Skip to main content

Showing 1–11 of 11 results for author: Albert, K

Searching in archive cs. Search in all archives.
.
  1. Label Propagation Techniques for Artifact Detection in Imbalanced Classes using Photoplethysmogram Signals

    Authors: Clara Macabiau, Thanh-Dung Le, Kevin Albert, Mana Shahriari, Philippe Jouvet, Rita Noumeir

    Abstract: This study aimed to investigate the application of label propagation techniques to propagate labels among photoplethysmogram (PPG) signals, particularly in imbalanced class scenarios and limited data availability scenarios, where clean PPG samples are significantly outnumbered by artifact-contaminated samples. We investigated a dataset comprising PPG recordings from 1571 patients, wherein approxim… ▽ More

    Submitted 23 May, 2024; v1 submitted 16 August, 2023; originally announced August 2023.

    Comments: Under preparation to submit to IEEE for possible publications

    MSC Class: 68T02

    Journal ref: IEEE Access, 12 (2024), pp. 81221-81235

  2. Sex Trouble: Common pitfalls in incorporating sex/gender in medical machine learning and how to avoid them

    Authors: Kendra Albert, Maggie Delano

    Abstract: False assumptions about sex and gender are deeply embedded in the medical system, including that they are binary, static, and concordant. Machine learning researchers must understand the nature of these assumptions in order to avoid perpetuating them. In this perspectives piece, we identify three common mistakes that researchers make when dealing with sex/gender data: "sex confusion", the failure… ▽ More

    Submitted 15 March, 2022; originally announced March 2022.

    Comments: submitted to Cell Patterns as a perspective article

  3. arXiv:2107.10302  [pdf, other

    cs.CR cs.CY cs.LG

    Adversarial for Good? How the Adversarial ML Community's Values Impede Socially Beneficial Uses of Attacks

    Authors: Kendra Albert, Maggie Delano, Bogdan Kulynych, Ram Shankar Siva Kumar

    Abstract: Attacks from adversarial machine learning (ML) have the potential to be used "for good": they can be used to run counter to the existing power structures within ML, creating breathing space for those who would otherwise be the targets of surveillance and control. But most research on adversarial ML has not engaged in develo** tools for resistance against ML systems. Why? In this paper, we review… ▽ More

    Submitted 15 September, 2021; v1 submitted 11 July, 2021; originally announced July 2021.

    Comments: Author list is ordered alphabetically as there is equal contribution. 4 pages Accepted by the ICML 2021 workshop on "A Blessing in Disguise:The Prospects and Perils of Adversarial Machine Learning"

  4. "This Whole Thing Smacks of Gender": Algorithmic Exclusion in Bioimpedance-based Body Composition Analysis

    Authors: Kendra Albert, Maggie Delano

    Abstract: Smart weight scales offer bioimpedance-based body composition analysis as a supplement to pure body weight measurement. Companies such as Withings and Fitbit tout composition analysis as providing self-knowledge and the ability to make more informed decisions. However, these aspirational statements elide the reality that these numbers are a product of proprietary regression equations that require… ▽ More

    Submitted 25 January, 2021; v1 submitted 20 January, 2021; originally announced January 2021.

    Comments: Accepted at FAccT 2021. Both authors contributed equally to the work. v2: added citations, v3: fixed typo, minor formatting issues

  5. arXiv:2012.02048  [pdf, ps, other

    cs.CY

    Ethical Testing in the Real World: Evaluating Physical Testing of Adversarial Machine Learning

    Authors: Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Rigot, Ram Shankar Siva Kumar

    Abstract: This paper critically assesses the adequacy and representativeness of physical domain testing for various adversarial machine learning (ML) attacks against computer vision systems involving human subjects. Many papers that deploy such attacks characterize themselves as "real world." Despite this framing, however, we found the physical or real-world testing conducted was minimal, provided few detai… ▽ More

    Submitted 3 December, 2020; originally announced December 2020.

    Comments: Accepted to NeurIPS 2020 Workshop on Dataset Curation and Security; Also accepted at Navigating the Broader Impacts of AI Research Workshop. All authors contributed equally. The list of authors is arranged alphabetically

  6. arXiv:2006.16179  [pdf

    cs.CY cs.CR cs.LG

    Legal Risks of Adversarial Machine Learning Research

    Authors: Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert

    Abstract: Adversarial Machine Learning is booming with ML researchers increasingly targeting commercial ML systems such as those used in Facebook, Tesla, Microsoft, IBM, Google to demonstrate vulnerabilities. In this paper, we ask, "What are the potential legal risks to adversarial ML researchers when they attack ML systems?" Studying or testing the security of any operational system potentially runs afoul… ▽ More

    Submitted 29 June, 2020; originally announced June 2020.

    Comments: Accepted at ICML 2020 Workshop on Law & Machine Learning

  7. arXiv:2002.05648  [pdf, ps, other

    cs.CY cs.CR cs.LG stat.ML

    Politics of Adversarial Machine Learning

    Authors: Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar

    Abstract: In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights… ▽ More

    Submitted 26 April, 2020; v1 submitted 31 January, 2020; originally announced February 2020.

    Comments: Authors ordered alphabetically; 4 pages

  8. arXiv:1911.11034  [pdf

    cs.LG cs.CR stat.ML

    Failure Modes in Machine Learning Systems

    Authors: Ram Shankar Siva Kumar, David O Brien, Kendra Albert, Salomé Viljöen, Jeffrey Snover

    Abstract: In the last two years, more than 200 papers have been written on how machine learning (ML) systems can fail because of adversarial attacks on the algorithms and data; this number balloons if we were to incorporate papers covering non-adversarial failure modes. The spate of papers has made it difficult for ML practitioners, let alone engineers, lawyers, and policymakers, to keep up with the attacks… ▽ More

    Submitted 25 November, 2019; originally announced November 2019.

    Comments: 12 pages

  9. arXiv:1811.12819  [pdf, other

    eess.SY cs.RO

    Structure-Preserving Constrained Optimal Trajectory Planning of a Wheeled Inverted Pendulum

    Authors: Klaus Albert, Karmvir Singh Phogat, Felix Anhalt, Ravi N Banavar, Debasish Chatterjee, Boris Lohmann

    Abstract: The Wheeled Inverted Pendulum (WIP) is an underactuated, nonholonomic mechatronic system, and has been popularized commercially as the Segway. Designing a control law for motion planning, that incorporates the state and control constraints, while respecting the configuration manifold, is a challenging problem. In this article we derive a discrete-time model of the WIP system using discrete mechani… ▽ More

    Submitted 2 October, 2019; v1 submitted 29 November, 2018; originally announced November 2018.

    Comments: 12 pages, 8 figures, 1 table. arXiv admin note: text overlap with arXiv:1710.10932

  10. arXiv:1810.10731  [pdf, ps, other

    cs.LG cs.CR cs.CY stat.ML

    Law and Adversarial Machine Learning

    Authors: Ram Shankar Siva Kumar, David R. O'Brien, Kendra Albert, Salome Vilojen

    Abstract: When machine learning systems fail because of adversarial manipulation, how should society expect the law to respond? Through scenarios grounded in adversarial ML literature, we explore how some aspects of computer crime, copyright, and tort law interface with perturbation, poisoning, model stealing and model inversion attacks to show how some attacks are more likely to result in liability than ot… ▽ More

    Submitted 4 December, 2018; v1 submitted 25 October, 2018; originally announced October 2018.

    Comments: Minor edits. Corrected typos, Added references. 4 pages, submitted to NIPS 2018 Workshop on Security in Machine Learning

  11. arXiv:1603.03149  [pdf

    cs.NE

    Real time error detection in metal arc welding process using Artificial Neural Netwroks

    Authors: Prashant Sharma, Shaju K. Albert, S. Rajeswari

    Abstract: Quality assurance in production line demands reliable weld joints. Human made errors is a major cause of faulty production. Promptly Identifying errors in the weld while welding is in progress will decrease the post inspection cost spent on the welding process. Electrical parameters generated during welding, could able to characterize the process efficiently. Parameter values are collected using h… ▽ More

    Submitted 10 March, 2016; originally announced March 2016.