Skip to main content

Showing 1–30 of 30 results for author: Blum, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.15500  [pdf, other

    stat.ML cs.LG

    Hidden Variables unseen by Random Forests

    Authors: Ricardo Blum, Munir Hiabu, Enno Mammen, Joseph Theo Meyer

    Abstract: Random Forests are widely claimed to capture interactions well. However, some simple examples suggest that they perform poorly in the presence of certain pure interactions that the conventional CART criterion struggles to capture during tree construction. We argue that simple alternative partitioning schemes used in the tree growing procedure can enhance identification of these interactions. In a… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2309.01460

  2. arXiv:2404.01217  [pdf, other

    cs.LG cs.AI

    Incorporating Domain Differential Equations into Graph Convolutional Networks to Lower Generalization Discrepancy

    Authors: Yue Sun, Chao Chen, Yuesheng Xu, Sihong Xie, Rick S. Blum, Parv Venkitasubramaniam

    Abstract: Ensuring both accuracy and robustness in time series prediction is critical to many applications, ranging from urban planning to pandemic management. With sufficient training data where all spatiotemporal patterns are well-represented, existing deep-learning models can make reasonably accurate predictions. However, existing methods fail when the training data are drawn from different circumstances… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  3. arXiv:2209.11944  [pdf, other

    cs.LG cs.AI

    Communication-Efficient {Federated} Learning Using Censored Heavy Ball Descent

    Authors: Yicheng Chen, Rick S. Blum, Brian M. Sadler

    Abstract: Distributed machine learning enables scalability and computational offloading, but requires significant levels of communication. Consequently, communication efficiency in distributed learning settings is an important consideration, especially when the communications are wireless and battery-driven devices are employed. In this paper we develop a censoring-based heavy ball (CHB) method for distribu… ▽ More

    Submitted 24 September, 2022; originally announced September 2022.

  4. arXiv:2202.09423  [pdf, ps, other

    cs.NI eess.SY

    Route Discovery and Capacity of Ad hoc Networks

    Authors: Eugene Perevalov, Rick S. Blum, Xun Chen, Anthony Nigara

    Abstract: Throughput capacity of large ad hoc networks has been shown to scale adversely with the size of network $n$. However the need for the nodes to find or repair routes has not been analyzed in this context. In this paper, we explicitly take route discovery into account and obtain the scaling law for the throughput capacity under general assumptions on the network environment, node behavior, and the q… ▽ More

    Submitted 18 February, 2022; originally announced February 2022.

    Comments: extended version, originally published in conference (IEEE GLOBECOM '05)

  5. arXiv:2202.02580  [pdf, ps, other

    cs.LG cs.AI

    Communication Efficient Federated Learning via Ordered ADMM in a Fully Decentralized Setting

    Authors: Yicheng Chen, Rick S. Blum, Brian M. Sadler

    Abstract: The challenge of communication-efficient distributed optimization has attracted attention in recent years. In this paper, a communication efficient algorithm, called ordering-based alternating direction method of multipliers (OADMM) is devised in a general fully decentralized network setting where a worker can only exchange messages with neighbors. Compared to the classical ADMM, a key feature of… ▽ More

    Submitted 5 February, 2022; originally announced February 2022.

  6. arXiv:2202.02491  [pdf, ps, other

    cs.LG cs.AI

    Distributed Learning With Sparsified Gradient Differences

    Authors: Yicheng Chen, Rick S. Blum, Martin Takac, Brian M. Sadler

    Abstract: A very large number of communications are typically required to solve distributed learning tasks, and this critically limits scalability and convergence speed in wireless communications applications. In this paper, we devise a Gradient Descent method with Sparsification and Error Correction (GD-SEC) to improve the communications efficiency in a general worker-server architecture. Motivated by a va… ▽ More

    Submitted 4 February, 2022; originally announced February 2022.

  7. arXiv:2111.06693  [pdf, other

    q-bio.QM cs.CV

    Deep-learning in the bioimaging wild: Handling ambiguous data with deepflash2

    Authors: Matthias Griebel, Dennis Segebarth, Nikolai Stein, Nina Schukraft, Philip Tovote, Robert Blum, Christoph M. Flath

    Abstract: We present deepflash2, a deep learning solution that facilitates the objective and reliable segmentation of ambiguous bioimages through multi-expert annotations and integrated quality assurance. Thereby, deepflash2 addresses typical challenges that arise during training, evaluation, and application of deep learning models in bioimaging. The tool is embedded in an easy-to-use graphical user interfa… ▽ More

    Submitted 12 November, 2021; originally announced November 2021.

  8. arXiv:2106.02892  [pdf, other

    cs.LG eess.SP

    Training Robust Graph Neural Networks with Topology Adaptive Edge Drop**

    Authors: Zhan Gao, Subhrajit Bhattacharya, Leiming Zhang, Rick S. Blum, Alejandro Ribeiro, Brian M. Sadler

    Abstract: Graph neural networks (GNNs) are processing architectures that exploit graph structural information to model representations from network data. Despite their success, GNNs suffer from sub-optimal generalization performance given limited training data, referred to as over-fitting. This paper proposes Topology Adaptive Edge Drop** (TADropEdge) method as an adaptive data augmentation technique to i… ▽ More

    Submitted 5 June, 2021; originally announced June 2021.

  9. arXiv:2010.04790  [pdf, other

    cs.SI

    Inter-cluster Transmission Control Using Graph Modal Barriers

    Authors: Leiming Zhang, Brian M. Sadler, Rick S. Blum, Subhrajit Bhattacharya

    Abstract: In this paper we consider the problem of transmission across a graph and how to effectively control/restrict it with limited resources. Transmission can represent information transfer across a social network, spread of a malicious virus across a computer network, or spread of an infectious disease across communities. The key insight is to assign proper weights to bottleneck edges of the graph base… ▽ More

    Submitted 9 October, 2020; originally announced October 2020.

    Comments: 16 pages

  10. arXiv:2001.01668  [pdf, other

    cs.IT

    Secret key authentication capacity region, Part I: average authentication rate

    Authors: Jake Perazzone, Eric Graves, Paul Yu, Rick Blum

    Abstract: This paper investigates the secret key authentication capacity region. Specifically, the focus is on a model where a source must transmit information over an adversary controlled channel where the adversary, prior to the source's transmission, decides whether or not to replace the destination's observation with an arbitrary one of their choosing (done in hopes of having the destination accept a fa… ▽ More

    Submitted 6 January, 2020; originally announced January 2020.

    Comments: First of a two part paper. Large text overlap in introductions. Submitted for possible publication

  11. arXiv:2001.01667  [pdf, other

    cs.IT

    Secret key authentication capacity region, Part II: typical authentication rate

    Authors: Eric Graves, Jake Perazzone, Paul Yu, Rick Blum

    Abstract: This paper investigates the secret key authentication capacity region. Specifically, the focus is on a model where a source must transmit information over an adversary controlled channel where the adversary, prior to the source's transmission, decides whether or not to replace the destination's observation with an arbitrary one of their choosing (done in hopes of having the destination accept a fa… ▽ More

    Submitted 6 January, 2020; originally announced January 2020.

    Comments: Second of a two part paper. Large text overlap in introductions. Submitted for possible publication

  12. arXiv:1901.02213  [pdf, other

    cs.DC cs.CR

    Superlight -- A Permissionless, Light-client Only Blockchain with Self-Contained Proofs and BLS Signatures

    Authors: Roman Blum, Thomas Bocek

    Abstract: Blockchain protocols are based on a distributed database where stored data is guaranteed to be immutable. The requirement that all nodes have to maintain their own local copy of the database ensures security while consensus mechanisms help deciding which data gets added to the database and keep powerful adversaries from derailing the system. However, since the database that forms the foundation of… ▽ More

    Submitted 16 September, 2019; v1 submitted 8 January, 2019; originally announced January 2019.

  13. arXiv:1809.03653  [pdf, ps, other

    cs.IT

    Energy-efficient Decision Fusion for Distributed Detection in Wireless Sensor Networks

    Authors: N. Sriranga, K. G. Nagananda, R. S. Blum, A. Saucan, P. K. Varshney

    Abstract: This paper proposes an energy-efficient counting rule for distributed detection by ordering sensor transmissions in wireless sensor networks. In the counting rule-based detection in an $N-$sensor network, the local sensors transmit binary decisions to the fusion center, where the number of all $N$ local-sensor detections are counted and compared to a threshold. In the ordering scheme, sensors tran… ▽ More

    Submitted 10 September, 2018; originally announced September 2018.

    Comments: 7 pages, 3 figures. Proceedings of FUSION 2018, Cambridge, UK

  14. arXiv:1802.01266  [pdf, other

    cs.IT

    Multi-snapshot Newtonized Orthogonal Matching Pursuit for Line Spectrum Estimation with Multiple Measurement Vectors

    Authors: Jiang Zhu, Lin Han, Rick S. Blum, Zhiwei Xu

    Abstract: In this paper, multi-snapshot Newtonized orthogonal matching pursuit (MNOMP) algorithm is proposed to deal with the line spectrum estimation with multiple measurement vectors (MMVs). MNOMP has the low computation complexity and state-of-the-art performance advantage of NOMP, and also includes two key steps: Detecting a new sinusoid on an oversampled discrete Fourier transform (DFT) grid and refini… ▽ More

    Submitted 8 May, 2019; v1 submitted 4 February, 2018; originally announced February 2018.

  15. arXiv:1801.03920  [pdf, other

    cs.IT

    Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement

    Authors: Jake Perazzone, Eric Graves, Paul Yu, Rick Blum

    Abstract: The rate regions of many variations of the standard and wire-tap channels have been thoroughly explored. Secrecy capacity characterizes the loss of rate required to ensure that the adversary gains no information about the transmissions. Authentication does not have a standard metric, despite being an important counterpart to secrecy. While some results have taken an information-theoretic approach… ▽ More

    Submitted 26 June, 2018; v1 submitted 11 January, 2018; originally announced January 2018.

  16. Signal Amplitude Estimation and Detection from Unlabeled Binary Quantized Samples

    Authors: Guanyu Wang, Jiang Zhu, Rick S. Blum, Peter Willett, Stefano Marano, Vincenzo Matta, Paolo Braca

    Abstract: Signal amplitude estimation and detection from unlabeled quantized binary samples are studied, assuming that the order of the time indexes is completely unknown. First, maximum likelihood (ML) estimators are utilized to estimate both the permutation matrix and unknown signal amplitude under arbitrary, but known signal shape and quantizer thresholds. Sufficient conditions are provided under which a… ▽ More

    Submitted 8 March, 2018; v1 submitted 4 June, 2017; originally announced June 2017.

  17. Attack Detection in Sensor Network Target Localization Systems with Quantized Data

    Authors: Jiangfan Zhang, Xiaodong Wang, Rick S. Blum, Lance M. Kaplan

    Abstract: We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center. A general attack is considered at some sensors that attempts to cause the fusion center to produce an inaccurate estimation of the target location with a large mean-square-error. The attack is a combi… ▽ More

    Submitted 15 May, 2017; originally announced May 2017.

  18. arXiv:1702.03515  [pdf, other

    cs.CV

    Sparse Representation based Multi-sensor Image Fusion: A Review

    Authors: Qiang Zhang, Yi Liu, Rick S. Blum, Jungong Han, Dacheng Tao

    Abstract: As a result of several successful applications in computer vision and image processing, sparse representation (SR) has attracted significant attention in multi-sensor image fusion. Unlike the traditional multiscale transforms (MSTs) that presume the basis functions, SR learns an over-complete dictionary from a set of training images for image fusion, and it achieves more stable and meaningful repr… ▽ More

    Submitted 12 February, 2017; originally announced February 2017.

    Comments: 19 pages

  19. arXiv:1701.01532  [pdf, ps, other

    cs.IT

    Suboptimum Low Complexity Joint Multi-target Detection and Localization for Noncoherent MIMO Radar with Widely Separated Antennas

    Authors: Wei Yi, Tao Zhou, Mingchi Xie, Yue Ai, Rick S. Blum

    Abstract: In this paper, the problems of simultaneously detecting and localizing multiple targets are considered for noncoherent multiple-input multiple-output (MIMO) radar with widely separated antennas. By assuming a prior knowledge of target number, an optimal solution to this problem is presented first. It is essentially a maximum-likelihood (ML) estimator searching parameters of interest in a high dime… ▽ More

    Submitted 5 January, 2017; originally announced January 2017.

  20. arXiv:1611.05117  [pdf, other

    stat.AP cs.IT

    Estimation Theory Based Robust Phase Offset Estimation in the Presence of Delay Attacks

    Authors: Anantha K. Karthik, Rick S. Blum

    Abstract: This paper addresses the problem of robust clock phase offset estimation for the IEEE 1588 precision time protocol (PTP) in the presence of delay attacks. Delay attacks are one of the most effective cyber attacks in PTP, as they cannot be mitigated using typical security measures. In this paper, we consider the case where the slave node can exchange synchronization messages with multiple master no… ▽ More

    Submitted 15 November, 2016; originally announced November 2016.

    Comments: 30 pages, 4 figures, Journal paper

  21. arXiv:1609.03355  [pdf, ps, other

    cs.IT

    Low-Rank Tensor Decomposition-Aided Channel Estimation for Millimeter Wave MIMO-OFDM Systems

    Authors: Zhou Zhou, Jun Fang, Linxiao Yang, Hongbin Li, Zhi Chen, Rick S. Blum

    Abstract: We consider the problem of downlink channel estimation for millimeter wave (mmWave) MIMO-OFDM systems, where both the base station (BS) and the mobile station (MS) employ large antenna arrays for directional precoding/beamforming. Hybrid analog and digital beamforming structures are employed in order to offer a compromise between hardware complexity and system performance. Different from most exis… ▽ More

    Submitted 1 November, 2016; v1 submitted 12 September, 2016; originally announced September 2016.

    Comments: arXiv admin note: text overlap with arXiv:1602.07955

  22. Performance Analysis of Target Parameters Estimation Using Multiple Widely Separated Antenna Arrays

    Authors: Peter Khomchuk, Igal Bilik, Rick S. Blum

    Abstract: Target parameter estimation performance is investigated for a radar employing a set of widely separated transmitting and receiving antenna arrays. Cases with multiple extended targets are considered under two signal model assumptions: stochastic and deterministic. The general expressions for the corresponding Cramer-Rao lower bound (CRLB) and the asymptotic properties of the maximum-likelihood (ML… ▽ More

    Submitted 15 June, 2016; originally announced June 2016.

    Journal ref: P. Khomchuk, R. S. Blum, I. Bilik, "Performance analysis of target parameters estimation using multiple widely separated antenna arrays", IEEE Transactions on Aerospace and Electronic System, 52.5 (2016): 2413-2435

  23. arXiv:1605.07284  [pdf, ps, other

    cs.IT cs.CR stat.AP

    Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks

    Authors: Jiangfan Zhang, Rick S. Blum, Lance Kaplan, Xuanxuan Lu

    Abstract: Estimation of an unknown deterministic vector from quantized sensor data is considered in the presence of spoofing attacks which alter the data presented to several sensors. Contrary to previous work, a generalized attack model is employed which manipulates the data using transformations with arbitrary functional forms determined by some attack parameters whose values are unknown to the attacked s… ▽ More

    Submitted 1 June, 2016; v1 submitted 24 May, 2016; originally announced May 2016.

  24. Wireless-Powered Cooperative Communications: Power-Splitting Relaying with Energy Accumulation

    Authors: Zheng Zhou, Mugen Peng, Zhongyuan Zhao, Wenbo Wang, Rick S. Blum

    Abstract: A harvest-use-store power splitting (PS) relaying strategy with distributed beamforming is proposed for wirelesspowered multi-relay cooperative networks in this paper. Different from the conventional battery-free PS relaying strategy, harvested energy is prioritized to power information relaying while the remainder is accumulated and stored for future usage with the help of a battery in the propos… ▽ More

    Submitted 3 January, 2016; originally announced January 2016.

    Comments: 15 pages, 7 figures. Manuscript received Apr. 15, 2015 by IEEE Journal on Selected Areas in Communications, revised Sep. 5, 2015, accepted Dec. 11, 2015

  25. Generalized Cramer-Rao Bound for Joint Estimation of Target Position and Velocity for Active and Passive Radar Networks

    Authors: Qian He, Jianbin Hu, Rick S. Blum, Yonggang Wu

    Abstract: In this paper, we derive the Cramer-Rao bound (CRB) for joint target position and velocity estimation using an active or passive distributed radar network under more general, and practically occurring, conditions than assumed in previous work. In particular, the presented results allow nonorthogonal signals, spatially dependent Gaussian reflection coefficients, and spatially dependent Gaussian clu… ▽ More

    Submitted 8 October, 2015; originally announced October 2015.

  26. Colocated MIMO Radar Waveform Design for Transmit Beampattern Formation

    Authors: Haisheng Xu, Rick S. Blum, Jian Wang, Jian Yuan

    Abstract: In this paper, colocated MIMO radar waveform design is considered by minimizing the integrated side-lobe level to obtain beam patterns with lower side-lobe levels than competing methods. First, a quadratic programming problem is formulated to design beam patterns by using the criteria for a minimal integrated side-lobe level. A theorem is derived that provides a closed-form analytical optimal solu… ▽ More

    Submitted 5 May, 2015; originally announced May 2015.

    Comments: 22 pages, 6 figures, Accepted by IEEE Transactions on Aerospace and Electronic Systems

    Journal ref: IEEE Transactions on Aerospace and Electronic Systems 51(2015) 1558 - 1568

  27. arXiv:1503.00080  [pdf, other

    stat.AP cs.IT

    Minimax Optimum Estimators for Phase Synchronization in IEEE 1588

    Authors: Anand Guruswamy, Rick S. Blum, Shalinee Kishore, Mark Bordogna

    Abstract: The IEEE 1588 protocol has received recent interest as a means of delivering sub-microsecond level clock phase synchronization over packet-switched mobile backhaul networks. Due to the randomness of the end-to-end delays in packet networks, the recovery of clock phase from packet timestamps in IEEE 1588 must be treated as a statistical estimation problem. A number of estimators for this problem ha… ▽ More

    Submitted 28 February, 2015; originally announced March 2015.

    Comments: 11 pages, 19 figures

  28. arXiv:1412.2477  [pdf, ps, other

    cs.IT

    Super-Resolution Compressed Sensing: A Generalized Iterative Reweighted L2 Approach

    Authors: Jun Fang, Hui** Duan, **g Li, Hongbin Li, Rick S. Blum

    Abstract: Conventional compressed sensing theory assumes signals have sparse representations in a known, finite dictionary. Nevertheless, in many practical applications such as direction-of-arrival (DOA) estimation and line spectral estimation, the sparsifying dictionary is usually characterized by a set of unknown parameters in a continuous domain. To apply the conventional compressed sensing technique to… ▽ More

    Submitted 18 December, 2014; v1 submitted 8 December, 2014; originally announced December 2014.

    Comments: arXiv admin note: text overlap with arXiv:1401.4312

  29. A PMU Scheduling Scheme for Transmission of Synchrophasor Data in Electric Power Systems

    Authors: K. G. Nagananda, Shalinee Kishore, Rick S. Blum

    Abstract: With the proposition to install a large number of phasor measurement units (PMUs) in the future power grid, it is essential to provide robust communications infrastructure for phasor data across the network. We make progress in this direction by devising a simple time division multiplexing scheme for transmitting phasor data from the PMUs to a central server: Time is divided into frames and the PM… ▽ More

    Submitted 31 December, 2014; v1 submitted 27 May, 2014; originally announced May 2014.

    Comments: 9 pages, 6 figures; an extra figure included in the published version. appears in IEEE Transactions on Smart Grid, Special Issue on Cyber Physical Systems and Security for Smart Grid, 2015

  30. Target Localization Accuracy Gain in MIMO Radar Based Systems

    Authors: Hana Godrich, Alexander M. Haimovich, Rick S. Blum

    Abstract: This paper presents an analysis of target localization accuracy, attainable by the use of MIMO (Multiple-Input Multiple-Output) radar systems, configured with multiple transmit and receive sensors, widely distributed over a given area. The Cramer-Rao lower bound (CRLB) for target localization accuracy is developed for both coherent and non-coherent processing. Coherent processing requires a comm… ▽ More

    Submitted 24 September, 2008; originally announced September 2008.

    Comments: 36 pages, 5 figures, submitted to IEEE Transaction on Information Theory