62 research outputs found

    Confidential Boosting with Random Linear Classifiers for Outsourced User-generated Data

    Full text link
    User-generated data is crucial to predictive modeling in many applications. With a web/mobile/wearable interface, a data owner can continuously record data generated by distributed users and build various predictive models from the data to improve their operations, services, and revenue. Due to the large size and evolving nature of users data, data owners may rely on public cloud service providers (Cloud) for storage and computation scalability. Exposing sensitive user-generated data and advanced analytic models to Cloud raises privacy concerns. We present a confidential learning framework, SecureBoost, for data owners that want to learn predictive models from aggregated user-generated data but offload the storage and computational burden to Cloud without having to worry about protecting the sensitive data. SecureBoost allows users to submit encrypted or randomly masked data to designated Cloud directly. Our framework utilizes random linear classifiers (RLCs) as the base classifiers in the boosting framework to dramatically simplify the design of the proposed confidential boosting protocols, yet still preserve the model quality. A Cryptographic Service Provider (CSP) is used to assist the Cloud's processing, reducing the complexity of the protocol constructions. We present two constructions of SecureBoost: HE+GC and SecSh+GC, using combinations of homomorphic encryption, garbled circuits, and random masking to achieve both security and efficiency. For a boosted model, Cloud learns only the RLCs and the CSP learns only the weights of the RLCs. Finally, the data owner collects the two parts to get the complete model. We conduct extensive experiments to understand the quality of the RLC-based boosting and the cost distribution of the constructions. Our results show that SecureBoost can efficiently learn high-quality boosting models from protected user-generated data

    Reinforcement Learning Agents acquire Flocking and Symbiotic Behaviour in Simulated Ecosystems

    Get PDF
    In nature, group behaviours such as flocking as well as cross-species symbiotic partnerships are observed in vastly different forms and circumstances. We hypothesize that such strategies can arise in response to generic predator-prey pressures in a spatial environment with range-limited sensation and action. We evaluate whether these forms of coordination can emerge by independent multi-agent reinforcement learning in simple multiple-species ecosystems. In contrast to prior work, we avoid hand-crafted shaping rewards, specific actions, or dynamics that would directly encourage coordination across agents. Instead we test whether coordination emerges as a consequence of adaptation without encouraging these specific forms of coordination, which only has indirect benefit. Our simulated ecosystems consist of a generic food chain involving three trophic levels: apex predator, mid-level predator, and prey. We conduct experiments on two different platforms, a 3D physics engine with tens of agents as well as in a 2D grid world with up to thousands. The results clearly confirm our hypothesis and show substantial coordination both within and across species. To obtain these results, we leverage and adapt recent advances in deep reinforcement learning within an ecosystem training protocol featuring homogeneous groups of independent agents from different species (sets of policies), acting in many different random combinations in parallel habitats. The policies utilize neural network architectures that are invariant to agent individuality but not type (species) and that generalize across varying numbers of observed other agents. While the emergence of complexity in artificial ecosystems have long been studied in the artificial life community, the focus has been more on individual complexity and genetic algorithms or explicit modelling, and less on group complexity and reinforcement learning emphasized in this article. Unlike what the name and intuition suggests, reinforcement learning adapts over evolutionary history rather than a life-time and is here addressing the sequential optimization of fitness that is usually approached by genetic algorithms in the artificial life community. We utilize a shift from procedures to objectives, allowing us to bring new powerful machinery to bare, and we see emergence of complex behaviour from a sequence of simple optimization problems

    Endoscopic endonasal surgical anatomy of the optic canal: key anatomical relationships between the optic nerve and ophthalmic artery

    Get PDF
    Purpose A detailed understanding of the neurovascular relationships between the optic nerve (ON) and the ophthalmic artery (OA) in the optic canal (OC) is paramount for safe surgery. We focused on the neurovascular anatomy of this area from both an endoscopic endonasal and transcranial trajectories to compare the surgical exposures and perspectives offered by these different views and provide recommendations to increase the intraoperative safety. Methods Twenty sides of ten formalin-fixed, latex-injected head specimens were utilized. The surgical anatomy and anatomical relationships of the OA in relationship to the ON along their intracranial and intracanalicular segments was studied from endoscopic endonasal and transcranial perspectives. Results Three types of OA-ON relationships at the origin of the OA were identified: inferomedial (type 1, 35%), inferior (type 2, 55%), and inferolateral (type 3, 10%). The endoscopic endonasal trajectory offers an inferomedial perspective of the ON-OA neurovascular complex, in which the OA, especially when located inferomedially, is first encountered. When comparing with the transcranial view, all OA were covered by the nerve, type 1 was located below the medial third, type 2 below the middle third, and type 3 below the lateral third of the OC. The mean extension of the intracanalicular portion of both OA and ON was 8.9 mm, while the intracranial portion of the OA and ON were 9.3 mm and 12.4 mm, respectively. The OA, endoscopically, is located within the inferior half of the OC, and occupies 39%, 43%, and 42% of the OC height at its origin, mid, and end points, respectively. The mean distance between the superior margin of the OC at its origin and superior margin of the OA is 1.4 mm. Conclusions Detailed anatomical understanding of the OC, and the ON and OA at their intracranial and intracanalicular segments is paramount to safe surgery. When opening the OC dura endoscopically, our results suggest that a medial incision along the superior third of the OC with a proximal to distal direction is recommended to avoid injury of the OA

    Game Plan: What AI can do for Football, and What Football can do for AI

    Get PDF
    The rapid progress in artificial intelligence (AI) and machine learning has opened unprecedented analytics possibilities in various team and individual sports, including baseball, basketball, and tennis. More recently, AI techniques have been applied to football, due to a huge increase in data collection by professional teams, increased computational power, and advances in machine learning, with the goal of better addressing new scientific challenges involved in the analysis of both individual players’ and coordinated teams’ behaviors. The research challenges associated with predictive and prescriptive football analytics require new developments and progress at the intersection of statistical learning, game theory, and computer vision. In this paper, we provide an overarching perspective highlighting how the combination of these fields, in particular, forms a unique microcosm for AI research, while offering mutual benefits for professional teams, spectators, and broadcasters in the years to come. We illustrate that this duality makes football analytics a game changer of tremendous value, in terms of not only changing the game of football itself, but also in terms of what this domain can mean for the field of AI. We review the state-of-theart and exemplify the types of analysis enabled by combining the aforementioned fields, including illustrative examples of counterfactual analysis using predictive models, and the combination of game-theoretic analysis of penalty kicks with statistical learning of player attributes. We conclude by highlighting envisioned downstream impacts, including possibilities for extensions to other sports (real and virtual)

    EPIC: Efficient Private Image Classification (or: Learning from the Masters)

    Get PDF
    Outsourcing an image classification task raises privacy concerns, both from the image provider\u27s perspective, who wishes to keep their images confidential, and from the classification algorithm provider\u27s perspective, who wishes to protect the intellectual property of their classifier. We propose EPIC, an efficient private image classification system based on support vector machine (SVM) learning, which is secure against malicious adversaries. The novelty of EPIC is that it builds upon transfer learning techniques known from the Machine Learning (ML) literature and minimizes the load on the privacy-preserving part. Our solution is based on Secure Multiparty Computation (MPC), it is 34 times faster than Gazelle (USENIX 2018) --the state-of-the-art in private image classification-- and it improves the total communication cost by 50 times, while achieving a 7\% higher accuracy on CIFAR-10 dataset. When benchmarked for performance, while maintaining the same CIFAR-10 accuracy as Gazelle, EPIC is 700 times faster and the communication cost is reduced by 500 times

    TRPA1 Contributes to the Acute Inflammatory Response and Mediates Carrageenan-Induced Paw Edema in the Mouse

    Get PDF
    Transient receptor potential ankyrin 1 (TRPA1) is an ion channel involved in thermosensation and nociception. TRPA1 is activated by exogenous irritants and also by oxidants formed in inflammatory reactions. However, our understanding of its role in inflammation is limited. Here, we tested the hypothesis that TRPA1 is involved in acute inflammatory edema. The TRPA1 agonist allyl isothiocyanate (AITC) induced inflammatory edema when injected intraplantarly to mice, mimicking the classical response to carrageenan. Interestingly, the TRPA1 antagonist HC-030031 and the cyclo-oxygenase (COX) inhibitor ibuprofen inhibited not only AITC but also carrageenan-induced edema. TRPA1-deficient mice displayed attenuated responses to carrageenan and AITC. Furthermore, AITC enhanced COX-2 expression in HEK293 cells transfected with human TRPA1, a response that was reversed by HC-030031. This study demonstrates a hitherto unknown role of TRPA1 in carrageenan-induced inflammatory edema. The results also strongly suggest that TRPA1 contributes, in a COX-dependent manner, to the development of acute inflammation

    Private genome analysis through homomorphic encryption

    Get PDF
    Background: The rapid development of genome sequencing technology allows researchers to access large genome datasets. However, outsourcing the data processing o the cloud poses high risks for personal privacy. The aim of this paper is to give a practical solution for this problem using homomorphic encryption. In our approach, all the computations can be performed in an untrusted cloud without requiring the decryption key or any interaction with the data owner, which preserves the privacy of genome data. Methods: We present evaluation algorithms for secure computation of the minor allele frequencies and chi(2) statistic in a genome-wide association studies setting. We also describe how to privately compute the Hamming distance and approximate Edit distance between encrypted DNA sequences. Finally, we compare performance details of using two practical homomorphic encryption schemes -the BGV scheme by Gentry, Halevi and Smart and the YASHE scheme by Bos, Lauter, Loftus and Naehrig. Results: The approach with the YASHE scheme analyzes data from 400 people within about 2 seconds and picks a variant associated with disease from 311 spots. For another task, using the BGV scheme, it took about 65 seconds to securely compute the approximate Edit distance for DNA sequences of size 5K and figure out the differences between them. Conclusions: The performance numbers for BGV are better than YASHE when homomorphically evaluating deep circuits (like the Hamming distance algorithm or approximate Edit distance algorithm). On the other hand, it is more efficient to use the YASHE scheme for a low-degree computation, such as minor allele frequencies or chi(2) test statistic in a case-control study

    Integrate mechanistic evidence from new approach methodologies (NAMs) into a read-across assessment to characterise trends in shared mode of action

    Get PDF
    This read-across case study characterises thirteen, structurally similar carboxylic acids demonstrating the application of in vitro and in silico human-based new approach methods, to determine biological similarity. Based on data from in vivo animal studies, the read-across hypothesis is that all analogues are steatotic and so should be considered hazardous. Transcriptomic analysis to determine differentially expressed genes (DEGs) in hepatocytes served as first tier testing to confirm a common mode-of-action and identify differences in the potency of the analogues. An adverse outcome pathway (AOP) network for hepatic steatosis, informed the design of an in vitro testing battery, targeting AOP relevant MIEs and KEs, and Dempster-Shafer decision theory was used to systematically quantify uncertainty and to define the minimal testing scope. The case study shows that the read-across hypothesis is the critical core to designing a robust, NAM-based testing strategy. By summarising the current mechanistic understanding, an AOP enables the selection of NAMs covering MIEs, early KEs, and late KEs. Experimental coverage of the AOP in this way is vital since MIEs and early KEs alone are not confirmatory of progression to the AO. This strategy exemplifies the workflow previously published by the EUTOXRISK project driving a paradigm shift towards NAM-based NGRA.Toxicolog
    • 

    corecore