-
Effect of ground-state deformation on the Isoscalar Giant Monopole Resonance and the first observation of overtones of the Isoscalar Giant Quadrupole Resonance in rare-earth Nd isotopes
Authors:
M. Abdullah,
S. Bagchi,
M. N. Harakeh,
H. Akimune,
D. Das,
T. Doi,
L. M. Donaldson,
Y. Fujikawa,
M. Fujiwara,
T. Furuno,
U. Garg,
Y. K. Gupta,
K. B. Howard,
Y. Hijikata,
K. Inaba,
S. Ishida,
M. Itoh,
N. Kalantar-Nayestanaki,
D. Kar,
T. Kawabata,
S. Kawashima,
K. Khokhar,
K. Kitamura,
N. Kobayashi,
Y. Matsuda
, et al. (11 additional authors not shown)
Abstract:
The strength distributions of the Isoscalar Giant Monopole Resonance (ISGMR) and Isoscalar Giant Quadrupole Resonance (ISGQR) in 142,146-150Nd have been determined via inelastic alpha-particle scattering with the Grand Raiden (GR) Spectrometer at the Research Center for Nuclear Physics (RCNP), Japan. In the deformed nuclei 146-150Nd, the ISGMR strength distributions exhibit a splitting into two co…
▽ More
The strength distributions of the Isoscalar Giant Monopole Resonance (ISGMR) and Isoscalar Giant Quadrupole Resonance (ISGQR) in 142,146-150Nd have been determined via inelastic alpha-particle scattering with the Grand Raiden (GR) Spectrometer at the Research Center for Nuclear Physics (RCNP), Japan. In the deformed nuclei 146-150Nd, the ISGMR strength distributions exhibit a splitting into two components, while the nearly spherical nucleus 142Nd displays a single peak in the ISGMR strength distribution. A noteworthy achievement in this study is the first-time detection of overtones in the Isoscalar Giant Quadrupole Resonance (ISGQR) strength distributions within Nd isotopes at an excitation energy around 25 MeV obtained through Multipole Decomposition Analysis (MDA).
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape - A Survey
Authors:
Joshua C. Zhao,
Saurabh Bagchi,
Salman Avestimehr,
Kevin S. Chan,
Somali Chaterji,
Dimitris Dimitriadis,
Jiacheng Li,
Ninghui Li,
Arash Nourian,
Holger R. Roth
Abstract:
Deep learning has shown incredible potential across a vast array of tasks and accompanying this growth has been an insatiable appetite for data. However, a large amount of data needed for enabling deep learning is stored on personal devices and recent concerns on privacy have further highlighted challenges for accessing such data. As a result, federated learning (FL) has emerged as an important pr…
▽ More
Deep learning has shown incredible potential across a vast array of tasks and accompanying this growth has been an insatiable appetite for data. However, a large amount of data needed for enabling deep learning is stored on personal devices and recent concerns on privacy have further highlighted challenges for accessing such data. As a result, federated learning (FL) has emerged as an important privacy-preserving technology enabling collaborative training of machine learning models without the need to send the raw, potentially sensitive, data to a central server. However, the fundamental premise that sending model updates to a server is privacy-preserving only holds if the updates cannot be "reverse engineered" to infer information about the private training data. It has been shown under a wide variety of settings that this premise for privacy does {\em not} hold.
In this survey paper, we provide a comprehensive literature review of the different privacy attacks and defense methods in FL. We identify the current limitations of these attacks and highlight the settings in which FL client privacy can be broken. We dissect some of the successful industry applications of FL and draw lessons for future successful adoption. We survey the emerging landscape of privacy regulation for FL. We conclude with future directions for taking FL toward the cherished goal of generating accurate models while preserving the privacy of the data from its participants.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles
Authors:
Akhil Bandarupalli,
Adithya Bhat,
Saurabh Bagchi,
Aniket Kate,
Chen-Da Liu-Zhang,
Michael K. Reiter
Abstract:
Agreement protocols are crucial in various emerging applications, spanning from distributed (blockchains) oracles to fault-tolerant cyber-physical systems. In scenarios where sensor/oracle nodes measure a common source, maintaining output within the convex range of correct inputs, known as convex validity, is imperative. Present asynchronous convex agreement protocols employ either randomization,…
▽ More
Agreement protocols are crucial in various emerging applications, spanning from distributed (blockchains) oracles to fault-tolerant cyber-physical systems. In scenarios where sensor/oracle nodes measure a common source, maintaining output within the convex range of correct inputs, known as convex validity, is imperative. Present asynchronous convex agreement protocols employ either randomization, incurring substantial computation overhead, or approximate agreement techniques, leading to high $\mathcal{\tilde{O}}(n^3)$ communication for an $n$-node system.
This paper introduces Delphi, a deterministic protocol with $\mathcal{\tilde{O}}(n^2)$ communication and minimal computation overhead. Delphi assumes that honest inputs are bounded, except with negligible probability, and integrates agreement primitives from literature with a novel weighted averaging technique. Experimental results highlight Delphi's superior performance, showcasing a significantly lower latency compared to state-of-the-art protocols. Specifically, for an $n=160$-node system, Delphi achieves an 8x and 3x improvement in latency within CPS and AWS environments, respectively.
△ Less
Submitted 7 May, 2024; v1 submitted 3 May, 2024;
originally announced May 2024.
-
Adversarial Attacks on Reinforcement Learning Agents for Command and Control
Authors:
Ahaan Dabholkar,
James Z. Hare,
Mark Mittrick,
John Richardson,
Nicholas Waytowich,
Priya Narayanan,
Saurabh Bagchi
Abstract:
Given the recent impact of Deep Reinforcement Learning in training agents to win complex games like StarCraft and DoTA(Defense Of The Ancients) - there has been a surge in research for exploiting learning based techniques for professional wargaming, battlefield simulation and modeling. Real time strategy games and simulators have become a valuable resource for operational planning and military res…
▽ More
Given the recent impact of Deep Reinforcement Learning in training agents to win complex games like StarCraft and DoTA(Defense Of The Ancients) - there has been a surge in research for exploiting learning based techniques for professional wargaming, battlefield simulation and modeling. Real time strategy games and simulators have become a valuable resource for operational planning and military research. However, recent work has shown that such learning based approaches are highly susceptible to adversarial perturbations. In this paper, we investigate the robustness of an agent trained for a Command and Control task in an environment that is controlled by an active adversary. The C2 agent is trained on custom StarCraft II maps using the state of the art RL algorithms - A3C and PPO. We empirically show that an agent trained using these algorithms is highly susceptible to noise injected by the adversary and investigate the effects these perturbations have on the performance of the trained agent. Our work highlights the urgent need to develop more robust training algorithms especially for critical arenas like the battlefield.
△ Less
Submitted 1 July, 2024; v1 submitted 2 May, 2024;
originally announced May 2024.
-
L-DIT: A dApp for Live Detectability, Identifiability and Trackability for ASOs on the Behavioral Dynamics Blockchain
Authors:
Anirban Chowdhury,
Yasir Latif,
Moriba K. Jah,
Samya Bagchi
Abstract:
As the number of Anthropogenic Space Objects (ASOs) grows, there is an urgent need to ensure space safety, security, and sustainability (S3) for long-term space use. Currently, no globally effective method can quantify the safety, security, and Sustainability of all ASOs in orbit. Existing methods such as the Space Sustainability Rating (SSR) rely on volunteering private information to provide sus…
▽ More
As the number of Anthropogenic Space Objects (ASOs) grows, there is an urgent need to ensure space safety, security, and sustainability (S3) for long-term space use. Currently, no globally effective method can quantify the safety, security, and Sustainability of all ASOs in orbit. Existing methods such as the Space Sustainability Rating (SSR) rely on volunteering private information to provide sustainability ratings. However, the need for such sensitive data might prove to be a barrier to adoption for space entities. For effective comparison of ASOs, the rating mechanism should apply to all ASOs, even retroactively, so that the sustainability of a single ASO can be assessed holistically. Lastly, geopolitical boundaries and alignments play a crucial and limiting role in a volunteered rating system, limiting the space safety, security, and sustainability. This work presents a Live Detectability, Identifiability, and Trackability (L-DIT) score through a distributed app (dApp) built on top of the Behavioral Dynamics blockchain (BDB). The BDB chain is a space situational awareness (SSA) chain that provides verified and cross-checked ASO data from multiple sources. This unique combination of consensus-based information from BDB and permissionless access to data allows the DIT scoring method presented here to be applied to all ASOs. While the underlying BDB chain collects, filters, and validates SSA data from various open (and closed if available) sources, the L-DIT dApp consumes the data from the chain to provide L-DIT score that can contribute towards an operator's, manufacturer's, or owner's sustainability practices. Our dApp provides data for all ASOs, allowing their sustainability score to be compared against other ASOs, regardless of geopolitical alignments, providing business value to entities such as space insurance providers and enabling compliance validation and enforcement.
△ Less
Submitted 20 June, 2024; v1 submitted 28 April, 2024;
originally announced April 2024.
-
A new approach for deducing rms proton radii from charge-changing reactions of neutron-rich nuclei and the reaction-target dependence
Authors:
J. -C. Zhang,
B. -H. Sun,
I. Tanihata,
R. Kanungo,
C. Scheidenberger,
S. Terashima,
Feng Wang,
F. Ameil,
J. Atkinson,
Y. Ayyad,
S. Bagchi,
D. Cortina-Gil,
I. Dillmann,
A. Estrade,
A. Evdokimov,
F. Farinon,
H. Geissel,
G. Guastalla,
R. Janik,
S. Kaur,
R. Knobel,
J. Kurcewicz,
Yu. A. Litvinov,
M. Marta,
M. Mostazo
, et al. (13 additional authors not shown)
Abstract:
We report the charge-changing cross sections ($σ_{\text{cc}}$) of 24 $p$-shell nuclides on both hydrogen and carbon at about 900$A$ MeV, of which $^{8,9}$Li, $^{10\textendash12}$Be, $^{10,14,15}$B, $^{14,15,17\textendash22}$N and $^{16}$O on hydrogen and $^{8,9}$Li on carbon are for the first time. Benefiting from the data set,we found a new and robust relationship between the scaling factor of th…
▽ More
We report the charge-changing cross sections ($σ_{\text{cc}}$) of 24 $p$-shell nuclides on both hydrogen and carbon at about 900$A$ MeV, of which $^{8,9}$Li, $^{10\textendash12}$Be, $^{10,14,15}$B, $^{14,15,17\textendash22}$N and $^{16}$O on hydrogen and $^{8,9}$Li on carbon are for the first time. Benefiting from the data set,we found a new and robust relationship between the scaling factor of the Glauber model calculations and the separation energies of the nuclei of interest on both targets.This allows us to deduce proton radii ($R_p$) for the first time from the cross sections on hydrogen. Nearly identical $R_p$ values are deduced from both target data for the neutron-rich carbon isotopes, however, the $R_p$ from the hydrogen target is systematically smaller in the neutron-rich nitrogen isotopes.This calls for further experimental and theoretical investigations.
△ Less
Submitted 31 March, 2024;
originally announced April 2024.
-
Leak and Learn: An Attacker's Cookbook to Train Using Leaked Data from Federated Learning
Authors:
Joshua C. Zhao,
Ahaan Dabholkar,
Atul Sharma,
Saurabh Bagchi
Abstract:
Federated learning is a decentralized learning paradigm introduced to preserve privacy of client data. Despite this, prior work has shown that an attacker at the server can still reconstruct the private training data using only the client updates. These attacks are known as data reconstruction attacks and fall into two major categories: gradient inversion (GI) and linear layer leakage attacks (LLL…
▽ More
Federated learning is a decentralized learning paradigm introduced to preserve privacy of client data. Despite this, prior work has shown that an attacker at the server can still reconstruct the private training data using only the client updates. These attacks are known as data reconstruction attacks and fall into two major categories: gradient inversion (GI) and linear layer leakage attacks (LLL). However, despite demonstrating the effectiveness of these attacks in breaching privacy, prior work has not investigated the usefulness of the reconstructed data for downstream tasks. In this work, we explore data reconstruction attacks through the lens of training and improving models with leaked data. We demonstrate the effectiveness of both GI and LLL attacks in maliciously training models using the leaked data more accurately than a benign federated learning strategy. Counter-intuitively, this bump in training quality can occur despite limited reconstruction quality or a small total number of leaked images. Finally, we show the limitations of these attacks for downstream training, individually for GI attacks and for LLL attacks.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
Data-Driven Modeling of Dislocation Mobility from Atomistics using Physics-Informed Machine Learning
Authors:
Yifeng Tian,
Soumendu Bagchi,
Liam Myhill,
Giacomo Po,
Enrique Martinez,
Yen Ting Lin,
Nithin Mathew,
Danny Perez
Abstract:
Dislocation mobility, which dictates the response of dislocations to an applied stress, is a fundamental property of crystalline materials that governs the evolution of plastic deformation. Traditional approaches for deriving mobility laws rely on phenomenological models of the underlying physics, whose free parameters are in turn fitted to a small number of intuition-driven atomic scale simulatio…
▽ More
Dislocation mobility, which dictates the response of dislocations to an applied stress, is a fundamental property of crystalline materials that governs the evolution of plastic deformation. Traditional approaches for deriving mobility laws rely on phenomenological models of the underlying physics, whose free parameters are in turn fitted to a small number of intuition-driven atomic scale simulations under varying conditions of temperature and stress. This tedious and time-consuming approach becomes particularly cumbersome for materials with complex dependencies on stress, temperature, and local environment, such as body-centered cubic crystals (BCC) metals and alloys. In this paper, we present a novel, uncertainty quantification-driven active learning paradigm for learning dislocation mobility laws from automated high-throughput large-scale molecular dynamics simulations, using Graph Neural Networks (GNN) with a physics-informed architecture. We demonstrate that this Physics-informed Graph Neural Network (PI-GNN) framework captures the underlying physics more accurately compared to existing phenomenological mobility laws in BCC metals.
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
Anomalous entropy-driven kinetics of dislocation nucleation
Authors:
Soumendu Bagchi,
Danny Perez
Abstract:
The kinetics of dislocation reactions, such as dislocation multiplication, controls the plastic deformation in crystals beyond their elastic limit, therefore critical mechanisms in a number of applications in materials science. We present a series of large-scale molecular dynamics simulations that shows that one such type of reactions, the nucleation of dislocation at free surfaces, exhibit extrem…
▽ More
The kinetics of dislocation reactions, such as dislocation multiplication, controls the plastic deformation in crystals beyond their elastic limit, therefore critical mechanisms in a number of applications in materials science. We present a series of large-scale molecular dynamics simulations that shows that one such type of reactions, the nucleation of dislocation at free surfaces, exhibit extremely unconventional kinetics, including unexpectedly large nucleation rates under compression, very strong entropic stabilization under tension, as well as strong non-Arrhenius behavior. These unusual kinetics are quantitatively rationalized using a variational transition state theory approach coupled with an efficient numerical scheme for the estimation of vibrational entropy changes. These results highlight the need for a variational treatment of the kinetics to quantitatively capture dislocation reaction kinetics, especially at low-to-moderate strains where large deformations are required to activate reactions. These observations suggest possible explanations to previously observed unconventional deformation kinetics in both molecular dynamics simulations and experiments.
△ Less
Submitted 1 February, 2024;
originally announced February 2024.
-
From anti-Arrhenius to Arrhenius behavior in a dislocation-obstacle bypass: Atomistic Simulations and Theoretical Investigation
Authors:
Mohammadhossein Nahavandian,
Soumit Sarkar,
Soumendu Bagchi,
Danny Perez,
Enrique Martinez
Abstract:
Dislocations are the primary carriers of plasticity in metallic material. Understanding the basic mechanisms for dislocation movement is paramount to predicting the material mechanical response. Relying on atomistic simulations, we observe a transition from non-Arrhenius to Arrhenius behavior in the rate for an edge dislocation to overcome the elastic interaction with a prismatic loop in tungsten.…
▽ More
Dislocations are the primary carriers of plasticity in metallic material. Understanding the basic mechanisms for dislocation movement is paramount to predicting the material mechanical response. Relying on atomistic simulations, we observe a transition from non-Arrhenius to Arrhenius behavior in the rate for an edge dislocation to overcome the elastic interaction with a prismatic loop in tungsten. Beyond the critical resolved shear stress, the process shows a non-Arrhenius behavior at low temperatures. However, as the temperature increases, the activation entropy starts to dominate, leading to a traditional Arrhenius behavior. We have computed the activation entropy analytically along the minimum energy path following Schoeck's methods [1], which capture the cross-over between anti-Arrhenius and Arrhenius domains. Also, the Projected Average Force Integrator (PAFI) [2], another simulation method to compute free energies along an initial transition path, exhibits considerable concurrence with Schoeck's formalism. We conclude that entropic effects need to be considered to understand processes involving dislocations bypassing elastic barriers close to the critical resolved shear stress. More work needs to be performed to fully understand the discrepancies between Schoeck's and PAFI results compared to molecular dynamics.
△ Less
Submitted 14 March, 2024; v1 submitted 8 January, 2024;
originally announced January 2024.
-
Non-Zero Mean Quantum Wishart Distribution Of Random Quantum States And Application
Authors:
Shrobona Bagchi
Abstract:
Random quantum states are useful in various areas of quantum information science. Distributions of random quantum states using Gaussian distributions have been used in various scenarios in quantum information science. One of this is the distribution of random quantum states derived using the Wishart distibution usually used in statistics. This distribution of random quantum states using the Wishar…
▽ More
Random quantum states are useful in various areas of quantum information science. Distributions of random quantum states using Gaussian distributions have been used in various scenarios in quantum information science. One of this is the distribution of random quantum states derived using the Wishart distibution usually used in statistics. This distribution of random quantum states using the Wishart distribution has recently been named as the quantum Wishart distribution \cite{Han}. The quantum Wishart distribution has been found for non-central distribution with a general covariance matrix and zero mean matrix. Here, we find out the closed form expression for the distribution of random quantum states pertaining to non-central Wishart distribution with any general rank one mean matrix and a general covariance matrix for arbitrary dimensions in both real and complex Hilbert space. We term this as the non-zero mean quantum Wishart distribution. We find out the method for the desired placement of its peak position in the real and complex Hilbert space for arbitrary dimensions. We also show an application of this via a fast and efficient algorithm for the random sampling of quantum states, mainly for qubits where the target distribution is a well behaved arbitrary probability distribution function occurring in the context of quantum state estimation experimental data .
△ Less
Submitted 23 January, 2024; v1 submitted 17 November, 2023;
originally announced November 2023.
-
Formation of field-induced breakdown precursors on metallic electrode surfaces
Authors:
Soumendu Bagchi,
Evgenya Simakov,
Danny Perez
Abstract:
Understanding the underlying factors responsible for higher-than-anticipated local field enhancements that trigger vacuum breakdown on pristine metal surfaces is crucial for the development of devices capable of withstanding intense operational fields. In this study, we investigate the behavior of nominally flat copper electrode surfaces exposed to electric fields of hundreds of MV/m. Our novel ap…
▽ More
Understanding the underlying factors responsible for higher-than-anticipated local field enhancements that trigger vacuum breakdown on pristine metal surfaces is crucial for the development of devices capable of withstanding intense operational fields. In this study, we investigate the behavior of nominally flat copper electrode surfaces exposed to electric fields of hundreds of MV/m. Our novel approach considers curvature-driven diffusion processes to elucidate the formation of sharp breakdown precursors. To do so, we develop a mesoscale finite element model that accounts for driving forces arising from both electrostatic and surface-tension-induced contributions to the free energy. Our findings reveal a dual influence: surface tension tends to mitigate local curvature, while the electric field drives mass transport toward regions of high local field density. This phenomenon triggers the growth of sharper protrusions, ultimately leading to a rapid enhancement of local fields and, consequently, system instability. Furthermore, we delineate supercritical and subcritical regimes across a range of initial surface roughness. Our numerical results align closely with experimentally reported data, predicting critical precursor formation fields in the range of 200 MV/m to 500 MV/m.
△ Less
Submitted 11 November, 2023;
originally announced November 2023.
-
Thermal and electric field driven breakdown precursor formation on metal surfaces
Authors:
Ryo Shinohara,
Soumendu Bagchi,
Evgenya Simakov,
Sergey V. Baryshev,
Danny Perez
Abstract:
The phenomenon of electric breakdown poses serious challenge to the design of devices that operate under high gradient environments. Experimental evidence often points towards breakdown events that are accompanied by elevated temperatures and dark current spikes, presumably due to high-asperity nano-structure formation that enhances the local electric field and triggers a runaway process. However,…
▽ More
The phenomenon of electric breakdown poses serious challenge to the design of devices that operate under high gradient environments. Experimental evidence often points towards breakdown events that are accompanied by elevated temperatures and dark current spikes, presumably due to high-asperity nano-structure formation that enhances the local electric field and triggers a runaway process. However, the exact mechanistic origin of such nano-structures under typical macroscopic operational conditions of electric gradient and magnetic-field-mediated heating remains poorly understood. In this work, a model is presented that describes the evolution of a typical copper surface under the combined action of the electric fields and elevated temperatures. Using a mesoscale curvature-driven growth model, we show how the copper surface can undergo a type of dynamical instability that naturally leads to the formation of sharp asperities in realistic experimental conditions. Exploring the combined effect of fields and temperature rise, we identify critical regimes that allow for the formation of breakdown precursors. These regimes strongly resonate with previous experimental findings on breakdown of copper electrodes, hence suggesting surface diffusion to be a crucial breakdown precursor mechanism.
△ Less
Submitted 7 November, 2023; v1 submitted 4 November, 2023;
originally announced November 2023.
-
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions
Authors:
Mustafa Abdallah,
Saurabh Bagchi,
Shaunak D. Bopardikar,
Kevin Chan,
Xing Gao,
Murat Kantarcioglu,
Congmiao Li,
Peng Liu,
Quanyan Zhu
Abstract:
Many of our critical infrastructure systems and personal computing systems have a distributed computing systems structure. The incentives to attack them have been growing rapidly as has their attack surface due to increasing levels of connectedness. Therefore, we feel it is time to bring in rigorous reasoning to secure such systems. The distributed system security and the game theory technical com…
▽ More
Many of our critical infrastructure systems and personal computing systems have a distributed computing systems structure. The incentives to attack them have been growing rapidly as has their attack surface due to increasing levels of connectedness. Therefore, we feel it is time to bring in rigorous reasoning to secure such systems. The distributed system security and the game theory technical communities can come together to effectively address this challenge. In this article, we lay out the foundations from each that we can build upon to achieve our goals. Next, we describe a set of research challenges for the community, organized into three categories -- analytical, systems, and integration challenges, each with "short term" time horizon (2-3 years) and "long term" (5-10 years) items. This article was conceived of through a community discussion at the 2022 NSF SaTC PI meeting.
△ Less
Submitted 28 May, 2024; v1 submitted 3 September, 2023;
originally announced September 2023.
-
Open Government Data Corpus for Table Search
Authors:
Michael Glass,
Sugato Bagchi,
Oktie Hassanzadeh,
Gaetano Rossiello,
Alfio Gliozzo
Abstract:
Increasing amounts of structured data can provide value for research and business if the relevant data can be located. Often the data is in a data lake without a consistent schema, making locating useful data challenging. Table search is a growing research area, but existing benchmarks have been limited to displayed tables. Tables sized and formatted for display in a Wikipedia page or ArXiv paper…
▽ More
Increasing amounts of structured data can provide value for research and business if the relevant data can be located. Often the data is in a data lake without a consistent schema, making locating useful data challenging. Table search is a growing research area, but existing benchmarks have been limited to displayed tables. Tables sized and formatted for display in a Wikipedia page or ArXiv paper are considerably different from data tables in both scale and style. By using metadata associated with open data from government portals, we create the first dataset to benchmark search over data tables at scale. We demonstrate three styles of table-to-table related table search. The three notions of table relatedness are: tables produced by the same organization, tables distributed as part of the same dataset, and tables with a high degree of overlap in the annotated tags. The keyword tags provided with the metadata also permit the automatic creation of a keyword search over tables benchmark. We provide baselines on this dataset using existing methods including traditional and neural approaches.
△ Less
Submitted 24 August, 2023;
originally announced August 2023.
-
A review on the questions of spin and spin quantum correlations in the relativistic regime
Authors:
Shrobona Bagchi
Abstract:
The majority of current understanding of the quantum correlations is in the field of non-relativistic quantum mechanics. To develop quantum information and computation tasks fully, one must inevitably take into account the relativistic effects. In this regard, the spin is one of the central tools. For this purpose, it is of paramount importance to understand and characterize fully the theory of sp…
▽ More
The majority of current understanding of the quantum correlations is in the field of non-relativistic quantum mechanics. To develop quantum information and computation tasks fully, one must inevitably take into account the relativistic effects. In this regard, the spin is one of the central tools. For this purpose, it is of paramount importance to understand and characterize fully the theory of spin in relativistic quantum information theory where the spin states act as qubit. This area is still far from being resolved. As a result, this article will explore the recent studies of the concepts of the spin and spin quantum correlations in inertial frames and some apparent paradoxes regarding this concept. We will mainly focus on the problem of characterizing the spin, reduced spin density matrices and spin quantum correlations in inertial reference frames and the apparent paradoxes involved therein. Another important aspect is the use of tools of quantum field theory to extend several concepts in non-relativistic domain to relativistic one. In this regard, we analyze the development of the theory of relativistic secret sharing and a correlation measure namely the entanglement of purification.
△ Less
Submitted 1 January, 2024; v1 submitted 9 August, 2023;
originally announced August 2023.
-
Increasing the rate capability for the cryogenic stop** cell of the FRS Ion Catcher
Authors:
J. W. Zhao,
D. Amanbayev,
T. Dickel,
I. Miskun,
W. R. Plass,
N. Tortorelli,
S. Ayet San Andres,
Soenke Beck,
J. Bergmann,
Z. Brencic,
P. Constantin,
H. Geissel,
F. Greiner,
L. Groef,
C. Hornung,
N. Kuzminzuk,
G. Kripko-Koncz,
I. Mardor,
I. Pohjalainen,
C. Scheidenberger,
P. G. Thirolf,
S. Bagchi,
E. Haettner,
E. Kazantseva,
D. Kostyleva
, et al. (23 additional authors not shown)
Abstract:
At the FRS Ion Catcher (FRS-IC), projectile and fission fragments are produced at relativistic energies, separated in-flight, energy-bunched, slowed down, and thermalized in the ultra-pure helium gas-filled cryogenic stop** cell (CSC). Thermalized nuclei are extracted from the CSC using a combination of DC and RF electric fields and gas flow. This CSC also serves as the prototype CSC for the Sup…
▽ More
At the FRS Ion Catcher (FRS-IC), projectile and fission fragments are produced at relativistic energies, separated in-flight, energy-bunched, slowed down, and thermalized in the ultra-pure helium gas-filled cryogenic stop** cell (CSC). Thermalized nuclei are extracted from the CSC using a combination of DC and RF electric fields and gas flow. This CSC also serves as the prototype CSC for the Super-FRS, where exotic nuclei will be produced at unprecedented rates making it possible to go towards the extremes of the nuclear chart. Therefore, it is essential to efficiently extract thermalized exotic nuclei from the CSC under high beam rate conditions, in order to use the rare exotic nuclei which come as cocktail beams. The extraction efficiency dependence on the intensity of the im**ing beam into the CSC was studied with a primary beam of 238U and its fragments. Tests were done with two different versions of the DC electrode structure inside the cryogenic chamber, the standard 1 m long and a short 0.5 m long DC electrode. In contrast to the rate capability of 10^4 ions/s with the long DC electrode, results show no extraction efficiency loss up to the rate of 2x10^5 ions/s with the new short DC electrode. This order of magnitude increase of the rate capability paves the way for new experiments at the FRS-IC, including exotic nuclei studies with in-cell multi-nucleon transfer reactions. The results further validate the design concept of the CSC for the Super-FRS, which was developed to effectively manage beams of even higher intensities.
△ Less
Submitted 4 August, 2023;
originally announced August 2023.
-
On some operator-valued Fourier pseudo-multipliers associated to Grushin operators
Authors:
Sayan Bagchi,
Riju Basak,
Rahul Garg,
Abhishek Ghosh
Abstract:
This is a continuation of our work [BBGG23, BBGG22] where we have initiated the study of sparse domination and quantitative weighted estimates for Grushin pseudo-multipliers. In this article, we further extend this analysis to study analogous estimates for a family of operator-valued Fourier pseudo-multipliers associated to Grushin operators…
▽ More
This is a continuation of our work [BBGG23, BBGG22] where we have initiated the study of sparse domination and quantitative weighted estimates for Grushin pseudo-multipliers. In this article, we further extend this analysis to study analogous estimates for a family of operator-valued Fourier pseudo-multipliers associated to Grushin operators $G = - Δ_{x^{\prime}} - |x^{\prime}|^2 Δ_{x^{\prime \prime}}$ on $\mathbb{R}^{n_1+n_2}.$
△ Less
Submitted 19 July, 2023;
originally announced July 2023.
-
Benchmarking Algorithms for Federated Domain Generalization
Authors:
Ruqi Bai,
Saurabh Bagchi,
David I. Inouye
Abstract:
While prior domain generalization (DG) benchmarks consider train-test dataset heterogeneity, we evaluate Federated DG which introduces federated learning (FL) specific challenges. Additionally, we explore domain-based heterogeneity in clients' local datasets - a realistic Federated DG scenario. Prior Federated DG evaluations are limited in terms of the number or heterogeneity of clients and datase…
▽ More
While prior domain generalization (DG) benchmarks consider train-test dataset heterogeneity, we evaluate Federated DG which introduces federated learning (FL) specific challenges. Additionally, we explore domain-based heterogeneity in clients' local datasets - a realistic Federated DG scenario. Prior Federated DG evaluations are limited in terms of the number or heterogeneity of clients and dataset diversity. To address this gap, we propose an Federated DG benchmark methodology that enables control of the number and heterogeneity of clients and provides metrics for dataset difficulty. We then apply our methodology to evaluate 14 Federated DG methods, which include centralized DG methods adapted to the FL context, FL methods that handle client heterogeneity, and methods designed specifically for Federated DG. Our results suggest that despite some progress, there remain significant performance gaps in Federated DG particularly when evaluating with a large number of clients, high client heterogeneity, or more realistic datasets. Please check our extendable benchmark code here: https://github.com/inouye-lab/FedDG_Benchmark.
△ Less
Submitted 10 April, 2024; v1 submitted 10 July, 2023;
originally announced July 2023.
-
Stronger Quantum Speed Limit For Mixed Quantum States
Authors:
Shrobona Bagchi,
Dimpi Thakuria,
Arun Kumar Pati
Abstract:
We derive a quantum speed limit for mixed quantum states using the stronger uncertainty relation for mixed quantum states and unitary evolution. We also show that this bound can be optimized over different choices of operators for obtaining a better bound. We illustrate this bound with some examples and show its better performance with respect to some earlier bounds.
We derive a quantum speed limit for mixed quantum states using the stronger uncertainty relation for mixed quantum states and unitary evolution. We also show that this bound can be optimized over different choices of operators for obtaining a better bound. We illustrate this bound with some examples and show its better performance with respect to some earlier bounds.
△ Less
Submitted 12 July, 2023; v1 submitted 5 July, 2023;
originally announced July 2023.
-
EESMR: Energy Efficient BFT-SMR for the masses
Authors:
Adithya Bhat,
Akhil Bandarupalli,
Manish Nagaraj,
Saurabh Bagchi,
Aniket Kate,
Michael K. Reiter
Abstract:
Modern Byzantine Fault-Tolerant State Machine Replication (BFT-SMR) solutions focus on reducing communication complexity, improving throughput, or lowering latency. This work explores the energy efficiency of BFT-SMR protocols. First, we propose a novel SMR protocol that optimizes for the steady state, i.e., when the leader is correct. This is done by reducing the number of required signatures per…
▽ More
Modern Byzantine Fault-Tolerant State Machine Replication (BFT-SMR) solutions focus on reducing communication complexity, improving throughput, or lowering latency. This work explores the energy efficiency of BFT-SMR protocols. First, we propose a novel SMR protocol that optimizes for the steady state, i.e., when the leader is correct. This is done by reducing the number of required signatures per consensus unit and the communication complexity by order of the number of nodes n compared to the state-of-the-art BFT-SMR solutions. Concretely, we employ the idea that a quorum (collection) of signatures on a proposed value is avoidable during the failure-free runs. Second, we model and analyze the energy efficiency of protocols and argue why the steady-state needs to be optimized. Third, we present an application in the cyber-physical system (CPS) setting, where we consider a partially connected system by optionally leveraging wireless multicasts among neighbors. We analytically determine the parameter ranges for when our proposed protocol offers better energy efficiency than communicating with a baseline protocol utilizing an external trusted node. We present a hypergraph-based network model and generalize previous fault tolerance results to the model. Finally, we demonstrate our approach's practicality by analyzing our protocol's energy efficiency through experiments on a CPS test bed. In particular, we observe as high as 64% energy savings when compared to the state-of-the-art SMR solution for n=10 settings using BLE.
△ Less
Submitted 14 October, 2023; v1 submitted 11 April, 2023;
originally announced April 2023.
-
The Resource Problem of Using Linear Layer Leakage Attack in Federated Learning
Authors:
Joshua C. Zhao,
Ahmed Roushdy Elkordy,
Atul Sharma,
Yahya H. Ezzeldin,
Salman Avestimehr,
Saurabh Bagchi
Abstract:
Secure aggregation promises a heightened level of privacy in federated learning, maintaining that a server only has access to a decrypted aggregate update. Within this setting, linear layer leakage methods are the only data reconstruction attacks able to scale and achieve a high leakage rate regardless of the number of clients or batch size. This is done through increasing the size of an injected…
▽ More
Secure aggregation promises a heightened level of privacy in federated learning, maintaining that a server only has access to a decrypted aggregate update. Within this setting, linear layer leakage methods are the only data reconstruction attacks able to scale and achieve a high leakage rate regardless of the number of clients or batch size. This is done through increasing the size of an injected fully-connected (FC) layer. However, this results in a resource overhead which grows larger with an increasing number of clients. We show that this resource overhead is caused by an incorrect perspective in all prior work that treats an attack on an aggregate update in the same way as an individual update with a larger batch size. Instead, by attacking the update from the perspective that aggregation is combining multiple individual updates, this allows the application of sparsity to alleviate resource overhead. We show that the use of sparsity can decrease the model size overhead by over 327$\times$ and the computation time by 3.34$\times$ compared to SOTA while maintaining equivalent total leakage rate, 77% even with $1000$ clients in aggregation.
△ Less
Submitted 26 March, 2023;
originally announced March 2023.
-
LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation
Authors:
Joshua C. Zhao,
Atul Sharma,
Ahmed Roushdy Elkordy,
Yahya H. Ezzeldin,
Salman Avestimehr,
Saurabh Bagchi
Abstract:
Federated learning was introduced to enable machine learning over large decentralized datasets while promising privacy by eliminating the need for data sharing. Despite this, prior work has shown that shared gradients often contain private information and attackers can gain knowledge either through malicious modification of the architecture and parameters or by using optimization to approximate us…
▽ More
Federated learning was introduced to enable machine learning over large decentralized datasets while promising privacy by eliminating the need for data sharing. Despite this, prior work has shown that shared gradients often contain private information and attackers can gain knowledge either through malicious modification of the architecture and parameters or by using optimization to approximate user data from the shared gradients. However, prior data reconstruction attacks have been limited in setting and scale, as most works target FedSGD and limit the attack to single-client gradients. Many of these attacks fail in the more practical setting of FedAVG or if updates are aggregated together using secure aggregation. Data reconstruction becomes significantly more difficult, resulting in limited attack scale and/or decreased reconstruction quality. When both FedAVG and secure aggregation are used, there is no current method that is able to attack multiple clients concurrently in a federated learning setting. In this work we introduce LOKI, an attack that overcomes previous limitations and also breaks the anonymity of aggregation as the leaked data is identifiable and directly tied back to the clients they come from. Our design sends clients customized convolutional parameters, and the weight gradients of data points between clients remain separate even through aggregation. With FedAVG and aggregation across 100 clients, prior work can leak less than 1% of images on MNIST, CIFAR-100, and Tiny ImageNet. Using only a single training round, LOKI is able to leak 76-86% of all data samples.
△ Less
Submitted 25 September, 2023; v1 submitted 21 March, 2023;
originally announced March 2023.
-
An Open Dataset of Sensor Data from Soil Sensors and Weather Stations at Production Farms
Authors:
Charilaos Mousoulis,
Pengcheng Wang,
Nguyen Luu Do,
Jose F Waimin,
Nithin Raghunathan,
Rahim Rahimi,
Ali Shakouri,
Saurabh Bagchi
Abstract:
Weather and soil conditions are particularly important when it comes to farming activities. Study of these factors and their role in nutrient and nitrate absorption rates can lead to useful insights with benefits for both the crop yield and the protection of the environment through the more controlled use of fertilizers and chemicals. There is a paucity of public data from rural, agricultural sens…
▽ More
Weather and soil conditions are particularly important when it comes to farming activities. Study of these factors and their role in nutrient and nitrate absorption rates can lead to useful insights with benefits for both the crop yield and the protection of the environment through the more controlled use of fertilizers and chemicals. There is a paucity of public data from rural, agricultural sensor networks. This is partly due to the unique challenges faced during the deployment and maintenance of IoT networks in rural agricultural areas. As part of a 5-year project called WHIN we have been deploying and collecting sensor data from production and experimental agricultural farms in and around Purdue University in Indiana. Here we release a dataset comprising soil sensor data from a representative sample of 3 nodes across 3 production farms, each for 5 months. We correlate this data with the weather data and draw some insights about the absorption of rain in the soil. We provide the dataset at: https://purduewhin.ecn.purdue.edu/dataset2021.
△ Less
Submitted 16 February, 2023;
originally announced February 2023.
-
DAG-based Task Orchestration for Edge Computing
Authors:
Xiang Li,
Mustafa Abdallah,
Shikhar Suryavansh,
Mung Chiang,
Saurabh Bagchi
Abstract:
As we increase the number of personal computing devices that we carry (mobile devices, tablets, e-readers, and laptops) and these come equipped with increasing resources, there is a vast potential computation power that can be utilized from those devices. Edge computing promises to exploit these underlying computation resources closer to users to help run latency-sensitive applications such as aug…
▽ More
As we increase the number of personal computing devices that we carry (mobile devices, tablets, e-readers, and laptops) and these come equipped with increasing resources, there is a vast potential computation power that can be utilized from those devices. Edge computing promises to exploit these underlying computation resources closer to users to help run latency-sensitive applications such as augmented reality and video analytics. However, one key missing piece has been how to incorporate personally owned unmanaged devices into a usable edge computing system. The primary challenges arise due to the heterogeneity, lack of interference management, and unpredictable availability of such devices. In this paper we propose an orchestration framework IBDASH, which orchestrates application tasks on an edge system that comprises a mix of commercial and personal edge devices. IBDASH targets reducing both end-to-end latency of execution and probability of failure for applications that have dependency among tasks, captured by directed acyclic graphs (DAGs). IBDASH takes memory constraints of each edge device and network bandwidth into consideration. To assess the effectiveness of IBDASH, we run real application tasks on real edge devices with widely varying capabilities.We feed these measurements into a simulator that runs IBDASH at scale. Compared to three state-of-the-art edge orchestration schemes, LAVEA, Petrel, and LaTS, and two intuitive baselines, IBDASH reduces the end-to-end latency and probability of failure, by 14% and 41% on average respectively. The main takeaway from our work is that it is feasible to combine personal and commercial devices into a usable edge computing platform, one that delivers low latency and predictable and high availability.
△ Less
Submitted 23 January, 2023;
originally announced January 2023.
-
Quantum Speed Limit From Tighter Uncertainty Relation
Authors:
Shrobona Bagchi,
Abhay Srivastav,
Arun Kumar Pati
Abstract:
The quantum speed limit provides a fundamental bound on how fast a quantum system can evolve between the initial and the final states under any physical operation. The celebrated Mandelstam-Tamm (MT) bound has been widely studied for various quantum systems undergoing unitary time evolution. Here, we prove a new quantum speed limit using the tighter uncertainty relations for pure quantum systems u…
▽ More
The quantum speed limit provides a fundamental bound on how fast a quantum system can evolve between the initial and the final states under any physical operation. The celebrated Mandelstam-Tamm (MT) bound has been widely studied for various quantum systems undergoing unitary time evolution. Here, we prove a new quantum speed limit using the tighter uncertainty relations for pure quantum systems undergoing arbitrary unitary evolution. We also derive a tighter uncertainty relation for mixed quantum states and then derive a new quantum speed limit for mixed quantum states from it such that it reduces to that of the pure quantum states derived from tighter uncertainty relations. We show that the MT bound is a special case of the tighter quantum speed limit derived here. We also show that this bound can be improved when optimized over many different sets of basis vectors. We illustrate the tighter speed limit for pure states with examples using random Hamiltonians and show that the new quantum speed limit outperforms the MT bound.
△ Less
Submitted 30 January, 2023; v1 submitted 26 November, 2022;
originally announced November 2022.
-
Photons are lying about where they have been, again
Authors:
Gregory Reznik,
Carlotta Versmold,
Jan Dziewior,
Florian Huber,
Shrobona Bagchi,
Harald Weinfurter,
Justin Dressel,
Lev Vaidman
Abstract:
Bhati and Arvind [Phys. Lett. A, 127955 (2022)] recently argued that in a specially designed experiment the timing of photon detection events demonstrates photon presence at a location at which they are not present according to the weak value approach. The alleged contradiction is resolved by a subtle interference effect resulting in anomalous sensitivity of the signal imprinted on the postselecte…
▽ More
Bhati and Arvind [Phys. Lett. A, 127955 (2022)] recently argued that in a specially designed experiment the timing of photon detection events demonstrates photon presence at a location at which they are not present according to the weak value approach. The alleged contradiction is resolved by a subtle interference effect resulting in anomalous sensitivity of the signal imprinted on the postselected photons for the interaction at this location, similarly to the case of a nested Mach-Zehnder interferometer with a Dove prism [Quant. Stud.: Mat. Found. 2, 255 (2015)]. We perform an in depth analysis of the characterization of the presence of a pre- and postselected particle at a particular location based on information imprinted on the particle itself. The theoretical results are tested by a computer simulation of the proposed experiment.
△ Less
Submitted 31 March, 2023; v1 submitted 22 November, 2022;
originally announced November 2022.
-
Proceedings of the AI-HRI Symposium at AAAI-FSS 2022
Authors:
Zhao Han,
Emmanuel Senft,
Muneeb I. Ahmad,
Shelly Bagchi,
Amir Yazdani,
Jason R. Wilson,
Boyoung Kim,
Ruchen Wen,
Justin W. Hart,
Daniel Hernández García,
Matteo Leonetti,
Ross Mead,
Reuth Mirsky,
Ahalya Prabhakar,
Megan L. Zimmerman
Abstract:
The Artificial Intelligence (AI) for Human-Robot Interaction (HRI) Symposium has been a successful venue of discussion and collaboration on AI theory and methods aimed at HRI since 2014. This year, after a review of the achievements of the AI-HRI community over the last decade in 2021, we are focusing on a visionary theme: exploring the future of AI-HRI. Accordingly, we added a Blue Sky Ideas trac…
▽ More
The Artificial Intelligence (AI) for Human-Robot Interaction (HRI) Symposium has been a successful venue of discussion and collaboration on AI theory and methods aimed at HRI since 2014. This year, after a review of the achievements of the AI-HRI community over the last decade in 2021, we are focusing on a visionary theme: exploring the future of AI-HRI. Accordingly, we added a Blue Sky Ideas track to foster a forward-thinking discussion on future research at the intersection of AI and HRI. As always, we appreciate all contributions related to any topic on AI/HRI and welcome new researchers who wish to take part in this growing community.
With the success of past symposia, AI-HRI impacts a variety of communities and problems, and has pioneered the discussions in recent trends and interests. This year's AI-HRI Fall Symposium aims to bring together researchers and practitioners from around the globe, representing a number of university, government, and industry laboratories. In doing so, we hope to accelerate research in the field, support technology transition and user adoption, and determine future directions for our group and our research.
△ Less
Submitted 28 November, 2022; v1 submitted 28 September, 2022;
originally announced September 2022.
-
Studying Gamow-Teller transitions and the assignment of isomeric and ground states at $N=50$
Authors:
Ali Mollaebrahimi,
Christine Hornung,
Timo Dickel,
Daler Amanbayev,
Gabriella Kripko-Koncz,
Wolfgang R. Plaß,
Samuel Ayet San Andrés,
Sönke Beck,
Andrey Blazhev,
Julian Bergmann,
Hans Geissel,
Magdalena Górska,
Hubert Grawe,
Florian Greiner,
Emma Haettner,
Nasser Kalantar-Nayestanaki,
Ivan Miskun,
Frédéric Nowacki,
Christoph Scheidenberger,
Soumya Bagchi,
Dimiter L. Balabanski,
Ziga Brencic,
Olga Charviakova,
Paul Constantin,
Masoumeh Dehghan
, et al. (28 additional authors not shown)
Abstract:
Direct mass measurements of neutron-deficient nuclides around the $N=50$ shell closure below $^{100}$Sn were performed at the FRS Ion Catcher (FRS-IC) at GSI, Germany. The nuclei were produced by projectile fragmentation of $^{124}$Xe, separated in the fragment separator FRS and delivered to the FRS-IC. The masses of 14 ground states and two isomers were measured with relative mass uncertainties d…
▽ More
Direct mass measurements of neutron-deficient nuclides around the $N=50$ shell closure below $^{100}$Sn were performed at the FRS Ion Catcher (FRS-IC) at GSI, Germany. The nuclei were produced by projectile fragmentation of $^{124}$Xe, separated in the fragment separator FRS and delivered to the FRS-IC. The masses of 14 ground states and two isomers were measured with relative mass uncertainties down to $1\times 10^{-7}$ using the multiple-reflection time-of-flight mass spectrometer of the FRS-IC, including the first direct mass measurements of $^{98}$Cd and $^{97}$Rh. A new $Q_\mathrm{EC} = 5437\pm67$ keV was obtained for $^{98}$Cd, resulting in a summed Gamow-Teller (GT) strength for the five observed transitions ($0^+\longrightarrow1^+$) as $B(\text{GT})=2.94^{+0.32}_{-0.28}$. Investigation of this result in state-of-the-art shell model approaches sheds light into a better understanding of the GT transitions in even-even isotones at $N=50$. The excitation energy of the long-lived isomeric state in $^{94}$Rh was determined for the first time to be $293\pm 21$ keV. This, together with the shell model calculations, allows the level ordering in $^{94}$Rh to be understood.
△ Less
Submitted 27 September, 2022;
originally announced September 2022.
-
Proton distribution radii of $^{16-24}$O: signatures of new shell closures and neutron skin
Authors:
S. Kaur,
R. Kanungo,
W. Horiuchi,
G. Hagen,
J. D. Holt,
B. S. Hu,
T. Miyagi,
T. Suzuki,
F. Ameil,
J. Atkinson,
Y. Ayyad,
S. Bagchi,
D. Cortina-Gil,
I. Dillmann,
A. Estradé,
A. Evdokimov,
F. Farinon,
H. Geissel,
G. Guastalla,
R. Janik,
R. Knöbel,
J. Kurcewicz,
Yu. A. Litvinov,
M. Marta,
M. Mostazo
, et al. (16 additional authors not shown)
Abstract:
The root mean square radii of the proton density distribution in $^{16-24}$O derived from measurements of charge changing cross sections with a carbon target at $\sim$900$A$ MeV together with the matter radii portray thick neutron skin for $^{22 - 24}$O despite $^{22,24}$O being doubly magic. Imprints of the shell closures at $N$ = 14 and 16 are reflected in local minima of their proton radii that…
▽ More
The root mean square radii of the proton density distribution in $^{16-24}$O derived from measurements of charge changing cross sections with a carbon target at $\sim$900$A$ MeV together with the matter radii portray thick neutron skin for $^{22 - 24}$O despite $^{22,24}$O being doubly magic. Imprints of the shell closures at $N$ = 14 and 16 are reflected in local minima of their proton radii that provide evidence for the tensor interaction causing them. The radii agree with it ab initio calculations employing the chiral NNLO$_{\mathrm{sat}}$ interaction, though skin thickness predictions are challenged. Shell model predictions agree well with the data.
△ Less
Submitted 1 September, 2022;
originally announced September 2022.
-
Anomaly Detection and Inter-Sensor Transfer Learning on Smart Manufacturing Datasets
Authors:
Mustafa Abdallah,
Byung-Gun Joung,
Wo Jae Lee,
Charilaos Mousoulis,
John W. Sutherland,
Saurabh Bagchi
Abstract:
Smart manufacturing systems are being deployed at a growing rate because of their ability to interpret a wide variety of sensed information and act on the knowledge gleaned from system observations. In many cases, the principal goal of the smart manufacturing system is to rapidly detect (or anticipate) failures to reduce operational cost and eliminate downtime. This often boils down to detecting a…
▽ More
Smart manufacturing systems are being deployed at a growing rate because of their ability to interpret a wide variety of sensed information and act on the knowledge gleaned from system observations. In many cases, the principal goal of the smart manufacturing system is to rapidly detect (or anticipate) failures to reduce operational cost and eliminate downtime. This often boils down to detecting anomalies within the sensor date acquired from the system. The smart manufacturing application domain poses certain salient technical challenges. In particular, there are often multiple types of sensors with varying capabilities and costs. The sensor data characteristics change with the operating point of the environment or machines, such as, the RPM of the motor. The anomaly detection process therefore has to be calibrated near an operating point. In this paper, we analyze four datasets from sensors deployed from manufacturing testbeds. We evaluate the performance of several traditional and ML-based forecasting models for predicting the time series of sensor data. Then, considering the sparse data from one kind of sensor, we perform transfer learning from a high data rate sensor to perform defect type classification. Taken together, we show that predictive failure classification can be achieved, thus paving the way for predictive maintenance.
△ Less
Submitted 13 June, 2022;
originally announced June 2022.
-
On extension of Calderón-Zygmund type singular integrals and their commutators
Authors:
Sayan Bagchi,
Rahul Garg,
Joydwip Singh
Abstract:
Motivated by the recent works [Huan Yu, Quansen Jiu, and Dongsheng Li, 2021] and [Yan** Chen and Zihua Guo, 2021], we study the following extension of Calderón-Zygmund type singular integrals $$ T_βf (x) = p.v. \int_{\mathbb{R}^n} \frac{Ω(y)}{|y|^{n-β}} f(x-y) \, dy, $$ for $0 < β< n$, and their commutators. We establish estimates of these singular integrals on Lipschitz spaces, Hardy spaces and…
▽ More
Motivated by the recent works [Huan Yu, Quansen Jiu, and Dongsheng Li, 2021] and [Yan** Chen and Zihua Guo, 2021], we study the following extension of Calderón-Zygmund type singular integrals $$ T_βf (x) = p.v. \int_{\mathbb{R}^n} \frac{Ω(y)}{|y|^{n-β}} f(x-y) \, dy, $$ for $0 < β< n$, and their commutators. We establish estimates of these singular integrals on Lipschitz spaces, Hardy spaces and Muckenhoupt $A_p$-weighted $L^p$-spaces. We also establish Lebesgue and Hardy space estimates of their commutators. Our estimates are uniform in small $β$, and therefore one can pass onto the limits as $β\to 0$ to deduce analogous estimates for the classical Calderón-Zygmund type singular integrals and their commutators.
△ Less
Submitted 26 April, 2022;
originally announced April 2022.
-
An analogue of Ingham's theorem on the Heisenberg group
Authors:
Sayan Bagchi,
Pritam Ganguly,
Jayanta Sarkar,
Sundaram Thangavelu
Abstract:
We prove an exact analogue of Ingham's uncertainty principle for the group Fourier transform on the Heisenberg group. This is accomplished by explicitly constructing compactly supported functions on the Heisenberg group whose operator-valued Fourier transforms have suitable Ingham type decay and proving an analogue of Chernoff's theorem for the family of special Hermite operators.
We prove an exact analogue of Ingham's uncertainty principle for the group Fourier transform on the Heisenberg group. This is accomplished by explicitly constructing compactly supported functions on the Heisenberg group whose operator-valued Fourier transforms have suitable Ingham type decay and proving an analogue of Chernoff's theorem for the family of special Hermite operators.
△ Less
Submitted 21 April, 2022;
originally announced April 2022.
-
Sparse bounds for pseudo-multipliers associated to Grushin operators, II
Authors:
Sayan Bagchi,
Riju Basak,
Rahul Garg,
Abhishek Ghosh
Abstract:
In this article, we establish pointwise sparse domination results for Grushin pseudo-multipliers corresponding to various symbol classes, as a continuation of our investigation initiated in [BBGG21]. As a consequence, we deduce quantitative weighted estimates for these pseudo-multipliers.
In this article, we establish pointwise sparse domination results for Grushin pseudo-multipliers corresponding to various symbol classes, as a continuation of our investigation initiated in [BBGG21]. As a consequence, we deduce quantitative weighted estimates for these pseudo-multipliers.
△ Less
Submitted 21 February, 2022;
originally announced February 2022.
-
Classification and count of binary linear complementary dual group codes
Authors:
Ankan Shaw,
Sanjit Bhowmick,
Satya Bagchi
Abstract:
We establish a complete classification of binary group codes with complementary duals for a finite group and explicitly determine the number of linear complementary dual (LCD) cyclic group codes by using cyclotomic cosets. The dimension and the minimum distance for LCD group codes are explored. Finally, we find a connection between LCD MDS group codes and maximal ideals.
We establish a complete classification of binary group codes with complementary duals for a finite group and explicitly determine the number of linear complementary dual (LCD) cyclic group codes by using cyclotomic cosets. The dimension and the minimum distance for LCD group codes are explored. Finally, we find a connection between LCD MDS group codes and maximal ideals.
△ Less
Submitted 21 January, 2022;
originally announced January 2022.
-
Virtuoso: Video-based Intelligence for real-time tuning on SOCs
Authors:
Jayoung Lee,
PengCheng Wang,
Ran Xu,
Venkat Dasari,
Noah Weston,
Yin Li,
Saurabh Bagchi,
Somali Chaterji
Abstract:
Efficient and adaptive computer vision systems have been proposed to make computer vision tasks, such as image classification and object detection, optimized for embedded or mobile devices. These solutions, quite recent in their origin, focus on optimizing the model (a deep neural network, DNN) or the system by designing an adaptive system with approximation knobs. In spite of several recent effor…
▽ More
Efficient and adaptive computer vision systems have been proposed to make computer vision tasks, such as image classification and object detection, optimized for embedded or mobile devices. These solutions, quite recent in their origin, focus on optimizing the model (a deep neural network, DNN) or the system by designing an adaptive system with approximation knobs. In spite of several recent efforts, we show that existing solutions suffer from two major drawbacks. First, the system does not consider energy consumption of the models while making a decision on which model to run. Second, the evaluation does not consider the practical scenario of contention on the device, due to other co-resident workloads. In this work, we propose an efficient and adaptive video object detection system, Virtuoso, which is jointly optimized for accuracy, energy efficiency, and latency. Underlying Virtuoso is a multi-branch execution kernel that is capable of running at different operating points in the accuracy-energy-latency axes, and a lightweight runtime scheduler to select the best fit execution branch to satisfy the user requirement. To fairly compare with Virtuoso, we benchmark 15 state-of-the-art or widely used protocols, including Faster R-CNN (FRCNN), YOLO v3, SSD, EfficientDet, SELSA, MEGA, REPP, FastAdapt, and our in-house adaptive variants of FRCNN+, YOLO+, SSD+, and EfficientDet+ (our variants have enhanced efficiency for mobiles). With this comprehensive benchmark, Virtuoso has shown superiority to all the above protocols, leading the accuracy frontier at every efficiency level on NVIDIA Jetson mobile GPUs. Specifically, Virtuoso has achieved an accuracy of 63.9%, which is more than 10% higher than some of the popular object detection models, FRCNN at 51.1%, and YOLO at 49.5%.
△ Less
Submitted 24 December, 2021;
originally announced December 2021.
-
Sparse bounds for pseudo-multipliers associated to Grushin operators, I
Authors:
Sayan Bagchi,
Riju Basak,
Rahul Garg,
Abhishek Ghosh
Abstract:
In this article, we prove sharp quantitative weighted $L^p$-estimates for Grushin pseudo-multipliers satisfying Hörmander's condition as an application of pointwise domination of Grushin pseudo-multipliers by appropriate sparse operators.
In this article, we prove sharp quantitative weighted $L^p$-estimates for Grushin pseudo-multipliers satisfying Hörmander's condition as an application of pointwise domination of Grushin pseudo-multipliers by appropriate sparse operators.
△ Less
Submitted 1 June, 2023; v1 submitted 13 December, 2021;
originally announced December 2021.
-
A Class of $(n, k, r, t)_i$ LRCs Via Parity Check Matrix
Authors:
Deep Mukhopadhyay,
Sanjit Bhowmick,
Kalyan Hansda,
Satya Bagchi
Abstract:
A code is called $(n, k, r, t)$ information symbol locally repairable code \big($(n, k, r, t)_i$ LRC\big) if each information coordinate can be achieved by at least $t$ disjoint repair sets, containing at most $r$ other coordinates. This paper considers a class of $(n, k, r, t)_i$ LRCs, where each repair set contains exactly one parity coordinate. We explore the systematic code in terms of the sta…
▽ More
A code is called $(n, k, r, t)$ information symbol locally repairable code \big($(n, k, r, t)_i$ LRC\big) if each information coordinate can be achieved by at least $t$ disjoint repair sets, containing at most $r$ other coordinates. This paper considers a class of $(n, k, r, t)_i$ LRCs, where each repair set contains exactly one parity coordinate. We explore the systematic code in terms of the standard parity check matrix. First, some structural features of the parity check matrix are proposed by showing some connections with the membership matrix and the minimum distance optimality of the code. Next to that, parity check matrix based proofs of various bounds associated with the code are placed. In addition to this, we provide several constructions of optimal $(n, k, r, t)_i$ LRCs, with the help of two Cayley tables of a finite field. Finally, we generalize a result of $q$-ary $(n, k, r)$ LRCs to $q$-ary $(n, k, r, t)$ LRCs.
△ Less
Submitted 24 August, 2022; v1 submitted 10 December, 2021;
originally announced December 2021.
-
Linear complementary dual code-based Multi-secret sharing scheme
Authors:
Haradhan Ghosh,
Sanjit Bhowmick,
Pramod Kumar Maurya,
Satya Bagchi
Abstract:
Hiding a secret is needed in many situations. Secret sharing plays an important role in protecting information from getting lost, stolen, or destroyed and has been applicable in recent years. A secret sharing scheme is a cryptographic protocol in which a dealer divides the secret into several pieces of share and one share is given to each participant. To recover the secret, the dealer requires a s…
▽ More
Hiding a secret is needed in many situations. Secret sharing plays an important role in protecting information from getting lost, stolen, or destroyed and has been applicable in recent years. A secret sharing scheme is a cryptographic protocol in which a dealer divides the secret into several pieces of share and one share is given to each participant. To recover the secret, the dealer requires a subset of participants called access structure. In this paper, we present a multi-secret sharing scheme over a local ring based on linear complementary dual codes using Blakley's method. We take a large secret space over a local ring that is greater than other code-based schemes and obtain a perfect and almost ideal scheme.
△ Less
Submitted 10 December, 2021;
originally announced December 2021.
-
Charge-changing cross sections for $^{42\textrm{--}51}$Ca and effect of charged-particle evaporation induced by neutron removal reaction
Authors:
M. Tanaka,
M. Takechi,
A. Homma,
A. Prochazka,
M. Fukuda,
D. Nishimura,
T. Suzuki,
T. Moriguchi,
D. S. Ahn,
A. Aimaganbetov,
M. Amano,
H. Arakawa,
S. Bagchi,
K. -H. Behr,
N. Burtebayev,
K. Chikaato,
H. Du,
T. Fujii,
N. Fukuda,
H. Geissel,
T. Hori,
S. Hoshino,
R. Igosawa,
A. Ikeda,
N. Inabe
, et al. (43 additional authors not shown)
Abstract:
Charge-changing cross sections $σ_\mathrm{CC}$ for $^{42\textrm{--}51}$Ca on a carbon target at around 280~MeV/nucleon have been measured. The measured $σ_\mathrm{CC}$ values differ significantly from the previously developed calculations based on the Glauber model. However, through introduction of the charged-particle evaporation effect induced by the neutron-removal reaction in addition to the G…
▽ More
Charge-changing cross sections $σ_\mathrm{CC}$ for $^{42\textrm{--}51}$Ca on a carbon target at around 280~MeV/nucleon have been measured. The measured $σ_\mathrm{CC}$ values differ significantly from the previously developed calculations based on the Glauber model. However, through introduction of the charged-particle evaporation effect induced by the neutron-removal reaction in addition to the Glauber-model calculation, experimental $σ_\mathrm{CC}$ values on $^{12}$C at around 300~MeV/nucleon for nuclides from C to Fe isotopes are all reproduced with approximately 1\% accuracy. This proposed model systematically reproduces $σ_\mathrm{CC}$ data without phenomenological corrections, and can also explain experimental $σ_\mathrm{CC}$ values obtained in other energy regions.
△ Less
Submitted 26 November, 2021;
originally announced November 2021.
-
On $L^2$-boundedness of pseudo-multipliers associated to the Grushin operator
Authors:
Sayan Bagchi,
Rahul Garg
Abstract:
In this article we define analogues of pseudo-differential operators associated to the joint functional calculus of the Grushin operator using their spectral resolution, and study Calderón--Vaillancourt-type theorems for these operators.
In this article we define analogues of pseudo-differential operators associated to the joint functional calculus of the Grushin operator using their spectral resolution, and study Calderón--Vaillancourt-type theorems for these operators.
△ Less
Submitted 2 February, 2023; v1 submitted 19 November, 2021;
originally announced November 2021.
-
Penetration and Secondary Atomization of Droplets Impacted on Wet Facemasks
Authors:
Sombuddha Bagchi,
Saptarshi Basu,
Swetaprovo Chaudhuri,
Abhishek Saha
Abstract:
Face covering, commonly known as facemask, is considered to be one of the most effective Personal Protective Equipments (PPEs) to reduce transmissions of pathogens through respiratory droplets - both large drops and liquid aerosol particles. Face masks, not only inhibit the expulsion of such respiratory droplets from the user, but also protects the user from inhaling pathogen-laden potentially har…
▽ More
Face covering, commonly known as facemask, is considered to be one of the most effective Personal Protective Equipments (PPEs) to reduce transmissions of pathogens through respiratory droplets - both large drops and liquid aerosol particles. Face masks, not only inhibit the expulsion of such respiratory droplets from the user, but also protects the user from inhaling pathogen-laden potentially harmful droplets or their dried nuclei. While the efficacies of various dry face masks have been explored in the recent past, a comprehensive investigation of a wet mask is lacking. Yet, users wear masks for a long period of time and during this period, owing to respiratory droplets released through multiple respiratory events, the mask matrix becomes wet. We, herein, present an experimental study on the dynamics of sequential impacts of droplets on masks to understand how wetness affects possible penetration and secondary atomization of the impacted droplet. Two different types of masks, hydrophobic and hydrophilic, were used in this study to evaluate the underlying physical mechanism that controls the penetration in each of them.
△ Less
Submitted 2 November, 2021;
originally announced November 2021.
-
Experimental investigation of ground-state properties of $^7$H with transfer reactions
Authors:
M. Caamaño,
T. Roger,
A. M. Moro,
G. F. Grinyer,
J. Pancin,
S. Bagchi,
S. Sambi,
J. Gibelin,
B. Fernandez-Dominguez,
N. Itagaki,
J. Benlliure,
D. Cortina-Gil,
F. Farget,
B. Jacquot,
D. Perez-Loureiro,
B. Pietras,
R. Raabe,
D. Ramos,
C. Rodriguez Tajes,
H. Savajols,
M. Vandebrouck
Abstract:
The properties of nuclei with extreme neutron-to-proton ratios, far from those naturally occurring on Earth, are key to understand nuclear forces and how nucleons hold together to form nuclei. $^7$H, with six neutrons and a single proton, is the nuclear system with the most unbalanced neutron-to-proton ratio known so far. However, its sheer existence and properties are still a challenge for experi…
▽ More
The properties of nuclei with extreme neutron-to-proton ratios, far from those naturally occurring on Earth, are key to understand nuclear forces and how nucleons hold together to form nuclei. $^7$H, with six neutrons and a single proton, is the nuclear system with the most unbalanced neutron-to-proton ratio known so far. However, its sheer existence and properties are still a challenge for experimental efforts and theoretical models. Here we report experimental evidences on the formation of $^7$H as a resonance, detected with independent observables, and the first measurement of the structure of its ground state. The resonance is found at $\sim$0.7 MeV above the $^3$H+4n mass, with a narrow width of $\sim$0.2 MeV and a $1/2^+$ spin and parity. These data are consistent with a $^7$H as a $^3$H core surrounded by an extended four-neutron halo, with a unique four-neutron decay and a relatively long half-life thanks to neutron pairing; a prime example of new phenomena occurring in what would be the most pure-neutron nuclear matter we can access in the laboratory.
△ Less
Submitted 2 March, 2022; v1 submitted 1 November, 2021;
originally announced November 2021.
-
TESSERACT: Gradient Flip Score to Secure Federated Learning Against Model Poisoning Attacks
Authors:
Atul Sharma,
Wei Chen,
Joshua Zhao,
Qiang Qiu,
Somali Chaterji,
Saurabh Bagchi
Abstract:
Federated learning---multi-party, distributed learning in a decentralized environment---is vulnerable to model poisoning attacks, even more so than centralized learning approaches. This is because malicious clients can collude and send in carefully tailored model updates to make the global model inaccurate. This motivated the development of Byzantine-resilient federated learning algorithms, such a…
▽ More
Federated learning---multi-party, distributed learning in a decentralized environment---is vulnerable to model poisoning attacks, even more so than centralized learning approaches. This is because malicious clients can collude and send in carefully tailored model updates to make the global model inaccurate. This motivated the development of Byzantine-resilient federated learning algorithms, such as Krum, Bulyan, FABA, and FoolsGold. However, a recently developed untargeted model poisoning attack showed that all prior defenses can be bypassed. The attack uses the intuition that simply by changing the sign of the gradient updates that the optimizer is computing, for a set of malicious clients, a model can be diverted from the optima to increase the test error rate. In this work, we develop TESSERACT---a defense against this directed deviation attack, a state-of-the-art model poisoning attack. TESSERACT is based on a simple intuition that in a federated learning setting, certain patterns of gradient flips are indicative of an attack. This intuition is remarkably stable across different learning algorithms, models, and datasets. TESSERACT assigns reputation scores to the participating clients based on their behavior during the training phase and then takes a weighted contribution of the clients. We show that TESSERACT provides robustness against even a white-box version of the attack.
△ Less
Submitted 19 October, 2021;
originally announced October 2021.
-
Coulomb and nuclear excitations of $^{70}$Zn and $^{68}$Ni at intermediate energy
Authors:
S. Calinescu,
O. Sorlin,
I. Matea,
F. Carstoiu,
D. Dao,
F. Nowacki,
G. de Angelis,
R. Astabatyan,
S. Bagchi,
C. Borcea,
R. Borcea,
L. Cáceres,
M. Ciemála,
E. Clément,
Z. Dombrádi,
S. Franchoo,
A. Gottardo,
S. Grévy,
H. Guerin,
M. N. Harakeh,
I. M. Harca,
O. Kamalou,
M. Kmiecik,
A. Krasznahorkay,
M. Krzysiek
, et al. (26 additional authors not shown)
Abstract:
The reduced transition probabilities $B(E2; 0^+_{g.s.}\rightarrow2_1^+,2^+_2)$ in $^{70}$Zn and the full $B(E2; 0^+_{g.s.}\rightarrow2^+)$ strength up to S$_n$=7.79 MeV in $^{68}$Ni have been determined at the LISE/GANIL facility using the Coulomb-excitation technique at intermediate beam energy on a $^{208}$Pb target. The $γ$ rays emitted in-flight were detected with an array of 46 BaF$_2$ cryst…
▽ More
The reduced transition probabilities $B(E2; 0^+_{g.s.}\rightarrow2_1^+,2^+_2)$ in $^{70}$Zn and the full $B(E2; 0^+_{g.s.}\rightarrow2^+)$ strength up to S$_n$=7.79 MeV in $^{68}$Ni have been determined at the LISE/GANIL facility using the Coulomb-excitation technique at intermediate beam energy on a $^{208}$Pb target. The $γ$ rays emitted in-flight were detected with an array of 46 BaF$_2$ crystals. The angles of the deflected nuclei were determined in order to disentangle and extract the Coulomb and nuclear contributions to the excitation of the 2$^+$ states. The measured $B(E2; 0^+_{g.s.}\rightarrow2_1^+)$ of 1432(124) e$^2$fm$^4$ for $^{70}$Zn falls in the lower part of the published values which clustered either around 1600 or above 2000 e$^2$fm$^4$, while the $B(E2; 0^+_{g.s.}\rightarrow2^+_2)$ of 53(7) e$^2$fm$^4$ agrees very well with the two published values. The relatively low $B(E2; 0^+_{g.s.}\rightarrow2_1^+)$ of 301(38) e$^2$fm$^4$ for $^{68}$Ni agrees with previous studies and confirms a local magicity at $Z=28, N=40$. Combining the results of the low-energy spectra of $^{68}$Ni and $^{70}$Zn and their shell-model interpretations, it is interesting to notice that four different shapes (spherical, oblate, prolate and triaxial) are present. Finally, a summed $E2$ strength of only about 150 e$^2$fm$^4$ has been found experimentally at high excitation energy, likely due to proton excitations across the $Z=28$ gap. The experimental distribution of this high-energy $E2$ excitation agrees with SM calculations, but its strength is about two times weaker.
△ Less
Submitted 8 October, 2021;
originally announced October 2021.
-
Birkhoff-James orthogonality in complex Banach spaces and Bhatia-Šemrl Theorem revisited
Authors:
Saikat Roy,
Satya Bagchi,
Debmalya Sain
Abstract:
We explore Birkhoff-James orthogonality of two elements in a complex Banach space by using the directional approach. Our investigation illustrates the geometric distinctions between a smooth point and a non-smooth point in a complex Banach space. As a concrete outcome of our study, we obtain a new proof of the Bhatia-Šemrl Theorem on orthogonality of linear operators.
We explore Birkhoff-James orthogonality of two elements in a complex Banach space by using the directional approach. Our investigation illustrates the geometric distinctions between a smooth point and a non-smooth point in a complex Banach space. As a concrete outcome of our study, we obtain a new proof of the Bhatia-Šemrl Theorem on orthogonality of linear operators.
△ Less
Submitted 26 September, 2021;
originally announced September 2021.
-
AI-HRI 2021 Proceedings
Authors:
Reuth Mirsky,
Megan Zimmerman,
Muneed Ahmad,
Shelly Bagchi,
Felix Gervits,
Zhao Han,
Justin Hart,
Daniel Hernández García,
Matteo Leonetti,
Ross Mead,
Emmanuel Senft,
Jivko Sinapov,
Jason Wilson
Abstract:
The Artificial Intelligence (AI) for Human-Robot Interaction (HRI) Symposium has been a successful venue of discussion and collaboration since 2014. During that time, these symposia provided a fertile ground for numerous collaborations and pioneered many discussions revolving trust in HRI, XAI for HRI, service robots, interactive learning, and more.
This year, we aim to review the achievements o…
▽ More
The Artificial Intelligence (AI) for Human-Robot Interaction (HRI) Symposium has been a successful venue of discussion and collaboration since 2014. During that time, these symposia provided a fertile ground for numerous collaborations and pioneered many discussions revolving trust in HRI, XAI for HRI, service robots, interactive learning, and more.
This year, we aim to review the achievements of the AI-HRI community in the last decade, identify the challenges facing ahead, and welcome new researchers who wish to take part in this growing community. Taking this wide perspective, this year there will be no single theme to lead the symposium and we encourage AI-HRI submissions from across disciplines and research interests. Moreover, with the rising interest in AR and VR as part of an interaction and following the difficulties in running physical experiments during the pandemic, this year we specifically encourage researchers to submit works that do not include a physical robot in their evaluation, but promote HRI research in general. In addition, acknowledging that ethics is an inherent part of the human-robot interaction, we encourage submissions of works on ethics for HRI. Over the course of the two-day meeting, we will host a collaborative forum for discussion of current efforts in AI-HRI, with additional talks focused on the topics of ethics in HRI and ubiquitous HRI.
△ Less
Submitted 23 September, 2021; v1 submitted 22 September, 2021;
originally announced September 2021.
-
Federated Action Recognition on Heterogeneous Embedded Devices
Authors:
Pranjal Jain,
Shreyas Goenka,
Saurabh Bagchi,
Biplab Banerjee,
Somali Chaterji
Abstract:
Federated learning allows a large number of devices to jointly learn a model without sharing data. In this work, we enable clients with limited computing power to perform action recognition, a computationally heavy task. We first perform model compression at the central server through knowledge distillation on a large dataset. This allows the model to learn complex features and serves as an initia…
▽ More
Federated learning allows a large number of devices to jointly learn a model without sharing data. In this work, we enable clients with limited computing power to perform action recognition, a computationally heavy task. We first perform model compression at the central server through knowledge distillation on a large dataset. This allows the model to learn complex features and serves as an initialization for model fine-tuning. The fine-tuning is required because the limited data present in smaller datasets is not adequate for action recognition models to learn complex spatio-temporal features. Because the clients present are often heterogeneous in their computing resources, we use an asynchronous federated optimization and we further show a convergence bound. We compare our approach to two baseline approaches: fine-tuning at the central server (no clients) and fine-tuning using (heterogeneous) clients using synchronous federated averaging. We empirically show on a testbed of heterogeneous embedded devices that we can perform action recognition with comparable accuracy to the two baselines above, while our asynchronous learning strategy reduces the training time by 40%, relative to synchronous learning.
△ Less
Submitted 17 July, 2021;
originally announced July 2021.
-
Feature Shift Detection: Localizing Which Features Have Shifted via Conditional Distribution Tests
Authors:
Sean Kulinski,
Saurabh Bagchi,
David I. Inouye
Abstract:
While previous distribution shift detection approaches can identify if a shift has occurred, these approaches cannot localize which specific features have caused a distribution shift -- a critical step in diagnosing or fixing any underlying issue. For example, in military sensor networks, users will want to detect when one or more of the sensors has been compromised, and critically, they will want…
▽ More
While previous distribution shift detection approaches can identify if a shift has occurred, these approaches cannot localize which specific features have caused a distribution shift -- a critical step in diagnosing or fixing any underlying issue. For example, in military sensor networks, users will want to detect when one or more of the sensors has been compromised, and critically, they will want to know which specific sensors might be compromised. Thus, we first define a formalization of this problem as multiple conditional distribution hypothesis tests and propose both non-parametric and parametric statistical tests. For both efficiency and flexibility, we then propose to use a test statistic based on the density model score function (i.e. gradient with respect to the input) -- which can easily compute test statistics for all dimensions in a single forward and backward pass. Any density model could be used for computing the necessary statistics including deep density models such as normalizing flows or autoregressive models. We additionally develop methods for identifying when and where a shift occurs in multivariate time-series data and show results for multiple scenarios using realistic attack models on both simulated and real world data.
△ Less
Submitted 14 July, 2021;
originally announced July 2021.
-
EEG-ConvTransformer for Single-Trial EEG based Visual Stimuli Classification
Authors:
Subhranil Bagchi,
Deepti R. Bathula
Abstract:
Different categories of visual stimuli activate different responses in the human brain. These signals can be captured with EEG for utilization in applications such as Brain-Computer Interface (BCI). However, accurate classification of single-trial data is challenging due to low signal-to-noise ratio of EEG. This work introduces an EEG-ConvTranformer network that is based on multi-headed self-atten…
▽ More
Different categories of visual stimuli activate different responses in the human brain. These signals can be captured with EEG for utilization in applications such as Brain-Computer Interface (BCI). However, accurate classification of single-trial data is challenging due to low signal-to-noise ratio of EEG. This work introduces an EEG-ConvTranformer network that is based on multi-headed self-attention. Unlike other transformers, the model incorporates self-attention to capture inter-region interactions. It further extends to adjunct convolutional filters with multi-head attention as a single module to learn temporal patterns. Experimental results demonstrate that EEG-ConvTransformer achieves improved classification accuracy over the state-of-the-art techniques across five different visual stimuli classification tasks. Finally, quantitative analysis of inter-head diversity also shows low similarity in representational subspaces, emphasizing the implicit diversity of multi-head attention.
△ Less
Submitted 8 July, 2021;
originally announced July 2021.