2,089 research outputs found

    Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics

    Full text link
    Mouse dynamics is a potential means of authenticating users. Typically, the authentication process is based on classical machine learning techniques, but recently, deep learning techniques have been introduced for this purpose. Although prior research has demonstrated how machine learning and deep learning algorithms can be bypassed by carefully crafted adversarial samples, there has been very little research performed on the topic of behavioural biometrics in the adversarial domain. In an attempt to address this gap, we built a set of attacks, which are applications of several generative approaches, to construct adversarial mouse trajectories that bypass authentication models. These generated mouse sequences will serve as the adversarial samples in the context of our experiments. We also present an analysis of the attack approaches we explored, explaining their limitations. In contrast to previous work, we consider the attacks in a more realistic and challenging setting in which an attacker has access to recorded user data but does not have access to the authentication model or its outputs. We explore three different attack strategies: 1) statistics-based, 2) imitation-based, and 3) surrogate-based; we show that they are able to evade the functionality of the authentication models, thereby impacting their robustness adversely. We show that imitation-based attacks often perform better than surrogate-based attacks, unless, however, the attacker can guess the architecture of the authentication model. In such cases, we propose a potential detection mechanism against surrogate-based attacks.Comment: Accepted in 2019 International Joint Conference on Neural Networks (IJCNN). Update of DO

    The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences

    Full text link
    Current smartphone operating systems regulate application permissions by prompting users on an ask-on-first-use basis. Prior research has shown that this method is ineffective because it fails to account for context: the circumstances under which an application first requests access to data may be vastly different than the circumstances under which it subsequently requests access. We performed a longitudinal 131-person field study to analyze the contextuality behind user privacy decisions to regulate access to sensitive resources. We built a classifier to make privacy decisions on the user's behalf by detecting when context has changed and, when necessary, inferring privacy preferences based on the user's past decisions and behavior. Our goal is to automatically grant appropriate resource requests without further user intervention, deny inappropriate requests, and only prompt the user when the system is uncertain of the user's preferences. We show that our approach can accurately predict users' privacy decisions 96.8% of the time, which is a four-fold reduction in error rate compared to current systems.Comment: 17 pages, 4 figure

    Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating

    Full text link
    In this work, we investigate the concept of biometric backdoors: a template poisoning attack on biometric systems that allows adversaries to stealthily and effortlessly impersonate users in the long-term by exploiting the template update procedure. We show that such attacks can be carried out even by attackers with physical limitations (no digital access to the sensor) and zero knowledge of training data (they know neither decision boundaries nor user template). Based on the adversaries' own templates, they craft several intermediate samples that incrementally bridge the distance between their own template and the legitimate user's. As these adversarial samples are added to the template, the attacker is eventually accepted alongside the legitimate user. To avoid detection, we design the attack to minimize the number of rejected samples. We design our method to cope with the weak assumptions for the attacker and we evaluate the effectiveness of this approach on state-of-the-art face recognition pipelines based on deep neural networks. We find that in scenarios where the deep network is known, adversaries can successfully carry out the attack over 70% of cases with less than ten injection attempts. Even in black-box scenarios, we find that exploiting the transferability of adversarial samples from surrogate models can lead to successful attacks in around 15% of cases. Finally, we design a poisoning detection technique that leverages the consistent directionality of template updates in feature space to discriminate between legitimate and malicious updates. We evaluate such a countermeasure with a set of intra-user variability factors which may present the same directionality characteristics, obtaining equal error rates for the detection between 7-14% and leading to over 99% of attacks being detected after only two sample injections.Comment: 12 page

    ๋”ฅ๋Ÿฌ๋‹ ๊ธฐ๋ฐ˜ ๊ณ ์žฅ ์ง„๋‹จ์„ ์œ„ํ•œ ์ •๋ณด ํ™œ์šฉ ๊ทน๋Œ€ํ™” ๊ธฐ๋ฒ• ๊ฐœ๋ฐœ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ๊ธฐ๊ณ„ํ•ญ๊ณต๊ณตํ•™๋ถ€, 2021.8. ์œค๋ณ‘๋™.๊ธฐ๊ณ„ ์‹œ์Šคํ…œ์˜ ์˜ˆ๊ธฐ์น˜ ์•Š์€ ๊ณ ์žฅ์€ ๋งŽ์€ ์‚ฐ์—… ๋ถ„์•ผ์—์„œ ๋ง‰๋Œ€ํ•œ ์‚ฌํšŒ์ , ๊ฒฝ์ œ์  ์†์‹ค์„ ์•ผ๊ธฐํ•  ์ˆ˜ ์žˆ๋‹ค. ๊ฐ‘์ž‘์Šค๋Ÿฐ ๊ณ ์žฅ์„ ๊ฐ์ง€ํ•˜๊ณ  ์˜ˆ๋ฐฉํ•˜์—ฌ ๊ธฐ๊ณ„ ์‹œ์Šคํ…œ์˜ ์‹ ๋ขฐ์„ฑ์„ ๋†’์ด๊ธฐ ์œ„ํ•ด ๋ฐ์ดํ„ฐ ๊ธฐ๋ฐ˜ ๊ณ ์žฅ ์ง„๋‹จ ๊ธฐ์ˆ ์„ ๊ฐœ๋ฐœํ•˜๊ธฐ ์œ„ํ•œ ์—ฐ๊ตฌ๊ฐ€ ํ™œ๋ฐœํ•˜๊ฒŒ ์ด๋ฃจ์–ด์ง€๊ณ  ์žˆ๋‹ค. ๊ณ ์žฅ ์ง„๋‹จ ๊ธฐ์ˆ ์˜ ๋ชฉํ‘œ๋Š” ๋Œ€์ƒ ๊ธฐ๊ณ„ ์‹œ์Šคํ…œ์˜ ๊ณ ์žฅ ๋ฐœ์ƒ์„ ๊ฐ€๋Šฅํ•œ ๋นจ๋ฆฌ ๊ฐ์ง€ํ•˜๊ณ  ์ง„๋‹จํ•˜๋Š” ๊ฒƒ์ด๋‹ค. ์ตœ๊ทผ ํ•ฉ์„ฑ๊ณฑ ์‹ ๊ฒฝ๋ง ๊ธฐ๋ฒ•์„ ํฌํ•จํ•œ ๋”ฅ๋Ÿฌ๋‹ ๊ธฐ๋ฐ˜ ๊ณ ์žฅ ์ง„๋‹จ ๊ธฐ์ˆ ์€ ์ž์œจ์ ์ธ ํŠน์„ฑ์ธ์ž(feature) ํ•™์Šต์ด ๊ฐ€๋Šฅํ•˜๊ณ  ๋†’์€ ์ง„๋‹จ ์„ฑ๋Šฅ์„ ์–ป์„ ์ˆ˜ ์žˆ๋‹ค๋Š” ์žฅ์ ์ด ์žˆ์–ด ํ™œ๋ฐœํžˆ ์—ฐ๊ตฌ๋˜๊ณ  ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๋”ฅ๋Ÿฌ๋‹ ๊ธฐ๋ฐ˜์˜ ๊ณ ์žฅ ์ง„๋‹จ ๊ธฐ์ˆ ์„ ๊ฐœ๋ฐœํ•จ์— ์žˆ์–ด ํ•ด๊ฒฐํ•ด์•ผ ํ•  ๋ช‡ ๊ฐ€์ง€ ๋ฌธ์ œ์ ๋“ค์ด ์กด์žฌํ•œ๋‹ค. ๋จผ์ €, ์‹ ๊ฒฝ๋ง ๊ตฌ์กฐ๋ฅผ ๊นŠ๊ฒŒ ์Œ“์Œ์œผ๋กœ์จ ํ’๋ถ€ํ•œ ๊ณ„์ธต์  ํŠน์„ฑ์ธ์ž๋“ค์„ ๋ฐฐ์šธ ์ˆ˜ ์žˆ๊ณ , ์ด๋ฅผ ํ†ตํ•ด ํ–ฅ์ƒ๋œ ์„ฑ๋Šฅ์„ ์–ป์„ ์ˆ˜ ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๊ธฐ์šธ๊ธฐ(gradient) ์ •๋ณด ํ๋ฆ„์˜ ๋น„ํšจ์œจ์„ฑ๊ณผ ๊ณผ์ ํ•ฉ ๋ฌธ์ œ๋กœ ์ธํ•ด ๋ชจ๋ธ์ด ๊นŠ์–ด์งˆ์ˆ˜๋ก ํ•™์Šต์ด ์–ด๋ ต๊ฒŒ ๋œ๋‹ค๋Š” ๋ฌธ์ œ๊ฐ€ ์žˆ๋‹ค. ๋‹ค์Œ์œผ๋กœ, ๋†’์€ ์„ฑ๋Šฅ์˜ ๊ณ ์žฅ ์ง„๋‹จ ๋ชจ๋ธ์„ ํ•™์Šตํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ์ถฉ๋ถ„ํ•œ ์–‘์˜ ๋ ˆ์ด๋ธ” ๋ฐ์ดํ„ฐ(labeled data)๊ฐ€ ํ™•๋ณด๋ผ์•ผ ํ•œ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์‹ค์ œ ํ˜„์žฅ์—์„œ ์šด์šฉ๋˜๊ณ  ์žˆ๋Š” ๊ธฐ๊ณ„ ์‹œ์Šคํ…œ์˜ ๊ฒฝ์šฐ, ์ถฉ๋ถ„ํ•œ ์–‘์˜ ๋ฐ์ดํ„ฐ์™€ ๋ ˆ์ด๋ธ” ์ •๋ณด๋ฅผ ์–ป๋Š” ๊ฒƒ์ด ์–ด๋ ค์šด ๊ฒฝ์šฐ๊ฐ€ ๋งŽ๋‹ค. ๋”ฐ๋ผ์„œ ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋“ค์„ ํ•ด๊ฒฐํ•˜๊ณ  ์ง„๋‹จ ์„ฑ๋Šฅ์„ ํ–ฅ์ƒ์‹œํ‚ค๊ธฐ ์œ„ํ•œ ์ƒˆ๋กœ์šด ๋”ฅ๋Ÿฌ๋‹ ๊ธฐ๋ฐ˜ ๊ณ ์žฅ ์ง„๋‹จ ๊ธฐ์ˆ ์˜ ๊ฐœ๋ฐœ์ด ํ•„์š”ํ•˜๋‹ค. ๋ณธ ๋ฐ•์‚ฌํ•™์œ„๋…ผ๋ฌธ์—์„œ๋Š” ๋”ฅ๋Ÿฌ๋‹ ๊ธฐ๋ฐ˜ ๊ณ ์žฅ ์ง„๋‹จ ๊ธฐ์ˆ ์˜ ์„ฑ๋Šฅ์„ ํ–ฅ์ƒ์‹œํ‚ค๊ธฐ ์œ„ํ•œ ์„ธ๊ฐ€์ง€ ์ •๋ณด ํ™œ์šฉ ๊ทน๋Œ€ํ™” ๊ธฐ๋ฒ•์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๋กœ 1) ๋”ฅ๋Ÿฌ๋‹ ์•„ํ‚คํ…์ฒ˜ ๋‚ด ๊ธฐ์šธ๊ธฐ ์ •๋ณด ํ๋ฆ„์„ ํ–ฅ์ƒ์‹œํ‚ค๊ธฐ ์œ„ํ•œ ์ƒˆ๋กœ์šด ๋”ฅ๋Ÿฌ๋‹ ๊ตฌ์กฐ ์—ฐ๊ตฌ, 2) ํŒŒ๋ผ๋ฏธํ„ฐ ์ „์ด ๋ฐ ์‚ผ์ค‘ํ•ญ ์†์‹ค์„ ๊ธฐ๋ฐ˜์œผ๋กœ ๋ถˆ์ถฉ๋ถ„ํ•œ ๋ฐ์ดํ„ฐ ๋ฐ ๋…ธ์ด์ฆˆ ์กฐ๊ฑด ํ•˜ ๊ฐ•๊ฑดํ•˜๊ณ  ์ฐจ๋ณ„์ ์ธ ํŠน์„ฑ์ธ์ž ํ•™์Šต์— ๋Œ€ํ•œ ์—ฐ๊ตฌ, 3) ๋‹ค๋ฅธ ๋„๋ฉ”์ธ์œผ๋กœ๋ถ€ํ„ฐ ๋ ˆ์ด๋ธ” ์ •๋ณด๋ฅผ ์ „์ด์‹œ์ผœ ์‚ฌ์šฉํ•˜๋Š” ๋„๋ฉ”์ธ ์ ์‘ ๊ธฐ๋ฐ˜ ๊ณ ์žฅ ์ง„๋‹จ ๊ธฐ๋ฒ• ์—ฐ๊ตฌ๋ฅผ ์ œ์•ˆํ•œ๋‹ค. ์ฒซ ๋ฒˆ์งธ ์—ฐ๊ตฌ์—์„œ๋Š” ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ ๋‚ด ๊ธฐ์šธ๊ธฐ ์ •๋ณด ํ๋ฆ„์„ ๊ฐœ์„ ํ•˜๊ธฐ ์œ„ํ•œ ํ–ฅ์ƒ๋œ ํ•ฉ์„ฑ๊ณฑ ์‹ ๊ฒฝ๋ง ๊ธฐ๋ฐ˜ ๊ตฌ์กฐ๋ฅผ ์ œ์•ˆํ•œ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ๋‹ค์–‘ํ•œ ๊ณ„์ธต์˜ ์•„์›ƒํ’‹(feature map)์„ ์ง์ ‘ ์—ฐ๊ฒฐํ•จ์œผ๋กœ์จ ํ–ฅ์ƒ๋œ ์ •๋ณด ํ๋ฆ„์„ ์–ป์„ ์ˆ˜ ์žˆ์œผ๋ฉฐ, ๊ทธ ๊ฒฐ๊ณผ ์ง„๋‹จ ๋ชจ๋ธ์„ ํšจ์œจ์ ์œผ๋กœ ํ•™์Šตํ•˜๋Š” ๊ฒƒ์ด ๊ฐ€๋Šฅํ•˜๋‹ค. ๋˜ํ•œ ์ฐจ์› ์ถ•์†Œ ๋ชจ๋“ˆ์„ ํ†ตํ•ด ํ•™์Šต ํŒŒ๋ผ๋ฏธํ„ฐ ์ˆ˜๋ฅผ ํฌ๊ฒŒ ์ค„์ž„์œผ๋กœ์จ ํ•™์Šต ํšจ์œจ์„ฑ์„ ๋†’์ผ ์ˆ˜ ์žˆ๋‹ค. ๋‘ ๋ฒˆ์งธ ์—ฐ๊ตฌ์—์„œ๋Š” ํŒŒ๋ผ๋ฏธํ„ฐ ์ „์ด ๋ฐ ๋ฉ”ํŠธ๋ฆญ ํ•™์Šต ๊ธฐ๋ฐ˜ ๊ณ ์žฅ ์ง„๋‹จ ๊ธฐ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋Š” ๋ฐ์ดํ„ฐ๊ฐ€ ๋ถˆ์ถฉ๋ถ„ํ•˜๊ณ  ๋…ธ์ด์ฆˆ๊ฐ€ ๋งŽ์€ ์กฐ๊ฑด ํ•˜์—์„œ๋„ ๋†’์€ ๊ณ ์žฅ ์ง„๋‹จ ์„ฑ๋Šฅ์„ ์–ป๊ธฐ ์œ„ํ•ด ๊ฐ•๊ฑดํ•˜๊ณ  ์ฐจ๋ณ„์ ์ธ ํŠน์„ฑ์ธ์ž ํ•™์Šต์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•œ๋‹ค. ๋จผ์ €, ํ’๋ถ€ํ•œ ์†Œ์Šค ๋„๋ฉ”์ธ ๋ฐ์ดํ„ฐ๋ฅผ ์‚ฌ์šฉํ•ด ํ›ˆ๋ จ๋œ ์‚ฌ์ „ํ•™์Šต๋ชจ๋ธ์„ ํƒ€๊ฒŸ ๋„๋ฉ”์ธ์œผ๋กœ ์ „์ดํ•ด ์‚ฌ์šฉํ•จ์œผ๋กœ์จ ๊ฐ•๊ฑดํ•œ ์ง„๋‹จ ๋ฐฉ๋ฒ•์„ ๊ฐœ๋ฐœํ•  ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ, semi-hard ์‚ผ์ค‘ํ•ญ ์†์‹ค ํ•จ์ˆ˜๋ฅผ ์‚ฌ์šฉํ•จ์œผ๋กœ์จ ๊ฐ ์ƒํƒœ ๋ ˆ์ด๋ธ”์— ๋”ฐ๋ผ ๋ฐ์ดํ„ฐ๊ฐ€ ๋” ์ž˜ ๋ถ„๋ฆฌ๋˜๋„๋ก ํ•ด์ฃผ๋Š” ํŠน์„ฑ์ธ์ž๋ฅผ ํ•™์Šตํ•  ์ˆ˜ ์žˆ๋‹ค. ์„ธ ๋ฒˆ์งธ ์—ฐ๊ตฌ์—์„œ๋Š” ๋ ˆ์ด๋ธ”์ด ์ง€์ •๋˜์ง€ ์•Š์€(unlabeled) ๋Œ€์ƒ ๋„๋ฉ”์ธ์—์„œ์˜ ๊ณ ์žฅ ์ง„๋‹จ ์„ฑ๋Šฅ์„ ๋†’์ด๊ธฐ ์œ„ํ•œ ๋ ˆ์ด๋ธ” ์ •๋ณด ์ „์ด ์ „๋žต์„ ์ œ์•ˆํ•œ๋‹ค. ์šฐ๋ฆฌ๊ฐ€ ๋ชฉํ‘œ๋กœ ํ•˜๋Š” ๋Œ€์ƒ ๋„๋ฉ”์ธ์—์„œ์˜ ๊ณ ์žฅ ์ง„๋‹จ ๋ฐฉ๋ฒ•์„ ๊ฐœ๋ฐœํ•˜๊ธฐ ์œ„ํ•ด ๋‹ค๋ฅธ ์†Œ์Šค ๋„๋ฉ”์ธ์—์„œ ์–ป์€ ๋ ˆ์ด๋ธ” ์ •๋ณด๊ฐ€ ์ „์ด๋˜์–ด ํ™œ์šฉ๋œ๋‹ค. ๋™์‹œ์— ์ƒˆ๋กญ๊ฒŒ ๊ณ ์•ˆํ•œ ์˜๋ฏธ๋ก ์  ํด๋Ÿฌ์Šคํ„ฐ๋ง ์†์‹ค(semantic clustering loss)์„ ์—ฌ๋Ÿฌ ํŠน์„ฑ์ธ์ž ์ˆ˜์ค€์— ์ ์šฉํ•จ์œผ๋กœ์จ ์ฐจ๋ณ„์ ์ธ ๋„๋ฉ”์ธ ๋ถˆ๋ณ€ ๊ธฐ๋Šฅ์„ ํ•™์Šตํ•œ๋‹ค. ๊ฒฐ๊ณผ์ ์œผ๋กœ ๋„๋ฉ”์ธ ๋ถˆ๋ณ€ ํŠน์„ฑ์„ ๊ฐ€์ง€๋ฉฐ ์˜๋ฏธ๋ก ์ ์œผ๋กœ ์ž˜ ๋ถ„๋ฅ˜๋˜๋Š” ํŠน์„ฑ์ธ์ž๋ฅผ ํšจ๊ณผ์ ์œผ๋กœ ํ•™์Šตํ•  ์ˆ˜ ์žˆ์Œ์„ ์ฆ๋ช…ํ•˜์˜€๋‹ค.Unexpected failures of mechanical systems can lead to substantial social and financial losses in many industries. In order to detect and prevent sudden failures and to enhance the reliability of mechanical systems, significant research efforts have been made to develop data-driven fault diagnosis techniques. The purpose of fault diagnosis techniques is to detect and identify the occurrence of abnormal behaviors in the target mechanical systems as early as possible. Recently, deep learning (DL) based fault diagnosis approaches, including the convolutional neural network (CNN) method, have shown remarkable fault diagnosis performance, thanks to their autonomous feature learning ability. Still, there are several issues that remain to be solved in the development of robust and industry-applicable deep learning-based fault diagnosis techniques. First, by stacking the neural network architectures deeper, enriched hierarchical features can be learned, and therefore, improved performance can be achieved. However, due to inefficiency in the gradient information flow and overfitting problems, deeper models cannot be trained comprehensively. Next, to develop a fault diagnosis model with high performance, it is necessary to obtain sufficient labeled data. However, for mechanical systems that operate in real-world environments, it is not easy to obtain sufficient data and label information. Consequently, novel methods that address these issues should be developed to improve the performance of deep learning based fault diagnosis techniques. This dissertation research investigated three research thrusts aimed toward maximizing the use of information to improve the performance of deep learning based fault diagnosis techniques, specifically: 1) study of the deep learning structure to enhance the gradient information flow within the architecture, 2) study of a robust and discriminative feature learning method under insufficient and noisy data conditions based on parameter transfer and triplet loss, and 3) investigation of a domain adaptation based fault diagnosis method that propagates the label information across different domains. The first research thrust suggests an advanced CNN-based architecture to improve the gradient information flow within the deep learning model. By directly connecting the feature maps of different layers, the diagnosis model can be trained efficiently thanks to enhanced information flow. In addition, the dimension reduction module also can increase the training efficiency by significantly reducing the number of trainable parameters. The second research thrust suggests a parameter transfer and metric learning based fault diagnosis method. The proposed approach facilitates robust and discriminative feature learning to enhance fault diagnosis performance under insufficient and noisy data conditions. The pre-trained model trained using abundant source domain data is transferred and used to develop a robust fault diagnosis method. Moreover, a semi-hard triplet loss function is adopted to learn the features with high separability, according to the class labels. Finally, the last research thrust proposes a label information propagation strategy to increase the fault diagnosis performance in the unlabeled target domain. The label information obtained from the source domain is transferred and utilized for developing fault diagnosis methods in the target domain. Simultaneously, the newly devised semantic clustering loss is applied at multiple feature levels to learn discriminative, domain-invariant features. As a result, features that are not only semantically well-clustered but also domain-invariant can be effectively learned.Chapter 1 Introduction 1 1.1 Motivation 1 1.2 Research Scope and Overview 3 1.3 Dissertation Layout 6 Chapter 2 Technical Background and Literature Review 8 2.1 Fault Diagnosis Techniques for Mechanical Systems 8 2.1.1 Fault Diagnosis Techniques 10 2.1.2 Deep Learning Based Fault Diagnosis Techniques 15 2.2 Transfer Learning 22 2.3 Metric Learning 28 2.4 Summary and Discussion 30 Chapter 3 Direct Connection Based Convolutional Neural Network (DC-CNN) for Fault Diagnosis 31 3.1 Directly Connected Convolutional Module 33 3.2 Dimension Reduction Module 34 3.3 Input Vibration Image Generation 36 3.4 DC-CNN-Based Fault Diagnosis Method 40 3.5 Experimental Studies and Results 45 3.5.1 Experiment and Data Description 45 3.5.2 Compared Methods 48 3.5.3 Diagnosis Performance Results 51 3.5.4 The Number of Trainable Parameters 56 3.5.5 Visualization of the Learned Features 58 3.5.6 Robustness of Diagnosis Performance 62 3.6 Summary and Discussion 67 Chapter 4 Robust and Discriminative Feature Learning for Fault Diagnosis Under Insufficient and Noisy Data Conditions 68 4.1 Parameter transfer learning 70 4.2 Robust Feature Learning Based on the Pre-trained model 72 4.3 Discriminative Feature Learning Based on the Triplet loss 77 4.4 Robust and Discriminative Feature Learning for Fault Diagnosis 80 4.5 Experimental Studies and Results 84 4.5.1 Experiment and Data Description 84 4.5.2 Compared Methods 85 4.5.3 Experimental Results Under Insufficient Data Conditions 86 4.5.4 Experimental Results Under Noisy Data Conditions 92 4.6 Summary and Discussion 95 Chapter 5 A Domain Adaptation with Semantic Clustering (DASC) Method for Fault Diagnosis 96 5.1 Unsupervised Domain Adaptation 101 5.2 CNN-based Diagnosis Model 104 5.3 Learning of Domain-invariant Features 105 5.4 Domain Adaptation with Semantic Clustering 107 5.5 Proposed DASC-based Fault Diagnosis Method 109 5.6 Experimental Studies and Results 114 5.6.1 Experiment and Data Description 114 5.6.2 Compared Methods 117 5.6.3 Scenario I: Different Operating Conditions 118 5.6.4 Scenario II: Different Rotating Machinery 125 5.6.5 Analysis and Discussion 131 5.7 Summary and Discussion 140 Chapter 6 Conclusion 141 6.1 Contributions and Significance 141 6.2 Suggestions for Future Research 143 References 146 ๊ตญ๋ฌธ ์ดˆ๋ก 154๋ฐ•

    Improving Classification in Single and Multi-View Images

    Get PDF
    Image classification is a sub-field of computer vision that focuses on identifying objects within digital images. In order to improve image classification we must address the following areas of improvement: 1) Single and Multi-View data quality using data pre-processing techniques. 2) Enhancing deep feature learning to extract alternative representation of the data. 3) Improving decision or prediction of labels. This dissertation presents a series of four published papers that explore different improvements of image classification. In our first paper, we explore the Siamese network architecture to create a Convolution Neural Network based similarity metric. We learn the priority features that differentiate two given input images. The metric proposed achieves state-of-the-art Fฮฒ measure. In our second paper, we explore multi-view data classification. We investigate the application of Generative Adversarial Networks GANs on Multi-view data image classification and few-shot learning. Experimental results show that our method outperforms state-of-the-art research. In our third paper, we take on the challenge of improving ResNet backbone model. For this task, we focus on improving channel attention mechanisms. We utilize Discrete Wavelet Transform compression to address the channel representation problem. Experimental results on ImageNet shows that our method outperforms baseline SENet-34 and SOTA FcaNet-34 at no extra computational cost. In our fourth paper, we investigate further the potential of orthogonalization of filters for extraction of diverse information for channel attention. We prove that using only random constant orthogonal filters is sufficient enough to achieve good channel attention. We test our proposed method using ImageNet, Places365, and Birds datasets for image classification, MS-COCO for object detection, and instance segmentation tasks. Our method outperforms FcaNet, and WaveNet and achieves the state-of-the-art results

    Improving Classification in Single and Multi-View Images

    Get PDF
    Image classification is a sub-field of computer vision that focuses on identifying objects within digital images. In order to improve image classification we must address the following areas of improvement: 1) Single and Multi-View data quality using data pre-processing techniques. 2) Enhancing deep feature learning to extract alternative representation of the data. 3) Improving decision or prediction of labels. This dissertation presents a series of four published papers that explore different improvements of image classification. In our first paper, we explore the Siamese network architecture to create a Convolution Neural Network based similarity metric. We learn the priority features that differentiate two given input images. The metric proposed achieves state-of-the-art Fฮฒ measure. In our second paper, we explore multi-view data classification. We investigate the application of Generative Adversarial Networks GANs on Multi-view data image classification and few-shot learning. Experimental results show that our method outperforms state-of-the-art research. In our third paper, we take on the challenge of improving ResNet backbone model. For this task, we focus on improving channel attention mechanisms. We utilize Discrete Wavelet Transform compression to address the channel representation problem. Experimental results on ImageNet shows that our method outperforms baseline SENet-34 and SOTA FcaNet-34 at no extra computational cost. In our fourth paper, we investigate further the potential of orthogonalization of filters for extraction of diverse information for channel attention. We prove that using only random constant orthogonal filters is sufficient enough to achieve good channel attention. We test our proposed method using ImageNet, Places365, and Birds datasets for image classification, MS-COCO for object detection, and instance segmentation tasks. Our method outperforms FcaNet, and WaveNet and achieves the state-of-the-art results
    • โ€ฆ
    corecore