Improved YOLOv8 Detection Algorithm in Security Inspection Image
- URL: http://arxiv.org/abs/2308.06452v3
- Date: Tue, 22 Aug 2023 07:11:04 GMT
- Title: Improved YOLOv8 Detection Algorithm in Security Inspection Image
- Authors: Liyao Lu
- Abstract summary: This paper aims at the problems of overlapping detection objects, false detection of contraband, and missed detection in the process of X-ray image detection.
An improved X-ray contraband detection algorithm CSS-YOLO based on YOLOv8s is proposed.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Security inspection is the first line of defense to ensure the safety of
people's lives and property, and intelligent security inspection is an
inevitable trend in the future development of the security inspection industry.
Aiming at the problems of overlapping detection objects, false detection of
contraband, and missed detection in the process of X-ray image detection, an
improved X-ray contraband detection algorithm CSS-YOLO based on YOLOv8s is
proposed.
Related papers
- GuardAlign: Test-time Safety Alignment in Multimodal Large Language Models [41.839145806211384]
GuardAlign is a training-free defense framework for large vision-language models.<n> OT-enhanced safety detection leverages optimal transport to measure distribution distances between image patches and unsafe semantics.<n>Cross-modal calibration strengthens the influence of safety prefixes by adaptively reallocating attention across layers.
arXiv Detail & Related papers (2026-02-27T13:52:52Z) - Detecting Object Tracking Failure via Sequential Hypothesis Testing [80.7891291021747]
Real-time online object tracking in videos constitutes a core task in computer vision.<n>We propose interpreting object tracking as a sequential hypothesis test, wherein evidence for or against tracking failures is gradually accumulated over time.<n>We propose both supervised and unsupervised variants by leveraging either ground-truth or solely internal tracking information.
arXiv Detail & Related papers (2026-02-13T14:57:15Z) - Delving into Cascaded Instability: A Lipschitz Continuity View on Image Restoration and Object Detection Synergy [95.93943805282868]
Lipschitz-regularized object detection (LROD)<n>We propose Lipschitz-regularized YOLO (LR-YOLO), a framework that integrates image restoration directly into the detector's feature learning.<n> experiments on haze and low-light benchmarks demonstrate that LR-YOLO consistently improves detection stability, optimization smoothness, and overall accuracy.
arXiv Detail & Related papers (2025-10-28T09:41:42Z) - An intrusion detection system in internet of things using grasshopper optimization algorithm and machine learning algorithms [3.109663673701098]
Internet of Things (IoT) has emerged as a foundational paradigm supporting a range of applications.<n>Significant advancements in IoT networks have been impeded by security vulnerabilities and threats.<n>Intrusion detection has become a fundamental research area and the focus of numerous studies.
arXiv Detail & Related papers (2025-09-01T19:05:58Z) - BlindGuard: Safeguarding LLM-based Multi-Agent Systems under Unknown Attacks [58.959622170433725]
BlindGuard is an unsupervised defense method that learns without requiring any attack-specific labels or prior knowledge of malicious behaviors.<n>We show that BlindGuard effectively detects diverse attack types (i.e., prompt injection, memory poisoning, and tool attack) across multi-agent systems.
arXiv Detail & Related papers (2025-08-11T16:04:47Z) - CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations [53.036288487863786]
We propose CANTXSec, the first deterministic Intrusion Detection and Prevention system based on physical ECU activations.<n>It detects and prevents classical attacks in the CAN bus, while detecting advanced attacks that have been less investigated in the literature.<n>We prove the effectiveness of our solution on a physical testbed, where we achieve 100% detection accuracy in both classes of attacks while preventing 100% of FIAs.
arXiv Detail & Related papers (2025-05-14T13:37:07Z) - Blockchain Meets Adaptive Honeypots: A Trust-Aware Approach to Next-Gen IoT Security [6.649910168731417]
Edge computing-based Next-Generation Wireless Networks (NGWN)-IoT offer enhanced bandwidth capacity for large-scale service provisioning.
Existing intrusion detection and prevention methods provide limited security as adversaries continually adapt their attack strategies.
We propose a dynamic attack detection and prevention approach to address this challenge.
arXiv Detail & Related papers (2025-04-22T19:36:19Z) - Superpowering Open-Vocabulary Object Detectors for X-ray Vision [53.07098133237041]
Open-vocabulary object detection (OvOD) is set to revolutionize security screening by enabling systems to recognize any item in X-ray scans.
We propose RAXO, a framework that repurposes off-the-shelf RGB OvOD detectors for robust X-ray detection.
RAXO builds high-quality X-ray class descriptors using a dual-source retrieval strategy.
arXiv Detail & Related papers (2025-03-21T11:54:16Z) - SAFE: Self-Supervised Anomaly Detection Framework for Intrusion Detection [6.587970321208976]
This paper introduces SAFE, a novel framework that transforms network intrusion data into an image-like format.
It is shown that SAFE outperforms the state-of-the-art anomaly detection method, Scale Learning-based Deep Anomaly Detection method (SLAD), by up to 26.2%.
It also surpasses the state-of-the-art SSL-based network intrusion detection approach, Anomal-E, by up to 23.5% in F1-score.
arXiv Detail & Related papers (2025-02-10T23:20:59Z) - Real-Time Detection for Small UAVs: Combining YOLO and Multi-frame Motion Analysis [0.8971132850029493]
Unmanned Aerial Vehicle (UAV) detection technology plays a critical role in mitigating security risks and safeguarding privacy in both military and civilian applications.
Traditional detection methods face significant challenges in identifying UAV targets with extremely small pixels at long distances.
We propose the Global-Local YOLO-Motion (GL-YOMO) detection algorithm, which combines You Only Look Once (YOLO) object detection with multi-frame motion detection techniques.
arXiv Detail & Related papers (2024-10-10T14:30:50Z) - YOLO-FEDER FusionNet: A Novel Deep Learning Architecture for Drone Detection [4.281091463408282]
We introduce a novel deep learning architecture called YOLO-FEDER FusionNet.
Unlike conventional approaches, YOLO-FEDER FusionNet combines generic object detection methods with the specialized strength of camouflage object detection techniques to enhance drone detection capabilities.
arXiv Detail & Related papers (2024-06-17T15:25:31Z) - Attire-Based Anomaly Detection in Restricted Areas Using YOLOv8 for Enhanced CCTV Security [0.0]
This research introduces an innovative security enhancement approach, employing advanced image analysis and soft computing.
The focus is on an intelligent surveillance system that detects unauthorized individuals in restricted areas by analyzing attire.
arXiv Detail & Related papers (2024-03-31T11:09:19Z) - Task-Agnostic Detector for Insertion-Based Backdoor Attacks [53.77294614671166]
We introduce TABDet (Task-Agnostic Backdoor Detector), a pioneering task-agnostic method for backdoor detection.
TABDet leverages final layer logits combined with an efficient pooling technique, enabling unified logit representation across three prominent NLP tasks.
TABDet can jointly learn from diverse task-specific models, demonstrating superior detection efficacy over traditional task-specific methods.
arXiv Detail & Related papers (2024-03-25T20:12:02Z) - Exploring Decision-based Black-box Attacks on Face Forgery Detection [53.181920529225906]
Face forgery generation technologies generate vivid faces, which have raised public concerns about security and privacy.
Although face forgery detection has successfully distinguished fake faces, recent studies have demonstrated that face forgery detectors are very vulnerable to adversarial examples.
arXiv Detail & Related papers (2023-10-18T14:49:54Z) - Approximate Shielding of Atari Agents for Safe Exploration [83.55437924143615]
We propose a principled algorithm for safe exploration based on the concept of shielding.
We present preliminary results that show our approximate shielding algorithm effectively reduces the rate of safety violations.
arXiv Detail & Related papers (2023-04-21T16:19:54Z) - Adversarially-Aware Robust Object Detector [85.10894272034135]
We propose a Robust Detector (RobustDet) based on adversarially-aware convolution to disentangle gradients for model learning on clean and adversarial images.
Our model effectively disentangles gradients and significantly enhances the detection robustness with maintaining the detection ability on clean images.
arXiv Detail & Related papers (2022-07-13T13:59:59Z) - Prepare for Trouble and Make it Double. Supervised and Unsupervised
Stacking for AnomalyBased Intrusion Detection [4.56877715768796]
We propose the adoption of meta-learning, in the form of a two-layer Stacker, to create a mixed approach that detects both known and unknown threats.
It turns out to be more effective in detecting zero-day attacks than supervised algorithms, limiting their main weakness but still maintaining adequate capabilities in detecting known attacks.
arXiv Detail & Related papers (2022-02-28T08:41:32Z) - Surveillance Evasion Through Bayesian Reinforcement Learning [78.79938727251594]
We consider a 2D continuous path planning problem with a completely unknown intensity of random termination.
Those Observers' surveillance intensity is a priori unknown and has to be learned through repetitive path planning.
arXiv Detail & Related papers (2021-09-30T02:29:21Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Machine Learning Applications in Misuse and Anomaly Detection [0.0]
Machine learning and data mining algorithms play important roles in designing intrusion detection systems.
Based on their approaches toward the detection of attacks in a network, intrusion detection systems can be broadly categorized into two types.
In the misuse detection systems, an attack in a system is detected whenever the sequence of activities in the network matches with a known attack signature.
In the anomaly detection approach, on the other hand, anomalous states in a system are identified based on a significant difference in the state transitions of the system from its normal states.
arXiv Detail & Related papers (2020-09-10T19:52:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.