6D object pose estimation has been a research topic in the field of computer vision and robotics. Many modern world applications like robot grasping, manipulation, autonomous navigation etc, require the correct pose of objects present in a scene to perform their specific task. It becomes even harder when the objects are placed in a cluttered scene and the level of occlusion is high. Prior works have tried to overcome this problem but could not achieve accuracy that can be considered reliable in real-world applications. In this paper, we present an architecture that, unlike prior work, is context-aware. It utilizes the context information available to us about the objects. Our proposed architecture treats the objects separately according to their types i.e; symmetric and non-symmetric. A deeper estimator and refiner network pair is used for non-symmetric objects as compared to symmetric due to their intrinsic differences. Our experiments show an enhancement in the accuracy of about 3.2% over the LineMOD dataset, which is considered a benchmark for pose estimation in the occluded and cluttered scenes, against the prior state-of-the-art DenseFusion. Our results also show that the inference time we got is sufficient for real-time usage.
translated by 谷歌翻译
Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used to develop reward and state associated with determination of surveillance detection routes (SDR). This work extends previous efforts on developing RL methods for path analysis within enterprise networks. This work focuses on building SDR where the routes focus on exploring the network services while trying to evade risk. RL is utilized to support the development of these routes by building a reward mechanism that would help in realization of these paths. The RL algorithm is modified to have a novel warm-up phase which decides in the initial exploration which areas of the network are safe to explore based on the rewards and penalty scale factor.
translated by 谷歌翻译
横向移动是指威胁参与者最初访问网络的方法,然后逐步通过上述网络收集有关资产的关键数据,直到达到其攻击的最终目标。随着企业网络的复杂性和相互联系的性质的增加,横向移动侵入变得更加复杂,并且需要同样复杂的检测机制,以便在企业量表下实时实时地进行此类威胁。在本文中,作者提出了一种使用用户行为分析和机器学习的新颖,轻巧的方法,用于横向运动检测。具体而言,本文介绍了一种用于网络域特异性特征工程的新方法,该方法可以以每个用户为基础识别横向运动行为。此外,工程功能还被用于开发两个监督的机器学习模型,用于横向运动识别,这些模型在文献中显然超过了先前在文献中看到的模型,同时在具有高级失衡的数据集上保持了稳健的性能。本文介绍的模型和方法也已与安全操作员合作设计,以相关和可解释,以最大程度地发挥影响力并最大程度地减少作为网络威胁检测工具包的价值。本文的基本目标是为近实时的横向运动检测提供一种计算高效的,特定于域的方法,该检测对企业规模的数据量和类别不平衡是可解释且健壮的。
translated by 谷歌翻译
DeepFake是使用AI方法产生或操纵的内容或材料,以便像真实一样传递。有四种不同的DeepFake类型:音频,视频,图像和文本。在这项研究中,我们专注于音频Deew,以及人们如何感知它。有几个音频DeepFake发电框架,但我们选择梅尔甘,这是一个非自动增加和快速的音频DeepFake产生框架,需要更少的参数。本研究试图评估来自不同专业大学生的音频深蓝。本研究还回答了他们的背景和主要可能影响他们对AI生成的深度的看法的问题。我们还基于以下不同方面分析结果:年级水平,语法的复杂性,音频剪辑中使用的语法,音频剪辑的长度,那些了解术语的人和那些没有政治角度的人和那些。有趣的是,结果表明当一个音频剪辑有政治内涵时,即使内容相当相似,它也会影响人们是否是真实的或假的。这项研究还探讨了背景和主要可能影响对德国人的看法的问题。
translated by 谷歌翻译
DeepFake是使用人工智能(AI)方法合成生成或操纵的内容或材料,以防止真实,并且可以包括音频,视频,图像和文本合成。与现有的调查论文相比,此调查与现有的调查文件相比具有不同的视角,主要专注于视频和图像Deewakes。该调查不仅评估了不同的DeepFake类别中的生成和检测方法,而且主要关注大多数现有调查中被忽视的音频Deewakes。本文重视分析并提供了一个独特的音频Deepfake研究来源,主要是从2016到2020年的范围。据我们所知,这是第一个专注于英语中音频Deewakes的调查。本次调查为读者提供了摘要1)不同的DeepFake类别2)如何创建和检测到它们3)该领域的最新趋势和检测方法中的缺点4)音频DeepFakes,如何更详细地创建和检测到它们这是本文的主要重点。我们发现生成的对抗性网络(GAN),卷积神经网络(CNN)和深神经网络(DNN)是创建和检测德刀的常见方式。在我们对超过140种方法的评估中,我们发现大多数重点都在视频Deewakes上,特别是在播放视频德国。我们发现,对于文本Deew,有更多的一代方法,但较少的检测方法,包括假新闻检测,这已成为一个有争议的研究领域,因为由于人类发电的假含量重叠的潜力。本文是完整调查的缩写版本,并揭示了研究音频Deew饼的清晰,特别是检测音频Deewakes。
translated by 谷歌翻译