Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring

Total Page:16

File Type:pdf, Size:1020Kb

Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring Blurring Fools the Network - Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring Chenchen Zhao and Hao Li∗ Abstract—Existing pixel-level adversarial attacks on neural Although existing type II adversarial attack methods are networks may be deficient in real scenarios, since pixel-level powerful with their extremely small amplitude of data changes on the data cannot be fully delivered to the neural modifications, it is barely possible for a real environment network after camera capture and multiple image preprocessing steps. In contrast, in this paper, we argue from another per- to correspond to the data with exact the same distortion spective that gaussian blurring, a common technique of image and color errors as the original data with the exact pixel preprocessing, can be aggressive itself in specific occasions, thus modifications as expected. Therefore, such adversarial exposing the network to real-world adversarial attacks. We first examples do not have the same characteristic of reality as propose an adversarial attack demo named peak suppression that in the original data, and are barely possible to exist in (PS) by suppressing the values of peak elements in the features of the data. Based on the blurring spirit of PS, we further the real world. Reality loss also happens in type I attacks apply gaussian blurring to the data, to investigate the potential with meaningless adversarial data [12] or manipulated influence and threats of gaussian blurring to performance of data modifications [13]. the network. Experiment results show that PS and well-designed • Preprocessing. The image data goes through several gaussian blurring can form adversarial attacks that completely preprocessing steps such as blurring, color transform, change classification results of a well-trained target network. With the strong physical significance and wide applications of reshaping, etc. before inputted to the network. Data gaussian blurring, the proposed approach will also be capable of modifications by a type II attack method may possibly conducting real world attacks. fail after such preprocessing steps, since the modification values are also changed in preprocessing together with I. INTRODUCTION the data, with their influence possibly weakened or even With the applications of deep learning and neural networks reversed in the process. in core technology, robustness and stability of their per- The two points respectively correspond to the two perspectives formance gradually attract much more attention. Researches of adversarial attacks: whether the adversarial examples can have proved that even well-trained neural networks may be truly exist in the real world; whether the differences between vulnerable to adversarial attacks: manipulated slight changes the adversarial examples and the original data can be fully on the data resulting in misjudgement [1]–[11], or generated delivered to the target network in real cases. Negativity of meaningness data resulting in high-confidence recognition by either perspective results in deficiency of the attack method in the target network [12], [13]. The above two spirits of attacks real scenarios. Unfortunately, the two points are just two of are respectively named type II and type I attacks, defined in the main drawbacks of existing adversarial attack methods. [13] according to the characteristics of modifications on data. In this paper, in order to maintain the reality and aggressive- These attack approaches have shown promising results and ness of adversarial examples in real cases, we choose not to ability of misleading the networks to wrong judgements with make manipulated modifications on the data. Instead, we focus common image datasets (e.g. ImageNet [14]). on the image preprocessing step, since it also makes changes While the existing attack approaches are indeed threatening arXiv:2012.11442v1 [cs.CV] 21 Dec 2020 to the raw data but does not affect the related data capturing the safety of neural networks and their applications, their process, thus not affecting the reality of data. Exploiting the performance may be greatly reduced in real world scenarios. vulnerability of the image preprocessing step is a better way In real image processing cases, there are several unique of generating real-world adversarial examples. We demonstrate characteristics of data and the processing system neglected that gaussian blurring, a typical image preprocessing method, by most attack approaches: is potentially threatening to neural networks itself by turning • Reality of data. The original data inputted to the network ordinary data aggressive before inputting it to the network. is collected from real scenes by non-ideal sensors, which We first propose a novel adversarial attack demo named have internal distortion and slight errors on color capture. peak suppression (PS). As a general type of blurring, PS This research work is supported by the SJTU (Shanghai Jiao Tong Univ.) suppresses the values of the peak elements (i.e. hotspots) in Young Talent Funding (WF220426002). the features and smoothes the features of data to confuse Chenchen Zhao is with Dept. Automation, SJTU, Shanghai, 200240, China. the feature processing module of the target network. The Hao Li, Assoc. Prof., is with Dept. Automation and SPEIT, SJTU, Shanghai, 200240, China. feature-level blurring of PS generates adversarial examples * Corresponding author: Hao Li (Email:[email protected]) which are similar to the original examples after pixel-level blurring, inspiring us to conduct adversarial attacks based on Adversarial ... direct pixel-level blurring happening in image preprocessing. Data We further introduce gaussian blurring to adversarial attacks. We construct several gaussian kernels that can change the Features data into adversarial examples simply by gaussian blurring. Such attacks may be more deadly, since a system with gaus- Classification sian blurring as a part of preprocessing may spontaneously y=y y=y result 0 0 y y0 introduce adversarial attacks to itself. Our contributions are Encoder Decoder PS MSE Gradient Image-domain summarized as follows: First, we propose a blurring demo Network Network Loss Backprop Restriction to conduct several successful adversarial attacks; second, we apply gaussian blurring to adversarial attacks, and construct Fig. 1: The iteration process of Peak Suppression attack. several threatening gaussian kernels for adversarial attacks; last but not least, we prove that the commonly-used gaussian blurring technique in image processing may be potentially of gaussian blurring, an ordinary data sample collected from ‘dangerous’ and exposing the image processing network to the real environment can turn aggressive after preprocessing. adversarial attacks. The attack approach proposed in this paper is effective and more importantly, maintaining the reality of III. THE PROPOSED GAUSSIAN BLURRING BASED data and capable in real world scenarios, since the designed ADVERSARIAL ATTACKS gaussian kernels serve as a module in image preprocessing and A. Feature peak suppression as demonstration do not affect the original data. This method raises a warning We first propose an attack demo named Peak Suppression to image processing systems on their choice of parameters in (PS) involving the basic spirit of blurring. gaussian blurring. As stated in [16], CNN has relatively stronger responses The paper is organized as follows: Some related work of in locations of key features of objects, reflected by specific adversarial attacks is stated in Section II; details of the peak peak elements in feature outputs with much larger values. suppression attack and the gaussian blurring based attack Based on this, we try to confuse the network by suppressing are stated in Section III; in Section IV, we conduct several such elements in the features, to make the target network experiments to prove the effectiveness of PS and the gaussian lose its concentration and make wrong judgements. Then, blurring based attack; we conclude this paper in Section V. adversarial data is derived from the peak-suppressed features. II. RELATED WORK The iteration process of PS is shown in Figure 1. After finite The gradient descent algorithm serves as the fundamen- number of iterations, peaks in the features turn implicit enough tal element in most existing adversarial attack approaches. to confuse the network, and the iteration process immediately Since the proposal of FGSM [7] stating the criterion of data ends when the network changes its judgement. PS can be modifications to change the output of the network to the considered as a simple feature-level blurring technique. largest extent, there are many studies aiming at modifying the In generation of the adversarial data x, the criterion is shown data to ‘guide’ the network to a wrong result with gradient in (1), in which fencoder(x)i is the ith layer of the feature descent. In [10], L2 norm is used to determine the minimum maps. value of perturbation in adversarial attacks; authors in [11] X LPS = jjmax(fencoder(x)i) − fencoder(x)ijj2 (1) proposed a pixel-level attack method to minimize the number i of changed pixels; in [1], the authors used projection to avoid PS is a white-box non-targeted attack approach with this the situations in which the modified data goes out of the data criterion. domain; in [5], [6], the authors propose a feature-level attack After every iteration, we apply the image-domain restric- method by driving the intermediate feature output to that of tions to the generated data, with its form shown in (2). another predefined data. There are also defense-targeted attack methods (e.g. C&W attack method [3] against distillation). x = min(max(x; 0); 1) (2) As stated in Section I, adversarial data generated by the attack methods above may fail to maintain its reality. Even B. Gaussian blurring based adversarial attack the real-world attacks in [15] have to go through a series Proved in experiments in Section IV, with features of specific steps of data capture, indicating that their perfor- smoothed, the adversarial data generated by PS also has lower mance relies heavily on the hardware environment and are clarity than the corresponding original data, and is similar partly unstable.
Recommended publications
  • Deblured Gaussian Blurred Images
    JOURNAL OF COMPUTING, VOLUME 2, ISSUE 4, APRIL 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 33 Deblured Gaussian Blurred Images Mr. Salem Saleh Al-amri1, Dr. N.V. Kalyankar2 and Dr. Khamitkar S.D 3 Abstract—This paper attempts to undertake the study of Restored Gaussian Blurred Images. by using four types of techniques of deblurring image as Wiener filter, Regularized filter ,Lucy Richardson deconvlutin algorithm and Blind deconvlution algorithm with an information of the Point Spread Function (PSF) corrupted blurred image with Different values of Size and Alfa and then corrupted by Gaussian noise. The same is applied to the remote sensing image and they are compared with one another, So as to choose the base technique for restored or deblurring image.This paper also attempts to undertake the study of restored Gaussian blurred image with no any information about the Point Spread Function (PSF) by using same four techniques after execute the guess of the PSF, the number of iterations and the weight threshold of it. To choose the base guesses for restored or deblurring image of this techniques. Index Terms—Blur/Types of Blur/PSF; Deblurring/Deblurring Methods. —————————— —————————— 1 INTRODUCTION he restoration image is very important process in the image entire image. Tprocessing to restor the image by using the image processing This type of blurring can be distribution in horizontal and vertical techniques to easily understand this image without any artifacts direction and can be circular averaging by radius
    [Show full text]
  • A Comparative Study of Different Noise Filtering Techniques in Digital Images
    International Journal of Engineering Research and General Science Volume 3, Issue 5, September-October, 2015 ISSN 2091-2730 A COMPARATIVE STUDY OF DIFFERENT NOISE FILTERING TECHNIQUES IN DIGITAL IMAGES Sanjib Das1, Jonti Saikia2, Soumita Das3 and Nural Goni4 1Deptt. of IT & Mathematics,ICFAI University Nagaland, Dimapur, 797112, India, [email protected] 2Service Engineer, Indian export & import office, Shillong- 793003, Meghalaya, India, [email protected] 3Department of IT, School of Technology, NEHU, Shillong-22, Meghalaya, India, [email protected] 4Department of IT, School of Technology, NEHU, Shillong-22, Meghalaya, India, [email protected] Abstract: Although various solutions are available for de-noising them, a detail study of the research is required in order to design a filter which will fulfil the desire aspects along with handling most of the image filtering issues. In this paper we want to present some of the most commonly used noise filtering techniques namely: Median filter, Gaussian filter, Kuan filter, Morphological filter, Homomorphic Filter, Bilateral Filter and wavelet filter. Median filter is used for reducing the amount of intensity variation from one pixel to another pixel. Gaussian filter is a smoothing filter in the 2D convolution operation that is used to remove noise and blur from image. Kuan filtering technique transforms multiplicative noise model into additive noise model. Morphological filter is defined as increasing idempotent operators and their laws of composition are proved. Homomorphic Filter normalizes the brightness across an image and increases contrast. Bilateral Filter is a non-linear edge preserving and noise reducing smoothing filter for images. Wavelet transform can be applied to image de-noising and it has been extremely successful.
    [Show full text]
  • A Simple Second Derivative Based Blur Estimation Technique Thesis
    A Simple Second Derivative Based Blur Estimation Technique Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master of Science in the Graduate School of The Ohio State University By Gourab Ghosh Roy, B.E. Graduate Program in Computer Science & Engineering The Ohio State University 2013 Thesis Committee: Brian Kulis, Advisor Mikhail Belkin Copyright by Gourab Ghosh Roy 2013 Abstract Blur detection is a very important problem in image processing. Different sources can lead to blur in images, and much work has been done to have automated image quality assessment techniques consistent with human rating. In this work a no-reference second derivative based image metric for blur detection and estimation has been proposed. This method works by evaluating the magnitude of the second derivative at the edge points in an image, and calculating the proportion of edge points where the magnitude is greater than a certain threshold. Lower values of this proportion or the metric denote increased levels of blur in the image. Experiments show that this method can successfully differentiate between images with no blur and varying degrees of blur. Comparison with some other state-of-the-art quality assessment techniques on a standard dataset of Gaussian blur images shows that the proposed method gives moderately high performance values in terms of correspondence with human subjective scores. Coupled with the method’s primary aspect of simplicity and subsequent ease of implementation, this makes it a probable choice for mobile applications. ii Acknowledgements This work was motivated by involvement in the personal analytics research group with Dr.
    [Show full text]
  • Histopathology Learning Dataset Augmentation: a Hybrid Approach
    Proceedings of Machine Learning Research { Under Review:1{9, 2021 Full Paper { MIDL 2021 submission HISTOPATHOLOGY LEARNING DATASET AUGMENTATION: A HYBRID APPROACH Ramzi HAMDI1 [email protected] Cl´ement BOUVIER1 [email protected] Thierry DELZESCAUX2 [email protected] C´edricCLOUCHOUX1 [email protected] 1 WITSEE, Neoxia, Paris, France 2 CEA-CNRS-UMR 9199, LMN, MIRCen, Univ. Paris-Saclay, Fontenay-aux-Roses, France Editors: Under Review for MIDL 2021 Abstract In histopathology, staining quantification is a mandatory step to unveil and characterize disease progression and assess drug efficiency in preclinical and clinical settings. Super- vised Machine Learning (SML) algorithms allow the automation of such tasks but rely on large learning datasets, which are not easily available for pre-clinical settings. Such databases can be extended using traditional Data Augmentation methods, although gen- erated images diversity is heavily dependent on hyperparameter tuning. Generative Ad- versarial Networks (GAN) represent a potential efficient way to synthesize images with a parameter-independent range of staining distribution. Unfortunately, generalization of such approaches is jeopardized by the low quantity of publicly available datasets. To leverage this issue, we propose a hybrid approach, mixing traditional data augmentation and GAN to produce partially or completely synthetic learning datasets for segmentation application. The augmented datasets are validated by a two-fold cross-validation analysis using U-Net as a SML method and F-Score as a quantitative criterion. Keywords: Generative Adversarial Networks, Histology, Machine Learning, Whole Slide Imaging 1. Introduction Histology is widely used to detect biological objects with specific staining such as protein deposits, blood vessels or cells.
    [Show full text]
  • Anisotropic Diffusion in Image Processing
    Anisotropic diffusion in image processing Tomi Sariola Advisor: Petri Ola September 16, 2019 Abstract Sometimes digital images may suffer from considerable noisiness. Of course, we would like to obtain the original noiseless image. However, this may not be even possible. In this thesis we utilize diffusion equations, particularly anisotropic diffusion, to reduce the noise level of the image. Applying these kinds of methods is a trade-off between retaining information and the noise level. Diffusion equations may reduce the noise level, but they also may blur the edges and thus information is lost. We discuss the mathematics and theoretical results behind the diffusion equations. We start with continuous equations and build towards discrete equations as digital images are fully discrete. The main focus is on iterative method, that is, we diffuse the image step by step. As it occurs, we need certain assumptions for these equations to produce good results, one of which is a timestep restriction and the other is a correct choice of a diffusivity function. We construct an anisotropic diffusion algorithm to denoise images and compare it to other diffusion equations. We discuss the edge-enhancing property, the noise removal properties and the convergence of the anisotropic diffusion. Results on test images show that the anisotropic diffusion is capable of reducing the noise level of the image while retaining the edges of image and as mentioned, anisotropic diffusion may even sharpen the edges of the image. Contents 1 Diffusion filtering 3 1.1 Physical background on diffusion . 3 1.2 Diffusion filtering with heat equation . 4 1.3 Non-linear models .
    [Show full text]
  • 22Nd International Congress on Acoustics ICA 2016
    Page intentionaly left blank 22nd International Congress on Acoustics ICA 2016 PROCEEDINGS Editors: Federico Miyara Ernesto Accolti Vivian Pasch Nilda Vechiatti X Congreso Iberoamericano de Acústica XIV Congreso Argentino de Acústica XXVI Encontro da Sociedade Brasileira de Acústica 22nd International Congress on Acoustics ICA 2016 : Proceedings / Federico Miyara ... [et al.] ; compilado por Federico Miyara ; Ernesto Accolti. - 1a ed . - Gonnet : Asociación de Acústicos Argentinos, 2016. Libro digital, PDF Archivo Digital: descarga y online ISBN 978-987-24713-6-1 1. Acústica. 2. Acústica Arquitectónica. 3. Electroacústica. I. Miyara, Federico II. Miyara, Federico, comp. III. Accolti, Ernesto, comp. CDD 690.22 ISBN 978-987-24713-6-1 © Asociación de Acústicos Argentinos Hecho el depósito que marca la ley 11.723 Disclaimer: The material, information, results, opinions, and/or views in this publication, as well as the claim for authorship and originality, are the sole responsibility of the respective author(s) of each paper, not the International Commission for Acoustics, the Federación Iberoamaricana de Acústica, the Asociación de Acústicos Argentinos or any of their employees, members, authorities, or editors. Except for the cases in which it is expressly stated, the papers have not been subject to peer review. The editors have attempted to accomplish a uniform presentation for all papers and the authors have been given the opportunity to correct detected formatting non-compliances Hecho en Argentina Made in Argentina Asociación de Acústicos Argentinos, AdAA Camino Centenario y 5006, Gonnet, Buenos Aires, Argentina http://www.adaa.org.ar Proceedings of the 22th International Congress on Acoustics ICA 2016 5-9 September 2016 Catholic University of Argentina, Buenos Aires, Argentina ICA 2016 has been organised by the Ibero-american Federation of Acoustics (FIA) and the Argentinian Acousticians Association (AdAA) on behalf of the International Commission for Acoustics.
    [Show full text]
  • Removing Camera Shake from a Single Photograph
    Removing Camera Shake from a Single Photograph Rob Fergus1 Barun Singh1 Aaron Hertzmann2 Sam T. Roweis2 William T. Freeman1 1MIT CSAIL 2University of Toronto Figure 1: Left: An image spoiled by camera shake. Middle: result from Photoshop “unsharp mask”. Right: result from our algorithm. Abstract depth-of-field. A tripod, or other specialized hardware, can elim- inate camera shake, but these are bulky and most consumer pho- tographs are taken with a conventional, handheld camera. Users Camera shake during exposure leads to objectionable image blur may avoid the use of flash due to the unnatural tonescales that re- and ruins many photographs. Conventional blind deconvolution sult. In our experience, many of the otherwise favorite photographs methods typically assume frequency-domain constraints on images, of amateur photographers are spoiled by camera shake. A method or overly simplified parametric forms for the motion path during to remove that motion blur from a captured photograph would be camera shake. Real camera motions can follow convoluted paths, an important asset for digital photography. and a spatial domain prior can better maintain visually salient im- age characteristics. We introduce a method to remove the effects of Camera shake can be modeled as a blur kernel, describing the cam- camera shake from seriously blurred images. The method assumes era motion during exposure, convolved with the image intensities. a uniform camera blur over the image and negligible in-plane cam- Removing the unknown camera shake is thus a form of blind image era rotation. In order to estimate the blur from the camera shake, deconvolution, which is a problem with a long history in the im- the user must specify an image region without saturation effects.
    [Show full text]
  • Performance Analysis of Intensity Averaging by Anisotropic Diffusion Method for MRI Denoising Corrupted by Random Noise by Ms
    Global Journal of Computer Science and Technology Graphics & Vision Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350 Performance Analysis of Intensity Averaging by Anisotropic diffusion Method for MRI Denoising Corrupted by Random Noise By Ms. Ami vibhakar, Mukesh Tiwari, Jaikaran singh & Sanjay rathore Ragiv Gandhi Technical University Abstract - The two parameters which plays important role in MRI (magnetic resonance imaging), acquired by various imaging modalities are Feature extraction and object recognition. These operations will become difficult if the images are corrupted with noise. Noise in MR image is always random type of noise. This noise will change the value of amplitude and phase of each pixel in MR image. Due to this, MR image gets corrupted and we cannot make perfect diagnostic for a body. So noise removal is essential task for perfect diagnostic. There are different approaches for noise reduction, each of which has its own advantages and limitation. MRI denoising is a difficult task as fine details in medical image containing diagnostic information should not be removed during noise removal process. In this paper, we are representing an algorithm for MRI denoising in which we are using iterations and Gaussian blurring for amplitude reconstruction and image fusion, anisotropic diffusion and FFT for phase reconstruction. We are using the PSNR(Peak signal to noise ration), MSE(Mean square error) and RMSE(Root mean square error) as performance matrices to measure the quality of denoised MRI .The final result shows that this method is effectively removing the noise while preserving the edge and fine information in the images.
    [Show full text]
  • California State University Northridge Noise
    CALIFORNIA STATE UNIVERSITY NORTHRIDGE NOISE REDUCTION AND IMAGE SMOOTHING USING GAUSSIAN BLUR. A graduate project in fulfillment of the requirements For the degree of Masters of Science In Electrical Engineering By Sachin Eswar MAY 2015 The graduate project of Sachin Eswar is approved: _____________________________________ ___________________ Dr. Ramin Roosta, Ph.D. Date _____________________________________ ___________________ Dr. Matthew Radmanesh, Ph.D. Date _____________________________________ ___________________ Dr. Shahnam Mirzaei, Ph.D., Chair Date California State University Northridge ii ACKNOWLEDGEMENT Working on this “Noise Reduction and Image Smoothing using Gaussian Blur” was a source of immense knowledge to me. I would like to express my sincere gratitude to Dr. Shahnam Mirzaei for his encouragement and unlimited support towards completion of my dissertation. His guidance and support are the key points for the completion of my project. I would also like to thank Dr. Ramin Roosta and Dr. Mathew Radmanesh for their extended support, scholarly advice and inspiration in completion of my project successfully. I am grateful to the Department of Electrical and computer engineering for giving me this opportunity and providing me the required knowledge in completing my project. I would also like to thank my family and friends, who encouraged me to extend my reach, and for their love, care and support through all the tough times during my graduation. iii TABLE OF CONTENTS SIGNATURE PAGE: ........................................................................................................
    [Show full text]
  • Scale-Space and Edge Detection Using Anisotropic Diffusion
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 12. NO. 7. JULY 1990 629 Scale-Space and Edge Detection Using Anisotropic Diffusion PIETRO PERONA AND JITENDRA MALIK Abstracf-The scale-space technique introduced by Witkin involves generating coarser resolution images by convolving the original image with a Gaussian kernel. This approach has a major drawback: it is difficult to obtain accurately the locations of the “semantically mean- ingful” edges at coarse scales. In this paper we suggest a new definition of scale-space, and introduce a class of algorithms that realize it using a diffusion process. The diffusion coefficient is chosen to vary spatially in such a way as to encourage intraregion smoothing in preference to interregion smoothing. It is shown that the “no new maxima should be generated at coarse scales” property of conventional scale space is pre- served. As the region boundaries in our approach remain sharp, we obtain a high quality edge detector which successfully exploits global information. Experimental results are shown on a number of images. The algorithm involves elementary, local operations replicated over the Fig. 1. A family of l-D signals I(x, t)obtained by convolving the original image making parallel hardware implementations feasible. one (bottom) with Gaussian kernels whose variance increases from bot- tom to top (adapted from Witkin [21]). Zndex Terms-Adaptive filtering, analog VLSI, edge detection, edge enhancement, nonlinear diffusion, nonlinear filtering, parallel algo- rithm, scale-space. with the initial condition I(x, y, 0) = Zo(x, y), the orig- inal image. 1. INTRODUCTION Koenderink motivates the diffusion equation formula- HE importance of multiscale descriptions of images tion by stating two criteria.
    [Show full text]
  • Newport Beach, California
    47th International Congress and Exposition on Noise Control Engineering (INTERNOISE 2018) Impact of Noise Control Engineering Chicago, Illinois, USA 26 - 29 August 2018 Volume 1 of 10 ISBN: 978-1-5108-7303-2 Printed from e-media with permission by: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 Some format issues inherent in the e-media version may also appear in this print version. Copyright© (2018) by Institute of Noise Control Engineering - USA (INCE-USA) All rights reserved. Printed by Curran Associates, Inc. (2018) For permission requests, please contact Institute of Noise Control Engineering - USA (INCE-USA) at the address below. Institute of Noise Control Engineering - USA (INCE-USA) INCE-USA Business Office 11130 Sunrise Valley Drive Suite 350 Reston, VA 20190 USA Phone: +1 703 234 4124 Fax: +1 703 435 4390 [email protected] Additional copies of this publication are available from: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 USA Phone: 845-758-0400 Fax: 845-758-2633 Email: [email protected] Web: www.proceedings.com INTER-NOISE 2018 – Pleanary, Keynote and Technical Sessions Papers are listed by Day, Morning/Afternoon, Session Number and Order of Presentation Select the underlined text (in18_xxxx.pdf) to link to paper Papers without links are available from the American Society of Mechanical Engineers (ASME) - Noise Control and Acoustics Division (NCAD) Sunday – 26 August, 2018 Opening Plenary: Barry Marshall Gibbs Session Chair: Stuart Bolton, Room: Chicago D and E 16:00 in18_4002.pdf Structure-Borne Sound in Buildings: Application of Vibro-Acoustic Methods for Measurement and Prediction .....1 Barry Marshall Gibbs, University of Liverpool Monday Morning – 27 August, 2018 Keynote: Jean-Louis Guyader Session Chair: Steffen Marburg Room: Chicago D 08:00 in18_5001.pdf Building Optimal Vibro-Acoustics Models From Measured Responses .....26 Jean-Louis Guyader, LVA/INSA de Lyon; Michael Ruzek, LAMCOS INSA de Lyon; Charles Pezerat, LAUM Universite du Maine Keynote: Amiya R.
    [Show full text]
  • Detection of Anomalous Noise Events for Real-Time Road
    Noise Mapp. 2018; 5:71–85 Research Article Francesc Alías*, Rosa Ma Alsina-Pagès, Ferran Orga, and Joan Claudi Socoró Detection of Anomalous Noise Events for Real-Time Road-Traflc Noise Mapping: The DYNAMAP’s project case study https://doi.org/10.1515/noise-2018-0006 1 Introduction Received Dec 28, 2017; accepted Jun 26, 2018 Abstract: Environmental noise is increasing year after year, Environmental noise is increasing year after year and be- especially in urban and suburban areas. Besides annoy- coming a growing concern in urban and suburban areas, ance, environmental noise also causes harmful health especially in large cities, since it does not only cause an- effects on people. The Environmental Noise Directive noyance to citizens, but also harmful effects on people. 2002/49/EC (END) is the main instrument of the European Most of them focus on health-related problems [1], being of Union to identify and combat noise pollution, followed particular worry the impact of noise on children [2], whose by the CNOSSOS-EU methodological framework. In com- population group is especially vulnerable. Other investiga- pliance with the END legislation, the European Member tions have also shown the effects of noise pollution in con- States are required to publish noise maps and action plans centration, sleep and stress [3]. Finally, it is worth mention- every five years. The emergence of Wireless Acoustic Sen- ing that noise exposure does not only affect health, but can sor Networks (WASNs) have changed the paradigm to ad- also affect social and economic aspects [4]. dress the END regulatory requirements, allowing the dy- Among noise sources, road-traffic noise is one ofthe namic ubiquitous measurement of environmental noise main noise pollutants in cities.
    [Show full text]