-
Neural Networks with (Low-Precision) Polynomial Approximations: New Insights and Techniques for Accuracy Improvement
Authors:
Chi Zhang,
**g**g Fan,
Man Ho Au,
Siu Ming Yiu
Abstract:
Replacing non-polynomial functions (e.g., non-linear activation functions such as ReLU) in a neural network with their polynomial approximations is a standard practice in privacy-preserving machine learning. The resulting neural network, called polynomial approximation of neural network (PANN) in this paper, is compatible with advanced cryptosystems to enable privacy-preserving model inference. Us…
▽ More
Replacing non-polynomial functions (e.g., non-linear activation functions such as ReLU) in a neural network with their polynomial approximations is a standard practice in privacy-preserving machine learning. The resulting neural network, called polynomial approximation of neural network (PANN) in this paper, is compatible with advanced cryptosystems to enable privacy-preserving model inference. Using ``highly precise'' approximation, state-of-the-art PANN offers similar inference accuracy as the underlying backbone model. However, little is known about the effect of approximation, and existing literature often determined the required approximation precision empirically. In this paper, we initiate the investigation of PANN as a standalone object. Specifically, our contribution is two-fold. Firstly, we provide an explanation on the effect of approximate error in PANN. In particular, we discovered that (1) PANN is susceptible to some type of perturbations; and (2) weight regularisation significantly reduces PANN's accuracy. We support our explanation with experiments. Secondly, based on the insights from our investigations, we propose solutions to increase inference accuracy for PANN. Experiments showed that combination of our solutions is very effective: at the same precision, our PANN is 10% to 50% more accurate than state-of-the-arts; and at the same accuracy, our PANN only requires a precision of 2^{-9} while state-of-the-art solution requires a precision of 2^{-12} using the ResNet-20 model on CIFAR-10 dataset.
△ Less
Submitted 7 June, 2024; v1 submitted 17 February, 2024;
originally announced February 2024.
-
Reinforcement Learning-based Relay Selection for Cooperative WSNs in the Presence of Bursty Impulsive Noise
Authors:
Hazem Barka,
Md Sahabul Alam,
Georges Kaddoum,
Minh Au,
Basile L. Agba
Abstract:
The problem of relay selection is pivotal in the realm of cooperative communication. However, this issue has not been thoroughly examined, particularly when the background noise is assumed to possess an impulsive characteristic with consistent memory as observed in smart grid communications and some other wireless communication scenarios. In this paper, we investigate the impact of this specific t…
▽ More
The problem of relay selection is pivotal in the realm of cooperative communication. However, this issue has not been thoroughly examined, particularly when the background noise is assumed to possess an impulsive characteristic with consistent memory as observed in smart grid communications and some other wireless communication scenarios. In this paper, we investigate the impact of this specific type of noise on the performance of cooperative Wireless Sensor Networks (WSNs) with the Decode and Forward (DF) relaying scheme, considering Symbol-Error-Rate (SER) and battery power consumption fairness across all nodes as the performance metrics. We introduce two innovative relay selection methods that depend on noise state detection and the residual battery power of each relay. The first method encompasses the adaptation of the Max-Min criterion to this specific context, whereas the second employs Reinforcement Learning (RL) to surmount this challenge. Our empirical outcomes demonstrate that the impacts of bursty impulsive noise on the SER performance can be effectively mitigated and that a balance in battery power consumption among all nodes can be established using the proposed methods.
△ Less
Submitted 26 January, 2024;
originally announced January 2024.
-
Digital Twinning in Smart Grid Networks: Interplay, Resource Allocation and Use Cases
Authors:
Abdullah Othman,
Georges Kaddoum,
Joao V. C. Evangelista,
Minh Au,
Basile L. Agba
Abstract:
Motivated by climate change, increasing industrialization and energy reliability concerns, the smart grid is set to revolutionize traditional power systems. Moreover, the exponential annual rise in number of grid-connected users and emerging key players e.g. electric vehicles strain the limited radio resources, which stresses the need for novel and scalable resource management techniques. Digital…
▽ More
Motivated by climate change, increasing industrialization and energy reliability concerns, the smart grid is set to revolutionize traditional power systems. Moreover, the exponential annual rise in number of grid-connected users and emerging key players e.g. electric vehicles strain the limited radio resources, which stresses the need for novel and scalable resource management techniques. Digital twin is a cutting-edge virtualization technology that has shown great potential by offering solutions for inherent bottlenecks in traditional wireless networks. In this article, we set the stage for various roles digital twinning can fulfill by optimizing congested radio resources in a proactive and resilient smart grid. Digital twins can help smart grid networks through real-time monitoring, advanced precise modeling and efficient radio resource allocation for normal operations and service restoration following unexpected events. However, reliable real-time communications, intricate abstraction abilities, interoperability with other smart grid technologies, robust computing capabilities and resilient security schemes are some open challenges for future work on digital twins.
△ Less
Submitted 26 June, 2023;
originally announced July 2023.
-
Stateful Switch: Optimized Time Series Release with Local Differential Privacy
Authors:
Qingqing Ye,
Haibo Hu,
Kai Huang,
Man Ho Au,
Qiao Xue
Abstract:
Time series data have numerous applications in big data analytics. However, they often cause privacy issues when collected from individuals. To address this problem, most existing works perturb the values in the time series while retaining their temporal order, which may lead to significant distortion of the values. Recently, we propose TLDP model that perturbs temporal perturbation to ensure priv…
▽ More
Time series data have numerous applications in big data analytics. However, they often cause privacy issues when collected from individuals. To address this problem, most existing works perturb the values in the time series while retaining their temporal order, which may lead to significant distortion of the values. Recently, we propose TLDP model that perturbs temporal perturbation to ensure privacy guarantee while retaining original values. It has shown great promise to achieve significantly higher utility than value perturbation mechanisms in many time series analysis. However, its practicability is still undermined by two factors, namely, utility cost of extra missing or empty values, and inflexibility of privacy budget settings. To address them, in this paper we propose {\it switch} as a new two-way operation for temporal perturbation, as opposed to the one-way {\it dispatch} operation. The former inherently eliminates the cost of missing, empty or repeated values. Optimizing switch operation in a {\it stateful} manner, we then propose $StaSwitch$ mechanism for time series release under TLDP. Through both analytical and empirical studies, we show that $StaSwitch$ has significantly higher utility for the published time series than any state-of-the-art temporal- or value-perturbation mechanism, while allowing any combination of privacy budget settings.
△ Less
Submitted 16 December, 2022;
originally announced December 2022.
-
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage
Authors:
Yuefeng Du,
Huayi Duan,
Anxin Zhou,
Cong Wang,
Man Ho Au,
Qian Wang
Abstract:
How to audit outsourced data in centralized storage like cloud is well-studied, but it is largely under-explored for the rising decentralized storage network (DSN) that bodes well for a billion-dollar market. To realize DSN as a usable service in a truly decentralized manner, the blockchain comes in handy -- to record and verify audit trails in forms of proof of storage, and based on that, to hand…
▽ More
How to audit outsourced data in centralized storage like cloud is well-studied, but it is largely under-explored for the rising decentralized storage network (DSN) that bodes well for a billion-dollar market. To realize DSN as a usable service in a truly decentralized manner, the blockchain comes in handy -- to record and verify audit trails in forms of proof of storage, and based on that, to handle fair payments with necessary dispute resolution.
Leaving the audit trails on the blockchain offers transparency and fairness, yet it 1) sacrifices privacy, as they may leak information about the data under audit, and 2) overwhelms on-chain resources, as they may be practically large in size and expensive to verify. Prior auditing designs in centralized settings are not directly applicable here. A handful of proposals targeting DSN cannot satisfactorily address these issues either.
We present an auditing solution that addresses on-chain privacy and efficiency, from a synergy of homomorphic linear authenticators with polynomial commitments for succinct proofs, and the sigma protocol for provable privacy. The solution results in, per audit, 288-byte proof written to the blockchain, and constant verification cost. It can sustain long-term operation and easily scale to thousands of users on Ethereum.
△ Less
Submitted 6 August, 2020; v1 submitted 11 May, 2020;
originally announced May 2020.
-
Matrix Bloom Filter: An Efficient Probabilistic Data Structure for 2-tuple Batch Lookup
Authors:
Yue Fu,
Rong Du,
Haibo Hu,
Man Ho Au,
Dagang Li
Abstract:
With the growing scale of big data, probabilistic structures receive increasing popularity for efficient approximate storage and query processing. For example, Bloom filters (BF) can achieve satisfactory performance for approximate membership existence query at the expense of false positives. However, a standard Bloom filter can only handle univariate data and single membership existence query, wh…
▽ More
With the growing scale of big data, probabilistic structures receive increasing popularity for efficient approximate storage and query processing. For example, Bloom filters (BF) can achieve satisfactory performance for approximate membership existence query at the expense of false positives. However, a standard Bloom filter can only handle univariate data and single membership existence query, which is insufficient for OLAP and machine learning applications. In this paper, we focus on a common multivariate data type, namely, 2-tuples, or equivalently, key-value pairs. We design the matrix Bloom filter as a high-dimensional extension of the standard Bloom filter. This new probabilistic data structure can not only insert and lookup a single 2-tuple efficiently, but also support these operations efficiently in batches --- a key requirement for OLAP and machine learning tasks. To further balance the insertion and query efficiency for different workload patterns, we propose two variants, namely, the maximum adaptive matrix BF and minimum storage matrix BF. Through both theoretical and empirical studies, we show the performance of matrix Bloom filter is superior on datasets with common statistical distributions; and even without them, it just degrades to a standard Bloom filter.
△ Less
Submitted 15 December, 2019;
originally announced December 2019.
-
Early Detection for Optimal-Latency Communications in Multi-Hop Links
Authors:
Diego Barragán Guerrero,
Minh Au,
Ghyslain Gagnon,
François Gagnon,
Pascal Giard
Abstract:
Modern wireless machine-to-machine-type communications aim to provide both ultra reliability and low latency, stringent requirements that appear to be mutually exclusive. From the noisy channel coding theorem, we know that reliable communications mandate transmission rates that are lower than the channel capacity. To guarantee arbitrarily-low error probability, this implies the use of messages who…
▽ More
Modern wireless machine-to-machine-type communications aim to provide both ultra reliability and low latency, stringent requirements that appear to be mutually exclusive. From the noisy channel coding theorem, we know that reliable communications mandate transmission rates that are lower than the channel capacity. To guarantee arbitrarily-low error probability, this implies the use of messages whose lengths tend to infinity. However, long messages are not suitable for low-latency communications. In this paper, we propose an early-detection scheme for wireless communications under a finite-blocklength regime that employs a sequential-test technique to reduce latency while maintaining reliability. We prove that our scheme leads to an average detection time smaller than the symbol duration. Furthermore, in multi-hop low-traffic or continuous-transmission links, we show that our scheme can reliably detect symbols before the end of their transmission, significantly reducing the latency, while kee** the error probability below a predefined threshold.
△ Less
Submitted 8 July, 2019; v1 submitted 4 July, 2019;
originally announced July 2019.
-
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks
Authors:
Ting Chen,
Xiaoqi Li,
Ying Wang,
Jiachi Chen,
Zihao Li,
Xiapu Luo,
Man Ho Au,
Xiaosong Zhang
Abstract:
The gas mechanism in Ethereum charges the execution of every operation to ensure that smart contracts running in EVM (Ethereum Virtual Machine) will be eventually terminated. Failing to properly set the gas costs of EVM operations allows attackers to launch DoS attacks on Ethereum. Although Ethereum recently adjusted the gas costs of EVM operations to defend against known DoS attacks, it remains u…
▽ More
The gas mechanism in Ethereum charges the execution of every operation to ensure that smart contracts running in EVM (Ethereum Virtual Machine) will be eventually terminated. Failing to properly set the gas costs of EVM operations allows attackers to launch DoS attacks on Ethereum. Although Ethereum recently adjusted the gas costs of EVM operations to defend against known DoS attacks, it remains unknown whether the new setting is proper and how to configure it to defend against unknown DoS attacks. In this paper, we make the first step to address this challenging issue by first proposing an emulation-based framework to automatically measure the resource consumptions of EVM operations. The results reveal that Ethereum's new setting is still not proper. Moreover, we obtain an insight that there may always exist exploitable under-priced operations if the cost is fixed. Hence, we propose a novel gas cost mechanism, which dynamically adjusts the costs of EVM operations according to the number of executions, to thwart DoS attacks. This method punishes the operations that are executed much more frequently than before and lead to high gas costs. To make our solution flexible and secure and avoid frequent update of Ethereum client, we design a special smart contract that collaborates with the updated EVM for dynamic parameter adjustment. Experimental results demonstrate that our method can effectively thwart both known and unknown DoS attacks with flexible parameter settings. Moreover, our method only introduces negligible additional gas consumption for benign users.
△ Less
Submitted 4 November, 2020; v1 submitted 18 December, 2017;
originally announced December 2017.
-
Meta-Key: A Secure Data-Sharing Protocol under Blockchain-Based Decentralised Storage Architecture
Authors:
Dagang Li,
Rong Du,
Man Ho Au,
Yue Fu
Abstract:
In this letter we propose Meta-key, a data-sharing mechanism that enables users share their encrypted data under a blockchain-based decentralized storage architecture. All the data-encryption keys are encrypted by the owner's public key and put onto the blockchain for safe and secure storage and easy key-management. Encrypted data are stored in dedicated storage nodes and proxy re-encryption mecha…
▽ More
In this letter we propose Meta-key, a data-sharing mechanism that enables users share their encrypted data under a blockchain-based decentralized storage architecture. All the data-encryption keys are encrypted by the owner's public key and put onto the blockchain for safe and secure storage and easy key-management. Encrypted data are stored in dedicated storage nodes and proxy re-encryption mechanism is used to ensure secure data-sharing in the untrusted environment. Security analysis of our model shows that the proxy re-encryption adopted in our system is naturally free from collusion-attack due to the specific architecture of Meta-key.
△ Less
Submitted 24 May, 2020; v1 submitted 22 October, 2017;
originally announced October 2017.
-
On Optimal Latency of Communications
Authors:
Minh Au,
Francois Gagnon
Abstract:
In this paper we investigate the optimal latency of communications. Focusing on fixed rate communication without any feedback channel, this paper encompasses low-latency strategies with which one hop and multi-hop communication issues are treated from an information theoretic perspective. By defining the latency as the time required to make decisions, we prove that if short messages can be transmi…
▽ More
In this paper we investigate the optimal latency of communications. Focusing on fixed rate communication without any feedback channel, this paper encompasses low-latency strategies with which one hop and multi-hop communication issues are treated from an information theoretic perspective. By defining the latency as the time required to make decisions, we prove that if short messages can be transmitted in parallel Gaussian channels, for example, via orthogonal frequency-division multiplexing (OFDM)-like signals, there exists an optimal low-latency strategy for every code. This can be achieved via early-detection schemes or asynchronous detections. We first provide the optimal achievable latency in additive white Gaussian noise (AWGN) channels for every channel code given a probability block error $ε$. This can be obtained via sequential ratio tests or a "genie" aided, \textit{e.g}. error-detecting codes. Results demonstrate the effectiveness of the approach. Next, we show how early-detection can be effective with OFDM signals while maintaining its spectral efficiency via random coding or pre-coding random matrices. Finally, we explore the optimal low-latency strategy in multi-hop relaying schemes. For amplify-and-forward (AF) and decode-and-forward (DF) relaying schemes there exist an optimal achievable latency. In particular, we first show that there exist a better low-latency strategy, for which AF relays could transmit while receiving. This can be achieved by using amplify and forward combined with early detection.
△ Less
Submitted 4 January, 2017; v1 submitted 30 September, 2016;
originally announced October 2016.