-
(Mis)align: A Simple Dynamic Framework for Modeling Interpersonal Coordination
Authors:
Grace Qiyuan Miao,
Rick Dale,
Alexia Galati
Abstract:
As people coordinate in daily interactions, they engage in different patterns of behavior to achieve successful outcomes. This includes both synchrony - the temporal coordination of the same behaviors at the same time - and complementarity - the coordination of the same or different behaviors that may occur at different relative times. Using computational methods, we develop a simple framework to…
▽ More
As people coordinate in daily interactions, they engage in different patterns of behavior to achieve successful outcomes. This includes both synchrony - the temporal coordination of the same behaviors at the same time - and complementarity - the coordination of the same or different behaviors that may occur at different relative times. Using computational methods, we develop a simple framework to describe the interpersonal dynamics of behavioral synchrony and complementarity over time, and explore their task dependence. A key feature of this framework is the inclusion of a task context that mediates interactions, and consists of active, inactive, and inhibitory constraints on communication. Initial simulation results show that these task constraints can be a robust predictor of simulated agents' behaviors over time. We also show that the framework can reproduce some general patterns observed in human interaction data. We describe preliminary theoretical implications from these results, and relate them to broader proposals of synergistic self-organization in communication.
△ Less
Submitted 30 August, 2023;
originally announced August 2023.
-
Real-time privacy preserving disease diagnosis using ECG signal
Authors:
Guanhong Miao,
A. Adam Ding,
Samuel S. Wu
Abstract:
The rapid development in Internet of Medical Things (IoMT) boosts the opportunity for real-time health monitoring using various data types such as electroencephalography (EEG) and electrocardiography (ECG). Security issues have significantly impeded the e-healthcare system implementation. Three important challenges for privacy preserving system need to be addressed: accurate diagnosis, privacy pro…
▽ More
The rapid development in Internet of Medical Things (IoMT) boosts the opportunity for real-time health monitoring using various data types such as electroencephalography (EEG) and electrocardiography (ECG). Security issues have significantly impeded the e-healthcare system implementation. Three important challenges for privacy preserving system need to be addressed: accurate diagnosis, privacy protection without compromising accuracy, and computation efficiency. It is essential to guarantee prediction accuracy since disease diagnosis is strongly related to health and life. By implementing matrix encryption method, we propose a real-time disease diagnosis scheme using support vector machine (SVM). A biomedical signal provided by the client is diagnosed such that the server does not get any information about the signal as well as the final result of the diagnosis while the proposed scheme also achieves confidentiality of the SVM classifier and the server's medical data. The proposed scheme has no accuracy degradation. Experiments on real-world data illustrate the high efficiency of the proposed scheme. It takes less than 1 second to derive the disease diagnosis result using a device with 4Gb RAMs, suggesting the feasibility to implement real-time privacy preserving health monitoring.
△ Less
Submitted 22 March, 2023; v1 submitted 8 February, 2022;
originally announced February 2022.
-
Efficient Privacy Preserving Logistic Regression for Horizontally Distributed Data
Authors:
Guanhong Miao
Abstract:
Internet of Things devices are expanding rapidly and generating huge amount of data. There is an increasing need to explore data collected from these devices. Collaborative learning provides a strategic solution for the Internet of Things settings but also raises public concern over data privacy. In recent years, large amount of privacy preserving techniques have been developed based on secure mul…
▽ More
Internet of Things devices are expanding rapidly and generating huge amount of data. There is an increasing need to explore data collected from these devices. Collaborative learning provides a strategic solution for the Internet of Things settings but also raises public concern over data privacy. In recent years, large amount of privacy preserving techniques have been developed based on secure multi-party computation and differential privacy. A major challenge of collaborative learning is to balance disclosure risk and data utility while maintaining high computation efficiency. In this paper, we proposed privacy preserving logistic regression model using matrix encryption approach. The secure scheme is resilient to chosen plaintext attack, known plaintext attack, and collusion attack that could compromise any agencies in the collaborative learning. Encrypted model estimate is decrypted to provide true model results with no accuracy degradation. Verification phase is implemented to examine dishonest behavior among agencies. Experimental evaluations demonstrate fast convergence rate and high efficiency of proposed scheme.
△ Less
Submitted 19 July, 2022; v1 submitted 5 February, 2022;
originally announced February 2022.
-
Linear Model Against Malicious Adversaries with Local Differential Privacy
Authors:
Guanhong Miao,
A. Adam Ding,
Samuel S. Wu
Abstract:
Scientific collaborations benefit from collaborative learning of distributed sources, but remain difficult to achieve when data are sensitive. In recent years, privacy preserving techniques have been widely studied to analyze distributed data across different agencies while protecting sensitive information. Most existing privacy preserving techniques are designed to resist semi-honest adversaries…
▽ More
Scientific collaborations benefit from collaborative learning of distributed sources, but remain difficult to achieve when data are sensitive. In recent years, privacy preserving techniques have been widely studied to analyze distributed data across different agencies while protecting sensitive information. Most existing privacy preserving techniques are designed to resist semi-honest adversaries and require intense computation to perform data analysis. Secure collaborative learning is significantly difficult with the presence of malicious adversaries who may deviates from the secure protocol. Another challenge is to maintain high computation efficiency with privacy protection. In this paper, matrix encryption is applied to encrypt data such that the secure schemes are against malicious adversaries, including chosen plaintext attack, known plaintext attack, and collusion attack. The encryption scheme also achieves local differential privacy. Moreover, cross validation is studied to prevent overfitting without additional communication cost. Empirical experiments on real-world datasets demonstrate that the proposed schemes are computationally efficient compared to existing techniques against malicious adversary and semi-honest model.
△ Less
Submitted 28 June, 2022; v1 submitted 4 February, 2022;
originally announced February 2022.
-
Reducing Noise Level in Differential Privacy through Matrix Masking
Authors:
A. Adam Ding,
Samuel S. Wu,
Guanhong Miao,
Shigang Chen
Abstract:
Differential privacy schemes have been widely adopted in recent years to address issues of data privacy protection. We propose a new Gaussian scheme combining with another data protection technique, called random orthogonal matrix masking, to achieve $(\varepsilon, δ)$-differential privacy (DP) more efficiently. We prove that the additional matrix masking significantly reduces the rate of noise va…
▽ More
Differential privacy schemes have been widely adopted in recent years to address issues of data privacy protection. We propose a new Gaussian scheme combining with another data protection technique, called random orthogonal matrix masking, to achieve $(\varepsilon, δ)$-differential privacy (DP) more efficiently. We prove that the additional matrix masking significantly reduces the rate of noise variance required in the Gaussian scheme to achieve $(\varepsilon, δ)-$DP in big data setting. Specifically, when $\varepsilon \to 0$, $δ\to 0$, and the sample size $n$ exceeds the number $p$ of attributes by $(n-p)=O(ln(1/δ))$, the required additive noise variance to achieve $(\varepsilon, δ)$-DP is reduced from $O(ln(1/δ)/\varepsilon^2)$ to $O(1/\varepsilon)$. With much less noise added, the resulting differential privacy protected pseudo data sets allow much more accurate inferences, thus can significantly improve the scope of application for differential privacy.
△ Less
Submitted 11 April, 2023; v1 submitted 11 January, 2022;
originally announced January 2022.
-
The SLT 2021 children speech recognition challenge: Open datasets, rules and baselines
Authors:
Fan Yu,
Zhuoyuan Yao,
Xiong Wang,
Keyu An,
Lei Xie,
Zhijian Ou,
Bo Liu,
Xiulin Li,
Guanqiong Miao
Abstract:
Automatic speech recognition (ASR) has been significantly advanced with the use of deep learning and big data. However improving robustness, including achieving equally good performance on diverse speakers and accents, is still a challenging problem. In particular, the performance of children speech recognition (CSR) still lags behind due to 1) the speech and language characteristics of children's…
▽ More
Automatic speech recognition (ASR) has been significantly advanced with the use of deep learning and big data. However improving robustness, including achieving equally good performance on diverse speakers and accents, is still a challenging problem. In particular, the performance of children speech recognition (CSR) still lags behind due to 1) the speech and language characteristics of children's voice are substantially different from those of adults and 2) sizable open dataset for children speech is still not available in the research community. To address these problems, we launch the Children Speech Recognition Challenge (CSRC), as a flagship satellite event of IEEE SLT 2021 workshop. The challenge will release about 400 hours of Mandarin speech data for registered teams and set up two challenge tracks and provide a common testbed to benchmark the CSR performance. In this paper, we introduce the datasets, rules, evaluation method as well as baselines.
△ Less
Submitted 16 November, 2020; v1 submitted 12 November, 2020;
originally announced November 2020.
-
Latency-Energy Tradeoff based on Channel Scheduling and Repetitions in NB-IoT Systems
Authors:
Amin Azari,
Guowang Miao,
Cedomir Stefanovic,
Petar Popovski
Abstract:
Narrowband IoT (NB-IoT) is the latest IoT connectivity solution presented by the 3GPP. NB-IoT introduces coverage classes and introduces a significant link budget improvement by allowing repeated transmissions by nodes that experience high path loss. However, those repetitions necessarily increase the energy consumption and the latency in the whole NB-IoT system. The extent to which the whole syst…
▽ More
Narrowband IoT (NB-IoT) is the latest IoT connectivity solution presented by the 3GPP. NB-IoT introduces coverage classes and introduces a significant link budget improvement by allowing repeated transmissions by nodes that experience high path loss. However, those repetitions necessarily increase the energy consumption and the latency in the whole NB-IoT system. The extent to which the whole system is affected depends on the scheduling of the uplink and downlink channels. We address this question, not treated previously, by develo** a tractable model of NB-IoT access protocol operation, comprising message exchanges in random-access, control, and data channels, both in the uplink and downlink. The model is then used to analyze the impact of channel scheduling as well as the interaction of coexisting coverage classes, through derivation of the expected latency and battery lifetime for each coverage class. These results are subsequently employed in investigation of latency-energy tradeoff in NB-IoT channel scheduling as well as determining the optimized operation points. Simulations results show validity of the analysis and confirm that there is a significant impact of channel scheduling on latency and lifetime performance of NBIoT devices.
△ Less
Submitted 15 July, 2018;
originally announced July 2018.
-
On Improving Deep Reinforcement Learning for POMDPs
Authors:
Pengfei Zhu,
Xin Li,
Pascal Poupart,
Guanghui Miao
Abstract:
Deep Reinforcement Learning (RL) recently emerged as one of the most competitive approaches for learning in sequential decision making problems with fully observable environments, e.g., computer Go. However, very little work has been done in deep RL to handle partially observable environments. We propose a new architecture called Action-specific Deep Recurrent Q-Network (ADRQN) to enhance learning…
▽ More
Deep Reinforcement Learning (RL) recently emerged as one of the most competitive approaches for learning in sequential decision making problems with fully observable environments, e.g., computer Go. However, very little work has been done in deep RL to handle partially observable environments. We propose a new architecture called Action-specific Deep Recurrent Q-Network (ADRQN) to enhance learning performance in partially observable domains. Actions are encoded by a fully connected layer and coupled with a convolutional observation to form an action-observation pair. The time series of action-observation pairs are then integrated by an LSTM layer that learns latent states based on which a fully connected layer computes Q-values as in conventional Deep Q-Networks (DQNs). We demonstrate the effectiveness of our new architecture in several partially observable domains, including flickering Atari games.
△ Less
Submitted 8 May, 2018; v1 submitted 17 April, 2018;
originally announced April 2018.
-
Network Lifetime Maximization for Cellular-Based M2M Networks
Authors:
Amin Azari,
Guowang Miao
Abstract:
High energy efficiency is critical for enabling massive machine-type communications (MTC) over cellular networks. This work is devoted to energy consumption modeling, battery lifetime analysis, lifetime-aware scheduling and transmit power control for massive MTC over cellular networks. We consider a realistic energy consumption model for MTC and model network battery-lifetime. Analytic expressions…
▽ More
High energy efficiency is critical for enabling massive machine-type communications (MTC) over cellular networks. This work is devoted to energy consumption modeling, battery lifetime analysis, lifetime-aware scheduling and transmit power control for massive MTC over cellular networks. We consider a realistic energy consumption model for MTC and model network battery-lifetime. Analytic expressions are derived to demonstrate the impact of scheduling on both the individual and network battery lifetimes. The derived expressions are subsequently employed in the uplink scheduling and transmit power control for mixed-priority MTC traffic in order to maximize the network lifetime. Besides the main solutions, low-complexity solutions with limited feedback requirement are investigated, and the results are extended to existing LTE networks. Also, the energy efficiency, spectral efficiency, and network lifetime tradeoffs in resource provisioning and scheduling for MTC over cellular networks are investigated. The simulation results show that the proposed solutions can provide substantial network lifetime improvement and network maintenance cost reduction
△ Less
Submitted 19 February, 2018;
originally announced February 2018.
-
Grant-Free Radio Access for Short-Packet Communications over 5G Networks
Authors:
Amin Azari,
Petar Popovski,
Guowang Miao,
Cedomir Stefanovic
Abstract:
Radio access management plays a vital role in delay and energy consumption of connected devices. The radio access in existing cellular networks is unable to efficiently support massive connectivity, due to its signaling overhead. In this paper, we investigate an asynchronous grant-free narrowband data transmission protocol that aims to provide low energy consumption and delay, by relaxing the sync…
▽ More
Radio access management plays a vital role in delay and energy consumption of connected devices. The radio access in existing cellular networks is unable to efficiently support massive connectivity, due to its signaling overhead. In this paper, we investigate an asynchronous grant-free narrowband data transmission protocol that aims to provide low energy consumption and delay, by relaxing the synchronization/reservation requirement at the cost of sending several packet copies at the transmitter side and more complex signal processing at the receiver side. Specifically, the timing and frequency offsets, as well as sending of multiple replicas of the same packet, are exploited as form of diversities at the receiver-side to trigger successive interference cancellation. The proposed scheme is investigated by deriving closed-form expressions for key performance indicators, including reliability and battery-lifetime. The performance evaluation indicates that the scheme can be tuned to realize long battery lifetime radio access for low-complexity devices. The obtained results indicate existence of traffic load regions, where synchronous access outperforms asynchronous access and vice versa.
△ Less
Submitted 7 September, 2017;
originally announced September 2017.
-
On Improving Deep Reinforcement Learning for POMDPs
Authors:
Pengfei Zhu,
Xin Li,
Pascal Poupart,
Guanghui Miao
Abstract:
Deep Reinforcement Learning (RL) recently emerged as one of the most competitive approaches for learning in sequential decision making problems with fully observable environments, e.g., computer Go. However, very little work has been done in deep RL to handle partially observable environments. We propose a new architecture called Action-specific Deep Recurrent Q-Network (ADRQN) to enhance learning…
▽ More
Deep Reinforcement Learning (RL) recently emerged as one of the most competitive approaches for learning in sequential decision making problems with fully observable environments, e.g., computer Go. However, very little work has been done in deep RL to handle partially observable environments. We propose a new architecture called Action-specific Deep Recurrent Q-Network (ADRQN) to enhance learning performance in partially observable domains. Actions are encoded by a fully connected layer and coupled with a convolutional observation to form an action-observation pair. The time series of action-observation pairs are then integrated by an LSTM layer that learns latent states based on which a fully connected layer computes Q-values as in conventional Deep Q-Networks (DQNs). We demonstrate the effectiveness of our new architecture in several partially observable domains, including flickering Atari games.
△ Less
Submitted 24 May, 2018; v1 submitted 26 April, 2017;
originally announced April 2017.
-
$E^2$-MAC: Energy Efficient Medium Access for Massive M2M Communications
Authors:
Guowang Miao,
Amin Azari,
Taewon Hwang
Abstract:
In this paper, we investigate energy-efficient clustering and medium access control (MAC) for cellular-based M2M networks to minimize device energy consumption and prolong network battery lifetime. First, we present an accurate energy consumption model that considers both static and dynamic energy consumptions, and utilize this model to derive the network lifetime. Second, we find the cluster size…
▽ More
In this paper, we investigate energy-efficient clustering and medium access control (MAC) for cellular-based M2M networks to minimize device energy consumption and prolong network battery lifetime. First, we present an accurate energy consumption model that considers both static and dynamic energy consumptions, and utilize this model to derive the network lifetime. Second, we find the cluster size to maximize the network lifetime and develop an energy-efficient cluster-head selection scheme. Furthermore, we find feasible regions where clustering is beneficial in enhancing network lifetime. We further investigate communications protocols for both intra- and inter-cluster communications. While inter-cluster communications use conventional cellular access schemes, we develop an energy-efficient and load-adaptive multiple access scheme, called n-phase CSMA/CA, which provides a tunable tradeoff between energy efficiency, delay, and spectral efficiency of the network. The simulation results show that the proposed clustering, cluster-head selection, and communications protocol design outperform the others in energy saving and significantly prolong the lifetimes of both individual nodes and the whole M2M network.
△ Less
Submitted 24 August, 2016;
originally announced August 2016.
-
Scalable Device-to-Device Communications For Frequency Reuse >> 1
Authors:
Daniel Verenzuela,
Guowang Miao
Abstract:
Proximity based applications are becoming fast growing markets suggesting that Device-to-Device (D2D) communications is becoming an essential part of future mobile data networks. We propose scalable admission and power control methods for D2D communications underlay cellular networks to increase the reuse of frequency resources and thus network capacity while maintaining QoS to all users. The aim…
▽ More
Proximity based applications are becoming fast growing markets suggesting that Device-to-Device (D2D) communications is becoming an essential part of future mobile data networks. We propose scalable admission and power control methods for D2D communications underlay cellular networks to increase the reuse of frequency resources and thus network capacity while maintaining QoS to all users. The aim of the proposed methods is to maximize the number of D2D links under QoS constraints, therefore maximizing network frequency reuse, while considering different levels of complexity and available channel state information (CSI) in a multi-cell environment. Numerical results show that by using D2D and the proposed multi-cell interference coordination and low power transmission method, the network spectral efficiency can be increased by as much as ten times, while low outage probability can be assured to provided QoS for all users.
△ Less
Submitted 18 October, 2016; v1 submitted 2 May, 2016;
originally announced May 2016.
-
Backhaul-Aware User Association and Resource Allocation for Energy-Constrained HetNets
Authors:
Qiaoni Han,
Bo Yang,
Guowang Miao,
Cailian Chen,
Xiaocheng Wang,
** Guan
Abstract:
Growing attentions have been paid to renewable energy or hybrid energy powered heterogeneous networks (HetNets). In this paper, focusing on backhaul-aware joint user association and resource allocation for this type of HetNets, we formulate an online optimization problem to maximize the network utility reflecting proportional fairness. Since user association and resource allocation are tightly cou…
▽ More
Growing attentions have been paid to renewable energy or hybrid energy powered heterogeneous networks (HetNets). In this paper, focusing on backhaul-aware joint user association and resource allocation for this type of HetNets, we formulate an online optimization problem to maximize the network utility reflecting proportional fairness. Since user association and resource allocation are tightly coupled not only on resource consumption of the base stations (BSs), but also in the constraints of their available energy and backhaul, the closed-form solution is quite difficult to obtain. Thus, we solve the problem distributively via employing some decomposition methods. Specifically, at first, by adopting primal decomposition method, we decompose the original problem into a lower-level resource allocation problem for each BS, and a higher-level user association problem. For the optimal resource allocation, we prove that a BS either assigns equal normalized resources or provides equal long-term service rate to its served users. Then, the user association problem is solved by Lagrange dual decomposition method, and a completely distributed algorithm is developed. Moreover, applying results of the subgradient method, we demonstrate the convergence of the proposed distributed algorithm. Furthermore, in order to efficiently and reliably apply the proposed algorithm to the future wireless networks with an extremely dense BS deployment, we design a virtual user association and resource allocation scheme based on the software-defined networking architecture. Lastly, numerical results validate the convergence of the proposed algorithm and the significant improvement on network utility, load balancing and user fairness.
△ Less
Submitted 8 March, 2016; v1 submitted 14 April, 2015;
originally announced April 2015.