Firearm Detection and Segmentation Using an Ensemble of Semantic Neural
Networks
- URL: http://arxiv.org/abs/2003.00805v1
- Date: Tue, 11 Feb 2020 13:58:16 GMT
- Title: Firearm Detection and Segmentation Using an Ensemble of Semantic Neural
Networks
- Authors: Alexander Egiazarov, Vasileios Mavroeidis, Fabio Massimo Zennaro,
Kamer Vishi
- Abstract summary: We present a weapon detection system based on an ensemble of semantic Convolutional Neural Networks.
A set of simpler neural networks dedicated to specific tasks requires less computational resources and can be trained in parallel.
The overall output of the system given by the aggregation of the outputs of individual networks can be tuned by a user to trade-off false positives and false negatives.
- Score: 62.997667081978825
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In recent years we have seen an upsurge in terror attacks around the world.
Such attacks usually happen in public places with large crowds to cause the
most damage possible and get the most attention. Even though surveillance
cameras are assumed to be a powerful tool, their effect in preventing crime is
far from clear due to either limitation in the ability of humans to vigilantly
monitor video surveillance or for the simple reason that they are operating
passively. In this paper, we present a weapon detection system based on an
ensemble of semantic Convolutional Neural Networks that decomposes the problem
of detecting and locating a weapon into a set of smaller problems concerned
with the individual component parts of a weapon. This approach has
computational and practical advantages: a set of simpler neural networks
dedicated to specific tasks requires less computational resources and can be
trained in parallel; the overall output of the system given by the aggregation
of the outputs of individual networks can be tuned by a user to trade-off false
positives and false negatives; finally, according to ensemble theory, the
output of the overall system will be robust and reliable even in the presence
of weak individual models. We evaluated our system running simulations aimed at
assessing the accuracy of individual networks and the whole system. The results
on synthetic data and real-world data are promising, and they suggest that our
approach may have advantages compared to the monolithic approach based on a
single deep convolutional neural network.
Related papers
- Using Graph Theory for Improving Machine Learning-based Detection of
Cyber Attacks [4.465883551216819]
Early detection of network intrusions and cyber threats is one of the main pillars of cybersecurity.
One of the most effective approaches for this purpose is to analyze network traffic with the help of artificial intelligence algorithms.
arXiv Detail & Related papers (2024-02-12T18:44:02Z) - Unfolding Local Growth Rate Estimates for (Almost) Perfect Adversarial
Detection [22.99930028876662]
Convolutional neural networks (CNN) define the state-of-the-art solution on many perceptual tasks.
Current CNN approaches largely remain vulnerable against adversarial perturbations of the input that have been crafted specifically to fool the system.
We propose a simple and light-weight detector, which leverages recent findings on the relation between networks' local intrinsic dimensionality (LID) and adversarial attacks.
arXiv Detail & Related papers (2022-12-13T17:51:32Z) - FuNNscope: Visual microscope for interactively exploring the loss
landscape of fully connected neural networks [77.34726150561087]
We show how to explore high-dimensional landscape characteristics of neural networks.
We generalize observations on small neural networks to more complex systems.
An interactive dashboard opens up a number of possible application networks.
arXiv Detail & Related papers (2022-04-09T16:41:53Z) - The Feasibility and Inevitability of Stealth Attacks [63.14766152741211]
We study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence systems.
In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself.
arXiv Detail & Related papers (2021-06-26T10:50:07Z) - Explaining Network Intrusion Detection System Using Explainable AI
Framework [0.5076419064097734]
Intrusion detection system is one of the important layers in cyber safety in today's world.
In this paper, we have used deep neural network for network intrusion detection.
We also proposed explainable AI framework to add transparency at every stage of machine learning pipeline.
arXiv Detail & Related papers (2021-03-12T07:15:09Z) - Tiny Adversarial Mulit-Objective Oneshot Neural Architecture Search [35.362883630015354]
Most neural network models deployed in mobile devices are tiny. However, tiny neural networks are commonly very vulnerable to attacks.
Our work focuses on how to improve the robustness of tiny neural networks without seriously deteriorating of clean accuracy under mobile-level resources.
arXiv Detail & Related papers (2021-02-28T00:54:09Z) - Anomaly Detection on Attributed Networks via Contrastive Self-Supervised
Learning [50.24174211654775]
We present a novel contrastive self-supervised learning framework for anomaly detection on attributed networks.
Our framework fully exploits the local information from network data by sampling a novel type of contrastive instance pair.
A graph neural network-based contrastive learning model is proposed to learn informative embedding from high-dimensional attributes and local structure.
arXiv Detail & Related papers (2021-02-27T03:17:20Z) - Firearm Detection via Convolutional Neural Networks: Comparing a
Semantic Segmentation Model Against End-to-End Solutions [68.8204255655161]
Threat detection of weapons and aggressive behavior from live video can be used for rapid detection and prevention of potentially deadly incidents.
One way for achieving this is through the use of artificial intelligence and, in particular, machine learning for image analysis.
We compare a traditional monolithic end-to-end deep learning model and a previously proposed model based on an ensemble of simpler neural networks detecting fire-weapons via semantic segmentation.
arXiv Detail & Related papers (2020-12-17T15:19:29Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z) - EagerNet: Early Predictions of Neural Networks for Computationally
Efficient Intrusion Detection [2.223733768286313]
We propose a new architecture to detect network attacks with minimal resources.
The architecture is able to deal with either binary or multiclass classification problems and trades prediction speed for the accuracy of the network.
arXiv Detail & Related papers (2020-07-27T11:31:37Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.