首页 > 最新文献

2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)最新文献

英文 中文
[Title page i] [标题页i]
{"title":"[Title page i]","authors":"","doi":"10.1109/ictai.2019.00001","DOIUrl":"https://doi.org/10.1109/ictai.2019.00001","url":null,"abstract":"","PeriodicalId":346657,"journal":{"name":"2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131861228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Harnessing GAN with Metric Learning for One-Shot Generation on a Fine-Grained Category 基于度量学习的GAN在细粒度分类上的一次性生成
Yusuke Ohtsubo, Tetsu Matsukawa, Einoshin Suzuki
We propose a GAN-based one-shot generation method on a fine-grained category, which represents a subclass of a category, typically with diverse examples. One-shot generation refers to a task of taking an image which belongs to a class not used in the training phase and then generating a set of new images belonging to the same class. Generative Adversarial Network (GAN), which represents a type of deep neural networks with competing generator and discriminator, has proven to be useful in generating realistic images. Especially DAGAN, which maps the input image to a low-dimensional space via an encoder and then back to the example space via a decoder, has been quite effective with datasets such as handwritten character datasets. However, when the class corresponds to a fine-grained category, DAGAN occasionally generates images which are regarded as belonging to other classes due to the rich variety of the examples in the class and the low dissimilarities of the examples among the classes. For example, it accidentally generates facial images of different persons when the class corresponds to a specific person. To circumvent this problem, we introduce a metric learning with a triplet loss to the bottleneck layer of DAGAN to penalize such a generation. We also extend the optimization algorithm of DAGAN to an alternating procedure for two types of loss functions. Our proposed method outperforms DAGAN in the GAN-test task for VGG-Face dataset and CompCars dataset by 5.6% and 4.8% in accuracy, respectively. We also conducted experiments for the data augmentation task and observed 4.5% higher accuracy for our proposed method over DAGAN for VGG-Face dataset.
我们提出了一种基于gan的细粒度类别的一次性生成方法,细粒度类别代表一个类别的子类,通常具有不同的示例。一次性生成(One-shot generation)是指取一张训练阶段未使用的类别的图像,然后生成一组属于同一类别的新图像。生成式对抗网络(GAN)是一种具有生成器和鉴别器竞争的深度神经网络,在生成逼真图像方面非常有用。特别是DAGAN,它通过编码器将输入图像映射到低维空间,然后通过解码器返回到示例空间,对于手写字符数据集等数据集非常有效。然而,当类对应于一个细粒度的类别时,DAGAN偶尔会产生被认为属于其他类的图像,因为类中的样本种类丰富,类之间的样本不相似度很低。例如,当类对应于特定的人时,它会意外地生成不同人的面部图像。为了避免这个问题,我们在DAGAN的瓶颈层引入了一个带有三重损失的度量学习来惩罚这样的生成。我们还将DAGAN的优化算法推广到两类损失函数的交替过程。在VGG-Face数据集和CompCars数据集的gan测试任务中,我们提出的方法的准确率分别比DAGAN高5.6%和4.8%。我们还对VGG-Face数据集的数据增强任务进行了实验,发现我们提出的方法在DAGAN上的准确率提高了4.5%。
{"title":"Harnessing GAN with Metric Learning for One-Shot Generation on a Fine-Grained Category","authors":"Yusuke Ohtsubo, Tetsu Matsukawa, Einoshin Suzuki","doi":"10.1109/ICTAI.2019.00130","DOIUrl":"https://doi.org/10.1109/ICTAI.2019.00130","url":null,"abstract":"We propose a GAN-based one-shot generation method on a fine-grained category, which represents a subclass of a category, typically with diverse examples. One-shot generation refers to a task of taking an image which belongs to a class not used in the training phase and then generating a set of new images belonging to the same class. Generative Adversarial Network (GAN), which represents a type of deep neural networks with competing generator and discriminator, has proven to be useful in generating realistic images. Especially DAGAN, which maps the input image to a low-dimensional space via an encoder and then back to the example space via a decoder, has been quite effective with datasets such as handwritten character datasets. However, when the class corresponds to a fine-grained category, DAGAN occasionally generates images which are regarded as belonging to other classes due to the rich variety of the examples in the class and the low dissimilarities of the examples among the classes. For example, it accidentally generates facial images of different persons when the class corresponds to a specific person. To circumvent this problem, we introduce a metric learning with a triplet loss to the bottleneck layer of DAGAN to penalize such a generation. We also extend the optimization algorithm of DAGAN to an alternating procedure for two types of loss functions. Our proposed method outperforms DAGAN in the GAN-test task for VGG-Face dataset and CompCars dataset by 5.6% and 4.8% in accuracy, respectively. We also conducted experiments for the data augmentation task and observed 4.5% higher accuracy for our proposed method over DAGAN for VGG-Face dataset.","PeriodicalId":346657,"journal":{"name":"2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115619919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Multiple Stopping Rule for Warm-Starting Sequential Selection 热启动顺序选择的最优多次停止规则
Mathilde Fekom, N. Vayatis, Argyris Kalogeratos
In this paper we present the Warm-starting Dynamic Thresholding algorithm, developed using dynamic programming, for a variant of the standard online selection problem. The problem allows job positions to be either free or already occupied at the beginning of the process. Throughout the selection process, the decision maker interviews one after the other the new candidates and reveals a quality score for each of them. Based on that information, she can (re) assign each job at most once by taking immediate and irrevocable decisions. We relax the hard requirement of the class of dynamic programming algorithms to perfectly know the distribution from which the scores of candidates are drawn, by presenting extensions for the partial and no-information cases, in which the decision maker can learn the underlying score distribution sequentially while interviewing candidates.
本文提出了一种基于动态规划的热启动动态阈值算法,用于解决标准在线选择问题的一个变体。该问题允许工作位置在流程开始时空闲或已被占用。在整个选拔过程中,决策者一个接一个地面试新候选人,并为他们每个人提供一个质量分数。基于这些信息,她可以通过立即和不可撤销的决定,最多分配一次每项工作。本文通过对部分信息和无信息情况的扩展,放宽了动态规划算法对完全了解候选人分数分布的硬性要求,使决策者可以在面试候选人时依次了解潜在的分数分布。
{"title":"Optimal Multiple Stopping Rule for Warm-Starting Sequential Selection","authors":"Mathilde Fekom, N. Vayatis, Argyris Kalogeratos","doi":"10.1109/ICTAI.2019.00202","DOIUrl":"https://doi.org/10.1109/ICTAI.2019.00202","url":null,"abstract":"In this paper we present the Warm-starting Dynamic Thresholding algorithm, developed using dynamic programming, for a variant of the standard online selection problem. The problem allows job positions to be either free or already occupied at the beginning of the process. Throughout the selection process, the decision maker interviews one after the other the new candidates and reveals a quality score for each of them. Based on that information, she can (re) assign each job at most once by taking immediate and irrevocable decisions. We relax the hard requirement of the class of dynamic programming algorithms to perfectly know the distribution from which the scores of candidates are drawn, by presenting extensions for the partial and no-information cases, in which the decision maker can learn the underlying score distribution sequentially while interviewing candidates.","PeriodicalId":346657,"journal":{"name":"2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114281590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated Mechanism Design: Compact and Decomposition Linear Programming Models 自动化机构设计:紧凑和分解线性规划模型
B. Jaumard, Kia Babashahi Ashtiani, Nicolas Huin
In the context of multi-agent systems, Automated Mechanism Design (AMD) is the computer-based design of the rules of a mechanism, which reaches an equilibrium despite the fact that agents can be selfish and lie about their preferences. Although it has been shown that AMD can be modelled as a linear program, it is with an exponential number of variables and consequently, there is no known efficient algorithm. We revisit the latter linear program model proposed for the AMD problem and introduce a new one with a polynomial number of variables. We show that the latter model corresponds to a Dantzig-Wolfe decomposition of the second one and design efficient solution schemes in polynomial time for both two models. Numerical experiments compare the solution efficiency of both models and show that we can solve very significantly larger data instances than before, up to 2,000 agents or 2,000 resources in about 35 seconds.
在多智能体系统背景下,自动机制设计(Automated Mechanism Design, AMD)是一种基于计算机的机制规则设计,尽管智能体可能是自私的,并对自己的偏好撒谎,但该机制仍能达到平衡。虽然已经证明AMD可以建模为线性程序,但它具有指数数量的变量,因此,没有已知的有效算法。我们回顾了针对AMD问题提出的后一种线性规划模型,并引入了一种具有多项式变量数的新模型。我们证明了后一个模型对应于第二个模型的dantzigg - wolfe分解,并设计了两个模型在多项式时间内的有效解方案。数值实验比较了两种模型的求解效率,并表明我们可以在大约35秒内解决比以前大得多的数据实例,最多可解决2,000个代理或2,000个资源。
{"title":"Automated Mechanism Design: Compact and Decomposition Linear Programming Models","authors":"B. Jaumard, Kia Babashahi Ashtiani, Nicolas Huin","doi":"10.1109/ICTAI.2019.00031","DOIUrl":"https://doi.org/10.1109/ICTAI.2019.00031","url":null,"abstract":"In the context of multi-agent systems, Automated Mechanism Design (AMD) is the computer-based design of the rules of a mechanism, which reaches an equilibrium despite the fact that agents can be selfish and lie about their preferences. Although it has been shown that AMD can be modelled as a linear program, it is with an exponential number of variables and consequently, there is no known efficient algorithm. We revisit the latter linear program model proposed for the AMD problem and introduce a new one with a polynomial number of variables. We show that the latter model corresponds to a Dantzig-Wolfe decomposition of the second one and design efficient solution schemes in polynomial time for both two models. Numerical experiments compare the solution efficiency of both models and show that we can solve very significantly larger data instances than before, up to 2,000 agents or 2,000 resources in about 35 seconds.","PeriodicalId":346657,"journal":{"name":"2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114854129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Numerical Calculations with CalcNet 探索数值计算与CalcNet
Ashish Rana, A. Malhi, Kary Främling
Neural networks are not great generalizers outside their training range i.e. they are good at capturing bias but might miss the overall concept. Important issues with neural networks is that when testing data goes outside training range they fail to predict accurate results. Hence, they loose the ability to generalize a concept. For systematic numeric exploration neural accumulators (NAC) and neural arithmetic logic unit(NALU) are proposed which performs excellent for simple arithmetic operations. But, major limitation with these units is that they can't handle complex mathematical operations & equations. For example, NALU can predict accurate results for multiplication operation but not for factorial function which is essentially composition of multiplication operations only. It is unable to comprehend pattern behind an expression when composition of operations are involved. Hence, we propose a new neural network structure effectively which takes in complex compositional mathematical operations and produces best possible results with small NALU based neural networks as its pluggable modules which evaluates these expression at unitary level in a bottom-up manner. We call this effective neural network as CalcNet, as it helps in predicting accurate calculations for complex numerical expressions even for values that are out of training range. As part of our study we applied this network on numerically approximating complex equations, evaluating biquadratic equations and tested reusability of these modules. We arrived at far better generalizations for complex arithmetic extrapolation tasks as compare to both only NALU layer based neural networks and simple feed forward neural networks. Also, we achieved even better results for our golden ratio based modified NAC and NALU structures for both interpolating and extrapolating tasks in all evaluation experiments. Finally, from reusability standpoint this model demonstrate strong invariance for making predictions on different tasks.
神经网络在其训练范围之外并不是很好的泛化者,也就是说,它们善于捕捉偏见,但可能会错过整体概念。神经网络的一个重要问题是,当测试数据超出训练范围时,它们无法预测准确的结果。因此,他们失去了概括一个概念的能力。针对系统的数值探索,提出了神经累加器(NAC)和神经算术逻辑单元(NALU),它们能很好地处理简单的算术运算。但是,这些单元的主要限制是它们不能处理复杂的数学运算和方程。例如,NALU可以预测乘法操作的准确结果,但不能预测阶乘函数,因为阶乘函数本质上只是乘法操作的组合。当涉及到操作组合时,无法理解表达式背后的模式。因此,我们提出了一种新的神经网络结构,它有效地处理复杂的组合数学运算,并以基于NALU的小型神经网络作为其可插拔模块,以自下而上的方式在酉级上评估这些表达式,从而产生最佳结果。我们称这种有效的神经网络为CalcNet,因为它有助于预测复杂数值表达式的精确计算,甚至是超出训练范围的值。作为我们研究的一部分,我们将该网络应用于数值逼近复杂方程,评估双二次方程并测试这些模块的可重用性。与仅基于NALU层的神经网络和简单的前馈神经网络相比,我们在复杂的算术外推任务中得到了更好的泛化。此外,在所有评估实验中,我们基于黄金分割的改进NAC和NALU结构在内插和外推任务中都取得了更好的结果。最后,从可重用性的角度来看,该模型在对不同任务进行预测时表现出很强的不变性。
{"title":"Exploring Numerical Calculations with CalcNet","authors":"Ashish Rana, A. Malhi, Kary Främling","doi":"10.1109/ICTAI.2019.00192","DOIUrl":"https://doi.org/10.1109/ICTAI.2019.00192","url":null,"abstract":"Neural networks are not great generalizers outside their training range i.e. they are good at capturing bias but might miss the overall concept. Important issues with neural networks is that when testing data goes outside training range they fail to predict accurate results. Hence, they loose the ability to generalize a concept. For systematic numeric exploration neural accumulators (NAC) and neural arithmetic logic unit(NALU) are proposed which performs excellent for simple arithmetic operations. But, major limitation with these units is that they can't handle complex mathematical operations & equations. For example, NALU can predict accurate results for multiplication operation but not for factorial function which is essentially composition of multiplication operations only. It is unable to comprehend pattern behind an expression when composition of operations are involved. Hence, we propose a new neural network structure effectively which takes in complex compositional mathematical operations and produces best possible results with small NALU based neural networks as its pluggable modules which evaluates these expression at unitary level in a bottom-up manner. We call this effective neural network as CalcNet, as it helps in predicting accurate calculations for complex numerical expressions even for values that are out of training range. As part of our study we applied this network on numerically approximating complex equations, evaluating biquadratic equations and tested reusability of these modules. We arrived at far better generalizations for complex arithmetic extrapolation tasks as compare to both only NALU layer based neural networks and simple feed forward neural networks. Also, we achieved even better results for our golden ratio based modified NAC and NALU structures for both interpolating and extrapolating tasks in all evaluation experiments. Finally, from reusability standpoint this model demonstrate strong invariance for making predictions on different tasks.","PeriodicalId":346657,"journal":{"name":"2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117279029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimizing Training using Information Theory-Based Curriculum Learning Factory 利用信息论课程学习工厂优化培训
Henok Ghebrechristos, G. Alaghband
We present a new system that can automatically generate input paths (syllabus) for a convolutional neural network to follow through a curriculum learning to improve training performance. Our system utilizes information-theoretic content measures of training samples to form syllabus at training time. We treat every sample as 2D random variable where a data point contained in the sample (such as a pixel) is modelled as an independent and identically distributed random variable (i.i.d) realization. We use several information theory methods to rank and determine when a sample is fed to a network by measuring its pixel composition and its relationship to other samples in the training set. Comparative evaluation of multiple state-of-the-art networks, including, GoogleNet, and VGG, on benchmark datasets demonstrate a syllabus that ranks samples using measures such as Joint Entropy between adjacent samples, can improve learning and significantly reduce the amount of training steps required to achieve desirable training accuracy. We present results that indicate our approach can reduce training loss by as much as a factor of 9 compared to conventional training.
我们提出了一个新的系统,它可以自动生成输入路径(教学大纲),让卷积神经网络通过课程学习来提高训练性能。本系统利用训练样本的信息论内容测度,在训练时形成教学大纲。我们将每个样本视为二维随机变量,其中样本中包含的数据点(例如像素)被建模为独立且同分布的随机变量(i.i.d)实现。我们使用几种信息论方法通过测量样本的像素组成及其与训练集中其他样本的关系来对样本进行排序和确定何时将样本馈送到网络中。在基准数据集上对多个最先进的网络(包括GoogleNet和VGG)进行比较评估,证明了使用相邻样本之间的联合熵等度量对样本进行排序的教学大纲,可以提高学习效果,并显著减少达到理想训练精度所需的训练步骤。我们提出的结果表明,与传统训练相比,我们的方法可以减少多达9倍的训练损失。
{"title":"Optimizing Training using Information Theory-Based Curriculum Learning Factory","authors":"Henok Ghebrechristos, G. Alaghband","doi":"10.1109/ICTAI.2019.00218","DOIUrl":"https://doi.org/10.1109/ICTAI.2019.00218","url":null,"abstract":"We present a new system that can automatically generate input paths (syllabus) for a convolutional neural network to follow through a curriculum learning to improve training performance. Our system utilizes information-theoretic content measures of training samples to form syllabus at training time. We treat every sample as 2D random variable where a data point contained in the sample (such as a pixel) is modelled as an independent and identically distributed random variable (i.i.d) realization. We use several information theory methods to rank and determine when a sample is fed to a network by measuring its pixel composition and its relationship to other samples in the training set. Comparative evaluation of multiple state-of-the-art networks, including, GoogleNet, and VGG, on benchmark datasets demonstrate a syllabus that ranks samples using measures such as Joint Entropy between adjacent samples, can improve learning and significantly reduce the amount of training steps required to achieve desirable training accuracy. We present results that indicate our approach can reduce training loss by as much as a factor of 9 compared to conventional training.","PeriodicalId":346657,"journal":{"name":"2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115389060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating Different Metric Configurations of an Evolutionary Wrapper for Attack Detection 评估用于攻击检测的进化包装器的不同度量配置
Javier Maldonado, M. Riff
Detecting various types of attacks is a major problem in cybersecurity. In this paper, we show different configurations of an evolutionary wrapper algorithm for selecting features to classify attacks using a decision tree. We use two metrics for the evaluation function and evolutionary operator acceptance criteria. As part of our experiments, we interchange them and test the effect on the classification quality. Results show that the algorithm is able to guide the classification to accomplish different goals.
检测各种类型的攻击是网络安全中的一个主要问题。在本文中,我们展示了一种进化包装算法的不同配置,用于选择使用决策树对攻击进行分类的特征。我们使用两个度量作为评价函数和进化算子的接受准则。作为实验的一部分,我们交换了它们并测试了对分类质量的影响。结果表明,该算法能够引导分类实现不同的目标。
{"title":"Evaluating Different Metric Configurations of an Evolutionary Wrapper for Attack Detection","authors":"Javier Maldonado, M. Riff","doi":"10.1109/ICTAI.2019.00187","DOIUrl":"https://doi.org/10.1109/ICTAI.2019.00187","url":null,"abstract":"Detecting various types of attacks is a major problem in cybersecurity. In this paper, we show different configurations of an evolutionary wrapper algorithm for selecting features to classify attacks using a decision tree. We use two metrics for the evaluation function and evolutionary operator acceptance criteria. As part of our experiments, we interchange them and test the effect on the classification quality. Results show that the algorithm is able to guide the classification to accomplish different goals.","PeriodicalId":346657,"journal":{"name":"2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123168141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Benchmarking Symbolic Execution Using Constraint Problems - Initial Results 使用约束问题对符号执行进行基准测试-初步结果
Sahil Verma, R. Yap
Symbolic execution is a powerful technique for bug finding and program testing. It is successful in finding bugs in real-world code. The core reasoning techniques use constraint solving, path exploration, and search, which are also the same techniques used in solving combinatorial problems, e.g., finite-domain constraint satisfaction problems (CSPs). We propose CSP instances as more challenging benchmarks to evaluate the effectiveness of the core techniques in symbolic execution. We transform CSP benchmarks into C programs suitable for testing the reasoning capabilities of symbolic execution tools. From a single CSP P, we transform P depending on transformation choice into different C programs. Preliminary testing with the KLEE, Tracer-X, and LLBMC tools show substantial runtime differences from transformation and solver choice. Our C benchmarks are effective in showing the limitations of existing symbolic execution tools. The motivation for this work is we believe that benchmarks of this form can spur the development and engineering of improved core reasoning in symbolic execution engines.
符号执行对于bug查找和程序测试来说是一种强大的技术。它在查找真实代码中的bug方面是成功的。核心推理技术使用约束求解、路径探索和搜索,这也是用于解决组合问题的相同技术,例如有限域约束满足问题(csp)。我们建议将CSP实例作为更具挑战性的基准来评估符号执行中核心技术的有效性。我们将CSP基准转换为适合于测试符号执行工具推理能力的C程序。从单个CSP P,根据变换选择将P变换成不同的C程序。使用KLEE、Tracer-X和LLBMC工具进行的初步测试显示,转换和求解器的选择在运行时存在很大差异。我们的C基准测试有效地展示了现有符号执行工具的局限性。这项工作的动机是我们相信这种形式的基准测试可以刺激符号执行引擎中改进的核心推理的开发和工程。
{"title":"Benchmarking Symbolic Execution Using Constraint Problems - Initial Results","authors":"Sahil Verma, R. Yap","doi":"10.1109/ICTAI.2019.00010","DOIUrl":"https://doi.org/10.1109/ICTAI.2019.00010","url":null,"abstract":"Symbolic execution is a powerful technique for bug finding and program testing. It is successful in finding bugs in real-world code. The core reasoning techniques use constraint solving, path exploration, and search, which are also the same techniques used in solving combinatorial problems, e.g., finite-domain constraint satisfaction problems (CSPs). We propose CSP instances as more challenging benchmarks to evaluate the effectiveness of the core techniques in symbolic execution. We transform CSP benchmarks into C programs suitable for testing the reasoning capabilities of symbolic execution tools. From a single CSP P, we transform P depending on transformation choice into different C programs. Preliminary testing with the KLEE, Tracer-X, and LLBMC tools show substantial runtime differences from transformation and solver choice. Our C benchmarks are effective in showing the limitations of existing symbolic execution tools. The motivation for this work is we believe that benchmarks of this form can spur the development and engineering of improved core reasoning in symbolic execution engines.","PeriodicalId":346657,"journal":{"name":"2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123310765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adversarial Attack Against DoS Intrusion Detection: An Improved Boundary-Based Method 针对DoS入侵检测的对抗攻击:一种改进的基于边界的方法
Xiao Peng, Wei-qing Huang, Zhixin Shi
Denial of Service (DoS) attacks pose serious threats to network security. With the rapid development of machine learning technologies, artificial neural network (ANN) has been used to classify DoS attacks. However, ANN models are vulnerable to adversarial samples: inputs that are specially crafted to yield incorrect outputs. In this work, we explore a kind of DoS adversarial attacks which aim to bypass ANN-based DoS intrusion detection systems. By analyzing features of DoS samples, we propose an improved boundary-based method to craft adversarial DoS samples. The key idea is to optimize a Mahalanobis distance by perturbing continuous features and discrete features of DoS samples respectively. We experimentally study the effectiveness of our method in two trained ANN classifiers on KDDcup99 dataset and CICIDS2017 dataset. Results show that our method can craft adversarial DoS samples with limited queries.
DoS (Denial of Service)攻击对网络安全构成严重威胁。随着机器学习技术的迅速发展,人工神经网络(ANN)已被用于DoS攻击分类。然而,人工神经网络模型很容易受到对抗性样本的影响:那些经过特殊设计以产生不正确输出的输入。在这项工作中,我们探索了一种旨在绕过基于人工神经网络的DoS入侵检测系统的DoS对抗性攻击。通过分析DoS样本的特征,提出了一种改进的基于边界的DoS样本生成方法。其关键思想是通过分别扰动DoS样本的连续特征和离散特征来优化马氏距离。我们在KDDcup99数据集和CICIDS2017数据集上实验研究了该方法在两个训练好的ANN分类器上的有效性。结果表明,该方法可以在有限的查询条件下生成对抗DoS样本。
{"title":"Adversarial Attack Against DoS Intrusion Detection: An Improved Boundary-Based Method","authors":"Xiao Peng, Wei-qing Huang, Zhixin Shi","doi":"10.1109/ICTAI.2019.00179","DOIUrl":"https://doi.org/10.1109/ICTAI.2019.00179","url":null,"abstract":"Denial of Service (DoS) attacks pose serious threats to network security. With the rapid development of machine learning technologies, artificial neural network (ANN) has been used to classify DoS attacks. However, ANN models are vulnerable to adversarial samples: inputs that are specially crafted to yield incorrect outputs. In this work, we explore a kind of DoS adversarial attacks which aim to bypass ANN-based DoS intrusion detection systems. By analyzing features of DoS samples, we propose an improved boundary-based method to craft adversarial DoS samples. The key idea is to optimize a Mahalanobis distance by perturbing continuous features and discrete features of DoS samples respectively. We experimentally study the effectiveness of our method in two trained ANN classifiers on KDDcup99 dataset and CICIDS2017 dataset. Results show that our method can craft adversarial DoS samples with limited queries.","PeriodicalId":346657,"journal":{"name":"2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123420906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
ECPNet: An Efficient Attention-Based Convolution Network with Pseudo-3D Block for Human Action Recognition ECPNet:一种有效的基于注意力的伪三维块卷积网络,用于人体动作识别
Xiuping Bao, Jiabin Yuan, Bei Chen
Human action recognition has became an important task in computer vision and has received a significant amount of research interests in recent years. Convolutional Neural Network (CNN) has shown its power in image recognition task. While in the field of video recognition, it is still a challenge problem. In this paper, we introduce a high-efficient attention-based convolutional network named ECPNet for video understanding. ECPNet adopts the framework that is a consecutive connection of 2D CNN and pseudo-3D CNN. The pseudo-3D means we replace the traditional 3 × 3 × 3 kernel with two 3D convolutional filters shaped 1 × 3 × 3 and 3 × 1 × 1. Our ECPNet combines the advantages of both 2D and 3D CNNs: (1) ECPNet is an end-to-end network and can learn information of appearance from images and motion between frames. (2) ECPNet requires less computing resource and lower memory consumption than many state-of-art models. (3) ECPNet is easy to expand for different demands of runtime and classification accuracy. We evaluate the proposed model on three popular video benchmarks in human action recognition task: Kinetics-mini (split of full Kinetics), UCF101 and HMDB51. Our ECPNet achieves the excellent performance on above datasets with less time cost.
人体动作识别已成为计算机视觉领域的一项重要研究课题,近年来受到了广泛的关注。卷积神经网络(CNN)在图像识别任务中已经显示出其强大的能力。而在视频识别领域,这仍然是一个具有挑战性的问题。本文介绍了一种高效的基于注意力的卷积网络ECPNet,用于视频理解。ECPNet采用的框架是二维CNN和伪三维CNN的连续连接。伪3D意味着我们用两个形状为1 × 3 × 3和3 × 1 × 1的三维卷积滤波器取代传统的3 × 3 × 3核。我们的ECPNet结合了2D和3D cnn的优点:(1)ECPNet是一个端到端的网络,可以从图像和帧之间的运动中学习外观信息。(2)与许多最先进的模型相比,ECPNet需要更少的计算资源和更低的内存消耗。(3) ECPNet易于扩展以满足不同的运行时间和分类精度需求。我们在人类动作识别任务中三个流行的视频基准上对所提出的模型进行了评估:Kinetics-mini (full Kinetics的分裂),UCF101和HMDB51。我们的ECPNet以较少的时间成本在上述数据集上实现了优异的性能。
{"title":"ECPNet: An Efficient Attention-Based Convolution Network with Pseudo-3D Block for Human Action Recognition","authors":"Xiuping Bao, Jiabin Yuan, Bei Chen","doi":"10.1109/ICTAI.2019.00089","DOIUrl":"https://doi.org/10.1109/ICTAI.2019.00089","url":null,"abstract":"Human action recognition has became an important task in computer vision and has received a significant amount of research interests in recent years. Convolutional Neural Network (CNN) has shown its power in image recognition task. While in the field of video recognition, it is still a challenge problem. In this paper, we introduce a high-efficient attention-based convolutional network named ECPNet for video understanding. ECPNet adopts the framework that is a consecutive connection of 2D CNN and pseudo-3D CNN. The pseudo-3D means we replace the traditional 3 × 3 × 3 kernel with two 3D convolutional filters shaped 1 × 3 × 3 and 3 × 1 × 1. Our ECPNet combines the advantages of both 2D and 3D CNNs: (1) ECPNet is an end-to-end network and can learn information of appearance from images and motion between frames. (2) ECPNet requires less computing resource and lower memory consumption than many state-of-art models. (3) ECPNet is easy to expand for different demands of runtime and classification accuracy. We evaluate the proposed model on three popular video benchmarks in human action recognition task: Kinetics-mini (split of full Kinetics), UCF101 and HMDB51. Our ECPNet achieves the excellent performance on above datasets with less time cost.","PeriodicalId":346657,"journal":{"name":"2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121404601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1