-
Recognition of Handwritten Japanese Characters Using Ensemble of Convolutional Neural Networks
Authors:
Angel I. Solis,
Justin Zarkovacki,
John Ly,
Adham Atyabi
Abstract:
The Japanese writing system is complex, with three character types of Hiragana, Katakana, and Kanji. Kanji consists of thousands of unique characters, further adding to the complexity of character identification and literature understanding. Being able to translate handwritten Japanese characters into digital text is useful for data analysis, translation, learning and cultural preservation. In thi…
▽ More
The Japanese writing system is complex, with three character types of Hiragana, Katakana, and Kanji. Kanji consists of thousands of unique characters, further adding to the complexity of character identification and literature understanding. Being able to translate handwritten Japanese characters into digital text is useful for data analysis, translation, learning and cultural preservation. In this study, a machine learning approach to analyzing and recognizing handwritten Japanese characters (Kanji) is proposed. The study used an ensemble of three convolutional neural networks (CNNs) for recognizing handwritten Kanji characters and utilized four datasets of MNIST, K-MNIST, Kuzushiji-49 (K49) and the top 150 represented classes in the Kuzushiji-Kanji (K-Kanji) dataset for its performance evaluation. The results indicate feasibility of using proposed CNN-ensemble architecture for recognizing handwritten characters, achieving 99.4%, 96.4%, 95.0% and 96.4% classification accuracy on MNIST, K-MNIS, K49, and K-Kanji datasets respectively.
△ Less
Submitted 6 June, 2023;
originally announced June 2023.
-
Triplet Loss-less Center Loss Sampling Strategies in Facial Expression Recognition Scenarios
Authors:
Hossein Rajoli,
Fatemeh Lotfi,
Adham Atyabi,
Fatemeh Afghah
Abstract:
Facial expressions convey massive information and play a crucial role in emotional expression. Deep neural network (DNN) accompanied by deep metric learning (DML) techniques boost the discriminative ability of the model in facial expression recognition (FER) applications. DNN, equipped with only classification loss functions such as Cross-Entropy cannot compact intra-class feature variation or sep…
▽ More
Facial expressions convey massive information and play a crucial role in emotional expression. Deep neural network (DNN) accompanied by deep metric learning (DML) techniques boost the discriminative ability of the model in facial expression recognition (FER) applications. DNN, equipped with only classification loss functions such as Cross-Entropy cannot compact intra-class feature variation or separate inter-class feature distance as well as when it gets fortified by a DML supporting loss item. The triplet center loss (TCL) function is applied on all dimensions of the sample's embedding in the embedding space. In our work, we developed three strategies: fully-synthesized, semi-synthesized, and prediction-based negative sample selection strategies. To achieve better results, we introduce a selective attention module that provides a combination of pixel-wise and element-wise attention coefficients using high-semantic deep features of input samples. We evaluated the proposed method on the RAF-DB, a highly imbalanced dataset. The experimental results reveal significant improvements in comparison to the baseline for all three negative sample selection strategies.
△ Less
Submitted 8 February, 2023;
originally announced February 2023.
-
Internet-based Social Engineering Attacks, Defenses and Psychology: A Survey
Authors:
Theodore Longtchi,
Rosana MontaƱez Rodriguez,
Laith Al-Shawaf,
Adham Atyabi,
Shouhuai Xu
Abstract:
Social engineering attacks are a major cyber threat because they often serve as a first step for an attacker to break into an otherwise well-defended network, steal victims' credentials, and cause financial losses. The problem has received due amount of attention with many publications proposing defenses against them. Despite this, the situation has not improved. In this paper, we aim to understan…
▽ More
Social engineering attacks are a major cyber threat because they often serve as a first step for an attacker to break into an otherwise well-defended network, steal victims' credentials, and cause financial losses. The problem has received due amount of attention with many publications proposing defenses against them. Despite this, the situation has not improved. In this paper, we aim to understand and explain this phenomenon by looking into the root cause of the problem. To this end, we examine the literature on attacks and defenses through a unique lens we propose -- {\em psychological factors (PFs) and techniques (PTs)}. We find that there is a big discrepancy between attacks and defenses: Attacks have deliberately exploited PFs by leveraging PTs, but defenses rarely take either of these into consideration, preferring technical solutions. This explains why existing defenses have achieved limited success. This prompts us to propose a roadmap for a more systematic approach towards designing effective defenses against social engineering attacks.
△ Less
Submitted 1 August, 2022; v1 submitted 15 March, 2022;
originally announced March 2022.
-
Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study
Authors:
Rosana MontaƱez Rodriguez,
Adham Atyabi,
Shouhuai
Abstract:
Social engineering attacks are phenomena that are equally applicable to both the physical world and cyberspace. These attacks in the physical world have been studied for a much longer time than their counterpart in cyberspace. This motivates us to investigate how social engineering attacks in the physical world and cyberspace relate to each other, including their common characteristics and unique…
▽ More
Social engineering attacks are phenomena that are equally applicable to both the physical world and cyberspace. These attacks in the physical world have been studied for a much longer time than their counterpart in cyberspace. This motivates us to investigate how social engineering attacks in the physical world and cyberspace relate to each other, including their common characteristics and unique features. For this purpose, we propose a methodology to unify social engineering attacks and defenses in the physical world and cyberspace into a single framework, including: (i) a systematic model based on psychological principles for describing these attacks; (ii) a systematization of these attacks; and (iii) a systematization of defenses against them. Our study leads to several insights, which shed light on future research directions towards adequately defending against social engineering attacks in cyberspace.
△ Less
Submitted 9 March, 2022;
originally announced March 2022.
-
Learning Oculomotor Behaviors from Scanpath
Authors:
Beibin Li,
Nicholas Nuechterlein,
Erin Barney,
Claire Foster,
Minah Kim,
Monique Mahony,
Adham Atyabi,
Li Feng,
Quan Wang,
Pamela Ventola,
Linda Shapiro,
Frederick Shic
Abstract:
Identifying oculomotor behaviors relevant for eye-tracking applications is a critical but often challenging task. Aiming to automatically learn and extract knowledge from existing eye-tracking data, we develop a novel method that creates rich representations of oculomotor scanpaths to facilitate the learning of downstream tasks. The proposed stimulus-agnostic Oculomotor Behavior Framework (OBF) mo…
▽ More
Identifying oculomotor behaviors relevant for eye-tracking applications is a critical but often challenging task. Aiming to automatically learn and extract knowledge from existing eye-tracking data, we develop a novel method that creates rich representations of oculomotor scanpaths to facilitate the learning of downstream tasks. The proposed stimulus-agnostic Oculomotor Behavior Framework (OBF) model learns human oculomotor behaviors from unsupervised and semi-supervised tasks, including reconstruction, predictive coding, fixation identification, and contrastive learning tasks. The resultant pre-trained OBF model can be used in a variety of applications. Our pre-trained model outperforms baseline approaches and traditional scanpath methods in autism spectrum disorder and viewed-stimulus classification tasks. Ablation experiments further show our proposed method could achieve even better results with larger model sizes and more diverse eye-tracking training datasets, supporting the model's potential for future eye-tracking applications. Open source code: http://github.com/BeibinLi/OBF.
△ Less
Submitted 11 August, 2021;
originally announced August 2021.
-
UUV's Hierarchical DE-based Motion Planning in a Semi Dynamic Underwater Wireless Sensor Network
Authors:
S. MahmoudZadeh,
D. M. W Powers,
A. Atyabi
Abstract:
This paper describes a reflexive multilayered mission planner with a mounted energy efficient local path planner for Unmanned Underwater Vehicle's (UUV) navigation throughout the complex subsea volume in a time-variant semi-dynamic operation network. The UUV routing protocol in Underwater Wireless Sensor Network (UNSW) is generalized with a homogeneous Dynamic Knapsack-Traveler Salesman Problem em…
▽ More
This paper describes a reflexive multilayered mission planner with a mounted energy efficient local path planner for Unmanned Underwater Vehicle's (UUV) navigation throughout the complex subsea volume in a time-variant semi-dynamic operation network. The UUV routing protocol in Underwater Wireless Sensor Network (UNSW) is generalized with a homogeneous Dynamic Knapsack-Traveler Salesman Problem emerging with an adaptive path planning mechanism to address UUV's long-duration missions on dynamically changing subsea volume. The framework includes a base layer of global path planning, an inner layer of local path planning and an environmental sub-layer. Such a multilayer integrated structure facilitates the framework to adopt any algorithm with real-time performance. The evolutionary technique known as Differential Evolution algorithm is employed by both base and inner layers to examine the performance of the framework in efficient mission timing and its resilience against the environmental disturbances. Relying on reactive nature of the framework and fast computational performance of the DE algorithm, the simulations show promising results and this new framework guarantees a safe and efficient deployment in a turbulent uncertain marine environment passing through a proper sequence of stations considering various constraint in a complex environment.
△ Less
Submitted 10 July, 2020;
originally announced July 2020.
-
Current Advancements on Autonomous Mission Planning and Management Systems: an AUV and UAV perspective
Authors:
Adham Atyabi,
Somaiyeh MahmoudZadeh,
Samia Nefti-Meziani
Abstract:
Advances in hardware technology have enabled more integration of sophisticated software, triggering progress in the development and employment of Unmanned Vehicles (UVs), and mitigating restraints for onboard intelligence. As a result, UVs can now take part in more complex mission where continuous transformation in environmental condition calls for a higher level of situational responsiveness. Thi…
▽ More
Advances in hardware technology have enabled more integration of sophisticated software, triggering progress in the development and employment of Unmanned Vehicles (UVs), and mitigating restraints for onboard intelligence. As a result, UVs can now take part in more complex mission where continuous transformation in environmental condition calls for a higher level of situational responsiveness. This paper serves as an introduction to UVs mission planning and management systems aiming to highlight some of the recent developments in the field of autonomous underwater and aerial vehicles in addition to stressing some possible future directions and discussing the learned lessons. A comprehensive survey over autonomy assessment of UVs, and different aspects of autonomy such as situation awareness, cognition, and decision-making has been provided in this study. The paper separately explains the humanoid and autonomous system's performance and highlights the role and impact of a human in UVs operations.
△ Less
Submitted 10 July, 2020;
originally announced July 2020.
-
A Hierarchal Planning Framework for AUV Mission Management in a Spatio-Temporal Varying Ocean
Authors:
Somaiyeh Mahmoud. Zadeh,
Karl Sammut,
David M. W Powers,
Adham Atyabi,
Amir Mehdi Yazdani
Abstract:
The purpose of this paper is to provide a hierarchical dynamic mission planning framework for a single autonomous underwater vehicle (AUV) to accomplish task-assign process in a limited time interval while operating in an uncertain undersea environment, where spatio-temporal variability of the operating field is taken into account. To this end, a high level reactive mission planner and a low level…
▽ More
The purpose of this paper is to provide a hierarchical dynamic mission planning framework for a single autonomous underwater vehicle (AUV) to accomplish task-assign process in a limited time interval while operating in an uncertain undersea environment, where spatio-temporal variability of the operating field is taken into account. To this end, a high level reactive mission planner and a low level motion planning system are constructed. The high level system is responsible for task priority assignment and guiding the vehicle toward a target of interest considering on-time termination of the mission. The lower layer is in charge of generating optimal trajectories based on sequence of tasks and dynamicity of operating terrain. The mission planner is able to reactively re-arrange the tasks based on mission/terrain updates while the low level planner is capable of coping unexpected changes of the terrain by correcting the old path and re-generating a new trajectory. As a result, the vehicle is able to undertake the maximum number of tasks with certain degree of maneuverability having situational awareness of the operating field. The computational engine of the mentioned framework is based on the biogeography based optimization (BBO) algorithm that is capable of providing efficient solutions. To evaluate the performance of the proposed framework, firstly, a realistic model of undersea environment is provided based on realistic map data, and then several scenarios, treated as real experiments, are designed through the simulation study. Additionally, to show the robustness and reliability of the framework, Monte-Carlo simulation is carried out and statistical analysis is performed. The results of simulations indicate the significant potential of the two-level hierarchical mission planning system in mission success and its applicability for real-time implementation.
△ Less
Submitted 19 November, 2017; v1 submitted 26 April, 2016;
originally announced April 2016.
-
An Efficient Hybrid Route-Path Planning Model For Dynamic Task Allocation and Safe Maneuvering of an Underwater Vehicle in a Realistic Environment
Authors:
Somaiyeh Mahmoud. Zadeh,
David M. W Powers,
Karl Sammut,
Amir Mehdi Yazdani,
Adham Atyabi
Abstract:
This paper presents a hybrid route-path planning model for an Autonomous Underwater Vehicle's task assignment and management while the AUV is operating through the variable littoral waters. Several prioritized tasks distributed in a large scale terrain is defined first; then, considering the limitations over the mission time, vehicle's battery, uncertainty and variability of the underlying operati…
▽ More
This paper presents a hybrid route-path planning model for an Autonomous Underwater Vehicle's task assignment and management while the AUV is operating through the variable littoral waters. Several prioritized tasks distributed in a large scale terrain is defined first; then, considering the limitations over the mission time, vehicle's battery, uncertainty and variability of the underlying operating field, appropriate mission timing and energy management is undertaken. The proposed objective is fulfilled by incorporating a route-planner that is in charge of prioritizing the list of available tasks according to available battery and a path-planer that acts in a smaller scale to provide vehicle's safe deployment against environmental sudden changes. The synchronous process of the task assign-route and path planning is simulated using a specific composition of Differential Evolution and Firefly Optimization (DEFO) Algorithms. The simulation results indicate that the proposed hybrid model offers efficient performance in terms of completion of maximum number of assigned tasks while perfectly expending the minimum energy, provided by using the favorable current flow, and controlling the associated mission time. The Monte-Carlo test is also performed for further analysis. The corresponding results show the significant robustness of the model against uncertainties of the operating field and variations of mission conditions.
△ Less
Submitted 19 November, 2017; v1 submitted 26 April, 2016;
originally announced April 2016.
-
Differential Evolution for Efficient AUV Path Planning in Time Variant Uncertain Underwater Environment
Authors:
S. Mahmoud Zadeh,
D. M. W. Powers,
A. Yazdani,
K. Sammut,
A Atyabi
Abstract:
The AUV three-dimension path planning in complex turbulent underwater environment is investigated in this research, in which static current map data and uncertain static-moving time variant obstacles are taken into account. Robustness of AUVs path planning to this strong variability is known as a complex NP-hard problem and is considered a critical issue to ensure vehicles safe deployment. Efficie…
▽ More
The AUV three-dimension path planning in complex turbulent underwater environment is investigated in this research, in which static current map data and uncertain static-moving time variant obstacles are taken into account. Robustness of AUVs path planning to this strong variability is known as a complex NP-hard problem and is considered a critical issue to ensure vehicles safe deployment. Efficient evolutionary techniques have substantial potential of handling NP hard complexity of path planning problem as more powerful and fast algorithms among other approaches for mentioned problem. For the purpose of this research Differential Evolution (DE) technique is conducted to solve the AUV path planning problem in a realistic underwater environment. The path planners designed in this paper are capable of extracting feasible areas of a real map to determine the allowed spaces for deployment, where coastal area, islands, static/dynamic obstacles and ocean current is taken into account and provides the efficient path with a small computation time. The results obtained from analyze of experimental demonstrate the inherent robustness and drastic efficiency of the proposed scheme in enhancement of the vehicles path planning capability in coping undesired current, using useful current flow, and avoid colliding collision boundaries in a real-time manner. The proposed approach is also flexible and strictly respects to vehicle's kinematic constraints resisting current instabilities.
△ Less
Submitted 4 December, 2016; v1 submitted 9 April, 2016;
originally announced April 2016.
-
Reducing training requirements through evolutionary based dimension reduction and subject transfer
Authors:
Adham Atyabi,
Martin Luerssena,
Sean P. Fitzgibbon,
Trent Lewis,
David M. W. Powersa
Abstract:
Training Brain Computer Interface (BCI) systems to understand the intention of a subject through Electroencephalogram (EEG) data currently requires multiple training sessions with a subject in order to develop the necessary expertise to distinguish signals for different tasks. Conventionally the task of training the subject is done by introducing a training and calibration stage during which some…
▽ More
Training Brain Computer Interface (BCI) systems to understand the intention of a subject through Electroencephalogram (EEG) data currently requires multiple training sessions with a subject in order to develop the necessary expertise to distinguish signals for different tasks. Conventionally the task of training the subject is done by introducing a training and calibration stage during which some feedback is presented to the subject. This training session can take several hours which is not appropriate for on-line EEG-based BCI systems. An alternative approach is to use previous recording sessions of the same person or some other subjects that performed the same tasks (subject transfer) for training the classifiers. The main aim of this study is to generate a methodology that allows the use of data from other subjects while reducing the dimensions of the data. The study investigates several possibilities for reducing the necessary training and calibration period in subjects and the classifiers and addresses the impact of i) evolutionary subject transfer and ii) adapting previously trained methods (retraining) using other subjects data. Our results suggest reduction to 40% of target subject data is sufficient for training the classifier. Our results also indicate the superiority of the approaches that incorporated evolutionary subject transfer and highlights the feasibility of adapting a system trained on other subjects.
△ Less
Submitted 6 February, 2016;
originally announced February 2016.