-
Gland Segmentation Via Dual Encoders and Boundary-Enhanced Attention
Authors:
Huadeng Wang,
Jiejiang Yu,
Bingbing Li,
Xipeng Pan,
Zhenbing Liu,
Rushi Lan,
Xiaonan Luo
Abstract:
Accurate and automated gland segmentation on pathological images can assist pathologists in diagnosing the malignancy of colorectal adenocarcinoma. However, due to various gland shapes, severe deformation of malignant glands, and overlap** adhesions between glands. Gland segmentation has always been very challenging. To address these problems, we propose a DEA model. This model consists of two b…
▽ More
Accurate and automated gland segmentation on pathological images can assist pathologists in diagnosing the malignancy of colorectal adenocarcinoma. However, due to various gland shapes, severe deformation of malignant glands, and overlap** adhesions between glands. Gland segmentation has always been very challenging. To address these problems, we propose a DEA model. This model consists of two branches: the backbone encoding and decoding network and the local semantic extraction network. The backbone encoding and decoding network extracts advanced Semantic features, uses the proposed feature decoder to restore feature space information, and then enhances the boundary features of the gland through boundary enhancement attention. The local semantic extraction network uses the pre-trained DeepLabv3+ as a Local semantic-guided encoder to realize the extraction of edge features. Experimental results on two public datasets, GlaS and CRAG, confirm that the performance of our method is better than other gland segmentation methods.
△ Less
Submitted 9 May, 2024; v1 submitted 29 January, 2024;
originally announced January 2024.
-
Towards an Accurate and Secure Detector against Adversarial Perturbations
Authors:
Chao Wang,
Shuren Qi,
Zhiqiu Huang,
Yushu Zhang,
Rushi Lan,
Xiaochun Cao
Abstract:
The vulnerability of deep neural networks to adversarial perturbations has been widely perceived in the computer vision community. From a security perspective, it poses a critical risk for modern vision systems, e.g., the popular Deep Learning as a Service (DLaaS) frameworks. For protecting off-the-shelf deep models while not modifying them, current algorithms typically detect adversarial patterns…
▽ More
The vulnerability of deep neural networks to adversarial perturbations has been widely perceived in the computer vision community. From a security perspective, it poses a critical risk for modern vision systems, e.g., the popular Deep Learning as a Service (DLaaS) frameworks. For protecting off-the-shelf deep models while not modifying them, current algorithms typically detect adversarial patterns through discriminative decomposition of natural-artificial data. However, these decompositions are biased towards frequency or spatial discriminability, thus failing to capture adversarial patterns comprehensively. More seriously, successful defense-aware (secondary) adversarial attack (i.e., evading the detector as well as fooling the model) is practical under the assumption that the adversary is fully aware of the detector (i.e., the Kerckhoffs's principle). Motivated by such facts, we propose an accurate and secure adversarial example detector, relying on a spatial-frequency discriminative decomposition with secret keys. It expands the above works on two aspects: 1) the introduced Krawtchouk basis provides better spatial-frequency discriminability and thereby is more suitable for capturing adversarial patterns than the common trigonometric or wavelet basis; 2) the extensive parameters for decomposition are generated by a pseudo-random function with secret keys, hence blocking the defense-aware adversarial attack. Theoretical and numerical analysis demonstrates the increased accuracy and security of our detector with respect to a number of state-of-the-art algorithms.
△ Less
Submitted 24 August, 2023; v1 submitted 18 May, 2023;
originally announced May 2023.
-
A novel dataset and a two-stage mitosis nuclei detection method based on hybrid anchor branch
Authors:
Huadeng Wang,
Hao Xu,
Bingbing Li,
Xipeng Pan,
Lingqi Zeng,
Rushi Lan,
Xiaonan Luo
Abstract:
Mitosis detection is one of the challenging problems in computational pathology, and mitotic count is an important index of cancer grading for pathologists. However, current counts of mitotic nuclei rely on pathologists looking microscopically at the number of mitotic nuclei in hot spots, which is subjective and time-consuming. In this paper, we propose a two-stage cascaded network, named FoCasNet…
▽ More
Mitosis detection is one of the challenging problems in computational pathology, and mitotic count is an important index of cancer grading for pathologists. However, current counts of mitotic nuclei rely on pathologists looking microscopically at the number of mitotic nuclei in hot spots, which is subjective and time-consuming. In this paper, we propose a two-stage cascaded network, named FoCasNet, for mitosis detection. In the first stage, a detection network named M_det is proposed to detect as many mitoses as possible. In the second stage, a classification network M_class is proposed to refine the results of the first stage. In addition, the attention mechanism, normalization method, and hybrid anchor branch classification subnet are introduced to improve the overall detection performance. Our method achieves the current highest F1-score of 0.888 on the public dataset ICPR 2012. We also evaluated our method on the GZMH dataset released by our research team for the first time and reached the highest F1-score of 0.563, which is also better than multiple classic detection networks widely used at present. It confirmed the effectiveness and generalization of our method. The code will be available at: https://github.com/antifen/mitosis-nuclei-detection.
△ Less
Submitted 18 January, 2023;
originally announced January 2023.
-
A Novel Dataset and a Deep Learning Method for Mitosis Nuclei Segmentation and Classification
Authors:
Huadeng Wang,
Zhipeng Liu,
Rushi Lan,
Zhenbing Liu,
Xiaonan Luo,
Xipeng Pan,
Bingbing Li
Abstract:
Mitosis nuclei count is one of the important indicators for the pathological diagnosis of breast cancer. The manual annotation needs experienced pathologists, which is very time-consuming and inefficient. With the development of deep learning methods, some models with good performance have emerged, but the generalization ability should be further strengthened. In this paper, we propose a two-stage…
▽ More
Mitosis nuclei count is one of the important indicators for the pathological diagnosis of breast cancer. The manual annotation needs experienced pathologists, which is very time-consuming and inefficient. With the development of deep learning methods, some models with good performance have emerged, but the generalization ability should be further strengthened. In this paper, we propose a two-stage mitosis segmentation and classification method, named SCMitosis. Firstly, the segmentation performance with a high recall rate is achieved by the proposed depthwise separable convolution residual block and channel-spatial attention gate. Then, a classification network is cascaded to further improve the detection performance of mitosis nuclei. The proposed model is verified on the ICPR 2012 dataset, and the highest F-score value of 0.8687 is obtained compared with the current state-of-the-art algorithms. In addition, the model also achieves good performance on GZMH dataset, which is prepared by our group and will be firstly released with the publication of this paper. The code will be available at: https://github.com/antifen/mitosis-nuclei-segmentation.
△ Less
Submitted 27 December, 2022;
originally announced December 2022.
-
Binary Representation via Jointly Personalized Sparse Hashing
Authors:
Xiaoqin Wang,
Chen Chen,
Rushi Lan,
Licheng Liu,
Zhenbing Liu,
Huiyu Zhou,
Xiaonan Luo
Abstract:
Unsupervised hashing has attracted much attention for binary representation learning due to the requirement of economical storage and efficiency of binary codes. It aims to encode high-dimensional features in the Hamming space with similarity preservation between instances. However, most existing methods learn hash functions in manifold-based approaches. Those methods capture the local geometric s…
▽ More
Unsupervised hashing has attracted much attention for binary representation learning due to the requirement of economical storage and efficiency of binary codes. It aims to encode high-dimensional features in the Hamming space with similarity preservation between instances. However, most existing methods learn hash functions in manifold-based approaches. Those methods capture the local geometric structures (i.e., pairwise relationships) of data, and lack satisfactory performance in dealing with real-world scenarios that produce similar features (e.g. color and shape) with different semantic information. To address this challenge, in this work, we propose an effective unsupervised method, namely Jointly Personalized Sparse Hashing (JPSH), for binary representation learning. To be specific, firstly, we propose a novel personalized hashing module, i.e., Personalized Sparse Hashing (PSH). Different personalized subspaces are constructed to reflect category-specific attributes for different clusters, adaptively map** instances within the same cluster to the same Hamming space. In addition, we deploy sparse constraints for different personalized subspaces to select important features. We also collect the strengths of the other clusters to build the PSH module with avoiding over-fitting. Then, to simultaneously preserve semantic and pairwise similarities in our JPSH, we incorporate the PSH and manifold-based hash learning into the seamless formulation. As such, JPSH not only distinguishes the instances from different clusters, but also preserves local neighborhood structures within the cluster. Finally, an alternating optimization algorithm is adopted to iteratively capture analytical solutions of the JPSH model. Extensive experiments on four benchmark datasets verify that the JPSH outperforms several hashing algorithms on the similarity search task.
△ Less
Submitted 31 August, 2022;
originally announced August 2022.
-
Online Discovery of Evolving Groups over Massive-Scale Trajectory Streams
Authors:
Yanwei Yu,
Ruoshan Lan,
Lei Cao,
Peng Song,
Yingjie Wang
Abstract:
The increasing pervasiveness of object tracking technologies leads to huge volumes of spatiotemporal data collected in the form of trajectory streams. The discovery of useful group patterns from moving objects' movement behaviours in trajectory streams is critical for real-time applications ranging from transportation management to military surveillance. Motivated by this, we first propose a novel…
▽ More
The increasing pervasiveness of object tracking technologies leads to huge volumes of spatiotemporal data collected in the form of trajectory streams. The discovery of useful group patterns from moving objects' movement behaviours in trajectory streams is critical for real-time applications ranging from transportation management to military surveillance. Motivated by this, we first propose a novel pattern, called evolving group, which models the unusual group events of moving objects that travel together within density connected clusters in evolving streaming trajectories. Our theoretical analysis and empirical study on the Osaka Pedestrian data and Bei**g Taxi data demonstrate its effectiveness in capturing the development, evolution, and trend of group events of moving objects in streaming context. Moreover, we propose a discovery method that efficiently supports online detection of evolving groups over massive-scale trajectory streams using a sliding window. It contains three phases along with a set of novel optimization techniques designed to minimize the computation costs. Furthermore, to scale to huge workloads over evolving streams, we extend our discovery method to a parallel framework by using a sector-based partition. Our comprehensive empirical study demonstrates that our online discovery framework is effective and efficient on real-world high-volume trajectory streams.
△ Less
Submitted 12 August, 2022;
originally announced August 2022.
-
Metaverse: Security and Privacy Concerns
Authors:
Ruoyu Zhao,
Yushu Zhang,
Youwen Zhu,
Rushi Lan,
Zhongyun Hua
Abstract:
The term "metaverse", a three-dimensional virtual universe similar to the real realm, has always been full of imagination since it was put forward in the 1990s. Recently, it is possible to realize the metaverse with the continuous emergence and progress of various technologies, and thus it has attracted extensive attention again. It may bring a lot of benefits to human society such as reducing dis…
▽ More
The term "metaverse", a three-dimensional virtual universe similar to the real realm, has always been full of imagination since it was put forward in the 1990s. Recently, it is possible to realize the metaverse with the continuous emergence and progress of various technologies, and thus it has attracted extensive attention again. It may bring a lot of benefits to human society such as reducing discrimination, eliminating individual differences, and socializing. However, everything has security and privacy concerns, which is no exception for the metaverse. In this article, we firstly analyze the concept of the metaverse and propose that it is a super virtual-reality (VR) ecosystem compared with other VR technologies. Then, we carefully analyze and elaborate on possible security and privacy concerns from four perspectives: user information, communication, scenario, and goods, and immediately, the potential solutions are correspondingly put forward. Meanwhile, we propose the need to take advantage of the new buckets effect to comprehensively address security and privacy concerns from a philosophical perspective, which hopefully will bring some progress to the metaverse community.
△ Less
Submitted 18 June, 2023; v1 submitted 8 March, 2022;
originally announced March 2022.
-
Horizon: A Gas-Efficient, Trustless Bridge for Cross-Chain Transactions
Authors:
Rongjian Lan,
Ganesha Upadhyaya,
Stephen Tse,
Mahdi Zamani
Abstract:
With the rise of digital currency systems that rely on blockchain to ensure ledger security, the ability to perform cross-chain transactions is becoming a crucial interoperability requirement. Such transactions allow not only funds to be transferred from one blockchain to another (as done in atomic swaps), but also a blockchain to verify the inclusion of any event on another blockchain. Cross-chai…
▽ More
With the rise of digital currency systems that rely on blockchain to ensure ledger security, the ability to perform cross-chain transactions is becoming a crucial interoperability requirement. Such transactions allow not only funds to be transferred from one blockchain to another (as done in atomic swaps), but also a blockchain to verify the inclusion of any event on another blockchain. Cross-chain bridges are protocols that allow on-chain exchange of cryptocurrencies, on-chain transfer of assets to sidechains, and cross-shard verification of events in sharded blockchains, many of which rely on Byzantine fault tolerance (BFT) for scalability. Unfortunately, existing bridge protocols that can transfer funds from a BFT blockchain incur significant computation overhead on the destination blockchain, resulting in a high gas cost for smart contract verification of events. In this paper, we propose Horizon, a gas-efficient, cross-chain bridge protocol to transfer assets from a BFT blockchain to another blockchain (e.g., Ethereum) that supports basic smart contract execution.
△ Less
Submitted 15 January, 2021;
originally announced January 2021.
-
Towards Scalable Distributed Training of Deep Learning on Public Cloud Clusters
Authors:
Shaohuai Shi,
Xianhao Zhou,
Shutao Song,
Xingyao Wang,
Zilin Zhu,
Xue Huang,
Xinan Jiang,
Feihu Zhou,
Zhenyu Guo,
Liqiang Xie,
Rui Lan,
Xianbin Ouyang,
Yan Zhang,
Jieqian Wei,
**g Gong,
Weiliang Lin,
** Gao,
Peng Meng,
Xiaomin Xu,
Chenyang Guo,
Bo Yang,
Zhibo Chen,
Yongjian Wu,
Xiaowen Chu
Abstract:
Distributed training techniques have been widely deployed in large-scale deep neural networks (DNNs) training on dense-GPU clusters. However, on public cloud clusters, due to the moderate inter-connection bandwidth between instances, traditional state-of-the-art distributed training systems cannot scale well in training large-scale models. In this paper, we propose a new computing and communicatio…
▽ More
Distributed training techniques have been widely deployed in large-scale deep neural networks (DNNs) training on dense-GPU clusters. However, on public cloud clusters, due to the moderate inter-connection bandwidth between instances, traditional state-of-the-art distributed training systems cannot scale well in training large-scale models. In this paper, we propose a new computing and communication efficient top-k sparsification communication library for distributed training. To further improve the system scalability, we optimize I/O by proposing a simple yet efficient multi-level data caching mechanism and optimize the update operation by introducing a novel parallel tensor operator. Experimental results on a 16-node Tencent Cloud cluster (each node with 8 Nvidia Tesla V100 GPUs) show that our system achieves 25%-40% faster than existing state-of-the-art systems on CNNs and Transformer. We finally break the record on DAWNBench on training ResNet-50 to 93% top-5 accuracy on ImageNet.
△ Less
Submitted 20 October, 2020;
originally announced October 2020.
-
AIM 2020 Challenge on Efficient Super-Resolution: Methods and Results
Authors:
Kai Zhang,
Martin Danelljan,
Yawei Li,
Radu Timofte,
Jie Liu,
Jie Tang,
Gangshan Wu,
Yu Zhu,
Xiangyu He,
Wenjie Xu,
Chenghua Li,
Cong Leng,
Jian Cheng,
Guangyang Wu,
Wenyi Wang,
Xiaohong Liu,
Hengyuan Zhao,
Xiangtao Kong,
**gwen He,
Yu Qiao,
Chao Dong,
Xiaotong Luo,
Liang Chen,
Jiangtao Zhang,
Maitreya Suin
, et al. (60 additional authors not shown)
Abstract:
This paper reviews the AIM 2020 challenge on efficient single image super-resolution with focus on the proposed solutions and results. The challenge task was to super-resolve an input image with a magnification factor x4 based on a set of prior examples of low and corresponding high resolution images. The goal is to devise a network that reduces one or several aspects such as runtime, parameter co…
▽ More
This paper reviews the AIM 2020 challenge on efficient single image super-resolution with focus on the proposed solutions and results. The challenge task was to super-resolve an input image with a magnification factor x4 based on a set of prior examples of low and corresponding high resolution images. The goal is to devise a network that reduces one or several aspects such as runtime, parameter count, FLOPs, activations, and memory consumption while at least maintaining PSNR of MSRResNet. The track had 150 registered participants, and 25 teams submitted the final results. They gauge the state-of-the-art in efficient single image super-resolution.
△ Less
Submitted 15 September, 2020;
originally announced September 2020.
-
Distributed Equivalent Substitution Training for Large-Scale Recommender Systems
Authors:
Haidong Rong,
Yangzihao Wang,
Feihu Zhou,
Junjie Zhai,
Haiyang Wu,
Rui Lan,
Fan Li,
Han Zhang,
Yuekui Yang,
Zhenyu Guo,
Di Wang
Abstract:
We present Distributed Equivalent Substitution (DES) training, a novel distributed training framework for large-scale recommender systems with dynamic sparse features. DES introduces fully synchronous training to large-scale recommendation system for the first time by reducing communication, thus making the training of commercial recommender systems converge faster and reach better CTR. DES requir…
▽ More
We present Distributed Equivalent Substitution (DES) training, a novel distributed training framework for large-scale recommender systems with dynamic sparse features. DES introduces fully synchronous training to large-scale recommendation system for the first time by reducing communication, thus making the training of commercial recommender systems converge faster and reach better CTR. DES requires much less communication by substituting the weights-rich operators with the computationally equivalent sub-operators and aggregating partial results instead of transmitting the huge sparse weights directly through the network. Due to the use of synchronous training on large-scale Deep Learning Recommendation Models (DLRMs), DES achieves higher AUC(Area Under ROC). We successfully apply DES training on multiple popular DLRMs of industrial scenarios. Experiments show that our implementation outperforms the state-of-the-art PS-based training framework, achieving up to 68.7% communication savings and higher throughput compared to other PS-based recommender systems.
△ Less
Submitted 30 May, 2020; v1 submitted 10 September, 2019;
originally announced September 2019.
-
Blockchain and human episodic memory
Authors:
Seong Hah Cho,
Cody A Cushing,
Kunal Patel,
Alok Kothari,
Rongjian Lan,
Matthias Michel,
Mouslim Cherkaoui,
Hakwan Lau
Abstract:
We relate the concepts used in decentralized ledger technology to studies of episodic memory in the mammalian brain. Specifically, we introduce the standard concepts of linked list, hash functions, and sharding, from computer science. We argue that these concepts may be more relevant to studies of the neural mechanisms of memory than has been previously appreciated. In turn, we also highlight that…
▽ More
We relate the concepts used in decentralized ledger technology to studies of episodic memory in the mammalian brain. Specifically, we introduce the standard concepts of linked list, hash functions, and sharding, from computer science. We argue that these concepts may be more relevant to studies of the neural mechanisms of memory than has been previously appreciated. In turn, we also highlight that certain phenomena studied in the brain, namely metacognition, reality monitoring, and how perceptual conscious experiences come about, may inspire development in blockchain technology too, specifically regarding probabilistic consensus protocols.
△ Less
Submitted 16 April, 2019; v1 submitted 5 November, 2018;
originally announced November 2018.
-
Achieving Large Multiplexing Gain in Distributed Antenna Systems via Cooperation with pCell Technology
Authors:
Antonio Forenza,
Stephen Perlman,
Fadi Saibi,
Mario Di Dio,
Roger van der Laan,
Giuseppe Caire
Abstract:
In this paper we present pCellTM technology, the first commercial-grade wireless system that employs cooperation between distributed transceiver stations to create concurrent data links to multiple users in the same spectrum. First we analyze the per-user signal-to-interference-plus-noise ratio (SINR) employing a geometrical spatial channel model to define volumes in space of coherent signal aroun…
▽ More
In this paper we present pCellTM technology, the first commercial-grade wireless system that employs cooperation between distributed transceiver stations to create concurrent data links to multiple users in the same spectrum. First we analyze the per-user signal-to-interference-plus-noise ratio (SINR) employing a geometrical spatial channel model to define volumes in space of coherent signal around user antennas (or personal cells, i.e., pCells). Then we describe the system architecture consisting of a general-purpose-processor (GPP) based software-defined radio (SDR) wireless platform implementing a real-time LTE protocol stack to communicate with off-the-shelf LTE devices. Finally we present experimental results demonstrating up to 16 concurrent spatial channels for an aggregate average spectral efficiency of 59.3 bps/Hz in the downlink and 27.5 bps/Hz in the uplink, providing data rates of 200 Mbps downlink and 25 Mbps uplink in 5 MHz of TDD spectrum.
△ Less
Submitted 22 January, 2016;
originally announced January 2016.