首页 > 最新文献

Machine learning and knowledge extraction最新文献

英文 中文
Android Malware Classification Based on Fuzzy Hashing Visualization 基于模糊哈希可视化的安卓恶意软件分类
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-28 DOI: 10.3390/make5040088
Horacio Rodriguez-Bazan, Grigori Sidorov, P. J. Escamilla-Ambrosio
The proliferation of Android-based devices has brought about an unprecedented surge in mobile application usage, making the Android ecosystem a prime target for cybercriminals. In this paper, a new method for Android malware classification is proposed. The method implements a convolutional neural network for malware classification using images. The research presents a novel approach to transforming the Android Application Package (APK) into a grayscale image. The image creation utilizes natural language processing techniques for text cleaning, extraction, and fuzzy hashing to represent the decompiled code from the APK in a set of hashes after preprocessing, where the image is composed of n fuzzy hashes that represent an APK. The method was tested on an Android malware dataset with 15,493 samples of five malware types. The proposed method showed an increase in accuracy compared to others in the literature, achieving up to 98.24% in the classification task.
安卓设备的普及带来了移动应用使用量的空前激增,使安卓生态系统成为网络犯罪分子的首要目标。本文提出了一种新的安卓恶意软件分类方法。该方法利用图像实施卷积神经网络进行恶意软件分类。研究提出了一种将安卓应用程序包(APK)转化为灰度图像的新方法。图像创建利用自然语言处理技术进行文本清理和提取,并利用模糊散列将 APK 的反编译代码表示为一组预处理后的散列,其中图像由表示 APK 的 n 个模糊散列组成。该方法在安卓恶意软件数据集上进行了测试,该数据集包含五种恶意软件类型的 15,493 个样本。与其他文献相比,所提出的方法提高了准确率,在分类任务中的准确率高达 98.24%。
{"title":"Android Malware Classification Based on Fuzzy Hashing Visualization","authors":"Horacio Rodriguez-Bazan, Grigori Sidorov, P. J. Escamilla-Ambrosio","doi":"10.3390/make5040088","DOIUrl":"https://doi.org/10.3390/make5040088","url":null,"abstract":"The proliferation of Android-based devices has brought about an unprecedented surge in mobile application usage, making the Android ecosystem a prime target for cybercriminals. In this paper, a new method for Android malware classification is proposed. The method implements a convolutional neural network for malware classification using images. The research presents a novel approach to transforming the Android Application Package (APK) into a grayscale image. The image creation utilizes natural language processing techniques for text cleaning, extraction, and fuzzy hashing to represent the decompiled code from the APK in a set of hashes after preprocessing, where the image is composed of n fuzzy hashes that represent an APK. The method was tested on an Android malware dataset with 15,493 samples of five malware types. The proposed method showed an increase in accuracy compared to others in the literature, achieving up to 98.24% in the classification task.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139221019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FCIoU: A Targeted Approach for Improving Minority Class Detection in Semantic Segmentation Systems FCIoU:改进语义分割系统中少数群体类别检测的针对性方法
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-23 DOI: 10.3390/make5040085
Jonathan Plangger, Mohamed Atia, H. Chaoui
In this paper, we present a comparative study of modern semantic segmentation loss functions and their resultant impact when applied with state-of-the-art off-road datasets. Class imbalance, inherent in these datasets, presents a significant challenge to off-road terrain semantic segmentation systems. With numerous environment classes being extremely sparse and underrepresented, model training becomes inefficient and struggles to comprehend the infrequent minority classes. As a solution to this problem, loss functions have been configured to take class imbalance into account and counteract this issue. To this end, we present a novel loss function, Focal Class-based Intersection over Union (FCIoU), which directly targets performance imbalance through the optimization of class-based Intersection over Union (IoU). The new loss function results in a general increase in class-based performance when compared to state-of-the-art targeted loss functions.
在本文中,我们对现代语义分割损失函数及其应用于最先进的越野数据集时产生的影响进行了比较研究。这些数据集固有的类不平衡现象给越野地形语义分割系统带来了巨大挑战。由于众多环境类别极为稀少且代表性不足,模型训练变得效率低下,难以理解不常见的少数类别。为解决这一问题,我们配置了损失函数,以考虑到类别不平衡的问题,并解决这一问题。为此,我们提出了一种新的损失函数--基于焦点类的联合交集(FCIoU),它通过优化基于类的联合交集(IoU)来直接解决性能不平衡问题。与最先进的目标损失函数相比,新损失函数能普遍提高基于类的性能。
{"title":"FCIoU: A Targeted Approach for Improving Minority Class Detection in Semantic Segmentation Systems","authors":"Jonathan Plangger, Mohamed Atia, H. Chaoui","doi":"10.3390/make5040085","DOIUrl":"https://doi.org/10.3390/make5040085","url":null,"abstract":"In this paper, we present a comparative study of modern semantic segmentation loss functions and their resultant impact when applied with state-of-the-art off-road datasets. Class imbalance, inherent in these datasets, presents a significant challenge to off-road terrain semantic segmentation systems. With numerous environment classes being extremely sparse and underrepresented, model training becomes inefficient and struggles to comprehend the infrequent minority classes. As a solution to this problem, loss functions have been configured to take class imbalance into account and counteract this issue. To this end, we present a novel loss function, Focal Class-based Intersection over Union (FCIoU), which directly targets performance imbalance through the optimization of class-based Intersection over Union (IoU). The new loss function results in a general increase in class-based performance when compared to state-of-the-art targeted loss functions.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"216 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139242762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Active Learning in the Detection of Anomalies in Cryptocurrency Transactions 加密货币交易异常检测中的主动学习
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-23 DOI: 10.3390/make5040084
Leandro L. Cunha, Miguel A. Brito, Domingos F. Oliveira, Ana P. Martins
The cryptocurrency market has grown significantly, and this quick growth has given rise to scams. It is necessary to put fraud detection mechanisms in place. The challenge of inadequate labeling is addressed in this work, which is a barrier to the training of high-performance supervised classifiers. It aims to lessen the necessity for laborious and time-consuming manual labeling. Some unlabeled data points have labels that are more pertinent and informative for the supervised model to learn from. The viability of utilizing unsupervised anomaly detection algorithms and active learning strategies to build an iterative process of acquiring labeled transactions in a cold start scenario, where there are no initial-labeled transactions, is being investigated. Investigating anomaly detection capabilities for a subset of data that maximizes supervised models’ learning potential is the goal. The anomaly detection algorithms under performed, according to the results. The findings underscore the need that anomaly detection algorithms be reserved for situations involving cold starts. As a result, using active learning techniques would produce better outcomes and supervised machine learning model performance.
加密货币市场已大幅增长,而这种快速增长催生了欺诈行为。有必要建立欺诈检测机制。标签不足是训练高性能有监督分类器的一个障碍,这项工作解决了这一难题。它旨在减少费力费时的人工标注。一些未标注的数据点具有更相关、信息量更大的标签,可供有监督模型学习。目前正在研究利用无监督异常检测算法和主动学习策略,在没有初始标签交易的冷启动场景中建立一个获取标签交易的迭代过程的可行性。目标是研究数据子集的异常检测能力,最大限度地发挥监督模型的学习潜力。结果显示,异常检测算法的性能良好。研究结果表明,异常检测算法需要专门用于涉及冷启动的情况。因此,使用主动学习技术将产生更好的结果和监督机器学习模型性能。
{"title":"Active Learning in the Detection of Anomalies in Cryptocurrency Transactions","authors":"Leandro L. Cunha, Miguel A. Brito, Domingos F. Oliveira, Ana P. Martins","doi":"10.3390/make5040084","DOIUrl":"https://doi.org/10.3390/make5040084","url":null,"abstract":"The cryptocurrency market has grown significantly, and this quick growth has given rise to scams. It is necessary to put fraud detection mechanisms in place. The challenge of inadequate labeling is addressed in this work, which is a barrier to the training of high-performance supervised classifiers. It aims to lessen the necessity for laborious and time-consuming manual labeling. Some unlabeled data points have labels that are more pertinent and informative for the supervised model to learn from. The viability of utilizing unsupervised anomaly detection algorithms and active learning strategies to build an iterative process of acquiring labeled transactions in a cold start scenario, where there are no initial-labeled transactions, is being investigated. Investigating anomaly detection capabilities for a subset of data that maximizes supervised models’ learning potential is the goal. The anomaly detection algorithms under performed, according to the results. The findings underscore the need that anomaly detection algorithms be reserved for situations involving cold starts. As a result, using active learning techniques would produce better outcomes and supervised machine learning model performance.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139245344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proximal Policy Optimization-Based Reinforcement Learning and Hybrid Approaches to Explore the Cross Array Task Optimal Solution 基于近端策略优化的强化学习和混合方法,探索交叉阵列任务的最优解
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-20 DOI: 10.3390/make5040082
Samuel Corecco, Giorgia Adorni, L. Gambardella
In an era characterised by rapid technological advancement, the application of algorithmic approaches to address complex problems has become crucial across various disciplines. Within the realm of education, there is growing recognition of the pivotal role played by computational thinking (CT). This skill set has emerged as indispensable in our ever-evolving digital landscape, accompanied by an equal need for effective methods to assess and measure these skills. This research places its focus on the Cross Array Task (CAT), an educational activity designed within the Swiss educational system to assess students’ algorithmic skills. Its primary objective is to evaluate pupils’ ability to deconstruct complex problems into manageable steps and systematically formulate sequential strategies. The CAT has proven its effectiveness as an educational tool in tracking and monitoring the development of CT skills throughout compulsory education. Additionally, this task presents an enthralling avenue for algorithmic research, owing to its inherent complexity and the necessity to scrutinise the intricate interplay between different strategies and the structural aspects of this activity. This task, deeply rooted in logical reasoning and intricate problem solving, often poses a substantial challenge for human solvers striving for optimal solutions. Consequently, the exploration of computational power to unearth optimal solutions or uncover less intuitive strategies presents a captivating and promising endeavour. This paper explores two distinct algorithmic approaches to the CAT problem. The first approach combines clustering, random search, and move selection to find optimal solutions. The second approach employs reinforcement learning techniques focusing on the Proximal Policy Optimization (PPO) model. The findings of this research hold the potential to deepen our understanding of how machines can effectively tackle complex challenges like the CAT problem but also have broad implications, particularly in educational contexts, where these approaches can be seamlessly integrated into existing tools as a tutoring mechanism, offering assistance to students encountering difficulties. This can ultimately enhance students’ CT and problem-solving abilities, leading to an enriched educational experience.
在技术飞速发展的时代,应用算法方法解决复杂问题已成为各学科的关键。在教育领域,人们越来越认识到计算思维(CT)的关键作用。在我们不断发展的数字环境中,这种技能组合已成为不可或缺的一部分,同时我们也同样需要有效的方法来评估和衡量这些技能。这项研究的重点是 "交叉阵列任务"(CAT),这是瑞士教育系统为评估学生算法技能而设计的一项教育活动。其主要目的是评估学生将复杂问题分解为易于处理的步骤并系统地制定顺序策略的能力。CAT 已被证明是一种有效的教育工具,可用于跟踪和监测整个义务教育阶段 CT 技能的发展情况。此外,这项任务由于其固有的复杂性,以及有必要仔细研究不同策略之间错综复杂的相互作用和这项活动的结构方面,为算法研究提供了一个令人着迷的途径。这项任务深深植根于逻辑推理和错综复杂的问题解决之中,往往对努力寻求最佳解决方案的人类解题者构成巨大挑战。因此,探索计算能力以发掘最佳解决方案或发掘不那么直观的策略,是一项令人着迷和充满希望的工作。本文针对 CAT 问题探索了两种不同的算法方法。第一种方法结合了聚类、随机搜索和移动选择来寻找最优解。第二种方法采用了强化学习技术,重点关注近端策略优化(PPO)模型。这项研究的发现有可能加深我们对机器如何有效解决 CAT 问题等复杂挑战的理解,同时也具有广泛的意义,特别是在教育领域,这些方法可以作为辅导机制无缝集成到现有工具中,为遇到困难的学生提供帮助。这最终可以提高学生的计算机辅助学习能力和解决问题的能力,从而丰富教育体验。
{"title":"Proximal Policy Optimization-Based Reinforcement Learning and Hybrid Approaches to Explore the Cross Array Task Optimal Solution","authors":"Samuel Corecco, Giorgia Adorni, L. Gambardella","doi":"10.3390/make5040082","DOIUrl":"https://doi.org/10.3390/make5040082","url":null,"abstract":"In an era characterised by rapid technological advancement, the application of algorithmic approaches to address complex problems has become crucial across various disciplines. Within the realm of education, there is growing recognition of the pivotal role played by computational thinking (CT). This skill set has emerged as indispensable in our ever-evolving digital landscape, accompanied by an equal need for effective methods to assess and measure these skills. This research places its focus on the Cross Array Task (CAT), an educational activity designed within the Swiss educational system to assess students’ algorithmic skills. Its primary objective is to evaluate pupils’ ability to deconstruct complex problems into manageable steps and systematically formulate sequential strategies. The CAT has proven its effectiveness as an educational tool in tracking and monitoring the development of CT skills throughout compulsory education. Additionally, this task presents an enthralling avenue for algorithmic research, owing to its inherent complexity and the necessity to scrutinise the intricate interplay between different strategies and the structural aspects of this activity. This task, deeply rooted in logical reasoning and intricate problem solving, often poses a substantial challenge for human solvers striving for optimal solutions. Consequently, the exploration of computational power to unearth optimal solutions or uncover less intuitive strategies presents a captivating and promising endeavour. This paper explores two distinct algorithmic approaches to the CAT problem. The first approach combines clustering, random search, and move selection to find optimal solutions. The second approach employs reinforcement learning techniques focusing on the Proximal Policy Optimization (PPO) model. The findings of this research hold the potential to deepen our understanding of how machines can effectively tackle complex challenges like the CAT problem but also have broad implications, particularly in educational contexts, where these approaches can be seamlessly integrated into existing tools as a tutoring mechanism, offering assistance to students encountering difficulties. This can ultimately enhance students’ CT and problem-solving abilities, leading to an enriched educational experience.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"41 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139258498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Review of YOLO Architectures in Computer Vision: From YOLOv1 to YOLOv8 and YOLO-NAS 全面回顾计算机视觉中的 YOLO 架构:从 YOLOv1 到 YOLOv8 和 YOLO-NAS
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-20 DOI: 10.3390/make5040083
Juan R. Terven, Diana-Margarita Córdova-Esparza, J. Romero-González
YOLO has become a central real-time object detection system for robotics, driverless cars, and video monitoring applications. We present a comprehensive analysis of YOLO’s evolution, examining the innovations and contributions in each iteration from the original YOLO up to YOLOv8, YOLO-NAS, and YOLO with transformers. We start by describing the standard metrics and postprocessing; then, we discuss the major changes in network architecture and training tricks for each model. Finally, we summarize the essential lessons from YOLO’s development and provide a perspective on its future, highlighting potential research directions to enhance real-time object detection systems.
YOLO 已成为机器人、无人驾驶汽车和视频监控应用的核心实时物体检测系统。我们对 YOLO 的演变进行了全面分析,研究了从最初的 YOLO 到 YOLOv8、YOLO-NAS 和 YOLO with transformers 的每次迭代中的创新和贡献。我们首先介绍了标准指标和后处理方法,然后讨论了每个模型在网络架构和训练技巧方面的主要变化。最后,我们总结了 YOLO 开发过程中的基本经验,并展望了 YOLO 的未来,强调了增强实时目标检测系统的潜在研究方向。
{"title":"A Comprehensive Review of YOLO Architectures in Computer Vision: From YOLOv1 to YOLOv8 and YOLO-NAS","authors":"Juan R. Terven, Diana-Margarita Córdova-Esparza, J. Romero-González","doi":"10.3390/make5040083","DOIUrl":"https://doi.org/10.3390/make5040083","url":null,"abstract":"YOLO has become a central real-time object detection system for robotics, driverless cars, and video monitoring applications. We present a comprehensive analysis of YOLO’s evolution, examining the innovations and contributions in each iteration from the original YOLO up to YOLOv8, YOLO-NAS, and YOLO with transformers. We start by describing the standard metrics and postprocessing; then, we discuss the major changes in network architecture and training tricks for each model. Finally, we summarize the essential lessons from YOLO’s development and provide a perspective on its future, highlighting potential research directions to enhance real-time object detection systems.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"65 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139259115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Pose Estimation Using Deep Learning: A Systematic Literature Review 使用深度学习的人体姿势估计:系统的文献综述
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-13 DOI: 10.3390/make5040081
Esraa Samkari, Muhammad Arif, Manal Alghamdi, Mohammed A. Al Ghamdi
Human Pose Estimation (HPE) is the task that aims to predict the location of human joints from images and videos. This task is used in many applications, such as sports analysis and surveillance systems. Recently, several studies have embraced deep learning to enhance the performance of HPE tasks. However, building an efficient HPE model is difficult; many challenges, like crowded scenes and occlusion, must be handled. This paper followed a systematic procedure to review different HPE models comprehensively. About 100 articles published since 2014 on HPE using deep learning were selected using several selection criteria. Both image and video data types of methods were investigated. Furthermore, both single and multiple HPE methods were reviewed. In addition, the available datasets, different loss functions used in HPE, and pretrained feature extraction models were all covered. Our analysis revealed that Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) are the most used in HPE. Moreover, occlusion and crowd scenes remain the main problems affecting models’ performance. Therefore, the paper presented various solutions to address these issues. Finally, this paper highlighted the potential opportunities for future work in this task.
人体姿态估计(HPE)是一项旨在从图像和视频中预测人体关节位置的任务。这项任务用于许多应用程序,例如运动分析和监视系统。最近,一些研究已经采用深度学习来提高HPE任务的性能。然而,建立一个高效的HPE模型是困难的;许多挑战,如拥挤的场景和遮挡,必须处理。本文采用系统的程序对不同的HPE模型进行了全面的综述。自2014年以来,在HPE上发表的大约100篇使用深度学习的文章通过几个选择标准被选中。对图像和视频数据类型的方法进行了研究。此外,还对单一和多种HPE方法进行了综述。此外,还涵盖了可用的数据集、HPE中使用的不同损失函数以及预训练的特征提取模型。我们的分析表明,卷积神经网络(cnn)和循环神经网络(RNNs)在HPE中使用最多。此外,遮挡和人群场景仍然是影响模型性能的主要问题。因此,本文提出了解决这些问题的各种解决方案。最后,本文强调了该任务未来工作的潜在机会。
{"title":"Human Pose Estimation Using Deep Learning: A Systematic Literature Review","authors":"Esraa Samkari, Muhammad Arif, Manal Alghamdi, Mohammed A. Al Ghamdi","doi":"10.3390/make5040081","DOIUrl":"https://doi.org/10.3390/make5040081","url":null,"abstract":"Human Pose Estimation (HPE) is the task that aims to predict the location of human joints from images and videos. This task is used in many applications, such as sports analysis and surveillance systems. Recently, several studies have embraced deep learning to enhance the performance of HPE tasks. However, building an efficient HPE model is difficult; many challenges, like crowded scenes and occlusion, must be handled. This paper followed a systematic procedure to review different HPE models comprehensively. About 100 articles published since 2014 on HPE using deep learning were selected using several selection criteria. Both image and video data types of methods were investigated. Furthermore, both single and multiple HPE methods were reviewed. In addition, the available datasets, different loss functions used in HPE, and pretrained feature extraction models were all covered. Our analysis revealed that Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) are the most used in HPE. Moreover, occlusion and crowd scenes remain the main problems affecting models’ performance. Therefore, the paper presented various solutions to address these issues. Finally, this paper highlighted the potential opportunities for future work in this task.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"53 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconstruction-Based Adversarial Attack Detection in Vision-Based Autonomous Driving Systems 基于视觉的自动驾驶系统中基于重构的对抗攻击检测
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-07 DOI: 10.3390/make5040080
Manzoor Hussain, Jang-Eui Hong
The perception system is a safety-critical component that directly impacts the overall safety of autonomous driving systems (ADSs). It is imperative to ensure the robustness of the deep-learning model used in the perception system. However, studies have shown that these models are highly vulnerable to the adversarial perturbation of input data. The existing works mainly focused on studying the impact of these adversarial attacks on classification rather than regression models. Therefore, this paper first introduces two generalized methods for perturbation-based attacks: (1) We used naturally occurring noises to create perturbations in the input data. (2) We introduce a modified square, HopSkipJump, and decision-based/boundary attack to attack the regression models used in ADSs. Then, we propose a deep-autoencoder-based adversarial attack detector. In addition to offline evaluation metrics (e.g., F1 score and precision, etc.), we introduce an online evaluation framework to evaluate the robustness of the model under attack. The framework considers the reconstruction loss of the deep autoencoder that validates the robustness of the models under attack in an end-to-end fashion at runtime. Our experimental results showed that the proposed adversarial attack detector could detect square, HopSkipJump, and decision-based/boundary attacks with a true positive rate (TPR) of 93%.
感知系统是直接影响自动驾驶系统(ads)整体安全性的安全关键部件。在感知系统中,必须保证深度学习模型的鲁棒性。然而,研究表明,这些模型极易受到输入数据的对抗性扰动的影响。现有的工作主要集中在研究这些对抗性攻击对分类的影响,而不是回归模型。因此,本文首先介绍了两种基于扰动攻击的广义方法:(1)我们使用自然产生的噪声在输入数据中产生扰动。(2)引入改进的方形算法HopSkipJump和基于决策/边界攻击来攻击ads中使用的回归模型。然后,我们提出了一种基于深度自编码器的对抗性攻击检测器。除了离线评估指标(例如F1分数和精度等)外,我们还引入了一个在线评估框架来评估受攻击模型的鲁棒性。该框架考虑了深度自编码器的重建损失,在运行时以端到端方式验证受攻击模型的鲁棒性。实验结果表明,所提出的对抗性攻击检测器可以检测到正方形攻击、HopSkipJump攻击和基于决策/边界攻击,其真阳性率(TPR)为93%。
{"title":"Reconstruction-Based Adversarial Attack Detection in Vision-Based Autonomous Driving Systems","authors":"Manzoor Hussain, Jang-Eui Hong","doi":"10.3390/make5040080","DOIUrl":"https://doi.org/10.3390/make5040080","url":null,"abstract":"The perception system is a safety-critical component that directly impacts the overall safety of autonomous driving systems (ADSs). It is imperative to ensure the robustness of the deep-learning model used in the perception system. However, studies have shown that these models are highly vulnerable to the adversarial perturbation of input data. The existing works mainly focused on studying the impact of these adversarial attacks on classification rather than regression models. Therefore, this paper first introduces two generalized methods for perturbation-based attacks: (1) We used naturally occurring noises to create perturbations in the input data. (2) We introduce a modified square, HopSkipJump, and decision-based/boundary attack to attack the regression models used in ADSs. Then, we propose a deep-autoencoder-based adversarial attack detector. In addition to offline evaluation metrics (e.g., F1 score and precision, etc.), we introduce an online evaluation framework to evaluate the robustness of the model under attack. The framework considers the reconstruction loss of the deep autoencoder that validates the robustness of the models under attack in an end-to-end fashion at runtime. Our experimental results showed that the proposed adversarial attack detector could detect square, HopSkipJump, and decision-based/boundary attacks with a true positive rate (TPR) of 93%.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"41 167","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135540006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explainable Stacked Ensemble Deep Learning (SEDL) Framework to Determine Cause of Death from Verbal Autopsies 可解释的堆叠集成深度学习(SEDL)框架,以确定死因的口头解剖
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-10-25 DOI: 10.3390/make5040079
Michael T. Mapundu, Chodziwadziwa W. Kabudula, Eustasius Musenge, Victor Olago, Turgay Celik
Verbal autopsies (VA) are commonly used in Low- and Medium-Income Countries (LMIC) to determine cause of death (CoD) where death occurs outside clinical settings, with the most commonly used international gold standard being physician medical certification. Interviewers elicit information from relatives of the deceased, regarding circumstances and events that might have led to death. This information is stored in textual format as VA narratives. The narratives entail detailed information that can be used to determine CoD. However, this approach still remains a manual task that is costly, inconsistent, time-consuming and subjective (prone to errors), amongst many drawbacks. As such, this negatively affects the VA reporting process, despite it being vital for strengthening health priorities and informing civil registration systems. Therefore, this study seeks to close this gap by applying novel deep learning (DL) interpretable approaches for reviewing VA narratives and generate CoD prediction in a timely, easily interpretable, cost-effective and error-free way. We validate our DL models using optimisation and performance accuracy machine learning (ML) curves as a function of training samples. We report on validation with training set accuracy (LSTM = 76.11%, CNN = 76.35%, and SEDL = 82.1%), validation accuracy (LSTM = 67.05%, CNN = 66.16%, and SEDL = 82%) and test set accuracy (LSTM = 67%, CNN = 66.2%, and SEDL = 82%) for our models. Furthermore, we also present Local Interpretable Model-agnostic Explanations (LIME) for ease of interpretability of the results, thereby building trust in the use of machines in healthcare. We presented robust deep learning methods to determine CoD from VAs, with the stacked ensemble deep learning (SEDL) approaches performing optimally and better than Long Short-Term Memory (LSTM) and Convolutional Neural Network (CNN). Our empirical results suggest that ensemble DL methods may be integrated in the CoD process to help experts get to a diagnosis. Ultimately, this will reduce the turnaround time needed by physicians to go through the narratives in order to be able to give an appropriate diagnosis, cut costs and minimise errors. This study was limited by the number of samples needed for training our models and the high levels of lexical variability in the words used in our textual information.
在低收入和中等收入国家(LMIC),当死亡发生在临床环境之外时,尸检通常用于确定死因(CoD),最常用的国际黄金标准是医师医疗证明。采访者从死者亲属处获取有关可能导致死亡的情况和事件的信息。这些信息以文本格式存储为VA叙述。这些叙述包含了可以用来确定死亡日期的详细信息。然而,这种方法仍然是一项手工任务,成本高、不一致、耗时且主观(容易出错),还有许多缺点。因此,这对VA报告程序产生了负面影响,尽管它对于加强卫生重点和告知民事登记系统至关重要。因此,本研究试图通过应用新颖的深度学习(DL)可解释方法来审查VA叙述,并以及时、易于解释、经济高效且无错误的方式生成CoD预测,从而缩小这一差距。我们使用优化和性能精度机器学习(ML)曲线作为训练样本的函数来验证我们的DL模型。我们报告了我们模型的训练集准确度(LSTM = 76.11%, CNN = 76.35%, SEDL = 82.1%),验证准确度(LSTM = 67.05%, CNN = 66.16%, SEDL = 82%)和测试集准确度(LSTM = 67%, CNN = 66.2%, SEDL = 82%)的验证。此外,我们还提出了局部可解释模型不可知论解释(LIME),以便于结果的可解释性,从而建立对医疗保健中机器使用的信任。我们提出了鲁棒深度学习方法来从VAs中确定CoD,其中堆叠集成深度学习(SEDL)方法表现最佳,优于长短期记忆(LSTM)和卷积神经网络(CNN)。我们的实证结果表明,集成深度学习方法可以集成在CoD过程中,以帮助专家得到诊断。最终,这将减少医生为了能够给出适当的诊断、降低成本和减少错误而需要的周转时间。这项研究受到训练我们的模型所需的样本数量和文本信息中使用的单词的高水平词汇可变性的限制。
{"title":"Explainable Stacked Ensemble Deep Learning (SEDL) Framework to Determine Cause of Death from Verbal Autopsies","authors":"Michael T. Mapundu, Chodziwadziwa W. Kabudula, Eustasius Musenge, Victor Olago, Turgay Celik","doi":"10.3390/make5040079","DOIUrl":"https://doi.org/10.3390/make5040079","url":null,"abstract":"Verbal autopsies (VA) are commonly used in Low- and Medium-Income Countries (LMIC) to determine cause of death (CoD) where death occurs outside clinical settings, with the most commonly used international gold standard being physician medical certification. Interviewers elicit information from relatives of the deceased, regarding circumstances and events that might have led to death. This information is stored in textual format as VA narratives. The narratives entail detailed information that can be used to determine CoD. However, this approach still remains a manual task that is costly, inconsistent, time-consuming and subjective (prone to errors), amongst many drawbacks. As such, this negatively affects the VA reporting process, despite it being vital for strengthening health priorities and informing civil registration systems. Therefore, this study seeks to close this gap by applying novel deep learning (DL) interpretable approaches for reviewing VA narratives and generate CoD prediction in a timely, easily interpretable, cost-effective and error-free way. We validate our DL models using optimisation and performance accuracy machine learning (ML) curves as a function of training samples. We report on validation with training set accuracy (LSTM = 76.11%, CNN = 76.35%, and SEDL = 82.1%), validation accuracy (LSTM = 67.05%, CNN = 66.16%, and SEDL = 82%) and test set accuracy (LSTM = 67%, CNN = 66.2%, and SEDL = 82%) for our models. Furthermore, we also present Local Interpretable Model-agnostic Explanations (LIME) for ease of interpretability of the results, thereby building trust in the use of machines in healthcare. We presented robust deep learning methods to determine CoD from VAs, with the stacked ensemble deep learning (SEDL) approaches performing optimally and better than Long Short-Term Memory (LSTM) and Convolutional Neural Network (CNN). Our empirical results suggest that ensemble DL methods may be integrated in the CoD process to help experts get to a diagnosis. Ultimately, this will reduce the turnaround time needed by physicians to go through the narratives in order to be able to give an appropriate diagnosis, cut costs and minimise errors. This study was limited by the number of samples needed for training our models and the high levels of lexical variability in the words used in our textual information.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"64 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135168714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Role of Machine Learning in Defense Applications and Industry 评估机器学习在国防应用和工业中的作用
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-10-22 DOI: 10.3390/make5040078
Evaldo Jorge Alcántara Suárez, Victor Monzon Baeza
Machine learning (ML) has become a critical technology in the defense sector, enabling the development of advanced systems for threat detection, decision making, and autonomous operations. However, the increasing ML use in defense systems has raised ethical concerns related to accountability, transparency, and bias. In this paper, we provide a comprehensive analysis of the impact of ML on the defense sector, including the benefits and drawbacks of using ML in various applications such as surveillance, target identification, and autonomous weapons systems. We also discuss the ethical implications of using ML in defense, focusing on privacy, accountability, and bias issues. Finally, we present recommendations for mitigating these ethical concerns, including increased transparency, accountability, and stakeholder involvement in designing and deploying ML systems in the defense sector.
机器学习(ML)已经成为国防领域的一项关键技术,可以开发用于威胁检测、决策和自主操作的先进系统。然而,越来越多的机器学习在国防系统中的应用引发了与问责制、透明度和偏见相关的伦理问题。在本文中,我们全面分析了机器学习对国防部门的影响,包括在监视、目标识别和自主武器系统等各种应用中使用机器学习的优点和缺点。我们还讨论了在防御中使用ML的伦理影响,重点是隐私、问责制和偏见问题。最后,我们提出了减轻这些道德问题的建议,包括在国防部门设计和部署ML系统时增加透明度、问责制和利益相关者的参与。
{"title":"Evaluating the Role of Machine Learning in Defense Applications and Industry","authors":"Evaldo Jorge Alcántara Suárez, Victor Monzon Baeza","doi":"10.3390/make5040078","DOIUrl":"https://doi.org/10.3390/make5040078","url":null,"abstract":"Machine learning (ML) has become a critical technology in the defense sector, enabling the development of advanced systems for threat detection, decision making, and autonomous operations. However, the increasing ML use in defense systems has raised ethical concerns related to accountability, transparency, and bias. In this paper, we provide a comprehensive analysis of the impact of ML on the defense sector, including the benefits and drawbacks of using ML in various applications such as surveillance, target identification, and autonomous weapons systems. We also discuss the ethical implications of using ML in defense, focusing on privacy, accountability, and bias issues. Finally, we present recommendations for mitigating these ethical concerns, including increased transparency, accountability, and stakeholder involvement in designing and deploying ML systems in the defense sector.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"26 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135461716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Electrocardiogram (ECG) Analysis of Implantable Cardiac Monitor Data: An Efficient Pipeline for Multi-Label Classification 增强对可植入心脏监护仪数据的心电图分析:一种高效的多标签分类方法
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-10-21 DOI: 10.3390/make5040077
Amnon Bleich, Antje Linnemann, Benjamin Jaidi, Björn H. Diem, Tim O. F. Conrad
Implantable Cardiac Monitor (ICM) devices are demonstrating, as of today, the fastest-growing market for implantable cardiac devices. As such, they are becoming increasingly common in patients for measuring heart electrical activity. ICMs constantly monitor and record a patient’s heart rhythm, and when triggered, send it to a secure server where health care professionals (HCPs) can review it. These devices employ a relatively simplistic rule-based algorithm (due to energy consumption constraints) to make alerts for abnormal heart rhythms. This algorithm is usually parameterized to an over-sensitive mode in order to not miss a case (resulting in a relatively high false-positive rate), and this, combined with the device’s nature of constantly monitoring the heart rhythm and its growing popularity, results in HCPs having to analyze and diagnose an increasingly growing number of data. In order to reduce the load on the latter, automated methods for ECG analysis are nowadays becoming a great tool to assist HCPs in their analysis. While state-of-the-art algorithms are data-driven rather than rule-based, training data for ICMs often consist of specific characteristics that make their analysis unique and particularly challenging. This study presents the challenges and solutions in automatically analyzing ICM data and introduces a method for its classification that outperforms existing methods on such data. It carries this out by combining high-frequency noise detection (which often occurs in ICM data) with a semi-supervised learning pipeline that allows for the re-labeling of training episodes and by using segmentation and dimension-reduction techniques that are robust to morphology variations of the sECG signal (which are typical to ICM data). As a result, it performs better than state-of-the-art techniques on such data with, e.g., an F1 score of 0.51 vs. 0.38 of our baseline state-of-the-art technique in correctly calling atrial fibrillation in ICM data. As such, it could be used in numerous ways, such as aiding HCPs in the analysis of ECGs originating from ICMs by, e.g., suggesting a rhythm type.
植入式心脏监测器(ICM)设备是目前增长最快的植入式心脏设备市场。正因为如此,它们在患者中测量心脏电活动变得越来越普遍。icm不断监测和记录患者的心律,当触发时,将其发送到安全的服务器,供医疗保健专业人员(hcp)查看。这些设备采用相对简单的基于规则的算法(由于能量消耗限制)来发出异常心律警报。该算法通常被参数化为过度敏感模式,以避免漏诊(导致相对较高的假阳性率),再加上该设备不断监测心律的性质及其日益普及,导致HCPs不得不分析和诊断越来越多的数据。为了减轻后者的负担,自动化的心电分析方法如今已成为辅助医护人员进行分析的重要工具。虽然最先进的算法是数据驱动的,而不是基于规则的,但icm的训练数据通常包含特定的特征,这使得它们的分析独特且特别具有挑战性。本研究提出了自动分析ICM数据的挑战和解决方案,并介绍了一种优于现有方法的ICM数据分类方法。它通过将高频噪声检测(通常发生在ICM数据中)与半监督学习管道相结合来实现这一目标,该管道允许重新标记训练集,并通过使用分割和降维技术,这些技术对sECG信号的形态变化(这是ICM数据的典型特征)具有鲁棒性。因此,在这些数据上,它比最先进的技术表现得更好,例如,在正确调用ICM数据中的心房颤动方面,F1得分为0.51,而我们的基线最先进技术为0.38。因此,它可以在许多方面使用,例如,通过提示心律类型,帮助HCPs分析源自ICMs的心电图。
{"title":"Enhancing Electrocardiogram (ECG) Analysis of Implantable Cardiac Monitor Data: An Efficient Pipeline for Multi-Label Classification","authors":"Amnon Bleich, Antje Linnemann, Benjamin Jaidi, Björn H. Diem, Tim O. F. Conrad","doi":"10.3390/make5040077","DOIUrl":"https://doi.org/10.3390/make5040077","url":null,"abstract":"Implantable Cardiac Monitor (ICM) devices are demonstrating, as of today, the fastest-growing market for implantable cardiac devices. As such, they are becoming increasingly common in patients for measuring heart electrical activity. ICMs constantly monitor and record a patient’s heart rhythm, and when triggered, send it to a secure server where health care professionals (HCPs) can review it. These devices employ a relatively simplistic rule-based algorithm (due to energy consumption constraints) to make alerts for abnormal heart rhythms. This algorithm is usually parameterized to an over-sensitive mode in order to not miss a case (resulting in a relatively high false-positive rate), and this, combined with the device’s nature of constantly monitoring the heart rhythm and its growing popularity, results in HCPs having to analyze and diagnose an increasingly growing number of data. In order to reduce the load on the latter, automated methods for ECG analysis are nowadays becoming a great tool to assist HCPs in their analysis. While state-of-the-art algorithms are data-driven rather than rule-based, training data for ICMs often consist of specific characteristics that make their analysis unique and particularly challenging. This study presents the challenges and solutions in automatically analyzing ICM data and introduces a method for its classification that outperforms existing methods on such data. It carries this out by combining high-frequency noise detection (which often occurs in ICM data) with a semi-supervised learning pipeline that allows for the re-labeling of training episodes and by using segmentation and dimension-reduction techniques that are robust to morphology variations of the sECG signal (which are typical to ICM data). As a result, it performs better than state-of-the-art techniques on such data with, e.g., an F1 score of 0.51 vs. 0.38 of our baseline state-of-the-art technique in correctly calling atrial fibrillation in ICM data. As such, it could be used in numerous ways, such as aiding HCPs in the analysis of ECGs originating from ICMs by, e.g., suggesting a rhythm type.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135510732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Machine learning and knowledge extraction
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1