-
Can A Single Human Supervise A Swarm of 100 Heterogeneous Robots?
Authors:
Julie A. Adams,
Joshua Hamell,
Phillip Walker
Abstract:
An open research question has been whether a single human can supervise a true heterogeneous swarm of robots completing tasks in real world environments. A general concern is whether or not the human's workload will be taxed to the breaking point. The Defense Advanced Research Projects Agency's OFFsensive Swarm-Enabled Tactics program's field exercises that occurred at U.S. Army urban training sit…
▽ More
An open research question has been whether a single human can supervise a true heterogeneous swarm of robots completing tasks in real world environments. A general concern is whether or not the human's workload will be taxed to the breaking point. The Defense Advanced Research Projects Agency's OFFsensive Swarm-Enabled Tactics program's field exercises that occurred at U.S. Army urban training sites provided the opportunity to understand the impact of achieving such swarm deployments. The Command and Control of Aggregate Swarm Tactics integrator team's swarm commander users the heterogeneous robot swarm to conduct relevant missions. During the final OFFSET program field exercise, the team collected objective and subjective metrics related to teh swarm commander's human performance. A multi-dimensional workload algorithm that estimates overall workload based on five components of workload was used to analyze the results. While the swarm commander's workload estimate did cross the overload threshold frequently, the swarm commander was able to successfully complete the missions, often under challenging operational conditions. The presented results demonstrate that a single human can deploy a swarm of 100 heterogeneous robots to conduct real-world missions.
△ Less
Submitted 31 July, 2023;
originally announced August 2023.
-
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers
Authors:
Payton Walker,
Tianfang Zhang,
Cong Shi,
Nitesh Saxena,
Yingying Chen
Abstract:
The growing adoption of voice-enabled devices (e.g., smart speakers), particularly in smart home environments, has introduced many security vulnerabilities that pose significant threats to users' privacy and safety. When multiple devices are connected to a voice assistant, an attacker can cause serious damage if they can gain control of these devices. We ask where and how can an attacker issue cle…
▽ More
The growing adoption of voice-enabled devices (e.g., smart speakers), particularly in smart home environments, has introduced many security vulnerabilities that pose significant threats to users' privacy and safety. When multiple devices are connected to a voice assistant, an attacker can cause serious damage if they can gain control of these devices. We ask where and how can an attacker issue clean voice commands stealthily across a physical barrier, and perform the first academic measurement study of this nature on the command injection attack. We present the BarrierBypass attack that can be launched against three different barrier-based scenarios termed across-door, across-window, and across-wall. We conduct a broad set of experiments to observe the command injection attack success rates for multiple speaker samples (TTS and live human recorded) at different command audio volumes (65, 75, 85 dB), and smart speaker locations (0.1-4.0m from barrier). Against Amazon Echo Dot 2, BarrierBypass is able to achieve 100% wake word and command injection success for the across-wall and across-window attacks, and for the across-door attack (up to 2 meters). At 4 meters for the across-door attack, BarrierBypass can achieve 90% and 80% injection accuracy for the wake word and command, respectively. Against Google Home mini BarrierBypass is able to achieve 100% wake word injection accuracy for all attack scenarios. For command injection BarrierBypass can achieve 100% accuracy for all the three barrier settings (up to 2 meters). For the across-door attack at 4 meters, BarrierBypass can achieve 80% command injection accuracy. Further, our demonstration using drones yielded high command injection success, up to 100%. Overall, our results demonstrate the potentially devastating nature of this vulnerability to control a user's device from outside of the device's physical space.
△ Less
Submitted 3 February, 2023;
originally announced February 2023.
-
Explainable Clustering via Exemplars: Complexity and Efficient Approximation Algorithms
Authors:
Ian Davidson,
Michael Livanos,
Antoine Gourru,
Peter Walker,
Julien Velcin,
S. S. Ravi
Abstract:
Explainable AI (XAI) is an important develo** area but remains relatively understudied for clustering. We propose an explainable-by-design clustering approach that not only finds clusters but also exemplars to explain each cluster. The use of exemplars for understanding is supported by the exemplar-based school of concept definition in psychology. We show that finding a small set of exemplars to…
▽ More
Explainable AI (XAI) is an important develo** area but remains relatively understudied for clustering. We propose an explainable-by-design clustering approach that not only finds clusters but also exemplars to explain each cluster. The use of exemplars for understanding is supported by the exemplar-based school of concept definition in psychology. We show that finding a small set of exemplars to explain even a single cluster is computationally intractable; hence, the overall problem is challenging. We develop an approximation algorithm that provides provable performance guarantees with respect to clustering quality as well as the number of exemplars used. This basic algorithm explains all the instances in every cluster whilst another approximation algorithm uses a bounded number of exemplars to allow simpler explanations and provably covers a large fraction of all the instances. Experimental results show that our work is useful in domains involving difficult to understand deep embeddings of images and text.
△ Less
Submitted 20 September, 2022;
originally announced September 2022.
-
Federated Learning for Healthcare Informatics
Authors:
Jie Xu,
Benjamin S. Glicksberg,
Chang Su,
Peter Walker,
Jiang Bian,
Fei Wang
Abstract:
With the rapid development of computer software and hardware technologies, more and more healthcare data are becoming readily available from clinical institutions, patients, insurance companies and pharmaceutical industries, among others. This access provides an unprecedented opportunity for data science technologies to derive data-driven insights and improve the quality of care delivery. Healthca…
▽ More
With the rapid development of computer software and hardware technologies, more and more healthcare data are becoming readily available from clinical institutions, patients, insurance companies and pharmaceutical industries, among others. This access provides an unprecedented opportunity for data science technologies to derive data-driven insights and improve the quality of care delivery. Healthcare data, however, are usually fragmented and private making it difficult to generate robust results across populations. For example, different hospitals own the electronic health records (EHR) of different patient populations and these records are difficult to share across hospitals because of their sensitive nature. This creates a big barrier for develo** effective analytical approaches that are generalizable, which need diverse, "big data". Federated learning, a mechanism of training a shared global model with a central server while kee** all the sensitive data in local institutions where the data belong, provides great promise to connect the fragmented healthcare data sources with privacy-preservation. The goal of this survey is to provide a review for federated learning technologies, particularly within the biomedical space. In particular, we summarize the general solutions to the statistical challenges, system challenges and privacy issues in federated learning, and point out the implications and potentials in healthcare.
△ Less
Submitted 20 August, 2020; v1 submitted 12 November, 2019;
originally announced November 2019.
-
Deep generative model-driven multimodal prostate segmentation in radiotherapy
Authors:
Kibrom Berihu Girum,
Gilles Créhange,
Raabid Hussain,
Paul Michael Walker,
Alain Lalande
Abstract:
Deep learning has shown unprecedented success in a variety of applications, such as computer vision and medical image analysis. However, there is still potential to improve segmentation in multimodal images by embedding prior knowledge via learning-based shape modeling and registration to learn the modality invariant anatomical structure of organs. For example, in radiotherapy automatic prostate s…
▽ More
Deep learning has shown unprecedented success in a variety of applications, such as computer vision and medical image analysis. However, there is still potential to improve segmentation in multimodal images by embedding prior knowledge via learning-based shape modeling and registration to learn the modality invariant anatomical structure of organs. For example, in radiotherapy automatic prostate segmentation is essential in prostate cancer diagnosis, therapy, and post-therapy assessment from T2-weighted MR or CT images. In this paper, we present a fully automatic deep generative model-driven multimodal prostate segmentation method using convolutional neural network (DGMNet). The novelty of our method comes with its embedded generative neural network for learning-based shape modeling and its ability to adapt for different imaging modalities via learning-based registration. The proposed method includes a multi-task learning framework that combines a convolutional feature extraction and an embedded regression and classification based shape modeling. This enables the network to predict the deformable shape of an organ. We show that generative neural networkbased shape modeling trained on a reliable contrast imaging modality (such as MRI) can be directly applied to low contrast imaging modality (such as CT) to achieve accurate prostate segmentation. The method was evaluated on MRI and CT datasets acquired from different clinical centers with large variations in contrast and scanning protocols. Experimental results reveal that our method can be used to automatically and accurately segment the prostate gland in different imaging modalities.
△ Less
Submitted 23 October, 2019;
originally announced October 2019.
-
Generic Connectivity-Based CGRA Map** via Integer Linear Programming
Authors:
Matthew J. P. Walker,
Jason H. Anderson
Abstract:
Coarse-grained reconfigurable architectures (CGRAs) are programmable logic devices with large coarse-grained ALU-like logic blocks, and multi-bit datapath-style routing. CGRAs often have relatively restricted data routing networks, so they attract CAD map** tools that use exact methods, such as Integer Linear Programming (ILP). However, tools that target general architectures must use large cons…
▽ More
Coarse-grained reconfigurable architectures (CGRAs) are programmable logic devices with large coarse-grained ALU-like logic blocks, and multi-bit datapath-style routing. CGRAs often have relatively restricted data routing networks, so they attract CAD map** tools that use exact methods, such as Integer Linear Programming (ILP). However, tools that target general architectures must use large constraint systems to fully describe an architecture's flexibility, resulting in lengthy run-times. In this paper, we propose to derive connectivity information from an otherwise generic device model, and use this to create simpler ILPs, which we combine in an iterative schedule and retain most of the exactness of a fully-generic ILP approach. This new approach has a speed-up geometric mean of 5.88x when considering benchmarks that do not hit a time-limit of 7.5 hours on the fully-generic ILP, and 37.6x otherwise. This was measured using the set of benchmarks used to originally evaluate the fully-generic approach and several more benchmarks representing computation tasks, over three different CGRA architectures. All run-times of the new approach are less than 20 minutes, with 90th percentile time of 410 seconds. The proposed map** techniques are integrated into, and evaluated using the open-source CGRA-ME architecture modelling and exploration framework.
△ Less
Submitted 30 April, 2019; v1 submitted 30 January, 2019;
originally announced January 2019.
-
The ARM Scalable Vector Extension
Authors:
Nigel Stephens,
Stuart Biles,
Matthias Boettcher,
Jacob Eapen,
Mbou Eyole,
Giacomo Gabrielli,
Matt Horsnell,
Grigorios Magklis,
Alejandro Martinez,
Nathanael Premillieu,
Alastair Reid,
Alejandro Rico,
Paul Walker
Abstract:
This article describes the ARM Scalable Vector Extension (SVE). Several goals guided the design of the architecture. First was the need to extend the vector processing capability associated with the ARM AArch64 execution state to better address the computational requirements in domains such as high-performance computing, data analytics, computer vision, and machine learning. Second was the desire…
▽ More
This article describes the ARM Scalable Vector Extension (SVE). Several goals guided the design of the architecture. First was the need to extend the vector processing capability associated with the ARM AArch64 execution state to better address the computational requirements in domains such as high-performance computing, data analytics, computer vision, and machine learning. Second was the desire to introduce an extension that can scale across multiple implementations, both now and into the future, allowing CPU designers to choose the vector length most suitable for their power, performance, and area targets. Finally, the architecture should avoid imposing a software development cost as the vector length changes and where possible reduce it by improving the reach of compiler auto-vectorization technologies. SVE achieves these goals. It allows implementations to choose a vector register length between 128 and 2,048 bits. It supports a vector-length agnostic programming model that lets code run and scale automatically across all vector lengths without recompilation. Finally, it introduces several innovative features that begin to overcome some of the traditional barriers to autovectorization.
△ Less
Submitted 16 March, 2018;
originally announced March 2018.
-
Semi-automated labelling of medical images: benefits of a collaborative work in the evaluation of prostate cancer in MRI
Authors:
Christian Mata,
Alain Lalande,
Paul Walker,
Arnau Oliver,
Joan MartÃ
Abstract:
Purpose: The goal of this study is to show the advantage of a collaborative work in the annotation and evaluation of prostate cancer tissues from T2-weighted MRI compared to the commonly used double blind evaluation.
Methods: The variability of medical findings focused on the prostate gland (central gland, peripheral and tumoural zones) by two independent experts was firstly evaluated, and secon…
▽ More
Purpose: The goal of this study is to show the advantage of a collaborative work in the annotation and evaluation of prostate cancer tissues from T2-weighted MRI compared to the commonly used double blind evaluation.
Methods: The variability of medical findings focused on the prostate gland (central gland, peripheral and tumoural zones) by two independent experts was firstly evaluated, and secondly compared with a consensus of these two experts. Using a prostate MRI database, experts drew regions of interest (ROIs) corresponding to healthy prostate (peripheral and central zones) and cancer using a semi-automated tool. One of the experts then drew the ROI with knowledge of the other expert's ROI.
Results: The surface area of each ROI as the Hausdorff distance and the Dice coefficient for each contour were evaluated between the different experiments, taking the drawing of the second expert as the reference. The results showed that the significant differences between the two experts became non-significant with a collaborative work.
Conclusions: This study shows that collaborative work with a dedicated tool allows a better consensus between expertise than using a double blind evaluation. Although we show this for prostate cancer evaluation in T2-weighted MRI, the results of this research can be extrapolated to other diseases and kind of medical images.
△ Less
Submitted 29 August, 2017;
originally announced August 2017.