-
Adversary-Robust Graph-Based Learning of WSIs
Authors:
Saba Heidari Gheshlaghi,
Milan Aryal,
Nasim Yahyasoltani,
Masoud Ganji
Abstract:
Enhancing the robustness of deep learning models against adversarial attacks is crucial, especially in critical domains like healthcare where significant financial interests heighten the risk of such attacks. Whole slide images (WSIs) are high-resolution, digitized versions of tissue samples mounted on glass slides, scanned using sophisticated imaging equipment. The digital analysis of WSIs presen…
▽ More
Enhancing the robustness of deep learning models against adversarial attacks is crucial, especially in critical domains like healthcare where significant financial interests heighten the risk of such attacks. Whole slide images (WSIs) are high-resolution, digitized versions of tissue samples mounted on glass slides, scanned using sophisticated imaging equipment. The digital analysis of WSIs presents unique challenges due to their gigapixel size and multi-resolution storage format. In this work, we aim at improving the robustness of cancer Gleason grading classification systems against adversarial attacks, addressing challenges at both the image and graph levels. As regards the proposed algorithm, we develop a novel and innovative graph-based model which utilizes GNN to extract features from the graph representation of WSIs. A denoising module, along with a pooling layer is incorporated to manage the impact of adversarial attacks on the WSIs. The process concludes with a transformer module that classifies various grades of prostate cancer based on the processed data. To assess the effectiveness of the proposed method, we conducted a comparative analysis using two scenarios. Initially, we trained and tested the model without the denoiser using WSIs that had not been exposed to any attack. We then introduced a range of attacks at either the image or graph level and processed them through the proposed network. The performance of the model was evaluated in terms of accuracy and kappa scores. The results from this comparison showed a significant improvement in cancer diagnosis accuracy, highlighting the robustness and efficiency of the proposed method in handling adversarial challenges in the context of medical imaging.
△ Less
Submitted 21 March, 2024;
originally announced March 2024.
-
Artifact-Robust Graph-Based Learning in Digital Pathology
Authors:
Saba Heidari Gheshlaghi,
Milan Aryal,
Nasim Yahyasoltani,
Masoud Ganji
Abstract:
Whole slide images~(WSIs) are digitized images of tissues placed in glass slides using advanced scanners. The digital processing of WSIs is challenging as they are gigapixel images and stored in multi-resolution format. A common challenge with WSIs is that perturbations/artifacts are inevitable during storing the glass slides and digitizing them. These perturbations include motion, which often ari…
▽ More
Whole slide images~(WSIs) are digitized images of tissues placed in glass slides using advanced scanners. The digital processing of WSIs is challenging as they are gigapixel images and stored in multi-resolution format. A common challenge with WSIs is that perturbations/artifacts are inevitable during storing the glass slides and digitizing them. These perturbations include motion, which often arises from slide movement during placement, and changes in hue and brightness due to variations in staining chemicals and the quality of digitizing scanners. In this work, a novel robust learning approach to account for these artifacts is presented. Due to the size and resolution of WSIs and to account for neighborhood information, graph-based methods are called for. We use graph convolutional network~(GCN) to extract features from the graph representing WSI. Through a denoiser {and pooling layer}, the effects of perturbations in WSIs are controlled and the output is followed by a transformer for the classification of different grades of prostate cancer. To compare the efficacy of the proposed approach, the model without denoiser is trained and tested with WSIs without any perturbation and then different perturbations are introduced in WSIs and passed through the network with the denoiser. The accuracy and kappa scores of the proposed model with prostate cancer dataset compared with non-robust algorithms show significant improvement in cancer diagnosis.
△ Less
Submitted 27 October, 2023;
originally announced October 2023.
-
Your Tribe Decides Your Vibe: Analyzing Local Popularity in the US Patent Citation Network
Authors:
Nishit Narang,
Manoj Kumar Ganji,
Amit Anil Nanavati
Abstract:
In many networks, the indegree of a vertex is a measure of its popularity. Past research has studied indegree distributions treating the network as a whole. In the US Patent citation network (USPCN), patents are classified into categories and subcategories. A natural question arises: How do patents gather their popularity from various (sub)categories? We analyse local indegree distributions to ans…
▽ More
In many networks, the indegree of a vertex is a measure of its popularity. Past research has studied indegree distributions treating the network as a whole. In the US Patent citation network (USPCN), patents are classified into categories and subcategories. A natural question arises: How do patents gather their popularity from various (sub)categories? We analyse local indegree distributions to answer this question.
The citation (indegree) of a patent within the same category indicates its internal popularity, while a cross-category citation indicates its external popularity. We analyze the internal and external indegree distributions at each level of USPCN hierarchy to learn how the internal and external popularity of patents varies across (sub)categories.
We find that all (sub)categories have local preferences that decide internal and external patents' popularities. Different patents are popular in different groups: Groups C1, C2 and C3 may not agree on popular patents in C1. In general, patent popularity appears to be a highly local phenomenon with subcategories (not even categories) deciding their own popular patents independent of the other (sub)categories.
△ Less
Submitted 2 June, 2021;
originally announced June 2021.
-
Downlink Asynchronous Non-Orthogonal Multiple Access with Quantizer Optimization
Authors:
Xun Zou,
Mehdi Ganji,
Hamid Jafarkhani
Abstract:
In this letter, we study a two-user downlink asynchronous non-orthogonal multiple access (ANOMA) with limited feedback. We employ the max-min criterion for the power allocation and derive the closed-form expressions for the upper and lower bounds of the max-min rate. It is demonstrated that ANOMA can achieve the same or even higher average maxmin rate with a lower feedback rate compared with NOMA.…
▽ More
In this letter, we study a two-user downlink asynchronous non-orthogonal multiple access (ANOMA) with limited feedback. We employ the max-min criterion for the power allocation and derive the closed-form expressions for the upper and lower bounds of the max-min rate. It is demonstrated that ANOMA can achieve the same or even higher average maxmin rate with a lower feedback rate compared with NOMA. Moreover, we propose a quantizer optimization algorithm which applies to both NOMA and ANOMA. Simulation results show that the optimized quantizer significantly improves the average max-min rate compared with the conventional uniform quantizer, especially in the scenario with a low feedback rate.
△ Less
Submitted 27 May, 2020;
originally announced May 2020.
-
Trellis-Coded Non-Orthogonal Multiple Access
Authors:
Xun Zou,
Mehdi Ganji,
Hamid Jafarkhani
Abstract:
In this letter, we propose a trellis-coded nonorthogonal multiple access (NOMA) scheme. The signals for different users are produced by trellis coded modulation (TCM) and then superimposed on different power levels. By interpreting the encoding process via the tensor product of trellises, we introduce a joint detection method based on the Viterbi algorithm. Then, we determine the optimal power all…
▽ More
In this letter, we propose a trellis-coded nonorthogonal multiple access (NOMA) scheme. The signals for different users are produced by trellis coded modulation (TCM) and then superimposed on different power levels. By interpreting the encoding process via the tensor product of trellises, we introduce a joint detection method based on the Viterbi algorithm. Then, we determine the optimal power allocation between the two users by maximizing the free distance of the tensor product trellis. Finally, we manifest that the trellis-coded NOMA outperforms the uncoded NOMA at high signal-to-noise ratio (SNR).
△ Less
Submitted 20 December, 2019;
originally announced December 2019.
-
Cooperative Asynchronous Non-Orthogonal Multiple Access with Power Minimization Under QoS Constraints
Authors:
Xun Zou,
Mehdi Ganji,
Hamid Jafarkhani
Abstract:
Recent studies have demonstrated the superiority of non-orthogonal multiple access (NOMA) over orthogonal multiple access (OMA) in cooperative communication networks. In this paper, we propose a novel half-duplex cooperative asynchronous NOMA (C-ANOMA) framework with user relaying, where a timing mismatch is intentionally added in the broadcast signal. We derive the expressions for the individual…
▽ More
Recent studies have demonstrated the superiority of non-orthogonal multiple access (NOMA) over orthogonal multiple access (OMA) in cooperative communication networks. In this paper, we propose a novel half-duplex cooperative asynchronous NOMA (C-ANOMA) framework with user relaying, where a timing mismatch is intentionally added in the broadcast signal. We derive the expressions for the individual throughputs of the strong user (acts as relay) which employs the block-wise successive interference cancellation (SIC) and the weak user which combines the symbol-asynchronous signal with the interference-free signal. We analytically prove that in the C-ANOMA systems with a sufficiently large frame length, the strong user attains the same throughput to decode its own message while both users can achieve a higher throughput to decode the weak user's message compared with those in the cooperative NOMA (C-NOMA) systems. Besides, we obtain the optimal timing mismatch when the frame length goes to infinity. Furthermore, to exploit the trade-off between the power consumption of base station and that of the relay user, we solve a weighted sum power minimization problem under quality of services (QoS) constraints. Numerical results show that the C-ANOMA system can consume less power compared with the C-NOMA system to satisfy the same QoS requirements.
△ Less
Submitted 20 February, 2019;
originally announced February 2019.
-
A New Codebook Design for Analog Beamforming in Millimeter-wave Communication
Authors:
Mehdi Ganji,
Hongbing Cheng,
Qi Zhan,
Kee-Bong Song
Abstract:
In this study, we analyze the codebook design used for analog beamforming. Analog beamforming and combining suffer from a subspace sampling limitation, that is, the receiver cannot directly observe the channel coefficients; instead, the receiver observes a noisy version of their weighted combination. To resolve this, the transmitter and the receiver usually collaborate to determine the best beamfo…
▽ More
In this study, we analyze the codebook design used for analog beamforming. Analog beamforming and combining suffer from a subspace sampling limitation, that is, the receiver cannot directly observe the channel coefficients; instead, the receiver observes a noisy version of their weighted combination. To resolve this, the transmitter and the receiver usually collaborate to determine the best beamformer combiner pair during the beam-swee** process. This is done by evaluating a limited number of codewords chosen from a pre-defined codebook. In this study, we propose a new framework inspired by the generalized Lloyd algorithm to design analog beamforming codebooks that optimize various performance metrics including the average beamforming gain, the outage, and the average data rate. The flexibility of our framework enables us to design beamforming codebooks for any array shapes including uniform linear and planar arrays. The other practical complexity in analog beamforming is the low resolution of the phase shifters. Therefore, we have extended our algorithm to create quantized codebooks that outperform the existing codebooks in literature. We have also provided extensive simulations to verify the superiority of our proposed codebook as compared with the existing codebooks.
△ Less
Submitted 10 February, 2020; v1 submitted 2 February, 2019;
originally announced February 2019.
-
Novel Time Asynchronous NOMA schemes for Downlink Transmissions
Authors:
Mehdi Ganji,
Hamid Jafarkhani
Abstract:
In this work, we investigate the effect of time asynchrony in non-orthogonal multiple access (NOMA) schemes for downlink transmissions. First, we analyze the benefit of adding intentional timing offsets to the conventional power domain-NOMA (P-NOMA). This method which is called Asynchronous-Power Domain-NOMA (AP-NOMA) introduces artificial symbol-offsets between packets destined for different user…
▽ More
In this work, we investigate the effect of time asynchrony in non-orthogonal multiple access (NOMA) schemes for downlink transmissions. First, we analyze the benefit of adding intentional timing offsets to the conventional power domain-NOMA (P-NOMA). This method which is called Asynchronous-Power Domain-NOMA (AP-NOMA) introduces artificial symbol-offsets between packets destined for different users. It reduces the mutual interference which results in enlarging the achievable rate-region of the conventional P-NOMA. Then, we propose a precoding scheme which fully exploits the degrees of freedom provided by the time asynchrony. We call this multiple access scheme T-NOMA which provides higher degrees of freedom for users compared to the conventional P-NOMA or even the modified AP-NOMA. T-NOMA adopts a precoding at the base station and a linear preprocessing scheme at the receiving user which decomposes the broadcast channel into parallel channels circumventing the need for Successive Interference Cancellation (SIC). The numerical results show that T-NOMA outperforms AP-NOMA and both outperform the conventional P-NOMA. We also compare the maximum sum-rate and fairness provided by these methods. Moreover, the impact of pulse shape and symbol offset on the performance of AP-NOMA and T-NOMA schemes are investigated.
△ Less
Submitted 26 August, 2018;
originally announced August 2018.
-
On the Performance of MRC Receiver with Unknown Timing Mismatch-A Large Scale Analysis
Authors:
Mehdi Ganji,
Hamid Jafarkhani
Abstract:
There has been extensive research on large scale multi-user multiple-input multiple-output (MU-MIMO) systems recently. Researchers have shown that there are great opportunities in this area, however, there are many obstacles in the way to achieve full potential of using large number of receive antennas. One of the main issues, which will be investigated thoroughly in this paper, is timing asynchro…
▽ More
There has been extensive research on large scale multi-user multiple-input multiple-output (MU-MIMO) systems recently. Researchers have shown that there are great opportunities in this area, however, there are many obstacles in the way to achieve full potential of using large number of receive antennas. One of the main issues, which will be investigated thoroughly in this paper, is timing asynchrony among signals of different users. Most of the works in the literature, assume that received signals are perfectly aligned which is not practical. We show that, neglecting the asynchrony can significantly degrade the performance of existing designs, particularly maximum ratio combining (MRC). We quantify the uplink achievable rates obtained by MRC receiver with perfect channel state information (CSI) and imperfect CSI while the system is impaired by unknown time delays among received signals. We then use these results to design new algorithms in order to alleviate the effects of timing mismatch. We also analyze the performance of introduced receiver design, which is called MRC-ZF, with perfect and imperfect CSI. For performing MRC-ZF, the only required information is the distribution of timing mismatch which circumvents the necessity of time delay acquisition or synchronization. To verify our analytical results, we present extensive simulation results which thoroughly investigate the performance of the traditional MRC receiver and the introduced MRC-ZF receiver.
△ Less
Submitted 25 January, 2018; v1 submitted 30 March, 2017;
originally announced March 2017.
-
Interference Mitigation Using Asynchronous Transmission and Sampling Diversity
Authors:
Mehdi Ganji,
Hamid Jafarkhani
Abstract:
In this paper, we show that by investigating inherent time delays between different users in a multiuser scenario, we are able to cancel interference more efficiently. Time asynchrony provides another tool to cancel interference which results in preserving other resources like frequency, time and code. Therefore, we can save the invaluable resource of frequency band and also increase spectral effi…
▽ More
In this paper, we show that by investigating inherent time delays between different users in a multiuser scenario, we are able to cancel interference more efficiently. Time asynchrony provides another tool to cancel interference which results in preserving other resources like frequency, time and code. Therefore, we can save the invaluable resource of frequency band and also increase spectral efficiency. A sampling method is presented which results in independent noise samples and obviates the need for the complex process of noise whitening. By taking advantage of this sampling method and its unique structure, we implement maximum-likelihood sequence detection which outperforms synchronous maximum-likelihood detection. We also present successive interference cancellation with hard decision passing which gives rise to a novel forward-backward belief propagation method. Next, the performance of zero forcing detection is analyzed. Simulation results are also presented to verify our analysis.
△ Less
Submitted 22 September, 2016;
originally announced September 2016.