Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Anomaly Detection Based on RBM-LSTM Neural Network for CPS in Advanced Driver Assistance System

Published: 22 May 2020 Publication History
  • Get Citation Alerts
  • Editorial Notes

    A corrigendum was issued for this paper on November 12, 2020. You can download the corrigendum from the supplemental material section of this citation page.

    Abstract

    Advanced Driver Assistance System (ADAS) is a typical Cyber Physical System (CPS) application for human–computer interaction. In the process of vehicle driving, we use the information from CPS on ADAS to not only help us understand the driving condition of the car but also help us change the driving strategies to drive in a better and safer way. After getting the information, the driver can evaluate the feedback information of the vehicle, so as to enhance the ability to assist in driving of the ADAS system. This completes a complete human–computer interaction process. However, the data obtained during the interaction usually form a large dimension, and irrelevant features sometimes hide the occurrence of anomalies, which poses a significant challenge to us to better understand the driving states of the car.
    To solve this problem, we propose an anomaly detection framework based on RBM-LSTM. In this hybrid framework, RBM is trained to extract general underlying features from data collected by CPS, and LSTM is trained from the features learned by RBM. This framework can effectively improve the prediction speed and present a good prediction accuracy to show vehicle driving condition. Besides, drivers are allowed to evaluate the prediction results, so as to improve the accuracy of prediction. Through the experimental results, we can find that the proposed framework not only simplifies the training of the entire neural network and increases the training speed but also greatly improves the accuracy of the interaction-driven data analysis. It is a valid method to analyze the data generated during the human interaction.

    Supplementary Material

    a27-wu-corrigendum (a27-wu-corrigendum.pdf)
    Corrigendum to "Anomaly Detection Based on RBM-LSTM Neural Network for CPS in Advanced Driver Assistance System" by Wu et al., ACM Transactions on Cyber-Physical Systems, Volume 4, No. 3 (TCPS 4:3).

    References

    [1]
    Jason Brownlee. [n.d.]. How to Convert a Time Series to a Supervised Learning Problem in Python. Retrieved from https://machinelearningmastery.com/convert-time-series-supervised-learning-problem-python/.
    [2]
    Zihao Cao, Yongxin Zhu, Liguo Yang, Menglin Wang, Yu Zheng, Peng Xiong, Junjie Hou, and Li Tian. 2018. Improving prediction accuracy in LSTM network model for aircraft testing flight data. In Proceedings of the 2018 IEEE International Conference on Smart Cloud (SmartCloud’18), 7--12.
    [3]
    Sarah M. Erfani, Sutharshan Rajasegarar, Shanika Karunasekera, and Christopher Leckie. 2016. High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn. 58, C (Oct. 2016), 121--134.
    [4]
    Asja Fischer and Christian Igel. 2014. Training restricted Boltzmann machines: An introduction. Pattern Recogn. 47, 1 (2014), 25--39.
    [5]
    Felix A. Gers, Nicol N. Schraudolph, and Jürgen Schmidhuber. 2003. Learning precise timing with lstm recurrent networks. J. Mach. Learn. Res. 3 (Mar. 2003), 115--143.
    [6]
    Kratarth Goel, Raunaq Vohra, and J. K. Sahoo. 2014. Polyphonic music generation by modeling temporal dependencies using a RNN-DBN. Lecture Notes in Computer Science. 217--224. https://doi.org/10.1007/978-3-319-11179-7_28
    [7]
    Alex Graves. 2013. Generating sequences with recurrent neural networks. CoRR abs/1308.0850 (2013). arxiv:1308.0850 http://arxiv.org/abs/1308.0850
    [8]
    Geoffrey E. Hinton. 2002. Training products of experts by minimizing contrastive divergence. Neural Comput. 14, 8 (Aug. 2002), 1771--1800.
    [9]
    Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural Comput. 9, 8 (1997), 1735--1780. arXiv:https://doi.org/10.1162/neco.1997.9.8.1735
    [10]
    Tian Huang, Yongxin Zhu, Yishu Mao, Xinyang Li, Mengyun Liu, Yafei Wu, Yajun Ha, and Gillian Dobbie. 2016. Parallel discord discovery. In Proceedings of the 20th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, Volume 9652 (PAKDD’16). Springer-Verlag, Berlin, 233--244.
    [11]
    T. Huang, Y. Zhu, Y. Wu, and W. Shi. 2015. J-distance discord: An improved time series discord definition and discovery method. In Proceedings of the 2015 IEEE International Conference on Data Mining Workshop (ICDMW’15). 303--310.
    [12]
    N. Lopes, B. Ribeiro, and J. Gonçalves. 2012. Restricted Boltzmann machines and deep belief networks on multi-core processors. In Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN’12). 1--7.
    [13]
    Tomas Mikolov, Martin Karafiát, Lukás Burget, Jan Cernocký, and Sanjeev Khudanpur. 2010. Recurrent neural network based language model. In Proceedings of the Conference of the International Speech Communication Association (INTERSPEECH’10).
    [14]
    Razvan Pascanu, Tomas Mikolov, and Yoshua Bengio. 2012. Understanding the exploding gradient problem. CoRR abs/1211.5063 (2012). arxiv:1211.5063 http://arxiv.org/abs/1211.5063
    [15]
    S. Ramyar, A. Homaifar, A. Karimoddini, and E. Tunstel. 2016. Identification of anomalies in lane change behavior using one-class SVM. In Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC’16). 004405--004410.
    [16]
    Sam T. Roweis. 1998. EM algorithms for PCA and SPCA. In Advances in Neural Information Processing Systems 10, M. I. Jordan, M. J. Kearns, and S. A. Solla (Eds.). MIT Press, 626--632.
    [17]
    R. Vohra, K. Goel, and J. K. Sahoo. 2015. Modeling temporal dependencies in data using a DBN-LSTM. In Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA’15). 1--4.
    [18]
    Chang Wang, Yongxin Zhu, Weiwei Shi, Victor Chang, P. Vijayakumar, Bin Liu, Yishu Mao, Jiabao Wang, and Yiping Fan. 2018. A dependable time series analytic framework for cyber-physical systems of IoT-based smart grid. ACM Trans. Cyber-Phys. Syst. 3, 1, Article 7 (Aug. 2018), 18 pages.
    [19]
    Wikipedia. 2018. Long Short-Term Memory. Retrieved December 9, 2018 from https://en.wikipedia.org/w/index.php?title=Long_short-term_memory8oldid=870076484.
    [20]
    Wikipedia. 2018. Principal Component Analysis. Retrieved December 9, 2018 from https://en.wikipedia.org/w/index.php?title=Principal_component_analysis8oldid=872329019.
    [21]
    Wikipedia. 2018. Restricted Boltzmann Machine. Retreived November 30, 2018 from https://en.wikipedia.org/w/index.php?title=Restricted_Boltzmann_machine8oldid=869037391.
    [22]
    Ronald J. Williams and David Zipser. 1995. Gradient-based learning algorithms for recurrent networks and their computational complexity. In Backpropagation. L. Erlbaum Associates Inc., Hillsdale, NJ, Chapter, 433--486. http://dl.acm.org/citation.cfm?id=201784.201801
    [23]
    D. Wu, Z. Sun, Y. Zhu, L. Tian, H. Zhu, P. Xiong, Z. Cao, M. Wang, Y. Zheng, C. Xiong, H. Jiang, K. H. Tsoi, X. Niu, W. Mao, C. Feng, X. Zha, G. Deng, and W. Luk. 2018. Custom machine learning architectures: Toward realtime anomaly detection for flight testing. In Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW’18). 1323--1330.
    [24]
    Yiran Zhao, Shuochao Yao, Huajie Shao, and Tarek Abdelzaher. 2018. Codrive: Cooperative driving scheme for vehicles in urban signalized intersections. In Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS’18). IEEE Press, Piscataway, NJ, 308--319.
    [25]
    Hanlin Zhu, Yongxin Zhu, Di Wu, Hui Wang, Li Tian, Wei Mao, Can Feng, Xiaowen Zha, Guobao Deng, Jiayi Chen, Tao Liu, Xinyu Niu, Kuen Hung Tsoi, and Wayne Luk. 2018. Correlation coefficient based cluster data preprocessing and LSTM prediction model for time series data in large aircraft test flights. In Smart Computing and Communication, Meikang Qiu (Ed.). Springer International Publishing, Cham, 376--385.

    Cited By

    View all
    • (2024)Adaptive Anomaly Detection in Industrial Systems: An EVT-DTS Approach with LSTM Autoencoders2024 IEEE International Instrumentation and Measurement Technology Conference (I2MTC)10.1109/I2MTC60896.2024.10561049(1-6)Online publication date: 20-May-2024
    • (2023)Sustainability of ICPS from a Safety Perspective: Challenges and Opportunities2023 IEEE 32nd International Symposium on Industrial Electronics (ISIE)10.1109/ISIE51358.2023.10228030(1-8)Online publication date: 19-Jun-2023
    • (2023)CNN-LSTM-Based Smart Field Station Electric Load Prediction2023 International Conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC)10.1109/IIoTBDSC60298.2023.00072(1-5)Online publication date: 22-Sep-2023
    • Show More Cited By

    Index Terms

    1. Anomaly Detection Based on RBM-LSTM Neural Network for CPS in Advanced Driver Assistance System

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Cyber-Physical Systems
      ACM Transactions on Cyber-Physical Systems  Volume 4, Issue 3
      Special Issue on User-Centric Security and Safety for CPS
      July 2020
      279 pages
      ISSN:2378-962X
      EISSN:2378-9638
      DOI:10.1145/3388234
      • Editor:
      • Tei-Wei Kuo
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Journal Family

      Publication History

      Published: 22 May 2020
      Online AM: 07 May 2020
      Accepted: 01 December 2019
      Revised: 01 October 2019
      Received: 01 December 2018
      Published in TCPS Volume 4, Issue 3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Anomaly detection
      2. LSTM
      3. RBM
      4. RNN

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      • National Natural Science Foundation of China
      • Shanghai Municipal Science and Technology Commission, and National Key Research and Development Program of China

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)53
      • Downloads (Last 6 weeks)4
      Reflects downloads up to 26 Jul 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Adaptive Anomaly Detection in Industrial Systems: An EVT-DTS Approach with LSTM Autoencoders2024 IEEE International Instrumentation and Measurement Technology Conference (I2MTC)10.1109/I2MTC60896.2024.10561049(1-6)Online publication date: 20-May-2024
      • (2023)Sustainability of ICPS from a Safety Perspective: Challenges and Opportunities2023 IEEE 32nd International Symposium on Industrial Electronics (ISIE)10.1109/ISIE51358.2023.10228030(1-8)Online publication date: 19-Jun-2023
      • (2023)CNN-LSTM-Based Smart Field Station Electric Load Prediction2023 International Conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC)10.1109/IIoTBDSC60298.2023.00072(1-5)Online publication date: 22-Sep-2023
      • (2023)Automated Threat Detection Using Flamingo Search Algorithm With Optimal Deep Learning on Cyber-Physical System EnvironmentIEEE Access10.1109/ACCESS.2023.333221311(127669-127678)Online publication date: 2023
      • (2023)Daily Water Level Time Series Prediction Using ECRBM-Based Ensemble Optimized Neural Network ModelJournal of Hydrologic Engineering10.1061/(ASCE)HE.1943-5584.000221928:1Online publication date: Jan-2023
      • (2023)An optimized AdaBoost Multi-class support vector machine for driver behavior monitoring in the advanced driver assistance systemsExpert Systems with Applications10.1016/j.eswa.2022.118618212(118618)Online publication date: Feb-2023
      • (2023)Cyber attack detection in healthcare data using cyber-physical system with optimized algorithmComputers and Electrical Engineering10.1016/j.compeleceng.2023.108636108(108636)Online publication date: May-2023
      • (2023)Machine intelligence and medical cyber-physical system architectures for smart healthcare: Taxonomy, challenges, opportunities, and possible solutionsArtificial Intelligence in Medicine10.1016/j.artmed.2023.102692146(102692)Online publication date: Dec-2023
      • (2022)OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack SimulationACM Transactions on Cyber-Physical Systems10.1145/35518936:4(1-27)Online publication date: 8-Aug-2022
      • (2022)Fast and Progressive Misbehavior Detection in Internet of Vehicles Based on Broad Learning and Incremental Learning SystemsIEEE Internet of Things Journal10.1109/JIOT.2021.31092769:6(4788-4798)Online publication date: 15-Mar-2022
      • Show More Cited By

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media