首页 > 最新文献

2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)最新文献

英文 中文
LE-CapsNet: A Light and Enhanced Capsule Network LE-CapsNet:一个轻型和增强胶囊网络
Pub Date : 2021-12-01 DOI: 10.1109/ICMLA52953.2021.00280
Pouya Shiri, A. Baniasadi
Capsule Network (CapsNet) classifier has several advantages over CNNs, including better detection of images containing overlapping categories and higher accuracy on transformed images. Despite the advantages, CapsNet is slow due to its different structure. In addition, CapsNet is resource-hungry, includes many parameters and lags in accuracy compared to CNNs. In this work, we propose LE-CapsNet as a light, enhanced and more accurate variant of CapsNet. Using 3.8M weights, LECapsNet obtains 76.73% accuracy on the CIFAR-10 dataset while performing inference 4x faster than CapsNet. In addition, our proposed network is more robust at detecting images with affine transformations compared to CapsNet. We achieve 94.37% accuracy on the AffNIST dataset (compared to CapsNet’s 90.52%).
胶囊网络(Capsule Network, CapsNet)分类器与cnn相比有几个优点,包括更好地检测包含重叠类别的图像,以及对转换后的图像有更高的准确率。尽管有这些优势,但由于其结构不同,CapsNet速度较慢。此外,CapsNet需要大量的资源,包含了很多参数,并且与cnn相比在精度上有一定的滞后。在这项工作中,我们提出LE-CapsNet作为CapsNet的轻量级,增强和更准确的变体。使用3.8M权值,LECapsNet在CIFAR-10数据集上获得76.73%的准确率,同时执行推理的速度比CapsNet快4倍。此外,与CapsNet相比,我们提出的网络在检测具有仿射变换的图像方面具有更强的鲁棒性。我们在AffNIST数据集上实现了94.37%的准确率(与CapsNet的90.52%相比)。
{"title":"LE-CapsNet: A Light and Enhanced Capsule Network","authors":"Pouya Shiri, A. Baniasadi","doi":"10.1109/ICMLA52953.2021.00280","DOIUrl":"https://doi.org/10.1109/ICMLA52953.2021.00280","url":null,"abstract":"Capsule Network (CapsNet) classifier has several advantages over CNNs, including better detection of images containing overlapping categories and higher accuracy on transformed images. Despite the advantages, CapsNet is slow due to its different structure. In addition, CapsNet is resource-hungry, includes many parameters and lags in accuracy compared to CNNs. In this work, we propose LE-CapsNet as a light, enhanced and more accurate variant of CapsNet. Using 3.8M weights, LECapsNet obtains 76.73% accuracy on the CIFAR-10 dataset while performing inference 4x faster than CapsNet. In addition, our proposed network is more robust at detecting images with affine transformations compared to CapsNet. We achieve 94.37% accuracy on the AffNIST dataset (compared to CapsNet’s 90.52%).","PeriodicalId":6750,"journal":{"name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"2 1","pages":"1767-1772"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73354851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Offensive Content on Twitter During Proud Boys Riots 在骄傲男孩骚乱期间检测Twitter上的攻击性内容
Pub Date : 2021-12-01 DOI: 10.1109/ICMLA52953.2021.00253
M. Fahim, S. Gokhale
Hateful and offensive speech on online social media platforms has seen a rise in the recent years. Often used to convey humor through sarcasm or to emphasize a point, offensive speech may also be employed to insult, deride and mock alternate points of view. In turbulent and chaotic circumstances, insults and mockery can lead to violence and unrest, and hence, such speech must be identified and tagged to limit its damage. This paper presents an application of machine learning to detect hateful and offensive content from Twitter feeds shared after the protests by Proud Boys, an extremist, ideological and violent hate group. A comprehensive coding guide, consolidating definitions of what constitutes offensive content based on the potential to trigger and incite people is developed and used to label the tweets. Linguistic, auxiliary and social features extracted from these labeled tweets were used to train machine learning classifiers, which detect offensive content with an accuracy of about 92%. An analysis of the importance scores reveals that offensiveness is pre-dominantly a function of words and their combinations, rather than meta features such as punctuations and quotes. This observation can form the foundation of pre-trained classifiers that can be deployed to automatically detect offensive speech in new and unforeseen circumstances.
近年来,在线社交媒体平台上的仇恨和攻击性言论有所增加。攻击性言语通常用于通过讽刺来表达幽默或强调一个观点,也可用于侮辱、嘲笑和嘲笑不同的观点。在动荡和混乱的环境中,侮辱和嘲弄可能导致暴力和动荡,因此,必须识别和标记此类言论,以限制其损害。本文介绍了一种机器学习的应用,用于检测极端主义、意识形态和暴力仇恨团体Proud Boys抗议后分享的Twitter feed中的仇恨和攻击性内容。一份全面的编码指南,根据触发和煽动人们的可能性,巩固了构成冒犯性内容的定义,并用于标记推文。从这些标记的推文中提取的语言、辅助和社交特征被用来训练机器学习分类器,它检测攻击性内容的准确率约为92%。对重要性分数的分析表明,冒犯性主要是单词及其组合的功能,而不是标点和引号等元特征。这种观察可以形成预训练分类器的基础,可以部署在新的和不可预见的情况下自动检测攻击性言论。
{"title":"Detecting Offensive Content on Twitter During Proud Boys Riots","authors":"M. Fahim, S. Gokhale","doi":"10.1109/ICMLA52953.2021.00253","DOIUrl":"https://doi.org/10.1109/ICMLA52953.2021.00253","url":null,"abstract":"Hateful and offensive speech on online social media platforms has seen a rise in the recent years. Often used to convey humor through sarcasm or to emphasize a point, offensive speech may also be employed to insult, deride and mock alternate points of view. In turbulent and chaotic circumstances, insults and mockery can lead to violence and unrest, and hence, such speech must be identified and tagged to limit its damage. This paper presents an application of machine learning to detect hateful and offensive content from Twitter feeds shared after the protests by Proud Boys, an extremist, ideological and violent hate group. A comprehensive coding guide, consolidating definitions of what constitutes offensive content based on the potential to trigger and incite people is developed and used to label the tweets. Linguistic, auxiliary and social features extracted from these labeled tweets were used to train machine learning classifiers, which detect offensive content with an accuracy of about 92%. An analysis of the importance scores reveals that offensiveness is pre-dominantly a function of words and their combinations, rather than meta features such as punctuations and quotes. This observation can form the foundation of pre-trained classifiers that can be deployed to automatically detect offensive speech in new and unforeseen circumstances.","PeriodicalId":6750,"journal":{"name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"44 3","pages":"1582-1587"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72631341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Deep Learning Methods for the Prediction of Information Display Type Using Eye Tracking Sequences 基于眼动追踪序列的信息显示类型预测的深度学习方法
Pub Date : 2021-12-01 DOI: 10.1109/ICMLA52953.2021.00100
Yuehan Yin, Yahya Alqahtani, Jinjuan Feng, J. Chakraborty, M. P. McGuire
Eye tracking data can help design effective user interfaces by showing how users visually process information. In this study, three neural network models were developed and employed to classify three types of information display methods by using eye gaze data that was collected in visual information processing behavior studies. Eye gaze data was first converted into a sequence and was fed into neural networks to predict the information display type. The results of the study show a comparison between three methods for the creation of eye tracking sequences and how they perform using three neural network models including CNN-LSTM, CNN-GRU, and 3D CNN. The results were positive with all models having an accuracy of higher than 88 percent.
眼动追踪数据可以通过显示用户如何视觉处理信息来帮助设计有效的用户界面。本研究利用视觉信息处理行为研究中收集的眼球注视数据,建立了三种神经网络模型,并对三种信息显示方式进行了分类。首先将眼球注视数据转换成序列,并将其输入神经网络来预测信息显示类型。研究结果显示了三种创建眼动追踪序列的方法之间的比较,以及它们如何使用三种神经网络模型,包括CNN- lstm, CNN- gru和3D CNN。结果是肯定的,所有模型的准确率都高于88%。
{"title":"Deep Learning Methods for the Prediction of Information Display Type Using Eye Tracking Sequences","authors":"Yuehan Yin, Yahya Alqahtani, Jinjuan Feng, J. Chakraborty, M. P. McGuire","doi":"10.1109/ICMLA52953.2021.00100","DOIUrl":"https://doi.org/10.1109/ICMLA52953.2021.00100","url":null,"abstract":"Eye tracking data can help design effective user interfaces by showing how users visually process information. In this study, three neural network models were developed and employed to classify three types of information display methods by using eye gaze data that was collected in visual information processing behavior studies. Eye gaze data was first converted into a sequence and was fed into neural networks to predict the information display type. The results of the study show a comparison between three methods for the creation of eye tracking sequences and how they perform using three neural network models including CNN-LSTM, CNN-GRU, and 3D CNN. The results were positive with all models having an accuracy of higher than 88 percent.","PeriodicalId":6750,"journal":{"name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"82 1","pages":"601-605"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72707683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting YOLO Misdetection by Learning Grid Cell Consensus 学习网格单元一致性预测YOLO误检
Pub Date : 2021-12-01 DOI: 10.1109/ICMLA52953.2021.00107
B. Paudel, Danushka Senarathna, Haibo Wang, S. Tragoudas, Yao Hu, Shengbing Jiang
Despite the immense performance improvement of deep learning-based object detection, the state-of-the-art object detection systems are still prone to misdetections. This work presents a method to predict such misdetections at run-time by using a small network, referred to as ConsensusNet, to learn the correlation patterns or consensus of neighboring detections before non-maximum suppression (NMS). Based on such correlations, ConsensusNet predicts if there are misdetection failures. The proposed method is experimentally evaluated considering single person class from COCO dataset and using YOLOv3 as the object detection system. It shows the proposed method can achieve accuracy of 84.6% and the performance measured in other metrics are also promising. To the best of our knowledge, ConsensusNet is the first network reported for predicting misdetections in object detection.
尽管基于深度学习的目标检测的性能有了巨大的提高,但最先进的目标检测系统仍然容易出现误检测。这项工作提出了一种在运行时预测这种错误检测的方法,通过使用一个小网络,称为ConsensusNet,在非最大抑制(NMS)之前学习相邻检测的相关模式或一致性。基于这种相关性,ConsensusNet可以预测是否存在误检失败。采用YOLOv3作为目标检测系统,对该方法进行了实验验证。结果表明,该方法的准确率达到84.6%,在其他指标上的测试结果也很有希望。据我们所知,ConsensusNet是第一个用于预测物体检测中的误检的网络。
{"title":"Predicting YOLO Misdetection by Learning Grid Cell Consensus","authors":"B. Paudel, Danushka Senarathna, Haibo Wang, S. Tragoudas, Yao Hu, Shengbing Jiang","doi":"10.1109/ICMLA52953.2021.00107","DOIUrl":"https://doi.org/10.1109/ICMLA52953.2021.00107","url":null,"abstract":"Despite the immense performance improvement of deep learning-based object detection, the state-of-the-art object detection systems are still prone to misdetections. This work presents a method to predict such misdetections at run-time by using a small network, referred to as ConsensusNet, to learn the correlation patterns or consensus of neighboring detections before non-maximum suppression (NMS). Based on such correlations, ConsensusNet predicts if there are misdetection failures. The proposed method is experimentally evaluated considering single person class from COCO dataset and using YOLOv3 as the object detection system. It shows the proposed method can achieve accuracy of 84.6% and the performance measured in other metrics are also promising. To the best of our knowledge, ConsensusNet is the first network reported for predicting misdetections in object detection.","PeriodicalId":6750,"journal":{"name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"134 1","pages":"643-648"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77894493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PROV-GEM: Automated Provenance Analysis Framework using Graph Embeddings gem:使用图嵌入的自动化来源分析框架
Pub Date : 2021-12-01 DOI: 10.1109/ICMLA52953.2021.00273
Maya Kapoor, Joshua Melton, Michael Ridenhour, S. Krishnan, Thomas Moyer
Data provenance graphs, detailed traces of system behavior, are a popular construct to analyze and forecast malicious cyber activity like advanced persistent threats (APT). A critical limitation of existing analysis techniques is the lack of an automated analytic framework to predict APTs. In this work, we address that limitation by augmenting efficient capture and storage mechanisms to include automated analysis. Specifically, we propose PROV-GEM, a deep graph learning framework to identify malicious anomalous behavior from provenance data. Since data provenance graphs are complex datasets often expressed as heterogeneous attributed multiplex networks, we use a unified relation-aware embedding framework to capture the necessary contexts and associated interactions between the various entities manifest in the data. Furthermore, provenance graphs by nature are rich detailed structures that are heavily attributed compared to other complex systems that have been used traditionally in graph machine learning applications. Towards that end, our framework uniquely captures “multi-embeddings” that can represent varied contexts of nodes and their multi-faceted nature. We demonstrate the efficacy of our embeddings by applying PROV-GEM to two publicly available APT provenance graph datasets from StreamSpot and Unicorn. PROV-GEM achieves strong performance on both datasets with a 99% accuracy and 97% F1-score on the StreamSpot dataset, and a 97% accuracy and 89% F1-score on the Unicorn dataset, equaling or outperforming comparable state-of-the-art APT threat detection models. Unlike other frameworks, PROV-GEM utilizes an efficient graph convolutional approach coupled with relational self-attention to generate rich graph embeddings that capture the complex topology of data provenance graphs, providing an effective automated analytic framework for APT detection.
数据来源图是系统行为的详细痕迹,是分析和预测高级持续性威胁(APT)等恶意网络活动的常用结构。现有分析技术的一个关键限制是缺乏预测apt的自动化分析框架。在这项工作中,我们通过增加有效的捕获和存储机制来包括自动化分析来解决这一限制。具体来说,我们提出了provo - gem,这是一个深度图学习框架,用于从来源数据中识别恶意异常行为。由于数据来源图是复杂的数据集,通常表示为异构属性多路网络,因此我们使用统一的关系感知嵌入框架来捕获数据中显示的各种实体之间的必要上下文和相关交互。此外,与传统上在图机器学习应用中使用的其他复杂系统相比,来源图本质上是丰富的详细结构。为此,我们的框架独特地捕获了“多嵌入”,可以表示节点的各种上下文及其多面性。我们通过将provo - gem应用于来自StreamSpot和Unicorn的两个公开可用的APT来源图数据集来证明我们嵌入的有效性。provo - gem在两个数据集上都实现了强大的性能,在StreamSpot数据集上具有99%的准确性和97%的f1分数,在Unicorn数据集上具有97%的准确性和89%的f1分数,相当于或优于可比较的最先进的APT威胁检测模型。与其他框架不同,provo - gem利用高效的图卷积方法与关系自关注相结合,生成丰富的图嵌入,捕获数据来源图的复杂拓扑,为APT检测提供有效的自动化分析框架。
{"title":"PROV-GEM: Automated Provenance Analysis Framework using Graph Embeddings","authors":"Maya Kapoor, Joshua Melton, Michael Ridenhour, S. Krishnan, Thomas Moyer","doi":"10.1109/ICMLA52953.2021.00273","DOIUrl":"https://doi.org/10.1109/ICMLA52953.2021.00273","url":null,"abstract":"Data provenance graphs, detailed traces of system behavior, are a popular construct to analyze and forecast malicious cyber activity like advanced persistent threats (APT). A critical limitation of existing analysis techniques is the lack of an automated analytic framework to predict APTs. In this work, we address that limitation by augmenting efficient capture and storage mechanisms to include automated analysis. Specifically, we propose PROV-GEM, a deep graph learning framework to identify malicious anomalous behavior from provenance data. Since data provenance graphs are complex datasets often expressed as heterogeneous attributed multiplex networks, we use a unified relation-aware embedding framework to capture the necessary contexts and associated interactions between the various entities manifest in the data. Furthermore, provenance graphs by nature are rich detailed structures that are heavily attributed compared to other complex systems that have been used traditionally in graph machine learning applications. Towards that end, our framework uniquely captures “multi-embeddings” that can represent varied contexts of nodes and their multi-faceted nature. We demonstrate the efficacy of our embeddings by applying PROV-GEM to two publicly available APT provenance graph datasets from StreamSpot and Unicorn. PROV-GEM achieves strong performance on both datasets with a 99% accuracy and 97% F1-score on the StreamSpot dataset, and a 97% accuracy and 89% F1-score on the Unicorn dataset, equaling or outperforming comparable state-of-the-art APT threat detection models. Unlike other frameworks, PROV-GEM utilizes an efficient graph convolutional approach coupled with relational self-attention to generate rich graph embeddings that capture the complex topology of data provenance graphs, providing an effective automated analytic framework for APT detection.","PeriodicalId":6750,"journal":{"name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"115 1","pages":"1720-1727"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77194918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Kernel ridge reconstruction for anomaly detection: general and low computational reconstruction 异常检测的核脊重建:一般和低计算重建
Pub Date : 2021-12-01 DOI: 10.1109/ICMLA52953.2021.00036
Yasutaka Furusho, Shuhei Nitta, Y. Sakata
Autoencoders (AEs) have been widely used for anomaly detection because models trained to reconstruct a normal data are expected to have a higher reconstruction error for anomalous data than that for normal data, and the higher error is adopted as a criterion for identifying anomalies. However, the high capacity of AEs is sometimes able to reconstruct anomalous data even when trained only on normal data, which leads to overlooked anomalies. To remedy this problem, we propose a kernel ridge reconstruction (KRR) approach for general, high-performance, and low computational anomaly detection. KRR replaces the non-linear decoder network of the AE with a linear regressor, which uses the weighted sum of training normal data for reconstruction, and thus prevents the reconstruction of anomalous data. We also reveal the desired property of the encoder for KRR to achieve high anomaly detection performance and propose an effective training algorithm to realize such property by instance discrimination and feature decorrelation. In addition, KRR reduces the computational cost because it replaces the non-linear decoder network with a linear regressor. Our experiments on MNIST, CIFAR10, and KDDCup99 datasets prove its applicability, high performance, and low computational cost. In particular, KRR achieved an area under the curve (AUC) of 0.670 with 12 millions multiply-accumulate operations (MACs) on the CIFAR10 dataset, outperforming a recent reconstruction-based anomaly detection method (MemAE) with a 1.1-fold higher AUC and 0.291 as many MACs.
自编码器(ae)被广泛用于异常检测,因为用于重建正常数据的训练模型对异常数据的重建误差比正常数据的重建误差要高,并且更高的误差被用作识别异常的标准。然而,即使只在正常数据上训练,高容量的ae有时也能够重建异常数据,这导致了被忽视的异常。为了解决这个问题,我们提出了一种核脊重构(KRR)方法,用于通用、高性能和低计算的异常检测。KRR用线性回归器代替声发射的非线性解码器网络,利用训练正常数据的加权和进行重构,从而避免了异常数据的重构。我们还揭示了KRR编码器为实现高异常检测性能所需要的特性,并提出了一种有效的训练算法,通过实例识别和特征去相关来实现这种特性。此外,由于KRR用线性回归器代替了非线性解码器网络,降低了计算成本。我们在MNIST、CIFAR10和KDDCup99数据集上的实验证明了它的适用性、高性能和低计算成本。特别是,KRR在CIFAR10数据集上通过1200万次乘法累积操作(mac)获得了0.670的曲线下面积(AUC),优于最近基于重建的异常检测方法(MemAE), AUC高1.1倍,mac数为0.291。
{"title":"Kernel ridge reconstruction for anomaly detection: general and low computational reconstruction","authors":"Yasutaka Furusho, Shuhei Nitta, Y. Sakata","doi":"10.1109/ICMLA52953.2021.00036","DOIUrl":"https://doi.org/10.1109/ICMLA52953.2021.00036","url":null,"abstract":"Autoencoders (AEs) have been widely used for anomaly detection because models trained to reconstruct a normal data are expected to have a higher reconstruction error for anomalous data than that for normal data, and the higher error is adopted as a criterion for identifying anomalies. However, the high capacity of AEs is sometimes able to reconstruct anomalous data even when trained only on normal data, which leads to overlooked anomalies. To remedy this problem, we propose a kernel ridge reconstruction (KRR) approach for general, high-performance, and low computational anomaly detection. KRR replaces the non-linear decoder network of the AE with a linear regressor, which uses the weighted sum of training normal data for reconstruction, and thus prevents the reconstruction of anomalous data. We also reveal the desired property of the encoder for KRR to achieve high anomaly detection performance and propose an effective training algorithm to realize such property by instance discrimination and feature decorrelation. In addition, KRR reduces the computational cost because it replaces the non-linear decoder network with a linear regressor. Our experiments on MNIST, CIFAR10, and KDDCup99 datasets prove its applicability, high performance, and low computational cost. In particular, KRR achieved an area under the curve (AUC) of 0.670 with 12 millions multiply-accumulate operations (MACs) on the CIFAR10 dataset, outperforming a recent reconstruction-based anomaly detection method (MemAE) with a 1.1-fold higher AUC and 0.291 as many MACs.","PeriodicalId":6750,"journal":{"name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"73 1","pages":"185-190"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76213444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Depression Detection Using Combination of sMRI and fMRI Image Features 结合sMRI和fMRI图像特征的抑郁症检测
Pub Date : 2021-12-01 DOI: 10.1109/ICMLA52953.2021.00092
Marzieh Mousavian, Jianhua Chen, S. Greening
Automatic detection of Major Depression Disorder (MDD) from brain MRI images with machine learning has been an active area of study. In this paper several methods are explored for MDD detection by combining features from structural and functional brain MRI images, and combining Atlas-based and spatial cube-based features. Experiments demonstrate good classification performance on an imbalanced dataset. The paper also presents a visualization that captures the spatial overlapping between the top discriminating spatial cube pairs and the regions of interests in the Harvard Atlas.
利用机器学习技术从脑MRI图像中自动检测重度抑郁症(MDD)一直是一个活跃的研究领域。本文结合脑MRI结构和功能图像特征,结合基于atlas的特征和基于空间立方体的特征,探索了几种检测MDD的方法。实验证明了在不平衡数据集上具有良好的分类性能。本文还提出了一种可视化方法,该方法捕获了哈佛地图集中顶部区分空间立方体对与感兴趣区域之间的空间重叠。
{"title":"Depression Detection Using Combination of sMRI and fMRI Image Features","authors":"Marzieh Mousavian, Jianhua Chen, S. Greening","doi":"10.1109/ICMLA52953.2021.00092","DOIUrl":"https://doi.org/10.1109/ICMLA52953.2021.00092","url":null,"abstract":"Automatic detection of Major Depression Disorder (MDD) from brain MRI images with machine learning has been an active area of study. In this paper several methods are explored for MDD detection by combining features from structural and functional brain MRI images, and combining Atlas-based and spatial cube-based features. Experiments demonstrate good classification performance on an imbalanced dataset. The paper also presents a visualization that captures the spatial overlapping between the top discriminating spatial cube pairs and the regions of interests in the Harvard Atlas.","PeriodicalId":6750,"journal":{"name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"125 5 1","pages":"552-557"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80502286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting SSH and FTP Brute Force Attacks in Big Data 大数据环境下SSH、FTP暴力破解检测
Pub Date : 2021-12-01 DOI: 10.1109/ICMLA52953.2021.00126
John T. Hancock, T. Khoshgoftaar, Joffrey L. Leevy
We present a simple approach for detecting brute force attacks in the CSE-CIC-IDS2018 Big Data dataset. We show our approach is preferable to more complex approaches since it is simpler, and yields stronger classification performance. Our contribution is to show that it is possible to train and test simple Decision Tree models with two independent variables to classify CSE-CIC-IDS2018 data with better results than reported in previous research, where more complex Deep Learning models are employed. Moreover, we show that Decision Tree models trained on data with two independent variables perform similarly to Decision Tree models trained on a larger number independent variables. Our experiments reveal that simple models, with AUC and AUPRC scores greater than 0.99, are capable of detecting brute force attacks in CSE-CIC-IDS2018. To the best of our knowledge, these are the strongest performance metrics published for the machine learning task of detecting these types of attacks. Furthermore, the simplicity of our approach, combined with its strong performance, makes it an appealing technique.
我们提出了一种简单的方法来检测CSE-CIC-IDS2018大数据集中的暴力破解攻击。我们证明了我们的方法比更复杂的方法更可取,因为它更简单,并且产生更强的分类性能。我们的贡献是表明可以训练和测试具有两个自变量的简单决策树模型来对CSE-CIC-IDS2018数据进行分类,其结果比之前使用更复杂的深度学习模型的研究报告更好。此外,我们表明,在具有两个自变量的数据上训练的决策树模型与在更多自变量上训练的决策树模型表现相似。我们的实验表明,AUC和AUPRC得分大于0.99的简单模型能够检测CSE-CIC-IDS2018中的暴力破解攻击。据我们所知,这些是针对检测这些类型攻击的机器学习任务发布的最强性能指标。此外,我们的方法的简单性,加上其强大的性能,使其成为一种吸引人的技术。
{"title":"Detecting SSH and FTP Brute Force Attacks in Big Data","authors":"John T. Hancock, T. Khoshgoftaar, Joffrey L. Leevy","doi":"10.1109/ICMLA52953.2021.00126","DOIUrl":"https://doi.org/10.1109/ICMLA52953.2021.00126","url":null,"abstract":"We present a simple approach for detecting brute force attacks in the CSE-CIC-IDS2018 Big Data dataset. We show our approach is preferable to more complex approaches since it is simpler, and yields stronger classification performance. Our contribution is to show that it is possible to train and test simple Decision Tree models with two independent variables to classify CSE-CIC-IDS2018 data with better results than reported in previous research, where more complex Deep Learning models are employed. Moreover, we show that Decision Tree models trained on data with two independent variables perform similarly to Decision Tree models trained on a larger number independent variables. Our experiments reveal that simple models, with AUC and AUPRC scores greater than 0.99, are capable of detecting brute force attacks in CSE-CIC-IDS2018. To the best of our knowledge, these are the strongest performance metrics published for the machine learning task of detecting these types of attacks. Furthermore, the simplicity of our approach, combined with its strong performance, makes it an appealing technique.","PeriodicalId":6750,"journal":{"name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"25 1","pages":"760-765"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81309974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GAN Based Approach for Drug Design 基于GAN的药物设计方法
Pub Date : 2021-12-01 DOI: 10.1109/ICMLA52953.2021.00136
Aninditha Ramesh, Anusha S. Rao, Sanjana Moudgalya, K. S. Srinivas
Deep Learning models have been a tremendous breakthrough in the field of Drug discovery, greatly simplifying the pre-clinical phase of this intricate task. With an intention to ease this further, we introduce a novel method to generate target-specific molecules using a Generative Adversarial Network (GAN). The dataset consists of drugs whose target proteins belong to the class of Tyrosine kinase and are specifically active against some of the growth factor receptors present in the human body. An Autoencoder network is used to learn the embeddings of the drug which is represented in the SMILES format and the deep neural network GAN is used to generate structurally valid molecules using drug-target interaction as the validating criteria. The model has successfully produced 39 novel structures and 15 of them show satisfactory binding with at least one of the target receptors.
深度学习模型在药物发现领域取得了巨大的突破,极大地简化了这一复杂任务的临床前阶段。为了进一步缓解这一问题,我们引入了一种使用生成对抗网络(GAN)生成目标特异性分子的新方法。该数据集由靶蛋白属于酪氨酸激酶类的药物组成,这些药物对人体中存在的一些生长因子受体具有特异性活性。使用自编码器网络学习以SMILES格式表示的药物嵌入,并使用深度神经网络GAN以药物-靶标相互作用为验证标准生成结构有效的分子。该模型成功地产生了39个新结构,其中15个与至少一种靶受体表现出满意的结合。
{"title":"GAN Based Approach for Drug Design","authors":"Aninditha Ramesh, Anusha S. Rao, Sanjana Moudgalya, K. S. Srinivas","doi":"10.1109/ICMLA52953.2021.00136","DOIUrl":"https://doi.org/10.1109/ICMLA52953.2021.00136","url":null,"abstract":"Deep Learning models have been a tremendous breakthrough in the field of Drug discovery, greatly simplifying the pre-clinical phase of this intricate task. With an intention to ease this further, we introduce a novel method to generate target-specific molecules using a Generative Adversarial Network (GAN). The dataset consists of drugs whose target proteins belong to the class of Tyrosine kinase and are specifically active against some of the growth factor receptors present in the human body. An Autoencoder network is used to learn the embeddings of the drug which is represented in the SMILES format and the deep neural network GAN is used to generate structurally valid molecules using drug-target interaction as the validating criteria. The model has successfully produced 39 novel structures and 15 of them show satisfactory binding with at least one of the target receptors.","PeriodicalId":6750,"journal":{"name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"10 1","pages":"825-828"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81938131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Batch and Online Variational Learning of Hierarchical Pitman-Yor Mixtures of Multivariate Beta Distributions 多变量Beta分布的分层Pitman-Yor混合的批处理和在线变分学习
Pub Date : 2021-12-01 DOI: 10.1109/ICMLA52953.2021.00053
Narges Manouchehri, N. Bouguila, Wentao Fan
In this paper, we propose hierarchical Pitman-Yor process mixtures of multivariate Beta distributions and learn this novel clustering method by online variational inference. The flexibility of this mixture model and its non-parametric hierarchical structure help in fitting our data. Also, the model complexity and model parameters are estimated simultaneously. We apply our proposed model to real medical applications. Our motivation is that labelling healthcare data is sensitive and expensive. Also, interpretability and evidence-based decision-making are some basic needs of medicine. These conditions led us to focus on clustering as it doesn’t need labelling. Another driving reason is that the amount of publicly available data in medicine is less compared to other fields due to the confidential regulations. To evaluate our proposed model, we compare its performance with other similar alternatives. The experimental results indicate the potential of our proposed model.
本文提出了多元Beta分布的分层Pitman-Yor过程混合聚类方法,并通过在线变分推理学习这种新颖的聚类方法。这种混合模型的灵活性及其非参数层次结构有助于拟合我们的数据。同时对模型复杂度和模型参数进行了估计。我们将提出的模型应用于实际医疗应用。我们的动机是,给医疗保健数据贴标签既敏感又昂贵。可解释性和循证决策是医学的基本需求。这些条件使我们专注于聚类,因为它不需要标记。另一个驱动因素是,由于保密规定,与其他领域相比,医学领域公开可用数据的数量较少。为了评估我们提出的模型,我们将其性能与其他类似的替代方案进行比较。实验结果表明了该模型的可行性。
{"title":"Batch and Online Variational Learning of Hierarchical Pitman-Yor Mixtures of Multivariate Beta Distributions","authors":"Narges Manouchehri, N. Bouguila, Wentao Fan","doi":"10.1109/ICMLA52953.2021.00053","DOIUrl":"https://doi.org/10.1109/ICMLA52953.2021.00053","url":null,"abstract":"In this paper, we propose hierarchical Pitman-Yor process mixtures of multivariate Beta distributions and learn this novel clustering method by online variational inference. The flexibility of this mixture model and its non-parametric hierarchical structure help in fitting our data. Also, the model complexity and model parameters are estimated simultaneously. We apply our proposed model to real medical applications. Our motivation is that labelling healthcare data is sensitive and expensive. Also, interpretability and evidence-based decision-making are some basic needs of medicine. These conditions led us to focus on clustering as it doesn’t need labelling. Another driving reason is that the amount of publicly available data in medicine is less compared to other fields due to the confidential regulations. To evaluate our proposed model, we compare its performance with other similar alternatives. The experimental results indicate the potential of our proposed model.","PeriodicalId":6750,"journal":{"name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"6 1","pages":"298-303"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87435668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1