IoT malware is rapidly increasing due to variants easily generated from publicly available source codes. Malware image classification capable of fast and accurate malware identification attracts attention. Since the c...
详细信息
ISBN:
(纸本)9798350326970
IoT malware is rapidly increasing due to variants easily generated from publicly available source codes. Malware image classification capable of fast and accurate malware identification attracts attention. Since the classification by imaging is affected by malware binary changes, a binary modification without behavioral changes can be a potential attacking method to the classification by imaging. There are concerns that by combining the publicly available malware source code with readily available source code obfuscation tools, it is possible to construct an effective attack that bypasses image classifiers relatively simply. In this study, we show the effectiveness of the attack by source code obfuscation and the possibility of defense against the attack. The contribution of this research is twofold. 1) We showed that Obfuscator-LLVM (oLLVM) code obfuscation could be used as an attack method on malware image classification. The obfuscated malware binaries made by oLLVM were misclassified by VGG16-based image classifier for all the attacked malware families including Mirai, Lightaidra, and Bashlite. 2) We showed that classifier training with obfuscated samples could address this attack method. We confirmed that the malware image classifier trained with obfuscated malware binaries made by oLLVM could classify with an accuracy of 100% the malware family with obfuscation as the obfuscated original malware family.
On shopping websites, product images of low quality negatively affect customer experience. Although there are plenty of work in detecting images with different defects, few efforts have been dedicated to correct those...
详细信息
ISBN:
(纸本)9781728198354
On shopping websites, product images of low quality negatively affect customer experience. Although there are plenty of work in detecting images with different defects, few efforts have been dedicated to correct those defects at scale. A major challenge is that there are thousands of product types and each has specific defects, therefore building defect specific models is unscalable. In this paper, we propose a unified image-to-image (I2I) translation model to correct multiple defects across different product types. Our model leverages an attention mechanism which hierarchically incorporates high-level defect groups and specific defect types to guide the network to focus on defect-related image regions. Evaluated on eight public datasets, our model reduces the Frechet Inception Distance (FID) by 24.6% in average compared with MoNCE, the state-of-the-art I2I method. Another practical challenge on shopping websites is the lack of high quality paired images. We extend our model to be semi-paired by leveraging both paired and unpaired data. Tested on a shopping website dataset to correct three image defects, our model reduces (FID) by 63.2% in average compared with WS-I2I, the state-of-the art semi-paired I2I method.
Traditional computer 3D modelling techniques require a lot of manpower, material and time, and do not provide multiple information at the same time. BIM technology is a kind of software based on model development, and...
详细信息
Early diagnosis is very important in brain tumors. Although Magnetic Resonance (MRI) is widely used for brain tumor detection, it is difficult to detect the tumor manually. Therefore, computer-aided diagnosis systems ...
详细信息
ISBN:
(纸本)9798350343557
Early diagnosis is very important in brain tumors. Although Magnetic Resonance (MRI) is widely used for brain tumor detection, it is difficult to detect the tumor manually. Therefore, computer-aided diagnosis systems have been frequently utilized in recent years. In this study, an Efficient Channel Attention-Dense Convolutional Network (ECA-DenseNet) framework is proposed to detect tumors in patients based on brain MRI images. While detecting the tumor, it is tried to determine which type of tumor is present in the patient. In the developed ECA-DenseNet structure, an ECA block has been added to the dense blocks. The ECA block aimed to discard unimportant information and thus reduce the computation time. The improved DenseNet model has been tested on an open-source dataset. The improved model is compared with DenseNet-121, DenseNet-169, DenseNet-201, and DenseNet-264. The experimental results show the improving model has better classification performance than the others. The accuracy of the proposed model was 95.07%.
At present, image classification model has become an essential component for detection system. However, existing identification models are primarily concentrated on the convolutional neural network or utilize transfor...
详细信息
In recent years, there has been a lot of research on underwater imageprocessing. Since taking images underwater is so challenging, there has been an upward trend in research in this domain. Poor contrast, blurring fe...
详细信息
This research paper presents the implementation and evaluation of a Total Variation (TV) layer within a deep learning framework for image denoising tasks. The TV layer is based on Chambolle's projection method and...
详细信息
In Internet of Things (IoT) and clouds, while many imageprocessing tasks are outsourced to third party cloud computing platforms, imageprocessing in encrypted domain is needed in many services for data confidentiali...
详细信息
image description is a task which combines the methods like Natural Language processing, Artificial Intelligence and computer Vision, which aims to generate contextually and semantically correct descriptions for an im...
详细信息
Deep Reinforcement Learning (DRL) is a deep learning (DL) network model that uses environmental feedback to train and make decisions. Expected value, as a powerful mathematical tool, is widely used in DRL network trai...
详细信息
暂无评论