首页 > 最新文献

Information最新文献

英文 中文
FEINT: Automated Framework for Efficient INsertion of Templates/Trojans into FPGAs FEINT:将模板/木马高效插入 FPGA 的自动化框架
Pub Date : 2024-07-08 DOI: 10.3390/info15070395
Virinchi Roy Surabhi, Rajat Sadhukhan, Md Raz, H. Pearce, P. Krishnamurthy, Joshua Trujillo, Ramesh Karri, F. Khorrami
Field-Programmable Gate Arrays (FPGAs) play a significant and evolving role in various industries and applications in the current technological landscape. They are widely known for their flexibility, rapid prototyping, reconfigurability, and design development features. FPGA designs are often constructed as compositions of interconnected modules that implement the various features/functionalities required in an application. This work develops a novel tool FEINT, which facilitates this module composition process and automates the design-level modifications required when introducing new modules into an existing design. The proposed methodology is architected as a “template” insertion tool that operates based on a user-provided configuration script to introduce dynamic design features as plugins at different stages of the FPGA design process to facilitate rapid prototyping, composition-based design evolution, and system customization. FEINT can be useful in applications where designers need to tailor system behavior without requiring expert FPGA programming skills or significant manual effort. For example, FEINT can help insert defensive monitoring, adversarial Trojan, and plugin-based functionality enhancement features. FEINT is scalable, future-proof, and cross-platform without a dependence on vendor-specific file formats, thus ensuring compatibility with FPGA families and tool versions and being integrable with commercial tools. To assess FEINT’s effectiveness, our tests covered the injection of various types of templates/modules into FPGA designs. For example, in the Trojan insertion context, our tests consider diverse Trojan behaviors and triggers, including key leakage and denial of service Trojans. We evaluated FEINT’s applicability to complex designs by creating an FPGA design that features a MicroBlaze soft-core processor connected to an AES-accelerator via an AXI-bus interface. FEINT can successfully and efficiently insert various templates into this design at different FPGA design stages.
在当前的技术领域中,现场可编程门阵列(FPGA)在各行各业和各种应用中发挥着重要的、不断发展的作用。FPGA 因其灵活性、快速原型设计、可重配置性和设计开发功能而广为人知。FPGA 设计通常由相互连接的模块组成,以实现应用中所需的各种特性/功能。这项工作开发了一种新颖的工具 FEINT,它能促进模块组合过程,并在将新模块引入现有设计时自动进行所需的设计级修改。所提出的方法被设计成一种 "模板 "插入工具,它基于用户提供的配置脚本运行,在 FPGA 设计流程的不同阶段以插件形式引入动态设计功能,以促进快速原型开发、基于组合的设计演进和系统定制。在设计人员需要定制系统行为而不需要专业的 FPGA 编程技能或大量手工劳动的应用中,FEINT 非常有用。例如,FEINT 可以帮助插入防御性监控、对抗性木马和基于插件的功能增强特性。FEINT 具有可扩展性、前瞻性和跨平台性,不依赖于供应商特定的文件格式,从而确保与 FPGA 系列和工具版本的兼容性,并可与商业工具集成。为了评估 FEINT 的有效性,我们的测试包括向 FPGA 设计中注入各种类型的模板/模块。例如,在木马插入方面,我们的测试考虑了各种木马行为和触发因素,包括密钥泄漏和拒绝服务木马。我们通过创建一个 FPGA 设计来评估 FEINT 对复杂设计的适用性,该设计采用了 MicroBlaze 软核处理器,并通过 AXI 总线接口连接到 AES 加速器。FEINT 可以在不同的 FPGA 设计阶段成功、高效地将各种模板插入该设计中。
{"title":"FEINT: Automated Framework for Efficient INsertion of Templates/Trojans into FPGAs","authors":"Virinchi Roy Surabhi, Rajat Sadhukhan, Md Raz, H. Pearce, P. Krishnamurthy, Joshua Trujillo, Ramesh Karri, F. Khorrami","doi":"10.3390/info15070395","DOIUrl":"https://doi.org/10.3390/info15070395","url":null,"abstract":"Field-Programmable Gate Arrays (FPGAs) play a significant and evolving role in various industries and applications in the current technological landscape. They are widely known for their flexibility, rapid prototyping, reconfigurability, and design development features. FPGA designs are often constructed as compositions of interconnected modules that implement the various features/functionalities required in an application. This work develops a novel tool FEINT, which facilitates this module composition process and automates the design-level modifications required when introducing new modules into an existing design. The proposed methodology is architected as a “template” insertion tool that operates based on a user-provided configuration script to introduce dynamic design features as plugins at different stages of the FPGA design process to facilitate rapid prototyping, composition-based design evolution, and system customization. FEINT can be useful in applications where designers need to tailor system behavior without requiring expert FPGA programming skills or significant manual effort. For example, FEINT can help insert defensive monitoring, adversarial Trojan, and plugin-based functionality enhancement features. FEINT is scalable, future-proof, and cross-platform without a dependence on vendor-specific file formats, thus ensuring compatibility with FPGA families and tool versions and being integrable with commercial tools. To assess FEINT’s effectiveness, our tests covered the injection of various types of templates/modules into FPGA designs. For example, in the Trojan insertion context, our tests consider diverse Trojan behaviors and triggers, including key leakage and denial of service Trojans. We evaluated FEINT’s applicability to complex designs by creating an FPGA design that features a MicroBlaze soft-core processor connected to an AES-accelerator via an AXI-bus interface. FEINT can successfully and efficiently insert various templates into this design at different FPGA design stages.","PeriodicalId":510156,"journal":{"name":"Information","volume":"120 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141666533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Ensemble Learning Approach with Explainable AI for Improved Heart Disease Prediction 利用可解释的人工智能优化集合学习法改进心脏病预测
Pub Date : 2024-07-08 DOI: 10.3390/info15070394
Ibomoiye Domor Mienye, N. Jere
Recent advances in machine learning (ML) have shown great promise in detecting heart disease. However, to ensure the clinical adoption of ML models, they must not only be generalizable and robust but also transparent and explainable. Therefore, this research introduces an approach that integrates the robustness of ensemble learning algorithms with the precision of Bayesian optimization for hyperparameter tuning and the interpretability offered by Shapley additive explanations (SHAP). The ensemble classifiers considered include adaptive boosting (AdaBoost), random forest, and extreme gradient boosting (XGBoost). The experimental results on the Cleveland and Framingham datasets demonstrate that the optimized XGBoost model achieved the highest performance, with specificity and sensitivity values of 0.971 and 0.989 on the Cleveland dataset and 0.921 and 0.975 on the Framingham dataset, respectively.
机器学习(ML)的最新进展表明,在检测心脏病方面大有可为。然而,为了确保 ML 模型在临床上的应用,这些模型不仅必须具有通用性和鲁棒性,还必须具有透明性和可解释性。因此,本研究引入了一种方法,将集合学习算法的稳健性与贝叶斯优化超参数调整的精确性以及夏普利加法解释(SHAP)提供的可解释性结合起来。所考虑的集合分类器包括自适应提升(AdaBoost)、随机森林和极端梯度提升(XGBoost)。克利夫兰和弗雷明汉数据集的实验结果表明,优化后的 XGBoost 模型性能最高,在克利夫兰数据集上的特异性和灵敏度值分别为 0.971 和 0.989,在弗雷明汉数据集上的特异性和灵敏度值分别为 0.921 和 0.975。
{"title":"Optimized Ensemble Learning Approach with Explainable AI for Improved Heart Disease Prediction","authors":"Ibomoiye Domor Mienye, N. Jere","doi":"10.3390/info15070394","DOIUrl":"https://doi.org/10.3390/info15070394","url":null,"abstract":"Recent advances in machine learning (ML) have shown great promise in detecting heart disease. However, to ensure the clinical adoption of ML models, they must not only be generalizable and robust but also transparent and explainable. Therefore, this research introduces an approach that integrates the robustness of ensemble learning algorithms with the precision of Bayesian optimization for hyperparameter tuning and the interpretability offered by Shapley additive explanations (SHAP). The ensemble classifiers considered include adaptive boosting (AdaBoost), random forest, and extreme gradient boosting (XGBoost). The experimental results on the Cleveland and Framingham datasets demonstrate that the optimized XGBoost model achieved the highest performance, with specificity and sensitivity values of 0.971 and 0.989 on the Cleveland dataset and 0.921 and 0.975 on the Framingham dataset, respectively.","PeriodicalId":510156,"journal":{"name":"Information","volume":" 390","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141669625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effect of Training Data Size on Disaster Classification from Twitter 训练数据量对推特灾害分类的影响
Pub Date : 2024-07-08 DOI: 10.3390/info15070393
Dimitrios Effrosynidis, Georgios Sylaios, Avi Arampatzis
In the realm of disaster-related tweet classification, this study presents a comprehensive analysis of various machine learning algorithms, shedding light on crucial factors influencing algorithm performance. The exceptional efficacy of simpler models is attributed to the quality and size of the dataset, enabling them to discern meaningful patterns. While powerful, complex models are time-consuming and prone to overfitting, particularly with smaller or noisier datasets. Hyperparameter tuning, notably through Bayesian optimization, emerges as a pivotal tool for enhancing the performance of simpler models. A practical guideline for algorithm selection based on dataset size is proposed, consisting of Bernoulli Naive Bayes for datasets below 5000 tweets and Logistic Regression for larger datasets exceeding 5000 tweets. Notably, Logistic Regression shines with 20,000 tweets, delivering an impressive combination of performance, speed, and interpretability. A further improvement of 0.5% is achieved by applying ensemble and stacking methods.
在与灾难相关的推文分类领域,本研究对各种机器学习算法进行了全面分析,揭示了影响算法性能的关键因素。简单模型的卓越功效归功于数据集的质量和规模,使其能够识别有意义的模式。复杂模型虽然功能强大,但耗时长,而且容易过度拟合,尤其是在数据集较小或噪声较大的情况下。超参数调整,特别是通过贝叶斯优化,成为提高简单模型性能的关键工具。本文提出了基于数据集规模的算法选择实用指南,其中伯努利-奈维贝叶斯算法适用于 5000 条推文以下的数据集,逻辑回归算法适用于超过 5000 条推文的大型数据集。值得注意的是,逻辑回归在 20,000 条推文中表现突出,在性能、速度和可解释性方面都令人印象深刻。通过应用集合和堆叠方法,性能进一步提高了 0.5%。
{"title":"The Effect of Training Data Size on Disaster Classification from Twitter","authors":"Dimitrios Effrosynidis, Georgios Sylaios, Avi Arampatzis","doi":"10.3390/info15070393","DOIUrl":"https://doi.org/10.3390/info15070393","url":null,"abstract":"In the realm of disaster-related tweet classification, this study presents a comprehensive analysis of various machine learning algorithms, shedding light on crucial factors influencing algorithm performance. The exceptional efficacy of simpler models is attributed to the quality and size of the dataset, enabling them to discern meaningful patterns. While powerful, complex models are time-consuming and prone to overfitting, particularly with smaller or noisier datasets. Hyperparameter tuning, notably through Bayesian optimization, emerges as a pivotal tool for enhancing the performance of simpler models. A practical guideline for algorithm selection based on dataset size is proposed, consisting of Bernoulli Naive Bayes for datasets below 5000 tweets and Logistic Regression for larger datasets exceeding 5000 tweets. Notably, Logistic Regression shines with 20,000 tweets, delivering an impressive combination of performance, speed, and interpretability. A further improvement of 0.5% is achieved by applying ensemble and stacking methods.","PeriodicalId":510156,"journal":{"name":"Information","volume":" 1239","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141668894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Resident Behavioral Activities Based on Social Media Data: A Case Study of Four Typical Communities in Beijing 基于社交媒体数据的居民行为活动研究:北京四个典型社区的案例研究
Pub Date : 2024-07-05 DOI: 10.3390/info15070392
Zhiyuan Ou, Bingqing Wang, Bin Meng, Changsheng Shi, Dongsheng Zhan
With the support of big data mining techniques, utilizing social media data containing location information and rich semantic text information can construct large-scale daily activity OD flows for urban populations, providing new data resources and research perspectives for studying urban spatiotemporal structures. This paper employs the ST-DBSCAN algorithm to identify the residential locations of Weibo users in four communities and then uses the BERT model for activity-type classification of Weibo texts. Combined with the TF-IDF method, the results are analyzed from three aspects: temporal features, spatial features, and semantic features. The research findings indicate: ① Spatially, residents’ daily activities are mainly centered around their residential locations, but there are significant differences in the radius and direction of activity among residents of different communities; ② In the temporal dimension, the activity intensities of residents from different communities exhibit uniformity during different time periods on weekdays and weekends; ③ Based on semantic analysis, the differences in activities and venue choices among residents of different communities are deeply influenced by the comprehensive characteristics of the communities. This study explores methods for OD information mining based on social media data, which is of great significance for expanding the mining methods of residents’ spatiotemporal behavior characteristics and enriching research on the configuration of public service facilities based on community residents’ activity spaces and facility demands.
在大数据挖掘技术的支持下,利用包含位置信息和丰富语义文本信息的社交媒体数据,可以构建大规模的城市人群日常活动OD流,为研究城市时空结构提供新的数据资源和研究视角。本文采用 ST-DBSCAN 算法识别四个社区中微博用户的居住位置,然后使用 BERT 模型对微博文本进行活动类型分类。结合 TF-IDF 方法,从时间特征、空间特征和语义特征三个方面对结果进行了分析。研究结果表明在空间维度上,居民的日常活动主要以居住地为中心,但不同社区居民的活动半径和方向存在显著差异;②在时间维度上,不同社区居民在工作日和周末不同时段的活动强度表现出一致性;③从语义分析来看,不同社区居民在活动内容和场所选择上的差异深受社区综合特征的影响。本研究探索了基于社交媒体数据的OD信息挖掘方法,对于拓展居民时空行为特征的挖掘方法,丰富基于社区居民活动空间和设施需求的公共服务设施配置研究具有重要意义。
{"title":"Research on Resident Behavioral Activities Based on Social Media Data: A Case Study of Four Typical Communities in Beijing","authors":"Zhiyuan Ou, Bingqing Wang, Bin Meng, Changsheng Shi, Dongsheng Zhan","doi":"10.3390/info15070392","DOIUrl":"https://doi.org/10.3390/info15070392","url":null,"abstract":"With the support of big data mining techniques, utilizing social media data containing location information and rich semantic text information can construct large-scale daily activity OD flows for urban populations, providing new data resources and research perspectives for studying urban spatiotemporal structures. This paper employs the ST-DBSCAN algorithm to identify the residential locations of Weibo users in four communities and then uses the BERT model for activity-type classification of Weibo texts. Combined with the TF-IDF method, the results are analyzed from three aspects: temporal features, spatial features, and semantic features. The research findings indicate: ① Spatially, residents’ daily activities are mainly centered around their residential locations, but there are significant differences in the radius and direction of activity among residents of different communities; ② In the temporal dimension, the activity intensities of residents from different communities exhibit uniformity during different time periods on weekdays and weekends; ③ Based on semantic analysis, the differences in activities and venue choices among residents of different communities are deeply influenced by the comprehensive characteristics of the communities. This study explores methods for OD information mining based on social media data, which is of great significance for expanding the mining methods of residents’ spatiotemporal behavior characteristics and enriching research on the configuration of public service facilities based on community residents’ activity spaces and facility demands.","PeriodicalId":510156,"journal":{"name":"Information","volume":" 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141673952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of Knowledge Graphs for Construction Safety Management: A Systematic Literature Review 知识图谱在建筑安全管理中的应用:系统性文献综述
Pub Date : 2024-07-03 DOI: 10.3390/info15070390
Fansheng Kong, Seungjun Ahn
Effective safety management is crucial in the construction industry. The growing interest in employing Knowledge Graphs (KGs) for safety management in construction is driven by the need for efficient computing-aided safety practices. This paper systematically reviews the literature related to automating safety management processes through knowledge base systems, focusing on the creation and utilization of KGs for construction safety. It captures current methodologies for developing and using KGs in construction safety management, outlining the techniques for each phase of KG development, including scope identification, integration of external data, ontological modeling, data extraction, and KG completion. This provides structured guidance on building a KG for safety management. Moreover, this paper discusses the challenges and limitations that hinder the wider adoption of KGs in construction safety management, leading to the identification of goals and considerations for future research.
有效的安全管理对建筑行业至关重要。由于需要高效的计算辅助安全实践,人们对采用知识图谱(KG)进行建筑安全管理的兴趣与日俱增。本文系统回顾了与通过知识库系统实现安全管理流程自动化相关的文献,重点关注建筑安全知识图谱的创建和使用。它总结了当前在建筑安全管理中开发和使用知识库的方法,概述了知识库开发各阶段的技术,包括范围确定、外部数据集成、本体建模、数据提取和知识库完成。这为构建安全管理 KG 提供了结构化指导。此外,本文还讨论了阻碍在建筑安全管理中更广泛地采用 KG 的挑战和限制,从而确定了未来研究的目标和考虑因素。
{"title":"Use of Knowledge Graphs for Construction Safety Management: A Systematic Literature Review","authors":"Fansheng Kong, Seungjun Ahn","doi":"10.3390/info15070390","DOIUrl":"https://doi.org/10.3390/info15070390","url":null,"abstract":"Effective safety management is crucial in the construction industry. The growing interest in employing Knowledge Graphs (KGs) for safety management in construction is driven by the need for efficient computing-aided safety practices. This paper systematically reviews the literature related to automating safety management processes through knowledge base systems, focusing on the creation and utilization of KGs for construction safety. It captures current methodologies for developing and using KGs in construction safety management, outlining the techniques for each phase of KG development, including scope identification, integration of external data, ontological modeling, data extraction, and KG completion. This provides structured guidance on building a KG for safety management. Moreover, this paper discusses the challenges and limitations that hinder the wider adoption of KGs in construction safety management, leading to the identification of goals and considerations for future research.","PeriodicalId":510156,"journal":{"name":"Information","volume":"57 S271","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141683270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DIPA: Adversarial Attack on DNNs by Dropping Information and Pixel-Level Attack on Attention DIPA:通过丢弃信息对 DNN 的对抗性攻击和对注意力的像素级攻击
Pub Date : 2024-07-03 DOI: 10.3390/info15070391
Jing Liu, Huailin Liu, Pengju Wang, Yang Wu, Keqin Li
Deep neural networks (DNNs) have shown remarkable performance across a wide range of fields, including image recognition, natural language processing, and speech processing. However, recent studies indicate that DNNs are highly vulnerable to well-crafted adversarial samples, which can cause incorrect classifications and predictions. These samples are so similar to the original ones that they are nearly undetectable by human vision, posing a significant security risk to DNNs in the real world due to the impact of adversarial attacks. Currently, the most common adversarial attack methods explicitly add adversarial perturbations to image samples, often resulting in adversarial samples that are easier to distinguish by humans. To address this issue, we are motivated to develop more effective methods for generating adversarial samples that remain undetectable to human vision. This paper proposes a pixel-level adversarial attack method based on attention mechanism and high-frequency information separation, named DIPA. Specifically, our approach involves constructing an attention suppression loss function and utilizing gradient information to identify and perturb sensitive pixels. By suppressing the model’s attention to the correct classes, the neural network is misled to focus on irrelevant classes, leading to incorrect judgments. Unlike previous studies, DIPA enhances the attack of adversarial samples by separating the imperceptible details in image samples to more effectively hide the adversarial perturbation while ensuring a higher attack success rate. Our experimental results demonstrate that under the extreme single-pixel attack scenario, DIPA achieves higher attack success rates for neural network models with various architectures. Furthermore, the visualization results and quantitative metrics illustrate that the DIPA can generate more imperceptible adversarial perturbation.
深度神经网络(DNN)在图像识别、自然语言处理和语音处理等众多领域都表现出了卓越的性能。然而,最近的研究表明,深度神经网络极易受到精心制作的对抗样本的影响,从而导致错误的分类和预测。这些样本与原始样本非常相似,几乎无法被人类视觉检测到,由于对抗性攻击的影响,DNN 在现实世界中面临着巨大的安全风险。目前,最常见的对抗性攻击方法明确地将对抗性扰动添加到图像样本中,往往会产生更容易被人类分辨的对抗性样本。为了解决这个问题,我们希望开发出更有效的方法,生成人类视觉无法检测的对抗样本。本文提出了一种基于注意力机制和高频信息分离的像素级对抗攻击方法,命名为 DIPA。具体来说,我们的方法包括构建注意力抑制损失函数,并利用梯度信息来识别和扰动敏感像素。通过抑制模型对正确类别的关注,误导神经网络关注无关类别,从而导致错误判断。与之前的研究不同,DIPA 通过分离图像样本中不易察觉的细节来增强对对抗样本的攻击,从而更有效地隐藏对抗扰动,同时确保更高的攻击成功率。我们的实验结果表明,在极端的单像素攻击场景下,DIPA 可为各种架构的神经网络模型实现更高的攻击成功率。此外,可视化结果和定量指标也表明,DIPA 可以产生更多不易察觉的对抗性扰动。
{"title":"DIPA: Adversarial Attack on DNNs by Dropping Information and Pixel-Level Attack on Attention","authors":"Jing Liu, Huailin Liu, Pengju Wang, Yang Wu, Keqin Li","doi":"10.3390/info15070391","DOIUrl":"https://doi.org/10.3390/info15070391","url":null,"abstract":"Deep neural networks (DNNs) have shown remarkable performance across a wide range of fields, including image recognition, natural language processing, and speech processing. However, recent studies indicate that DNNs are highly vulnerable to well-crafted adversarial samples, which can cause incorrect classifications and predictions. These samples are so similar to the original ones that they are nearly undetectable by human vision, posing a significant security risk to DNNs in the real world due to the impact of adversarial attacks. Currently, the most common adversarial attack methods explicitly add adversarial perturbations to image samples, often resulting in adversarial samples that are easier to distinguish by humans. To address this issue, we are motivated to develop more effective methods for generating adversarial samples that remain undetectable to human vision. This paper proposes a pixel-level adversarial attack method based on attention mechanism and high-frequency information separation, named DIPA. Specifically, our approach involves constructing an attention suppression loss function and utilizing gradient information to identify and perturb sensitive pixels. By suppressing the model’s attention to the correct classes, the neural network is misled to focus on irrelevant classes, leading to incorrect judgments. Unlike previous studies, DIPA enhances the attack of adversarial samples by separating the imperceptible details in image samples to more effectively hide the adversarial perturbation while ensuring a higher attack success rate. Our experimental results demonstrate that under the extreme single-pixel attack scenario, DIPA achieves higher attack success rates for neural network models with various architectures. Furthermore, the visualization results and quantitative metrics illustrate that the DIPA can generate more imperceptible adversarial perturbation.","PeriodicalId":510156,"journal":{"name":"Information","volume":"97 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141681726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Neural Network Learning, Attention, and Memory 人工神经网络学习、注意力和记忆力
Pub Date : 2024-07-02 DOI: 10.3390/info15070387
Vincenzo Manca
The learning equations of an ANN are presented, giving an extremely concise derivation based on the principle of backpropagation through the descendent gradient. Then, a dual network is outlined acting between synapses of a basic ANN, which controls the learning process and coordinates the subnetworks selected by attention mechanisms toward purposeful behaviors. Mechanisms of memory and their affinity with comprehension are considered, by emphasizing the common role of abstraction and the interplay between assimilation and accommodation, in the spirit of Piaget’s analysis of psychological acquisition and genetic epistemology. Learning, comprehension, and knowledge are expressed as different levels of organization of informational processes inside cognitive systems. It is argued that formal analyses of cognitive artificial systems could shed new light on typical mechanisms of “natural intelligence” and, in a specular way, that models of natural cognition processes could promote further developments of ANN models. Finally, new possibilities of chatbot interaction are briefly discussed.
本文介绍了智能网络的学习方程,并根据梯度下降的反向传播原理进行了极为简洁的推导。然后,概述了在基本 ANN 的突触之间起作用的双重网络,该网络控制学习过程,并协调由注意机制选择的子网络,以实现有目的的行为。通过强调抽象的共同作用以及同化与调适之间的相互作用,并借鉴皮亚杰对心理习得和遗传认识论的分析精神,研究了记忆的机制及其与理解的关系。学习、理解和知识表现为认知系统内部信息过程的不同组织层次。本文认为,对人工认知系统的形式分析可以为 "自然智能 "的典型机制提供新的启示,而且自然认知过程的模型可以促进人工智能网络模型的进一步发展。最后,简要讨论了聊天机器人交互的新可能性。
{"title":"Artificial Neural Network Learning, Attention, and Memory","authors":"Vincenzo Manca","doi":"10.3390/info15070387","DOIUrl":"https://doi.org/10.3390/info15070387","url":null,"abstract":"The learning equations of an ANN are presented, giving an extremely concise derivation based on the principle of backpropagation through the descendent gradient. Then, a dual network is outlined acting between synapses of a basic ANN, which controls the learning process and coordinates the subnetworks selected by attention mechanisms toward purposeful behaviors. Mechanisms of memory and their affinity with comprehension are considered, by emphasizing the common role of abstraction and the interplay between assimilation and accommodation, in the spirit of Piaget’s analysis of psychological acquisition and genetic epistemology. Learning, comprehension, and knowledge are expressed as different levels of organization of informational processes inside cognitive systems. It is argued that formal analyses of cognitive artificial systems could shed new light on typical mechanisms of “natural intelligence” and, in a specular way, that models of natural cognition processes could promote further developments of ANN models. Finally, new possibilities of chatbot interaction are briefly discussed.","PeriodicalId":510156,"journal":{"name":"Information","volume":"5 5‐6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141686578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Development of a Prototype Solution for Collecting Information on Cycling and Hiking Trail Users 开发收集自行车道和远足径使用者信息的原型解决方案
Pub Date : 2024-07-02 DOI: 10.3390/info15070389
Joaquim Miguel, Pedro Mendonça, Agnelo Quelhas, J. M. L. P. Caldeira, V. N. Soares
Hiking and cycling have gained popularity as ways of promoting well-being and physical activity. This has not gone unnoticed by Portuguese authorities, who have invested in infrastructure to support these activities and to boost sustainable and nature-based tourism. However, the lack of reliable data on the use of these infrastructures prevents us from recording attendance rates and the most frequent types of users. This information is important for the authorities responsible for managing, maintaining, promoting and using these infrastructures. In this sense, this study builds on a previous study by the same authors which identified computer vision as a suitable technology to identify and count different types of users of cycling and hiking routes. The performance tests carried out led to the conclusion that the YOLOv3-Tiny convolutional neural network has great potential for solving this problem. Based on this result, this paper describes the proposal and implementation of a prototype demonstrator. It is based on a Raspberry Pi 4 platform with YOLOv3-Tiny, which is responsible for detecting and classifying user types. An application available on users’ smartphones implements the concept of opportunistic networks, allowing information to be collected over time, in scenarios where there is no end-to-end connectivity. This aggregated information can then be consulted on an online platform. The prototype was subjected to validation and functional tests and proved to be a viable low-cost solution.
徒步旅行和骑自行车作为促进身心健康和体育锻炼的方式,越来越受到人们的欢迎。葡萄牙政府也注意到了这一点,投资建设了基础设施,以支持这些活动,促进可持续发展和以自然为基础的旅游业。然而,由于缺乏有关这些基础设施使用情况的可靠数据,我们无法记录这些设施的使用率和最常使用的用户类型。这些信息对于负责管理、维护、推广和使用这些基础设施的部门非常重要。从这个意义上说,本研究以同一作者之前的一项研究为基础,该研究认为计算机视觉是一种合适的技术,可用于识别和统计自行车和徒步路线的不同类型用户。通过性能测试得出的结论是,YOLOv3-Tiny 卷积神经网络在解决这一问题方面具有巨大潜力。基于这一结果,本文介绍了原型验证器的提案和实施。它基于 Raspberry Pi 4 平台和 YOLOv3-Tiny,YOLOv3-Tiny 负责检测和分类用户类型。用户智能手机上的一个应用程序实现了机会主义网络的概念,允许在没有端到端连接的情况下长期收集信息。然后,可以在一个在线平台上查询这些汇总信息。对原型进行了验证和功能测试,证明这是一个可行的低成本解决方案。
{"title":"The Development of a Prototype Solution for Collecting Information on Cycling and Hiking Trail Users","authors":"Joaquim Miguel, Pedro Mendonça, Agnelo Quelhas, J. M. L. P. Caldeira, V. N. Soares","doi":"10.3390/info15070389","DOIUrl":"https://doi.org/10.3390/info15070389","url":null,"abstract":"Hiking and cycling have gained popularity as ways of promoting well-being and physical activity. This has not gone unnoticed by Portuguese authorities, who have invested in infrastructure to support these activities and to boost sustainable and nature-based tourism. However, the lack of reliable data on the use of these infrastructures prevents us from recording attendance rates and the most frequent types of users. This information is important for the authorities responsible for managing, maintaining, promoting and using these infrastructures. In this sense, this study builds on a previous study by the same authors which identified computer vision as a suitable technology to identify and count different types of users of cycling and hiking routes. The performance tests carried out led to the conclusion that the YOLOv3-Tiny convolutional neural network has great potential for solving this problem. Based on this result, this paper describes the proposal and implementation of a prototype demonstrator. It is based on a Raspberry Pi 4 platform with YOLOv3-Tiny, which is responsible for detecting and classifying user types. An application available on users’ smartphones implements the concept of opportunistic networks, allowing information to be collected over time, in scenarios where there is no end-to-end connectivity. This aggregated information can then be consulted on an online platform. The prototype was subjected to validation and functional tests and proved to be a viable low-cost solution.","PeriodicalId":510156,"journal":{"name":"Information","volume":"28 46","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141685241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability and Motion Patterns of Two Interactive Oscillating Agents 两个互动振荡代理的稳定性和运动模式
Pub Date : 2024-07-02 DOI: 10.3390/info15070388
J. Juang
This paper investigates the stability and motion of two interactive oscillating agents. Multiple agents can be controlled in a centralized and/or distributed manner to form specific patterns in cooperative tracking, pursuit, and evasion games, as well as environmental exploration. This paper studies the behavior of two oscillating agents due to their interaction. It shows that, through a combination of selecting oscillation centers and interaction gain, a variety of motions, including limit-cycles and stationary behavior, can be realized.
本文研究了两个交互式摆动代理的稳定性和运动。在合作追踪、追逐和规避游戏以及环境探索中,可以通过集中和/或分布式方式控制多个代理形成特定模式。本文研究了两个摆动代理的互动行为。结果表明,通过选择振荡中心和交互增益的组合,可以实现各种运动,包括极限循环和静止行为。
{"title":"Stability and Motion Patterns of Two Interactive Oscillating Agents","authors":"J. Juang","doi":"10.3390/info15070388","DOIUrl":"https://doi.org/10.3390/info15070388","url":null,"abstract":"This paper investigates the stability and motion of two interactive oscillating agents. Multiple agents can be controlled in a centralized and/or distributed manner to form specific patterns in cooperative tracking, pursuit, and evasion games, as well as environmental exploration. This paper studies the behavior of two oscillating agents due to their interaction. It shows that, through a combination of selecting oscillation centers and interaction gain, a variety of motions, including limit-cycles and stationary behavior, can be realized.","PeriodicalId":510156,"journal":{"name":"Information","volume":"106 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141686965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CCNN-SVM: Automated Model for Emotion Recognition Based on Custom Convolutional Neural Networks with SVM CCNN-SVM:基于自定义卷积神经网络和 SVM 的自动情感识别模型
Pub Date : 2024-07-01 DOI: 10.3390/info15070384
Metwally Rashad, Doaa M. Alebiary, Mohammed Aldawsari, Ahmed A. El-Sawy, Ahmed H. AbuEl-Atta
The expressions on human faces reveal the emotions we are experiencing internally. Emotion recognition based on facial expression is one of the subfields of social signal processing. It has several applications in different areas, specifically in the interaction between humans and computers. This study presents a simple CCNN-SVM automated model as a viable approach for FER. The model combines a Convolutional Neural Network for feature extraction, certain image preprocessing techniques, and Support Vector Machine (SVM) for classification. Firstly, the input image is preprocessed using face detection, histogram equalization, gamma correction, and resizing techniques. Secondly, the images go through custom single Deep Convolutional Neural Networks (CCNN) to extract deep features. Finally, SVM uses the generated features to perform the classification. The suggested model was trained and tested on four datasets, CK+, JAFFE, KDEF, and FER. These datasets consist of seven primary emotional categories, which encompass anger, disgust, fear, happiness, sadness, surprise, and neutrality for CK+, and include contempt for JAFFE. The model put forward demonstrates commendable performance in comparison to existing facial expression recognition techniques. It achieves an impressive accuracy of 99.3% on the CK+ dataset, 98.4% on the JAFFE dataset, 87.18% on the KDEF dataset, and 88.7% on the FER.
人脸上的表情揭示了我们内心正在经历的情绪。基于面部表情的情绪识别是社会信号处理的子领域之一。它在不同领域都有一些应用,特别是在人与计算机的交互中。本研究提出了一个简单的 CCNN-SVM 自动模型,作为 FER 的可行方法。该模型结合了用于特征提取的卷积神经网络、某些图像预处理技术和用于分类的支持向量机(SVM)。首先,使用人脸检测、直方图均衡化、伽玛校正和大小调整技术对输入图像进行预处理。其次,图像经过定制的单一深度卷积神经网络(CCNN)来提取深度特征。最后,SVM 使用生成的特征进行分类。建议的模型在 CK+、JAFFE、KDEF 和 FER 四个数据集上进行了训练和测试。这些数据集包含七个主要情感类别,CK+ 包含愤怒、厌恶、恐惧、快乐、悲伤、惊讶和中立,JAFFE 包含蔑视。与现有的面部表情识别技术相比,所提出的模型表现出了值得称赞的性能。它在 CK+ 数据集上达到了令人印象深刻的 99.3%,在 JAFFE 数据集上达到了 98.4%,在 KDEF 数据集上达到了 87.18%,在 FER 数据集上达到了 88.7%。
{"title":"CCNN-SVM: Automated Model for Emotion Recognition Based on Custom Convolutional Neural Networks with SVM","authors":"Metwally Rashad, Doaa M. Alebiary, Mohammed Aldawsari, Ahmed A. El-Sawy, Ahmed H. AbuEl-Atta","doi":"10.3390/info15070384","DOIUrl":"https://doi.org/10.3390/info15070384","url":null,"abstract":"The expressions on human faces reveal the emotions we are experiencing internally. Emotion recognition based on facial expression is one of the subfields of social signal processing. It has several applications in different areas, specifically in the interaction between humans and computers. This study presents a simple CCNN-SVM automated model as a viable approach for FER. The model combines a Convolutional Neural Network for feature extraction, certain image preprocessing techniques, and Support Vector Machine (SVM) for classification. Firstly, the input image is preprocessed using face detection, histogram equalization, gamma correction, and resizing techniques. Secondly, the images go through custom single Deep Convolutional Neural Networks (CCNN) to extract deep features. Finally, SVM uses the generated features to perform the classification. The suggested model was trained and tested on four datasets, CK+, JAFFE, KDEF, and FER. These datasets consist of seven primary emotional categories, which encompass anger, disgust, fear, happiness, sadness, surprise, and neutrality for CK+, and include contempt for JAFFE. The model put forward demonstrates commendable performance in comparison to existing facial expression recognition techniques. It achieves an impressive accuracy of 99.3% on the CK+ dataset, 98.4% on the JAFFE dataset, 87.18% on the KDEF dataset, and 88.7% on the FER.","PeriodicalId":510156,"journal":{"name":"Information","volume":"4 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141715340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1