亚洲男人的天堂2018av,欧美草比,久久久久久免费视频精选,国色天香在线看免费,久久久久亚洲av成人片仓井空

Data transformations (e.g. rotations, reflections, and cropping) play an important role in self-supervised learning. Typically, images are transformed into different views, and neural networks trained on tasks involving these views produce useful feature representations for downstream tasks, including anomaly detection. However, for anomaly detection beyond image data, it is often unclear which transformations to use. Here we present a simple end-to-end procedure for anomaly detection with learnable transformations. The key idea is to embed the transformed data into a semantic space such that the transformed data still resemble their untransformed form, while different transformations are easily distinguishable. Extensive experiments on time series demonstrate that our proposed method outperforms existing approaches in the one-vs.-rest setting and is competitive in the more challenging n-vs.-rest anomaly detection task. On tabular datasets from the medical and cyber-security domains, our method learns domain-specific transformations and detects anomalies more accurately than previous work.

相關內容

在(zai)(zai)數(shu)(shu)(shu)據(ju)(ju)挖掘中,異(yi)(yi)常(chang)(chang)(chang)檢(jian)(jian)測(ce)(ce)(ce)(英(ying)語:anomaly detection)對不(bu)符合預(yu)期模(mo)(mo)(mo)式(shi)(shi)或數(shu)(shu)(shu)據(ju)(ju)集(ji)(ji)中其(qi)(qi)他(ta)(ta)項目的(de)(de)(de)(de)項目、事件或觀(guan)測(ce)(ce)(ce)值的(de)(de)(de)(de)識別。通(tong)(tong)常(chang)(chang)(chang)異(yi)(yi)常(chang)(chang)(chang)項目會轉變成(cheng)銀行(xing)(xing)欺詐(zha)、結構缺(que)陷(xian)、醫療問題、文本(ben)錯誤等(deng)類(lei)(lei)(lei)型的(de)(de)(de)(de)問題。異(yi)(yi)常(chang)(chang)(chang)也被稱為離群值、新奇(qi)、噪聲、偏(pian)差(cha)和例外。 特別是在(zai)(zai)檢(jian)(jian)測(ce)(ce)(ce)濫用與網(wang)絡入(ru)侵時(shi),有趣性對象往(wang)往(wang)不(bu)是罕(han)見對象,但卻是超出(chu)(chu)(chu)預(yu)料的(de)(de)(de)(de)突發活動(dong)。這(zhe)種模(mo)(mo)(mo)式(shi)(shi)不(bu)遵循通(tong)(tong)常(chang)(chang)(chang)統計定(ding)義中把(ba)異(yi)(yi)常(chang)(chang)(chang)點(dian)看作是罕(han)見對象,于是許多異(yi)(yi)常(chang)(chang)(chang)檢(jian)(jian)測(ce)(ce)(ce)方(fang)法(fa)(特別是無監(jian)督(du)(du)的(de)(de)(de)(de)方(fang)法(fa))將對此類(lei)(lei)(lei)數(shu)(shu)(shu)據(ju)(ju)失效,除非進(jin)行(xing)(xing)了合適的(de)(de)(de)(de)聚(ju)集(ji)(ji)。相(xiang)反,聚(ju)類(lei)(lei)(lei)分(fen)(fen)析(xi)算法(fa)可能(neng)可以檢(jian)(jian)測(ce)(ce)(ce)出(chu)(chu)(chu)這(zhe)些(xie)模(mo)(mo)(mo)式(shi)(shi)形成(cheng)的(de)(de)(de)(de)微(wei)聚(ju)類(lei)(lei)(lei)。 有三大類(lei)(lei)(lei)異(yi)(yi)常(chang)(chang)(chang)檢(jian)(jian)測(ce)(ce)(ce)方(fang)法(fa)。[1] 在(zai)(zai)假(jia)設數(shu)(shu)(shu)據(ju)(ju)集(ji)(ji)中大多數(shu)(shu)(shu)實例都(dou)是正(zheng)常(chang)(chang)(chang)的(de)(de)(de)(de)前(qian)提(ti)下,無監(jian)督(du)(du)異(yi)(yi)常(chang)(chang)(chang)檢(jian)(jian)測(ce)(ce)(ce)方(fang)法(fa)能(neng)通(tong)(tong)過尋找與其(qi)(qi)他(ta)(ta)數(shu)(shu)(shu)據(ju)(ju)最不(bu)匹(pi)配的(de)(de)(de)(de)實例來(lai)檢(jian)(jian)測(ce)(ce)(ce)出(chu)(chu)(chu)未(wei)標(biao)記測(ce)(ce)(ce)試(shi)數(shu)(shu)(shu)據(ju)(ju)的(de)(de)(de)(de)異(yi)(yi)常(chang)(chang)(chang)。監(jian)督(du)(du)式(shi)(shi)異(yi)(yi)常(chang)(chang)(chang)檢(jian)(jian)測(ce)(ce)(ce)方(fang)法(fa)需要一個(ge)已(yi)經被標(biao)記“正(zheng)常(chang)(chang)(chang)”與“異(yi)(yi)常(chang)(chang)(chang)”的(de)(de)(de)(de)數(shu)(shu)(shu)據(ju)(ju)集(ji)(ji),并(bing)涉及到訓練(lian)分(fen)(fen)類(lei)(lei)(lei)器(與許多其(qi)(qi)他(ta)(ta)的(de)(de)(de)(de)統計分(fen)(fen)類(lei)(lei)(lei)問題的(de)(de)(de)(de)關鍵區別是異(yi)(yi)常(chang)(chang)(chang)檢(jian)(jian)測(ce)(ce)(ce)的(de)(de)(de)(de)內(nei)在(zai)(zai)不(bu)均衡性)。半監(jian)督(du)(du)式(shi)(shi)異(yi)(yi)常(chang)(chang)(chang)檢(jian)(jian)測(ce)(ce)(ce)方(fang)法(fa)根據(ju)(ju)一個(ge)給定(ding)的(de)(de)(de)(de)正(zheng)常(chang)(chang)(chang)訓練(lian)數(shu)(shu)(shu)據(ju)(ju)集(ji)(ji)創建一個(ge)表示正(zheng)常(chang)(chang)(chang)行(xing)(xing)為的(de)(de)(de)(de)模(mo)(mo)(mo)型,然后檢(jian)(jian)測(ce)(ce)(ce)由(you)學習模(mo)(mo)(mo)型生成(cheng)的(de)(de)(de)(de)測(ce)(ce)(ce)試(shi)實例的(de)(de)(de)(de)可能(neng)性。

Anomalies represent rare observations (e.g., data records or events) that deviate significantly from others. Over several decades, research on anomaly mining has received increasing interests due to the implications of these occurrences in a wide range of disciplines. Anomaly detection, which aims to identify rare observations, is among the most vital tasks in the world, and has shown its power in preventing detrimental events, such as financial fraud, network intrusion, and social spam. The detection task is typically solved by identifying outlying data points in the feature space and inherently overlooks the relational information in real-world data. Graphs have been prevalently used to represent the structural information, which raises the graph anomaly detection problem - identifying anomalous graph objects (i.e., nodes, edges and sub-graphs) in a single graph, or anomalous graphs in a database/set of graphs. However, conventional anomaly detection techniques cannot tackle this problem well because of the complexity of graph data. For the advent of deep learning, graph anomaly detection with deep learning has received a growing attention recently. In this survey, we aim to provide a systematic and comprehensive review of the contemporary deep learning techniques for graph anomaly detection. We compile open-sourced implementations, public datasets, and commonly-used evaluation metrics to provide affluent resources for future studies. More importantly, we highlight twelve extensive future research directions according to our survey results covering unsolved and emerging research problems and real-world applications. With this survey, our goal is to create a "one-stop-shop" that provides a unified understanding of the problem categories and existing approaches, publicly available hands-on resources, and high-impact open challenges for graph anomaly detection using deep learning.

Traditional object detection answers two questions; "what" (what the object is?) and "where" (where the object is?). "what" part of the object detection can be fine-grained further i.e. "what type", "what shape" and "what material" etc. This results in the shifting of the object detection tasks to the object description paradigm. Describing an object provides additional detail that enables us to understand the characteristics and attributes of the object ("plastic boat" not just boat, "glass bottle" not just bottle). This additional information can implicitly be used to gain insight into unseen objects (e.g. unknown object is "metallic", "has wheels"), which is not possible in traditional object detection. In this paper, we present a new approach to simultaneously detect objects and infer their attributes, we call it Detect and Describe (DaD) framework. DaD is a deep learning-based approach that extends object detection to object attribute prediction as well. We train our model on aPascal train set and evaluate our approach on aPascal test set. We achieve 97.0% in Area Under the Receiver Operating Characteristic Curve (AUC) for object attributes prediction on aPascal test set. We also show qualitative results for object attribute prediction on unseen objects, which demonstrate the effectiveness of our approach for describing unknown objects.

Despite significant advances in the field of deep learning in applications to various fields, explaining the inner processes of deep learning models remains an important and open question. The purpose of this article is to describe and substantiate the geometric and topological view of the learning process of neural networks. Our attention is focused on the internal representation of neural networks and on the dynamics of changes in the topology and geometry of the data manifold on different layers. We also propose a method for assessing the generalizing ability of neural networks based on topological descriptors. In this paper, we use the concepts of topological data analysis and intrinsic dimension, and we present a wide range of experiments on different datasets and different configurations of convolutional neural network architectures. In addition, we consider the issue of the geometry of adversarial attacks in the classification task and spoofing attacks on face recognition systems. Our work is a contribution to the development of an important area of explainable and interpretable AI through the example of computer vision.

Massive false rumors emerging along with breaking news or trending topics severely hinder the truth. Existing rumor detection approaches achieve promising performance on the yesterday`s news, since there is enough corpus collected from the same domain for model training. However, they are poor at detecting rumors about unforeseen events especially those propagated in different languages due to the lack of training data and prior knowledge (i.e., low-resource regimes). In this paper, we propose an adversarial contrastive learning framework to detect rumors by adapting the features learned from well-resourced rumor data to that of the low-resourced. Our model explicitly overcomes the restriction of domain and/or language usage via language alignment and a novel supervised contrastive training paradigm. Moreover, we develop an adversarial augmentation mechanism to further enhance the robustness of low-resource rumor representation. Extensive experiments conducted on two low-resource datasets collected from real-world microblog platforms demonstrate that our framework achieves much better performance than state-of-the-art methods and exhibits a superior capacity for detecting rumors at early stages.

The adaptive processing of structured data is a long-standing research topic in machine learning that investigates how to automatically learn a mapping from a structured input to outputs of various nature. Recently, there has been an increasing interest in the adaptive processing of graphs, which led to the development of different neural network-based methodologies. In this thesis, we take a different route and develop a Bayesian Deep Learning framework for graph learning. The dissertation begins with a review of the principles over which most of the methods in the field are built, followed by a study on graph classification reproducibility issues. We then proceed to bridge the basic ideas of deep learning for graphs with the Bayesian world, by building our deep architectures in an incremental fashion. This framework allows us to consider graphs with discrete and continuous edge features, producing unsupervised embeddings rich enough to reach the state of the art on several classification tasks. Our approach is also amenable to a Bayesian nonparametric extension that automatizes the choice of almost all model's hyper-parameters. Two real-world applications demonstrate the efficacy of deep learning for graphs. The first concerns the prediction of information-theoretic quantities for molecular simulations with supervised neural models. After that, we exploit our Bayesian models to solve a malware-classification task while being robust to intra-procedural code obfuscation techniques. We conclude the dissertation with an attempt to blend the best of the neural and Bayesian worlds together. The resulting hybrid model is able to predict multimodal distributions conditioned on input graphs, with the consequent ability to model stochasticity and uncertainty better than most works. Overall, we aim to provide a Bayesian perspective into the articulated research field of deep learning for graphs.

The considerable significance of Anomaly Detection (AD) problem has recently drawn the attention of many researchers. Consequently, the number of proposed methods in this research field has been increased steadily. AD strongly correlates with the important computer vision and image processing tasks such as image/video anomaly, irregularity and sudden event detection. More recently, Deep Neural Networks (DNNs) offer a high performance set of solutions, but at the expense of a heavy computational cost. However, there is a noticeable gap between the previously proposed methods and an applicable real-word approach. Regarding the raised concerns about AD as an ongoing challenging problem, notably in images and videos, the time has come to argue over the pitfalls and prospects of methods have attempted to deal with visual AD tasks. Hereupon, in this survey we intend to conduct an in-depth investigation into the images/videos deep learning based AD methods. We also discuss current challenges and future research directions thoroughly.

Mining graph data has become a popular research topic in computer science and has been widely studied in both academia and industry given the increasing amount of network data in the recent years. However, the huge amount of network data has posed great challenges for efficient analysis. This motivates the advent of graph representation which maps the graph into a low-dimension vector space, keeping original graph structure and supporting graph inference. The investigation on efficient representation of a graph has profound theoretical significance and important realistic meaning, we therefore introduce some basic ideas in graph representation/network embedding as well as some representative models in this chapter.

It is important to detect anomalous inputs when deploying machine learning systems. The use of larger and more complex inputs in deep learning magnifies the difficulty of distinguishing between anomalous and in-distribution examples. At the same time, diverse image and text data are available in enormous quantities. We propose leveraging these data to improve deep anomaly detection by training anomaly detectors against an auxiliary dataset of outliers, an approach we call Outlier Exposure (OE). This enables anomaly detectors to generalize and detect unseen anomalies. In extensive experiments on natural language processing and small- and large-scale vision tasks, we find that Outlier Exposure significantly improves detection performance. We also observe that cutting-edge generative models trained on CIFAR-10 may assign higher likelihoods to SVHN images than to CIFAR-10 images; we use OE to mitigate this issue. We also analyze the flexibility and robustness of Outlier Exposure, and identify characteristics of the auxiliary dataset that improve performance.

The low resolution of objects of interest in aerial images makes pedestrian detection and action detection extremely challenging tasks. Furthermore, using deep convolutional neural networks to process large images can be demanding in terms of computational requirements. In order to alleviate these challenges, we propose a two-step, yes and no question answering framework to find specific individuals doing one or multiple specific actions in aerial images. First, a deep object detector, Single Shot Multibox Detector (SSD), is used to generate object proposals from small aerial images. Second, another deep network, is used to learn a latent common sub-space which associates the high resolution aerial imagery and the pedestrian action labels that are provided by the human-based sources

Object detection is an important and challenging problem in computer vision. Although the past decade has witnessed major advances in object detection in natural scenes, such successes have been slow to aerial imagery, not only because of the huge variation in the scale, orientation and shape of the object instances on the earth's surface, but also due to the scarcity of well-annotated datasets of objects in aerial scenes. To advance object detection research in Earth Vision, also known as Earth Observation and Remote Sensing, we introduce a large-scale Dataset for Object deTection in Aerial images (DOTA). To this end, we collect $2806$ aerial images from different sensors and platforms. Each image is of the size about 4000-by-4000 pixels and contains objects exhibiting a wide variety of scales, orientations, and shapes. These DOTA images are then annotated by experts in aerial image interpretation using $15$ common object categories. The fully annotated DOTA images contains $188,282$ instances, each of which is labeled by an arbitrary (8 d.o.f.) quadrilateral To build a baseline for object detection in Earth Vision, we evaluate state-of-the-art object detection algorithms on DOTA. Experiments demonstrate that DOTA well represents real Earth Vision applications and are quite challenging.

北京阿比特科技有限公司