Linsong Chu, R. Raghavendra, M. Srivatsa, A. Preece, Daniel Harborne
{"title":"Feature Importance Identification through Bottleneck Reconstruction","authors":"Linsong Chu, R. Raghavendra, M. Srivatsa, A. Preece, Daniel Harborne","doi":"10.1109/ICCC.2019.00022","DOIUrl":"https://doi.org/10.1109/ICCC.2019.00022","url":null,"abstract":"We address the problem of feature importance. Often, when working with classification or regression problems, the results of black-box deep learning techniques are held to scrutiny in an effort to interpret which and to what extent various features affect outcome. We address this issue specifically when the model has a bottleneck which we will be used to infer feature importance. In this paper, we apply this technique to weather data and study which weather features affect traffic most. To this end, we introduce convolutional spatial embedding to convert data with spatial information into spatial images that are suitable for convolutional neural networks. An advantage of our approach is in dealing with input that has highly correlated features, where removing even an important feature will not increase loss.","PeriodicalId":262923,"journal":{"name":"2019 IEEE International Conference on Cognitive Computing (ICCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127131378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Visual Representation of Abstract Verbs: Merging Verb Classification with Iconicity in Sign Language","authors":"Simone Scicluna, C. Strapparava","doi":"10.1109/ICCC.2019.00025","DOIUrl":"https://doi.org/10.1109/ICCC.2019.00025","url":null,"abstract":"Theories like the picture superiority effect state that the visual modality has substantial advantage over the other human senses. This makes visual information vital in the acquisition of knowledge, such as in the learning of a language. Words can be graphically represented to illustrate the meaning of a message and facilitate its understanding. This method, however, becomes a limitation in the case of abstract words, like accept, belong, integrate and agree, which have no visual referent. The current research turns to sign languages to explore the common semantic elements that link words to each other. Such visual languages have been found to reveal enlightening patterns across signs of similar meanings, pointing towards the possibility of creating clusters of iconic meanings along with their respective graphic representation. By using sign language insight and VerbNet's organisation of verb predicates, this study presents a novel organisation of 506 English abstract verbs classified by visual shape. Graphic animation was used to visually represent the 20 classes of abstract verbs developed. To build confidence on the resulting product, which can be accessed on www.vroav.online, an online survey was created to achieve judgements on the visuals' representativeness. Considerable agreement between participants was found, suggesting a positive way forward for this work, which may be developed as a language learning aid in educational contexts or as a multimodal language comprehension tool for digital text.","PeriodicalId":262923,"journal":{"name":"2019 IEEE International Conference on Cognitive Computing (ICCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122024308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ganyu Wang, Miguel Vargas Martin, P. Hung, Shane MacDonald
{"title":"Towards Classifying Motor Imagery Using a Consumer-Grade Brain-Computer Interface","authors":"Ganyu Wang, Miguel Vargas Martin, P. Hung, Shane MacDonald","doi":"10.1109/ICCC.2019.00023","DOIUrl":"https://doi.org/10.1109/ICCC.2019.00023","url":null,"abstract":"This research attempts to classify electroencephalogram (EEG) signals of motor imagery of left and right hand movement with a consumer-grade brain-computer interface device, which consists of four channels. For this purpose, we designed an interface to collect a total of approximately 600 samples for left and right hand motor imagery from two subjects. Hilbert-Huang Transform was used for feature extraction, and we applied support-vector machine (SVM) and k-nearest neighbors (k-NN) algorithms for learning the features and classification. Results show that these methods have some ability to classify left and right hand motor imagery EEG signals. This paper outlines the used methodology which could be a reference for future studies of the same nature.","PeriodicalId":262923,"journal":{"name":"2019 IEEE International Conference on Cognitive Computing (ICCC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124650176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cristina Barros, Marta Vicente-Moreno, Elena Lloret
{"title":"Tackling the Challenge of Computational Identification of Characters in Fictional Narratives","authors":"Cristina Barros, Marta Vicente-Moreno, Elena Lloret","doi":"10.1109/ICCC.2019.00031","DOIUrl":"https://doi.org/10.1109/ICCC.2019.00031","url":null,"abstract":"This paper focuses on the computational identification of characters in fictional narratives, regardless of their nature, i.e., either humans, animals or other type of beings. We approach this problem as a supervised binary classification task, whether or not a noun in a narrative -specifically in a fairy taleis classified as a character. A wide range of Machine Learning algorithms and configurations were tested in order to come up with the most appropriate model (or set of models) to successfully fulfil this task. Despite the challenges associated with the character identification in the domain of children stories, the best models obtain an F-Measure above 0.80, proving a good performance and broadly outperforming the baselines.","PeriodicalId":262923,"journal":{"name":"2019 IEEE International Conference on Cognitive Computing (ICCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115220107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying and Clustering Users for Unsupervised Intrusion Detection in Corporate Audit Sessions","authors":"Mathieu Garchery, M. Granitzer","doi":"10.1109/ICCC.2019.00016","DOIUrl":"https://doi.org/10.1109/ICCC.2019.00016","url":null,"abstract":"We address intrusion detection in audit sessions, focusing on masquerades and insider threats. Unsupervised intrusion detection can straightforwardly be addressed through supervised user identification. This allows us to simply model the normal behavior of users implicitly within any supervised classifier. However certain users can have very similar behavior as shown by their audit sessions, thus learning to distinguish them is meaningless and leads to false positives. To address this issue we propose a second method, which identifies user clusters instead of individual users. By discarding harmless alarms for users with similar sessions, a better trade-off between false positives and detection rate can be achieved. We evaluate both methods on real-world and synthetic corporate audit sessions: our methods outperform anomaly detection baselines for masquerade detection. Our results suggest that user identification is effective for masquerades, while insider threats should be detected differently.","PeriodicalId":262923,"journal":{"name":"2019 IEEE International Conference on Cognitive Computing (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129759225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Malware Cognitive Systems against Adversarial Attacks","authors":"Yuede Ji, Benjamin Bowman, H. H. Huang","doi":"10.1109/ICCC.2019.00014","DOIUrl":"https://doi.org/10.1109/ICCC.2019.00014","url":null,"abstract":"The cognitive systems along with the machine learning techniques have provided significant improvements for many applications. However, recent adversarial attacks, such as data poisoning, evasion attacks, and exploratory attacks, have shown to be able to either cause the machine learning methods to misbehave, or leak sensitive model parameters. In this work, we have devised a prototype of a malware cognitive system, called DeepArmour, which performs robust malware classification against adversarial attacks. At the heart of our method is a voting system with three different machine learning malware classifiers: random forest, multi-layer perceptron, and structure2vec. In addition, DeepArmour applies several adversarial countermeasures, such as feature reconstruction and adversarial retraining to strengthen the robustness. We tested DeepArmour on a malware execution trace dataset, which has 12, 536 malware in five categories. We are able to achieve 0.989 accuracy with 10-fold cross validation. Further, to demonstrate the ability of combating adversarial attacks, we have performed a white-box evasion attack on the dataset and showed how our system is resilient to such attacks. Particularly, DeepArmour is able to achieve 0.675 accuracy for the generated adversarial attacks which are unknown to the model. After retraining with only 10% adversarial samples, DeepArmour is able to achieve 0.839 accuracy","PeriodicalId":262923,"journal":{"name":"2019 IEEE International Conference on Cognitive Computing (ICCC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126293650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rhodri L. Morris, Liam D. Turner, R. Whitaker, Cheryl Giammanco
{"title":"The Impact of Peer Pressure: Extending Axelrod's Model on Cultural Polarisation","authors":"Rhodri L. Morris, Liam D. Turner, R. Whitaker, Cheryl Giammanco","doi":"10.1109/ICCC.2019.00030","DOIUrl":"https://doi.org/10.1109/ICCC.2019.00030","url":null,"abstract":"Culture represents the broad range of things over which people influence each other, and frequently contributes to the behaviour, interaction and outlook of groups. Although it has been studied in the context of humans, it is also relevant to future intelligent cognitive systems, that could have the capability to update their disposition and strategy based on the influence of others. In this work we transfer concepts from social sciences to the computing sciences and examine the effect of peer influence on culture. We consider the notion of \"peer pressure\", being the combined effect from all an individual's neighbours exerting influence at the same time, and also through influence flowing from indirect sources. This approach is derived using Social Impact Theory. We benchmark this against the cultural polarisation model from Axelrod, which involves influence being restricted to dyadic interactions between agents. We find that peer pressure provides complex contagion with a significant impact on cultural evolution. Greater cultural diversity is maintained, with indirect paths mitigating this by effectively forming disruptive weak links. This reaffirms that maintaining diversity in social ties, as well as a wide breadth, supports the mitigation of cultural isolation and polarisation. The model provides a platform to explore culture in a wide range of further scenarios, including electronic, coalition and organisational contexts.","PeriodicalId":262923,"journal":{"name":"2019 IEEE International Conference on Cognitive Computing (ICCC)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132800582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scaling Deep Spiking Neural Networks with Binary Stochastic Activations","authors":"Deboleena Roy, I. Chakraborty, K. Roy","doi":"10.1109/ICCC.2019.00020","DOIUrl":"https://doi.org/10.1109/ICCC.2019.00020","url":null,"abstract":"The modern era has witnessed a proliferation of portable devices that use Artificial Intelligence (AI) to enhance user experiences. Majority of these AI tasks are performed by large neural networks, which require a good amount of memory and compute power. This has resulted in a growing interest in Spiking Neural Networks (SNNs) which communicate through binary activations or 'spikes', as they offer a bio-plausible and energy efficient alternative to traditional deep neural networks (DNNs). In this work, we present deep spiking neural networks with binary stochastic activations, that are tailored for implementation on emerging hardware platforms. We evaluate two deep neural network models, VGG-9 and VGG-16 on CIFAR-10 and CIFAR-100 datasets, respectively, with binary stochastic activations. We achieve state of the accuracy and achieve 1.4x improvement in energy consumption because of spike-based communication versus a network with ReLU neurons. We further investigate extremely quantized version of these networks having binary weights and show an energy benefit of 28x over full-precision neural networks. Thus we present scalable deep spiking neural networks that achieve performance comparable to DNNs while achieving substantial energy benefit.","PeriodicalId":262923,"journal":{"name":"2019 IEEE International Conference on Cognitive Computing (ICCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122062671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mireille Fares, Angela Moufarrej, Eliane Jreij, Joe Tekli, W. Grosky
{"title":"Difficulties and Improvements to Graph-Based Lexical Sentiment Analysis Using LISA","authors":"Mireille Fares, Angela Moufarrej, Eliane Jreij, Joe Tekli, W. Grosky","doi":"10.1109/ICCC.2019.00008","DOIUrl":"https://doi.org/10.1109/ICCC.2019.00008","url":null,"abstract":"Lexical sentiment analysis (LSA) underlines a family of methods combining natural language processing, machine learning, or graph navigation techniques to identify the underlying sentiments or emotions carried in textual data. In this paper, we introduce LISA, an unsupervised word-level knowledge graph-based LexIcal Sentiment Analysis framework. It uses different variants of shortest path graph navigation techniques to compute and propagate affective scores in a lexical-affective graph (LAG), created by connecting a typical lexical knowledgebase (KB) like WordNet, with a reliable affect KB like WordNet-Affect Hierarchy. LISA was designed in two consecutive iterations, producing two main modules: i) LISA 1.0 for affect navigation, and ii) LISA 2.0 for affect propagation and lookup. LISA 1.0 suffered from the semantic connectivity problem shared by some existing lexicon-based methods, and required polynomial execution time. This led to the development of LISA 2.0, which i) processes affective relationships separately from lexical/semantic connections (solving the semantic connectivity problem of LISA 1.0), and ii) produces a sentiment lexicon which can be searched in logarithmic time (handling LISA 1.0's efficiency problem). Experimental results on the ANEW dataset show that LISA 2.0, while completely unsupervised, is on a par with existing supervised solutions, highlighting its quality and potential.","PeriodicalId":262923,"journal":{"name":"2019 IEEE International Conference on Cognitive Computing (ICCC)","volume":"437 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116554096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extraction of Taxonomic Relation of Complex Terms by Recurrent Neural Network","authors":"Atsushi Oba, Incheon Paik","doi":"10.1109/ICCC.2019.00024","DOIUrl":"https://doi.org/10.1109/ICCC.2019.00024","url":null,"abstract":"In recent years, while the Internet has brought various technological evolutions, a lot of ontology is required to organize and systemize knowledge, and its generation is necessary. Especially, classification of hypernym-hyponym relation which describes taxonomy of ontology has received a lot of attention. As a method to automate the generation, word embedding based method was proposed recently. Although the method enabled high accuracy classification by using semantics, it does not correspond to complex term consisting of multiple words. Based on this background, in this paper, we proposed a new model combined word embedding and Recurrent Neural Network(RNN), evaluated the classification performance with data extracted from WordNet. For the result, it is indicated that the RNN approach is more effective and general for ontology generation.","PeriodicalId":262923,"journal":{"name":"2019 IEEE International Conference on Cognitive Computing (ICCC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131543567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}