191 research outputs found
Semi-supervised learning via DQN for log anomaly detection
Log anomaly detection is a critical component in modern software system
security and maintenance, serving as a crucial support and basis for system
monitoring, operation, and troubleshooting. It aids operations personnel in
timely identification and resolution of issues. However, current methods in log
anomaly detection still face challenges such as underutilization of unlabeled
data, imbalance between normal and anomaly class data, and high rates of false
positives and false negatives, leading to insufficient effectiveness in anomaly
recognition. In this study, we propose a semi-supervised log anomaly detection
method named DQNLog, which integrates deep reinforcement learning to enhance
anomaly detection performance by leveraging a small amount of labeled data and
large-scale unlabeled data. To address issues of imbalanced data and
insufficient labeling, we design a state transition function biased towards
anomalies based on cosine similarity, aiming to capture semantic-similar
anomalies rather than favoring the majority class. To enhance the model's
capability in learning anomalies, we devise a joint reward function that
encourages the model to utilize labeled anomalies and explore unlabeled
anomalies, thereby reducing false positives and false negatives. Additionally,
to prevent the model from deviating from normal trajectories due to
misestimation, we introduce a regularization term in the loss function to
ensure the model retains prior knowledge during updates. We evaluate DQNLog on
three widely used datasets, demonstrating its ability to effectively utilize
large-scale unlabeled data and achieve promising results across all
experimental datasets
Fine-grained Graph Learning for Multi-view Subspace Clustering
Multi-view subspace clustering (MSC) is a popular unsupervised method by
integrating heterogeneous information to reveal the intrinsic clustering
structure hidden across views. Usually, MSC methods use graphs (or affinity
matrices) fusion to learn a common structure, and further apply graph-based
approaches to clustering. Despite progress, most of the methods do not
establish the connection between graph learning and clustering. Meanwhile,
conventional graph fusion strategies assign coarse-grained weights to combine
multi-graph, ignoring the importance of local structure. In this paper, we
propose a fine-grained graph learning framework for multi-view subspace
clustering (FGL-MSC) to address these issues. To utilize the multi-view
information sufficiently, we design a specific graph learning method by
introducing graph regularization and local structure fusion pattern. The main
challenge is how to optimize the fine-grained fusion weights while generating
the learned graph that fits the clustering task, thus making the clustering
representation meaningful and competitive. Accordingly, an iterative algorithm
is proposed to solve the above joint optimization problem, which obtains the
learned graph, the clustering representation, and the fusion weights
simultaneously. Extensive experiments on eight real-world datasets show that
the proposed framework has comparable performance to the state-of-the-art
methods
Deeper and Wider Networks for Performance Metrics Prediction in Communication Networks
In today's era, users have increasingly high expectations regarding the
performance and efficiency of communication networks. Network operators aspire
to achieve efficient network planning, operation, and optimization through
Digital Twin Networks (DTN). The effectiveness of DTN heavily relies on the
network model, with graph neural networks (GNN) playing a crucial role in
network modeling. However, existing network modeling methods still lack a
comprehensive understanding of communication networks. In this paper, we
propose DWNet (Deeper and Wider Networks), a heterogeneous graph neural network
modeling method based on data-driven approaches that aims to address end-to-end
latency and jitter prediction in network models. This method stands out due to
two distinctive features: firstly, it introduces deeper levels of state
participation in the message passing process; secondly, it extensively
integrates relevant features during the feature fusion process. Through
experimental validation and evaluation, our model achieves higher prediction
accuracy compared to previous research achievements, particularly when dealing
with unseen network topologies during model training. Our model not only
provides more accurate predictions but also demonstrates stronger
generalization capabilities across diverse topological structures
HC-Ref: Hierarchical Constrained Refinement for Robust Adversarial Training of GNNs
Recent studies have shown that attackers can catastrophically reduce the
performance of GNNs by maliciously modifying the graph structure or node
features on the graph. Adversarial training, which has been shown to be one of
the most effective defense mechanisms against adversarial attacks in computer
vision, holds great promise for enhancing the robustness of GNNs. There is
limited research on defending against attacks by performing adversarial
training on graphs, and it is crucial to delve deeper into this approach to
optimize its effectiveness. Therefore, based on robust adversarial training on
graphs, we propose a hierarchical constraint refinement framework (HC-Ref) that
enhances the anti-perturbation capabilities of GNNs and downstream classifiers
separately, ultimately leading to improved robustness. We propose corresponding
adversarial regularization terms that are conducive to adaptively narrowing the
domain gap between the normal part and the perturbation part according to the
characteristics of different layers, promoting the smoothness of the predicted
distribution of both parts. Moreover, existing research on graph robust
adversarial training primarily concentrates on training from the standpoint of
node feature perturbations and seldom takes into account alterations in the
graph structure. This limitation makes it challenging to prevent attacks based
on topological changes in the graph. This paper generates adversarial examples
by utilizing graph structure perturbations, offering an effective approach to
defend against attack methods that are based on topological changes. Extensive
experiments on two real-world graph benchmarks show that HC-Ref successfully
resists various attacks and has better node classification performance compared
to several baseline methods
Hyperedge Interaction-aware Hypergraph Neural Network
Hypergraphs provide an effective modeling approach for modeling high-order
relationships in many real-world datasets. To capture such complex
relationships, several hypergraph neural networks have been proposed for
learning hypergraph structure, which propagate information from nodes to
hyperedges and then from hyperedges back to nodes. However, most existing
methods focus on information propagation between hyperedges and nodes,
neglecting the interactions among hyperedges themselves. In this paper, we
propose HeIHNN, a hyperedge interaction-aware hypergraph neural network, which
captures the interactions among hyperedges during the convolution process and
introduce a novel mechanism to enhance information flow between hyperedges and
nodes. Specifically, HeIHNN integrates the interactions between hyperedges into
the hypergraph convolution by constructing a three-stage information
propagation process. After propagating information from nodes to hyperedges, we
introduce a hyperedge-level convolution to update the hyperedge embeddings.
Finally, the embeddings that capture rich information from the interaction
among hyperedges will be utilized to update the node embeddings. Additionally,
we introduce a hyperedge outlier removal mechanism in the information
propagation stages between nodes and hyperedges, which dynamically adjusts the
hypergraph structure using the learned embeddings, effectively removing
outliers. Extensive experiments conducted on real-world datasets show the
competitive performance of HeIHNN compared with state-of-the-art methods
Transferable Adversarial Facial Images for Privacy Protection
The success of deep face recognition (FR) systems has raised serious privacy
concerns due to their ability to enable unauthorized tracking of users in the
digital world. Previous studies proposed introducing imperceptible adversarial
noises into face images to deceive those face recognition models, thus
achieving the goal of enhancing facial privacy protection. Nevertheless, they
heavily rely on user-chosen references to guide the generation of adversarial
noises, and cannot simultaneously construct natural and highly transferable
adversarial face images in black-box scenarios. In light of this, we present a
novel face privacy protection scheme with improved transferability while
maintain high visual quality. We propose shaping the entire face space directly
instead of exploiting one kind of facial characteristic like makeup information
to integrate adversarial noises. To achieve this goal, we first exploit global
adversarial latent search to traverse the latent space of the generative model,
thereby creating natural adversarial face images with high transferability. We
then introduce a key landmark regularization module to preserve the visual
identity information. Finally, we investigate the impacts of various kinds of
latent spaces and find that latent space benefits the trade-off
between visual naturalness and adversarial transferability. Extensive
experiments over two datasets demonstrate that our approach significantly
enhances attack transferability while maintaining high visual quality,
outperforming state-of-the-art methods by an average 25% improvement in deep FR
models and 10% improvement on commercial FR APIs, including Face++, Aliyun, and
Tencent.Comment: Accepted by ACM MM 202
Deep Residual Text Detection Network for Scene Text
Scene text detection is a challenging problem in computer vision. In this
paper, we propose a novel text detection network based on prevalent object
detection frameworks. In order to obtain stronger semantic feature, we adopt
ResNet as feature extraction layers and exploit multi-level feature by
combining hierarchical convolutional networks. A vertical proposal mechanism is
utilized to avoid proposal classification, while regression layer remains
working to improve localization accuracy. Our approach evaluated on ICDAR2013
dataset achieves F-measure of 0.91, which outperforms previous state-of-the-art
results in scene text detection.Comment: IAPR International Conference on Document Analysis and Recognition
(ICDAR) 201
- …
