2,160 research outputs found

    Mobile Device Background Sensors: Authentication vs Privacy

    Get PDF
    The increasing number of mobile devices in recent years has caused the collection of a large amount of personal information that needs to be protected. To this aim, behavioural biometrics has become very popular. But, what is the discriminative power of mobile behavioural biometrics in real scenarios? With the success of Deep Learning (DL), architectures based on Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), such as Long Short-Term Memory (LSTM), have shown improvements compared to traditional machine learning methods. However, these DL architectures still have limitations that need to be addressed. In response, new DL architectures like Transformers have emerged. The question is, can these new Transformers outperform previous biometric approaches? To answers to these questions, this thesis focuses on behavioural biometric authentication with data acquired from mobile background sensors (i.e., accelerometers and gyroscopes). In addition, to the best of our knowledge, this is the first thesis that explores and proposes novel behavioural biometric systems based on Transformers, achieving state-of-the-art results in gait, swipe, and keystroke biometrics. The adoption of biometrics requires a balance between security and privacy. Biometric modalities provide a unique and inherently personal approach for authentication. Nevertheless, biometrics also give rise to concerns regarding the invasion of personal privacy. According to the General Data Protection Regulation (GDPR) introduced by the European Union, personal data such as biometric data are sensitive and must be used and protected properly. This thesis analyses the impact of sensitive data in the performance of biometric systems and proposes a novel unsupervised privacy-preserving approach. The research conducted in this thesis makes significant contributions, including: i) a comprehensive review of the privacy vulnerabilities of mobile device sensors, covering metrics for quantifying privacy in relation to sensitive data, along with protection methods for safeguarding sensitive information; ii) an analysis of authentication systems for behavioural biometrics on mobile devices (i.e., gait, swipe, and keystroke), being the first thesis that explores the potential of Transformers for behavioural biometrics, introducing novel architectures that outperform the state of the art; and iii) a novel privacy-preserving approach for mobile biometric gait verification using unsupervised learning techniques, ensuring the protection of sensitive data during the verification process

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    Researching animal research: What the humanities and social sciences can contribute to laboratory animal science and welfare

    Get PDF
    Every year around 80 million scientific procedures are carried out on animals globally. These experiments have the potential to generate new understandings of biology and clinical treatments. They also give rise to ongoing societal debate.This book demonstrates how the humanities and social sciences can contribute to understanding what is created through animal procedures - including constitutional forms of research governance, different institutional cultures of care, the professional careers of scientists and veterinarians, collaborations with patients and publics, and research animals, specially bred for experiments or surplus to requirements.Developing the idea of the animal research nexus, this book explores how connections and disconnections are made between these different elements, how these have reshaped each other historically, and how they configure the current practice and policy of UK animal research

    On the Generation of Realistic and Robust Counterfactual Explanations for Algorithmic Recourse

    Get PDF
    This recent widespread deployment of machine learning algorithms presents many new challenges. Machine learning algorithms are usually opaque and can be particularly difficult to interpret. When humans are involved, algorithmic and automated decisions can negatively impact people’s lives. Therefore, end users would like to be insured against potential harm. One popular way to achieve this is to provide end users access to algorithmic recourse, which gives end users negatively affected by algorithmic decisions the opportunity to reverse unfavorable decisions, e.g., from a loan denial to a loan acceptance. In this thesis, we design recourse algorithms to meet various end user needs. First, we propose methods for the generation of realistic recourses. We use generative models to suggest recourses likely to occur under the data distribution. To this end, we shift the recourse action from the input space to the generative model’s latent space, allowing to generate counterfactuals that lie in regions with data support. Second, we observe that small changes applied to the recourses prescribed to end users likely invalidate the suggested recourse after being nosily implemented in practice. Motivated by this observation, we design methods for the generation of robust recourses and for assessing the robustness of recourse algorithms to data deletion requests. Third, the lack of a commonly used code-base for counterfactual explanation and algorithmic recourse algorithms and the vast array of evaluation measures in literature make it difficult to compare the per formance of different algorithms. To solve this problem, we provide an open source benchmarking library that streamlines the evaluation process and can be used for benchmarking, rapidly developing new methods, and setting up new experiments. In summary, our work contributes to a more reliable interaction of end users and machine learned models by covering fundamental aspects of the recourse process and suggests new solutions towards generating realistic and robust counterfactual explanations for algorithmic recourse

    Self-supervised learning for transferable representations

    Get PDF
    Machine learning has undeniably achieved remarkable advances thanks to large labelled datasets and supervised learning. However, this progress is constrained by the labour-intensive annotation process. It is not feasible to generate extensive labelled datasets for every problem we aim to address. Consequently, there has been a notable shift in recent times toward approaches that solely leverage raw data. Among these, self-supervised learning has emerged as a particularly powerful approach, offering scalability to massive datasets and showcasing considerable potential for effective knowledge transfer. This thesis investigates self-supervised representation learning with a strong focus on computer vision applications. We provide a comprehensive survey of self-supervised methods across various modalities, introducing a taxonomy that categorises them into four distinct families while also highlighting practical considerations for real-world implementation. Our focus thenceforth is on the computer vision modality, where we perform a comprehensive benchmark evaluation of state-of-the-art self supervised models against many diverse downstream transfer tasks. Our findings reveal that self-supervised models often outperform supervised learning across a spectrum of tasks, albeit with correlations weakening as tasks transition beyond classification, particularly for datasets with distribution shifts. Digging deeper, we investigate the influence of data augmentation on the transferability of contrastive learners, uncovering a trade-off between spatial and appearance-based invariances that generalise to real-world transformations. This begins to explain the differing empirical performances achieved by self-supervised learners on different downstream tasks, and it showcases the advantages of specialised representations produced with tailored augmentation. Finally, we introduce a novel self-supervised pre-training algorithm for object detection, aligning pre-training with downstream architecture and objectives, leading to reduced localisation errors and improved label efficiency. In conclusion, this thesis contributes a comprehensive understanding of self-supervised representation learning and its role in enabling effective transfer across computer vision tasks

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    Climate Change and Critical Agrarian Studies

    Full text link
    Climate change is perhaps the greatest threat to humanity today and plays out as a cruel engine of myriad forms of injustice, violence and destruction. The effects of climate change from human-made emissions of greenhouse gases are devastating and accelerating; yet are uncertain and uneven both in terms of geography and socio-economic impacts. Emerging from the dynamics of capitalism since the industrial revolution — as well as industrialisation under state-led socialism — the consequences of climate change are especially profound for the countryside and its inhabitants. The book interrogates the narratives and strategies that frame climate change and examines the institutionalised responses in agrarian settings, highlighting what exclusions and inclusions result. It explores how different people — in relation to class and other co-constituted axes of social difference such as gender, race, ethnicity, age and occupation — are affected by climate change, as well as the climate adaptation and mitigation responses being implemented in rural areas. The book in turn explores how climate change – and the responses to it - affect processes of social differentiation, trajectories of accumulation and in turn agrarian politics. Finally, the book examines what strategies are required to confront climate change, and the underlying political-economic dynamics that cause it, reflecting on what this means for agrarian struggles across the world. The 26 chapters in this volume explore how the relationship between capitalism and climate change plays out in the rural world and, in particular, the way agrarian struggles connect with the huge challenge of climate change. Through a huge variety of case studies alongside more conceptual chapters, the book makes the often-missing connection between climate change and critical agrarian studies. The book argues that making the connection between climate and agrarian justice is crucial

    Protecting Privacy in Indian Schools: Regulating AI-based Technologies' Design, Development and Deployment

    Get PDF
    Education is one of the priority areas for the Indian government, where Artificial Intelligence (AI) technologies are touted to bring digital transformation. Several Indian states have also started deploying facial recognition-enabled CCTV cameras, emotion recognition technologies, fingerprint scanners, and Radio frequency identification tags in their schools to provide personalised recommendations, ensure student security, and predict the drop-out rate of students but also provide 360-degree information of a student. Further, Integrating Aadhaar (digital identity card that works on biometric data) across AI technologies and learning and management systems (LMS) renders schools a ‘panopticon’. Certain technologies or systems like Aadhaar, CCTV cameras, GPS Systems, RFID tags, and learning management systems are used primarily for continuous data collection, storage, and retention purposes. Though they cannot be termed AI technologies per se, they are fundamental for designing and developing AI systems like facial, fingerprint, and emotion recognition technologies. The large amount of student data collected speedily through the former technologies is used to create an algorithm for the latter-stated AI systems. Once algorithms are processed using machine learning (ML) techniques, they learn correlations between multiple datasets predicting each student’s identity, decisions, grades, learning growth, tendency to drop out, and other behavioural characteristics. Such autonomous and repetitive collection, processing, storage, and retention of student data without effective data protection legislation endangers student privacy. The algorithmic predictions by AI technologies are an avatar of the data fed into the system. An AI technology is as good as the person collecting the data, processing it for a relevant and valuable output, and regularly evaluating the inputs going inside an AI model. An AI model can produce inaccurate predictions if the person overlooks any relevant data. However, the state, school administrations and parents’ belief in AI technologies as a panacea to student security and educational development overlooks the context in which ‘data practices’ are conducted. A right to privacy in an AI age is inextricably connected to data practices where data gets ‘cooked’. Thus, data protection legislation operating without understanding and regulating such data practices will remain ineffective in safeguarding privacy. The thesis undergoes interdisciplinary research that enables a better understanding of the interplay of data practices of AI technologies with social practices of an Indian school, which the present Indian data protection legislation overlooks, endangering students’ privacy from designing and developing to deploying stages of an AI model. The thesis recommends the Indian legislature frame better legislation equipped for the AI/ML age and the Indian judiciary on evaluating the legality and reasonability of designing, developing, and deploying such technologies in schools

    A comparative study of GNN and MLP based machine learning for the diagnosis of Alzheimer’s Disease involving data synthesis

    Get PDF
    Alzheimer’s Disease (AD) is a neurodegenerative disease that commonly occurs in older people. It is characterized by both cognitive and functional impairment. However, as AD has an unclear pathological cause, it can be hard to diagnose with confidence. This is even more so in the early stage of Mild Cognitive Impairment (MCI). This paper proposes a U-Net based Generative Adversarial Network (GAN) to synthesize fluorodeoxyglucose -positron emission tomography (FDG-PET) from magnetic resonance imaging - T1 weighted imaging (MRI-T1WI) for further usage in AD diagnosis including its early-stage MCI. The experiments have displayed promising results with Structural Similarity Index Measure (SSIM) reaching 0.9714. Furthermore, three types of classifiers are developed, i.e., one Multi-Layer Perceptron (MLP) based classifier, two Graph Neural Network (GNN) based classifiers where one is for graph classification and the other is for node classification. 10-fold cross-validation has been conducted on all trials of experiments for classifier comparison. The performance of these three types of classifiers has been compared with the different input modalities setting and data fusion strategies. The results have shown that GNN based node classifier surpasses the other two types of classifiers, and has achieved the state-of-the-art (SOTA) performance with the best accuracy at 90.18% for 3-class classification, namely AD, MCI and normal control (NC) with the synthesized fluorodeoxyglucose - positron emission tomography (FDG-PET) features fused at the input level. Moreover, involving synthesized FDG-PET as part of the input with proper data fusion strategies has also proved to enhance all three types of classifiers’ performance. This work provides support for the notion that machine learning-derived image analysis may be a useful approach to improving the diagnosis of AD

    HOW DO FOLLOWERS EXPERIENCE SHARED LEADERSHIP AS A LIVED EXPERIENCE? Understanding the relationality, processes and practices informing such collaboration.

    Get PDF
    How do followers experience shared leadership as a lived experience? Understanding the relationality, processes and practices informing such collaboration. Within shared leadership research culture, the aspiration is to explore “leadership as a dynamic interactive influence process”’ at the group level, supporting goal achievement (Pearce and Conger, 2003, P.1). However, the motivation of much research has focused on performance improvement, whereby discrete leadership variables are examined, using reductionist methods, to determine relevant linkages to team effectiveness (Denis et al., 2012. See also Fairhurst et.al, 2020). In expanding understanding of shared leadership from a follower perspective, enabling a fuller appreciation of how that has been experienced and operationalised over time, an immersive, participatory action research study was conducted, to facilitate a processual view of shared leadership; one that embraces relational aspects of shared leadership and considers its dynamic emergence within a hierarchical leadership setting. Unconventionally, Relational Cultural Theory has been applied to enable a more meaningful and nuanced consideration of this leadership phenomenon (Fletcher, 2012). This expanded consideration of shared leadership has produced four main findings: • The follower “voice” has been meaningfully expressed regarding experiences and actions, occurring throughout such collaboration. • A more processual understanding of the shared leadership undertaking itself, reveals how the cultivation of interdependence enables the dynamic operationalisation of expertise in relational and reciprocal ways. • The shifting nature of power dynamics has been explicated, as well as recognising the degree of interdependence occurring between followers and their leaders. • Learning History methodology was innovatively applied to facilitate a more processual understanding of shared leadership, facilitating new theoretical and practical understanding. This study challenges some of the negative connotations that may surround conceptualisations of followers and followership (Uhl-Bien, 2018), as well as actively elevating and emotionalising their experience, which is uncommon (Reitz, 2014). Finally, this study, through its positive conceptualisation of share leadership effectively challenges the myth of individual achievement that pervades much organisational life (Miller, 2012)
    • …
    corecore