首页 > 最新文献

IEEE transactions on artificial intelligence最新文献

英文 中文
A Human-in-the-Middle Attack Against Object Detection Systems 针对物体检测系统的中间人攻击
Pub Date : 2024-07-15 DOI: 10.1109/TAI.2024.3428520
Han Wu;Sareh Rowlands;Johan Wahlström
Object detection systems using deep learning models have become increasingly popular in robotics thanks to the rising power of central processing units (CPUs) and graphics processing units (GPUs) in embedded systems. However, these models are susceptible to adversarial attacks. While some attacks are limited by strict assumptions on access to the detection system, we propose a novel hardware attack inspired by Man-in-the-Middle attacks in cryptography. This attack generates a universal adversarial perturbations (UAPs) and injects the perturbation between the universal serial bus (USB) camera and the detection system via a hardware attack. Besides, prior research is misled by an evaluation metric that measures the model accuracy rather than the attack performance. In combination with our proposed evaluation metrics, we significantly increased the strength of adversarial perturbations. These findings raise serious concerns for applications of deep learning models in safety-critical systems, such as autonomous driving.
由于嵌入式系统中中央处理器(CPU)和图形处理器(GPU)的性能不断提升,使用深度学习模型的物体检测系统在机器人领域越来越受欢迎。然而,这些模型容易受到恶意攻击。有些攻击受限于访问检测系统的严格假设,而我们提出的新型硬件攻击则受密码学中的 "中间人 "攻击启发。这种攻击会产生一种通用对抗扰动(UAPs),并通过硬件攻击将扰动注入通用串行总线(USB)摄像头和检测系统之间。此外,先前的研究还受到了衡量模型准确性而非攻击性能的评估指标的误导。结合我们提出的评估指标,我们大大提高了对抗性扰动的强度。这些发现引起了人们对深度学习模型在自动驾驶等安全关键系统中应用的严重担忧。
{"title":"A Human-in-the-Middle Attack Against Object Detection Systems","authors":"Han Wu;Sareh Rowlands;Johan Wahlström","doi":"10.1109/TAI.2024.3428520","DOIUrl":"https://doi.org/10.1109/TAI.2024.3428520","url":null,"abstract":"Object detection systems using deep learning models have become increasingly popular in robotics thanks to the rising power of central processing units (CPUs) and graphics processing units (GPUs) in embedded systems. However, these models are susceptible to adversarial attacks. While some attacks are limited by strict assumptions on access to the detection system, we propose a novel hardware attack inspired by Man-in-the-Middle attacks in cryptography. This attack generates a universal adversarial perturbations (UAPs) and injects the perturbation between the universal serial bus (USB) camera and the detection system via a hardware attack. Besides, prior research is misled by an evaluation metric that measures the model accuracy rather than the attack performance. In combination with our proposed evaluation metrics, we significantly increased the strength of adversarial perturbations. These findings raise serious concerns for applications of deep learning models in safety-critical systems, such as autonomous driving.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142443113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disentangled Cross-modal Fusion for Event-Guided Image Super-resolution 事件引导图像超分辨率的分离式跨模态融合
Pub Date : 2024-06-28 DOI: 10.1109/TAI.2024.3418376
Minjie Liu;Hongjian Wang;Kuk-Jin Yoon;Lin Wang
Event cameras detect the intensity changes and produce asynchronous events with high dynamic range and no motion blur. Recently, several attempts have been made to superresolve the intensity images guided by events. However, these methods directly fuse the event and image features without distinguishing the modality difference and achieve image superresolution (SR) in multiple steps, leading to error-prone image SR results. Also, they lack quantitative evaluation of real-world data. In this article, we present an end-to-end framework, called event-guided image (EGI)-SR to narrow the modality gap and subtly integrate the event and RGB modality features for effective image SR. Specifically, EGI-SR employs three crossmodality encoders (CME) to learn modality-specific and modality-shared features from the stacked events and the intensity image, respectively. As such, EGI-SR can better mitigate the negative impact of modality varieties and reduce the difference in the feature space between the events and the intensity image. Subsequently, a transformer-based decoder is deployed to reconstruct the SR image. Moreover, we collect a real-world dataset, with temporally and spatially aligned events and color image pairs. We conduct extensive experiments on the synthetic and real-world datasets, showing EGI-SR favorably surpassing the existing methods by a large margin.
事件摄像机能检测强度变化,并产生具有高动态范围和无运动模糊的异步事件。最近,人们尝试对事件引导的强度图像进行超分辨率处理。然而,这些方法直接融合事件和图像特征,没有区分模态差异,而且分多个步骤实现图像超分辨率(SR),导致图像超分辨率结果容易出错。此外,这些方法缺乏对真实世界数据的定量评估。在本文中,我们提出了一个端到端的框架,称为事件引导图像(EGI)-SR,以缩小模态差距,巧妙地整合事件和 RGB 模态特征,从而实现有效的图像 SR。具体来说,EGI-SR 采用了三个跨模态编码器 (CME),分别从堆叠事件和强度图像中学习特定模态和模态共享特征。因此,EGI-SR 可以更好地减轻模态多样性的负面影响,并减少事件和强度图像之间的特征空间差异。随后,我们部署了基于变压器的解码器来重建 SR 图像。此外,我们还收集了一个真实世界的数据集,其中包含时间和空间上一致的事件和彩色图像对。我们在合成数据集和真实数据集上进行了大量实验,结果表明 EGI-SR 远远优于现有方法。
{"title":"Disentangled Cross-modal Fusion for Event-Guided Image Super-resolution","authors":"Minjie Liu;Hongjian Wang;Kuk-Jin Yoon;Lin Wang","doi":"10.1109/TAI.2024.3418376","DOIUrl":"https://doi.org/10.1109/TAI.2024.3418376","url":null,"abstract":"Event cameras detect the intensity changes and produce asynchronous events with high dynamic range and no motion blur. Recently, several attempts have been made to superresolve the intensity images guided by events. However, these methods directly fuse the event and image features without distinguishing the modality difference and achieve image superresolution (SR) in multiple steps, leading to error-prone image SR results. Also, they lack quantitative evaluation of real-world data. In this article, we present an \u0000<italic>end-to-end</i>\u0000 framework, called \u0000<italic>event-guided image (EGI)-SR</i>\u0000 to narrow the modality gap and subtly integrate the event and RGB modality features for effective image SR. Specifically, EGI-SR employs three crossmodality encoders (CME) to learn modality-specific and modality-shared features from the stacked events and the intensity image, respectively. As such, EGI-SR can better mitigate the negative impact of modality varieties and reduce the difference in the feature space between the events and the intensity image. Subsequently, a transformer-based decoder is deployed to reconstruct the SR image. Moreover, we collect a real-world dataset, with temporally and spatially aligned events and color image pairs. We conduct extensive experiments on the synthetic and real-world datasets, showing EGI-SR favorably surpassing the existing methods by a large margin.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142443093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement Learning-Based Time-Synchronized Optimized Control for Affine Systems 基于强化学习的仿射系统时间同步优化控制
Pub Date : 2024-06-27 DOI: 10.1109/TAI.2024.3420261
Yuxiang Zhang;Xiaoling Liang;Dongyu Li;Shuzhi Sam Ge;Bingzhao Gao;Hong Chen;Tong Heng Lee
The approach of (fixed-) time-synchronized control (FTSC) aims at attaining the outcome where all the system state-variables converge to the origin simultaneously/synchronously. This type of outcome can be the highly essential performance desired in various real-world high-precision control applications. Toward this objective, this article proposes and investigates the development of a time-synchronized reinforcement learning algorithm (TSRL) applicable to a particular class of first- and second-order affine nonlinear systems. The approach developed here appropriately incorporates the norm-normalized sign function into the optimal system control design, leveraging on the special properties of this norm-normalized sign function in attaining time-synchronized stability and control. Concurrently, the actor–critic framework in reinforcement learning (RL) is invoked, and the dual quantities of system control and gradient term of the cost function are decomposed with appropriate time-synchronized control items and unknown actor/critic part and to be learned independently. By additionally employing the adaptive dynamic programming technique, the solution of the Hamilton–Jacobi–Bellman equation is iteratively approximated under this actor–critic framework. As an outcome, the proposed TSRL method optimizes the system control while attaining the notable time-synchronized convergence property. The performance and effectiveness of the proposed method are demonstrated to be effectively applicable via detailed numerical studies and on an autonomous vehicle nonlinear system motion control problem.
固定)时间同步控制(FTSC)方法旨在实现所有系统状态变量同时/同步收敛到原点的结果。在现实世界的各种高精度控制应用中,这种结果可能是最基本的性能要求。为了实现这一目标,本文提出并研究了一种适用于一阶和二阶仿射非线性系统的时间同步强化学习算法(TSRL)。本文所开发的方法将规范归一化符号函数恰当地融入了最优系统控制设计中,利用这种规范归一化符号函数的特殊性质实现了时间同步稳定性和控制。同时,引用强化学习(RL)中的行为批判框架,将系统控制和成本函数梯度项的双重量分解为适当的时间同步控制项和未知的行为/批判部分,并进行独立学习。此外,还采用了自适应动态编程技术,在此 "行动者-批评者 "框架下迭代逼近汉密尔顿-雅各比-贝尔曼方程的解。结果,所提出的 TSRL 方法在优化系统控制的同时,还获得了显著的时间同步收敛特性。通过详细的数值研究和自主车辆非线性系统运动控制问题,证明了所提方法的性能和有效性。
{"title":"Reinforcement Learning-Based Time-Synchronized Optimized Control for Affine Systems","authors":"Yuxiang Zhang;Xiaoling Liang;Dongyu Li;Shuzhi Sam Ge;Bingzhao Gao;Hong Chen;Tong Heng Lee","doi":"10.1109/TAI.2024.3420261","DOIUrl":"https://doi.org/10.1109/TAI.2024.3420261","url":null,"abstract":"The approach of (fixed-) time-synchronized control (FTSC) aims at attaining the outcome where all the system state-variables converge to the origin simultaneously/synchronously. This type of outcome can be the highly essential performance desired in various real-world high-precision control applications. Toward this objective, this article proposes and investigates the development of a time-synchronized reinforcement learning algorithm (TSRL) applicable to a particular class of first- and second-order affine nonlinear systems. The approach developed here appropriately incorporates the norm-normalized sign function into the optimal system control design, leveraging on the special properties of this norm-normalized sign function in attaining time-synchronized stability and control. Concurrently, the actor–critic framework in reinforcement learning (RL) is invoked, and the dual quantities of system control and gradient term of the cost function are decomposed with appropriate time-synchronized control items and unknown actor/critic part and to be learned independently. By additionally employing the adaptive dynamic programming technique, the solution of the Hamilton–Jacobi–Bellman equation is iteratively approximated under this actor–critic framework. As an outcome, the proposed TSRL method optimizes the system control while attaining the notable time-synchronized convergence property. The performance and effectiveness of the proposed method are demonstrated to be effectively applicable via detailed numerical studies and on an autonomous vehicle nonlinear system motion control problem.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142443107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IN-GFD: An Interpretable Graph Fraud Detection Model for Spam Reviews IN-GFD:针对垃圾评论的可解释图形欺诈检测模型
Pub Date : 2024-06-27 DOI: 10.1109/TAI.2024.3420262
Hang Yu;Weixu Liu;Nengjun Zhu;Pengbo Li;Xiangfeng Luo
With the development of the e-commerce platform, more and more reviews of its various formats continue to appear. Reviews help people buy the right item faster, and instead, spam reviews reduce the user experience. To be able to detect spam reviews, statistical machine learning-based methods were commonly used in the past, but these approaches ignored the correlation between reviews. With the development of the graph fraud detection model, people have started to graph model the review data. However, typical graph fraud detection models still have problems with interpretability. Therefore, we propose here an interpretable graph fraud detection model for spam reviews, which is also named IN-GFD. As for the interpretability issue, we leveraged the relationship against the predicted score and whether a review is spam or not to build a loss function on top of the feature-embedding matrix, and introduced a scoring difference threshold mechanism, which can allow our model to have antehoc interpretability. In addition, to address class imbalance issues, IN-GFD utilizes the oversampling of the spam nodes to balance them with normal nodes and introduces an edge-loss function to learn new edge relationships. After extensive experiments, our method proves to be better than other state-of-the-arts (SOTA) models in terms of fraud detection and offers the benefit of interpretability. Finally, our study combines detection models with antehoc interpretability, offering a promising direction in review detection. Our approach has wide applicability, detecting spam reviews in datasets with user reviews and providing reasonable interpretations.
随着电子商务平台的发展,越来越多的各种形式的评论不断出现。评论可以帮助人们更快地购买到合适的商品,而垃圾评论反而会降低用户体验。为了检测垃圾评论,过去通常使用基于统计的机器学习方法,但这些方法忽略了评论之间的相关性。随着图欺诈检测模型的发展,人们开始对评论数据进行图建模。然而,典型的图欺诈检测模型仍然存在可解释性的问题。因此,我们在此提出一种可解释的垃圾评论图欺诈检测模型,并将其命名为 IN-GFD。针对可解释性问题,我们利用预测得分与评论是否为垃圾评论之间的关系,在特征嵌入矩阵之上建立了一个损失函数,并引入了评分差异阈值机制,从而使我们的模型具有临时可解释性。此外,为了解决类不平衡问题,IN-GFD 利用对垃圾节点的超采样来平衡它们与正常节点的关系,并引入边缘损失函数来学习新的边缘关系。经过大量实验证明,我们的方法在欺诈检测方面优于其他先进(SOTA)模型,并且具有可解释性强的优点。最后,我们的研究将检测模型与前置可解释性相结合,为评论检测提供了一个前景广阔的方向。我们的方法具有广泛的适用性,可以在包含用户评论的数据集中检测出垃圾评论,并提供合理的解释。
{"title":"IN-GFD: An Interpretable Graph Fraud Detection Model for Spam Reviews","authors":"Hang Yu;Weixu Liu;Nengjun Zhu;Pengbo Li;Xiangfeng Luo","doi":"10.1109/TAI.2024.3420262","DOIUrl":"https://doi.org/10.1109/TAI.2024.3420262","url":null,"abstract":"With the development of the e-commerce platform, more and more reviews of its various formats continue to appear. Reviews help people buy the right item faster, and instead, spam reviews reduce the user experience. To be able to detect spam reviews, statistical machine learning-based methods were commonly used in the past, but these approaches ignored the correlation between reviews. With the development of the graph fraud detection model, people have started to graph model the review data. However, typical graph fraud detection models still have problems with interpretability. Therefore, we propose here an interpretable graph fraud detection model for spam reviews, which is also named IN-GFD. As for the interpretability issue, we leveraged the relationship against the predicted score and whether a review is spam or not to build a loss function on top of the feature-embedding matrix, and introduced a scoring difference threshold mechanism, which can allow our model to have antehoc interpretability. In addition, to address class imbalance issues, IN-GFD utilizes the oversampling of the spam nodes to balance them with normal nodes and introduces an edge-loss function to learn new edge relationships. After extensive experiments, our method proves to be better than other state-of-the-arts (SOTA) models in terms of fraud detection and offers the benefit of interpretability. Finally, our study combines detection models with antehoc interpretability, offering a promising direction in review detection. Our approach has wide applicability, detecting spam reviews in datasets with user reviews and providing reasonable interpretations.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142443127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Intelligent Resilient Bipartite Formation Control for Nonlinear Multiagent Systems With False Data Injection Attacks on Actuators and Sensors 针对执行器和传感器受到虚假数据注入攻击的非线性多代理系统的自适应智能弹性双方阵控制
Pub Date : 2024-06-26 DOI: 10.1109/TAI.2024.3418938
Jie Lan;Hao Wang;Yan-Jun Liu;Shaocheng Tong
An adaptive intelligent resilient distributed output bipartite time-varying formation protocol is proposed for a class of second-order uncertain nonlinear multiagent systems (MASs) with unknown attacks. Actuators and sensors are both vulnerable to unknown false data injection (FDI) attacks, and the proposed protocol does not require the removal of misbehaving agents or strong network connectivity restrictions. However, existing research methods are mainly limited to studying the complete cooperative relationship and attacks only on actuators or sensors. Network interactions are based on directed signed topologies, reflecting cooperation and competition between agents, and the corresponding adjacency matrix is no longer nonnegative, making traditional consensus controls strategy inapplicable and analyzed by gauge transformation matrix. Due to the uncertain nonlinear dynamics with unmeasurable states, unknown attacks would jeopardize the synchronization of bipartite formation control and even deteriorate entire systems. To address this issue, a security state estimator and adaptive intelligent state reconstruction technique are adopted. It not only can estimate and mitigate malicious unknown FDI attacks on both actuators and sensors simultaneously but also achieve uniform ultimate boundedness (UUB) for observer errors and prescribed time-varying bipartite group consistency formation performance. In particular, the proposed method overcomes the restriction that the dynamics must be linear or general Lipschitz-type nonlinear conditions. Finally, employing Riccati equation and linear matrix inequality, the theoretical method is validly proved by constructing proper Lyapunov through transformation matrix. The results of digital simulation can be effectively demonstrated.
针对一类具有未知攻击的二阶不确定非线性多代理系统(MAS),提出了一种自适应智能弹性分布式输出双方格时变形成协议。执行器和传感器都容易受到未知虚假数据注入(FDI)攻击,而所提出的协议不需要移除行为不端的代理或强网络连接限制。然而,现有的研究方法主要局限于研究完整的合作关系,以及只针对致动器或传感器的攻击。网络交互基于有向符号拓扑,反映了代理之间的合作与竞争,相应的邻接矩阵不再是非负矩阵,使得传统的共识控制策略不适用,只能通过量规变换矩阵进行分析。由于不确定的非线性动力学具有不可测量的状态,未知攻击会危及双方阵控制的同步性,甚至会恶化整个系统。针对这一问题,我们采用了安全状态估计器和自适应智能状态重建技术。它不仅能同时估计和缓解对执行器和传感器的恶意未知 FDI 攻击,还能实现观测器误差的统一终极约束性(UUB)和规定时变的双方组一致性形成性能。特别是,所提出的方法克服了动力学必须是线性或一般 Lipschitz 型非线性条件的限制。最后,利用 Riccati 方程和线性矩阵不等式,通过变换矩阵构造适当的 Lyapunov,有效地证明了理论方法。数字仿真的结果可以得到有效证明。
{"title":"Adaptive Intelligent Resilient Bipartite Formation Control for Nonlinear Multiagent Systems With False Data Injection Attacks on Actuators and Sensors","authors":"Jie Lan;Hao Wang;Yan-Jun Liu;Shaocheng Tong","doi":"10.1109/TAI.2024.3418938","DOIUrl":"https://doi.org/10.1109/TAI.2024.3418938","url":null,"abstract":"An adaptive intelligent resilient distributed output bipartite time-varying formation protocol is proposed for a class of second-order uncertain nonlinear multiagent systems (MASs) with unknown attacks. Actuators and sensors are both vulnerable to unknown false data injection (FDI) attacks, and the proposed protocol does not require the removal of misbehaving agents or strong network connectivity restrictions. However, existing research methods are mainly limited to studying the complete cooperative relationship and attacks only on actuators or sensors. Network interactions are based on directed signed topologies, reflecting cooperation and competition between agents, and the corresponding adjacency matrix is no longer nonnegative, making traditional consensus controls strategy inapplicable and analyzed by gauge transformation matrix. Due to the uncertain nonlinear dynamics with unmeasurable states, unknown attacks would jeopardize the synchronization of bipartite formation control and even deteriorate entire systems. To address this issue, a security state estimator and adaptive intelligent state reconstruction technique are adopted. It not only can estimate and mitigate malicious unknown FDI attacks on both actuators and sensors simultaneously but also achieve uniform ultimate boundedness (UUB) for observer errors and prescribed time-varying bipartite group consistency formation performance. In particular, the proposed method overcomes the restriction that the dynamics must be linear or general Lipschitz-type nonlinear conditions. Finally, employing Riccati equation and linear matrix inequality, the theoretical method is validly proved by constructing proper Lyapunov through transformation matrix. The results of digital simulation can be effectively demonstrated.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142443132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editorial: AutoML for Nonstationary Data 特邀社论:用于非平稳数据的 AutoML
Pub Date : 2024-06-25 DOI: 10.1109/TAI.2024.3387583
Ran Cheng;Hugo Jair Escalante;Wei-Wei Tu;Jan N. Van Rijn;Shuo Wang;Yun Yang
The five papers in this special section address different aspects of automated machine learning (AutoML) from fundamental algorithms to real-world applications. Developing high-performance machine learning models is a difficult task that usually requires expertise from data scientists and knowledge from domain experts. To make machine learning more accessible and ease the labor-intensive trial-and-error process of searching for the most appropriate machine learning algorithm and the optimal hyperparameter setting, AutoML was developed and has become a rapidly growing area in recent years. AutoML aims at automation and efficiency of the machine learning process across domains and applications. Nowadays, data is commonly collected over time and susceptible to changes, such as in Internet-of-Things (IoT) systems, mobile phone applications and healthcare data analysis. It poses new challenges to the traditional AutoML with the assumption of data stationarity. Interesting research questions arise around whether, when and how to effectively and efficiently deal with non-stationary data in AutoML.
本专题中的五篇论文探讨了机器自动学习(AutoML)从基础算法到实际应用的不同方面。开发高性能机器学习模型是一项艰巨的任务,通常需要数据科学家的专业知识和领域专家的知识。为了使机器学习更容易获得,并减轻寻找最合适的机器学习算法和最佳超参数设置的劳动密集型试错过程,AutoML应运而生,并成为近年来迅速发展的一个领域。AutoML 旨在实现跨领域和跨应用的机器学习过程的自动化和高效化。如今,数据通常是随时间收集的,并且容易发生变化,例如在物联网(IoT)系统、手机应用和医疗数据分析中。这给以数据固定性为假设的传统 AutoML 带来了新的挑战。围绕是否、何时以及如何在 AutoML 中有效、高效地处理非静态数据,产生了一些有趣的研究问题。
{"title":"Guest Editorial: AutoML for Nonstationary Data","authors":"Ran Cheng;Hugo Jair Escalante;Wei-Wei Tu;Jan N. Van Rijn;Shuo Wang;Yun Yang","doi":"10.1109/TAI.2024.3387583","DOIUrl":"https://doi.org/10.1109/TAI.2024.3387583","url":null,"abstract":"The five papers in this special section address different aspects of automated machine learning (AutoML) from fundamental algorithms to real-world applications. Developing high-performance machine learning models is a difficult task that usually requires expertise from data scientists and knowledge from domain experts. To make machine learning more accessible and ease the labor-intensive trial-and-error process of searching for the most appropriate machine learning algorithm and the optimal hyperparameter setting, AutoML was developed and has become a rapidly growing area in recent years. AutoML aims at automation and efficiency of the machine learning process across domains and applications. Nowadays, data is commonly collected over time and susceptible to changes, such as in Internet-of-Things (IoT) systems, mobile phone applications and healthcare data analysis. It poses new challenges to the traditional AutoML with the assumption of data stationarity. Interesting research questions arise around whether, when and how to effectively and efficiently deal with non-stationary data in AutoML.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10571781","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141474817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Artificial Intelligence Publication Information IEEE Transactions on Artificial Intelligence 出版信息
Pub Date : 2024-06-25 DOI: 10.1109/TAI.2024.3408962
{"title":"IEEE Transactions on Artificial Intelligence Publication Information","authors":"","doi":"10.1109/TAI.2024.3408962","DOIUrl":"https://doi.org/10.1109/TAI.2024.3408962","url":null,"abstract":"","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10571780","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141474909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Driven Technology Applications in Planning, Demand-Side Management, and Cybersecurity for Smart Household Community 智能家居社区在规划、需求方管理和网络安全方面的数据驱动技术应用
Pub Date : 2024-06-20 DOI: 10.1109/TAI.2024.3417389
Dipanshu Naware;Arghya Mitra
The need for data-driven technologies such as artificial intelligence (AI), machine learning (ML), and deep learning (DL) in various sectors has been soaring for over a decade. The amount of data released by the smart grid itself has been enormous, making these cutting-edge technologies highly efficient and reliable. This article proposes an orderly review of data-driven technology applications for smart residential households. It underpins the importance of forecasting studies with demand-side management (DSM)-aided tools such as demand response (DR), over a secure energy transaction platform. For the publications reviewed, the outcomes suggest the urgent need for household-level forecasting as it accounts for only 21% of the publications reviewed while DL dominates the forecasting studies (57%) with scope towards its hybridization with decomposition techniques. Similarly, the DSM/DR domain needs to be actively implemented at the retail level over a secure network. The outcomes suggest that baseline prediction (4.76%) and self-learning DR (19%) are crucial but the least focused issues, hence AI/ML/DL could be the solutions. Likewise, scalability (24.3%) turns out to be the major issue for assessing the security of the utility grid. However, deep reinforcement learning (DRL) could be a suitable tool as it is adaptive, independent of the system dynamics, and works best in a model-free dynamic environment. The overall findings suggest that the smart household community is the least focused entity and needs prompt attention to address the associated challenges. Additionally, several distinct insights such as dataset features, model parameters, performance metrics, customer-centricity, customer diversity, and mitigation are mapped with applications. Besides, this article points out various shortcomings and tries to postulate probable solutions to the best of capacity.
十多年来,各行各业对人工智能(AI)、机器学习(ML)和深度学习(DL)等数据驱动型技术的需求不断飙升。智能电网本身释放的数据量巨大,使得这些前沿技术变得高效可靠。本文对智能住宅家庭的数据驱动技术应用进行了有序回顾。文章强调了通过安全的能源交易平台,利用需求侧管理(DSM)辅助工具(如需求响应(DR))进行预测研究的重要性。就所审查的出版物而言,结果表明急需进行家庭级预测,因为家庭级预测仅占所审查出版物的 21%,而 DL 在预测研究中占主导地位(57%),并有可能与分解技术混合使用。同样,DSM/DR 领域也需要通过安全网络在零售层面积极实施。研究结果表明,基线预测(4.76%)和自学灾后恢复(19%)是关键问题,但关注度最低,因此人工智能/ML/DL 可以成为解决方案。同样,可扩展性(24.3%)也是评估公用事业电网安全性的主要问题。然而,深度强化学习(DRL)可能是一个合适的工具,因为它具有自适应能力,不受系统动态的影响,并且在无模型的动态环境中效果最佳。总体研究结果表明,智能家居社区是关注度最低的实体,需要及时关注以应对相关挑战。此外,本文还对数据集特征、模型参数、性能指标、以客户为中心、客户多样性和缓解措施等方面的应用进行了深入分析。此外,本文还指出了各种不足之处,并试图提出可能的解决方案。
{"title":"Data-Driven Technology Applications in Planning, Demand-Side Management, and Cybersecurity for Smart Household Community","authors":"Dipanshu Naware;Arghya Mitra","doi":"10.1109/TAI.2024.3417389","DOIUrl":"https://doi.org/10.1109/TAI.2024.3417389","url":null,"abstract":"The need for data-driven technologies such as artificial intelligence (AI), machine learning (ML), and deep learning (DL) in various sectors has been soaring for over a decade. The amount of data released by the smart grid itself has been enormous, making these cutting-edge technologies highly efficient and reliable. This article proposes an orderly review of data-driven technology applications for smart residential households. It underpins the importance of forecasting studies with demand-side management (DSM)-aided tools such as demand response (DR), over a secure energy transaction platform. For the publications reviewed, the outcomes suggest the urgent need for household-level forecasting as it accounts for only 21% of the publications reviewed while DL dominates the forecasting studies (57%) with scope towards its hybridization with decomposition techniques. Similarly, the DSM/DR domain needs to be actively implemented at the retail level over a secure network. The outcomes suggest that baseline prediction (4.76%) and self-learning DR (19%) are crucial but the least focused issues, hence AI/ML/DL could be the solutions. Likewise, scalability (24.3%) turns out to be the major issue for assessing the security of the utility grid. However, deep reinforcement learning (DRL) could be a suitable tool as it is adaptive, independent of the system dynamics, and works best in a model-free dynamic environment. The overall findings suggest that the smart household community is the least focused entity and needs prompt attention to address the associated challenges. Additionally, several distinct insights such as dataset features, model parameters, performance metrics, customer-centricity, customer diversity, and mitigation are mapped with applications. Besides, this article points out various shortcomings and tries to postulate probable solutions to the best of capacity.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142442994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DecGAN: Decoupling Generative Adversarial Network for Detecting Abnormal Neural Circuits in Alzheimer's Disease DecGAN:用于检测阿尔茨海默病异常神经回路的解耦生成对抗网络
Pub Date : 2024-06-18 DOI: 10.1109/TAI.2024.3416420
Junren Pan;Qiankun Zuo;Bingchuan Wang;C.L. Philip Chen;Baiying Lei;Shuqiang Wang
One of the main reasons for Alzheimer's disease (AD) is the disorder of some neural circuits. Existing methods for AD prediction have achieved great success, however, detecting abnormal neural circuits from the perspective of brain networks is still a big challenge. In this work, a novel decoupling generative adversarial network (DecGAN) is proposed to detect abnormal neural circuits for AD. Concretely, a decoupling module is designed to decompose a brain network into two parts: one part is composed of a few sparse graphs that represent the neural circuits largely determining the development of AD; the other part is a supplement graph, whose influence on AD can be ignored. Furthermore, the adversarial strategy is utilized to guide the decoupling module to extract the feature more related to AD. Meanwhile, by encoding the detected neural circuits to hypergraph data, an analytic module associated with the hyperedge neurons algorithm is designed to identify the neural circuits. More importantly, a novel sparse capacity loss based on the spatial-spectral hypergraph similarity is developed to minimize the intrinsic topological distribution of neural circuits, which can significantly improve the accuracy and robustness of the proposed model. Experimental results demonstrate that the proposed model can effectively detect the abnormal neural circuits at different stages of AD, which is helpful for pathological study and early treatment.
阿尔茨海默病(AD)的主要原因之一是某些神经回路的紊乱。现有的阿尔茨海默病预测方法取得了巨大成功,但从大脑网络的角度检测异常神经回路仍是一大挑战。本研究提出了一种新型解耦生成对抗网络(DecGAN)来检测 AD 的异常神经回路。具体来说,设计了一个解耦模块,将大脑网络分解为两部分:一部分由一些稀疏图组成,这些稀疏图代表了在很大程度上决定注意力缺失症发展的神经回路;另一部分是补充图,这些补充图对注意力缺失症的影响可以忽略不计。此外,还利用对抗策略引导解耦模块提取与注意力缺失症更相关的特征。同时,通过将检测到的神经回路编码为超图数据,设计了一个与超edge 神经元算法相关的分析模块来识别神经回路。更重要的是,基于空间-光谱超图相似性开发了一种新的稀疏容量损失,以最小化神经回路的内在拓扑分布,从而显著提高了所提模型的准确性和鲁棒性。实验结果表明,所提出的模型能有效地检测出AD不同阶段的异常神经回路,有助于病理研究和早期治疗。
{"title":"DecGAN: Decoupling Generative Adversarial Network for Detecting Abnormal Neural Circuits in Alzheimer's Disease","authors":"Junren Pan;Qiankun Zuo;Bingchuan Wang;C.L. Philip Chen;Baiying Lei;Shuqiang Wang","doi":"10.1109/TAI.2024.3416420","DOIUrl":"https://doi.org/10.1109/TAI.2024.3416420","url":null,"abstract":"One of the main reasons for Alzheimer's disease (AD) is the disorder of some neural circuits. Existing methods for AD prediction have achieved great success, however, detecting abnormal neural circuits from the perspective of brain networks is still a big challenge. In this work, a novel decoupling generative adversarial network (DecGAN) is proposed to detect abnormal neural circuits for AD. Concretely, a decoupling module is designed to decompose a brain network into two parts: one part is composed of a few sparse graphs that represent the neural circuits largely determining the development of AD; the other part is a supplement graph, whose influence on AD can be ignored. Furthermore, the adversarial strategy is utilized to guide the decoupling module to extract the feature more related to AD. Meanwhile, by encoding the detected neural circuits to hypergraph data, an analytic module associated with the hyperedge neurons algorithm is designed to identify the neural circuits. More importantly, a novel sparse capacity loss based on the spatial-spectral hypergraph similarity is developed to minimize the intrinsic topological distribution of neural circuits, which can significantly improve the accuracy and robustness of the proposed model. Experimental results demonstrate that the proposed model can effectively detect the abnormal neural circuits at different stages of AD, which is helpful for pathological study and early treatment.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142443087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Decentralized Policies With Attention for Large-Scale Multiagent Environments 针对大规模多代理环境的注意力自适应分散政策
Pub Date : 2024-06-18 DOI: 10.1109/TAI.2024.3415550
Youness Boutyour;Abdellah Idrissi
Multiagent reinforcement learning (MARL) poses unique challenges in real-world applications, demanding the adaptation of reinforcement learning principles to scenarios where agents interact in dynamically changing environments. This article presents a novel approach, “decentralized policy with attention” (ADPA), designed to address these challenges in large-scale multiagent environments. ADPA leverages an attention mechanism to dynamically select relevant information for estimating critics while training decentralized policies. This enables effective and scalable learning, supporting both cooperative and competitive settings, and scenarios with nonglobal states. In this work, we conduct a comprehensive evaluation of ADPA across a range of multiagent environments, including cooperative treasure collection and rover-tower communication. We compare ADPA with existing centralized training methods and ablated variants to showcase its advantages in terms of scalability, adaptability to various environments, and robustness. Our results demonstrate that ADPA offers a promising solution for addressing the complexities of large-scale MARL, providing the flexibility to handle diverse multiagent scenarios. By combining decentralized policies with attention mechanisms, we contribute to the advancement of MARL techniques, offering a powerful tool for real-world applications in dynamic and interactive multiagent systems.
多代理强化学习(MARL)在现实世界的应用中提出了独特的挑战,要求将强化学习原理适应代理在动态变化的环境中交互的场景。本文介绍了一种新颖的方法--"带注意力的分散策略"(ADPA),旨在应对大规模多代理环境中的这些挑战。ADPA 利用注意力机制来动态选择相关信息,以便在训练分散策略时估计批评者。这就实现了有效和可扩展的学习,同时支持合作和竞争环境,以及具有非全局状态的场景。在这项工作中,我们在一系列多代理环境中对 ADPA 进行了全面评估,包括合作寻宝和漫游者-塔台通信。我们将 ADPA 与现有的集中式训练方法和消融变体进行了比较,以展示其在可扩展性、对各种环境的适应性和鲁棒性方面的优势。我们的研究结果表明,ADPA 为解决大规模 MARL 的复杂性提供了一种很有前途的解决方案,它能灵活地处理各种多代理场景。通过将分散策略与关注机制相结合,我们为 MARL 技术的进步做出了贡献,为动态交互式多代理系统的实际应用提供了一个强大的工具。
{"title":"Adaptive Decentralized Policies With Attention for Large-Scale Multiagent Environments","authors":"Youness Boutyour;Abdellah Idrissi","doi":"10.1109/TAI.2024.3415550","DOIUrl":"https://doi.org/10.1109/TAI.2024.3415550","url":null,"abstract":"Multiagent reinforcement learning (MARL) poses unique challenges in real-world applications, demanding the adaptation of reinforcement learning principles to scenarios where agents interact in dynamically changing environments. This article presents a novel approach, “decentralized policy with attention” (ADPA), designed to address these challenges in large-scale multiagent environments. ADPA leverages an attention mechanism to dynamically select relevant information for estimating critics while training decentralized policies. This enables effective and scalable learning, supporting both cooperative and competitive settings, and scenarios with nonglobal states. In this work, we conduct a comprehensive evaluation of ADPA across a range of multiagent environments, including cooperative treasure collection and rover-tower communication. We compare ADPA with existing centralized training methods and ablated variants to showcase its advantages in terms of scalability, adaptability to various environments, and robustness. Our results demonstrate that ADPA offers a promising solution for addressing the complexities of large-scale MARL, providing the flexibility to handle diverse multiagent scenarios. By combining decentralized policies with attention mechanisms, we contribute to the advancement of MARL techniques, offering a powerful tool for real-world applications in dynamic and interactive multiagent systems.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142442959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE transactions on artificial intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1