-
Penalized Deep Partially Linear Cox Models with Application to CT Scans of Lung Cancer Patients
Authors:
Yuming Sun,
Jian Kang,
Chinmay Haridas,
Nicholas R. Mayne,
Alexandra L. Potter,
Chi-Fu Jeffrey Yang,
David C. Christiani,
Yi Li
Abstract:
Lung cancer is a leading cause of cancer mortality globally, highlighting the importance of understanding its mortality risks to design effective patient-centered therapies. The National Lung Screening Trial (NLST) employed computed tomography texture analysis, which provides objective measurements of texture patterns on CT scans, to quantify the mortality risks of lung cancer patients. Partially…
▽ More
Lung cancer is a leading cause of cancer mortality globally, highlighting the importance of understanding its mortality risks to design effective patient-centered therapies. The National Lung Screening Trial (NLST) employed computed tomography texture analysis, which provides objective measurements of texture patterns on CT scans, to quantify the mortality risks of lung cancer patients. Partially linear Cox models have gained popularity for survival analysis by dissecting the hazard function into parametric and nonparametric components, allowing for the effective incorporation of both well-established risk factors (such as age and clinical variables) and emerging risk factors (e.g., image features) within a unified framework. However, when the dimension of parametric components exceeds the sample size, the task of model fitting becomes formidable, while nonparametric modeling grapples with the curse of dimensionality. We propose a novel Penalized Deep Partially Linear Cox Model (Penalized DPLC), which incorporates the SCAD penalty to select important texture features and employs a deep neural network to estimate the nonparametric component of the model. We prove the convergence and asymptotic properties of the estimator and compare it to other methods through extensive simulation studies, evaluating its performance in risk prediction and feature selection. The proposed method is applied to the NLST study dataset to uncover the effects of key clinical and imaging risk factors on patients' survival. Our findings provide valuable insights into the relationship between these factors and survival outcomes.
△ Less
Submitted 29 September, 2023; v1 submitted 9 March, 2023;
originally announced March 2023.
-
Biocybersecurity -- A Converging Threat as an Auxiliary to War
Authors:
Lucas Potter,
Orlando Ayala,
Xavier-Lewis Palmer
Abstract:
Biodefense is the discipline of ensuring biosecurity with respect to select groups of organisms and limiting their spread. This field has increasingly been challenged by novel threats from nature that have been weaponized such as SARS, Anthrax, and similar pathogens, but has emerged victorious through collaboration of national and world health groups. However, it may come under additional stress i…
▽ More
Biodefense is the discipline of ensuring biosecurity with respect to select groups of organisms and limiting their spread. This field has increasingly been challenged by novel threats from nature that have been weaponized such as SARS, Anthrax, and similar pathogens, but has emerged victorious through collaboration of national and world health groups. However, it may come under additional stress in the 21st century as the field intersects with the cyberworld -- a world where governments have already been struggling to keep up with cyber attacks from small to state-level actors as cyberthreats have been relied on to level the playing field in international disputes. Disruptions to military logistics and economies through cyberattacks have been able to be done at a mere fraction of economic and moral costs through conventional military means, making it an increasingly tempting means of disruption. In the field of biocybersecurity (BCS), the strengths within biotechnology and cybersecurity merge, along with many of their vulnerabilities, and this could spell increased trouble for biodefense, as novel threats can be synthesized and disseminated in ways that fuse the routes of attacks seen in biosecurity and cybersecurity. Herein, we offer an exploration of how threats in the domain of biocybersecurity may emerge through less foreseen routes as it might be an attractive auxiliary to conventional war. This is done through an analysis of potential payload and delivery methods to develop notional threat vectorizations. We conclude with several paradigms through which to view BCS-based threats.
△ Less
Submitted 1 October, 2020;
originally announced October 2020.
-
Human Factors in Biocybersecurity Wargames
Authors:
Lucas Potter,
Xavier-Lewis Palmer
Abstract:
Within the field of biocybersecurity, it is important to understand what vulnerabilities may be uncovered in the processing of biologics as well as how they can be safeguarded as they intersect with cyber and cyberphysical systems, as noted by the Peccoud Lab, to ensure not only product and brand integrity, but protect those served. Recent findings have revealed that biological systems can be used…
▽ More
Within the field of biocybersecurity, it is important to understand what vulnerabilities may be uncovered in the processing of biologics as well as how they can be safeguarded as they intersect with cyber and cyberphysical systems, as noted by the Peccoud Lab, to ensure not only product and brand integrity, but protect those served. Recent findings have revealed that biological systems can be used to compromise computer systems and vice versa. While regular and sophisticated attacks are still years away, time is of the essence to better understand ways to deepen critique and grasp intersectional vulnerabilities within bioprocessing as processes involved become increasingly digitally accessible. Wargames have been shown to be successful with-in improving group dynamics in response to anticipated cyber threats, and they can be used towards addressing possible threats within biocybersecurity. Within this paper, we discuss the growing prominence of biocybersecurity, the importance of biocybersecurity to bioprocessing , with respect to domestic and international contexts, and reasons for emphasizing the biological component in the face of explosive growth in biotechnology and thus separating the terms biocybersecurity and cyberbiosecurity. Additionally, a discussion and manual is provided for a simulation towards organizational learning to sense and shore up vulnerabilities that may emerge within an organization's bioprocessing pipeline
△ Less
Submitted 17 April, 2020;
originally announced May 2020.
-
On the Emerging Area of Biocybersecurity and Relevant Considerations
Authors:
Xavier-Lewis Palmer,
Lucas Potter,
Saltuk Karahan
Abstract:
Biocybersecurity is a novel space for the 21st century that meets our innovations in biotechnology and computing head on. Within this space, many considerations are open for and demand consideration as groups endeavor to develop products and policies that adequately ensure asset management and protection. Herein, simplified and brief exploration is given followed by some surface discussion of impa…
▽ More
Biocybersecurity is a novel space for the 21st century that meets our innovations in biotechnology and computing head on. Within this space, many considerations are open for and demand consideration as groups endeavor to develop products and policies that adequately ensure asset management and protection. Herein, simplified and brief exploration is given followed by some surface discussion of impacts. These impacts concern the end user, ethical and legal considerations, international proceedings, business, and limitations. It is hoped that this will be helpful in future considerations towards biocybersecurity policy developments and implementations.
Notice: This article has been queued for publication in the Proceedings of the 2020 Future of Information and Communication Conference (FICC)
△ Less
Submitted 24 March, 2020;
originally announced March 2020.
-
Sparsity Pattern Recovery in Bernoulli-Gaussian Signal Model
Authors:
Subhojit Som,
Lee C Potter
Abstract:
In compressive sensing, sparse signals are recovered from underdetermined noisy linear observations. One of the interesting problems which attracted a lot of attention in recent times is the support recovery or sparsity pattern recovery problem. The aim is to identify the non-zero elements in the original sparse signal. In this article we consider the sparsity pattern recovery problem under a prob…
▽ More
In compressive sensing, sparse signals are recovered from underdetermined noisy linear observations. One of the interesting problems which attracted a lot of attention in recent times is the support recovery or sparsity pattern recovery problem. The aim is to identify the non-zero elements in the original sparse signal. In this article we consider the sparsity pattern recovery problem under a probabilistic signal model where the sparse support follows a Bernoulli distribution and the signal restricted to this support follows a Gaussian distribution. We show that the energy in the original signal restricted to the missed support of the MAP estimate is bounded above and this bound is of the order of energy in the projection of the noise signal to the subspace spanned by the active coefficients. We also derive sufficient conditions for no misdetection and no false alarm in support recovery.
△ Less
Submitted 22 April, 2010;
originally announced April 2010.