3,189 research outputs found

    ์ปค๋„ ์„œํฌํŠธ์™€ ํ‰ํ˜•์ ์„ ํ™œ์šฉํ•œ ์ฐจ๋ถ„ ํ”„๋ผ์ด๋ฒ„์‹œ ๋‹ค์ค‘ ํด๋ž˜์Šค ๋ถ„๋ฅ˜ ๊ธฐ๋ฒ•

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์‚ฐ์—…๊ณตํ•™๊ณผ, 2022.2. ์ด์žฌ์šฑ.In this paper, we propose a multi-class classification method using kernel supports and a dynamic system under differential privacy. We find support vector machine (SVM) algorithms have a fundamental weaknesses of implementing differential privacy because the decision function depends on some subset of the training data called the support vectors. Therefore, we develop a method using interior points called equilibrium points (EPs) without relying on the decision boundary. To construct EPs, we utilize a dynamic system with a new differentially private support vector data description (SVDD) by perturbing the sphere center in the kernel space. Empirical results show that the proposed method achieves better performance even on small-sized datasets where differential privacy performs poorly.๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์ปค๋„ ์„œํฌํŠธ์™€ ํ‰ํ˜•์ ์„ ํ™œ์šฉํ•œ ์ฐจ๋ถ„ ํ”„๋ผ์ด๋ฒ„์‹œ ๋‹ค์ค‘ ํด๋ž˜์Šค ๋ถ„๋ฅ˜ ๊ธฐ๋ฒ•์„ ์ œ์‹œํ•œ๋‹ค. ์„œํฌํŠธ ๋ฒกํ„ฐ ๋ถ„๋ฅ˜ ๊ธฐ๋ฒ•์€ ๋ฐ์ดํ„ฐ ๋ถ„์„๊ณผ ๋จธ์‹  ๋Ÿฌ๋‹์— ํ™œ์šฉ์„ฑ์ด ๋†’์•„ ์‚ฌ์šฉ์ž์˜ ๋ฐ์ดํ„ฐ๋ฅผ ๋ณดํ˜ธํ•˜๋ฉฐ ํ•™์Šตํ•˜๋Š” ๊ฒƒ์ด ํ•„์ˆ˜์ ์ด๋‹ค. ๊ทธ ์ค‘ ๊ฐ€์žฅ ๋Œ€์ค‘์ ์ธ ์„œํฌํŠธ ๋ฒกํ„ฐ ๋จธ์‹ (SVM)์€ ์„œํฌํŠธ ๋ฒกํ„ฐ๋ผ๊ณ  ๋ถˆ๋ฆฌ๋Š” ์ผ๋ถ€ ๋ฐ์ดํ„ฐ์—๋งŒ ๋ถ„๋ฅ˜์— ์˜์กดํ•˜๊ธฐ ๋•Œ๋ฌธ์— ํ”„๋ผ์ด๋ฒ„์‹œ ์ฐจ๋ถ„ ๊ธฐ๋ฒ•์„ ํ™œ์šฉํ•˜๊ธฐ ์–ด๋ ต๋‹ค. ๋ฐ์ดํ„ฐ ํ•˜๋‚˜๊ฐ€ ๋ณ€๊ฒฝ๋˜์—ˆ์„ ๋•Œ ๊ฒฐ๊ณผ์˜ ๋ณ€ํ™”๊ฐ€ ์ ์–ด์•ผ ํ•˜๋Š” ์ฐจ๋ถ„ ํ”„๋ผ์ด๋ฒ„์‹œ ์ƒํ™ฉ์—์„œ ์„œํฌํŠธ ๋ฒกํ„ฐ ํ•˜๋‚˜๊ฐ€ ์—†์–ด์ง„๋‹ค๋ฉด ๋ถ„๋ฅ˜๊ธฐ์˜ ๊ฒฐ์ • ๊ฒฝ๊ณ„๋Š” ๊ทธ ๋ณ€ํ™”์— ๋งค์šฐ ์ทจ์•ฝํ•˜๋‹ค๋Š” ๋ฌธ์ œ๊ฐ€ ์žˆ๋‹ค. ์ด ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ํ‰ํ˜•์ ์ด๋ผ๊ณ  ๋ถˆ๋ฆฌ๋Š” ๊ตฐ์ง‘ ๋‚ด๋ถ€์— ์กด์žฌํ•˜๋Š” ์ ์„ ํ™œ์šฉํ•˜๋Š” ์ฐจ๋ถ„ ํ”„๋ผ์ด๋ฒ„์‹œ ๋‹ค์ค‘ ํด๋ž˜์Šค ๋ถ„๋ฅ˜ ๊ธฐ๋ฒ•์„ ์ œ์‹œํ•œ๋‹ค. ์ด๋ฅผ ์œ„ํ•ด, ๋จผ์ € ์ปค๋„ ๊ณต๊ฐ„์—์„œ ๊ตฌ์˜ ์ค‘์‹ฌ์— ์„ญ๋™์„ ๋”ํ•ด ์ฐจ๋ถ„ ํ”„๋ผ์ด๋ฒ„์‹œ๋ฅผ ๋งŒ์กฑํ•˜๋Š” ์„œํฌํŠธ ๋ฒกํ„ฐ ๋ฐ์ดํ„ฐ ๋””์Šคํฌ๋ฆฝ์…˜(SVDD)์„ ๊ตฌํ•˜๊ณ  ์ด๋ฅผ ๋ ˆ๋ฒจ์ง‘ํ•ฉ์œผ๋กœ ํ™œ์šฉํ•ด ๋™์—ญํ•™๊ณ„๋กœ ๊ทน์†Œ์ ๋“ค์„ ๊ตฌํ•œ๋‹ค. ํ‰ํ˜•์ ์„ ํ™œ์šฉํ•˜๊ฑฐ๋‚˜ ๊ณ ์ฐจ์› ๋ฐ์ดํ„ฐ์˜ ๊ฒฝ์šฐ ์ดˆ์ž…๋ฐฉ์ฒด๋ฅผ ๋งŒ๋“ค์–ด, ํ•™์Šตํ•œ ๋ชจ๋ธ์„ ์ถ”๋ก ์— ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋Š” (1) ์„œํฌํŠธ ํ•จ์ˆ˜๋ฅผ ๊ณต๊ฐœ ํ•˜๋Š” ๋ฐฉ๋ฒ•๊ณผ (2) ํ‰ํ˜•์ ์„ ๊ณต๊ฐœํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์‹œํ•œ๋‹ค. 8๊ฐœ์˜ ๋‹ค์–‘ํ•œ ๋ฐ์ดํ„ฐ ์ง‘ํ•ฉ์˜ ์‹คํ—˜์ ์ธ ๊ฒฐ๊ณผ๋Š” ์ œ์‹œํ•œ ๋ฐฉ๋ฒ•๋ก ์ด ๋…ธ์ด์ฆˆ์— ๊ฐ•๊ฑดํ•œ ๋‚ด๋ถ€์˜ ์ ์„ ํ™œ์šฉํ•ด ๊ธฐ์กด์˜ ์ฐจ๋ถ„ ํ”„๋ผ์ด๋ฒ„์‹œ ์„œํฌํŠธ ๋ฒกํ„ฐ ๋จธ์‹ ๋ณด๋‹ค ์„ฑ๋Šฅ์„ ๋†’์ด๊ณ , ์ฐจ๋ถ„ ํ”„๋ผ์ด๋ฒ„์‹œ๊ฐ€ ์ ์šฉ๋˜๊ธฐ ์–ด๋ ค์šด ์ž‘์€ ๋ฐ์ดํ„ฐ์…‹์—๋„ ํ™œ์šฉ๋  ์ˆ˜ ์žˆ๋‹ค๋Š” ๊ธฐ์ˆ ์ž„์„ ๋ณด์—ฌ์ค€๋‹ค.Chapter 1 Introduction 1 1.1 Problem Description: Data Privacy 1 1.2 The Privacy of Support Vector Methods 2 1.3 Research Motivation and Contribution 4 1.4 Organization of the Thesis 5 Chapter 2 Literature Review 6 2.1 Differentially private Empirical risk minimization 6 2.2 Differentially private Support vector machine 7 Chapter 3 Preliminaries 9 3.1 Differential privacy 9 Chapter 4 Differential private support vector data description 12 4.1 Support vector data description 12 4.2 Differentially private support vector data description 13 Chapter 5 Differentially private multi-class classification utilizing SVDD 19 5.1 Phase I. Constructing a private support level function 20 5.2 Phase II: Differentially private clustering on the data space via a dynamical system 21 5.3 Phase III: Classifying the decomposed regions under differential privacy 22 Chapter 6 Inference scenarios and releasing the differentially private model 25 6.1 Publishing support function 26 6.2 Releasing equilibrium points 26 6.3 Comparison to previous methods 27 Chapter 7 Experiments 28 7.1 Models and Scenario setting 28 7.2 Datasets 29 7.3 Experimental settings 29 7.4 Empirical results on various datasets under publishing support function 30 7.5 Evaluating robustness under diverse data size 33 7.6 Inference through equilibrium points 33 Chapter 8 Conclusion 34 8.1 Conclusion 34์„

    Experiences of aiding autobiographical memory Using the SenseCam

    Get PDF
    Human memory is a dynamic system that makes accessible certain memories of events based on a hierarchy of information, arguably driven by personal significance. Not all events are remembered, but those that are tend to be more psychologically relevant. In contrast, lifelogging is the process of automatically recording aspects of one's life in digital form without loss of information. In this article we share our experiences in designing computer-based solutions to assist people review their visual lifelogs and address this contrast. The technical basis for our work is automatically segmenting visual lifelogs into events, allowing event similarity and event importance to be computed, ideas that are motivated by cognitive science considerations of how human memory works and can be assisted. Our work has been based on visual lifelogs gathered by dozens of people, some of them with collections spanning multiple years. In this review article we summarize a series of studies that have led to the development of a browser that is based on human memory systems and discuss the inherent tension in storing large amounts of data but making the most relevant material the most accessible

    Experiences of aiding autobiographical memory using the sensecam

    Get PDF
    Human memory is a dynamic system that makes accessible certain memories of events based on a hierarchy of information, arguably driven by personal significance. Not all events are remembered, but those that are tend to be more psychologically relevant. In contrast, lifelogging is the process of automatically recording aspects of one's life in digital form without loss of information. In this article we share our experiences in designing computer-based solutions to assist people review their visual lifelogs and address this contrast. The technical basis for our work is automatically segmenting visual lifelogs into events, allowing event similarity and event importance to be computed, ideas that are motivated by cognitive science considerations of how human memory works and can be assisted. Our work has been based on visual lifelogs gathered by dozens of people, some of them with collections spanning multiple years. In this review article we summarize a series of studies that have led to the development of a browser that is based on human memory systems and discuss the inherent tension in storing large amounts of data but making the most relevant material the most accessible

    Multi-factor Physical Layer Security Authentication in Short Blocklength Communication

    Full text link
    Lightweight and low latency security schemes at the physical layer that have recently attracted a lot of attention include: (i) physical unclonable functions (PUFs), (ii) localization based authentication, and, (iii) secret key generation (SKG) from wireless fading coefficients. In this paper, we focus on short blocklengths and propose a fast, privacy preserving, multi-factor authentication protocol that uniquely combines PUFs, proximity estimation and SKG. We focus on delay constrained applications and demonstrate the performance of the SKG scheme in the short blocklength by providing a numerical comparison of three families of channel codes, including half rate low density parity check codes (LDPC), Bose Chaudhuri Hocquenghem (BCH), and, Polar Slepian Wolf codes for n=512, 1024. The SKG keys are incorporated in a zero-round-trip-time resumption protocol for fast re-authentication. All schemes of the proposed mutual authentication protocol are shown to be secure through formal proofs using Burrows, Abadi and Needham (BAN) and Mao and Boyd (MB) logic as well as the Tamarin-prover

    Novelty, distillation, and federation in machine learning for medical imaging

    Get PDF
    The practical application of deep learning methods in the medical domain has many challenges. Pathologies are diverse and very few examples may be available for rare cases. Where data is collected it may lie in multiple institutions and cannot be pooled for practical and ethical reasons. Deep learning is powerful for image segmentation problems but ultimately its output must be interpretable at the patient level. Although clearly not an exhaustive list, these are the three problems tackled in this thesis. To address the rarity of pathology I investigate novelty detection algorithms to find outliers from normal anatomy. The problem is structured as first finding a low-dimension embedding and then detecting outliers in that embedding space. I evaluate for speed and accuracy several unsupervised embedding and outlier detection methods. Data consist of Magnetic Resonance Imaging (MRI) for interstitial lung disease for which healthy and pathological patches are available; only the healthy patches are used in model training. I then explore the clinical interpretability of a model output. I take related work by the Canon team โ€” a model providing voxel-level detection of acute ischemic stroke signs โ€” and deliver the Alberta Stroke Programme Early CT Score (ASPECTS, a measure of stroke severity). The data are acute head computed tomography volumes of suspected stroke patients. I convert from the voxel level to the brain region level and then to the patient level through a series of rules. Due to the real world clinical complexity of the problem, there are at each level โ€” voxel, region and patient โ€” multiple sources of โ€œtruthโ€; I evaluate my results appropriately against these truths. Finally, federated learning is used to train a model on data that are divided between multiple institutions. I introduce a novel evolution of this algorithm โ€” dubbed โ€œsoft federated learningโ€ โ€” that avoids the central coordinating authority, and takes into account domain shift (covariate shift) and dataset size. I first demonstrate the key properties of these two algorithms on a series of MNIST (handwritten digits) toy problems. Then I apply the methods to the BraTS medical dataset, which contains MRI brain glioma scans from multiple institutions, to compare these algorithms in a realistic setting
    • โ€ฆ
    corecore