IEEE Transactions on Industrial Informatics, volume 17, issue 8, pages 5790-5798

Siamese Neural Network Based Few-Shot Learning for Anomaly Detection in Industrial Cyber-Physical Systems

Publication typeJournal Article
Publication date2021-08-01
scimago Q1
SJR4.420
CiteScore24.1
Impact factor11.7
ISSN15513203, 19410050
Computer Science Applications
Electrical and Electronic Engineering
Information Systems
Control and Systems Engineering
Abstract
With the increasing population of Industry 4.0, both AI and smart techniques have been applied and become hotly discussed topics in industrial cyber-physical systems (CPS). Intelligent anomaly detection for identifying cyber-physical attacks to guarantee the work efficiency and safety is still a challenging issue, especially when dealing with few labeled data for cyber-physical security protection. In this article, we propose a few-shot learning model with Siamese convolutional neural network (FSL-SCNN), to alleviate the over-fitting issue and enhance the accuracy for intelligent anomaly detection in industrial CPS. A Siamese CNN encoding network is constructed to measure distances of input samples based on their optimized feature representations. A robust cost function design including three specific losses is then proposed to enhance the efficiency of training process. An intelligent anomaly detection algorithm is developed finally. Experiment results based on a fully labeled public dataset and a few labeled dataset demonstrate that our proposed FSL-SCNN can significantly improve false alarm rate (FAR) and F1 scores when detecting intrusion signals for industrial CPS security protection.
Sun X., Xv H., Dong J., Zhou H., Chen C., Li Q.
2021-04-01 citations by CoLab: 64 Abstract  
Learning to recognize novel visual categories from a few examples is a challenging task for machines in real-world industrial applications. In contrast, humans have the ability to discriminate even similar objects with little supervision. This article attempts to address the few-shot fine-grained image classification problem. We propose a feature fusion model to explore discriminative features by focusing on key regions. The model utilizes the focus-area location mechanism to discover the perceptually similar regions among objects. High-order integration is employed to capture the interaction information among intraparts. We also design a center neighbor loss to form robust embedding space distributions. Furthermore, we build a typical fine-grained and few-shot learning dataset miniPPlankton from the real-world application in the area of marine ecological environments. Extensive experiments are carried out to validate the performance of our method. The results demonstrate that our model achieves competitive performance compared with state-of-the-art models. Our work is a valuable complement to the model domain-specific industrial applications.
Lu J., Jin S., Liang J., Zhang C.
2021-04-01 citations by CoLab: 36 Abstract  
Few-shot learning (FSL) focuses on distilling transferrable knowledge from existing experience to cope with novel concepts for which the labeled data are scarce. A typical assumption in FSL is that the training examples of novel classes are all clean with no outlier interference. In many realistic applications where examples are provided by users, however, data are potentially noisy or unreadable. In this context, we introduce a novel research topic, robust FSL (RFSL), where we aim to address two types of outliers within user-provided data: the representation outlier (RO) and the label outlier (LO). Moreover, we introduce a metric for estimating robustness and use it to investigate the performance of several advanced methods to FSL when faced with user-provided outliers. In addition, we propose robust attentive profile networks (RapNets) to achieve outlier suppression. The results of a comprehensive evaluation of benchmark data sets demonstrate the shortcomings of current FSL methods and the superiority of the proposed RapNets when dealing with RFSL problems, establishing a benchmark for follow-up studies.
Droghini D., Squartini S., Principi E., Gabrielli L., Piazza F.
2021-03-01 citations by CoLab: 18 Abstract  
In the recent years, several supervised and unsupervised approaches to fall detection have been presented in the literature. These are generally based on a corpus of examples of human falls that are, though, hard to collect. For this reason, fall detection algorithms should be designed to gather as much information as possible from the few available data related to the type of events to be detected. The one-shot learning paradigm for expert systems training seems to naturally match these constraints, and this inspired the novel Siamese Neural Network (SNN) architecture for human fall detection proposed in this contribution. Acoustic data are employed as input, and the twin convolutional autoencoders composing the SNN are trained to perform a suitable metric learning in the audio domain and, thus, extract robust features to be used in the final classification stage. A large acoustic dataset has been recorded in three real rooms with different floor types and human falls performed by four volunteers, and then adopted for experiments. Obtained results show that the proposed approach, which only relies on two real human fall events in the training phase, achieves a F$_1$-Measure of 93.58% during testing, remarkably outperforming the recent supervised and unsupervised state-of-art techniques selected for comparison.
Gu K., Zhang Y., Qiao J.
2021-03-01 citations by CoLab: 92 Abstract  
In each petrochemical plant around the world, the flare stack as a requisite facility produces a large amount of soot due to the incomplete combustion of flare gas, and this strongly endangers air quality and human health. Despite severe damages, the abovementioned abnormal conditions rarely occur, and, thus, only few-shot samples are available. To address such difficulty, in this article, we design an image-based flare soot density recognition network (FSDR-Net) via a new ensemble meta-learning technology. More particularly, we first train a deep convolutional neural network (CNN) by applying the model-agnostic meta-learning algorithm on a variety of learning tasks that are relevant to the flare soot recognition so as to obtain the general-purpose optimized initial parameters (GOIP). Second, for the new task of recognizing the flare soot density via only few-shot instances, a new ensemble is developed to selectively aggregate several predictions that are generated based on a wide range of learning rates and a small number of gradient steps. Results of experiments conducted on the density recognition of flare soot corroborate the superiority of our proposed FSDR-Net as compared with the popular and state-of-the-art deep CNNs.
Pearce H., Pinisetty S., Roop P.S., Kuo M.M., Ukil A.
2020-07-01 citations by CoLab: 38 Abstract  
Cyber-physical systems (CPSs) are implemented in many industrial and embedded control applications. Where these systems are safety-critical, correct and safe behavior is of paramount importance. Malicious attacks on such CPSs can have far-reaching repercussions. For instance, if elements of a power grid behave erratically, physical damage and loss of life could occur. Currently, there is a trend toward increased complexity and connectivity of CPS. However, as this occurs, the potential attack vectors for these systems grow in number, increasing the risk that a given controller might become compromised. In this article, we examine how the dangers of compromised controllers can be mitigated. We propose a novel application of runtime enforcement that can secure the safety of real-world physical systems. Here, we synthesize enforcers to a new hardware architecture within programmable logic controller I/O modules to act as an effective line of defence between the cyber and the physical domains. Our enforcers prevent the physical damage that a compromised control system might be able to perform. To demonstrate the efficacy of our approach, we present several benchmarks, and show that the overhead for each system is extremely minimal.
Sun Q., Zhang K., Shi Y.
2020-07-01 citations by CoLab: 182 Abstract  
This article presents a resilient model predictive control (MPC) framework to attenuate adverse effects of denial-of-service (DoS) attacks for cyber-physical systems (CPSs), where the system dynamics is modeled by a linear time-invariant system. A DoS attacker targets at blocking the controller to actuator (C-A) communication channel by launching adversarial jamming signals. We show that, in order to guarantee exponential stability of the closed-loop system, several conditions for resilient MPC should be satisfied. And these established conditions are explicitly related to the duration of DoS attacks and MPC parameters such as the prediction horizon and the terminal constraint. Two key techniques, including the μ-step positively invariant set and the modified initial feasible set are exploited for achieving exponential stability in the presence of DoS attacks. Moreover, the maximum allowable duration of the DoS attacker is also obtained by using the μ-step positively invariant set. Finally, the effectiveness of the proposed MPC algorithm is verified by simulated studies and comparisons.
Farivar F., Haghighi M.S., Jolfaei A., Alazab M.
2020-04-01 citations by CoLab: 216 Abstract  
This article proposes a hybrid intelligent-classic control approach for reconstruction and compensation of cyber attacks launched on inputs of nonlinear cyber-physical systems (CPS) and industrial Internet of Things systems, which work through shared communication networks. In this article, a class of n-order nonlinear systems is considered as a model of CPS while it is in presence of cyber attacks only in the forward channel. An intelligent-classic control system is developed to compensate cyber-attacks. Neural network (NN) is designed as an intelligent estimator for attack estimation and a classic nonlinear control system based on the variable structure control method is designed to compensate the effect of attacks and control the system performance in tracking applications. In the proposed strategy, nonlinear control theory is applied to guarantee the stability of the system when attacks happen. In this strategy, a Gaussian radial basis function NN is used for online estimation and reconstruction of cyber-attacks launched on the networked system. An adaptation law of the intelligent estimator is derived from a Lyapunov function. Simulation results demonstrate the validity and feasibility of the proposed strategy in car cruise control application as the testbed.
Huang S., Liu Y., Fung C., An W., He R., Zhao Y., Yang H., Luan Z.
2020-01-01 citations by CoLab: 12 Abstract  
Anomaly detection, as one of the most important problems in the domain of network and service management, has been widely studied in statistics and machine learning. The supervised methods with plenty of labeled data have achieved great success in anomaly detection, but cannot integrate new anomaly types. In this paper, we propose a few-shot learning model for anomaly detection. Our model is trained with labeled data, and is then tested in terms of its ability to learn how to detect new types, given examples of the unseen classes. Due to a gap between the known anomaly data and unseen anomaly data, we designed a gated network structure to tackle the imbalanced data problem, to which we added a gate structure to aggregate known anomaly types and unknown types. We evaluated our proposed method based on the anomaly dataset NSL-KDD and our experimental results show that the proposed method achieved the state-of-the-art results in few-shot settings.
Shen Y., Shi Y., Zhang J., Letaief K.B.
2020-01-01 citations by CoLab: 92 Abstract  
Effective resource management plays a pivotal role in wireless networks, which, unfortunately, typically results in challenging mixed-integer nonlinear programming (MINLP) problems. Machine learning-based methods have recently emerged as a disruptive way to obtain near-optimal performance for MINLPs with affordable computational complexity. There have been some attempts in applying such methods to resource management in wireless networks, but these attempts require huge amounts of training samples and lack the capability to handle constrained problems. Furthermore, they suffer from severe performance deterioration when the network parameters change, which commonly happens and is referred to as the task mismatch problem. In this paper, to reduce the sample complexity and address the feasibility issue, we propose a framework of Learning to Optimize for Resource Management (LORM). In contrast to the end-to-end learning approach adopted in previous studies, LORM learns the optimal pruning policy in the branch-and-bound algorithm for MINLPs via a sample-efficient method, namely, imitation learning . To further address the task mismatch problem, we develop a transfer learning method via self-imitation in LORM, named LORM-TL , which can quickly adapt a pre-trained machine learning model to the new task with only a few additional unlabeled training samples. Numerical simulations demonstrate that LORM outperforms specialized state-of-the-art algorithms and achieves near-optimal performance, while providing significant speedup compared with the branch-and-bound algorithm. Moreover, LORM-TL, by relying on a few unlabeled samples, achieves comparable performance with the model trained from scratch with sufficient labeled samples.
Das D., Lee C.S.
2020-01-01 citations by CoLab: 121 Abstract  
This paper proposes a multi-layer neural network structure for few-shot image recognition of novel categories. The proposed multi-layer neural network architecture encodes transferable knowledge extracted from a large annotated dataset of base categories. This architecture is then applied to novel categories containing only a few samples. The transfer of knowledge is carried out at the feature-extraction and the classification levels distributed across the two training stages. In the first-training stage, we introduce the relative feature to capture the structure of the data as well as obtain a low-dimensional discriminative space. Secondly, we account for the variable variance of different categories by using a network to predict the variance of each class. Classification is then performed by computing the Mahalanobis distance to the mean-class representation in contrast to previous approaches that used the Euclidean distance. In the second-training stage, a category-agnostic mapping is learned from the mean-sample representation to its corresponding class-prototype representation. This is because the mean-sample representation may not accurately represent the novel category prototype. Finally, we evaluate the proposed network structure on four standard few-shot image recognition datasets, where our proposed few-shot learning system produces competitive performance compared to previous work. We also extensively studied and analyzed the contribution of each component of our proposed framework.
Kim S., Won Y., Park I., Eun Y., Park K.
IEEE Internet of Things Journal scimago Q1 wos Q1
2019-08-01 citations by CoLab: 46 Abstract  
A cyber-physical system (CPS) is an entanglement of physical and computing systems by real-time information exchange through networking, which can be considered as real-time IoT because of end-to-end real-time performance guarantee. Most societal infrastructures, such as transportation systems, smart power grid, smart factory, and smart buildings, are key application domains of CPS. Though there have been extensive studies on infrastructures from the perspective of cyber security, insufficient research has been conducted from a practical viewpoint of cyber-physical security. In this paper, we focus on train control systems as one of the critical infrastructures. We fully investigate the emerging de facto standard of train control systems, communication-based train control (CBTC). We analyze the cyber-physical vulnerability of CBTC and discover that a man-in-the-middle attack combined with knowledge on train signaling can cause train collisions in CBTC. To resolve the issue, we propose a countermeasure for resiliency of CBTC. By implementing a realistic CBTC testbed, we validate our analysis. To the best of our knowledge, this is the first in-depth empirical study on cyber-physical vulnerability of CBTC systems.
Perez-Cabo D., Jimenez-Cabello D., Costa-Pazo A., Lopez-Sastre R.J.
2019-06-01 citations by CoLab: 41 Abstract  
Face recognition has achieved unprecedented results, surpassing human capabilities in certain scenarios. However, these automatic solutions are not ready for production because they can be easily fooled by simple identity impersonation attacks. And although much effort has been devoted to develop face anti-spoofing models, their generalization capacity still remains a challenge in real scenarios. In this paper, we introduce a novel approach that reformulates the Generalized Presentation Attack Detection (GPAD) problem from an anomaly detection perspective. Technically, a deep metric learning model is proposed, where a triplet focal loss is used as a regularization for a novel loss coined "metric-softmax", which is in charge of guiding the learning process towards more discriminative feature representations in an embedding space. Finally, we demonstrate the benefits of our deep anomaly detection architecture, by introducing a few-shot a posteriori probability estimation that does not need any classifier to be trained on the learned features. We conduct extensive experiments using the GRAD-GPAD framework that provides the largest aggregated dataset for face GPAD. Results confirm that our approach is able to outperform all the state-of-the-art methods by a considerable margin.
Li F., Shi Y., Shinde A., Ye J., Song W.
IEEE Internet of Things Journal scimago Q1 wos Q1
2019-06-01 citations by CoLab: 94 Abstract  
Internet of Things (IoT) are vulnerable to both cyber and physical attacks. Therefore, a cyber-physical security system against different kinds of attacks is in high demand. Traditionally, attacks are detected via monitoring system logs. However, the system logs, such as network statistics and file access records, can be forged. Furthermore, existing solutions mainly target cyber attacks. This paper proposes the first energy auditing and analytics-based IoT monitoring mechanism. To our best knowledge, this is the first attempt to detect and identify IoT cyber and physical attacks based on energy auditing. Using the energy meter readings, we develop a dual deep learning (DL) model system, which adaptively learns the system behaviors in a normal condition. Unlike the previous single DL models for energy disaggregation, we propose a disaggregation-aggregation architecture. The innovative design makes it possible to detect both cyber and physical attacks. The disaggregation model analyzes the energy consumptions of system subcomponents, e.g., CPU, network, disk, etc., to identify cyber attacks, while the aggregation model detects the physical attacks by characterizing the difference between the measured power consumption and prediction results. Using energy consumption data only, the proposed system identifies both cyber and physical attacks. The system and algorithm designs are described in detail. In the hardware simulation experiments, the proposed system exhibits promising performances.
Wang T., Xu J., Zhang W., Gu Z., Zhong H.
2018-03-01 citations by CoLab: 42 Abstract  
Monitoring is the key to guarantee the reliability of cloud computing systems. By analyzing monitoring data, administrators can understand systems statuses to detect, diagnose and solve problems. However, due to the enormous scale and complex structure of cloud computing, a monitoring system should collect, transfer, store and process a large amount of monitoring data, which brings a significant performance overhead and increases the difficulty of analyzing useful information. To address the above issue, this paper proposes a self-adaptive monitoring approach for cloud computing systems. First, we conduct correlation analysis between different metrics, and monitor selected important ones which represent the others and reflect the running status of a system. Second, we characterize the running status with Principal Component Analysis (PCA), estimate the anomaly degree, and predict the possibility of faults. Finally, we dynamically adjust the monitoring period based on the estimated anomaly degree and a reliability model. To evaluate our proposal, we have applied the approach in our open-source TPC-W benchmark Bench4Q deployed in our real cloud computing platform OnceCloud. The experimental results demonstrate that our approach can adapt to dynamic workloads, accurately estimate the anomaly degree, and automatically adjust monitoring periods. Thus, the approach can effectively improve the accuracy and timeliness of anomaly detection in an abnormal status, and efficiently lower the monitoring overhead in a normal status. Correlation analysis is proposed to select key metrics representing others.PCA is proposed to characterize running status and predict the possibility of faults.We dynamically adjust metrics and periods based on a reliability model.We evaluate the approach on our real cloud platform with case studies.
Sakthivel R., Santra S., Kaviarasan B.
2018-02-01 citations by CoLab: 39 Abstract  
This paper proposes an active resilient control strategy for singular networked control systems with external disturbances and missing data scenario based on sampled-data scheme. To characterize the missing data scenario, a stochastic variable satisfying Bernoulli distributed white sequence is introduced. Based on this scenario, in this paper, two different models are proposed. For both the models, by using Lyapunov–Krasovskii functional approach, which fully uses the available information about the actual sampling pattern, some sufficient conditions in terms of linear matrix inequalities (LMIs) are separately obtained to guarantee that the resulting closed-loop system is admissible and strictly dissipative with a prescribed performance index. In particular, Jensen’s and Wirtinger based integral inequalities are employed to simplify the integral terms which appeared in the derivation of stabilization results. Then, if the obtained LMIs are feasible, the corresponding parameters of the designed resilient sampled-data controller are determined. Finally, two numerical examples are presented to demonstrate the effectiveness of the proposed control design technique.
Xue Q., Zhang Z., Fan K., Wang M.
Electronics (Switzerland) scimago Q2 wos Q2 Open Access
2025-02-28 citations by CoLab: 0 PDF Abstract  
The extensive interconnection and intelligent collaboration of multi-source heterogeneous devices in the industrial Internet environment have significantly improved the efficiency of industrial production and resource utilization. However, at the same time, the deployment characteristics of open-network architecture and the promotion of the concept of deep integration of OT/IT have led to an exponential growth of attacks on the industrial Internet. At present, most of the detection methods for industrial internet attacks use deep learning. However, due to the black-box characteristics caused by the complex structure of deep learning models, the explainability of industrial internet detection results generated based on deep learning is low. Therefore, we proposed an industrial internet intrusion response method xIIRS based on explainable deep learning. Firstly, an explanation method was improved to enhance the explanation by approximating and sampling the historical input and calculating the dynamic weighting for the sparse group lasso based on the evaluation criteria for the importance of features between and within feature groups. Then, we determined the defense rule scope based on the obtained explanation results and generated more fine-grained defense rules to implement intrusion response in combination with security constraints. The proposed method was experimented on two public datasets, TON_IoT and Gas Pipeline. The experimental results show that the explanation effect of xIIRS is better than the baseline method while achieving an average malicious traffic blocking rate of about 95% and an average normal traffic passing rate of about 99%. 
Zhou J., Yang X., Ren Z.
Electronics (Switzerland) scimago Q2 wos Q2 Open Access
2025-02-14 citations by CoLab: 0 PDF Abstract  
Time series anomaly detection is a significant challenge due to the inherent complexity and diversity of time series data. Traditional methods for time series anomaly detection (TAD) often struggle to effectively address the intricate nature of a complex time series and the composite characteristics of diverse anomalies. In this paper, we propose SCConv-Denoising Diffusion Probabilistic Model Anomaly Detection Based on TimesNet (SDADT), a novel framework that integrates the Spatial and Channel Reconstruction Convolution (SCConv) module and Denoising Diffusion Probabilistic Models (DDPMs) to address these challenges. By transforming 1D time series into 2D tensors via TimesNet, our method captures intra- and inter-period variations, achieving state-of-the-art performance across three real-world datasets: 85.39% F1-score on SMD, 92.76% on SWaT, and 97.36% on PSM, outperforming nine baseline models including Transformers and LSTM. Ablation studies confirm the necessity of both modules, with performance dropping significantly when either SCConv or DDPMs are removed. In conclusion, this paper proposes a novel alternative solution for anomaly detection in the Cyber Physical Systems (CPSs) domain.
Cheng L., Huang P., Zhang M., Yang R., Wang Y.
Mathematics scimago Q2 wos Q1 Open Access
2025-01-23 citations by CoLab: 1 PDF Abstract  
This review proposes a novel integration of game-theoretical methods—specifically Evolutionary Game Theory (EGT), Stackelberg games, and Bayesian games—with deep reinforcement learning (DRL) to optimize electricity markets. Our approach uniquely addresses the dynamic interactions among power purchasing and generation enterprises, highlighting both theoretical underpinnings and practical applications. We demonstrate how this integrated framework enhances market resilience, informs evidence-based policy-making, and supports renewable energy expansion. By explicitly connecting our findings to regulatory strategies and real-world market scenarios, we underscore the political implications and applicability of our results in diverse global electricity systems. By integrating EGT with advanced methodologies such as DRL, this study develops a comprehensive framework that addresses both the dynamic nature of electricity markets and the strategic adaptability of market participants. This hybrid approach allows for the simulation of complex market scenarios, capturing the nuanced decision-making processes of enterprises under varying conditions of uncertainty and competition. The review systematically evaluates the effectiveness and cost-efficiency of various control policies implemented within electricity markets, including pricing mechanisms, capacity incentives, renewable integration incentives, and regulatory measures aimed at enhancing market competition and transparency. Our analysis underscores the potential of EGT to significantly enhance market resilience, enabling electricity markets to better withstand shocks such as sudden demand fluctuations, supply disruptions, and regulatory changes. Moreover, the integration of EGT with DRL facilitates the promotion of sustainable energy integration by modeling the strategic adoption of renewable energy technologies and optimizing resource allocation. This leads to improved overall market performance, characterized by increased efficiency, reduced costs, and greater sustainability. The findings contribute to the development of robust regulatory frameworks that support competitive and efficient electricity markets in an evolving energy landscape. By leveraging the dynamic and adaptive capabilities of EGT and DRL, policymakers can design regulations that not only address current market challenges but also anticipate and adapt to future developments. This proactive approach is essential for fostering a resilient energy infrastructure capable of accommodating rapid advancements in renewable technologies and shifting consumer demands. Additionally, the review identifies key areas for future research, including the exploration of multi-agent reinforcement learning techniques and the need for empirical studies to validate the theoretical models and simulations discussed. This study provides a comprehensive roadmap for optimizing electricity markets through strategic and policy-driven interventions, bridging the gap between theoretical game-theoretic models and practical market applications.
Sedaghat Z., Courbon B., Botrel H., Dugua H., Tulinski P., Alibaud L., Pagani L., Mercer D.K., Guyard C., Védrine C., Dixneuf S.
2025-01-20 citations by CoLab: 0 Abstract  
ABSTRACTWe propose an innovative technology to classify the Mechanism of Action (MoA) of antimicrobials and predict their novelty, called HoloMoA. HoloMoA is a rapid, robust, inexpensive, and versatile tool based on the combination of time-lapse Digital Inline Holographic Microscopy (DIHM) and Deep Learning (DL). In combination with proper image reconstruction, DIHM enables a label-free, time-resolved visualization of bacterial cell morphology and phase map (i.e. refractive index × thickness) to reveal phenotypic responses to antimicrobials, while DL techniques are powerful tools to extract discriminative features from image sequences and classify them. We assessed the performance of HoloMoA technology on Escherichia coli (E. coli) ATCC 25922 treated for up to 2 hours with 22 antibiotic molecules representing 5 functional classes (i.e. Cell Wall synthesis inhibitors, Cell Membrane inhibitors, Protein synthesis inhibitors, DNA and RNA synthesis inhibitors). First, using reconstructed phase images as input to a 3D Convolutional Neural Network classifier, we detected the MoA of known antibiotics with 89% accuracy. Secondly, we showed how our CNN models combined with a Siamese neural network architecture can be used for the novelty assessment of the MoA of a candidate antibiotic. The HoloMoA novelty detection tool succeeded in detecting trimethoprim-sulfamethoxazole (Folic Acid synthesis inhibitors) as belonging to a novel functional class (i.e. different from the 5 aforementioned classes). We demonstrated that combining DHIM and DL gives a promising tool for determining the MoA of new antimicrobial candidates provided that a large image database for known antimicrobials is available.
Lin X., Wang P., Wang S., Shen J.
2025-01-15 citations by CoLab: 0 Abstract  
Purpose The purpose of this paper is to investigate the accurate monitoring and assessment of steel bar corrosion in concrete based on deep learning multi-sensor information fusion method. The paper addresses the issue of traditional corrosion assessment models relying on sufficient data volume and low evaluation accuracy under small sample conditions. Design/methodology/approach A multi-sensor integrated corrosion monitoring equipment for reinforced concrete is designed to detect corrosion parameters such as corrosion potential, current, impedance, electromagnetic signal and steel bar stress, as well as environmental parameters such as internal temperature, humidity and chloride ion concentration of concrete. To overcome the small amount of monitoring data and improve the accuracy of evaluation, an improved Siamese neural network based on the attention mechanism and multi-loss fusion function is proposed to establish a corrosion evaluation model suitable for small sample data. Findings The corrosion assessment model has an accuracy of 98.41%, which is 20% more accurate than traditional models. Practical implications Timely maintenance of buildings according to corrosion evaluation results can improve maintenance efficiency and reduce maintenance costs, which is of great significance to ensure structural safety. Originality/value The corrosion monitoring equipment for reinforced concrete designed in this paper can realize the whole process of monitoring inside the concrete. The proposed corrosion evaluation model for reinforced concrete based on Siamese neural network has high accuracy and can provide a more accurate assessment model for structural health testing.
Lechner M., Jantsch A.
2025-01-01 citations by CoLab: 0 Abstract  
Enabled by the substantial increases in computational power and efficiency of embedded devices and accelerators for Deep Neural Networks, machine learning has become a key component in many edge computing applications. Due to these increased hardware capabilities and the steadily rising accuracy requirements, the complexity of neural networks has also stepped up to a point where network optimizations are crucial to meet latency targets in complex applications. In this work, we present OptiSim, a method to estimate the impact of DNN optimization strategies like pruning and shunt connections on inference latency. It uses characterizations of State-of-the-Art optimization algorithms to simulate the effect on the network structure and to provide latency estimations for various degrees of model compression. OptiSim considers the platform-specific properties embedded in the latency estimation models to find optimal layer sizes improving the hardware utilization. Our tool can quickly evaluate and compare large amounts of network optimizations without the need to build time-consuming execution engines. In experiments, we achieved an error of 7.04% Root Mean Square Percentage Error (RMSPE) in latency estimation when comparing the target latency with the latency reached when running the optimization algorithms with the estimated compression factors. Compared to the traditional, manual workflow where developers have to guess the required compression factors, the automated approach of OptiSim saves valuable time for deployment.
Sekhar Dey N., Deepika R., Tekuri K., Sanjana U.
2024-12-30 citations by CoLab: 0 Abstract  
The growth of complex cyber threats has spurred the investigation and development of creative approaches in anomaly detection within the area of cybersecurity. Machine learning has become a crucial technique in strengthening digital defenses against changing cyber threats due to its capacity to identify patterns and abnormalities in large datasets. This study digs into the improvements in machine learning algorithms geared particularly for anomaly identification in cybersecurity applications. Anomaly detection strategies span a broad range of methodologies, including both classic statistical approaches and more complex deep learning models. This study investigates the development of machine learning methods, emphasizing their advantages, constraints, and uses in identifying abnormal behaviors in intricate network settings. These models are highly effective in capturing complex patterns and subtle details found in cybersecurity datasets, allowing for the detection of previously unidentified risks and abnormalities with improved accuracy. In addition, the use of ensemble learning methods, such as random forests and gradient boosting machines, has enhanced the strength and scalability of anomaly detection systems. This work highlights a comprehensive analysis of various machine learning methods and anomaly detection algorithms in cybersecurity applications. It reveals that random forests achieve the highest detection accuracy at 95.2%, closely followed by gradient boosting at 94.8%. Moreover, random forests and neural networks exhibit the most effective performance in reducing false alarms, with false positive rates of 2.1% and 2.9% respectively. In terms of computing efficiency, random forests demonstrate the shortest processing time at 15.7 milliseconds, followed by neural networks at 17.9 milliseconds. While random forests and neural networks prove highly scalable, with excellent real-time performance and resilience to adversarial attacks, other models such as support vector machines and K-nearest neighbors exhibit varying levels of performance across these metrics. These insights highlight the importance of selecting appropriate algorithms based on the specific requirements and characteristics of cybersecurity datasets to ensure robust anomaly detection systems.

Top-30

Journals

2
4
6
8
10
12
14
16
18
2
4
6
8
10
12
14
16
18

Publishers

10
20
30
40
50
60
70
80
90
10
20
30
40
50
60
70
80
90
  • We do not take into account publications without a DOI.
  • Statistics recalculated only for publications connected to researchers, organizations and labs registered on the platform.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Share
Cite this
GOST | RIS | BibTex | MLA
Found error?