Likelihood-based Sensor Calibration using Affine Transformation
Authors:
RĂ¼diger Machhamer,
Lejla Begic Fazlic,
Eray Guven,
David Junk,
Gunes Karabulut Kurt,
Stefan Naumann,
Stephan Didas,
Klaus-Uwe Gollmer,
Ralph Bergmann,
Ingo J. Timm,
Guido Dartmann
Abstract:
An important task in the field of sensor technology is the efficient implementation of adaptation procedures of measurements from one sensor to another sensor of identical design. One idea is to use the estimation of an affine transformation between different systems, which can be improved by the knowledge of experts. This paper presents an improved solution from Glacier Research that was publishe…
▽ More
An important task in the field of sensor technology is the efficient implementation of adaptation procedures of measurements from one sensor to another sensor of identical design. One idea is to use the estimation of an affine transformation between different systems, which can be improved by the knowledge of experts. This paper presents an improved solution from Glacier Research that was published back in 1973. The results demonstrate the adaptability of this solution for various applications, including software calibration of sensors, implementation of expert-based adaptation, and paving the way for future advancements such as distributed learning methods. One idea here is to use the knowledge of experts for estimating an affine transformation between different systems. We evaluate our research with simulations and also with real measured data of a multi-sensor board with 8 identical sensors. Both data set and evaluation script are provided for download. The results show an improvement for both the simulation and the experiments with real data.
△ Less
Submitted 10 January, 2024; v1 submitted 20 September, 2023;
originally announced September 2023.
Exploring Adversarial Attacks on Neural Networks: An Explainable Approach
Authors:
Justus Renkhoff,
Wenkai Tan,
Alvaro Velasquez,
illiam Yichen Wang,
Yongxin Liu,
Jian Wang,
Shuteng Niu,
Lejla Begic Fazlic,
Guido Dartmann,
Houbing Song
Abstract:
Deep Learning (DL) is being applied in various domains, especially in safety-critical applications such as autonomous driving. Consequently, it is of great significance to ensure the robustness of these methods and thus counteract uncertain behaviors caused by adversarial attacks. In this paper, we use gradient heatmaps to analyze the response characteristics of the VGG-16 model when the input ima…
▽ More
Deep Learning (DL) is being applied in various domains, especially in safety-critical applications such as autonomous driving. Consequently, it is of great significance to ensure the robustness of these methods and thus counteract uncertain behaviors caused by adversarial attacks. In this paper, we use gradient heatmaps to analyze the response characteristics of the VGG-16 model when the input images are mixed with adversarial noise and statistically similar Gaussian random noise. In particular, we compare the network response layer by layer to determine where errors occurred. Several interesting findings are derived. First, compared to Gaussian random noise, intentionally generated adversarial noise causes severe behavior deviation by distracting the area of concentration in the networks. Second, in many cases, adversarial examples only need to compromise a few intermediate blocks to mislead the final decision. Third, our experiments revealed that specific blocks are more vulnerable and easier to exploit by adversarial examples. Finally, we demonstrate that the layers $Block4\_conv1$ and $Block5\_cov1$ of the VGG-16 model are more susceptible to adversarial attacks. Our work could provide valuable insights into develo** more reliable Deep Neural Network (DNN) models.
△ Less
Submitted 8 March, 2023;
originally announced March 2023.