-
MaSS: Multi-attribute Selective Suppression
Authors:
Chun-Fu Chen,
Shaohan Hu,
Zhonghao Shi,
Prateek Gulati,
Bill Moriarty,
Marco Pistoia,
Vincenzo Piuri,
Pierangela Samarati
Abstract:
The recent rapid advances in machine learning technologies largely depend on the vast richness of data available today, in terms of both the quantity and the rich content contained within. For example, biometric data such as images and voices could reveal people's attributes like age, gender, sentiment, and origin, whereas location/motion data could be used to infer people's activity levels, trans…
▽ More
The recent rapid advances in machine learning technologies largely depend on the vast richness of data available today, in terms of both the quantity and the rich content contained within. For example, biometric data such as images and voices could reveal people's attributes like age, gender, sentiment, and origin, whereas location/motion data could be used to infer people's activity levels, transportation modes, and life habits. Along with the new services and applications enabled by such technological advances, various governmental policies are put in place to regulate such data usage and protect people's privacy and rights. As a result, data owners often opt for simple data obfuscation (e.g., blur people's faces in images) or withholding data altogether, which leads to severe data quality degradation and greatly limits the data's potential utility.
Aiming for a sophisticated mechanism which gives data owners fine-grained control while retaining the maximal degree of data utility, we propose Multi-attribute Selective Suppression, or MaSS, a general framework for performing precisely targeted data surgery to simultaneously suppress any selected set of attributes while preserving the rest for downstream machine learning tasks. MaSS learns a data modifier through adversarial games between two sets of networks, where one is aimed at suppressing selected attributes, and the other ensures the retention of the rest of the attributes via general contrastive loss as well as explicit classification metrics. We carried out an extensive evaluation of our proposed method using multiple datasets from different domains including facial images, voice audio, and video clips, and obtained promising results in MaSS' generalizability and capability of suppressing targeted attributes without negatively affecting the data's usability in other downstream ML tasks.
△ Less
Submitted 24 October, 2022; v1 submitted 18 October, 2022;
originally announced October 2022.
-
Classification based credit risk analysis: The case of Lending Club
Authors:
Aadi Gupta,
Priya Gulati,
Siddhartha P. Chakrabarty
Abstract:
In this paper, we performs a credit risk analysis, on the data of past loan applicants of a company named Lending Club. The calculation required the use of exploratory data analysis and machine learning classification algorithms, namely, Logistic Regression and Random Forest Algorithm. We further used the calculated probability of default to design a credit derivative based on the idea of a Credit…
▽ More
In this paper, we performs a credit risk analysis, on the data of past loan applicants of a company named Lending Club. The calculation required the use of exploratory data analysis and machine learning classification algorithms, namely, Logistic Regression and Random Forest Algorithm. We further used the calculated probability of default to design a credit derivative based on the idea of a Credit Default Swap, to hedge against an event of default. The results on the test set are presented using various performance measures.
△ Less
Submitted 11 October, 2022;
originally announced October 2022.
-
[Re] Distilling Knowledge via Knowledge Review
Authors:
Apoorva Verma,
Pranjal Gulati,
Sarthak Gupta
Abstract:
This effort aims to reproduce the results of experiments and analyze the robustness of the review framework for knowledge distillation introduced in the CVPR '21 paper 'Distilling Knowledge via Knowledge Review' by Chen et al. Previous works in knowledge distillation only studied connections paths between the same levels of the student and the teacher, and cross-level connection paths had not been…
▽ More
This effort aims to reproduce the results of experiments and analyze the robustness of the review framework for knowledge distillation introduced in the CVPR '21 paper 'Distilling Knowledge via Knowledge Review' by Chen et al. Previous works in knowledge distillation only studied connections paths between the same levels of the student and the teacher, and cross-level connection paths had not been considered. Chen et al. propose a new residual learning framework to train a single student layer using multiple teacher layers. They also design a novel fusion module to condense feature maps across levels and a loss function to compare feature information stored across different levels to improve performance. In this work, we consistently verify the improvements in test accuracy across student models as reported in the original paper and study the effectiveness of the novel modules introduced by conducting ablation studies and new experiments.
△ Less
Submitted 18 May, 2022;
originally announced May 2022.
-
Boundaries control active channel flows
Authors:
Paarth Gulati,
Suraj Shankar,
M. Cristina Marchetti
Abstract:
Boundary conditions dictate how fluids, including liquid crystals, flow when pumped through a channel. Can boundary conditions also be used to control internally driven active fluids that generate flows spontaneously? By using numerical simulations and stability analysis we explore how surface anchoring of active agents at the boundaries and substrate drag can be used to rectify coherent flow of a…
▽ More
Boundary conditions dictate how fluids, including liquid crystals, flow when pumped through a channel. Can boundary conditions also be used to control internally driven active fluids that generate flows spontaneously? By using numerical simulations and stability analysis we explore how surface anchoring of active agents at the boundaries and substrate drag can be used to rectify coherent flow of an active polar fluid in a 2D channel. Upon increasing activity, a succession of dynamical states is obtained, from laminar flow to vortex arrays to eventual turbulence, that are controlled by the interplay between the hydrodynamic screening length and the extrapolation length quantifying the anchoring strength of the orientational order parameter. We highlight the key role of symmetry in both flow and order and show that coherent laminar flow with net throughput is only possible for weak anchoring and intermediate activity. Our work demonstrates the possibility of controlling the nature and properties of active flows in a channel simply by patterning the confining boundaries.
△ Less
Submitted 17 May, 2022;
originally announced May 2022.
-
Analysing Word Importance for Image Annotation
Authors:
Payal Gulati,
A. K. Sharma
Abstract:
Image annotation provides several keywords automatically for a given image based on various tags to describe its contents which is useful in Image retrieval. Various researchers are working on text based and content based image annotations [7,9]. It is seen, in traditional Image annotation approaches, annotation words are treated equally without considering the importance of each word in real worl…
▽ More
Image annotation provides several keywords automatically for a given image based on various tags to describe its contents which is useful in Image retrieval. Various researchers are working on text based and content based image annotations [7,9]. It is seen, in traditional Image annotation approaches, annotation words are treated equally without considering the importance of each word in real world. In context of this, in this work, images are annotated with keywords based on their frequency count and word correlation. Moreover this work proposes an approach to compute importance score of candidate keywords, having same frequency count.
△ Less
Submitted 20 June, 2013;
originally announced June 2013.
-
A Dynamic ID-based Remote User Authentication Scheme
Authors:
Manik Lal Das,
Ashutosh Saxena,
Ved P. Gulati
Abstract:
Password-based authentication schemes are the most widely used techniques for remote user authentication. Many static ID-based remote user authentication schemes both with and without smart cards have been proposed. Most of the schemes do not allow the users to choose and change their passwords, and maintain a verifier table to verify the validity of the user login. In this paper we present a dy…
▽ More
Password-based authentication schemes are the most widely used techniques for remote user authentication. Many static ID-based remote user authentication schemes both with and without smart cards have been proposed. Most of the schemes do not allow the users to choose and change their passwords, and maintain a verifier table to verify the validity of the user login. In this paper we present a dynamic ID-based remote user authentication scheme using smart cards. Our scheme allows the users to choose and change their passwords freely, and do not maintain any verifier table. The scheme is secure against ID-theft, and can resist the reply attacks, forgery attacks, guessing attacks, insider attacks and stolen verifier attacks.
△ Less
Submitted 13 December, 2007;
originally announced December 2007.
-
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing
Authors:
Ravi S. Veerubhotla,
Ashutosh Saxena,
V. P. Gulati,
A. K. Pujari
Abstract:
This work presents two new construction techniques for q-ary Gossip codes from tdesigns and Traceability schemes. These Gossip codes achieve the shortest code length specified in terms of code parameters and can withstand erasures in digital fingerprinting applications. This work presents the construction of embedded Gossip codes for extending an existing Gossip code into a bigger code. It discu…
▽ More
This work presents two new construction techniques for q-ary Gossip codes from tdesigns and Traceability schemes. These Gossip codes achieve the shortest code length specified in terms of code parameters and can withstand erasures in digital fingerprinting applications. This work presents the construction of embedded Gossip codes for extending an existing Gossip code into a bigger code. It discusses the construction of concatenated codes and realisation of erasure model through concatenated codes.
△ Less
Submitted 24 May, 2005;
originally announced May 2005.