首页 > 最新文献

2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI)最新文献

英文 中文
Feature Construction, Feature Reduction and Search Space Reduction Using Genetic Programming 基于遗传规划的特征构造、特征约简与搜索空间约简
Pub Date : 2022-11-26 DOI: 10.1109/ISCMI56532.2022.10068452
David Herrera-Sánchez, E. Mezura-Montes, H. Acosta-Mesa
Feature construction and feature selection are essential pre-processing techniques in data mining, especially for high-dimensional data. The principal goals of such techniques are to increase accuracy in classification tasks and reduce runtime in the learning process. Genetic programming is used to construct a new high-level feature space. Additionally, the feature selection process, immersed in the task, is seized. Therefore, a set of features with relevant information is obtained. This paper presents an approach to reducing the features of high-dimensional data throughout genetic programming. Moreover, reducing the search space eliminates features that do not have considerable information over the generations of the search process. Although the approach is simple, competitive results are achieved. In the implementation, the wrapper approach is used for the classifier to lead the searching process.
特征构建和特征选择是数据挖掘中必不可少的预处理技术,尤其是对高维数据的预处理。这些技术的主要目标是提高分类任务的准确性,减少学习过程中的运行时间。利用遗传规划构造新的高级特征空间。此外,沉浸在任务中的特征选择过程被捕获。这样就得到了一组具有相关信息的特征。本文提出了一种通过遗传规划来减少高维数据特征的方法。此外,减少搜索空间消除了在几代搜索过程中没有大量信息的特征。虽然方法简单,但取得了有竞争力的结果。在实现中,分类器使用包装器方法来引导搜索过程。
{"title":"Feature Construction, Feature Reduction and Search Space Reduction Using Genetic Programming","authors":"David Herrera-Sánchez, E. Mezura-Montes, H. Acosta-Mesa","doi":"10.1109/ISCMI56532.2022.10068452","DOIUrl":"https://doi.org/10.1109/ISCMI56532.2022.10068452","url":null,"abstract":"Feature construction and feature selection are essential pre-processing techniques in data mining, especially for high-dimensional data. The principal goals of such techniques are to increase accuracy in classification tasks and reduce runtime in the learning process. Genetic programming is used to construct a new high-level feature space. Additionally, the feature selection process, immersed in the task, is seized. Therefore, a set of features with relevant information is obtained. This paper presents an approach to reducing the features of high-dimensional data throughout genetic programming. Moreover, reducing the search space eliminates features that do not have considerable information over the generations of the search process. Although the approach is simple, competitive results are achieved. In the implementation, the wrapper approach is used for the classifier to lead the searching process.","PeriodicalId":340397,"journal":{"name":"2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116714593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online News Extraction and Multiclass Classification Using Linear Support Vector Machines 基于线性支持向量机的在线新闻提取和多类分类
Pub Date : 2022-11-26 DOI: 10.1109/ISCMI56532.2022.10068460
Apoorva Gupta, Smriti Arora, Niyati Baliyan
Online news articles, blogs, sites are a rich source of diverse text-based data. However, the data contained in these sources cannot be manually extricated, recorded, and listed because it comes in colossal size. Accurate mapping of precise news into their corresponding category is challenging in these times. Several methods have been proposed over time for news classification when training documents for each predefined class are present readily, however such methods were tried and tested upon a small dataset. With the underlying research, the aim is to propose a method that can be used when lakhs and lakhs of instances are present. This research analysis involves the task of news classification using multiclass classifiers - OneVsRest and OneVsOne classifiers over the Linear Support Vector Classification to learn the performance of multiclass news categorization. The proposed methodology “Keyword Based Classification Technique (KBCT)” in this study was executed and concluded using Python and deployed using Google Colaboratory. The result was expressed using four distinguished news classes over a multivariate dataset of 422419 instances from the uci-news-aggregator dataset. The OneVsRestClassifier's accuracy was computed to be 95.76% that was 0.09% more than the OneVsOneClassifier's accuracy of 95.67%. The proposed prototype was compared with some of the related studies and algorithms, and the outcomes produced by the OneVsRest model were the most optimum in terms of accuracy.
在线新闻文章、博客、网站是各种文本数据的丰富来源。然而,这些数据源中包含的数据无法手工提取、记录和列出,因为它们的大小非常大。在这个时代,将精确的新闻准确地归入相应的类别是一项挑战。随着时间的推移,当每个预定义类的训练文档都很容易出现时,已经提出了几种用于新闻分类的方法,但是这些方法都是在小数据集上进行尝试和测试的。在基础研究中,目标是提出一种可以在存在成千上万个实例时使用的方法。本研究分析涉及使用多类分类器OneVsRest和OneVsOne分类器在线性支持向量分类上进行新闻分类的任务,以学习多类新闻分类的性能。本研究中提出的方法“基于关键字的分类技术(KBCT)”使用Python执行和总结,并使用谷歌协作实验室部署。结果使用来自uci-news-aggregator数据集的422419个实例的多元数据集上的四个不同的新闻类来表示。计算出OneVsRestClassifier的准确率为95.76%,比onevsonecclassifier的准确率95.67%高出0.09%。将提出的原型与一些相关的研究和算法进行比较,发现OneVsRest模型产生的结果在准确性方面是最优的。
{"title":"Online News Extraction and Multiclass Classification Using Linear Support Vector Machines","authors":"Apoorva Gupta, Smriti Arora, Niyati Baliyan","doi":"10.1109/ISCMI56532.2022.10068460","DOIUrl":"https://doi.org/10.1109/ISCMI56532.2022.10068460","url":null,"abstract":"Online news articles, blogs, sites are a rich source of diverse text-based data. However, the data contained in these sources cannot be manually extricated, recorded, and listed because it comes in colossal size. Accurate mapping of precise news into their corresponding category is challenging in these times. Several methods have been proposed over time for news classification when training documents for each predefined class are present readily, however such methods were tried and tested upon a small dataset. With the underlying research, the aim is to propose a method that can be used when lakhs and lakhs of instances are present. This research analysis involves the task of news classification using multiclass classifiers - OneVsRest and OneVsOne classifiers over the Linear Support Vector Classification to learn the performance of multiclass news categorization. The proposed methodology “Keyword Based Classification Technique (KBCT)” in this study was executed and concluded using Python and deployed using Google Colaboratory. The result was expressed using four distinguished news classes over a multivariate dataset of 422419 instances from the uci-news-aggregator dataset. The OneVsRestClassifier's accuracy was computed to be 95.76% that was 0.09% more than the OneVsOneClassifier's accuracy of 95.67%. The proposed prototype was compared with some of the related studies and algorithms, and the outcomes produced by the OneVsRest model were the most optimum in terms of accuracy.","PeriodicalId":340397,"journal":{"name":"2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127588695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel Quality Prediction in 5G LTE Small Cell Mobile Network Using Deep Learning 基于深度学习的5G LTE小蜂窝移动网络信道质量预测
Pub Date : 2022-11-26 DOI: 10.1109/ISCMI56532.2022.10068487
Ndolane Diouf, Massa Ndong, Dialo Diop, K. Talla, Mamadou Sarr, A. Beye
Prior knowledge of wireless channel quality with high accuracy is essential to enable anticipated networking tasks. Traditional channel quality prediction problems rely on past channel information to predict its future quality. In this paper, we investigate the channel quality prediction problem over different wireless channels. We propose an efficient prediction scheme based on deep learning, to predict channel quality. For the deep learning task, we use deep neural networks and long short-term memory networks. We compare their performance on a dataset collected from a commercial 4G mobile radio network of Orange Senegal. The performance evaluation performed on the benchmark dataset demonstrates the validity of the proposed deep learning approach, reaching a root mean square error of 0.27 for the LSTM model and 0.28 for the DNN model. The performances in terms of RMSE with the same dataset for each of the models used in this study were compared to other models. Thus, the DNN and LSTM models give low RMSEs compared to the models of our previous work. The proposed prediction method can be applied for 5G small cell networks.
高精度无线信道质量的先验知识对于实现预期的网络任务至关重要。传统的信道质量预测问题依赖于过去的信道信息来预测其未来的信道质量。本文研究了不同无线信道下的信道质量预测问题。我们提出了一种基于深度学习的有效预测方案来预测信道质量。对于深度学习任务,我们使用深度神经网络和长短期记忆网络。我们在从Orange塞内加尔的商业4G移动无线网络收集的数据集上比较了它们的性能。在基准数据集上进行的性能评估证明了所提出的深度学习方法的有效性,LSTM模型的均方根误差为0.27,DNN模型的均方根误差为0.28。本研究中使用的每个模型在相同数据集的RMSE方面的性能与其他模型进行了比较。因此,与我们以前的工作模型相比,DNN和LSTM模型给出了较低的均方根误差。该预测方法可应用于5G小蜂窝网络。
{"title":"Channel Quality Prediction in 5G LTE Small Cell Mobile Network Using Deep Learning","authors":"Ndolane Diouf, Massa Ndong, Dialo Diop, K. Talla, Mamadou Sarr, A. Beye","doi":"10.1109/ISCMI56532.2022.10068487","DOIUrl":"https://doi.org/10.1109/ISCMI56532.2022.10068487","url":null,"abstract":"Prior knowledge of wireless channel quality with high accuracy is essential to enable anticipated networking tasks. Traditional channel quality prediction problems rely on past channel information to predict its future quality. In this paper, we investigate the channel quality prediction problem over different wireless channels. We propose an efficient prediction scheme based on deep learning, to predict channel quality. For the deep learning task, we use deep neural networks and long short-term memory networks. We compare their performance on a dataset collected from a commercial 4G mobile radio network of Orange Senegal. The performance evaluation performed on the benchmark dataset demonstrates the validity of the proposed deep learning approach, reaching a root mean square error of 0.27 for the LSTM model and 0.28 for the DNN model. The performances in terms of RMSE with the same dataset for each of the models used in this study were compared to other models. Thus, the DNN and LSTM models give low RMSEs compared to the models of our previous work. The proposed prediction method can be applied for 5G small cell networks.","PeriodicalId":340397,"journal":{"name":"2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115413412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Learning Disentangled Representations Using Dormant Variations 使用休眠变异学习解纠缠表征
Pub Date : 2022-11-26 DOI: 10.1109/ISCMI56532.2022.10068446
K. Palaniappan, Ushasukhanya S, T. N. Malleswari, Prabha Selvaraj, Vijay Kumar Burugari
A disentangled representation is one in which each variable in the latent space is sensitive to one single generative factor and is relatively dormant to other factors. Disentanglement results in an incisive latent representation of the image which can be used for downstream tasks such as reinforcement learning and supervised learning. The discrete generative factors in image datasets are hard to capture in the form of a latent space and in order to perform efficient interpolations it requires smooth and continuous latent spaces in order to address this by disentangling the important factors of the input image in the latent space. Subsequently post training the model should be able to generate different versions of the input image by varying features/attributes. A technique Hybrid Optimized GAN using Dormant Variants (HOGDV) is proposed which can be deployed in multiple places if the number is made variable and works on a wide variety of data distribution.
一个解纠缠的表示是潜伏空间中的每个变量对一个单一的生成因素敏感,而对其他因素相对休眠。解纠缠导致图像的清晰潜在表示,可用于下游任务,如强化学习和监督学习。图像数据集中的离散生成因子很难以潜在空间的形式捕获,为了执行有效的插值,它需要平滑和连续的潜在空间,以便通过在潜在空间中解开输入图像的重要因素来解决这个问题。随后,训练后的模型应该能够通过不同的特征/属性生成不同版本的输入图像。提出了一种利用休眠变异体(HOGDV)的混合优化GAN技术,该技术可以在多个位置部署,并且可以应用于各种数据分布。
{"title":"Learning Disentangled Representations Using Dormant Variations","authors":"K. Palaniappan, Ushasukhanya S, T. N. Malleswari, Prabha Selvaraj, Vijay Kumar Burugari","doi":"10.1109/ISCMI56532.2022.10068446","DOIUrl":"https://doi.org/10.1109/ISCMI56532.2022.10068446","url":null,"abstract":"A disentangled representation is one in which each variable in the latent space is sensitive to one single generative factor and is relatively dormant to other factors. Disentanglement results in an incisive latent representation of the image which can be used for downstream tasks such as reinforcement learning and supervised learning. The discrete generative factors in image datasets are hard to capture in the form of a latent space and in order to perform efficient interpolations it requires smooth and continuous latent spaces in order to address this by disentangling the important factors of the input image in the latent space. Subsequently post training the model should be able to generate different versions of the input image by varying features/attributes. A technique Hybrid Optimized GAN using Dormant Variants (HOGDV) is proposed which can be deployed in multiple places if the number is made variable and works on a wide variety of data distribution.","PeriodicalId":340397,"journal":{"name":"2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122454976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dysfluency Classification in Speech Using a Biological Sound Perception Model 基于生物声音感知模型的言语不流利分类
Pub Date : 2022-11-26 DOI: 10.1109/ISCMI56532.2022.10068490
Mélanie Jouaiti, K. Dautenhahn
Dysfluency classification for stuttered speech has been tackled from different perspectives over the years, with research being more and more focused on deep learning. Here, we use a specific biological model of sound texture perception to extract a subband representation of speech and statistical features. A statistical analysis was also performed to identify relevant features. Afterwards, dysfluency classification was performed using a Random Forest Classifier to perform multi-label classification on the FluencyBank dataset and Support Vector Machine on the UCLASS dataset. This method performs as well or better than current state of the art deep learning algorithm, suggesting that approaching speech classification problems from a more biological point of view is a promising direction.
多年来,人们从不同的角度对口吃言语的非流利性分类进行了研究,研究越来越集中在深度学习上。在这里,我们使用声音纹理感知的特定生物学模型来提取语音和统计特征的子带表示。统计分析也确定执行相关功能。然后,使用随机森林分类器对FluencyBank数据集进行多标签分类,并使用支持向量机对UCLASS数据集进行多标签分类。该方法的性能与当前最先进的深度学习算法一样好,甚至更好,这表明从更生物学的角度来处理语音分类问题是一个有前途的方向。
{"title":"Dysfluency Classification in Speech Using a Biological Sound Perception Model","authors":"Mélanie Jouaiti, K. Dautenhahn","doi":"10.1109/ISCMI56532.2022.10068490","DOIUrl":"https://doi.org/10.1109/ISCMI56532.2022.10068490","url":null,"abstract":"Dysfluency classification for stuttered speech has been tackled from different perspectives over the years, with research being more and more focused on deep learning. Here, we use a specific biological model of sound texture perception to extract a subband representation of speech and statistical features. A statistical analysis was also performed to identify relevant features. Afterwards, dysfluency classification was performed using a Random Forest Classifier to perform multi-label classification on the FluencyBank dataset and Support Vector Machine on the UCLASS dataset. This method performs as well or better than current state of the art deep learning algorithm, suggesting that approaching speech classification problems from a more biological point of view is a promising direction.","PeriodicalId":340397,"journal":{"name":"2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127519593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Framework for Secure Cloud Computing Based IDS Using Machine Learning Techniques 基于机器学习技术的安全云计算IDS新框架
Pub Date : 2022-11-26 DOI: 10.1109/ISCMI56532.2022.10068437
Geetika Tiwari, Ruchi Jain
Cloud computing has been promoted as one of the most effective methods of hosting and delivering services via the internet. But cloud security remains a serious concern for cloud computing. Many secure solutions have been developed to safeguard communication in such environments, the majority of which are based on attack signatures. These systems are often ineffective in detecting all forms of threats. To address this gap machine learning approaches are being explored. In this research, we present a novel firewall mechanism for safe cloud computing environments called machine learning system. Proposed Method identifies and classifies incoming traffic packets using a novel combination methodology named most frequent decision, in which the nodes' one previous decisions are coupled with the machine learning algorithm's current decision to estimate the final attack category classification. This method improves learning performance as well as system correctness. UNSW-NB-15, a publicly accessible dataset, is utilized to derive our findings. Our data demonstrate that it enhances anomaly detection to 97.68 percent.
云计算已被推广为通过互联网托管和提供服务的最有效方法之一。但是云安全仍然是云计算的一个严重问题。已经开发了许多安全解决方案来保护这种环境中的通信,其中大多数是基于攻击签名的。这些系统在检测各种形式的威胁方面往往是无效的。为了解决这一差距,人们正在探索机器学习的方法。在这项研究中,我们提出了一种新的安全云计算环境防火墙机制,称为机器学习系统。该方法采用一种新的组合方法,即最频繁决策,将节点之前的一个决策与机器学习算法的当前决策相结合,以估计最终的攻击类别分类。这种方法不仅提高了学习性能,而且提高了系统的正确性。UNSW-NB-15是一个可公开访问的数据集,用于得出我们的研究结果。我们的数据表明,该方法将异常检出率提高到97.68%。
{"title":"A Novel Framework for Secure Cloud Computing Based IDS Using Machine Learning Techniques","authors":"Geetika Tiwari, Ruchi Jain","doi":"10.1109/ISCMI56532.2022.10068437","DOIUrl":"https://doi.org/10.1109/ISCMI56532.2022.10068437","url":null,"abstract":"Cloud computing has been promoted as one of the most effective methods of hosting and delivering services via the internet. But cloud security remains a serious concern for cloud computing. Many secure solutions have been developed to safeguard communication in such environments, the majority of which are based on attack signatures. These systems are often ineffective in detecting all forms of threats. To address this gap machine learning approaches are being explored. In this research, we present a novel firewall mechanism for safe cloud computing environments called machine learning system. Proposed Method identifies and classifies incoming traffic packets using a novel combination methodology named most frequent decision, in which the nodes' one previous decisions are coupled with the machine learning algorithm's current decision to estimate the final attack category classification. This method improves learning performance as well as system correctness. UNSW-NB-15, a publicly accessible dataset, is utilized to derive our findings. Our data demonstrate that it enhances anomaly detection to 97.68 percent.","PeriodicalId":340397,"journal":{"name":"2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124268807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Biological Plausibility of Orthogonal Initialisation for Solving Gradient Instability in Deep Neural Networks 正交初始化求解深度神经网络梯度不稳定性的生物合理性研究
Pub Date : 2022-10-27 DOI: 10.1109/ISCMI56532.2022.10068489
Nikolay Manchev, Michael W. Spratling
Initialising the synaptic weights of artificial neural networks (ANNs) with orthogonal matrices is known to alleviate vanishing and exploding gradient problems. A major objection against such initialisation schemes is that they are deemed biologically implausible as they mandate factorization techniques that are difficult to attribute to a neurobiological process. This paper presents two initialisation schemes that allow a network to naturally evolve its weights to form orthogonal matrices, provides theoretical analysis that pre-training orthogonalisation always converges, and empirically confirms that the proposed schemes outperform randomly initialised recurrent and feedforward networks.
用正交矩阵初始化人工神经网络(ANNs)的突触权值可以缓解梯度消失和爆炸问题。对此类初始化方案的主要反对意见是,它们被认为在生物学上是不可信的,因为它们要求使用难以归因于神经生物学过程的因子分解技术。本文提出了两种初始化方案,允许网络自然地进化其权重以形成正交矩阵,提供了预训练正交化总是收敛的理论分析,并经验证实了所提出的方案优于随机初始化的循环和前馈网络。
{"title":"On the Biological Plausibility of Orthogonal Initialisation for Solving Gradient Instability in Deep Neural Networks","authors":"Nikolay Manchev, Michael W. Spratling","doi":"10.1109/ISCMI56532.2022.10068489","DOIUrl":"https://doi.org/10.1109/ISCMI56532.2022.10068489","url":null,"abstract":"Initialising the synaptic weights of artificial neural networks (ANNs) with orthogonal matrices is known to alleviate vanishing and exploding gradient problems. A major objection against such initialisation schemes is that they are deemed biologically implausible as they mandate factorization techniques that are difficult to attribute to a neurobiological process. This paper presents two initialisation schemes that allow a network to naturally evolve its weights to form orthogonal matrices, provides theoretical analysis that pre-training orthogonalisation always converges, and empirically confirms that the proposed schemes outperform randomly initialised recurrent and feedforward networks.","PeriodicalId":340397,"journal":{"name":"2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI)","volume":"32 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114128167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Continuous User Authentication Using Machine Learning and Multi-finger Mobile Touch Dynamics with a Novel Dataset 使用机器学习和多指移动触摸动力学的连续用户认证与新数据集
Pub Date : 2022-07-27 DOI: 10.1109/ISCMI56532.2022.10068450
Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala
As technology grows and evolves rapidly, it is increasingly clear that mobile devices are more commonly used for sensitive matters than ever before. A need to authenticate users continuously is sought after as a single-factor or multi-factor authentication may only initially validate a user, which doesn't help if an impostor can bypass this initial validation. The field of touch dynamics emerges as a clear way to non-intrusively collect data about a user and their behaviors in order to develop and make imperative security-related decisions in real time. In this paper we present a novel dataset consisting of tracking 25 users playing two mobile games - Snake.io and Minecraft - each for 10 minutes, along with their relevant gesture data. From this data, we ran machine learning binary classifiers - namely Random Forest and K-Nearest Neighbor - to attempt to authenticate whether a sample of a particular user's actions were genuine. Our strongest model returned an average accuracy of roughly 93% for both games, showing touch dynamics can differentiate users effectively and is a feasible consideration for authentication schemes. Our dataset can be observed at https://github.com/zderidder/MC-Snake-Results
随着技术的快速发展和发展,越来越明显的是,移动设备比以往任何时候都更常用于敏感问题。需要不断地对用户进行身份验证,因为单因素或多因素身份验证可能只会对用户进行初始验证,如果冒名顶替者可以绕过这个初始验证,这就没有帮助了。触控动态领域的出现是一种清晰的方式,可以非侵入性地收集用户及其行为数据,以便实时开发和制定必要的安全相关决策。在本文中,我们提出了一个新的数据集,该数据集由跟踪25个玩两种手机游戏的用户组成。io和Minecraft -每个10分钟,以及相关的手势数据。从这些数据中,我们运行机器学习二元分类器——即随机森林和k近邻——试图验证特定用户行为的样本是否真实。我们最强的模型对这两款游戏的平均准确率约为93%,这表明触摸动态可以有效区分用户,并且是认证方案的可行考虑因素。我们的数据集可以在https://github.com/zderidder/MC-Snake-Results上观察到
{"title":"Continuous User Authentication Using Machine Learning and Multi-finger Mobile Touch Dynamics with a Novel Dataset","authors":"Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala","doi":"10.1109/ISCMI56532.2022.10068450","DOIUrl":"https://doi.org/10.1109/ISCMI56532.2022.10068450","url":null,"abstract":"As technology grows and evolves rapidly, it is increasingly clear that mobile devices are more commonly used for sensitive matters than ever before. A need to authenticate users continuously is sought after as a single-factor or multi-factor authentication may only initially validate a user, which doesn't help if an impostor can bypass this initial validation. The field of touch dynamics emerges as a clear way to non-intrusively collect data about a user and their behaviors in order to develop and make imperative security-related decisions in real time. In this paper we present a novel dataset consisting of tracking 25 users playing two mobile games - Snake.io and Minecraft - each for 10 minutes, along with their relevant gesture data. From this data, we ran machine learning binary classifiers - namely Random Forest and K-Nearest Neighbor - to attempt to authenticate whether a sample of a particular user's actions were genuine. Our strongest model returned an average accuracy of roughly 93% for both games, showing touch dynamics can differentiate users effectively and is a feasible consideration for authentication schemes. Our dataset can be observed at https://github.com/zderidder/MC-Snake-Results","PeriodicalId":340397,"journal":{"name":"2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124025479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Using Deep Learning to Detecting Deepfakes 使用深度学习检测深度造假
Pub Date : 2022-07-27 DOI: 10.1109/ISCMI56532.2022.10068449
Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala
In the recent years, social media has grown to become a major source of information for many online users. This has given rise to the spread of misinformation through deepfakes. Deepfakes are videos or images that replace one person's face with another computer-generated face, often a more recognizable person in society. With the recent advances in technology, a person with little technological experience can generate these videos. This enables them to mimic a power figure in society, such as a president or celebrity, creating the potential danger of spreading misinformation and other nefarious uses of deepfakes. To combat this online threat, researchers have developed models that are designed to detect deepfakes. This study looks at various deepfake detection models that use deep learning algorithms to combat this looming threat. This survey focuses on providing a comprehensive overview of the current state of deepfake detection models and the unique approaches many researchers take to solving this problem. The benefits, limitations, and suggestions for future work will be thoroughly discussed throughout this paper.
近年来,社交媒体已经发展成为许多在线用户的主要信息来源。这导致了虚假信息通过深度造假的传播。深度伪造是指用电脑生成的另一张人脸代替一个人的脸的视频或图像,通常是社会上更容易识别的人。随着最近技术的进步,一个没有技术经验的人也可以制作这些视频。这使他们能够模仿社会上的权力人物,如总统或名人,从而产生传播错误信息和其他恶意使用深度伪造的潜在危险。为了对抗这种在线威胁,研究人员开发了旨在检测深度伪造的模型。这项研究着眼于各种深度伪造检测模型,这些模型使用深度学习算法来对抗这种迫在眉睫的威胁。本调查的重点是全面概述深度伪造检测模型的现状,以及许多研究人员解决这一问题的独特方法。本文将全面讨论其优点、局限性和对未来工作的建议。
{"title":"Using Deep Learning to Detecting Deepfakes","authors":"Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala","doi":"10.1109/ISCMI56532.2022.10068449","DOIUrl":"https://doi.org/10.1109/ISCMI56532.2022.10068449","url":null,"abstract":"In the recent years, social media has grown to become a major source of information for many online users. This has given rise to the spread of misinformation through deepfakes. Deepfakes are videos or images that replace one person's face with another computer-generated face, often a more recognizable person in society. With the recent advances in technology, a person with little technological experience can generate these videos. This enables them to mimic a power figure in society, such as a president or celebrity, creating the potential danger of spreading misinformation and other nefarious uses of deepfakes. To combat this online threat, researchers have developed models that are designed to detect deepfakes. This study looks at various deepfake detection models that use deep learning algorithms to combat this looming threat. This survey focuses on providing a comprehensive overview of the current state of deepfake detection models and the unique approaches many researchers take to solving this problem. The benefits, limitations, and suggestions for future work will be thoroughly discussed throughout this paper.","PeriodicalId":340397,"journal":{"name":"2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124471037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Knowledge Graph Fusion for Language Model Fine-Tuning 基于知识图融合的语言模型微调
Pub Date : 2022-06-21 DOI: 10.1109/ISCMI56532.2022.10068451
Nimesh Bhana, Terence L van Zyl
Language Models such as BERT (Bidirectional Encoder Representations from Transformers) have grown in popularity due to their ability to be pre-trained and perform robustly on a wide range of Natural Language Processing tasks. Often seen as an evolution over traditional word embedding techniques, they can produce semantic representations of text, useful for tasks such as semantic similarity. However, state-of-the-art models often have high computational requirements and lack global context or domain knowledge which is required for complete language understanding. To address these limitations, we investigate the benefits of knowledge incorporation into the fine-tuning stages of BERT. An existing K-BERT model, which enriches sentences with triplets from a Knowledge Graph, is adapted for the English language and extended to inject contextually relevant information into sentences. As a side-effect, changes made to K-BERT for accommodating the English language also extend to other word-based languages. Experiments conducted indicate that injected knowledge introduces noise. We see statistically significant improvements for knowledge-driven tasks when this noise is minimised. We show evidence that, given the appropriate task, modest injection with relevant, high-quality knowledge is most performant.
语言模型,如BERT(来自变形金刚的双向编码器表示)已经越来越受欢迎,因为它们能够在广泛的自然语言处理任务上进行预训练和健壮地执行。它们通常被视为传统词嵌入技术的进化,可以生成文本的语义表示,对语义相似性等任务很有用。然而,最先进的模型通常具有很高的计算要求,并且缺乏完整语言理解所需的全局上下文或领域知识。为了解决这些限制,我们研究了将知识纳入BERT微调阶段的好处。现有的K-BERT模型使用知识图中的三元组来丰富句子,该模型适用于英语语言,并扩展到将上下文相关的信息注入句子中。作为一个副作用,为适应英语而对K-BERT所做的更改也扩展到其他基于单词的语言。实验表明,注入的知识引入了噪声。当这种噪音最小化时,我们可以看到知识驱动型任务在统计上的显著改善。我们展示的证据表明,在给定适当的任务时,适度注入相关的高质量知识是最有效的。
{"title":"Knowledge Graph Fusion for Language Model Fine-Tuning","authors":"Nimesh Bhana, Terence L van Zyl","doi":"10.1109/ISCMI56532.2022.10068451","DOIUrl":"https://doi.org/10.1109/ISCMI56532.2022.10068451","url":null,"abstract":"Language Models such as BERT (Bidirectional Encoder Representations from Transformers) have grown in popularity due to their ability to be pre-trained and perform robustly on a wide range of Natural Language Processing tasks. Often seen as an evolution over traditional word embedding techniques, they can produce semantic representations of text, useful for tasks such as semantic similarity. However, state-of-the-art models often have high computational requirements and lack global context or domain knowledge which is required for complete language understanding. To address these limitations, we investigate the benefits of knowledge incorporation into the fine-tuning stages of BERT. An existing K-BERT model, which enriches sentences with triplets from a Knowledge Graph, is adapted for the English language and extended to inject contextually relevant information into sentences. As a side-effect, changes made to K-BERT for accommodating the English language also extend to other word-based languages. Experiments conducted indicate that injected knowledge introduces noise. We see statistically significant improvements for knowledge-driven tasks when this noise is minimised. We show evidence that, given the appropriate task, modest injection with relevant, high-quality knowledge is most performant.","PeriodicalId":340397,"journal":{"name":"2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI)","volume":"10 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121009686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1