Zum Hauptinhalt springen

Showing 1–50 of 75 results for author: Chiang, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.09522  [pdf, other

    cs.DC

    Orchestrating Federated Learning in Space-Air-Ground Integrated Networks: Adaptive Data Offloading and Seamless Handover

    Authors: Dong-Jun Han, Wenzhi Fang, Seyyedali Hosseinalipour, Mung Chiang, Christopher G. Brinton

    Abstract: Devices located in remote regions often lack coverage from well-developed terrestrial communication infrastructure. This not only prevents them from experiencing high quality communication services but also hinders the delivery of machine learning services in remote regions. In this paper, we propose a new federated learning (FL) methodology tailored to space-air-ground integrated networks (SAGINs… ▽ More

    Submitted 18 August, 2024; originally announced August 2024.

    Comments: This paper is accepted for publication in IEEE Journal on Selected Areas in Communications (JSAC)

  2. arXiv:2401.08396  [pdf

    cs.CV cs.AI cs.CL

    Hidden Flaws Behind Expert-Level Accuracy of GPT-4 Vision in Medicine

    Authors: Qiao Jin, Fangyuan Chen, Yiliang Zhou, Ziyang Xu, Justin M. Cheung, Robert Chen, Ronald M. Summers, Justin F. Rousseau, Peiyun Ni, Marc J Landsman, Sally L. Baxter, Subhi J. Al'Aref, Yijia Li, Alex Chen, Josef A. Brejt, Michael F. Chiang, Yifan Peng, Zhiyong Lu

    Abstract: Recent studies indicate that Generative Pre-trained Transformer 4 with Vision (GPT-4V) outperforms human physicians in medical challenge tasks. However, these evaluations primarily focused on the accuracy of multi-choice questions alone. Our study extends the current scope by conducting a comprehensive analysis of GPT-4V's rationales of image comprehension, recall of medical knowledge, and step-by… ▽ More

    Submitted 22 April, 2024; v1 submitted 16 January, 2024; originally announced January 2024.

    Comments: Under review

    Journal ref: npj Digital Medicine, 2024

  3. arXiv:2312.15361  [pdf, other

    cs.DC cs.AI

    Cooperative Federated Learning over Ground-to-Satellite Integrated Networks: Joint Local Computation and Data Offloading

    Authors: Dong-Jun Han, Seyyedali Hosseinalipour, David J. Love, Mung Chiang, Christopher G. Brinton

    Abstract: While network coverage maps continue to expand, many devices located in remote areas remain unconnected to terrestrial communication infrastructures, preventing them from getting access to the associated data-driven services. In this paper, we propose a ground-to-satellite cooperative federated learning (FL) methodology to facilitate machine learning service management over remote regions. Our met… ▽ More

    Submitted 23 December, 2023; originally announced December 2023.

    Comments: This paper is accepted for publication in IEEE Journal on Selected Areas in Communications (JSAC)

  4. arXiv:2311.04350  [pdf, other

    cs.NI cs.DC cs.LG

    Device Sampling and Resource Optimization for Federated Learning in Cooperative Edge Networks

    Authors: Su Wang, Roberto Morabito, Seyyedali Hosseinalipour, Mung Chiang, Christopher G. Brinton

    Abstract: The conventional federated learning (FedL) architecture distributes machine learning (ML) across worker devices by having them train local models that are periodically aggregated by a server. FedL ignores two important characteristics of contemporary wireless networks, however: (i) the network may contain heterogeneous communication/computation resources, and (ii) there may be significant overlaps… ▽ More

    Submitted 19 August, 2024; v1 submitted 7 November, 2023; originally announced November 2023.

    Comments: Published in IEEE/ACM Transactions on Networking. arXiv admin note: substantial text overlap with arXiv:2101.00787

  5. arXiv:2311.03375  [pdf, other

    cs.AR cs.AI cs.DC cs.NI

    Edge AI Inference in Heterogeneous Constrained Computing: Feasibility and Opportunities

    Authors: Roberto Morabito, Mallik Tatipamula, Sasu Tarkoma, Mung Chiang

    Abstract: The network edge's role in Artificial Intelligence (AI) inference processing is rapidly expanding, driven by a plethora of applications seeking computational advantages. These applications strive for data-driven efficiency, leveraging robust AI capabilities and prioritizing real-time responsiveness. However, as demand grows, so does system complexity. The proliferation of AI inference accelerators… ▽ More

    Submitted 27 October, 2023; originally announced November 2023.

    Comments: This paper has been accepted for publication in the proceedings of the IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks 2023 (IEEE CAMAD 2023)

  6. arXiv:2305.19097  [pdf, other

    eess.IV cs.CV cs.LG

    A generalized framework to predict continuous scores from medical ordinal labels

    Authors: Katharina V. Hoebel, Andreanne Lemay, John Peter Campbell, Susan Ostmo, Michael F. Chiang, Christopher P. Bridge, Matthew D. Li, Praveer Singh, Aaron S. Coyner, Jayashree Kalpathy-Cramer

    Abstract: Many variables of interest in clinical medicine, like disease severity, are recorded using discrete ordinal categories such as normal/mild/moderate/severe. These labels are used to train and evaluate disease severity prediction models. However, ordinal categories represent a simplification of an underlying continuous severity spectrum. Using continuous scores instead of ordinal categories is more… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

  7. arXiv:2305.13503  [pdf, other

    cs.LG cs.DC

    Asynchronous Multi-Model Dynamic Federated Learning over Wireless Networks: Theory, Modeling, and Optimization

    Authors: Zhan-Lun Chang, Seyyedali Hosseinalipour, Mung Chiang, Christopher G. Brinton

    Abstract: Federated learning (FL) has emerged as a key technique for distributed machine learning (ML). Most literature on FL has focused on ML model training for (i) a single task/model, with (ii) a synchronous scheme for updating model parameters, and (iii) a static data distribution setting across devices, which is often not realistic in practical wireless environments. To address this, we develop DMA-FL… ▽ More

    Submitted 15 February, 2024; v1 submitted 22 May, 2023; originally announced May 2023.

    Comments: Completed the major revision for IEEE Transactions on Cognitive Communications and Networking

  8. arXiv:2303.08988  [pdf, other

    cs.DC

    Connectivity-Aware Semi-Decentralized Federated Learning over Time-Varying D2D Networks

    Authors: Rohit Parasnis, Seyyedali Hosseinalipour, Yun-Wei Chu, Mung Chiang, Christopher G. Brinton

    Abstract: Semi-decentralized federated learning blends the conventional device to-server (D2S) interaction structure of federated model training with localized device-to-device (D2D) communications. We study this architecture over practical edge networks with multiple D2D clusters modeled as time-varying and directed communication graphs. Our investigation results in an algorithm that controls the fundament… ▽ More

    Submitted 20 July, 2023; v1 submitted 15 March, 2023; originally announced March 2023.

    Comments: 10 pages, 5 figures. This paper has been accepted to ACM-MobiHoc 2023

  9. arXiv:2303.08361  [pdf, other

    cs.DC cs.LG cs.NI eess.SY

    Towards Cooperative Federated Learning over Heterogeneous Edge/Fog Networks

    Authors: Su Wang, Seyyedali Hosseinalipour, Vaneet Aggarwal, Christopher G. Brinton, David J. Love, Weifeng Su, Mung Chiang

    Abstract: Federated learning (FL) has been promoted as a popular technique for training machine learning (ML) models over edge/fog networks. Traditional implementations of FL have largely neglected the potential for inter-network cooperation, treating edge/fog devices and other infrastructure participating in ML as separate processing elements. Consequently, FL has been vulnerable to several dimensions of n… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

    Comments: This paper has been accepted for publication in IEEE Communications Magazine

  10. arXiv:2301.09278  [pdf, other

    cs.DC cs.NI

    DAG-based Task Orchestration for Edge Computing

    Authors: Xiang Li, Mustafa Abdallah, Shikhar Suryavansh, Mung Chiang, Saurabh Bagchi

    Abstract: As we increase the number of personal computing devices that we carry (mobile devices, tablets, e-readers, and laptops) and these come equipped with increasing resources, there is a vast potential computation power that can be utilized from those devices. Edge computing promises to exploit these underlying computation resources closer to users to help run latency-sensitive applications such as aug… ▽ More

    Submitted 23 January, 2023; originally announced January 2023.

  11. arXiv:2208.08019  [pdf, other

    cs.LG cs.AI cs.NI

    Interference Cancellation GAN Framework for Dynamic Channels

    Authors: Hung T. Nguyen, Steven Bottone, Kwang Taik Kim, Mung Chiang, H. Vincent Poor

    Abstract: Symbol detection is a fundamental and challenging problem in modern communication systems, e.g., multiuser multiple-input multiple-output (MIMO) setting. Iterative Soft Interference Cancellation (SIC) is a state-of-the-art method for this task and recently motivated data-driven neural network models, e.g. DeepSIC, that can deal with unknown non-linear channels. However, these neural network models… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

  12. arXiv:2208.02856  [pdf, other

    cs.LG

    Embedding Alignment for Unsupervised Federated Learning via Smart Data Exchange

    Authors: Satyavrat Wagle, Seyyedali Hosseinalipour, Naji Khosravan, Mung Chiang, Christopher G. Brinton

    Abstract: Federated learning (FL) has been recognized as one of the most promising solutions for distributed machine learning (ML). In most of the current literature, FL has been studied for supervised ML tasks, in which edge devices collect labeled data. Nevertheless, in many applications, it is impractical to assume existence of labeled data across devices. To this end, we develop a novel methodology, Coo… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Comments: Accepted for publication in IEEE Global Communications Conferences (GLOBECOM), 2022

  13. Multi-Edge Server-Assisted Dynamic Federated Learning with an Optimized Floating Aggregation Point

    Authors: Bhargav Ganguly, Seyyedali Hosseinalipour, Kwang Taik Kim, Christopher G. Brinton, Vaneet Aggarwal, David J. Love, Mung Chiang

    Abstract: We propose cooperative edge-assisted dynamic federated learning (CE-FL). CE-FL introduces a distributed machine learning (ML) architecture, where data collection is carried out at the end devices, while the model training is conducted cooperatively at the end devices and the edge servers, enabled via data offloading from the end devices to the edge servers through base stations. CE-FL also introdu… ▽ More

    Submitted 22 October, 2022; v1 submitted 25 March, 2022; originally announced March 2022.

    Journal ref: Published in IEEE/ACM Transactions on Networking, 2023

  14. arXiv:2203.12738  [pdf, other

    cs.LG cs.AI cs.DC

    Contextual Model Aggregation for Fast and Robust Federated Learning in Edge Computing

    Authors: Hung T. Nguyen, H. Vincent Poor, Mung Chiang

    Abstract: Federated learning is a prime candidate for distributed machine learning at the network edge due to the low communication complexity and privacy protection among other attractive properties. However, existing algorithms face issues with slow convergence and/or robustness of performance due to the considerable heterogeneity of data distribution, computation and communication capability at the edge.… ▽ More

    Submitted 23 March, 2022; originally announced March 2022.

    Comments: 10 pages

  15. arXiv:2202.02947  [pdf, other

    cs.LG cs.AI cs.NI eess.SY

    Parallel Successive Learning for Dynamic Distributed Model Training over Heterogeneous Wireless Networks

    Authors: Seyyedali Hosseinalipour, Su Wang, Nicolo Michelusi, Vaneet Aggarwal, Christopher G. Brinton, David J. Love, Mung Chiang

    Abstract: Federated learning (FedL) has emerged as a popular technique for distributing model training over a set of wireless devices, via iterative local updates (at devices) and global aggregations (at the server). In this paper, we develop parallel successive learning (PSL), which expands the FedL architecture along three dimensions: (i) Network, allowing decentralized cooperation among the devices via d… ▽ More

    Submitted 14 June, 2023; v1 submitted 7 February, 2022; originally announced February 2022.

  16. arXiv:2112.11491  [pdf, other

    cs.LG cs.IT

    Adversarial Neural Networks for Error Correcting Codes

    Authors: Hung T. Nguyen, Steven Bottone, Kwang Taik Kim, Mung Chiang, H. Vincent Poor

    Abstract: Error correcting codes are a fundamental component in modern day communication systems, demanding extremely high throughput, ultra-reliability and low latency. Recent approaches using machine learning (ML) models as the decoders offer both improved performance and great adaptability to unknown environments, where traditional decoders struggle. We introduce a general framework to further boost the… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

    Comments: 6 pages, accepted to GLOBECOM 2021

  17. arXiv:2112.11485  [pdf, other

    cs.LG cs.DC

    On-the-fly Resource-Aware Model Aggregation for Federated Learning in Heterogeneous Edge

    Authors: Hung T. Nguyen, Roberto Morabito, Kwang Taik Kim, Mung Chiang

    Abstract: Edge computing has revolutionized the world of mobile and wireless networks world thanks to its flexible, secure, and performing characteristics. Lately, we have witnessed the increasing use of it to make more performing the deployment of machine learning (ML) techniques such as federated learning (FL). FL was debuted to improve communication efficiency compared to conventional distributed machine… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

    Comments: 6 pages, accepted to GLOBECOM 2021

  18. arXiv:2109.13845  [pdf

    cs.CV

    Not Color Blind: AI Predicts Racial Identity from Black and White Retinal Vessel Segmentations

    Authors: Aaron S. Coyner, Praveer Singh, James M. Brown, Susan Ostmo, R. V. Paul Chan, Michael F. Chiang, Jayashree Kalpathy-Cramer, J. Peter Campbell

    Abstract: Background: Artificial intelligence (AI) may demonstrate racial bias when skin or choroidal pigmentation is present in medical images. Recent studies have shown that convolutional neural networks (CNNs) can predict race from images that were not previously thought to contain race-specific features. We evaluate whether grayscale retinal vessel maps (RVMs) of patients screened for retinopathy of pre… ▽ More

    Submitted 28 September, 2021; originally announced September 2021.

    Comments: 31 pages, 6 figures

  19. arXiv:2106.15734  [pdf, other

    cs.LG cs.NI eess.SY

    UAV-assisted Online Machine Learning over Multi-Tiered Networks: A Hierarchical Nested Personalized Federated Learning Approach

    Authors: Su Wang, Seyyedali Hosseinalipour, Maria Gorlatova, Christopher G. Brinton, Mung Chiang

    Abstract: We investigate training machine learning (ML) models across a set of geo-distributed, resource-constrained clusters of devices through unmanned aerial vehicles (UAV) swarms. The presence of time-varying data heterogeneity and computational resource inadequacy among device clusters motivate four key parts of our methodology: (i) stratified UAV swarms of leader, worker, and coordinator UAVs, (ii) hi… ▽ More

    Submitted 18 October, 2022; v1 submitted 29 June, 2021; originally announced June 2021.

    Comments: To be published in IEEE Transactions on Network and Service Management

  20. arXiv:2104.09425  [pdf, other

    cs.LG cs.CR cs.CV

    Robust Learning Meets Generative Models: Can Proxy Distributions Improve Adversarial Robustness?

    Authors: Vikash Sehwag, Saeed Mahloujifar, Tinashe Handina, Sihui Dai, Chong Xiang, Mung Chiang, Prateek Mittal

    Abstract: While additional training data improves the robustness of deep neural networks against adversarial examples, it presents the challenge of curating a large number of specific real-world samples. We circumvent this challenge by using additional data from proxy distributions learned by advanced generative models. We first seek to formally understand the transfer of robustness from classifiers trained… ▽ More

    Submitted 3 March, 2022; v1 submitted 19 April, 2021; originally announced April 2021.

    Comments: ICLR 2022 version (30 pages, 13 figures, 12 tables)

  21. arXiv:2103.12051  [pdf, other

    cs.CV cs.AI cs.LG

    SSD: A Unified Framework for Self-Supervised Outlier Detection

    Authors: Vikash Sehwag, Mung Chiang, Prateek Mittal

    Abstract: We ask the following question: what training information is required to design an effective outlier/out-of-distribution (OOD) detector, i.e., detecting samples that lie far away from the training distribution? Since unlabeled data is easily accessible for many applications, the most compelling approach is to develop detectors based on only unlabeled in-distribution data. However, we observe that m… ▽ More

    Submitted 22 March, 2021; originally announced March 2021.

    Comments: ICLR 2021

  22. Device Sampling for Heterogeneous Federated Learning: Theory, Algorithms, and Implementation

    Authors: Su Wang, Mengyuan Lee, Seyyedali Hosseinalipour, Roberto Morabito, Mung Chiang, Christopher G. Brinton

    Abstract: The conventional federated learning (FedL) architecture distributes machine learning (ML) across worker devices by having them train local models that are periodically aggregated by a server. FedL ignores two important characteristics of contemporary wireless networks, however: (i) the network may contain heterogeneous communication/computation resources, while (ii) there may be significant overla… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

    Comments: This paper is accepted for publication in the proceedings of 2021 IEEE International Conference on Computer Communications (INFOCOM)

  23. arXiv:2011.05925  [pdf, other

    cs.DC cs.NI

    I-BOT: Interference-Based Orchestration of Tasks for Dynamic Unmanaged Edge Computing

    Authors: Shikhar Suryavansh, Chandan Bothra, Kwang Taik Kim, Mung Chiang, Chunyi Peng, Saurabh Bagchi

    Abstract: In recent years, edge computing has become a popular choice for latency-sensitive applications like facial recognition and augmented reality because it is closer to the end users compared to the cloud. Although infrastructure providers are working toward creating managed edge networks, personal devices such as laptops and tablets, which are widely available and are underutilized, can also be used… ▽ More

    Submitted 11 November, 2020; originally announced November 2020.

    Comments: 14 pages, 13 figures

    ACM Class: C.2.4; C.3

  24. arXiv:2010.09670  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    RobustBench: a standardized adversarial robustness benchmark

    Authors: Francesco Croce, Maksym Andriushchenko, Vikash Sehwag, Edoardo Debenedetti, Nicolas Flammarion, Mung Chiang, Prateek Mittal, Matthias Hein

    Abstract: As a research community, we are still lacking a systematic understanding of the progress on adversarial robustness which often makes it hard to identify the most promising ideas in training robust models. A key challenge in benchmarking robustness is that its evaluation is often error-prone leading to robustness overestimation. Our goal is to establish a standardized benchmark of adversarial robus… ▽ More

    Submitted 31 October, 2021; v1 submitted 19 October, 2020; originally announced October 2020.

    Comments: The camera-ready version accepted at the NeurIPS'21 Datasets and Benchmarks Track: 120+ evaluations, 80+ models, 7 leaderboards (Linf, L2, common corruptions; CIFAR-10, CIFAR-100, ImageNet), significantly expanded analysis part (calibration, fairness, privacy leakage, smoothness, transferability)

  25. arXiv:2007.14574  [pdf, ps, other

    cs.GT cs.CY cs.NI

    Paid Prioritization with Content Competition

    Authors: Parinaz Naghizadeh, Carlee Joe-Wong, Mung Chiang

    Abstract: We study the effects of allowing paid prioritization arrangements in a market with content provider (CP) competition. We consider competing CPs who pay prioritization fees to a monopolistic ISP so as to offset the ISP's cost for investing in infrastructure to support fast lanes. Unlike prior works, our proposed model of users' content consumption accounts for multi-purchasing (i.e., users simultan… ▽ More

    Submitted 28 July, 2020; originally announced July 2020.

  26. arXiv:2007.13137  [pdf, other

    cs.LG cs.DC

    Fast-Convergent Federated Learning

    Authors: Hung T. Nguyen, Vikash Sehwag, Seyyedali Hosseinalipour, Christopher G. Brinton, Mung Chiang, H. Vincent Poor

    Abstract: Federated learning has emerged recently as a promising solution for distributing machine learning tasks through modern networks of mobile devices. Recent studies have obtained lower bounds on the expected decrease in model loss that is achieved through each round of federated learning. However, convergence generally requires a large number of communication rounds, which induces delay in model trai… ▽ More

    Submitted 31 October, 2020; v1 submitted 26 July, 2020; originally announced July 2020.

    Comments: 17 pages

  27. arXiv:2006.14077  [pdf, other

    cs.CV cs.LG

    Time for a Background Check! Uncovering the impact of Background Features on Deep Neural Networks

    Authors: Vikash Sehwag, Rajvardhan Oak, Mung Chiang, Prateek Mittal

    Abstract: With increasing expressive power, deep neural networks have significantly improved the state-of-the-art on image classification datasets, such as ImageNet. In this paper, we investigate to what extent the increasing performance of deep neural networks is impacted by background features? In particular, we focus on background invariance, i.e., accuracy unaffected by switching background features and… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

    Comments: 6 pages, 5 figures

  28. arXiv:2006.03594  [pdf, other

    cs.DC cs.LG cs.NI stat.ML

    From Federated to Fog Learning: Distributed Machine Learning over Heterogeneous Wireless Networks

    Authors: Seyyedali Hosseinalipour, Christopher G. Brinton, Vaneet Aggarwal, Huaiyu Dai, Mung Chiang

    Abstract: Machine learning (ML) tasks are becoming ubiquitous in today's network applications. Federated learning has emerged recently as a technique for training ML models at the network edge by leveraging processing capabilities across the nodes that collect the data. There are several challenges with employing conventional federated learning in contemporary networks, due to the significant heterogeneity… ▽ More

    Submitted 23 October, 2020; v1 submitted 7 June, 2020; originally announced June 2020.

    Comments: This paper is accepted for publication in IEEE Communications Magazine

  29. arXiv:2005.02580  [pdf

    cs.ET physics.app-ph

    Compact Device Models for FinFET and Beyond

    Authors: Darsen D. Lu, Mohan V. Dunga, Ali M. Niknejad, Chenming Hu, Fu-Xiang Liang, Wei-Chen Hung, Jia-Wei Lee, Chun-Hsiang Hsu, Meng-Hsueh Chiang

    Abstract: Compact device models play a significant role in connecting device technology and circuit design. BSIM-CMG and BSIM-IMG are industry standard compact models suited for the FinFET and UTBB technologies, respectively. Its surface potential based modeling framework and symmetry preserving properties make them suitable for both analog/RF and digital design. In the era of artificial intelligence / deep… ▽ More

    Submitted 5 May, 2020; originally announced May 2020.

    Comments: Invited talk at the Asia-Pacific Workshop on Fundamentals and Applications of Advanced Semiconductor Devices (AWAD), Kitakyushu, Japan, July 2018

  30. arXiv:2004.09063  [pdf, other

    cs.NI cs.CR

    Securing Internet Applications from Routing Attacks

    Authors: Yixin Sun, Maria Apostolaki, Henry Birge-Lee, Laurent Vanbever, Jennifer Rexford, Mung Chiang, Prateek Mittal

    Abstract: Attacks on Internet routing are typically viewed through the lens of availability and confidentiality, assuming an adversary that either discards traffic or performs eavesdropping. Yet, a strategic adversary can use routing attacks to compromise the security of critical Internet applications like Tor, certificate authorities, and the bitcoin network. In this paper, we survey such application-speci… ▽ More

    Submitted 11 August, 2020; v1 submitted 20 April, 2020; originally announced April 2020.

  31. arXiv:2001.08169  [pdf, other

    cs.OS cs.LG stat.ML

    AppStreamer: Reducing Storage Requirements of Mobile Games through Predictive Streaming

    Authors: Nawanol Theera-Ampornpunt, Shikhar Suryavansh, Sameer Manchanda, Rajesh Panta, Kaustubh Joshi, Mostafa Ammar, Mung Chiang, Saurabh Bagchi

    Abstract: Storage has become a constrained resource on smartphones. Gaming is a popular activity on mobile devices and the explosive growth in the number of games coupled with their growing size contributes to the storage crunch. Even where storage is plentiful, it takes a long time to download and install a heavy app before it can be launched. This paper presents AppStreamer, a novel technique for reducing… ▽ More

    Submitted 16 December, 2019; originally announced January 2020.

    Comments: 12 pages; EWSN 2020

  32. arXiv:2001.00090  [pdf, other

    cs.CY cs.DC eess.SY

    Resilient Cyberphysical Systems and their Application Drivers: A Technology Roadmap

    Authors: Somali Chaterji, Parinaz Naghizadeh, Muhammad Ashraful Alam, Saurabh Bagchi, Mung Chiang, David Corman, Brian Henz, Suman Jana, Na Li, Shaoshuai Mou, Meeko Oishi, Chunyi Peng, Tiark Rompf, Ashutosh Sabharwal, Shreyas Sundaram, James Weimer, Jennifer Weller

    Abstract: Cyberphysical systems (CPS) are ubiquitous in our personal and professional lives, and they promise to dramatically improve micro-communities (e.g., urban farms, hospitals), macro-communities (e.g., cities and metropolises), urban structures (e.g., smart homes and cars), and living structures (e.g., human bodies, synthetic genomes). The question that we address in this article pertains to designin… ▽ More

    Submitted 19 December, 2019; originally announced January 2020.

    Comments: 36 pages, 2 figures, NSF-supported workshop on Grand Challenges in Resilience, held at Purdue, March 20-21, 2019

    MSC Class: C.5.3; D.4.5; H.4.0 ACM Class: C.5.3; D.4.5; H.4.0

  33. arXiv:1905.01726  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples

    Authors: Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal

    Abstract: A large body of recent work has investigated the phenomenon of evasion attacks using adversarial examples for deep learning systems, where the addition of norm-bounded perturbations to the test inputs leads to incorrect output classification. Previous work has investigated this phenomenon in closed-world systems where training and test inputs follow a pre-specified distribution. However, real-worl… ▽ More

    Submitted 5 May, 2019; originally announced May 2019.

    Comments: 18 pages, 5 figures, 9 tables

  34. arXiv:1901.10074  [pdf, other

    cs.CR

    CaRENets: Compact and Resource-Efficient CNN for Homomorphic Inference on Encrypted Medical Images

    Authors: Jin Chao, Ahmad Al Badawi, Balagopal Unnikrishnan, Jie Lin, Chan Fook Mun, James M. Brown, J. Peter Campbell, Michael Chiang, Jayashree Kalpathy-Cramer, Vijay Ramaseshan Chandrasekhar, Pavitra Krishnaswamy, Khin Mi Mi Aung

    Abstract: Convolutional neural networks (CNNs) have enabled significant performance leaps in medical image classification tasks. However, translating neural network models for clinical applications remains challenging due to data privacy issues. Fully Homomorphic Encryption (FHE) has the potential to address this challenge as it enables the use of CNNs on encrypted images. However, current HE technology pos… ▽ More

    Submitted 28 January, 2019; originally announced January 2019.

  35. arXiv:1901.06080  [pdf, other

    cs.DS cs.LG

    Accelerated Experimental Design for Pairwise Comparisons

    Authors: Yuan Guo, Jennifer Dy, Deniz Erdogmus, Jayashree Kalpathy-Cramer, Susan Ostmo, J. Peter Campbell, Michael F. Chiang, Stratis Ioannidis

    Abstract: Pairwise comparison labels are more informative and less variable than class labels, but generating them poses a challenge: their number grows quadratically in the dataset size. We study a natural experimental design objective, namely, D-optimality, that can be used to identify which $K$ pairwise comparisons to generate. This objective is known to perform well in practice, and is submodular, makin… ▽ More

    Submitted 17 January, 2019; originally announced January 2019.

  36. arXiv:1811.02638  [pdf, ps, other

    cs.DC cs.NI

    Characterizing Task Completion Latencies in Fog Computing

    Authors: Maria Gorlatova, Hazer Inaltekin, Mung Chiang

    Abstract: Fog computing, which distributes computing resources to multiple locations between the Internet of Things (IoT) devices and the cloud, is attracting considerable attention from academia and industry. Yet, despite the excitement about the potential of fog computing, few comprehensive quantitative characteristics of the properties of fog computing architectures have been conducted. In this paper we… ▽ More

    Submitted 6 November, 2018; originally announced November 2018.

  37. arXiv:1811.02539  [pdf, other

    cs.CV

    Deep feature transfer between localization and segmentation tasks

    Authors: Szu-Yeu Hu, Andrew Beers, Ken Chang, Kathi Höbel, J. Peter Campbell, Deniz Erdogumus, Stratis Ioannidis, Jennifer Dy, Michael F. Chiang, Jayashree Kalpathy-Cramer, James M. Brown

    Abstract: In this paper, we propose a new pre-training scheme for U-net based image segmentation. We first train the encoding arm as a localization network to predict the center of the target, before extending it into a U-net architecture for segmentation. We apply our proposed method to the problem of segmenting the optic disc from fundus photographs. Our work shows that the features learned by encoding ar… ▽ More

    Submitted 10 November, 2018; v1 submitted 6 November, 2018; originally announced November 2018.

  38. arXiv:1807.00082  [pdf, other

    q-bio.NC cs.AI

    Amanuensis: The Programmer's Apprentice

    Authors: Thomas Dean, Maurice Chiang, Marcus Gomez, Nate Gruver, Yousef Hindy, Michelle Lam, Peter Lu, Sophia Sanchez, Rohun Saxena, Michael Smith, Lucy Wang, Catherine Wong

    Abstract: This document provides an overview of the material covered in a course taught at Stanford in the spring quarter of 2018. The course draws upon insight from cognitive and systems neuroscience to implement hybrid connectionist and symbolic reasoning systems that leverage and extend the state of the art in machine learning by integrating human and machine intelligence. As a concrete example we focus… ▽ More

    Submitted 8 November, 2018; v1 submitted 29 June, 2018; originally announced July 2018.

  39. arXiv:1806.08468  [pdf, other

    cs.SI cs.CY stat.AP

    Personalized Thread Recommendation for MOOC Discussion Forums

    Authors: Andrew S. Lan, Jonathan C. Spencer, Ziqi Chen, Christopher G. Brinton, Mung Chiang

    Abstract: Social learning, i.e., students learning from each other through social interactions, has the potential to significantly scale up instruction in online education. In many cases, such as in massive open online courses (MOOCs), social learning is facilitated through discussion forums hosted by course providers. In this paper, we propose a probabilistic model for the process of learners posting on su… ▽ More

    Submitted 21 June, 2018; originally announced June 2018.

    Comments: To appear at ECML-PKDD 2018

  40. arXiv:1806.03551  [pdf, other

    stat.ML cs.LG eess.SP

    An Estimation and Analysis Framework for the Rasch Model

    Authors: Andrew S. Lan, Mung Chiang, Christoph Studer

    Abstract: The Rasch model is widely used for item response analysis in applications ranging from recommender systems to psychology, education, and finance. While a number of estimators have been proposed for the Rasch model over the last decades, the available analytical performance guarantees are mostly asymptotic. This paper provides a framework that relies on a novel linear minimum mean-squared error (L-… ▽ More

    Submitted 9 June, 2018; originally announced June 2018.

    Comments: To be presented at ICML 2018

  41. arXiv:1805.03144  [pdf, other

    cs.CV

    High-resolution medical image synthesis using progressively grown generative adversarial networks

    Authors: Andrew Beers, James Brown, Ken Chang, J. Peter Campbell, Susan Ostmo, Michael F. Chiang, Jayashree Kalpathy-Cramer

    Abstract: Generative adversarial networks (GANs) are a class of unsupervised machine learning algorithms that can produce realistic images from randomly-sampled vectors in a multi-dimensional space. Until recently, it was not possible to generate realistic high-resolution images using GANs, which has limited their applicability to medical images that contain biomarkers only detectable at native resolution.… ▽ More

    Submitted 9 May, 2018; v1 submitted 8 May, 2018; originally announced May 2018.

  42. arXiv:1802.06430  [pdf, other

    cs.CR cs.CV

    DARTS: Deceiving Autonomous Cars with Toxic Signs

    Authors: Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Mung Chiang, Prateek Mittal

    Abstract: Sign recognition is an integral part of autonomous cars. Any misclassification of traffic signs can potentially lead to a multitude of disastrous consequences, ranging from a life-threatening accident to even a large-scale interruption of transportation services relying on autonomous cars. In this paper, we propose and examine security attacks against sign recognition systems for Deceiving Autonom… ▽ More

    Submitted 31 May, 2018; v1 submitted 18 February, 2018; originally announced February 2018.

    Comments: Submitted to ACM CCS 2018; Extended version of [1801.02780] Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos

  43. arXiv:1802.03700  [pdf, ps, other

    cs.DC cs.DS

    Stochastic Non-preemptive Co-flow Scheduling with Time-Indexed Relaxation

    Authors: Ruijiu Mao, Vaneet Aggarwal, Mung Chiang

    Abstract: Co-flows model a modern scheduling setting that is commonly found in a variety of applications in distributed and cloud computing. A stochastic co-flow task contains a set of parallel flows with randomly distributed sizes. Further, many applications require non-preemptive scheduling of co-flow tasks. This paper gives an approximation algorithm for stochastic non-preemptive co-flow scheduling. The… ▽ More

    Submitted 23 February, 2018; v1 submitted 11 February, 2018; originally announced February 2018.

    Comments: Some of the results have been fixed, mainly involving the CoV. The changes compared to the previous version are minor

  44. arXiv:1801.02780  [pdf, other

    cs.CR cs.LG

    Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos

    Authors: Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Prateek Mittal, Mung Chiang

    Abstract: We propose a new real-world attack against the computer vision based systems of autonomous vehicles (AVs). Our novel Sign Embedding attack exploits the concept of adversarial examples to modify innocuous signs and advertisements in the environment such that they are classified as the adversary's desired traffic sign with high confidence. Our attack greatly expands the scope of the threat posed to… ▽ More

    Submitted 26 March, 2018; v1 submitted 8 January, 2018; originally announced January 2018.

    Comments: Extended abstract accepted for the 1st Deep Learning and Security Workshop; 5 pages, 4 figures

  45. arXiv:1801.01932  [pdf, other

    cs.CR

    Tempest: Temporal Dynamics in Anonymity Systems

    Authors: Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal

    Abstract: Many recent proposals for anonymous communication omit from their security analyses a consideration of the effects of time on important system components. In practice, many components of anonymity systems, such as the client location and network structure, exhibit changes and patterns over time. In this paper, we focus on the effect of such temporal dynamics on the security of anonymity networks.… ▽ More

    Submitted 29 March, 2018; v1 submitted 5 January, 2018; originally announced January 2018.

    Comments: Conference version to appear at The 18th Privacy Enhancing Technologies Symposium (PETS 2018)

  46. arXiv:1712.07816  [pdf, other

    cs.CR

    Acoustic Denial of Service Attacks on HDDs

    Authors: Mohammad Shahrad, Arsalan Mosenia, Liwei Song, Mung Chiang, David Wentzlaff, Prateek Mittal

    Abstract: Among storage components, hard disk drives (HDDs) have become the most commonly-used type of non-volatile storage due to their recent technological advances, including, enhanced energy efficacy and significantly-improved areal density. Such advances in HDDs have made them an inevitable part of numerous computing systems, including, personal computers, closed-circuit television (CCTV) systems, medi… ▽ More

    Submitted 21 December, 2017; originally announced December 2017.

    Comments: 8 pages, 8 figures

  47. arXiv:1712.00100  [pdf, ps, other

    cs.IT

    Virtualized Control over Fog: Interplay Between Reliability and Latency

    Authors: Hazer Inaltekin, Maria Gorlatova, Mung Chiang

    Abstract: This paper introduces an analytical framework to investigate optimal design choices for the placement of virtual controllers along the cloud-to-things continuum. The main application scenarios include low-latency cyber-physical systems in which real-time control actions are required in response to the changes in states of an IoT node. In such cases, deploying controller software on a cloud server… ▽ More

    Submitted 13 February, 2018; v1 submitted 30 November, 2017; originally announced December 2017.

  48. arXiv:1709.07450  [pdf, other

    cs.CY

    ProCMotive: Bringing Programability and Connectivity into Isolated Vehicles

    Authors: Arsalan Mosenia, Jad F. Bechara, Tao Zhang, Prateek Mittal, Mung Chiang

    Abstract: In recent years, numerous vehicular technologies, e.g., cruise control and steering assistant, have been proposed and deployed to improve the driving experience, passenger safety, and vehicle performance. Despite the existence of several novel vehicular applications in the literature, there still exists a significant gap between resources needed for a variety of vehicular (in particular, data-domi… ▽ More

    Submitted 21 September, 2017; originally announced September 2017.

    Comments: 23 Pages

  49. arXiv:1704.00843  [pdf, other

    cs.CR cs.NI

    Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks

    Authors: Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal

    Abstract: Tor is vulnerable to network-level adversaries who can observe both ends of the communication to deanonymize users. Recent work has shown that Tor is susceptible to the previously unknown active BGP routing attacks, called RAPTOR attacks, which expose Tor users to more network-level adversaries. In this paper, we aim to mitigate and detect such active routing attacks against Tor. First, we present… ▽ More

    Submitted 5 April, 2017; v1 submitted 3 April, 2017; originally announced April 2017.

    Comments: Appearing at IEEE S&P 2017

  50. AMUSE: Empowering Users for Cost-Aware Offloading with Throughput-Delay Tradeoffs

    Authors: Youngbin Im, Carlee Joe-Wong, Sangtae Ha, Soumya Sen, Ted Taekyoung Kwon, Mung Chiang

    Abstract: To cope with recent exponential increases in demand for mobile data, wireless Internet service providers (ISPs) are increasingly changing their pricing plans and deploying WiFi hotspots to offload their mobile traffic. However, these ISP-centric approaches for traffic management do not always match the interests of mobile users. Users face a complex, multi-dimensional tradeoff between cost, throug… ▽ More

    Submitted 17 February, 2017; originally announced February 2017.

    Comments: 15 pages, 16 figures, IEEE Transactions on Mobile Computing, Vol. 15, No. 5, May 2016

    Journal ref: IEEE Transactions on Mobile Computing, Vol. 15, No. 5, May 2016