-
Minimum-Cost Sensor Channel Selection For Wearable Computing
Authors:
Ramesh Kumar Sah,
Hassan Ghasemzadeh
Abstract:
Sensor systems are constrained by design and finding top sensor channel(s) for a given computational task is an important but hard problem. We define an optimization framework and mathematically formulate the minimum-cost channel selection problem. We then propose two novel algorithms of varying scope and complexity to solve the optimization problem. Branch and bound channel selection finds a glob…
▽ More
Sensor systems are constrained by design and finding top sensor channel(s) for a given computational task is an important but hard problem. We define an optimization framework and mathematically formulate the minimum-cost channel selection problem. We then propose two novel algorithms of varying scope and complexity to solve the optimization problem. Branch and bound channel selection finds a globally optimal channel subset and the greedy channel selection finds the best intermediate subset based on the value of a score function. Proposed channel selection algorithms are conditioned with performance as well as the cost of the channel subset. We evaluate both algorithms on two publicly available time series datasets of human activity recognition and mental task detection. Branch and bound channel selection achieved a cost saving of up to 94.8% and the greedy search reduced the cost by 89.6% while maintaining performance thresholds.
△ Less
Submitted 10 January, 2024;
originally announced February 2024.
-
Toward Ultra-Low-Power Remote Health Monitoring: An Optimal and Adaptive Compressed Sensing Framework for Activity Recognition
Authors:
J. Pagan,
R. Fallahzadeh,
M. Pedram,
José L. Risco-Martín,
J. M. Moya,
J. L. Ayala,
H. Ghasemzadeh
Abstract:
Activity recognition, as an important component of behavioral monitoring and intervention, has attracted enormous attention, especially in Mobile Cloud Computing (MCC) and Remote Health Monitoring (RHM) paradigms. While recently resource constrained wearable devices have been gaining popularity, their battery life is limited and constrained by the frequent wireless transmission of data to more com…
▽ More
Activity recognition, as an important component of behavioral monitoring and intervention, has attracted enormous attention, especially in Mobile Cloud Computing (MCC) and Remote Health Monitoring (RHM) paradigms. While recently resource constrained wearable devices have been gaining popularity, their battery life is limited and constrained by the frequent wireless transmission of data to more computationally powerful back-ends. This paper proposes an ultra-low power activity recognition system using a novel adaptive compressed sensing technique that aims to minimize transmission costs. Coarse-grained on-body sensor localization and unsupervised clustering modules are devised to autonomously reconfigure the compressed sensing module for further power saving. We perform a thorough heuristic optimization using Grammatical Evolution (GE) to ensure minimal computation overhead of the proposed methodology. Our evaluation on a real-world dataset and a low power wearable sensing node demonstrates that our approach can reduce the energy consumption of the wireless data transmission up to $81.2\%$ and $61.5\%$, with up to $60.6\%$ and $35.0\%$ overall power savings in comparison with baseline and a naive state-of-the-art approaches, respectively. These solutions lead to an average activity recognition accuracy of $89.0\%$ -- only $4.8\%$ less than the baseline accuracy -- while having a negligible energy overhead of on-node computation.
△ Less
Submitted 2 November, 2023;
originally announced November 2023.
-
Designing User-Centric Behavioral Interventions to Prevent Dysglycemia with Novel Counterfactual Explanations
Authors:
Asiful Arefeen,
Hassan Ghasemzadeh
Abstract:
Maintaining normal blood glucose levels through lifestyle behaviors is central to maintaining health and preventing disease. Frequent exposure to dysglycemia (i.e., abnormal glucose events such as hyperlycemia and hypoglycemia) leads to chronic complications including diabetes, kidney disease and need for dialysis, myocardial infarction, stroke, amputation, and death. Therefore, a tool capable of…
▽ More
Maintaining normal blood glucose levels through lifestyle behaviors is central to maintaining health and preventing disease. Frequent exposure to dysglycemia (i.e., abnormal glucose events such as hyperlycemia and hypoglycemia) leads to chronic complications including diabetes, kidney disease and need for dialysis, myocardial infarction, stroke, amputation, and death. Therefore, a tool capable of predicting dysglycemia and offering users actionable feedback about how to make changes in their diet, exercise, and medication to prevent abnormal glycemic events could have significant societal impacts. Counterfactual explanations can provide insights into why a model made a particular prediction by generating hypothetical instances that are similar to the original input but lead to a different prediction outcome. Therefore, counterfactuals can be viewed as a means to design AI-driven health interventions to prevent adverse health outcomes such as dysglycemia. In this paper, we design GlyCoach, a framework for generating counterfactual explanations for glucose control. Leveraging insights from adversarial learning, GlyCoach characterizes the decision boundary for high-dimensional health data and performs a grid search to generate actionable interventions. GlyCoach is unique in integrating prior knowledge about user preferences of plausible explanations into the process of counterfactual generation. We evaluate GlyCoach extensively using two real-world datasets and external simulators from prior studies that predict glucose response. GlyCoach achieves 87\% sensitivity in the simulation-aided validation, surpassing the state-of-the-art techniques for generating counterfactual explanations by at least $10\%$. Besides, counterfactuals from GlyCoach exhibit a $32\%$ improved normalized distance compared to previous research.
△ Less
Submitted 2 October, 2023;
originally announced October 2023.
-
Toward Generalizable Machine Learning Models in Speech, Language, and Hearing Sciences: Estimating Sample Size and Reducing Overfitting
Authors:
Hamzeh Ghasemzadeh,
Robert E. Hillman,
Daryush D. Mehta
Abstract:
This study's first purpose is to provide quantitative evidence that would incentivize researchers to instead use the more robust method of nested cross-validation. The second purpose is to present methods and MATLAB codes for doing power analysis for ML-based analysis during the design of a study. Monte Carlo simulations were used to quantify the interactions between the employed cross-validation…
▽ More
This study's first purpose is to provide quantitative evidence that would incentivize researchers to instead use the more robust method of nested cross-validation. The second purpose is to present methods and MATLAB codes for doing power analysis for ML-based analysis during the design of a study. Monte Carlo simulations were used to quantify the interactions between the employed cross-validation method, the discriminative power of features, the dimensionality of the feature space, and the dimensionality of the model. Four different cross-validations (single holdout, 10-fold, train-validation-test, and nested 10-fold) were compared based on the statistical power and statistical confidence of the ML models. Distributions of the null and alternative hypotheses were used to determine the minimum required sample size for obtaining a statistically significant outcome (α=0.05, 1-\b{eta}=0.8). Statistical confidence of the model was defined as the probability of correct features being selected and hence being included in the final model. Our analysis showed that the model generated based on the single holdout method had very low statistical power and statistical confidence and that it significantly overestimated the accuracy. Conversely, the nested 10-fold cross-validation resulted in the highest statistical confidence and the highest statistical power, while providing an unbiased estimate of the accuracy. The required sample size with a single holdout could be 50% higher than what would be needed if nested cross-validation were used. Confidence in the model based on nested cross-validation was as much as four times higher than the confidence in the single holdout-based model. A computational model, MATLAB codes, and lookup tables are provided to assist researchers with estimating the sample size during the design of their future studies.
△ Less
Submitted 22 December, 2023; v1 submitted 22 August, 2023;
originally announced August 2023.
-
The Scope of In-Context Learning for the Extraction of Medical Temporal Constraints
Authors:
Parker Seegmiller,
Joseph Gatto,
Madhusudan Basak,
Diane Cook,
Hassan Ghasemzadeh,
John Stankovic,
Sarah Preum
Abstract:
Medications often impose temporal constraints on everyday patient activity. Violations of such medical temporal constraints (MTCs) lead to a lack of treatment adherence, in addition to poor health outcomes and increased healthcare expenses. These MTCs are found in drug usage guidelines (DUGs) in both patient education materials and clinical texts. Computationally representing MTCs in DUGs will adv…
▽ More
Medications often impose temporal constraints on everyday patient activity. Violations of such medical temporal constraints (MTCs) lead to a lack of treatment adherence, in addition to poor health outcomes and increased healthcare expenses. These MTCs are found in drug usage guidelines (DUGs) in both patient education materials and clinical texts. Computationally representing MTCs in DUGs will advance patient-centric healthcare applications by hel** to define safe patient activity patterns. We define a novel taxonomy of MTCs found in DUGs and develop a novel context-free grammar (CFG) based model to computationally represent MTCs from unstructured DUGs. Additionally, we release three new datasets with a combined total of N = 836 DUGs labeled with normalized MTCs. We develop an in-context learning (ICL) solution for automatically extracting and normalizing MTCs found in DUGs, achieving an average F1 score of 0.62 across all datasets. Finally, we rigorously investigate ICL model performance against a baseline model, across datasets and MTC types, and through in-depth error analysis.
△ Less
Submitted 16 October, 2023; v1 submitted 16 March, 2023;
originally announced March 2023.
-
ActSafe: Predicting Violations of Medical Temporal Constraints for Medication Adherence
Authors:
Parker Seegmiller,
Joseph Gatto,
Abdullah Mamun,
Hassan Ghasemzadeh,
Diane Cook,
John Stankovic,
Sarah Masud Preum
Abstract:
Prescription medications often impose temporal constraints on regular health behaviors (RHBs) of patients, e.g., eating before taking medication. Violations of such medical temporal constraints (MTCs) can result in adverse effects. Detecting and predicting such violations before they occur can help alert the patient. We formulate the problem of modeling MTCs and develop a proof-of-concept solution…
▽ More
Prescription medications often impose temporal constraints on regular health behaviors (RHBs) of patients, e.g., eating before taking medication. Violations of such medical temporal constraints (MTCs) can result in adverse effects. Detecting and predicting such violations before they occur can help alert the patient. We formulate the problem of modeling MTCs and develop a proof-of-concept solution, ActSafe, to predict violations of MTCs well ahead of time. ActSafe utilizes a context-free grammar based approach for extracting and map** MTCs from patient education materials. It also addresses the challenges of accurately predicting RHBs central to MTCs (e.g., medication intake). Our novel behavior prediction model, HERBERT , utilizes a basis vectorization of time series that is generalizable across temporal scale and duration of behaviors, explicitly capturing the dependency between temporally collocated behaviors. Based on evaluation using a real-world RHB dataset collected from 28 patients in uncontrolled environments, HERBERT outperforms baseline models with an average of 51% reduction in root mean square error. Based on an evaluation involving patients with chronic conditions, ActSafe can predict MTC violations a day ahead of time with an average F1 score of 0.86.
△ Less
Submitted 17 January, 2023;
originally announced January 2023.
-
ADARP: A Multi Modal Dataset for Stress and Alcohol Relapse Quantification in Real Life Setting
Authors:
Ramesh Kumar Sah,
Michael McDonell,
Patricia Pendry,
Sara Parent,
Hassan Ghasemzadeh,
Michael J Cleveland
Abstract:
Stress detection and classification from wearable sensor data is an emerging area of research with significant implications for individuals' physical and mental health. In this work, we introduce a new dataset, ADARP, which contains physiological data and self-report outcomes collected in real-world ambulatory settings involving individuals diagnosed with alcohol use disorders. We describe the use…
▽ More
Stress detection and classification from wearable sensor data is an emerging area of research with significant implications for individuals' physical and mental health. In this work, we introduce a new dataset, ADARP, which contains physiological data and self-report outcomes collected in real-world ambulatory settings involving individuals diagnosed with alcohol use disorders. We describe the user study, present details of the dataset, establish the significant correlation between physiological data and self-reported outcomes, demonstrate stress classification, and make our dataset public to facilitate research.
△ Less
Submitted 14 June, 2022;
originally announced June 2022.
-
Stress Classification and Personalization: Getting the most out of the least
Authors:
Ramesh Kumar Sah,
Hassan Ghasemzadeh
Abstract:
Stress detection and monitoring is an active area of research with important implications for the personal, professional, and social health of an individual. Current approaches for affective state classification use traditional machine learning algorithms with features computed from multiple sensor modalities. These methods are data-intensive and rely on hand-crafted features which impede the prac…
▽ More
Stress detection and monitoring is an active area of research with important implications for the personal, professional, and social health of an individual. Current approaches for affective state classification use traditional machine learning algorithms with features computed from multiple sensor modalities. These methods are data-intensive and rely on hand-crafted features which impede the practical applicability of these sensor systems in daily lives. To overcome these shortcomings, we propose a novel Convolutional Neural Network (CNN) based stress detection and classification framework without any feature computation using data from only one sensor modality. Our method is competitive and outperforms current state-of-the-art techniques and achieves a classification accuracy of $92.85\%$ and an $f1$ score of $0.89$. Through our leave-one-subject-out analysis, we also show the importance of personalizing stress models.
△ Less
Submitted 12 July, 2021;
originally announced July 2021.
-
Inter-Beat Interval Estimation with Tiramisu Model: A Novel Approach with Reduced Error
Authors:
Asiful Arefeen,
Ali Akbari,
Seyed Iman Mirzadeh,
Roozbeh Jafari,
Behrooz A. Shirazi,
Hassan Ghasemzadeh
Abstract:
Inter-beat interval (IBI) measurement enables estimation of heart-rate variability (HRV) which, in turns, can provide early indication of potential cardiovascular diseases. However, extracting IBIs from noisy signals is challenging since the morphology of the signal is distorted in the presence of the noise. Electrocardiogram (ECG) of a person in heavy motion is highly corrupted with noise, known…
▽ More
Inter-beat interval (IBI) measurement enables estimation of heart-rate variability (HRV) which, in turns, can provide early indication of potential cardiovascular diseases. However, extracting IBIs from noisy signals is challenging since the morphology of the signal is distorted in the presence of the noise. Electrocardiogram (ECG) of a person in heavy motion is highly corrupted with noise, known as motion-artifact, and IBI extracted from it is inaccurate. As a part of remote health monitoring and wearable system development, denoising ECG signals and estimating IBIs correctly from them have become an emerging topic among signal-processing researchers. Apart from conventional methods, deep-learning techniques have been successfully used in signal denoising recently, and diagnosis process has become easier, leading to accuracy levels that were previously unachievable. We propose a deep-learning approach leveraging tiramisu autoencoder model to suppress motion-artifact noise and make the R-peaks of the ECG signal prominent even in the presence of high-intensity motion. After denoising, IBIs are estimated more accurately expediting diagnosis tasks. Results illustrate that our method enables IBI estimation from noisy ECG signals with SNR up to -30dB with average root mean square error (RMSE) of 13 milliseconds for estimated IBIs. At this noise level, our error percentage remains below 8% and outperforms other state of the art techniques.
△ Less
Submitted 1 July, 2021;
originally announced July 2021.
-
Single Run Action Detector over Video Stream -- A Privacy Preserving Approach
Authors:
Anbumalar Saravanan,
Justin Sanchez,
Hassan Ghasemzadeh,
Aurelia Macabasco-O'Connell,
Hamed Tabkhi
Abstract:
This paper takes initial strides at designing and evaluating a vision-based system for privacy ensured activity monitoring. The proposed technology utilizing Artificial Intelligence (AI)-empowered proactive systems offering continuous monitoring, behavioral analysis, and modeling of human activities. To this end, this paper presents Single Run Action Detector (S-RAD) which is a real-time privacy-p…
▽ More
This paper takes initial strides at designing and evaluating a vision-based system for privacy ensured activity monitoring. The proposed technology utilizing Artificial Intelligence (AI)-empowered proactive systems offering continuous monitoring, behavioral analysis, and modeling of human activities. To this end, this paper presents Single Run Action Detector (S-RAD) which is a real-time privacy-preserving action detector that performs end-to-end action localization and classification. It is based on Faster-RCNN combined with temporal shift modeling and segment based sampling to capture the human actions. Results on UCF-Sports and UR Fall dataset present comparable accuracy to State-of-the-Art approaches with significantly lower model size and computation demand and the ability for real-time execution on edge embedded device (e.g. Nvidia Jetson Xavier).
△ Less
Submitted 5 February, 2021;
originally announced February 2021.
-
Linear Mode Connectivity in Multitask and Continual Learning
Authors:
Seyed Iman Mirzadeh,
Mehrdad Farajtabar,
Dilan Gorur,
Razvan Pascanu,
Hassan Ghasemzadeh
Abstract:
Continual (sequential) training and multitask (simultaneous) training are often attempting to solve the same overall objective: to find a solution that performs well on all considered tasks. The main difference is in the training regimes, where continual learning can only have access to one task at a time, which for neural networks typically leads to catastrophic forgetting. That is, the solution…
▽ More
Continual (sequential) training and multitask (simultaneous) training are often attempting to solve the same overall objective: to find a solution that performs well on all considered tasks. The main difference is in the training regimes, where continual learning can only have access to one task at a time, which for neural networks typically leads to catastrophic forgetting. That is, the solution found for a subsequent task does not perform well on the previous ones anymore. However, the relationship between the different minima that the two training regimes arrive at is not well understood. What sets them apart? Is there a local structure that could explain the difference in performance achieved by the two different schemes? Motivated by recent work showing that different minima of the same task are typically connected by very simple curves of low error, we investigate whether multitask and continual solutions are similarly connected. We empirically find that indeed such connectivity can be reliably achieved and, more interestingly, it can be done by a linear path, conditioned on having the same initialization for both. We thoroughly analyze this observation and discuss its significance for the continual learning process. Furthermore, we exploit this finding to propose an effective algorithm that constrains the sequentially learned minima to behave as the multitask solution. We show that our method outperforms several state of the art continual learning algorithms on various vision benchmarks.
△ Less
Submitted 9 October, 2020;
originally announced October 2020.
-
Transfer Learning for Activity Recognition in Mobile Health
Authors:
Yuchao Ma,
Andrew T. Campbell,
Diane J. Cook,
John Lach,
Shwetak N. Patel,
Thomas Ploetz,
Majid Sarrafzadeh,
Donna Spruijt-Metz,
Hassan Ghasemzadeh
Abstract:
While activity recognition from inertial sensors holds potential for mobile health, differences in sensing platforms and user movement patterns cause performance degradation. Aiming to address these challenges, we propose a transfer learning framework, TransFall, for sensor-based activity recognition. TransFall's design contains a two-tier data transformation, a label estimation layer, and a model…
▽ More
While activity recognition from inertial sensors holds potential for mobile health, differences in sensing platforms and user movement patterns cause performance degradation. Aiming to address these challenges, we propose a transfer learning framework, TransFall, for sensor-based activity recognition. TransFall's design contains a two-tier data transformation, a label estimation layer, and a model generation layer to recognize activities for the new scenario. We validate TransFall analytically and empirically.
△ Less
Submitted 12 July, 2020;
originally announced July 2020.
-
Pervasive Lying Posture Tracking
Authors:
Paratoo Alinia,
Ali Samadani,
Mladen Milosevic,
Hassan Ghasemzadeh,
Saman Parvaneh
Abstract:
There exist significant gaps in research about how to design efficient in-bed lying posture tracking systems. These gaps can be articulated through several research questions as follows. First, can we design a single-sensor, pervasive, and inexpensive system that can accurately detect lying postures? Second, what computational models are most effective in the accurate detection of lying postures?…
▽ More
There exist significant gaps in research about how to design efficient in-bed lying posture tracking systems. These gaps can be articulated through several research questions as follows. First, can we design a single-sensor, pervasive, and inexpensive system that can accurately detect lying postures? Second, what computational models are most effective in the accurate detection of lying postures? Finally, what physical configuration of the sensor system is most effective for lying posture tracking? To answer these important research questions, in this article, we propose a comprehensive approach to design a sensor system that uses a single accelerometer along with machine learning algorithms for in-bed lying posture classification. We design two categories of machine learning algorithms based on deep learning and traditional classification with handcrafted features to detect lying postures. We also investigate what wearing sites are most effective in accurate detection of lying postures. We extensively evaluate the performance of the proposed algorithms on nine different body locations and four human lying postures using two datasets. Our results show that a system with a single accelerometer can be used with either deep learning or traditional classifiers to accurately detect lying postures. The best models in our approach achieve an F-Score that ranges from 95.2% to 97.8% with 0.03 to 0.05 coefficient of variation. The results also identify the thighs and chest as the most salient body sites for lying posture tracking. Our findings in this article suggest that because accelerometers are ubiquitous and inexpensive sensors, they can be a viable source of information for pervasive monitoring of in-bed postures.
△ Less
Submitted 18 June, 2020;
originally announced June 2020.
-
Understanding the Role of Training Regimes in Continual Learning
Authors:
Seyed Iman Mirzadeh,
Mehrdad Farajtabar,
Razvan Pascanu,
Hassan Ghasemzadeh
Abstract:
Catastrophic forgetting affects the training of neural networks, limiting their ability to learn multiple tasks sequentially. From the perspective of the well established plasticity-stability dilemma, neural networks tend to be overly plastic, lacking the stability necessary to prevent the forgetting of previous knowledge, which means that as learning progresses, networks tend to forget previously…
▽ More
Catastrophic forgetting affects the training of neural networks, limiting their ability to learn multiple tasks sequentially. From the perspective of the well established plasticity-stability dilemma, neural networks tend to be overly plastic, lacking the stability necessary to prevent the forgetting of previous knowledge, which means that as learning progresses, networks tend to forget previously seen tasks. This phenomenon coined in the continual learning literature, has attracted much attention lately, and several families of approaches have been proposed with different degrees of success. However, there has been limited prior work extensively analyzing the impact that different training regimes -- learning rate, batch size, regularization method-- can have on forgetting. In this work, we depart from the typical approach of altering the learning algorithm to improve stability. Instead, we hypothesize that the geometrical properties of the local minima found for each task play an important role in the overall degree of forgetting. In particular, we study the effect of dropout, learning rate decay, and batch size, on forming training regimes that widen the tasks' local minima and consequently, on hel** it not to forget catastrophically. Our study provides practical insights to improve stability via simple yet effective techniques that outperform alternative baselines.
△ Less
Submitted 12 June, 2020;
originally announced June 2020.
-
Dropout as an Implicit Gating Mechanism For Continual Learning
Authors:
Seyed-Iman Mirzadeh,
Mehrdad Farajtabar,
Hassan Ghasemzadeh
Abstract:
In recent years, neural networks have demonstrated an outstanding ability to achieve complex learning tasks across various domains. However, they suffer from the "catastrophic forgetting" problem when they face a sequence of learning tasks, where they forget the old ones as they learn new tasks. This problem is also highly related to the "stability-plasticity dilemma". The more plastic the network…
▽ More
In recent years, neural networks have demonstrated an outstanding ability to achieve complex learning tasks across various domains. However, they suffer from the "catastrophic forgetting" problem when they face a sequence of learning tasks, where they forget the old ones as they learn new tasks. This problem is also highly related to the "stability-plasticity dilemma". The more plastic the network, the easier it can learn new tasks, but the faster it also forgets previous ones. Conversely, a stable network cannot learn new tasks as fast as a very plastic network. However, it is more reliable to preserve the knowledge it has learned from the previous tasks. Several solutions have been proposed to overcome the forgetting problem by making the neural network parameters more stable, and some of them have mentioned the significance of dropout in continual learning. However, their relationship has not been sufficiently studied yet. In this paper, we investigate this relationship and show that a stable network with dropout learns a gating mechanism such that for different tasks, different paths of the network are active. Our experiments show that the stability achieved by this implicit gating plays a very critical role in leading to performance comparable to or better than other involved continual learning algorithms to overcome catastrophic forgetting.
△ Less
Submitted 24 April, 2020;
originally announced April 2020.
-
Personality Assessment from Text for Machine Commonsense Reasoning
Authors:
Niloofar Hezarjaribi,
Zhila Esna Ashari,
James F. Frenzel,
Hassan Ghasemzadeh,
Saied Hemati
Abstract:
This article presents PerSense, a framework to estimate human personality traits based on expressed texts and to use them for commonsense reasoning analysis. The personality assessment approaches include an aggregated Probability Density Functions (PDF), and Machine Learning (ML) models. Our goal is to demonstrate the feasibility of using machine learning algorithms on personality trait data to pr…
▽ More
This article presents PerSense, a framework to estimate human personality traits based on expressed texts and to use them for commonsense reasoning analysis. The personality assessment approaches include an aggregated Probability Density Functions (PDF), and Machine Learning (ML) models. Our goal is to demonstrate the feasibility of using machine learning algorithms on personality trait data to predict humans' responses to open-ended commonsense questions. We assess the performance of the PerSense algorithms for personality assessment by conducting an experiment focused on Neuroticism, an important personality trait crucial in mental health analysis and suicide prevention by collecting data from a diverse population with different Neuroticism scores. Our analysis shows that the algorithms achieve comparable results to the ground truth data. Specifically, the PDF approach achieves 97% accuracy when the confidence factor, the logarithmic ratio of the first to the second guess probability, is greater than 3. Additionally, ML approach obtains its highest accuracy, 82.2%, with a multilayer Perceptron classifier. To assess the feasibility of commonsense reasoning analysis, we train ML algorithms to predict responses to commonsense questions. Our analysis of data collected with 300 participants demonstrate that PerSense predicts answers to commonsense questions with 82.3% accuracy using a Random Forest classifier.
△ Less
Submitted 15 April, 2020;
originally announced April 2020.
-
Proximity-Based Active Learning on Streaming Data: A Personalized Eating Moment Recognition
Authors:
Marjan Nourollahi,
Seyed Ali Rokni,
Hassan Ghasemzadeh
Abstract:
Detecting when eating occurs is an essential step toward automatic dietary monitoring, medication adherence assessment, and diet-related health interventions. Wearable technologies play a central role in designing unubtrusive diet monitoring solutions by leveraging machine learning algorithms that work on time-series sensor data to detect eating moments. While much research has been done on develo…
▽ More
Detecting when eating occurs is an essential step toward automatic dietary monitoring, medication adherence assessment, and diet-related health interventions. Wearable technologies play a central role in designing unubtrusive diet monitoring solutions by leveraging machine learning algorithms that work on time-series sensor data to detect eating moments. While much research has been done on develo** activity recognition and eating moment detection algorithms, the performance of the detection algorithms drops substantially when the model trained with one user is utilized by a new user. To facilitate development of personalized models, we propose PALS, Proximity-based Active Learning on Streaming data, a novel proximity-based model for recognizing eating gestures with the goal of significantly decreasing the need for labeled data with new users. Particularly, we propose an optimization problem to perform active learning under limited query budget by leveraging unlabeled data. Our extensive analysis on data collected in both controlled and uncontrolled settings indicates that the F-score of PLAS ranges from 22% to 39% for a budget that varies from 10 to 60 query. Furthermore, compared to the state-of-the-art approaches, off-line PALS, on average, achieves to 40% higher recall and 12\% higher f-score in detecting eating gestures.
△ Less
Submitted 29 March, 2020;
originally announced March 2020.
-
Adversarial Transferability in Wearable Sensor Systems
Authors:
Ramesh Kumar Sah,
Hassan Ghasemzadeh
Abstract:
Machine learning is used for inference and decision making in wearable sensor systems. However, recent studies have found that machine learning algorithms are easily fooled by the addition of adversarial perturbations to their inputs. What is more interesting is that adversarial examples generated for one machine learning system is also effective against other systems. This property of adversarial…
▽ More
Machine learning is used for inference and decision making in wearable sensor systems. However, recent studies have found that machine learning algorithms are easily fooled by the addition of adversarial perturbations to their inputs. What is more interesting is that adversarial examples generated for one machine learning system is also effective against other systems. This property of adversarial examples is called transferability. In this work, we take the first stride in studying adversarial transferability in wearable sensor systems from the following perspectives: 1) transferability between machine learning systems, 2) transferability across subjects, 3) transferability across sensor body locations, and 4) transferability across datasets. We found strong untargeted transferability in most cases. Targeted attacks were less successful with success scores from $0\%$ to $80\%$. The transferability of adversarial examples depends on many factors such as the inclusion of data from all subjects, sensor body position, number of samples in the dataset, type of learning algorithm, and the distribution of source and target system dataset. The transferability of adversarial examples decreases sharply when the data distribution of the source and target system becomes more distinct. We also provide guidelines for the community for designing robust sensor systems.
△ Less
Submitted 15 July, 2021; v1 submitted 17 March, 2020;
originally announced March 2020.
-
ActiLabel: A Combinatorial Transfer Learning Framework for Activity Recognition
Authors:
Parastoo Alinia,
Iman Mirzadeh,
Hassan Ghasemzadeh
Abstract:
Sensor-based human activity recognition has become a critical component of many emerging applications ranging from behavioral medicine to gaming. However, an unprecedented increase in the diversity of sensor devices in the Internet-of-Things era has limited the adoption of activity recognition models for use across different domains. We propose ActiLabel a combinatorial framework that learns struc…
▽ More
Sensor-based human activity recognition has become a critical component of many emerging applications ranging from behavioral medicine to gaming. However, an unprecedented increase in the diversity of sensor devices in the Internet-of-Things era has limited the adoption of activity recognition models for use across different domains. We propose ActiLabel a combinatorial framework that learns structural similarities among the events in an arbitrary domain and those of a different domain. The structural similarities are captured through a graph model, referred to as the it dependency graph, which abstracts details of activity patterns in low-level signal and feature space. The activity labels are then autonomously learned by finding an optimal tiered map** between the dependency graphs. Extensive experiments based on three public datasets demonstrate the superiority of ActiLabel over state-of-the-art transfer learning and deep learning methods.
△ Less
Submitted 16 March, 2020;
originally announced March 2020.
-
Mindful Active Learning
Authors:
Zhila Esna Ashari,
Hassan Ghasemzadeh
Abstract:
We propose a novel active learning framework for activity recognition using wearable sensors. Our work is unique in that it takes physical and cognitive limitations of the oracle into account when selecting sensor data to be annotated by the oracle. Our approach is inspired by human-beings' limited capacity to respond to external stimulus such as responding to a prompt on their mobile devices. Thi…
▽ More
We propose a novel active learning framework for activity recognition using wearable sensors. Our work is unique in that it takes physical and cognitive limitations of the oracle into account when selecting sensor data to be annotated by the oracle. Our approach is inspired by human-beings' limited capacity to respond to external stimulus such as responding to a prompt on their mobile devices. This capacity constraint is manifested not only in the number of queries that a person can respond to in a given time-frame but also in the lag between the time that a query is made and when it is responded to. We introduce the notion of mindful active learning and propose a computational framework, called EMMA, to maximize the active learning performance taking informativeness of sensor data, query budget, and human memory into account. We formulate this optimization problem, propose an approach to model memory retention, discuss complexity of the problem, and propose a greedy heuristic to solve the problem. We demonstrate the effectiveness of our approach on three publicly available datasets and by simulating oracles with various memory strengths. We show that the activity recognition accuracy ranges from 21% to 97% depending on memory strength, query budget, and difficulty of the machine learning task. Our results also indicate that EMMA achieves an accuracy level that is, on average, 13.5% higher than the case when only informativeness of the sensor data is considered for active learning. Additionally, we show that the performance of our approach is at most 20% less than experimental upper-bound and up to 80% higher than experimental lower-bound. We observe that mindful active learning is most beneficial when query budget is small and/or oracle's memory is weak, thus emphasizing contributions of our work in human-centered mobile health settings and for elderly with cognitive impairments.
△ Less
Submitted 27 July, 2019;
originally announced July 2019.
-
Resource-Efficient Wearable Computing for Real-Time Reconfigurable Machine Learning: A Cascading Binary Classification
Authors:
Mahdi Pedram,
Seyed Ali Rokni,
Marjan Nourollahi,
Houman Homayoun,
Hassan Ghasemzadeh
Abstract:
Advances in embedded systems have enabled integration of many lightweight sensory devices within our daily life. In particular, this trend has given rise to continuous expansion of wearable sensors in a broad range of applications from health and fitness monitoring to social networking and military surveillance. Wearables leverage machine learning techniques to profile behavioral routine of their…
▽ More
Advances in embedded systems have enabled integration of many lightweight sensory devices within our daily life. In particular, this trend has given rise to continuous expansion of wearable sensors in a broad range of applications from health and fitness monitoring to social networking and military surveillance. Wearables leverage machine learning techniques to profile behavioral routine of their end-users through activity recognition algorithms. Current research assumes that such machine learning algorithms are trained offline. In reality, however, wearables demand continuous reconfiguration of their computational algorithms due to their highly dynamic operation. Develo** a personalized and adaptive machine learning model requires real-time reconfiguration of the model. Due to stringent computation and memory constraints of these embedded sensors, the training/re-training of the computational algorithms need to be memory- and computation-efficient. In this paper, we propose a framework, based on the notion of online learning, for real-time and on-device machine learning training. We propose to transform the activity recognition problem from a multi-class classification problem to a hierarchical model of binary decisions using cascading online binary classifiers. Our results, based on Pegasos online learning, demonstrate that the proposed approach achieves 97% accuracy in detecting activities of varying intensities using a limited memory while power usages of the system is reduced by more than 40%.
△ Less
Submitted 7 July, 2019;
originally announced July 2019.
-
Resource-Efficient Computing in Wearable Systems
Authors:
Mahdi Pedram,
Mahsan Rofouei,
Francesco Fraternali,
Zhila Esna Ashari,
Hassan Ghasemzadeh
Abstract:
We propose two optimization techniques to minimize memory usage and computation while meeting system timing constraints for real-time classification in wearable systems. Our method derives a hierarchical classifier structure for Support Vector Machine (SVM) in order to reduce the amount of computations, based on the probability distribution of output classes occurrences. Also, we propose a memory…
▽ More
We propose two optimization techniques to minimize memory usage and computation while meeting system timing constraints for real-time classification in wearable systems. Our method derives a hierarchical classifier structure for Support Vector Machine (SVM) in order to reduce the amount of computations, based on the probability distribution of output classes occurrences. Also, we propose a memory optimization technique based on SVM parameters, which results in storing fewer support vectors and as a result requiring less memory. To demonstrate the efficiency of our proposed techniques, we performed an activity recognition experiment and were able to save up to 35% and 56% in memory storage when classifying 14 and 6 different activities, respectively. In addition, we demonstrated that there is a trade-off between accuracy of classification and memory savings, which can be controlled based on application requirements.
△ Less
Submitted 7 July, 2019;
originally announced July 2019.
-
Improved Knowledge Distillation via Teacher Assistant
Authors:
Seyed-Iman Mirzadeh,
Mehrdad Farajtabar,
Ang Li,
Nir Levine,
Akihiro Matsukawa,
Hassan Ghasemzadeh
Abstract:
Despite the fact that deep neural networks are powerful models and achieve appealing results on many tasks, they are too large to be deployed on edge devices like smartphones or embedded sensor nodes. There have been efforts to compress these networks, and a popular method is knowledge distillation, where a large (teacher) pre-trained network is used to train a smaller (student) network. However,…
▽ More
Despite the fact that deep neural networks are powerful models and achieve appealing results on many tasks, they are too large to be deployed on edge devices like smartphones or embedded sensor nodes. There have been efforts to compress these networks, and a popular method is knowledge distillation, where a large (teacher) pre-trained network is used to train a smaller (student) network. However, in this paper, we show that the student network performance degrades when the gap between student and teacher is large. Given a fixed student network, one cannot employ an arbitrarily large teacher, or in other words, a teacher can effectively transfer its knowledge to students up to a certain size, not smaller. To alleviate this shortcoming, we introduce multi-step knowledge distillation, which employs an intermediate-sized network (teacher assistant) to bridge the gap between the student and the teacher. Moreover, we study the effect of teacher assistant size and extend the framework to multi-step distillation. Theoretical analysis and extensive experiments on CIFAR-10,100 and ImageNet datasets and on CNN and ResNet architectures substantiate the effectiveness of our proposed approach.
△ Less
Submitted 16 December, 2019; v1 submitted 9 February, 2019;
originally announced February 2019.
-
Personalized Human Activity Recognition Using Convolutional Neural Networks
Authors:
Seyed Ali Rokni,
Marjan Nourollahi,
Hassan Ghasemzadeh
Abstract:
A major barrier to the personalized Human Activity Recognition using wearable sensors is that the performance of the recognition model drops significantly upon adoption of the system by new users or changes in physical/ behavioral status of users. Therefore, the model needs to be retrained by collecting new labeled data in the new context. In this study, we develop a transfer learning framework us…
▽ More
A major barrier to the personalized Human Activity Recognition using wearable sensors is that the performance of the recognition model drops significantly upon adoption of the system by new users or changes in physical/ behavioral status of users. Therefore, the model needs to be retrained by collecting new labeled data in the new context. In this study, we develop a transfer learning framework using convolutional neural networks to build a personalized activity recognition model with minimal user supervision.
△ Less
Submitted 24 January, 2018;
originally announced January 2018.
-
Calibrated Audio Steganalysis
Authors:
Hamzeh Ghasemzadeh,
Mohammad H. Kayvanrad
Abstract:
Calibration is a common practice in image steganalysis for extracting prominent features. Based on the idea of reembedding, a new set of calibrated features for audio steganalysis applications are proposed. These features are extracted from a model that has maximum deviation from human auditory system and had been specifically designed for audio steganalysis. Ability of the proposed system is test…
▽ More
Calibration is a common practice in image steganalysis for extracting prominent features. Based on the idea of reembedding, a new set of calibrated features for audio steganalysis applications are proposed. These features are extracted from a model that has maximum deviation from human auditory system and had been specifically designed for audio steganalysis. Ability of the proposed system is tested extensively. Simulations demonstrate that the proposed method can accurately detect the presence of hidden messages even in very low embedding rates. Proposed method achieves an accuracy of 99.3% ([email protected]% BPB) which is 9.5% higher than the previous R-MFCC based steganalysis method.
△ Less
Submitted 29 August, 2018; v1 submitted 22 November, 2017;
originally announced November 2017.
-
Key management system for WSNs based on hash functions and elliptic curve cryptography
Authors:
Hamzeh Ghasemzadeh,
Ali Payandeh,
Mohammad Reza Aref
Abstract:
Due to hostile environment and wireless communication channel, security mechanisms are essential for wireless sensor networks (WSNs). Existence of a pair of shared key is a prerequisite for many of these security mechanisms; a task that key management system addresses. Recently, an energy efficient method based on public key cryptography (PKC) was proposed. We analyze this protocol and show that i…
▽ More
Due to hostile environment and wireless communication channel, security mechanisms are essential for wireless sensor networks (WSNs). Existence of a pair of shared key is a prerequisite for many of these security mechanisms; a task that key management system addresses. Recently, an energy efficient method based on public key cryptography (PKC) was proposed. We analyze this protocol and show that it is vulnerable to denial of service (DOS) attacks and adversary can exhaust memory and battery of nodes. Then, we analyze this protocol and show that using a more knowledgeable BS this vulnerability can be solved very efficiently. Based on this observation we propose a modified version of the protocol that achieves immediate authentication and can prevent DOS attacks. We show that the improved protocol achieves immediate authentication at the expense of 1.82 mj extra energy consumption while retaining other desirable characteristics of the basic method.
△ Less
Submitted 22 November, 2017;
originally announced November 2017.
-
Multi-layer architecture for efficient steganalysis of Undermp3cover in multi-encoder scenario
Authors:
Hamzeh Ghasemzadeh
Abstract:
Mp3 is a very popular audio format and hence it can be a good host for carrying hidden messages. Therefore, different steganography methods have been proposed for mp3 hosts. But, current literature has only focused on steganalysis of mp3stego. In this paper we mention some of the limitations of mp3stego and argue that UnderMp3Cover (Ump3c) does not have those limitations. Ump3c makes subtle change…
▽ More
Mp3 is a very popular audio format and hence it can be a good host for carrying hidden messages. Therefore, different steganography methods have been proposed for mp3 hosts. But, current literature has only focused on steganalysis of mp3stego. In this paper we mention some of the limitations of mp3stego and argue that UnderMp3Cover (Ump3c) does not have those limitations. Ump3c makes subtle changes only to the global gain of bitstream and keeps the rest of bitstream intact. Therefore, its detection is much harder than mp3stego. To address this, joint distributions between global gain and other fields of mp3 bit stream are used. The changes are detected by measuring the mutual information from those joint distributions. Furthermore, we show that different mp3 encoders have dissimilar performances. Consequently, a novel multi-layer architecture for steganalysis of Ump3c is proposed. In this manner, the first layer detects the encoder and the second layer performs the steganalysis job. One of advantages of this architecture is that feature extraction and feature selection can be optimized for each encoder separately. We show this multi-layer architecture outperforms the conventional single-layer methods. Comparing results of the proposed method with other works shows an improvement of 20.4% in the accuracy of steganalysis.
△ Less
Submitted 2 July, 2018; v1 submitted 3 October, 2017;
originally announced October 2017.
-
Calibrated steganalysis of mp3stego in multi-encoder scenario
Authors:
Hamzeh Ghasemzadeh
Abstract:
Comparing popularity of mp3 and wave with the amount of works published on each of them shows mp3 steganalysis has not found adequate attention. Furthermore, investigating existing works on mp3 steganalysis shows that a major factor has been overlooked. Experimenting with different mp3 encoders shows there are subtle differences in their outputs. This shows that mp3 standard has been implemented i…
▽ More
Comparing popularity of mp3 and wave with the amount of works published on each of them shows mp3 steganalysis has not found adequate attention. Furthermore, investigating existing works on mp3 steganalysis shows that a major factor has been overlooked. Experimenting with different mp3 encoders shows there are subtle differences in their outputs. This shows that mp3 standard has been implemented in dissimilar fashions, which in turn could degrade performance of steganalysis if it is not addressed properly. Additionally, calibration is a powerful technique which has not found its true potential for mp3 steganalysis. This paper tries to fill these gaps. First, we present our analysis on different encoders and show they can be classified quite accurately with only four features. Then, we propose a new set of calibrated features based on quantization step. To that end, we show quantization step is a band limited signal and steganography noise affects its high frequency components more prominently. By applying a low pass filter on quantization steps, we arrive at an estimation of quantization step, which in turn is used for calibrating the features.
△ Less
Submitted 23 September, 2017;
originally announced September 2017.
-
Universal Audio Steganalysis Based on Calibration and Reversed Frequency Resolution of Human Auditory System
Authors:
Hamzeh Ghasemzadeh,
Meisam Khalil Arjmandi
Abstract:
Calibration and higher order statistics (HOS) are standard components of many image steganalysis systems. These techniques have not yet found adequate attention in audio steganalysis context. Specifically, most of current works are either non-calibrated or only based on noise removal approach. This paper aims to fill these gaps by proposing a new set of calibrated features based on re-embedding te…
▽ More
Calibration and higher order statistics (HOS) are standard components of many image steganalysis systems. These techniques have not yet found adequate attention in audio steganalysis context. Specifically, most of current works are either non-calibrated or only based on noise removal approach. This paper aims to fill these gaps by proposing a new set of calibrated features based on re-embedding technique. Additionally, we show that least significant bit (LSB) is the most sensitive bit-plane to data hiding algorithms and therefore it can be employed as a universal embedding method. Furthermore, the proposed features are based on a model that has the maximum deviation from human auditory system (HAS), and therefore are more suitable for the purpose of steganalysis. Performance of the proposed method is evaluated on a wide range of data hiding algorithms in both targeted and universal paradigms. Simulation results show that the proposed method can detect the finest traces of data hiding algorithms and in very low embedding rates. The system detects steghide at capacity of 0.06 bit per symbol (BPS) with sensitivity of 98.6% (music) and 78.5% (speech). These figures are respectively 7.1% and 27.5% higher than state-of-the-art results based on RMFCC.
△ Less
Submitted 18 September, 2017; v1 submitted 19 January, 2017;
originally announced January 2017.
-
Comprehensive Review of Audio Steganalysis Methods
Authors:
Hamzeh Ghasemzadeh,
Mohammad H. Kayvanrad
Abstract:
Recently, merging signal processing techniques with information security services has found a lot of attention. Steganography and steganalysis are among those trends. Like their counterparts in cryptology, steganography and steganalysis are in a constant battle. Steganography methods try to hide the presence of covert messages in innocuous-looking data, whereas steganalysis methods try to reveal e…
▽ More
Recently, merging signal processing techniques with information security services has found a lot of attention. Steganography and steganalysis are among those trends. Like their counterparts in cryptology, steganography and steganalysis are in a constant battle. Steganography methods try to hide the presence of covert messages in innocuous-looking data, whereas steganalysis methods try to reveal existence of such messages and to break steganography methods. The stream nature of audio signals, their popularity, and their wide spread usage make them very suitable media for steganography. This has led to a very rich literature on both steganography and steganalysis of audio signals. This paper intends to conduct a comprehensive review of audio steganalysis methods aggregated over near fifteen years. Furthermore, we implement some of the most recent audio steganalysis methods and conduct a comparative analysis on their performances. Finally, the paper provides some possible directions for future researches on audio steganalysis.
△ Less
Submitted 2 April, 2018; v1 submitted 19 January, 2017;
originally announced January 2017.
-
A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs
Authors:
Hamzeh Ghasemzadeh,
Ali Payandeh,
Mohammad Reza Aref
Abstract:
Security is a critical and vital task in wireless sensor networks, therefore different key management systems have been proposed, many of which are based on symmetric cryptography. Such systems are very energy efficient, but they lack some other desirable characteristics. On the other hand, systems based on public key cryptography have those desirable characteristics, but they consume more energy.…
▽ More
Security is a critical and vital task in wireless sensor networks, therefore different key management systems have been proposed, many of which are based on symmetric cryptography. Such systems are very energy efficient, but they lack some other desirable characteristics. On the other hand, systems based on public key cryptography have those desirable characteristics, but they consume more energy. Recently based on authenticated messages from base station a new PKC based key agreement protocol was proposed. We show this method is susceptible to a form of denial of service attack where resources of the network can be exhausted with bogus messages. Then, we propose two different improvements to solve this vulnerability. Simulation results show that these new protocols retain desirable characteristics of the basic method and solve its deficiencies.
△ Less
Submitted 19 January, 2017;
originally announced January 2017.
-
Jigsaw Cryptanalysis of Audio Scrambling Systems
Authors:
Hamzeh Ghasemzadeh,
Mehdi Tajik Khass,
Hamed Mehrara
Abstract:
Recently it was shown that permutation-only multimedia ciphers can completely be broken in a chosen-plaintext scenario. Apparently, chosen-plaintext scenario models a very resourceful adversary and does not hold in many practical situations. To show that these ciphers are totally broken, we propose a cipher-text only attack on these ciphers. To that end, we investigate speech permutation-only ciph…
▽ More
Recently it was shown that permutation-only multimedia ciphers can completely be broken in a chosen-plaintext scenario. Apparently, chosen-plaintext scenario models a very resourceful adversary and does not hold in many practical situations. To show that these ciphers are totally broken, we propose a cipher-text only attack on these ciphers. To that end, we investigate speech permutation-only ciphers and show that inherent redundancies of speech signal can pave the path for a successful cipher-text only attack. For this task different concepts and techniques are merged together. First, Short Time Fourier Transform (STFT) is employed to extract regularities of audio signal in both time and frequency. Then, it is shown that cipher-texts can be considered as a set of scrambled puzzles. Then different techniques such as estimation, image processing, branch and bound, and graph theory are fused together to create and solve these puzzles. After extracting the keys from the solved puzzles, they are applied on the scrambled signal. Conducted tests show that the proposed method achieves objective and subjective intelligibility of 87.8% and 92.9%. These scores are 50.9% and 34.6% higher than scores of previous method.
△ Less
Submitted 19 January, 2017;
originally announced January 2017.