首页 > 最新文献

International Workshop on Intelligent Information Technologies & Systems of Information Security最新文献

英文 中文
Post-Train Adaptive MobileNet for Fast Anti-Spoofing (keynote) 训练后自适应移动网络快速反欺骗(主题演讲)
K. Khabarlak
Many applications require high accuracy of neural networks as well as low latency and user data privacy guaranty. Face anti-spoofing is one of such tasks. However, a single model might not give the best results for different device performance categories, while training multiple models is time consuming. In this work we present Post-Train Adaptive (PTA) block. Such a block is simple in structure and offers a drop-in replacement for the MobileNetV2 Inverted Residual block. The PTA block has multiple branches with different computation costs. The branch to execute can be selected on-demand and at runtime; thus, offering different inference times and configuration capability for multiple device tiers. Crucially, the model is trained once and can be easily reconfigured after training, even directly on a mobile device. In addition, the proposed approach shows substantially better overall performance in comparison to the original MobileNetV2 as tested on CelebA-Spoof dataset. Different PTA block configurations are sampled at training time, which also decreases overall wall-clock time needed to train the model. While we present computational results for the anti-spoofing problem, the MobileNetV2 with PTA blocks is applicable to any problem solvable with convolutional neural networks, which makes the results presented practically significant.
许多应用需要神经网络的高精度、低延迟和用户数据隐私保证。人脸反欺骗就是其中一项任务。然而,对于不同的设备性能类别,单个模型可能无法给出最佳结果,而训练多个模型则非常耗时。在这项工作中,我们提出了训练后自适应(PTA)块。这样的块结构简单,并为MobileNetV2倒立残余块提供了一个插入式替代品。PTA区块有多个分支,计算成本不同。可以在运行时按需选择要执行的分支;因此,为多个设备层提供不同的推理时间和配置能力。至关重要的是,模型只训练一次,训练后可以很容易地重新配置,甚至可以直接在移动设备上进行配置。此外,与在CelebA-Spoof数据集上测试的原始MobileNetV2相比,所提出的方法显示出更好的整体性能。在训练时采样不同的PTA块配置,这也减少了训练模型所需的整体时钟时间。虽然我们给出了反欺骗问题的计算结果,但具有PTA块的MobileNetV2适用于任何用卷积神经网络可解决的问题,这使得结果具有实际意义。
{"title":"Post-Train Adaptive MobileNet for Fast Anti-Spoofing (keynote)","authors":"K. Khabarlak","doi":"10.48550/arXiv.2207.13410","DOIUrl":"https://doi.org/10.48550/arXiv.2207.13410","url":null,"abstract":"Many applications require high accuracy of neural networks as well as low latency and user data privacy guaranty. Face anti-spoofing is one of such tasks. However, a single model might not give the best results for different device performance categories, while training multiple models is time consuming. In this work we present Post-Train Adaptive (PTA) block. Such a block is simple in structure and offers a drop-in replacement for the MobileNetV2 Inverted Residual block. The PTA block has multiple branches with different computation costs. The branch to execute can be selected on-demand and at runtime; thus, offering different inference times and configuration capability for multiple device tiers. Crucially, the model is trained once and can be easily reconfigured after training, even directly on a mobile device. In addition, the proposed approach shows substantially better overall performance in comparison to the original MobileNetV2 as tested on CelebA-Spoof dataset. Different PTA block configurations are sampled at training time, which also decreases overall wall-clock time needed to train the model. While we present computational results for the anti-spoofing problem, the MobileNetV2 with PTA blocks is applicable to any problem solvable with convolutional neural networks, which makes the results presented practically significant.","PeriodicalId":251021,"journal":{"name":"International Workshop on Intelligent Information Technologies & Systems of Information Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116809752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Cyber-Physical System for Increasing the Efficiency of the Iron Ore Desliming Process 提高铁矿石脱泥效率的信息物理系统
V. Morkun, N. Morkun, A. Pikilnyak, S. Semerikov, O. Serdiuk, I. Gaponenko
It is proposed to carry out the spatial effect of high-energy ultrasound dynamic effects with controlled characteristics on the solid phase particles of the ore pulp in the deslimer input product to increase the efficiency of thickening and desliming processes of iron ore beneficiation products. The above allows predicting the characteristics of particle gravitational sedimentation based on an assessment of the spatial dynamics of pulp solid- phase particles under the controlled action of high-energy ultrasound and fuzzy logical inference. The object of study is the assessment of the characteristics and the process of control the operations of thickening and deslaming of iron ore beneficiation products in the conditions of the technological line of the ore beneficiation plant. The subject of study is a cyber-physical system based on the use of high-energy ultrasound radiation pressure effects on iron-containing beneficiation products in the technological processes of thickening and desliming. The working hypothesis of the project is that there is a relationship between the physical-mechanical and chemical-mineralogical characteristics of the iron ore pulp solid- phase particles and their behavior in technological flows under the influence of controlled ultrasonic radiation, based on which the imitation modeling of the gravitational sedimentation process of the iron ore pulp solid-phase particles can be performed directly in the technological process. Also, the optimal control actions concerning the processes of thickening and desliming can be determined.
提出对脱泥输入产品中矿浆固相颗粒进行具有可控特性的高能超声动力效应的空间效应,以提高铁矿选矿产品的浓缩脱泥工艺效率。通过对高能超声和模糊逻辑推理控制下纸浆固相颗粒空间动力学的评价,可以预测颗粒重力沉降特性。研究对象是在选矿厂工艺线条件下,对铁矿选矿产品的浓缩、脱浆操作的特点和控制过程进行评价。本课题研究的是一个基于高能超声辐射压力对含铁选矿产品在浓缩和脱泥工艺过程中的影响的信息物理系统。本课题的工作假设是受控超声辐射作用下铁矿矿浆固相颗粒的物理力学特征和化学矿物学特征与其工艺流程行为之间存在一定的关系,在此基础上可在工艺流程中直接进行铁矿矿浆固相颗粒重力沉降过程的模拟建模。此外,还可以确定稠化和脱泥过程的最优控制动作。
{"title":"The Cyber-Physical System for Increasing the Efficiency of the Iron Ore Desliming Process","authors":"V. Morkun, N. Morkun, A. Pikilnyak, S. Semerikov, O. Serdiuk, I. Gaponenko","doi":"10.31812/123456789/4373","DOIUrl":"https://doi.org/10.31812/123456789/4373","url":null,"abstract":"It is proposed to carry out the spatial effect of high-energy ultrasound dynamic effects with controlled characteristics on the solid phase particles of the ore pulp in the deslimer input product to increase the efficiency of thickening and desliming processes of iron ore beneficiation products. The above allows predicting the characteristics of particle gravitational sedimentation based on an assessment of the spatial dynamics of pulp solid- phase particles under the controlled action of high-energy ultrasound and fuzzy logical inference. The object of study is the assessment of the characteristics and the process of control the operations of thickening and deslaming of iron ore beneficiation products in the conditions of the technological line of the ore beneficiation plant. The subject of study is a cyber-physical system based on the use of high-energy ultrasound radiation pressure effects on iron-containing beneficiation products in the technological processes of thickening and desliming. The working hypothesis of the project is that there is a relationship between the physical-mechanical and chemical-mineralogical characteristics of the iron ore pulp solid- phase particles and their behavior in technological flows under the influence of controlled ultrasonic radiation, based on which the imitation modeling of the gravitational sedimentation process of the iron ore pulp solid-phase particles can be performed directly in the technological process. Also, the optimal control actions concerning the processes of thickening and desliming can be determined.","PeriodicalId":251021,"journal":{"name":"International Workshop on Intelligent Information Technologies & Systems of Information Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130667738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Method of Assessing the Influence of Personnel Competence on Institutional Information Security 人员胜任能力对机构信息安全影响的评估方法
I. Pilkevych, O. Boychenko, N. Lobanchykova, T. Vakaliuk, S. Semerikov
Modern types of internal threats and methods of counteracting these threats are analyzed. It is established that increasing the competence of the staff of the institution through training (education) is the most effective method of counteracting internal threats to information. A method for assessing the influence of personnel competence on institutional information security is proposed. This method takes into account violator models and information threat models that are designed for a specific institution. The method proposes to assess the competence of the staff of the institution by three components: the level of knowledge, skills, and character traits (personal qualities). It is proposed to assess the level of knowledge based on the results of test tasks of different levels of complexity. Not only the number of correct answers is taken into account, but also the complexity of test tasks. It is proposed to assess the assessment of the level of skills as the ratio of the number of correctly performed practical tasks to the total number of practical tasks. It is assumed that the number of practical tasks, their complexity is determined for each institution by the direction of activity. It is proposed to use a list of character traits for each position to assess the character traits (personal qualities) that a person must have to effectively perform the tasks assigned to him. This list should be developed in each institution. It is proposed to establish a quantitative assessment of the state of information security, defining it as restoring the amount of probability of occurrence of a threat from the relevant employee to the product of the general threat and employees of the institution. An experiment was conducted, the results of which form a particular institution show different values of the level of information security of the institution for different values of the competence of the staff of the institution. It is shown that with the increase of the level of competence of the staff of the institution the state of information security in the institution increases.
分析了现代内部威胁的类型和应对这些威胁的方法。通过培训(教育)提高机构工作人员的能力是对抗内部信息威胁的最有效方法。提出了一种评估人员胜任能力对机构信息安全影响的方法。该方法考虑了针对特定机构设计的违规者模型和信息威胁模型。该方法建议通过三个组成部分来评估机构工作人员的能力:知识水平、技能和性格特征(个人素质)。提出了基于不同复杂程度测试任务的结果来评估知识水平的方法。不仅要考虑正确答案的数量,还要考虑测试任务的复杂性。建议以正确完成实际任务的次数与实际任务总数之比来评估技能水平的评估。假设实际任务的数量及其复杂性是由每个机构的活动方向决定的。建议对每个职位使用一个性格特征列表来评估一个人有效地完成分配给他的任务所必须具备的性格特征(个人品质)。每个机构都应该制定这份清单。建议建立对信息安全状态的定量评估,将其定义为将相关员工发生威胁的概率量恢复为一般威胁与机构员工的乘积。进行了一项实验,其结果形成了一个特定的机构显示不同价值观的机构的信息安全水平对于不同价值观的机构的工作人员的能力。研究表明,随着机构工作人员能力水平的提高,机构的信息安全状况也随之提高。
{"title":"Method of Assessing the Influence of Personnel Competence on Institutional Information Security","authors":"I. Pilkevych, O. Boychenko, N. Lobanchykova, T. Vakaliuk, S. Semerikov","doi":"10.31812/123456789/4374","DOIUrl":"https://doi.org/10.31812/123456789/4374","url":null,"abstract":"Modern types of internal threats and methods of counteracting these threats are analyzed. It is established that increasing the competence of the staff of the institution through training (education) is the most effective method of counteracting internal threats to information. A method for assessing the influence of personnel competence on institutional information security is proposed. This method takes into account violator models and information threat models that are designed for a specific institution. The method proposes to assess the competence of the staff of the institution by three components: the level of knowledge, skills, and character traits (personal qualities). It is proposed to assess the level of knowledge based on the results of test tasks of different levels of complexity. Not only the number of correct answers is taken into account, but also the complexity of test tasks. It is proposed to assess the assessment of the level of skills as the ratio of the number of correctly performed practical tasks to the total number of practical tasks. It is assumed that the number of practical tasks, their complexity is determined for each institution by the direction of activity. It is proposed to use a list of character traits for each position to assess the character traits (personal qualities) that a person must have to effectively perform the tasks assigned to him. This list should be developed in each institution. It is proposed to establish a quantitative assessment of the state of information security, defining it as restoring the amount of probability of occurrence of a threat from the relevant employee to the product of the general threat and employees of the institution. An experiment was conducted, the results of which form a particular institution show different values of the level of information security of the institution for different values of the competence of the staff of the institution. It is shown that with the increase of the level of competence of the staff of the institution the state of information security in the institution increases.","PeriodicalId":251021,"journal":{"name":"International Workshop on Intelligent Information Technologies & Systems of Information Security","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132867648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
International Workshop on Intelligent Information Technologies & Systems of Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1