Now showing 1 - 10 of 1724
No Thumbnail Available
Publication

Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks

2022 , Borcherding, Anne , Feldmann, Lukas , Karch, Markus , Meshram, Ankush , Beyerer, Jürgen

It is crucial in an industrial network to understand how and why a intrusion detection system detects, classifies, and reports intrusions. With the ongoing introduction of machine learning into the research area of intrusion detection, this understanding gets even more important since the used systems often appear as a black-box for the user and are no longer understandable in an intuitive and comprehensible way. We propose a novel approach to understand the internal characteristics of a machine learning based network intrusion detection system. This approach includes methods to understand which data sources the system uses, to evaluate whether the system uses linear or non-linear classification approaches, and to find out which underlying machine learning model is implemented in the system. Our evaluation on two publicly available industrial datasets shows that the detection of the data source and the differentiation between linear and non-linear models is possible with our approach. In addition, the identification of the underlying machine learning model can be accomplished with statistical significance for non-linear models. The information made accessible by our approach helps to develop a deeper understanding of the functioning of a network intrusion detection system, and contributes towards developing transparent machine learning based intrusion detection approaches.

No Thumbnail Available
Publication

Fast and Lightweight Online Person Search for Large-Scale Surveillance Systems

2022 , Specker, Andreas , Moritz, Lennart , Cormier, Mickael , Beyerer, Jürgen

The demand for methods for video analysis in the fieldof surveillance technology is rapidly growing due to theincreasing amount of surveillance footage available. Intelligent methods for surveillance software offer numerouspossibilities to support police investigations and crime prevention. This includes the integration of video processingpipelines for tasks such as detection of graffiti, suspiciousluggage, or intruders. Another important surveillance taskis the semi-automated search for specific persons-of-interestwithin a camera network. In this work, we identify the major obstacles for the development of person search systemsas the real-time processing capability on affordable hardware and the performance gap of person detection and reidentification methods on unseen target domain data. Inaddition, we demonstrate the current potential of intelligentonline person search by developing a real-world, largescale surveillance system. An extensive evaluation is provided for person detection, tracking, and re-identificationcomponents on affordable hardware setups, for which thewhole system achieves real-time processing up to 76 FPS.

No Thumbnail Available
Publication

Modelling Ambiguous Assignments for Multi-Person Tracking in Crowds

2022 , Stadler, Daniel , Beyerer, Jürgen

Multi-person tracking is often solved with a tracking-by-detection approach that matches all tracks and detections simultaneously based on a distance matrix. In crowded scenes, ambiguous situations with similar track-detection distances occur, which leads to wrong assignments. To mitigate this problem, we propose a new association method that separately treats such difficult situations by modelling ambiguous assignments based on the differences in the distance matrix. Depending on the numbers of tracks and detections, for which the assignment task is determined ambiguous, different strategies to resolve these ambiguous situations are proposed. To further enhance the performance of our tracking framework, we introduce a camera motion-aware interpolation technique and make an adaptation to the motion model, which improves identity preservation. The effectiveness of our approach is demonstrated through extensive ablative experiments with different detection models. Moreover, the superiority w.r.t. other trackers is shown on the challenging MOT17 and MOT20 datasets, where state-of-the-art results are obtained.

No Thumbnail Available
Publication

Advances in 2 µm polarization-maintaining thulium-doped Q-switched fiber lasers for frequency conversion into the mid-IR

2021 , Schneider, Julian , Forster, Patrick , Romano, Clément , Eichhorn, Marc , Kieleck, Christelle

A diode-pumped actively Q-switched Tm3+-doped fiber laser is reported generating pulse energies of 800 µJ, pulse widths of 43 ns and peak powers of 17.5 kW. By using the single-oscillator as a pump source for nonlinear frequency conversion, mid-IR pulse energies of 230 µJ are extracted from a ZnGeP2 (ZGP) optical parametric oscillator (OPO).

No Thumbnail Available
Publication

Where are we with Human Pose Estimation in Real-World Surveillance?

2022 , Cormier, Mickael , Clepe, Aris , Specker, Andreas , Beyerer, Jürgen

The rapidly increasing number of surveillance cameras offers a variety of opportunities for intelligent video analytics to improve public safety. Among many others, the automatic recognition of suspicious and violent behavior poses a key task. To preserve personal privacy, prevent ethnic bias, and reduce complexity, most approaches first extract the pose or skeleton of persons and subsequently perform activity recognition. However, current literature mainly focuses on research datasets and does not consider real-world challenges and requirements of human pose estimation. We close this gap by analyzing these challenges, such as inadequate data and the need for real-time processing, and proposing a framework for human pose estimation in uncontrolled crowded surveillance scenarios. Our system integrates mitigation measures as well as a tracking component to incorporate temporal information. Finally, we provide a detailed quantitative and qualitative analysis on both a scientific and a real-world dataset to highlight improvements and remaining obstacles towards robust real-world human pose estimation in uncooperative scenarios.

No Thumbnail Available
Publication

Composition and Symmetries - Computational Analysis of Fine-Art Aesthetics

2022 , Zhuravleva, Olga A. , Komarov, Andrei V. , Zherdev, Denis A. , Savkhalova, Natalie B. , Demina, Anna L. , Michaelsen, Eckart , Nikonorov, Artem V. , Nesterov, Alexander Y.

This article deals with the problem of quantitative research of the aesthetic content of the fine-art object. The paper states that a fine-art object is a conceptually formed sequence of signs, and its composition is a structural form, that can be measured using mathematical models. The main approach is based on the perception of the formal order as a determinant of the aesthetic category of beauty. The composition of the image is directly related to the formation of aesthetic sensations and values, since it performs the function of controlling the viewer's perception of a work of art. The research is based on the studies of computational aesthetics by G. D. Birkhoff and M. Bense, as well as the studies of the receptive aesthetics of R. Ingarden, W. Iser, H. R. Jauss and Ya. Mukarzhovsky. The computational aesthetics methods, such as CNN-based object detectors, and gestalt-based symmetry analysis, are used to detect symmetry axes in fine-art images. Experimental analysis demonstrates that the applied computational approach is consistent with the philosophical analysis and the expert evaluations of the fine-art images, therefore it allows to obtain more detailed fine-art paintings description.

No Thumbnail Available
Publication

Partizipative & sozialverantwortliche Technikentwicklung

2021 , Mucha, Henrik , Maas, Franzisca , Stilke, Julia , Draude, Claude , Jarke, Juliane , Bischof, Andreas , Wolf, Sara , Buchmüller, Sandra , Marsden, Nicola , Berger, Arne , Maaß, Susanne

Im Workshop treffen sich Forscher*innen und Praktiker*innen zu Austausch und Diskussion über die Beteiligung von Nutzer*innen an Technikentwicklungsprozessen. Sie gehen dabei der Frage nach, wie Partizipation dem Anspruch auf Demokratisierung und Empowerment in Forschung und Praxis gerecht werden kann. Der Workshop dient auch als jährliches Treffen der Fachgruppe ""Partizipation"" im Fachbereich Mensch-Computer-Interaktion (MCI) der Gesellschaft für Informatik (GI).

No Thumbnail Available
Publication

Improving Semantic Image Segmentation via Label Fusion in Semantically Textured Meshes

2022 , Fervers, Florian , Breuer, Timo , Stachowiak, Gregor , Bullinger, Sebastian , Bodensteiner, Christoph , Arens, Michael

Models for semantic segmentation require a large amount of hand-labeled training data which is costly and time-consuming to produce. For this purpose, we present a label fusion framework that is capable of improving semantic pixel labels of video sequences in an unsupervised manner. We make use of a 3D mesh representation of the environment and fuse the predictions of different frames into a consistent representation using semantic mesh textures. Rendering the semantic mesh using the original intrinsic and extrinsic camera parameters yields a set of improved semantic segmentation images. Due to our optimized CUDA implementation, we are able to exploit the entire c-dimensional probability distribution of annotations over c classes in an uncertainty-aware manner. We evaluate our method on the Scannet dataset where we improve annotations produced by the state-of-the-art segmentation network ESANet from 52.05% to 58.25% pixel accuracy. We publish the source code of our framework online to foster future research in this area (https://github.com/fferflo/semantic-meshes). To the best of our knowledge, this is the first publicly available label fusion framework for semantic image segmentation based on meshes with semantic textures.

No Thumbnail Available
Publication

Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks

2022 , Borcherding, Anne , Takacs, Philipp , Beyerer, Jürgen

To ensure functionality and security of network stacks in Industrial Devices, thorough testing is necessary. This includes blackbox network fuzzing, where fields in network packets are filled with unexpected values to test the device's behavior in edge cases. Due to resource constraints, the tests need to be efficient and such the input values need to be chosen intelligently. Previous solutions use heuristics based on vague knowledge from previous projects to make these decisions. We aim to structure existing knowledge by defining Vulnerability Anti-Patterns for network communication stacks based on an analysis of the recent vulnerability groups Ripple20, Amnesia:33, and Urgent/11. For our evaluation, we implement fuzzing test scripts based on the Vulnerability Anti-Patterns and run them against 8 Industrial Devices from 5 different device classes. We show (I) that similar vulnerabilities occur in implementations of the same protocol as well as in different protocols, (II) that similar vulnerabilities also spread over different device classes, and (III) that test scripts based on the Vulnerability Anti-Patterns help to identify these vulnerabilities.

No Thumbnail Available
Publication

ML4Heat - Tools for the optimized operation of existing district heating networks based on machine learning methods

2021 , Kleppmann, Nicola , Hartung, Benedikt , Wallner, Steffen , Gonuguntla, Naga Mamatha , Bernard, Thomas

The increasing trend towards smart metering in district heating networks (DHNs) makes the networks more transparent than they have ever been. Previously the consumer side was autonomous, and the network was optimized based on the experience of a few plant operators. The global objective of the ML4Heat project is the development of methods and software tools to optimize the operation of existing DHNs from an energetic and economic point of view. Meter, controller, and plant data is evaluated using machine learning processes on three levels:1. Individual substations: Tools for performance monitoring and optimizated control of substations are developed and implemented. These range from detecting and where possible repairing anomalous behaviour to minimizing return flow temperatures without the use of additional sensor.2. Strand optimization: Methods are being developed which, based on the measurement data from the district heating transfer stations, can quickly identify anomalous behaviour of subsections (strands), such as high heat losses. For this purpose, machine learning processes are used in combination with basic physical equations.3. Network optimization: First, methods have been developed to predict the energy demand for the entire district heating network more precisely than before. This uses only readily available data and allows for the optimization of the power plants under consideration of heat losses, supply delays and individual consumer patterns.