-
Phoneme-Based Proactive Anti-Eavesdrop** with Controlled Recording Privilege
Authors:
Peng Huang,
Yao Wei,
Peng Cheng,
Zhongjie Ba,
Li Lu,
Feng Lin,
Yang Wang,
Kui Ren
Abstract:
The widespread smart devices raise people's concerns of being eavesdropped on. To enhance voice privacy, recent studies exploit the nonlinearity in microphone to jam audio recorders with inaudible ultrasound. However, existing solutions solely rely on energetic masking. Their simple-form noise leads to several problems, such as high energy requirements and being easily removed by speech enhancemen…
▽ More
The widespread smart devices raise people's concerns of being eavesdropped on. To enhance voice privacy, recent studies exploit the nonlinearity in microphone to jam audio recorders with inaudible ultrasound. However, existing solutions solely rely on energetic masking. Their simple-form noise leads to several problems, such as high energy requirements and being easily removed by speech enhancement techniques. Besides, most of these solutions do not support authorized recording, which restricts their usage scenarios. In this paper, we design an efficient yet robust system that can jam microphones while preserving authorized recording. Specifically, we propose a novel phoneme-based noise with the idea of informational masking, which can distract both machines and humans and is resistant to denoising techniques. Besides, we optimize the noise transmission strategy for broader coverage and implement a hardware prototype of our system. Experimental results show that our system can reduce the recognition accuracy of recordings to below 50\% under all tested speech recognition systems, which is much better than existing solutions.
△ Less
Submitted 28 January, 2024;
originally announced January 2024.
-
Semantic Importance-Aware Based for Multi-User Communication Over MIMO Fading Channels
Authors:
Haotai Liang,
Zhicheng Bao,
Wannian An,
Chen Dong,
Xiaodong Xu
Abstract:
Semantic communication, as a novel communication paradigm, has attracted the interest of many scholars, with multi-user, multi-input multi-output (MIMO) scenarios being one of the critical contexts. This paper presents a semantic importance-aware based communication system (SIA-SC) over MIMO Rayleigh fading channels. Combining the semantic symbols' inequality and the equivalent subchannels of MIMO…
▽ More
Semantic communication, as a novel communication paradigm, has attracted the interest of many scholars, with multi-user, multi-input multi-output (MIMO) scenarios being one of the critical contexts. This paper presents a semantic importance-aware based communication system (SIA-SC) over MIMO Rayleigh fading channels. Combining the semantic symbols' inequality and the equivalent subchannels of MIMO channels based on Singular Value Decomposition (SVD) maximizes the end-to-end semantic performance through the new layer map** method. For multi-user scenarios, a method of semantic interference cancellation is proposed. Furthermore, a new metric, namely semantic information distortion (SID), is established to unify the expressions of semantic performance, which is affected by channel bandwidth ratio (CBR) and signal-to-noise ratio (SNR). With the help of the proposed metric, we derived performance expressions and Semantic Outage Probability (SOP) of SIA-SC for Single-User Single-Input Single-Output (SU-SISO), Single-User MIMO (SU-MIMO), Multi-Users SISO (MU-MIMO) and Multi-Users MIMO (MU-MIMO) scenarios. Numerical experiments show that SIA-SC can significantly improve semantic performance across various scenarios.
△ Less
Submitted 26 December, 2023;
originally announced December 2023.
-
DC-based Security Constraints Formulation: A Perspective of Primal-Dual Interior Point Method
Authors:
Zhiyuan Bao,
Zechun Hu,
Asad Mujeeb
Abstract:
The DC network security constraints have been extensively studied in numerous power system problems, such as optimal power flow (OPF), security-constrained economic dispatch (SCED), and security-constrained unit commitment (SCUC). Linear shift factors, i.e., power transfer distribution factors (PTDFs), are widely applied to replace DC power flow constraints. However, the PTDF matrix is extremely d…
▽ More
The DC network security constraints have been extensively studied in numerous power system problems, such as optimal power flow (OPF), security-constrained economic dispatch (SCED), and security-constrained unit commitment (SCUC). Linear shift factors, i.e., power transfer distribution factors (PTDFs), are widely applied to replace DC power flow constraints. However, the PTDF matrix is extremely dense, making it difficult to solve security-constraint optimization problems. This paper analyzes/investigates the computational inefficiency of PTDF-based security constraints from the sparse structure perspective of the primal-dual interior point method(IPM). Additionally, a matrix transformation method is proposed for restoring the sparsity of the linear system during IPM iterations. It turns out that the transformation method is equivalent to solving the original optimization problem expressed in pure voltage angle, which preserves the sparsity structure but introduces additional variables and constraints proportional to one to two times the total number of buses. The regular B-$θ$ formulation is also a variant of the proposed transformation. Numerical studies show that sparsity rather than the size of variables and constraints is the key factor impacting the speed of solving convex quadratic problems (QP), i.e., OPF and SCED problems. In contrast, sparsity is less desirable when solving a mixed integer problem (MIP), such as the SCUC problem, where reoptimization techniques are significantly more critical and the dual simplex method is typically employed rather than IPM.
△ Less
Submitted 3 March, 2023;
originally announced March 2023.
-
Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples
Authors:
Meng Chen,
Li Lu,
Jiadi Yu,
Yingying Chen,
Zhongjie Ba,
Feng Lin,
Kui Ren
Abstract:
Faced with the threat of identity leakage during voice data publishing, users are engaged in a privacy-utility dilemma when enjoying convenient voice services. Existing studies employ direct modification or text-based re-synthesis to de-identify users' voices, but resulting in inconsistent audibility in the presence of human participants. In this paper, we propose a voice de-identification system,…
▽ More
Faced with the threat of identity leakage during voice data publishing, users are engaged in a privacy-utility dilemma when enjoying convenient voice services. Existing studies employ direct modification or text-based re-synthesis to de-identify users' voices, but resulting in inconsistent audibility in the presence of human participants. In this paper, we propose a voice de-identification system, which uses adversarial examples to balance the privacy and utility of voice services. Instead of typical additive examples inducing perceivable distortions, we design a novel convolutional adversarial example that modulates perturbations into real-world room impulse responses. Benefit from this, our system could preserve user identity from exposure by Automatic Speaker Identification (ASI) while remaining the voice perceptual quality for non-intrusive de-identification. Moreover, our system learns a compact speaker distribution through a conditional variational auto-encoder to sample diverse target embeddings on demand. Combining diverse target generation and input-specific perturbation construction, our system enables any-to-any identify transformation for adaptive de-identification. Experimental results show that our system could achieve 98% and 79% successful de-identification on mainstream ASIs and commercial systems with an objective Mel cepstral distortion of 4.31dB and a subjective mean opinion score of 4.48.
△ Less
Submitted 10 November, 2022;
originally announced November 2022.
-
Armor: A Benchmark for Meta-evaluation of Artificial Music
Authors:
Songhe Wang,
Zheng Bao,
**gtong E
Abstract:
Objective evaluation (OE) is essential to artificial music, but it's often very hard to determine the quality of OEs. Hitherto, subjective evaluation (SE) remains reliable and prevailing but suffers inevitable disadvantages that OEs may overcome. Therefore, a meta-evaluation system is necessary for designers to test the effectiveness of OEs. In this paper, we present Armor, a complex and cross-dom…
▽ More
Objective evaluation (OE) is essential to artificial music, but it's often very hard to determine the quality of OEs. Hitherto, subjective evaluation (SE) remains reliable and prevailing but suffers inevitable disadvantages that OEs may overcome. Therefore, a meta-evaluation system is necessary for designers to test the effectiveness of OEs. In this paper, we present Armor, a complex and cross-domain benchmark dataset that serves for this purpose. Since OEs should correlate with human judgment, we provide music as test cases for OEs and human judgment scores as touchstones. We also provide two meta-evaluation scenarios and their corresponding testing methods to assess the effectiveness of OEs. To the best of our knowledge, Armor is the first comprehensive and rigorous framework that future works could follow, take example by, and improve upon for the task of evaluating computer-generated music and the field of computational music as a whole. By analyzing different OE methods on our dataset, we observe that there is still a huge gap between SE and OE, meaning that hard-coded algorithms are far from catching human's judgment to the music.
△ Less
Submitted 29 August, 2021;
originally announced August 2021.
-
A SPA-based Manifold Learning Framework for Motor Imagery EEG Data Classification
Authors:
Xiangyun Li,
Peng Chen,
Zhanpeng Bao
Abstract:
The electroencephalography (EEG) signal is a non-stationary, stochastic, and highly non-linear bioelectric signal for which achieving high classification accuracy is challenging, especially when the number of subjects is limited. As frequently used solution, classifiers based on multilayer neural networks has to be implemented without large training data sets and careful tuning. This paper propose…
▽ More
The electroencephalography (EEG) signal is a non-stationary, stochastic, and highly non-linear bioelectric signal for which achieving high classification accuracy is challenging, especially when the number of subjects is limited. As frequently used solution, classifiers based on multilayer neural networks has to be implemented without large training data sets and careful tuning. This paper proposes a manifold learning framework to classify two types of EEG data from motor imagery (MI) tasks by discovering lower dimensional geometric structures. For feature extraction, it is implemented by Common Spatial Pattern (CSP) from the preprocessed EEG signals. In the neighborhoods of the features for classification, the local approximation to the support of the data is obtained, and then the features are assigned to the classes with the closest support. A spherical approximation (SPA) classifier is created using spherelets for local approximation, and the extracted features are classified with this manifold-based method. The SPA classifier achieves high accuracy in the 2008 BCI competition data, and the analysis shows that this method can significantly improve the decoding accuracy of MI tasks and exhibit strong robustness for small sample datasets. It would be simple and efficient to tune the two-parameters classifier for the online brain-computer interface(BCI)system.
△ Less
Submitted 30 July, 2021;
originally announced August 2021.
-
Bus Frequency Optimization: When Waiting Time Matters in User Satisfaction
Authors:
Songsong Mo,
Zhifeng Bao,
Baihua Zheng,
Zhiyong Peng
Abstract:
Reorganizing bus frequency to cater for the actual travel demand can save the cost of the public transport system significantly. Many, if not all, existing studies formulate this as a bus frequency optimization problem which tries to minimize passengers' average waiting time. However, many investigations have confirmed that the user satisfaction drops faster as the waiting time increases. Conseque…
▽ More
Reorganizing bus frequency to cater for the actual travel demand can save the cost of the public transport system significantly. Many, if not all, existing studies formulate this as a bus frequency optimization problem which tries to minimize passengers' average waiting time. However, many investigations have confirmed that the user satisfaction drops faster as the waiting time increases. Consequently, this paper studies the bus frequency optimization problem considering the user satisfaction. Specifically, for the first time to our best knowledge, we study how to schedule the buses such that the total number of passengers who could receive their bus services within the waiting time threshold is maximized. We prove that this problem is NP-hard, and present an index-based algorithm with $(1-1/e)$ approximation ratio. By exploiting the locality property of routes in a bus network, we propose a partition-based greedy method which achieves a $(1-ρ)(1-1/e)$ approximation ratio. Then we propose a progressive partition-based greedy method to further improve the efficiency while achieving a $(1-ρ)(1-1/e-\varepsilon)$ approximation ratio. Experiments on a real city-wide bus dataset in Singapore verify the efficiency, effectiveness, and scalability of our methods.
△ Less
Submitted 23 March, 2020;
originally announced April 2020.
-
Age-optimal Service and Decision Scheduling in Internet of Things
Authors:
Zhiwei Bao,
Yunquan Dong,
Zhengchuan Chen,
**yi Fan,
Khaled B. Letaief
Abstract:
We consider an Internet of Things (IoT) system in which a sensor observes a phenomena of interest with exponentially distributed intervals and delivers the updates to a monitor with the First-come-First-served (FCFS) policy. At the monitor, the received updates are used to make decisions with deterministic or random intervals. For this system, we investigate the freshness of the updates at these d…
▽ More
We consider an Internet of Things (IoT) system in which a sensor observes a phenomena of interest with exponentially distributed intervals and delivers the updates to a monitor with the First-come-First-served (FCFS) policy. At the monitor, the received updates are used to make decisions with deterministic or random intervals. For this system, we investigate the freshness of the updates at these decision epochs using the age upon decisions (AuD) metric. Theoretical results show that 1) when the decisions are made with exponentially distributed intervals, the average AuD of the system is smaller if the service time (e.g., transmission time) is uniformly distributed than when it is exponentially distributed, and would be the smallest if it is deterministic; 2)when the decisions are made periodically, the average AuD of the system is larger than, and decreases with decision rate to, the average AuD of the corresponding system with Poisson decision intervals; 3)the probability of missing to use a received update for any decisions is decreasing with the decision rate, and is the smallest if the service time is deterministic. For IoT monitoring systems, therefore, it is suggested to use deterministic monitoring schemes, deterministic transmitting schemes, and Poisson decision schemes, so that the received updates are as fresh as possible at the time they are used to make decisions.
△ Less
Submitted 25 February, 2020;
originally announced February 2020.
-
Deep Learning-Based Strategy for Macromolecules Classification with Imbalanced Data from Cellular Electron Cryotomography
Authors:
Ziqian Luo,
Xiangrui Zeng,
Zhipeng Bao,
Min Xu
Abstract:
Deep learning model trained by imbalanced data may not work satisfactorily since it could be determined by major classes and thus may ignore the classes with small amount of data. In this paper, we apply deep learning based imbalanced data classification for the first time to cellular macromolecular complexes captured by Cryo-electron tomography (Cryo-ET). We adopt a range of strategies to cope wi…
▽ More
Deep learning model trained by imbalanced data may not work satisfactorily since it could be determined by major classes and thus may ignore the classes with small amount of data. In this paper, we apply deep learning based imbalanced data classification for the first time to cellular macromolecular complexes captured by Cryo-electron tomography (Cryo-ET). We adopt a range of strategies to cope with imbalanced data, including data sampling, bagging, boosting, Genetic Programming based method and. Particularly, inspired from Inception 3D network, we propose a multi-path CNN model combining focal loss and mixup on the Cryo-ET dataset to expand the dataset, where each path had its best performance corresponding to each type of data and let the network learn the combinations of the paths to improve the classification performance. In addition, extensive experiments have been conducted to show our proposed method is flexible enough to cope with different number of classes by adjusting the number of paths in our multi-path model. To our knowledge, this work is the first application of deep learning methods of dealing with imbalanced data to the internal tissue classification of cell macromolecular complexes, which opened up a new path for cell classification in the field of computational biology.
△ Less
Submitted 26 August, 2019;
originally announced August 2019.
-
Augmenting C. elegans Microscopic Dataset for Accelerated Pattern Recognition
Authors:
Dali Wang,
Zheng Lu,
Zhirong Bao
Abstract:
The detection of cell shape changes in 3D time-lapse images of complex tissues is an important task. However, it is a challenging and tedious task to establish a comprehensive dataset to improve the performance of deep learning models. In the paper, we present a deep learning approach to augment 3D live images of the Caenorhabditis elegans embryo, so that we can further speed up the specific struc…
▽ More
The detection of cell shape changes in 3D time-lapse images of complex tissues is an important task. However, it is a challenging and tedious task to establish a comprehensive dataset to improve the performance of deep learning models. In the paper, we present a deep learning approach to augment 3D live images of the Caenorhabditis elegans embryo, so that we can further speed up the specific structural pattern recognition. We use an unsupervised training over unlabeled images to generate supplementary datasets for further pattern recognition. Technically, we used Alex-style neural networks in a generative adversarial network framework to generate new datasets that have common features of the C. elegans membrane structure. We also made the dataset available for a broad scientific community.
△ Less
Submitted 31 May, 2019;
originally announced June 2019.