-
Unifying Qualitative and Quantitative Safety Verification of DNN-Controlled Systems
Authors:
Dapeng Zhi,
Peixin Wang,
Si Liu,
Luke Ong,
Min Zhang
Abstract:
The rapid advance of deep reinforcement learning techniques enables the oversight of safety-critical systems through the utilization of Deep Neural Networks (DNNs). This underscores the pressing need to promptly establish certified safety guarantees for such DNN-controlled systems. Most of the existing verification approaches rely on qualitative approaches, predominantly employing reachability ana…
▽ More
The rapid advance of deep reinforcement learning techniques enables the oversight of safety-critical systems through the utilization of Deep Neural Networks (DNNs). This underscores the pressing need to promptly establish certified safety guarantees for such DNN-controlled systems. Most of the existing verification approaches rely on qualitative approaches, predominantly employing reachability analysis. However, qualitative verification proves inadequate for DNN-controlled systems as their behaviors exhibit stochastic tendencies when operating in open and adversarial environments. In this paper, we propose a novel framework for unifying both qualitative and quantitative safety verification problems of DNN-controlled systems. This is achieved by formulating the verification tasks as the synthesis of valid neural barrier certificates (NBCs). Initially, the framework seeks to establish almost-sure safety guarantees through qualitative verification. In cases where qualitative verification fails, our quantitative verification method is invoked, yielding precise lower and upper bounds on probabilistic safety across both infinite and finite time horizons. To facilitate the synthesis of NBCs, we introduce their $k$-inductive variants. We also devise a simulation-guided approach for training NBCs, aiming to achieve tightness in computing precise certified lower and upper bounds. We prototype our approach into a tool called $\textsf{UniQQ}$ and showcase its efficacy on four classic DNN-controlled systems.
△ Less
Submitted 2 April, 2024;
originally announced April 2024.
-
Robustness Verification of Deep Reinforcement Learning Based Control Systems using Reward Martingales
Authors:
Dapeng Zhi,
Peixin Wang,
Cheng Chen,
Min Zhang
Abstract:
Deep Reinforcement Learning (DRL) has gained prominence as an effective approach for control systems. However, its practical deployment is impeded by state perturbations that can severely impact system performance. Addressing this critical challenge requires robustness verification about system performance, which involves tackling two quantitative questions: (i) how to establish guaranteed bounds…
▽ More
Deep Reinforcement Learning (DRL) has gained prominence as an effective approach for control systems. However, its practical deployment is impeded by state perturbations that can severely impact system performance. Addressing this critical challenge requires robustness verification about system performance, which involves tackling two quantitative questions: (i) how to establish guaranteed bounds for expected cumulative rewards, and (ii) how to determine tail bounds for cumulative rewards. In this work, we present the first approach for robustness verification of DRL-based control systems by introducing reward martingales, which offer a rigorous mathematical foundation to characterize the impact of state perturbations on system performance in terms of cumulative rewards. Our verified results provide provably quantitative certificates for the two questions. We then show that reward martingales can be implemented and trained via neural networks, against different types of control policies. Experimental results demonstrate that our certified bounds tightly enclose simulation outcomes on various DRL-based control systems, indicating the effectiveness and generality of the proposed approach.
△ Less
Submitted 15 December, 2023;
originally announced December 2023.
-
Genetic InfoMax: Exploring Mutual Information Maximization in High-Dimensional Imaging Genetics Studies
Authors:
Yaochen Xie,
Ziqian Xie,
Sheikh Muhammad Saiful Islam,
Degui Zhi,
Shuiwang Ji
Abstract:
Genome-wide association studies (GWAS) are used to identify relationships between genetic variations and specific traits. When applied to high-dimensional medical imaging data, a key step is to extract lower-dimensional, yet informative representations of the data as traits. Representation learning for imaging genetics is largely under-explored due to the unique challenges posed by GWAS in compari…
▽ More
Genome-wide association studies (GWAS) are used to identify relationships between genetic variations and specific traits. When applied to high-dimensional medical imaging data, a key step is to extract lower-dimensional, yet informative representations of the data as traits. Representation learning for imaging genetics is largely under-explored due to the unique challenges posed by GWAS in comparison to typical visual representation learning. In this study, we tackle this problem from the mutual information (MI) perspective by identifying key limitations of existing methods. We introduce a trans-modal learning framework Genetic InfoMax (GIM), including a regularized MI estimator and a novel genetics-informed transformer to address the specific challenges of GWAS. We evaluate GIM on human brain 3D MRI data and establish standardized evaluation protocols to compare it to existing approaches. Our results demonstrate the effectiveness of GIM and a significantly improved performance on GWAS.
△ Less
Submitted 25 September, 2023;
originally announced September 2023.
-
PheME: A deep ensemble framework for improving phenotype prediction from multi-modal data
Authors:
Shenghan Zhang,
Haoxuan Li,
Ruixiang Tang,
Sirui Ding,
Laila Rasmy,
Degui Zhi,
Na Zou,
Xia Hu
Abstract:
Detailed phenotype information is fundamental to accurate diagnosis and risk estimation of diseases. As a rich source of phenotype information, electronic health records (EHRs) promise to empower diagnostic variant interpretation. However, how to accurately and efficiently extract phenotypes from the heterogeneous EHR data remains a challenge. In this work, we present PheME, an Ensemble framework…
▽ More
Detailed phenotype information is fundamental to accurate diagnosis and risk estimation of diseases. As a rich source of phenotype information, electronic health records (EHRs) promise to empower diagnostic variant interpretation. However, how to accurately and efficiently extract phenotypes from the heterogeneous EHR data remains a challenge. In this work, we present PheME, an Ensemble framework using Multi-modality data of structured EHRs and unstructured clinical notes for accurate Phenotype prediction. Firstly, we employ multiple deep neural networks to learn reliable representations from the sparse structured EHR data and redundant clinical notes. A multi-modal model then aligns multi-modal features onto the same latent space to predict phenotypes. Secondly, we leverage ensemble learning to combine outputs from single-modal models and multi-modal models to improve phenotype predictions. We choose seven diseases to evaluate the phenoty** performance of the proposed framework. Experimental results show that using multi-modal data significantly improves phenotype prediction in all diseases, the proposed ensemble learning framework can further boost the performance.
△ Less
Submitted 26 April, 2023; v1 submitted 19 March, 2023;
originally announced March 2023.
-
Taming Reachability Analysis of DNN-Controlled Systems via Abstraction-Based Training
Authors:
Jiaxu Tian,
Dapeng Zhi,
Si Liu,
Peixin Wang,
Guy Katz,
Min Zhang
Abstract:
The intrinsic complexity of deep neural networks (DNNs) makes it challenging to verify not only the networks themselves but also the hosting DNN-controlled systems. Reachability analysis of these systems faces the same challenge. Existing approaches rely on over-approximating DNNs using simpler polynomial models. However, they suffer from low efficiency and large overestimation, and are restricted…
▽ More
The intrinsic complexity of deep neural networks (DNNs) makes it challenging to verify not only the networks themselves but also the hosting DNN-controlled systems. Reachability analysis of these systems faces the same challenge. Existing approaches rely on over-approximating DNNs using simpler polynomial models. However, they suffer from low efficiency and large overestimation, and are restricted to specific types of DNNs. This paper presents a novel abstraction-based approach to bypass the crux of over-approximating DNNs in reachability analysis. Specifically, we extend conventional DNNs by inserting an additional abstraction layer, which abstracts a real number to an interval for training. The inserted abstraction layer ensures that the values represented by an interval are indistinguishable to the network for both training and decision-making. Leveraging this, we devise the first black-box reachability analysis approach for DNN-controlled systems, where trained DNNs are only queried as black-box oracles for the actions on abstract states. Our approach is sound, tight, efficient, and agnostic to any DNN type and size. The experimental results on a wide range of benchmarks show that the DNNs trained by using our approach exhibit comparable performance, while the reachability analysis of the corresponding systems becomes more amenable with significant tightness and efficiency improvement over the state-of-the-art white-box approaches.
△ Less
Submitted 31 October, 2023; v1 submitted 20 November, 2022;
originally announced November 2022.
-
Simple Recurrent Neural Networks is all we need for clinical events predictions using EHR data
Authors:
Laila Rasmy,
Jie Zhu,
Zhiheng Li,
Xin Hao,
Hong Thoai Tran,
Yujia Zhou,
Firat Tiryaki,
Yang Xiang,
Hua Xu,
Degui Zhi
Abstract:
Recently, there is great interest to investigate the application of deep learning models for the prediction of clinical events using electronic health records (EHR) data. In EHR data, a patient's history is often represented as a sequence of visits, and each visit contains multiple events. As a result, deep learning models developed for sequence modeling, like recurrent neural networks (RNNs) are…
▽ More
Recently, there is great interest to investigate the application of deep learning models for the prediction of clinical events using electronic health records (EHR) data. In EHR data, a patient's history is often represented as a sequence of visits, and each visit contains multiple events. As a result, deep learning models developed for sequence modeling, like recurrent neural networks (RNNs) are common architecture for EHR-based clinical events predictive models. While a large variety of RNN models were proposed in the literature, it is unclear if complex architecture innovations will offer superior predictive performance. In order to move this field forward, a rigorous evaluation of various methods is needed. In this study, we conducted a thorough benchmark of RNN architectures in modeling EHR data. We used two prediction tasks: the risk for develo** heart failure and the risk of early readmission for inpatient hospitalization. We found that simple gated RNN models, including GRUs and LSTMs, often offer competitive results when properly tuned with Bayesian Optimization, which is in line with similar to findings in the natural language processing (NLP) domain. For reproducibility, Our codebase is shared at https://github.com/ZhiGroup/pytorch_ehr.
△ Less
Submitted 3 October, 2021;
originally announced October 2021.
-
A Hybrid Quantum Secret Sharing Scheme based on Mutually Unbiased Bases
Authors:
Dan-Li Zhi,
Zhu-Hui Li,
Li-juan Liu,
Zhao-Wei Han
Abstract:
With the advantages of both classical and quantum secret sharing, many practical hybrid quantum secret sharing have been proposed. In this paper, we propose a hybrid quantum secret sharing scheme based on mutually unbiased bases and monotone span program. First, the dealer sends the shares in the linear secret sharing to the participants in the authorization set via a secure channel. Then, the dea…
▽ More
With the advantages of both classical and quantum secret sharing, many practical hybrid quantum secret sharing have been proposed. In this paper, we propose a hybrid quantum secret sharing scheme based on mutually unbiased bases and monotone span program. First, the dealer sends the shares in the linear secret sharing to the participants in the authorization set via a secure channel. Then, the dealer and participants perform unitary transformation on a d-dimensional quantum state sequentially, and the dealer publishes the measurement result confidentially to the participants in the authorization set to recover the secret. The verifiability of the scheme is guaranteed by the Hash function. Next, the correctness and security of the scheme are proved and our scheme is secure against the general eavesdropper attacks. Finally, a specific example is employed to further clarify the exibility of the scheme and the detailed comparison of similar quantum secret sharing schemes also shows the superiority of our proposed scheme.
△ Less
Submitted 23 June, 2020;
originally announced June 2020.
-
Med-BERT: pre-trained contextualized embeddings on large-scale structured electronic health records for disease prediction
Authors:
Laila Rasmy,
Yang Xiang,
Ziqian Xie,
Cui Tao,
Degui Zhi
Abstract:
Deep learning (DL) based predictive models from electronic health records (EHR) deliver impressive performance in many clinical tasks. Large training cohorts, however, are often required to achieve high accuracy, hindering the adoption of DL-based models in scenarios with limited training data size. Recently, bidirectional encoder representations from transformers (BERT) and related models have ac…
▽ More
Deep learning (DL) based predictive models from electronic health records (EHR) deliver impressive performance in many clinical tasks. Large training cohorts, however, are often required to achieve high accuracy, hindering the adoption of DL-based models in scenarios with limited training data size. Recently, bidirectional encoder representations from transformers (BERT) and related models have achieved tremendous successes in the natural language processing domain. The pre-training of BERT on a very large training corpus generates contextualized embeddings that can boost the performance of models trained on smaller datasets. We propose Med-BERT, which adapts the BERT framework for pre-training contextualized embedding models on structured diagnosis data from 28,490,650 patients EHR dataset. Fine-tuning experiments are conducted on two disease-prediction tasks: (1) prediction of heart failure in patients with diabetes and (2) prediction of pancreatic cancer from two clinical databases. Med-BERT substantially improves prediction accuracy, boosting the area under receiver operating characteristics curve (AUC) by 2.02-7.12%. In particular, pre-trained Med-BERT substantially improves the performance of tasks with very small fine-tuning training sets (300-500 samples) boosting the AUC by more than 20% or equivalent to the AUC of 10 times larger training set. We believe that Med-BERT will benefit disease-prediction studies with small local training datasets, reduce data collection expenses, and accelerate the pace of artificial intelligence aided healthcare.
△ Less
Submitted 22 May, 2020;
originally announced May 2020.
-
A quantum secret sharing scheme with verifiable function
Authors:
Li-Juan Liu,
Zhi-Hui Li,
Zhao-Wei Han,
Dan-Li Zhi
Abstract:
In the $\left( {t,n} \right)$ threshold quantum secret sharing scheme, it is difficult to ensure that internal participants are honest. In this paper, a verifiable $\left( {t,n} \right)$ threshold quantum secret sharing scheme is designed combined with classical secret sharing scheme. First of all, the distributor uses the asymmetric binary polynomials to generate the shares and sends them to each…
▽ More
In the $\left( {t,n} \right)$ threshold quantum secret sharing scheme, it is difficult to ensure that internal participants are honest. In this paper, a verifiable $\left( {t,n} \right)$ threshold quantum secret sharing scheme is designed combined with classical secret sharing scheme. First of all, the distributor uses the asymmetric binary polynomials to generate the shares and sends them to each participant. Secondly, the distributor sends the initial quantum state with the secret to the first participant, and each participant performs unitary operation that using the mutually unbiased bases on the obtained $d$ dimension single bit quantum state ($d$ is a large odd prime number). In this process, distributor can randomly check the participants, and find out the internal fraudsters by unitary inverse operation gradually upward. Then the secret is reconstructed after all other participants simultaneously public transmission. Security analysis show that this scheme can resist both external and internal attacks.
△ Less
Submitted 9 March, 2020;
originally announced March 2020.
-
A Verifiable Quantum Secret Sharing Scheme Based on a Single Qubit
Authors:
Dan-Li Zhi,
Zhi-Hui Li,
Zhao-Wei Han,
Li-Juan Liu
Abstract:
To detect frauds from some internal participants or external attackers, some verifiable threshold quantum secret sharing schemes have been proposed. In this paper, we present a new verifiable threshold structure based on a single qubit using bivariate polynomial. First, Alice chooses an asymmetric bivariate polynomial and sends a pair of values from this polynomial to each participant. Then Alice…
▽ More
To detect frauds from some internal participants or external attackers, some verifiable threshold quantum secret sharing schemes have been proposed. In this paper, we present a new verifiable threshold structure based on a single qubit using bivariate polynomial. First, Alice chooses an asymmetric bivariate polynomial and sends a pair of values from this polynomial to each participant. Then Alice and participants implement in sequence unitary transformation on the $d$-dimensional quantum state based on unbiased bases, where those unitary transformations are contacted by this polynomial. Finally, security analysis shows that the proposed scheme can detect the fraud from external and internal attacks compared with the exiting schemes and is comparable to the recent schemes.
△ Less
Submitted 9 March, 2020;
originally announced March 2020.
-
Active Object Manipulation Facilitates Visual Object Learning: An Egocentric Vision Study
Authors:
Satoshi Tsutsui,
Dian Zhi,
Md Alimoor Reza,
David Crandall,
Chen Yu
Abstract:
Inspired by the remarkable ability of the infant visual learning system, a recent study collected first-person images from children to analyze the `training data' that they receive. We conduct a follow-up study that investigates two additional directions. First, given that infants can quickly learn to recognize a new object without much supervision (i.e. few-shot learning), we limit the number of…
▽ More
Inspired by the remarkable ability of the infant visual learning system, a recent study collected first-person images from children to analyze the `training data' that they receive. We conduct a follow-up study that investigates two additional directions. First, given that infants can quickly learn to recognize a new object without much supervision (i.e. few-shot learning), we limit the number of training images. Second, we investigate how children control the supervision signals they receive during learning based on hand manipulation of objects. Our experimental results suggest that supervision with hand manipulation is better than without hands, and the trend is consistent even when a small number of images is available.
△ Less
Submitted 4 June, 2019;
originally announced June 2019.
-
Deep learning-based phase control method for coherent beam combining and its application in generating orbital angular momentum beams
Authors:
Tianyue Hou,
Yi An,
Qi Chang,
Pengfei Ma,
Jun Li,
Liang** Huang,
Dong Zhi,
Jian Wu,
Rongtao Su,
Yanxing Ma,
Pu Zhou
Abstract:
We incorporate deep learning (DL) into coherent beam combining (CBC) systems for the first time, to the best of our knowledge. Using a well-trained convolutional neural network DL model, the phase error in CBC systems could be accurately estimated and preliminarily compensated. Then, the residual phase error is further compensated by stochastic parallel gradient descent (SPGD) algorithms. The two-…
▽ More
We incorporate deep learning (DL) into coherent beam combining (CBC) systems for the first time, to the best of our knowledge. Using a well-trained convolutional neural network DL model, the phase error in CBC systems could be accurately estimated and preliminarily compensated. Then, the residual phase error is further compensated by stochastic parallel gradient descent (SPGD) algorithms. The two-stage phase control strategy combined with DL and SPGD algorithms is validated to be a feasible and promising technique to alleviate the long-standing problem that the phase control bandwidth decreases as the number of array elements expands. Further investigation denotes that the proposed phase control technique could be employed to generate orbital angular momentum (OAM) beams with different orders by distinguishing the OAM beams of conjugated phase distributions.
△ Less
Submitted 10 March, 2019;
originally announced March 2019.
-
High power orbital-angular-momentum beam generation system based on coherent beam array combination technique
Authors:
Dong Zhi,
Yanxing Ma,
Pu Zhou,
Rumao Tao,
Xiaolin Wang,
Lei Si,
Ze** Liu
Abstract:
High power orbital-angular-momentum (OAM) beam has dominant advantages in capacity increasing and data receiving for free-space optical communication systems at long distance. Utilizing coherent combination of beam array technique and helical phase approximation by piston-phase-array, we have proposed a generation system of high power novel beam carrying OAM, which could overcome power limitation…
▽ More
High power orbital-angular-momentum (OAM) beam has dominant advantages in capacity increasing and data receiving for free-space optical communication systems at long distance. Utilizing coherent combination of beam array technique and helical phase approximation by piston-phase-array, we have proposed a generation system of high power novel beam carrying OAM, which could overcome power limitation of common vortex phase modulator and single beam. We have experimentally implemented a high power OAM beam by coherent beam combination (CBC) of a six-element hexagonal fiber amplifier array. We show that the CBC technique utilized to control the piston phase differences among the array beams has a high accuracy with residual phase errors superior to λ/30. On the premise of CBC, we have obtained novel vortex beams carrying OAM of +/- 1 by applying an additional piston-phase-array modulation on the corresponding beam array. The experimental results approximately coincide with the theoretical analysis. This work could be beneficial to the areas that need high power OAM beams, like ultra-distance free-space optical communications, biomedical treatments, powerful trap** and manipulation under deep potential well.
△ Less
Submitted 4 November, 2017;
originally announced November 2017.
-
Self-referenced coherent diffraction x-ray movie of Angstrom- and femtosecond-scale atomic motion
Authors:
J. M. Glownia,
A. Natan,
J. P. Cryan,
R. Hartsock,
M. Kozina,
M. P. Minitti,
S. Nelson,
J. Robinson,
T. Sato,
T. van Driel,
G. Welch,
C. Weninger,
D. Zhi,
P. H. Bucksbaum
Abstract:
Time-resolved femtosecond x-ray diffraction patterns from laser-excited molecular iodine are used to create a movie of intramolecular motion with time and space resolution of $30~$fs and $0.3$ Å. The high spatial fidelity is due to interference between the moving excitation and the static initial charge distribution. This x-ray interference has not been employed to image internal motion in molecul…
▽ More
Time-resolved femtosecond x-ray diffraction patterns from laser-excited molecular iodine are used to create a movie of intramolecular motion with time and space resolution of $30~$fs and $0.3$ Å. The high spatial fidelity is due to interference between the moving excitation and the static initial charge distribution. This x-ray interference has not been employed to image internal motion in molecules before. The initial state is used as the local oscillator for heterodyne amplification of the excited charge distribution to retrieve real-space movies of atomic motion on Ångstrom and femtosecond scales. Coherent vibrational motion and dispersion, dissociation, and rotational dephasing are all clearly visible in the data, thereby demonstrating the stunning sensitivity of heterodyne methods.
△ Less
Submitted 31 August, 2016; v1 submitted 10 August, 2016;
originally announced August 2016.
-
Influence of seed power on mode instabilities in high power fiber amplifiers
Authors:
Rumao Tao,
Xiaolin Wang,
Pu Zhou,
Dong Zhi,
Lei Si,
Ze** Liu
Abstract:
We use a semi-analytical model of stimulated thermal Rayleigh scattering to present theoretical study of seed power on mode instability with the presence of photodarkening. The behavior of mode instabilities as a function of seed power has been investigated. The nonlinear dependence of the threshold with lower seed powers is ascribed to the influence of gain saturation while the reduction behavior…
▽ More
We use a semi-analytical model of stimulated thermal Rayleigh scattering to present theoretical study of seed power on mode instability with the presence of photodarkening. The behavior of mode instabilities as a function of seed power has been investigated. The nonlinear dependence of the threshold with lower seed powers is ascribed to the influence of gain saturation while the reduction behavior of the threshold with higher seed powers is put down to the effects of photodarkening, which agrees well with the experimental results.
△ Less
Submitted 25 January, 2016;
originally announced January 2016.