scholarly journals Toward the development of a feature-space representation for a complex natural category domain

2017 ◽  
Vol 50 (2) ◽  
pp. 530-556 ◽  
Author(s):  
Robert M. Nosofsky ◽  
Craig A. Sanders ◽  
Brian J. Meagher ◽  
Bruce J. Douglas
2021 ◽  
Author(s):  
Sibghatullah I. Khan ◽  
Vikram Palodiya ◽  
Lavanya Poluboyina

Abstract Bronchiectasis and chronic obstructive pulmonary disease (COPD) are common human lung diseases. In general, the expert pulmonologistcarries preliminary screening and detection of these lung abnormalities by listening to the adventitious lung sounds. The present paper is an attempt towards the automatic detection of adventitious lung sounds ofBronchiectasis,COPD from normal lung sounds of healthy subjects. For classification of the lung sounds into a normaland adventitious category, we obtain features from phase space representation (PSR). At first, the empirical mode decomposition (EMD) is applied to lung sound signals to obtain intrinsic mode functions (IMFs). The IMFs are then further processed to construct two dimensional (2D) and three dimensional (3D) PSR. The feature space includes the 95% confidence ellipse area and interquartile range (IQR) of Euclidian distances computed from 2D and 3D PSRs, respectively. The process is carried out for the first four IMFs correspondings to normal and adventitious lung sound signals. The computed features depicta significant ability to discriminate the two categories of lung sound signals.To perform classification, we use the least square support vector machine with two kernels, namely, polynomial and radial basis function (RBF).Simulation outcomes on ICBHI 2017 lung sound dataset show the ability of the proposed method in effectively classifying normal and adventitious lung sound signals. LS-SVM is employing RBF kernel provides the highest classification accuracy of 97.67 % over feature space constituted by first, second, and fourth IMF.


2019 ◽  
Vol 3 (1) ◽  
pp. 13-33 ◽  
Author(s):  
Robert M. Nosofsky ◽  
Craig A. Sanders ◽  
Brian J. Meagher ◽  
Bruce J. Douglas

Author(s):  
Caixia Sun ◽  
Lian Zou ◽  
Cien Fan ◽  
Yu Shi ◽  
Yifeng Liu

Deep neural networks are vulnerable to adversarial examples, which can fool models by adding carefully designed perturbations. An intriguing phenomenon is that adversarial examples often exhibit transferability, thus making black-box attacks effective in real-world applications. However, the adversarial examples generated by existing methods typically overfit the structure and feature representation of the source model, resulting in a low success rate in a black-box manner. To address this issue, we propose the multi-scale feature attack to boost attack transferability, which adjusts the internal feature space representation of the adversarial image to get far to the internal representation of the original image. We show that we can select a low-level layer and a high-level layer of the source model to conduct the perturbations, and the crafted adversarial examples are confused with original images, not just in the class but also in the feature space representations. To further improve the transferability of adversarial examples, we apply reverse cross-entropy loss to reduce the overfitting further and show that it is effective for attacking adversarially trained models with strong defensive ability. Extensive experiments show that the proposed methods consistently outperform the iterative fast gradient sign method (IFGSM) and momentum iterative fast gradient sign method (MIFGSM) under the challenging black-box setting.


2014 ◽  
Vol 11 (1) ◽  
pp. 288-292 ◽  
Author(s):  
Sergio Bernabe ◽  
Prashanth Reddy Marpu ◽  
Antonio Plaza ◽  
Mauro Dalla Mura ◽  
Jon Atli Benediktsson

2020 ◽  
pp. 442-448
Author(s):  
Vladyslav Hamolia ◽  
Viktor Melnyk ◽  
Pavlo Zhezhnych ◽  
Anna Shilinh

Anomaly detection (AD) identifies samples that are not related to the overall distribution in the feature space. This problem has a long history of research through diverse methods, including statistical and modern Deep Neural Networks (DNN) methods. Non-trivial tasks such as covering ambiguous user actions and the complexity of standard algorithms challenged researchers. This article discusses the results of introducing an intrusion detection system using a machine learning (ML) approach. We compared these results with the characteristics of the most common existing rule-based Snort system. Signature Based Intrusion Detection System (SBIDS) has critical limitations well observed in a large number of previous studies. The crucial disadvantage is the limited variety of the same attack type due to the predetermination of all the rules. DNN solves this problem with long short-term memory (LSTM). However, requiring the amount of data and resources for training, this solution is not suitable for a real-world system. This necessitated a compromise solution based on DNN and latent space techniques.


2009 ◽  
Vol 16-19 ◽  
pp. 1020-1024
Author(s):  
Yu Ming Gu ◽  
Jie Liu ◽  
Kuo Liu ◽  
Zhao Yao

Aiming at the shortcoming of feature space representation in traditional mean shift, we propose an improved object tracking method. At first, the target model region is segmented into overlapped square, and their histograms are computed. Then, the feature space is constituted which has introduced spatial information into. So the accuracy is enhanced. After computing the feature space of target candidate region, the mean shift is employed to find the new target location. The result shows that the improved method can track the object more robust, accurately and quickly.


2003 ◽  
Vol 22 (9) ◽  
pp. 1152-1162 ◽  
Author(s):  
Xiao-Peng Hu ◽  
L. Dempere-Marco ◽  
Guang-Zhong Yang

Sign in / Sign up

Export Citation Format

Share Document