-
Educating for AI Cybersecurity Work and Research: Ethics, Systems Thinking, and Communication Requirements
Authors:
Sorin Adam Matei,
Elisa Bertino
Abstract:
The present study explored managerial and instructor perceptions of their freshly employed cybersecurity workers' or students' preparedness to work effectively in a changing cybersecurity environment that includes AI tools. Specifically, we related perceptions of technical preparedness to ethical, systems thinking, and communication skills. We found that managers and professors perceive preparedne…
▽ More
The present study explored managerial and instructor perceptions of their freshly employed cybersecurity workers' or students' preparedness to work effectively in a changing cybersecurity environment that includes AI tools. Specifically, we related perceptions of technical preparedness to ethical, systems thinking, and communication skills. We found that managers and professors perceive preparedness to use AI tools in cybersecurity to be significantly associated with all three non-technical skill sets. Most important, ethics is a clear leader in the network of relationships. Contrary to expectations that ethical concerns are left behind in the rush to adopt the most advanced AI tools in security, both higher education instructors and managers appreciate their role and see them closely associated with technical prowess. Another significant finding is that professors over-estimate students' preparedness for ethical, system thinking, and communication abilities compared to IT managers' perceptions of their newly employed IT workers.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Artificial Intelligence Ethics Education in Cybersecurity: Challenges and Opportunities: a focus group report
Authors:
Diane Jackson,
Sorin Adam Matei,
Elisa Bertino
Abstract:
The emergence of AI tools in cybersecurity creates many opportunities and uncertainties. A focus group with advanced graduate students in cybersecurity revealed the potential depth and breadth of the challenges and opportunities. The salient issues are access to open source or free tools, documentation, curricular diversity, and clear articulation of ethical principles for AI cybersecurity educati…
▽ More
The emergence of AI tools in cybersecurity creates many opportunities and uncertainties. A focus group with advanced graduate students in cybersecurity revealed the potential depth and breadth of the challenges and opportunities. The salient issues are access to open source or free tools, documentation, curricular diversity, and clear articulation of ethical principles for AI cybersecurity education. Confronting the "black box" mentality in AI cybersecurity work is also of the greatest importance, doubled by deeper and prior education in foundational AI work. Systems thinking and effective communication were considered relevant areas of educational improvement. Future AI educators and practitioners need to address these issues by implementing rigorous technical training curricula, clear documentation, and frameworks for ethically monitoring AI combined with critical and system's thinking and communication skills.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
Crime scene classification from skeletal trajectory analysis in surveillance settings
Authors:
Alina-Daniela Matei,
Estefania Talavera,
Maya Aghaei
Abstract:
Video anomaly analysis is a core task actively pursued in the field of computer vision, with applications extending to real-world crime detection in surveillance footage. In this work, we address the task of human-related crime classification. In our proposed approach, the human body in video frames, represented as skeletal joints trajectories, is used as the main source of exploration. First, we…
▽ More
Video anomaly analysis is a core task actively pursued in the field of computer vision, with applications extending to real-world crime detection in surveillance footage. In this work, we address the task of human-related crime classification. In our proposed approach, the human body in video frames, represented as skeletal joints trajectories, is used as the main source of exploration. First, we introduce the significance of extending the ground truth labels for HR-Crime dataset and hence, propose a supervised and unsupervised methodology to generate trajectory-level ground truth labels. Next, given the availability of the trajectory-level ground truth, we introduce a trajectory-based crime classification framework. Ablation studies are conducted with various architectures and feature fusion strategies for the representation of the human trajectories. The conducted experiments demonstrate the feasibility of the task and pave the path for further research in the field.
△ Less
Submitted 4 July, 2022;
originally announced July 2022.
-
Continuous Flow Model of a Historical Battle: A Fresh Look at Pickett's charge
Authors:
Jonathan Poggie,
Sorin A. Matei,
Robert Kirchubel
Abstract:
A continuous flow model of infantry behavior, based on conservation of individuals and tracking of subunit identity, has been developed in sufficient detail that it can now be applied to a realistic simulation of a historical battle. Pickett's charge during the 1863 Battle of Gettysburg, Pennsylvania in the U.S. Civil War was chosen as an initial application of the model. This scenario is a good t…
▽ More
A continuous flow model of infantry behavior, based on conservation of individuals and tracking of subunit identity, has been developed in sufficient detail that it can now be applied to a realistic simulation of a historical battle. Pickett's charge during the 1863 Battle of Gettysburg, Pennsylvania in the U.S. Civil War was chosen as an initial application of the model. This scenario is a good test of the current mathematical model because many modern military tactics were employed, in a context where the action took place on foot or horseback, and the historical map and troop numbers are available. Compared to a discrete agent model, the flow model was found to better capture the interaction of the forces with the terrain and each other. A brigade-level simulation, faithful to the details of the historical events, was performed. The main source of asymmetry in the numbers of casualties was found to be the inability of the Confederate forces to use effective ranged fire while they were moving. Comparison of simulations with and without terrain effects showed that they slow the pace of battle and favor the defenders, exposing the attackers to heavy ranged fire for an extended period. A statistical analysis of possible outcomes for an ensemble of 1000 randomized perturbations of the baseline brigade-level scenario was carried out. Consistent with historical events, it was found that only 6 percent of the scenarios resulted in an outcome that could be considered a Confederate victory.
△ Less
Submitted 21 March, 2022;
originally announced March 2022.
-
HR-Crime: Human-Related Anomaly Detection in Surveillance Videos
Authors:
Kayleigh Boekhoudt,
Alina Matei,
Maya Aghaei,
EstefanÃa Talavera
Abstract:
The automatic detection of anomalies captured by surveillance settings is essential for speeding the otherwise laborious approach. To date, UCF-Crime is the largest available dataset for automatic visual analysis of anomalies and consists of real-world crime scenes of various categories. In this paper, we introduce HR-Crime, a subset of the UCF-Crime dataset suitable for human-related anomaly dete…
▽ More
The automatic detection of anomalies captured by surveillance settings is essential for speeding the otherwise laborious approach. To date, UCF-Crime is the largest available dataset for automatic visual analysis of anomalies and consists of real-world crime scenes of various categories. In this paper, we introduce HR-Crime, a subset of the UCF-Crime dataset suitable for human-related anomaly detection tasks. We rely on state-of-the-art techniques to build the feature extraction pipeline for human-related anomaly detection. Furthermore, we present the baseline anomaly detection analysis on the HR-Crime. HR-Crime as well as the developed feature extraction pipeline and the extracted features will be publicly available for further research in the field.
△ Less
Submitted 31 July, 2021;
originally announced August 2021.
-
Eating Habits Discovery in Egocentric Photo-streams
Authors:
Estefania Talavera,
Andreea Glavan,
Alina Matei,
Petia Radeva
Abstract:
Eating habits are learned throughout the early stages of our lives. However, it is not easy to be aware of how our food-related routine affects our healthy living. In this work, we address the unsupervised discovery of nutritional habits from egocentric photo-streams. We build a food-related behavioural pattern discovery model, which discloses nutritional routines from the activities performed thr…
▽ More
Eating habits are learned throughout the early stages of our lives. However, it is not easy to be aware of how our food-related routine affects our healthy living. In this work, we address the unsupervised discovery of nutritional habits from egocentric photo-streams. We build a food-related behavioural pattern discovery model, which discloses nutritional routines from the activities performed throughout the days. To do so, we rely on Dynamic-Time-War** for the evaluation of similarity among the collected days. Within this framework, we present a simple, but robust and fast novel classification pipeline that outperforms the state-of-the-art on food-related image classification with a weighted accuracy and F-score of 70% and 63%, respectively. Later, we identify days composed of nutritional activities that do not describe the habits of the person as anomalies in the daily life of the user with the Isolation Forest method. Furthermore, we show an application for the identification of food-related scenes when the camera wearer eats in isolation. Results have shown the good performance of the proposed model and its relevance to visualize the nutritional habits of individuals.
△ Less
Submitted 16 September, 2020;
originally announced September 2020.
-
Deep learning for scene recognition from visual data: a survey
Authors:
Alina Matei,
Andreea Glavan,
Estefania Talavera
Abstract:
The use of deep learning techniques has exploded during the last few years, resulting in a direct contribution to the field of artificial intelligence. This work aims to be a review of the state-of-the-art in scene recognition with deep learning models from visual data. Scene recognition is still an emerging field in computer vision, which has been addressed from a single image and dynamic image p…
▽ More
The use of deep learning techniques has exploded during the last few years, resulting in a direct contribution to the field of artificial intelligence. This work aims to be a review of the state-of-the-art in scene recognition with deep learning models from visual data. Scene recognition is still an emerging field in computer vision, which has been addressed from a single image and dynamic image perspective. We first give an overview of available datasets for image and video scene recognition. Later, we describe ensemble techniques introduced by research papers in the field. Finally, we give some remarks on our findings and discuss what we consider challenges in the field and future lines of research. This paper aims to be a future guide for model selection for the task of scene recognition.
△ Less
Submitted 3 July, 2020;
originally announced July 2020.
-
What is affordance theory and how can it be used in communication research?
Authors:
Sorin Adam Matei
Abstract:
Affordance theory proposes that the use of an object is intrinsically determined by its physical shape. However, when translated to digital objects, affordance theory loses explanatory power, as the same physical affordances, for example, screens, can have many socially constructed meanings and can be used in many ways. Furthermore, the affordance theory core idea that physical affordances have in…
▽ More
Affordance theory proposes that the use of an object is intrinsically determined by its physical shape. However, when translated to digital objects, affordance theory loses explanatory power, as the same physical affordances, for example, screens, can have many socially constructed meanings and can be used in many ways. Furthermore, the affordance theory core idea that physical affordances have intrinsic, pre-cognitive meaning cannot be sustained for the highly symbolic nature of digital affordances, which gain meaning through social learning and use. A possible way to solve this issue is to think about on-screen affordances as symbols and affordance research as a semiotic and linguistic enterprise.
△ Less
Submitted 4 March, 2020;
originally announced March 2020.
-
Identification of Model Uncertainty via Optimal Design of Experiments Applied to a Mechanical Press
Authors:
Tristan Gally,
Peter Groche,
Florian Hoppe,
Anja Kuttich,
Alexander Matei,
Marc E. Pfetsch,
Martin Rakowitsch,
Stefan Ulbrich
Abstract:
In engineering applications almost all processes are described with the help of models. Especially forming machines heavily rely on mathematical models for control and condition monitoring. Inaccuracies during the modeling, manufacturing and assembly of these machines induce model uncertainty which impairs the controller's performance. In this paper we propose an approach to identify model uncerta…
▽ More
In engineering applications almost all processes are described with the help of models. Especially forming machines heavily rely on mathematical models for control and condition monitoring. Inaccuracies during the modeling, manufacturing and assembly of these machines induce model uncertainty which impairs the controller's performance. In this paper we propose an approach to identify model uncertainty using parameter identification, optimal design of experiments and hypothesis testing. The experimental setup is characterized by optimal sensor positions such that specific model parameters can be determined with minimal variance. This allows for the computation of confidence regions in which the real parameters or the parameter estimates from different test sets have to lie. We claim that inconsistencies in the estimated parameter values, considering their approximated confidence ellipsoids as well, cannot be explained by data uncertainty but are indicators of model uncertainty. The proposed method is demonstrated using a component of the 3D Servo Press, a multi-technology forming machine that combines spindles with eccentric servo drives.
△ Less
Submitted 24 June, 2020; v1 submitted 18 October, 2019;
originally announced October 2019.
-
A New Approach to Reporting Archaeological Surveys: Connecting Rough Cilicia, Visible Past and Open Context through loose coupling and 3d codes
Authors:
Sorin Adam Matei,
Nicholas K. Rauh,
Eric C. Kansa
Abstract:
The project presents the strategy adopted by the Rough Cilicia Archaeological Survey team for publishing its primary data and reports via three potentially transformative strategies for digital humanities: Loose coupling of digital data curation and publishing platforms. In loosely coupled systems, components share only a limited set of simple assumptions, which enables systems to evolve dynamical…
▽ More
The project presents the strategy adopted by the Rough Cilicia Archaeological Survey team for publishing its primary data and reports via three potentially transformative strategies for digital humanities: Loose coupling of digital data curation and publishing platforms. In loosely coupled systems, components share only a limited set of simple assumptions, which enables systems to evolve dynamically. Collaborative creation of map based narrative content. Connecting print scholarship (book, reports, article) to online resources via two-dimensional barcodes (2D codes) that can be printed on paper and can call up hyperlinks when scanned with a Smartphone. The three strategies are made possible by loosely coupling two autonomous services: Visible Past, dedicated to web collaboration and digital-print publishing and Open Context, which is a geo-historical data archiving and publishing service. The Rough Cilicia Archaeological Survey, Visible Past, and Open Context work together to illustrate a new genre of scholarship, which combine qualitative narratives and quantitative representations of space and social phenomena. The project provides tools for collaborative creation of rich scholarly narratives that are spatially located and for connecting print publications to the digital realm. The project is a case study for utilizing the three new strategies for creating and publishing spatial humanities scholarship more broadly for ancient historians.
△ Less
Submitted 11 March, 2014; v1 submitted 9 February, 2014;
originally announced February 2014.