Browse > Article
http://dx.doi.org/10.3837/tiis.2022.08.018

CutPaste-Based Anomaly Detection Model using Multi Scale Feature Extraction in Time Series Streaming Data  

Jeon, Byeong-Uk (Department of Computer Science, Kyonggi University)
Chung, Kyungyong (Division of AI Computer Science and Engineering, Kyonggi University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.16, no.8, 2022 , pp. 2787-2800 More about this Journal
Abstract
The aging society increases emergency situations of the elderly living alone and a variety of social crimes. In order to prevent them, techniques to detect emergency situations through voice are actively researched. This study proposes CutPaste-based anomaly detection model using multi-scale feature extraction in time series streaming data. In the proposed method, an audio file is converted into a spectrogram. In this way, it is possible to use an algorithm for image data, such as CNN. After that, mutli-scale feature extraction is applied. Three images drawn from Adaptive Pooling layer that has different-sized kernels are merged. In consideration of various types of anomaly, including point anomaly, contextual anomaly, and collective anomaly, the limitations of a conventional anomaly model are improved. Finally, CutPaste-based anomaly detection is conducted. Since the model is trained through self-supervised learning, it is possible to detect a diversity of emergency situations as anomaly without labeling. Therefore, the proposed model overcomes the limitations of a conventional model that classifies only labelled emergency situations. Also, the proposed model is evaluated to have better performance than a conventional anomaly detection model.
Keywords
Anomaly Detection; Multi Scale Feature Extraction; Self-Supervised Learning;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 K. Simonyan and A. Zisserman, "Very Deep Convolutional Networks for Large-Scale Image Recognition," arXiv preprint arXiv:1409.1556, Sep. 2014.
2 B. McFee, J. Salamon, and J. P. Bello, "Adaptive Pooling Operators for Weakly Labeled Sound Event Detection," IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 26, no. 11, pp. 2180-2193, Aug. 2018.   DOI
3 Z. Chen, C. K. Yeo, B. S. Lee, and C. T. Lau, "Autoencoder-Based Network Anomaly Detection," in Proc. of 2018 Wireless Telecommunications Symposium (WTS), pp. 1-5, Apr. 2018.
4 L. Wyse, "Audio Spectrogram Representations for Processing with Convolutional Neural Networks," arXiv preprint arXiv:1706.09559, 2017.
5 A. Krizhevsky, I. Sutskever, and G. E. Hinton "ImageNet Classification with Deep Convolutional Neural Networks," Communications of the ACM, vol. 60, no. 6, pp. 84-90, Jun. 2017.   DOI
6 M. Ahmed, A. N. Mahmood, and J. Hu, "A Survey of Network Anomaly Detection Techniques," Journal of Network and Computer Applications, vol. 60, pp. 19-31, Jan. 2016.   DOI
7 K. He, X. Zhang, S. Ren, and J. Sun, "Deep Residual Learning for Image Recognition," in Proc. of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770-778, 2016.
8 H. J. Kwon, D. H Shin, and K. Chung, "PGGAN-Based Anomaly Classification on Chest X-Ray Using Weighted Multi-Scale Similarity," IEEE Access, vol. 9, no. 1, pp. 113315-113325, Aug. 2017.
9 D. H. Shin, R. C. Park, and K. Chung, "Decision Boundary-Based Anomaly Detection Model using Improved AnoGAN from ECG Data," IEEE Access, vol. 8, no. 1, pp. 108664-108674, Jun. 2020.   DOI
10 C. L. Li, K. Sohn, J. Yoon, and T. Pfister, "Cutpaste: Self-Supervised Learning for Anomaly Detection and Localization," in Proc. of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 9664-9674, 2021.
11 AI Hub, Last modified on: Nov 18. 2021. [Online]. Available: Apr 13. 2022, https://aihub.or.kr.
12 J. W. Baek and K. Chung, "Pothole Classification Model Using Edge Detection in Road Image," Applied Sciences, vol. 10 no. 19, pp. 6662-6680, Sep. 2020.   DOI
13 S. Akcay, A. Atapour-Abarghouei, and T. P. Breckon, "Ganomaly: Semi-Supervised Anomaly Detection via Adversarial Training," in Proc. of Asian Conference on Computer Vision, pp. 622-637, May. 2019.
14 S. Saqaeeyan and H. Amirkhani, "Anomaly Detection in Smart Homes using Bayesian Networks," KSII Transactions on Internet and Information Systems (TIIS), vol. 14, no. 4, pp. 1796-1816, Apr. 2020.   DOI
15 L. Van Zoonen, "Privacy Concerns in Smart Cities," Government Information Quarterly, vol. 33, no. 3, pp. 472-480, Jul. 2016.   DOI
16 M. A. Mohammed, K. H. Abdulkareem, S. A. Mostafa, M. K. A. Ghani, M. S. Maashi, B. GarciaZapirain, I. Oleagordia, H. Alhakami, and F. T. Al-Dhief, "Voice Pathology Detection and Classification using Convolutional Neural Network Model," Applied Sciences, vol. 10, no. 11, p. 3723, May. 2020.
17 E. Principi, S. Squartini, R. Bonfigli, G. Ferroni, and F. Piazza, "An Integrated System for Voice Command Recognition and Emergency Detection Based on audio signals," Expert Systems with Applications, vol. 42, no. 13, pp. 5668-5683, August. 2015.   DOI
18 C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, "Rethinking the Inception Architecture for Computer Vision," in Proc. of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818-2826, 2016.
19 H. J. Kwon, M. J. Kim, J. W. Baek, and K. Chung, "Voice Frequency Synthesis using VAW-GAN based Amplitude Scaling for Emotion Transformation," KSII Transactions on Internet and Information Systems (TIIS), vol. 16, no. 2, pp. 713-725, Mar. 2022.
20 S. Hershey, S. Chaudhuri, D. P. Ellis, J. F. Gemmeke, A. Jansen, R. C. Moore, and K. Wilson, "CNN Architectures for Large-Scale Audio Classification," in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing (icassp), pp. 131-135, 2017.
21 X. Shi, Q. Kang, M. Zhou, A. Abusorrah, and J. An, "Soft Sensing of Nonlinear and Multimode Processes Based on Semi-Supervised Weighted Gaussian Regression," IEEE Sensors Journal, vol. 20, no. 21 pp. 12950-12960, 2020.   DOI
22 Emergency Voice/Sound, AI hub, Last modified on: Nov 18. 2021. [Online]. Available: Mar 15. 2022, https://aihub.or.kr/node/30742.
23 H. Yoo, R. C. Park, K. Chung, "IoT-based Health Big-data Process Technologies: A Survey," KSII Transactions on Internet and Information Systems (TIIS), vol. 15, no. 3, pp. 974-992, Mar. 2021.
24 S. Naseer and Y. Saleem, "Enhanced Network Intrusion Detection using Deep Convolutional Neural Networks," KSII Transactions on Internet and Information Systems (TIIS), vol. 12, no. 10, pp. 5159-5178, Oct. 2018.   DOI
25 Y. L. Wu, Y. H. Tao, and C. J. Chang, "A Comparative Review on Privacy Concerns and Safety Demands of Closed-Circuit Television among Taiwan, Japan, and the United Kingdom," Journal of Information and Optimization Sciences, vol. 38, no. 1, pp. 173-196, Feb. 2017.   DOI
26 H. Yoo, K. Chung, "Classification of Multi-Frame Human Motion Using CNN-based Skeleton Extraction," Intelligent Automation & Soft Computing, vol. 34, no. 1, pp. 1-13, Apr. 2022.   DOI
27 H. Ghayvat, S. Mukhopadhyay, B. Shenjie, A. Chouhan, and W. Chen, "Smart Home Based Ambient Assisted Living: Recognition of Anomaly in the Activity of Daily Living for an Elderly Living Alone," in Proc. of 2018 IEEE International Instrumentation and Measurement Technology Conference (I2MTC), pp. 1-5, May. 2018.
28 E. L. Piza, B. C. Welsh, D. P. Farrington, and A. L. Thomas, "CCTV Surveillance for Crime Prevention: A 40-year Systematic Review with Meta-analysis," Criminology & Public Policy, vol. 18, no. 1, pp. 135-159, Mar. 2019.   DOI
29 W. B. Kim and I. Y. Lee, "Secure and Efficient Storage of Video Data in a CCTV Environment," KSII Transactions on Internet and Information Systems (TIIS), vol. 13, no. 6, pp. 3238-3257, Jun. 2019.   DOI