SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
K-NEAREST NEIGHBORS DIRECTED SYNTHETIC IMAGES INJECTION
                                                                                   Luca Piras, Giorgio Giacinto
                                                     Dept. of Electrical and Electronic Engineering - University of Cagliari, Italy
                                                                         luca.piras@diee.unica.it - giacinto@diee.unica.it



                                                                                                                               K-Nearest Neighbors Directed Pattern Injection
                             Relevance feedback                                                                     We propose to address the problem of small number of training
 Relevance feedback techniques are employed to capture the                                                          patterns by artificially increasing the number of relevant patterns in
 subjectivity of retrieval results and to refine the search. The user is asked                                      the feature space. The basic idea underlying K-Nearest Neighbors
 to label the images as being relevant or not, and the similarity measure                                           Directed Pattern Injection consists in adding some artificial patterns
 is modified accordingly: the images in the database are ranked in                                                  generated in the feature space by taking into account the K
 terms of the distances from the nearest relevant and non-relevant                                                  relevant images nearest to a reference point in the feature space.
 images.
                                                             I ! NN nr I  ()                                                                                    1 K
                                                                                                                                                                  $ # X % Qk    (           )
                  relevanceNN I =      ()                                                                                                        Pi = X + ! "
                                                              ()
                                                  I ! NN r I + I ! NN nr I              ()                                                                      K k =1 k
                                                                                                                    The choice of all parameter is far from being a trivial task; the

NN    r
          ( I ) ( resp., NN ( I ))nr
                                            nearest relevant (resp., non-relevant) image to
                                            image I.
                                                                                                                    effectiveness of the method depends from:

                                                                                                                     X Reference relevant image          K n° Nearest Neighbors                                 ! k ! N (0,1)
                                                                                                                     - Query
                            Digital              Compute the new
                            Library               query using the                                                    - mean vector of all the relevant images (Mr)
                                                    user's hints                Non-relevant       Relevant          - each relevant images (Ar)
                                                                                                                     - a point computed according to the BQS                                                    New artificial
                                                                                                                       query movement technique (BQS)                                                           pattern
                    Compute the similarity between
                      the query image and the
                       images in the database
  Example-Image                                                                                                       !   Scaling factor
 chosen by a user to
                                                                                                                                      1
perform a search in a                                                                                                     !=
    Digital Library
                                                                    The user marks the relevant and non-relevant
                                                                                                                               ("1
                                                                                                                                  2
                                                                                                                                      + " 22 )
                                                                                                                                                              Bound of linear
                                                                         images for the relevance feedback                         1
                                                                                                                          !=                                  combination
                                                                                                                               ("1 + "2 )
                                                                        After several
                                                                         iterations                                                   1                       Bound of nearest
                                                                                                                          !=                                  relevant image
                                                                                                                               ("1 + "2 )
                                                                                                                                            2

                                                                                                                                                                                    Bound of farthest
                                                                                                                                                                                    relevant image

                         The system outputs the results
                                                                                                                     Qk k-th relevant image nearest to X

                                                                                                                                                     N             where n = 2, …, 5
                                                                                                                     Number of pattern Pi :              =n
                                                                                                                                                    R+ P
                                                                                  Relevant images found at
                                                                                      the previous steps
                           Lack of relevant images
 One of the most severe problems in exploiting relevance feedback in
 image retrieval is the small number of images that the user considers as
 being “relevant” compared to the number of non-relevant images
 especially during the first iterations.                                                                                                     Experimental results
                                                                                                                   The Caltech-256 dataset obtained from the California Institute of
    I) Even in the case of very “cooperative” users, it is not feasible to                                         Technology repository has been used. It consists of 30607 images
    display more than a few dozens of images to label.                                                             subdivided into 257 semantic classes and the number of images per
                                                                                                                   class ranges from 80 to 827.
    II) If the database at hand is very large, then the number of images
    that are relevant to the query can easily be very small compared to                                            500 images have been randomly extracted from all of the 257 classes,
    the size of the database.                                                                                      and used as query. The top twenty nearest neighbors of each query
    III) In a high dimensional feature space images with different                                                 are returned. 9 relevance feedback iterations are performed.
    semantic content can lie near each other.
                                                                                                                   The Tamura representation has been used (18-dimensional feature vector).




                                                                                                                                                                                                                 1
                               Our proposal                                                                                                                                                     F=
                                                                                                                                                                                                            1         1
 Increasing the number of “relevant” patterns used to train the system:                                                                                                                                         +
                                                                                                                                                                                                        2 ! prec 2 ! recall
   I) Creating new random artificial patterns by exploiting nearest
   neighbor information.
   II) Constraining these patterns in a region of the feature space
   containing relevant images.



                                                          Pattern Recognition and Applications Group
                    P
                        R     A    Group                  http://prag.diee.unica.it/pra/eng/home
                                                                                                                                                                            WIAMIS 2010

Contenu connexe

Tendances

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Deep Learning
Deep LearningDeep Learning
Deep Learning
Pierre de Lacaze
 
Extracting the Object from the Shadows: Maximum Likelihood Object/Shadow Disc...
Extracting the Object from the Shadows: Maximum Likelihood Object/Shadow Disc...Extracting the Object from the Shadows: Maximum Likelihood Object/Shadow Disc...
Extracting the Object from the Shadows: Maximum Likelihood Object/Shadow Disc...
Kan Ouivirach, Ph.D.
 
Modeling perceptual similarity and shift invariance in deep networks
Modeling perceptual similarity and shift invariance in deep networksModeling perceptual similarity and shift invariance in deep networks
Modeling perceptual similarity and shift invariance in deep networks
NAVER Engineering
 
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
Edge AI and Vision Alliance
 
A Game Theoretic Framework for Heterogenous Information Network Clustering
A Game Theoretic Framework for Heterogenous Information Network ClusteringA Game Theoretic Framework for Heterogenous Information Network Clustering
A Game Theoretic Framework for Heterogenous Information Network Clustering
Faris Alqadah
 

Tendances (18)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Deep Learning
Deep LearningDeep Learning
Deep Learning
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Hussain Learning Relevant Eye Movement Feature Spaces Across Users
Hussain Learning Relevant Eye Movement Feature Spaces Across UsersHussain Learning Relevant Eye Movement Feature Spaces Across Users
Hussain Learning Relevant Eye Movement Feature Spaces Across Users
 
Pc Seminar Jordi
Pc Seminar JordiPc Seminar Jordi
Pc Seminar Jordi
 
Ct31628631
Ct31628631Ct31628631
Ct31628631
 
IT6005 digital image processing question bank
IT6005   digital image processing question bankIT6005   digital image processing question bank
IT6005 digital image processing question bank
 
Extracting the Object from the Shadows: Maximum Likelihood Object/Shadow Disc...
Extracting the Object from the Shadows: Maximum Likelihood Object/Shadow Disc...Extracting the Object from the Shadows: Maximum Likelihood Object/Shadow Disc...
Extracting the Object from the Shadows: Maximum Likelihood Object/Shadow Disc...
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
It 603
It 603It 603
It 603
 
Modeling perceptual similarity and shift invariance in deep networks
Modeling perceptual similarity and shift invariance in deep networksModeling perceptual similarity and shift invariance in deep networks
Modeling perceptual similarity and shift invariance in deep networks
 
Gray Image Coloring Using Texture Similarity Measures
Gray Image Coloring Using Texture Similarity MeasuresGray Image Coloring Using Texture Similarity Measures
Gray Image Coloring Using Texture Similarity Measures
 
56 58
56 5856 58
56 58
 
Vc pred
Vc predVc pred
Vc pred
 
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
A Game Theoretic Framework for Heterogenous Information Network Clustering
A Game Theoretic Framework for Heterogenous Information Network ClusteringA Game Theoretic Framework for Heterogenous Information Network Clustering
A Game Theoretic Framework for Heterogenous Information Network Clustering
 

En vedette

eOk.ro - statistici septembrie
eOk.ro - statistici septembrieeOk.ro - statistici septembrie
eOk.ro - statistici septembrie
enedelcu
 
Ssquared logo dark
Ssquared logo darkSsquared logo dark
Ssquared logo dark
susanmcphee
 
1.pc project presentations with its objectives
1.pc project presentations with its objectives1.pc project presentations with its objectives
1.pc project presentations with its objectives
TIBUCON
 
Exam. recuperacion
Exam. recuperacionExam. recuperacion
Exam. recuperacion
Leydi Ortiz
 
Diagrama de flujo
Diagrama de flujoDiagrama de flujo
Diagrama de flujo
maleta-01
 

En vedette (20)

eOk.ro - statistici septembrie
eOk.ro - statistici septembrieeOk.ro - statistici septembrie
eOk.ro - statistici septembrie
 
Navarathiri dussera
Navarathiri dusseraNavarathiri dussera
Navarathiri dussera
 
Nutricion
NutricionNutricion
Nutricion
 
Baroig | + productividad paso a paso | 2:00 mins
Baroig | + productividad paso a paso | 2:00 minsBaroig | + productividad paso a paso | 2:00 mins
Baroig | + productividad paso a paso | 2:00 mins
 
Ssquared logo dark
Ssquared logo darkSsquared logo dark
Ssquared logo dark
 
1.pc project presentations with its objectives
1.pc project presentations with its objectives1.pc project presentations with its objectives
1.pc project presentations with its objectives
 
Exam. recuperacion
Exam. recuperacionExam. recuperacion
Exam. recuperacion
 
Power factor basics
Power factor basicsPower factor basics
Power factor basics
 
MICROSOFT CERTIFIED PROFESSIONALS
MICROSOFT CERTIFIED PROFESSIONALSMICROSOFT CERTIFIED PROFESSIONALS
MICROSOFT CERTIFIED PROFESSIONALS
 
No Experience Necessary: A Crash Course in Developing Approval Plans
No Experience Necessary: A Crash Course in Developing Approval PlansNo Experience Necessary: A Crash Course in Developing Approval Plans
No Experience Necessary: A Crash Course in Developing Approval Plans
 
Radio mobil
Radio mobilRadio mobil
Radio mobil
 
Photo Album
Photo AlbumPhoto Album
Photo Album
 
Tirz ppt
Tirz pptTirz ppt
Tirz ppt
 
Votação orçamentária
Votação orçamentáriaVotação orçamentária
Votação orçamentária
 
Practica29
Practica29 Practica29
Practica29
 
Chris Ham: capitated budgets - a flexible way to enable new models of care
Chris Ham: capitated budgets - a flexible way to enable new models of careChris Ham: capitated budgets - a flexible way to enable new models of care
Chris Ham: capitated budgets - a flexible way to enable new models of care
 
K&K Designs Virtual Party
K&K Designs Virtual PartyK&K Designs Virtual Party
K&K Designs Virtual Party
 
Diagrama de flujo
Diagrama de flujoDiagrama de flujo
Diagrama de flujo
 
Video
VideoVideo
Video
 
mHealth Services Science - Science in the Service of Life Quality
mHealth Services Science - Science in the Service of Life QualitymHealth Services Science - Science in the Service of Life Quality
mHealth Services Science - Science in the Service of Life Quality
 

Similaire à Wiamis2010 poster

Image quality assessment and statistical evaluation
Image quality assessment and statistical evaluationImage quality assessment and statistical evaluation
Image quality assessment and statistical evaluation
DocumentStory
 
Week06 bme429-cbir
Week06 bme429-cbirWeek06 bme429-cbir
Week06 bme429-cbir
Ikram Moalla
 
Unit-1Chapter-1Lecture-2.pptxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk...
Unit-1Chapter-1Lecture-2.pptxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk...Unit-1Chapter-1Lecture-2.pptxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk...
Unit-1Chapter-1Lecture-2.pptxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk...
MonikaSharma151258
 

Similaire à Wiamis2010 poster (19)

Bayesian Core: Chapter 8
Bayesian Core: Chapter 8Bayesian Core: Chapter 8
Bayesian Core: Chapter 8
 
Image quality assessment and statistical evaluation
Image quality assessment and statistical evaluationImage quality assessment and statistical evaluation
Image quality assessment and statistical evaluation
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Semi-supervised concept detection by learning the structure of similarity graphs
Semi-supervised concept detection by learning the structure of similarity graphsSemi-supervised concept detection by learning the structure of similarity graphs
Semi-supervised concept detection by learning the structure of similarity graphs
 
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
 
Dissection network
Dissection networkDissection network
Dissection network
 
Prediction of Interpolants in Subsampled Radargram Slices
Prediction of Interpolants in Subsampled Radargram SlicesPrediction of Interpolants in Subsampled Radargram Slices
Prediction of Interpolants in Subsampled Radargram Slices
 
Image quality improvement of Low-resolution camera using Data fusion technique
Image quality improvement of Low-resolution camera using Data fusion techniqueImage quality improvement of Low-resolution camera using Data fusion technique
Image quality improvement of Low-resolution camera using Data fusion technique
 
Salient KeypointSelection for Object Representation
Salient KeypointSelection for Object RepresentationSalient KeypointSelection for Object Representation
Salient KeypointSelection for Object Representation
 
Image Interpolation Techniques in Digital Image Processing: An Overview
Image Interpolation Techniques in Digital Image Processing: An OverviewImage Interpolation Techniques in Digital Image Processing: An Overview
Image Interpolation Techniques in Digital Image Processing: An Overview
 
V2 v posenet
V2 v posenetV2 v posenet
V2 v posenet
 
最近の研究情勢についていくために - Deep Learningを中心に -
最近の研究情勢についていくために - Deep Learningを中心に - 最近の研究情勢についていくために - Deep Learningを中心に -
最近の研究情勢についていくために - Deep Learningを中心に -
 
Large Scale Image Retrieval 2022.pdf
Large Scale Image Retrieval 2022.pdfLarge Scale Image Retrieval 2022.pdf
Large Scale Image Retrieval 2022.pdf
 
Recommender Systems Tutorial (Part 2) -- Offline Components
Recommender Systems Tutorial (Part 2) -- Offline ComponentsRecommender Systems Tutorial (Part 2) -- Offline Components
Recommender Systems Tutorial (Part 2) -- Offline Components
 
Chapter 2. Digital Image Fundamentals.pdf
Chapter 2. Digital Image Fundamentals.pdfChapter 2. Digital Image Fundamentals.pdf
Chapter 2. Digital Image Fundamentals.pdf
 
A broad ranging open access journal Fast and efficient online submission Expe...
A broad ranging open access journal Fast and efficient online submission Expe...A broad ranging open access journal Fast and efficient online submission Expe...
A broad ranging open access journal Fast and efficient online submission Expe...
 
Week06 bme429-cbir
Week06 bme429-cbirWeek06 bme429-cbir
Week06 bme429-cbir
 
Unit-1Chapter-1Lecture-2.pptxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk...
Unit-1Chapter-1Lecture-2.pptxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk...Unit-1Chapter-1Lecture-2.pptxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk...
Unit-1Chapter-1Lecture-2.pptxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk...
 
Attentive Relational Networks for Mapping Images to Scene Graphs
Attentive Relational Networks for Mapping Images to Scene GraphsAttentive Relational Networks for Mapping Images to Scene Graphs
Attentive Relational Networks for Mapping Images to Scene Graphs
 

Plus de Pluribus One

Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Pluribus One
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Pluribus One
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Pluribus One
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Pluribus One
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
Pluribus One
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
Pluribus One
 

Plus de Pluribus One (20)

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial Settings
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion Attacks
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
 
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
 
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 

Wiamis2010 poster

  • 1. K-NEAREST NEIGHBORS DIRECTED SYNTHETIC IMAGES INJECTION Luca Piras, Giorgio Giacinto Dept. of Electrical and Electronic Engineering - University of Cagliari, Italy luca.piras@diee.unica.it - giacinto@diee.unica.it K-Nearest Neighbors Directed Pattern Injection Relevance feedback We propose to address the problem of small number of training Relevance feedback techniques are employed to capture the patterns by artificially increasing the number of relevant patterns in subjectivity of retrieval results and to refine the search. The user is asked the feature space. The basic idea underlying K-Nearest Neighbors to label the images as being relevant or not, and the similarity measure Directed Pattern Injection consists in adding some artificial patterns is modified accordingly: the images in the database are ranked in generated in the feature space by taking into account the K terms of the distances from the nearest relevant and non-relevant relevant images nearest to a reference point in the feature space. images. I ! NN nr I () 1 K $ # X % Qk ( ) relevanceNN I = () Pi = X + ! " () I ! NN r I + I ! NN nr I () K k =1 k The choice of all parameter is far from being a trivial task; the NN r ( I ) ( resp., NN ( I ))nr nearest relevant (resp., non-relevant) image to image I. effectiveness of the method depends from: X Reference relevant image K n° Nearest Neighbors ! k ! N (0,1) - Query Digital Compute the new Library query using the - mean vector of all the relevant images (Mr) user's hints Non-relevant Relevant - each relevant images (Ar) - a point computed according to the BQS New artificial query movement technique (BQS) pattern Compute the similarity between the query image and the images in the database Example-Image ! Scaling factor chosen by a user to 1 perform a search in a != Digital Library The user marks the relevant and non-relevant ("1 2 + " 22 ) Bound of linear images for the relevance feedback 1 != combination ("1 + "2 ) After several iterations 1 Bound of nearest != relevant image ("1 + "2 ) 2 Bound of farthest relevant image The system outputs the results Qk k-th relevant image nearest to X N where n = 2, …, 5 Number of pattern Pi : =n R+ P Relevant images found at the previous steps Lack of relevant images One of the most severe problems in exploiting relevance feedback in image retrieval is the small number of images that the user considers as being “relevant” compared to the number of non-relevant images especially during the first iterations. Experimental results The Caltech-256 dataset obtained from the California Institute of I) Even in the case of very “cooperative” users, it is not feasible to Technology repository has been used. It consists of 30607 images display more than a few dozens of images to label. subdivided into 257 semantic classes and the number of images per class ranges from 80 to 827. II) If the database at hand is very large, then the number of images that are relevant to the query can easily be very small compared to 500 images have been randomly extracted from all of the 257 classes, the size of the database. and used as query. The top twenty nearest neighbors of each query III) In a high dimensional feature space images with different are returned. 9 relevance feedback iterations are performed. semantic content can lie near each other. The Tamura representation has been used (18-dimensional feature vector). 1 Our proposal F= 1 1 Increasing the number of “relevant” patterns used to train the system: + 2 ! prec 2 ! recall I) Creating new random artificial patterns by exploiting nearest neighbor information. II) Constraining these patterns in a region of the feature space containing relevant images. Pattern Recognition and Applications Group P R A Group http://prag.diee.unica.it/pra/eng/home WIAMIS 2010