C3PO: Database and Benchmark for Early-stage Malicious Activity Detection in 3D Printing

نویسندگان

  • Zhe Li
  • Xiaolong Ma
  • Hongjia Li
  • Qiyuan An
  • Aditya Singh Rathore
  • Qinru Qiu
  • Wenyao Xu
  • Yanzhi Wang
چکیده

Increasing malicious users have sought practices to leverage 3D printing technology to produce unlawful tools in criminal activities. Current regulations are inadequate to deal with the rapid growth of 3D printers. It is of vital importance to enable 3D printers to identify the objects to be printed, so that the manufacturing procedure of an illegal weapon can be terminated at the early stage. Deep learning yields significant rises in performance in the object recognition tasks. However, the lack of large-scale databases in 3D printing domain stalls the advancement of automatic illegal weapon recognition. This paper presents a new 3D printing image database, namely C3PO, which compromises two subsets for the different system working scenarios. We extract images from the numerical control programming code files of 22 3D models, and then categorize the images into 10 distinct labels. The first set consists of 62,200 images which represent the object projections on the three planes in a Cartesian coordinate system. And the second sets consists of sequences of total 671,677 images to simulate the cameras’ captures of the printed objects. Importantly, we demonstrate that the weapons can be recognized in either scenario using deep learning based approaches using our proposed database. The quantitative results are promising, and the future exploration of the database and the crime prevention in 3D printing are demanding tasks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Electrical Energy Demand Modeling of 3D Printing Technology for Sustainable Manufacture

The advent of 3D printers has been embraced globally within few years of its emergence. The surge in the acceptability of rapid manufacturing RM technology can be attributed to the depletion and cost of natural resources, waste reduction and sustainability criterion of manufactured parts. This rapidly evolving 3D printing technologies is predicted to grow exponentially especially for the manufa...

متن کامل

A Review on the Application of 3D Printing Technology in Radiotherapy for Breast Cancer

Breast cancer is considered as one of the main causes of cancer death in women. Early diagnosis and treatment, especially by modern technologies play major roles in management of breast cancer. Radiation therapy is known as one of the main treatment options for breast cancer. Nowadays, 3D printing technology is also used to rapidly construct objects with high quality. Many studies have shown th...

متن کامل

Implications of Malicious 3D Printer Firmware

The utilization of 3D printing technology within the manufacturing process creates an environment that is potentially conducive to malicious activity. Previous research in 3D printing focused on attack vector identification and intellectual property protection. This research develops and implements malicious code using Printrbot’s branch of the open source Marlin 3D printer firmware. Implementa...

متن کامل

The Future of Healthcare Facilities: How Technology and Medical Advances May Shape Hospitals of the Future

In this review article, we aim to depict how healthcare facilities may look in the near future from an architectural design point of view. For this purpose, we review newly introduced technology and medical advances in the field of healthcare, such as artificial intelligence (AI), robotic surgery, 3D printing, and information technology (IT), and suggest how those advances may affect the archit...

متن کامل

Overview of Intrusion Detection Techniques in Database

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018