106 research outputs found

    An empirical evaluation of nuclei segmentation from H&E images in a real application scenario

    Get PDF
    Cell nuclei segmentation is a challenging task, especially in real applications, when the target images significantly differ between them. This task is also challenging for methods based on convolutional neural networks (CNNs), which have recently boosted the performance of cell nuclei segmentation systems. However, when training data are scarce or not representative of deployment scenarios, they may suffer from overfitting to a different extent, and may hardly generalise to images that differ from the ones used for training. In this work, we focus on real-world, challenging application scenarios when no annotated images from a given dataset are available, or when few images (even unlabelled) of the same domain are available to perform domain adaptation. To simulate this scenario, we performed extensive cross-dataset experiments on several CNN-based state-of-the-art cell nuclei segmentation methods. Our results show that some of the existing CNN-based approaches are capable of generalising to target images which resemble the ones used for training. In contrast, their effectiveness considerably degrades when target and source significantly differ in colours and scale

    Scene-specific crowd counting using synthetic training images

    Get PDF
    Crowd counting is a computer vision task on which considerable progress has recently been made thanks to convolutional neural networks. However, it remains a challenging task even in scene-specific settings, in real-world application scenarios where no representative images of the target scene are available, not even unlabelled, for training or fine-tuning a crowd counting model. Inspired by previous work in other computer vision tasks, we propose a simple but effective solution for the above application scenario, which consists of automatically building a scene-specific training set of synthetic images. Our solution does not require from end-users any manual annotation effort nor the collection of representative images of the target scene. Extensive experiments on several benchmark data sets show that the proposed solution can improve the effectiveness of existing crowd counting methods

    Is Feature Selection Secure against Training Data Poisoning?

    Get PDF
    Learning in adversarial settings is becoming an important task for application domains where attackers may inject malicious data into the training set to subvert normal operation of data-driven technologies. Feature selection has been widely used in machine learning for security applications to improve generalization and computational efficiency, although it is not clear whether its use may be beneficial or even counterproductive when training data are poisoned by intelligent attackers. In this work, we shed light on this issue by providing a framework to investigate the robustness of popular feature selection methods, including LASSO, ridge regression and the elastic net. Our results on malware detection show that feature selection methods can be significantly compromised under attack (we can reduce LASSO to almost random choices of feature sets by careful insertion of less than 5% poisoned training samples), highlighting the need for specific countermeasures

    Thermo-visual feature fusion for object tracking using multiple spatiogram trackers

    Get PDF
    In this paper, we propose a framework that can efficiently combine features for robust tracking based on fusing the outputs of multiple spatiogram trackers. This is achieved without the exponential increase in storage and processing that other multimodal tracking approaches suffer from. The framework allows the features to be split arbitrarily between the trackers, as well as providing the flexibility to add, remove or dynamically weight features. We derive a mean-shift type algorithm for the framework that allows efficient object tracking with very low computational overhead. We especially target the fusion of thermal infrared and visible spectrum features as the most useful features for automated surveillance applications. Results are shown on multimodal video sequences clearly illustrating the benefits of combining multiple features using our framework

    Initial Experimental Tests of an ANN-Based Microwave Imaging Technique for Neck Diagnostics

    Get PDF
    In this letter, a microwave imaging strategy based on an artificial neural network (ANN) is applied, for the first time, to experimental data gathered from simplified neck phantoms. The ANN is used for solving the underlying inverse scattering problem, with the aim of retrieving the dielectric properties of the neck for monitoring and diagnostic purposes. The ANN is trained using simulated phantoms, to overcome the limited availability of experimental data. First, a simple configuration with a liquid-filled glass beaker is tested. Then, simplified 3-D-printed models of the human neck are considered. The preliminary findings indicate the possibility of training the network with numerical simulations and testing it against experimental measurements

    A wireless sensors network for monitoring the Carasau bread manufacturing process

    Get PDF
    This work copes with the design and implementation of a wireless sensors network architecture to automatically and continuously monitor, for the first time, the manufacturing process of Sardinian Carasau bread. The case of a traditional bakery company facing the challenge of the Food-Industry 4.0 competitiveness is investigated. The process was analyzed to identify the most relevant variables to be monitored during the product manufacturing. Then, a heterogeneous, multi-tier wireless sensors network was designed and realized to allow the real-time control and the data collection during the critical steps of dough production, sheeting, cutting and leavening. Commercial on-the-shelf and cost-effective integrated electronics were employed, making the proposed approach of interest for many practical cases. Finally, a user-friendly interface was provided to enhance the understanding, control and to favor the process monitoring. With the wireless senors network (WSN) we designed, it is possible to monitor environmental parameters (temperature, relative humidity, gas concentrations); cinematic quantities of the belts; and, through a dedicated image processing system, the morphological characteristics of the bread before the baking. The functioning of the WSN was demonstrated and a statistical analysis was performed on the variables monitored during different seasons

    DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation

    Full text link
    Image spam emails are often used to evade text-based spam filters that detect spam emails with their frequently used keywords. In this paper, we propose a new image spam email detection tool called DeepCapture using a convolutional neural network (CNN) model. There have been many efforts to detect image spam emails, but there is a significant performance degrade against entirely new and unseen image spam emails due to overfitting during the training phase. To address this challenging issue, we mainly focus on developing a more robust model to address the overfitting problem. Our key idea is to build a CNN-XGBoost framework consisting of eight layers only with a large number of training samples using data augmentation techniques tailored towards the image spam detection task. To show the feasibility of DeepCapture, we evaluate its performance with publicly available datasets consisting of 6,000 spam and 2,313 non-spam image samples. The experimental results show that DeepCapture is capable of achieving an F1-score of 88%, which has a 6% improvement over the best existing spam detection model CNN-SVM with an F1-score of 82%. Moreover, DeepCapture outperformed existing image spam detection solutions against new and unseen image datasets.Comment: 15 pages, single column. ACISP 2020: Australasian Conference on Information Security and Privac

    A Robust SVM Color-Based Food Segmentation Algorithm for the Production Process of a Traditional Carasau Bread

    Get PDF
    In this paper, we address the problem of automatic image segmentation methods applied to the partial automation of the production process of a traditional Sardinian flatbread called pane Carasau for assuring quality control. The study focuses on one of the most critical activities for obtaining an efficient degree of automation: the estimation of the size and shape of the bread sheets during the production phase, to study the shape variations undergone by the sheet depending on some environmental and production variables. The knowledge can thus be used to create a system capable of predicting the quality of the shape of the dough produced and empower the production process. We implemented an image acquisition system and created an efficient machine learning algorithm, based on support vector machines, for the segmentation and estimation of image measurements for Carasau bread. Experiments demonstrated that the method can successfully achieve accurate segmentation of bread sheets images, ensuring that the dimensions extracted are representative of the sheets coming from the production process. The algorithm proved to be fast and accurate in estimating the size of the bread sheets in various scenarios that occurred over a year of acquisitions. The maximum error committed by the algorithm is equal to the 2.2% of the pixel size in the worst scenario and to 1.2% elsewhere

    A Hybrid Spam Detection Method Based on Unstructured Datasets

    Get PDF
    This document is the accepted manuscript version of the following article: Shao, Y., Trovati, M., Shi, Q. et al. Soft Comput (2017) 21: 233. The final publication is available at Springer via http://dx.doi.org/10.1007/s00500-015-1959-z. © Springer-Verlag Berlin Heidelberg 2015.The identification of non-genuine or malicious messages poses a variety of challenges due to the continuous changes in the techniques utilised by cyber-criminals. In this article, we propose a hybrid detection method based on a combination of image and text spam recognition techniques. In particular, the former is based on sparse representation-based classification, which focuses on the global and local image features, and a dictionary learning technique to achieve a spam and a ham sub-dictionary. On the other hand, the textual analysis is based on semantic properties of documents to assess the level of maliciousness. More specifically, we are able to distinguish between meta-spam and real spam. Experimental results show the accuracy and potential of our approach.Peer reviewedFinal Accepted Versio
    corecore