• Title/Summary/Keyword: Adversarial Networks

Search Result 214, Processing Time 0.025 seconds

Mitigating Mode Collapse using Multiple GANs Training System (모드 붕괴를 완화하기 위한 다중 GANs 훈련 시스템)

  • Joo Yong Shim;Jean Seong Bjorn Choe;Jong-Kook Kim
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.10
    • /
    • pp.497-504
    • /
    • 2024
  • Generative Adversarial Networks (GANs) are typically described as a two-player game between a generator and a discriminator, where the generator aims to produce realistic data, and the discriminator tries to distinguish between real and generated data. However, this setup often leads to mode collapse, where the generator produces limited variations in the data, failing to capture the full range of the target data distribution. This paper proposes a new training system to mitigate the mode collapse problem. Specifically, it extends the traditional two-player game of GANs into a multi-player game and introduces a peer-evaluation method to effectively train multiple GANs. In the peer-evaluation process, the generated samples from each GANs are evaluated by the other players. This provides external feedback, serving as an additional standard that helps GANs recognize mode failure. This cooperative yet competitive training method encourages the generators to explore and capture a broader range of the data distribution, mitigating mode collapse problem. This paper explains the detailed algorithm for peer-evaluation based multi-GANs training and validates the performance through experiments.

A Novel Globally Adaptive Load-Balanced Routing Algorithm for Torus Interconnection Networks

  • Wang, Hong;Xu, Du;Li, Lemin
    • ETRI Journal
    • /
    • v.29 no.3
    • /
    • pp.405-407
    • /
    • 2007
  • A globally adaptive load-balanced routing algorithm for torus interconnection networks is proposed. Unlike previously published algorithms, this algorithm employs a new scheme based on collision detection to handle deadlock, and has higher routing adaptability than previous algorithms. Simulation results show that our algorithm outperforms previous algorithms by 16% on benign traffic patterns, and by 10% to 21% on adversarial traffic patterns.

  • PDF

Dynamic Session Key based Pairwise Key Management Scheme for Wireless Sensor Networks

  • Premamayudu, B;Rao, Koduganti Venkata;Varma, P. Suresh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5596-5615
    • /
    • 2016
  • Security is one of the major challenges in the Wireless Sensor Networks (WSNs). WSNs are more vulnerable to adversarial activities. All cryptographic security services indirectly depend on key management. Symmetric key management is the best key establishment process for WSNs due to the resource constraints of the sensors. In this paper, we proposed dynamic session key establishment scheme based on randomly generated nonce value and sensor node identity, in which each sensor node is equipped with session key on expire basis. The proposed scheme is compare with five popular existing key management systems. Our scheme is simulated in OMNET++ with MixiM and presented experimental results. The analytical study and experimental results show the superiority of the proposed scheme over the existing schemes in terms of energy, storage, resilience and communication overhead.

A Beacon-Based Trust Management System for Enhancing User Centric Location Privacy in VANETs

  • Chen, Yi-Ming;Wei, Yu-Chih
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.153-163
    • /
    • 2013
  • In recent years, more and more researches have been focusing on trust management of vehicle ad-hoc networks (VANETs) for improving the safety of vehicles. However, in these researches, little attention has been paid to the location privacy due to the natural conflict between trust and anonymity, which is the basic protection of privacy. Although traffic safety remains the most crucial issue in VANETs, location privacy can be just as important for drivers, and neither can be ignored. In this paper, we propose a beacon-based trust management system, called BTM, that aims to thwart internal attackers from sending false messages in privacy-enhanced VANETs. To evaluate the reliability and performance of the proposed system, we conducted a set of simulations under alteration attacks, bogus message attacks, and message suppression attacks. The simulation results show that the proposed system is highly resilient to adversarial attacks, whether it is under a fixed silent period or random silent period location privacy-enhancement scheme.

Exploring the Aged Face Synthesize Model Based on Gender Preservation (젠더보존에 기반한 얼굴 합성 모델 탐구)

  • Li, Suli;Lee, Hyo Jong
    • Annual Conference of KIPS
    • /
    • 2022.11a
    • /
    • pp.653-655
    • /
    • 2022
  • Face aging aims to synthesize future face images by reflecting the age factor on given faces. In recent years, deep learning-based approaches have made outstanding progress in simulating the aging process of the human face. However, generating accurate and high-quality aging faces is still intrinsically difficult. We propose a new method that incorporates gender information into the model, which achieves comparable and stable performance. Experimental results demonstrate that our method can preserve the identity well and generate diverse aged faces.

Development of Augmentation Method of Ballistic Missile Trajectory using Variational Autoencoder (변이형 오토인코더를 이용한 탄도미사일 궤적 증강기법 개발)

  • Dong Kyu Lee;Dong Wg Hong
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.2
    • /
    • pp.145-156
    • /
    • 2023
  • Trajectory of ballistic missile is defined by inherent flight dynamics, which decided range and maneuvering characteristics. It is crucial to predict range and maneuvering characteristics of ballistic missile in KAMD (Korea Air and Missile Defense) to minimize damage due to ballistic missile attacks, Nowadays, needs for applying AI(Artificial Intelligence) technologies are increasing due to rapid developments of DNN(Deep Neural Networks) technologies. To apply these DNN technologies amount of data are required for superviesed learning, but trajectory data of ballistic missiles is limited because of security issues. Trajectory data could be considered as multivariate time series including many variables. And augmentation in time series data is a developing area of research. In this paper, we tried to augment trajectory data of ballistic missiles using recently developed methods. We used TimeVAE(Time Variational AutoEncoder) method and TimeGAN(Time Generative Adversarial Networks) to synthesize missile trajectory data. We also compare the results of two methods and analyse for future works.

Enhancing Retinal Fundus Image Segmentation Using GAN

  • Manal AlGhamdi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.10
    • /
    • pp.213-220
    • /
    • 2024
  • Retinal vessel analysis plays a vital role in the detection of some diseases. For example, diabetic retinopathy which may lead to blindness is one of the most common diseases that cause retinal blood vessel structure to change. However, doctors usually take a lot of time and money to collect and label training sets. Thus, automated vessel segmentation as the first step toward computer-aided analysis of fundus remains an active research avenue. We propose an automated Retinal vessel segmentation method based on the GAN network. Traditional image segmentation networks are unsupervised, and GAN is a new semi-supervised network due to adding a Discriminator. By training the discriminator network, we can capture the quality of the generator's output and drive it closer to the true image features. In our experiment, we use DRIVE dataset for training and testing. The final segmentation effect is represented by the Dice coefficient. Experimental results show that the GAN network can effectively improve the edge effect of image segmentation. Compared with the traditional U-net network, GAN shows about 1.55% higher segmentation accuracy.

Spine Computed Tomography to Magnetic Resonance Image Synthesis Using Generative Adversarial Networks : A Preliminary Study

  • Lee, Jung Hwan;Han, In Ho;Kim, Dong Hwan;Yu, Seunghan;Lee, In Sook;Song, You Seon;Joo, Seongsu;Jin, Cheng-Bin;Kim, Hakil
    • Journal of Korean Neurosurgical Society
    • /
    • v.63 no.3
    • /
    • pp.386-396
    • /
    • 2020
  • Objective : To generate synthetic spine magnetic resonance (MR) images from spine computed tomography (CT) using generative adversarial networks (GANs), as well as to determine the similarities between synthesized and real MR images. Methods : GANs were trained to transform spine CT image slices into spine magnetic resonance T2 weighted (MRT2) axial image slices by combining adversarial loss and voxel-wise loss. Experiments were performed using 280 pairs of lumbar spine CT scans and MRT2 images. The MRT2 images were then synthesized from 15 other spine CT scans. To evaluate whether the synthetic MR images were realistic, two radiologists, two spine surgeons, and two residents blindly classified the real and synthetic MRT2 images. Two experienced radiologists then evaluated the similarities between subdivisions of the real and synthetic MRT2 images. Quantitative analysis of the synthetic MRT2 images was performed using the mean absolute error (MAE) and peak signal-to-noise ratio (PSNR). Results : The mean overall similarity of the synthetic MRT2 images evaluated by radiologists was 80.2%. In the blind classification of the real MRT2 images, the failure rate ranged from 0% to 40%. The MAE value of each image ranged from 13.75 to 34.24 pixels (mean, 21.19 pixels), and the PSNR of each image ranged from 61.96 to 68.16 dB (mean, 64.92 dB). Conclusion : This was the first study to apply GANs to synthesize spine MR images from CT images. Despite the small dataset of 280 pairs, the synthetic MR images were relatively well implemented. Synthesis of medical images using GANs is a new paradigm of artificial intelligence application in medical imaging. We expect that synthesis of MR images from spine CT images using GANs will improve the diagnostic usefulness of CT. To better inform the clinical applications of this technique, further studies are needed involving a large dataset, a variety of pathologies, and other MR sequence of the lumbar spine.

Image-to-Image Translation Based on U-Net with R2 and Attention (R2와 어텐션을 적용한 유넷 기반의 영상 간 변환에 관한 연구)

  • Lim, So-hyun;Chun, Jun-chul
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.9-16
    • /
    • 2020
  • In the Image processing and computer vision, the problem of reconstructing from one image to another or generating a new image has been steadily drawing attention as hardware advances. However, the problem of computer-generated images also continues to emerge when viewed with human eyes because it is not natural. Due to the recent active research in deep learning, image generating and improvement problem using it are also actively being studied, and among them, the network called Generative Adversarial Network(GAN) is doing well in the image generating. Various models of GAN have been presented since the proposed GAN, allowing for the generation of more natural images compared to the results of research in the image generating. Among them, pix2pix is a conditional GAN model, which is a general-purpose network that shows good performance in various datasets. pix2pix is based on U-Net, but there are many networks that show better performance among U-Net based networks. Therefore, in this study, images are generated by applying various networks to U-Net of pix2pix, and the results are compared and evaluated. The images generated through each network confirm that the pix2pix model with Attention, R2, and Attention-R2 networks shows better performance than the existing pix2pix model using U-Net, and check the limitations of the most powerful network. It is suggested as a future study.

Mechanism of Authentication Procedure between Ad Hoc Network and Sensor Network (에드 홉 네트워크와 개별 센서 네트워크 간의 인증 절차 메카니즘)

  • Kim, Seungmin;Yang, Jisoo;Kim, Hankyu;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.160-161
    • /
    • 2013
  • Extending mobile IP to ad hoc networks with the foreign agent acting as the bridge between the wired network and ad hoc networks can provide the global Internet connectivity for ad hoc hosts. The existing research in the area of the integrated wired and ad hoc network is carried out in a non-adversarial setting. This paper analysed an effective solution to solve the security related problems encountered in these integrated networks. This security protocol also excludes malicious nodes from performing the ad hoc network routing. This paper focuses on preventing ad hoc hosts from the attacks of anti-integrity.

  • PDF