1
|
Yoon JT, Lee KM, Oh JH, Kim HG, Jeong JW. Insights and Considerations in Development and Performance Evaluation of Generative Adversarial Networks (GANs): What Radiologists Need to Know. Diagnostics (Basel) 2024; 14:1756. [PMID: 39202244 PMCID: PMC11353572 DOI: 10.3390/diagnostics14161756] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/01/2024] [Accepted: 08/05/2024] [Indexed: 09/03/2024] Open
Abstract
The rapid development of deep learning in medical imaging has significantly enhanced the capabilities of artificial intelligence while simultaneously introducing challenges, including the need for vast amounts of training data and the labor-intensive tasks of labeling and segmentation. Generative adversarial networks (GANs) have emerged as a solution, offering synthetic image generation for data augmentation and streamlining medical image processing tasks through models such as cGAN, CycleGAN, and StyleGAN. These innovations not only improve the efficiency of image augmentation, reconstruction, and segmentation, but also pave the way for unsupervised anomaly detection, markedly reducing the reliance on labeled datasets. Our investigation into GANs in medical imaging addresses their varied architectures, the considerations for selecting appropriate GAN models, and the nuances of model training and performance evaluation. This paper aims to provide radiologists who are new to GAN technology with a thorough understanding, guiding them through the practical application and evaluation of GANs in brain imaging with two illustrative examples using CycleGAN and pixel2style2pixel (pSp)-combined StyleGAN. It offers a comprehensive exploration of the transformative potential of GANs in medical imaging research. Ultimately, this paper strives to equip radiologists with the knowledge to effectively utilize GANs, encouraging further research and application within the field.
Collapse
Affiliation(s)
- Jeong Taek Yoon
- Department of Radiology, Kyung Hee University Hospital, Kyung Hee University College of Medicine, 23 Kyungheedae-ro, Dongdaemun-gu, Seoul 02447, Republic of Korea; (J.T.Y.); (H.-G.K.)
| | - Kyung Mi Lee
- Department of Radiology, Kyung Hee University Hospital, Kyung Hee University College of Medicine, 23 Kyungheedae-ro, Dongdaemun-gu, Seoul 02447, Republic of Korea; (J.T.Y.); (H.-G.K.)
| | - Jang-Hoon Oh
- Department of Radiology, Kyung Hee University Hospital, Kyung Hee University College of Medicine, 23 Kyungheedae-ro, Dongdaemun-gu, Seoul 02447, Republic of Korea; (J.T.Y.); (H.-G.K.)
| | - Hyug-Gi Kim
- Department of Radiology, Kyung Hee University Hospital, Kyung Hee University College of Medicine, 23 Kyungheedae-ro, Dongdaemun-gu, Seoul 02447, Republic of Korea; (J.T.Y.); (H.-G.K.)
| | - Ji Won Jeong
- Department of Medicine, Graduate School, Kyung Hee University, 23 Kyungheedae-ro, Dongdaemun-gu, Seoul 02447, Republic of Korea;
| |
Collapse
|
2
|
Wang B, Ben K. GTR: GAN-Based Trusted Routing Algorithm for Underwater Wireless Sensor Networks. SENSORS (BASEL, SWITZERLAND) 2024; 24:4879. [PMID: 39123927 PMCID: PMC11314668 DOI: 10.3390/s24154879] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/02/2024] [Revised: 07/24/2024] [Accepted: 07/25/2024] [Indexed: 08/12/2024]
Abstract
The transmission environment of underwater wireless sensor networks is open, and important transmission data can be easily intercepted, interfered with, and tampered with by malicious nodes. Malicious nodes can be mixed in the network and are difficult to distinguish, especially in time-varying underwater environments. To address this issue, this article proposes a GAN-based trusted routing algorithm (GTR). GTR defines the trust feature attributes and trust evaluation matrix of underwater network nodes, constructs the trust evaluation model based on a generative adversarial network (GAN), and achieves malicious node detection by establishing a trust feature profile of a trusted node, which improves the detection performance for malicious nodes in underwater networks under unlabeled and imbalanced training data conditions. GTR combines the trust evaluation algorithm with the adaptive routing algorithm based on Q-Learning to provide an optimal trusted data forwarding route for underwater network applications, improving the security, reliability, and efficiency of data forwarding in underwater networks. GTR relies on the trust feature profile of trusted nodes to distinguish malicious nodes and can adaptively select the forwarding route based on the status of trusted candidate next-hop nodes, which enables GTR to better cope with the changing underwater transmission environment and more accurately detect malicious nodes, especially unknown malicious node intrusions, compared to baseline algorithms. Simulation experiments showed that, compared to baseline algorithms, GTR can provide a better malicious node detection performance and data forwarding performance. Under the condition of 15% malicious nodes and 10% unknown malicious nodes mixed in, the detection rate of malicious nodes by the underwater network configured with GTR increased by 5.4%, the error detection rate decreased by 36.4%, the packet delivery rate increased by 11.0%, the energy tax decreased by 11.4%, and the network throughput increased by 20.4%.
Collapse
Affiliation(s)
- Bin Wang
- College of Electronic Engineering, Naval University of Engineering, Wuhan 430033, China;
| | | |
Collapse
|
3
|
Wang X, An Y, Hu Q. Anomaly prediction of Internet behavior based on generative adversarial networks. PeerJ Comput Sci 2024; 10:e2009. [PMID: 39145230 PMCID: PMC11323085 DOI: 10.7717/peerj-cs.2009] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/19/2023] [Accepted: 04/01/2024] [Indexed: 08/16/2024]
Abstract
With the popularity of Internet applications, a large amount of Internet behavior log data is generated. Abnormal behaviors of corporate employees may lead to internet security issues and data leakage incidents. To ensure the safety of information systems, it is important to research on anomaly prediction of Internet behaviors. Due to the high cost of labeling big data manually, an unsupervised generative model-Anomaly Prediction of Internet behavior based on Generative Adversarial Networks (APIBGAN), which works only with a small amount of labeled data, is proposed to predict anomalies of Internet behaviors. After the input Internet behavior data is preprocessed by the proposed method, the data-generating generative adversarial network (DGGAN) in APIBGAN learns the distribution of real Internet behavior data by leveraging neural networks' powerful feature extraction from the data to generate Internet behavior data with random noise. The APIBGAN utilizes these labeled generated data as a benchmark to complete the distance-based anomaly prediction. Three categories of Internet behavior sampling data from corporate employees are employed to train APIBGAN: (1) Online behavior data of an individual in a department. (2) Online behavior data of multiple employees in the same department. (3) Online behavior data of multiple employees in different departments. The prediction scores of the three categories of Internet behavior data are 87.23%, 85.13%, and 83.47%, respectively, and are above the highest score of 81.35% which is obtained by the comparison method based on Isolation Forests in the CCF Big Data & Computing Intelligence Contest (CCF-BDCI). The experimental results validate that APIBGAN predicts the outlier of Internet behaviors effectively through the GAN, which is composed of a simple three-layer fully connected neural networks (FNNs). We can use APIBGAN not only for anomaly prediction of Internet behaviors but also for anomaly prediction in many other applications, which have big data infeasible to label manually. Above all, APIBGAN has broad application prospects for anomaly prediction, and our work also provides valuable input for anomaly prediction-based GAN.
Collapse
Affiliation(s)
- XiuQing Wang
- College of Computer and Cyber Security, Hebei Normal University, Shijiazhuang, Hebei, China
- Hebei Provincial Key Laboratory of Network & Information Security, College of Computer and Cyber Security, Shijiazhuang, Hebei, China
- Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security, Hebei Normal University, Shijiazhuang, Hebei, China
| | - Yang An
- College of Computer and Cyber Security, Hebei Normal University, Shijiazhuang, Hebei, China
| | - Qianwei Hu
- College of Computer and Cyber Security, Hebei Normal University, Shijiazhuang, Hebei, China
| |
Collapse
|
4
|
Zhao D, Kong F, Lv N, Xu Z, Du F. A Common Knowledge-Driven Generic Vision Inspection Framework for Adaptation to Multiple Scenarios, Tasks, and Objects. SENSORS (BASEL, SWITZERLAND) 2024; 24:4120. [PMID: 39000899 PMCID: PMC11244257 DOI: 10.3390/s24134120] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/05/2024] [Revised: 06/21/2024] [Accepted: 06/22/2024] [Indexed: 07/16/2024]
Abstract
The industrial manufacturing model is undergoing a transformation from a product-centric model to a customer-centric one. Driven by customized requirements, the complexity of products and the requirements for quality have increased, which pose a challenge to the applicability of traditional machine vision technology. Extensive research demonstrates the effectiveness of AI-based learning and image processing on specific objects or tasks, but few publications focus on the composite task of the integrated product, the traceability and improvability of methods, as well as the extraction and communication of knowledge between different scenarios or tasks. To address this problem, this paper proposes a common, knowledge-driven, generic vision inspection framework, targeted for standardizing product inspection into a process of information decoupling and adaptive metrics. Task-related object perception is planned into a multi-granularity and multi-pattern progressive alignment based on industry knowledge and structured tasks. Inspection is abstracted as a reconfigurable process of multi-sub-pattern space combination mapping and difference metric under appropriate high-level strategies and experiences. Finally, strategies for knowledge improvement and accumulation based on historical data are presented. The experiment demonstrates the process of generating a detection pipeline for complex products and continuously improving it through failure tracing and knowledge improvement. Compared to the (1.767°, 69.802 mm) and 0.883 obtained by state-of-the-art deep learning methods, the generated pipeline achieves a pose estimation ranging from (2.771°, 153.584 mm) to (1.034°, 52.308 mm) and a detection rate ranging from 0.462 to 0.927. Through verification of other imaging methods and industrial tasks, we prove that the key to adaptability lies in the mining of inherent commonalities of knowledge, multi-dimensional accumulation, and reapplication.
Collapse
Affiliation(s)
- Delong Zhao
- School of Mechanical Engineering and Automation, Beihang University, 37 College Road, Haidian District, Beijing 100191, China
| | - Feifei Kong
- School of Mechanical Engineering and Automation, Beihang University, 37 College Road, Haidian District, Beijing 100191, China
| | - Nengbin Lv
- School of Mechanical Engineering and Automation, Beihang University, 37 College Road, Haidian District, Beijing 100191, China
| | - Zhangmao Xu
- School of Mechanical Engineering and Automation, Beihang University, 37 College Road, Haidian District, Beijing 100191, China
| | - Fuzhou Du
- School of Mechanical Engineering and Automation, Beihang University, 37 College Road, Haidian District, Beijing 100191, China
| |
Collapse
|
5
|
Du X, Ding X, Xi M, Lv Y, Qiu S, Liu Q. A Data Augmentation Method for Motor Imagery EEG Signals Based on DCGAN-GP Network. Brain Sci 2024; 14:375. [PMID: 38672024 PMCID: PMC11048538 DOI: 10.3390/brainsci14040375] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/20/2024] [Revised: 04/09/2024] [Accepted: 04/11/2024] [Indexed: 04/28/2024] Open
Abstract
Motor imagery electroencephalography (EEG) signals have garnered attention in brain-computer interface (BCI) research due to their potential in promoting motor rehabilitation and control. However, the limited availability of labeled data poses challenges for training robust classifiers. In this study, we propose a novel data augmentation method utilizing an improved Deep Convolutional Generative Adversarial Network with Gradient Penalty (DCGAN-GP) to address this issue. We transformed raw EEG signals into two-dimensional time-frequency maps and employed a DCGAN-GP network to generate synthetic time-frequency representations resembling real data. Validation experiments were conducted on the BCI IV 2b dataset, comparing the performance of classifiers trained with augmented and unaugmented data. Results demonstrated that classifiers trained with synthetic data exhibit enhanced robustness across multiple subjects and achieve higher classification accuracy. Our findings highlight the effectiveness of utilizing a DCGAN-GP-generated synthetic EEG data to improve classifier performance in distinguishing different motor imagery tasks. Thus, the proposed data augmentation method based on a DCGAN-GP offers a promising avenue for enhancing BCI system performance, overcoming data scarcity challenges, and bolstering classifier robustness, thereby providing substantial support for the broader adoption of BCI technology in real-world applications.
Collapse
Affiliation(s)
| | - Xiaohui Ding
- Communication and Network Laboratory, Dalian University, Dalian 116622, China; (X.D.); (M.X.); (Y.L.); (S.Q.); (Q.L.)
| | | | | | | | | |
Collapse
|
6
|
Kong S, Ai J, Lu M, Gong Y. GRAND: GAN-based software runtime anomaly detection method using trace information. Neural Netw 2024; 169:365-377. [PMID: 37924606 DOI: 10.1016/j.neunet.2023.10.036] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/06/2023] [Revised: 08/13/2023] [Accepted: 10/22/2023] [Indexed: 11/06/2023]
Abstract
Software runtime anomaly detection can detect manifestations (known as anomalies) caused by faults in complex systems before they lead to failure. Whereas most existing methods use external performance indicators, this study uses internal execution traces to reveal failures not only related to software performance issues but also functional errors. A neural network model called GRAND, which combines a variational autoencoder and a generative adversarial network, is proposed to mine anomalies in the execution trace. Cassandra, a widely used database system, was used as a representation to conduct the empirical study. The dataset was collected under a well-designed operational profile that contained 5180 time series, each containing more than ten million data points. GRAND achieved a higher detection performance than the other two SOTA baseline models, with a 99% F1-score compared with 93% and 87%. Ablation studies show that the workload information used in GRAND can determine whether the current internal status is consistent with the task, thus achieving a 16% improvement in the F1-score. The attention mechanism used for data fusion can achieve a 32% improvement in the F1-score.
Collapse
Affiliation(s)
- Shiyi Kong
- School of Reliability and Systems Engineering, Beihang University, No. 37, Xueyuan Road, Haidian District, Beijing 100191, China; Beijing Institute of Astronautical Systems Engineering, No. 1, Nandahongmen Road, Fengtai District, Beijing 100076, China.
| | - Jun Ai
- School of Reliability and Systems Engineering, Beihang University, No. 37, Xueyuan Road, Haidian District, Beijing 100191, China.
| | - Minyan Lu
- School of Reliability and Systems Engineering, Beihang University, No. 37, Xueyuan Road, Haidian District, Beijing 100191, China.
| | - Yiang Gong
- School of Reliability and Systems Engineering, Beihang University, No. 37, Xueyuan Road, Haidian District, Beijing 100191, China
| |
Collapse
|
7
|
Zhang D, Li L, Sripada C, Kang J. Image response regression via deep neural networks. J R Stat Soc Series B Stat Methodol 2023; 85:1589-1614. [PMID: 38584801 PMCID: PMC10994199 DOI: 10.1093/jrsssb/qkad073] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/17/2022] [Revised: 06/22/2023] [Accepted: 06/28/2023] [Indexed: 04/09/2024]
Abstract
Delineating associations between images and covariates is a central aim of imaging studies. To tackle this problem, we propose a novel non-parametric approach in the framework of spatially varying coefficient models, where the spatially varying functions are estimated through deep neural networks. Our method incorporates spatial smoothness, handles subject heterogeneity, and provides straightforward interpretations. It is also highly flexible and accurate, making it ideal for capturing complex association patterns. We establish estimation and selection consistency and derive asymptotic error bounds. We demonstrate the method's advantages through intensive simulations and analyses of two functional magnetic resonance imaging data sets.
Collapse
Affiliation(s)
- Daiwei Zhang
- Department of Biostatistics, Epidemiology and Informatics, University of Pennsylvania, Philadelphia, PA, USA
| | - Lexin Li
- Department of Biostatistics and Epidemiology, University of California, Berkeley, CA, USA
| | - Chandra Sripada
- Department of Psychiatry, University of Michigan, Ann Arbor, MI, USA
- Department of Philosophy, University of Michigan, Ann Arbor, MI, USA
| | - Jian Kang
- Department of Biostatistics, University of Michigan, Ann Arbor, MI, USA
| |
Collapse
|
8
|
Wei C, Song Z. Real-Time Forecasting of Subsurface Inclusion Defects for Continuous Casting Slabs: A Data-Driven Comparative Study. SENSORS (BASEL, SWITZERLAND) 2023; 23:5415. [PMID: 37420581 DOI: 10.3390/s23125415] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/08/2023] [Revised: 05/30/2023] [Accepted: 06/06/2023] [Indexed: 07/09/2023]
Abstract
Subsurface inclusions are one of the most common defects that affect the inner quality of continuous casting slabs. This increases the defects in the final products and increases the complexity of the hot charge rolling process and may even cause breakout accidents. The defects are, however, hard to detect online by traditional mechanism-model-based and physics-based methods. In the present paper, a comparative study is carried out based on data-driven methods, which are only sporadically discussed in the literature. As a further contribution, a scatter-regularized kernel discriminative least squares (SR-KDLS) model and a stacked defect-related autoencoder back propagation neural network (SDAE-BPNN) model are developed to improve the forecasting performance. The scatter-regularized kernel discriminative least squares is designed as a coherent framework to directly provide forecasting information instead of low-dimensional embeddings. The stacked defect-related autoencoder back propagation neural network extracts deep defect-related features layer by layer for a higher feasibility and accuracy. The feasibility and efficiency of the data-driven methods are demonstrated through case studies based on a real-life continuous casting process, where the imbalance degree drastically vary in different categories, showing that the defects are timely (within 0.01 ms) and accurately forecasted. Moreover, experiments illustrate the merits of the developed scatter-regularized kernel discriminative least squares and stacked defect-related autoencoder back propagation neural network methods regarding the computational burden; the F1 scores of the developed methods are clearly higher than common methods.
Collapse
Affiliation(s)
- Chihang Wei
- School of Information Science and Technology, Hangzhou Normal University, Hangzhou 311121, China
| | - Zhihuan Song
- State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou 310027, China
| |
Collapse
|
9
|
Rajabi MM, Komeilian P, Wan X, Farmani R. Leak detection and localization in water distribution networks using conditional deep convolutional generative adversarial networks. WATER RESEARCH 2023; 238:120012. [PMID: 37150062 DOI: 10.1016/j.watres.2023.120012] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/15/2023] [Revised: 04/06/2023] [Accepted: 04/26/2023] [Indexed: 05/09/2023]
Abstract
This paper explores the use of 'conditional convolutional generative adversarial networks' (CDCGAN) for image-based leak detection and localization (LD&L) in water distribution networks (WDNs). The method employs pressure measurements and is based on four pillars: (1) hydraulic model-based generation of leak-free training data by taking into account the demand uncertainty, (2) conversion of hydraulic model input demand-output pressure pairs into images using kriging interpolation, (3) training of a CDCGAN model for image-to-image translation, and (4) using the structural similarity (SSIM) index for LD&L. SSIM, computed over the entire pressure distribution image is used for leak detection, and a local estimate of SSIM is employed for leak localization. The CDCGAN model employed in this paper is based on the pix2pix architecture. The effectiveness of the proposed methodology is demonstrated on leakage datasets under various scenarios. Results show that the method has an accuracy of approximately 70% for real-time leak detection. The proposed method is well-suited for real-time applications due to the low computational cost of CDCGAN predictions compared to WDN hydraulic models, is robust in presence of uncertainty due to the nature of generative adversarial networks, and scales well to large and variable-sized monitoring data due to the use of an image-based approach.
Collapse
Affiliation(s)
- Mohammad Mahdi Rajabi
- Civil and Environmental Engineering Faculty, Tarbiat Modares University, PO Box 14115-397, Tehran, Iran.
| | - Pooya Komeilian
- Department of Civil Engineering, Sharif University of Technology, Tehran, Iran
| | - Xi Wan
- Centre for Water Systems, Department of Engineering, University of Exeter, Exeter, Devon EX4 4QF, UK
| | - Raziyeh Farmani
- Centre for Water Systems, Department of Engineering, University of Exeter, Exeter, Devon EX4 4QF, UK
| |
Collapse
|
10
|
Farady I, Kuo CC, Ng HF, Lin CY. Hierarchical Image Transformation and Multi-Level Features for Anomaly Defect Detection. SENSORS (BASEL, SWITZERLAND) 2023; 23:988. [PMID: 36679785 PMCID: PMC9861680 DOI: 10.3390/s23020988] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/27/2022] [Revised: 11/22/2022] [Accepted: 01/12/2023] [Indexed: 06/17/2023]
Abstract
Anomalies are a set of samples that do not follow the normal behavior of the majority of data. In an industrial dataset, anomalies appear in a very small number of samples. Currently, deep learning-based models have achieved important advances in image anomaly detection. However, with general models, real-world application data consisting of non-ideal images, also known as poison images, become a challenge. When the work environment is not conducive to consistently acquiring a good or ideal sample, an additional adaptive learning model is needed. In this work, we design a potential methodology to tackle poison or non-ideal images that commonly appear in industrial production lines by enhancing the existing training data. We propose Hierarchical Image Transformation and Multi-level Features (HIT-MiLF) modules for an anomaly detection network to adapt to perturbances from novelties in testing images. This approach provides a hierarchical process for image transformation during pre-processing and explores the most efficient layer of extracted features from a CNN backbone. The model generates new transformations of training samples that simulate the non-ideal condition and learn the normality in high-dimensional features before applying a Gaussian mixture model to detect the anomalies from new data that it has never seen before. Our experimental results show that hierarchical transformation and multi-level feature exploration improve the baseline performance on industrial metal datasets.
Collapse
Affiliation(s)
- Isack Farady
- Department of Electrical Engineering, Mercu Buana University, Jakarta 11650, Indonesia
- Department of Electrical and Communication Engineering, Yuan Ze University, Taoyuan 320, Taiwan
| | - Chia-Chen Kuo
- National Center for High-Performance Computing, National Applied Research Laboratories, Hsinchu 300, Taiwan
| | - Hui-Fuang Ng
- Department of Computer Science, University Tunku Abdul Rahman, Kampar 31900, Malaysia
| | - Chih-Yang Lin
- Department of Electrical and Communication Engineering, Yuan Ze University, Taoyuan 320, Taiwan
| |
Collapse
|
11
|
Research on DUAL-ADGAN Model for Anomaly Detection Method in Time-Series Data. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:8753323. [DOI: 10.1155/2022/8753323] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/26/2022] [Revised: 09/17/2022] [Accepted: 09/19/2022] [Indexed: 11/17/2022]
Abstract
In recent years, anomaly detection techniques in time-series data have been widely used in manufacturing, cybersecurity, and other fields. Meanwhile, various anomaly detection models based on generative adversarial networks (GAN) are gradually used in time-series anomaly detection tasks. However, there are problems of unstable generator training, missed detection of anomalous data, and inconsistency between the discriminator’s discriminant and the anomaly detection target in GAN networks. Aiming at the above problems, the paper proposes a DUAL-ADGAN (Dual Anomaly Detection Generative Adversarial Networks) model for the detection of anomalous data in time series. First, the Wasserstein distance satisfying the Lipschitz constraint is used as the loss function of the data reconstruction module, which improves the stability of the traditional GAN network training. Second, by adding a data prediction module to the DUAL-ADGAN model, the distinction between abnormal and normal samples is increased, and the rate of missing abnormal data in the model is reduced. Third, by introducing the Fence-GAN loss function, the discriminator is aligned with the anomaly detection target, which effectively reduces the anomaly data false detection rate of the DUAL-ADGAN model. Finally, anomaly scores derived from the DUAL-ADGAN model are compared with dynamic thresholds to detect anomalies. The experimental results show that the average F1 of the DUAL-ADGAN model is 0.881, which is better than the other nine baseline models. The conclusions demonstrate that the DUAL-ADGAN model proposed in the paper is more stable in training while effectively solving the problems of anomaly miss detection and discriminator inconsistency with the anomaly detection target in the anomaly detection task.
Collapse
|
12
|
Aldayri A, Albattah W. Taxonomy of Anomaly Detection Techniques in Crowd Scenes. SENSORS (BASEL, SWITZERLAND) 2022; 22:6080. [PMID: 36015840 PMCID: PMC9415874 DOI: 10.3390/s22166080] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/04/2022] [Revised: 08/06/2022] [Accepted: 08/09/2022] [Indexed: 06/15/2023]
Abstract
With the widespread use of closed-circuit television (CCTV) surveillance systems in public areas, crowd anomaly detection has become an increasingly critical aspect of the intelligent video surveillance system. It requires workforce and continuous attention to decide on the captured event, which is hard to perform by individuals. The available literature on human action detection includes various approaches to detect abnormal crowd behavior, which is articulated as an outlier detection problem. This paper presents a detailed review of the recent development of anomaly detection methods from the perspectives of computer vision on different available datasets. A new taxonomic organization of existing works in crowd analysis and anomaly detection has been introduced. A summarization of existing reviews and datasets related to anomaly detection has been listed. It covers an overview of different crowd concepts, including mass gathering events analysis and challenges, types of anomalies, and surveillance systems. Additionally, research trends and future work prospects have been analyzed.
Collapse
Affiliation(s)
| | - Waleed Albattah
- Department of Information Technology, College of Computer, Qassim University, Buraydah 52571, Saudi Arabia
| |
Collapse
|
13
|
Abnormal Detection for Running State of Linear Motor Feeding System Based on Deep Neural Networks. ENERGIES 2022. [DOI: 10.3390/en15155671] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Because the linear motor feeding system always runs in complex working conditions for a long time, its performance and state transition have great randomness. Therefore, abnormal detection is particularly significant for predictive maintenance to promptly discover the running state degradation trend. Aiming at the problem that the abnormal samples of linear motor feed system are few and the samples have time-series features, a method of abnormal operation state detection of a linear motor feed system based on normal sample training was proposed, named GANomaly-LSTM. The method constructs an encoding-decoding-reconstructed encoding network model. Firstly, the time-series features of vibration, current and composite data samples are extracted by the long short-term memory (LSTM) network; Secondly, the three-layer fully connected layer is employed to extract potential feature vectors; Finally, anomaly detection of the system is completed by comparing the potential feature vectors of the two encodings. An experimental platform of the X-Y two-axis linkage linear motor feeding system is built to verify the rationality of the proposed method. Compared with other classical methods such as GANomaly and GAN-AE, the average AUROC index of this method is improved by 17.5% and 9.3%, the average accuracy is enhanced by 11.6% and 15.5%, and the detection time is shortened by 223 ms and 284 ms, respectively. GANomaly-LSTM has successfully proved its superiority for abnormal detection for running state of linear motor feeding systems.
Collapse
|
14
|
Anomaly detection methods based on GAN: a survey. APPL INTELL 2022. [DOI: 10.1007/s10489-022-03905-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/02/2022]
|
15
|
Mishra L, Verma S. Graph Attention Autoencoder Inspired CNN based Brain Tumor Classification using MRI. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2022.06.107] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/12/2023]
|
16
|
|