56 research outputs found

    Towards Flexible Inductive Bias via Progressive Reparameterization Scheduling

    Full text link
    There are two de facto standard architectures in recent computer vision: Convolutional Neural Networks (CNNs) and Vision Transformers (ViTs). Strong inductive biases of convolutions help the model learn sample effectively, but such strong biases also limit the upper bound of CNNs when sufficient data are available. On the contrary, ViT is inferior to CNNs for small data but superior for sufficient data. Recent approaches attempt to combine the strengths of these two architectures. However, we show these approaches overlook that the optimal inductive bias also changes according to the target data scale changes by comparing various models' accuracy on subsets of sampled ImageNet at different ratios. In addition, through Fourier analysis of feature maps, the model's response patterns according to signal frequency changes, we observe which inductive bias is advantageous for each data scale. The more convolution-like inductive bias is included in the model, the smaller the data scale is required where the ViT-like model outperforms the ResNet performance. To obtain a model with flexible inductive bias on the data scale, we show reparameterization can interpolate inductive bias between convolution and self-attention. By adjusting the number of epochs the model stays in the convolution, we show that reparameterization from convolution to self-attention interpolates the Fourier analysis pattern between CNNs and ViTs. Adapting these findings, we propose Progressive Reparameterization Scheduling (PRS), in which reparameterization adjusts the required amount of convolution-like or self-attention-like inductive bias per layer. For small-scale datasets, our PRS performs reparameterization from convolution to self-attention linearly faster at the late stage layer. PRS outperformed previous studies on the small-scale dataset, e.g., CIFAR-100.Comment: Accepted at VIPriors ECCVW 2022, camera-ready versio

    Addressing Negative Transfer in Diffusion Models

    Full text link
    Diffusion-based generative models have achieved remarkable success in various domains. It trains a model on denoising tasks that encompass different noise levels simultaneously, representing a form of multi-task learning (MTL). However, analyzing and improving diffusion models from an MTL perspective remains under-explored. In particular, MTL can sometimes lead to the well-known phenomenon of negativeย transfer\textit{negative transfer}, which results in the performance degradation of certain tasks due to conflicts between tasks. In this paper, we aim to analyze diffusion training from an MTL standpoint, presenting two key observations: (O1)\textbf{(O1)} the task affinity between denoising tasks diminishes as the gap between noise levels widens, and (O2)\textbf{(O2)} negative transfer can arise even in the context of diffusion training. Building upon these observations, our objective is to enhance diffusion training by mitigating negative transfer. To achieve this, we propose leveraging existing MTL methods, but the presence of a huge number of denoising tasks makes this computationally expensive to calculate the necessary per-task loss or gradient. To address this challenge, we propose clustering the denoising tasks into small task clusters and applying MTL methods to them. Specifically, based on (O2)\textbf{(O2)}, we employ interval clustering to enforce temporal proximity among denoising tasks within clusters. We show that interval clustering can be solved with dynamic programming and utilize signal-to-noise ratio, timestep, and task affinity for clustering objectives. Through this, our approach addresses the issue of negative transfer in diffusion models by allowing for efficient computation of MTL methods. We validate the proposed clustering and its integration with MTL methods through various experiments, demonstrating improved sample quality of diffusion models.Comment: 22 pages, 12 figures, under revie

    Towards Practical Plug-and-Play Diffusion Models

    Full text link
    Diffusion-based generative models have achieved remarkable success in image generation. Their guidance formulation allows an external model to plug-and-play control the generation process for various tasks without fine-tuning the diffusion model. However, the direct use of publicly available off-the-shelf models for guidance fails due to their poor performance on noisy inputs. For that, the existing practice is to fine-tune the guidance models with labeled data corrupted with noises. In this paper, we argue that this practice has limitations in two aspects: (1) performing on inputs with extremely various noises is too hard for a single model; (2) collecting labeled datasets hinders scaling up for various tasks. To tackle the limitations, we propose a novel strategy that leverages multiple experts where each expert is specialized in a particular noise range and guides the reverse process at its corresponding timesteps. However, as it is infeasible to manage multiple networks and utilize labeled data, we present a practical guidance framework termed Practical Plug-And-Play (PPAP), which leverages parameter-efficient fine-tuning and data-free knowledge transfer. We exhaustively conduct ImageNet class conditional generation experiments to show that our method can successfully guide diffusion with small trainable parameters and no labeled data. Finally, we show that image classifiers, depth estimators, and semantic segmentation models can guide publicly available GLIDE through our framework in a plug-and-play manner

    A Robot Operating System Framework for Secure UAV Communications

    Get PDF
    To perform advanced operations with unmanned aerial vehicles (UAVs), it is crucial that components other than the existing ones such as flight controller, network devices, and ground control station (GCS) are also used. The inevitable addition of hardware and software to accomplish UAV operations may lead to security vulnerabilities through various vectors. Hence, we propose a security framework in this study to improve the security of an unmanned aerial system (UAS). The proposed framework operates in the robot operating system (ROS) and is designed to focus on sev-eral perspectives, such as overhead arising from additional security elements and security issues essential for flight missions. The UAS is operated in a nonnative and native ROS environment. The performance of the proposed framework in both environments is verified through experiments. ยฉ 2021 by the authors. Licensee MDPI, Basel, Switzerland.1

    KIOM-79, an Inhibitor of AGEsโ€“Protein Cross-linking, Prevents Progression of Nephropathy in Zucker Diabetic Fatty Rats

    Get PDF
    Advanced glycation end products (AGEs) have been implicated in the development of diabetic complications, including diabetic nephropathy. KIOM-79, an 80% ethanolic extract obtained from parched Puerariae Radix, gingered Magnolia Cortex, Glycyrrhiza Radix and Euphorbia Radix, was investigated for its effects on the development of renal disease in Zucker diabetic fatty rats, an animal model of type 2 diabetes. In vitro inhibitory effect of KIOM-79 on AGEs cross-linking was examined by enzyme-linked immunosorbent assay (ELISA). KIOM-79 (50 mg/kg/day) was given to Zucker diabetic fatty rats for 13 weeks. Body and kidney weight, blood glucose, glycated hemoglobin, urinary albumin and creatinine excretions were monitored. Kidney histopathology, collagen accumulation, fibrinogen and transforming growth factor-beta 1 (TGF-ฮฒ1) expression were also examined. KIOM-79 reduced blood glucose, kidney weight, histologic renal damage and albuminuria in Zucker diabetic fatty rats. KIOM-79 prevented glomerulosclerosis, tubular degeneration, collagen deposition and podocyte apoptosis. In the renal cortex, TGF-ฮฒ1, fibronectin mRNA and protein were significantly reduced by KIOM-79 treatment. KIOM-79 reduces AGEs accumulation in vivo, AGEโ€“protein cross-linking and protein oxidation. KIOM-79 could be beneficial in preventing the progression of diabetic glomerularsclerosis in type 2 diabetic rats by attenuating AGEs deposition in the glomeruli

    Posterior Epidural Migration of a Lumbar Intervertebral Disc Fragment Resembling a Spinal Tumor: A Case Report

    Get PDF
    Posterior epidural migration of a lumbar intervertebral disc fragment (PEMLIF) is uncommon because of anatomical barriers. It is difficult to diagnose PEMLIF definitively because of its relatively rare incidence and the ambiguity of radiological findings resembling spinal tumors. This case report describes a 76-year-old man with sudden-onset weakness and pain in both legs. Electromyography revealed bilateral lumbosacral polyradiculopathy with a mass-like lesion in L2-3 dorsal epidural space on lumbosacral magnetic resonance imaging (MRI). The lesion showed peripheral rim enhancement on T1-weighted MRI with gadolinium administration. The patient underwent decompressive L2-3 central laminectomy, to remove the mass-like lesion. The excised lesion was confirmed as an intervertebral disc. The possibility of PEMLIF should be considered when rim enhancement is observed in the epidural space on MRI scans and electrodiagnostic features of polyradiculopathy with sudden symptoms of cauda equina syndrome

    Association of pathway mutation with survival after recurrence in colorectal cancer patients treated with adjuvant fluoropyrimidine and oxaliplatin chemotherapy

    Get PDF
    Background Although the prognostic biomarkers associated with colorectal cancer (CRC) survival are well known, there are limited data on the association between the molecular characteristics and survival after recurrence (SAR). The purpose of this study was to assess the association between pathway mutations and SAR. Methods Of the 516 patients with stage III or high risk stage II CRC patients treated with surgery and adjuvant chemotherapy, 87 who had distant recurrence were included in the present study. We analyzed the association between SAR and mutations of 40 genes included in the five critical pathways of CRC (WNT, P53, RTK-RAS, TGF-ฮฒ, and PI3K). Results Mutation of genes within the WNT, P53, RTK-RAS, TGF-ฮฒ, and PI3K pathways were shown in 69(79.3%), 60(69.0%), 57(65.5%), 21(24.1%), and 19(21.8%) patients, respectively. Patients with TGF-ฮฒ pathway mutation were younger and had higher incidence of mucinous adenocarcinoma (MAC) histology and microsatellite instability-high. TGF-ฮฒ pathway mutation (median SAR of 21.6 vs. 44.4โ€‰months, pโ€‰=โ€‰0.021) and MAC (20.0 vs. 44.4โ€‰months, pโ€‰=โ€‰0.003) were associated with poor SAR, and receiving curative resection after recurrence was associated with favorable SAR (Not reached vs. 23.6โ€‰months, pโ€‰<โ€‰ย 0.001). Mutations in genes within other critical pathways were not associated with SAR. When MAC was excluded as a covariate, multivariate analysis revealed TGF-ฮฒ pathway mutation and curative resection after distant recurrence as an independent prognostic factor for SAR. The impact of TGF-ฮฒ pathway mutations were predicted using the PROVEAN, SIFT, and PolyPhen-2. Among 25 mutations, 23(92.0%)-24(96.0%) mutations were predicted to be damaging mutation. Conclusions Mutation in genes within TGF-ฮฒ pathway may have negative prognostic role for SAR in CRC. Other pathway mutations were not associated with SAR.This research was supported by the Seoul National University Hospital (SNUH) Research Fund (03โ€“2014-0440) and a grant of the Korea Health Technology R&D Project through the Korea Health Industry Development Institute (KHIDI), funded by the Ministry of Health & Welfare, Republic of Korea (grant number: HI14C1277 and HI13C2163). The funding bodies had no influence on the design of the study and collection, analysis, and interpretation of data and in writing the manuscript

    ๋ณด์•ˆ๋œ UAV ํ†ต์‹ ์„ ์œ„ํ•œ ๋กœ๋ด‡ ์šด์˜ ์ฒด์ œ ํ”„๋ ˆ์ž„์›Œํฌ

    No full text
    To perform advanced operations with unmanned aerial vehicles (UAVs), it is crucial that components other than the existing ones such as flight controller, network devices, and GCS are used. The feature of obstacle avoidance is added to the pre-existing simple waypoint missions to ensure the commercialization of UAVs. However, this feature requires additional hardware and software to recognize obstacles based on radar or lidar. The inevitable addition of components to accomplish this functionality may lead to security vulnerabilities through various vectors. Hence, we propose a security framework in this study to improve the security of UAS. The proposed framework operates in the ROS (robot operating system) and is designed to focus on several perspectives such as overhead arising from additional security elements and security issues essential for flight missions. The UAS is operated in a non-native and native ROS environment. The performance of the proposed framework in both environments is verified through experiments.Yโ… . INTRODUCTION 1 โ…ก. BACKGROUND 3 2.1 Unmanned Aerial System (UAS) 3 2.2 Robot Operating System (ROS) 5 2.3 Rosbridge 6 2.4 Safety tool of ROS 6 โ…ข. VULNEARABILITY DEFINITION OF ROBOT OPERATING SYSTEM 9 3.1 Vulnerability in CPS 9 3.2 UAS data transmission layer model in CPS perspective 10 3.3 Model of ROS-based UAS 11 3.4 Vulnerability of ROS-based UAS 13 โ…ฃ. RELATED WORK 15 โ…ค. PROPOSED METHOD 17 5.1 Registration of a new node 18 5.2 Signature with HMAC 19 5.3 Performance and Conceptual Comparison 21 โ…ฅ. TEST 23 6.1 Experiment environment of UAS 23 6.2 Experiment on native ROS attack 25 6.3 Experiment on non-native ROS attack 28 โ…ฆ. CONCLUSION 32 REFERENCES 33 SUMMARY (Korean) 35๋ณธ ๋…ผ๋ฌธ์€ ROS๊ฐ€ ์ ์šฉ๋œ UAS์—์„œ์˜ ์ทจ์•ฝ์ ์„ ๋ถ„์„ํ•˜๊ณ , ์ด๋ฅผ ๋ฐฉ์–ดํ•  ์ˆ˜ ์žˆ๋Š” ๋ณด์•ˆ ํ”„๋ ˆ์ž„ ์›Œํฌ๋ฅผ ์ œ์‹œํ•œ๋‹ค. ์ตœ๊ทผ ์—ฌ๋Ÿฌ ์ƒ์—…๋งค์ฒด ๋˜๋Š” ๊ตฐ์—์„œ ๋™์ž‘ํ•˜๋Š” UAV ๋Š” ๊ฐœ๋ณ„์ ์œผ๋กœ ๋™์ž‘ํ•˜๋Š” ์ „ํ†ต์ ์ธ ์ž„๋ฒ ๋””๋“œ์™€ ๋‹ฌ๋ฆฌ ์ปดํ“จํŒ… ์‹œ์Šคํ…œ๊ณผ ๋ฌผ๋ฆฌ์‹œ์Šคํ…œ์ด ๋ฐ€์ ‘ํ•œ ์ƒํ˜ธ์ž‘์šฉ์„ ํ•˜๋ฉฐ ๋™์ž‘ํ•œ๋‹ค. ์ด๋Ÿฌํ•œ ํŠน์„ฑ์„ ๊ฐ–๋Š” UAV๋ฅผ ์šด์šฉํ•˜๋Š” ์‹œ์Šคํ…œ์ธ UAS ๋Š” CPS ์˜ ํ•œ ๋ฒ”์ฃผ์— ์†ํ•œ๋‹ค. CPS ๋Š” ๊ณ„์‚ฐ, ๋„คํŠธ์›Œํ‚น, ๋ฌผ๋ฆฌ์  ํ”„๋กœ์„ธ์Šค๊ฐ€ ํ•˜๋‚˜์˜ ํ”ผ๋“œ๋ฐฑ ๋ฃจํ”„๋กœ ํ†ตํ•ฉ๋œ ์‹œ์Šคํ…œ์„ ์˜๋ฏธํ•œ๋‹ค. ์ด ์ค‘ ๋„คํŠธ์›Œํ‚น์„ ๋‹ด๋‹นํ•˜๋Š” ๋ฐ์ดํ„ฐ ์ „์†ก ๊ณ„์ธต์€ ์žฅ์†Œ, ์ƒํ™ฉ, ํ•˜๋“œ์›จ์–ด, ์†Œํ”„ํŠธ์›จ์–ด ๋“ฑ ๋‹ค์–‘ํ•œ ํ†ต์‹  ๋„คํŠธ์›Œํฌ์˜ ์ ‘๊ทผ์„ฑ์„ ๊ฐ–๋Š” CPS ์˜ ํŠน์„ฑ์œผ๋กœ ์ธํ•ด ์ทจ์•ฝํ•œ ๊ณ„์ธต์ด๋‹ค. ์ด๋Ÿฌํ•œ ์‚ฌ์‹ค์€ CPS ์˜ ์ผ๋ถ€์ธ UAS ๋„ ๊ฐ™์€ ์ทจ์•ฝ์ ์„ ๊ฐ–๊ณ  ์žˆ์Œ์„ ์˜๋ฏธํ•œ๋‹ค. ์ตœ๊ทผ UAV ์˜ ์‚ฌ์šฉ์€ ๋‹จ์ˆœํ•œ ๋น„ํ–‰ ๋ฏธ์…˜ ์ˆ˜ํ–‰๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ๊ตฐ์ง‘๋น„ํ–‰, ์ž์œจ๋น„ํ–‰ ๋“ฑ์˜ ํŠน์ˆ˜ํ•œ ๋ฏธ์…˜์„ ์ˆ˜ํ–‰ํ•œ๋‹ค. ํ•ด๋‹น ๋ฏธ์…˜์„ ์œ„ํ•ด์„œ๋Š” ์ปดํ“จํŒ… ๋Šฅ๋ ฅ์ด ์žˆ๋Š” ํ•˜๋“œ์›จ์–ด ๋ฐ ์†Œํ”„ํŠธ์›จ์–ด๊ฐ€ UAS ์— ์ถ”๊ฐ€ ๋˜์–ด์•ผํ•œ๋‹ค. ๊ทธ ์†Œํ”„ํŠธ์›จ์–ด ์ค‘ ํ•˜๋‚˜๋กœ ROS๊ฐ€ ์‚ฌ์šฉ๋˜๋ฉฐ, ์ด๋Š” ๋ณด์•ˆ์  ์š”์†Œ์˜ ๋ถ€์žฌ๋กœ ๊ณต๊ฒฉ์ž๊ฐ€ ๋กœ๋ด‡ ์‹œ์Šคํ…œ์„ ๋ง๊ฐ€๋œจ๋ฆฌ๋Š” ๊ฒƒ์„ ํ—ˆ์šฉํ•œ๋‹ค. ์šฐ๋ฆฌ๋Š” ROS ์˜ ๋ณด์•ˆ์„ ์œ„ํ•ด ๊ธฐ์กด์— ์—ฐ๊ตฌ๋œ ๋‚ด์šฉ์„ ์กฐ์‚ฌํ•˜์˜€์œผ๋ฉฐ, ํ•ด๋‹น ๋ฐฉ๋ฒ•์ด UAS ์— ์ ์šฉ ๊ฐ€๋Šฅํ•œ์ง€ ์—ฌ๋ถ€๋ฅผ ๋ถ„์„ํ•˜์˜€๋‹ค. ์šฐ๋ฆฌ๋Š” ์‹œ๊ฐ„์— ๋ฏผ๊ฐํ•œ UAS ์— ์ ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ๊ฐ€๋ฒผ์šด ์˜ค๋ฒ„ํ—ค๋“œ๋ฅผ ๊ฐ–๋Š” ๋ณด์•ˆ ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ์ œ์•ˆํ•œ๋‹ค. ๋˜ํ•œ ROS ๋ฅผ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ๋‘ ๊ฐ€์ง€ ์ ‘๊ทผ๋ฒ•์ธ native ROS ์™€ non-native ROS ํ™˜๊ฒฝ์—์„œ ์‹ค์ œ ์‹คํ—˜์„ ํ†ตํ•ด ๋ณด์•ˆ ํ”„๋ ˆ์ž„์›Œํฌ์˜ ์„ฑ๋Šฅ์„ ๊ฒ€์ฆํ•œ๋‹คMasterdCollectio
    • โ€ฆ
    corecore