Federated learning (FL) achieves collaborative learning without the need for data sharing, thus preventing privacy leakage. To extend FL into a fully decentralized algorithm, researchers have applied distributed optim...
Federated learning (FL) achieves collaborative learning without the need for data sharing, thus preventing privacy leakage. To extend FL into a fully decentralized algorithm, researchers have applied distributed optimization algorithms to FL by considering machine learning (ML) tasks as parameter optimization problems. Conversely, the consensus-based multi-hop federated distillation (CMFD) proposed in the authors' previous work makes neural network (NN) models get close with others in a function space rather than in a parameter space. Hence, this study solves two unresolved challenges of CMFD: (1) communication cost reduction and (2) visualization of model convergence. Based on a proposed dynamic communication cost reduction method (DCCR), the amount of data transferred in a network is reduced; however, with a slight degradation in the prediction accuracy. In addition, a technique for visualizing the distance between the NN models in a function space is also proposed. The technique applies a dimensionality reduction technique by approximating infinite-dimensional functions as numerical vectors to visualize the trajectory of how the models change by the distributed learning algorithm.
In this work, we investigate improving the generalizability of GAN-generated image detectors by performing data augmentation in the fingerprint domain. Specifically, we first separate the fingerprints and contents of ...
In this work, we investigate improving the generalizability of GAN-generated image detectors by performing data augmentation in the fingerprint domain. Specifically, we first separate the fingerprints and contents of the GAN-generated images using an autoencoder based GAN fingerprint extractor, followed by random perturbations of the fingerprints. Then the original fingerprints are substituted with the perturbed fingerprints and added to the original contents, to produce images that are visually invariant but with distinct fingerprints. The perturbed images can successfully imitate images generated by different GANs to improve the generalization of the detectors, which is demonstrated by the spectra visualization. To our knowledge, we are the first to conduct data augmentation in the fingerprint domain. Our work explores a novel prospect that is distinct from previous works on spatial and frequency domains augmentation. Extensive cross-GAN experiments demonstrate the effectiveness of our method compared to the state-of-the-art methods in detecting fake images generated by unknown GANs.
We propose Edit-History Vis, a visual analytics system designed to facilitate interactive exploration on Wikipedia edit history at a fine-grained level. The examination of detailed changes in Wikipedia articles is cru...
We propose Edit-History Vis, a visual analytics system designed to facilitate interactive exploration on Wikipedia edit history at a fine-grained level. The examination of detailed changes in Wikipedia articles is crucial for understanding how authors’ perspectives vary and conflict during the collaborative editing process. However, it is challenging to reveal the details while preserving the heterogeneous attributes of revisions, namely the time, content, and editor. The Edit-History Vis system integrates editor and textual changes of revisions by utilizing a force-directed revision graph that groups revisions based on standpoints. Through this revision graph, users can identify and analyze editing events such as edit wars, vandalism, repair, and normal updates. The effectiveness of the system in analyzing the edit history is validated through a qualitative comparison with prior work and a quantitative rating from a user study.
A non-fungible token (NFT) is a data unit stored on the blockchain. Nowadays, more and more investors and collectors (NFT traders), who participate in transactions of NFTs, have an urgent need to assess the performanc...
A non-fungible token (NFT) is a data unit stored on the blockchain. Nowadays, more and more investors and collectors (NFT traders), who participate in transactions of NFTs, have an urgent need to assess the performance of NFTs. However, there are two challenges for NFT traders when analyzing the performance of NFT. First, the current rarity models have flaws and are sometimes not convincing. In addition, NFT performance is dependent on multiple factors, such as images (high-dimensional data), history transactions (network), and market evolution (time series). It is difficult to take comprehensive consideration and analyze NFT performance efficiently. To address these challenges, we propose NFTVis, a visual analysis system that facilitates assessing individual NFT performance. A new NFT rarity model is proposed to quantify NFTs with images. Four well-coordinated views are designed to represent the various factors affecting the performance of the NFT. Finally, we evaluate the usefulness and effectiveness of our system using two case studies and user studies.
This paper presents an Augmented Reality (AR) solution called RISAR that allows for the real-time visualisation of Radiological hazards based on sensor data captured from detectors as well as Unmanned Aerial and Groun...
详细信息
This paper presents an Augmented Reality (AR) solution called RISAR that allows for the real-time visualisation of Radiological hazards based on sensor data captured from detectors as well as Unmanned Aerial and Ground Vehicles. RISAR improves safety for first responders during radiological events by enhancing their situation awareness. This lowers the risk of harm, and with it any health impacts and costs.
Single-cell RNA sequencing (scRNA-seq) is becoming popular in studying the gene expression of cells at the single-cell level. ScRNA-seq enables analysts to characterize cell types, thereby providing a better understan...
Single-cell RNA sequencing (scRNA-seq) is becoming popular in studying the gene expression of cells at the single-cell level. ScRNA-seq enables analysts to characterize cell types, thereby providing a better understanding of dynamic biological processes. In scRNA-seq data analysis, principal component analysis (PCA) is commonly used to reduce at least thousands of dimensions in the raw data to a manageable size so that analysts can visualize and cluster cells to identify different cell types. The conventional process to determine the optimal dimensionality includes a laborious manual review of hundreds of different projection plots. To address this problem, we introduce a dimensionality explorer for single-cell analysis, which is a visualization system that helps analysts to effectively determine the optimal dimensionality of scRNA-seq data. It employs a hull heatmap, which provides a holistic view of overlaps among multiple cell types across various dimensionalities using a convex hull-embedded color map. The hull heatmap effectively reduces the burden of manually reviewing hundreds of projection plots to determine the optimal dimensionality. Our system also provides interactive gene expression level visualization and intuitive lasso selection, thereby allowing analysts to progressively refine the convex hulls of the hull heatmap. We demonstrate the usefulness of the proposed system through a user study and three case studies conducted by domain experts.
This paper addresses the growing issue of terrorists utilizing the Internet, and particularly the Dark Web market places, with the purpose of fundraising for their illegal activities. It proposes the Visual Analytics ...
This paper addresses the growing issue of terrorists utilizing the Internet, and particularly the Dark Web market places, with the purpose of fundraising for their illegal activities. It proposes the Visual Analytics (VA) system, an advanced AI-powered tool, in an effort to combat cross-border financing associated with terrorism. The tools focus on semantic concept detection and large-scale visual data indexing, and the ultimate goal is to familiarize end-users, practitioners, and law enforcement investigators with these technologies. This paper discusses prior works concerning the presentation and visualization of Deep Learning results to users, outlines the main objectives, and provides fundamental usage instructions for the VA system.
In this work, we propose the Network Performance Collector (NPC) workflow for automated network performance characterization. The workflow relies on the collection, processing, and visualization of network performance...
In this work, we propose the Network Performance Collector (NPC) workflow for automated network performance characterization. The workflow relies on the collection, processing, and visualization of network performance metrics such as throughput and latency, and can be used for analysis with various network performance models. Depending on the selected model, benchmark tools such as iperf or sockperf and microbenchmarks specific to parallel programming models can be automated and orchestrated for data collection using the NPC. The data obtained can then be used by NPC to, for example, validate and characterize the performance of the underlying network or to analyze the system limitations for a given application.
Cybersecurity solutions based on machine learning (ML) and behavioral fingerprinting have demonstrated their suitability when detecting heterogeneous malware. However, most solutions are black boxes missing explainabl...
Cybersecurity solutions based on machine learning (ML) and behavioral fingerprinting have demonstrated their suitability when detecting heterogeneous malware. However, most solutions are black boxes missing explainable and visual capabilities needed to analyze relevant metrics and malicious behaviors to be collected. In this demonstration, SecBox, a dynamic malware analysis platform with integrated data collection and visualization for malware execution, is presented. To provide a lightweight sandboxing approach, the architecture relies on Linux containers for isolation. The sandboxing and data analysis components of the SecBox architecture are deployed in a test bed to show the analysis of two malware families. In the presented scenario, the Monti ransomware and CoinMiner, a Monero-based cryptojacker are analyzed after obtaining them from a public database.
In order to promote the development of gesture interaction on wearable devices, this article explores the negative effects of sensor shifts in photoplethysmography (PPG)-based gesture recognition technology and propos...
详细信息
In order to promote the development of gesture interaction on wearable devices, this article explores the negative effects of sensor shifts in photoplethysmography (PPG)-based gesture recognition technology and propose a solution based on transfer learning (TL) method. First, ten batches of PPG data with sensor shifts are collected for 14 gestures and ten participants. Then, the negative effects of sensor shifts is explored through experiments of feature visualization and gesture recognition based on single-batch data and multibatch data. Experimental results show that the negative effect of sensor shifts can significantly change the feature distribution of gesture PPG signals, resulting in a sharp drop (59.24%) in gesture recognition accuracy. Finally, with the goal of reducing user training burden in the presence of sensor shifts, a long short-term memory (LSTM)-based TL scheme is proposed and implemented. Compared to non-TL strategy, TL strategy can improve the accuracy of gesture recognition to a certain degree, especially, the improvement effect is more significant when the amount of data involved in model calibration is small. Using the proposed TL scheme, only a small amount of data is needed to calibrate the classier in the practical application of PPG gesture interaction. This study lays a good foundation for the realization of PPG-based gesture interaction applications on wearable devices.
暂无评论