Now showing 1 - 10 of 2666
  • Publication
    Informed Machine Learning - A Taxonomy and Survey of Integrating Prior Knowledge into Learning Systems
    Despite its great success, machine learning can have its limits when dealing with insufficient training data. A potential solution is the additional integration of prior knowledge into the training process which leads to the notion of informed machine learning. In this paper, we present a structured overview of various approaches in this field. We provide a definition and propose a concept for informed machine learning which illustrates its building blocks and distinguishes it from conventional machine learning. We introduce a taxonomy that serves as a classification framework for informed machine learning approaches. It considers the source of knowledge, its representation, and its integration into the machine learning pipeline. Based on this taxonomy, we survey related research and describe how different knowledge representations such as algebraic equations, logic rules, or simulation results can be used in learning systems. This evaluation of numerous papers on the basis of our taxonomy uncovers key methods in the field of informed machine learning.
  • Publication
    Handheld spectral sensing devices should not mislead consumers as far as non-authentic food is concerned: A case study with adulteration of milk powder
    ( 2022)
    Delatour, Thierry
    ;
    ; ;
    Romero, Roman
    ;
    ; ;
    Panchaud, Alexandre
    With the rising trend of consumers being offered by start-up companies portable devices and applications for checking quality of purchased products, it appears of paramount importance to assess the reliability of miniaturized sensors embedded in such devices. Here, eight sensors were assessed for food fraud applications in skimmed milk powder. The performance was evaluated with dry- and wet-blended powders mimicking adulterated materials by addition of either ammonium sulfate, semicarbazide, or cornstarch in the range 0.5-10% of profit. The quality of the spectra was assessed for an adequate identification of the outliers prior to a deep assessment of performance for both non-targeted (soft independent modelling of class analogy, SIMCA) and targeted analyses (partial least square regression with orthogonal signal correction, OPLS). Here, we show that the sensors have generally difficulties in detecting adulterants at ca. 5% supplementation, and often fail in achieving adequate specificity and detection capability. This is a concern as they may mislead future users, particularly consumers, if they are intended to be developed for handheld devices available publicly in smartphone-based applications. Full article(This article belongs to the Special Issue Rapid Detection Methods for Food Fraud and Food Contaminants Series II).
  • Publication
    Confocal fluorescence microscopy with high-NA diffractive lens arrays
    Traditionally, there is a trade-off between the numerical aperture and field of view for a microscope objective. Diffractive lens arrays (DLAs) with overlapping apertures are used to overcome such a problem. A spot array with an NA up to 0.83 and a pitch of 75 m is produced by the proposed DLA at a wavelength of 488 nm. By measurement of the fluorescence beads, the DLA-based confocal setup shows the capability of high-resolution measurement over an area of 3mm 3mm with a 2.5 0.07 NA objective. Further, the proposed fluorescence microscope is insensitive to optical aberrations, which has been demonstrated by imaging with a simple doublet lens.
  • Publication
    Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks
    ( 2022) ;
    Feldmann, Lukas
    ;
    Karch, Markus
    ;
    ;
    It is crucial in an industrial network to understand how and why a intrusion detection system detects, classifies, and reports intrusions. With the ongoing introduction of machine learning into the research area of intrusion detection, this understanding gets even more important since the used systems often appear as a black-box for the user and are no longer understandable in an intuitive and comprehensible way. We propose a novel approach to understand the internal characteristics of a machine learning based network intrusion detection system. This approach includes methods to understand which data sources the system uses, to evaluate whether the system uses linear or non-linear classification approaches, and to find out which underlying machine learning model is implemented in the system. Our evaluation on two publicly available industrial datasets shows that the detection of the data source and the differentiation between linear and non-linear models is possible with our approach. In addition, the identification of the underlying machine learning model can be accomplished with statistical significance for non-linear models. The information made accessible by our approach helps to develop a deeper understanding of the functioning of a network intrusion detection system, and contributes towards developing transparent machine learning based intrusion detection approaches.
  • Publication
    In memoriam Fernando Puente Leon
    ( 2022)
    Heizmann, M.
    ;
    Beyerer, J.
  • Publication
    Siamese recurrent neural networks for the robust classification of grid disturbances in transmission power systems considering unknown events
    ( 2022)
    Kummerow, A.
    ;
    Monsalve, C.
    ;
    Bretschneider, P.
    The automated identification and localisation of grid disturbances is a major research area and key technology for the monitoring and control of future power systems. Current recognition systems rely on sufficient training data and are very error-prone to disturbance events, which are unseen during training. This study introduces a robust Siamese recurrent neural network using attention-based embedding functions to simultaneously identify and locate disturbances from synchrophasor data. Additionally, a novel double-sigmoid classifier is introduced for reliable differentiation between known and unknown disturbance types and locations. Different models are evaluated within an open-set classification problem for a generic power transmission system considering different unknown disturbance events. A detailed analysis of the results is provided and classification results are compared with a state-of-the-art open-set classifier.
  • Publication
    Multiagent Self-Redundancy Identification and Tuned Greedy-Exploration
    ( 2022)
    Martinez, D.A.
    ;
    Mojica-Nava, E.
    ;
    Watson, K.
    ;
    Usländer, T.
    The constant development of sensing applications using innovative and affordable measurement devices has increased the amount of data transmitted through networks, carrying in many cases, redundant information that requires more time to be analyzed or larger storage centers. This redundancy is mainly present because the network nodes do not recognize environmental variations requiring exploration, which causes a repetitive data collection in a set of limited locations. In this work, we propose a multiagent learning framework that uses the Gaussian process regression (GPR) to allow the agents to predict the environmental behavior by means of the neighborhood measurements, and the rate distortion function to establish a border in which the environmental information is neither misunderstood nor redundant. We apply this framework to a mobile sensor network and demonstrate that the nodes can tune the parameter s of the Blahut-Arimoto algorithm in order to adjust the gathered environment information and to become more or less exploratory within a sensing area.
  • Publication
    Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks
    ( 2022) ;
    Takacs, Philipp
    ;
    To ensure functionality and security of network stacks in Industrial Devices, thorough testing is necessary. This includes blackbox network fuzzing, where fields in network packets are filled with unexpected values to test the device's behavior in edge cases. Due to resource constraints, the tests need to be efficient and such the input values need to be chosen intelligently. Previous solutions use heuristics based on vague knowledge from previous projects to make these decisions. We aim to structure existing knowledge by defining Vulnerability Anti-Patterns for network communication stacks based on an analysis of the recent vulnerability groups Ripple20, Amnesia:33, and Urgent/11. For our evaluation, we implement fuzzing test scripts based on the Vulnerability Anti-Patterns and run them against 8 Industrial Devices from 5 different device classes. We show (I) that similar vulnerabilities occur in implementations of the same protocol as well as in different protocols, (II) that similar vulnerabilities also spread over different device classes, and (III) that test scripts based on the Vulnerability Anti-Patterns help to identify these vulnerabilities.
  • Publication
    Validation of XAI Explanations for Multivariate Time Series Classification in the Maritime Domain
    Due to the lack of explanation towards their internal mechanism, state-of-the-art deep learning-based classifiers are often considered as black-box models. For instance, in the maritime domain, models that classify the types of ships based on their trajectories and other features perform well, but give no further explanation for their predictions. To gain the trust of human operators responsible for critical decisions, the reason behind the classification is crucial. In this paper, we introduce explainable artificial intelligence (XAI) approaches to the task of classification of ship types. This supports decision-making by providing explanations in terms of the features contributing the most towards the prediction, along with their corresponding time intervals. In the case of the LIME explainer, we adapt the time-slice mapping technique (LimeforTime), while for Shapley additive explanations (SHAP) and path integrated gradient (PIG), we represent the relevance of each input variable to generate a heatmap as an explanation. In order to validate the XAI results, the existing perturbation and sequence analyses for classifiers of univariate time series data is employed for testing and evaluating the XAI explanations on multivariate time series. Furthermore, we introduce a novel evaluation technique to assess the quality of explanations yielded by the chosen XAI method.
  • Publication
    Intelligente Bild- und Videoauswertung für die Sicherheit
    Das Fraunhofer-Institut für Optronik, Systemtechnik und Bildauswertung IOSB befasst sich seit vielen Jahren mit der intelligenten Bild- und Videoauswertung im präventiv-polizeilichen und ermittlungstechnischen Bereich. Neuste Methoden der intelligenten Videoüberwachung werden dazu in realen Anwendungen getestet und weiterentwickelt. Bis 2023 wird beispielsweise gemeinsam mit dem Land Baden-Württemberg und dem Polizeipräsidium Mannheim eine intelligente Technik in einem Modellprojekt in Mannheim erprobt und weiterentwickelt, die zudem die Privatsphäre der Bevölkerung und den Datenschutz verbessert. Das Ziel ist es, ein Assistenzsystem zu entwickeln, das die Aufmerksamkeit der Videobeobachter im Führungs- und Lagezentrum auf polizeilich relevante Situationen lenkt, so dass die Beamten ausschließlich diese Szenen sehen und bewerten müssen. Zudem wird in diesem Beitrag das aktuelle Potenzial intelligenter Verfahren exemplarisch anhand des fraunhofereigenen Experimentalsystems ivisX aufgezeigt.