-
An Explainable and Conformal AI Model to Detect Temporomandibular Joint Involvement in Children Suffering from Juvenile Idiopathic Arthritis
Authors:
Lena Todnem Bach Christensen,
Dikte Straadt,
Stratos Vassis,
Christian Marius Lillelund,
Peter Bangsgaard Stoustrup,
Ruben Pauwels,
Thomas Klit Pedersen,
Christian Fischer Pedersen
Abstract:
Juvenile idiopathic arthritis (JIA) is the most common rheumatic disease during childhood and adolescence. The temporomandibular joints (TMJ) are among the most frequently affected joints in patients with JIA, and mandibular growth is especially vulnerable to arthritic changes of the TMJ in children. A clinical examination is the most cost-effective method to diagnose TMJ involvement, but clinicia…
▽ More
Juvenile idiopathic arthritis (JIA) is the most common rheumatic disease during childhood and adolescence. The temporomandibular joints (TMJ) are among the most frequently affected joints in patients with JIA, and mandibular growth is especially vulnerable to arthritic changes of the TMJ in children. A clinical examination is the most cost-effective method to diagnose TMJ involvement, but clinicians find it difficult to interpret and inaccurate when used only on clinical examinations. This study implemented an explainable artificial intelligence (AI) model that can help clinicians assess TMJ involvement. The classification model was trained using Random Forest on 6154 clinical examinations of 1035 pediatric patients (67% female, 33% male) and evaluated on its ability to correctly classify TMJ involvement or not on a separate test set. Most notably, the results show that the model can classify patients within two years of their first examination as having TMJ involvement with a precision of 0.86 and a sensitivity of 0.7. The results show promise for an AI model in the assessment of TMJ involvement in children and as a decision support tool.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Assessing Neural Network Representations During Training Using Noise-Resilient Diffusion Spectral Entropy
Authors:
Danqi Liao,
Chen Liu,
Benjamin W. Christensen,
Alexander Tong,
Guillaume Huguet,
Guy Wolf,
Maximilian Nickel,
Ian Adelstein,
Smita Krishnaswamy
Abstract:
Entropy and mutual information in neural networks provide rich information on the learning process, but they have proven difficult to compute reliably in high dimensions. Indeed, in noisy and high-dimensional data, traditional estimates in ambient dimensions approach a fixed entropy and are prohibitively hard to compute. To address these issues, we leverage data geometry to access the underlying m…
▽ More
Entropy and mutual information in neural networks provide rich information on the learning process, but they have proven difficult to compute reliably in high dimensions. Indeed, in noisy and high-dimensional data, traditional estimates in ambient dimensions approach a fixed entropy and are prohibitively hard to compute. To address these issues, we leverage data geometry to access the underlying manifold and reliably compute these information-theoretic measures. Specifically, we define diffusion spectral entropy (DSE) in neural representations of a dataset as well as diffusion spectral mutual information (DSMI) between different variables representing data. First, we show that they form noise-resistant measures of intrinsic dimensionality and relationship strength in high-dimensional simulated data that outperform classic Shannon entropy, nonparametric estimation, and mutual information neural estimation (MINE). We then study the evolution of representations in classification networks with supervised learning, self-supervision, or overfitting. We observe that (1) DSE of neural representations increases during training; (2) DSMI with the class label increases during generalizable learning but stays stagnant during overfitting; (3) DSMI with the input signal shows differing trends: on MNIST it increases, while on CIFAR-10 and STL-10 it decreases. Finally, we show that DSE can be used to guide better network initialization and that DSMI can be used to predict downstream classification accuracy across 962 models on ImageNet. The official implementation is available at https://github.com/ChenLiu-1996/DiffusionSpectralEntropy.
△ Less
Submitted 3 December, 2023;
originally announced December 2023.
-
Quantum Two-Way Communication Protocol Beyond Superdense Coding
Authors:
Lorenzo Valentini,
Kristian Skafte Jensen,
René Bødker Christensen,
Marco Chiani,
Petar Popovski
Abstract:
We introduce a generalization of one-way superdense coding to two-way communication protocols for transmitting classical bits by using entangled quantum pairs. The proposed protocol caters for provision of entangled pairs, which is assumed to be given in one-way superdense coding. The proposed protocol gives a 50% increase in both data rate and energy efficiency compared to the classical protocol.…
▽ More
We introduce a generalization of one-way superdense coding to two-way communication protocols for transmitting classical bits by using entangled quantum pairs. The proposed protocol caters for provision of entangled pairs, which is assumed to be given in one-way superdense coding. The proposed protocol gives a 50% increase in both data rate and energy efficiency compared to the classical protocol. Even when decoherence is taken into consideration, the quantum protocol performs better as long as the decoherence time is not extremely short.
△ Less
Submitted 6 September, 2023;
originally announced September 2023.
-
Private Product Computation using Quantum Entanglement
Authors:
René Bødker Christensen,
Petar Popovski
Abstract:
In this work, we show that a pair of entangled qubits can be used to compute a product privately. More precisely, two participants with a private input from a finite field can perform local operations on a shared, Bell-like quantum state, and when these qubits are later sent to a third participant, the third participant can determine the product of the inputs, but without learning more about the i…
▽ More
In this work, we show that a pair of entangled qubits can be used to compute a product privately. More precisely, two participants with a private input from a finite field can perform local operations on a shared, Bell-like quantum state, and when these qubits are later sent to a third participant, the third participant can determine the product of the inputs, but without learning more about the individual inputs. We give a concrete way to realize this product computation for arbitrary finite fields of prime order.
△ Less
Submitted 27 October, 2023; v1 submitted 10 May, 2023;
originally announced May 2023.
-
Reliable Quantum Communications based on Asymmetry in Distillation and Coding
Authors:
Lorenzo Valentini,
René Bødker Christensen,
Petar Popovski,
Marco Chiani
Abstract:
The reliable provision of entangled qubits is an essential precondition in a variety of schemes for distributed quantum computing. This is challenged by multiple nuisances, such as errors during the transmission over quantum links, but also due to degradation of the entanglement over time due to decoherence. The latter can be seen as a constraint on the latency of the quantum protocol, which bring…
▽ More
The reliable provision of entangled qubits is an essential precondition in a variety of schemes for distributed quantum computing. This is challenged by multiple nuisances, such as errors during the transmission over quantum links, but also due to degradation of the entanglement over time due to decoherence. The latter can be seen as a constraint on the latency of the quantum protocol, which brings the problem of quantum protocol design into the context of latency-reliability constraints. We address the problem through hybrid schemes that combine: (1) indirect transmission based on teleportation and distillation; (2) direct transmission, based on quantum error correction (QEC). The intuition is that, at present, the quantum hardware offers low fidelity, which demands distillation; on the other hand, low latency can be obtained by QEC techniques. It is shown that, in the proposed framework, the distillation protocol gives rise to asymmetries that can be exploited by asymmetric quantum error correcting code (QECC), which sets the basis for unique hybrid distillation and coding design. Our results show that ad-hoc asymmetric codes give, compared to conventional QEC, a performance boost and codeword size reduction both in a single link and in a quantum network scenario.
△ Less
Submitted 3 June, 2024; v1 submitted 1 May, 2023;
originally announced May 2023.
-
FIMP: Foundation Model-Informed Message Passing for Graph Neural Networks
Authors:
Syed Asad Rizvi,
Nazreen Pallikkavaliyaveetil,
David Zhang,
Zhuoyang Lyu,
Nhi Nguyen,
Haoran Lyu,
Benjamin Christensen,
Josue Ortega Caro,
Antonio H. O. Fonseca,
Emanuele Zappala,
Maryam Bagherian,
Christopher Averill,
Chadi G. Abdallah,
Amin Karbasi,
Rex Ying,
Maria Brbic,
Rahul Madhav Dhodapkar,
David van Dijk
Abstract:
Foundation models have achieved remarkable success across many domains, relying on pretraining over vast amounts of data. Graph-structured data often lacks the same scale as unstructured data, making the development of graph foundation models challenging. In this work, we propose Foundation-Informed Message Passing (FIMP), a Graph Neural Network (GNN) message-passing framework that leverages pretr…
▽ More
Foundation models have achieved remarkable success across many domains, relying on pretraining over vast amounts of data. Graph-structured data often lacks the same scale as unstructured data, making the development of graph foundation models challenging. In this work, we propose Foundation-Informed Message Passing (FIMP), a Graph Neural Network (GNN) message-passing framework that leverages pretrained non-textual foundation models in graph-based tasks. We show that the self-attention layers of foundation models can effectively be repurposed on graphs to perform cross-node attention-based message-passing. Our model is evaluated on a real-world image network dataset and two biological applications (single-cell RNA sequencing data and fMRI brain activity recordings) in both finetuned and zero-shot settings. FIMP outperforms strong baselines, demonstrating that it can effectively leverage state-of-the-art foundation models in graph tasks.
△ Less
Submitted 1 July, 2024; v1 submitted 17 October, 2022;
originally announced October 2022.
-
Private Randomness Agreement and its Application in Quantum Key Distribution Networks
Authors:
René Bødker Christensen,
Petar Popovski
Abstract:
We define a variation on the well-known problem of private message transmission. This new problem called private randomness agreement (PRA) gives two participants access to a public, authenticated channel alongside the main channels, and the 'message' is not fixed a priori.
Instead, the participants aim to agree on a random string completely unknown to a computationally unbounded adversary.
We…
▽ More
We define a variation on the well-known problem of private message transmission. This new problem called private randomness agreement (PRA) gives two participants access to a public, authenticated channel alongside the main channels, and the 'message' is not fixed a priori.
Instead, the participants aim to agree on a random string completely unknown to a computationally unbounded adversary.
We define privacy and reliability, and show that PRA cannot be solved in a single round. We then show that it can be solved in three rounds, albeit with exponential cost, and give an efficient four-round protocol based on polynomial evaluation.
△ Less
Submitted 14 February, 2023; v1 submitted 11 October, 2022;
originally announced October 2022.
-
Weak-signal extraction enabled by deep-neural-network denoising of diffraction data
Authors:
Jens Oppliger,
M. Michael Denner,
Julia Küspert,
Ruggero Frison,
Qisi Wang,
Alexander Morawietz,
Oleh Ivashko,
Ann-Christin Dippel,
Martin von Zimmermann,
Izabela Biało,
Leonardo Martinelli,
Benoît Fauqué,
Jaewon Choi,
Mirian Garcia-Fernandez,
Ke-** Zhou,
Niels B. Christensen,
Tohru Kurosawa,
Naoki Momono,
Migaku Oda,
Fabian D. Natterer,
Mark H. Fischer,
Titus Neupert,
Johan Chang
Abstract:
Removal or cancellation of noise has wide-spread applications for imaging and acoustics. In every-day-life applications, denoising may even include generative aspects, which are unfaithful to the ground truth. For scientific use, however, denoising must reproduce the ground truth accurately. Here, we show how data can be denoised via a deep convolutional neural network such that weak signals appea…
▽ More
Removal or cancellation of noise has wide-spread applications for imaging and acoustics. In every-day-life applications, denoising may even include generative aspects, which are unfaithful to the ground truth. For scientific use, however, denoising must reproduce the ground truth accurately. Here, we show how data can be denoised via a deep convolutional neural network such that weak signals appear with quantitative accuracy. In particular, we study X-ray diffraction on crystalline materials. We demonstrate that weak signals stemming from charge ordering, insignificant in the noisy data, become visible and accurate in the denoised data. This success is enabled by supervised training of a deep neural network with pairs of measured low- and high-noise data. We demonstrate that using artificial noise does not yield such quantitatively accurate results. Our approach thus illustrates a practical strategy for noise filtering that can be applied to challenging acquisition problems.
△ Less
Submitted 11 December, 2023; v1 submitted 19 September, 2022;
originally announced September 2022.
-
Accurate and fast identification of minimally prepared bacteria phenotypes using Raman spectroscopy assisted by machine learning
Authors:
Benjamin Lundquist Thomsen,
Jesper B. Christensen,
Olga Rodenko,
Iskander Usenov,
Rasmus Birkholm Grønnemose,
Thomas Emil Andersen,
Mikael Lassen
Abstract:
The worldwide increase of antimicrobial resistance (AMR) is a serious threat to human health. To avert the spread of AMR, fast reliable diagnostics tools that facilitate optimal antibiotic stewardship are an unmet need. In this regard, Raman spectroscopy promises rapid label- and culture-free identification and antimicrobial susceptibility testing (AST) in a single step. However, even though many…
▽ More
The worldwide increase of antimicrobial resistance (AMR) is a serious threat to human health. To avert the spread of AMR, fast reliable diagnostics tools that facilitate optimal antibiotic stewardship are an unmet need. In this regard, Raman spectroscopy promises rapid label- and culture-free identification and antimicrobial susceptibility testing (AST) in a single step. However, even though many Raman-based bacteria-identification and AST studies have demonstrated impressive results, some shortcomings must be addressed. To bridge the gap between proof-of-concept studies and clinical application, we have developed machine learning techniques in combination with a novel data-augmentation algorithm, for fast identification of minimally prepared bacteria phenotypes and the distinctions of methicillin-resistant (MR) from methicillin-susceptible (MS) bacteria. For this we have implemented a spectral transformer model for hyper-spectral Raman images of bacteria. We show that our model outperforms the standard convolutional neural network models on a multitude of classification problems, both in terms of accuracy and in terms of training time. We attain more than 96$\%$ classification accuracy on a dataset consisting of 15 different classes and 95.6$\%$ classification accuracy for six MR-MS bacteria species. More importantly, our results are obtained using only fast and easy-to-produce training and test data
△ Less
Submitted 27 June, 2022;
originally announced June 2022.
-
Semi-Private Computation of Data Similarity with Applications to Data Valuation and Pricing
Authors:
René Bødker Christensen,
Shashi Raj Pandey,
Petar Popovski
Abstract:
Consider two data providers that want to contribute data to a certain learning model. Recent works have shown that the value of the data of one of the providers is dependent on the similarity with the data owned by the other provider. It would thus be beneficial if the two providers can calculate the similarity of their data, while kee** the actual data private. In this work, we devise multipart…
▽ More
Consider two data providers that want to contribute data to a certain learning model. Recent works have shown that the value of the data of one of the providers is dependent on the similarity with the data owned by the other provider. It would thus be beneficial if the two providers can calculate the similarity of their data, while kee** the actual data private. In this work, we devise multiparty computation-protocols to compute similarity of two data sets based on correlation, while offering controllable privacy guarantees. We consider a simple model with two participating providers and develop methods to compute exact and approximate correlation, respectively, with controlled information leakage. Both protocols have computational and communication complexities that are linear in the number of data samples. We also provide general bounds on the maximal error in the approximation case, and analyse the resulting errors for practical parameter choices.
△ Less
Submitted 11 April, 2023; v1 submitted 14 June, 2022;
originally announced June 2022.
-
An Algorithmic Approach to Entanglement-Assisted Quantum Error-Correcting Codes from the Hermitian Curve
Authors:
René Bødker Christensen,
Carlos Munuera,
Francisco Revson F. Pereira,
Diego Ruano
Abstract:
We study entanglement-assisted quantum error-correcting codes (EAQECCs) arising from classical one-point algebraic geometry codes from the Hermitian curve with respect to the Hermitian inner product. Their only unknown parameter is $c$, the number of required maximally entangled quantum states since the Hermitian dual of an AG code is unknown. In this article, we present an efficient algorithmic a…
▽ More
We study entanglement-assisted quantum error-correcting codes (EAQECCs) arising from classical one-point algebraic geometry codes from the Hermitian curve with respect to the Hermitian inner product. Their only unknown parameter is $c$, the number of required maximally entangled quantum states since the Hermitian dual of an AG code is unknown. In this article, we present an efficient algorithmic approach for computing $c$ for this family of EAQECCs. As a result, this algorithm allows us to provide EAQECCs with excellent parameters over any field size.
△ Less
Submitted 11 January, 2022; v1 submitted 5 May, 2021;
originally announced May 2021.
-
Longevity Associated Geometry Identified in Satellite Images: Sidewalks, Driveways and Hiking Trails
Authors:
Joshua J. Levy,
Rebecca M. Lebeaux,
Anne G. Hoen,
Brock C. Christensen,
Louis J. Vaickus,
Todd A. MacKenzie
Abstract:
Importance: Following a century of increase, life expectancy in the United States has stagnated and begun to decline in recent decades. Using satellite images and street view images prior work has demonstrated associations of the built environment with income, education, access to care and health factors such as obesity. However, assessment of learned image feature relationships with variation in…
▽ More
Importance: Following a century of increase, life expectancy in the United States has stagnated and begun to decline in recent decades. Using satellite images and street view images prior work has demonstrated associations of the built environment with income, education, access to care and health factors such as obesity. However, assessment of learned image feature relationships with variation in crude mortality rate across the United States has been lacking.
Objective: Investigate prediction of county-level mortality rates in the U.S. using satellite images.
Design: Satellite images were extracted with the Google Static Maps application programming interface for 430 counties representing approximately 68.9% of the US population. A convolutional neural network was trained using crude mortality rates for each county in 2015 to predict mortality. Learned image features were interpreted using Shapley Additive Feature Explanations, clustered, and compared to mortality and its associated covariate predictors.
Main Outcomes and Measures: County mortality was predicted using satellite images.
Results: Predicted mortality from satellite images in a held-out test set of counties was strongly correlated to the true crude mortality rate (Pearson r=0.72). Learned image features were clustered, and we identified 10 clusters that were associated with education, income, geographical region, race and age.
Conclusion and Relevance: The application of deep learning techniques to remotely-sensed features of the built environment can serve as a useful predictor of mortality in the United States. Tools that are able to identify image features associated with health-related outcomes can inform targeted public health interventions.
△ Less
Submitted 5 March, 2020;
originally announced March 2020.
-
On Steane-Enlargement of Quantum Codes from Cartesian Product Point Sets
Authors:
René Bødker Christensen,
Olav Geil
Abstract:
In this work, we study quantum error-correcting codes obtained by using Steane-enlargement. We apply this technique to certain codes defined from Cartesian products previously considered by Galindo et al. in [4]. We give bounds on the dimension increase obtained via enlargement, and additionally give an algorithm to compute the true increase. A number of examples of codes are provided, and their p…
▽ More
In this work, we study quantum error-correcting codes obtained by using Steane-enlargement. We apply this technique to certain codes defined from Cartesian products previously considered by Galindo et al. in [4]. We give bounds on the dimension increase obtained via enlargement, and additionally give an algorithm to compute the true increase. A number of examples of codes are provided, and their parameters are compared to relevant codes in the literature, which shows that the parameters of the enlarged codes are advantageous. Furthermore, comparison with the Gilbert-Varshamov bound for stabilizer quantum codes shows that several of the enlarged codes match or exceed the parameters promised by the bound.
△ Less
Submitted 13 August, 2019;
originally announced August 2019.
-
Steane-Enlargement of Quantum Codes from the Hermitian Curve
Authors:
René Bødker Christensen,
Olav Geil
Abstract:
In this paper, we study the construction of quantum codes by applying Steane-enlargement to codes from the Hermitian curve. We cover Steane-enlargement of both usual one-point Hermitian codes and of order bound improved Hermitian codes. In particular, the paper contains two constructions of quantum codes whose parameters are described by explicit formulae, and we show that these codes compare favo…
▽ More
In this paper, we study the construction of quantum codes by applying Steane-enlargement to codes from the Hermitian curve. We cover Steane-enlargement of both usual one-point Hermitian codes and of order bound improved Hermitian codes. In particular, the paper contains two constructions of quantum codes whose parameters are described by explicit formulae, and we show that these codes compare favourably to existing, comparable constructions in the literature.
△ Less
Submitted 22 April, 2019;
originally announced April 2019.
-
On nested code pairs from the Hermitian curve
Authors:
René Bødker Christensen,
Olav Geil
Abstract:
Nested code pairs play a crucial role in the construction of ramp secret sharing schemes [Kurihara et al. 2012] and in the CSS construction of quantum codes [Ketkar et al. 2006]. The important parameters are (1) the codimension, (2) the relative minimum distance of the codes, and (3) the relative minimum distance of the dual set of codes. Given values for two of them, one aims at finding a set of…
▽ More
Nested code pairs play a crucial role in the construction of ramp secret sharing schemes [Kurihara et al. 2012] and in the CSS construction of quantum codes [Ketkar et al. 2006]. The important parameters are (1) the codimension, (2) the relative minimum distance of the codes, and (3) the relative minimum distance of the dual set of codes. Given values for two of them, one aims at finding a set of nested codes having parameters with these values and with the remaining parameter being as large as possible. In this work we study nested codes from the Hermitian curve. For not too small codimension, we present improved constructions and provide closed formula estimates on their performance. For small codimension we show how to choose pairs of one-point algebraic geometric codes in such a way that one of the relative minimum distances is larger than the corresponding non-relative minimum distance.
△ Less
Submitted 2 September, 2020; v1 submitted 11 July, 2018;
originally announced July 2018.
-
An advanced active quenching circuit for ultra-fast quantum cryptography
Authors:
Mario Stipčević,
Bradley G. Christensen,
Paul G. Kwiat,
Daniel J. Gauthier
Abstract:
Commercial photon-counting modules based on actively quenched solid-state avalanche photodiode sensors are used in a wide variety of applications. Manufacturers characterize their detectors by specifying a small set of parameters, such as detection efficiency, dead time, dark counts rate, afterpulsing probability and single-photon arrival-time resolution (jitter). However, they usually do not spec…
▽ More
Commercial photon-counting modules based on actively quenched solid-state avalanche photodiode sensors are used in a wide variety of applications. Manufacturers characterize their detectors by specifying a small set of parameters, such as detection efficiency, dead time, dark counts rate, afterpulsing probability and single-photon arrival-time resolution (jitter). However, they usually do not specify the range of conditions over which these parameters are constant or present a sufficient description of the characterization process. In this work, we perform a few novel tests on two commercial detectors and identify an additional set of imperfections that must be specified to sufficiently characterize their behavior. These include rate-dependence of the dead time and jitter, detection delay shift, and "twilighting." We find that these additional non-ideal behaviors can lead to unexpected effects or strong deterioration of the performance of a system using these devices. We explain their origin by an in-depth analysis of the active quenching process. To mitigate the effects of these imperfections, a custom-built detection system is designed using a novel active quenching circuit. Its performance is compared against two commercial detectors in a fast quantum key distribution system with hyper-entangled photons and a random number generator.
△ Less
Submitted 9 September, 2017; v1 submitted 20 June, 2017;
originally announced June 2017.
-
Receiver Architectures for MIMO-OFDM Based on a Combined VMP-SP Algorithm
Authors:
Carles Navarro Manchón,
Gunvor E. Kirkelund,
Erwin Riegler,
Lars P. B. Christensen,
Bernard H. Fleury
Abstract:
Iterative information processing, either based on heuristics or analytical frameworks, has been shown to be a very powerful tool for the design of efficient, yet feasible, wireless receiver architectures. Within this context, algorithms performing message-passing on a probabilistic graph, such as the sum-product (SP) and variational message passing (VMP) algorithms, have become increasingly popula…
▽ More
Iterative information processing, either based on heuristics or analytical frameworks, has been shown to be a very powerful tool for the design of efficient, yet feasible, wireless receiver architectures. Within this context, algorithms performing message-passing on a probabilistic graph, such as the sum-product (SP) and variational message passing (VMP) algorithms, have become increasingly popular.
In this contribution, we apply a combined VMP-SP message-passing technique to the design of receivers for MIMO-ODFM systems. The message-passing equations of the combined scheme can be obtained from the equations of the stationary points of a constrained region-based free energy approximation. When applied to a MIMO-OFDM probabilistic model, we obtain a generic receiver architecture performing iterative channel weight and noise precision estimation, equalization and data decoding. We show that this generic scheme can be particularized to a variety of different receiver structures, ranging from high-performance iterative structures to low complexity receivers. This allows for a flexible design of the signal processing specially tailored for the requirements of each specific application. The numerical assessment of our solutions, based on Monte Carlo simulations, corroborates the high performance of the proposed algorithms and their superiority to heuristic approaches.
△ Less
Submitted 24 November, 2011;
originally announced November 2011.