-
Multi-modal Cycle-consistent Generalized Zero-Shot Learning
Authors:
Rafael Felix,
B. G. Vijay Kumar,
Ian Reid,
Gustavo Carneiro
Abstract:
In generalized zero shot learning (GZSL), the set of classes are split into seen and unseen classes, where training relies on the semantic features of the seen and unseen classes and the visual representations of only the seen classes, while testing uses the visual representations of the seen and unseen classes. Current methods address GZSL by learning a transformation from the visual to the seman…
▽ More
In generalized zero shot learning (GZSL), the set of classes are split into seen and unseen classes, where training relies on the semantic features of the seen and unseen classes and the visual representations of only the seen classes, while testing uses the visual representations of the seen and unseen classes. Current methods address GZSL by learning a transformation from the visual to the semantic space, exploring the assumption that the distribution of classes in the semantic and visual spaces is relatively similar. Such methods tend to transform unseen testing visual representations into one of the seen classes' semantic features instead of the semantic features of the correct unseen class, resulting in low accuracy GZSL classification. Recently, generative adversarial networks (GAN) have been explored to synthesize visual representations of the unseen classes from their semantic features - the synthesized representations of the seen and unseen classes are then used to train the GZSL classifier. This approach has been shown to boost GZSL classification accuracy, however, there is no guarantee that synthetic visual representations can generate back their semantic feature in a multi-modal cycle-consistent manner. This constraint can result in synthetic visual representations that do not represent well their semantic features. In this paper, we propose the use of such constraint based on a new regularization for the GAN training that forces the generated visual features to reconstruct their original semantic features. Once our model is trained with this multi-modal cycle-consistent semantic compatibility, we can then synthesize more representative visual representations for the seen and, more importantly, for the unseen classes. Our proposed approach shows the best GZSL classification results in the field in several publicly available datasets.
△ Less
Submitted 1 August, 2018; v1 submitted 31 July, 2018;
originally announced August 2018.
-
Mist Computing: Principles, Trends and Future Direction
Authors:
Manas Kumar Yogi,
K. Chandrasekhar,
G. Vijay Kumar
Abstract:
In this paper we present the novel idea of computing near the edge of IOT architecture which enhances the inherent efficiency while computing complex applications. This concept is termed as mist computing. We believe this computing will bring about an massive revolution in future computing technologies. instead of thrusting the control responsibility to gateways while data transmission the control…
▽ More
In this paper we present the novel idea of computing near the edge of IOT architecture which enhances the inherent efficiency while computing complex applications. This concept is termed as mist computing. We believe this computing will bring about an massive revolution in future computing technologies. instead of thrusting the control responsibility to gateways while data transmission the control is decentralised to end nodes which decrease the communicational delay of the network thereby increasing the throughput.
△ Less
Submitted 6 August, 2017;
originally announced September 2017.
-
Proactive Web Server Protocol for Complaint Assessment
Authors:
G. Vijay Kumar,
Ravikumar S. Raykundaliya,
Dr. P. Naga Prasad
Abstract:
Vulnerability Discovery with attack Injection security threats are increasing for the server software, when software is developed, the software tested for the functionality. Due to unawareness of software vulnerabilities most of the software before pre-Release the software should be thoroughly tested for not only functionality reliability, but should be tested for the security flows (or) vulnerabi…
▽ More
Vulnerability Discovery with attack Injection security threats are increasing for the server software, when software is developed, the software tested for the functionality. Due to unawareness of software vulnerabilities most of the software before pre-Release the software should be thoroughly tested for not only functionality reliability, but should be tested for the security flows (or) vulnerabilities. The approaches such as fuzzers, Fault injection, vulnerabilities scanners, static vulnerabilities analyzers, Run time prevention mechanisms and software Rejuvenation are identifying the un-patched software which is open for security threats address to solve the problem "security testing". These techniques are useful for generating attacks but cannot be extendable for the new land of attacks. The system called proactive vulnerability attack injection tool is suitable for adding new attacks injection vectors, methods to define new protocol states (or) Specification using the interface of tool includes Network server protocol specification using GUI, Attacks generator, Attack injector, monitoring module at the victim injector, monitoring module at the victim machine and the attacks injection report generation. This tool can address most of the vulnerabilities (or) security flows.
△ Less
Submitted 9 February, 2014;
originally announced February 2014.