态方法显著提高了长期预测的准确性。
{"title":"A multi-modal approach for mixed-frequency time series forecasting","authors":"Leopoldo Lusquino Filho, Rafael de Oliveira Werneck, Manuel Castro, Pedro Ribeiro Mendes Júnior, Augusto Lustosa, Marcelo Zampieri, Oscar Linares, Renato Moura, Elayne Morais, Murilo Amaral, Soroor Salavati, Ashish Loomba, Ahmed Esmin, Maiara Gonçalves, Denis José Schiozer, Alexandre Ferreira, Alessandra Davólio, Anderson Rocha","doi":"10.1007/s00521-024-10305-z","DOIUrl":"https://doi.org/10.1007/s00521-024-10305-z","url":null,"abstract":"<p>This study proposes a novel multimodal approach for mixed-frequency time series forecasting in the oil industry, enabling the use of high-frequency (HF) data in their original frequency. We specifically address the challenge of integrating HF data streams, such as pressure and temperature measurements, with daily time series without introducing noise. Our approach was compared with existing econometric regression model mixed-data sampling (MIDAS) and with the data-driven models N-HiTS and a GRU-based network, across short-, medium-, and long-term prediction horizons. Additionally, we validated the proposed method on datasets from other domains beyond the oil industry. The experimental results indicate that our multimodal approach significantly improves long-term prediction accuracy.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI for industrial: automate the network design for 5G URLLC services 面向工业的人工智能:实现 5G URLLC 服务网络设计自动化
Pub Date : 2024-09-03 DOI: 10.1007/s00521-024-10321-z
Jiao Wang, Jay Weitzen, Oguz Bayat, Volkan Sevindik

Fifth generation (5G) mobile networks enable ultra-reliable low-latency communication (URLLC) applications, ushering in an era of endless possibilities for 5G. URLLC supports emerging 5G services and applications with stringent requirements for latency and reliability. Factory automation (FA) is a URLLC application that automates and optimizes workflows and processes in factories. To accommodate diversified FA services, 5G networks employ the “network slicing” technique, which divides the network into slices tailored to different service requirements. Designing a sliced network and translating diversified service-level agreements (SLAs) into network attributes necessitates advanced automation techniques to enhance human–machine collaboration, increase efficiency, minimize manual errors, reduce operating costs, and, most importantly, provide adequate service quality economically and reliably. To apply autonomic computing to FA network design, new architectures and software components have been envisioned. These include information extraction, domain knowledge representation, rule-based reasoning, performance model calculation, and querying using simulators and neural networks (NNs), among others. This paper proposes an innovative approach to network slicing design using advanced automation methods. This approach can be easily extended to include new services or to integrate cutting-edge 5G techniques.

第五代(5G)移动网络支持超可靠低延迟通信(URLLC)应用,为 5G 带来了一个充满无限可能的时代。URLLC 支持对延迟和可靠性有严格要求的新兴 5G 服务和应用。工厂自动化(FA)是一种 URLLC 应用,可实现工厂工作流和流程的自动化和优化。为了适应多样化的 FA 服务,5G 网络采用了 "网络切片 "技术,根据不同的服务要求将网络划分为不同的片区。设计切片网络并将多样化的服务级别协议(SLA)转化为网络属性需要先进的自动化技术,以加强人机协作、提高效率、减少人工错误、降低运营成本,最重要的是经济可靠地提供足够的服务质量。为了将自主计算应用于 FA 网络设计,人们设想了新的架构和软件组件。其中包括信息提取、领域知识表示、基于规则的推理、性能模型计算以及使用模拟器和神经网络(NN)进行查询等。本文提出了一种利用先进自动化方法进行网络切片设计的创新方法。这种方法可以很容易地扩展到新服务或集成最前沿的 5G 技术。
{"title":"AI for industrial: automate the network design for 5G URLLC services","authors":"Jiao Wang, Jay Weitzen, Oguz Bayat, Volkan Sevindik","doi":"10.1007/s00521-024-10321-z","DOIUrl":"https://doi.org/10.1007/s00521-024-10321-z","url":null,"abstract":"<p>Fifth generation (5G) mobile networks enable ultra-reliable low-latency communication (URLLC) applications, ushering in an era of endless possibilities for 5G. URLLC supports emerging 5G services and applications with stringent requirements for latency and reliability. Factory automation (FA) is a URLLC application that automates and optimizes workflows and processes in factories. To accommodate diversified FA services, 5G networks employ the “network slicing” technique, which divides the network into slices tailored to different service requirements. Designing a sliced network and translating diversified service-level agreements (SLAs) into network attributes necessitates advanced automation techniques to enhance human–machine collaboration, increase efficiency, minimize manual errors, reduce operating costs, and, most importantly, provide adequate service quality economically and reliably. To apply autonomic computing to FA network design, new architectures and software components have been envisioned. These include information extraction, domain knowledge representation, rule-based reasoning, performance model calculation, and querying using simulators and neural networks (NNs), among others. This paper proposes an innovative approach to network slicing design using advanced automation methods. This approach can be easily extended to include new services or to integrate cutting-edge 5G techniques.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid two-level protection system for preserving pre-trained DNN models ownership 保护预训练 DNN 模型所有权的混合两级保护系统
Pub Date : 2024-08-28 DOI: 10.1007/s00521-024-10304-0
Alaa Fkirin, Ahmed Samy Moursi, Gamal Attiya, Ayman El-Sayed, Marwa A. Shouman

Recent advancements in deep neural networks (DNNs) have made them indispensable for numerous commercial applications. These include healthcare systems and self-driving cars. Training DNN models typically demands substantial time, vast datasets and high computational costs. However, these valuable models face significant risks. Attackers can steal and sell pre-trained DNN models for profit. Unauthorised sharing of these models poses a serious threat. Once sold, they can be easily copied and redistributed. Therefore, a well-built pre-trained DNN model is a valuable asset that requires protection. This paper introduces a robust hybrid two-level protection system for safeguarding the ownership of pre-trained DNN models. The first-level employs zero-bit watermarking. The second-level incorporates an adversarial attack as a watermark by using a perturbation technique to embed the watermark. The robustness of the proposed system is evaluated against seven types of attacks. These are Fast Gradient Method Attack, Auto Projected Gradient Descent Attack, Auto Conjugate Gradient Attack, Basic Iterative Method Attack, Momentum Iterative Method Attack, Square Attack and Auto Attack. The proposed two-level protection system withstands all seven attack types. It maintains accuracy and surpasses current state-of-the-art methods.

深度神经网络(DNN)的最新进展使其在众多商业应用中变得不可或缺。这些应用包括医疗保健系统和自动驾驶汽车。训练 DNN 模型通常需要大量时间、庞大的数据集和高昂的计算成本。然而,这些宝贵的模型也面临着巨大的风险。攻击者可以窃取并出售预训练的 DNN 模型以牟利。未经授权共享这些模型构成了严重威胁。这些模型一旦售出,就很容易被复制和重新分发。因此,精心构建的预训练 DNN 模型是需要保护的宝贵资产。本文介绍了一种稳健的两级混合保护系统,用于保护预训练 DNN 模型的所有权。第一级采用零位水印。第二级通过使用扰动技术嵌入水印,将对抗性攻击作为水印。针对七种类型的攻击,对拟议系统的鲁棒性进行了评估。这些攻击包括快速梯度法攻击、自动投影梯度下降攻击、自动共轭梯度攻击、基本迭代法攻击、动量迭代法攻击、正方形攻击和自动攻击。所提出的两级保护系统可抵御所有七种攻击类型。它保持了准确性,并超越了当前最先进的方法。
{"title":"Hybrid two-level protection system for preserving pre-trained DNN models ownership","authors":"Alaa Fkirin, Ahmed Samy Moursi, Gamal Attiya, Ayman El-Sayed, Marwa A. Shouman","doi":"10.1007/s00521-024-10304-0","DOIUrl":"https://doi.org/10.1007/s00521-024-10304-0","url":null,"abstract":"<p>Recent advancements in deep neural networks (DNNs) have made them indispensable for numerous commercial applications. These include healthcare systems and self-driving cars. Training DNN models typically demands substantial time, vast datasets and high computational costs. However, these valuable models face significant risks. Attackers can steal and sell pre-trained DNN models for profit. Unauthorised sharing of these models poses a serious threat. Once sold, they can be easily copied and redistributed. Therefore, a well-built pre-trained DNN model is a valuable asset that requires protection. This paper introduces a robust hybrid two-level protection system for safeguarding the ownership of pre-trained DNN models. The first-level employs zero-bit watermarking. The second-level incorporates an adversarial attack as a watermark by using a perturbation technique to embed the watermark. The robustness of the proposed system is evaluated against seven types of attacks. These are Fast Gradient Method Attack, Auto Projected Gradient Descent Attack, Auto Conjugate Gradient Attack, Basic Iterative Method Attack, Momentum Iterative Method Attack, Square Attack and Auto Attack. The proposed two-level protection system withstands all seven attack types. It maintains accuracy and surpasses current state-of-the-art methods.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IRAM–NET model: image residual agnostics meta-learning-based network for rare de novo glioblastoma diagnosis IRAM-NET 模型:基于元学习的图像残留敏捷网络,用于罕见的新发胶质母细胞瘤诊断
Pub Date : 2024-08-28 DOI: 10.1007/s00521-024-10347-3
Kuljeet Singh, Deepti Malhotra

In the recent years, neuroimaging and deep learning have received notable scientific attention for the diagnosis of grade IV tumor de novo glioblastoma in the central nervous system. However, the scarce amount of neuroimaging data for training has resulted in significant overfitting issues for numerous deep learning models. To address these challenges, we propose the implementation of a meta-learning-based IRAM–NET model that utilizes the ResNet-50 as a deep learning-based model and incorporates the e-MAML ensemble technique from meta-learning for the early diagnosis of glioblastoma. The methodology developed was trained and validated using brain MRI images taken from numerous national and international cancer initiative data repositories. In the training phase, this study employed detailed procedures, including the handling of exceptions and the application of normalization techniques. These measures were implemented to guarantee precise data representation, mitigate the risk of overfitting, and enhance the proposed model’s capacity for making meaningful generalizations. The proposed IRAM–NET model surpasses the most recent studies in accurately predicting glioblastoma diagnosis, achieving a training, testing and validation accuracy of 97.22%, 96.10%, and 94.74%, respectively. Overall, the research not only enhances the diagnosis of rare disorders like glioblastoma, but also promotes the wider inclusion of meta-learning in healthcare. This underlines the importance of adaptation and efficiency in situations with limited data availability.

近年来,神经影像学和深度学习在诊断中枢神经系统 IV 级肿瘤新发胶质母细胞瘤方面受到了科学界的广泛关注。然而,用于训练的神经影像数据量稀少,导致许多深度学习模型存在严重的过拟合问题。为了应对这些挑战,我们提出了一种基于元学习的 IRAM-NET 模型,该模型利用 ResNet-50 作为基于深度学习的模型,并结合了元学习中的 e-MAML 集合技术,用于胶质母细胞瘤的早期诊断。所开发的方法利用从众多国家和国际癌症倡议数据存储库中获取的脑磁共振成像图像进行了训练和验证。在训练阶段,这项研究采用了详细的程序,包括处理异常和应用归一化技术。这些措施的实施保证了数据的精确表达,降低了过度拟合的风险,并增强了所提出模型的归纳能力。所提出的 IRAM-NET 模型在准确预测胶质母细胞瘤诊断方面超越了最新的研究,其训练、测试和验证准确率分别达到 97.22%、96.10% 和 94.74%。总体而言,这项研究不仅提高了胶质母细胞瘤等罕见疾病的诊断水平,还推动了元学习在医疗保健领域的广泛应用。这强调了在数据可用性有限的情况下,适应性和效率的重要性。
{"title":"IRAM–NET model: image residual agnostics meta-learning-based network for rare de novo glioblastoma diagnosis","authors":"Kuljeet Singh, Deepti Malhotra","doi":"10.1007/s00521-024-10347-3","DOIUrl":"https://doi.org/10.1007/s00521-024-10347-3","url":null,"abstract":"<p>In the recent years, neuroimaging and deep learning have received notable scientific attention for the diagnosis of grade IV tumor de novo glioblastoma in the central nervous system. However, the scarce amount of neuroimaging data for training has resulted in significant overfitting issues for numerous deep learning models. To address these challenges, we propose the implementation of a meta-learning-based IRAM–NET model that utilizes the ResNet-50 as a deep learning-based model and incorporates the <i>e-</i>MAML ensemble technique from meta-learning for the early diagnosis of glioblastoma. The methodology developed was trained and validated using brain MRI images taken from numerous national and international cancer initiative data repositories. In the training phase, this study employed detailed procedures, including the handling of exceptions and the application of normalization techniques. These measures were implemented to guarantee precise data representation, mitigate the risk of overfitting, and enhance the proposed model’s capacity for making meaningful generalizations. The proposed IRAM–NET model surpasses the most recent studies in accurately predicting glioblastoma diagnosis, achieving a training, testing and validation accuracy of 97.22%, 96.10%, and 94.74%, respectively. Overall, the research not only enhances the diagnosis of rare disorders like glioblastoma, but also promotes the wider inclusion of meta-learning in healthcare. This underlines the importance of adaptation and efficiency in situations with limited data availability.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dementia diagnosis in young adults: a machine learning and optimization approach 青壮年痴呆症诊断:一种机器学习和优化方法
Pub Date : 2024-08-28 DOI: 10.1007/s00521-024-10317-9
Fatma M. Talaat, Mai Ramadan Ibraheem

Individuals who are younger and have dementia often start experiencing its symptoms before they turn 65, with cases even documented in people as young as their thirties. Researchers strive for accurate dementia diagnosis to slow or halt its progression. This paper presents a novel Enhanced Dementia Detection and Classification Model (EDCM) comprised of four modules: data acquisition, preprocessing, hyperparameter optimization, and feature extraction/classification. Notably, the model uses texture information from segmented brain images for improved feature extraction, leading to significant gains in both binary and multi-class classification. This is achieved by selecting optimal features via a Gray Wolf Optimization (GWO)-driven enhancement model. Results demonstrate substantial accuracy improvements after optimization. For instance, using an Extra Tree Classifier for "normal" cases, the model achieves 85% accuracy before optimization. However, with GWO-optimized features and hyperparameters, the accuracy jumps to 97%.

患有痴呆症的年轻人往往在 65 岁之前就开始出现痴呆症症状,甚至在 30 多岁时就有病例记录。研究人员致力于准确诊断痴呆症,以减缓或阻止其发展。本文介绍了一种新型的增强痴呆症检测和分类模型(EDCM),该模型由四个模块组成:数据采集、预处理、超参数优化和特征提取/分类。值得注意的是,该模型利用大脑图像分割后的纹理信息改进特征提取,从而显著提高了二元分类和多类分类的效率。这是通过灰狼优化(GWO)驱动的增强模型选择最佳特征实现的。结果表明,优化后的准确率大幅提高。例如,对 "正常 "病例使用 Extra Tree 分类器,该模型在优化前的准确率为 85%。然而,经过 GWO 优化的特征和超参数后,准确率跃升至 97%。
{"title":"Dementia diagnosis in young adults: a machine learning and optimization approach","authors":"Fatma M. Talaat, Mai Ramadan Ibraheem","doi":"10.1007/s00521-024-10317-9","DOIUrl":"https://doi.org/10.1007/s00521-024-10317-9","url":null,"abstract":"<p>Individuals who are younger and have dementia often start experiencing its symptoms before they turn 65, with cases even documented in people as young as their thirties. Researchers strive for accurate dementia diagnosis to slow or halt its progression. This paper presents a novel Enhanced Dementia Detection and Classification Model (EDCM) comprised of four modules: data acquisition, preprocessing, hyperparameter optimization, and feature extraction/classification. Notably, the model uses texture information from segmented brain images for improved feature extraction, leading to significant gains in both binary and multi-class classification. This is achieved by selecting optimal features via a Gray Wolf Optimization (GWO)-driven enhancement model. Results demonstrate substantial accuracy improvements after optimization. For instance, using an Extra Tree Classifier for \"normal\" cases, the model achieves 85% accuracy before optimization. However, with GWO-optimized features and hyperparameters, the accuracy jumps to 97%.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aspect-based sentiment analysis in Urdu language: resource creation and evaluation 乌尔都语基于方面的情感分析:资源创建与评估
Pub Date : 2024-08-28 DOI: 10.1007/s00521-024-10145-x
Amna Altaf, Muhammad Waqas Anwar, Muhammad Hasan Jamal, Usama Ijaz Bajwa, Sadaf Rani

With the advancement in web interactions and increased use of Online Social Networks, sentiment analysis has gained popularity. Topics like sports, health, music, and technology are widely debated on in OSN, especially on twitter. People share their activities, views, and feelings toward different events in their native languages that can be analyzed using sentiment analysis to understand the sentiments of the people toward these events. For English language, studies on sentiment analysis are vastly available. However, very little work exists on sentiment analysis for resource-scarce language like Urdu. For this study, we perform aspect-based sentiment analysis on sports tweets in Urdu language by extracting the following information from a sentence, i.e., aspect terms, aspect term polarity, aspect category, and aspect category polarity, using machine learning and deep learning classifiers. This work is the first effort in aspect-based sentiment analysis for Urdu language using classical machine learning and deep learning approach. Additionally, we also identify implicit aspects from a sentence. Our proposed approach shows classical machine learning approach performed better on the tasks of aspect term polarity, aspect category, and aspect category polarity, while deep learning model outperformed classical machine learning classifiers for the task of aspect term/s.

随着网络互动的发展和在线社交网络使用量的增加,情感分析越来越受欢迎。体育、健康、音乐和技术等话题在在线社交网络,尤其是在 Twitter 上被广泛讨论。人们用自己的母语分享他们的活动、观点和对不同事件的感受,通过情感分析可以了解人们对这些事件的情感。对于英语语言,情感分析的研究成果非常丰富。然而,对于乌尔都语这种资源稀缺的语言,情感分析方面的研究却少之又少。在这项研究中,我们使用机器学习和深度学习分类器从句子中提取以下信息,即方面术语、方面术语极性、方面类别和方面类别极性,从而对乌尔都语的体育推文进行基于方面的情感分析。这是首次使用经典机器学习和深度学习方法对乌尔都语进行基于方面的情感分析。此外,我们还识别了句子中的隐含方面。我们提出的方法表明,经典机器学习方法在方面术语极性、方面类别和方面类别极性任务中表现更佳,而深度学习模型在方面术语任务中的表现优于经典机器学习分类器。
{"title":"Aspect-based sentiment analysis in Urdu language: resource creation and evaluation","authors":"Amna Altaf, Muhammad Waqas Anwar, Muhammad Hasan Jamal, Usama Ijaz Bajwa, Sadaf Rani","doi":"10.1007/s00521-024-10145-x","DOIUrl":"https://doi.org/10.1007/s00521-024-10145-x","url":null,"abstract":"<p>With the advancement in web interactions and increased use of Online Social Networks, sentiment analysis has gained popularity. Topics like sports, health, music, and technology are widely debated on in OSN, especially on twitter. People share their activities, views, and feelings toward different events in their native languages that can be analyzed using sentiment analysis to understand the sentiments of the people toward these events. For English language, studies on sentiment analysis are vastly available. However, very little work exists on sentiment analysis for resource-scarce language like Urdu. For this study, we perform aspect-based sentiment analysis on sports tweets in Urdu language by extracting the following information from a sentence, i.e., aspect terms, aspect term polarity, aspect category, and aspect category polarity, using machine learning and deep learning classifiers. This work is the first effort in aspect-based sentiment analysis for Urdu language using classical machine learning and deep learning approach. Additionally, we also identify implicit aspects from a sentence. Our proposed approach shows classical machine learning approach performed better on the tasks of aspect term polarity, aspect category, and aspect category polarity, while deep learning model outperformed classical machine learning classifiers for the task of aspect term/s.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient fake account identification in social media networks: Facebook and Instagram using NSGA-II algorithm 社交媒体网络中的高效虚假账户识别:使用 NSGA-II 算法识别 Facebook 和 Instagram 中的虚假账户
Pub Date : 2024-08-28 DOI: 10.1007/s00521-024-10350-8
Amine Sallah, El Arbi Abdellaoui Alaoui, Abdelaaziz Hessane, Said Agoujil, Anand Nayyar

The widespread use of online social networks (OSNs) has made them prime targets for cyber attackers, who exploit these platforms for various malicious activities. As a result, a whole industry of black-market services has emerged, selling services based on the sale of fake accounts. Because of the massive rise of OSNs, the number of fraudulent accounts rapidly expands. Hence, this research focuses on detecting fraudulent profiles on Instagram and Facebook and aims to find an optimal subset of features that can effectively differentiate between real and fake accounts. The problem has been formulated as a multiobjective optimization task, aiming to maximize the classification accuracy while minimizing the number of selected features. NSGA-II (non-dominated sorting genetic algorithm II) is employed as the optimization algorithm to explore the trade-offs between these conflicting objectives. In the current study, a novel approach for feature selection using the NSGA-II optimization algorithm to detect fake accounts is proposed. The proposed methodology relies on input data comprising features characterizing the profiles under investigation. The selected features are utilized to train a machine learning model. The model’s performance is evaluated using various metrics, including precision, recall, F1-score, and receiver operating characteristic (ROC) curve. The final prediction model achieved accuracy values ranging from 90 to 99.88%. The results indicated that the model, utilizing features selected by the NSGA-II algorithm, delivered high prediction accuracy while using less than 31% of the total feature space. This efficient feature selection allowed for the precise differentiation between fake and real users, demonstrating the model’s effectiveness with a minimal number of input variables. Furthermore, the results of experiments demonstrate that the proposed approach achieves better performance as compared to other existing approaches. This research paper focuses on explainability, which refers to the ability to understand and interpret the decisions and outcomes of machine learning models.

在线社交网络(OSN)的广泛使用使其成为网络攻击者的主要目标,他们利用这些平台进行各种恶意活动。因此,整个黑市服务行业应运而生,以出售虚假账户为基础销售服务。由于 OSN 的大规模兴起,虚假账户的数量迅速膨胀。因此,本研究的重点是检测 Instagram 和 Facebook 上的虚假资料,旨在找到能有效区分真假账户的最佳特征子集。该问题被表述为一个多目标优化任务,旨在最大限度地提高分类准确率,同时最小化所选特征的数量。采用 NSGA-II(非支配排序遗传算法 II)作为优化算法,以探索这些相互冲突的目标之间的权衡。本研究提出了一种利用 NSGA-II 优化算法进行特征选择以检测假账户的新方法。所提出的方法依赖于输入数据,这些数据包含描述调查对象特征的特征。所选特征用于训练机器学习模型。该模型的性能使用各种指标进行评估,包括精确度、召回率、F1-分数和接收者操作特征曲线(ROC)。最终预测模型的准确率达到了 90% 到 99.88%。结果表明,该模型利用 NSGA-II 算法选择的特征,在使用不到总特征空间 31% 的情况下,实现了较高的预测准确率。这种高效的特征选择可以精确区分虚假用户和真实用户,证明了该模型在输入变量数量极少的情况下的有效性。此外,实验结果表明,与其他现有方法相比,所提出的方法取得了更好的性能。本文的研究重点是可解释性,即理解和解释机器学习模型的决策和结果的能力。
{"title":"An efficient fake account identification in social media networks: Facebook and Instagram using NSGA-II algorithm","authors":"Amine Sallah, El Arbi Abdellaoui Alaoui, Abdelaaziz Hessane, Said Agoujil, Anand Nayyar","doi":"10.1007/s00521-024-10350-8","DOIUrl":"https://doi.org/10.1007/s00521-024-10350-8","url":null,"abstract":"<p>The widespread use of online social networks (OSNs) has made them prime targets for cyber attackers, who exploit these platforms for various malicious activities. As a result, a whole industry of black-market services has emerged, selling services based on the sale of fake accounts. Because of the massive rise of OSNs, the number of fraudulent accounts rapidly expands. Hence, this research focuses on detecting fraudulent profiles on Instagram and Facebook and aims to find an optimal subset of features that can effectively differentiate between real and fake accounts. The problem has been formulated as a multiobjective optimization task, aiming to maximize the classification accuracy while minimizing the number of selected features. NSGA-II (non-dominated sorting genetic algorithm II) is employed as the optimization algorithm to explore the trade-offs between these conflicting objectives. In the current study, a novel approach for feature selection using the NSGA-II optimization algorithm to detect fake accounts is proposed. The proposed methodology relies on input data comprising features characterizing the profiles under investigation. The selected features are utilized to train a machine learning model. The model’s performance is evaluated using various metrics, including precision, recall, <i>F</i>1-score, and receiver operating characteristic (ROC) curve. The final prediction model achieved accuracy values ranging from 90 to 99.88%. The results indicated that the model, utilizing features selected by the NSGA-II algorithm, delivered high prediction accuracy while using less than 31% of the total feature space. This efficient feature selection allowed for the precise differentiation between fake and real users, demonstrating the model’s effectiveness with a minimal number of input variables. Furthermore, the results of experiments demonstrate that the proposed approach achieves better performance as compared to other existing approaches. This research paper focuses on explainability, which refers to the ability to understand and interpret the decisions and outcomes of machine learning models.</p>","PeriodicalId":18925,"journal":{"name":"Neural Computing and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142188361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Neural Computing and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1