13 research outputs found

    Few-shot Bioacoustic Event Detection with Machine Learning Methods

    Full text link
    Few-shot learning is a type of classification through which predictions are made based on a limited number of samples for each class. This type of classification is sometimes referred to as a meta-learning problem, in which the model learns how to learn to identify rare cases. We seek to extract information from five exemplar vocalisations of mammals or birds and detect and classify these sounds in field recordings [2]. This task was provided in the Detection and Classification of Acoustic Scenes and Events (DCASE) Challenge of 2021. Rather than utilize deep learning, as is most commonly done, we formulated a novel solution using only machine learning methods. Various models were tested, and it was found that logistic regression outperformed both linear regression and template matching. However, all of these methods over-predicted the number of events in the field recordings.Comment: 7 pages, 6 tables, 1 figur

    pFedDef: Defending Grey-Box Attacks for Personalized Federated Learning

    Full text link
    Personalized federated learning allows for clients in a distributed system to train a neural network tailored to their unique local data while leveraging information at other clients. However, clients' models are vulnerable to attacks during both the training and testing phases. In this paper we address the issue of adversarial clients crafting evasion attacks at test time to deceive other clients. For example, adversaries may aim to deceive spam filters and recommendation systems trained with personalized federated learning for monetary gain. The adversarial clients have varying degrees of personalization based on the method of distributed learning, leading to a "grey-box" situation. We are the first to characterize the transferability of such internal evasion attacks for different learning methods and analyze the trade-off between model accuracy and robustness depending on the degree of personalization and similarities in client data. We introduce a defense mechanism, pFedDef, that performs personalized federated adversarial training while respecting resource limitations at clients that inhibit adversarial training. Overall, pFedDef increases relative grey-box adversarial robustness by 62% compared to federated adversarial training and performs well even under limited system resources.Comment: 16 pages, 5 figures (11 images if counting sub-figures separately), longer version of paper submitted to CrossFL 2022 poster workshop, code available at (https://github.com/tj-kim/pFedDef_v1

    Adversarial Robustness Unhardening via Backdoor Attacks in Federated Learning

    Full text link
    In today's data-driven landscape, the delicate equilibrium between safeguarding user privacy and unleashing data potential stands as a paramount concern. Federated learning, which enables collaborative model training without necessitating data sharing, has emerged as a privacy-centric solution. This decentralized approach brings forth security challenges, notably poisoning and backdoor attacks where malicious entities inject corrupted data. Our research, initially spurred by test-time evasion attacks, investigates the intersection of adversarial training and backdoor attacks within federated learning, introducing Adversarial Robustness Unhardening (ARU). ARU is employed by a subset of adversaries to intentionally undermine model robustness during decentralized training, rendering models susceptible to a broader range of evasion attacks. We present extensive empirical experiments evaluating ARU's impact on adversarial training and existing robust aggregation defenses against poisoning and backdoor attacks. Our findings inform strategies for enhancing ARU to counter current defensive measures and highlight the limitations of existing defenses, offering insights into bolstering defenses against ARU.Comment: 8 pages, 6 main pages of text, 4 figures, 2 tables. Made for a Neurips workshop on backdoor attack

    D2.1 Performance evaluation framework

    Full text link
    This deliverable contains a proposal for a performance evaluation framework that aims at ensuring that multiple projects within 5G-PPP wireless strand can quantitatively assess and compare the performance of different 5G RAN design concepts. The report collects the vision of several 5G-PPP projects and is conceived as a living document to be further elaborated along with the 5G-PPP framework workshops planned during 2016.Weber, A.; Agyapong, P.; Rosowski, T.; Zimmerman, G.; Fallgren, M.; Sharma, S.; Kousaridas, A.... (2016). D2.1 Performance evaluation framework. https://doi.org/10.13140/RG.2.2.35447.2192

    D2.2 Draft Overall 5G RAN Design

    Full text link
    This deliverable provides the consolidated preliminary view of the METIS-II partners on the 5 th generation (5G) radio access network (RAN) design at a mid-point of the project. The overall 5G RAN is envisaged to operate over a wide range of spectrum bands comprising of heterogeneous spectrum usage scenarios. More precisely, the 5G air interface (AI) is expected to be composed of multiple so-called AI variants (AIVs), which include evolved legacy technology such as Long Term Evolution Advanced (LTE-A) as well as novel AIVs, which may be tailored to particular services or frequency bands.Arnold, P.; Bayer, N.; Belschner, J.; Rosowski, T.; Zimmermann, G.; Ericson, M.; Da Silva, IL.... (2016). D2.2 Draft Overall 5G RAN Design. https://doi.org/10.13140/RG.2.2.17831.1424

    SPECTROGRAPHIC SEAM PATTERNS FOR DISCRIMINATIVE WORD SPOTTING

    No full text
    This paper presents a novel method for deriving patterns for classification of speech sounds. In contrast to conventional methods that attempt to capture time-frequency patterns as represented by spectral envelopes or peaks, our method captures patterns of high-energy tracks, or seams, of maximum “whiteness ” across frequency in spectrograms. Our hypothesis is that these seams could potentially carry relatively invariant signatures of underlying sounds. We present a method to derive feature vectors from seam patterns for discriminative word spotting. We show experimentally that spectrographic seam patterns are indeed distinctive for different spoken words, and are effective for word spotting

    Informal Lending in Emerging Markets

    No full text
    corecore