-
Incorporating Anatomical Awareness for Enhanced Generalizability and Progression Prediction in Deep Learning-Based Radiographic Sacroiliitis Detection
Authors:
Felix J. Dorfner,
Janis L. Vahldiek,
Leonhard Donle,
Andrei Zhukov,
Lina Xu,
Hartmut Häntze,
Marcus R. Makowski,
Hugo J. W. L. Aerts,
Fabian Proft,
Valeria Rios Rodriguez,
Judith Rademacher,
Mikhail Protopopov,
Hildrun Haibel,
Torsten Diekhoff,
Murat Torgutalp,
Lisa C. Adams,
Denis Poddubnyy,
Keno K. Bressem
Abstract:
Purpose: To examine whether incorporating anatomical awareness into a deep learning model can improve generalizability and enable prediction of disease progression.
Methods: This retrospective multicenter study included conventional pelvic radiographs of 4 different patient cohorts focusing on axial spondyloarthritis (axSpA) collected at university and community hospitals. The first cohort, whic…
▽ More
Purpose: To examine whether incorporating anatomical awareness into a deep learning model can improve generalizability and enable prediction of disease progression.
Methods: This retrospective multicenter study included conventional pelvic radiographs of 4 different patient cohorts focusing on axial spondyloarthritis (axSpA) collected at university and community hospitals. The first cohort, which consisted of 1483 radiographs, was split into training (n=1261) and validation (n=222) sets. The other cohorts comprising 436, 340, and 163 patients, respectively, were used as independent test datasets. For the second cohort, follow-up data of 311 patients was used to examine progression prediction capabilities. Two neural networks were trained, one on images cropped to the bounding box of the sacroiliac joints (anatomy-aware) and the other one on full radiographs. The performance of the models was compared using the area under the receiver operating characteristic curve (AUC), accuracy, sensitivity, and specificity.
Results: On the three test datasets, the standard model achieved AUC scores of 0.853, 0.817, 0.947, with an accuracy of 0.770, 0.724, 0.850. Whereas the anatomy-aware model achieved AUC scores of 0.899, 0.846, 0.957, with an accuracy of 0.821, 0.744, 0.906, respectively. The patients who were identified as high risk by the anatomy aware model had an odds ratio of 2.16 (95% CI: 1.19, 3.86) for having progression of radiographic sacroiliitis within 2 years.
Conclusion: Anatomical awareness can improve the generalizability of a deep learning model in detecting radiographic sacroiliitis. The model is published as fully open source alongside this study.
△ Less
Submitted 12 May, 2024;
originally announced May 2024.
-
From Text to Image: Exploring GPT-4Vision's Potential in Advanced Radiological Analysis across Subspecialties
Authors:
Felix Busch,
Tianyu Han,
Marcus Makowski,
Daniel Truhn,
Keno Bressem,
Lisa Adams
Abstract:
The study evaluates and compares GPT-4 and GPT-4Vision for radiological tasks, suggesting GPT-4Vision may recognize radiological features from images, thereby enhancing its diagnostic potential over text-based descriptions.
The study evaluates and compares GPT-4 and GPT-4Vision for radiological tasks, suggesting GPT-4Vision may recognize radiological features from images, thereby enhancing its diagnostic potential over text-based descriptions.
△ Less
Submitted 24 November, 2023;
originally announced November 2023.
-
Evaluation of GPT-4 for chest X-ray impression generation: A reader study on performance and perception
Authors:
Sebastian Ziegelmayer,
Alexander W. Marka,
Nicolas Lenhart,
Nadja Nehls,
Stefan Reischl,
Felix Harder,
Andreas Sauter,
Marcus Makowski,
Markus Graf,
Joshua Gawlitza
Abstract:
The remarkable generative capabilities of multimodal foundation models are currently being explored for a variety of applications. Generating radiological impressions is a challenging task that could significantly reduce the workload of radiologists. In our study we explored and analyzed the generative abilities of GPT-4 for Chest X-ray impression generation. To generate and evaluate impressions o…
▽ More
The remarkable generative capabilities of multimodal foundation models are currently being explored for a variety of applications. Generating radiological impressions is a challenging task that could significantly reduce the workload of radiologists. In our study we explored and analyzed the generative abilities of GPT-4 for Chest X-ray impression generation. To generate and evaluate impressions of chest X-rays based on different input modalities (image, text, text and image), a blinded radiological report was written for 25-cases of the publicly available NIH-dataset. GPT-4 was given image, finding section or both sequentially to generate an input dependent impression. In a blind randomized reading, 4-radiologists rated the impressions and were asked to classify the impression origin (Human, AI), providing justification for their decision. Lastly text model evaluation metrics and their correlation with the radiological score (summation of the 4 dimensions) was assessed. According to the radiological score, the human-written impression was rated highest, although not significantly different to text-based impressions. The automated evaluation metrics showed moderate to substantial correlations to the radiological score for the image impressions, however individual scores were highly divergent among inputs, indicating insufficient representation of radiological quality. Detection of AI-generated impressions varied by input and was 61% for text-based impressions. Impressions classified as AI-generated had significantly worse radiological scores even when written by a radiologist, indicating potential bias. Our study revealed significant discrepancies between a radiological assessment and common automatic evaluation metrics depending on the model input. The detection of AI-generated findings is subject to bias that highly rated impressions are perceived as human-written.
△ Less
Submitted 12 November, 2023;
originally announced November 2023.
-
MEDBERT.de: A Comprehensive German BERT Model for the Medical Domain
Authors:
Keno K. Bressem,
Jens-Michalis Papaioannou,
Paul Grundmann,
Florian Borchert,
Lisa C. Adams,
Leonhard Liu,
Felix Busch,
Lina Xu,
Jan P. Loyen,
Stefan M. Niehues,
Moritz Augustin,
Lennart Grosser,
Marcus R. Makowski,
Hugo JWL. Aerts,
Alexander Löser
Abstract:
This paper presents medBERTde, a pre-trained German BERT model specifically designed for the German medical domain. The model has been trained on a large corpus of 4.7 Million German medical documents and has been shown to achieve new state-of-the-art performance on eight different medical benchmarks covering a wide range of disciplines and medical document types. In addition to evaluating the ove…
▽ More
This paper presents medBERTde, a pre-trained German BERT model specifically designed for the German medical domain. The model has been trained on a large corpus of 4.7 Million German medical documents and has been shown to achieve new state-of-the-art performance on eight different medical benchmarks covering a wide range of disciplines and medical document types. In addition to evaluating the overall performance of the model, this paper also conducts a more in-depth analysis of its capabilities. We investigate the impact of data deduplication on the model's performance, as well as the potential benefits of using more efficient tokenization methods. Our results indicate that domain-specific models such as medBERTde are particularly useful for longer texts, and that deduplication of training data does not necessarily lead to improved performance. Furthermore, we found that efficient tokenization plays only a minor role in improving model performance, and attribute most of the improved performance to the large amount of training data. To encourage further research, the pre-trained model weights and new benchmarks based on radiological data are made publicly available for use by the scientific community.
△ Less
Submitted 24 March, 2023; v1 submitted 14 March, 2023;
originally announced March 2023.
-
Private, fair and accurate: Training large-scale, privacy-preserving AI models in medical imaging
Authors:
Soroosh Tayebi Arasteh,
Alexander Ziller,
Christiane Kuhl,
Marcus Makowski,
Sven Nebelung,
Rickmer Braren,
Daniel Rueckert,
Daniel Truhn,
Georgios Kaissis
Abstract:
Artificial intelligence (AI) models are increasingly used in the medical domain. However, as medical data is highly sensitive, special precautions to ensure its protection are required. The gold standard for privacy preservation is the introduction of differential privacy (DP) to model training. Prior work indicates that DP has negative implications on model accuracy and fairness, which are unacce…
▽ More
Artificial intelligence (AI) models are increasingly used in the medical domain. However, as medical data is highly sensitive, special precautions to ensure its protection are required. The gold standard for privacy preservation is the introduction of differential privacy (DP) to model training. Prior work indicates that DP has negative implications on model accuracy and fairness, which are unacceptable in medicine and represent a main barrier to the widespread use of privacy-preserving techniques. In this work, we evaluated the effect of privacy-preserving training of AI models regarding accuracy and fairness compared to non-private training. For this, we used two datasets: (1) A large dataset (N=193,311) of high quality clinical chest radiographs, and (2) a dataset (N=1,625) of 3D abdominal computed tomography (CT) images, with the task of classifying the presence of pancreatic ductal adenocarcinoma (PDAC). Both were retrospectively collected and manually labeled by experienced radiologists. We then compared non-private deep convolutional neural networks (CNNs) and privacy-preserving (DP) models with respect to privacy-utility trade-offs measured as area under the receiver-operator-characteristic curve (AUROC), and privacy-fairness trade-offs, measured as Pearson's r or Statistical Parity Difference. We found that, while the privacy-preserving trainings yielded lower accuracy, they did largely not amplify discrimination against age, sex or co-morbidity. Our study shows that -- under the challenging realistic circumstances of a real-life clinical dataset -- the privacy-preserving training of diagnostic deep learning models is possible with excellent diagnostic accuracy and fairness.
△ Less
Submitted 16 March, 2024; v1 submitted 3 February, 2023;
originally announced February 2023.
-
Dynamic complex opto-magnetic holography
Authors:
Michal Makowski,
Jaroslaw Bomba,
Antoni Frej,
Mateusz Kolodziejczyk,
Maciej Sypek,
Tomoyoshi Shimobaba,
Tomoyoshi Ito,
Andrei Kirilyuk,
Andrzej Stupakiewicz
Abstract:
Computer-generated holograms with their animated, three-dimensional appearance have long appealed to our imagination as the path towards truly immersive displays with bi-directional natural parallax. Impressive progress in updateable 3-D imagery has been achieved with liquid crystal modulators and high-resolution, but quasi-static holograms are being recorded in photosensitive materials. However,…
▽ More
Computer-generated holograms with their animated, three-dimensional appearance have long appealed to our imagination as the path towards truly immersive displays with bi-directional natural parallax. Impressive progress in updateable 3-D imagery has been achieved with liquid crystal modulators and high-resolution, but quasi-static holograms are being recorded in photosensitive materials. However, the memory requirements and computational loads of real-time, large-area holography will be hard to tackle for several decades to come with the current paradigm based on a matrix calculations and bit-plane writing. Here, we experimentally demonstrate a conceptually novel, holistic approach to serial computation and repeatable writing of computer-generated dynamic holograms without Fourier transform, using minimal amounts of computer memory. We use the ultrafast opto-magnetic recording of holographic patterns in a ferrimagnetic film with femtosecond laser pulses, driven by on-the-fly hardware computation of a single holographic point. The intensity-threshold nature of the magnetic medium allows sub-diffraction-limited, point-by-point toggling of arbitrarily localized magnetic spots on the sample, according to the proposed circular detour-phase encoding, providing complex modulation and symmetrical suppression of upper diffractive orders and conjugated terms in holographically reconstructed 3-D images.
△ Less
Submitted 4 November, 2022;
originally announced November 2022.
-
What Does DALL-E 2 Know About Radiology?
Authors:
Lisa C. Adams,
Felix Busch,
Daniel Truhn,
Marcus R. Makowski,
Hugo JWL. Aerts,
Keno K. Bressem
Abstract:
Generative models such as DALL-E 2 could represent a promising future tool for image generation, augmentation, and manipulation for artificial intelligence research in radiology provided that these models have sufficient medical domain knowledge. Here we show that DALL-E 2 has learned relevant representations of X-ray images with promising capabilities in terms of zero-shot text-to-image generatio…
▽ More
Generative models such as DALL-E 2 could represent a promising future tool for image generation, augmentation, and manipulation for artificial intelligence research in radiology provided that these models have sufficient medical domain knowledge. Here we show that DALL-E 2 has learned relevant representations of X-ray images with promising capabilities in terms of zero-shot text-to-image generation of new images, continuation of an image beyond its original boundaries, or removal of elements, while pathology generation or CT, MRI, and ultrasound images are still limited. The use of generative models for augmenting and generating radiological data thus seems feasible, even if further fine-tuning and adaptation of these models to the respective domain is required beforehand.
△ Less
Submitted 27 September, 2022;
originally announced September 2022.
-
Transactional Interpretation for the Principle of Minimum Fisher Information
Authors:
Marcin Makowski,
Edward W. Piotrowski,
Piotr Frąckiewicz,
Marek Szopa
Abstract:
The principle of minimum Fisher information states that in the set of acceptable probability distributions characterizing the given system, it is best done by the one that minimizes the corresponding Fisher information. This principle can be applied to transaction processes, the dynamics of which can be interpreted as the market tendency to minimize the information revealed about itself. More info…
▽ More
The principle of minimum Fisher information states that in the set of acceptable probability distributions characterizing the given system, it is best done by the one that minimizes the corresponding Fisher information. This principle can be applied to transaction processes, the dynamics of which can be interpreted as the market tendency to minimize the information revealed about itself. More information involves higher costs (information is physical). The starting point for our considerations is a description of the market derived from the assumption of minimum Fisher information for a strategy with a fixed financial risk. Strategies of this type that minimize Fisher information overlap with the well-known eigenstates of a the quantum harmonic oscillator. The analytical extension of this field of strategy to the complex vector space (traditional for quantum mechanics) suggests the study of the interference of the oscillator eigenstates in terms of their minimization of Fisher information. It is revealed that the minimum value of Fisher information of the superposition of the two strategies being the ground state and the second excited state of the oscillator, has Fisher information less than the ground state of the oscillator. Similarly, less information is obtained for the system of strategies (the oscillator eigenstates) randomized by the Gibbs distribution. We distinguish two different views on the description of Fisher information. One of them, the classical, is based on the value of Fisher information. The second, we call it transactional, expresses Fisher information from the perspective of the constant risk of market strategies. The orders of the market strategies derived from these two descriptions are different. From a market standpoint, minimizing Fisher information is equivalent to minimizing risk.
△ Less
Submitted 23 January, 2022;
originally announced March 2022.
-
Longitudinal Self-Supervision for COVID-19 Pathology Quantification
Authors:
Tobias Czempiel,
Coco Rogers,
Matthias Keicher,
Magdalini Paschali,
Rickmer Braren,
Egon Burian,
Marcus Makowski,
Nassir Navab,
Thomas Wendler,
Seong Tae Kim
Abstract:
Quantifying COVID-19 infection over time is an important task to manage the hospitalization of patients during a global pandemic. Recently, deep learning-based approaches have been proposed to help radiologists automatically quantify COVID-19 pathologies on longitudinal CT scans. However, the learning process of deep learning methods demands extensive training data to learn the complex characteris…
▽ More
Quantifying COVID-19 infection over time is an important task to manage the hospitalization of patients during a global pandemic. Recently, deep learning-based approaches have been proposed to help radiologists automatically quantify COVID-19 pathologies on longitudinal CT scans. However, the learning process of deep learning methods demands extensive training data to learn the complex characteristics of infected regions over longitudinal scans. It is challenging to collect a large-scale dataset, especially for longitudinal training. In this study, we want to address this problem by proposing a new self-supervised learning method to effectively train longitudinal networks for the quantification of COVID-19 infections. For this purpose, longitudinal self-supervision schemes are explored on clinical longitudinal COVID-19 CT scans. Experimental results show that the proposed method is effective, hel** the model better exploit the semantics of longitudinal data and improve two COVID-19 quantification tasks.
△ Less
Submitted 21 March, 2022;
originally announced March 2022.
-
Per-Pixel Lung Thickness and Lung Capacity Estimation on Chest X-Rays using Convolutional Neural Networks
Authors:
Manuel Schultheiss,
Philipp Schmette,
Thorsten Sellerer,
Rafael Schick,
Kirsten Taphorn,
Korbinian Mechlem,
Lorenz Birnbacher,
Bernhard Renger,
Marcus R. Makowski,
Franz Pfeiffer,
Daniela Pfeiffer
Abstract:
Estimating the lung depth on x-ray images could provide both an accurate opportunistic lung volume estimation during clinical routine and improve image contrast in modern structural chest imaging techniques like x-ray dark-field imaging. We present a method based on a convolutional neural network that allows a per-pixel lung thickness estimation and subsequent total lung capacity estimation. The n…
▽ More
Estimating the lung depth on x-ray images could provide both an accurate opportunistic lung volume estimation during clinical routine and improve image contrast in modern structural chest imaging techniques like x-ray dark-field imaging. We present a method based on a convolutional neural network that allows a per-pixel lung thickness estimation and subsequent total lung capacity estimation. The network was trained and validated using 5250 simulated radiographs generated from 525 real CT scans. The network was evaluated on a test set of 131 synthetic radiographs and a retrospective evaluation was performed on another test set of 45 standard clinical radiographs. The standard clinical radiographs were obtained from 45 patients, who got a CT examination between July 1, 2021 and September 1, 2021 and a chest x-ray 6 month before or after the CT. For 45 standard clinical radiographs, the mean-absolute error between the estimated lung volume and groundtruth volume was 0.75 liter with a positive correlation (r = 0.78). When accounting for the patient diameter, the error decreases to 0.69 liter with a positive correlation (r = 0.83). Additionally, we predicted the lung thicknesses on the synthetic test set, where the mean-absolute error between the total volumes was 0.19 liter with a positive correlation (r = 0.99). The results show, that creation of lung thickness maps and estimation of approximate total lung volume is possible from standard clinical radiographs.
△ Less
Submitted 29 March, 2022; v1 submitted 24 October, 2021;
originally announced October 2021.
-
Interactive Segmentation for COVID-19 Infection Quantification on Longitudinal CT scans
Authors:
Michelle Xiao-Lin Foo,
Seong Tae Kim,
Magdalini Paschali,
Leili Goli,
Egon Burian,
Marcus Makowski,
Rickmer Braren,
Nassir Navab,
Thomas Wendler
Abstract:
Consistent segmentation of COVID-19 patient's CT scans across multiple time points is essential to assess disease progression and response to therapy accurately. Existing automatic and interactive segmentation models for medical images only use data from a single time point (static). However, valuable segmentation information from previous time points is often not used to aid the segmentation of a…
▽ More
Consistent segmentation of COVID-19 patient's CT scans across multiple time points is essential to assess disease progression and response to therapy accurately. Existing automatic and interactive segmentation models for medical images only use data from a single time point (static). However, valuable segmentation information from previous time points is often not used to aid the segmentation of a patient's follow-up scans. Also, fully automatic segmentation techniques frequently produce results that would need further editing for clinical use. In this work, we propose a new single network model for interactive segmentation that fully utilizes all available past information to refine the segmentation of follow-up scans. In the first segmentation round, our model takes 3D volumes of medical images from two-time points (target and reference) as concatenated slices with the additional reference time point segmentation as a guide to segment the target scan. In subsequent segmentation refinement rounds, user feedback in the form of scribbles that correct the segmentation and the target's previous segmentation results are additionally fed into the model. This ensures that the segmentation information from previous refinement rounds is retained. Experimental results on our in-house multiclass longitudinal COVID-19 dataset show that the proposed model outperforms its static version and can assist in localizing COVID-19 infections in patient's follow-up scans.
△ Less
Submitted 1 June, 2023; v1 submitted 3 October, 2021;
originally announced October 2021.
-
Tracked 3D Ultrasound and Deep Neural Network-based Thyroid Segmentation reduce Interobserver Variability in Thyroid Volumetry
Authors:
Markus Krönke,
Christine Eilers,
Desislava Dimova,
Melanie Köhler,
Gabriel Buschner,
Lilit Mirzojan,
Lemonia Konstantinidou,
Marcus R. Makowski,
James Nagarajah,
Nassir Navab,
Wolfgang Weber,
Thomas Wendler
Abstract:
Background: Thyroid volumetry is crucial in diagnosis, treatment and monitoring of thyroid diseases. However, conventional thyroid volumetry with 2D ultrasound is highly operator-dependent. This study compares 2D ultrasound and tracked 3D ultrasound with an automatic thyroid segmentation based on a deep neural network regarding inter- and intraobserver variability, time and accuracy. Volume refere…
▽ More
Background: Thyroid volumetry is crucial in diagnosis, treatment and monitoring of thyroid diseases. However, conventional thyroid volumetry with 2D ultrasound is highly operator-dependent. This study compares 2D ultrasound and tracked 3D ultrasound with an automatic thyroid segmentation based on a deep neural network regarding inter- and intraobserver variability, time and accuracy. Volume reference was MRI. Methods: 28 healthy volunteers were scanned with 2D and 3D ultrasound as well as by MRI. Three physicians (MD 1, 2, 3) with different levels of experience (6, 4 and 1 a) performed three 2D ultrasound and three tracked 3D ultrasound scans on each volunteer. In the 2D scans the thyroid lobe volumes were calculated with the ellipsoid formula. A convolutional deep neural network (CNN) segmented the 3D thyroid lobes automatically. On MRI (T1 VIBE sequence) the thyroid was manually segmented by an experienced medical doctor. Results: The CNN was trained to obtain a dice score of 0.94. The interobserver variability comparing two MDs showed mean differences for 2D and 3D respectively of 0.58 ml to 0.52 ml (MD1 vs. 2), -1.33 ml to -0.17 ml (MD1 vs. 3) and -1.89 ml to -0.70 ml (MD2 vs. 3). Paired samples t-tests showed significant differences in two comparisons for 2D and none for 3D. Intraobsever variability was similar for 2D and 3D ultrasound. Comparison of ultrasound volumes and MRI volumes by paired samples t-tests showed a significant difference for the 2D volumetry of all MDs, and no significant difference for 3D ultrasound. Acquisition time was significantly shorter for 3D ultrasound. Conclusion: Tracked 3D ultrasound combined with a CNN segmentation significantly reduces interobserver variability in thyroid volumetry and increases the accuracy of the measurements with shorter acquisition times.
△ Less
Submitted 10 August, 2021;
originally announced August 2021.
-
U-GAT: Multimodal Graph Attention Network for COVID-19 Outcome Prediction
Authors:
Matthias Keicher,
Hendrik Burwinkel,
David Bani-Harouni,
Magdalini Paschali,
Tobias Czempiel,
Egon Burian,
Marcus R. Makowski,
Rickmer Braren,
Nassir Navab,
Thomas Wendler
Abstract:
During the first wave of COVID-19, hospitals were overwhelmed with the high number of admitted patients. An accurate prediction of the most likely individual disease progression can improve the planning of limited resources and finding the optimal treatment for patients. However, when dealing with a newly emerging disease such as COVID-19, the impact of patient- and disease-specific factors (e.g.…
▽ More
During the first wave of COVID-19, hospitals were overwhelmed with the high number of admitted patients. An accurate prediction of the most likely individual disease progression can improve the planning of limited resources and finding the optimal treatment for patients. However, when dealing with a newly emerging disease such as COVID-19, the impact of patient- and disease-specific factors (e.g. body weight or known co-morbidities) on the immediate course of disease is by and large unknown. In the case of COVID-19, the need for intensive care unit (ICU) admission of pneumonia patients is often determined only by acute indicators such as vital signs (e.g. breathing rate, blood oxygen levels), whereas statistical analysis and decision support systems that integrate all of the available data could enable an earlier prognosis. To this end, we propose a holistic graph-based approach combining both imaging and non-imaging information. Specifically, we introduce a multimodal similarity metric to build a population graph for clustering patients and an image-based end-to-end Graph Attention Network to process this graph and predict the COVID-19 patient outcomes: admission to ICU, need for ventilation and mortality. Additionally, the network segments chest CT images as an auxiliary task and extracts image features and radiomics for feature fusion with the available metadata. Results on a dataset collected in Klinikum rechts der Isar in Munich, Germany show that our approach outperforms single modality and non-graph baselines. Moreover, our clustering and graph attention allow for increased understanding of the patient relationships within the population graph and provide insight into the network's decision-making process.
△ Less
Submitted 29 July, 2021;
originally announced August 2021.
-
NeuralDP Differentially private neural networks by design
Authors:
Moritz Knolle,
Dmitrii Usynin,
Alexander Ziller,
Marcus R. Makowski,
Daniel Rueckert,
Georgios Kaissis
Abstract:
The application of differential privacy to the training of deep neural networks holds the promise of allowing large-scale (decentralized) use of sensitive data while providing rigorous privacy guarantees to the individual. The predominant approach to differentially private training of neural networks is DP-SGD, which relies on norm-based gradient clip** as a method for bounding sensitivity, foll…
▽ More
The application of differential privacy to the training of deep neural networks holds the promise of allowing large-scale (decentralized) use of sensitive data while providing rigorous privacy guarantees to the individual. The predominant approach to differentially private training of neural networks is DP-SGD, which relies on norm-based gradient clip** as a method for bounding sensitivity, followed by the addition of appropriately calibrated Gaussian noise. In this work we propose NeuralDP, a technique for privatising activations of some layer within a neural network, which by the post-processing properties of differential privacy yields a differentially private network. We experimentally demonstrate on two datasets (MNIST and Pediatric Pneumonia Dataset (PPD)) that our method offers substantially improved privacy-utility trade-offs compared to DP-SGD.
△ Less
Submitted 10 August, 2021; v1 submitted 30 July, 2021;
originally announced July 2021.
-
Differentially private training of neural networks with Langevin dynamics for calibrated predictive uncertainty
Authors:
Moritz Knolle,
Alexander Ziller,
Dmitrii Usynin,
Rickmer Braren,
Marcus R. Makowski,
Daniel Rueckert,
Georgios Kaissis
Abstract:
We show that differentially private stochastic gradient descent (DP-SGD) can yield poorly calibrated, overconfident deep learning models. This represents a serious issue for safety-critical applications, e.g. in medical diagnosis. We highlight and exploit parallels between stochastic gradient Langevin dynamics, a scalable Bayesian inference technique for training deep neural networks, and DP-SGD,…
▽ More
We show that differentially private stochastic gradient descent (DP-SGD) can yield poorly calibrated, overconfident deep learning models. This represents a serious issue for safety-critical applications, e.g. in medical diagnosis. We highlight and exploit parallels between stochastic gradient Langevin dynamics, a scalable Bayesian inference technique for training deep neural networks, and DP-SGD, in order to train differentially private, Bayesian neural networks with minor adjustments to the original (DP-SGD) algorithm. Our approach provides considerably more reliable uncertainty estimates than DP-SGD, as demonstrated empirically by a reduction in expected calibration error (MNIST $\sim{5}$-fold, Pediatric Pneumonia Dataset $\sim{2}$-fold).
△ Less
Submitted 4 August, 2021; v1 submitted 9 July, 2021;
originally announced July 2021.
-
Sensitivity analysis in differentially private machine learning using hybrid automatic differentiation
Authors:
Alexander Ziller,
Dmitrii Usynin,
Moritz Knolle,
Kritika Prakash,
Andrew Trask,
Rickmer Braren,
Marcus Makowski,
Daniel Rueckert,
Georgios Kaissis
Abstract:
In recent years, formal methods of privacy protection such as differential privacy (DP), capable of deployment to data-driven tasks such as machine learning (ML), have emerged. Reconciling large-scale ML with the closed-form reasoning required for the principled analysis of individual privacy loss requires the introduction of new tools for automatic sensitivity analysis and for tracking an individ…
▽ More
In recent years, formal methods of privacy protection such as differential privacy (DP), capable of deployment to data-driven tasks such as machine learning (ML), have emerged. Reconciling large-scale ML with the closed-form reasoning required for the principled analysis of individual privacy loss requires the introduction of new tools for automatic sensitivity analysis and for tracking an individual's data and their features through the flow of computation. For this purpose, we introduce a novel \textit{hybrid} automatic differentiation (AD) system which combines the efficiency of reverse-mode AD with an ability to obtain a closed-form expression for any given quantity in the computational graph. This enables modelling the sensitivity of arbitrary differentiable function compositions, such as the training of neural networks on private data. We demonstrate our approach by analysing the individual DP guarantees of statistical database queries. Moreover, we investigate the application of our technique to the training of DP neural networks. Our approach can enable the principled reasoning about privacy loss in the setting of data processing, and further the development of automatic sensitivity analysis and privacy budgeting systems.
△ Less
Submitted 17 August, 2021; v1 submitted 9 July, 2021;
originally announced July 2021.
-
Differentially private federated deep learning for multi-site medical image segmentation
Authors:
Alexander Ziller,
Dmitrii Usynin,
Nicolas Remerscheid,
Moritz Knolle,
Marcus Makowski,
Rickmer Braren,
Daniel Rueckert,
Georgios Kaissis
Abstract:
Collaborative machine learning techniques such as federated learning (FL) enable the training of models on effectively larger datasets without data transfer. Recent initiatives have demonstrated that segmentation models trained with FL can achieve performance similar to locally trained models. However, FL is not a fully privacy-preserving technique and privacy-centred attacks can disclose confiden…
▽ More
Collaborative machine learning techniques such as federated learning (FL) enable the training of models on effectively larger datasets without data transfer. Recent initiatives have demonstrated that segmentation models trained with FL can achieve performance similar to locally trained models. However, FL is not a fully privacy-preserving technique and privacy-centred attacks can disclose confidential patient data. Thus, supplementing FL with privacy-enhancing technologies (PTs) such as differential privacy (DP) is a requirement for clinical applications in a multi-institutional setting. The application of PTs to FL in medical imaging and the trade-offs between privacy guarantees and model utility, the ramifications on training performance and the susceptibility of the final models to attacks have not yet been conclusively investigated. Here we demonstrate the first application of differentially private gradient descent-based FL on the task of semantic segmentation in computed tomography. We find that high segmentation performance is possible under strong privacy guarantees with an acceptable training time penalty. We furthermore demonstrate the first successful gradient-based model inversion attack on a semantic segmentation model and show that the application of DP prevents it from divulging sensitive image features.
△ Less
Submitted 6 July, 2021;
originally announced July 2021.
-
Measuring and upscaling micromechanical interactions in a cohesive granular material
Authors:
Arnaud Hemmerle,
Yuta Yamaguchi,
Marcin Makowski,
Oliver Bäumchen,
Lucas Goehring
Abstract:
The mechanical properties of a disordered heterogeneous medium depend, in general, on a complex interplay between multiple length scales. Connecting local interactions to macroscopic observables, such as stiffness or fracture, is thus challenging in this type of material. Here, we study the properties of a cohesive granular material composed of glass beads held together by soft polymer bridges. We…
▽ More
The mechanical properties of a disordered heterogeneous medium depend, in general, on a complex interplay between multiple length scales. Connecting local interactions to macroscopic observables, such as stiffness or fracture, is thus challenging in this type of material. Here, we study the properties of a cohesive granular material composed of glass beads held together by soft polymer bridges. We characterise the mechanical response of single bridges under traction and shear, using a setup based on the deflection of flexible micropipettes. These measurements, along with information from X-ray microtomograms of the granular packings, then inform large-scale discrete element model (DEM) simulations. Although simple, these simulations are constrained in every way by empirical measurement and accurately predict mechanical responses of the aggregates, including details on their compressive failure, and how the material's stiffness depends on the stiffness and geometry of its parts. By demonstrating how to accurately relate microscopic information to macroscopic properties, these results provide new perspectives for predicting the behaviour of complex disordered materials, such as porous rock, snow, or foam.
△ Less
Submitted 25 March, 2021;
originally announced March 2021.
-
3D U-Net for segmentation of COVID-19 associated pulmonary infiltrates using transfer learning: State-of-the-art results on affordable hardware
Authors:
Keno K. Bressem,
Stefan M. Niehues,
Bernd Hamm,
Marcus R. Makowski,
Janis L. Vahldiek,
Lisa C. Adams
Abstract:
Segmentation of pulmonary infiltrates can help assess severity of COVID-19, but manual segmentation is labor and time-intensive. Using neural networks to segment pulmonary infiltrates would enable automation of this task. However, training a 3D U-Net from computed tomography (CT) data is time- and resource-intensive. In this work, we therefore developed and tested a solution on how transfer learni…
▽ More
Segmentation of pulmonary infiltrates can help assess severity of COVID-19, but manual segmentation is labor and time-intensive. Using neural networks to segment pulmonary infiltrates would enable automation of this task. However, training a 3D U-Net from computed tomography (CT) data is time- and resource-intensive. In this work, we therefore developed and tested a solution on how transfer learning can be used to train state-of-the-art segmentation models on limited hardware and in shorter time. We use the recently published RSNA International COVID-19 Open Radiology Database (RICORD) to train a fully three-dimensional U-Net architecture using an 18-layer 3D ResNet, pretrained on the Kinetics-400 dataset as encoder. The generalization of the model was then tested on two openly available datasets of patients with COVID-19, who received chest CTs (Corona Cases and MosMed datasets). Our model performed comparable to previously published 3D U-Net architectures, achieving a mean Dice score of 0.679 on the tuning dataset, 0.648 on the Coronacases dataset and 0.405 on the MosMed dataset. Notably, these results were achieved with shorter training time on a single GPU with less memory available than the GPUs used in previous studies.
△ Less
Submitted 25 January, 2021;
originally announced January 2021.
-
Privacy-preserving medical image analysis
Authors:
Alexander Ziller,
Jonathan Passerat-Palmbach,
Théo Ryffel,
Dmitrii Usynin,
Andrew Trask,
Ionésio Da Lima Costa Junior,
Jason Mancuso,
Marcus Makowski,
Daniel Rueckert,
Rickmer Braren,
Georgios Kaissis
Abstract:
The utilisation of artificial intelligence in medicine and healthcare has led to successful clinical applications in several domains. The conflict between data usage and privacy protection requirements in such systems must be resolved for optimal results as well as ethical and legal compliance. This calls for innovative solutions such as privacy-preserving machine learning (PPML). We present PriMI…
▽ More
The utilisation of artificial intelligence in medicine and healthcare has led to successful clinical applications in several domains. The conflict between data usage and privacy protection requirements in such systems must be resolved for optimal results as well as ethical and legal compliance. This calls for innovative solutions such as privacy-preserving machine learning (PPML). We present PriMIA (Privacy-preserving Medical Image Analysis), a software framework designed for PPML in medical imaging. In a real-life case study we demonstrate significantly better classification performance of a securely aggregated federated learning model compared to human experts on unseen datasets. Furthermore, we show an inference-as-a-service scenario for end-to-end encrypted diagnosis, where neither the data nor the model are revealed. Lastly, we empirically evaluate the framework's security against a gradient-based model inversion attack and demonstrate that no usable information can be recovered from the model.
△ Less
Submitted 10 December, 2020;
originally announced December 2020.
-
Efficient, high-performance pancreatic segmentation using multi-scale feature extraction
Authors:
Moritz Knolle,
Georgios Kaissis,
Friederike Jungmann,
Sebastian Ziegelmayer,
Daniel Sasse,
Marcus Makowski,
Daniel Rueckert,
Rickmer Braren
Abstract:
For artificial intelligence-based image analysis methods to reach clinical applicability, the development of high-performance algorithms is crucial. For example, existent segmentation algorithms based on natural images are neither efficient in their parameter use nor optimized for medical imaging. Here we present MoNet, a highly optimized neural-network-based pancreatic segmentation algorithm focu…
▽ More
For artificial intelligence-based image analysis methods to reach clinical applicability, the development of high-performance algorithms is crucial. For example, existent segmentation algorithms based on natural images are neither efficient in their parameter use nor optimized for medical imaging. Here we present MoNet, a highly optimized neural-network-based pancreatic segmentation algorithm focused on achieving high performance by efficient multi-scale image feature utilization.
△ Less
Submitted 12 January, 2021; v1 submitted 2 September, 2020;
originally announced September 2020.
-
Endpoints for randomized controlled clinical trials for COVID-19 treatments
Authors:
Lori E Dodd,
Dean Follmann,
**g Wang,
Franz Koenig,
Lisa L Korn,
Christian Schoergenhofer,
Michael Proschan,
Sally Hunsberger,
Tyler Bonnett,
Mat Makowski,
Drifa Belhadi,
Yeming Wang,
Bin Cao,
France Mentre,
Thomas Jaki
Abstract:
Introduction: Endpoint choice for randomized controlled trials of treatments for COVID-19 is complex. A new disease brings many uncertainties, but trials must start rapidly. COVID-19 is heterogeneous, ranging from mild disease that improves within days to critical disease that can last weeks and can end in death. While improvement in mortality would provide unquestionable evidence about clinical s…
▽ More
Introduction: Endpoint choice for randomized controlled trials of treatments for COVID-19 is complex. A new disease brings many uncertainties, but trials must start rapidly. COVID-19 is heterogeneous, ranging from mild disease that improves within days to critical disease that can last weeks and can end in death. While improvement in mortality would provide unquestionable evidence about clinical significance of a treatment, sample sizes for a study evaluating mortality are large and may be impractical. Furthermore, patient states in between "cure" and "death" represent meaningful distinctions. Clinical severity scores have been proposed as an alternative. However, the appropriate summary measure for severity scores has been the subject of debate, particularly in relating to the uncertainty about the time-course of COVID-19. Outcomes measured at fixed time-points may risk missing the time of clinical benefit. An endpoint such as time-to-improvement (or recovery), avoids the timing problem. However, some have argued that power losses will result from reducing the ordinal scale to a binary state of "recovered" vs "not recovered."
Methods: We evaluate statistical power for possible trial endpoints for COVID-19 treatment trials using simulation models and data from two recent COVID-19 treatment trials.
Results: Power for fixed-time point methods depends heavily on the time selected for evaluation. Time-to-improvement (or recovery) analyses do not specify a time-point. Time-to-event approaches have reasonable statistical power, even when compared to a fixed time-point method evaluated at the optimal time.
Discussion: Time-to-event analyses methods have advantages in the COVID-19 setting, unless the optimal time for evaluating treatment effect is known in advance. Even when the optimal time is known, a time-to-event approach may increase power for interim analyses.
△ Less
Submitted 9 June, 2020;
originally announced June 2020.
-
3D-Imaging and Quantification of Magnetic Nanoparticle Uptake by Living Cells
Authors:
Hendrik Paysen,
Norbert Loewa,
Anke Stach,
James Wells,
Olaf Kosch,
Shailey Twamley,
Marcus R. Makowski,
Tobias Schaeffter,
Antje Ludwig,
Frank Wiekhorst
Abstract:
Magnetic particle imaging (MPI) is a non-invasive, non-ionizing imaging technique for the visualization and quantification of magnetic nanoparticles (MNPs). The technique is especially suitable for cell imaging as it offers zero background contribution from the surrounding tissue, high sensitivity, and good spatial and temporal resolutions. Previous studies have demonstrated that the dynamic magne…
▽ More
Magnetic particle imaging (MPI) is a non-invasive, non-ionizing imaging technique for the visualization and quantification of magnetic nanoparticles (MNPs). The technique is especially suitable for cell imaging as it offers zero background contribution from the surrounding tissue, high sensitivity, and good spatial and temporal resolutions. Previous studies have demonstrated that the dynamic magnetic behaviour of MNPs changes during cellular binding and internalization. In this study, we demonstrate how this information is encoded in the MPI imaging signal. Through MPI imaging we are able to discriminate between free and cell-bound MNPs in reconstructed images. This technique was used to image and quantify the changes that occur in-vitro when free MNPs come into contact with cells and undergo cellularuptake over time. The quantitative MPI results were verified by a phenanthroline assay. The results showed a mean relative difference of 23.8% for the quantification of cell-bound MNPs. The insights gained from such observations provide a new window into fundamental biological processes and associated pathological changes occurring at a cellular level. This technique could therefore offer new opportunities for the early diagnosis of inflammatory diseases.
△ Less
Submitted 3 December, 2019;
originally announced December 2019.
-
Asymptotic degree distributions in random threshold graphs
Authors:
Armand M. Makowski,
Siddharth Pal
Abstract:
We discuss several limiting degree distributions for a class of random threshold graphs in the many node regime. This analysis is carried out under a weak assumption on the distribution of the underlying fitness variable. This assumption, which is satisfied by the exponential distribution, determines a natural scaling under which the following limiting results are shown: The nodal degree distribut…
▽ More
We discuss several limiting degree distributions for a class of random threshold graphs in the many node regime. This analysis is carried out under a weak assumption on the distribution of the underlying fitness variable. This assumption, which is satisfied by the exponential distribution, determines a natural scaling under which the following limiting results are shown: The nodal degree distribution, i.e., the distribution of any node, converges in distribution to a limiting pmf. However, for each $d=0,1, \ldots $, the fraction of nodes with given degree $d$ converges only in distribution to a non-degenerate random variable $Π(d)$ (whose distribution depends on $d$),and not in probability to the aforementioned limiting nodal pmf as is customarily expected. The distribution of $Π(d)$ is identified only through its characteristic function. Implications of this result include: (i) The empirical node distribution may not be used as a proxy for or as an estimate to the limiting nodal pmf; (ii) Even in homogeneous graphs, the network-wide degree distribution and the nodal degree distribution may capture vastly different information; and (iii) Random threshold graphs with exponential distributed fitness do not provide an alternative scale-free model to the Barabási-Albert model as was argued by some authors; the two models cannot be meaningfully compared in terms of their degree distributions!
△ Less
Submitted 19 August, 2019;
originally announced August 2019.
-
Node isolation in large homogeneous binary multiplicative attribute graph models
Authors:
Sikai Qu,
Armand M. Makowski
Abstract:
The multiplicative attribute graph (MAG) model was introduced by Kim and Leskovec as a mathematically tractable model of certain classes of real-world networks. It is an instance of hidden graph models, and implements the plausible idea that network structure is collectively shaped by attributes individually associated with nodes. These authors have studied several aspects of this model, including…
▽ More
The multiplicative attribute graph (MAG) model was introduced by Kim and Leskovec as a mathematically tractable model of certain classes of real-world networks. It is an instance of hidden graph models, and implements the plausible idea that network structure is collectively shaped by attributes individually associated with nodes. These authors have studied several aspects of this model, including its connectivity, the existence of a giant component,its diameter and the degree distribution. This was done in the asymptotic regime when the number of nodes and the number of node attributes both grow unboundedly large, the latter scaling with the former under a natural admissibility condition. In the same setting, we explore the existence (or equivalently, absence) of isolated nodes, a property not discussed in the original paper. The main result of the paper is a {\em zero-one} law for the absence of isolated nodes; this zero-one law coincides with that obtained by Kim and Leskovec for graph connectivity (although under slightly weaker assumptions). We prove these results by applying the method of first and second moments in a non-standard way to multiple sets of counting random variables associated with the number of isolated nodes.
△ Less
Submitted 24 January, 2019;
originally announced January 2019.
-
Schrödinger type equation for subjective identification of supply and demand
Authors:
Marcin Makowski,
Edward W. Piotrowski,
Jan Sładkowski
Abstract:
The present authors have put forward a quantum game theory based model of market prices movements. By using Fisher information, we present a construction of an equation of Schrödinger type for probability distributions for relationship between demand and supply. Various analogies between quantum physics and market phenomena can be found.
The present authors have put forward a quantum game theory based model of market prices movements. By using Fisher information, we present a construction of an equation of Schrödinger type for probability distributions for relationship between demand and supply. Various analogies between quantum physics and market phenomena can be found.
△ Less
Submitted 20 December, 2018;
originally announced December 2018.
-
On the log-normality of the degree distribution in large homogeneous binary multiplicative attribute graph models
Authors:
Sikai Qu,
Armand M. Makowski
Abstract:
The muliplicative attribute graph (MAG) model was introduced by Kim and Leskovec as a mathematically tractable model for networks where network structure is believed to be shaped by features or attributes associated with individual nodes. For large homogeneous binary MAGs, they argued through approximation arguments that the "tail of [the] degree distribution follows a log-normal distribution" as…
▽ More
The muliplicative attribute graph (MAG) model was introduced by Kim and Leskovec as a mathematically tractable model for networks where network structure is believed to be shaped by features or attributes associated with individual nodes. For large homogeneous binary MAGs, they argued through approximation arguments that the "tail of [the] degree distribution follows a log-normal distribution" as the number of nodes becomes unboundedly large and the number of attributes scales logarithmically with the number of nodes. Under the same limiting regime, we revisit the asymptotic behavior of the degree distribution: Under weaker conditions we obtain a precise convergence result to log-normality, develop from it reasoned log-normal approximations to the degree distribution and derive various rates of convergence. In particular, we show that a certain transformation of the node degree converges in distribution to a log-normal distribution, and give its convergence rate in the form of a Berry-Esseen type estimate.
△ Less
Submitted 23 October, 2018;
originally announced October 2018.
-
Asymptotic degree distributions in large (homogeneous) random networks: A little theory and a counterexample
Authors:
Siddharth Pal,
Armand M. Makowski
Abstract:
In random graph models, the degree distribution of an individual node should be distinguished from the (empirical) degree distribution of the graph that records the fractions of nodes with given degree. We introduce a general framework to explore when these two degree distributions coincide asymptotically in large homogeneous random networks. The discussion is carried under three basic statistical…
▽ More
In random graph models, the degree distribution of an individual node should be distinguished from the (empirical) degree distribution of the graph that records the fractions of nodes with given degree. We introduce a general framework to explore when these two degree distributions coincide asymptotically in large homogeneous random networks. The discussion is carried under three basic statistical assumptions on the degree sequences: (i) a weak form of distributional homogeneity; (ii) the existence of an asymptotic (nodal) degree distribution; and (iii) a weak form of asymptotic uncorrelatedness. We show that this asymptotic equality may fail in homogeneous random networks for which (i) and (ii) hold but (iii) does not. The counterexample is found in the class of random threshold graphs. An implication of this finding is that random threshold graphs cannot be used as a substitute to the Barabási-Albert model for scale-free network modeling, as has been proposed by some authors. The results can also be formulated for non-homogeneous models by making use of a random sampling procedure over the nodes.
△ Less
Submitted 13 November, 2018; v1 submitted 30 October, 2017;
originally announced October 2017.
-
Light traffic behavior under the power-of-two load balancing strategy: The case of heterogeneous servers
Authors:
Ane Izagirre,
Armand M. Makowski
Abstract:
We consider a multi-server queueing system under the power-of-two policy with Poisson job arrivals, heterogeneous servers and a general job requirement distribution; each server operates under the first-come first-serve policy and there are no buffer constraints. We analyze the performance of this system in light traffic by evaluating the first two light traffic derivatives of the average job resp…
▽ More
We consider a multi-server queueing system under the power-of-two policy with Poisson job arrivals, heterogeneous servers and a general job requirement distribution; each server operates under the first-come first-serve policy and there are no buffer constraints. We analyze the performance of this system in light traffic by evaluating the first two light traffic derivatives of the average job response time. These expressions point to several interesting structural features associated with server heterogeneity in light traffic: For unequal capacities, the average job response time is seen to decrease for small values of the arrival rate, and the more diverse the server speeds, the greater the gain in performance. These theoretical findings are assessed through limited simulations.
△ Less
Submitted 21 January, 2017;
originally announced January 2017.
-
Gyrokinetic projection of the divertor heat-flux width from present tokamaks to ITER
Authors:
C. S. Chang,
S. Ku,
A. Loarte,
V. Parail,
F. Köchl,
M. Romanelli,
R. Maingi,
J. -W. Ahn,
T. Gray,
J. Hughes,
B. LaBombard,
T. Leonard,
M. Makowski,
J. Terry
Abstract:
The XGC1 edge gyrokinetic code is used for a high fidelity prediction for the width of the heat-flux to divertor plates in attached plasma condition. The simulation results are validated against the empirical scaling $λ_q \propto B_P^{-γ}$ obtained from present tokamak devices, where $λ_q$ is the divertor heat-flux width mapped to the outboard midplane and $γ_q=1.19$ as defined by T. Eich et al. […
▽ More
The XGC1 edge gyrokinetic code is used for a high fidelity prediction for the width of the heat-flux to divertor plates in attached plasma condition. The simulation results are validated against the empirical scaling $λ_q \propto B_P^{-γ}$ obtained from present tokamak devices, where $λ_q$ is the divertor heat-flux width mapped to the outboard midplane and $γ_q=1.19$ as defined by T. Eich et al. [Nucl. Fusion 53 (2013) 093031], and $B_P$ is the magnitude of the poloidal magnetic field at outboard midplane separatrix surface. This empirical scaling predicts $λ_q \leq 1mm$ when extrapolated to ITER, which would require operation with very high separatrix densities $(n_{sep}/n_{Greenwald} > 0.6)$ in the Q=10 scenario to achieve semi-detached plasma operation and high radiative fractions leading to acceptable divertor power fluxes. XGC1 predicts, however, that $λ_q$ for ITER is over 5 mm, suggesting that operation in the ITER Q=10 scenario with acceptable divertor power loads could be obtained over a wider range of plasma separatrix densities and radiative fractions. The physics reason behind this difference is, according to the XGC1 results, that while the ion magnetic drift contribution to the divertor heat-flux width is wider in the present tokamaks, the turbulent electron contribution is wider in ITER. A high current C-Mod discharge is found to be in a mixed regime: While the heat-flux width by the ion neoclassical magnetic drift is still wider than the turbulent electron heat-flux width, the heat-flux magnitude is dominated by the narrower electron heat-flux.
△ Less
Submitted 21 April, 2017; v1 submitted 19 January, 2017;
originally announced January 2017.
-
Counting triangles, tunable clustering and the small-world property in random key graphs (Extended version)
Authors:
Osman Yağan,
Armand M. Makowski
Abstract:
Random key graphs were introduced to study various properties of the Eschenauer-Gligor key predistribution scheme for wireless sensor networks (WSNs). Recently this class of random graphs has received much attention in contexts as diverse as recommender systems, social network modeling, and clustering and classification analysis. This paper is devoted to analyzing various properties of random key…
▽ More
Random key graphs were introduced to study various properties of the Eschenauer-Gligor key predistribution scheme for wireless sensor networks (WSNs). Recently this class of random graphs has received much attention in contexts as diverse as recommender systems, social network modeling, and clustering and classification analysis. This paper is devoted to analyzing various properties of random key graphs. In particular, we establish a zero-one law for the the existence of triangles in random key graphs, and identify the corresponding critical scaling. This zero-one law exhibits significant differences with the corresponding result in Erdos-Renyi (ER) graphs. We also compute the clustering coefficient of random key graphs, and compare it to that of ER graphs in the many node regime when their expected average degrees are asymptotically equivalent. For the parameter range of practical relevance in both wireless sensor network and social network applications, random key graphs are shown to be much more clustered than the corresponding ER graphs. We also explore the suitability of random key graphs as small world models in the sense of Watts and Strogatz.
△ Less
Submitted 13 January, 2017;
originally announced January 2017.
-
On the Eschenauer-Gligor key predistribution scheme under on-off communication channels: The absence of isolated nodes (Extended version)
Authors:
Armand M. Makowski,
Osman Yağan
Abstract:
We consider the Eschenauer-Gligor key predistribution scheme under the condition of partial visibility with i.i.d. on-off links between pairs of nodes. This situation is modeled as the intersection of two random graphs, namely a random key graph and an Erdős-Rényi (ER) graph. For this class of composite random graphs we give various improvements on a recent result by Yağan [IEEE Transactions on In…
▽ More
We consider the Eschenauer-Gligor key predistribution scheme under the condition of partial visibility with i.i.d. on-off links between pairs of nodes. This situation is modeled as the intersection of two random graphs, namely a random key graph and an Erdős-Rényi (ER) graph. For this class of composite random graphs we give various improvements on a recent result by Yağan [IEEE Transactions on Information Theory, 58(6):3821-3835, 2012] concerning zero-one laws for the absence of isolated nodes.
△ Less
Submitted 10 October, 2015;
originally announced October 2015.
-
Generalization of the Aoki-Yoshikawa sectoral productivity model based on extreme physical information principle
Authors:
Ilona Bednarek,
Marcin Makowski,
Edward W. Piotrowski,
Jan Sładkowski,
Jacek Syska
Abstract:
This paper presents a continuous variable generalization of the Aoki-Yoshikawa sectoral productivity model. Information theoretical methods from the Frieden-Soffer extreme physical information statistical estimation methodology were used to construct exact solutions. Both approaches coincide in first order approximation. The approach proposed here can be successfully applied in other fields of res…
▽ More
This paper presents a continuous variable generalization of the Aoki-Yoshikawa sectoral productivity model. Information theoretical methods from the Frieden-Soffer extreme physical information statistical estimation methodology were used to construct exact solutions. Both approaches coincide in first order approximation. The approach proposed here can be successfully applied in other fields of research.
△ Less
Submitted 2 April, 2015;
originally announced April 2015.
-
The intensity of the random variable intercept in the sector of negative probabilities
Authors:
Marcin Makowski,
Edward W. Piotrowski,
Jan Sładkowski,
Jacek Syska
Abstract:
We consider properties of the measurement intensity $ρ$ of a random variable for which the probability density function represented by the corresponding Wigner function attains negative values on a part of the domain. We consider a simple economic interpretation of this problem. This model is used to present the applicability of the method to the analysis of the negative probability on markets whe…
▽ More
We consider properties of the measurement intensity $ρ$ of a random variable for which the probability density function represented by the corresponding Wigner function attains negative values on a part of the domain. We consider a simple economic interpretation of this problem. This model is used to present the applicability of the method to the analysis of the negative probability on markets where there are anomalies in the law of supply and demand (e.g. Giffen's goods). It turns out that the new conditions to optimize the intensity $ρ$ require a new strategy. We propose a strategy (so-called $\grave{a}$ rebours strategy) based on the fixed point method and explore its effectiveness.
△ Less
Submitted 30 January, 2015;
originally announced March 2015.
-
Do transitive preferences always result in indifferent divisions?
Authors:
Marcin Makowski,
Edward W. Piotrowski,
Jan Sładkowski
Abstract:
The transitivity of preferences is one of the basic assumptions used in the theory of games and decisions. It is often equated with rationality of choice and is considered useful in building rankings. Intransitive preferences are considered paradoxical and undesirable. This problem is discussed by many social and natural sciences. The paper discusses a simple model of sequential game in which two…
▽ More
The transitivity of preferences is one of the basic assumptions used in the theory of games and decisions. It is often equated with rationality of choice and is considered useful in building rankings. Intransitive preferences are considered paradoxical and undesirable. This problem is discussed by many social and natural sciences. The paper discusses a simple model of sequential game in which two players in each iteration of the game choose one of the two elements. They make their decisions in different contexts defined by the rules of the game. It appears that the optimal strategy of one of the players can only be intransitive! (the so-called \textsl{relevant intransitive strategies}.) On the other hand, the optimal strategy for the second player can be either transitive or intransitive. A quantum model of the game using pure one-qubit strategies is considered. In this model, an increase in importance of intransitive strategies is observed -- there is a certain course of the game where intransitive strategies are the only optimal strategies for both players. The study of decision-making models using quantum information theory tools may shed some new light on the understanding of mechanisms that drive the formation of types of preferences.
△ Less
Submitted 10 February, 2015; v1 submitted 30 December, 2014;
originally announced January 2015.
-
Numerical investigation of lensless zoomable holographic multiple projections to tilted planes
Authors:
Tomoyoshi Shimobaba,
Michal Makowski,
Takashi Kakue,
Naohisa Okada,
Yutaka Endo,
Ryuji Hirayam,
Daisuke Hiyama,
Satoki Hasegawa,
Yuki Nagahama,
Tomoyoshi Ito
Abstract:
This paper numerically investigates the feasibility of lensless zoomable holographic multiple projections to tilted planes. We have already developed lensless zoomable holographic single projection using scaled diffraction, which calculates diffraction between parallel planes with different sampling pitches. The structure of this zoomable holographic projection is very simple because it does not n…
▽ More
This paper numerically investigates the feasibility of lensless zoomable holographic multiple projections to tilted planes. We have already developed lensless zoomable holographic single projection using scaled diffraction, which calculates diffraction between parallel planes with different sampling pitches. The structure of this zoomable holographic projection is very simple because it does not need a lens; however, it only projects a single image to a plane parallel to the hologram. The lensless zoomable holographic projection in this paper is capable of projecting multiple images onto tilted planes simultaneously.
△ Less
Submitted 10 July, 2014;
originally announced July 2014.
-
Parameter estimation by fixed point of function of information processing intensity
Authors:
Rober Jankowski,
Marcin Makowski,
Edward W. Piotrowski
Abstract:
We present a new method of estimating the dispersion of a distribution which is based on the surprising property of a function that measures information processing intensity. It turns out that this function has a maximum at its fixed point. We use a fixed-point equation to estimate the parameter of the distribution that is of interest to us. We illustrate the estimation method by using the example…
▽ More
We present a new method of estimating the dispersion of a distribution which is based on the surprising property of a function that measures information processing intensity. It turns out that this function has a maximum at its fixed point. We use a fixed-point equation to estimate the parameter of the distribution that is of interest to us. We illustrate the estimation method by using the example of an exponential distribution. The codes of programs that calculate the experimental values of the information processing intensity are presented.
△ Less
Submitted 31 March, 2014;
originally announced April 2014.
-
When "I cut, you choose" method implies intransitivity
Authors:
Marcin Makowski,
Edward W. Piotrowski
Abstract:
There is a common belief that humans and many animals follow transitive inference (choosing A over C on the basis of knowing that A is better than B and B is better than C). Transitivity seems to be the essence of rational choice. We present a theoretical model of a repeated game in which the players make a choice between three goods (e.g. food). The rules of the game refer to the simple procedure…
▽ More
There is a common belief that humans and many animals follow transitive inference (choosing A over C on the basis of knowing that A is better than B and B is better than C). Transitivity seems to be the essence of rational choice. We present a theoretical model of a repeated game in which the players make a choice between three goods (e.g. food). The rules of the game refer to the simple procedure of fair division among two players, known as the "I cut, you choose" mechanism which has been widely discussed in the literature. In this game one of the players has to make intransitive choices in order to achieve the optimal result (for him/her and his/her co-player). The point is that an intransitive choice can be rational. Previously, an increase in the significance of intransitive strategies was achieved by referring to models of quantum games. We show that \textit{relevant intransitive strategies} also appear in the classic description of decision algorithms.
△ Less
Submitted 20 September, 2014; v1 submitted 31 October, 2013;
originally announced November 2013.
-
Rigidity results, inverse curvature flows and Alexandrov-Fenchel type inequalities in the sphere
Authors:
Matthias Makowski,
Julian Scheuer
Abstract:
We prove a rigidity result in the sphere which allows us to generalize a result about smooth convex hypersurfaces in the sphere by Do Carmo-Warner to convex $C^2$-hypersurfaces. We apply these results to prove $C^{1,β}$-convergence of inverse F-curvature flows in the sphere to an equator in \mathbb{S}^{n+1} for embedded, closed, strictly convex initial hypersurfaces. The result holds for large cla…
▽ More
We prove a rigidity result in the sphere which allows us to generalize a result about smooth convex hypersurfaces in the sphere by Do Carmo-Warner to convex $C^2$-hypersurfaces. We apply these results to prove $C^{1,β}$-convergence of inverse F-curvature flows in the sphere to an equator in \mathbb{S}^{n+1} for embedded, closed, strictly convex initial hypersurfaces. The result holds for large classes of curvature functions including the mean curvature and arbitrary powers of the Gauss curvature. We use this result to prove Alexandrov-Fenchel type inequalities in the sphere.
△ Less
Submitted 5 November, 2015; v1 submitted 22 July, 2013;
originally announced July 2013.
-
Mixed volume preserving curvature flows in hyperbolic space
Authors:
Matthias Makowski
Abstract:
We consider curvature flows in hyperbolic space with a monotone, symmetric, homogeneous of degree 1 curvature function F. Furthermore we assume F to be either concave and inverse concave or convex. For compact initial hypersurfaces, which are strictly convex by horospheres, we show the long time existence of mixed volume preserving curvature flows. Furthermore we show that these flows converge exp…
▽ More
We consider curvature flows in hyperbolic space with a monotone, symmetric, homogeneous of degree 1 curvature function F. Furthermore we assume F to be either concave and inverse concave or convex. For compact initial hypersurfaces, which are strictly convex by horospheres, we show the long time existence of mixed volume preserving curvature flows. Furthermore we show that these flows converge exponentially in the C-infinity topology to a geodesic sphere.
△ Less
Submitted 9 August, 2012;
originally announced August 2012.
-
Volume preserving curvature flows in Lorentzian manifolds
Authors:
Matthias Makowski
Abstract:
Let N be a (n+1)-dimensional globally hyperbolic Lorentzian manifold with a compact Cauchy hypersurface. We consider curvature flows in N with different curvature functions F (including the mean curvature, the gauss curvature and the second elementary symmetric polynomial) and a volume preserving term. Under suitable assumptions we prove the long time existence of the flow and the exponential conv…
▽ More
Let N be a (n+1)-dimensional globally hyperbolic Lorentzian manifold with a compact Cauchy hypersurface. We consider curvature flows in N with different curvature functions F (including the mean curvature, the gauss curvature and the second elementary symmetric polynomial) and a volume preserving term. Under suitable assumptions we prove the long time existence of the flow and the exponential convergence of the corresponding graphs in the $C^\infty$-topology to a hypersurface of constant F-curvature. Furthermore we examine stability properties and foliations of constant F-curvature hypersurfaces.
△ Less
Submitted 12 April, 2011;
originally announced April 2011.
-
On the gradual deployment of random pairwise key distribution schemes (Extended Version)
Authors:
Osman Yagan,
Armand M. Makowski
Abstract:
In the context of wireless sensor networks, the pairwise key distribution scheme of Chan et al. has several advantages over other key distribution schemes including the original scheme of Eschenauer and Gligor. However, this offline pairwise key distribution mechanism requires that the network size be set in advance, and involves all sensor nodes simultaneously. Here, we address this issue by desc…
▽ More
In the context of wireless sensor networks, the pairwise key distribution scheme of Chan et al. has several advantages over other key distribution schemes including the original scheme of Eschenauer and Gligor. However, this offline pairwise key distribution mechanism requires that the network size be set in advance, and involves all sensor nodes simultaneously. Here, we address this issue by describing an implementation of the pairwise scheme that supports the gradual deployment of sensor nodes in several consecutive phases. We discuss the key ring size needed to maintain the secure connectivity throughout all the deployment phases. In particular we show that the number of keys at each sensor node can be taken to be $O(\log n)$ in order to achieve secure connectivity (with high probability).
△ Less
Submitted 22 March, 2011;
originally announced March 2011.
-
Modeling the pairwise key distribution scheme in the presence of unreliable links
Authors:
Osman Yagan,
Armand M. Makowski
Abstract:
We investigate the secure connectivity of wireless sensor networks under the pairwise key distribution scheme of Chan et al.. Unlike recent work which was carried out under the assumption of full visibility, here we assume a (simplified) communication model where unreliable wireless links are represented as on/off channels. We present conditions on how to scale the model parameters so that the net…
▽ More
We investigate the secure connectivity of wireless sensor networks under the pairwise key distribution scheme of Chan et al.. Unlike recent work which was carried out under the assumption of full visibility, here we assume a (simplified) communication model where unreliable wireless links are represented as on/off channels. We present conditions on how to scale the model parameters so that the network i) has no secure node which is isolated and ii) is securely connected, both with high probability when the number of sensor nodes becomes large. The results are given in the form of zero-one laws, and exhibit significant differences with corresponding results in the full visibility case. Through simulations these zero-one laws are shown to be valid also under a more realistic communication model, i.e., the disk model.
△ Less
Submitted 10 February, 2011;
originally announced February 2011.
-
Transitivity of an entangled choice
Authors:
Marcin Makowski,
Edward W. Piotrowski
Abstract:
We describe a quantum model of simple choice game (constructed upon entangled state of two qubits), which involves the fundamental problem of transitive - intransitive preferences. We compare attainability of optimal intransitive strategies in both classical and quantum models with the use of geometrical interpretation.
We describe a quantum model of simple choice game (constructed upon entangled state of two qubits), which involves the fundamental problem of transitive - intransitive preferences. We compare attainability of optimal intransitive strategies in both classical and quantum models with the use of geometrical interpretation.
△ Less
Submitted 18 January, 2011;
originally announced January 2011.
-
Decisions in elections --- transitive or intransitive quantum preferences
Authors:
Marcin Makowski,
Edward W. Piotrowski
Abstract:
Our preferences depend on the circumstances in which we reveal them. We will introduce a dependency which allows us to illustrate the relation between the possibility of winning of particular candidates in a quantum election and the type of preference. It occurs that if voters start to clearly prefer one of the candidates, the significance of intransitive preferences in the quantum model decreases…
▽ More
Our preferences depend on the circumstances in which we reveal them. We will introduce a dependency which allows us to illustrate the relation between the possibility of winning of particular candidates in a quantum election and the type of preference. It occurs that if voters start to clearly prefer one of the candidates, the significance of intransitive preferences in the quantum model decreases. This dynamic change cannot be observed in the case of the classical model.
△ Less
Submitted 18 January, 2011;
originally announced January 2011.
-
A zero-one law for the existence of triangles in random key graphs
Authors:
Osman Yagan,
Armand M. Makowski
Abstract:
Random key graphs are random graphs induced by the random key predistribution scheme of Eschenauer and Gligor under the assumption of full visibility. For this class of random graphs we show the existence of a zero-one law for the appearance of triangles, and identify the corresponding critical scaling. This is done by applying the method of first and second moments to the number of triangles in…
▽ More
Random key graphs are random graphs induced by the random key predistribution scheme of Eschenauer and Gligor under the assumption of full visibility. For this class of random graphs we show the existence of a zero-one law for the appearance of triangles, and identify the corresponding critical scaling. This is done by applying the method of first and second moments to the number of triangles in the graph.
△ Less
Submitted 2 October, 2009;
originally announced October 2009.
-
Zero-one laws for connectivity in random key graphs
Authors:
Osman Yagan,
Armand M. Makowski
Abstract:
The random key graph is a random graph naturally associated with the random key predistribution scheme of Eschenauer and Gligor for wireless sensor networks. For this class of random graphs we establish a new version of a conjectured zero-one law for graph connectivity as the number of nodes becomes unboundedly large. The results reported here complement and strengthen recent work on this conjectu…
▽ More
The random key graph is a random graph naturally associated with the random key predistribution scheme of Eschenauer and Gligor for wireless sensor networks. For this class of random graphs we establish a new version of a conjectured zero-one law for graph connectivity as the number of nodes becomes unboundedly large. The results reported here complement and strengthen recent work on this conjecture by Blackburn and Gerke. In particular, the results are given under conditions which are more realistic for applications to wireless sensor networks.
△ Less
Submitted 7 June, 2012; v1 submitted 25 August, 2009;
originally announced August 2009.
-
Transitivity vs. Intransitivity in decision making process. (An example in quantum game theory)
Authors:
Marcin Makowski
Abstract:
We compare two different ways of quantization a simple sequential game Cat's Dilemma in the context of the debate on intransitive and transitive preferences. This kind of analysis can have essential meaning for the research on the artificial intelligence (some possibilities are discussed). Nature has both properties transitive and intransitive and maybe quantum models can be more able to capture…
▽ More
We compare two different ways of quantization a simple sequential game Cat's Dilemma in the context of the debate on intransitive and transitive preferences. This kind of analysis can have essential meaning for the research on the artificial intelligence (some possibilities are discussed). Nature has both properties transitive and intransitive and maybe quantum models can be more able to capture this dualism than classical one. We also present electoral interpretation of the game.
△ Less
Submitted 1 February, 2009; v1 submitted 12 January, 2009;
originally announced January 2009.
-
Intersecting random graphs and networks with multiple adjacency constraints: A simple example
Authors:
N. Prasanth Anthapadmanabhan,
Armand M. Makowski
Abstract:
When studying networks using random graph models, one is sometimes faced with situations where the notion of adjacency between nodes reflects multiple constraints. Traditional random graph models are insufficient to handle such situations.
A simple idea to account for multiple constraints consists in taking the intersection of random graphs. In this paper we initiate the study of random graphs…
▽ More
When studying networks using random graph models, one is sometimes faced with situations where the notion of adjacency between nodes reflects multiple constraints. Traditional random graph models are insufficient to handle such situations.
A simple idea to account for multiple constraints consists in taking the intersection of random graphs. In this paper we initiate the study of random graphs so obtained through a simple example. We examine the intersection of an Erdos-Renyi graph and of one-dimensional geometric random graphs. We investigate the zero-one laws for the property that there are no isolated nodes. When the geometric component is defined on the unit circle, a full zero-one law is established and we determine its critical scaling. When the geometric component lies in the unit interval, there is a gap in that the obtained zero and one laws are found to express deviations from different critical scalings. In particular, the first moment method requires a larger critical scaling than in the unit circle case in order to obtain the one law. This discrepancy is somewhat surprising given that the zero-one laws for the absence of isolated nodes are identical in the geometric random graphs on both the unit interval and unit circle.
△ Less
Submitted 4 September, 2008;
originally announced September 2008.
-
Quantum Cat's Dilemma
Authors:
Marcin Makowski,
Edward W. Piotrowski
Abstract:
We study a quantum version of the sequential game illustrating problems connected with making rational decisions. We compare the results that the two models (quantum and classical) yield. In the quantum model intransitivity gains importance significantly. We argue that the quantum model describes our spontaneously shown preferences more precisely than the classical model, as these preferences ar…
▽ More
We study a quantum version of the sequential game illustrating problems connected with making rational decisions. We compare the results that the two models (quantum and classical) yield. In the quantum model intransitivity gains importance significantly. We argue that the quantum model describes our spontaneously shown preferences more precisely than the classical model, as these preferences are often intransitive.
△ Less
Submitted 14 October, 2005;
originally announced October 2005.