Researchers have shown growing interest in using deep neural networks (DNNs) to efficiently test the effects of perceptual processes on the evolution of color patterns and morphologies. Whether this is a valid approach remains unclear, as it is unknown whether the relative detectability of ecologically relevant stimuli to DNNs actually matches that of biological neural networks. To test this, we compare image classification performance by humans and six DNNs (AlexNet, VGG-16, VGG-19, ResNet-18, SqueezeNet, and GoogLeNet) trained to detect artificial moths on tree trunks. Moths varied in their degree of crypsis, conferred by different sizes and spatial configurations of transparent wing elements. Like humans, four of six DNN architectures found moths with larger transparent elements harder to detect. However, humans and only one DNN architecture (GoogLeNet) found moths with transparent elements touching one side of the moth's outline harder to detect than moths with untouched outlines. When moths were small, the camouflaging effect of transparent elements touching the moth's outline was reduced for DNNs but enhanced for humans. Prey size can thus interact with camouflage type in opposing directions in humans and DNNs, which warrants a deeper investigation of size interactions with a broader range of stimuli. Overall, our results suggest that humans and DNNs responses had some similarities, but not enough to justify the widespread use of DNNs for studies of camouflage.

Download full-text PDF

Source
http://dx.doi.org/10.1093/jeb/voae146DOI Listing

Publication Analysis

Top Keywords

neural networks
12
humans dnns
12
transparent elements
12
deep neural
8
humans dnn
8
harder detect
8
elements touching
8
moth's outline
8
moths
7
dnns
7

Similar Publications

The human visual system possesses a remarkable ability to detect and process faces across diverse contexts, including the phenomenon of face pareidolia--seeing faces in inanimate objects. Despite extensive research, it remains unclear why the visual system employs such broadly tuned face detection capabilities. We hypothesized that face pareidolia results from the visual system's optimization for recognizing both faces and objects.

View Article and Find Full Text PDF

With the increasing number of patients with Alzheimer's Disease (AD), the demand for early diagnosis and intervention is becoming increasingly urgent. The traditional detection methods for Alzheimer's disease mainly rely on clinical symptoms, biomarkers, and imaging examinations. However, these methods have limitations in the early detection of Alzheimer's disease, such as strong subjectivity in diagnostic criteria, high detection costs, and high misdiagnosis rates.

View Article and Find Full Text PDF

To enhance the intelligent classification of computer vulnerabilities and improve the efficiency and accuracy of network security management, this study delves into the application of a comprehensive classification system that integrates the Memristor Neural Network (MNN) and an improved Temporal Convolutional Neural Network (TCNN) in network security management. This system not only focuses on the precise classification of vulnerability data but also emphasizes its core role in strengthening the network security management framework. Firstly, the study designs and implements a neural network model based on memristors.

View Article and Find Full Text PDF

Modernizing power systems into smart grids has introduced numerous benefits, including enhanced efficiency, reliability, and integration of renewable energy sources. However, this advancement has also increased vulnerability to cyber threats, particularly False Data Injection Attacks (FDIAs). Traditional Intrusion Detection Systems (IDS) often fall short in identifying sophisticated FDIAs due to their reliance on predefined rules and signatures.

View Article and Find Full Text PDF

Software-Defined Networks (SDN) provides more control and network operation over a network infrastructure as an emerging and revolutionary paradigm in networking. Operating the many network applications and preserving the network services and functions, the SDN controller is regarded as the operating system of the SDN-based network architecture. The SDN has several security problems because of its intricate design, even with all its amazing features.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!