-
Beyond Data, Towards Sustainability: A Sydney Case Study on Urban Digital Twins
Authors:
Ammar Sohail,
Bojie Shen,
Muhammad Aamir Cheema,
Mohammed Eunus Ali,
Anwaar Ulhaq,
Muhammad Ali Babar,
Asama Qureshi
Abstract:
As urban areas grapple with unprecedented challenges stemming from population growth and climate change, the emergence of urban digital twins offers a promising solution. This paper presents a case study focusing on Sydney's urban digital twin, a virtual replica integrating diverse real-time and historical data, including weather, crime, emissions, and traffic. Through advanced visualization and d…
▽ More
As urban areas grapple with unprecedented challenges stemming from population growth and climate change, the emergence of urban digital twins offers a promising solution. This paper presents a case study focusing on Sydney's urban digital twin, a virtual replica integrating diverse real-time and historical data, including weather, crime, emissions, and traffic. Through advanced visualization and data analysis techniques, the study explores some applications of this digital twin in urban sustainability, such as spatial ranking of suburbs and automatic identification of correlations between variables. Additionally, the research delves into predictive modeling, employing machine learning to forecast traffic crash risks using environmental data, showcasing the potential for proactive interventions. The contributions of this work lie in the comprehensive exploration of a city-scale digital twin for sustainable urban planning, offering a multifaceted approach to data-driven decision-making.
△ Less
Submitted 7 June, 2024;
originally announced June 2024.
-
MapCoder: Multi-Agent Code Generation for Competitive Problem Solving
Authors:
Md. Ashraful Islam,
Mohammed Eunus Ali,
Md Rizwan Parvez
Abstract:
Code synthesis, which requires a deep understanding of complex natural language problem descriptions, generation of code instructions for complex algorithms and data structures, and the successful execution of comprehensive unit tests, presents a significant challenge. While large language models (LLMs) demonstrate impressive proficiency in natural language processing, their performance in code ge…
▽ More
Code synthesis, which requires a deep understanding of complex natural language problem descriptions, generation of code instructions for complex algorithms and data structures, and the successful execution of comprehensive unit tests, presents a significant challenge. While large language models (LLMs) demonstrate impressive proficiency in natural language processing, their performance in code generation tasks remains limited. In this paper, we introduce a new approach to code generation tasks leveraging multi-agent prompting that uniquely replicates the full cycle of program synthesis as observed in human developers. Our framework, MapCoder, consists of four LLM agents specifically designed to emulate the stages of this cycle: recalling relevant examples, planning, code generation, and debugging. After conducting thorough experiments, with multiple LLM ablations and analyses across eight challenging competitive problem-solving and program synthesis benchmarks, MapCoder showcases remarkable code generation capabilities, achieving new state-of-the-art results (pass@1) on HumanEval (93.9%), MBPP (83.1%), APPS (22.0%), CodeContests (28.5%), and xCodeEval (45.3%). Moreover, our method consistently delivers superior performance across various programming languages and varying problem difficulties. We open-source our framework at https://github.com/Md-Ashraful-Pramanik/MapCoder.
△ Less
Submitted 18 May, 2024;
originally announced May 2024.
-
Trusting the Search: Unraveling Human Trust in Health Information from Google and ChatGPT
Authors:
Xin Sun,
Rongjun Ma,
Xiaochang Zhao,
Zhuying Li,
Janne Lindqvist,
Abdallah El Ali,
Jos A. Bosch
Abstract:
People increasingly rely on online sources for health information seeking due to their convenience and timeliness, traditionally using search engines like Google as the primary search agent. Recently, the emergence of generative Artificial Intelligence (AI) has made Large Language Model (LLM) powered conversational agents such as ChatGPT a viable alternative for health information search. However,…
▽ More
People increasingly rely on online sources for health information seeking due to their convenience and timeliness, traditionally using search engines like Google as the primary search agent. Recently, the emergence of generative Artificial Intelligence (AI) has made Large Language Model (LLM) powered conversational agents such as ChatGPT a viable alternative for health information search. However, while trust is crucial for adopting the online health advice, the factors influencing people's trust judgments in health information provided by LLM-powered conversational agents remain unclear. To address this, we conducted a mixed-methods, within-subjects lab study (N=21) to explore how interactions with different agents (ChatGPT vs. Google) across three health search tasks influence participants' trust judgments of the search results as well as the search agents themselves. Our key findings showed that: (a) participants' trust levels in ChatGPT were significantly higher than Google in the context of health information seeking; (b) there is a significant correlation between trust in health-related information and trust in the search agent, however only for Google; (c) the type of search tasks did not affect participants' perceived trust; and (d) participants' prior knowledge, the style of information presentation, and the interactive manner of using search agents were key determinants of trust in the health-related information. Our study taps into differences in trust perceptions when using traditional search engines compared to LLM-powered conversational agents. We highlight the potential role LLMs play in health-related information-seeking contexts, where they excel as step** stones for further search. We contribute key factors and considerations for ensuring effective and reliable personal health information seeking in the age of generative AI.
△ Less
Submitted 14 March, 2024;
originally announced March 2024.
-
ShareYourReality: Investigating Haptic Feedback and Agency in Virtual Avatar Co-embodiment
Authors:
Karthikeya Puttur Venkatraj,
Wo Meijer,
Monica Perusquía-Hernández,
Gijs Huisman,
Abdallah El Ali
Abstract:
Virtual co-embodiment enables two users to share a single avatar in Virtual Reality (VR). During such experiences, the illusion of shared motion control can break during joint-action activities, highlighting the need for position-aware feedback mechanisms. Drawing on the perceptual crossing paradigm, we explore how haptics can enable non-verbal coordination between co-embodied participants. In a w…
▽ More
Virtual co-embodiment enables two users to share a single avatar in Virtual Reality (VR). During such experiences, the illusion of shared motion control can break during joint-action activities, highlighting the need for position-aware feedback mechanisms. Drawing on the perceptual crossing paradigm, we explore how haptics can enable non-verbal coordination between co-embodied participants. In a within-subjects study (20 participant pairs), we examined the effects of vibrotactile haptic feedback (None, Present) and avatar control distribution (25-75%, 50-50%, 75-25%) across two VR reaching tasks (Targeted, Free-choice) on participants Sense of Agency (SoA), co-presence, body ownership, and motion synchrony. We found (a) lower SoA in the free-choice with haptics than without, (b) higher SoA during the shared targeted task, (c) co-presence and body ownership were significantly higher in the free-choice task, (d) players hand motions synchronized more in the targeted task. We provide cautionary considerations when including haptic feedback mechanisms for avatar co-embodiment experiences.
△ Less
Submitted 13 March, 2024;
originally announced March 2024.
-
Transparent AI Disclosure Obligations: Who, What, When, Where, Why, How
Authors:
Abdallah El Ali,
Karthikeya Puttur Venkatraj,
Sophie Morosoli,
Laurens Naudts,
Natali Helberger,
Pablo Cesar
Abstract:
Advances in Generative Artificial Intelligence (AI) are resulting in AI-generated media output that is (nearly) indistinguishable from human-created content. This can drastically impact users and the media sector, especially given global risks of misinformation. While the currently discussed European AI Act aims at addressing these risks through Article 52's AI transparency obligations, its interp…
▽ More
Advances in Generative Artificial Intelligence (AI) are resulting in AI-generated media output that is (nearly) indistinguishable from human-created content. This can drastically impact users and the media sector, especially given global risks of misinformation. While the currently discussed European AI Act aims at addressing these risks through Article 52's AI transparency obligations, its interpretation and implications remain unclear. In this early work, we adopt a participatory AI approach to derive key questions based on Article 52's disclosure obligations. We ran two workshops with researchers, designers, and engineers across disciplines (N=16), where participants deconstructed Article 52's relevant clauses using the 5W1H framework. We contribute a set of 149 questions clustered into five themes and 18 sub-themes. We believe these can not only help inform future legal developments and interpretations of Article 52, but also provide a starting point for Human-Computer Interaction research to (re-)examine disclosure transparency from a human-centered AI lens.
△ Less
Submitted 13 March, 2024; v1 submitted 11 March, 2024;
originally announced March 2024.
-
A Universal Non-Parametric Approach For Improved Molecular Sequence Analysis
Authors:
Sarwan Ali,
Tamkanat E Ali,
Prakash Chourasia,
Murray Patterson
Abstract:
In the field of biological research, it is essential to comprehend the characteristics and functions of molecular sequences. The classification of molecular sequences has seen widespread use of neural network-based techniques. Despite their astounding accuracy, these models often require a substantial number of parameters and more data collection. In this work, we present a novel approach based on…
▽ More
In the field of biological research, it is essential to comprehend the characteristics and functions of molecular sequences. The classification of molecular sequences has seen widespread use of neural network-based techniques. Despite their astounding accuracy, these models often require a substantial number of parameters and more data collection. In this work, we present a novel approach based on the compression-based Model, motivated from \cite{jiang2023low}, which combines the simplicity of basic compression algorithms like Gzip and Bz2, with Normalized Compression Distance (NCD) algorithm to achieve better performance on classification tasks without relying on handcrafted features or pre-trained models. Firstly, we compress the molecular sequence using well-known compression algorithms, such as Gzip and Bz2. By leveraging the latent structure encoded in compressed files, we compute the Normalized Compression Distance between each pair of molecular sequences, which is derived from the Kolmogorov complexity. This gives us a distance matrix, which is the input for generating a kernel matrix using a Gaussian kernel. Next, we employ kernel Principal Component Analysis (PCA) to get the vector representations for the corresponding molecular sequence, capturing important structural and functional information. The resulting vector representations provide an efficient yet effective solution for molecular sequence analysis and can be used in ML-based downstream tasks. The proposed approach eliminates the need for computationally intensive Deep Neural Networks (DNNs), with their large parameter counts and data requirements. Instead, it leverages a lightweight and universally accessible compression-based model.
△ Less
Submitted 12 February, 2024;
originally announced February 2024.
-
Molecular Hybridization Induced Antidam** and Sizable Enhanced Spin-to-Charge Conversion in Co20Fe60B20/$β$-W/C60 Heterostructures
Authors:
Antarjami Sahoo,
Aritra Mukhopadhyaya,
Swayang Priya Mahanta,
Md. Ehesan Ali,
Subhankar Bedanta
Abstract:
Development of power efficient spintronics devices has been the compelling need in the post-CMOS technology era. The effective tunability of spin-orbit-coupling (SOC) in bulk and at the interfaces of hybrid materials stacking is a prerequisite for scaling down the dimension and power consumption of these devices. In this work, we demonstrate the strong chemisorption of C60 molecules when grown on…
▽ More
Development of power efficient spintronics devices has been the compelling need in the post-CMOS technology era. The effective tunability of spin-orbit-coupling (SOC) in bulk and at the interfaces of hybrid materials stacking is a prerequisite for scaling down the dimension and power consumption of these devices. In this work, we demonstrate the strong chemisorption of C60 molecules when grown on the high SOC $β$-W layer. The parent CFB/$β$-W bilayer exhibits large spin-to-charge interconversion efficiency, which can be ascribed to the interfacial SOC observed at the Ferromagnet/Heavy metal interface. Further, the adsorption of C60 molecules on $β$-W reduces the effective Gilbert dam** by $\sim$15% in the CFB/$β$-W/C60 heterostructures. The anti-dam** is accompanied by a gigantic $\sim$115% enhancement in the spin-pum** induced output voltage owing to the molecular hybridization. The non-collinear Density Functional Theory calculations confirm the long-range enhancement of SOC of $β$-W upon the chemisorption of C60 molecules, which in turn can also enhance the SOC at the CFB/$β$-W interface in CFB/$β$-W/C60 heterostructures. The combined amplification of bulk as well interfacial SOC upon molecular hybridization stabilizes the anti-dam** and enhanced spin-to-charge conversion, which can pave the way for the fabrication of power efficient spintronics devices.
△ Less
Submitted 31 December, 2023;
originally announced January 2024.
-
All Rivers Run to the Sea: Private Learning with Asymmetric Flows
Authors:
Yue Niu,
Ramy E. Ali,
Saurav Prakash,
Salman Avestimehr
Abstract:
Data privacy is of great concern in cloud machine-learning service platforms, when sensitive data are exposed to service providers. While private computing environments (e.g., secure enclaves), and cryptographic approaches (e.g., homomorphic encryption) provide strong privacy protection, their computing performance still falls short compared to cloud GPUs. To achieve privacy protection with high c…
▽ More
Data privacy is of great concern in cloud machine-learning service platforms, when sensitive data are exposed to service providers. While private computing environments (e.g., secure enclaves), and cryptographic approaches (e.g., homomorphic encryption) provide strong privacy protection, their computing performance still falls short compared to cloud GPUs. To achieve privacy protection with high computing performance, we propose Delta, a new private training and inference framework, with comparable model performance as non-private centralized training. Delta features two asymmetric data flows: the main information-sensitive flow and the residual flow. The main part flows into a small model while the residuals are offloaded to a large model. Specifically, Delta embeds the information-sensitive representations into a low-dimensional space while pushing the information-insensitive part into high-dimension residuals. To ensure privacy protection, the low-dimensional information-sensitive part is secured and fed to a small model in a private environment. On the other hand, the residual part is sent to fast cloud GPUs, and processed by a large model. To further enhance privacy and reduce the communication cost, Delta applies a random binary quantization technique along with a DP-based technique to the residuals before sharing them with the public platform. We theoretically show that Delta guarantees differential privacy in the public environment and greatly reduces the complexity in the private environment. We conduct empirical analyses on CIFAR-10, CIFAR-100 and ImageNet datasets and ResNet-18 and ResNet-34, showing that Delta achieves strong privacy protection, fast training, and inference without significantly compromising the model utility.
△ Less
Submitted 29 March, 2024; v1 submitted 5 December, 2023;
originally announced December 2023.
-
PhysioCHI: Towards Best Practices for Integrating Physiological Signals in HCI
Authors:
Francesco Chiossi,
Ekaterina R. Stepanova,
Benjamin Tag,
Monica Perusquia-Hernandez,
Alexandra Kitson,
Arindam Dey,
Sven Mayer,
Abdallah El Ali
Abstract:
Recently, we saw a trend toward using physiological signals in interactive systems. These signals, offering deep insights into users' internal states and health, herald a new era for HCI. However, as this is an interdisciplinary approach, many challenges arise for HCI researchers, such as merging diverse disciplines, from understanding physiological functions to design expertise. Also, isolated re…
▽ More
Recently, we saw a trend toward using physiological signals in interactive systems. These signals, offering deep insights into users' internal states and health, herald a new era for HCI. However, as this is an interdisciplinary approach, many challenges arise for HCI researchers, such as merging diverse disciplines, from understanding physiological functions to design expertise. Also, isolated research endeavors limit the scope and reach of findings. This workshop aims to bridge these gaps, fostering cross-disciplinary discussions on usability, open science, and ethics tied to physiological data in HCI. In this workshop, we will discuss best practices for embedding physiological signals in interactive systems. Through collective efforts, we seek to craft a guiding document for best practices in physiological HCI research, ensuring that it remains grounded in shared principles and methodologies as the field advances.
△ Less
Submitted 11 December, 2023; v1 submitted 7 December, 2023;
originally announced December 2023.
-
First Principal Investigations to Explore the Half-metallicity, Structural, Mechanical, and Optoelectronic Properties of Sodium-Based Fluoroperovskites NaYF3 (Y = Sc and Ti) for Applications in Spintronics and Optoelectronics
Authors:
Saeed Ullah,
Uzma Gul,
Saad Tariq,
Riaz Ullah,
Nasir Rahman,
Essam A. Ali,
Mudasser Husain,
Munawar Abbas,
Hafeez Ullah
Abstract:
A theoretical investigation was conducted on Na-based fluoro-perovskites NaYF3 (Y = Sc, Ti) to examine their structural, optical, electronic, and mechanical characteristics for the first time. These cubic compounds exhibit structural stability, maintaining perovskite structures with lattice spacing ranging from 4.15 to 4.26 Å. Computation of elastic parameters confirms their stability, ionic bondi…
▽ More
A theoretical investigation was conducted on Na-based fluoro-perovskites NaYF3 (Y = Sc, Ti) to examine their structural, optical, electronic, and mechanical characteristics for the first time. These cubic compounds exhibit structural stability, maintaining perovskite structures with lattice spacing ranging from 4.15 to 4.26 Å. Computation of elastic parameters confirms their stability, ionic bonding, ductility, and anisotropy. Computed band profiles reveal the half-metallic nature with indirect (M-Γ) bandgaps for the spin-down configurations. Furthermore, density-of-states analysis highlights the role of Y (Sc, Ti) atoms in the metallic character and conduction band contribution. The lack of absorbance in the visible region highlights the materials' suitability for optoelectronic devices. This investigation aims to provide comprehensive insights and encourage further experimental research.
△ Less
Submitted 4 December, 2023;
originally announced December 2023.
-
Towards Detecting, Recognizing, and Parsing the Address Information from Bangla Signboard: A Deep Learning-based Approach
Authors:
Hasan Murad,
Mohammed Eunus Ali
Abstract:
Retrieving textual information from natural scene images is an active research area in the field of computer vision with numerous practical applications. Detecting text regions and extracting text from signboards is a challenging problem due to special characteristics like reflecting lights, uneven illumination, or shadows found in real-life natural scene images. With the advent of deep learning-b…
▽ More
Retrieving textual information from natural scene images is an active research area in the field of computer vision with numerous practical applications. Detecting text regions and extracting text from signboards is a challenging problem due to special characteristics like reflecting lights, uneven illumination, or shadows found in real-life natural scene images. With the advent of deep learning-based methods, different sophisticated techniques have been proposed for text detection and text recognition from the natural scene. Though a significant amount of effort has been devoted to extracting natural scene text for resourceful languages like English, little has been done for low-resource languages like Bangla. In this research work, we have proposed an end-to-end system with deep learning-based models for efficiently detecting, recognizing, correcting, and parsing address information from Bangla signboards. We have created manually annotated datasets and synthetic datasets to train signboard detection, address text detection, address text recognition, address text correction, and address text parser models. We have conducted a comparative study among different CTC-based and Encoder-Decoder model architectures for Bangla address text recognition. Moreover, we have designed a novel address text correction model using a sequence-to-sequence transformer-based network to improve the performance of Bangla address text recognition model by post-correction. Finally, we have developed a Bangla address text parser using the state-of-the-art transformer-based pre-trained language model.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
The Word2vec Graph Model for Author Attribution and Genre Detection in Literary Analysis
Authors:
Nafis Irtiza Tripto,
Mohammed Eunus Ali
Abstract:
Analyzing the writing styles of authors and articles is a key to supporting various literary analyses such as author attribution and genre detection. Over the years, rich sets of features that include stylometry, bag-of-words, n-grams have been widely used to perform such analysis. However, the effectiveness of these features largely depends on the linguistic aspects of a particular language and d…
▽ More
Analyzing the writing styles of authors and articles is a key to supporting various literary analyses such as author attribution and genre detection. Over the years, rich sets of features that include stylometry, bag-of-words, n-grams have been widely used to perform such analysis. However, the effectiveness of these features largely depends on the linguistic aspects of a particular language and datasets specific characteristics. Consequently, techniques based on these feature sets cannot give desired results across domains. In this paper, we propose a novel Word2vec graph based modeling of a document that can rightly capture both context and style of the document. By using these Word2vec graph based features, we perform classification to perform author attribution and genre detection tasks. Our detailed experimental study with a comprehensive set of literary writings shows the effectiveness of this method over traditional feature based approaches. Our code and data are publicly available at https://cutt.ly/svLjSgk
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
Understanding Social Structures from Contemporary Literary Fiction using Character Interaction Graph -- Half Century Chronology of Influential Bengali Writers
Authors:
Nafis Irtiza Tripto,
Mohammed Eunus Ali
Abstract:
Social structures and real-world incidents often influence contemporary literary fiction. Existing research in literary fiction analysis explains these real-world phenomena through the manual critical analysis of stories. Conventional Natural Language Processing (NLP) methodologies, including sentiment analysis, narrative summarization, and topic modeling, have demonstrated substantial efficacy in…
▽ More
Social structures and real-world incidents often influence contemporary literary fiction. Existing research in literary fiction analysis explains these real-world phenomena through the manual critical analysis of stories. Conventional Natural Language Processing (NLP) methodologies, including sentiment analysis, narrative summarization, and topic modeling, have demonstrated substantial efficacy in analyzing and identifying similarities within fictional works. However, the intricate dynamics of character interactions within fiction necessitate a more nuanced approach that incorporates visualization techniques. Character interaction graphs (or networks) emerge as a highly suitable means for visualization and information retrieval from the realm of fiction. Therefore, we leverage character interaction graphs with NLP-derived features to explore a diverse spectrum of societal inquiries about contemporary culture's impact on the landscape of literary fiction. Our study involves constructing character interaction graphs from fiction, extracting relevant graph features, and exploiting these features to resolve various real-life queries. Experimental evaluation of influential Bengali fiction over half a century demonstrates that character interaction graphs can be highly effective in specific assessments and information retrieval from literary fiction. Our data and codebase are available at https://cutt.ly/fbMgGEM
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
User Experience Design Professionals' Perceptions of Generative Artificial Intelligence
Authors:
Jie Li,
Hancheng Cao,
Laura Lin,
Youyang Hou,
Ruihao Zhu,
Abdallah El Ali
Abstract:
Among creative professionals, Generative Artificial Intelligence (GenAI) has sparked excitement over its capabilities and fear over unanticipated consequences. How does GenAI impact User Experience Design (UXD) practice, and are fears warranted? We interviewed 20 UX Designers, with diverse experience and across companies (startups to large enterprises). We probed them to characterize their practic…
▽ More
Among creative professionals, Generative Artificial Intelligence (GenAI) has sparked excitement over its capabilities and fear over unanticipated consequences. How does GenAI impact User Experience Design (UXD) practice, and are fears warranted? We interviewed 20 UX Designers, with diverse experience and across companies (startups to large enterprises). We probed them to characterize their practices, and sample their attitudes, concerns, and expectations. We found that experienced designers are confident in their originality, creativity, and empathic skills, and find GenAI's role as assistive. They emphasized the unique human factors of "enjoyment" and "agency", where humans remain the arbiters of "AI alignment". However, skill degradation, job replacement, and creativity exhaustion can adversely impact junior designers. We discuss implications for human-GenAI collaboration, specifically copyright and ownership, human creativity and agency, and AI literacy and access. Through the lens of responsible and participatory AI, we contribute a deeper understanding of GenAI fears and opportunities for UXD.
△ Less
Submitted 16 February, 2024; v1 submitted 26 September, 2023;
originally announced September 2023.
-
Noise-Tolerant Unsupervised Adapter for Vision-Language Models
Authors:
Eman Ali,
Dayan Guan,
Shijian Lu,
Abdulmotaleb Elsaddik
Abstract:
Recent advances in large-scale vision-language models have achieved very impressive performance in various zero-shot image classification tasks. While prior studies have demonstrated significant improvements by introducing few-shot labelled target samples, they still require labelling of target samples, which greatly degrades their scalability while handling various visual recognition tasks. We de…
▽ More
Recent advances in large-scale vision-language models have achieved very impressive performance in various zero-shot image classification tasks. While prior studies have demonstrated significant improvements by introducing few-shot labelled target samples, they still require labelling of target samples, which greatly degrades their scalability while handling various visual recognition tasks. We design NtUA, a Noise-tolerant Unsupervised Adapter that allows learning superior target models with few-shot unlabelled target samples. NtUA works as a key-value cache that formulates visual features and predicted pseudo-labels of the few-shot unlabelled target samples as key-value pairs. It consists of two complementary designs. The first is adaptive cache formation that combats pseudo-label noises by weighting the key-value pairs according to their prediction confidence. The second is pseudo-label rectification, which corrects both pair values (i.e., pseudo-labels) and cache weights by leveraging knowledge distillation from large-scale vision language models. Extensive experiments show that NtUA achieves superior performance consistently across multiple widely adopted benchmarks.
△ Less
Submitted 26 September, 2023;
originally announced September 2023.
-
Generating Faithful Text From a Knowledge Graph with Noisy Reference Text
Authors:
Tahsina Hashem,
Weiqing Wang,
Derry Tanti Wijaya,
Mohammed Eunus Ali,
Yuan-Fang Li
Abstract:
Knowledge Graph (KG)-to-Text generation aims at generating fluent natural-language text that accurately represents the information of a given knowledge graph. While significant progress has been made in this task by exploiting the power of pre-trained language models (PLMs) with appropriate graph structure-aware modules, existing models still fall short of generating faithful text, especially when…
▽ More
Knowledge Graph (KG)-to-Text generation aims at generating fluent natural-language text that accurately represents the information of a given knowledge graph. While significant progress has been made in this task by exploiting the power of pre-trained language models (PLMs) with appropriate graph structure-aware modules, existing models still fall short of generating faithful text, especially when the ground-truth natural-language text contains additional information that is not present in the graph. In this paper, we develop a KG-to-text generation model that can generate faithful natural-language text from a given graph, in the presence of noisy reference text. Our framework incorporates two core ideas: Firstly, we utilize contrastive learning to enhance the model's ability to differentiate between faithful and hallucinated information in the text, thereby encouraging the decoder to generate text that aligns with the input graph. Secondly, we empower the decoder to control the level of hallucination in the generated text by employing a controllable text generation technique. We evaluate our model's performance through the standard quantitative metrics as well as a ChatGPT-based quantitative and qualitative analysis. Our evaluation demonstrates the superior performance of our model over state-of-the-art KG-to-text models on faithfulness.
△ Less
Submitted 12 August, 2023;
originally announced August 2023.
-
Contrastive Self-Supervised Learning Based Approach for Patient Similarity: A Case Study on Atrial Fibrillation Detection from PPG Signal
Authors:
Subangkar Karmaker Shanto,
Shoumik Saha,
Atif Hasan Rahman,
Mohammad Mehedy Masud,
Mohammed Eunus Ali
Abstract:
In this paper, we propose a novel contrastive learning based deep learning framework for patient similarity search using physiological signals. We use a contrastive learning based approach to learn similar embeddings of patients with similar physiological signal data. We also introduce a number of neighbor selection algorithms to determine the patients with the highest similarity on the generated…
▽ More
In this paper, we propose a novel contrastive learning based deep learning framework for patient similarity search using physiological signals. We use a contrastive learning based approach to learn similar embeddings of patients with similar physiological signal data. We also introduce a number of neighbor selection algorithms to determine the patients with the highest similarity on the generated embeddings. To validate the effectiveness of our framework for measuring patient similarity, we select the detection of Atrial Fibrillation (AF) through photoplethysmography (PPG) signals obtained from smartwatch devices as our case study. We present extensive experimentation of our framework on a dataset of over 170 individuals and compare the performance of our framework with other baseline methods on this dataset.
△ Less
Submitted 22 July, 2023;
originally announced August 2023.
-
Photometric calibration of the Stellar Abundance and Galactic Evolution Survey (SAGES): Nanshan One-meter Wide-field Telescope g, r, and i band imaging data
Authors:
Kai Xiao,
Haibo Yuan,
Bowen Huang,
Shuai Xu,
Jie Zheng,
Chun Li,
Zhou Fan,
Wei Wang,
Gang Zhao,
Guojie Feng,
Xuan Zhang,
**zhong Liu,
Ruoyi Zhang,
Lin Yang,
Yu Zhang,
Chunhai Bai,
Hubiao Niu,
Esamdin Ali,
Lu Ma
Abstract:
In this paper, a total of approximately 2.6 million dwarfs were constructed as standard stars, with an accuracy of about 0.01-0.02 mag for each band, by combining spectroscopic data from the Large Sky Area Multi-Object Fiber Spectroscopic Telescope Data Release 7, photometric data from the corrected Gaia Early Data Release 3, and photometric metallicities. Using the spectroscopy based stellar colo…
▽ More
In this paper, a total of approximately 2.6 million dwarfs were constructed as standard stars, with an accuracy of about 0.01-0.02 mag for each band, by combining spectroscopic data from the Large Sky Area Multi-Object Fiber Spectroscopic Telescope Data Release 7, photometric data from the corrected Gaia Early Data Release 3, and photometric metallicities. Using the spectroscopy based stellar color regression method (SCR method) and the photometric-based SCR method (SCR' method), we performed the relative calibration of the Nanshan One-meter Wide-field Telescope imaging data. Based on the corrected Pan-STARRS DR1 photometry, the absolute calibration was also performed. In the photometric calibration process, we analyzed the dependence of the calibration zero points on different images (observation time), different gates of the CCD detector, and different CCD positions. We found that the stellar flat and the relative gain between different gates depend on time. The amplitude of gain variation in three channels is approximately 0.5%-0.7% relative to the other channel, with a maximum value of 4%. In addition, significant spatial variations of the stellar flat fitting residual are found and corrected. Using repeated sources in the adjacent images, we checked and discovered internal consistency of about 1-2 mmag in all the filters. Using the PS1 magnitudes synthesized by Gaia DR3 BP/RP spectra by the synthetic photometry method, we found that the photometric calibration uniformity is about 1-2 mmag for all the bands, at a spatial resolution of 1.3 degree. A detailed comparison between the spectroscopy-based SCR and photometric-based SCR method magnitude offsets was performed, and we achieved an internal consistency precision of about 2 mmag or better with resolutions of 1.3 degree for all the filters. Which is mainly from the position-dependent errors of the E(B-V) used in SCR' method.
△ Less
Submitted 25 July, 2023;
originally announced July 2023.
-
Ultrafast nonadiabatic electron dynamics in photoexcited C60: A comparative study among DFT exchange-correlation functionals
Authors:
Esam Ali,
Mohamed El-Amine Madjet,
Ruma De,
Thomas Frauenheim,
Himadri S. Chakraborty
Abstract:
The non-radiative electron-relaxation dynamics in C$_{60}$ molecule is studied after selective initial photoexcitations. The methodology includes nonadibabtic molecular simulation combined with time-dependent density functional theory (DFT) and semi-classical surface hop** approach. Results of treating the DFT exchange-correlation (xc) interaction by the non-empirical Perdew-Burke-Ernzerhof (PBE…
▽ More
The non-radiative electron-relaxation dynamics in C$_{60}$ molecule is studied after selective initial photoexcitations. The methodology includes nonadibabtic molecular simulation combined with time-dependent density functional theory (DFT) and semi-classical surface hop** approach. Results of treating the DFT exchange-correlation (xc) interaction by the non-empirical Perdew-Burke-Ernzerhof (PBE), hybrid PBE0, and hybrid Becke 3-parameter Lee-Yang-Parr (B3LYP) functional are compared. Even though some differences in the details are found, all three functionals produce qualitatively similar unoccupied band structures in the ground state. The model-dependent differences in the ultrafast population dynamics, including the occurrences of transient entrapment of population, are studied systematically. The trend of the results demonstrates a universal dependence on the structure of unoccupied band offering a spectroscopic route to probe this structure. Results can be verified, as well as the best xc model for quantitative accuracy can be determined, by comparing with ultrafast transient absorption or time-resolved photoelectron spectroscopy measurements. From the computational standpoint, the study facilitates method optimization to simulate nonadiabatic relaxation dynamics in technologically important fullerene derivatives.
△ Less
Submitted 28 June, 2023;
originally announced June 2023.
-
Real-time Seismic Intensity Prediction using Self-supervised Contrastive GNN for Earthquake Early Warning
Authors:
Rafid Umayer Murshed,
Kazi Noshin,
Md. Anu Zakaria,
Md. Forkan Uddin,
A. F. M. Saiful Amin,
Mohammed Eunus Ali
Abstract:
Seismic intensity prediction from early or initial seismic waves received by a few seismic stations can enhance Earthquake Early Warning (EEW) systems, particularly in ground motion-based approaches like PLUM. While many operational EEW systems currently utilize point-source-based models that estimate the warning area based on magnitude and distance measures, direct intensity prediction offers a p…
▽ More
Seismic intensity prediction from early or initial seismic waves received by a few seismic stations can enhance Earthquake Early Warning (EEW) systems, particularly in ground motion-based approaches like PLUM. While many operational EEW systems currently utilize point-source-based models that estimate the warning area based on magnitude and distance measures, direct intensity prediction offers a potential improvement in accuracy and reliability. In this paper, we propose a novel deep learning approach, Seismic Contrastive Graph Neural Network (SC-GNN), for highly accurate seismic intensity prediction using a small portion of initial seismic waveforms from a few seismic stations. The SC-GNN consists of two key components: (i) a graph neural network (GNN) to propagate spatiotemporal information through a graph-like structure representing seismic station distribution and wave propagation, and (ii) a self-supervised contrastive learning component to train the network with larger time windows and enable predictions using shorter initial waveforms. The efficacy of our approach is demonstrated through experiments on three real-world seismic datasets, where it shows superior performance over existing techniques, including a significant reduction in mean squared error (MSE) and the lowest standard deviation of error, indicating its robustness, reliability, and strong positive relationship between predicted and actual values. Notably, the SC-GNN model maintains superior performance even with 5s input waveforms, making it especially suitable for enhancing EEW applications.
△ Less
Submitted 28 March, 2024; v1 submitted 25 June, 2023;
originally announced June 2023.
-
Enabling Spatial Digital Twins: Technologies, Challenges, and Future Research Directions
Authors:
Mohammed Eunus Ali,
Muhammad Aamir Cheema,
Tanzima Hashem,
Anwaar Ulhaq,
Muhammad Ali Babar
Abstract:
A Digital Twin (DT) is a virtual replica of a physical object or system, created to monitor, analyze, and optimize its behavior and characteristics. A Spatial Digital Twin (SDT) is a specific type of digital twin that emphasizes the geospatial aspects of the physical entity, incorporating precise location and dimensional attributes for a comprehensive understanding within its spatial environment.…
▽ More
A Digital Twin (DT) is a virtual replica of a physical object or system, created to monitor, analyze, and optimize its behavior and characteristics. A Spatial Digital Twin (SDT) is a specific type of digital twin that emphasizes the geospatial aspects of the physical entity, incorporating precise location and dimensional attributes for a comprehensive understanding within its spatial environment. The current body of research on SDTs primarily concentrates on analyzing their potential impact and opportunities within various application domains. As building an SDT is a complex process and requires a variety of spatial computing technologies, it is not straightforward for practitioners and researchers of this multi-disciplinary domain to grasp the underlying details of enabling technologies of the SDT. In this paper, we are the first to systematically analyze different spatial technologies relevant to building an SDT in layered approach (starting from data acquisition to visualization). More specifically, we present the key components of SDTs into four layers of technologies: (i) data acquisition; (ii) spatial database management \& big data analytics systems; (iii) GIS middleware software, maps \& APIs; and (iv) key functional components such as visualizing, querying, mining, simulation and prediction. Moreover, we discuss how modern technologies such as AI/ML, blockchains, and cloud computing can be effectively utilized in enabling and enhancing SDTs. Finally, we identify a number of research challenges and opportunities in SDTs. This work serves as an important resource for SDT researchers and practitioners as it explicitly distinguishes SDTs from traditional DTs, identifies unique applications, outlines the essential technological components of SDTs, and presents a vision for their future development along with the challenges that lie ahead.
△ Less
Submitted 11 June, 2023;
originally announced June 2023.
-
Comments on CausalEC: A Causally Consistent Data Storage Algorithm Based on Cross-Object Erasure Coding
Authors:
Ramy E. Ali
Abstract:
Cadambe and Lyu 2021 presents an erasure coding based algorithm called CausalEC that ensures causal consistency based on cross-object erasure coding. This note shows that the algorithm presented in Cadambe and Lyu 2021 and the main ideas behind it are in essence the same as the algorithm developed in Lyu, Cadambe, Ali and Urgaonkar 2018.
Cadambe and Lyu 2021 presents an erasure coding based algorithm called CausalEC that ensures causal consistency based on cross-object erasure coding. This note shows that the algorithm presented in Cadambe and Lyu 2021 and the main ideas behind it are in essence the same as the algorithm developed in Lyu, Cadambe, Ali and Urgaonkar 2018.
△ Less
Submitted 22 May, 2023;
originally announced May 2023.
-
Designing for Affective Augmentation: Assistive, Harmful, or Unfamiliar?
Authors:
Abdallah El Ali
Abstract:
In what capacity are affective augmentations helpful to humans, and what risks (if any) do they pose? In this position paper, we outline three works on affective augmentation systems, where our studies suggest these systems have the ability to influence our cognitive, affective, and (social) bodily perceptions in perhaps unusual ways. We provide considerations on whether these systems, outside cli…
▽ More
In what capacity are affective augmentations helpful to humans, and what risks (if any) do they pose? In this position paper, we outline three works on affective augmentation systems, where our studies suggest these systems have the ability to influence our cognitive, affective, and (social) bodily perceptions in perhaps unusual ways. We provide considerations on whether these systems, outside clinical settings, are assistive, harmful, or as of now largely unfamiliar to users.
△ Less
Submitted 31 March, 2023;
originally announced March 2023.
-
Social Virtual Reality Avatar Biosignal Animations as Availability Status Indicators
Authors:
Abdallah El Ali,
Sueyoon Lee,
Pablo Cesar
Abstract:
In this position paper, we outline our research challenges in Affective Interactive Systems, and present recent work on visualizing avatar biosignals for social VR entertainment. We highlight considerations for how biosignals animations in social VR spaces can (falsely) indicate users' availability status.
In this position paper, we outline our research challenges in Affective Interactive Systems, and present recent work on visualizing avatar biosignals for social VR entertainment. We highlight considerations for how biosignals animations in social VR spaces can (falsely) indicate users' availability status.
△ Less
Submitted 10 February, 2023;
originally announced February 2023.
-
A simulation-based study of Zero-inflated Bernoulli model with various models for the susceptible probability
Authors:
Essoham Ali,
Kim-Hung Pho
Abstract:
In this work, we are interested in the stability and robustness of the parameter estimation in the Zero-Inflated Bernoulli (ZIBer) model, when the susceptible probability (SP) model is modeled by numerous different binary models: logit, probit, cloglog and generalized extreme value (GEV). To address this problem, we propose the maximum likelihood estimation (MLE) method to check its performance wh…
▽ More
In this work, we are interested in the stability and robustness of the parameter estimation in the Zero-Inflated Bernoulli (ZIBer) model, when the susceptible probability (SP) model is modeled by numerous different binary models: logit, probit, cloglog and generalized extreme value (GEV). To address this problem, we propose the maximum likelihood estimation (MLE) method to check its performance when different SP models are considered. Based on numerical evidences through simulation studies and the analysis of a real data set, it can be seen that the MLE approach has provided accurate and reliable inferences. In addition, it can also be seen that for the empirical analysis, the probit-ZIBer model is probably more suitable for the fishing data set than the other models considered in this study. Besides, the results obtained in the experimental analysis are also very consistent, compatible and very meaningful in practice. It will help us to understand the importance of increasing production while fishing.
△ Less
Submitted 23 January, 2023;
originally announced January 2023.
-
A Hierarchical Approach for Investigating Social Features of a City from Mobile Phone Call Detail Records
Authors:
Fahim Hasan Khan,
Mohammed Eunus Ali
Abstract:
Cellphone service-providers continuously collect Call Detail Records (CDR) as a usage log containing spatio-temporal traces of phone users. We proposed a multi-layered hierarchical analytical model for large spatio-temporal datasets and applied that for the progressive exploration of social features of a city, e.g., social activities, relationships, and groups, from CDR. This approach utilizes CDR…
▽ More
Cellphone service-providers continuously collect Call Detail Records (CDR) as a usage log containing spatio-temporal traces of phone users. We proposed a multi-layered hierarchical analytical model for large spatio-temporal datasets and applied that for the progressive exploration of social features of a city, e.g., social activities, relationships, and groups, from CDR. This approach utilizes CDR as the preliminary input for the initial layer, and analytical results from consecutive layers are added to the knowledge-base to be used in the subsequent layers to explore more detailed social features. Each subsequent layer uses the results from previous layers, facilitating the discovery of more in-depth social features not predictable in a single-layered approach using only raw CDR. This model starts with exploring aggregated overviews of the social features and gradually focuses on comprehensive details of social relationships and groups, which facilitates a novel approach for investigating CDR datasets for the progressive exploration of social features in a densely-populated city.
△ Less
Submitted 10 December, 2022;
originally announced December 2022.
-
A Modified IEEE 802.15.6 MAC Scheme to Enhance Performance of Wireless Body Area Networks in E-health Applications
Authors:
Md. Abubakar Siddik,
Most. Anju Ara Hasi,
Jakia Akter Nitu,
Sumonto Sarker,
Nasrin Sultana,
Emarn Ali
Abstract:
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layers and medium access control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area Networks (WBAN). The medical applications of WBAN has several obligatory requirements and constrains viz. high reliability, strict delay deadlines and low power consumption. The standard IEEE 8…
▽ More
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layers and medium access control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area Networks (WBAN). The medical applications of WBAN has several obligatory requirements and constrains viz. high reliability, strict delay deadlines and low power consumption. The standard IEEE 802.15.6 MAC scheme is not able to fulfil the all requirements of medical applications of WBAN. To address this issue we propose an IEEE 802.15.6-based MAC scheme that is the modification of superframe structure, user priorities and access mechanism of standard IEEE 802.15.6 MAC scheme. The proposed superframe has three access phases: random access phases (RAP), manage access phases (MAP) and contention access phase (CAP). The proposed four user priorities nodes access the channel during RAP using CAMA/CA mechanism with a large value of contention window. The proposed MAC scheme uses RTS/CTS access mechanism instead of basic access mechanism to mitigate the effect of hidden and expose terminal problem. Moreover, we develop an analytical model to evaluate the performance of proposed MAC scheme and solve the analytical model using Maple. The results show that the modified IEEE 802.15.6 MAC scheme achieve the better performance in terms of reliability, throughput, average access delay, energy consumption, channel utilization and fairness compared to standard IEEE 802.15.6 MAC scheme in E-health applications.
△ Less
Submitted 1 September, 2022;
originally announced September 2022.
-
BSpell: A CNN-Blended BERT Based Bangla Spell Checker
Authors:
Chowdhury Rafeed Rahman,
MD. Hasibur Rahman,
Samiha Zakir,
Mohammad Rafsan,
Mohammed Eunus Ali
Abstract:
Bangla ty** is mostly performed using English keyboard and can be highly erroneous due to the presence of compound and similarly pronounced letters. Spelling correction of a misspelled word requires understanding of word ty** pattern as well as the context of the word usage. A specialized BERT model named BSpell has been proposed in this paper targeted towards word for word correction in sente…
▽ More
Bangla ty** is mostly performed using English keyboard and can be highly erroneous due to the presence of compound and similarly pronounced letters. Spelling correction of a misspelled word requires understanding of word ty** pattern as well as the context of the word usage. A specialized BERT model named BSpell has been proposed in this paper targeted towards word for word correction in sentence level. BSpell contains an end-to-end trainable CNN sub-model named SemanticNet along with specialized auxiliary loss. This allows BSpell to specialize in highly inflected Bangla vocabulary in the presence of spelling errors. Furthermore, a hybrid pretraining scheme has been proposed for BSpell that combines word level and character level masking. Comparison on two Bangla and one Hindi spelling correction dataset shows the superiority of our proposed approach. BSpell is available as a Bangla spell checking tool via GitHub: https://github.com/Hasiburshanto/Bangla-Spell-Checker
△ Less
Submitted 31 December, 2023; v1 submitted 20 August, 2022;
originally announced August 2022.
-
Unsupervised Space Partitioning for Nearest Neighbor Search
Authors:
Abrar Fahim,
Mohammed Eunus Ali,
Muhammad Aamir Cheema
Abstract:
Approximate Nearest Neighbor Search (ANNS) in high dimensional spaces is crucial for many real-life applications (e.g., e-commerce, web, multimedia, etc.) dealing with an abundance of data. This paper proposes an end-to-end learning framework that couples the partitioning (one critical step of ANNS) and learning-to-search steps using a custom loss function. A key advantage of our proposed solution…
▽ More
Approximate Nearest Neighbor Search (ANNS) in high dimensional spaces is crucial for many real-life applications (e.g., e-commerce, web, multimedia, etc.) dealing with an abundance of data. This paper proposes an end-to-end learning framework that couples the partitioning (one critical step of ANNS) and learning-to-search steps using a custom loss function. A key advantage of our proposed solution is that it does not require any expensive pre-processing of the dataset, which is one of the critical limitations of the state-of-the-art approach. We achieve the above edge by formulating a multi-objective custom loss function that does not need ground truth labels to quantify the quality of a given data-space partition, making it entirely unsupervised. We also propose an ensembling technique by adding varying input weights to the loss function to train an ensemble of models to enhance the search quality. On several standard benchmarks for ANNS, we show that our method beats the state-of-the-art space partitioning method and the ubiquitous K-means clustering method while using fewer parameters and shorter offline training times. We also show that incorporating our space-partitioning strategy into state-of-the-art ANNS techniques such as ScaNN can improve their performance significantly. Finally, we present our unsupervised partitioning approach as a promising alternative to many widely used clustering methods, such as K-means clustering and DBSCAN.
△ Less
Submitted 19 October, 2022; v1 submitted 16 June, 2022;
originally announced June 2022.
-
Paradigm Shift in Language Modeling: Revisiting CNN for Modeling Sanskrit Originated Bengali and Hindi Language
Authors:
Chowdhury Rafeed Rahman,
MD. Hasibur Rahman,
Mohammad Rafsan,
Samiha Zakir,
Mohammed Eunus Ali,
Rafsanjani Muhammod
Abstract:
Though there has been a large body of recent works in language modeling (LM) for high resource languages such as English and Chinese, the area is still unexplored for low resource languages like Bengali and Hindi. We propose an end to end trainable memory efficient CNN architecture named CoCNN to handle specific characteristics such as high inflection, morphological richness, flexible word order a…
▽ More
Though there has been a large body of recent works in language modeling (LM) for high resource languages such as English and Chinese, the area is still unexplored for low resource languages like Bengali and Hindi. We propose an end to end trainable memory efficient CNN architecture named CoCNN to handle specific characteristics such as high inflection, morphological richness, flexible word order and phonetical spelling errors of Bengali and Hindi. In particular, we introduce two learnable convolutional sub-models at word and at sentence level that are end to end trainable. We show that state-of-the-art (SOTA) Transformer models including pretrained BERT do not necessarily yield the best performance for Bengali and Hindi. CoCNN outperforms pretrained BERT with 16X less parameters, and it achieves much better performance than SOTA LSTM models on multiple real-world datasets. This is the first study on the effectiveness of different architectures drawn from three deep learning paradigms - Convolution, Recurrent, and Transformer neural nets for modeling two widely used languages, Bengali and Hindi.
△ Less
Submitted 4 November, 2021; v1 submitted 25 October, 2021;
originally announced October 2021.
-
Secure Aggregation for Buffered Asynchronous Federated Learning
Authors:
**hyun So,
Ramy E. Ali,
Başak Güler,
A. Salman Avestimehr
Abstract:
Federated learning (FL) typically relies on synchronous training, which is slow due to stragglers. While asynchronous training handles stragglers efficiently, it does not ensure privacy due to the incompatibility with the secure aggregation protocols. A buffered asynchronous training protocol known as FedBuff has been proposed recently which bridges the gap between synchronous and asynchronous tra…
▽ More
Federated learning (FL) typically relies on synchronous training, which is slow due to stragglers. While asynchronous training handles stragglers efficiently, it does not ensure privacy due to the incompatibility with the secure aggregation protocols. A buffered asynchronous training protocol known as FedBuff has been proposed recently which bridges the gap between synchronous and asynchronous training to mitigate stragglers and to also ensure privacy simultaneously. FedBuff allows the users to send their updates asynchronously while ensuring privacy by storing the updates in a trusted execution environment (TEE) enabled private buffer. TEEs, however, have limited memory which limits the buffer size. Motivated by this limitation, we develop a buffered asynchronous secure aggregation (BASecAgg) protocol that does not rely on TEEs. The conventional secure aggregation protocols cannot be applied in the buffered asynchronous setting since the buffer may have local models corresponding to different rounds and hence the masks that the users use to protect their models may not cancel out. BASecAgg addresses this challenge by carefully designing the masks such that they cancel out even if they correspond to different rounds. Our convergence analysis and experiments show that BASecAgg almost has the same convergence guarantees as FedBuff without relying on TEEs.
△ Less
Submitted 5 October, 2021;
originally announced October 2021.
-
3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs
Authors:
Yue Niu,
Ramy E. Ali,
Salman Avestimehr
Abstract:
Leveraging parallel hardware (e.g. GPUs) for deep neural network (DNN) training brings high computing performance. However, it raises data privacy concerns as GPUs lack a trusted environment to protect the data. Trusted execution environments (TEEs) have emerged as a promising solution to achieve privacy-preserving learning. Unfortunately, TEEs' limited computing power renders them not comparable…
▽ More
Leveraging parallel hardware (e.g. GPUs) for deep neural network (DNN) training brings high computing performance. However, it raises data privacy concerns as GPUs lack a trusted environment to protect the data. Trusted execution environments (TEEs) have emerged as a promising solution to achieve privacy-preserving learning. Unfortunately, TEEs' limited computing power renders them not comparable to GPUs in performance. To improve the trade-off among privacy, computing performance, and model accuracy, we propose an \emph{asymmetric} model decomposition framework, \AsymML{}, to (1) accelerate training using parallel hardware; and (2) achieve a strong privacy guarantee using TEEs and differential privacy (DP) with much less accuracy compromised compared to DP-only methods. By exploiting the low-rank characteristics in training data and intermediate features, \AsymML{} asymmetrically decomposes inputs and intermediate activations into low-rank and residual parts. With the decomposed data, the target DNN model is accordingly split into a \emph{trusted} and an \emph{untrusted} part. The trusted part performs computations on low-rank data, with low compute and memory costs. The untrusted part is fed with residuals perturbed by very small noise. Privacy, computing performance, and model accuracy are well managed by respectively delegating the trusted and the untrusted part to TEEs and GPUs. We provide a formal DP guarantee that demonstrates that, for the same privacy guarantee, combining asymmetric data decomposition and DP requires much smaller noise compared to solely using DP without decomposition. This improves the privacy-utility trade-off significantly compared to using only DP methods without decomposition. Furthermore, we present a rank bound analysis showing that the low-rank structure is preserved after each layer across the entire model.
△ Less
Submitted 17 June, 2022; v1 submitted 4 October, 2021;
originally announced October 2021.
-
LightSecAgg: a Lightweight and Versatile Design for Secure Aggregation in Federated Learning
Authors:
**hyun So,
Chaoyang He,
Chien-Sheng Yang,
Songze Li,
Qian Yu,
Ramy E. Ali,
Basak Guler,
Salman Avestimehr
Abstract:
Secure model aggregation is a key component of federated learning (FL) that aims at protecting the privacy of each user's individual model while allowing for their global aggregation. It can be applied to any aggregation-based FL approach for training a global or personalized model. Model aggregation needs to also be resilient against likely user dropouts in FL systems, making its design substanti…
▽ More
Secure model aggregation is a key component of federated learning (FL) that aims at protecting the privacy of each user's individual model while allowing for their global aggregation. It can be applied to any aggregation-based FL approach for training a global or personalized model. Model aggregation needs to also be resilient against likely user dropouts in FL systems, making its design substantially more complex. State-of-the-art secure aggregation protocols rely on secret sharing of the random-seeds used for mask generations at the users to enable the reconstruction and cancellation of those belonging to the dropped users. The complexity of such approaches, however, grows substantially with the number of dropped users. We propose a new approach, named LightSecAgg, to overcome this bottleneck by changing the design from "random-seed reconstruction of the dropped users" to "one-shot aggregate-mask reconstruction of the active users via mask encoding/decoding". We show that LightSecAgg achieves the same privacy and dropout-resiliency guarantees as the state-of-the-art protocols while significantly reducing the overhead for resiliency against dropped users. We also demonstrate that, unlike existing schemes, LightSecAgg can be applied to secure aggregation in the asynchronous FL setting. Furthermore, we provide a modular system design and optimized on-device parallelization for scalable implementation, by enabling computational overlap** between model training and on-device encoding, as well as improving the speed of concurrent receiving and sending of chunked masks. We evaluate LightSecAgg via extensive experiments for training diverse models on various datasets in a realistic FL system with large number of users and demonstrate that LightSecAgg significantly reduces the total training time.
△ Less
Submitted 1 February, 2022; v1 submitted 29 September, 2021;
originally announced September 2021.
-
ApproxIFER: A Model-Agnostic Approach to Resilient and Robust Prediction Serving Systems
Authors:
Mahdi Soleymani,
Ramy E. Ali,
Hessam Mahdavifar,
A. Salman Avestimehr
Abstract:
Due to the surge of cloud-assisted AI services, the problem of designing resilient prediction serving systems that can effectively cope with stragglers/failures and minimize response delays has attracted much interest. The common approach for tackling this problem is replication which assigns the same prediction task to multiple workers. This approach, however, is very inefficient and incurs signi…
▽ More
Due to the surge of cloud-assisted AI services, the problem of designing resilient prediction serving systems that can effectively cope with stragglers/failures and minimize response delays has attracted much interest. The common approach for tackling this problem is replication which assigns the same prediction task to multiple workers. This approach, however, is very inefficient and incurs significant resource overheads. Hence, a learning-based approach known as parity model (ParM) has been recently proposed which learns models that can generate parities for a group of predictions in order to reconstruct the predictions of the slow/failed workers. While this learning-based approach is more resource-efficient than replication, it is tailored to the specific model hosted by the cloud and is particularly suitable for a small number of queries (typically less than four) and tolerating very few (mostly one) number of stragglers. Moreover, ParM does not handle Byzantine adversarial workers. We propose a different approach, named Approximate Coded Inference (ApproxIFER), that does not require training of any parity models, hence it is agnostic to the model hosted by the cloud and can be readily applied to different data domains and model architectures. Compared with earlier works, ApproxIFER can handle a general number of stragglers and scales significantly better with the number of queries. Furthermore, ApproxIFER is robust against Byzantine workers. Our extensive experiments on a large number of datasets and model architectures also show significant accuracy improvement by up to 58% over the parity model approaches.
△ Less
Submitted 20 September, 2021;
originally announced September 2021.
-
DeepAltTrip: Top-k Alternative Itineraries for Trip Recommendation
Authors:
Syed Md. Mukit Rashid,
Mohammed Eunus Ali,
Muhammad Aamir Cheema
Abstract:
Trip itinerary recommendation finds an ordered sequence of Points-of-Interest (POIs) from a large number of candidate POIs in a city. In this paper, we propose a deep learning-based framework, called DeepAltTrip, that learns to recommend top-k alternative itineraries for given source and destination POIs. These alternative itineraries would be not only popular given the historical routes adopted b…
▽ More
Trip itinerary recommendation finds an ordered sequence of Points-of-Interest (POIs) from a large number of candidate POIs in a city. In this paper, we propose a deep learning-based framework, called DeepAltTrip, that learns to recommend top-k alternative itineraries for given source and destination POIs. These alternative itineraries would be not only popular given the historical routes adopted by past users but also dissimilar (or diverse) to each other. The DeepAltTrip consists of two major components: (i) Itinerary Net (ITRNet) which estimates the likelihood of POIs on an itinerary by using graph autoencoders and two (forward and backward) LSTMs; and (ii) a route generation procedure to generate k diverse itineraries passing through relevant POIs obtained using ITRNet. For the route generation step, we propose a novel sampling algorithm that can seamlessly handle a wide variety of user-defined constraints. To the best of our knowledge, this is the first work that learns from historical trips to provide a set of alternative itineraries to the users. Extensive experiments conducted on eight popular real-world datasets show the effectiveness and efficacy of our approach over state-of-the-art methods.
△ Less
Submitted 8 September, 2021;
originally announced September 2021.
-
Learning Indoor Layouts from Simple Point-Clouds
Authors:
Md. Tareq Mahmood,
Mohammed Eunus Ali
Abstract:
Reconstructing a layout of indoor spaces has been a crucial part of growing indoor location based services. One of the key challenges in the proliferation of indoor location based services is the unavailability of indoor spatial maps due to the complex nature of capturing an indoor space model (e.g., floor plan) of an existing building. In this paper, we propose a system to automatically generate…
▽ More
Reconstructing a layout of indoor spaces has been a crucial part of growing indoor location based services. One of the key challenges in the proliferation of indoor location based services is the unavailability of indoor spatial maps due to the complex nature of capturing an indoor space model (e.g., floor plan) of an existing building. In this paper, we propose a system to automatically generate floor plans that can recognize rooms from the point-clouds obtained through smartphones like Google's Tango. In particular, we propose two approaches - a Recurrent Neural Network based approach using Pointer Network and a Convolutional Neural Network based approach using Mask-RCNN to identify rooms (and thereby floor plans) from point-clouds. Experimental results on different datasets demonstrate approximately 0.80-0.90 Intersection-over-Union scores, which show that our models can effectively identify the rooms and regenerate the shapes of the rooms in heterogeneous environment.
△ Less
Submitted 7 August, 2021;
originally announced August 2021.
-
Adaptive Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
Authors:
Tingting Tang,
Ramy E. Ali,
Hanieh Hashemi,
Tynan Gangwani,
Salman Avestimehr,
Murali Annavaram
Abstract:
Stragglers, Byzantine workers, and data privacy are the main bottlenecks in distributed cloud computing. Some prior works proposed coded computing strategies to jointly address all three challenges. They require either a large number of workers, a significant communication cost or a significant computational complexity to tolerate Byzantine workers. Much of the overhead in prior schemes comes from…
▽ More
Stragglers, Byzantine workers, and data privacy are the main bottlenecks in distributed cloud computing. Some prior works proposed coded computing strategies to jointly address all three challenges. They require either a large number of workers, a significant communication cost or a significant computational complexity to tolerate Byzantine workers. Much of the overhead in prior schemes comes from the fact that they tightly couple coding for all three problems into a single framework. In this paper, we propose Adaptive Verifiable Coded Computing (AVCC) framework that decouples the Byzantine node detection challenge from the straggler tolerance. AVCC leverages coded computing just for handling stragglers and privacy, and then uses an orthogonal approach that leverages verifiable computing to mitigate Byzantine workers. Furthermore, AVCC dynamically adapts its coding scheme to trade-off straggler tolerance with Byzantine protection. We evaluate AVCC on a compute-intensive distributed logistic regression application. Our experiments show that AVCC achieves up to $4.2\times$ speedup and up to $5.1\%$ accuracy improvement over the state-of-the-art Lagrange coded computing approach (LCC). AVCC also speeds up the conventional uncoded implementation of distributed logistic regression by up to $7.6\times$, and improves the test accuracy by up to $12.1\%$.
△ Less
Submitted 22 March, 2022; v1 submitted 27 July, 2021;
originally announced July 2021.
-
Density functional study of the variants of inter-Coulombic decay resonances in the photoionization of Cl@C60
Authors:
Ruma De,
Esam Ali,
Steven T. Manson,
Himadri S. Chakraborty
Abstract:
Inter-Coulombic decay (ICD) resonances in the photoionization of Cl@C60 endofullerene molecule are calculated using a perturbative density functional theory (DFT) method. This is the first ICD study of an open shell atom in a fullerene cage. Three classes of resonances are probed: (i) Cl inner vacancies decaying through C60 outer continua, (ii) C60 inner vacancies decaying through Cl outer continu…
▽ More
Inter-Coulombic decay (ICD) resonances in the photoionization of Cl@C60 endofullerene molecule are calculated using a perturbative density functional theory (DFT) method. This is the first ICD study of an open shell atom in a fullerene cage. Three classes of resonances are probed: (i) Cl inner vacancies decaying through C60 outer continua, (ii) C60 inner vacancies decaying through Cl outer continua, and (iii) inner vacancies of either system decaying through the continua of Cl-C60 hybrid levels, the hybrid Auger-ICD resonances. Comparisons with Ar@C60 results reveal that the properties of hybrid Auger-ICD resonances are affected by the extent of level hybridization.
△ Less
Submitted 10 June, 2021;
originally announced June 2021.
-
Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning
Authors:
**hyun So,
Ramy E. Ali,
Basak Guler,
Jiantao Jiao,
Salman Avestimehr
Abstract:
Secure aggregation is a critical component in federated learning (FL), which enables the server to learn the aggregate model of the users without observing their local models. Conventionally, secure aggregation algorithms focus only on ensuring the privacy of individual users in a single training round. We contend that such designs can lead to significant privacy leakages over multiple training ro…
▽ More
Secure aggregation is a critical component in federated learning (FL), which enables the server to learn the aggregate model of the users without observing their local models. Conventionally, secure aggregation algorithms focus only on ensuring the privacy of individual users in a single training round. We contend that such designs can lead to significant privacy leakages over multiple training rounds, due to partial user selection/participation at each round of FL. In fact, we show that the conventional random user selection strategies in FL lead to leaking users' individual models within number of rounds that is linear in the number of users. To address this challenge, we introduce a secure aggregation framework, Multi-RoundSecAgg, with multi-round privacy guarantees. In particular, we introduce a new metric to quantify the privacy guarantees of FL over multiple training rounds, and develop a structured user selection strategy that guarantees the long-term privacy of each user (over any number of training rounds). Our framework also carefully accounts for the fairness and the average number of participating users at each round. Our experiments on MNIST and CIFAR-10 datasets in the IID and the non-IID settings demonstrate the performance improvement over the baselines, both in terms of privacy protection and test accuracy.
△ Less
Submitted 27 July, 2023; v1 submitted 7 June, 2021;
originally announced June 2021.
-
Electron vacancy-level dependent hybrid photoionization of F-@C60+ molecule
Authors:
Esam Ali,
Taylor O'Brien,
Andrew Dennis,
Mohamed El-Amine Madjet,
Steven T. Manson,
Himadri S. Chakraborty
Abstract:
Our previous studies [J. Phys. B 53, 125101 (2020); Euro. Phys. J. D 74, 191 (2020)] have predicted that the atom-fullerene hybrid photoionization properties for X = Cl, Br and I endohedrally confined in C60 are different before and after an electron transfers from C60 to the halogen. It was further found as a rule that the ionization dynamics is insensitive to the C60 level the electron originate…
▽ More
Our previous studies [J. Phys. B 53, 125101 (2020); Euro. Phys. J. D 74, 191 (2020)] have predicted that the atom-fullerene hybrid photoionization properties for X = Cl, Br and I endohedrally confined in C60 are different before and after an electron transfers from C60 to the halogen. It was further found as a rule that the ionization dynamics is insensitive to the C60 level the electron originates from to produce X-@C60+. In the current study, we report an exception to this rule in F@C60. It is found that when the electron vacancy is situated in the C60 level that participates in the hybridization in F-@C60+, the mixing becomes dramatically large leading to strong modifications in the photoionization of the hybrid levels. But when the vacancy is at any other pure level of C60, the level-invariance is retained showing weak hybridization. Even though this case of F@C60 is an anomaly in the halogen@C60 series, the phenomenon can be more general and can occur with compounds of other atoms caged in a variety of fullerenes. In addition, possible experimental studies are suggested to benchmark the present results.
△ Less
Submitted 4 June, 2021;
originally announced June 2021.
-
A Probabilistic Approach to Personalize Type-based Facet Ranking for POI Suggestion
Authors:
Esraa Ali,
Annalina Caputo,
Séamus Lawless,
Owen Conlan
Abstract:
Faceted Search Systems (FSS) have become one of the main search interfaces used in vertical search systems, offering users meaningful facets to refine their search query and narrow down the results quickly to find the intended search target. This work focuses on the problem of ranking type-based facets. In a structured information space, type-based facets (t-facets) indicate the category to which…
▽ More
Faceted Search Systems (FSS) have become one of the main search interfaces used in vertical search systems, offering users meaningful facets to refine their search query and narrow down the results quickly to find the intended search target. This work focuses on the problem of ranking type-based facets. In a structured information space, type-based facets (t-facets) indicate the category to which each object belongs. When they belong to a large multi-level taxonomy, it is desirable to rank them separately before ranking other facet groups. This helps the searcher in filtering the results according to their type first. This also makes it easier to rank the rest of the facets once the type of the intended search target is selected. Existing research employs the same ranking methods for different facet groups. In this research, we propose a two-step approach to personalize t-facet ranking. The first step assigns a relevance score to each individual leaf-node t-facet. The score is generated using probabilistic models and it reflects t-facet relevance to the query and the user profile. In the second step, this score is used to re-order and select the sub-tree to present to the user. We investigate the usefulness of the proposed method to a Point Of Interest (POI) suggestion task. Our evaluation aims at capturing the user effort required to fulfil her search needs by using the ranked facets. The proposed approach achieved better results than other existing personalized baselines.
△ Less
Submitted 10 May, 2021;
originally announced May 2021.
-
Towards SocialVR: Evaluating a Novel Technology for Watching Videos Together
Authors:
Mario Montagud,
Jie Li,
Gianluca Cernigliario,
Abdallah El Ali,
Sergi Fernandez,
Pablo Cesar
Abstract:
Social VR enables people to interact over distance with others in real-time. It allows remote people, typically represented as avatars, to communicate and perform activities together in a join shared virtual environment, extending the capabilities of traditional social platforms like Facebook and Netflix. This paper explores the benefits and drawbacks provided by a lightweight and low-cost Social…
▽ More
Social VR enables people to interact over distance with others in real-time. It allows remote people, typically represented as avatars, to communicate and perform activities together in a join shared virtual environment, extending the capabilities of traditional social platforms like Facebook and Netflix. This paper explores the benefits and drawbacks provided by a lightweight and low-cost Social VR platform (SocialVR), in which users are captured by several cameras and reconstructed in real-time. In particular, the paper contributes with (1) the design and evaluation of an experimental protocol for Social VR experiences; (2) the report of a production workflow for this new type of media experiences; and (3) the results of experiments with both end-users (N=15 pairs) and professionals (N=25) to evaluate the potential of the SocialVR platform. Results from the questionnaires and semi-structured interviews show that end-users rated positively towards the experiences provided by the SocialVR platform, which enabled them to sense emotions and communicate effortlessly. End-users perceived the photo-realistic experience of SocialVR similar to face-to-face scenarios and appreciated this new creative medium. From a commercial perspective, professionals confirmed the potential of this communication medium and encourage further research for the adoption of the platform in the commercial landscape
△ Less
Submitted 11 April, 2021;
originally announced April 2021.
-
Math That Matters: Enhancing Academic Mathematics' Impact on Society
Authors:
Christopher Thron,
Monira Taj Elsir Hamid Ali
Abstract:
Most if not all of today's revolutionary technologies have a common foundation, namely the intelligent use of information. It is clear that computers play a central role: but the contribution of mathematics, though less visible, is no less critical. The conceptual tools and insights provided by mathematics are the keys to unlocking the full information-processing potential of computers. Academic m…
▽ More
Most if not all of today's revolutionary technologies have a common foundation, namely the intelligent use of information. It is clear that computers play a central role: but the contribution of mathematics, though less visible, is no less critical. The conceptual tools and insights provided by mathematics are the keys to unlocking the full information-processing potential of computers. Academic mathematicians now have an unparalleled opportunity to make a huge impact on modern society: but to take advantage of this opportunity, mathematicians must prioritize making these tools and concepts accessible to a wider audience.
In this paper we present three examples of mathematics with significant social benefit: Dmitri Bertsimas' study of diabetes using k-nearest-neighbor methodology; Development of mathematical software (MATLAB and Sage); and ongoing development of data representation and visualization software to facilitate analysis of survey data. We also suggest steps to be taken by academic mathematicians in Nigeria towards enhancing the positive impact of mathematics on society.
△ Less
Submitted 31 March, 2021; v1 submitted 30 March, 2021;
originally announced March 2021.
-
List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier
Authors:
Mahdi Soleymani,
Ramy E. Ali,
Hessam Mahdavifar,
A. Salman Avestimehr
Abstract:
We consider the problem of coded computing, where a computational task is performed in a distributed fashion in the presence of adversarial workers. We propose techniques to break the adversarial toleration threshold barrier previously known in coded computing. More specifically, we leverage list-decoding techniques for folded Reed-Solomon codes and propose novel algorithms to recover the correct…
▽ More
We consider the problem of coded computing, where a computational task is performed in a distributed fashion in the presence of adversarial workers. We propose techniques to break the adversarial toleration threshold barrier previously known in coded computing. More specifically, we leverage list-decoding techniques for folded Reed-Solomon codes and propose novel algorithms to recover the correct codeword using side information. In the coded computing setting, we show how the master node can perform certain carefully designed extra computations to obtain the side information. The workload of computing this side information is negligible compared to the computations done by each worker. This side information is then utilized to prune the output of the list decoder and uniquely recover the true outcome. We further propose folded Lagrange coded computing (FLCC) to incorporate the developed techniques into a specific coded computing setting. Our results show that FLCC outperforms LCC by breaking the barrier on the number of adversaries that can be tolerated. In particular, the corresponding threshold in FLCC is improved by a factor of two asymptotically compared to that of LCC.
△ Less
Submitted 19 August, 2021; v1 submitted 27 January, 2021;
originally announced January 2021.
-
Effect of Fullerene on domain size and relaxation in a perpendicularly magnetized Pt/Co/C60/Pt system
Authors:
Purbasha Sharangi,
Aritra Mukhopadhyaya,
Srijani Mallik,
Md. Ehesan Ali,
Subhankar Bedanta
Abstract:
Buckminsterfullerene (C60) can exhibit ferromagnetism at the interface (called as a spinterface) when it is placed next to a ferromagnet (FM). Formation of such spinterface happens due to orbital hybridization and spin polarized charge transfer at the interface. The spinterface can influence the domain size and dynamics of the organic/ferromagnetic heterostructure. Here, we have performed magnetic…
▽ More
Buckminsterfullerene (C60) can exhibit ferromagnetism at the interface (called as a spinterface) when it is placed next to a ferromagnet (FM). Formation of such spinterface happens due to orbital hybridization and spin polarized charge transfer at the interface. The spinterface can influence the domain size and dynamics of the organic/ferromagnetic heterostructure. Here, we have performed magnetic domain imaging and studied the relaxation dynamics in Pt/Co/C60/Pt system with perpendicular anisotropy. We have compared the results with its parent Pt/Co/Pt system. It is observed that presence of C60 in the Pt/Co/Pt system increases the anisotropy and a decrease in the bubble domain size. Further the switching time of Pt/Co/C60/Pt system is almost two times faster than Pt/Co/Pt system. We have also performed the spin polarized density functional theory (DFT) calculations to understand the underneath mechanism. DFT results show formation of a spin polarized spinterface which leads to an enhancement in anisotropy.
△ Less
Submitted 3 May, 2021; v1 submitted 23 December, 2020;
originally announced December 2020.
-
Ultrafast transfer and transient entrapment of photoexcited Mg electron in Mg@C60
Authors:
Mohamed El-Amine Madjet,
Esam Ali,
Marcelo Carignano,
Oriol Vendrell,
Himadri S. Chakraborty
Abstract:
Electron relaxation is studied in endofullerene Mg@C60, after an initial localized photoexcitation in Mg, by nonadiabtic molecular dynamics simulations. To ensure reliability, two methods are used: i) an independent particle approach with a DFT description of the ground state and ii) HF ground state with many-body effects for the excited state dynamics. Both methods exhibit similar relaxation time…
▽ More
Electron relaxation is studied in endofullerene Mg@C60, after an initial localized photoexcitation in Mg, by nonadiabtic molecular dynamics simulations. To ensure reliability, two methods are used: i) an independent particle approach with a DFT description of the ground state and ii) HF ground state with many-body effects for the excited state dynamics. Both methods exhibit similar relaxation times leading to an ultrafast decay and charge transfer from Mg to C60 within tens of femtoseconds. Method (i) further elicits a robust transient-trap of the transferred electron that can delay the electron-hole recombination. Results shall motivate experiments to probe these ultrafast processes by two-photon transient absorption spectroscopy in gas phase, in solution, or as thin films.
△ Less
Submitted 1 December, 2020;
originally announced December 2020.
-
Monadic Pavlovian associative learning in a backpropagation-free photonic network
Authors:
James Y. S. Tan,
Zengguang Cheng,
Johannes Feldmann,
Xuan Li,
Nathan Youngblood,
Utku E. Ali,
C. David Wright,
Wolfram H. P. Pernice,
Harish Bhaskaran
Abstract:
Over a century ago, Ivan P. Pavlov, in a classic experiment, demonstrated how dogs can learn to associate a ringing bell with food, thereby causing a ring to result in salivation. Today, it is rare to find the use of Pavlovian type associative learning for artificial intelligence (AI) applications even though other learning concepts, in particular backpropagation on artificial neural networks (ANN…
▽ More
Over a century ago, Ivan P. Pavlov, in a classic experiment, demonstrated how dogs can learn to associate a ringing bell with food, thereby causing a ring to result in salivation. Today, it is rare to find the use of Pavlovian type associative learning for artificial intelligence (AI) applications even though other learning concepts, in particular backpropagation on artificial neural networks (ANNs) have flourished. However, training using the backpropagation method on 'conventional' ANNs, especially in the form of modern deep neural networks (DNNs), is computationally and energy intensive. Here we experimentally demonstrate a form of backpropagation-free learning using a single (or monadic) associative hardware element. We realize this on an integrated photonic platform using phase-change materials combined with on-chip cascaded directional couplers. We then develop a scaled-up circuit network using our monadic Pavlovian photonic hardware that delivers a distinct machine-learning framework based on single-element associations and, importantly, using backpropagation-free architectures to address general learning tasks. Our approach reduces the computational burden imposed by learning in conventional neural network approaches, thereby increasing speed, whilst also offering higher bandwidth inherent to our photonic implementation.
△ Less
Submitted 5 August, 2022; v1 submitted 30 November, 2020;
originally announced November 2020.
-
A Survey on Deep Learning Based Point-Of-Interest (POI) Recommendations
Authors:
Md. Ashraful Islam,
Mir Mahathir Mohammad,
Sarkar Snigdha Sarathi Das,
Mohammed Eunus Ali
Abstract:
Location-based Social Networks (LBSNs) enable users to socialize with friends and acquaintances by sharing their check-ins, opinions, photos, and reviews. Huge volume of data generated from LBSNs opens up a new avenue of research that gives birth to a new sub-field of recommendation systems, known as Point-of-Interest (POI) recommendation. A POI recommendation technique essentially exploits users'…
▽ More
Location-based Social Networks (LBSNs) enable users to socialize with friends and acquaintances by sharing their check-ins, opinions, photos, and reviews. Huge volume of data generated from LBSNs opens up a new avenue of research that gives birth to a new sub-field of recommendation systems, known as Point-of-Interest (POI) recommendation. A POI recommendation technique essentially exploits users' historical check-ins and other multi-modal information such as POI attributes and friendship network, to recommend the next set of POIs suitable for a user. A plethora of earlier works focused on traditional machine learning techniques by using hand-crafted features from the dataset. With the recent surge of deep learning research, we have witnessed a large variety of POI recommendation works utilizing different deep learning paradigms. These techniques largely vary in problem formulations, proposed techniques, used datasets, and features, etc. To the best of our knowledge, this work is the first comprehensive survey of all major deep learning-based POI recommendation works. Our work categorizes and critically analyzes the recent POI recommendation works based on different deep learning paradigms and other relevant features. This review can be considered a cookbook for researchers or practitioners working in the area of POI recommendation.
△ Less
Submitted 19 November, 2020;
originally announced November 2020.
-
On Polynomial Approximations for Privacy-Preserving and Verifiable ReLU Networks
Authors:
Ramy E. Ali,
**hyun So,
A. Salman Avestimehr
Abstract:
Outsourcing deep neural networks (DNNs) inference tasks to an untrusted cloud raises data privacy and integrity concerns. While there are many techniques to ensure privacy and integrity for polynomial-based computations, DNNs involve non-polynomial computations. To address these challenges, several privacy-preserving and verifiable inference techniques have been proposed based on replacing the non…
▽ More
Outsourcing deep neural networks (DNNs) inference tasks to an untrusted cloud raises data privacy and integrity concerns. While there are many techniques to ensure privacy and integrity for polynomial-based computations, DNNs involve non-polynomial computations. To address these challenges, several privacy-preserving and verifiable inference techniques have been proposed based on replacing the non-polynomial activation functions such as the rectified linear unit (ReLU) function with polynomial activation functions. Such techniques usually require polynomials with integer coefficients or polynomials over finite fields. Motivated by such requirements, several works proposed replacing the ReLU function with the square function. In this work, we empirically show that the square function is not the best degree-2 polynomial that can replace the ReLU function even when restricting the polynomials to have integer coefficients. We instead propose a degree-2 polynomial activation function with a first order term and empirically show that it can lead to much better models. Our experiments on the CIFAR and Tiny ImageNet datasets on various architectures such as VGG-16 show that our proposed function improves the test accuracy by up to 10.4% compared to the square function.
△ Less
Submitted 6 February, 2024; v1 submitted 10 November, 2020;
originally announced November 2020.
-
BayesBeat: Reliable Atrial Fibrillation Detection from Noisy Photoplethysmography Data
Authors:
Sarkar Snigdha Sarathi Das,
Subangkar Karmaker Shanto,
Masum Rahman,
Md. Saiful Islam,
Atif Rahman,
Mohammad Mehedy Masud,
Mohammed Eunus Ali
Abstract:
Smartwatches or fitness trackers have garnered a lot of popularity as potential health tracking devices due to their affordable and longitudinal monitoring capabilities. To further widen their health tracking capabilities, in recent years researchers have started to look into the possibility of Atrial Fibrillation (AF) detection in real-time leveraging photoplethysmography (PPG) data, an inexpensi…
▽ More
Smartwatches or fitness trackers have garnered a lot of popularity as potential health tracking devices due to their affordable and longitudinal monitoring capabilities. To further widen their health tracking capabilities, in recent years researchers have started to look into the possibility of Atrial Fibrillation (AF) detection in real-time leveraging photoplethysmography (PPG) data, an inexpensive sensor widely available in almost all smartwatches. A significant challenge in AF detection from PPG signals comes from the inherent noise in the smartwatch PPG signals. In this paper, we propose a novel deep learning based approach, BayesBeat that leverages the power of Bayesian deep learning to accurately infer AF risks from noisy PPG signals, and at the same time provides an uncertainty estimate of the prediction. Extensive experiments on two publicly available dataset reveal that our proposed method BayesBeat outperforms the existing state-of-the-art methods. Moreover, BayesBeat is substantially more efficient having 40-200X fewer parameters than state-of-the-art baseline approaches making it suitable for deployment in resource constrained wearable devices.
△ Less
Submitted 16 September, 2022; v1 submitted 2 November, 2020;
originally announced November 2020.