2,380 research outputs found
Automatic Extraction of Commonsense LocatedNear Knowledge
LocatedNear relation is a kind of commonsense knowledge describing two
physical objects that are typically found near each other in real life. In this
paper, we study how to automatically extract such relationship through a
sentence-level relation classifier and aggregating the scores of entity pairs
from a large corpus. Also, we release two benchmark datasets for evaluation and
future research.Comment: Accepted by ACL 2018. A preliminary version is presented on
AKBC@NIPS'1
Palmprint Recognition in Uncontrolled and Uncooperative Environment
Online palmprint recognition and latent palmprint identification are two
branches of palmprint studies. The former uses middle-resolution images
collected by a digital camera in a well-controlled or contact-based environment
with user cooperation for commercial applications and the latter uses
high-resolution latent palmprints collected in crime scenes for forensic
investigation. However, these two branches do not cover some palmprint images
which have the potential for forensic investigation. Due to the prevalence of
smartphone and consumer camera, more evidence is in the form of digital images
taken in uncontrolled and uncooperative environment, e.g., child pornographic
images and terrorist images, where the criminals commonly hide or cover their
face. However, their palms can be observable. To study palmprint identification
on images collected in uncontrolled and uncooperative environment, a new
palmprint database is established and an end-to-end deep learning algorithm is
proposed. The new database named NTU Palmprints from the Internet (NTU-PI-v1)
contains 7881 images from 2035 palms collected from the Internet. The proposed
algorithm consists of an alignment network and a feature extraction network and
is end-to-end trainable. The proposed algorithm is compared with the
state-of-the-art online palmprint recognition methods and evaluated on three
public contactless palmprint databases, IITD, CASIA, and PolyU and two new
databases, NTU-PI-v1 and NTU contactless palmprint database. The experimental
results showed that the proposed algorithm outperforms the existing palmprint
recognition methods.Comment: Accepted in the IEEE Transactions on Information Forensics and
Securit
Balanced Order Batching with Task-Oriented Graph Clustering
Balanced order batching problem (BOBP) arises from the process of warehouse
picking in Cainiao, the largest logistics platform in China. Batching orders
together in the picking process to form a single picking route, reduces travel
distance. The reason for its importance is that order picking is a labor
intensive process and, by using good batching methods, substantial savings can
be obtained. The BOBP is a NP-hard combinational optimization problem and
designing a good problem-specific heuristic under the quasi-real-time system
response requirement is non-trivial. In this paper, rather than designing
heuristics, we propose an end-to-end learning and optimization framework named
Balanced Task-orientated Graph Clustering Network (BTOGCN) to solve the BOBP by
reducing it to balanced graph clustering optimization problem. In BTOGCN, a
task-oriented estimator network is introduced to guide the type-aware
heterogeneous graph clustering networks to find a better clustering result
related to the BOBP objective. Through comprehensive experiments on
single-graph and multi-graphs, we show: 1) our balanced task-oriented graph
clustering network can directly utilize the guidance of target signal and
outperforms the two-stage deep embedding and deep clustering method; 2) our
method obtains an average 4.57m and 0.13m picking distance ("m" is the
abbreviation of the meter (the SI base unit of length)) reduction than the
expert-designed algorithm on single and multi-graph set and has a good
generalization ability to apply in practical scenario.Comment: 10 pages, 6 figure
Enhancing Face Recognition with Deep Learning Architectures: A Comprehensive Review
The progression of information discernment via facial identification and the emergence of innovative frameworks has exhibited remarkable strides in recent years. This phenomenon has been particularly pronounced within the realm of verifying individual credentials, a practice prominently harnessed by law enforcement agencies to advance the field of forensic science. A multitude of scholarly endeavors have been dedicated to the application of deep learning techniques within machine learning models. These endeavors aim to facilitate the extraction of distinctive features and subsequent classification, thereby elevating the precision of unique individual recognition. In the context of this scholarly inquiry, the focal point resides in the exploration of deep learning methodologies tailored for the realm of facial recognition and its subsequent matching processes. This exploration centers on the augmentation of accuracy through the meticulous process of training models with expansive datasets. Within the confines of this research paper, a comprehensive survey is conducted, encompassing an array of diverse strategies utilized in facial recognition. This survey, in turn, delves into the intricacies and challenges that underlie the intricate field of facial recognition within imagery analysis
Shortlisting the influential members of criminal organizations and identifying their important communication channels
Low-level criminals, who do the legwork in a criminal organization are the most likely to be arrested, whereas the high-level ones tend to avoid attention. But crippling the work of a criminal organizations is not possible unless investigators can identify the most influential, high-level members and monitor their communication channels. Investigators often approach this task by requesting the mobile phone service records of the arrested low-level criminals to identify contacts, and then they build a network model of the organization where each node denotes a criminal and the edges represent communications. Network analysis can be used to infer the most influential criminals and most important communication channels within the network but screening all the nodes and links in a network is laborious and time consuming. Here we propose a new forensic analysis system called IICCC (Identifying Influential Criminals and their Communication Channels) that can effectively and efficiently infer the high-level criminals and short-list the important communication channels in a criminal organization, based on the mobile phone communications of its members. IICCC can also be used to build a network from crime incident reports. We evaluated IICCC experimentally and compared it with five other systems, confirming its superior prediction performance
Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach
Graph anomaly detection (GAD) has achieved success and has been widely
applied in various domains, such as fraud detection, cybersecurity, finance
security, and biochemistry. However, existing graph anomaly detection
algorithms focus on distinguishing individual entities (nodes or graphs) and
overlook the possibility of anomalous groups within the graph. To address this
limitation, this paper introduces a novel unsupervised framework for a new task
called Group-level Graph Anomaly Detection (Gr-GAD). The proposed framework
first employs a variant of Graph AutoEncoder (GAE) to locate anchor nodes that
belong to potential anomaly groups by capturing long-range inconsistencies.
Subsequently, group sampling is employed to sample candidate groups, which are
then fed into the proposed Topology Pattern-based Graph Contrastive Learning
(TPGCL) method. TPGCL utilizes the topology patterns of groups as clues to
generate embeddings for each candidate group and thus distinct anomaly groups.
The experimental results on both real-world and synthetic datasets demonstrate
that the proposed framework shows superior performance in identifying and
localizing anomaly groups, highlighting it as a promising solution for Gr-GAD.
Datasets and codes of the proposed framework are at the github repository
https://anonymous.4open.science/r/Topology-Pattern-Enhanced-Unsupervised-Group-level-Graph-Anomaly-Detection
Addressing the Impact of Localized Training Data in Graph Neural Networks
Graph Neural Networks (GNNs) have achieved notable success in learning from
graph-structured data, owing to their ability to capture intricate dependencies
and relationships between nodes. They excel in various applications, including
semi-supervised node classification, link prediction, and graph generation.
However, it is important to acknowledge that the majority of state-of-the-art
GNN models are built upon the assumption of an in-distribution setting, which
hinders their performance on real-world graphs with dynamic structures. In this
article, we aim to assess the impact of training GNNs on localized subsets of
the graph. Such restricted training data may lead to a model that performs well
in the specific region it was trained on but fails to generalize and make
accurate predictions for the entire graph. In the context of graph-based
semi-supervised learning (SSL), resource constraints often lead to scenarios
where the dataset is large, but only a portion of it can be labeled, affecting
the model's performance. This limitation affects tasks like anomaly detection
or spam detection when labeling processes are biased or influenced by human
subjectivity. To tackle the challenges posed by localized training data, we
approach the problem as an out-of-distribution (OOD) data issue by by aligning
the distributions between the training data, which represents a small portion
of labeled data, and the graph inference process that involves making
predictions for the entire graph. We propose a regularization method to
minimize distributional discrepancies between localized training data and graph
inference, improving model performance on OOD data. Extensive tests on popular
GNN models show significant performance improvement on three citation GNN
benchmark datasets. The regularization approach effectively enhances model
adaptation and generalization, overcoming challenges posed by OOD data.Comment: 6 pages, 4 figure
Bias Remediation in Driver Drowsiness Detection Systems Using Generative Adversarial Networks
Datasets are crucial when training a deep neural network. When datasets are
unrepresentative, trained models are prone to bias because they are unable to
generalise to real world settings. This is particularly problematic for models
trained in specific cultural contexts, which may not represent a wide range of
races, and thus fail to generalise. This is a particular challenge for Driver
drowsiness detection, where many publicly available datasets are
unrepresentative as they cover only certain ethnicity groups. Traditional
augmentation methods are unable to improve a model's performance when tested on
other groups with different facial attributes, and it is often challenging to
build new, more representative datasets. In this paper, we introduce a novel
framework that boosts the performance of detection of drowsiness for different
ethnicity groups. Our framework improves Convolutional Neural Network (CNN)
trained for prediction by using Generative Adversarial networks (GAN) for
targeted data augmentation based on a population bias visualisation strategy
that groups faces with similar facial attributes and highlights where the model
is failing. A sampling method selects faces where the model is not performing
well, which are used to fine-tune the CNN. Experiments show the efficacy of our
approach in improving driver drowsiness detection for under represented
ethnicity groups. Here, models trained on publicly available datasets are
compared with a model trained using the proposed data augmentation strategy.
Although developed in the context of driver drowsiness detection, the proposed
framework is not limited to the driver drowsiness detection task, but can be
applied to other applications.Comment: 9 pages, 7 figure
- …