In today's interconnected world,network traffic is replete with adversarial *** technology evolves,these attacks are also becoming increasingly sophisticated,making them even harder to ***,artificial intelli-gence...
详细信息
In today's interconnected world,network traffic is replete with adversarial *** technology evolves,these attacks are also becoming increasingly sophisticated,making them even harder to ***,artificial intelli-gence(Al)and,specifically machine learning(ML),have shown great success in fast and accurate detection,classifica-tion,and even analysis of such ***,there is a growing body of literature addressing how subfields of Al/ML(e.g.,natural language processing(NLP))are getting leveraged to accurately detect evasive malicious patterns in network *** this paper,we delve into the current advancements in ML-based network traffic classification using image *** a rigorous experimental methodology,we first explore the process of network traffic to image ***,we investigate how machine learning techniques can effectively leverage image visualization to accurately classify evasive malicious traces within network *** the utilization of production-level tools and utilities in realistic experiments,our proposed solution achieves an impressive accuracy rate of 99.48%in detecting fileless malware,which is widely regarded as one of the most elusive classes of malicious software.
This paper discusses the influence of dynamic images and traditional static images on user perception in web interface visualizations of products. First, thirty graduate students in industrial design participated in a...
详细信息
This paper discusses the influence of dynamic images and traditional static images on user perception in web interface visualizations of products. First, thirty graduate students in industrial design participated in an eye tracking experiment, performing visual imagery (VI) tasks of the product images with different presentation formats and durations. The results of eye movement experiment show that the visual cognitive effect was better for the dynamic images than the static image, and the efficiency of visual search was improved. However, the emotional experience of viewing dynamic images was substantially affected by the presentation time. Secondly, there were significant differences in the cognitive level and emotional experience of the users between the dynamic images with different presentation times. The optimal perception experience was observed at a presentation time of 9000 ms, indicating that the subjective responses of the users' questionnaire survey did not represent the actual cognitive needs of the users. This study provides a scientific basis for product designers to achieve an improved browsing experience of their products.
Now the Industrial Internet of Things (IIoT) devices can be deployed to monitor the flow of data, the source of collection and supervision on a large scale of complex networks. It implements large networks for sending...
详细信息
Now the Industrial Internet of Things (IIoT) devices can be deployed to monitor the flow of data, the source of collection and supervision on a large scale of complex networks. It implements large networks for sending and receiving data connected by smart devices. Malware threats, which are primarily targeted at conventional computers linked to the Internet, can also be targeted at IoT machines. Therefore, a smart protection approach is needed to protect millions of IIoT users against malicious attacks. On the other hand, existing state-of - the-art malware identification methods are not better in terms of computational complexity. In this paper, we design architecture to detect malware attacks on the Industrial Internet of Things (MD-IIOT). For an in-depth analysis of malware, a methodology is proposed based on color image visualization and deep convolution neural network. The findings of the proposed method are compared to former approaches to malware detection. The experimental results indicate that the proposed method's predictive time and detection accuracy are higher than that of previous machine learning and deep learning methods. (C) 2020 Elsevier B.V. All rights reserved.
The recent increases in Internet use and the number of malicious attacks are helping attackers generate malware variants through automated software. Because of these attacks, the amount of malware and the number of th...
详细信息
The recent increases in Internet use and the number of malicious attacks are helping attackers generate malware variants through automated software. Because of these attacks, the amount of malware and the number of their variants are continuously increasing. Consequently, an improved malware analysis is a critical requirement to stop the rapid expansion of malicious activities. In this study, we propose a more accurate and slightly faster model to characterize malware variants. To implement the proposed model, we designed a method for transforming a malware binary into a grayscale image. We then propose the use of collective local and global malicious patterns for efficient malware variant identification. To reduce the computational time, the total number of dimensions of both types of patterns is reduced using selection methods. In addition, we prepared a baseline to compare the classification performance of our proposed model with previous state-of-the-art malware detection techniques. The experimental results indicate that the response time and classification performance of our model are better than those of previous models. (C) 2019 Elsevier Ltd. All rights reserved.
PDF, as one of most popular document file format, has been frequently utilized as a vector by attackers to covey malware due to its flexible file structure and the ability to embed different kinds of content. In this ...
详细信息
ISBN:
(纸本)9781728120805
PDF, as one of most popular document file format, has been frequently utilized as a vector by attackers to covey malware due to its flexible file structure and the ability to embed different kinds of content. In this paper, we propose a new learning-based method to detect PDF malware using image processing and processing techniques. The PDF files are first converted to grayscale images using image visualization techniques. Then various image features representing the distinct visual characteristics of PDF malware and benign PDF files are extracted. Finally, learning algorithms are applied to create the classification models to classify a new PDF file as malicious or benign. The performance of the proposed method was evaluated using Contagio PDF malware dataset. The results show that the proposed method is a viable solution fur PDF malware detection. It is also shown that the proposed method is more robust to resist reverse mimicry attacks than the slate-of-art learning-based method.
Spectral images captured by satellites and radio-telescopes are analyzed to obtain information about geological compositions distributions, distant asters as well as undersea terrain. Spectral images usually contain t...
详细信息
ISBN:
(纸本)9783319973043;9783319973036
Spectral images captured by satellites and radio-telescopes are analyzed to obtain information about geological compositions distributions, distant asters as well as undersea terrain. Spectral images usually contain tens to hundreds of continuous narrow spectral bands, so the visualization based on information fusion and dimensional reduction is required for proper display on a trichromatic monitor which is important for spectral image processing and analysis system. The visualizations of spectral images should preserve as much information as possible from the original signal and facilitate image interpretation. However, most of the existing visualization methods display spectral images in false colors, which contradicts with human's expectation and experience. In this paper, we present a novel visualization method based on generative adversarial network (GAN) to display spectral images in natural colors, in which a structure loss and an adversarial loss are combined to form a new loss function. The adversarial loss fits the visualized image to the natural image distribution using a discriminator network that is trained to distinguish false-color images from natural-color images. At the same time, we use an improved cycle loss as the structure constraint to guarantee structure consistency. Experimental results show that our method is able to generate structure-preserved and natural-looking visualizations.
High-quality visualization collections are beneficial for a variety of applications including visualization reference and data-driven visualization design. The visualization community has created many visualization co...
详细信息
High-quality visualization collections are beneficial for a variety of applications including visualization reference and data-driven visualization design. The visualization community has created many visualization collections, and developed interactive exploration systems for the collections. However, the systems are mainly based on extrinsic attributes like authors and publication years, whilst neglect intrinsic property (i.e., visual appearance) of visualizations, hindering visual comparison and query of visualization designs. This paper presents VISAtlas, an image-based approach empowered by neural image embedding, to facilitate exploration and query for visualization collections. To improve embedding accuracy, we create a comprehensive collection of synthetic and real-world visualizations, and use it to train a convolutional neural network (CNN) model with a triplet loss for taxonomical classification of visualizations. Next, we design a coordinated multiple view (CMV) system that enables multi-perspective exploration and design retrieval based on visualization embeddings. Specifically, we design a novel embedding overview that leverages contextual layout framework to preserve the context of the embedding vectors with the associated visualization taxonomies, and density plot and sampling techniques to address the overdrawing problem. We demonstrate in three case studies and one user study the effectiveness of VISAtlas in supporting comparative analysis of visualization collections, exploration of composite visualizations, and image-based retrieval of visualization designs. The studies reveal that real-world visualization collections (e.g., Beagle and VIS30K) better accord with the richness and diversity of visualization designs than synthetic collections (e.g., Data2Vis), inspiring composite visualizations are identified in real-world collections, and distinct design patterns exist in visualizations from different sources.
The aim of this paper is to demonstrate the major role and potential of three of the most powerful open source computerized tools for the advanced processing of medical images, in the study of neuroanatomy. DICOM imag...
详细信息
The aim of this paper is to demonstrate the major role and potential of three of the most powerful open source computerized tools for the advanced processing of medical images, in the study of neuroanatomy. DICOM images were acquired with radiodiagnostic equipment using 1.5 Tesla Magnetic Resonance (MR) images. images were further processed using the following applications: first, OsiriXTM version 4.0 32 bits for OS;Second, 3D Slicer version 4.3;and finally, MRIcron, version 6. Advanced neuroimaging processing requires two key features: segmentation and three- dimensional or volumetric reconstruction. Examples of identification and reconstruction of some of the most complex neuroimaging elements such vascular ones and tractographies are included in this paper. The three selected applications represent some of the most versatile technologies within the field of medical imaging.
BackgroundWith increasing evidence supporting three-dimensional (3D) automated breast (AB) ultrasound (US) for supplemental screening of breast cancer in increased-risk populations, including those with dense breasts ...
详细信息
BackgroundWith increasing evidence supporting three-dimensional (3D) automated breast (AB) ultrasound (US) for supplemental screening of breast cancer in increased-risk populations, including those with dense breasts and in limited-resource settings, there is an interest in developing more robust, cost-effective, and high-resolution 3DUS imaging techniques. Compared with specialized ABUS systems, our previously developed point-of-care 3D ABUS system addresses these needs and is compatible with any conventional US transducer, which offers a cost-effective solution and improved availability in clinical practice. While conventional US transducers have high in-plane resolution (axial and lateral), their out-of-plane resolution is constrained by the poor intrinsic elevational US resolution. Consequently, any oblique view plane in an acquired 3DUS image will contain high in-plane and poor out-of-plane resolution components, diminishing spatial resolution uniformity and overall diagnostic *** develop and validate a novel 3D complementary breast ultrasound (CBUS) approach to improve 3DUS spatial resolution uniformity using a conventional US transducer by acquiring and generating orthogonal 3DUS *** previously developed a cost-effective, portable, dedicated 3D ABUS system consisting of a wearable base, a compression assembly, and a mechanically driven scanner for automated 3DUS image acquisition, compatible with any commercial linear US transducer. For this system, we have proposed 3D CBUS approach which involves acquiring and registering orthogonal 3DUS images (VA${V}_A$ and VB${V}_B$) with an aim of overcoming the poor resolution uniformity in the scanning direction in 3D US images. The voxel intensity values in the 3D CBUS image are computed with a spherical-weighted algorithm from the original orthogonal 3DUS images. Experimental validation was performed with 2DUS frame densities of 2, 4, 6 frames mm-1 using an agar-based phantom with a speed o
To protect the increasing cyberspace assets, attack detection systems (ADS s) as well as intrusion detection systems (IDS s) have been equipped in various network environments. Recently, with the development of big da...
详细信息
To protect the increasing cyberspace assets, attack detection systems (ADS s) as well as intrusion detection systems (IDS s) have been equipped in various network environments. Recently, with the development of big data, machine learning, deep learning, neural networks and other artificial intelligence (AI) technologies, more and more ADSs/IDSs based on Artificial Intelligence are presented in academia and industry. Particularly, depending on the outstanding performance and efficiency in recognizing and classifying images, computer vision algorithms have been employed to detect malicious software and malicious traffic. However, we found that in wireless networks, the results vary significantly depending on the mapping methods used to transform the original network traffic data into visual images. Therefore, in this paper, we propose an AI -based attack detection scheme (TV -ADS) by introducing a novel trafficimage mapping method, which segments the sequential network traffic into individual event cells and transforms variant images to a uniform standard size, and design a CNN model to recognize normal and malicious traffics with these visible network event images. Finally, the results of our experiments on the AWID3 dataset demonstrate that our TVADS outperforms the existing schemes in terms of accuracy, precision, recall, F1 -score and efficiency.
暂无评论