82 research outputs found
Visualization of Deep Convolutional Neural Networks
Deep learning has achieved great accuracy in large scale image classification and scene recognition tasks, especially after the Convolutional Neural Network (CNN) model was introduced. Although a CNN often demonstrates very good classification results, it is usually unclear how or why a classification result is achieved. The objective of this thesis is to explore several existing visualization approaches which offer intuitive visual results. The thesis focuses on three visualization approaches: (1) image masking which highlights the region of image with high influence on the classification, (2) Taylor decomposition back-propagation which generates a per pixel heat map that describes each pixel\u27s effect on the classification, and (3) Inception which generates a natural looking image based on the features maximizing the classification score. We explore two challenging visualization tasks, (1) visualizing a model classifying images based on the time when they are taken, and (2) visualizing a model of predicting plant phenotypes (specifically wheat heading percentage). The thesis demonstrates how these visualization approaches work for both the classification model and regression model, and evaluates the results on real-world imagery
Public Places Safety Management Evaluation of Railway Stations
AbstractWith more and more attentions paid to safety problems in public places by the whole society, preventions and controls of unexpected events in the crowded places of railway stations are especially important. Aimed at the safety problems in railway station, such as crowded people, complex environment, weak management and so on, in order to make the public places safety management of railway stations more effective, through analysis of public places system safety features and hidden dangers of railway stations, public places safety management evaluation indicators system is constructed and aimed at every specific indicator. Corresponding safety management and control requirements are put forward. Taking Xi’an Railway Station as the example, Analytic Hierarchy Process (AHP) is used to get indicators weight values. Public places safety main control factor is obtained by analysis. According to the evaluation results, aimed at the weak links in safety management, improvement measures are put forward, supplying an important basis of perfect safety management system and improvement of safety management
Correcting soft errors online in fast fourier transform
While many algorithm-based fault tolerance (ABFT) schemes have been proposed to detect soft errors offline in the fast Fourier transform (FFT) after computation finishes, none of the existing ABFT schemes detect soft errors online before the computation finishes. This paper presents an online ABFT scheme for FFT so that soft errors can be detected online and the corrupted computation can be terminated in a much more timely manner. We also extend our scheme to tolerate both arithmetic errors and memory errors, develop strategies to reduce its fault tolerance overhead and improve its numerical stability and fault coverage, and finally incorporate it into the widely used FFTW library - one of the today's fastest FFT software implementations. Experimental results demonstrate that: (1) the proposed online ABFT scheme introduces much lower overhead than the existing offline ABFT schemes; (2) it detects errors in a much more timely manner; and (3) it also has higher numerical stability and better fault coverage
Look Closer to Your Enemy: Learning to Attack via Teacher-Student Mimicking
Deep neural networks have significantly advanced person re-identification
(ReID) applications in the realm of the industrial internet, yet they remain
vulnerable. Thus, it is crucial to study the robustness of ReID systems, as
there are risks of adversaries using these vulnerabilities to compromise
industrial surveillance systems. Current adversarial methods focus on
generating attack samples using misclassification feedback from victim models
(VMs), neglecting VM's cognitive processes. We seek to address this by
producing authentic ReID attack instances through VM cognition decryption. This
approach boasts advantages like better transferability to open-set ReID tests,
easier VM misdirection, and enhanced creation of realistic and undetectable
assault images. However, the task of deciphering the cognitive mechanism in VM
is widely considered to be a formidable challenge. In this paper, we propose a
novel inconspicuous and controllable ReID attack baseline, LCYE (Look Closer to
Your Enemy), to generate adversarial query images. Specifically, LCYE first
distills VM's knowledge via teacher-student memory mimicking the proxy task.
This knowledge prior serves as an unambiguous cryptographic token,
encapsulating elements deemed indispensable and plausible by the VM, with the
intent of facilitating precise adversarial misdirection. Further, benefiting
from the multiple opposing task framework of LCYE, we investigate the
interpretability and generalization of ReID models from the view of the
adversarial attack, including cross-domain adaption, cross-model consensus, and
online learning process. Extensive experiments on four ReID benchmarks show
that our method outperforms other state-of-the-art attackers with a large
margin in white-box, black-box, and target attacks. The source code can be
found at https://github.com/MingjieWang0606/LCYE-attack_reid
DistillBEV: Boosting Multi-Camera 3D Object Detection with Cross-Modal Knowledge Distillation
3D perception based on the representations learned from multi-camera
bird's-eye-view (BEV) is trending as cameras are cost-effective for mass
production in autonomous driving industry. However, there exists a distinct
performance gap between multi-camera BEV and LiDAR based 3D object detection.
One key reason is that LiDAR captures accurate depth and other geometry
measurements, while it is notoriously challenging to infer such 3D information
from merely image input. In this work, we propose to boost the representation
learning of a multi-camera BEV based student detector by training it to imitate
the features of a well-trained LiDAR based teacher detector. We propose
effective balancing strategy to enforce the student to focus on learning the
crucial features from the teacher, and generalize knowledge transfer to
multi-scale layers with temporal fusion. We conduct extensive evaluations on
multiple representative models of multi-camera BEV. Experiments reveal that our
approach renders significant improvement over the student models, leading to
the state-of-the-art performance on the popular benchmark nuScenes.Comment: ICCV 202
CEAZ: Accelerating Parallel I/O via Hardware-Algorithm Co-Design of Efficient and Adaptive Lossy Compression
As supercomputers continue to grow to exascale, the amount of data that needs
to be saved or transmitted is exploding. To this end, many previous works have
studied using error-bounded lossy compressors to reduce the data size and
improve the I/O performance. However, little work has been done for effectively
offloading lossy compression onto FPGA-based SmartNICs to reduce the
compression overhead. In this paper, we propose a hardware-algorithm co-design
of efficient and adaptive lossy compressor for scientific data on FPGAs (called
CEAZ) to accelerate parallel I/O. Our contribution is fourfold: (1) We propose
an efficient Huffman coding approach that can adaptively update Huffman
codewords online based on codewords generated offline (from a variety of
representative scientific datasets). (2) We derive a theoretical analysis to
support a precise control of compression ratio under an error-bounded
compression mode, enabling accurate offline Huffman codewords generation. This
also helps us create a fixed-ratio compression mode for consistent throughput.
(3) We develop an efficient compression pipeline by adopting cuSZ's
dual-quantization algorithm to our hardware use case. (4) We evaluate CEAZ on
five real-world datasets with both a single FPGA board and 128 nodes from
Bridges-2 supercomputer. Experiments show that CEAZ outperforms the second-best
FPGA-based lossy compressor by 2X of throughput and 9.6X of compression ratio.
It also improves MPI_File_write and MPI_Gather throughputs by up to 25.8X and
24.8X, respectively.Comment: 14 pages, 17 figures, 8 table
- …