-
Network Bending of Diffusion Models for Audio-Visual Generation
Authors:
Luke Dzwonczyk,
Carmine Emanuele Cella,
David Ban
Abstract:
In this paper we present the first steps towards the creation of a tool which enables artists to create music visualizations using pre-trained, generative, machine learning models. First, we investigate the application of network bending, the process of applying transforms within the layers of a generative network, to image generation diffusion models by utilizing a range of point-wise, tensor-wis…
▽ More
In this paper we present the first steps towards the creation of a tool which enables artists to create music visualizations using pre-trained, generative, machine learning models. First, we investigate the application of network bending, the process of applying transforms within the layers of a generative network, to image generation diffusion models by utilizing a range of point-wise, tensor-wise, and morphological operators. We identify a number of visual effects that result from various operators, including some that are not easily recreated with standard image editing tools. We find that this process allows for continuous, fine-grain control of image generation which can be helpful for creative applications. Next, we generate music-reactive videos using Stable Diffusion by passing audio features as parameters to network bending operators. Finally, we comment on certain transforms which radically shift the image and the possibilities of learning more about the latent space of Stable Diffusion based on these transforms.
△ Less
Submitted 27 June, 2024;
originally announced June 2024.
-
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
Authors:
Rudolf Ferenc,
Péter Hegedűs,
Péter Gyimesi,
Gábor Antal,
Dénes Bán,
Tibor Gyimóthy
Abstract:
The rapid rise of cyber-crime activities and the growing number of devices threatened by them place software security issues in the spotlight. As around 90% of all attacks exploit known types of security issues, finding vulnerable components and applying existing mitigation techniques is a viable practical approach for fighting against cyber-crime. In this paper, we investigate how the state-of-th…
▽ More
The rapid rise of cyber-crime activities and the growing number of devices threatened by them place software security issues in the spotlight. As around 90% of all attacks exploit known types of security issues, finding vulnerable components and applying existing mitigation techniques is a viable practical approach for fighting against cyber-crime. In this paper, we investigate how the state-of-the-art machine learning techniques, including a popular deep learning algorithm, perform in predicting functions with possible security vulnerabilities in JavaScript programs. We applied 8 machine learning algorithms to build prediction models using a new dataset constructed for this research from the vulnerability information in public databases of the Node Security Project and the Snyk platform, and code fixing patches from GitHub. We used static source code metrics as predictors and an extensive grid-search algorithm to find the best performing models. We also examined the effect of various re-sampling strategies to handle the imbalanced nature of the dataset. The best performing algorithm was KNN, which created a model for the prediction of vulnerable functions with an F-measure of 0.76 (0.91 precision and 0.66 recall). Moreover, deep learning, tree and forest based classifiers, and SVM were competitive with F-measures over 0.70. Although the F-measures did not vary significantly with the re-sampling strategies, the distribution of precision and recall did change. No re-sampling seemed to produce models preferring high precision, while re-sampling strategies balanced the IR measures.
△ Less
Submitted 12 May, 2024;
originally announced May 2024.
-
A Health Monitoring System Based on Flexible Triboelectric Sensors for Intelligence Medical Internet of Things and its Applications in Virtual Reality
Authors:
Junqi Mao,
Puen Zhou,
Xiaoyao Wang,
Hongbo Yao,
Liuyang Liang,
Yiqiao Zhao,
Jiawei Zhang,
Dayan Ban,
Haiwu Zheng
Abstract:
The Internet of Medical Things (IoMT) is a platform that combines Internet of Things (IoT) technology with medical applications, enabling the realization of precision medicine, intelligent healthcare, and telemedicine in the era of digitalization and intelligence. However, the IoMT faces various challenges, including sustainable power supply, human adaptability of sensors and the intelligence of s…
▽ More
The Internet of Medical Things (IoMT) is a platform that combines Internet of Things (IoT) technology with medical applications, enabling the realization of precision medicine, intelligent healthcare, and telemedicine in the era of digitalization and intelligence. However, the IoMT faces various challenges, including sustainable power supply, human adaptability of sensors and the intelligence of sensors. In this study, we designed a robust and intelligent IoMT system through the synergistic integration of flexible wearable triboelectric sensors and deep learning-assisted data analytics. We embedded four triboelectric sensors into a wristband to detect and analyze limb movements in patients suffering from Parkinson's Disease (PD). By further integrating deep learning-assisted data analytics, we actualized an intelligent healthcare monitoring system for the surveillance and interaction of PD patients, which includes location/trajectory tracking, heart monitoring and identity recognition. This innovative approach enabled us to accurately capture and scrutinize the subtle movements and fine motor of PD patients, thus providing insightful feedback and comprehensive assessment of the patients conditions. This monitoring system is cost-effective, easily fabricated, highly sensitive, and intelligent, consequently underscores the immense potential of human body sensing technology in a Health 4.0 society.
△ Less
Submitted 12 September, 2023;
originally announced September 2023.
-
Query Data With Fuzzy Information In Object-Oriented Databases An Approach Interval Values
Authors:
Doan Van Thang,
Doan Van Ban
Abstract:
In this paper, we propose methods of handling attributive values of object classes in object oriented database with fuzzy information and uncertainty based on quantitatively semantics based hedge algebraic. In this approach we consider to attributive values (as well as methods) object class is interval values and the interval values are converted into sub interval in [0, 1] respectively. That its…
▽ More
In this paper, we propose methods of handling attributive values of object classes in object oriented database with fuzzy information and uncertainty based on quantitatively semantics based hedge algebraic. In this approach we consider to attributive values (as well as methods) object class is interval values and the interval values are converted into sub interval in [0, 1] respectively. That its the fuzziness of the elements in the hedge algebra is also sub interval in [0,1]. So, we present an algorithm allows the comparison of two sub interval [0,1] hel** the requirements of the query data
△ Less
Submitted 16 October, 2016;
originally announced November 2016.