681 research outputs found

    BFDA: A MATLAB Toolbox for Bayesian Functional Data Analysis

    Get PDF
    We provide a MATLAB toolbox, BFDA, that implements a Bayesian hierarchical model to smooth multiple functional data samples with the assumptions of the same underlying Gaussian process distribution, a Gaussian process prior for the mean function, and an Inverse-Wishart process prior for the covariance function. This model-based approach can borrow strength from all functional data samples to increase the smoothing accuracy, as well as simultaneously estimate the mean-covariance functions. An option of approximating the Bayesian inference process using cubic B-spline basis functions is integrated in BFDA, which allows for efficiently dealing with high-dimensional functional data. Examples of using BFDA in various scenarios and conducting follow-up functional regression are provided. The advantages of BFDA include: (1) simultaneously smooths multiple functional data samples and estimates the mean-covariance functions in a nonparametric way; (2) flexibly deals with sparse and high-dimensional functional data with stationary and nonstationary covariance functions, and without the requirement of common observation grids; (3) provides accurately smoothed functional data for follow-up analysis

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    Association of homocysteine with type 2 diabetes: a meta-analysis implementing Mendelian randomization approach

    Get PDF
    Background: We tested the hypothesis that elevated homocysteine (Hcy) level is causally associated with increased risk of type 2 diabetes mellitus (T2DM). Results: The meta-analysis and Mendelian randomization analysis were performed among 4011 cases and 4303 controls. The absolute pooled mean Hcy concentration in subjects with MTHFR 677TT was 5.55 μmol/L (95% CI, 1.33 to 9.77) greater than that in subjects with MTHFR 677CC in T2DM. Overall, the T allele of the MTHFR 677 C > T conferred a greater risk for T2DM [Random effect (RE) OR = 1.31(1.17-1.64), I2 = 41.0%, p = 0.055]. The random effect (RE) pooled OR associated with T2DM for MTHFR 677TT relative to the 677CC was [RE OR = 1.38(1.18-1.62)]. The fixed-effect pooled OR of the association for the MTHFR 677 TT vs CT was 1.29 (95% CI, 1.09-1.51). MTHFR 677 TT showed a significantly higher risk for T2DM compared with MTHFR 677 CC + CT [Fixed effect (FE) OR = 1.32(1.14-1.54), I2 = 0.0%, p = 0.686]. The absolute pooled mean Hcy concentration in individuals with T2DM was 0.94 μmol/L (95% CI, 0.40-1.48) greater than that in control subjects. The estimated causal OR associated with T2DM was 1.29 for 5 μmol/L increment in Hcy. Conclusions: Our findings provided strong evidence on the causal association of Hcy level with the development of T2DM

    A survey on vulnerability of federated learning: A learning algorithm perspective

    Get PDF
    Federated Learning (FL) has emerged as a powerful paradigm for training Machine Learning (ML), particularly Deep Learning (DL) models on multiple devices or servers while maintaining data localized at owners’ sites. Without centralizing data, FL holds promise for scenarios where data integrity, privacy and security and are critical. However, this decentralized training process also opens up new avenues for opponents to launch unique attacks, where it has been becoming an urgent need to understand the vulnerabilities and corresponding defense mechanisms from a learning algorithm perspective. This review paper takes a comprehensive look at malicious attacks against FL, categorizing them from new perspectives on attack origins and targets, and providing insights into their methodology and impact. In this survey, we focus on threat models targeting the learning process of FL systems. Based on the source and target of the attack, we categorize existing threat models into four types, Data to Model (D2M), Model to Data (M2D), Model to Model (M2M) and composite attacks. For each attack type, we discuss the defense strategies proposed, highlighting their effectiveness, assumptions and potential areas for improvement. Defense strategies have evolved from using a singular metric to excluding malicious clients, to employing a multifaceted approach examining client models at various phases. In this survey paper, our research indicates that the to-learn data, the learning gradients, and the learned model at different stages all can be manipulated to initiate malicious attacks that range from undermining model performance, reconstructing private local data, and to inserting backdoors. We have also seen these threat are becoming more insidious. While earlier studies typically amplified malicious gradients, recent endeavors subtly alter the least significant weights in local models to bypass defense measures. This literature review provides a holistic understanding of the current FL threat landscape and highlights the importance of developing robust, efficient, and privacy-preserving defenses to ensure the safe and trusted adoption of FL in real-world applications. The categorized bibliography can be found at: https://github.com/Rand2AI/Awesome-Vulnerability-of-Federated-Learning

    Review-Driven Multi-Label Music Style Classification by Exploiting Style Correlations

    Full text link
    This paper explores a new natural language processing task, review-driven multi-label music style classification. This task requires the system to identify multiple styles of music based on its reviews on websites. The biggest challenge lies in the complicated relations of music styles. It has brought failure to many multi-label classification methods. To tackle this problem, we propose a novel deep learning approach to automatically learn and exploit style correlations. The proposed method consists of two parts: a label-graph based neural network, and a soft training mechanism with correlation-based continuous label representation. Experimental results show that our approach achieves large improvements over the baselines on the proposed dataset. Especially, the micro F1 is improved from 53.9 to 64.5, and the one-error is reduced from 30.5 to 22.6. Furthermore, the visualized analysis shows that our approach performs well in capturing style correlations

    Hierarchical Text Classification with Reinforced Label Assignment

    Full text link
    While existing hierarchical text classification (HTC) methods attempt to capture label hierarchies for model training, they either make local decisions regarding each label or completely ignore the hierarchy information during inference. To solve the mismatch between training and inference as well as modeling label dependencies in a more principled way, we formulate HTC as a Markov decision process and propose to learn a Label Assignment Policy via deep reinforcement learning to determine where to place an object and when to stop the assignment process. The proposed method, HiLAP, explores the hierarchy during both training and inference time in a consistent manner and makes inter-dependent decisions. As a general framework, HiLAP can incorporate different neural encoders as base models for end-to-end training. Experiments on five public datasets and four base models show that HiLAP yields an average improvement of 33.4% in Macro-F1 over flat classifiers and outperforms state-of-the-art HTC methods by a large margin. Data and code can be found at https://github.com/morningmoni/HiLAP.Comment: EMNLP 201

    Network association strategies for an energy harvesting aided super-wifi network relying on measured solar activity

    No full text
    The super-WiFi network concept has been proposed for nationwide Internet access in the United States. However, the traditional mains power supply is not necessarily ubiquitous in this large-scale wireless network. Furthermore, the non-uniform geographic distribution of both the based-stations and the tele-traffic requires carefully considered user association. Relying on the rapidly developing energy harvesting techniques, we focus our attention on the sophisticated access point (AP) selection strategies conceived for the energy harvesting aided super-WiFi network. Explicitly, we propose a solar radiation model relying on the historical solar activity observation data provided by the University of Queensland, followed by a beneficial radiation parameter estimation method. Furthermore, we formulate both a Markov decision process (MDP) as well as a partially observable MDP (POMDP) for supporting the users’ decisions on beneficially selecting APs. Moreover, we conceive iterative algorithms for implementing our MDP and POMDP-based AP-selection, respectively. Finally, our performance results are benchmarked against a range of traditional decision-making algorithms
    • …
    corecore