-
A Framework for the Systematic Assessment of Anomaly Detectors in Time-Sensitive Automotive Networks
Authors:
Philipp Meyer,
Timo Häckel,
Teresa Lübeck,
Franz Korf,
Thomas C. Schmidt
Abstract:
Connected cars are susceptible to cyberattacks. Security and safety of future vehicles highly depend on a holistic protection of automotive components, of which the time-sensitive backbone network takes a significant role. These onboard Time-Sensitive Networks (TSNs) require monitoring for safety and -- as versatile platforms to host Network Anomaly Detection Systems (NADSs) -- for security. Still…
▽ More
Connected cars are susceptible to cyberattacks. Security and safety of future vehicles highly depend on a holistic protection of automotive components, of which the time-sensitive backbone network takes a significant role. These onboard Time-Sensitive Networks (TSNs) require monitoring for safety and -- as versatile platforms to host Network Anomaly Detection Systems (NADSs) -- for security. Still a thorough evaluation of anomaly detection methods in the context of hard real-time operations, automotive protocol stacks, and domain specific attack vectors is missing along with appropriate input datasets. In this paper, we present an assessment framework that allows for reproducible, comparable, and rapid evaluation of detection algorithms. It is based on a simulation toolchain, which contributes configurable topologies, traffic streams, anomalies, attacks, and detectors. We demonstrate the assessment of NADSs in a comprehensive in-vehicular network with its communication flows, on which we model traffic anomalies. We evaluate exemplary detection mechanisms and reveal how the detection performance is influenced by different combinations of TSN traffic flows and anomaly types. Our approach translates to other real-time Ethernet domains, such as industrial facilities, airplanes, and UAVs.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Assessing the Performance of Deep Learning for Automated Gleason Grading in Prostate Cancer
Authors:
Dominik Müller,
Philip Meyer,
Lukas Rentschler,
Robin Manz,
Daniel Hieber,
Jonas Bäcker,
Samantha Cramer,
Christoph Wengenmayr,
Bruno Märkl,
Ralf Huss,
Frank Kramer,
Iñaki Soto-Rey,
Johannes Raffler
Abstract:
Prostate cancer is a dominant health concern calling for advanced diagnostic tools. Utilizing digital pathology and artificial intelligence, this study explores the potential of 11 deep neural network architectures for automated Gleason grading in prostate carcinoma focusing on comparing traditional and recent architectures. A standardized image classification pipeline, based on the AUCMEDI framew…
▽ More
Prostate cancer is a dominant health concern calling for advanced diagnostic tools. Utilizing digital pathology and artificial intelligence, this study explores the potential of 11 deep neural network architectures for automated Gleason grading in prostate carcinoma focusing on comparing traditional and recent architectures. A standardized image classification pipeline, based on the AUCMEDI framework, facilitated robust evaluation using an in-house dataset consisting of 34,264 annotated tissue tiles. The results indicated varying sensitivity across architectures, with ConvNeXt demonstrating the strongest performance. Notably, newer architectures achieved superior performance, even though with challenges in differentiating closely related Gleason grades. The ConvNeXt model was capable of learning a balance between complexity and generalizability. Overall, this study lays the groundwork for enhanced Gleason grading systems, potentially improving diagnostic efficiency for prostate cancer.
△ Less
Submitted 25 March, 2024;
originally announced March 2024.
-
DeepGleason: a System for Automated Gleason Grading of Prostate Cancer using Deep Neural Networks
Authors:
Dominik Müller,
Philip Meyer,
Lukas Rentschler,
Robin Manz,
Jonas Bäcker,
Samantha Cramer,
Christoph Wengenmayr,
Bruno Märkl,
Ralf Huss,
Iñaki Soto-Rey,
Johannes Raffler
Abstract:
Advances in digital pathology and artificial intelligence (AI) offer promising opportunities for clinical decision support and enhancing diagnostic workflows. Previous studies already demonstrated AI's potential for automated Gleason grading, but lack state-of-the-art methodology and model reusability. To address this issue, we propose DeepGleason: an open-source deep neural network based image cl…
▽ More
Advances in digital pathology and artificial intelligence (AI) offer promising opportunities for clinical decision support and enhancing diagnostic workflows. Previous studies already demonstrated AI's potential for automated Gleason grading, but lack state-of-the-art methodology and model reusability. To address this issue, we propose DeepGleason: an open-source deep neural network based image classification system for automated Gleason grading using whole-slide histopathology images from prostate tissue sections. Implemented with the standardized AUCMEDI framework, our tool employs a tile-wise classification approach utilizing fine-tuned image preprocessing techniques in combination with a ConvNeXt architecture which was compared to various state-of-the-art architectures. The neural network model was trained and validated on an in-house dataset of 34,264 annotated tiles from 369 prostate carcinoma slides. We demonstrated that DeepGleason is capable of highly accurate and reliable Gleason grading with a macro-averaged F1-score of 0.806, AUC of 0.991, and Accuracy of 0.974. The internal architecture comparison revealed that the ConvNeXt model was superior performance-wise on our dataset to established and other modern architectures like transformers. Furthermore, we were able to outperform the current state-of-the-art in tile-wise fine-classification with a sensitivity and specificity of 0.94 and 0.98 for benign vs malignant detection as well as of 0.91 and 0.75 for Gleason 3 vs Gleason 4 & 5 classification, respectively. Our tool contributes to the wider adoption of AI-based Gleason grading within the research community and paves the way for broader clinical application of deep learning models in digital pathology. DeepGleason is open-source and publicly available for research application in the following Git repository: https://github.com/frankkramer-lab/DeepGleason.
△ Less
Submitted 25 March, 2024;
originally announced March 2024.
-
Verified Training for Counterfactual Explanation Robustness under Data Shift
Authors:
Anna P. Meyer,
Yuhao Zhang,
Aws Albarghouthi,
Loris D'Antoni
Abstract:
Counterfactual explanations (CEs) enhance the interpretability of machine learning models by describing what changes to an input are necessary to change its prediction to a desired class. These explanations are commonly used to guide users' actions, e.g., by describing how a user whose loan application was denied can be approved for a loan in the future. Existing approaches generate CEs by focusin…
▽ More
Counterfactual explanations (CEs) enhance the interpretability of machine learning models by describing what changes to an input are necessary to change its prediction to a desired class. These explanations are commonly used to guide users' actions, e.g., by describing how a user whose loan application was denied can be approved for a loan in the future. Existing approaches generate CEs by focusing on a single, fixed model, and do not provide any formal guarantees on the CEs' future validity. When models are updated periodically to account for data shift, if the generated CEs are not robust to the shifts, users' actions may no longer have the desired impacts on their predictions. This paper introduces VeriTraCER, an approach that jointly trains a classifier and an explainer to explicitly consider the robustness of the generated CEs to small model shifts. VeriTraCER optimizes over a carefully designed loss function that ensures the verifiable robustness of CEs to local model updates, thus providing deterministic guarantees to CE validity. Our empirical evaluation demonstrates that VeriTraCER generates CEs that (1) are verifiably robust to small model updates and (2) display competitive robustness to state-of-the-art approaches in handling empirical model updates including random initialization, leave-one-out, and distribution shifts.
△ Less
Submitted 6 March, 2024;
originally announced March 2024.
-
Cohere3D: Exploiting Temporal Coherence for Unsupervised Representation Learning of Vision-based Autonomous Driving
Authors:
Yichen Xie,
Hongge Chen,
Gregory P. Meyer,
Yong Jae Lee,
Eric M. Wolff,
Masayoshi Tomizuka,
Wei Zhan,
Yuning Chai,
Xin Huang
Abstract:
Due to the lack of depth cues in images, multi-frame inputs are important for the success of vision-based perception, prediction, and planning in autonomous driving. Observations from different angles enable the recovery of 3D object states from 2D image inputs if we can identify the same instance in different input frames. However, the dynamic nature of autonomous driving scenes leads to signific…
▽ More
Due to the lack of depth cues in images, multi-frame inputs are important for the success of vision-based perception, prediction, and planning in autonomous driving. Observations from different angles enable the recovery of 3D object states from 2D image inputs if we can identify the same instance in different input frames. However, the dynamic nature of autonomous driving scenes leads to significant changes in the appearance and shape of each instance captured by the camera at different time steps. To this end, we propose a novel contrastive learning algorithm, Cohere3D, to learn coherent instance representations in a long-term input sequence robust to the change in distance and perspective. The learned representation aids in instance-level correspondence across multiple input frames in downstream tasks. In the pretraining stage, the raw point clouds from LiDAR sensors are utilized to construct the long-term temporal correspondence for each instance, which serves as guidance for the extraction of instance-level representation from the vision-based bird's eye-view (BEV) feature map. Cohere3D encourages a consistent representation for the same instance at different frames but distinguishes between representations of different instances. We evaluate our algorithm by finetuning the pretrained model on various downstream perception, prediction, and planning tasks. Results show a notable improvement in both data efficiency and task performance.
△ Less
Submitted 23 February, 2024;
originally announced February 2024.
-
ViP-LLaVA: Making Large Multimodal Models Understand Arbitrary Visual Prompts
Authors:
Mu Cai,
Haotian Liu,
Dennis Park,
Siva Karthik Mustikovela,
Gregory P. Meyer,
Yuning Chai,
Yong Jae Lee
Abstract:
While existing large vision-language multimodal models focus on whole image understanding, there is a prominent gap in achieving region-specific comprehension. Current approaches that use textual coordinates or spatial encodings often fail to provide a user-friendly interface for visual prompting. To address this challenge, we introduce a novel multimodal model capable of decoding arbitrary visual…
▽ More
While existing large vision-language multimodal models focus on whole image understanding, there is a prominent gap in achieving region-specific comprehension. Current approaches that use textual coordinates or spatial encodings often fail to provide a user-friendly interface for visual prompting. To address this challenge, we introduce a novel multimodal model capable of decoding arbitrary visual prompts. This allows users to intuitively mark images and interact with the model using natural cues like a "red bounding box" or "pointed arrow". Our simple design directly overlays visual markers onto the RGB image, eliminating the need for complex region encodings, yet achieves state-of-the-art performance on region-understanding tasks like Visual7W, PointQA, and Visual Commonsense Reasoning benchmark. Furthermore, we present ViP-Bench, a comprehensive benchmark to assess the capability of models in understanding visual prompts across multiple dimensions, enabling future research in this domain. Code, data, and model are publicly available.
△ Less
Submitted 26 April, 2024; v1 submitted 1 December, 2023;
originally announced December 2023.
-
A Multilayered Security Infrastructure for Connected Vehicles -- First Lessons from the Field
Authors:
Timo Häckel,
Philipp Meyer,
Lukas Stahlbock,
Falk Langer,
Sebastian A. Eckhardt,
Franz Korf,
Thomas C. Schmidt
Abstract:
Connected vehicles are vulnerable to manipulation and a broad attack surface can be used to intrude in-vehicle networks from anywhere on earth. In this work, we present an integrated security infrastructure comprising network protection, monitoring, incident management, and counteractions, which we built into a prototype based on a production car. Our vehicle implements a Software-Defined Networki…
▽ More
Connected vehicles are vulnerable to manipulation and a broad attack surface can be used to intrude in-vehicle networks from anywhere on earth. In this work, we present an integrated security infrastructure comprising network protection, monitoring, incident management, and counteractions, which we built into a prototype based on a production car. Our vehicle implements a Software-Defined Networking Ethernet backbone to restrict communication routes, network anomaly detection to make misbehavior evident, virtual controller functions to enable agile countermeasures, and an automotive cloud defense center to analyse and manage incidents on vehicle fleets. We present first measurements and lessons learned from operating the prototype: many network attacks can be prevented through software-defined access control in the backbone; anomaly detection can reliably detect misbehavior but needs to improve on false positive rate; controller virtualization needs tailored frameworks to meet in-car requirements; and cloud defence enables fleet management and advanced countermeasures. Our findings indicate attack mitigation times in the vehicle from 257 ms to 328 ms and from 2,168 ms to 2,713 ms traversing the cloud.
△ Less
Submitted 16 October, 2023;
originally announced October 2023.
-
SHIFT3D: Synthesizing Hard Inputs For Tricking 3D Detectors
Authors:
Hongge Chen,
Zhao Chen,
Gregory P. Meyer,
Dennis Park,
Carl Vondrick,
Ashish Shrivastava,
Yuning Chai
Abstract:
We present SHIFT3D, a differentiable pipeline for generating 3D shapes that are structurally plausible yet challenging to 3D object detectors. In safety-critical applications like autonomous driving, discovering such novel challenging objects can offer insight into unknown vulnerabilities of 3D detectors. By representing objects with a signed distanced function (SDF), we show that gradient error s…
▽ More
We present SHIFT3D, a differentiable pipeline for generating 3D shapes that are structurally plausible yet challenging to 3D object detectors. In safety-critical applications like autonomous driving, discovering such novel challenging objects can offer insight into unknown vulnerabilities of 3D detectors. By representing objects with a signed distanced function (SDF), we show that gradient error signals allow us to smoothly deform the shape or pose of a 3D object in order to confuse a downstream 3D detector. Importantly, the objects generated by SHIFT3D physically differ from the baseline object yet retain a semantically recognizable shape. Our approach provides interpretable failure modes for modern 3D object detectors, and can aid in preemptive discovery of potential safety risks within 3D perception systems before these risks become critical failures.
△ Less
Submitted 11 September, 2023;
originally announced September 2023.
-
Improving Primary Healthcare Workflow Using Extreme Summarization of Scientific Literature Based on Generative AI
Authors:
Gregor Stiglic,
Leon Kopitar,
Lucija Gosak,
Primoz Kocbek,
Zhe He,
Prithwish Chakraborty,
Pablo Meyer,
Jiang Bian
Abstract:
Primary care professionals struggle to keep up to date with the latest scientific literature critical in guiding evidence-based practice related to their daily work. To help solve the above-mentioned problem, we employed generative artificial intelligence techniques based on large-scale language models to summarize abstracts of scientific papers. Our objective is to investigate the potential of ge…
▽ More
Primary care professionals struggle to keep up to date with the latest scientific literature critical in guiding evidence-based practice related to their daily work. To help solve the above-mentioned problem, we employed generative artificial intelligence techniques based on large-scale language models to summarize abstracts of scientific papers. Our objective is to investigate the potential of generative artificial intelligence in diminishing the cognitive load experienced by practitioners, thus exploring its ability to alleviate mental effort and burden. The study participants were provided with two use cases related to preventive care and behavior change, simulating a search for new scientific literature. The study included 113 university students from Slovenia and the United States randomized into three distinct study groups. The first group was assigned to the full abstracts. The second group was assigned to the short abstracts generated by AI. The third group had the option to select a full abstract in addition to the AI-generated short summary. Each use case study included ten retrieved abstracts. Our research demonstrates that the use of generative AI for literature review is efficient and effective. The time needed to answer questions related to the content of abstracts was significantly lower in groups two and three compared to the first group using full abstracts. The results, however, also show significantly lower accuracy in extracted knowledge in cases where full abstract was not available. Such a disruptive technology could significantly reduce the time required for healthcare professionals to keep up with the most recent scientific literature; nevertheless, further developments are needed to help them comprehend the knowledge accurately.
△ Less
Submitted 24 July, 2023;
originally announced July 2023.
-
Pants distances of knotted surfaces in 4-manifolds
Authors:
Román Aranda,
Sarah Blackwell,
Devashi Gulati,
Homayun Karimi,
Geunyoung Kim,
Nicholas Paul Meyer,
Puttipong Pongtanapaisan
Abstract:
We define a pants distance for knotted surfaces in 4-manifolds which generalizes the complexity studied by Blair-Campisi-Taylor-Tomova for surfaces in the 4-sphere. We determine that if the distance computed on a given diagram does not surpass a theoretical bound in terms of the multisection genus, then the (4-manifold, surface) pair has a simple topology. Furthermore, we calculate the exact value…
▽ More
We define a pants distance for knotted surfaces in 4-manifolds which generalizes the complexity studied by Blair-Campisi-Taylor-Tomova for surfaces in the 4-sphere. We determine that if the distance computed on a given diagram does not surpass a theoretical bound in terms of the multisection genus, then the (4-manifold, surface) pair has a simple topology. Furthermore, we calculate the exact values of our invariants for many new examples such as the spun lens spaces. We provide a characterization of genus two quadrisections with distance at most six.
△ Less
Submitted 25 July, 2023;
originally announced July 2023.
-
On Minimizing the Impact of Dataset Shifts on Actionable Explanations
Authors:
Anna P. Meyer,
Dan Ley,
Suraj Srinivas,
Himabindu Lakkaraju
Abstract:
The Right to Explanation is an important regulatory principle that allows individuals to request actionable explanations for algorithmic decisions. However, several technical challenges arise when providing such actionable explanations in practice. For instance, models are periodically retrained to handle dataset shifts. This process may invalidate some of the previously prescribed explanations, t…
▽ More
The Right to Explanation is an important regulatory principle that allows individuals to request actionable explanations for algorithmic decisions. However, several technical challenges arise when providing such actionable explanations in practice. For instance, models are periodically retrained to handle dataset shifts. This process may invalidate some of the previously prescribed explanations, thus rendering them unactionable. But, it is unclear if and when such invalidations occur, and what factors determine explanation stability i.e., if an explanation remains unchanged amidst model retraining due to dataset shifts. In this paper, we address the aforementioned gaps and provide one of the first theoretical and empirical characterizations of the factors influencing explanation stability. To this end, we conduct rigorous theoretical analysis to demonstrate that model curvature, weight decay parameters while training, and the magnitude of the dataset shift are key factors that determine the extent of explanation (in)stability. Extensive experimentation with real-world datasets not only validates our theoretical results, but also demonstrates that the aforementioned factors dramatically impact the stability of explanations produced by various state-of-the-art methods.
△ Less
Submitted 11 June, 2023;
originally announced June 2023.
-
Directedeness, correlations, and daily cycles in springbok motion: from data over stochastic models to movement prediction
Authors:
P. G. Meyer,
A. G. Cherstvy,
H. Seckler,
R. Hering,
N. Blaum,
F. Jeltsch,
R. Metzler
Abstract:
How predictable is the next move of an animal? Specifically, which factors govern the short- and long-term motion patterns and the overall dynamics of landbound, plant-eating animals and ruminants in particular? To answer this question, we here study the movement dynamics of springbok antelopes Antidorcas marsupialis. We propose complementary statistical analysis techniques combined with machine l…
▽ More
How predictable is the next move of an animal? Specifically, which factors govern the short- and long-term motion patterns and the overall dynamics of landbound, plant-eating animals and ruminants in particular? To answer this question, we here study the movement dynamics of springbok antelopes Antidorcas marsupialis. We propose complementary statistical analysis techniques combined with machine learning approaches to analyze, across multiple time scales, the springbok motion recorded in long-term GPS-tracking of collared springboks at a private wildlife reserve in Namibia. As a new result, we are able to predict the springbok movement within the next hour with a certainty of about 20\%. The remaining 80\% are stochastic in nature and are induced by unaccounted factors in the modeling algorithm and by individual behavioral features of springboks. We find that directedness of motion contributes approximately 17\% to this predicted fraction. We find that the measure for directedeness is strongly dependent on the daily cycle. The previously known daily affinity of springboks to their water points, as predicted from our machine learning algorithm, overall accounts for only 3\% of this predicted deterministic component of springbok motion. Moreover, the resting points are found to affect the motion of springboks at least as much as the formally studied effects of water points. The generality of these statements for the motion patterns and their underlying behavioral reasons for other ruminants can be examined on the basis of our statistical analysis tools.
△ Less
Submitted 11 May, 2023;
originally announced May 2023.
-
The Dataset Multiplicity Problem: How Unreliable Data Impacts Predictions
Authors:
Anna P. Meyer,
Aws Albarghouthi,
Loris D'Antoni
Abstract:
We introduce dataset multiplicity, a way to study how inaccuracies, uncertainty, and social bias in training datasets impact test-time predictions. The dataset multiplicity framework asks a counterfactual question of what the set of resultant models (and associated test-time predictions) would be if we could somehow access all hypothetical, unbiased versions of the dataset. We discuss how to use t…
▽ More
We introduce dataset multiplicity, a way to study how inaccuracies, uncertainty, and social bias in training datasets impact test-time predictions. The dataset multiplicity framework asks a counterfactual question of what the set of resultant models (and associated test-time predictions) would be if we could somehow access all hypothetical, unbiased versions of the dataset. We discuss how to use this framework to encapsulate various sources of uncertainty in datasets' factualness, including systemic social bias, data collection practices, and noisy labels or features. We show how to exactly analyze the impacts of dataset multiplicity for a specific model architecture and type of uncertainty: linear models with label errors. Our empirical analysis shows that real-world datasets, under reasonable assumptions, contain many test samples whose predictions are affected by dataset multiplicity. Furthermore, the choice of domain-specific dataset multiplicity definition determines what samples are affected, and whether different demographic groups are disparately impacted. Finally, we discuss implications of dataset multiplicity for machine learning practice and research, including considerations for when model outcomes should not be trusted.
△ Less
Submitted 20 April, 2023;
originally announced April 2023.
-
Authenticated and Secure Automotive Service Discovery with DNSSEC and DANE
Authors:
Mehmet Mueller,
Timo Häckel,
Philipp Meyer,
Franz Korf,
Thomas C. Schmidt
Abstract:
Automotive softwarization is progressing and future cars are expected to operate a Service-Oriented Architecture on multipurpose compute units, which are interconnected via a high-speed Ethernet backbone. The AUTOSAR architecture foresees a universal middleware called SOME/IP that provides the service primitives, interfaces, and application protocols on top of Ethernet and IP. SOME/IP lacks a robu…
▽ More
Automotive softwarization is progressing and future cars are expected to operate a Service-Oriented Architecture on multipurpose compute units, which are interconnected via a high-speed Ethernet backbone. The AUTOSAR architecture foresees a universal middleware called SOME/IP that provides the service primitives, interfaces, and application protocols on top of Ethernet and IP. SOME/IP lacks a robust security architecture, even though security is an essential in future Internet-connected vehicles. In this paper, we augment the SOME/IP service discovery with an authentication and certificate management scheme based on DNSSEC and DANE. We argue that the deployment of well-proven, widely tested standard protocols should serve as an appropriate basis for a robust and reliable security infrastructure in cars. Our solution enables on-demand service authentication in offline scenarios, easy online updates, and remains free of attestation collisions. We evaluate our extension of the common vsomeip stack and find performance values that fully comply with car operations.
△ Less
Submitted 27 March, 2023;
originally announced March 2023.
-
Dynamic Service-Orientation for Software-Defined In-Vehicle Networks
Authors:
Timo Häckel,
Philipp Meyer,
Mehmet Mueller,
Jan Schmitt-Solbrig,
Franz Korf,
Thomas C. Schmidt
Abstract:
Modern In-Vehicle Networks (IVNs) are composed of a large number of devices and services linked via an Ethernet-based time-sensitive network. Communication in future IVNs will become more dynamic as services can be updated, added, or removed during runtime. This requires a flexible and adaptable IVN, for which Software-Defined Networking (SDN) is a promising candidate. In this paper, we show how S…
▽ More
Modern In-Vehicle Networks (IVNs) are composed of a large number of devices and services linked via an Ethernet-based time-sensitive network. Communication in future IVNs will become more dynamic as services can be updated, added, or removed during runtime. This requires a flexible and adaptable IVN, for which Software-Defined Networking (SDN) is a promising candidate. In this paper, we show how SDN can be used to support a dynamic, service-oriented network architecture. We demonstrate our concept using the SOME/IP protocol, which is the most widely deployed implementation of automotive service-oriented architectures. In a simulation study, we evaluate the performance of SOME/IP-adaptive SDN control compared to standard Ethernet switching and non-optimized SDN. Our results show an expected overhead introduced by the central SDN controller, which is, however, reduced by up to 50% compared to SOME/IP-unaware SDN.For a large number of services, the setup time is in the order of milliseconds, which matches standard Ethernet switching. A SOME/IP-aware SDN controller can optimize the service discovery to improve adaptability, robustness, security, and Quality-of-Service of the IVN while remaining transparent to existing SOME/IP implementations.
△ Less
Submitted 24 March, 2023;
originally announced March 2023.
-
Reachability Analysis of Neural Networks with Uncertain Parameters
Authors:
Pierre-Jean Meyer
Abstract:
The literature on reachability analysis methods for neural networks currently only focuses on uncertainties on the network's inputs. In this paper, we introduce two new approaches for the reachability analysis of neural networks with additional uncertainties on their internal parameters (weight matrices and bias vectors of each layer), which may open the field of formal methods on neural networks…
▽ More
The literature on reachability analysis methods for neural networks currently only focuses on uncertainties on the network's inputs. In this paper, we introduce two new approaches for the reachability analysis of neural networks with additional uncertainties on their internal parameters (weight matrices and bias vectors of each layer), which may open the field of formal methods on neural networks to new topics, such as safe training or network repair. The first and main method that we propose relies on existing reachability analysis approach based on mixed monotonicity (initially introduced for dynamical systems). The second proposed approach extends the ESIP (Error-based Symbolic Interval Propagation) approach which was first implemented in the verification tool Neurify, and first mentioned in the publication of the tool VeriNet. Although the ESIP approach has been shown to often outperform the mixed-monotonicity reachability analysis in the classical case with uncertainties only on the network's inputs, we show in this paper through numerical simulations that the situation is greatly reversed (in terms of precision, computation time, memory usage, and broader applicability) when dealing with uncertainties on the weights and biases.
△ Less
Submitted 14 March, 2023;
originally announced March 2023.
-
Efficient Transformer-based 3D Object Detection with Dynamic Token Halting
Authors:
Mao Ye,
Gregory P. Meyer,
Yuning Chai,
Qiang Liu
Abstract:
Balancing efficiency and accuracy is a long-standing problem for deploying deep learning models. The trade-off is even more important for real-time safety-critical systems like autonomous vehicles. In this paper, we propose an effective approach for accelerating transformer-based 3D object detectors by dynamically halting tokens at different layers depending on their contribution to the detection…
▽ More
Balancing efficiency and accuracy is a long-standing problem for deploying deep learning models. The trade-off is even more important for real-time safety-critical systems like autonomous vehicles. In this paper, we propose an effective approach for accelerating transformer-based 3D object detectors by dynamically halting tokens at different layers depending on their contribution to the detection task. Although halting a token is a non-differentiable operation, our method allows for differentiable end-to-end learning by leveraging an equivalent differentiable forward-pass. Furthermore, our framework allows halted tokens to be reused to inform the model's predictions through a straightforward token recycling mechanism. Our method significantly improves the Pareto frontier of efficiency versus accuracy when compared with the existing approaches. By halting tokens and increasing model capacity, we are able to improve the baseline model's performance without increasing the model's latency on the Waymo Open Dataset.
△ Less
Submitted 11 October, 2023; v1 submitted 9 March, 2023;
originally announced March 2023.
-
Informing clinical assessment by contextualizing post-hoc explanations of risk prediction models in type-2 diabetes
Authors:
Shruthi Chari,
Prasant Acharya,
Daniel M. Gruen,
Olivia Zhang,
Elif K. Eyigoz,
Mohamed Ghalwash,
Oshani Seneviratne,
Fernando Suarez Saiz,
Pablo Meyer,
Prithwish Chakraborty,
Deborah L. McGuinness
Abstract:
Medical experts may use Artificial Intelligence (AI) systems with greater trust if these are supported by contextual explanations that let the practitioner connect system inferences to their context of use. However, their importance in improving model usage and understanding has not been extensively studied. Hence, we consider a comorbidity risk prediction scenario and focus on contexts regarding…
▽ More
Medical experts may use Artificial Intelligence (AI) systems with greater trust if these are supported by contextual explanations that let the practitioner connect system inferences to their context of use. However, their importance in improving model usage and understanding has not been extensively studied. Hence, we consider a comorbidity risk prediction scenario and focus on contexts regarding the patients clinical state, AI predictions about their risk of complications, and algorithmic explanations supporting the predictions. We explore how relevant information for such dimensions can be extracted from Medical guidelines to answer typical questions from clinical practitioners. We identify this as a question answering (QA) task and employ several state-of-the-art LLMs to present contexts around risk prediction model inferences and evaluate their acceptability. Finally, we study the benefits of contextual explanations by building an end-to-end AI pipeline including data cohorting, AI risk modeling, post-hoc model explanations, and prototyped a visual dashboard to present the combined insights from different context dimensions and data sources, while predicting and identifying the drivers of risk of Chronic Kidney Disease - a common type-2 diabetes comorbidity. All of these steps were performed in engagement with medical experts, including a final evaluation of the dashboard results by an expert medical panel. We show that LLMs, in particular BERT and SciBERT, can be readily deployed to extract some relevant explanations to support clinical usage. To understand the value-add of the contextual explanations, the expert panel evaluated these regarding actionable insights in the relevant clinical setting. Overall, our paper is one of the first end-to-end analyses identifying the feasibility and benefits of contextual explanations in a real-world clinical use case.
△ Less
Submitted 11 February, 2023;
originally announced February 2023.
-
MISm: A Medical Image Segmentation Metric for Evaluation of weak labeled Data
Authors:
Dennis Hartmann,
Verena Schmid,
Philip Meyer,
Iñaki Soto-Rey,
Dominik Müller,
Frank Kramer
Abstract:
Performance measures are an important tool for assessing and comparing different medical image segmentation algorithms. Unfortunately, the current measures have their weaknesses when it comes to assessing certain edge cases. These limitations arouse when images with a very small region of interest or without a region of interest at all are assessed. As a solution for these limitations, we propose…
▽ More
Performance measures are an important tool for assessing and comparing different medical image segmentation algorithms. Unfortunately, the current measures have their weaknesses when it comes to assessing certain edge cases. These limitations arouse when images with a very small region of interest or without a region of interest at all are assessed. As a solution for these limitations, we propose a new medical image segmentation metric: MISm. To evaluate MISm, the popular metrics in the medical image segmentation and MISm were compared using images of magnet resonance tomography from several scenarios. In order to allow application in the community and reproducibility of experimental results, we included MISm in the publicly available evaluation framework MISeval: https://github.com/frankkramer-lab/miseval/tree/master/miseval
△ Less
Submitted 24 October, 2022;
originally announced October 2022.
-
Distillation to Enhance the Portability of Risk Models Across Institutions with Large Patient Claims Database
Authors:
Steve Nyemba,
Chao Yan,
Ziqi Zhang,
Amol Rajmane,
Pablo Meyer,
Prithwish Chakraborty,
Bradley Malin
Abstract:
Artificial intelligence, and particularly machine learning (ML), is increasingly developed and deployed to support healthcare in a variety of settings. However, clinical decision support (CDS) technologies based on ML need to be portable if they are to be adopted on a broad scale. In this respect, models developed at one institution should be reusable at another. Yet there are numerous examples of…
▽ More
Artificial intelligence, and particularly machine learning (ML), is increasingly developed and deployed to support healthcare in a variety of settings. However, clinical decision support (CDS) technologies based on ML need to be portable if they are to be adopted on a broad scale. In this respect, models developed at one institution should be reusable at another. Yet there are numerous examples of portability failure, particularly due to naive application of ML models. Portability failure can lead to suboptimal care and medical errors, which ultimately could prevent the adoption of ML-based CDS in practice. One specific healthcare challenge that could benefit from enhanced portability is the prediction of 30-day readmission risk. Research to date has shown that deep learning models can be effective at modeling such risk. In this work, we investigate the practicality of model portability through a cross-site evaluation of readmission prediction models. To do so, we apply a recurrent neural network, augmented with self-attention and blended with expert features, to build readmission prediction models for two independent large scale claims datasets. We further present a novel transfer learning technique that adapts the well-known method of born-again network (BAN) training. Our experiments show that direct application of ML models trained at one institution and tested at another institution perform worse than models trained and tested at the same institution. We further show that the transfer learning approach based on the BAN produces models that are better than those trained on just a single institution's data. Notably, this improvement is consistent across both sites and occurs after a single retraining, which illustrates the potential for a cheap and general model transfer mechanism of readmission risk prediction.
△ Less
Submitted 6 July, 2022;
originally announced July 2022.
-
Certifying Data-Bias Robustness in Linear Regression
Authors:
Anna P. Meyer,
Aws Albarghouthi,
Loris D'Antoni
Abstract:
Datasets typically contain inaccuracies due to human error and societal biases, and these inaccuracies can affect the outcomes of models trained on such datasets. We present a technique for certifying whether linear regression models are pointwise-robust to label bias in the training dataset, i.e., whether bounded perturbations to the labels of a training dataset result in models that change the p…
▽ More
Datasets typically contain inaccuracies due to human error and societal biases, and these inaccuracies can affect the outcomes of models trained on such datasets. We present a technique for certifying whether linear regression models are pointwise-robust to label bias in the training dataset, i.e., whether bounded perturbations to the labels of a training dataset result in models that change the prediction of test points. We show how to solve this problem exactly for individual test points, and provide an approximate but more scalable method that does not require advance knowledge of the test point. We extensively evaluate both techniques and find that linear models -- both regression- and classification-based -- often display high levels of bias-robustness. However, we also unearth gaps in bias-robustness, such as high levels of non-robustness for certain bias assumptions on some datasets. Overall, our approach can serve as a guide for when to trust, or question, a model's output.
△ Less
Submitted 7 June, 2022;
originally announced June 2022.
-
Collective behavior of stock prices in the time of crisis as a response to the external stimulus
Authors:
Maryam Zamani,
Sander Paekivi,
Philipp Meyer,
Holger Kantz
Abstract:
We analyze the interaction between stock prices of big companies in the USA and Germany using Granger Causality. We claim that the increase in pair-wise Granger causality interaction between prices in the times of crisis is the consequence of simultaneous response of the markets to the outside events or external stimulus that is considered as a common driver to all the stocks, not a result of real…
▽ More
We analyze the interaction between stock prices of big companies in the USA and Germany using Granger Causality. We claim that the increase in pair-wise Granger causality interaction between prices in the times of crisis is the consequence of simultaneous response of the markets to the outside events or external stimulus that is considered as a common driver to all the stocks, not a result of real causal predictability between the prices themselves. An alternative approach through recurrence analysis in single stock price series supports this claim. The observed patterns in the price of stocks are modelled by adding a multiplicative exogenous term as the representative for external factors to the geometric Brownian motion model for stock prices. Altogether, we can detect and model the effects of the Great Recession as a consequence of the mortgage crisis in 2007/2008 as well as the impacts of the Covid out-break in early 2020
△ Less
Submitted 9 May, 2022;
originally announced May 2022.
-
The Double Chooz antineutrino detectors
Authors:
Double Chooz Collaboration,
H. de Kerret,
Y. Abe,
C. Aberle,
T. Abrahão,
J. M. Ahijado,
T. Akiri,
J. M. Alarcón,
J. Alba,
H. Almazan,
J. C. dos Anjos,
S. Appel,
F. Ardellier,
I. Barabanov,
J. C. Barriere,
E. Baussan,
A. Baxter,
I. Bekman,
M. Bergevin,
A. Bernstein,
W. Bertoli,
T. J. C. Bezerra,
L. Bezrukov,
C. Blanco,
N. Bleurvacq
, et al. (226 additional authors not shown)
Abstract:
This article describes the setup and performance of the near and far detectors in the Double Chooz experiment. The electron antineutrinos of the Chooz nuclear power plant were measured in two identically designed detectors with different average baselines of about 400 m and 1050 m from the two reactor cores. Over many years of data taking the neutrino signals were extracted from interactions in th…
▽ More
This article describes the setup and performance of the near and far detectors in the Double Chooz experiment. The electron antineutrinos of the Chooz nuclear power plant were measured in two identically designed detectors with different average baselines of about 400 m and 1050 m from the two reactor cores. Over many years of data taking the neutrino signals were extracted from interactions in the detectors with the goal of measuring a fundamental parameter in the context of neutrino oscillation, the mixing angle θ13. The central part of the Double Chooz detectors was a main detector comprising four cylindrical volumes filled with organic liquids. From the inside towards the outside there were volumes containing gadolinium-loaded scintillator, gadolinium-free scintillator, a buffer oil and, optically separated, another liquid scintillator acting as veto system. Above this main detector an additional outer veto system using plastic scintillator strips was installed. The technologies developed in Double Chooz were inspiration for several other antineutrino detectors in the field. The detector design allowed implementation of efficient background rejection techniques including use of pulse shape information provided by the data acquisition system. The Double Chooz detectors featured remarkable stability, in particular for the detected photons, as well as high radiopurity of the detector components.
△ Less
Submitted 13 September, 2022; v1 submitted 31 January, 2022;
originally announced January 2022.
-
MISeval: a Metric Library for Medical Image Segmentation Evaluation
Authors:
Dominik Müller,
Dennis Hartmann,
Philip Meyer,
Florian Auer,
Iñaki Soto-Rey,
Frank Kramer
Abstract:
Correct performance assessment is crucial for evaluating modern artificial intelligence algorithms in medicine like deep-learning based medical image segmentation models. However, there is no universal metric library in Python for standardized and reproducible evaluation. Thus, we propose our open-source publicly available Python package MISeval: a metric library for Medical Image Segmentation Eva…
▽ More
Correct performance assessment is crucial for evaluating modern artificial intelligence algorithms in medicine like deep-learning based medical image segmentation models. However, there is no universal metric library in Python for standardized and reproducible evaluation. Thus, we propose our open-source publicly available Python package MISeval: a metric library for Medical Image Segmentation Evaluation. The implemented metrics can be intuitively used and easily integrated into any performance assessment pipeline. The package utilizes modern CI/CD strategies to ensure functionality and stability. MISeval is available from PyPI (miseval) and GitHub: https://github.com/frankkramer-lab/miseval.
△ Less
Submitted 23 January, 2022;
originally announced January 2022.
-
Secure Time-Sensitive Software-Defined Networking in Vehicles
Authors:
Timo Häckel,
Philipp Meyer,
Franz Korf,
Thomas C. Schmidt
Abstract:
Current designs of future In-Vehicle Networks (IVN) prepare for switched Ethernet backbones, which can host advanced LAN technologies such as IEEE Time-Sensitive Networking (TSN) and Software-Defined Networking (SDN). In this paper, we present an integrated Time-Sensitive Software-Defined Networking (TSSDN) architecture that simultaneously enables control of synchronous and asynchronous real-time…
▽ More
Current designs of future In-Vehicle Networks (IVN) prepare for switched Ethernet backbones, which can host advanced LAN technologies such as IEEE Time-Sensitive Networking (TSN) and Software-Defined Networking (SDN). In this paper, we present an integrated Time-Sensitive Software-Defined Networking (TSSDN) architecture that simultaneously enables control of synchronous and asynchronous real-time and best-effort communication for all IVN traffic classes. Despite the central SDN controller, we can validate that control can operate without a delay penalty for TSN traffic, provided protocols are properly mapped. We demonstrate how TSSDN adaptably and reliably enhances network security for in-vehicle communication. A systematic investigation of the possible control flow integrations with switched Ether-networks reveals that these strategies allow for sha** the attack surface of a software-defined IVN. We discuss embeddings of control flow identifiers on different layers, covering the range from a fully exposed map** to deep encapsulation. We experimentally evaluate these strategies in a production vehicle, which we map to a modern Ethernet topology. Our findings indicate that visibility of automotive control flows on lower network layers enables isolation and access control throughout the network infrastructure. Such a TSSDN backbone can establish and survey trust zones within the IVN and reduce the attack surface of connected cars in various attack scenarios.
△ Less
Submitted 26 August, 2022; v1 submitted 3 January, 2022;
originally announced January 2022.
-
Network Anomaly Detection in Cars: A Case for Time-Sensitive Stream Filtering and Policing
Authors:
Philipp Meyer,
Timo Häckel,
Sandra Reider,
Franz Korf,
Thomas C. Schmidt
Abstract:
Connected vehicles are threatened by cyber-attacks as in-vehicle networks technologically approach (mobile) LANs with several wireless interconnects to the outside world. Malware that infiltrates a car today faces potential victims of constrained, barely shielded Electronic Control Units (ECUs). Many ECUs perform critical driving functions, which stresses the need for hardening security and resili…
▽ More
Connected vehicles are threatened by cyber-attacks as in-vehicle networks technologically approach (mobile) LANs with several wireless interconnects to the outside world. Malware that infiltrates a car today faces potential victims of constrained, barely shielded Electronic Control Units (ECUs). Many ECUs perform critical driving functions, which stresses the need for hardening security and resilience of in-vehicle networks in a multifaceted way. Future vehicles will comprise Ethernet backbones that differentiate services via Time-Sensitive Networking (TSN). The well-known vehicular control flows will follow predefined schedules and TSN traffic classifications. In this paper, we exploit this traffic classification to build a network anomaly detection system. We show how filters and policies of TSN can identify misbehaving traffic and thereby serve as distributed guards on the data link layer. On this lowest possible layer, our approach derives a highly efficient network protection directly from TSN. We classify link layer anomalies and micro-benchmark the detection accuracy in each class. Based on a topology derived from a real-world car and its traffic definitions we evaluate the detection system in realistic macro-benchmarks based on recorded attack traces. Our results show that the detection accuracy depends on how exact the specifications of in-vehicle communication are configured. Most notably for a fully specified communication matrix, our anomaly detection remains free of false-positive alarms, which is a significant benefit for implementing automated countermeasures in future vehicles.
△ Less
Submitted 3 July, 2023; v1 submitted 21 December, 2021;
originally announced December 2021.
-
Reachability analysis of neural networks using mixed monotonicity
Authors:
Pierre-Jean Meyer
Abstract:
This paper presents a new reachability analysis approach to compute interval over-approximations of the output set of feedforward neural networks with input uncertainty. We adapt to neural networks an existing mixed-monotonicity method for the reachability analysis of dynamical systems and apply it to each partial network within the main network. This ensures that the intersection of the obtained…
▽ More
This paper presents a new reachability analysis approach to compute interval over-approximations of the output set of feedforward neural networks with input uncertainty. We adapt to neural networks an existing mixed-monotonicity method for the reachability analysis of dynamical systems and apply it to each partial network within the main network. This ensures that the intersection of the obtained results is the tightest interval over-approximation of the output of each layer that can be obtained using mixed-monotonicity on any partial network decomposition. Unlike other tools in the literature focusing on small classes of piecewise-affine or monotone activation functions, the main strength of our approach is its generality: it can handle neural networks with any Lipschitz-continuous activation function. In addition, the simplicity of our framework allows users to very easily add unimplemented activation functions, by simply providing the function, its derivative and the global argmin and argmax of the derivative. Our algorithm is compared to five other interval-based tools (Interval Bound Propagation, ReluVal, Neurify, VeriNet, CROWN) on both existing benchmarks and two sets of small and large randomly generated networks for four activation functions (ReLU, TanH, ELU, SiLU).
△ Less
Submitted 23 June, 2022; v1 submitted 15 November, 2021;
originally announced November 2021.
-
Certifying Robustness to Programmable Data Bias in Decision Trees
Authors:
Anna P. Meyer,
Aws Albarghouthi,
Loris D'Antoni
Abstract:
Datasets can be biased due to societal inequities, human biases, under-representation of minorities, etc. Our goal is to certify that models produced by a learning algorithm are pointwise-robust to potential dataset biases. This is a challenging problem: it entails learning models for a large, or even infinite, number of datasets, ensuring that they all produce the same prediction. We focus on dec…
▽ More
Datasets can be biased due to societal inequities, human biases, under-representation of minorities, etc. Our goal is to certify that models produced by a learning algorithm are pointwise-robust to potential dataset biases. This is a challenging problem: it entails learning models for a large, or even infinite, number of datasets, ensuring that they all produce the same prediction. We focus on decision-tree learning due to the interpretable nature of the models. Our approach allows programmatically specifying bias models across a variety of dimensions (e.g., missing data for minorities), composing types of bias, and targeting bias towards a specific group. To certify robustness, we use a novel symbolic technique to evaluate a decision-tree learner on a large, or infinite, number of datasets, certifying that each and every dataset produces the same prediction for a specific test point. We evaluate our approach on datasets that are commonly used in the fairness literature, and demonstrate our approach's viability on a range of bias models.
△ Less
Submitted 8 October, 2021;
originally announced October 2021.
-
Simulation-based Evaluation of a Synchronous Transaction Model for Time-Sensitive Software-Defined Networks
Authors:
Tobias Haugg,
Mohammad Fazel Soltani,
Timo Häckel,
Philipp Meyer,
Franz Korf,
Thomas C. Schmidt
Abstract:
Real-time networks based on Ethernet require robust quality-of-service for time-critical traffic. The Time-Sensitive Networking (TSN) collection of standards enables this in real-time environments like vehicle on-board networks. Runtime reconfigurations in TSN must respect the deadlines of real-time traffic. Software-Defined Networking (SDN) moves the control plane of network devices to the SDN co…
▽ More
Real-time networks based on Ethernet require robust quality-of-service for time-critical traffic. The Time-Sensitive Networking (TSN) collection of standards enables this in real-time environments like vehicle on-board networks. Runtime reconfigurations in TSN must respect the deadlines of real-time traffic. Software-Defined Networking (SDN) moves the control plane of network devices to the SDN controller, making these networks programmable. This allows reconfigurations from a central point in the network. In this work, we present a transactional model for network reconfigurations that are synchronously executed in all network devices. We evaluate its performance in a case study against nontransactional reconfigurations and show that synchronous transactions enable consistency for reconfigurations in TSN without increased latencies for real-time frames.
△ Less
Submitted 8 October, 2021; v1 submitted 1 October, 2021;
originally announced October 2021.
-
Disease Progression Modeling Workbench 360
Authors:
Parthasarathy Suryanarayanan,
Prithwish Chakraborty,
Piyush Madan,
Kibichii Bore,
William Ogallo,
Rachita Chandra,
Mohamed Ghalwash,
Italo Buleje,
Sekou Remy,
Shilpa Mahatma,
Pablo Meyer,
Jianying Hu
Abstract:
In this work we introduce Disease Progression Modeling workbench 360 (DPM360) opensource clinical informatics framework for collaborative research and delivery of healthcare AI. DPM360, when fully developed, will manage the entire modeling life cycle, from data analysis (e.g., cohort identification) to machine learning algorithm development and prototy**. DPM360 augments the advantages of data m…
▽ More
In this work we introduce Disease Progression Modeling workbench 360 (DPM360) opensource clinical informatics framework for collaborative research and delivery of healthcare AI. DPM360, when fully developed, will manage the entire modeling life cycle, from data analysis (e.g., cohort identification) to machine learning algorithm development and prototy**. DPM360 augments the advantages of data model standardization and tooling (OMOP-CDM, Athena, ATLAS) provided by the widely-adopted OHDSI initiative with a powerful machine learning training framework, and a mechanism for rapid prototy** through automatic deployment of models as containerized services to a cloud environment.
△ Less
Submitted 24 June, 2021;
originally announced June 2021.
-
Validating GAN-BioBERT: A Methodology For Assessing Reporting Trends In Clinical Trials
Authors:
Joshua J Myszewski,
Emily Klossowski,
Patrick Meyer,
Kristin Bevil,
Lisa Klesius,
Kristopher M Schroeder
Abstract:
In the past decade, there has been much discussion about the issue of biased reporting in clinical research. Despite this attention, there have been limited tools developed for the systematic assessment of qualitative statements made in clinical research, with most studies assessing qualitative statements relying on the use of manual expert raters, which limits their size. Also, previous attempts…
▽ More
In the past decade, there has been much discussion about the issue of biased reporting in clinical research. Despite this attention, there have been limited tools developed for the systematic assessment of qualitative statements made in clinical research, with most studies assessing qualitative statements relying on the use of manual expert raters, which limits their size. Also, previous attempts to develop larger scale tools, such as those using natural language processing, were limited by both their accuracy and the number of categories used for the classification of their findings. With these limitations in mind, this study's goal was to develop a classification algorithm that was both suitably accurate and finely grained to be applied on a large scale for assessing the qualitative sentiment expressed in clinical trial abstracts. Additionally, this study seeks to compare the performance of the proposed algorithm, GAN-BioBERT, to previous studies as well as to expert manual rating of clinical trial abstracts. This study develops a three-class sentiment classification algorithm for clinical trial abstracts using a semi-supervised natural language process model based on the Bidirectional Encoder Representation from Transformers (BERT) model, from a series of clinical trial abstracts annotated by a group of experts in academic medicine. Results: The use of this algorithm was found to have a classification accuracy of 91.3%, with a macro F1-Score of 0.92, which is a significant improvement in accuracy when compared to previous methods and expert ratings, while also making the sentiment classification finer grained than previous studies. The proposed algorithm, GAN-BioBERT, is a suitable classification model for the large-scale assessment of qualitative statements in clinical trial literature, providing an accurate, reproducible tool for the large-scale study of clinical publication trends.
△ Less
Submitted 1 June, 2021;
originally announced June 2021.
-
Objective comparison of methods to decode anomalous diffusion
Authors:
Gorka Muñoz-Gil,
Giovanni Volpe,
Miguel Angel Garcia-March,
Erez Aghion,
Aykut Argun,
Chang Beom Hong,
Tom Bland,
Stefano Bo,
J. Alberto Conejero,
Nicolás Firbas,
Òscar Garibo i Orts,
Alessia Gentili,
Zihan Huang,
Jae-Hyung Jeon,
Hélène Kabbech,
Yeong** Kim,
Patrycja Kowalek,
Diego Krapf,
Hanna Loch-Olszewska,
Michael A. Lomholt,
Jean-Baptiste Masson,
Philipp G. Meyer,
Seongyu Park,
Borja Requena,
Ihor Smal
, et al. (9 additional authors not shown)
Abstract:
Deviations from Brownian motion leading to anomalous diffusion are ubiquitously found in transport dynamics, playing a crucial role in phenomena from quantum physics to life sciences. The detection and characterization of anomalous diffusion from the measurement of an individual trajectory are challenging tasks, which traditionally rely on calculating the mean squared displacement of the trajector…
▽ More
Deviations from Brownian motion leading to anomalous diffusion are ubiquitously found in transport dynamics, playing a crucial role in phenomena from quantum physics to life sciences. The detection and characterization of anomalous diffusion from the measurement of an individual trajectory are challenging tasks, which traditionally rely on calculating the mean squared displacement of the trajectory. However, this approach breaks down for cases of important practical interest, e.g., short or noisy trajectories, ensembles of heterogeneous trajectories, or non-ergodic processes. Recently, several new approaches have been proposed, mostly building on the ongoing machine-learning revolution. Aiming to perform an objective comparison of methods, we gathered the community and organized an open competition, the Anomalous Diffusion challenge (AnDi). Participating teams independently applied their own algorithms to a commonly-defined dataset including diverse conditions. Although no single method performed best across all scenarios, the results revealed clear differences between the various approaches, providing practical advice for users and a benchmark for developers.
△ Less
Submitted 14 May, 2021;
originally announced May 2021.
-
Strategies for Integrating Controls Flows in Software-Defined In-Vehicle Networks and Their Impact on Network Security
Authors:
Timo Häckel,
Anja Schmidt,
Philipp Meyer,
Franz Korf,
Thomas C. Schmidt
Abstract:
Current In-Vehicle Networks (IVNs) connect Electronic Control Units (ECUs) via domain busses. A gateway forwards messages between these domains. Automotive Ethernet emerges as a flat, high-speed backbone technology for IVNs that carries the various control flows within Ethernet frames. Recently, Software-Defined-Networking (SDN) has been identified as a useful building block of the vehicular domai…
▽ More
Current In-Vehicle Networks (IVNs) connect Electronic Control Units (ECUs) via domain busses. A gateway forwards messages between these domains. Automotive Ethernet emerges as a flat, high-speed backbone technology for IVNs that carries the various control flows within Ethernet frames. Recently, Software-Defined-Networking (SDN) has been identified as a useful building block of the vehicular domain, as it allows the differentiation of packets based on all header fields and thus can isolate unrelated control flows. In this work, we systematically explore the different strategies for integrating automotive control flows in switched Ether-networks and analyze their security impact for a software-defined IVN. We discuss how control flow identifiers can be embedded on different layers resulting in a range of solutions from fully exposed embedding to deep encapsulation. We evaluate these strategies in a realistic IVN based on the communication matrix of a production grade vehicle, which we map into a modern Ethernet topology. We find that visibility of automotive control flows within packet headers is essential for the network infrastructure to enable isolation and access control. With an exposed embedding, the SDN backbone can establish and survey trust zones within the IVN and largely reduce the attack surface of connected cars. An exposed embedding strategy also minimizes communication expenses.
△ Less
Submitted 8 December, 2020; v1 submitted 8 October, 2020;
originally announced October 2020.
-
Moses, Noah and Joseph Effects in Coupled Lévy Processes
Authors:
Erez Aghion,
Philipp G. Meyer,
Vidushi Adalkha,
Holger Kantz,
Kevin E. Bassler
Abstract:
We study a method for detecting the origins of anomalous diffusion, when it is observed in an ensemble of times-series, generated experimentally or numerically, without having knowledge about the exact underlying dynamics. The reasons for anomalous diffusive scaling of the mean-squared displacement are decomposed into three root causes: increment correlations are expressed by the "Joseph effect" […
▽ More
We study a method for detecting the origins of anomalous diffusion, when it is observed in an ensemble of times-series, generated experimentally or numerically, without having knowledge about the exact underlying dynamics. The reasons for anomalous diffusive scaling of the mean-squared displacement are decomposed into three root causes: increment correlations are expressed by the "Joseph effect" [Mandelbrot 1968], fat-tails of the increment probability density lead to a "Noah effect" [Mandelbrot 1968], and non-stationarity, to the "Moses effect" [Chen et al. 2017]. After appropriate rescaling, based on the quantification of these effects, the increment distribution converges at increasing times to a time-invariant asymptotic shape. For different processes, this asymptotic limit can be an equilibrium state, an infinite-invariant, or an infinite-covariant density. We use numerical methods of time-series analysis to quantify the three effects in a model of a non-linearly coupled Lévy walk, compare our results to theoretical predictions, and discuss the generality of the method.
△ Less
Submitted 22 December, 2020; v1 submitted 18 September, 2020;
originally announced September 2020.
-
Social Distance Characterization by means of Pedestrian Simulation
Authors:
Daniel R. Parisi,
Germán A. Patterson,
Lucio Pagni,
Agustina Osimani,
Tomas Bacigalupo,
Juan Godfrid,
Federico M. Bergagna,
Manuel Rodriguez Brizi,
Pedro Momesso,
Fermin L. Gomez,
Jimena Lozano,
Juan Martin Baader,
Ignacio Ribas,
Facundo P. Astiz Meyer,
Miguel Di Luca,
Nicolás E. Barrera,
Ezequiel M. Keimel Álvarez,
Maite M. Herran Oyhanarte,
Pedro R. **arilho,
Ximena Zuberbuhler,
Felipe Gorostiaga
Abstract:
In the present work, we study how the number of simulated clients (occupancy) affects the social distance in an ideal supermarket. For this, we account for realistic typical dimensions and process time (picking products and checkout). From the simulated trajectories, we measure events of social distance less than 2 m and its duration. Between other observables, we define a social distance coeffici…
▽ More
In the present work, we study how the number of simulated clients (occupancy) affects the social distance in an ideal supermarket. For this, we account for realistic typical dimensions and process time (picking products and checkout). From the simulated trajectories, we measure events of social distance less than 2 m and its duration. Between other observables, we define a social distance coefficient that informs how many events (of a given duration) suffer each agent in the system. These kinds of outputs could be useful for building procedures and protocols in the context of a pandemic allowing to keep low health risks while setting a maximum operating capacity.
△ Less
Submitted 8 September, 2020;
originally announced September 2020.
-
Convolutional neural network based deep-learning architecture for intraprostatic tumour contouring on PSMA PET images in patients with primary prostate cancer
Authors:
Dejan Kostyszyn,
Tobias Fechter,
Nico Bartl,
Anca L. Grosu,
Christian Gratzke,
August Sigle,
Michael Mix,
Juri Ruf,
Thomas F. Fassbender,
Selina Kiefer,
Alisa S. Bettermann,
Nils H. Nicolay,
Simon Spohn,
Maria U. Kramer,
Peter Bronsert,
Hongqian Guo,
Xuefeng Qiu,
Feng Wang,
Christoph Henkenberens,
Rudolf A. Werner,
Dimos Baltas,
Philipp T. Meyer,
Thorsten Derlin,
Mengxia Chen,
Constantinos Zamboglou
Abstract:
Accurate delineation of the intraprostatic gross tumour volume (GTV) is a prerequisite for treatment approaches in patients with primary prostate cancer (PCa). Prostate-specific membrane antigen positron emission tomography (PSMA-PET) may outperform MRI in GTV detection. However, visual GTV delineation underlies interobserver heterogeneity and is time consuming. The aim of this study was to develo…
▽ More
Accurate delineation of the intraprostatic gross tumour volume (GTV) is a prerequisite for treatment approaches in patients with primary prostate cancer (PCa). Prostate-specific membrane antigen positron emission tomography (PSMA-PET) may outperform MRI in GTV detection. However, visual GTV delineation underlies interobserver heterogeneity and is time consuming. The aim of this study was to develop a convolutional neural network (CNN) for automated segmentation of intraprostatic tumour (GTV-CNN) in PSMA-PET.
Methods: The CNN (3D U-Net) was trained on [68Ga]PSMA-PET images of 152 patients from two different institutions and the training labels were generated manually using a validated technique. The CNN was tested on two independent internal (cohort 1: [68Ga]PSMA-PET, n=18 and cohort 2: [18F]PSMA-PET, n=19) and one external (cohort 3: [68Ga]PSMA-PET, n=20) test-datasets. Accordance between manual contours and GTV-CNN was assessed with Dice-Sørensen coefficient (DSC). Sensitivity and specificity were calculated for the two internal test-datasets by using whole-mount histology.
Results: Median DSCs for cohorts 1-3 were 0.84 (range: 0.32-0.95), 0.81 (range: 0.28-0.93) and 0.83 (range: 0.32-0.93), respectively. Sensitivities and specificities for GTV-CNN were comparable with manual expert contours: 0.98 and 0.76 (cohort 1) and 1 and 0.57 (cohort 2), respectively. Computation time was around 6 seconds for a standard dataset.
Conclusion: The application of a CNN for automated contouring of intraprostatic GTV in [68Ga]PSMA- and [18F]PSMA-PET images resulted in a high concordance with expert contours and in high sensitivities and specificities in comparison with histology reference. This robust, accurate and fast technique may be implemented for treatment concepts in primary PCa. The trained model and the study's source code are available in an open source repository.
△ Less
Submitted 7 August, 2020;
originally announced August 2020.
-
Peregrine 2.0: Explaining Correctness of Population Protocols through Stage Graphs
Authors:
Javier Esparza,
Martin Helfrich,
Stefan Jaax,
Philipp J. Meyer
Abstract:
We present a new version of Peregrine, the tool for the analysis and parameterized verification of population protocols introduced in [Blondin et al., CAV'2018]. Population protocols are a model of computation, intensely studied by the distributed computing community, in which mobile anonymous agents interact stochastically to perform a task.
Peregrine 2.0 features a novel verification engine ba…
▽ More
We present a new version of Peregrine, the tool for the analysis and parameterized verification of population protocols introduced in [Blondin et al., CAV'2018]. Population protocols are a model of computation, intensely studied by the distributed computing community, in which mobile anonymous agents interact stochastically to perform a task.
Peregrine 2.0 features a novel verification engine based on the construction of stage graphs. Stage graphs are proof certificates, introduced in [Blondin et al., CAV'2020], that are typically succinct and can be independently checked. Moreover, unlike the techniques of Peregrine 1.0, the stage graph methodology can verify protocols whose executions never terminate, a class including recent fast majority protocols. Peregrine 2.0 also features a novel proof visualization component that allows the user to interactively explore the stage graph generated for a given protocol.
△ Less
Submitted 15 July, 2020;
originally announced July 2020.
-
MultiXNet: Multiclass Multistage Multimodal Motion Prediction
Authors:
Nemanja Djuric,
Henggang Cui,
Zhaoen Su,
Shangxuan Wu,
Huahua Wang,
Fang-Chieh Chou,
Luisa San Martin,
Song Feng,
Rui Hu,
Yang Xu,
Alyssa Dayan,
Sidney Zhang,
Brian C. Becker,
Gregory P. Meyer,
Carlos Vallespi-Gonzalez,
Carl K. Wellington
Abstract:
One of the critical pieces of the self-driving puzzle is understanding the surroundings of a self-driving vehicle (SDV) and predicting how these surroundings will change in the near future. To address this task we propose MultiXNet, an end-to-end approach for detection and motion prediction based directly on lidar sensor data. This approach builds on prior work by handling multiple classes of traf…
▽ More
One of the critical pieces of the self-driving puzzle is understanding the surroundings of a self-driving vehicle (SDV) and predicting how these surroundings will change in the near future. To address this task we propose MultiXNet, an end-to-end approach for detection and motion prediction based directly on lidar sensor data. This approach builds on prior work by handling multiple classes of traffic actors, adding a jointly trained second-stage trajectory refinement step, and producing a multimodal probability distribution over future actor motion that includes both multiple discrete traffic behaviors and calibrated continuous position uncertainties. The method was evaluated on large-scale, real-world data collected by a fleet of SDVs in several cities, with the results indicating that it outperforms existing state-of-the-art approaches.
△ Less
Submitted 24 May, 2021; v1 submitted 2 June, 2020;
originally announced June 2020.
-
RV-FuseNet: Range View Based Fusion of Time-Series LiDAR Data for Joint 3D Object Detection and Motion Forecasting
Authors:
Ankit Laddha,
Shivam Gautam,
Gregory P. Meyer,
Carlos Vallespi-Gonzalez,
Carl K. Wellington
Abstract:
Robust real-time detection and motion forecasting of traffic participants is necessary for autonomous vehicles to safely navigate urban environments. In this paper, we present RV-FuseNet, a novel end-to-end approach for joint detection and trajectory estimation directly from time-series LiDAR data. Instead of the widely used bird's eye view (BEV) representation, we utilize the native range view (R…
▽ More
Robust real-time detection and motion forecasting of traffic participants is necessary for autonomous vehicles to safely navigate urban environments. In this paper, we present RV-FuseNet, a novel end-to-end approach for joint detection and trajectory estimation directly from time-series LiDAR data. Instead of the widely used bird's eye view (BEV) representation, we utilize the native range view (RV) representation of LiDAR data. The RV preserves the full resolution of the sensor by avoiding the voxelization used in the BEV. Furthermore, RV can be processed efficiently due to its compactness. Previous approaches project time-series data to a common viewpoint for temporal fusion, and often this viewpoint is different from where it was captured. This is sufficient for BEV methods, but for RV methods, this can lead to loss of information and data distortion which has an adverse impact on performance. To address this challenge we propose a simple yet effective novel architecture, \textit{Incremental Fusion}, that minimizes the information loss by sequentially projecting each RV sweep into the viewpoint of the next sweep in time. We show that our approach significantly improves motion forecasting performance over the existing state-of-the-art. Furthermore, we demonstrate that our sequential fusion approach is superior to alternative RV based fusion methods on multiple datasets.
△ Less
Submitted 22 March, 2021; v1 submitted 21 May, 2020;
originally announced May 2020.
-
Checking Qualitative Liveness Properties of Replicated Systems with Stochastic Scheduling
Authors:
Michael Blondin,
Javier Esparza,
Martin Helfrich,
Antonín Kučera,
Philipp J. Meyer
Abstract:
We present a sound and complete method for the verification of qualitative liveness properties of replicated systems under stochastic scheduling. These are systems consisting of a finite-state program, executed by an unknown number of indistinguishable agents, where the next agent to make a move is determined by the result of a random experiment. We show that if a property of such a system holds,…
▽ More
We present a sound and complete method for the verification of qualitative liveness properties of replicated systems under stochastic scheduling. These are systems consisting of a finite-state program, executed by an unknown number of indistinguishable agents, where the next agent to make a move is determined by the result of a random experiment. We show that if a property of such a system holds, then there is always a witness in the shape of a Presburger stage graph: a finite graph whose nodes are Presburger-definable sets of configurations. Due to the high complexity of the verification problem (non-elementary), we introduce an incomplete procedure for the construction of Presburger stage graphs, and implement it on top of an SMT solver. The procedure makes extensive use of the theory of well-quasi-orders, and of the structural theory of Petri nets and vector addition systems. We apply our results to a set of benchmarks, in particular to a large collection of population protocols, a model of distributed computation extensively studied by the distributed computing community.
△ Less
Submitted 2 July, 2020; v1 submitted 7 May, 2020;
originally announced May 2020.
-
Symplectic Dirac operators for Lie algebras and graded Hecke algebras
Authors:
Dan Ciubotaru,
Marcelo De Martino,
Philippe Meyer
Abstract:
We define a pair of symplectic Dirac operators $(D^+,D^-)$ in an algebraic setting motivated by the analogy with the algebraic orthogonal Dirac operators in representation theory. We work in the settings of $\mathbb Z/2$-graded quadratic Lie algebras $\mathfrak g=\mathfrak k+\mathfrak p$ and of graded affine Hecke algebras $\mathbb H$.
We define a pair of symplectic Dirac operators $(D^+,D^-)$ in an algebraic setting motivated by the analogy with the algebraic orthogonal Dirac operators in representation theory. We work in the settings of $\mathbb Z/2$-graded quadratic Lie algebras $\mathfrak g=\mathfrak k+\mathfrak p$ and of graded affine Hecke algebras $\mathbb H$.
△ Less
Submitted 25 March, 2020;
originally announced March 2020.
-
Geometric properties of special orthogonal representations associated to exceptional Lie superalgebras
Authors:
Philippe Meyer
Abstract:
From an octonion algebra $\mathbb{O}$ over a field $k$ of characteristic not two or three, we show that the fundamental representation ${\rm Im}(\mathbb{O})$ of the derivation algebra ${\rm Der}(\mathbb{O})$ and the spinor representation $\mathbb{O}$ of $\mathfrak{so}({\rm Im}(\mathbb{O}))$ are special orthogonal representations. They have particular geometric properties coming from their similari…
▽ More
From an octonion algebra $\mathbb{O}$ over a field $k$ of characteristic not two or three, we show that the fundamental representation ${\rm Im}(\mathbb{O})$ of the derivation algebra ${\rm Der}(\mathbb{O})$ and the spinor representation $\mathbb{O}$ of $\mathfrak{so}({\rm Im}(\mathbb{O}))$ are special orthogonal representations. They have particular geometric properties coming from their similarities with binary cubics and we show that the covariants of these representations and their Mathews identities are related to the Fano plane and the affine space $(\mathbb{Z}_2)^3$. This also permits to give constructions of exceptional Lie superalgebras.
△ Less
Submitted 31 July, 2020; v1 submitted 13 March, 2020;
originally announced March 2020.
-
LaserFlow: Efficient and Probabilistic Object Detection and Motion Forecasting
Authors:
Gregory P. Meyer,
Jake Charland,
Shreyash Pandey,
Ankit Laddha,
Shivam Gautam,
Carlos Vallespi-Gonzalez,
Carl K. Wellington
Abstract:
In this work, we present LaserFlow, an efficient method for 3D object detection and motion forecasting from LiDAR. Unlike the previous work, our approach utilizes the native range view representation of the LiDAR, which enables our method to operate at the full range of the sensor in real-time without voxelization or compression of the data. We propose a new multi-sweep fusion architecture, which…
▽ More
In this work, we present LaserFlow, an efficient method for 3D object detection and motion forecasting from LiDAR. Unlike the previous work, our approach utilizes the native range view representation of the LiDAR, which enables our method to operate at the full range of the sensor in real-time without voxelization or compression of the data. We propose a new multi-sweep fusion architecture, which extracts and merges temporal features directly from the range images. Furthermore, we propose a novel technique for learning a probability distribution over future trajectories inspired by curriculum learning. We evaluate LaserFlow on two autonomous driving datasets and demonstrate competitive results when compared to the existing state-of-the-art methods.
△ Less
Submitted 15 October, 2020; v1 submitted 12 March, 2020;
originally announced March 2020.
-
SDVTracker: Real-Time Multi-Sensor Association and Tracking for Self-Driving Vehicles
Authors:
Shivam Gautam,
Gregory P. Meyer,
Carlos Vallespi-Gonzalez,
Brian C. Becker
Abstract:
Accurate motion state estimation of Vulnerable Road Users (VRUs), is a critical requirement for autonomous vehicles that navigate in urban environments. Due to their computational efficiency, many traditional autonomy systems perform multi-object tracking using Kalman Filters which frequently rely on hand-engineered association. However, such methods fail to generalize to crowded scenes and multi-…
▽ More
Accurate motion state estimation of Vulnerable Road Users (VRUs), is a critical requirement for autonomous vehicles that navigate in urban environments. Due to their computational efficiency, many traditional autonomy systems perform multi-object tracking using Kalman Filters which frequently rely on hand-engineered association. However, such methods fail to generalize to crowded scenes and multi-sensor modalities, often resulting in poor state estimates which cascade to inaccurate predictions. We present a practical and lightweight tracking system, SDVTracker, that uses a deep learned model for association and state estimation in conjunction with an Interacting Multiple Model (IMM) filter. The proposed tracking method is fast, robust and generalizes across multiple sensor modalities and different VRU classes. In this paper, we detail a model that jointly optimizes both association and state estimation with a novel loss, an algorithm for determining ground-truth supervision, and a training procedure. We show this system significantly outperforms hand-engineered methods on a real-world urban driving dataset while running in less than 2.5 ms on CPU for a scene with 100 actors, making it suitable for self-driving applications where low latency and high accuracy is critical.
△ Less
Submitted 9 March, 2020;
originally announced March 2020.
-
Cubic Dirac operators and the strange Freudenthal-de Vries formula for colour Lie algebras
Authors:
Philippe Meyer
Abstract:
The aim of this paper is to define cubic Dirac operators for colour Lie algebras. We give a necessary and sufficient condition to construct a colour Lie algebra from an $ε$-orthogonal representation of an $ε$-quadratic colour Lie algebra. This is used to prove a strange Freudenthal-de Vries formula for basic colour Lie algebras as well as a Parthasarathy formula for cubic Dirac operators of colour…
▽ More
The aim of this paper is to define cubic Dirac operators for colour Lie algebras. We give a necessary and sufficient condition to construct a colour Lie algebra from an $ε$-orthogonal representation of an $ε$-quadratic colour Lie algebra. This is used to prove a strange Freudenthal-de Vries formula for basic colour Lie algebras as well as a Parthasarathy formula for cubic Dirac operators of colour Lie algebras. We calculate the cohomology induced by this Dirac operator, analogously to the algebraic Vogan conjecture proved by Huang and Pandžić.
△ Less
Submitted 2 March, 2020;
originally announced March 2020.
-
Involutions of sl(2,k) and non-split, three-dimensional simple Lie algebras
Authors:
Philippe Meyer
Abstract:
We give a process to construct non-split, three-dimensional simple Lie algebras from involutions of sl(2,k), where k is a field of characteristic not two. Up to equivalence, non-split three-dimensional simple Lie algebras obtained in this way are parametrised by a subgroup of the Brauer group of k and are characterised by the fact that their Killing form represents -2. Over local and global fields…
▽ More
We give a process to construct non-split, three-dimensional simple Lie algebras from involutions of sl(2,k), where k is a field of characteristic not two. Up to equivalence, non-split three-dimensional simple Lie algebras obtained in this way are parametrised by a subgroup of the Brauer group of k and are characterised by the fact that their Killing form represents -2. Over local and global fields we re-express this condition in terms of Hilbert and Legendre Symbols and give examples of three-dimensional simple Lie algebras which can and cannot be obtained by this construction over the field of rationals.
△ Less
Submitted 27 February, 2020;
originally announced February 2020.
-
Interval Reachability Analysis using Second-Order Sensitivity
Authors:
Pierre-Jean Meyer,
Murat Arcak
Abstract:
We propose a new approach to compute an interval over-approximation of the finite time reachable set for a large class of nonlinear systems. This approach relies on the notions of sensitivity matrices, which are the partial derivatives representing the variations of the system trajectories in response to variations of the initial states. Using interval arithmetics, we first over-approximate the po…
▽ More
We propose a new approach to compute an interval over-approximation of the finite time reachable set for a large class of nonlinear systems. This approach relies on the notions of sensitivity matrices, which are the partial derivatives representing the variations of the system trajectories in response to variations of the initial states. Using interval arithmetics, we first over-approximate the possible values of the second-order sensitivity at the final time of the reachability problem. Then we exploit these bounds and the evaluation of the first-order sensitivity matrices at a few sampled initial states to obtain an over-approximation of the first-order sensitivity, which is in turn used to over-approximate the reachable set of the initial system. Unlike existing methods relying only on the first-order sensitivity matrix, this new approach provides guaranteed over-approximations of the first-order sensitivity and can also provide such over-approximations with an arbitrary precision by increasing the number of samples.
△ Less
Submitted 4 May, 2020; v1 submitted 21 November, 2019;
originally announced November 2019.
-
Continuous and discrete abstractions for planning, applied to ship docking
Authors:
Pierre-Jean Meyer,
He Yin,
Astrid H. Brodtkorb,
Murat Arcak,
Asgeir J. Sørensen
Abstract:
We propose a hierarchical control framework for the synthesis of correct-by-construction controllers for nonlinear control-affine systems with respect to reach-avoid-stay specifications. We first create a low-dimensional continuous abstraction of the system and use Sum-of-Squares (SOS) programming to obtain a low-level controller ensuring a bounded error between the two models. We then create a di…
▽ More
We propose a hierarchical control framework for the synthesis of correct-by-construction controllers for nonlinear control-affine systems with respect to reach-avoid-stay specifications. We first create a low-dimensional continuous abstraction of the system and use Sum-of-Squares (SOS) programming to obtain a low-level controller ensuring a bounded error between the two models. We then create a discrete abstraction of the continuous abstraction and use formal methods to synthesize a controller satisfying the specifications shrunk by the obtained error bound. Combining both controllers finally solves the main control problem on the initial system. This two-step framework allows the discrete abstraction methods to deal with higher-dimensional systems which may be computationally expensive without the prior continuous abstraction. The main novelty of the proposed SOS continuous abstraction is that it allows the error between abstract and concrete models to explicitly depend on the control input of the abstract model, which offers more freedom in the choice of the continuous abstraction model and provides lower error bounds than when only the states of both models are considered. This approach is illustrated on the docking problem of a marine vessel.
△ Less
Submitted 21 November, 2019;
originally announced November 2019.
-
An Alternative Probabilistic Interpretation of the Huber Loss
Authors:
Gregory P. Meyer
Abstract:
The Huber loss is a robust loss function used for a wide range of regression tasks. To utilize the Huber loss, a parameter that controls the transitions from a quadratic function to an absolute value function needs to be selected. We believe the standard probabilistic interpretation that relates the Huber loss to the Huber density fails to provide adequate intuition for identifying the transition…
▽ More
The Huber loss is a robust loss function used for a wide range of regression tasks. To utilize the Huber loss, a parameter that controls the transitions from a quadratic function to an absolute value function needs to be selected. We believe the standard probabilistic interpretation that relates the Huber loss to the Huber density fails to provide adequate intuition for identifying the transition point. As a result, a hyper-parameter search is often necessary to determine an appropriate value. In this work, we propose an alternative probabilistic interpretation of the Huber loss, which relates minimizing the loss to minimizing an upper-bound on the Kullback-Leibler divergence between Laplace distributions, where one distribution represents the noise in the ground-truth and the other represents the noise in the prediction. In addition, we show that the parameters of the Laplace distributions are directly related to the transition point of the Huber loss. We demonstrate, through a toy problem, that the optimal transition point of the Huber loss is closely related to the distribution of the noise in the ground-truth data. As a result, our interpretation provides an intuitive way to identify well-suited hyper-parameters by approximating the amount of noise in the data, which we demonstrate through a case study and experimentation on the Faster R-CNN and RetinaNet object detectors.
△ Less
Submitted 18 November, 2020; v1 submitted 5 November, 2019;
originally announced November 2019.
-
A QoS Aware Approach to Service-Oriented Communication in Future Automotive Networks
Authors:
Mehmet Çakır,
Timo Häckel,
Sandra Reider,
Philipp Meyer,
Franz Korf,
Thomas C. Schmidt
Abstract:
Service-Oriented Architecture (SOA) is about to enter automotive networks based on the SOME/IP middleware and an Ethernet high-bandwidth communication layer. It promises to meet the growing demands on connectivity and flexibility for software components in modern cars. Largely heterogeneous service requirements and time-sensitive network functions make Quality-of-Service (QoS) agreements a vital b…
▽ More
Service-Oriented Architecture (SOA) is about to enter automotive networks based on the SOME/IP middleware and an Ethernet high-bandwidth communication layer. It promises to meet the growing demands on connectivity and flexibility for software components in modern cars. Largely heterogeneous service requirements and time-sensitive network functions make Quality-of-Service (QoS) agreements a vital building block within future automobiles. Existing middleware solutions, however, do not allow for a dynamic selection of QoS.
This paper presents a service-oriented middleware for QoS aware communication in future cars. We contribute a protocol for dynamic QoS negotiation along with a multi-protocol stack, which supports the different communication classes as derived from a thorough requirements analysis. We validate the feasibility of our approach in a case study and evaluate its performance in a simulation model of a realistic in-car network. Our findings indicate that QoS aware communication can indeed meet the requirements, while the impact of the service negotiations and setup times of the network remain acceptable provided the cross-traffic during negotiations stays below 70% of the available bandwidth.
△ Less
Submitted 5 November, 2019;
originally announced November 2019.