首页 > 最新文献

2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)最新文献

英文 中文
25th IEEE International Conference on Computational Science and Engineering, CSE 2022, Wuhan, China, December 9-11, 2022 第25届IEEE计算科学与工程国际会议,CSE 2022,武汉,中国,2022年12月9日至11日
{"title":"25th IEEE International Conference on Computational Science and Engineering, CSE 2022, Wuhan, China, December 9-11, 2022","authors":"","doi":"10.1109/CSE57773.2022","DOIUrl":"https://doi.org/10.1109/CSE57773.2022","url":null,"abstract":"","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91397089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of Environmental Conditions on PRNU 环境条件对PRNU的影响
Pucha Rohan, Priyanka Singh, M. Mohanty
Photo Response Non-Uniformity (PRNU) has been used reliably in the field of digital forensics to identify the camera for multiple applications. Given its importance, we study how the different environmental conditions affect this unique camera property in this paper. We collected 18 different cameras and created a dataset by clicking photos of 10 different objects in the varied environmental conditions. To be specific, we clicked photos of objects in the sun, putting water droplets on the camera lens, placing objects inside water and, putting dust on the camera lens, apart from clicking the normal images of the objects in a closed room. To compute the PRNU of each of these 18 cameras, we clicked nearly 30 to 50 images of the plain surfaces. We then analyzed the behavior of these cameras, considering the computed PRNU as the baseline. We used the Peak to Correlation Energy (PCE) to evaluate a match for the camera. Here, we present the experimental results and the possible causes of failure for the PRNU for the specific cameras in varied environmental conditions.
在数字取证领域,光响应非均匀性(PRNU)已被可靠地用于识别相机的多种应用。鉴于其重要性,本文研究了不同的环境条件如何影响这一独特的相机特性。我们收集了18台不同的相机,并通过点击不同环境条件下10个不同物体的照片创建了一个数据集。具体来说,除了在封闭的房间里拍摄物体的正常图像外,我们还拍摄了太阳下物体的照片,在相机镜头上放上水滴,把物体放在水中,在相机镜头上放上灰尘。为了计算这18台相机的PRNU,我们点击了近30到50张平面图像。然后,我们分析了这些相机的行为,考虑计算的PRNU作为基线。我们使用峰值到相关能(PCE)来评估相机的匹配。在这里,我们给出了在不同环境条件下特定相机的PRNU的实验结果和可能的故障原因。
{"title":"Effect of Environmental Conditions on PRNU","authors":"Pucha Rohan, Priyanka Singh, M. Mohanty","doi":"10.1109/CSE53436.2021.00031","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00031","url":null,"abstract":"Photo Response Non-Uniformity (PRNU) has been used reliably in the field of digital forensics to identify the camera for multiple applications. Given its importance, we study how the different environmental conditions affect this unique camera property in this paper. We collected 18 different cameras and created a dataset by clicking photos of 10 different objects in the varied environmental conditions. To be specific, we clicked photos of objects in the sun, putting water droplets on the camera lens, placing objects inside water and, putting dust on the camera lens, apart from clicking the normal images of the objects in a closed room. To compute the PRNU of each of these 18 cameras, we clicked nearly 30 to 50 images of the plain surfaces. We then analyzed the behavior of these cameras, considering the computed PRNU as the baseline. We used the Peak to Correlation Energy (PCE) to evaluate a match for the camera. Here, we present the experimental results and the possible causes of failure for the PRNU for the specific cameras in varied environmental conditions.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"49 1","pages":"154-161"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75271465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Vulnerability Types Classification Using Pure Self-Attention: A Common Weakness Enumeration Based Approach 基于纯自关注的漏洞类型分类:一种常见的基于弱点枚举的方法
Tianyi Wang, Shengzhi Qin, Kam-pui Chow
The wake of increasing malicious cyberattack cases has aroused people’s attention on cybersecurity and vulnerabilities. Common Vulnerabilities and Exposures (CVE), a famous cybersecurity vulnerability database, is often referenced as a standard in cybersecurity territory for both research and commercial purposes. In the past decade, the development of Common Weakness Enumeration (CWE) has provided useful vulnerability taxonomy on CVE entities. However, the generation process of CWE categories is totally by manual working, which has made cybersecurity professionals suffer from the unpredictable timing waiting for the up to date information to be published. In this study, a new CWE based vulnerability types classification method is introduced with the adoption of the CVE dataset. Our method adopts transformer encoder-decoder architecture and uses pure self-attention mechanism without any convolutions and recurrences. We first encode the CVE input entries to learn representative features and then decode them to perform vulnerability types classification regarding the CWE standards. Fine-tuned deep pre-trained Bidirectional Encoder Representation from Transformers (BERT) is utilized in experiment and performs automatic vulnerability types classification tasks on unlabeled CVE candidates and assigns CWE IDs. The proposed vulnerability types classification method outperforms all classical Natural Language Processing (NLP) baseline algorithms, conducting a high accuracy of 90.74% on the testing dataset. In addition, the well-trained vulnerability types classification model is believed to achieve considerable correctness at industry level when applied to the real-life cyber threat intelligence related articles and reports.
随着恶意网络攻击案件的不断增多,引起了人们对网络安全和漏洞的关注。Common Vulnerabilities and Exposures (CVE)是一个著名的网络安全漏洞数据库,在网络安全研究和商业领域经常被引用为标准。在过去的十年中,公共弱点枚举(CWE)的发展为CVE实体提供了有用的漏洞分类。然而,CWE类别的生成过程完全是手工操作的,这使得网络安全专业人员面临着等待最新信息发布的不可预测的时间。本研究采用CVE数据集,引入了一种新的基于CWE的漏洞类型分类方法。该方法采用变压器式编解码器结构,采用纯自关注机制,不需要任何卷积和递归。我们首先对CVE输入条目进行编码,学习具有代表性的特征,然后对其进行解码,根据CWE标准进行漏洞类型分类。实验中使用了微调深度预训练双向编码器表示(BERT),对未标记的CVE候选对象进行漏洞类型自动分类任务并分配CWE id。提出的漏洞类型分类方法优于所有经典的自然语言处理(NLP)基线算法,在测试数据集上的准确率高达90.74%。此外,训练有素的漏洞类型分类模型在应用于现实生活中的网络威胁情报相关文章和报告时,在行业层面上具有相当的正确性。
{"title":"Towards Vulnerability Types Classification Using Pure Self-Attention: A Common Weakness Enumeration Based Approach","authors":"Tianyi Wang, Shengzhi Qin, Kam-pui Chow","doi":"10.1109/CSE53436.2021.00030","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00030","url":null,"abstract":"The wake of increasing malicious cyberattack cases has aroused people’s attention on cybersecurity and vulnerabilities. Common Vulnerabilities and Exposures (CVE), a famous cybersecurity vulnerability database, is often referenced as a standard in cybersecurity territory for both research and commercial purposes. In the past decade, the development of Common Weakness Enumeration (CWE) has provided useful vulnerability taxonomy on CVE entities. However, the generation process of CWE categories is totally by manual working, which has made cybersecurity professionals suffer from the unpredictable timing waiting for the up to date information to be published. In this study, a new CWE based vulnerability types classification method is introduced with the adoption of the CVE dataset. Our method adopts transformer encoder-decoder architecture and uses pure self-attention mechanism without any convolutions and recurrences. We first encode the CVE input entries to learn representative features and then decode them to perform vulnerability types classification regarding the CWE standards. Fine-tuned deep pre-trained Bidirectional Encoder Representation from Transformers (BERT) is utilized in experiment and performs automatic vulnerability types classification tasks on unlabeled CVE candidates and assigns CWE IDs. The proposed vulnerability types classification method outperforms all classical Natural Language Processing (NLP) baseline algorithms, conducting a high accuracy of 90.74% on the testing dataset. In addition, the well-trained vulnerability types classification model is believed to achieve considerable correctness at industry level when applied to the real-life cyber threat intelligence related articles and reports.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"8 1","pages":"146-153"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84849491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multimodal Aesthetic Analysis Assisted by Styles through a Multimodal co-Transformer Model 基于多模态共变模型的多模态美学分析
Haotian Miao, Yifei Zhang, Daling Wang, Shi Feng
Many real-world applications could profit from the ability of image aesthetic analysis. A simultaneous understanding of both the visual content of images and the textual content of user comments and style attributes appears to be more vivid and adequate than single-modality and single-dimension information to help people learning to identify beauty or not. In this paper, we propose a multimodal co-transformer model to learn a joint representation of multimodal contents based on the co-attention mechanism, and then we conduct multi-dimension aesthetic analysis assisted by style attributes. Towards this goal, we propose a stacked multimodal co-transformer module encoding the feature under interactive guidance, and then we utilize a multi-task learning strategy for predicting multiple aesthetic dimensions. Experimental results indicate that the proposed model achieves state-of-the-art performance on the AVA datasets benchmark.
许多现实世界的应用程序都可以从图像美学分析能力中获益。同时理解图像的视觉内容和用户评论和风格属性的文字内容,似乎比单一形态、单一维度的信息更生动、更充分地帮助人们学习识别美与不美。本文提出了一种基于共同注意机制的多模态共变模型,学习多模态内容的联合表示,并在风格属性的辅助下进行多维审美分析。为了实现这一目标,我们提出了一个堆叠的多模态共变模块,在交互指导下对特征进行编码,然后我们利用多任务学习策略来预测多个审美维度。实验结果表明,该模型在AVA数据集基准上达到了最先进的性能。
{"title":"Multimodal Aesthetic Analysis Assisted by Styles through a Multimodal co-Transformer Model","authors":"Haotian Miao, Yifei Zhang, Daling Wang, Shi Feng","doi":"10.1109/CSE53436.2021.00016","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00016","url":null,"abstract":"Many real-world applications could profit from the ability of image aesthetic analysis. A simultaneous understanding of both the visual content of images and the textual content of user comments and style attributes appears to be more vivid and adequate than single-modality and single-dimension information to help people learning to identify beauty or not. In this paper, we propose a multimodal co-transformer model to learn a joint representation of multimodal contents based on the co-attention mechanism, and then we conduct multi-dimension aesthetic analysis assisted by style attributes. Towards this goal, we propose a stacked multimodal co-transformer module encoding the feature under interactive guidance, and then we utilize a multi-task learning strategy for predicting multiple aesthetic dimensions. Experimental results indicate that the proposed model achieves state-of-the-art performance on the AVA datasets benchmark.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"52 1","pages":"43-50"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90682789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Robot Coverage Path Planning based on Deep Reinforcement Learning 基于深度强化学习的多机器人覆盖路径规划
Xiaolin Zhou, Xiaojie Liu, Xingwei Wang, Shiguang Wu, Mingyang Sun
The multi-robot coverage path planning (CPP) is the design of optimal motion sequence of robots, which can make robots execute the task covering all positions of the work area except the obstacles. In this article, the communication capability of the multi-robot system is applied, and a multi-robot CPP mechanism is proposed to control the robots to perform CPP tasks in an unknown environment. In this mechanism, an algorithm based on deep reinforcement learning is proposed, which can generate the next action for robots in real-time according to the current state of the robots. In addition, a real-time obstacle avoidance scheme for multi-robot is proposed based on the information interaction capability of multi-robot. Experiment results show that the method can plan the optimal path for multi-robot to complete the covering task in an unknown environment. Moreover, compared with other reinforcement learning methods, the algorithm proposed can efficiently learning with fast convergence speed and good stability.
多机器人覆盖路径规划(CPP)是设计机器人的最优运动序列,使机器人能够覆盖工作区域除障碍物外的所有位置。本文利用多机器人系统的通信能力,提出了一种多机器人CPP机制来控制机器人在未知环境下执行CPP任务。在该机制中,提出了一种基于深度强化学习的算法,可以根据机器人的当前状态实时生成机器人的下一个动作。此外,基于多机器人的信息交互能力,提出了一种多机器人实时避障方案。实验结果表明,该方法可以为多机器人在未知环境下完成覆盖任务规划最优路径。与其他强化学习方法相比,该算法具有学习效率高、收敛速度快、稳定性好等特点。
{"title":"Multi-Robot Coverage Path Planning based on Deep Reinforcement Learning","authors":"Xiaolin Zhou, Xiaojie Liu, Xingwei Wang, Shiguang Wu, Mingyang Sun","doi":"10.1109/CSE53436.2021.00015","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00015","url":null,"abstract":"The multi-robot coverage path planning (CPP) is the design of optimal motion sequence of robots, which can make robots execute the task covering all positions of the work area except the obstacles. In this article, the communication capability of the multi-robot system is applied, and a multi-robot CPP mechanism is proposed to control the robots to perform CPP tasks in an unknown environment. In this mechanism, an algorithm based on deep reinforcement learning is proposed, which can generate the next action for robots in real-time according to the current state of the robots. In addition, a real-time obstacle avoidance scheme for multi-robot is proposed based on the information interaction capability of multi-robot. Experiment results show that the method can plan the optimal path for multi-robot to complete the covering task in an unknown environment. Moreover, compared with other reinforcement learning methods, the algorithm proposed can efficiently learning with fast convergence speed and good stability.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"10 1","pages":"35-42"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84315901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Extracting Discriminative Features for Cross-View Gait Recognition Based on the Attention Mechanism 基于注意机制的横视步态识别判别特征提取
Ruicheng Sun, Shuo Han, Weihang Peng, Hanxiang Zhuang, Xin Zeng, Xingang Liu
Human identification based on gait biometrics has become a popular research topic of computer vision and pattern recognition due to its great potential in public security and surveillance system. However, the recognition accuracy can be seriously degraded because of the appearance differences caused by view angle variation. To tackle this problem, we propose a method based on convolutional neural network (CNN) and attention mechanism to solve the cross-view problem in gait recognition. In the proposed algorithm, we firstly extract the features based on CNN structure and then the Horizontal Splitting operation is done to obtain the feature partitions in different granularities. After that, the attention mechanism is utilized to calculate the attention scores of the input partitions on both spatial and channel domain and finally the group of feature vectors can be obtained to determine the corresponding identity. In order to verify the effectiveness of the proposed method, the experiments are done based on two popular gait datasets–CASIA-B and OU-ISIR LP. The results show that the proposed model can effectively extract the discriminative gait features robust to view angle variation and improve the crossview gait recognition accuracy compared with the state-of-the-arts.
基于步态生物特征的人体识别由于其在公安监控系统中的巨大潜力,已成为计算机视觉和模式识别领域的热门研究课题。然而,由于视角变化引起的外观差异会严重降低识别精度。为了解决这一问题,我们提出了一种基于卷积神经网络(CNN)和注意机制的方法来解决步态识别中的横视问题。在该算法中,我们首先基于CNN结构提取特征,然后进行水平分割操作,得到不同粒度的特征分区。然后利用注意机制计算输入分区在空间域和通道域的注意分数,最终得到一组特征向量,确定相应的身份。为了验证该方法的有效性,在casia - b和OU-ISIR LP两种常用的步态数据集上进行了实验。结果表明,该模型能够有效提取步态特征,对视角变化具有鲁棒性,提高了横视步态识别的精度。
{"title":"Extracting Discriminative Features for Cross-View Gait Recognition Based on the Attention Mechanism","authors":"Ruicheng Sun, Shuo Han, Weihang Peng, Hanxiang Zhuang, Xin Zeng, Xingang Liu","doi":"10.1109/CSE53436.2021.00032","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00032","url":null,"abstract":"Human identification based on gait biometrics has become a popular research topic of computer vision and pattern recognition due to its great potential in public security and surveillance system. However, the recognition accuracy can be seriously degraded because of the appearance differences caused by view angle variation. To tackle this problem, we propose a method based on convolutional neural network (CNN) and attention mechanism to solve the cross-view problem in gait recognition. In the proposed algorithm, we firstly extract the features based on CNN structure and then the Horizontal Splitting operation is done to obtain the feature partitions in different granularities. After that, the attention mechanism is utilized to calculate the attention scores of the input partitions on both spatial and channel domain and finally the group of feature vectors can be obtained to determine the corresponding identity. In order to verify the effectiveness of the proposed method, the experiments are done based on two popular gait datasets–CASIA-B and OU-ISIR LP. The results show that the proposed model can effectively extract the discriminative gait features robust to view angle variation and improve the crossview gait recognition accuracy compared with the state-of-the-arts.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"46 1","pages":"162-167"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88312872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new image encryption scheme based on 3D Sine-adjusted-Logistic map and DNA coding 一种基于三维正弦调整logistic图和DNA编码的图像加密新方案
Zhenzhou Guo, Ding Feng, Changqing Gong, Han Qi, Na Lin, Xintong Li
The chaos theory is a widely used technology for image encryption as its significant properties such as unpredictability and initial state sensitivity. In this paper, we introduce a new 3D Sine adjusted Logistic hyperchaotic system (3D-SALM), which is derived from the Logistic and Sine maps. Performance evaluation shows that it has good performance in ergodicity and orbit uncertainty. To investigate its applications, we propose a new random DNA coding scheme, the random coding rules are according to 3D-SALM sequences. This paper further introduces a new image encryption scheme (SALM-IES). In order to enhance the confusion of cipher-image, the principle of random diffusion and random confusion are fulfilled. Simulation results show that the proposed scheme can effectively resist various typical attacks, especially in the resistance to differential and cropping attacks.
混沌理论以其不可预测性和初始状态敏感性等显著特性被广泛应用于图像加密。本文引入了一种新的三维正弦调整Logistic超混沌系统(3D- salm),该系统由Logistic映射和正弦映射衍生而来。性能评估表明,该方法在遍历性和轨道不确定性方面具有良好的性能。为了研究其应用,我们提出了一种新的DNA随机编码方案,该方案根据3D-SALM序列随机编码规则。本文进一步介绍了一种新的图像加密方案(SALM-IES)。为了增强密码图像的混淆性,实现了随机扩散和随机混淆原理。仿真结果表明,该方案能够有效抵御各种典型攻击,特别是对差分攻击和裁剪攻击的抵抗能力较强。
{"title":"A new image encryption scheme based on 3D Sine-adjusted-Logistic map and DNA coding","authors":"Zhenzhou Guo, Ding Feng, Changqing Gong, Han Qi, Na Lin, Xintong Li","doi":"10.1109/CSE53436.2021.00014","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00014","url":null,"abstract":"The chaos theory is a widely used technology for image encryption as its significant properties such as unpredictability and initial state sensitivity. In this paper, we introduce a new 3D Sine adjusted Logistic hyperchaotic system (3D-SALM), which is derived from the Logistic and Sine maps. Performance evaluation shows that it has good performance in ergodicity and orbit uncertainty. To investigate its applications, we propose a new random DNA coding scheme, the random coding rules are according to 3D-SALM sequences. This paper further introduces a new image encryption scheme (SALM-IES). In order to enhance the confusion of cipher-image, the principle of random diffusion and random confusion are fulfilled. Simulation results show that the proposed scheme can effectively resist various typical attacks, especially in the resistance to differential and cropping attacks.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"56 1","pages":"27-34"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85561842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Brain Hippocampus Segmentation Based on Improved U-net Model 基于改进U-net模型的人脑海马区分割
Chulan Ren, Ning Wang, Yang Zhang
The hippocampus segmentation in MRI is of great significance for the diagnosis, treatment decision and research of neuropsychiatric diseases. Manual segmentation of the hippocampus is very time-consuming and has low repeatability. With the development of deep learning, great progress has been brought about in this regard. In this paper, the U-net model is selected to realize the automatic segmentation of the hippocampus, and the residual module is added to the U-net segmentation network to speed up the network convergence. Aiming at the characteristics of the hippocampus in the brain MRI image such as blurry edges, irregular shapes, and small size, the Laplacian algorithm is used to sharpen and filter the original image to make the details and edges of the brain image clearer. The enhanced picture can effectively improve the segmentation effect. Finally, the Dice coefficient on the test set reached 90.14%.The experimental results show that the pre-processed images use this segmentation model to achieve accurate segmentation of the hippocampus in the brain MRI, which can assist doctors in better diagnosis.
MRI海马分割对神经精神疾病的诊断、治疗决策和研究具有重要意义。手工分割海马非常耗时,重复性低。随着深度学习的发展,这方面已经取得了很大的进展。本文选择U-net模型实现海马的自动分割,并在U-net分割网络中加入残差模块,加快网络收敛速度。针对大脑MRI图像中海马边缘模糊、形状不规则、体积小等特点,采用拉普拉斯算法对原始图像进行锐化和滤波,使大脑图像的细节和边缘更加清晰。增强后的图像可以有效地提高分割效果。最后,测试集上的Dice系数达到90.14%。实验结果表明,预处理后的图像使用该分割模型可以实现对大脑MRI中海马的准确分割,可以帮助医生更好地进行诊断。
{"title":"Human Brain Hippocampus Segmentation Based on Improved U-net Model","authors":"Chulan Ren, Ning Wang, Yang Zhang","doi":"10.1109/CSE53436.2021.00011","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00011","url":null,"abstract":"The hippocampus segmentation in MRI is of great significance for the diagnosis, treatment decision and research of neuropsychiatric diseases. Manual segmentation of the hippocampus is very time-consuming and has low repeatability. With the development of deep learning, great progress has been brought about in this regard. In this paper, the U-net model is selected to realize the automatic segmentation of the hippocampus, and the residual module is added to the U-net segmentation network to speed up the network convergence. Aiming at the characteristics of the hippocampus in the brain MRI image such as blurry edges, irregular shapes, and small size, the Laplacian algorithm is used to sharpen and filter the original image to make the details and edges of the brain image clearer. The enhanced picture can effectively improve the segmentation effect. Finally, the Dice coefficient on the test set reached 90.14%.The experimental results show that the pre-processed images use this segmentation model to achieve accurate segmentation of the hippocampus in the brain MRI, which can assist doctors in better diagnosis.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"26 1","pages":"7-11"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91014366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
UAV-empowered Vehicular Networking Scheme for Federated Learning in Delay Tolerant Environments 延迟容忍环境下联合学习的无人机授权车载网络方案
Zhaoyang Du, Ganggui Wang, Narisu Cha, Celimuge Wu, T. Yoshinaga, Rui Yin
While vehicular federated learning (FL) systems can be used for various purposes including traffic monitoring and people flow control, since the learning process involves a large variety of network entities that exhibits different characteristics, it is inefficient to establish an end-to-end communication route for each model upload/download. In this paper, we discuss the use of delay tolerant networking (DTN) technology in transmission of FL models for unmanned aerial vehicle (UAV) empowered vehicular environments, and propose a networking scheme. The proposed scheme considers the encounter probability, the connectivity between encounter nodes, and the sociability of nodes in the packet forwarding by using a fuzzy logic approach. The importance of local model data is also considered in the buffer management of forwarder nodes, which ensures that local models with higher importance are more likely to be delivered to the central server. We use extensive simulations to evaluate the proposed scheme in terms of its effect on the federated learning, packet delivery ratio, networking overhead and communication latency by comparing with existing baselines.
虽然车辆联合学习(FL)系统可以用于各种目的,包括交通监控和人流控制,但由于学习过程涉及各种各样的网络实体,这些网络实体表现出不同的特征,因此为每个模型的上传/下载建立端到端的通信路由是低效的。本文讨论了容延迟网络(DTN)技术在无人机驱动的车载环境下FL模型传输中的应用,并提出了一种网络方案。该方案采用模糊逻辑方法,综合考虑了分组转发过程中遇到节点的概率、节点间的连通性和节点间的社交性。在转发器节点的缓冲区管理中也考虑了本地模型数据的重要性,保证了重要性较高的本地模型更有可能被传递到中心服务器。通过与现有的基线进行比较,我们使用大量的模拟来评估所提出的方案在联邦学习、数据包传送率、网络开销和通信延迟方面的影响。
{"title":"UAV-empowered Vehicular Networking Scheme for Federated Learning in Delay Tolerant Environments","authors":"Zhaoyang Du, Ganggui Wang, Narisu Cha, Celimuge Wu, T. Yoshinaga, Rui Yin","doi":"10.1109/CSE53436.2021.00020","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00020","url":null,"abstract":"While vehicular federated learning (FL) systems can be used for various purposes including traffic monitoring and people flow control, since the learning process involves a large variety of network entities that exhibits different characteristics, it is inefficient to establish an end-to-end communication route for each model upload/download. In this paper, we discuss the use of delay tolerant networking (DTN) technology in transmission of FL models for unmanned aerial vehicle (UAV) empowered vehicular environments, and propose a networking scheme. The proposed scheme considers the encounter probability, the connectivity between encounter nodes, and the sociability of nodes in the packet forwarding by using a fuzzy logic approach. The importance of local model data is also considered in the buffer management of forwarder nodes, which ensures that local models with higher importance are more likely to be delivered to the central server. We use extensive simulations to evaluate the proposed scheme in terms of its effect on the federated learning, packet delivery ratio, networking overhead and communication latency by comparing with existing baselines.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"7 1","pages":"72-79"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73027522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FlowGAN - Synthetic Network Flow Generation using Generative Adversarial Networks 使用生成对抗网络的合成网络流量生成
Liam Daly Manocchio, S. Layeghy, Marius Portmann
Generative Adversarial Networks (GANs) are known to be a powerful machine learning tool for realistic data synthesis. In this paper, we explore GANs for the generation of synthetic network flow data (NetFlow), e.g. for the training of Network Intrusion Detection Systems. GANs are known to be prone to modal collapse, a condition where the generated data fails to reflect the diversity (modes) of the training data. We experimentally evaluate the key GAN-based approaches in the literature for the synthetic generation of network flow data, and demonstrate that they indeed suffer from modal collapse. To address this problem, we present FlowGAN, a network flow generation method which mitigates the problem of modal collapse by applying the recently proposed concept of Manifold Guided Generative Adversarial Networks (MGGAN). Our experimental evaluation shows that FlowGAN is able to generate much more realistic network traffic flows compared to the state-of-the-art GAN-based approaches. We quantify this significant improvement of FlowGAN by using the Wasserstein distance between the statistical distribution of key features of the generated flow data, compared with the corresponding distributions in the training data set.
生成对抗网络(GANs)是一种强大的机器学习工具,用于现实数据合成。在本文中,我们探讨了生成合成网络流量数据(NetFlow)的gan,例如用于网络入侵检测系统的训练。已知gan容易出现模态崩溃,即生成的数据不能反映训练数据的多样性(模态)。我们通过实验评估了文献中用于网络流数据合成的关键基于gan的方法,并证明它们确实存在模态崩溃。为了解决这个问题,我们提出了FlowGAN,一种网络流生成方法,它通过应用最近提出的流形引导生成对抗网络(MGGAN)的概念来减轻模态崩溃的问题。我们的实验评估表明,与最先进的基于gan的方法相比,FlowGAN能够生成更真实的网络流量。我们通过使用生成的流量数据的关键特征的统计分布与训练数据集中相应分布之间的Wasserstein距离来量化FlowGAN的显著改进。
{"title":"FlowGAN - Synthetic Network Flow Generation using Generative Adversarial Networks","authors":"Liam Daly Manocchio, S. Layeghy, Marius Portmann","doi":"10.1109/CSE53436.2021.00033","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00033","url":null,"abstract":"Generative Adversarial Networks (GANs) are known to be a powerful machine learning tool for realistic data synthesis. In this paper, we explore GANs for the generation of synthetic network flow data (NetFlow), e.g. for the training of Network Intrusion Detection Systems. GANs are known to be prone to modal collapse, a condition where the generated data fails to reflect the diversity (modes) of the training data. We experimentally evaluate the key GAN-based approaches in the literature for the synthetic generation of network flow data, and demonstrate that they indeed suffer from modal collapse. To address this problem, we present FlowGAN, a network flow generation method which mitigates the problem of modal collapse by applying the recently proposed concept of Manifold Guided Generative Adversarial Networks (MGGAN). Our experimental evaluation shows that FlowGAN is able to generate much more realistic network traffic flows compared to the state-of-the-art GAN-based approaches. We quantify this significant improvement of FlowGAN by using the Wasserstein distance between the statistical distribution of key features of the generated flow data, compared with the corresponding distributions in the training data set.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"39 1","pages":"168-176"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76160709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1