8 research outputs found
Edge Device Deployment of Multi-Tasking Network for Self-Driving Operations
A safe and robust autonomous driving system relies on accurate perception of
the environment for application-oriented scenarios. This paper proposes
deployment of the three most crucial tasks (i.e., object detection, drivable
area segmentation and lane detection tasks) on embedded system for self-driving
operations. To achieve this research objective, multi-tasking network is
utilized with a simple encoder-decoder architecture. Comprehensive and
extensive comparisons for two models based on different backbone networks are
performed. All training experiments are performed on server while Nvidia Jetson
Xavier NX is chosen as deployment device.Comment: arXiv admin note: text overlap with arXiv:1908.08926 by other author
Toward Data-Driven Digital Therapeutics Analytics: Literature Review and Research Directions
With the advent of Digital Therapeutics (DTx), the development of software as
a medical device (SaMD) for mobile and wearable devices has gained significant
attention in recent years. Existing DTx evaluations, such as randomized
clinical trials, mostly focus on verifying the effectiveness of DTx products.
To acquire a deeper understanding of DTx engagement and behavioral adherence,
beyond efficacy, a large amount of contextual and interaction data from mobile
and wearable devices during field deployment would be required for analysis. In
this work, the overall flow of the data-driven DTx analytics is reviewed to
help researchers and practitioners to explore DTx datasets, to investigate
contextual patterns associated with DTx usage, and to establish the (causal)
relationship of DTx engagement and behavioral adherence. This review of the key
components of data-driven analytics provides novel research directions in the
analysis of mobile sensor and interaction datasets, which helps to iteratively
improve the receptivity of existing DTx.Comment: This paper has been accepted by the IEEE/CAA Journal of Automatica
Sinic
Performance Evaluation of Deep Learning Based Network Intrusion Detection System across Multiple Balanced and Imbalanced Datasets
In the modern era of active network throughput and communication, the study of Intrusion Detection Systems (IDS) is a crucial role to ensure safe network resources and information from outside invasion. Recently, IDS has become a needful tool for improving flexibility and efficiency for unexpected and unpredictable invasions of the network. Deep learning (DL) is an essential and well-known tool to solve complex system problems and can learn rich features of enormous data. In this work, we aimed at a DL method for applying the effective and adaptive IDS by applying the architectures such as Convolutional Neural Network (CNN) and Long-Short Term Memory (LSTM), Recurrent Neural Network (RNN), Gated Recurrent Unit (GRU). CNN models have already proved an incredible performance in computer vision tasks. Moreover, the CNN can be applied to time-sequence data. We implement the DL models such as CNN, LSTM, RNN, GRU by using sequential data in a prearranged time range as a malicious traffic record for developing the IDS. The benign and attack records of network activities are classified, and a label is given for the supervised-learning method. We applied our approaches to three different benchmark data sets which are UNSW NB15, KDDCup ’99, NSL-KDD to show the efficiency of DL approaches. For contrast in performance, we applied CNN and LSTM combination models with varied parameters and architectures. In each implementation, we trained the models until 100 epochs accompanied by a learning rate of 0.0001 for both balanced and imbalanced train data scenarios. The single CNN and combination of LSTM models have overcome compared to others. This is essentially because the CNN model can learn high-level features that characterize the abstract patterns from network traffic records data
Performance Evaluation of Deep Learning Based Network Intrusion Detection System across Multiple Balanced and Imbalanced Datasets
In the modern era of active network throughput and communication, the study of Intrusion Detection Systems (IDS) is a crucial role to ensure safe network resources and information from outside invasion. Recently, IDS has become a needful tool for improving flexibility and efficiency for unexpected and unpredictable invasions of the network. Deep learning (DL) is an essential and well-known tool to solve complex system problems and can learn rich features of enormous data. In this work, we aimed at a DL method for applying the effective and adaptive IDS by applying the architectures such as Convolutional Neural Network (CNN) and Long-Short Term Memory (LSTM), Recurrent Neural Network (RNN), Gated Recurrent Unit (GRU). CNN models have already proved an incredible performance in computer vision tasks. Moreover, the CNN can be applied to time-sequence data. We implement the DL models such as CNN, LSTM, RNN, GRU by using sequential data in a prearranged time range as a malicious traffic record for developing the IDS. The benign and attack records of network activities are classified, and a label is given for the supervised-learning method. We applied our approaches to three different benchmark data sets which are UNSW NB15, KDDCup ’99, NSL-KDD to show the efficiency of DL approaches. For contrast in performance, we applied CNN and LSTM combination models with varied parameters and architectures. In each implementation, we trained the models until 100 epochs accompanied by a learning rate of 0.0001 for both balanced and imbalanced train data scenarios. The single CNN and combination of LSTM models have overcome compared to others. This is essentially because the CNN model can learn high-level features that characterize the abstract patterns from network traffic records data