In recent years,anomaly detection has attracted much attention in industrial production.As traditional anomaly detection methods usually rely on direct comparison of samples,they often ignore the intrinsic relationshi...In recent years,anomaly detection has attracted much attention in industrial production.As traditional anomaly detection methods usually rely on direct comparison of samples,they often ignore the intrinsic relationship between samples,resulting in poor accuracy in recognizing anomalous samples.To address this problem,a knowledge distillation anomaly detection method based on feature reconstruction was proposed in this study.Knowledge distillation was performed after inverting the structure of the teacher-student network to avoid the teacher-student network sharing the same inputs and similar structure.Representability was improved by using feature splicing to unify features at different levels,and the merged features were processed and reconstructed using an improved Transformer.The experimental results show that the proposed method achieves better performance on the MVTec dataset,verifying its effectiveness and feasibility in anomaly detection tasks.This study provides a new idea to improve the accuracy and efficiency of anomaly detection.展开更多
Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research si...Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research significance for network security.Due to the strong generalization of invalid features during training process,it is more difficult for single autoencoder intrusion detection model to obtain effective results.A network intrusion detection model based on the Ensemble of Denoising Adversarial Autoencoder(EDAAE)was proposed,which had higher accuracy and reliability compared to the traditional anomaly detection model.Using the adversarial learning idea of Adversarial Autoencoder(AAE),the discriminator module was added to the original model,and the encoder part was used as the generator.The distribution of the hidden space of the data generated by the encoder matched with the distribution of the original data.The generalization of the model to the invalid features was also reduced to improve the detection accuracy.At the same time,the denoising autoencoder and integrated operation was introduced to prevent overfitting in the adversarial learning process.Experiments on the CICIDS2018 traffic dataset showed that the proposed intrusion detection model achieves an Accuracy of 95.23%,which out performs traditional self-encoders and other existing intrusion detection models methods in terms of overall performance.展开更多
脱氧雪腐镰刀南烯醇(Don)是赤霉病麦中最常检出的毒素之一,在美国、加拿大、日本和我国等生产的玉米、麦类中 Don 检出率可达20%~100%,造成了 Don 对人畜健康的威胁。因此,国内外学者对 Don 的毒性做了较多研究,本文综述了近年来 Don ...脱氧雪腐镰刀南烯醇(Don)是赤霉病麦中最常检出的毒素之一,在美国、加拿大、日本和我国等生产的玉米、麦类中 Don 检出率可达20%~100%,造成了 Don 对人畜健康的威胁。因此,国内外学者对 Don 的毒性做了较多研究,本文综述了近年来 Don 的毒性研究进展。1.展开更多
This paper presents an urban expressway video surveillance and monitoring system for traffic flow measurement and abnormal performance detection. The proposed flow detection module collects traffic flow statistics in ...This paper presents an urban expressway video surveillance and monitoring system for traffic flow measurement and abnormal performance detection. The proposed flow detection module collects traffic flow statistics in real time by leveraging multi-vehicle tracking information. Based on these online statistics, road operating situations can be easily obtained. Using spatiotemporal trajectories, vehicle motion paths are encoded by hidden Markov models. With path division and parameter matching, abnormal performances containing extra low or high speed driving, illegal stopping and turning are detected in real scenes. The traffic surveillance approach is implemented and evaluated on a DM642 DSP-based embedded platform. Experimental results demonstrate that the proposed system is feasible for the detection of vehicle speed, vehicle counts and road efficiency, and it is effective for the monitoring of the aforementioned anomalies with low computational costs.展开更多
This paper presents a mechanism for detecting flooding-attacks. The simplicity of the mechanism lies in its statelessness and low computation overhead, which makes the detection mechanism itself immune to flooding-att...This paper presents a mechanism for detecting flooding-attacks. The simplicity of the mechanism lies in its statelessness and low computation overhead, which makes the detection mechanism itself immune to flooding-attacks. The SYN-flooding, as an instance of flooding-attack, is used to illustrate the anomaly detection mechanism. The mechanism applies an exponentially weighted moving average (EWMA) method to detect the abrupt net flow and applies a symmetry analysis method to detect the anomaly activity of the network flow. Experiment shows that the mechanism has high detection accuracy and low detection latency.展开更多
An intrusion detection (ID) model is proposed based on the fuzzy data mining method. A major difficulty of anomaly ID is that patterns of the normal behavior change with time. In addition, an actual intrusion with a...An intrusion detection (ID) model is proposed based on the fuzzy data mining method. A major difficulty of anomaly ID is that patterns of the normal behavior change with time. In addition, an actual intrusion with a small deviation may match normal patterns. So the intrusion behavior cannot be detected by the detection system.To solve the problem, fuzzy data mining technique is utilized to extract patterns representing the normal behavior of a network. A set of fuzzy association rules mined from the network data are shown as a model of “normal behaviors”. To detect anomalous behaviors, fuzzy association rules are generated from new audit data and the similarity with sets mined from “normal” data is computed. If the similarity values are lower than a threshold value,an alarm is given. Furthermore, genetic algorithms are used to adjust the fuzzy membership functions and to select an appropriate set of features.展开更多
In order to implement the real-time detection of abnormality of elder and devices in an empty nest home,multi-modal joint sensors are used to collect discrete action sequences of behavior,and the improved hierarchical...In order to implement the real-time detection of abnormality of elder and devices in an empty nest home,multi-modal joint sensors are used to collect discrete action sequences of behavior,and the improved hierarchical hidden Markov model is adopted to Abstract these discrete action sequences captured by multi-modal joint sensors into an occupant’s high-level behavior—event,then structure representation models of occupant normality are modeled from large amounts of spatio-temporal data. These models are used as classifiers of normality to detect an occupant’s abnormal behavior.In order to express context information needed by reasoning and detection,multi-media ontology (MMO) is designed to annotate and reason about the media information in the smart monitoring system.A pessimistic emotion model (PEM) is improved to analyze multi-interleaving events of multi-active devices in the home.Experiments demonstrate that the PEM can enhance the accuracy and reliability for detecting active devices when these devices are in blind regions or are occlusive. The above approach has good performance in detecting abnormalities involving occupants and devices in a real-time way.展开更多
[Objective] The experiment aimed to explore physiological and biochemical changes of leaves after plants were mutated. [Method] A rice double mutant with stripes on stems, leaves and spikelets were taken as experiment...[Objective] The experiment aimed to explore physiological and biochemical changes of leaves after plants were mutated. [Method] A rice double mutant with stripes on stems, leaves and spikelets were taken as experimental materials to study the enzyme activity changes in different growth stages and amino acid variation in rice. [ Result] The SOD activity in mutant was higher than that in wild plant at tillering metaphase, but lower than that in wild type before heading stage and late flowering; the POD activity in three stages increased firstly then declined and the activity showed highest maximal activity at before heading stage. However, the POD activity in wild type showed the opposite change trend; the CAT activity presented degression at three stages, especially high at tillering metaphase, but reverse changes in wild type; the MDA activity decreased at three stages, but it was still higher than that in wild type, besides, the soluble sugar content of mutant was lower, but total amino acid content was increased. [ Conclusion] The expression of mutant characteristics was correlated with SOD, POD, CAT and MDA activity Changes and these changes made the mutant survive and rice quality change at last.展开更多
AIM: To demonstrate the imaging findings of biliopan creatic and pancreatico-biliary reflux in patients with anomalous union of the pancreatico biliary duct (AUPBD) on gadoxetic acidenhanced functional magnetic res...AIM: To demonstrate the imaging findings of biliopan creatic and pancreatico-biliary reflux in patients with anomalous union of the pancreatico biliary duct (AUPBD) on gadoxetic acidenhanced functional magnetic resonance cholangiography (fMRC).展开更多
Earthquake precursor data have been used as an important basis for earthquake prediction.In this study,a recurrent neural network(RNN)architecture with long short-term memory(LSTM)units is utilized to develop a predic...Earthquake precursor data have been used as an important basis for earthquake prediction.In this study,a recurrent neural network(RNN)architecture with long short-term memory(LSTM)units is utilized to develop a predictive model for normal data.Furthermore,the prediction errors from the predictive models are used to indicate normal or abnormal behavior.An additional advantage of using the LSTM networks is that the earthquake precursor data can be directly fed into the network without any elaborate preprocessing as required by other approaches.Furthermore,no prior information on abnormal data is needed by these networks as they are trained only using normal data.Experiments using three groups of real data were conducted to compare the anomaly detection results of the proposed method with those of manual recognition.The comparison results indicated that the proposed LSTM network achieves promising results and is viable for detecting anomalies in earthquake precursor data.展开更多
For anomaly detection,anomalies existing in the background will affect the detection performance.Accordingly,a background refinement method based on the local density is proposed to remove the anomalies from thebackgr...For anomaly detection,anomalies existing in the background will affect the detection performance.Accordingly,a background refinement method based on the local density is proposed to remove the anomalies from thebackground.In this work,the local density is measured by its spectral neighbors through a certain radius which is obtained by calculating the mean median of the distance matrix.Further,a two-step segmentation strategy is designed.The first segmentation step divides the original background into two subsets,a large subset composed by background pixels and a small subset containing both background pixels and anomalies.The second segmentation step employing Otsu method with an aim to obtain a discrimination threshold is conducted on the small subset.Then the pixels whose local densities are lower than the threshold are removed.Finally,to validate the effectiveness of the proposed method,it combines Reed-Xiaoli detector and collaborative-representation-based detector to detect anomalies.Experiments are conducted on two real hyperspectral datasets.Results show that the proposed method achieves better detection performance.展开更多
文摘In recent years,anomaly detection has attracted much attention in industrial production.As traditional anomaly detection methods usually rely on direct comparison of samples,they often ignore the intrinsic relationship between samples,resulting in poor accuracy in recognizing anomalous samples.To address this problem,a knowledge distillation anomaly detection method based on feature reconstruction was proposed in this study.Knowledge distillation was performed after inverting the structure of the teacher-student network to avoid the teacher-student network sharing the same inputs and similar structure.Representability was improved by using feature splicing to unify features at different levels,and the merged features were processed and reconstructed using an improved Transformer.The experimental results show that the proposed method achieves better performance on the MVTec dataset,verifying its effectiveness and feasibility in anomaly detection tasks.This study provides a new idea to improve the accuracy and efficiency of anomaly detection.
文摘Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research significance for network security.Due to the strong generalization of invalid features during training process,it is more difficult for single autoencoder intrusion detection model to obtain effective results.A network intrusion detection model based on the Ensemble of Denoising Adversarial Autoencoder(EDAAE)was proposed,which had higher accuracy and reliability compared to the traditional anomaly detection model.Using the adversarial learning idea of Adversarial Autoencoder(AAE),the discriminator module was added to the original model,and the encoder part was used as the generator.The distribution of the hidden space of the data generated by the encoder matched with the distribution of the original data.The generalization of the model to the invalid features was also reduced to improve the detection accuracy.At the same time,the denoising autoencoder and integrated operation was introduced to prevent overfitting in the adversarial learning process.Experiments on the CICIDS2018 traffic dataset showed that the proposed intrusion detection model achieves an Accuracy of 95.23%,which out performs traditional self-encoders and other existing intrusion detection models methods in terms of overall performance.
基金The National Key Technology R&D Program of China during the 11th Five-Year Plan Period(No.2009BAG13A04)Jiangsu Transportation Science Research Program(No.08X09)Program of Suzhou Science and Technology(No.SG201076)
文摘This paper presents an urban expressway video surveillance and monitoring system for traffic flow measurement and abnormal performance detection. The proposed flow detection module collects traffic flow statistics in real time by leveraging multi-vehicle tracking information. Based on these online statistics, road operating situations can be easily obtained. Using spatiotemporal trajectories, vehicle motion paths are encoded by hidden Markov models. With path division and parameter matching, abnormal performances containing extra low or high speed driving, illegal stopping and turning are detected in real scenes. The traffic surveillance approach is implemented and evaluated on a DM642 DSP-based embedded platform. Experimental results demonstrate that the proposed system is feasible for the detection of vehicle speed, vehicle counts and road efficiency, and it is effective for the monitoring of the aforementioned anomalies with low computational costs.
基金TheNationalHighTechnologyResearchandDevelopmentProgramofChina(863Program) (No .2 0 0 2AA14 5 0 90 )
文摘This paper presents a mechanism for detecting flooding-attacks. The simplicity of the mechanism lies in its statelessness and low computation overhead, which makes the detection mechanism itself immune to flooding-attacks. The SYN-flooding, as an instance of flooding-attack, is used to illustrate the anomaly detection mechanism. The mechanism applies an exponentially weighted moving average (EWMA) method to detect the abrupt net flow and applies a symmetry analysis method to detect the anomaly activity of the network flow. Experiment shows that the mechanism has high detection accuracy and low detection latency.
文摘An intrusion detection (ID) model is proposed based on the fuzzy data mining method. A major difficulty of anomaly ID is that patterns of the normal behavior change with time. In addition, an actual intrusion with a small deviation may match normal patterns. So the intrusion behavior cannot be detected by the detection system.To solve the problem, fuzzy data mining technique is utilized to extract patterns representing the normal behavior of a network. A set of fuzzy association rules mined from the network data are shown as a model of “normal behaviors”. To detect anomalous behaviors, fuzzy association rules are generated from new audit data and the similarity with sets mined from “normal” data is computed. If the similarity values are lower than a threshold value,an alarm is given. Furthermore, genetic algorithms are used to adjust the fuzzy membership functions and to select an appropriate set of features.
基金The National Natural Science Foundation of China(No.60773110)the Youth Education Fund of Hunan Province(No.07B014)
文摘In order to implement the real-time detection of abnormality of elder and devices in an empty nest home,multi-modal joint sensors are used to collect discrete action sequences of behavior,and the improved hierarchical hidden Markov model is adopted to Abstract these discrete action sequences captured by multi-modal joint sensors into an occupant’s high-level behavior—event,then structure representation models of occupant normality are modeled from large amounts of spatio-temporal data. These models are used as classifiers of normality to detect an occupant’s abnormal behavior.In order to express context information needed by reasoning and detection,multi-media ontology (MMO) is designed to annotate and reason about the media information in the smart monitoring system.A pessimistic emotion model (PEM) is improved to analyze multi-interleaving events of multi-active devices in the home.Experiments demonstrate that the PEM can enhance the accuracy and reliability for detecting active devices when these devices are in blind regions or are occlusive. The above approach has good performance in detecting abnormalities involving occupants and devices in a real-time way.
基金Supported by Program for New Century Excellent Talents in University(NCET-04-0907)the Innovative Research Team in University (IRT0453)~~
文摘[Objective] The experiment aimed to explore physiological and biochemical changes of leaves after plants were mutated. [Method] A rice double mutant with stripes on stems, leaves and spikelets were taken as experimental materials to study the enzyme activity changes in different growth stages and amino acid variation in rice. [ Result] The SOD activity in mutant was higher than that in wild plant at tillering metaphase, but lower than that in wild type before heading stage and late flowering; the POD activity in three stages increased firstly then declined and the activity showed highest maximal activity at before heading stage. However, the POD activity in wild type showed the opposite change trend; the CAT activity presented degression at three stages, especially high at tillering metaphase, but reverse changes in wild type; the MDA activity decreased at three stages, but it was still higher than that in wild type, besides, the soluble sugar content of mutant was lower, but total amino acid content was increased. [ Conclusion] The expression of mutant characteristics was correlated with SOD, POD, CAT and MDA activity Changes and these changes made the mutant survive and rice quality change at last.
文摘AIM: To demonstrate the imaging findings of biliopan creatic and pancreatico-biliary reflux in patients with anomalous union of the pancreatico biliary duct (AUPBD) on gadoxetic acidenhanced functional magnetic resonance cholangiography (fMRC).
基金supported by the Science for Earthquake Resilience of China(No.XH18027)Research and Development of Comprehensive Geophysical Field Observing Instrument in China's Mainland(No.Y201703)Research Fund Project of Shandong Earthquake Agency(Nos.JJ1505Y and JJ1602)
文摘Earthquake precursor data have been used as an important basis for earthquake prediction.In this study,a recurrent neural network(RNN)architecture with long short-term memory(LSTM)units is utilized to develop a predictive model for normal data.Furthermore,the prediction errors from the predictive models are used to indicate normal or abnormal behavior.An additional advantage of using the LSTM networks is that the earthquake precursor data can be directly fed into the network without any elaborate preprocessing as required by other approaches.Furthermore,no prior information on abnormal data is needed by these networks as they are trained only using normal data.Experiments using three groups of real data were conducted to compare the anomaly detection results of the proposed method with those of manual recognition.The comparison results indicated that the proposed LSTM network achieves promising results and is viable for detecting anomalies in earthquake precursor data.
基金Projects(61405041,61571145)supported by the National Natural Science Foundation of ChinaProject(ZD201216)supported by the Key Program of Heilongjiang Natural Science Foundation,China+1 种基金Project(RC2013XK009003)supported by Program Excellent Academic Leaders of Harbin,ChinaProject(HEUCF1508)supported by the Fundamental Research Funds for the Central Universities,China
文摘For anomaly detection,anomalies existing in the background will affect the detection performance.Accordingly,a background refinement method based on the local density is proposed to remove the anomalies from thebackground.In this work,the local density is measured by its spectral neighbors through a certain radius which is obtained by calculating the mean median of the distance matrix.Further,a two-step segmentation strategy is designed.The first segmentation step divides the original background into two subsets,a large subset composed by background pixels and a small subset containing both background pixels and anomalies.The second segmentation step employing Otsu method with an aim to obtain a discrimination threshold is conducted on the small subset.Then the pixels whose local densities are lower than the threshold are removed.Finally,to validate the effectiveness of the proposed method,it combines Reed-Xiaoli detector and collaborative-representation-based detector to detect anomalies.Experiments are conducted on two real hyperspectral datasets.Results show that the proposed method achieves better detection performance.