applications of deep learning beyond text images
play

Applications of Deep Learning (Beyond Text & Images) Brian Mac - PowerPoint PPT Presentation

Applications of Deep Learning (Beyond Text & Images) Brian Mac Namee APPLICATIONS OF MACHINE LEARNING https://trends.google.com/trends/ https://xkcd.com/1425/ https://xkcd.com/1831/ artificial intelligence artificial intelligence


  1. Applications of Deep Learning (Beyond Text & Images) Brian Mac Namee

  2. APPLICATIONS OF MACHINE LEARNING

  3. https://trends.google.com/trends/

  4. https://xkcd.com/1425/

  5. https://xkcd.com/1831/

  6. artificial intelligence

  7. artificial intelligence machine learning

  8. artificial intelligence deep learning machine learning

  9. artificial intelligence deep learning machine data learning science

  10. artificial intelligence deep learning machine data learning science

  11. artificial intelligence supervised learning deep learning machine data unsupervised learning learning science reinforcement learning

  12. artificial intelligence deep learning machine data learning science

  13. artificial intelligence decision tree learning deep Bayesian learning learning machine data instance-based learning learning science analytical learning reinforcement learning

  14. artificial intelligence deep learning machine data learning science

  15. artificial intelligence probability-based deep learning error-based machine data learning science information-based similarity-based

  16. artificial intelligence deep learning machine data learning science

  17. artificial intelligence recognising deep forecasting learning machine data generating learning science organising controlling

  18. artificial intelligence recognising deep forecasting learning machine data generating learning science organising controlling

  19. artificial intelligence recognising deep forecasting learning machine data generating learning science organising controlling

  20. artificial intelligence recognising deep forecasting learning machine data generating learning science organising controlling

  21. artificial intelligence recognising deep forecasting learning machine data generating learning science organising controlling

  22. artificial intelligence recognising deep forecasting learning machine data generating learning science organising controlling

  23. artificial intelligence recognising deep forecasting learning machine data generating learning science organising controlling

  24. artificial intelligence recognising deep forecasting learning machine data generating learning science organising controlling

  25. Domains Ripe for Application of Machine Learning Involve repetitive tasks with defined outcomes Massive collections of historical examples of the task with solutions already exist Involve simple decisions rather than complex recommendations The domain does not change too rapidly The opportunity to augment human performance rather than replace it exists

  26. Limitations of Machine Learning Still best for one-level questions Struggles to deal with subtle context Encode biases that exist in datasets Making machine learning models that continuously learn is still difficult Explanation of models (in domains where trust is required) remains challenging

  27. (BEYOND TEXT & IMAGES)

  28. There’s All Kinds Of Data Out There!

  29. What Data You Analyzed – KDnuggets Poll Results and Trends https://www.kdnuggets.com/2017/04/poll-results-data-analyzed.html

  30. Activity Tracking artificial intelligence recognising deep forecasting learning generating data machine science organising learning controlling

  31. WISDM v1.1 Activity Recognition Data Accelerometer data recorded in controlled conditions for activity recognition – 1,098,207 instances – 3 attributes – 6 activity classes Assume signals contain both spatial and temporal structure

  32. WISDM v1.1 Activity Recognition Data International Workshop on Knowledge Discovery from Sensor Data (at KDD-10) Jennifer R. Kwapisz, Gary M. Weiss and Samuel A. Moore (2010). Activity Recognition using Cell Phone Accelerometers, Proceedings of the Fourth 20 20 Y Axis Y Axis 15 15 10 10 Acceleration Acceleration http://www.cis.fordham.edu/wisdm/dataset.php 5 5 0 0 X Axis -5 -5 Z Axis Z Axis X Axis -10 -10 0 0.5 1 1.5 2 2.5 0 0.5 1 1.5 2 2.5 Time (s) Time (s) (a) Walking (b) Jogging

  33. WISDM v1.1 Activity Recognition Data International Workshop on Knowledge Discovery from Sensor Data (at KDD-10) Jennifer R. Kwapisz, Gary M. Weiss and Samuel A. Moore (2010). Activity Recognition using Cell Phone Accelerometers, Proceedings of the Fourth 20 20 Y Axis Y Axis 15 15 Z Axis 10 Acceleration 10 Acceleration 5 http://www.cis.fordham.edu/wisdm/dataset.php Z Axis 5 0 0 -5 -5 X Axis X Axis -10 -10 0 0.5 1 1.5 2 2.5 0 0.5 1 1.5 2 2.5 Time (s) Time (s) (c) Ascending Stairs (d) Descending Stairs

  34. WISDM v1.1 Activity Recognition Data International Workshop on Knowledge Discovery from Sensor Data (at KDD-10) Jennifer R. Kwapisz, Gary M. Weiss and Samuel A. Moore (2010). Activity Recognition using Cell Phone Accelerometers, Proceedings of the Fourth 10 10 Y Axis X Axis Z Axis Acceleration Acceleration 5 5 http://www.cis.fordham.edu/wisdm/dataset.php Z Axis 0 0 Y Axis X Axis -5 -5 0 0.5 1 1.5 2 2.5 0 0.5 1 1.5 2 2.5 Time (s) Time (s) (e) Sitting (f) Standing Figure 2: Acceleration Plots for the Six Activities (a-f)

  35. WISDM v1.1 Activity Recognition Data International Workshop on Knowledge Discovery from Sensor Data (at KDD-10) Jennifer R. Kwapisz, Gary M. Weiss and Samuel A. Moore (2010). Activity Recognition using Cell Phone Accelerometers, Proceedings of the Fourth 10 10 Y Axis X Axis Objective: apply deep learning Z Axis Acceleration Acceleration 5 5 http://www.cis.fordham.edu/wisdm/dataset.php Z Axis approaches without any specialist 0 0 Y Axis domain knowledge or manual X Axis feature engineering -5 -5 0 0.5 1 1.5 2 2.5 0 0.5 1 1.5 2 2.5 Time (s) Time (s) (e) Sitting (f) Standing Figure 2: Acceleration Plots for the Six Activities (a-f)

  36. CNN Based Architecture Input x y z channels 1 x 64 1 x 64 1 x 64 1D conv [ReLu] [ReLu] [ReLu] (Stride =1) 1D conv 64 x 64 64 x 64 64 x 64 (Stride=2) [ReLu] [ReLu] [ReLu] 1D conv 64 x 64 64 x 64 64 x 64 Stride=2 [ReLu] [ReLu] [ReLu] Concatenation 3 x 64 128 hidden nodes [ReLu] Fully connected 128 hidden nodes [ReLu] layers 6 output nodes [softmax] Classification

  37. CNN on 1-D Time Series Channel Output layer Feature maps Fully connected layer Pooling Layer 1D convolutional layer

  38. CNN-LSTM based architecture Input x y z channels 1 x 64 1 x 64 1 x 64 1D conv [ReLu] [ReLu] [ReLu] (Stride =1) 1D conv 64 x 64 64 x 64 64 x 64 (Stride=2) [ReLu] [ReLu] [ReLu] 1D conv 64 x 64 64 x 64 64 x 64 Stride=2 [ReLu] [ReLu] [ReLu] Concatenation 3 x 64 LSTM [128 hidden] Recurrent LSTM [128 hidden] layers LSTM [6 hidden] Softmax Classification

  39. CNN to LSTM y Classification LSTM LSTM LSTM LSTM LSTM LSTM LSTM LSTM LSTM Inputs to LSTM x 0 x 1 x n Feature vector at each Output of CNN timestamp t 0 t 1 t n

  40. Results

  41. User Centric Problem Impersonal Data – Model trained on data from only users outside the test set. – Don’t require user-specific data but are less accurate Personal Data – Model trained on data only from the test user. – Require user-specific data but tend to be accurate Hybrid Data – Model trained on data from both the test users and users outside the test set.

  42. Malware Detection artificial intelligence recognising deep forecasting learning generating data machine science organising learning controlling

  43. Kaggle Microsoft Malware Classification Challenge https://www.kaggle.com/c/malware-classification Kaggle Microsoft Malware Classification Challenge Malware is malicious code which is often encountered as compiled executable byte code Kaggle Microsoft malware Malware Class Instances classification challenge Ramnit 1541 Lollipop 2478 – Over 400 GB uncompressed data Kelihos_v3 2942 Vundo 475 – 9 labelled malware classes Simda 42 – 10,868 malware files as raw Tracur 751 byte code (plus disassembled Kelihos_v1 398 machine code) in training set Obfuscator.ACY 1228 Gatak 1013

  44. Kaggle Microsoft Malware Classification Challenge https://www.kaggle.com/c/malware-classification Kaggle Microsoft Malware Classification Challenge .text:00401000 56 push esi 00401000 56 8D 44 24 08 50 8B F1 .text:00401001 8D 44 24 08 lea eax, [esp+8] E8 1C 1B 00 00 C7 06 08 Objective: apply deep learning .text:00401005 50 push eax 00401010 BB 42 00 8B C6 5E C2 04 00 CC CC CC CC CC CC CC .text:00401006 8B F1 mov esi, ecx approaches without any specialist 00401020 C7 01 08 BB 42 00 E9 26 .text:0040100D C7 06 08 mov dword ptr [esi] 1C 00 00 CC CC CC CC CC domain knowledge or manual offset off_42BB08 00401030 56 8B F1 C7 06 08 BB 42 .text:00401013 8B C6 mov eax, esi feature engineering 00 E8 13 1C 00 00 F6 44 .text:00401015 5E pop esi 00401040 24 08 01 74 09 56 E8 6C .text:00401016 C2 04 00 retn 4 1E 00 00 83 C4 04 8B C6 .text:00401019 CC CC CC align 10h 00401050 5E C2 04 00 CC CC CC CC .text:00401020 C7 01 08 mov dword ptr [ecx], CC CC CC CC CC CC CC CC offset off_42BB08 00401060 8B 44 24 08 8A 08 8B 54 .text:00401026 E9 26 1C jmp sub_402C51 24 04 88 0A C3 CC CC CC

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend