435 research outputs found
Bidirectional Contrastive Split Learning for Visual Question Answering
Visual Question Answering (VQA) based on multi-modal data facilitates
real-life applications such as home robots and medical diagnoses. One
significant challenge is to devise a robust decentralized learning framework
for various client models where centralized data collection is refrained due to
confidentiality concerns. This work aims to tackle privacy-preserving VQA by
decoupling a multi-modal model into representation modules and a contrastive
module and leveraging inter-module gradients sharing and inter-client weight
sharing. To this end, we propose Bidirectional Contrastive Split Learning
(BiCSL) to train a global multi-modal model on the entire data distribution of
decentralized clients. We employ the contrastive loss that enables a more
efficient self-supervised learning of decentralized modules. Comprehensive
experiments are conducted on the VQA-v2 dataset based on five SOTA VQA models,
demonstrating the effectiveness of the proposed method. Furthermore, we inspect
BiCSL's robustness against a dual-key backdoor attack on VQA. Consequently,
BiCSL shows much better robustness to the multi-modal adversarial attack
compared to the centralized learning method, which provides a promising
approach to decentralized multi-modal learning
Federated Phish Bowl: LSTM-Based Decentralized Phishing Email Detection
With increasingly more sophisticated phishing campaigns in recent years,
phishing emails lure people using more legitimate-looking personal contexts. To
tackle this problem, instead of traditional heuristics-based algorithms, more
adaptive detection systems such as natural language processing (NLP)-powered
approaches are essential to understanding phishing text representations.
Nevertheless, concerns surrounding the collection of phishing data that might
cover confidential information hinder the effectiveness of model learning. We
propose a decentralized phishing email detection framework called Federated
Phish Bowl (FedPB) which facilitates collaborative phishing detection with
privacy. In particular, we devise a knowledge-sharing mechanism with federated
learning (FL). Using long short-term memory (LSTM) for phishing detection, the
framework adapts by sharing a global word embedding matrix across the clients,
with each client running its local model with Non-IID data. We collected the
most recent phishing samples to study the effectiveness of the proposed method
using different client numbers and data distributions. The results show that
FedPB can attain a competitive performance with a centralized phishing
detector, with generality to various cases of FL retaining a prediction
accuracy of 83%.Comment: To be published in 2022 IEEE International Conference on Systems,
Man, and Cybernetics (SMC
An Optimized Least Squares Monte Carlo Approach to Calculate Credit Exposures for Asian and Barrier Options
Counterparty credit risk management has become an important issue for financial institutions since the Basel III framework was introduced. Expected exposure (EE) is defined as the average (positive) exposure at a future date, it is an essential component in the measurement of counterparty credit risk.
This thesis aims to develop an efficient Monte Carlo method to calculate the expected exposures for Asian and barrier options. These options are path-dependent in that their payoffs depend on the historical prices of the underlying assets. Since analytical solutions are generally not available to path-dependent options, the evaluation of the expected exposures has to rely on numerical methods. Monte Carlo method is considered to be more efficient than other methods in particular for high dimension problems.
We briefly introduce the concepts and terms regarding credit exposures in the Basel III framework. Then, we introduce Asian and barrier options as well as some basic pricing models. Next, we will extend the optimized least squares Monte Carlo (OLSM) method to calculate the credit exposures for Asian and barrier options and present our numerical results
Resilience of Wireless Ad Hoc Federated Learning against Model Poisoning Attacks
Wireless ad hoc federated learning (WAFL) is a fully decentralized
collaborative machine learning framework organized by opportunistically
encountered mobile nodes. Compared to conventional federated learning, WAFL
performs model training by weakly synchronizing the model parameters with
others, and this shows great resilience to a poisoned model injected by an
attacker. In this paper, we provide our theoretical analysis of the WAFL's
resilience against model poisoning attacks, by formulating the force balance
between the poisoned model and the legitimate model. According to our
experiments, we confirmed that the nodes directly encountered the attacker has
been somehow compromised to the poisoned model but other nodes have shown great
resilience. More importantly, after the attacker has left the network, all the
nodes have finally found stronger model parameters combined with the poisoned
model. Most of the attack-experienced cases achieved higher accuracy than the
no-attack-experienced cases.Comment: 10 pages, 7 figures, to be published in IEEE International Conference
on Trust, Privacy and Security in Intelligent Systems, and Applications 202
Neural 3D Scene Reconstruction from Multiple 2D Images without 3D Supervision
Neural 3D scene reconstruction methods have achieved impressive performance
when reconstructing complex geometry and low-textured regions in indoor scenes.
However, these methods heavily rely on 3D data which is costly and
time-consuming to obtain in real world. In this paper, we propose a novel
neural reconstruction method that reconstructs scenes using sparse depth under
the plane constraints without 3D supervision. We introduce a signed distance
function field, a color field, and a probability field to represent a scene. We
optimize these fields to reconstruct the scene by using differentiable ray
marching with accessible 2D images as supervision. We improve the
reconstruction quality of complex geometry scene regions with sparse depth
obtained by using the geometric constraints. The geometric constraints project
3D points on the surface to similar-looking regions with similar features in
different 2D images. We impose the plane constraints to make large planes
parallel or vertical to the indoor floor. Both two constraints help reconstruct
accurate and smooth geometry structures of the scene. Without 3D supervision,
our method achieves competitive performance compared with existing methods that
use 3D supervision on the ScanNet dataset.Comment: 10 pages, 6 figure
Deep Learning for Optimization of Trajectories for Quadrotors
This paper presents a novel learning-based trajectory planning framework for
quadrotors that combines model-based optimization techniques with deep
learning. Specifically, we formulate the trajectory optimization problem as a
quadratic programming (QP) problem with dynamic and collision-free constraints
using piecewise trajectory segments through safe flight corridors [1]. We train
neural networks to directly learn the time allocation for each segment to
generate optimal smooth and fast trajectories. Furthermore, the constrained
optimization problem is applied as a separate implicit layer for
backpropagation in the network, for which the differential loss function can be
obtained. We introduce an additional penalty function to penalize time
allocations which result in solutions that violate the constraints to
accelerate the training process and increase the success rate of the original
optimization problem. To this end, we enable a flexible number of sequences of
piece-wise trajectories by adding an extra end-of-sentence token during
training. We illustrate the performance of the proposed method via extensive
simulation and experimentation and show that it works in real time in diverse,
cluttered environments
- …