Improved YOLOv8 Detection Algorithm in Security Inspection Image
- URL: http://arxiv.org/abs/2308.06452v3
- Date: Tue, 22 Aug 2023 07:11:04 GMT
- Title: Improved YOLOv8 Detection Algorithm in Security Inspection Image
- Authors: Liyao Lu
- Abstract summary: This paper aims at the problems of overlapping detection objects, false detection of contraband, and missed detection in the process of X-ray image detection.
An improved X-ray contraband detection algorithm CSS-YOLO based on YOLOv8s is proposed.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Security inspection is the first line of defense to ensure the safety of
people's lives and property, and intelligent security inspection is an
inevitable trend in the future development of the security inspection industry.
Aiming at the problems of overlapping detection objects, false detection of
contraband, and missed detection in the process of X-ray image detection, an
improved X-ray contraband detection algorithm CSS-YOLO based on YOLOv8s is
proposed.
Related papers
- YOLO-FEDER FusionNet: A Novel Deep Learning Architecture for Drone Detection [4.281091463408282]
We introduce a novel deep learning architecture called YOLO-FEDER FusionNet.
Unlike conventional approaches, YOLO-FEDER FusionNet combines generic object detection methods with the specialized strength of camouflage object detection techniques to enhance drone detection capabilities.
arXiv Detail & Related papers (2024-06-17T15:25:31Z) - Attire-Based Anomaly Detection in Restricted Areas Using YOLOv8 for Enhanced CCTV Security [0.0]
This research introduces an innovative security enhancement approach, employing advanced image analysis and soft computing.
The focus is on an intelligent surveillance system that detects unauthorized individuals in restricted areas by analyzing attire.
arXiv Detail & Related papers (2024-03-31T11:09:19Z) - Task-Agnostic Detector for Insertion-Based Backdoor Attacks [53.77294614671166]
We introduce TABDet (Task-Agnostic Backdoor Detector), a pioneering task-agnostic method for backdoor detection.
TABDet leverages final layer logits combined with an efficient pooling technique, enabling unified logit representation across three prominent NLP tasks.
TABDet can jointly learn from diverse task-specific models, demonstrating superior detection efficacy over traditional task-specific methods.
arXiv Detail & Related papers (2024-03-25T20:12:02Z) - Exploring Decision-based Black-box Attacks on Face Forgery Detection [53.181920529225906]
Face forgery generation technologies generate vivid faces, which have raised public concerns about security and privacy.
Although face forgery detection has successfully distinguished fake faces, recent studies have demonstrated that face forgery detectors are very vulnerable to adversarial examples.
arXiv Detail & Related papers (2023-10-18T14:49:54Z) - Approximate Shielding of Atari Agents for Safe Exploration [83.55437924143615]
We propose a principled algorithm for safe exploration based on the concept of shielding.
We present preliminary results that show our approximate shielding algorithm effectively reduces the rate of safety violations.
arXiv Detail & Related papers (2023-04-21T16:19:54Z) - Adversarially-Aware Robust Object Detector [85.10894272034135]
We propose a Robust Detector (RobustDet) based on adversarially-aware convolution to disentangle gradients for model learning on clean and adversarial images.
Our model effectively disentangles gradients and significantly enhances the detection robustness with maintaining the detection ability on clean images.
arXiv Detail & Related papers (2022-07-13T13:59:59Z) - Prepare for Trouble and Make it Double. Supervised and Unsupervised
Stacking for AnomalyBased Intrusion Detection [4.56877715768796]
We propose the adoption of meta-learning, in the form of a two-layer Stacker, to create a mixed approach that detects both known and unknown threats.
It turns out to be more effective in detecting zero-day attacks than supervised algorithms, limiting their main weakness but still maintaining adequate capabilities in detecting known attacks.
arXiv Detail & Related papers (2022-02-28T08:41:32Z) - Surveillance Evasion Through Bayesian Reinforcement Learning [78.79938727251594]
We consider a 2D continuous path planning problem with a completely unknown intensity of random termination.
Those Observers' surveillance intensity is a priori unknown and has to be learned through repetitive path planning.
arXiv Detail & Related papers (2021-09-30T02:29:21Z) - DetectorGuard: Provably Securing Object Detectors against Localized
Patch Hiding Attacks [28.94435153159868]
State-of-the-art object detectors are vulnerable to localized patch hiding attacks.
We propose the first general framework for building provably robust detectors against the localized patch hiding attack called DetectorGuard.
arXiv Detail & Related papers (2021-02-05T02:02:21Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Machine Learning Applications in Misuse and Anomaly Detection [0.0]
Machine learning and data mining algorithms play important roles in designing intrusion detection systems.
Based on their approaches toward the detection of attacks in a network, intrusion detection systems can be broadly categorized into two types.
In the misuse detection systems, an attack in a system is detected whenever the sequence of activities in the network matches with a known attack signature.
In the anomaly detection approach, on the other hand, anomalous states in a system are identified based on a significant difference in the state transitions of the system from its normal states.
arXiv Detail & Related papers (2020-09-10T19:52:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.