Towards digital cognitive clones for the decision-makers : adversarial training experiments
Golovianko, M., Gryshko, S., Terziyan, V., & Tuunanen, T. (2021). Towards digital cognitive clones for the decision-makers : adversarial training experiments. In F. Longo, M. Affenzeller, & A. Padovano (Eds.), ISM 2020 : Proceedings of the 2nd International Conference on Industry 4.0 and Smart Manufacturing (180, pp. 180-189). Elsevier. Procedia Computer Science. https://doi.org/10.1016/j.procs.2021.01.155
Julkaistu sarjassa
Procedia Computer SciencePäivämäärä
2021Tekijänoikeudet
© 2021 the Authors
There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveillance over the conveyors. The digital component of the environment contains special modifications of Generative Adversarial Networks, which include a human-operator as a trainer, an autonomous Pi-Mind clone as a trainee (a discriminator) and a smart digital adversary as a challenger (generator of sophisticated decision situations, emergencies and attacks, which supposedly catalyzes the cloning process).
See presentation slides: https://ai.it.jyu.fi/ISM-2020-Pi-Mind.pptx
...
Julkaisija
ElsevierKonferenssi
International Conference on Industry 4.0 and Smart ManufacturingKuuluu julkaisuun
ISM 2020 : Proceedings of the 2nd International Conference on Industry 4.0 and Smart ManufacturingISSN Hae Julkaisufoorumista
1877-0509Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/51611386
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems
Terziyan, Vagan; Gryshko, Svitlana; Golovianko, Mariia (Elsevier, 2021)Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for ... -
Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Peregrine Technical Solutions, 2020)Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine ... -
On Attacking Future 5G Networks with Adversarial Examples : Survey
Zolotukhin, Mikhail; Zhang, Di; Hämäläinen, Timo; Miraghaei, Parsa (MDPI AG, 2023)The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to ... -
IoT -based adversarial attack's effect on cloud data platform services in a smart building context
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Academic Conferences International, 2020)IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's ... -
Koneoppimisen hyödyntäminen esineiden internetin kyberturvallisuudessa
Kattelus, Eetu (2023)Esineiden internet koostuu toisiinsa verkon välityksellä kommunikoivista laitteista. Kyberturvallisuus näissä laitteissa on usein riittämätön, mikä olisi tärkeää saada ajan tasalle laitteiden alati kasvavan määrän vuoksi. ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.