Deep learning

New Method to Automatically Generate Radar-Camera Datasets for Deep Learning Applications

In recent years, scientists have been working on a variety of systems that can identify and traverse items in their environment. Most of these systems rely on deep learning and machine learning algorithms that use radar and necessitate a large amount of labeled training data.

Despite the enormous advantages of radars over optical sensors, there are currently very few image datasets available for training that comprise data obtained using radar sensors. Labeling radar data is a time- and labor-intensive procedure that is often carried out by manually comparing it to a parallelly acquired image data stream. Furthermore, many open-source radar datasets available are difficult to use for various user applications.

To overcome the issue of data scarcity, University of Arizona researchers have devised a new method for automatically generating datasets with tagged radar data-camera images. It labels the radar point cloud using an object recognition algorithm (YOLO) on the camera image stream and an association technique (the Hungarian algorithm).

The approach works on the idea of using an image-based object detection framework to automatically label the radar data instead of manually looking at images if the camera and radar were staring at the same item.

The approach’s co-calibration, grouping, and association capabilities are three distinguishing properties. The method co-calibrates a radar and its camera to identify how the location of an object detected by the radar would translate into digital pixels on a camera.

They employed a density-based clustering scheme to detect and remove noise/stray radar returns and to segregate radar signals into clusters to discriminate between separate objects.

They employed a Hungarian intra-frame and inter-frame method for the association. In a single frame, the intra-frame HA linked YOLO predictions to co-calibrated radar clusters. On the other hand, the inter-frame HA linked radar clusters for the same object across frames to account for labeling radar data in frames even when optical sensors failed intermittently.

Instead of simply employing the point-cloud distribution or just the micro-doppler data, they suggest using an effective 12-dimensional radar feature vector.

In the future, this approach could aid in the automated production of radar-camera and radar-only datasets. Furthermore, the researchers looked at both proof-of-concept classification techniques based on a radar-camera sensor-fusion and data acquired only by radars.

The team believes that their work is to quickly analyze and train deep-learning models for classifying or tracking objects utilizing sensor fusion. These models can improve the performance of a wide range of robotic systems, from autonomous automobiles to small robots.

Paper: https://ieeexplore.ieee.org/document/9690006

Reference: https://techxplore.com/news/2022-02-method-automatically-radar-camera-datasets-deep.html

Mots-clés : cybersécurité, sécurité informatique, protection des données, menaces cybernétiques, veille cyber, analyse de vulnérabilités, sécurité des réseaux, cyberattaques, conformité RGPD, NIS2, DORA, PCIDSS, DEVSECOPS, eSANTE, intelligence artificielle, IA en cybersécurité, apprentissage automatique, deep learning, algorithmes de sécurité, détection des anomalies, systèmes intelligents, automatisation de la sécurité, IA pour la prévention des cyberattaques.

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Bots et IA biaisées : menaces pour la cybersécurité

Bots et IA biaisées : une menace silencieuse pour la cybersécurité des entreprises Introduction Les…

13 heures ago

Cloudflare en Panne

Cloudflare en Panne : Causes Officielles, Impacts et Risques pour les Entreprises  Le 5 décembre…

14 heures ago

Alerte sur le Malware Brickstorm : Une Menace pour les Infrastructures Critiques

Introduction La cybersécurité est aujourd’hui une priorité mondiale. Récemment, la CISA (Cybersecurity and Infrastructure Security…

14 heures ago

Cloud Computing : État de la menace et stratégies de protection

  La transformation numérique face aux nouvelles menaces Le cloud computing s’impose aujourd’hui comme un…

2 jours ago

Attaque DDoS record : Cloudflare face au botnet Aisuru – Une analyse de l’évolution des cybermenaces

Les attaques par déni de service distribué (DDoS) continuent d'évoluer en sophistication et en ampleur,…

2 jours ago

Poèmes Pirates : La Nouvelle Arme Contre Votre IA

Face à l'adoption croissante des technologies d'IA dans les PME, une nouvelle menace cybersécuritaire émerge…

2 jours ago

This website uses cookies.