首页 > 最新文献

Machine learning and knowledge extraction最新文献

英文 中文
Bayesian Network Structural Learning Using Adaptive Genetic Algorithm with Varying Population Size 利用种群规模变化的自适应遗传算法进行贝叶斯网络结构学习
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-12-01 DOI: 10.3390/make5040090
Rafael Rodrigues Mendes Ribeiro, Carlos Dias Maciel
A Bayesian network (BN) is a probabilistic graphical model that can model complex and nonlinear relationships. Its structural learning from data is an NP-hard problem because of its search-space size. One method to perform structural learning is a search and score approach, which uses a search algorithm and structural score. A study comparing 15 algorithms showed that hill climbing (HC) and tabu search (TABU) performed the best overall on the tests. This work performs a deeper analysis of the application of the adaptive genetic algorithm with varying population size (AGAVaPS) on the BN structural learning problem, which a preliminary test showed that it had the potential to perform well on. AGAVaPS is a genetic algorithm that uses the concept of life, where each solution is in the population for a number of iterations. Each individual also has its own mutation rate, and there is a small probability of undergoing mutation twice. Parameter analysis of AGAVaPS in BN structural leaning was performed. Also, AGAVaPS was compared to HC and TABU for six literature datasets considering F1 score, structural Hamming distance (SHD), balanced scoring function (BSF), Bayesian information criterion (BIC), and execution time. HC and TABU performed basically the same for all the tests made. AGAVaPS performed better than the other algorithms for F1 score, SHD, and BIC, showing that it can perform well and is a good choice for BN structural learning.
贝叶斯网络(BN)是一种概率图模型,可以对复杂的非线性关系进行建模。由于其搜索空间的大小,它从数据中进行结构化学习是一个np困难问题。执行结构学习的一种方法是搜索和评分方法,它使用搜索算法和结构评分。一项比较15种算法的研究表明,爬坡(HC)和禁忌搜索(tabu)在测试中的总体表现最好。本文对变种群大小自适应遗传算法(AGAVaPS)在BN结构学习问题上的应用进行了更深入的分析,初步测试表明该算法在该问题上具有良好的表现潜力。AGAVaPS是一种使用生命概念的遗传算法,其中每个解决方案都在种群中进行多次迭代。每个个体也有自己的突变率,经历两次突变的概率很小。对AGAVaPS在BN结构学习中的参数进行了分析。同时,考虑F1评分、结构汉明距离(SHD)、平衡评分函数(BSF)、贝叶斯信息准则(BIC)和执行时间,将AGAVaPS与HC和TABU在6个文献数据集上进行比较。HC和TABU在所有测试中的表现基本相同。AGAVaPS在F1分数、SHD和BIC方面的表现都优于其他算法,表明AGAVaPS具有良好的性能,是BN结构学习的良好选择。
{"title":"Bayesian Network Structural Learning Using Adaptive Genetic Algorithm with Varying Population Size","authors":"Rafael Rodrigues Mendes Ribeiro, Carlos Dias Maciel","doi":"10.3390/make5040090","DOIUrl":"https://doi.org/10.3390/make5040090","url":null,"abstract":"A Bayesian network (BN) is a probabilistic graphical model that can model complex and nonlinear relationships. Its structural learning from data is an NP-hard problem because of its search-space size. One method to perform structural learning is a search and score approach, which uses a search algorithm and structural score. A study comparing 15 algorithms showed that hill climbing (HC) and tabu search (TABU) performed the best overall on the tests. This work performs a deeper analysis of the application of the adaptive genetic algorithm with varying population size (AGAVaPS) on the BN structural learning problem, which a preliminary test showed that it had the potential to perform well on. AGAVaPS is a genetic algorithm that uses the concept of life, where each solution is in the population for a number of iterations. Each individual also has its own mutation rate, and there is a small probability of undergoing mutation twice. Parameter analysis of AGAVaPS in BN structural leaning was performed. Also, AGAVaPS was compared to HC and TABU for six literature datasets considering F1 score, structural Hamming distance (SHD), balanced scoring function (BSF), Bayesian information criterion (BIC), and execution time. HC and TABU performed basically the same for all the tests made. AGAVaPS performed better than the other algorithms for F1 score, SHD, and BIC, showing that it can perform well and is a good choice for BN structural learning.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"6 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138624618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android Malware Classification Based on Fuzzy Hashing Visualization 基于模糊哈希可视化的安卓恶意软件分类
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-28 DOI: 10.3390/make5040088
Horacio Rodriguez-Bazan, Grigori Sidorov, P. J. Escamilla-Ambrosio
The proliferation of Android-based devices has brought about an unprecedented surge in mobile application usage, making the Android ecosystem a prime target for cybercriminals. In this paper, a new method for Android malware classification is proposed. The method implements a convolutional neural network for malware classification using images. The research presents a novel approach to transforming the Android Application Package (APK) into a grayscale image. The image creation utilizes natural language processing techniques for text cleaning, extraction, and fuzzy hashing to represent the decompiled code from the APK in a set of hashes after preprocessing, where the image is composed of n fuzzy hashes that represent an APK. The method was tested on an Android malware dataset with 15,493 samples of five malware types. The proposed method showed an increase in accuracy compared to others in the literature, achieving up to 98.24% in the classification task.
安卓设备的普及带来了移动应用使用量的空前激增,使安卓生态系统成为网络犯罪分子的首要目标。本文提出了一种新的安卓恶意软件分类方法。该方法利用图像实施卷积神经网络进行恶意软件分类。研究提出了一种将安卓应用程序包(APK)转化为灰度图像的新方法。图像创建利用自然语言处理技术进行文本清理和提取,并利用模糊散列将 APK 的反编译代码表示为一组预处理后的散列,其中图像由表示 APK 的 n 个模糊散列组成。该方法在安卓恶意软件数据集上进行了测试,该数据集包含五种恶意软件类型的 15,493 个样本。与其他文献相比,所提出的方法提高了准确率,在分类任务中的准确率高达 98.24%。
{"title":"Android Malware Classification Based on Fuzzy Hashing Visualization","authors":"Horacio Rodriguez-Bazan, Grigori Sidorov, P. J. Escamilla-Ambrosio","doi":"10.3390/make5040088","DOIUrl":"https://doi.org/10.3390/make5040088","url":null,"abstract":"The proliferation of Android-based devices has brought about an unprecedented surge in mobile application usage, making the Android ecosystem a prime target for cybercriminals. In this paper, a new method for Android malware classification is proposed. The method implements a convolutional neural network for malware classification using images. The research presents a novel approach to transforming the Android Application Package (APK) into a grayscale image. The image creation utilizes natural language processing techniques for text cleaning, extraction, and fuzzy hashing to represent the decompiled code from the APK in a set of hashes after preprocessing, where the image is composed of n fuzzy hashes that represent an APK. The method was tested on an Android malware dataset with 15,493 samples of five malware types. The proposed method showed an increase in accuracy compared to others in the literature, achieving up to 98.24% in the classification task.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139221019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FCIoU: A Targeted Approach for Improving Minority Class Detection in Semantic Segmentation Systems FCIoU:改进语义分割系统中少数群体类别检测的针对性方法
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-23 DOI: 10.3390/make5040085
Jonathan Plangger, Mohamed Atia, H. Chaoui
In this paper, we present a comparative study of modern semantic segmentation loss functions and their resultant impact when applied with state-of-the-art off-road datasets. Class imbalance, inherent in these datasets, presents a significant challenge to off-road terrain semantic segmentation systems. With numerous environment classes being extremely sparse and underrepresented, model training becomes inefficient and struggles to comprehend the infrequent minority classes. As a solution to this problem, loss functions have been configured to take class imbalance into account and counteract this issue. To this end, we present a novel loss function, Focal Class-based Intersection over Union (FCIoU), which directly targets performance imbalance through the optimization of class-based Intersection over Union (IoU). The new loss function results in a general increase in class-based performance when compared to state-of-the-art targeted loss functions.
在本文中,我们对现代语义分割损失函数及其应用于最先进的越野数据集时产生的影响进行了比较研究。这些数据集固有的类不平衡现象给越野地形语义分割系统带来了巨大挑战。由于众多环境类别极为稀少且代表性不足,模型训练变得效率低下,难以理解不常见的少数类别。为解决这一问题,我们配置了损失函数,以考虑到类别不平衡的问题,并解决这一问题。为此,我们提出了一种新的损失函数--基于焦点类的联合交集(FCIoU),它通过优化基于类的联合交集(IoU)来直接解决性能不平衡问题。与最先进的目标损失函数相比,新损失函数能普遍提高基于类的性能。
{"title":"FCIoU: A Targeted Approach for Improving Minority Class Detection in Semantic Segmentation Systems","authors":"Jonathan Plangger, Mohamed Atia, H. Chaoui","doi":"10.3390/make5040085","DOIUrl":"https://doi.org/10.3390/make5040085","url":null,"abstract":"In this paper, we present a comparative study of modern semantic segmentation loss functions and their resultant impact when applied with state-of-the-art off-road datasets. Class imbalance, inherent in these datasets, presents a significant challenge to off-road terrain semantic segmentation systems. With numerous environment classes being extremely sparse and underrepresented, model training becomes inefficient and struggles to comprehend the infrequent minority classes. As a solution to this problem, loss functions have been configured to take class imbalance into account and counteract this issue. To this end, we present a novel loss function, Focal Class-based Intersection over Union (FCIoU), which directly targets performance imbalance through the optimization of class-based Intersection over Union (IoU). The new loss function results in a general increase in class-based performance when compared to state-of-the-art targeted loss functions.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"216 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139242762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Active Learning in the Detection of Anomalies in Cryptocurrency Transactions 加密货币交易异常检测中的主动学习
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-23 DOI: 10.3390/make5040084
Leandro L. Cunha, Miguel A. Brito, Domingos F. Oliveira, Ana P. Martins
The cryptocurrency market has grown significantly, and this quick growth has given rise to scams. It is necessary to put fraud detection mechanisms in place. The challenge of inadequate labeling is addressed in this work, which is a barrier to the training of high-performance supervised classifiers. It aims to lessen the necessity for laborious and time-consuming manual labeling. Some unlabeled data points have labels that are more pertinent and informative for the supervised model to learn from. The viability of utilizing unsupervised anomaly detection algorithms and active learning strategies to build an iterative process of acquiring labeled transactions in a cold start scenario, where there are no initial-labeled transactions, is being investigated. Investigating anomaly detection capabilities for a subset of data that maximizes supervised models’ learning potential is the goal. The anomaly detection algorithms under performed, according to the results. The findings underscore the need that anomaly detection algorithms be reserved for situations involving cold starts. As a result, using active learning techniques would produce better outcomes and supervised machine learning model performance.
加密货币市场已大幅增长,而这种快速增长催生了欺诈行为。有必要建立欺诈检测机制。标签不足是训练高性能有监督分类器的一个障碍,这项工作解决了这一难题。它旨在减少费力费时的人工标注。一些未标注的数据点具有更相关、信息量更大的标签,可供有监督模型学习。目前正在研究利用无监督异常检测算法和主动学习策略,在没有初始标签交易的冷启动场景中建立一个获取标签交易的迭代过程的可行性。目标是研究数据子集的异常检测能力,最大限度地发挥监督模型的学习潜力。结果显示,异常检测算法的性能良好。研究结果表明,异常检测算法需要专门用于涉及冷启动的情况。因此,使用主动学习技术将产生更好的结果和监督机器学习模型性能。
{"title":"Active Learning in the Detection of Anomalies in Cryptocurrency Transactions","authors":"Leandro L. Cunha, Miguel A. Brito, Domingos F. Oliveira, Ana P. Martins","doi":"10.3390/make5040084","DOIUrl":"https://doi.org/10.3390/make5040084","url":null,"abstract":"The cryptocurrency market has grown significantly, and this quick growth has given rise to scams. It is necessary to put fraud detection mechanisms in place. The challenge of inadequate labeling is addressed in this work, which is a barrier to the training of high-performance supervised classifiers. It aims to lessen the necessity for laborious and time-consuming manual labeling. Some unlabeled data points have labels that are more pertinent and informative for the supervised model to learn from. The viability of utilizing unsupervised anomaly detection algorithms and active learning strategies to build an iterative process of acquiring labeled transactions in a cold start scenario, where there are no initial-labeled transactions, is being investigated. Investigating anomaly detection capabilities for a subset of data that maximizes supervised models’ learning potential is the goal. The anomaly detection algorithms under performed, according to the results. The findings underscore the need that anomaly detection algorithms be reserved for situations involving cold starts. As a result, using active learning techniques would produce better outcomes and supervised machine learning model performance.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139245344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proximal Policy Optimization-Based Reinforcement Learning and Hybrid Approaches to Explore the Cross Array Task Optimal Solution 基于近端策略优化的强化学习和混合方法,探索交叉阵列任务的最优解
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-20 DOI: 10.3390/make5040082
Samuel Corecco, Giorgia Adorni, L. Gambardella
In an era characterised by rapid technological advancement, the application of algorithmic approaches to address complex problems has become crucial across various disciplines. Within the realm of education, there is growing recognition of the pivotal role played by computational thinking (CT). This skill set has emerged as indispensable in our ever-evolving digital landscape, accompanied by an equal need for effective methods to assess and measure these skills. This research places its focus on the Cross Array Task (CAT), an educational activity designed within the Swiss educational system to assess students’ algorithmic skills. Its primary objective is to evaluate pupils’ ability to deconstruct complex problems into manageable steps and systematically formulate sequential strategies. The CAT has proven its effectiveness as an educational tool in tracking and monitoring the development of CT skills throughout compulsory education. Additionally, this task presents an enthralling avenue for algorithmic research, owing to its inherent complexity and the necessity to scrutinise the intricate interplay between different strategies and the structural aspects of this activity. This task, deeply rooted in logical reasoning and intricate problem solving, often poses a substantial challenge for human solvers striving for optimal solutions. Consequently, the exploration of computational power to unearth optimal solutions or uncover less intuitive strategies presents a captivating and promising endeavour. This paper explores two distinct algorithmic approaches to the CAT problem. The first approach combines clustering, random search, and move selection to find optimal solutions. The second approach employs reinforcement learning techniques focusing on the Proximal Policy Optimization (PPO) model. The findings of this research hold the potential to deepen our understanding of how machines can effectively tackle complex challenges like the CAT problem but also have broad implications, particularly in educational contexts, where these approaches can be seamlessly integrated into existing tools as a tutoring mechanism, offering assistance to students encountering difficulties. This can ultimately enhance students’ CT and problem-solving abilities, leading to an enriched educational experience.
在技术飞速发展的时代,应用算法方法解决复杂问题已成为各学科的关键。在教育领域,人们越来越认识到计算思维(CT)的关键作用。在我们不断发展的数字环境中,这种技能组合已成为不可或缺的一部分,同时我们也同样需要有效的方法来评估和衡量这些技能。这项研究的重点是 "交叉阵列任务"(CAT),这是瑞士教育系统为评估学生算法技能而设计的一项教育活动。其主要目的是评估学生将复杂问题分解为易于处理的步骤并系统地制定顺序策略的能力。CAT 已被证明是一种有效的教育工具,可用于跟踪和监测整个义务教育阶段 CT 技能的发展情况。此外,这项任务由于其固有的复杂性,以及有必要仔细研究不同策略之间错综复杂的相互作用和这项活动的结构方面,为算法研究提供了一个令人着迷的途径。这项任务深深植根于逻辑推理和错综复杂的问题解决之中,往往对努力寻求最佳解决方案的人类解题者构成巨大挑战。因此,探索计算能力以发掘最佳解决方案或发掘不那么直观的策略,是一项令人着迷和充满希望的工作。本文针对 CAT 问题探索了两种不同的算法方法。第一种方法结合了聚类、随机搜索和移动选择来寻找最优解。第二种方法采用了强化学习技术,重点关注近端策略优化(PPO)模型。这项研究的发现有可能加深我们对机器如何有效解决 CAT 问题等复杂挑战的理解,同时也具有广泛的意义,特别是在教育领域,这些方法可以作为辅导机制无缝集成到现有工具中,为遇到困难的学生提供帮助。这最终可以提高学生的计算机辅助学习能力和解决问题的能力,从而丰富教育体验。
{"title":"Proximal Policy Optimization-Based Reinforcement Learning and Hybrid Approaches to Explore the Cross Array Task Optimal Solution","authors":"Samuel Corecco, Giorgia Adorni, L. Gambardella","doi":"10.3390/make5040082","DOIUrl":"https://doi.org/10.3390/make5040082","url":null,"abstract":"In an era characterised by rapid technological advancement, the application of algorithmic approaches to address complex problems has become crucial across various disciplines. Within the realm of education, there is growing recognition of the pivotal role played by computational thinking (CT). This skill set has emerged as indispensable in our ever-evolving digital landscape, accompanied by an equal need for effective methods to assess and measure these skills. This research places its focus on the Cross Array Task (CAT), an educational activity designed within the Swiss educational system to assess students’ algorithmic skills. Its primary objective is to evaluate pupils’ ability to deconstruct complex problems into manageable steps and systematically formulate sequential strategies. The CAT has proven its effectiveness as an educational tool in tracking and monitoring the development of CT skills throughout compulsory education. Additionally, this task presents an enthralling avenue for algorithmic research, owing to its inherent complexity and the necessity to scrutinise the intricate interplay between different strategies and the structural aspects of this activity. This task, deeply rooted in logical reasoning and intricate problem solving, often poses a substantial challenge for human solvers striving for optimal solutions. Consequently, the exploration of computational power to unearth optimal solutions or uncover less intuitive strategies presents a captivating and promising endeavour. This paper explores two distinct algorithmic approaches to the CAT problem. The first approach combines clustering, random search, and move selection to find optimal solutions. The second approach employs reinforcement learning techniques focusing on the Proximal Policy Optimization (PPO) model. The findings of this research hold the potential to deepen our understanding of how machines can effectively tackle complex challenges like the CAT problem but also have broad implications, particularly in educational contexts, where these approaches can be seamlessly integrated into existing tools as a tutoring mechanism, offering assistance to students encountering difficulties. This can ultimately enhance students’ CT and problem-solving abilities, leading to an enriched educational experience.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"41 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139258498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Review of YOLO Architectures in Computer Vision: From YOLOv1 to YOLOv8 and YOLO-NAS 全面回顾计算机视觉中的 YOLO 架构:从 YOLOv1 到 YOLOv8 和 YOLO-NAS
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-20 DOI: 10.3390/make5040083
Juan R. Terven, Diana-Margarita Córdova-Esparza, J. Romero-González
YOLO has become a central real-time object detection system for robotics, driverless cars, and video monitoring applications. We present a comprehensive analysis of YOLO’s evolution, examining the innovations and contributions in each iteration from the original YOLO up to YOLOv8, YOLO-NAS, and YOLO with transformers. We start by describing the standard metrics and postprocessing; then, we discuss the major changes in network architecture and training tricks for each model. Finally, we summarize the essential lessons from YOLO’s development and provide a perspective on its future, highlighting potential research directions to enhance real-time object detection systems.
YOLO 已成为机器人、无人驾驶汽车和视频监控应用的核心实时物体检测系统。我们对 YOLO 的演变进行了全面分析,研究了从最初的 YOLO 到 YOLOv8、YOLO-NAS 和 YOLO with transformers 的每次迭代中的创新和贡献。我们首先介绍了标准指标和后处理方法,然后讨论了每个模型在网络架构和训练技巧方面的主要变化。最后,我们总结了 YOLO 开发过程中的基本经验,并展望了 YOLO 的未来,强调了增强实时目标检测系统的潜在研究方向。
{"title":"A Comprehensive Review of YOLO Architectures in Computer Vision: From YOLOv1 to YOLOv8 and YOLO-NAS","authors":"Juan R. Terven, Diana-Margarita Córdova-Esparza, J. Romero-González","doi":"10.3390/make5040083","DOIUrl":"https://doi.org/10.3390/make5040083","url":null,"abstract":"YOLO has become a central real-time object detection system for robotics, driverless cars, and video monitoring applications. We present a comprehensive analysis of YOLO’s evolution, examining the innovations and contributions in each iteration from the original YOLO up to YOLOv8, YOLO-NAS, and YOLO with transformers. We start by describing the standard metrics and postprocessing; then, we discuss the major changes in network architecture and training tricks for each model. Finally, we summarize the essential lessons from YOLO’s development and provide a perspective on its future, highlighting potential research directions to enhance real-time object detection systems.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"65 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139259115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Pose Estimation Using Deep Learning: A Systematic Literature Review 使用深度学习的人体姿势估计:系统的文献综述
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-13 DOI: 10.3390/make5040081
Esraa Samkari, Muhammad Arif, Manal Alghamdi, Mohammed A. Al Ghamdi
Human Pose Estimation (HPE) is the task that aims to predict the location of human joints from images and videos. This task is used in many applications, such as sports analysis and surveillance systems. Recently, several studies have embraced deep learning to enhance the performance of HPE tasks. However, building an efficient HPE model is difficult; many challenges, like crowded scenes and occlusion, must be handled. This paper followed a systematic procedure to review different HPE models comprehensively. About 100 articles published since 2014 on HPE using deep learning were selected using several selection criteria. Both image and video data types of methods were investigated. Furthermore, both single and multiple HPE methods were reviewed. In addition, the available datasets, different loss functions used in HPE, and pretrained feature extraction models were all covered. Our analysis revealed that Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) are the most used in HPE. Moreover, occlusion and crowd scenes remain the main problems affecting models’ performance. Therefore, the paper presented various solutions to address these issues. Finally, this paper highlighted the potential opportunities for future work in this task.
人体姿态估计(HPE)是一项旨在从图像和视频中预测人体关节位置的任务。这项任务用于许多应用程序,例如运动分析和监视系统。最近,一些研究已经采用深度学习来提高HPE任务的性能。然而,建立一个高效的HPE模型是困难的;许多挑战,如拥挤的场景和遮挡,必须处理。本文采用系统的程序对不同的HPE模型进行了全面的综述。自2014年以来,在HPE上发表的大约100篇使用深度学习的文章通过几个选择标准被选中。对图像和视频数据类型的方法进行了研究。此外,还对单一和多种HPE方法进行了综述。此外,还涵盖了可用的数据集、HPE中使用的不同损失函数以及预训练的特征提取模型。我们的分析表明,卷积神经网络(cnn)和循环神经网络(RNNs)在HPE中使用最多。此外,遮挡和人群场景仍然是影响模型性能的主要问题。因此,本文提出了解决这些问题的各种解决方案。最后,本文强调了该任务未来工作的潜在机会。
{"title":"Human Pose Estimation Using Deep Learning: A Systematic Literature Review","authors":"Esraa Samkari, Muhammad Arif, Manal Alghamdi, Mohammed A. Al Ghamdi","doi":"10.3390/make5040081","DOIUrl":"https://doi.org/10.3390/make5040081","url":null,"abstract":"Human Pose Estimation (HPE) is the task that aims to predict the location of human joints from images and videos. This task is used in many applications, such as sports analysis and surveillance systems. Recently, several studies have embraced deep learning to enhance the performance of HPE tasks. However, building an efficient HPE model is difficult; many challenges, like crowded scenes and occlusion, must be handled. This paper followed a systematic procedure to review different HPE models comprehensively. About 100 articles published since 2014 on HPE using deep learning were selected using several selection criteria. Both image and video data types of methods were investigated. Furthermore, both single and multiple HPE methods were reviewed. In addition, the available datasets, different loss functions used in HPE, and pretrained feature extraction models were all covered. Our analysis revealed that Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) are the most used in HPE. Moreover, occlusion and crowd scenes remain the main problems affecting models’ performance. Therefore, the paper presented various solutions to address these issues. Finally, this paper highlighted the potential opportunities for future work in this task.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"53 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconstruction-Based Adversarial Attack Detection in Vision-Based Autonomous Driving Systems 基于视觉的自动驾驶系统中基于重构的对抗攻击检测
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-07 DOI: 10.3390/make5040080
Manzoor Hussain, Jang-Eui Hong
The perception system is a safety-critical component that directly impacts the overall safety of autonomous driving systems (ADSs). It is imperative to ensure the robustness of the deep-learning model used in the perception system. However, studies have shown that these models are highly vulnerable to the adversarial perturbation of input data. The existing works mainly focused on studying the impact of these adversarial attacks on classification rather than regression models. Therefore, this paper first introduces two generalized methods for perturbation-based attacks: (1) We used naturally occurring noises to create perturbations in the input data. (2) We introduce a modified square, HopSkipJump, and decision-based/boundary attack to attack the regression models used in ADSs. Then, we propose a deep-autoencoder-based adversarial attack detector. In addition to offline evaluation metrics (e.g., F1 score and precision, etc.), we introduce an online evaluation framework to evaluate the robustness of the model under attack. The framework considers the reconstruction loss of the deep autoencoder that validates the robustness of the models under attack in an end-to-end fashion at runtime. Our experimental results showed that the proposed adversarial attack detector could detect square, HopSkipJump, and decision-based/boundary attacks with a true positive rate (TPR) of 93%.
感知系统是直接影响自动驾驶系统(ads)整体安全性的安全关键部件。在感知系统中,必须保证深度学习模型的鲁棒性。然而,研究表明,这些模型极易受到输入数据的对抗性扰动的影响。现有的工作主要集中在研究这些对抗性攻击对分类的影响,而不是回归模型。因此,本文首先介绍了两种基于扰动攻击的广义方法:(1)我们使用自然产生的噪声在输入数据中产生扰动。(2)引入改进的方形算法HopSkipJump和基于决策/边界攻击来攻击ads中使用的回归模型。然后,我们提出了一种基于深度自编码器的对抗性攻击检测器。除了离线评估指标(例如F1分数和精度等)外,我们还引入了一个在线评估框架来评估受攻击模型的鲁棒性。该框架考虑了深度自编码器的重建损失,在运行时以端到端方式验证受攻击模型的鲁棒性。实验结果表明,所提出的对抗性攻击检测器可以检测到正方形攻击、HopSkipJump攻击和基于决策/边界攻击,其真阳性率(TPR)为93%。
{"title":"Reconstruction-Based Adversarial Attack Detection in Vision-Based Autonomous Driving Systems","authors":"Manzoor Hussain, Jang-Eui Hong","doi":"10.3390/make5040080","DOIUrl":"https://doi.org/10.3390/make5040080","url":null,"abstract":"The perception system is a safety-critical component that directly impacts the overall safety of autonomous driving systems (ADSs). It is imperative to ensure the robustness of the deep-learning model used in the perception system. However, studies have shown that these models are highly vulnerable to the adversarial perturbation of input data. The existing works mainly focused on studying the impact of these adversarial attacks on classification rather than regression models. Therefore, this paper first introduces two generalized methods for perturbation-based attacks: (1) We used naturally occurring noises to create perturbations in the input data. (2) We introduce a modified square, HopSkipJump, and decision-based/boundary attack to attack the regression models used in ADSs. Then, we propose a deep-autoencoder-based adversarial attack detector. In addition to offline evaluation metrics (e.g., F1 score and precision, etc.), we introduce an online evaluation framework to evaluate the robustness of the model under attack. The framework considers the reconstruction loss of the deep autoencoder that validates the robustness of the models under attack in an end-to-end fashion at runtime. Our experimental results showed that the proposed adversarial attack detector could detect square, HopSkipJump, and decision-based/boundary attacks with a true positive rate (TPR) of 93%.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"41 167","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135540006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explainable Stacked Ensemble Deep Learning (SEDL) Framework to Determine Cause of Death from Verbal Autopsies 可解释的堆叠集成深度学习(SEDL)框架,以确定死因的口头解剖
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-10-25 DOI: 10.3390/make5040079
Michael T. Mapundu, Chodziwadziwa W. Kabudula, Eustasius Musenge, Victor Olago, Turgay Celik
Verbal autopsies (VA) are commonly used in Low- and Medium-Income Countries (LMIC) to determine cause of death (CoD) where death occurs outside clinical settings, with the most commonly used international gold standard being physician medical certification. Interviewers elicit information from relatives of the deceased, regarding circumstances and events that might have led to death. This information is stored in textual format as VA narratives. The narratives entail detailed information that can be used to determine CoD. However, this approach still remains a manual task that is costly, inconsistent, time-consuming and subjective (prone to errors), amongst many drawbacks. As such, this negatively affects the VA reporting process, despite it being vital for strengthening health priorities and informing civil registration systems. Therefore, this study seeks to close this gap by applying novel deep learning (DL) interpretable approaches for reviewing VA narratives and generate CoD prediction in a timely, easily interpretable, cost-effective and error-free way. We validate our DL models using optimisation and performance accuracy machine learning (ML) curves as a function of training samples. We report on validation with training set accuracy (LSTM = 76.11%, CNN = 76.35%, and SEDL = 82.1%), validation accuracy (LSTM = 67.05%, CNN = 66.16%, and SEDL = 82%) and test set accuracy (LSTM = 67%, CNN = 66.2%, and SEDL = 82%) for our models. Furthermore, we also present Local Interpretable Model-agnostic Explanations (LIME) for ease of interpretability of the results, thereby building trust in the use of machines in healthcare. We presented robust deep learning methods to determine CoD from VAs, with the stacked ensemble deep learning (SEDL) approaches performing optimally and better than Long Short-Term Memory (LSTM) and Convolutional Neural Network (CNN). Our empirical results suggest that ensemble DL methods may be integrated in the CoD process to help experts get to a diagnosis. Ultimately, this will reduce the turnaround time needed by physicians to go through the narratives in order to be able to give an appropriate diagnosis, cut costs and minimise errors. This study was limited by the number of samples needed for training our models and the high levels of lexical variability in the words used in our textual information.
在低收入和中等收入国家(LMIC),当死亡发生在临床环境之外时,尸检通常用于确定死因(CoD),最常用的国际黄金标准是医师医疗证明。采访者从死者亲属处获取有关可能导致死亡的情况和事件的信息。这些信息以文本格式存储为VA叙述。这些叙述包含了可以用来确定死亡日期的详细信息。然而,这种方法仍然是一项手工任务,成本高、不一致、耗时且主观(容易出错),还有许多缺点。因此,这对VA报告程序产生了负面影响,尽管它对于加强卫生重点和告知民事登记系统至关重要。因此,本研究试图通过应用新颖的深度学习(DL)可解释方法来审查VA叙述,并以及时、易于解释、经济高效且无错误的方式生成CoD预测,从而缩小这一差距。我们使用优化和性能精度机器学习(ML)曲线作为训练样本的函数来验证我们的DL模型。我们报告了我们模型的训练集准确度(LSTM = 76.11%, CNN = 76.35%, SEDL = 82.1%),验证准确度(LSTM = 67.05%, CNN = 66.16%, SEDL = 82%)和测试集准确度(LSTM = 67%, CNN = 66.2%, SEDL = 82%)的验证。此外,我们还提出了局部可解释模型不可知论解释(LIME),以便于结果的可解释性,从而建立对医疗保健中机器使用的信任。我们提出了鲁棒深度学习方法来从VAs中确定CoD,其中堆叠集成深度学习(SEDL)方法表现最佳,优于长短期记忆(LSTM)和卷积神经网络(CNN)。我们的实证结果表明,集成深度学习方法可以集成在CoD过程中,以帮助专家得到诊断。最终,这将减少医生为了能够给出适当的诊断、降低成本和减少错误而需要的周转时间。这项研究受到训练我们的模型所需的样本数量和文本信息中使用的单词的高水平词汇可变性的限制。
{"title":"Explainable Stacked Ensemble Deep Learning (SEDL) Framework to Determine Cause of Death from Verbal Autopsies","authors":"Michael T. Mapundu, Chodziwadziwa W. Kabudula, Eustasius Musenge, Victor Olago, Turgay Celik","doi":"10.3390/make5040079","DOIUrl":"https://doi.org/10.3390/make5040079","url":null,"abstract":"Verbal autopsies (VA) are commonly used in Low- and Medium-Income Countries (LMIC) to determine cause of death (CoD) where death occurs outside clinical settings, with the most commonly used international gold standard being physician medical certification. Interviewers elicit information from relatives of the deceased, regarding circumstances and events that might have led to death. This information is stored in textual format as VA narratives. The narratives entail detailed information that can be used to determine CoD. However, this approach still remains a manual task that is costly, inconsistent, time-consuming and subjective (prone to errors), amongst many drawbacks. As such, this negatively affects the VA reporting process, despite it being vital for strengthening health priorities and informing civil registration systems. Therefore, this study seeks to close this gap by applying novel deep learning (DL) interpretable approaches for reviewing VA narratives and generate CoD prediction in a timely, easily interpretable, cost-effective and error-free way. We validate our DL models using optimisation and performance accuracy machine learning (ML) curves as a function of training samples. We report on validation with training set accuracy (LSTM = 76.11%, CNN = 76.35%, and SEDL = 82.1%), validation accuracy (LSTM = 67.05%, CNN = 66.16%, and SEDL = 82%) and test set accuracy (LSTM = 67%, CNN = 66.2%, and SEDL = 82%) for our models. Furthermore, we also present Local Interpretable Model-agnostic Explanations (LIME) for ease of interpretability of the results, thereby building trust in the use of machines in healthcare. We presented robust deep learning methods to determine CoD from VAs, with the stacked ensemble deep learning (SEDL) approaches performing optimally and better than Long Short-Term Memory (LSTM) and Convolutional Neural Network (CNN). Our empirical results suggest that ensemble DL methods may be integrated in the CoD process to help experts get to a diagnosis. Ultimately, this will reduce the turnaround time needed by physicians to go through the narratives in order to be able to give an appropriate diagnosis, cut costs and minimise errors. This study was limited by the number of samples needed for training our models and the high levels of lexical variability in the words used in our textual information.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"64 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135168714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Role of Machine Learning in Defense Applications and Industry 评估机器学习在国防应用和工业中的作用
Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-10-22 DOI: 10.3390/make5040078
Evaldo Jorge Alcántara Suárez, Victor Monzon Baeza
Machine learning (ML) has become a critical technology in the defense sector, enabling the development of advanced systems for threat detection, decision making, and autonomous operations. However, the increasing ML use in defense systems has raised ethical concerns related to accountability, transparency, and bias. In this paper, we provide a comprehensive analysis of the impact of ML on the defense sector, including the benefits and drawbacks of using ML in various applications such as surveillance, target identification, and autonomous weapons systems. We also discuss the ethical implications of using ML in defense, focusing on privacy, accountability, and bias issues. Finally, we present recommendations for mitigating these ethical concerns, including increased transparency, accountability, and stakeholder involvement in designing and deploying ML systems in the defense sector.
机器学习(ML)已经成为国防领域的一项关键技术,可以开发用于威胁检测、决策和自主操作的先进系统。然而,越来越多的机器学习在国防系统中的应用引发了与问责制、透明度和偏见相关的伦理问题。在本文中,我们全面分析了机器学习对国防部门的影响,包括在监视、目标识别和自主武器系统等各种应用中使用机器学习的优点和缺点。我们还讨论了在防御中使用ML的伦理影响,重点是隐私、问责制和偏见问题。最后,我们提出了减轻这些道德问题的建议,包括在国防部门设计和部署ML系统时增加透明度、问责制和利益相关者的参与。
{"title":"Evaluating the Role of Machine Learning in Defense Applications and Industry","authors":"Evaldo Jorge Alcántara Suárez, Victor Monzon Baeza","doi":"10.3390/make5040078","DOIUrl":"https://doi.org/10.3390/make5040078","url":null,"abstract":"Machine learning (ML) has become a critical technology in the defense sector, enabling the development of advanced systems for threat detection, decision making, and autonomous operations. However, the increasing ML use in defense systems has raised ethical concerns related to accountability, transparency, and bias. In this paper, we provide a comprehensive analysis of the impact of ML on the defense sector, including the benefits and drawbacks of using ML in various applications such as surveillance, target identification, and autonomous weapons systems. We also discuss the ethical implications of using ML in defense, focusing on privacy, accountability, and bias issues. Finally, we present recommendations for mitigating these ethical concerns, including increased transparency, accountability, and stakeholder involvement in designing and deploying ML systems in the defense sector.","PeriodicalId":93033,"journal":{"name":"Machine learning and knowledge extraction","volume":"26 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135461716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Machine learning and knowledge extraction
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1