全國中小學科展

電腦科學與資訊工程

以深度學習及動脈壓力波頻譜諧波分析實驗為基礎開發脈搏訊號分析系統

本研究提出一套創新的人體健康分析方式,透過全新的分析演算法架構深度解析脈搏訊號中的特徵,並結合深度神經網路進行預測,最後開發成監測人體健康的嵌入式系統。本研究基於血液共振理論,將光體積變化描計圖法擷取到的脈搏訊號進行訊號處理,從中擷取出共振峰值以及其變化量,檢測血液循環一週的微小變化,改善了當前分析方法著重在計算平均值,無法呈現即時狀態的缺失。本研究提出的系統和演算法所延伸的預警系統具有77.3%的預測精準度,同時可以擴展至多種趨勢相關的臨床症狀。此外,本系統十分適合應用於低功耗、低成本的硬體,對於未來各種行動裝置、穿戴科技與居家照護的生理數據分析需求,可提供實質的貢獻。

利用VAE-pix2pix生成擬真的山脈模型

本研究利用NASA的SRTM 1 Arc-Second資料集來收集全球各地的地形高度圖(heightmap),也利用MapTiler網站收集相對應的衛星空照圖,用這些收集的圖像,訓練我們建構的VAE-pix2pix模型。VAE-pix2pix為Variational Autoencoder (VAE)及pix2pix (為一個Conditional Generative Adversarial Network)結合的模型,能將人工繪製的高度圖加上真實山脈應有的細節(包含尖銳的山脊、山壁上的紋路、連續的河流網路等……),並生成出相對應的擬真衛星空照圖。相較於原pix2pix模型,VAE-pix2pix所生成的高度圖及衛星空照圖會更接近於真實世界的地形高度圖及衛星空照圖,同時VAE-pix2pix模型也能透過改變latent code的數值來生成出不同風格的高度圖及空照圖,如地貌的顏色或雪線的高度等,這些都增加模型生成圖像的多樣性。為了使我們建構的模型能更廣泛的被應用,我們在Unity上開發了Unity客戶端,其生成的mesh可以讓使用者直接應用於遊戲的場景,簡化了遊戲中生成擬真山脈模型的任務。

利用近端策略優化演算法結合內在好奇心模組進行2D雙足模型行走模擬

強化學習為當前AI領域的熱門話題,其特點是在環境的獎勵與懲罰下,進行學習。強化學習雖然較為困難,但其成功的項目都非常有名,其中最著名的例子有: AlphoGo、AlphaZero等等。 深度強化學習(DRL)是深度學習與強化學習的結合體,本專題透過DRL實現近端優化策略演算法,來使BipedalWalker環境中的二足模型學會行走,並調適超參數與神經網路來讓模型訓練擁有更好的結果。 經過實驗後發現,適當的降低獎勵折扣衰減率能有效的提升學習速度以及學習上限,同時可以避免分數落差過大導致的Dead relu問題。最終的結果能讓平均分數達到302分,成功達成了BipedalWalker環境要求(平均分數>=300分)。 為了使智能體擁有更好的探索能力,本專題加入了ICM(Intrinsic Curiosity Module),成功提升了最終的平均分數至316分,將不摔倒的機率提升至99%,最高分數則到了320分,使得雙足模型能以更快的速度向前移動並保持穩定。

A Person Re-identification based Misidentification-proof Person Following Service Robot

Two years ago, I attended a robot contest, in which one of the missions required the robot to follow the pedestrian to complete the task. At that time, I used their demo program to complete the task. Not long after, I found two main issues: 1. The program follows the closest point read by the depth camera, which if I walk close to a wall next to, the robot may likely ‘follow’ the wall. 2. Not to mention if another pedestrian crosses between the robot and the target. Regarding these two issues, I decided to improve it. We’ve designed a procedure of using YOLO Object Detection and Person re-identification to re-identify the target for continuous following.

A Person Re-identification based Misidentification-proof Person Following Service Robot

Two years ago, I attended a robot contest, in which one of the missions required the robot to follow the pedestrian to complete the task. At that time, I used their demo program to complete the task. Not long after, I found two main issues: 1. The program follows the closest point read by the depth camera, which if I walk close to a wall next to, the robot may likely ‘follow’ the wall. 2. Not to mention if another pedestrian crosses between the robot and the target. Regarding these two issues, I decided to improve it. We’ve designed a procedure of using YOLO Object Detection and Person re-identification to re-identify the target for continuous following.

偵測注音文密碼強度之研究

密碼為我們生活中常見的一項工具,它可以為我們保護我們的隱私,以免受到別人侵犯,但也同時間出現許多問題,例如:若密碼太過單純會使密碼的功能失去意義,讓其他人可以輕易存取使用者的資料。 在臺灣,注音文密碼是十分常用的密碼,因為它乍看像亂碼,其實有一定的規律存在,而這些密碼,卻容易被判斷為安全的密碼,因此,我們希望可以將這個問題改善。 在研究中,我們先研究密碼強弱,再探討注音文密碼中在一般密碼中的比例,最後達成我們希望的目標—寫出一個可以偵測加入注音文策略的程式。在研究中,我們亦討論各個密碼演算法的優點及缺點,以找出可以最準確判斷的程式,並在研究的最後,提出可以將這套方法擴充至其他語言或是輸入法的可能性。

Limited Query Black-box Adversarial Attacks in the Real World

We study the creation of physical adversarial examples, which are robust to real-world transformations, using a limited number of queries to the target black-box neural networks. We observe that robust models tend to be especially susceptible to foreground manipulations, which motivates our novel Foreground attack. We demonstrate that gradient priors are a useful signal for black-box attacks and therefore introduce an improved version of the popular SimBA. We also propose an algorithm for transferable attacks that selects the most similar surrogates to the target model. Our black-box attacks outperform state-of-the-art approaches they are based on and support our belief that the concept of model similarity could be leveraged to build strong attacks in a limited-information setting.

殊途同歸—無既定模式中英文混合輸入

本研究旨在設計一個使用模式,以不切換中、英文輸入法打字的原則之下,能夠完整的自動辨識出一個包含中文(注音、嘸蝦米、倉頡)與英文完整句子。經實測結果,正確率達到94.23%以上。

Imperative Programming程式碼與Functional Programming程式碼的等價性與其證明,使用Agda

本研究主要考慮在盡量保留可讀性的情況下,找出將 Imperative Programming 程式碼對應的 Functional Programming 的程式碼並證明。 結果如下: 一、if statement 等價於由 ifte 函數所構成的程式碼,其中函數ifte定義在本文內 二、某些 for-loop statement 等價於由 foldl 函數所構成的程式碼 三、某些 for-loop statement 等價於由 map 函數所構成的程式碼

HoneySurfer: Intelligent Web-Surfing Honeypots

In Singapore’s evolving cyber landscape, 96% of organisations have suffered at least one cyber attack and 95% of organisations have been reporting more sophisticated attacks in the frame of one year according to a 2019 report[1] by Carbon Black. As such, more tools must be utilised to counter increasingly refined attacks performed by malicious actors. Honeypots are effective tools for studying and mitigating these attacks. They work as decoy systems, typically deployed alongside real systems to capture and log the activities of the attacker. These systems are useful as they can actively detect potential attacks, help cybersecurity specialists study an attacker’s tactics and even misdirect attackers from their intended targets. Honeypots can be classified into two main categories: 1. Low-interaction honeypots merely emulate network services and internet protocols, allowing for limited interaction with the attacker. 2. High-interaction honeypots emulate operating systems, allowing for much more interaction with the attacker. Although honeypots are powerful tools, its value diminishes when its true identity is uncovered by attackers. This is especially so with attackers becoming more skilled through system fingerprinting or analysing network traffic from targets and hence, hindering honeypots from capturing more experienced attackers. While substantial research has been done to defend against system fingerprinting scans (see 1.1 Related Work), not much has been done to defend against network traffic analysis. As pointed out by Symantec[2][3], when attackers attempt to sniff network traffic of the system in question, the lack of network traffic raises a red flag, increasing the likelihood of the honeypot’s true identity being discovered. In addition, the main concern with regards to honeypot deployment being their ability to attract and engage attackers for a substantial period of time, an increased ability to interest malicious actors is invaluable. Producing human-like network activity on a honeypot would appeal to more malicious actors. Hence, this research aims to build an intelligent web-surfer which can learn and thus simulate human web-surfing behaviour, creating evidence of human network activities to disguise the identity of honeypots as production systems and luring in more attackers interested in packet sniffing for malicious purposes.