-
Privacy Preserving Federated Learning in Medical Imaging with Uncertainty Estimation
Authors:
Nikolas Koutsoubis,
Yasin Yilmaz,
Ravi P. Ramachandran,
Matthew Schabath,
Ghulam Rasool
Abstract:
Machine learning (ML) and Artificial Intelligence (AI) have fueled remarkable advancements, particularly in healthcare. Within medical imaging, ML models hold the promise of improving disease diagnoses, treatment planning, and post-treatment monitoring. Various computer vision tasks like image classification, object detection, and image segmentation are poised to become routine in clinical analysi…
▽ More
Machine learning (ML) and Artificial Intelligence (AI) have fueled remarkable advancements, particularly in healthcare. Within medical imaging, ML models hold the promise of improving disease diagnoses, treatment planning, and post-treatment monitoring. Various computer vision tasks like image classification, object detection, and image segmentation are poised to become routine in clinical analysis. However, privacy concerns surrounding patient data hinder the assembly of large training datasets needed for develo** and training accurate, robust, and generalizable models. Federated Learning (FL) emerges as a compelling solution, enabling organizations to collaborate on ML model training by sharing model training information (gradients) rather than data (e.g., medical images). FL's distributed learning framework facilitates inter-institutional collaboration while preserving patient privacy. However, FL, while robust in privacy preservation, faces several challenges. Sensitive information can still be gleaned from shared gradients that are passed on between organizations during model training. Additionally, in medical imaging, quantifying model confidence\uncertainty accurately is crucial due to the noise and artifacts present in the data. Uncertainty estimation in FL encounters unique hurdles due to data heterogeneity across organizations. This paper offers a comprehensive review of FL, privacy preservation, and uncertainty estimation, with a focus on medical imaging. Alongside a survey of current research, we identify gaps in the field and suggest future directions for FL research to enhance privacy and address noisy medical imaging data challenges.
△ Less
Submitted 18 June, 2024;
originally announced June 2024.
-
HoneyBee: A Scalable Modular Framework for Creating Multimodal Oncology Datasets with Foundational Embedding Models
Authors:
Aakash Tripathi,
Asim Waqas,
Yasin Yilmaz,
Ghulam Rasool
Abstract:
Develo** accurate machine learning models for oncology requires large-scale, high-quality multimodal datasets. However, creating such datasets remains challenging due to the complexity and heterogeneity of medical data. To address this challenge, we introduce HoneyBee, a scalable modular framework for building multimodal oncology datasets that leverages foundation models to generate representati…
▽ More
Develo** accurate machine learning models for oncology requires large-scale, high-quality multimodal datasets. However, creating such datasets remains challenging due to the complexity and heterogeneity of medical data. To address this challenge, we introduce HoneyBee, a scalable modular framework for building multimodal oncology datasets that leverages foundation models to generate representative embeddings. HoneyBee integrates various data modalities, including clinical diagnostic and pathology imaging data, medical notes, reports, records, and molecular data. It employs data preprocessing techniques and foundation models to generate embeddings that capture the essential features and relationships within the raw medical data. The generated embeddings are stored in a structured format using Hugging Face datasets and PyTorch dataloaders for accessibility. Vector databases enable efficient querying and retrieval for machine learning applications. We demonstrate the effectiveness of HoneyBee through experiments assessing the quality and representativeness of these embeddings. The framework is designed to be extensible to other medical domains and aims to accelerate oncology research by providing high-quality, machine learning-ready datasets. HoneyBee is an ongoing open-source effort, and the code, datasets, and models are available at the project repository.
△ Less
Submitted 13 June, 2024; v1 submitted 13 May, 2024;
originally announced May 2024.
-
Multimodal Attack Detection for Action Recognition Models
Authors:
Furkan Mumcu,
Yasin Yilmaz
Abstract:
Adversarial machine learning attacks on video action recognition models is a growing research area and many effective attacks were introduced in recent years. These attacks show that action recognition models can be breached in many ways. Hence using these models in practice raises significant security concerns. However, there are very few works which focus on defending against or detecting attack…
▽ More
Adversarial machine learning attacks on video action recognition models is a growing research area and many effective attacks were introduced in recent years. These attacks show that action recognition models can be breached in many ways. Hence using these models in practice raises significant security concerns. However, there are very few works which focus on defending against or detecting attacks. In this work, we propose a novel universal detection method which is compatible with any action recognition model. In our extensive experiments, we show that our method consistently detects various attacks against different target models with high true positive rates while satisfying very low false positive rates. Tested against four state-of-the-art attacks targeting four action recognition models, the proposed detector achieves an average AUC of 0.911 over 16 test cases while the best performance achieved by the existing detectors is 0.645 average AUC. This 41.2% improvement is enabled by the robustness of the proposed detector to varying attack methods and target models. The lowest AUC achieved by our detector across the 16 test cases is 0.837 while the competing detector's performance drops as low as 0.211. We also show that the proposed detector is robust to varying attack strengths. In addition, we analyze our method's real-time performance with different hardware setups to demonstrate its potential as a practical defense mechanism.
△ Less
Submitted 12 April, 2024;
originally announced April 2024.
-
EV2Gym: A Flexible V2G Simulator for EV Smart Charging Research and Benchmarking
Authors:
Stavros Orfanoudakis,
Cesar Diaz-Londono,
Yunus E. Yılmaz,
Peter Palensky,
Pedro P. Vergara
Abstract:
As electric vehicle (EV) numbers rise, concerns about the capacity of current charging and power grid infrastructure grow, necessitating the development of smart charging solutions. While many smart charging simulators have been developed in recent years, only a few support the development of Reinforcement Learning (RL) algorithms in the form of a Gym environment, and those that do usually lack de…
▽ More
As electric vehicle (EV) numbers rise, concerns about the capacity of current charging and power grid infrastructure grow, necessitating the development of smart charging solutions. While many smart charging simulators have been developed in recent years, only a few support the development of Reinforcement Learning (RL) algorithms in the form of a Gym environment, and those that do usually lack depth in modeling Vehicle-to-Grid (V2G) scenarios. To address the aforementioned issues, this paper introduces the EV2Gym, a realistic simulator platform for the development and assessment of small and large-scale smart charging algorithms within a standardized platform. The proposed simulator is populated with comprehensive EV, charging station, power transformer, and EV behavior models validated using real data. EV2Gym has a highly customizable interface empowering users to choose from pre-designed case studies or craft their own customized scenarios to suit their specific requirements. Moreover, it incorporates a diverse array of RL, mathematical programming, and heuristic algorithms to speed up the development and benchmarking of new solutions. By offering a unified and standardized platform, EV2Gym aims to provide researchers and practitioners with a robust environment for advancing and assessing smart charging algorithms.
△ Less
Submitted 2 April, 2024;
originally announced April 2024.
-
Information gain and measurement disturbance for quantum agents
Authors:
Arthur O. T. Pang,
Noah Lupu-Gladstein,
Y. Batuhan Yilmaz,
Aharon Brodutch,
Aephraim M. Steinberg
Abstract:
The traditional formalism of quantum measurement (hereafter ``TQM'') describes processes where some properties of quantum states are extracted and stored as classical information. While TQM is a natural and appropriate description of how humans interact with quantum systems, it is silent on the question of how a more general, quantum, agent would do so. How do we describe the observation of a syst…
▽ More
The traditional formalism of quantum measurement (hereafter ``TQM'') describes processes where some properties of quantum states are extracted and stored as classical information. While TQM is a natural and appropriate description of how humans interact with quantum systems, it is silent on the question of how a more general, quantum, agent would do so. How do we describe the observation of a system by an observer with the ability to store not only classical information but quantum states in its memory? In this paper, we extend the idea of measurement to a more general class of sensors for quantum agents which interact with a system in such a way that the agent's memory stores information (classical or quantum) about the system under study. For appropriate sensory interactions, the quantum agent may ``learn'' more about the system than would be possible under any set of classical measurements -- but as we show, this comes at the cost of additional measurement disturbance. We experimentally demonstrate such a system and characterize the tradeoffs, which can be done by considering the information required to erase the effects of a measurement.
△ Less
Submitted 19 February, 2024; v1 submitted 12 February, 2024;
originally announced February 2024.
-
Isotropic gap formation, localization, and waveguiding in mesoscale Yukawa-potential amorphous structures
Authors:
Murat Can Sarihan,
Alperen Govdeli,
Zhihao Lan,
Yildirim Batuhan Yilmaz,
Mertcan Erdil,
Yupei Wang,
Mehmet Sirin Aras,
Cenk Yanik,
Nicolae Coriolan Panoiu,
Chee Wei Wong,
Serdar Kocaman
Abstract:
Amorphous photonic structures are mesoscopic optical structures described by electrical permittivity distributions with underlying spatial randomness. They offer a unique platform for studying a broad set of electromagnetic phenomena, including transverse Anderson localization, enhanced wave transport, and suppressed diffusion in random media. Despite this, at a more practical level, there is insu…
▽ More
Amorphous photonic structures are mesoscopic optical structures described by electrical permittivity distributions with underlying spatial randomness. They offer a unique platform for studying a broad set of electromagnetic phenomena, including transverse Anderson localization, enhanced wave transport, and suppressed diffusion in random media. Despite this, at a more practical level, there is insufficient work on both understanding the nature of optical transport and the conditions conducive to vector-wave localization in these planar structures, as well as their potential applications to photonic nanodevices. In this study, we fill this gap by investigating experimentally and theoretically the characteristics of optical transport in a class of amorphous photonic structures and by demonstrating their use to some basic waveguiding nanostructures. We demonstrate that these 2-D structures have unique isotropic and asymmetric band gaps for in-plane propagation, controlled from first principles by varying the scattering strength and whose properties are elucidated by establishing an analogy between photon and carrier transport in amorphous semiconductors. We further observe Urbach band tails in these random structures and uncover their relation to frequency- and disorder-dependent Anderson-like localized modes through the modified Ioffe-Regel criterion and their mean free path - localization length character. Finally, we illustrate that our amorphous structures can serve as a versatile platform in which photonic devices such as disorder-localized waveguides can be readily implemented.
△ Less
Submitted 12 December, 2023;
originally announced December 2023.
-
Generating a 4-photon Tetrahedron State: Towards Simultaneous Super-sensitivity to Non-commuting Rotations
Authors:
Hugo Ferretti,
Y. Batuhan Yilmaz,
Kent Bonsma-Fisher,
Aaron Z. Goldberg,
Noah Lupu-Gladstein,
Arthur O. T. Pang,
Lee A. Rozema,
Aephraim M. Steinberg
Abstract:
It is often thought that the super-sensitivity of a quantum state to an observable comes at the cost of a decreased sensitivity to other non-commuting observables. For example, a squeezed state squeezed in position quadrature is super-sensitive to position displacements, but very insensitive to momentum displacements. This misconception was cleared with the introduction of the compass state, a qua…
▽ More
It is often thought that the super-sensitivity of a quantum state to an observable comes at the cost of a decreased sensitivity to other non-commuting observables. For example, a squeezed state squeezed in position quadrature is super-sensitive to position displacements, but very insensitive to momentum displacements. This misconception was cleared with the introduction of the compass state, a quantum state equally super-sensitive to displacements in position and momentum. When looking at quantum states used to measure spin rotations, N00N states are known to be more advantageous than classical methods as long as they are aligned to the rotation axis. When considering the estimation of a rotation with unknown direction and amplitude, a certain class of states stands out with interesting properties. These states are equally sensitive to rotations around any axis, are second-order unpolarized, and can possess the rotational properties of platonic solids in particular dimensions. Importantly, these states are optimal for simultaneously estimating the three parameters describing a rotation. In the asymptotic limit, estimating all d parameters describing a transformation simultaneously rather than sequentially can lead to a reduction of the appropriately-weighted sum of the measured parameters' variances by a factor of d. We report the experimental creation and characterization of the lowest-dimensional such state, which we call the "tetrahedron state" due to its tetrahedral symmetry. This tetrahedron state is created in the symmetric subspace of four optical photons' polarization in a single spatial and temporal mode, which behaves as a spin-2 particle. While imperfections due to the hardware limit the performance of our method, we argue that better technology can improve our method to the point of outperforming any other existing strategy in per-photon comparisons.
△ Less
Submitted 26 October, 2023;
originally announced October 2023.
-
Building Flexible, Scalable, and Machine Learning-ready Multimodal Oncology Datasets
Authors:
Aakash Tripathi,
Asim Waqas,
Kavya Venkatesan,
Yasin Yilmaz,
Ghulam Rasool
Abstract:
The advancements in data acquisition, storage, and processing techniques have resulted in the rapid growth of heterogeneous medical data. Integrating radiological scans, histopathology images, and molecular information with clinical data is essential for develo** a holistic understanding of the disease and optimizing treatment. The need for integrating data from multiple sources is further prono…
▽ More
The advancements in data acquisition, storage, and processing techniques have resulted in the rapid growth of heterogeneous medical data. Integrating radiological scans, histopathology images, and molecular information with clinical data is essential for develo** a holistic understanding of the disease and optimizing treatment. The need for integrating data from multiple sources is further pronounced in complex diseases such as cancer for enabling precision medicine and personalized treatments. This work proposes Multimodal Integration of Oncology Data System (MINDS) - a flexible, scalable, and cost-effective metadata framework for efficiently fusing disparate data from public sources such as the Cancer Research Data Commons (CRDC) into an interconnected, patient-centric framework. MINDS offers an interface for exploring relationships across data types and building cohorts for develo** large-scale multimodal machine learning models. By harmonizing multimodal data, MINDS aims to potentially empower researchers with greater analytical ability to uncover diagnostic and prognostic insights and enable evidence-based personalized care. MINDS tracks granular end-to-end data provenance, ensuring reproducibility and transparency. The cloud-native architecture of MINDS can handle exponential data growth in a secure, cost-optimized manner while ensuring substantial storage optimization, replication avoidance, and dynamic access capabilities. Auto-scaling, access controls, and other mechanisms guarantee pipelines' scalability and security. MINDS overcomes the limitations of existing biomedical data silos via an interoperable metadata-driven approach that represents a pivotal step toward the future of oncology data integration.
△ Less
Submitted 22 December, 2023; v1 submitted 30 September, 2023;
originally announced October 2023.
-
Deep Learning-based RF Fingerprint Authentication with Chaotic Antenna Arrays
Authors:
Justin McMillen,
Gokhan Mumcu,
Yasin Yilmaz
Abstract:
Radio frequency (RF) fingerprinting is a tool which allows for authentication by utilizing distinct and random distortions in a received signal based on characteristics of the transmitter. We introduce a deep learning-based authentication method for a novel RF fingerprinting system called Physically Unclonable Wireless Systems (PUWS). An element of PUWS is based on the concept of Chaotic Antenna A…
▽ More
Radio frequency (RF) fingerprinting is a tool which allows for authentication by utilizing distinct and random distortions in a received signal based on characteristics of the transmitter. We introduce a deep learning-based authentication method for a novel RF fingerprinting system called Physically Unclonable Wireless Systems (PUWS). An element of PUWS is based on the concept of Chaotic Antenna Arrays (CAAs) that can be cost effectively manufactured by utilizing mask-free laser-enhanced direct print additive manufacturing (LE-DPAM). In our experiments, using simulation data of 300 CAAs each exhibiting 4 antenna elements, we test 3 different convolutional neural network (CNN) architectures under different channel conditions and compare their authentication performance to the current state-of-the-art RF fingerprinting authentication methods.
△ Less
Submitted 13 March, 2023;
originally announced March 2023.
-
Experimental Communication Through Superposition of Quantum Channels
Authors:
Arthur O. T. Pang,
Noah Lupu-Gladstein,
Hugo Ferretti,
Y. Batuhan Yilmaz,
Aharon Brodutch,
Aephraim M. Steinberg
Abstract:
Information capacity enhancement through the coherent control of channels has attracted much attention of late, with work exploring the effect of coherent control of channel causal orders, channel superpositions, and information encoding. Coherently controlling channels necessitates a non-trivial expansion of the channel description, which for superposing qubit channels, is equivalent to expanding…
▽ More
Information capacity enhancement through the coherent control of channels has attracted much attention of late, with work exploring the effect of coherent control of channel causal orders, channel superpositions, and information encoding. Coherently controlling channels necessitates a non-trivial expansion of the channel description, which for superposing qubit channels, is equivalent to expanding the channel to act on qutrits. Here we explore the nature of this capacity enhancement for the superposition of channels by comparing the maximum coherent information through depolarizing qubit channels and relevant superposed and qutrit channels. We show that the expanded qutrit channel description in itself is sufficient to explain the capacity enhancement without any use of superposition.
△ Less
Submitted 25 September, 2023; v1 submitted 28 February, 2023;
originally announced February 2023.
-
RSU-Based Online Intrusion Detection and Mitigation for VANET
Authors:
Ammar Haydari,
Yasin Yilmaz
Abstract:
Secure vehicular communication is a critical factor for secure traffic management. Effective security in intelligent transportation systems (ITS) requires effective and timely intrusion detection systems (IDS). In this paper, we consider false data injection attacks and distributed denial-of-service (DDoS) attacks, especially the stealthy DDoS attacks, targeting the integrity and availability, res…
▽ More
Secure vehicular communication is a critical factor for secure traffic management. Effective security in intelligent transportation systems (ITS) requires effective and timely intrusion detection systems (IDS). In this paper, we consider false data injection attacks and distributed denial-of-service (DDoS) attacks, especially the stealthy DDoS attacks, targeting the integrity and availability, respectively, in vehicular ad-hoc networks (VANET). Novel statistical intrusion detection and mitigation techniques based on centralized communications through roadside units (RSU) are proposed for the considered attacks. The performance of the proposed methods are evaluated using a traffic simulator and a real traffic dataset. Comparisons with the state-of-the-art solutions clearly demonstrate the superior performance of the proposed methods in terms of quick and accurate detection and localization of cyberattacks.
△ Less
Submitted 17 July, 2022;
originally announced July 2022.
-
Adversarial Machine Learning Attacks Against Video Anomaly Detection Systems
Authors:
Furkan Mumcu,
Keval Doshi,
Yasin Yilmaz
Abstract:
Anomaly detection in videos is an important computer vision problem with various applications including automated video surveillance. Although adversarial attacks on image understanding models have been heavily investigated, there is not much work on adversarial machine learning targeting video understanding models and no previous work which focuses on video anomaly detection. To this end, we inve…
▽ More
Anomaly detection in videos is an important computer vision problem with various applications including automated video surveillance. Although adversarial attacks on image understanding models have been heavily investigated, there is not much work on adversarial machine learning targeting video understanding models and no previous work which focuses on video anomaly detection. To this end, we investigate an adversarial machine learning attack against video anomaly detection systems, that can be implemented via an easy-to-perform cyber-attack. Since surveillance cameras are usually connected to the server running the anomaly detection model through a wireless network, they are prone to cyber-attacks targeting the wireless connection. We demonstrate how Wi-Fi deauthentication attack, a notoriously easy-to-perform and effective denial-of-service (DoS) attack, can be utilized to generate adversarial data for video anomaly detection systems. Specifically, we apply several effects caused by the Wi-Fi deauthentication attack on video quality (e.g., slow down, freeze, fast forward, low resolution) to the popular benchmark datasets for video anomaly detection. Our experiments with several state-of-the-art anomaly detection models show that the attackers can significantly undermine the reliability of video anomaly detection systems by causing frequent false alarms and hiding physical anomalies from the surveillance system.
△ Less
Submitted 6 April, 2022;
originally announced April 2022.
-
TiSAT: Time Series Anomaly Transformer
Authors:
Keval Doshi,
Shatha Abudalou,
Yasin Yilmaz
Abstract:
While anomaly detection in time series has been an active area of research for several years, most recent approaches employ an inadequate evaluation criterion leading to an inflated F1 score. We show that a rudimentary Random Guess method can outperform state-of-the-art detectors in terms of this popular but faulty evaluation criterion. In this work, we propose a proper evaluation metric that meas…
▽ More
While anomaly detection in time series has been an active area of research for several years, most recent approaches employ an inadequate evaluation criterion leading to an inflated F1 score. We show that a rudimentary Random Guess method can outperform state-of-the-art detectors in terms of this popular but faulty evaluation criterion. In this work, we propose a proper evaluation metric that measures the timeliness and precision of detecting sequential anomalies. Moreover, most existing approaches are unable to capture temporal features from long sequences. Self-attention based approaches, such as transformers, have been demonstrated to be particularly efficient in capturing long-range dependencies while being computationally efficient during training and inference. We also propose an efficient transformer approach for anomaly detection in time series and extensively evaluate our proposed approach on several popular benchmark datasets.
△ Less
Submitted 10 March, 2022;
originally announced March 2022.
-
End-to-End Semantic Video Transformer for Zero-Shot Action Recognition
Authors:
Keval Doshi,
Yasin Yilmaz
Abstract:
While video action recognition has been an active area of research for several years, zero-shot action recognition has only recently started gaining traction. In this work, we propose a novel end-to-end trained transformer model which is capable of capturing long range spatiotemporal dependencies efficiently, contrary to existing approaches which use 3D-CNNs. Moreover, to address a common ambiguit…
▽ More
While video action recognition has been an active area of research for several years, zero-shot action recognition has only recently started gaining traction. In this work, we propose a novel end-to-end trained transformer model which is capable of capturing long range spatiotemporal dependencies efficiently, contrary to existing approaches which use 3D-CNNs. Moreover, to address a common ambiguity in the existing works about classes that can be considered as previously unseen, we propose a new experimentation setup that satisfies the zero-shot learning premise for action recognition by avoiding overlap between the training and testing classes. The proposed approach significantly outperforms the state of the arts in zero-shot action recognition in terms of the the top-1 accuracy on UCF-101, HMDB-51 and ActivityNet datasets. The code and proposed experimentation setup are available in GitHub: https://github.com/Secure-and-Intelligent-Systems-Lab/SemanticVideoTransformer
△ Less
Submitted 2 December, 2022; v1 submitted 10 March, 2022;
originally announced March 2022.
-
Negative quasiprobabilities enhance phase estimation in quantum-optics experiment
Authors:
Noah B. Lupu-Gladstein,
Batuhan Y. Yilmaz,
David R. M. Arvidsson-Shukur,
Aharon Brodutch,
Arthur O. T. Pang,
Aephraim M. Steinberg,
Nicole Yunger Halpern
Abstract:
Operator noncommutation, a hallmark of quantum theory, limits measurement precision, according to uncertainty principles. Wielded correctly, though, noncommutation can boost precision. A recent foundational result relates a metrological advantage with negative quasiprobabilities -- quantum extensions of probabilities -- engendered by noncommuting operators. We crystallize the relationship in an eq…
▽ More
Operator noncommutation, a hallmark of quantum theory, limits measurement precision, according to uncertainty principles. Wielded correctly, though, noncommutation can boost precision. A recent foundational result relates a metrological advantage with negative quasiprobabilities -- quantum extensions of probabilities -- engendered by noncommuting operators. We crystallize the relationship in an equation that we prove theoretically and observe experimentally. Our proof-of-principle optical experiment features a filtering technique that we term partially postselected amplification (PPA). Using PPA, we measure a waveplate's birefringent phase. PPA amplifies, by over two orders of magnitude, the information obtained about the phase per detected photon. In principle, PPA can boost the information obtained from the average filtered photon by an arbitrarily large factor. The filter's amplification of systematic errors, we find, bounds the theoretically unlimited advantage in practice. PPA can facilitate any phase measurement and mitigates challenges that scale with trial number, such as proportional noise and detector saturation. By quantifying PPA's metrological advantage with quasiprobabilities, we reveal deep connections between quantum foundations and precision measurement.
△ Less
Submitted 7 November, 2021; v1 submitted 1 November, 2021;
originally announced November 2021.
-
Multimodal Data Fusion in High-Dimensional Heterogeneous Datasets via Generative Models
Authors:
Yasin Yilmaz,
Mehmet Aktukmak,
Alfred O. Hero
Abstract:
The commonly used latent space embedding techniques, such as Principal Component Analysis, Factor Analysis, and manifold learning techniques, are typically used for learning effective representations of homogeneous data. However, they do not readily extend to heterogeneous data that are a combination of numerical and categorical variables, e.g., arising from linked GPS and text data. In this paper…
▽ More
The commonly used latent space embedding techniques, such as Principal Component Analysis, Factor Analysis, and manifold learning techniques, are typically used for learning effective representations of homogeneous data. However, they do not readily extend to heterogeneous data that are a combination of numerical and categorical variables, e.g., arising from linked GPS and text data. In this paper, we are interested in learning probabilistic generative models from high-dimensional heterogeneous data in an unsupervised fashion. The learned generative model provides latent unified representations that capture the factors common to the multiple dimensions of the data, and thus enable fusing multimodal data for various machine learning tasks. Following a Bayesian approach, we propose a general framework that combines disparate data types through the natural parameterization of the exponential family of distributions. To scale the model inference to millions of instances with thousands of features, we use the Laplace-Bernstein approximation for posterior computations involving nonlinear link functions. The proposed algorithm is presented in detail for the commonly encountered heterogeneous datasets with real-valued (Gaussian) and categorical (multinomial) features. Experiments on two high-dimensional and heterogeneous datasets (NYC Taxi and MovieLens-10M) demonstrate the scalability and competitive performance of the proposed algorithm on different machine learning tasks such as anomaly detection, data imputation, and recommender systems.
△ Less
Submitted 16 September, 2021; v1 submitted 27 August, 2021;
originally announced August 2021.
-
An Efficient Approach for Anomaly Detection in Traffic Videos
Authors:
Keval Doshi,
Yasin Yilmaz
Abstract:
Due to its relevance in intelligent transportation systems, anomaly detection in traffic videos has recently received much interest. It remains a difficult problem due to a variety of factors influencing the video quality of a real-time traffic feed, such as temperature, perspective, lighting conditions, and so on. Even though state-of-the-art methods perform well on the available benchmark datase…
▽ More
Due to its relevance in intelligent transportation systems, anomaly detection in traffic videos has recently received much interest. It remains a difficult problem due to a variety of factors influencing the video quality of a real-time traffic feed, such as temperature, perspective, lighting conditions, and so on. Even though state-of-the-art methods perform well on the available benchmark datasets, they need a large amount of external training data as well as substantial computational resources. In this paper, we propose an efficient approach for a video anomaly detection system which is capable of running at the edge devices, e.g., on a roadside camera. The proposed approach comprises a pre-processing module that detects changes in the scene and removes the corrupted frames, a two-stage background modelling module and a two-stage object detector. Finally, a backtracking anomaly detection algorithm computes a similarity statistic and decides on the onset time of the anomaly. We also propose a sequential change detection algorithm that can quickly adapt to a new scene and detect changes in the similarity statistic. Experimental results on the Track 4 test set of the 2021 AI City Challenge show the efficacy of the proposed framework as we achieve an F1-score of 0.9157 along with 8.4027 root mean square error (RMSE) and are ranked fourth in the competition.
△ Less
Submitted 20 April, 2021;
originally announced April 2021.
-
A Modular and Unified Framework for Detecting and Localizing Video Anomalies
Authors:
Keval Doshi,
Yasin Yilmaz
Abstract:
Anomaly detection in videos has been attracting an increasing amount of attention. Despite the competitive performance of recent methods on benchmark datasets, they typically lack desirable features such as modularity, cross-domain adaptivity, interpretability, and real-time anomalous event detection. Furthermore, current state-of-the-art approaches are evaluated using the standard instance-based…
▽ More
Anomaly detection in videos has been attracting an increasing amount of attention. Despite the competitive performance of recent methods on benchmark datasets, they typically lack desirable features such as modularity, cross-domain adaptivity, interpretability, and real-time anomalous event detection. Furthermore, current state-of-the-art approaches are evaluated using the standard instance-based detection metric by considering video frames as independent instances, which is not ideal for video anomaly detection. Motivated by these research gaps, we propose a modular and unified approach to the online video anomaly detection and localization problem, called MOVAD, which consists of a novel transfer learning based plug-and-play architecture, a sequential anomaly detector, a mathematical framework for selecting the detection threshold, and a suitable performance metric for real-time anomalous event detection in videos. Extensive performance evaluations on benchmark datasets show that the proposed framework significantly outperforms the current state-of-the-art approaches.
△ Less
Submitted 21 March, 2021;
originally announced March 2021.
-
The effects of charmonium on the properties of the $1^{++}$ hidden charm poles in effective field theory
Authors:
E. Cincioglu,
A. Ozpineci,
D. Yildirim Yilmaz
Abstract:
In this study, the properties of the $J^{PC}=1^{++}$ hidden charm poles are analyzed under the variation of the bare 2P charmonium mass within the effective field theory proposed in Ref.[1]. The main focus of the current work is on the pole trajectory of the $χ_{c1}(2P)$ charmonium dressed by the $D \bar{D}^*$ meson loops. It is shown that the trajectories of the pole change radically for values o…
▽ More
In this study, the properties of the $J^{PC}=1^{++}$ hidden charm poles are analyzed under the variation of the bare 2P charmonium mass within the effective field theory proposed in Ref.[1]. The main focus of the current work is on the pole trajectory of the $χ_{c1}(2P)$ charmonium dressed by the $D \bar{D}^*$ meson loops. It is shown that the trajectories of the pole change radically for values of the bare charmonium mass above a certain value and also depending on how close the pole is to the threshold.
△ Less
Submitted 7 August, 2021; v1 submitted 27 December, 2020;
originally announced December 2020.
-
Road Damage Detection using Deep Ensemble Learning
Authors:
Keval Doshi,
Yasin Yilmaz
Abstract:
Road damage detection is critical for the maintenance of a road, which traditionally has been performed using expensive high-performance sensors. With the recent advances in technology, especially in computer vision, it is now possible to detect and categorize different types of road damages, which can facilitate efficient maintenance and resource management. In this work, we present an ensemble m…
▽ More
Road damage detection is critical for the maintenance of a road, which traditionally has been performed using expensive high-performance sensors. With the recent advances in technology, especially in computer vision, it is now possible to detect and categorize different types of road damages, which can facilitate efficient maintenance and resource management. In this work, we present an ensemble model for efficient detection and classification of road damages, which we have submitted to the IEEE BigData Cup Challenge 2020. Our solution utilizes a state-of-the-art object detector known as You Only Look Once (YOLO-v4), which is trained on images of various types of road damages from Czech, Japan and India. Our ensemble approach was extensively tested with several different model versions and it was able to achieve an F1 score of 0.628 on the test 1 dataset and 0.6358 on the test 2 dataset.
△ Less
Submitted 29 October, 2020;
originally announced November 2020.
-
Deep Reinforcement Learning for Adaptive Network Slicing in 5G for Intelligent Vehicular Systems and Smart Cities
Authors:
Almuthanna Nassar,
Yasin Yilmaz
Abstract:
Intelligent vehicular systems and smart city applications are the fastest growing Internet of things (IoT) implementations at a compound annual growth rate of 30%. In view of the recent advances in IoT devices and the emerging new breed of IoT applications driven by artificial intelligence (AI), fog radio access network (F-RAN) has been recently introduced for the fifth generation (5G) wireless co…
▽ More
Intelligent vehicular systems and smart city applications are the fastest growing Internet of things (IoT) implementations at a compound annual growth rate of 30%. In view of the recent advances in IoT devices and the emerging new breed of IoT applications driven by artificial intelligence (AI), fog radio access network (F-RAN) has been recently introduced for the fifth generation (5G) wireless communications to overcome the latency limitations of cloud-RAN (C-RAN). We consider the network slicing problem of allocating the limited resources at the network edge (fog nodes) to vehicular and smart city users with heterogeneous latency and computing demands in dynamic environments. We develop a network slicing model based on a cluster of fog nodes (FNs) coordinated with an edge controller (EC) to efficiently utilize the limited resources at the network edge. For each service request in a cluster, the EC decides which FN to execute the task, i.e., locally serve the request at the edge, or to reject the task and refer it to the cloud. We formulate the problem as infinite-horizon Markov decision process (MDP) and propose a deep reinforcement learning (DRL) solution to adaptively learn the optimal slicing policy. The performance of the proposed DRL-based slicing method is evaluated by comparing it with other slicing approaches in dynamic environments and for different scenarios of design objectives. Comprehensive simulation results corroborate that the proposed DRL-based EC quickly learns the optimal policy through interaction with the environment, which enables adaptive and automated network slicing for efficient resource allocation in dynamic vehicular and smart city environments.
△ Less
Submitted 19 October, 2020;
originally announced October 2020.
-
Online Anomaly Detection in Surveillance Videos with Asymptotic Bounds on False Alarm Rate
Authors:
Keval Doshi,
Yasin Yilmaz
Abstract:
Anomaly detection in surveillance videos is attracting an increasing amount of attention. Despite the competitive performance of recent methods, they lack theoretical performance analysis, particularly due to the complex deep neural network architectures used in decision making. Additionally, online decision making is an important but mostly neglected factor in this domain. Much of the existing me…
▽ More
Anomaly detection in surveillance videos is attracting an increasing amount of attention. Despite the competitive performance of recent methods, they lack theoretical performance analysis, particularly due to the complex deep neural network architectures used in decision making. Additionally, online decision making is an important but mostly neglected factor in this domain. Much of the existing methods that claim to be online, depend on batch or offline processing in practice. Motivated by these research gaps, we propose an online anomaly detection method in surveillance videos with asymptotic bounds on the false alarm rate, which in turn provides a clear procedure for selecting a proper decision threshold that satisfies the desired false alarm rate. Our proposed algorithm consists of a multi-objective deep learning module along with a statistical anomaly detection module, and its effectiveness is demonstrated on several publicly available data sets where we outperform the state-of-the-art algorithms. All codes are available at https://github.com/kevaldoshi17/Prediction-based-Video-Anomaly-Detection-.
△ Less
Submitted 10 October, 2020;
originally announced October 2020.
-
Fractal Measures of Sea, Lake, Strait, and Dam-Reserve Shores: Calculation, Differentiation, and Interpretation
Authors:
D. Yilmazer,
A. N. Berker,
Y. Yilmaz
Abstract:
The fractal dimensions d_f of the shore lines of the Mediterranean, the Aegean, the Black Sea, the Bosphorus Straits (on both the Asian and European sides), the Van Lake, and the lake formed by the Ataturk Dam have been calculated. Important distinctions have been found and explained.
The fractal dimensions d_f of the shore lines of the Mediterranean, the Aegean, the Black Sea, the Bosphorus Straits (on both the Asian and European sides), the Van Lake, and the lake formed by the Ataturk Dam have been calculated. Important distinctions have been found and explained.
△ Less
Submitted 28 June, 2021; v1 submitted 15 September, 2020;
originally announced September 2020.
-
Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks
Authors:
Keval Doshi,
Yasin Yilmaz,
Suleyman Uludag
Abstract:
Internet of Things (IoT) networks consist of sensors, actuators, mobile and wearable devices that can connect to the Internet. With billions of such devices already in the market which have significant vulnerabilities, there is a dangerous threat to the Internet services and also some cyber-physical systems that are also connected to the Internet. Specifically, due to their existing vulnerabilitie…
▽ More
Internet of Things (IoT) networks consist of sensors, actuators, mobile and wearable devices that can connect to the Internet. With billions of such devices already in the market which have significant vulnerabilities, there is a dangerous threat to the Internet services and also some cyber-physical systems that are also connected to the Internet. Specifically, due to their existing vulnerabilities IoT devices are susceptible to being compromised and being part of a new type of stealthy Distributed Denial of Service (DDoS) attack, called Mongolian DDoS, which is characterized by its widely distributed nature and small attack size from each source. This study proposes a novel anomaly-based Intrusion Detection System (IDS) that is capable of timely detecting and mitigating this emerging type of DDoS attacks. The proposed IDS's capability of detecting and mitigating stealthy DDoS attacks with even very low attack size per source is demonstrated through numerical and testbed experiments.
△ Less
Submitted 14 June, 2020;
originally announced June 2020.
-
Deep Reinforcement Learning for Intelligent Transportation Systems: A Survey
Authors:
Ammar Haydari,
Yasin Yilmaz
Abstract:
Latest technological improvements increased the quality of transportation. New data-driven approaches bring out a new research direction for all control-based systems, e.g., in transportation, robotics, IoT and power systems. Combining data-driven applications with transportation systems plays a key role in recent transportation applications. In this paper, the latest deep reinforcement learning (…
▽ More
Latest technological improvements increased the quality of transportation. New data-driven approaches bring out a new research direction for all control-based systems, e.g., in transportation, robotics, IoT and power systems. Combining data-driven applications with transportation systems plays a key role in recent transportation applications. In this paper, the latest deep reinforcement learning (RL) based traffic control applications are surveyed. Specifically, traffic signal control (TSC) applications based on (deep) RL, which have been studied extensively in the literature, are discussed in detail. Different problem formulations, RL parameters, and simulation environments for TSC are discussed comprehensively. In the literature, there are also several autonomous driving applications studied with deep RL models. Our survey extensively summarizes existing works in this field by categorizing them with respect to application types, control models and studied algorithms. In the end, we discuss the challenges and open questions regarding deep RL-based transportation applications.
△ Less
Submitted 2 May, 2020;
originally announced May 2020.
-
Continual Learning for Anomaly Detection in Surveillance Videos
Authors:
Keval Doshi,
Yasin Yilmaz
Abstract:
Anomaly detection in surveillance videos has been recently gaining attention. A challenging aspect of high-dimensional applications such as video surveillance is continual learning. While current state-of-the-art deep learning approaches perform well on existing public datasets, they fail to work in a continual learning framework due to computational and storage issues. Furthermore, online decisio…
▽ More
Anomaly detection in surveillance videos has been recently gaining attention. A challenging aspect of high-dimensional applications such as video surveillance is continual learning. While current state-of-the-art deep learning approaches perform well on existing public datasets, they fail to work in a continual learning framework due to computational and storage issues. Furthermore, online decision making is an important but mostly neglected factor in this domain. Motivated by these research gaps, we propose an online anomaly detection method for surveillance videos using transfer learning and continual learning, which in turn significantly reduces the training complexity and provides a mechanism for continually learning from recent data without suffering from catastrophic forgetting. Our proposed algorithm leverages the feature extraction power of neural network-based models for transfer learning, and the continual learning capability of statistical detection methods.
△ Less
Submitted 15 April, 2020;
originally announced April 2020.
-
Any-Shot Sequential Anomaly Detection in Surveillance Videos
Authors:
Keval Doshi,
Yasin Yilmaz
Abstract:
Anomaly detection in surveillance videos has been recently gaining attention. Even though the performance of state-of-the-art methods on publicly available data sets has been competitive, they demand a massive amount of training data. Also, they lack a concrete approach for continuously updating the trained model once new data is available. Furthermore, online decision making is an important but m…
▽ More
Anomaly detection in surveillance videos has been recently gaining attention. Even though the performance of state-of-the-art methods on publicly available data sets has been competitive, they demand a massive amount of training data. Also, they lack a concrete approach for continuously updating the trained model once new data is available. Furthermore, online decision making is an important but mostly neglected factor in this domain. Motivated by these research gaps, we propose an online anomaly detection method for surveillance videos using transfer learning and any-shot learning, which in turn significantly reduces the training complexity and provides a mechanism that can detect anomalies using only a few labeled nominal examples. Our proposed algorithm leverages the feature extraction power of neural network-based models for transfer learning and the any-shot learning capability of statistical detection methods.
△ Less
Submitted 4 April, 2020;
originally announced April 2020.
-
Online Multivariate Anomaly Detection and Localization for High-dimensional Settings
Authors:
Mahsa Mozaffari,
Yasin Yilmaz
Abstract:
This paper considers the real-time detection of anomalies in high-dimensional systems. The goal is to detect anomalies quickly and accurately so that the appropriate countermeasures could be taken in time, before the system possibly gets harmed. We propose a sequential and multivariate anomaly detection method that scales well to high-dimensional datasets. The proposed method follows a nonparametr…
▽ More
This paper considers the real-time detection of anomalies in high-dimensional systems. The goal is to detect anomalies quickly and accurately so that the appropriate countermeasures could be taken in time, before the system possibly gets harmed. We propose a sequential and multivariate anomaly detection method that scales well to high-dimensional datasets. The proposed method follows a nonparametric, i.e., data-driven, and semi-supervised approach, i.e., trains only on nominal data. Thus, it is applicable to a wide range of applications and data types. Thanks to its multivariate nature, it can quickly and accurately detect challenging anomalies, such as changes in the correlation structure and stealth low-rate cyberattacks. Its asymptotic optimality and computational complexity are comprehensively analyzed. In conjunction with the detection method, an effective technique for localizing the anomalous data dimensions is also proposed. We further extend the proposed detection and localization methods to a supervised setup where an additional anomaly dataset is available, and combine the proposed semi-supervised and supervised algorithms to obtain an online learning algorithm under the semi-supervised framework. The practical use of proposed algorithms are demonstrated in DDoS attack mitigation, and their performances are evaluated using a real IoT-botnet dataset and simulations.
△ Less
Submitted 14 July, 2020; v1 submitted 16 May, 2019;
originally announced May 2019.
-
The Tracking Machine Learning challenge : Accuracy phase
Authors:
Sabrina Amrouche,
Laurent Basara,
Paolo Calafiura,
Victor Estrade,
Steven Farrell,
Diogo R. Ferreira,
Liam Finnie,
Nicole Finnie,
Cécile Germain,
Vladimir Vava Gligorov,
Tobias Golling,
Sergey Gorbunov,
Heather Gray,
Isabelle Guyon,
Mikhail Hushchyn,
Vincenzo Innocente,
Moritz Kiehn,
Edward Moyse,
Jean-Francois Puget,
Yuval Reina,
David Rousseau,
Andreas Salzburger,
Andrey Ustyuzhanin,
Jean-Roch Vlimant,
Johan Sokrates Wind
, et al. (2 additional authors not shown)
Abstract:
This paper reports the results of an experiment in high energy physics: using the power of the "crowd" to solve difficult experimental problems linked to tracking accurately the trajectory of particles in the Large Hadron Collider (LHC). This experiment took the form of a machine learning challenge organized in 2018: the Tracking Machine Learning Challenge (TrackML). Its results were discussed at…
▽ More
This paper reports the results of an experiment in high energy physics: using the power of the "crowd" to solve difficult experimental problems linked to tracking accurately the trajectory of particles in the Large Hadron Collider (LHC). This experiment took the form of a machine learning challenge organized in 2018: the Tracking Machine Learning Challenge (TrackML). Its results were discussed at the competition session at the Neural Information Processing Systems conference (NeurIPS 2018). Given 100.000 points, the participants had to connect them into about 10.000 arcs of circles, following the trajectory of particles issued from very high energy proton collisions. The competition was difficult with a dozen front-runners well ahead of a pack. The single competition score is shown to be accurate and effective in selecting the best algorithms from the domain point of view. The competition has exposed a diversity of approaches, with various roles for Machine Learning, a number of which are discussed in the document
△ Less
Submitted 3 May, 2021; v1 submitted 14 April, 2019;
originally announced April 2019.
-
High-performance 2D 1xN T-junction Wavelength (De)Multiplexer Systems by Inverse Design
Authors:
Yusuf A. Yilmaz,
Ahmet M. Alpkilic,
Aydan Yeltik,
Hamza Kurt
Abstract:
Previously proposed designs of integrated photonic devices have used the intuitive brute force approach or optimization methods that employ parameter search algorithms. However, a small parameter space and poor exploitation of the underlying physics have limited device performance, functionality, and footprint. In this paper, we propose efficient and compact 2D 1xN in-plane-incidence wavelength de…
▽ More
Previously proposed designs of integrated photonic devices have used the intuitive brute force approach or optimization methods that employ parameter search algorithms. However, a small parameter space and poor exploitation of the underlying physics have limited device performance, functionality, and footprint. In this paper, we propose efficient and compact 2D 1xN in-plane-incidence wavelength demultiplexers by using recently developed objective-first inverse design algorithm. Output ports in the presented 1xN photonic devices are located along the transverse to the input channel. Ultra-high device performance was achieved for the specific designs of 1x2, 1x4, and 1x6 wavelength (de)multiplexers with small footprints 2.80 um x 2.80 um, 2.80 um x 4.60 um, 2.80 um x 6.95 um, respectively. We used two approaches to binarization-level-set and binarization-cost-to obtain silicon wavelength demultiplexer considering fabrication constraints. For instance, the transmission efficiency of binarization-cost 1x2 demultiplexer was -0.30 dB for 1.31 um and -0.54 dB at 1.55 um while crosstalk at the operating wavelengths are negligibly small, i.e., -17.80 and -15.29 dB, respectively. Moreover, for the binarization-cost 1x4 demultiplexer, the transmission efficiency values were approximately -1.90 dB at 1.31, 1.39, 1.47, and 1.55 um as the crosstalk was approximately -13 dB. Furthermore, the objective-first algorithm was used to employ our demultiplexers as multiplexers which means the ports that were once used as inputs in demultiplexers are designed to be used as outputs. The inverse design approach that allows for the implementation of more than six output channels together with the proposed functionalities can help develop compact and manufacturable 2D 1xN couplers.
△ Less
Submitted 27 February, 2019;
originally announced February 2019.
-
Secure Distributed Dynamic State Estimation in Wide-Area Smart Grids
Authors:
Mehmet Necip Kurt,
Yasin Yilmaz,
Xiaodong Wang
Abstract:
Smart grid is a large complex network with a myriad of vulnerabilities, usually operated in adversarial settings and regulated based on estimated system states. In this study, we propose a novel highly secure distributed dynamic state estimation mechanism for wide-area (multi-area) smart grids, composed of geographically separated subregions, each supervised by a local control center. We firstly p…
▽ More
Smart grid is a large complex network with a myriad of vulnerabilities, usually operated in adversarial settings and regulated based on estimated system states. In this study, we propose a novel highly secure distributed dynamic state estimation mechanism for wide-area (multi-area) smart grids, composed of geographically separated subregions, each supervised by a local control center. We firstly propose a distributed state estimator assuming regular system operation, that achieves near-optimal performance based on the local Kalman filters and with the exchange of necessary information between local centers. To enhance the security, we further propose to (i) protect the network database and the network communication channels against attacks and data manipulations via a blockchain (BC)-based system design, where the BC operates on the peer-to-peer network of local centers, (ii) locally detect the measurement anomalies in real-time to eliminate their effects on the state estimation process, and (iii) detect misbehaving (hacked/faulty) local centers in real-time via a distributed trust management scheme over the network. We provide theoretical guarantees regarding the false alarm rates of the proposed detection schemes, where the false alarms can be easily controlled. Numerical studies illustrate that the proposed mechanism offers reliable state estimation under regular system operation, timely and accurate detection of anomalies, and good state recovery performance in case of anomalies.
△ Less
Submitted 14 July, 2019; v1 submitted 19 February, 2019;
originally announced February 2019.
-
Real-Time Nonparametric Anomaly Detection in High-Dimensional Settings
Authors:
Mehmet Necip Kurt,
Yasin Yilmaz,
Xiaodong Wang
Abstract:
Timely detection of abrupt anomalies is crucial for real-time monitoring and security of modern systems producing high-dimensional data. With this goal, we propose effective and scalable algorithms. Proposed algorithms are nonparametric as both the nominal and anomalous multivariate data distributions are assumed unknown. We extract useful univariate summary statistics and perform anomaly detectio…
▽ More
Timely detection of abrupt anomalies is crucial for real-time monitoring and security of modern systems producing high-dimensional data. With this goal, we propose effective and scalable algorithms. Proposed algorithms are nonparametric as both the nominal and anomalous multivariate data distributions are assumed unknown. We extract useful univariate summary statistics and perform anomaly detection in a single-dimensional space. We model anomalies as persistent outliers and propose to detect them via a cumulative sum-like algorithm. In case the observed data have a low intrinsic dimensionality, we learn a submanifold in which the nominal data are embedded and evaluate whether the sequentially acquired data persistently deviate from the nominal submanifold. Further, in the general case, we learn an acceptance region for nominal data via Geometric Entropy Minimization and evaluate whether the sequentially observed data persistently fall outside the acceptance region. We provide an asymptotic lower bound and an asymptotic approximation for the average false alarm period of the proposed algorithm. Moreover, we provide a sufficient condition to asymptotically guarantee that the decision statistic of the proposed algorithm does not diverge in the absence of anomalies. Experiments illustrate the effectiveness of the proposed schemes in quick and accurate anomaly detection in high-dimensional settings.
△ Less
Submitted 27 January, 2020; v1 submitted 14 September, 2018;
originally announced September 2018.
-
Latent heterogeneous multilayer community detection
Authors:
Hafiz Tiomoko Ali,
Sijia Liu,
Yasin Yilmaz,
Romain Couillet,
Indika Rajapakse,
Alfred Hero
Abstract:
We propose a method for simultaneously detecting shared and unshared communities in heterogeneous multilayer weighted and undirected networks. The multilayer network is assumed to follow a generative probabilistic model that takes into account the similarities and dissimilarities between the communities. We make use of a variational Bayes approach for jointly inferring the shared and unshared hidd…
▽ More
We propose a method for simultaneously detecting shared and unshared communities in heterogeneous multilayer weighted and undirected networks. The multilayer network is assumed to follow a generative probabilistic model that takes into account the similarities and dissimilarities between the communities. We make use of a variational Bayes approach for jointly inferring the shared and unshared hidden communities from multilayer network observations. We show that our approach outperforms state-of-the-art algorithms in detecting disparate (shared and private) communities on synthetic data as well as on real genome-wide fibroblast proliferation dataset.
△ Less
Submitted 24 June, 2019; v1 submitted 16 June, 2018;
originally announced June 2018.
-
Reinforcement Learning-based Resource Allocation in Fog RAN for IoT with Heterogeneous Latency Requirements
Authors:
Almuthanna T. Nassar,
Yasin Yilmaz
Abstract:
In light of the quick proliferation of Internet of things (IoT) devices and applications, fog radio access network (Fog-RAN) has been recently proposed for fifth generation (5G) wireless communications to assure the requirements of ultra-reliable low-latency communication (URLLC) for the IoT applications which cannot accommodate large delays. Hence, fog nodes (FNs) are equipped with computing, sig…
▽ More
In light of the quick proliferation of Internet of things (IoT) devices and applications, fog radio access network (Fog-RAN) has been recently proposed for fifth generation (5G) wireless communications to assure the requirements of ultra-reliable low-latency communication (URLLC) for the IoT applications which cannot accommodate large delays. Hence, fog nodes (FNs) are equipped with computing, signal processing and storage capabilities to extend the inherent operations and services of the cloud to the edge. We consider the problem of sequentially allocating the FN's limited resources to the IoT applications of heterogeneous latency requirements. For each access request from an IoT user, the FN needs to decide whether to serve it locally utilizing its own resources or to refer it to the cloud to conserve its valuable resources for future users of potentially higher utility to the system (i.e., lower latency requirement). We formulate the Fog-RAN resource allocation problem in the form of a Markov decision process (MDP), and employ several reinforcement learning (RL) methods, namely Q-learning, SARSA, Expected SARSA, and Monte Carlo, for solving the MDP problem by learning the optimum decision-making policies. We verify the performance and adaptivity of the RL methods and compare it with the performance of a fixed-threshold-based algorithm. Extensive simulation results considering 19 IoT environments of heterogeneous latency requirements corroborate that RL methods always achieve the best possible performance regardless of the IoT environment.
△ Less
Submitted 15 January, 2019; v1 submitted 27 May, 2018;
originally announced June 2018.
-
Homological properties of persistent homology
Authors:
Hanife Varlı,
Yağmur Yılmaz,
Mehmetcik Pamuk
Abstract:
We investigate to what extent persistent homology benefits from the properties of the usual homology theory.
We investigate to what extent persistent homology benefits from the properties of the usual homology theory.
△ Less
Submitted 3 May, 2018;
originally announced May 2018.
-
Anomaly Detection in Partially Observed Traffic Networks
Authors:
Elizabeth Hou,
Yasin Yilmaz,
Alfred Hero
Abstract:
This paper addresses the problem of detecting anomalous activity in traffic networks where the network is not directly observed. Given knowledge of what the node-to-node traffic in a network should be, any activity that differs significantly from this baseline would be considered anomalous. We propose a Bayesian hierarchical model for estimating the traffic rates and detecting anomalous changes in…
▽ More
This paper addresses the problem of detecting anomalous activity in traffic networks where the network is not directly observed. Given knowledge of what the node-to-node traffic in a network should be, any activity that differs significantly from this baseline would be considered anomalous. We propose a Bayesian hierarchical model for estimating the traffic rates and detecting anomalous changes in the network. The probabilistic nature of the model allows us to perform statistical goodness-of-fit tests to detect significant deviations from a baseline network. We show that due to the more defined structure of the hierarchical Bayesian model, such tests perform well even when the empirical models estimated by the EM algorithm are misspecified. We apply our model to both simulated and real datasets to demonstrate its superior performance over existing alternatives.
△ Less
Submitted 16 November, 2018; v1 submitted 24 April, 2018;
originally announced April 2018.
-
Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid
Authors:
Mehmet Necip Kurt,
Yasin Yilmaz,
Xiaodong Wang
Abstract:
For a safe and reliable operation of the smart grid, timely detection of cyber-attacks is of critical importance. Moreover, considering smarter and more capable attackers, robust detection mechanisms are needed against a diverse range of cyber-attacks. With these purposes, we propose a robust online detection algorithm for (possibly combined) false data injection (FDI) and jamming attacks, that al…
▽ More
For a safe and reliable operation of the smart grid, timely detection of cyber-attacks is of critical importance. Moreover, considering smarter and more capable attackers, robust detection mechanisms are needed against a diverse range of cyber-attacks. With these purposes, we propose a robust online detection algorithm for (possibly combined) false data injection (FDI) and jamming attacks, that also provides online estimates of the unknown and time-varying attack parameters and recovered state estimates. Further, considering smarter attackers that are capable of designing stealthy attacks to prevent the detection or to increase the detection delay of the proposed algorithm, we propose additional countermeasures. Numerical studies illustrate the quick and reliable response of the proposed detection mechanisms against hybrid and stealthy cyber-attacks.
△ Less
Submitted 27 June, 2018; v1 submitted 28 February, 2018;
originally announced March 2018.
-
Online Nonparametric Anomaly Detection based on Geometric Entropy Minimization
Authors:
Yasin Yilmaz
Abstract:
We consider the online and nonparametric detection of abrupt and persistent anomalies, such as a change in the regular system dynamics at a time instance due to an anomalous event (e.g., a failure, a malicious activity). Combining the simplicity of the nonparametric Geometric Entropy Minimization (GEM) method with the timely detection capability of the Cumulative Sum (CUSUM) algorithm we propose a…
▽ More
We consider the online and nonparametric detection of abrupt and persistent anomalies, such as a change in the regular system dynamics at a time instance due to an anomalous event (e.g., a failure, a malicious activity). Combining the simplicity of the nonparametric Geometric Entropy Minimization (GEM) method with the timely detection capability of the Cumulative Sum (CUSUM) algorithm we propose a computationally efficient online anomaly detection method that is applicable to high-dimensional datasets, and at the same time achieve a near-optimum average detection delay performance for a given false alarm constraint. We provide new insights to both GEM and CUSUM, including new asymptotic analysis for GEM, which enables soft decisions for outlier detection, and a novel interpretation of CUSUM in terms of the discrepancy theory, which helps us generalize it to the nonparametric GEM statistic. We numerically show, using both simulated and real datasets, that the proposed nonparametric algorithm attains a close performance to the clairvoyant parametric CUSUM test.
△ Less
Submitted 15 May, 2017; v1 submitted 10 April, 2017;
originally announced April 2017.
-
On a Surface Pencil with a Common New Type of Special Suface Curve in Galilean Space G3
Authors:
Zuhal Kucukarslan Yuzbasi,
Munevver Yildirim Yilmaz
Abstract:
In this study, we investigate a new type of a surface curve called a new D-type special curve. Also, we show that this special curve is more generally than a geodesic curve or an asymptotic curve. Then, we give the necessary and sufficient conditions for a curve to be the new D-type special curve using Frenet frame in Galilean space. We investigate some corollaries by taking account of a new D-typ…
▽ More
In this study, we investigate a new type of a surface curve called a new D-type special curve. Also, we show that this special curve is more generally than a geodesic curve or an asymptotic curve. Then, we give the necessary and sufficient conditions for a curve to be the new D-type special curve using Frenet frame in Galilean space. We investigate some corollaries by taking account of a new D-type special curve as a helix, a salkowski and an anti-salkowski. After all, for the sake of visualizing of this study, we plot some examples for this surface pencil (i.e. surface family).
△ Less
Submitted 8 February, 2017; v1 submitted 23 November, 2016;
originally announced December 2016.
-
Online Diversion Detection in Nuclear Fuel Cycles via Multimodal Observations
Authors:
Yasin Yilmaz,
Elizabeth Hou,
Alfred O. Hero
Abstract:
In nuclear fuel cycles, an enrichment facility typically provides low enriched uranium (LEU) to a number of customers. We consider monitoring an enrichment facility to timely detect a possible diversion of highly enriched uranium (HEU). To increase the the detection accuracy it is important to efficiently use the available information diversity. In this work, it is assumed that the shipment times…
▽ More
In nuclear fuel cycles, an enrichment facility typically provides low enriched uranium (LEU) to a number of customers. We consider monitoring an enrichment facility to timely detect a possible diversion of highly enriched uranium (HEU). To increase the the detection accuracy it is important to efficiently use the available information diversity. In this work, it is assumed that the shipment times and the power consumption of the enrichment facility are observed for each shipment of enriched uranium. We propose to initially learn the statistical patterns of the enrichment facility through the bimodal observations in a training period, that is known to be free of diversions. Then, for the goal of timely diversion detection, we propose to use an online detection algorithm which sequentially compares each set of new observations in the test period, which possibly includes diversions, to the learned patterns, and raises a diversion alarm when a significant statistical deviation is detected. The efficacy of the proposed method is shown by comparing its detection performance to those of the traditional detection methods in the Statistics literature.
△ Less
Submitted 15 May, 2016; v1 submitted 1 May, 2016;
originally announced May 2016.
-
Diversion Detection in Partially Observed Nuclear Fuel Cycle Networks
Authors:
Elizabeth Hou,
Yasin Yılmaz,
Alfred O. Hero
Abstract:
A nuclear fuel cycle contains several facilities with different purposes such as mining, conversion, enrichment, and fuel rod fabrication. These facilities form a network, which is naturally sparse in the number of connections (i.e., edges) since not every facility directly interacts with all the others. Given the knowledge of a network baseline, we are interested in detecting anomalous activities…
▽ More
A nuclear fuel cycle contains several facilities with different purposes such as mining, conversion, enrichment, and fuel rod fabrication. These facilities form a network, which is naturally sparse in the number of connections (i.e., edges) since not every facility directly interacts with all the others. Given the knowledge of a network baseline, we are interested in detecting anomalous activities in this network, which may signal the diversion of nuclear materials. Anomalies can take the form of a new or missing edge or abnormal rates of interaction. However, often it is not possible to observe the entire network traffic directly due to some constraints such as cost, physical limitations, or laws. By treating the unobserved network traffic as latent variables, we propose estimators for the true network traffic, including the anomalous activity, to use in testing for significant deviations from the baseline. We provide simulation results of a simple network of facilities and show that our estimators have superior performance over existing alternatives. Additionally, we establish that while a good estimate of the network traffic is necessary, perfect reconstruction is not required to effectively detect anomalous network activity. Instead it suffices to detect perturbations within the network at an aggregate or global scale.
△ Less
Submitted 15 June, 2016; v1 submitted 14 April, 2016;
originally announced April 2016.
-
Multimodal Event Detection in Twitter Hashtag Networks
Authors:
Yasin Yilmaz,
Alfred Hero
Abstract:
Event detection in a multimodal Twitter dataset is considered. We treat the hashtags in the dataset as instances with two modes: text and geolocation features. The text feature consists of a bag-of-words representation. The geolocation feature consists of geotags (i.e., geographical coordinates) of the tweets. Fusing the multimodal data we aim to detect, in terms of topic and geolocation, the inte…
▽ More
Event detection in a multimodal Twitter dataset is considered. We treat the hashtags in the dataset as instances with two modes: text and geolocation features. The text feature consists of a bag-of-words representation. The geolocation feature consists of geotags (i.e., geographical coordinates) of the tweets. Fusing the multimodal data we aim to detect, in terms of topic and geolocation, the interesting events and the associated hashtags. To this end, a generative latent variable model is assumed, and a generalized expectation-maximization (EM) algorithm is derived to learn the model parameters. The proposed method is computationally efficient, and lends itself to big datasets. Experimental results on a Twitter dataset from August 2014 show the efficacy of the proposed method.
△ Less
Submitted 15 May, 2016; v1 submitted 3 January, 2016;
originally announced January 2016.
-
Multimodal Factor Analysis
Authors:
Yasin Yilmaz,
Alfred O. Hero
Abstract:
A multimodal system with Poisson, Gaussian, and multinomial observations is considered. A generative graphical model that combines multiple modalities through common factor loadings is proposed. In this model, latent factors are like summary objects that has latent factor scores in each modality, and the observed objects are represented in terms of such summary objects. This potentially brings abo…
▽ More
A multimodal system with Poisson, Gaussian, and multinomial observations is considered. A generative graphical model that combines multiple modalities through common factor loadings is proposed. In this model, latent factors are like summary objects that has latent factor scores in each modality, and the observed objects are represented in terms of such summary objects. This potentially brings about a significant dimensionality reduction. It also naturally enables a powerful means of clustering based on a diverse set of observations. An expectation-maximization (EM) algorithm to find the model parameters is provided. The algorithm is tested on a Twitter dataset which consists of the counts and geographical coordinates of hashtag occurrences, together with the bag of words for each hashtag. The resultant factors successfully localizes the hashtags in all dimensions: counts, coordinates, topics. The algorithm is also extended to accommodate von Mises-Fisher distribution, which is used to model the spherical coordinates.
△ Less
Submitted 3 August, 2015;
originally announced August 2015.
-
Observation of the rare $B^0_s\toμ^+μ^-$ decay from the combined analysis of CMS and LHCb data
Authors:
The CMS,
LHCb Collaborations,
:,
V. Khachatryan,
A. M. Sirunyan,
A. Tumasyan,
W. Adam,
T. Bergauer,
M. Dragicevic,
J. Erö,
M. Friedl,
R. Frühwirth,
V. M. Ghete,
C. Hartl,
N. Hörmann,
J. Hrubec,
M. Jeitler,
W. Kiesenhofer,
V. Knünz,
M. Krammer,
I. Krätschmer,
D. Liko,
I. Mikulec,
D. Rabady,
B. Rahbaran
, et al. (2807 additional authors not shown)
Abstract:
A joint measurement is presented of the branching fractions $B^0_s\toμ^+μ^-$ and $B^0\toμ^+μ^-$ in proton-proton collisions at the LHC by the CMS and LHCb experiments. The data samples were collected in 2011 at a centre-of-mass energy of 7 TeV, and in 2012 at 8 TeV. The combined analysis produces the first observation of the $B^0_s\toμ^+μ^-$ decay, with a statistical significance exceeding six sta…
▽ More
A joint measurement is presented of the branching fractions $B^0_s\toμ^+μ^-$ and $B^0\toμ^+μ^-$ in proton-proton collisions at the LHC by the CMS and LHCb experiments. The data samples were collected in 2011 at a centre-of-mass energy of 7 TeV, and in 2012 at 8 TeV. The combined analysis produces the first observation of the $B^0_s\toμ^+μ^-$ decay, with a statistical significance exceeding six standard deviations, and the best measurement of its branching fraction so far. Furthermore, evidence for the $B^0\toμ^+μ^-$ decay is obtained with a statistical significance of three standard deviations. The branching fraction measurements are statistically compatible with SM predictions and impose stringent constraints on several theories beyond the SM.
△ Less
Submitted 17 August, 2015; v1 submitted 17 November, 2014;
originally announced November 2014.
-
Sequential Joint Detection and Estimation: Optimum Tests and Applications
Authors:
Yasin Yilmaz,
Shang Li,
Xiaodong Wang
Abstract:
We treat the statistical inference problems in which one needs to detect and estimate simultaneously using as small number of samples as possible. Conventional methods treat the detection and estimation subproblems separately, ignoring the intrinsic coupling between them. However, a joint detection and estimation problem should be solved to maximize the overall performance. We address the sample s…
▽ More
We treat the statistical inference problems in which one needs to detect and estimate simultaneously using as small number of samples as possible. Conventional methods treat the detection and estimation subproblems separately, ignoring the intrinsic coupling between them. However, a joint detection and estimation problem should be solved to maximize the overall performance. We address the sample size concern through a sequential and Bayesian setup. Specifically, we seek the optimum triplet of stop** time, detector, and estimator(s) that minimizes the number of samples subject to a constraint on the combined detection and estimation cost. A general framework for optimum sequential joint detection and estimation is developed. The resulting optimum detector and estimator(s) are strongly coupled with each other, proving that the separate treatment is strictly sub-optimum. The theoretical results derived for a quite general model are then applied to several problems with linear quadratic Gaussian (LQG) models, including dynamic spectrum access in cognitive radio, and state estimation in smart grid with topological uncertainty. Numerical results corroborate the superior overall detection and estimation performance of the proposed schemes over the conventional methods that handle the subproblems separately.
△ Less
Submitted 5 November, 2014;
originally announced November 2014.
-
Variational Inference For Probabilistic Latent Tensor Factorization with KL Divergence
Authors:
Beyza Ermis,
Y. Kenan Yılmaz,
A. Taylan Cemgil,
Evrim Acar
Abstract:
Probabilistic Latent Tensor Factorization (PLTF) is a recently proposed probabilistic framework for modelling multi-way data. Not only the common tensor factorization models but also any arbitrary tensor factorization structure can be realized by the PLTF framework. This paper presents full Bayesian inference via variational Bayes that facilitates more powerful modelling and allows more sophistica…
▽ More
Probabilistic Latent Tensor Factorization (PLTF) is a recently proposed probabilistic framework for modelling multi-way data. Not only the common tensor factorization models but also any arbitrary tensor factorization structure can be realized by the PLTF framework. This paper presents full Bayesian inference via variational Bayes that facilitates more powerful modelling and allows more sophisticated inference on the PLTF framework. We illustrate our approach on model order selection and link prediction.
△ Less
Submitted 29 September, 2014;
originally announced September 2014.
-
Sequential Joint Spectrum Sensing and Channel Estimation for Dynamic Spectrum Access
Authors:
Yasin Yilmaz,
Ziyu Guo,
Xiaodong Wang
Abstract:
Dynamic spectrum access under channel uncertainties is considered. With the goal of maximizing the secondary user (SU) throughput subject to constraints on the primary user (PU) outage probability we formulate a joint problem of spectrum sensing and channel state estimation. The problem is cast into a sequential framework since sensing time minimization is crucial for throughput maximization. In t…
▽ More
Dynamic spectrum access under channel uncertainties is considered. With the goal of maximizing the secondary user (SU) throughput subject to constraints on the primary user (PU) outage probability we formulate a joint problem of spectrum sensing and channel state estimation. The problem is cast into a sequential framework since sensing time minimization is crucial for throughput maximization. In the optimum solution, the sensing decision rule is coupled with the channel estimator, making the separate treatment of the sensing and channel estimation strictly suboptimal. Using such a joint structure for spectrum sensing and channel estimation we propose a distributed (cooperative) dynamic spectrum access scheme under statistical channel state information (CSI). In the proposed scheme, the SUs report their sufficient statistics to a fusion center (FC) via level-triggered sampling, a nonuniform sampling technique that is known to be bandwidth-and-energy efficient. Then, the FC makes a sequential spectrum sensing decision using local statistics and channel estimates, and selects the SU with the best transmission opportunity. The selected SU, using the sensing decision and its channel estimates, computes the transmit power and starts data transmission. Simulation results demonstrate that the proposed scheme significantly outperforms its conventional counterparts, under the same PU outage constraints, in terms of the achievable SU throughput.
△ Less
Submitted 22 January, 2014;
originally announced January 2014.
-
Generalized Beta Divergence
Authors:
Y. Kenan Yilmaz
Abstract:
This paper generalizes beta divergence beyond its classical form associated with power variance functions of Tweedie models. Generalized form is represented by a compact definite integral as a function of variance function of the exponential dispersion model. This compact integral form simplifies derivations of many properties such as scaling, translation and expectation of the beta divergence. Fu…
▽ More
This paper generalizes beta divergence beyond its classical form associated with power variance functions of Tweedie models. Generalized form is represented by a compact definite integral as a function of variance function of the exponential dispersion model. This compact integral form simplifies derivations of many properties such as scaling, translation and expectation of the beta divergence. Further, we show that beta divergence and (half of) the statistical deviance are equivalent measures.
△ Less
Submitted 18 June, 2013; v1 submitted 14 June, 2013;
originally announced June 2013.
-
Sequential Joint Detection and Estimation
Authors:
Yasin Yilmaz,
George V. Moustakides,
Xiaodong Wang
Abstract:
We consider the problem of simultaneous detection and estimation under a sequential framework. In particular we are interested in sequential tests that distinguish between the null and the alternative hypothesis and every time the decision is in favor of the alternative they provide an estimate of a random parameter. As we demonstrate with our analysis treating the two subproblems separately with…
▽ More
We consider the problem of simultaneous detection and estimation under a sequential framework. In particular we are interested in sequential tests that distinguish between the null and the alternative hypothesis and every time the decision is in favor of the alternative they provide an estimate of a random parameter. As we demonstrate with our analysis treating the two subproblems separately with the corresponding optimal strategies does not result in the best possible performance. To enjoy optimality one needs to take into account the optimum estimator during the hypothesis testing phase.
△ Less
Submitted 22 September, 2013; v1 submitted 25 February, 2013;
originally announced February 2013.
-
Sequential Distributed Detection in Energy-Constrained Wireless Sensor Networks
Authors:
Yasin Yilmaz,
Xiaodong Wang
Abstract:
The recently proposed sequential distributed detector based on level-triggered sampling operates as simple as the decision fusion techniques and at the same time performs as well as the data fusion techniques. Hence, it is well suited for resource-constrained wireless sensor networks. However, in practical cases where sensors observe discrete-time signals, the random overshoot above or below the s…
▽ More
The recently proposed sequential distributed detector based on level-triggered sampling operates as simple as the decision fusion techniques and at the same time performs as well as the data fusion techniques. Hence, it is well suited for resource-constrained wireless sensor networks. However, in practical cases where sensors observe discrete-time signals, the random overshoot above or below the sampling thresholds considerably degrades the performance of the considered detector. We propose, for systems with stringent energy constraints, a novel approach to tackle this problem by encoding the overshoot into the time delay between the sampling time and the transmission time. Specifically, each sensor computes the local log-likelihood ratio (LLR) and samples it using level-triggered sampling. Then, it transmits a single pulse to the fusion center (FC) after a transmission delay that is proportional to the overshoot, as in pulse position modulation (PPM). The FC, upon receiving a bit decodes the corresponding overshoot and recovers the transmitted LLR value. It then updates the approximate global LLR and compares it with two threshold to either make a decision or to continue the sequential process. We analyze the asymptotic average detection delay performance of the proposed scheme. We then apply the proposed sequential scheme to target detection in wireless sensor networks under the four Swerling fluctuating target models. It is seen that the proposed sequential distributed detector offers significant performance advantage over conventional decision fusion techniques.
△ Less
Submitted 21 January, 2014; v1 submitted 26 January, 2013;
originally announced January 2013.