Goto

Collaborating Authors

Physical Integrity Attack Detection of Surveillance Camera with Deep Learning Based Video Frame Interpolation

arXiv.org Artificial Intelligence

Surveillance cameras, which is a form of Cyber Physical System, are deployed extensively to provide visual surveillance monitoring of activities of interest or anomalies. However, these cameras are at risks of physical security attacks against their physical attributes or configuration like tampering of their recording coverage, camera positions or recording configurations like focus and zoom factors. Such adversarial alteration of physical configuration could also be invoked through cyber security attacks against the camera's software vulnerabilities to administratively change the camera's physical configuration settings. When such Cyber Physical attacks occur, they affect the integrity of the targeted cameras that would in turn render these cameras ineffective in fulfilling the intended security functions. There is a significant measure of research work in detection mechanisms of cyber-attacks against these Cyber Physical devices, however it is understudied area with such mechanisms against integrity attacks on physical configuration. This research proposes the use of the novel use of deep learning algorithms to detect such physical attacks originating from cyber or physical spaces. Additionally, we proposed the novel use of deep learning-based video frame interpolation for such detection that has comparatively better performance to other anomaly detectors in spatiotemporal environments.


[Editors' Choice] Signatures of chiral anomaly multiply

Science

Chiral anomaly is one of the most striking phenomena predicted to occur in Dirac and Weyl semimetals. One of its consequences, the decrease in electrical resistance with applied magnetic field, has been observed in several of these materials, but disentangling it from other, less exotic effects is tricky. Working with nanoplates of the Dirac semimetal Cd3As2, Zhang et al. observed two additional signatures of the chiral anomaly in nonlocal transport and optical response. The unusual nonlocal transport was caused partly by the diffusion of valley polarization, which in turn was a consequence of the chiral anomaly. These complementary signatures will make it possible to study the phenomenon more closely.


[D] Splitting ConvLSTM into multiple GPUs • r/MachineLearning

#artificialintelligence

I ran out of memory running my network on a single GPU(12 GB memory). My network is a ConvLSTM with n timesteps, and at each timestep, I pass a single image, for now. At each timestep, all the network weights will be same but the feature maps generated would lead to large memory usage.


RobustTAD: Robust Time Series Anomaly Detection via Decomposition and Convolutional Neural Networks

arXiv.org Machine Learning

The monitoring and management of numerous and diverse time series data at Alibaba Group calls for an effective and scalable time series anomaly detection service. In this paper, we propose RobustTAD, a Robust Time series Anomaly Detection framework by integrating robust seasonal-trend decomposition and convolutional neural network for time series data. The seasonal-trend decomposition can effectively handle complicated patterns in time series, and meanwhile significantly simplifies the architecture of the neural network, which is an encoder-decoder architecture with skip connections. This architecture can effectively capture the multi-scale information from time series, which is very useful in anomaly detection. Due to the limited labeled data in time series anomaly detection, we systematically investigate data augmentation methods in both time and frequency domains. We also introduce label-based weight and value-based weight in the loss function by utilizing the unbalanced nature of the time series anomaly detection problem. Compared with the widely used forecasting-based anomaly detection algorithms, decomposition-based algorithms, traditional statistical algorithms, as well as recent neural network based algorithms, RobustTAD performs significantly better on public benchmark datasets. It is deployed as a public online service and widely adopted in different business scenarios at Alibaba Group.


Anomaly detection using streaming analytics & AI

#artificialintelligence

An organization's ability to quickly detect and respond to anomalies is critical to success in a digitally transforming culture. Google Cloud customers can strengthen this ability by using rich artificial intelligence and machine learning (AI/ML) capabilities in conjunction with an enterprise-class streaming analytics platform. We refer to this combination of fast data and advanced analytics as real-time AI. There are many applications for real-time AI across businesses, including anomaly detection, video analysis, and forecasting. In this post, we walk through a real-time AI pattern for detecting anomalies in log files.