-
Population-aware Online Mirror Descent for Mean-Field Games by Deep Reinforcement Learning
Authors:
Zida Wu,
Mathieu Lauriere,
Samuel Jia Cong Chua,
Matthieu Geist,
Olivier Pietquin,
Ankur Mehta
Abstract:
Mean Field Games (MFGs) have the ability to handle large-scale multi-agent systems, but learning Nash equilibria in MFGs remains a challenging task. In this paper, we propose a deep reinforcement learning (DRL) algorithm that achieves population-dependent Nash equilibrium without the need for averaging or sampling from history, inspired by Munchausen RL and Online Mirror Descent. Through the desig…
▽ More
Mean Field Games (MFGs) have the ability to handle large-scale multi-agent systems, but learning Nash equilibria in MFGs remains a challenging task. In this paper, we propose a deep reinforcement learning (DRL) algorithm that achieves population-dependent Nash equilibrium without the need for averaging or sampling from history, inspired by Munchausen RL and Online Mirror Descent. Through the design of an additional inner-loop replay buffer, the agents can effectively learn to achieve Nash equilibrium from any distribution, mitigating catastrophic forgetting. The resulting policy can be applied to various initial distributions. Numerical experiments on four canonical examples demonstrate our algorithm has better convergence properties than SOTA algorithms, in particular a DRL version of Fictitious Play for population-dependent policies.
△ Less
Submitted 6 March, 2024;
originally announced March 2024.
-
Private Knowledge Sharing in Distributed Learning: A Survey
Authors:
Yasas Supeksala,
Dinh C. Nguyen,
Ming Ding,
Thilina Ranbaduge,
Calson Chua,
Jun Zhang,
Jun Li,
H. Vincent Poor
Abstract:
The rise of Artificial Intelligence (AI) has revolutionized numerous industries and transformed the way society operates. Its widespread use has led to the distribution of AI and its underlying data across many intelligent systems. In this light, it is crucial to utilize information in learning processes that are either distributed or owned by different entities. As a result, modern data-driven se…
▽ More
The rise of Artificial Intelligence (AI) has revolutionized numerous industries and transformed the way society operates. Its widespread use has led to the distribution of AI and its underlying data across many intelligent systems. In this light, it is crucial to utilize information in learning processes that are either distributed or owned by different entities. As a result, modern data-driven services have been developed to integrate distributed knowledge entities into their outcomes. In line with this goal, the latest AI models are frequently trained in a decentralized manner. Distributed learning involves multiple entities working together to make collective predictions and decisions. However, this collaboration can also bring about security vulnerabilities and challenges. This paper provides an in-depth survey on private knowledge sharing in distributed learning, examining various knowledge components utilized in leading distributed learning architectures. Our analysis sheds light on the most critical vulnerabilities that may arise when using these components in a distributed setting. We further identify and examine defensive strategies for preserving the privacy of these knowledge components and preventing malicious parties from manipulating or accessing the knowledge information. Finally, we highlight several key limitations of knowledge sharing in distributed learning and explore potential avenues for future research.
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
RetSeg: Retention-based Colorectal Polyps Segmentation Network
Authors:
Khaled ELKarazle,
Valliappan Raman,
Caslon Chua,
Patrick Then
Abstract:
Vision Transformers (ViTs) have revolutionized medical imaging analysis, showcasing superior efficacy compared to conventional Convolutional Neural Networks (CNNs) in vital tasks such as polyp classification, detection, and segmentation. Leveraging attention mechanisms to focus on specific image regions, ViTs exhibit contextual awareness in processing visual data, culminating in robust and precise…
▽ More
Vision Transformers (ViTs) have revolutionized medical imaging analysis, showcasing superior efficacy compared to conventional Convolutional Neural Networks (CNNs) in vital tasks such as polyp classification, detection, and segmentation. Leveraging attention mechanisms to focus on specific image regions, ViTs exhibit contextual awareness in processing visual data, culminating in robust and precise predictions, even for intricate medical images. Moreover, the inherent self-attention mechanism in Transformers accommodates varying input sizes and resolutions, granting an unprecedented flexibility absent in traditional CNNs. However, Transformers grapple with challenges like excessive memory usage and limited training parallelism due to self-attention, rendering them impractical for real-time disease detection on resource-constrained devices. In this study, we address these hurdles by investigating the integration of the recently introduced retention mechanism into polyp segmentation, introducing RetSeg, an encoder-decoder network featuring multi-head retention blocks. Drawing inspiration from Retentive Networks (RetNet), RetSeg is designed to bridge the gap between precise polyp segmentation and resource utilization, particularly tailored for colonoscopy images. We train and validate RetSeg for polyp segmentation employing two publicly available datasets: Kvasir-SEG and CVC-ClinicDB. Additionally, we showcase RetSeg's promising performance across diverse public datasets, including CVC-ColonDB, ETIS-LaribPolypDB, CVC-300, and BKAI-IGH NeoPolyp. While our work represents an early-stage exploration, further in-depth studies are imperative to advance these promising findings.
△ Less
Submitted 8 March, 2024; v1 submitted 9 October, 2023;
originally announced October 2023.
-
DeepCPCFG: Deep Learning and Context Free Grammars for End-to-End Information Extraction
Authors:
Freddy C. Chua,
Nigel P. Duffy
Abstract:
We address the challenge of extracting structured information from business documents without detailed annotations. We propose Deep Conditional Probabilistic Context Free Grammars (DeepCPCFG) to parse two-dimensional complex documents and use Recursive Neural Networks to create an end-to-end system for finding the most probable parse that represents the structured information to be extracted. This…
▽ More
We address the challenge of extracting structured information from business documents without detailed annotations. We propose Deep Conditional Probabilistic Context Free Grammars (DeepCPCFG) to parse two-dimensional complex documents and use Recursive Neural Networks to create an end-to-end system for finding the most probable parse that represents the structured information to be extracted. This system is trained end-to-end with scanned documents as input and only relational-records as labels. The relational-records are extracted from existing databases avoiding the cost of annotating documents by hand. We apply this approach to extract information from scanned invoices achieving state-of-the-art results despite using no hand-annotations.
△ Less
Submitted 5 June, 2021; v1 submitted 10 March, 2021;
originally announced March 2021.
-
Semi-supervised and Unsupervised Methods for Heart Sounds Classification in Restricted Data Environments
Authors:
Balagopal Unnikrishnan,
Pranshu Ranjan Singh,
Xulei Yang,
Matthew Chin Heng Chua
Abstract:
Automated heart sounds classification is a much-required diagnostic tool in the view of increasing incidences of heart related diseases worldwide. In this study, we conduct a comprehensive study of heart sounds classification by using various supervised, semi-supervised and unsupervised approaches on the PhysioNet/CinC 2016 Challenge dataset. Supervised approaches, including deep learning and mach…
▽ More
Automated heart sounds classification is a much-required diagnostic tool in the view of increasing incidences of heart related diseases worldwide. In this study, we conduct a comprehensive study of heart sounds classification by using various supervised, semi-supervised and unsupervised approaches on the PhysioNet/CinC 2016 Challenge dataset. Supervised approaches, including deep learning and machine learning methods, require large amounts of labelled data to train the models, which are challenging to obtain in most practical scenarios. In view of the need to reduce the labelling burden for clinical practices, where human labelling is both expensive and time-consuming, semi-supervised or even unsupervised approaches in restricted data setting are desirable. A GAN based semi-supervised method is therefore proposed, which allows the usage of unlabelled data samples to boost the learning of data distribution. It achieves a better performance in terms of AUROC over the supervised baseline when limited data samples exist. Furthermore, several unsupervised methods are explored as an alternative approach by considering the given problem as an anomaly detection scenario. In particular, the unsupervised feature extraction using 1D CNN Autoencoder coupled with one-class SVM obtains good performance without any data labelling. The potential of the proposed semi-supervised and unsupervised methods may lead to a workflow tool in the future for the creation of higher quality datasets.
△ Less
Submitted 3 June, 2020;
originally announced June 2020.
-
Decentralising power: how we are trying to keep CALLector ethical
Authors:
Cathy Chua,
Hanieh Habibi,
Manny Rayner,
Nikos Tsourakis
Abstract:
We present a brief overview of the CALLector project, and consider ethical questions arising from its overall goal of creating a social network to support creation and use of online CALL resources. We argue that these questions are best addressed in a decentralised, pluralistic open source architecture.
We present a brief overview of the CALLector project, and consider ethical questions arising from its overall goal of creating a social network to support creation and use of online CALL resources. We argue that these questions are best addressed in a decentralised, pluralistic open source architecture.
△ Less
Submitted 30 July, 2019;
originally announced August 2019.
-
What do the founders of online communities owe to their users?
Authors:
Cathy Chua,
Manny Rayner
Abstract:
We discuss the organisation of internet communities, focusing on what we call the principle of "bait and switch": founders of internet communities often find it advantageous to recruit members by promising inducements which are later not honoured. We look at some of the dilemmas and ways of attempting to resolve them through two paradigmatic examples, Wikispaces and Wordpress. Our analysis is to a…
▽ More
We discuss the organisation of internet communities, focusing on what we call the principle of "bait and switch": founders of internet communities often find it advantageous to recruit members by promising inducements which are later not honoured. We look at some of the dilemmas and ways of attempting to resolve them through two paradigmatic examples, Wikispaces and Wordpress. Our analysis is to a large extent motivated by the demands of CALLector, a university-centred social network we are in the process of establishing. We consider the question of what ethical standards are imposed on universities engaged in this type of activity.
△ Less
Submitted 30 July, 2019;
originally announced August 2019.
-
Alexa as a CALL platform for children: Where do we start?
Authors:
Nikos Tsourakis,
Manny Rayner,
Hanieh Habibi,
Pierre-Emmanuel Gallais,
Cathy Chua,
Matt Butterweck
Abstract:
Amazon's Alexa is now widely available and shows interesting potential as a platform for hosting CALL games aimed at children. In this paper, we describe an initial informal experiment where we created some simple CALL games and made them available to a few child testers. We report the children's and parents' reactions. Our overall conclusion is that, although Alexa has many positive features, the…
▽ More
Amazon's Alexa is now widely available and shows interesting potential as a platform for hosting CALL games aimed at children. In this paper, we describe an initial informal experiment where we created some simple CALL games and made them available to a few child testers. We report the children's and parents' reactions. Our overall conclusion is that, although Alexa has many positive features, there are still fundamental platform issues in the current version that make it very difficult to build compelling CALL games for children. The games used will soon be freely available for download on the Alexa store.
△ Less
Submitted 30 July, 2019;
originally announced July 2019.
-
BiRA-Net: Bilinear Attention Net for Diabetic Retinopathy Grading
Authors:
Ziyuan Zhao,
Kerui Zhang,
Xuejie Hao,
Jing Tian,
Matthew Chin Heng Chua,
Li Chen,
Xin Xu
Abstract:
Diabetic retinopathy (DR) is a common retinal disease that leads to blindness. For diagnosis purposes, DR image grading aims to provide automatic DR grade classification, which is not addressed in conventional research methods of binary DR image classification. Small objects in the eye images, like lesions and microaneurysms, are essential to DR grading in medical imaging, but they could easily be…
▽ More
Diabetic retinopathy (DR) is a common retinal disease that leads to blindness. For diagnosis purposes, DR image grading aims to provide automatic DR grade classification, which is not addressed in conventional research methods of binary DR image classification. Small objects in the eye images, like lesions and microaneurysms, are essential to DR grading in medical imaging, but they could easily be influenced by other objects. To address these challenges, we propose a new deep learning architecture, called BiRA-Net, which combines the attention model for feature extraction and bilinear model for fine-grained classification. Furthermore, in considering the distance between different grades of different DR categories, we propose a new loss function, called grading loss, which leads to improved training convergence of the proposed approach. Experimental results are provided to demonstrate the superior performance of the proposed approach.
△ Less
Submitted 1 July, 2019; v1 submitted 15 May, 2019;
originally announced May 2019.
-
Segmentation of optic disc, fovea and retinal vasculature using a single convolutional neural network
Authors:
Jen Hong Tan,
U. Rajendra Acharya,
Sulatha V. Bhandary,
Kuang Chua Chua,
Sobha Sivaprasad
Abstract:
We have developed and trained a convolutional neural network to automatically and simultaneously segment optic disc, fovea and blood vessels. Fundus images were normalised before segmentation was performed to enforce consistency in background lighting and contrast. For every effective point in the fundus image, our algorithm extracted three channels of input from the neighbourhood of the point and…
▽ More
We have developed and trained a convolutional neural network to automatically and simultaneously segment optic disc, fovea and blood vessels. Fundus images were normalised before segmentation was performed to enforce consistency in background lighting and contrast. For every effective point in the fundus image, our algorithm extracted three channels of input from the neighbourhood of the point and forward the response across the 7 layer network. In average, our segmentation achieved an accuracy of 92.68 percent on the testing set from Drive database.
△ Less
Submitted 1 February, 2017;
originally announced February 2017.
-
Collective Semi-Supervised Learning for User Profiling in Social Media
Authors:
Richard J. Oentaryo,
Ee-Peng Lim,
Freddy Chong Tat Chua,
Jia-Wei Low,
David Lo
Abstract:
The abundance of user-generated data in social media has incentivized the development of methods to infer the latent attributes of users, which are crucially useful for personalization, advertising and recommendation. However, the current user profiling approaches have limited success, due to the lack of a principled way to integrate different types of social relationships of a user, and the relia…
▽ More
The abundance of user-generated data in social media has incentivized the development of methods to infer the latent attributes of users, which are crucially useful for personalization, advertising and recommendation. However, the current user profiling approaches have limited success, due to the lack of a principled way to integrate different types of social relationships of a user, and the reliance on scarcely-available labeled data in building a prediction model. In this paper, we present a novel solution termed Collective Semi-Supervised Learning (CSL), which provides a principled means to integrate different types of social relationship and unlabeled data under a unified computational framework. The joint learning from multiple relationships and unlabeled data yields a computationally sound and accurate approach to model user attributes in social media. Extensive experiments using Twitter data have demonstrated the efficacy of our CSL approach in inferring user attributes such as account type and marital status. We also show how CSL can be used to determine important user features, and to make inference on a larger user population.
△ Less
Submitted 24 June, 2016;
originally announced June 2016.
-
Stringer: Balancing Latency and Resource Usage in Service Function Chain Provisioning
Authors:
Freddy C. Chua,
Julie Ward,
Ying Zhang,
Puneet Sharma,
Bernardo A. Huberman
Abstract:
Network Functions Virtualization, or NFV, enables telecommunications infrastructure providers to replace special-purpose networking equipment with commodity servers running virtualized network functions (VNFs). A service provider utilizing NFV technology faces the SFC provisioning problem of assigning VNF instances to nodes in the physical infrastructure (e.g., a datacenter), and routing Service F…
▽ More
Network Functions Virtualization, or NFV, enables telecommunications infrastructure providers to replace special-purpose networking equipment with commodity servers running virtualized network functions (VNFs). A service provider utilizing NFV technology faces the SFC provisioning problem of assigning VNF instances to nodes in the physical infrastructure (e.g., a datacenter), and routing Service Function Chains (sequences of functions required by customers, a.k.a. SFCs) in the physical network. In doing so, the provider must balance between various competing goals of performance and resource usage. We present an approach for SFC provisioning, consisting of three elements. The first element is a fast, scalable round-robin heuristic. The second element is a Mixed Integer Programming (MIP) based approach. The third element is a queueing-theoretic model to estimate the average latency associated with any SFC provisioning solution. Combined, these elements create an approach that generates a set of SFC provisioning solutions, reflecting different tradeoffs between resource usage and performance.
△ Less
Submitted 9 June, 2016; v1 submitted 28 April, 2016;
originally announced April 2016.
-
A Bayesian Approach to the Partitioning of Workflows
Authors:
Freddy C. Chua,
Bernardo A. Huberman
Abstract:
When partitioning workflows in realistic scenarios, the knowledge of the processing units is often vague or unknown. A naive approach to addressing this issue is to perform many controlled experiments for different workloads, each consisting of multiple number of trials in order to estimate the mean and variance of the specific workload. Since this controlled experimental approach can be quite cos…
▽ More
When partitioning workflows in realistic scenarios, the knowledge of the processing units is often vague or unknown. A naive approach to addressing this issue is to perform many controlled experiments for different workloads, each consisting of multiple number of trials in order to estimate the mean and variance of the specific workload. Since this controlled experimental approach can be quite costly in terms of time and resources, we propose a variant of the Gibbs Sampling algorithm that uses a sequence of Bayesian inference updates to estimate the processing characteristics of the processing units. Using the inferred characteristics of the processing units, we are able to determine the best way to split a workflow for processing it in parallel with the lowest expected completion time and least variance.
△ Less
Submitted 2 November, 2015;
originally announced November 2015.
-
Partitioning Uncertain Workflows
Authors:
Bernardo A. Huberman,
Freddy C. Chua
Abstract:
It is common practice to partition complex workflows into separate channels in order to speed up their completion times. When this is done within a distributed environment, unavoidable fluctuations make individual realizations depart from the expected average gains. We present a method for breaking any complex workflow into several workloads in such a way that once their outputs are joined, their…
▽ More
It is common practice to partition complex workflows into separate channels in order to speed up their completion times. When this is done within a distributed environment, unavoidable fluctuations make individual realizations depart from the expected average gains. We present a method for breaking any complex workflow into several workloads in such a way that once their outputs are joined, their full completion takes less time and exhibit smaller variance than when running in only one channel. We demonstrate the effectiveness of this method in two different scenarios; the optimization of a convex function and the transmission of a large computer file over the Internet.
△ Less
Submitted 1 July, 2015;
originally announced July 2015.
-
Using Linear Dynamical Topic Model for Inferring Temporal Social Correlation in Latent Space
Authors:
Freddy Chong Tat Chua,
Richard J. Oentaryo,
Ee-Peng Lim
Abstract:
The abundance of online user data has led to a surge of interests in understanding the dynamics of social relationships using computational methods. Utilizing users' items adoption data, we develop a new method to compute the Granger-causal (GC) relationships among users. In order to handle the high dimensional and sparse nature of the adoption data, we propose to model the relationships among use…
▽ More
The abundance of online user data has led to a surge of interests in understanding the dynamics of social relationships using computational methods. Utilizing users' items adoption data, we develop a new method to compute the Granger-causal (GC) relationships among users. In order to handle the high dimensional and sparse nature of the adoption data, we propose to model the relationships among users in latent space instead of the original data space. We devise a Linear Dynamical Topic Model (LDTM) that can capture the dynamics of the users' items adoption behaviors in latent (topic) space. Using the time series of temporal topic distributions learned by LDTM, we conduct Granger causality tests to measure the social correlation relationships between pairs of users. We call the combination of our LDTM and Granger causality tests as Temporal Social Correlation. By conducting extensive experiments on bibliographic data, where authors are analogous to users, we show that the ordering of authors' name on their publications plays a statistically significant role in the interaction of research topics among the authors. We also present a case study to illustrate the correlational relationships between pairs of authors.
△ Less
Submitted 6 January, 2015;
originally announced January 2015.
-
Detecting Flow Anomalies in Distributed Systems
Authors:
Freddy Chong Tat Chua,
Ee-Peng Lim,
Bernardo A. Huberman
Abstract:
Deep within the networks of distributed systems, one often finds anomalies that affect their efficiency and performance. These anomalies are difficult to detect because the distributed systems may not have sufficient sensors to monitor the flow of traffic within the interconnected nodes of the networks. Without early detection and making corrections, these anomalies may aggravate over time and cou…
▽ More
Deep within the networks of distributed systems, one often finds anomalies that affect their efficiency and performance. These anomalies are difficult to detect because the distributed systems may not have sufficient sensors to monitor the flow of traffic within the interconnected nodes of the networks. Without early detection and making corrections, these anomalies may aggravate over time and could possibly cause disastrous outcomes in the system in the unforeseeable future. Using only coarse-grained information from the two end points of network flows, we propose a network transmission model and a localization algorithm, to detect the location of anomalies and rank them using a proposed metric within distributed systems. We evaluate our approach on passengers' records of an urbanized city's public transportation system and correlate our findings with passengers' postings on social media microblogs. Our experiments show that the metric derived using our localization algorithm gives a better ranking of anomalies as compared to standard deviation measures from statistical models. Our case studies also demonstrate that transportation events reported in social media microblogs matches the locations of our detect anomalies, suggesting that our algorithm performs well in locating the anomalies within distributed systems.
△ Less
Submitted 8 December, 2014; v1 submitted 22 July, 2014;
originally announced July 2014.
-
Secrecy Wireless Information and Power Transfer with MISO Beamforming
Authors:
Liang Liu,
Rui Zhang,
K. C. Chua
Abstract:
The dual use of radio signals for simultaneous wireless information and power transfer (SWIPT) has recently drawn significant attention. To meet the practical requirement that energy receivers (ERs) operate with much higher received power than information receivers (IRs), ERs need to be deployed closer to the transmitter than IRs. However, due to the broadcast nature of wireless channels, one crit…
▽ More
The dual use of radio signals for simultaneous wireless information and power transfer (SWIPT) has recently drawn significant attention. To meet the practical requirement that energy receivers (ERs) operate with much higher received power than information receivers (IRs), ERs need to be deployed closer to the transmitter than IRs. However, due to the broadcast nature of wireless channels, one critical issue is that the messages sent to IRs cannot be eavesdropped by ERs, which possess better channels from the transmitter. In this paper, we address this new secrecy communication problem in a multiuser multiple-input single-output (MISO) SWIPT system where a multi-antenna transmitter sends information and energy simultaneously to one IR and multiple ERs, each with a single antenna. By optimizing transmit beamforming vectors and their power allocation, we maximize the weighted sum-energy transferred to ERs subject to a secrecy rate constraint for the information sent to the IR. We solve this non-convex problem optimally by reformulating it into a two-stage problem. First, we fix the signal-to-interference-plus-noise ratio (SINR) at the IR and obtain the optimal beamforming solution by applying the technique of semidefinite relaxation (SDR). Then the original problem is solved by a one-dimension search over the optimal SINR value for the IR. Furthermore, two suboptimal low-complexity beamforming schemes are proposed, and their achievable (secrecy) rate-energy (R-E) regions are compared against that by the optimal scheme.
△ Less
Submitted 30 July, 2013; v1 submitted 4 June, 2013;
originally announced June 2013.