-
Spectrum of random-to-random shuffling in the Hecke algebra
Authors:
Ilani Axelrod-Freed,
Sarah Brauner,
Judy Chiang,
Patricia Commins,
Veronica Lang
Abstract:
We generalize random-to-random shuffling from a Markov chain on the symmetric group to one on the Type A Iwahori Hecke algebra, and show that its eigenvalues are polynomials in q with non-negative integer coefficients. Setting q=1 recovers results of Dieker and Saliola, whose computation of the spectrum of random-to-random in the symmetric group resolved a nearly 20 year old conjecture by Uyemura-…
▽ More
We generalize random-to-random shuffling from a Markov chain on the symmetric group to one on the Type A Iwahori Hecke algebra, and show that its eigenvalues are polynomials in q with non-negative integer coefficients. Setting q=1 recovers results of Dieker and Saliola, whose computation of the spectrum of random-to-random in the symmetric group resolved a nearly 20 year old conjecture by Uyemura-Reyes. Our methods simplify their proofs by drawing novel connections to the Jucys-Murphy elements of the Hecke algebra, Young seminormal forms, and the Okounkov-Vershik approach to representation theory.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Efficient GANs for Document Image Binarization Based on DWT and Normalization
Authors:
Rui-Yang Ju,
KokSheik Wong,
Jen-Shiun Chiang
Abstract:
For document image binarization task, generative adversarial networks (GANs) can generate images where shadows and noise are effectively removed, which allow for text information extraction. The current state-of-the-art (SOTA) method proposes a three-stage network architecture that utilizes six GANs. Despite its excellent model performance, the SOTA network architecture requires long training and…
▽ More
For document image binarization task, generative adversarial networks (GANs) can generate images where shadows and noise are effectively removed, which allow for text information extraction. The current state-of-the-art (SOTA) method proposes a three-stage network architecture that utilizes six GANs. Despite its excellent model performance, the SOTA network architecture requires long training and inference times. To overcome this problem, this work introduces an efficient GAN method based on the three-stage network architecture that incorporates the Discrete Wavelet Transformation and normalization to reduce the input image size, which in turns, decrease both training and inference times. In addition, this work presents novel generators, discriminators, and loss functions to improve the model's performance. Experimental results show that the proposed method reduces the training time by 10% and the inference time by 26% when compared to the SOTA method while maintaining the model performance at 73.79 of Avg-Score. Our implementation code is available on GitHub at https://github.com/RuiyangJu/Efficient_Document_Image_Binarization.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.
-
Global Context Modeling in YOLOv8 for Pediatric Wrist Fracture Detection
Authors:
Rui-Yang Ju,
Chun-Tse Chien,
Chia-Min Lin,
Jen-Shiun Chiang
Abstract:
Children often suffer wrist injuries in daily life, while fracture injuring radiologists usually need to analyze and interpret X-ray images before surgical treatment by surgeons. The development of deep learning has enabled neural network models to work as computer-assisted diagnosis (CAD) tools to help doctors and experts in diagnosis. Since the YOLOv8 models have obtained the satisfactory succes…
▽ More
Children often suffer wrist injuries in daily life, while fracture injuring radiologists usually need to analyze and interpret X-ray images before surgical treatment by surgeons. The development of deep learning has enabled neural network models to work as computer-assisted diagnosis (CAD) tools to help doctors and experts in diagnosis. Since the YOLOv8 models have obtained the satisfactory success in object detection tasks, it has been applied to fracture detection. The Global Context (GC) block effectively models the global context in a lightweight way, and incorporating it into YOLOv8 can greatly improve the model performance. This paper proposes the YOLOv8+GC model for fracture detection, which is an improved version of the YOLOv8 model with the GC block. Experimental results demonstrate that compared to the original YOLOv8 model, the proposed YOLOv8-GC model increases the mean average precision calculated at intersection over union threshold of 0.5 (mAP 50) from 63.58% to 66.32% on the GRAZPEDWRI-DX dataset, achieving the state-of-the-art (SOTA) level. The implementation code for this work is available on GitHub at https://github.com/RuiyangJu/YOLOv8_Global_Context_Fracture_Detection.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
Context Matters: An Empirical Study of the Impact of Contextual Information in Temporal Question Answering Systems
Authors:
Dan Schumacher,
Fatemeh Haji,
Tara Grey,
Niharika Bandlamudi,
Nupoor Karnik,
Gagana Uday Kumar,
Jason Cho-Yu Chiang,
Paul Rad,
Nishant Vishwamitra,
Anthony Rios
Abstract:
Large language models (LLMs) often struggle with temporal reasoning, crucial for tasks like historical event analysis and time-sensitive information retrieval. Despite advancements, state-of-the-art models falter in handling temporal information, especially when faced with irrelevant or noisy contexts. This paper addresses this gap by empirically examining the robustness of temporal question-answe…
▽ More
Large language models (LLMs) often struggle with temporal reasoning, crucial for tasks like historical event analysis and time-sensitive information retrieval. Despite advancements, state-of-the-art models falter in handling temporal information, especially when faced with irrelevant or noisy contexts. This paper addresses this gap by empirically examining the robustness of temporal question-answering (TQA) systems trained on various context types, including relevant, irrelevant, slightly altered, and no context. Our findings indicate that training with a mix of these contexts enhances model robustness and accuracy. Additionally, we show that the position of context relative to the question significantly impacts performance, with question-first positioning yielding better results. We introduce two new context-rich TQA datasets, ContextAQA and ContextTQE, and provide comprehensive evaluations and guidelines for training robust TQA models. Our work lays the foundation for developing reliable and context-aware temporal QA systems, with broader implications for enhancing LLM robustness against diverse and potentially adversarial information.
△ Less
Submitted 27 June, 2024;
originally announced June 2024.
-
Privacy-Preserving Logistic Regression Training on Large Datasets
Authors:
John Chiang
Abstract:
Privacy-preserving machine learning is one class of cryptographic methods that aim to analyze private and sensitive data while keeping privacy, such as homomorphic logistic regression training over large encrypted data. In this paper, we propose an efficient algorithm for logistic regression training on large encrypted data using Homomorphic Encryption (HE), which is the mini-batch version of rece…
▽ More
Privacy-preserving machine learning is one class of cryptographic methods that aim to analyze private and sensitive data while keeping privacy, such as homomorphic logistic regression training over large encrypted data. In this paper, we propose an efficient algorithm for logistic regression training on large encrypted data using Homomorphic Encryption (HE), which is the mini-batch version of recent methods using a faster gradient variant called $\texttt{quadratic gradient}$. It is claimed that $\texttt{quadratic gradient}$ can integrate curve information (Hessian matrix) into the gradient and therefore can effectively accelerate the first-order gradient (descent) algorithms. We also implement the full-batch version of their method when the encrypted dataset is so large that it has to be encrypted in the mini-batch manner. We compare our mini-batch algorithm with our full-batch implementation method on real financial data consisting of 422,108 samples with 200 freatures. %Our experiments show that Nesterov's accelerated gradient (NAG) Given the inefficiency of HEs, our results are inspiring and demonstrate that the logistic regression training on large encrypted dataset is of practical feasibility, marking a significant milestone in our understanding.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Enhancing Antibiotic Stewardship using a Natural Language Approach for Better Feature Representation
Authors:
Simon A. Lee,
Trevor Brokowski,
Jeffrey N. Chiang
Abstract:
The rapid emergence of antibiotic-resistant bacteria is recognized as a global healthcare crisis, undermining the efficacy of life-saving antibiotics. This crisis is driven by the improper and overuse of antibiotics, which escalates bacterial resistance. In response, this study explores the use of clinical decision support systems, enhanced through the integration of electronic health records (EHR…
▽ More
The rapid emergence of antibiotic-resistant bacteria is recognized as a global healthcare crisis, undermining the efficacy of life-saving antibiotics. This crisis is driven by the improper and overuse of antibiotics, which escalates bacterial resistance. In response, this study explores the use of clinical decision support systems, enhanced through the integration of electronic health records (EHRs), to improve antibiotic stewardship. However, EHR systems present numerous data-level challenges, complicating the effective synthesis and utilization of data. In this work, we transform EHR data into a serialized textual representation and employ pretrained foundation models to demonstrate how this enhanced feature representation can aid in antibiotic susceptibility predictions. Our results suggest that this text representation, combined with foundation models, provides a valuable tool to increase interpretability and support antibiotic stewardship efforts.
△ Less
Submitted 30 May, 2024;
originally announced May 2024.
-
A Simple Solution for Homomorphic Evaluation on Large Intervals
Authors:
John Chiang
Abstract:
Homomorphic encryption (HE) is a promising technique used for privacy-preserving computation. Since HE schemes only support primitive polynomial operations, homomorphic evaluation of polynomial approximations for non-polynomial functions plays an important role in privacy-preserving machine learning. In this paper, we introduce a simple solution to approximating any functions, which might be overm…
▽ More
Homomorphic encryption (HE) is a promising technique used for privacy-preserving computation. Since HE schemes only support primitive polynomial operations, homomorphic evaluation of polynomial approximations for non-polynomial functions plays an important role in privacy-preserving machine learning. In this paper, we introduce a simple solution to approximating any functions, which might be overmissed by researchers: just using the neural networks for regressions. By searching decent superparameters, neural networks can achieve near-optimal computation depth for a given function with fixed precision, thereby reducing the modulus consumed.
There are three main reasons why we choose neural networks for homomorphic evaluation of polynomial approximations. Firstly, neural networks with polynomial activation functions can be used to approximate whatever functions are needed in an encrypted state. This means that we can compute by one unified process for any polynomial approximation, such as that of Sigmoid or of ReLU. Secondly, by carefully finding an appropriate architecture, neural networks can efficiently evaluate a polynomial using near-optimal multiplicative depth, which would consume less modulus and therefore employ less ciphertext refreshing. Finally, as popular tools, model neural networks have many well-studied techniques that can conveniently serve our solution.
Experiments showed that our method can be used for approximation of various functions. We exploit our method to the evaluation of the Sigmoid function on large intervals $[-30, +30]$, $[-50, +50]$, and $[-70, +70]$, respectively.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
FAD-SAR: A Novel Fishing Activity Detection System via Synthetic Aperture Radar Images Based on Deep Learning Method
Authors:
Yanbing Bai,
Siao Li,
Rui-Yang Ju,
Zihao Yang,
Jinze Yu,
Jen-Shiun Chiang
Abstract:
Illegal, unreported, and unregulated (IUU) fishing activities seriously affect various aspects of human life. However, traditional methods for detecting and monitoring IUU fishing activities at sea have limitations. Although synthetic aperture radar (SAR) can complement existing vessel detection systems, extracting useful information from SAR images using traditional methods remains a challenge, e…
▽ More
Illegal, unreported, and unregulated (IUU) fishing activities seriously affect various aspects of human life. However, traditional methods for detecting and monitoring IUU fishing activities at sea have limitations. Although synthetic aperture radar (SAR) can complement existing vessel detection systems, extracting useful information from SAR images using traditional methods remains a challenge, especially in IUU fishing. This paper proposes a deep learning based fishing activity detection system, which is implemented on the xView3 dataset using six classical object detection models: SSD, RetinaNet, FSAF, FCOS, Faster R-CNN, and Cascade R-CNN. In addition, this work employs different enhancement techniques to improve the performance of the Faster R-CNN model. The experimental results demonstrate that training the Faster R-CNN model using the Online Hard Example Mining (OHEM) strategy increases the Avg-F1 value from 0.212 to 0.216.
△ Less
Submitted 12 July, 2024; v1 submitted 28 April, 2024;
originally announced April 2024.
-
YOLOv9 for Fracture Detection in Pediatric Wrist Trauma X-ray Images
Authors:
Chun-Tse Chien,
Rui-Yang Ju,
Kuang-Yi Chou,
Jen-Shiun Chiang
Abstract:
The introduction of YOLOv9, the latest version of the You Only Look Once (YOLO) series, has led to its widespread adoption across various scenarios. This paper is the first to apply the YOLOv9 algorithm model to the fracture detection task as computer-assisted diagnosis (CAD) to help radiologists and surgeons to interpret X-ray images. Specifically, this paper trained the model on the GRAZPEDWRI-D…
▽ More
The introduction of YOLOv9, the latest version of the You Only Look Once (YOLO) series, has led to its widespread adoption across various scenarios. This paper is the first to apply the YOLOv9 algorithm model to the fracture detection task as computer-assisted diagnosis (CAD) to help radiologists and surgeons to interpret X-ray images. Specifically, this paper trained the model on the GRAZPEDWRI-DX dataset and extended the training set using data augmentation techniques to improve the model performance. Experimental results demonstrate that compared to the mAP 50-95 of the current state-of-the-art (SOTA) model, the YOLOv9 model increased the value from 42.16% to 43.73%, with an improvement of 3.7%. The implementation code is publicly available at https://github.com/RuiyangJu/YOLOv9-Fracture-Detection.
△ Less
Submitted 27 May, 2024; v1 submitted 17 March, 2024;
originally announced March 2024.
-
SmallToLarge (S2L): Scalable Data Selection for Fine-tuning Large Language Models by Summarizing Training Trajectories of Small Models
Authors:
Yu Yang,
Siddhartha Mishra,
Jeffrey N Chiang,
Baharan Mirzasoleiman
Abstract:
Despite the effectiveness of data selection for large language models (LLMs) during pretraining and instruction fine-tuning phases, improving data efficiency in supervised fine-tuning (SFT) for specialized domains poses significant challenges due to the complexity of fine-tuning data. To bridge this gap, we introduce an effective and scalable data selection method for SFT, SmallToLarge (S2L), whic…
▽ More
Despite the effectiveness of data selection for large language models (LLMs) during pretraining and instruction fine-tuning phases, improving data efficiency in supervised fine-tuning (SFT) for specialized domains poses significant challenges due to the complexity of fine-tuning data. To bridge this gap, we introduce an effective and scalable data selection method for SFT, SmallToLarge (S2L), which leverages training trajectories from small models to guide the data selection for larger models. We demonstrate through extensive experiments that S2L significantly improves data efficiency in SFT for mathematical problem-solving, reducing the training data to just 11% of the original MathInstruct dataset (Yue et al., 2023) to match full dataset performance while outperforming state-of-the-art data selection algorithms by an average of 4.7% across 6 in- and out-domain evaluation datasets. Remarkably, selecting only 50K data for SFT, S2L achieves a 32.7% accuracy on the most challenging MATH (Hendrycks et al., 2021) benchmark, improving Phi-2 (Li et al., 2023b) by 16.6%. In clinical text summarization on the MIMIC-III dataset (Johnson et al., 2016), S2L again outperforms training on the full dataset using only 50% of the data. Notably, S2L can perform data selection using a reference model 40x smaller than the target model, proportionally reducing the cost of data selection.
△ Less
Submitted 12 March, 2024;
originally announced March 2024.
-
YOLOv8-AM: YOLOv8 with Attention Mechanisms for Pediatric Wrist Fracture Detection
Authors:
Chun-Tse Chien,
Rui-Yang Ju,
Kuang-Yi Chou,
Enkaer Xieerke,
Jen-Shiun Chiang
Abstract:
Wrist trauma and even fractures occur frequently in daily life, particularly among children who account for a significant proportion of fracture cases. Before performing surgery, surgeons often request patients to undergo X-ray imaging first and prepare for it based on the analysis of the radiologist. With the development of neural networks, You Only Look Once (YOLO) series models have been widely…
▽ More
Wrist trauma and even fractures occur frequently in daily life, particularly among children who account for a significant proportion of fracture cases. Before performing surgery, surgeons often request patients to undergo X-ray imaging first and prepare for it based on the analysis of the radiologist. With the development of neural networks, You Only Look Once (YOLO) series models have been widely used in fracture detection as computer-assisted diagnosis (CAD). In 2023, Ultralytics presented the latest version of the YOLO models, which has been employed for detecting fractures across various parts of the body. Attention mechanism is one of the hottest methods to improve the model performance. This research work proposes YOLOv8-AM, which incorporates the attention mechanism into the original YOLOv8 architecture. Specifically, we respectively employ four attention modules, Convolutional Block Attention Module (CBAM), Global Attention Mechanism (GAM), Efficient Channel Attention (ECA), and Shuffle Attention (SA), to design the improved models and train them on GRAZPEDWRI-DX dataset. Experimental results demonstrate that the mean Average Precision at IoU 50 (mAP 50) of the YOLOv8-AM model based on ResBlock + CBAM (ResCBAM) increased from 63.6% to 65.8%, which achieves the state-of-the-art (SOTA) performance. Conversely, YOLOv8-AM model incorporating GAM obtains the mAP 50 value of 64.2%, which is not a satisfactory enhancement. Therefore, we combine ResBlock and GAM, introducing ResGAM to design another new YOLOv8-AM model, whose mAP 50 value is increased to 65.0%. The implementation code for this study is available on GitHub at https://github.com/RuiyangJu/Fracture_Detection_Improved_YOLOv8.
△ Less
Submitted 24 April, 2024; v1 submitted 14 February, 2024;
originally announced February 2024.
-
Emergency Department Decision Support using Clinical Pseudo-notes
Authors:
Simon A. Lee,
Sujay Jain,
Alex Chen,
Kyoka Ono,
Jennifer Fang,
Akos Rudas,
Jeffrey N. Chiang
Abstract:
In this work, we introduce the Multiple Embedding Model for EHR (MEME), an approach that serializes multimodal EHR tabular data into text using pseudo-notes, mimicking clinical text generation. This conversion not only preserves better representations of categorical data and learns contexts but also enables the effective employment of pretrained foundation models for rich feature representation. T…
▽ More
In this work, we introduce the Multiple Embedding Model for EHR (MEME), an approach that serializes multimodal EHR tabular data into text using pseudo-notes, mimicking clinical text generation. This conversion not only preserves better representations of categorical data and learns contexts but also enables the effective employment of pretrained foundation models for rich feature representation. To address potential issues with context length, our framework encodes embeddings for each EHR modality separately. We demonstrate the effectiveness of MEME by applying it to several decision support tasks within the Emergency Department across multiple hospital systems. Our findings indicate that MEME outperforms traditional machine learning, EHR-specific foundation models, and general LLMs, highlighting its potential as a general and extendible EHR representation strategy.
△ Less
Submitted 29 April, 2024; v1 submitted 31 January, 2024;
originally announced February 2024.
-
REBUS: A Robust Evaluation Benchmark of Understanding Symbols
Authors:
Andrew Gritsevskiy,
Arjun Panickssery,
Aaron Kirtland,
Derik Kauffman,
Hans Gundlach,
Irina Gritsevskaya,
Joe Cavanagh,
Jonathan Chiang,
Lydia La Roux,
Michelle Hung
Abstract:
We propose a new benchmark evaluating the performance of multimodal large language models on rebus puzzles. The dataset covers 333 original examples of image-based wordplay, cluing 13 categories such as movies, composers, major cities, and food. To achieve good performance on the benchmark of identifying the clued word or phrase, models must combine image recognition and string manipulation with h…
▽ More
We propose a new benchmark evaluating the performance of multimodal large language models on rebus puzzles. The dataset covers 333 original examples of image-based wordplay, cluing 13 categories such as movies, composers, major cities, and food. To achieve good performance on the benchmark of identifying the clued word or phrase, models must combine image recognition and string manipulation with hypothesis testing, multi-step reasoning, and an understanding of human cognition, making for a complex, multimodal evaluation of capabilities. We find that GPT-4o significantly outperforms all other models, followed by proprietary models outperforming all other evaluated models. However, even the best model has a final accuracy of only 42\%, which goes down to just 7\% on hard puzzles, highlighting the need for substantial improvements in reasoning. Further, models rarely understand all parts of a puzzle, and are almost always incapable of retroactively explaining the correct answer. Our benchmark can therefore be used to identify major shortcomings in the knowledge and reasoning of multimodal large language models.
△ Less
Submitted 3 June, 2024; v1 submitted 10 January, 2024;
originally announced January 2024.
-
Evaluating Self-supervised Speech Models on a Taiwanese Hokkien Corpus
Authors:
Yi-Hui Chou,
Kalvin Chang,
Meng-Ju Wu,
Winston Ou,
Alice Wen-Hsin Bi,
Carol Yang,
Bryan Y. Chen,
Rong-Wei Pai,
Po-Yen Yeh,
Jo-Peng Chiang,
Iu-Tshian Phoann,
Winnie Chang,
Chenxuan Cui,
Noel Chen,
Jiatong Shi
Abstract:
Taiwanese Hokkien is declining in use and status due to a language shift towards Mandarin in Taiwan. This is partly why it is a low resource language in NLP and speech research today. To ensure that the state of the art in speech processing does not leave Taiwanese Hokkien behind, we contribute a 1.5-hour dataset of Taiwanese Hokkien to ML-SUPERB's hidden set. Evaluating ML-SUPERB's suite of self-…
▽ More
Taiwanese Hokkien is declining in use and status due to a language shift towards Mandarin in Taiwan. This is partly why it is a low resource language in NLP and speech research today. To ensure that the state of the art in speech processing does not leave Taiwanese Hokkien behind, we contribute a 1.5-hour dataset of Taiwanese Hokkien to ML-SUPERB's hidden set. Evaluating ML-SUPERB's suite of self-supervised learning (SSL) speech representations on our dataset, we find that model size does not consistently determine performance. In fact, certain smaller models outperform larger ones. Furthermore, linguistic alignment between pretraining data and the target language plays a crucial role.
△ Less
Submitted 5 December, 2023;
originally announced December 2023.
-
Mitigation of the Brighter-Fatter Effect in the LSST Camera
Authors:
Alex Broughton,
Yousuke Utsumi,
Andrés Plazas Malagón,
Christopher Waters,
Craig Lage,
Adam Snyder,
Andrew Rasmussen,
Stuart Marshall,
Jim Chiang,
Simona Murgia,
Aaron Roodman
Abstract:
Thick, fully depleted charge-coupled devices (CCDs) are known to exhibit non-linear behavior at high signal levels due to the dynamic behavior of charges collecting in the potential wells of pixels, called the brighter-fatter effect (BFE). This particularly impacts bright calibration stars, which appear larger than their intrinsic shape, creating a flux-dependent point-spread function (PSF) that i…
▽ More
Thick, fully depleted charge-coupled devices (CCDs) are known to exhibit non-linear behavior at high signal levels due to the dynamic behavior of charges collecting in the potential wells of pixels, called the brighter-fatter effect (BFE). This particularly impacts bright calibration stars, which appear larger than their intrinsic shape, creating a flux-dependent point-spread function (PSF) that if left unmitigated, could make up a large fraction of the error budget in Stage IV weak-lensing (WL) surveys such as the Legacy Survey of Space and Time (LSST). In this paper, we analyze image measurements of flat fields and artificial stars taken at different illumination levels with the LSST Camera (LSSTCam) at SLAC National Accelerator Laboratory in order to quantify this effect in the LSST Camera before and after a previously introduced correction technique. We observe that the BFE evolves anisotropically as a function of flux due to higher-order BFEs, which violates the fundamental assumption of this correction method. We then introduce a new sampling method based on a physically motivated model to account these higher-order terms in the correction, and then we test the modified correction on both datasets. We find that the new method corrects the effect in flat fields better than it corrects the effect in artificial stars which we conclude is the result of a unmodeled curl component of the deflection field by the correction. We use these results to define a new metric for the full-well capacity of our sensors and advise image processing strategies to further limit the impact of the effect on LSST WL science pathways.
△ Less
Submitted 5 December, 2023;
originally announced December 2023.
-
Detection and prediction of clopidogrel treatment failures using longitudinal structured electronic health records
Authors:
Samuel Kim,
In Gu Sean Lee,
Mijeong Irene Ban,
Jane Chiang
Abstract:
We propose machine learning algorithms to automatically detect and predict clopidogrel treatment failure using longitudinal structured electronic health records (EHR). By drawing analogies between natural language and structured EHR, we introduce various machine learning algorithms used in natural language processing (NLP) applications to build models for treatment failure detection and prediction…
▽ More
We propose machine learning algorithms to automatically detect and predict clopidogrel treatment failure using longitudinal structured electronic health records (EHR). By drawing analogies between natural language and structured EHR, we introduce various machine learning algorithms used in natural language processing (NLP) applications to build models for treatment failure detection and prediction. In this regard, we generated a cohort of patients with clopidogrel prescriptions from UK Biobank and annotated if the patients had treatment failure events within one year of the first clopidogrel prescription; out of 502,527 patients, 1,824 patients were identified as treatment failure cases, and 6,859 patients were considered as control cases. From the dataset, we gathered diagnoses, prescriptions, and procedure records together per patient and organized them into visits with the same date to build models. The models were built for two different tasks, i.e., detection and prediction, and the experimental results showed that time series models outperform bag-of-words approaches in both tasks. In particular, a Transformer-based model, namely BERT, could reach 0.928 AUC in detection tasks and 0.729 AUC in prediction tasks. BERT also showed competence over other time series models when there is not enough training data, because it leverages the pre-training procedure using large unlabeled data.
△ Less
Submitted 12 October, 2023;
originally announced October 2023.
-
VoiceBank-2023: A Multi-Speaker Mandarin Speech Corpus for Constructing Personalized TTS Systems for the Speech Impaired
Authors:
Jia-Jyu Su,
Pang-Chen Liao,
Yen-Ting Lin,
Wu-Hao Li,
Guan-Ting Liou,
Cheng-Che Kao,
Wei-Cheng Chen,
Jen-Chieh Chiang,
Wen-Yang Chang,
Pin-Han Lin,
Chen-Yu Chiang
Abstract:
Services of personalized TTS systems for the Mandarin-speaking speech impaired are rarely mentioned. Taiwan started the VoiceBanking project in 2020, aiming to build a complete set of services to deliver personalized Mandarin TTS systems to amyotrophic lateral sclerosis patients. This paper reports the corpus design, corpus recording, data purging and correction for the corpus, and evaluations of…
▽ More
Services of personalized TTS systems for the Mandarin-speaking speech impaired are rarely mentioned. Taiwan started the VoiceBanking project in 2020, aiming to build a complete set of services to deliver personalized Mandarin TTS systems to amyotrophic lateral sclerosis patients. This paper reports the corpus design, corpus recording, data purging and correction for the corpus, and evaluations of the developed personalized TTS systems, for the VoiceBanking project. The developed corpus is named after the VoiceBank-2023 speech corpus because of its release year. The corpus contains 29.78 hours of utterances with prompts of short paragraphs and common phrases spoken by 111 native Mandarin speakers. The corpus is labeled with information about gender, degree of speech impairment, types of users, transcription, SNRs, and speaking rates. The VoiceBank-2023 is available by request for non-commercial use and welcomes all parties to join the VoiceBanking project to improve the services for the speech impaired.
△ Less
Submitted 27 August, 2023;
originally announced August 2023.
-
Privacy-Preserving 3-Layer Neural Network Training
Authors:
John Chiang
Abstract:
In this manuscript, we consider the problem of privacy-preserving training of neural networks in the mere homomorphic encryption setting. We combine several exsiting techniques available, extend some of them, and finally enable the training of 3-layer neural networks for both the regression and classification problems using mere homomorphic encryption technique.
In this manuscript, we consider the problem of privacy-preserving training of neural networks in the mere homomorphic encryption setting. We combine several exsiting techniques available, extend some of them, and finally enable the training of 3-layer neural networks for both the regression and classification problems using mere homomorphic encryption technique.
△ Less
Submitted 1 June, 2024; v1 submitted 18 August, 2023;
originally announced August 2023.
-
Photometry, Centroid and Point-Spread Function Measurements in the LSST Camera Focal Plane Using Artificial Stars
Authors:
Johnny H. Esteves,
Yousuke Utsumi,
Adam Snyder,
Theo Schutt,
Alex Broughton,
Bahrudin Trbalic,
Sidney Mau,
Andrew Rasmussen,
Andrés A. Plazas Malagón,
Andrew Bradshaw,
Stuart Marshall,
Seth Digel,
James Chiang,
Marcelle Soares-Santos,
Aaron Roodman
Abstract:
The Vera C. Rubin Observatory's LSST Camera (LSSTCam) pixel response has been characterized using laboratory measurements with a grid of artificial stars. We quantify the contributions to photometry, centroid, point-spread function size, and shape measurement errors due to small anomalies in the LSSTCam CCDs. The main sources of those anomalies are quantum efficiency variations and pixel area vari…
▽ More
The Vera C. Rubin Observatory's LSST Camera (LSSTCam) pixel response has been characterized using laboratory measurements with a grid of artificial stars. We quantify the contributions to photometry, centroid, point-spread function size, and shape measurement errors due to small anomalies in the LSSTCam CCDs. The main sources of those anomalies are quantum efficiency variations and pixel area variations induced by the amplifier segmentation boundaries and "tree-rings" - circular variations in silicon doping concentration. This laboratory study using artificial stars projected on the sensors shows overall small effects. The residual effects on point-spread function (PSF) size and shape are below $0.1\%$, meeting the ten-year LSST survey science requirements. However, the CCD mid-line presents distortions that can have a moderate impact on PSF measurements. This feature can be avoided by masking the affected regions. Effects of tree-rings are observed on centroids and PSFs of the artificial stars and the nature of the effect is confirmed by a study of the flat-field response. Nevertheless, further studies of the full-focal plane with stellar data should more completely probe variations and might reveal new features, e.g. wavelength-dependent effects. The results of this study can be used as a guide for the on-sky operation of LSSTCam.
△ Less
Submitted 3 November, 2023; v1 submitted 1 August, 2023;
originally announced August 2023.
-
Semantic Segmentation Using Super Resolution Technique as Pre-Processing
Authors:
Chih-Chia Chen,
Wei-Han Chen,
Jen-Shiun Chiang,
Chun-Tse Chien,
Tingkai Chang
Abstract:
Combining high-level and low-level visual tasks is a common technique in the field of computer vision. This work integrates the technique of image super resolution to semantic segmentation for document image binarization. It demonstrates that using image super-resolution as a preprocessing step can effectively enhance the results and performance of semantic segmentation.
Combining high-level and low-level visual tasks is a common technique in the field of computer vision. This work integrates the technique of image super resolution to semantic segmentation for document image binarization. It demonstrates that using image super-resolution as a preprocessing step can effectively enhance the results and performance of semantic segmentation.
△ Less
Submitted 27 June, 2023;
originally announced June 2023.
-
CCDWT-GAN: Generative Adversarial Networks Based on Color Channel Using Discrete Wavelet Transform for Document Image Binarization
Authors:
Rui-Yang Ju,
Yu-Shian Lin,
Jen-Shiun Chiang,
Chih-Chia Chen,
Wei-Han Chen,
Chun-Tse Chien
Abstract:
To efficiently extract textual information from color degraded document images is a significant research area. The prolonged imperfect preservation of ancient documents has led to various types of degradation, such as page staining, paper yellowing, and ink bleeding. These types of degradation badly impact the image processing for features extraction. This paper introduces a novelty method employi…
▽ More
To efficiently extract textual information from color degraded document images is a significant research area. The prolonged imperfect preservation of ancient documents has led to various types of degradation, such as page staining, paper yellowing, and ink bleeding. These types of degradation badly impact the image processing for features extraction. This paper introduces a novelty method employing generative adversarial networks based on color channel using discrete wavelet transform (CCDWT-GAN). The proposed method involves three stages: image preprocessing, image enhancement, and image binarization. In the initial step, we apply discrete wavelet transform (DWT) to retain the low-low (LL) subband image, thereby enhancing image quality. Subsequently, we divide the original input image into four single-channel colors (red, green, blue, and gray) to separately train adversarial networks. For the extraction of global and local features, we utilize the output image from the image enhancement stage and the entire input image to train adversarial networks independently, and then combine these two results as the final output. To validate the positive impact of the image enhancement and binarization stages on model performance, we conduct an ablation study. This work compares the performance of the proposed method with other state-of-the-art (SOTA) methods on DIBCO and H-DIBCO ((Handwritten) Document Image Binarization Competition) datasets. The experimental results demonstrate that CCDWT-GAN achieves a top two performance on multiple benchmark datasets. Notably, on DIBCO 2013 and 2016 dataset, our method achieves F-measure (FM) values of 95.24 and 91.46, respectively.
△ Less
Submitted 24 August, 2023; v1 submitted 27 May, 2023;
originally announced May 2023.
-
Activation Functions Not To Active: A Plausible Theory on Interpreting Neural Networks
Authors:
John Chiang
Abstract:
Researchers commonly believe that neural networks model a high-dimensional space but cannot give a clear definition of this space. What is this space? What is its dimension? And does it has finite dimensions? In this paper, we develop a plausible theory on interpreting neural networks in terms of the role of activation functions in neural networks and define a high-dimensional (more precisely, an…
▽ More
Researchers commonly believe that neural networks model a high-dimensional space but cannot give a clear definition of this space. What is this space? What is its dimension? And does it has finite dimensions? In this paper, we develop a plausible theory on interpreting neural networks in terms of the role of activation functions in neural networks and define a high-dimensional (more precisely, an infinite-dimensional) space that neural networks including deep-learning networks could create. We show that the activation function acts as a magnifying function that maps the low-dimensional linear space into an infinite-dimensional space, which can distinctly identify the polynomial approximation of any multivariate continuous function of the variable values being the same features of the given dataset. Given a dataset with each example of $d$ features $f_1$, $f_2$, $\cdots$, $f_d$, we believe that neural networks model a special space with infinite dimensions, each of which is a monomial $$\prod_{i_1, i_2, \cdots, i_d} f_1^{i_1} f_2^{i_2} \cdots f_d^{i_d}$$ for some non-negative integers ${i_1, i_2, \cdots, i_d} \in \mathbb{Z}_{0}^{+}=\{0,1,2,3,\ldots\} $. We term such an infinite-dimensional space a $\textit{ Super Space (SS)}$. We see such a dimension as the minimum information unit. Every neuron node previously through an activation layer in neural networks is a $\textit{ Super Plane (SP) }$, which is actually a polynomial of infinite degree. This $\textit{ Super Space }$ is something like a coordinate system, in which every multivalue function can be represented by a $\textit{ Super Plane }$. We also show that training NNs could at least be reduced to solving a system of nonlinear equations. %solve sets of nonlinear equations
△ Less
Submitted 9 May, 2023; v1 submitted 1 May, 2023;
originally announced May 2023.
-
Privacy-Preserving CNN Training with Transfer Learning: Multiclass Logistic Regression
Authors:
John Chiang
Abstract:
In this paper, we present a practical solution to implement privacy-preserving CNN training based on mere Homomorphic Encryption (HE) technique. To our best knowledge, this is the first attempt successfully to crack this nut and no work ever before has achieved this goal. Several techniques combine to accomplish the task:: (1) with transfer learning, privacy-preserving CNN training can be reduced…
▽ More
In this paper, we present a practical solution to implement privacy-preserving CNN training based on mere Homomorphic Encryption (HE) technique. To our best knowledge, this is the first attempt successfully to crack this nut and no work ever before has achieved this goal. Several techniques combine to accomplish the task:: (1) with transfer learning, privacy-preserving CNN training can be reduced to homomorphic neural network training, or even multiclass logistic regression (MLR) training; (2) via a faster gradient variant called $\texttt{Quadratic Gradient}$, an enhanced gradient method for MLR with a state-of-the-art performance in convergence speed is applied in this work to achieve high performance; (3) we employ the thought of transformation in mathematics to transform approximating Softmax function in the encryption domain to the approximation of the Sigmoid function. A new type of loss function termed $\texttt{Squared Likelihood Error}$ has been developed alongside to align with this change.; and (4) we use a simple but flexible matrix-encoding method named $\texttt{Volley Revolver}$ to manage the data flow in the ciphertexts, which is the key factor to complete the whole homomorphic CNN training. The complete, runnable C++ code to implement our work can be found at: \href{https://github.com/petitioner/HE.CNNtraining}{$\texttt{https://github.com/petitioner/HE.CNNtraining}$}. We select $\texttt{REGNET\_X\_400MF}$ as our pre-trained model for transfer learning. We use the first 128 MNIST training images as training data and the whole MNIST testing dataset as the testing data. The client only needs to upload 6 ciphertexts to the cloud and it takes $\sim 21$ mins to perform 2 iterations on a cloud with 64 vCPUs, resulting in a precision of $21.49\%$.
△ Less
Submitted 3 June, 2024; v1 submitted 7 April, 2023;
originally announced April 2023.
-
Resolution Enhancement Processing on Low Quality Images Using Swin Transformer Based on Interval Dense Connection Strategy
Authors:
Rui-Yang Ju,
Chih-Chia Chen,
Jen-Shiun Chiang,
Yu-Shian Lin,
Wei-Han Chen,
Chun-Tse Chien
Abstract:
The Transformer-based method has demonstrated remarkable performance for image super-resolution in comparison to the method based on the convolutional neural networks (CNNs). However, using the self-attention mechanism like SwinIR (Image Restoration Using Swin Transformer) to extract feature information from images needs a significant amount of computational resources, which limits its application…
▽ More
The Transformer-based method has demonstrated remarkable performance for image super-resolution in comparison to the method based on the convolutional neural networks (CNNs). However, using the self-attention mechanism like SwinIR (Image Restoration Using Swin Transformer) to extract feature information from images needs a significant amount of computational resources, which limits its application on low computing power platforms. To improve the model feature reuse, this research work proposes the Interval Dense Connection Strategy, which connects different blocks according to the newly designed algorithm. We apply this strategy to SwinIR and present a new model, which named SwinOIR (Object Image Restoration Using Swin Transformer). For image super-resolution, an ablation study is conducted to demonstrate the positive effect of the Interval Dense Connection Strategy on the model performance. Furthermore, we evaluate our model on various popular benchmark datasets, and compare it with other state-of-the-art (SOTA) lightweight models. For example, SwinOIR obtains a PSNR of 26.62 dB for x4 upscaling image super-resolution on Urban100 dataset, which is 0.15 dB higher than the SOTA model SwinIR. For real-life application, this work applies the lastest version of You Only Look Once (YOLOv8) model and the proposed model to perform object detection and real-life image super-resolution on low-quality images. This implementation code is publicly available at https://github.com/Rubbbbbbbbby/SwinOIR.
△ Less
Submitted 13 May, 2023; v1 submitted 16 March, 2023;
originally announced March 2023.
-
Bender-Knuth involutions on linear extensions of posets
Authors:
Judy Hsin-Hui Chiang,
Anh Trong Nam Hoang,
Matthew Kendall,
Ryan Lynch,
Son Nguyen,
Benjamin Przybocki,
Janabel Xia
Abstract:
We study the permutation group $\mathcal{BK}_P$ generated by Bender-Knuth moves on linear extensions of a poset $P$, an analog of the Berenstein-Kirillov group on column-strict tableaux. We explore the group relations, with an emphasis on identifying posets $P$ for which the cactus relations hold in $\mathcal{BK}_P$. We also examine $\mathcal{BK}_P$ as a subgroup of the symmetric group…
▽ More
We study the permutation group $\mathcal{BK}_P$ generated by Bender-Knuth moves on linear extensions of a poset $P$, an analog of the Berenstein-Kirillov group on column-strict tableaux. We explore the group relations, with an emphasis on identifying posets $P$ for which the cactus relations hold in $\mathcal{BK}_P$. We also examine $\mathcal{BK}_P$ as a subgroup of the symmetric group $\mathfrak{S}_{\mathcal{L}(P)}$ on the set of linear extensions of $P$ with the focus on analyzing posets $P$ for which $\mathcal{BK}_P = \mathfrak{S}_{\mathcal{L}(P)}$.
△ Less
Submitted 24 March, 2024; v1 submitted 23 February, 2023;
originally announced February 2023.
-
Three-stage binarization of color document images based on discrete wavelet transform and generative adversarial networks
Authors:
Rui-Yang Ju,
Yu-Shian Lin,
Yanlin Jin,
Chih-Chia Chen,
Chun-Tse Chien,
Jen-Shiun Chiang
Abstract:
The efficient segmentation of text information from the background in degraded color document images is an important challenge in the preservation of ancient manuscripts. The imperfect preservation of ancient manuscripts has led to various types of degradation over time, such as staining, yellowing, and ink seepage, badly affecting document image binarization results. This work proposes a three-st…
▽ More
The efficient segmentation of text information from the background in degraded color document images is an important challenge in the preservation of ancient manuscripts. The imperfect preservation of ancient manuscripts has led to various types of degradation over time, such as staining, yellowing, and ink seepage, badly affecting document image binarization results. This work proposes a three-stage method to generate binarization image results for degraded colour document images using generative adversarial networks (GANs). Stage-1 involves applying discrete wavelet transform and retaining the low-low subband images for document image enhancement. In Stage-2, the original input image is split into red, green, and blue (RGB) three single-channel images and one grayscale image, and each image is trained with independent GANs to extract color foreground information. In Stage-3, the output images of Stage-2 and the resized input images are used to train independent GANs to generate document binarization results, enabling the combination of global and local features. The experimental results show that the Avg-Score of the proposed method is 77.64, 77.95, 79.05, 76.38, 75.34, and 77.00 on the (H)-DIBCO 2011, 2013, 2014, 2016, 2017, and 2018 datasets, which achieves the state-of-the-art level. The implementation code for this work is available at https://github.com/abcpp12383/ThreeStageBinarization.
△ Less
Submitted 14 June, 2024; v1 submitted 29 November, 2022;
originally announced November 2022.
-
A Joint Roman Space Telescope and Rubin Observatory Synthetic Wide-Field Imaging Survey
Authors:
M. A. Troxel,
C. Lin,
A. Park,
C. Hirata,
R. Mandelbaum,
M. Jarvis,
A. Choi,
J. Givans,
M. Higgins,
B. Sanchez,
M. Yamamoto,
H. Awan,
J. Chiang,
O. Dore,
C. W. Walter,
T. Zhang,
J. Cohen-Tanugi,
E. Gawiser,
A. Hearin,
K. Heitmann,
M. Ishak,
E. Kovacs,
Y. -Y. Mao,
M. Wood-Vasey,
the LSST Dark Energy Science Collaboration
Abstract:
We present and validate 20 deg$^2$ of overlapping synthetic imaging surveys representing the full depth of the Nancy Grace Roman Space Telescope High-Latitude Imaging Survey (HLIS) and five years of observations of the Vera C. Rubin Observatory Legacy Survey of Space and Time (LSST). The two synthetic surveys are summarized, with reference to the existing 300 deg$^2$ of LSST simulated imaging prod…
▽ More
We present and validate 20 deg$^2$ of overlapping synthetic imaging surveys representing the full depth of the Nancy Grace Roman Space Telescope High-Latitude Imaging Survey (HLIS) and five years of observations of the Vera C. Rubin Observatory Legacy Survey of Space and Time (LSST). The two synthetic surveys are summarized, with reference to the existing 300 deg$^2$ of LSST simulated imaging produced as part of Dark Energy Science Collaboration (DESC) Data Challenge 2 (DC2). Both synthetic surveys observe the same simulated DESC DC2 universe. For the synthetic Roman survey, we simulate for the first time fully chromatic images along with the detailed physics of the Sensor Chip Assemblies derived from lab measurements using the flight detectors. The simulated imaging and resulting pixel-level measurements of photometric properties of objects span a wavelength range of $\sim$0.3 to 2.0 $μ$m. We also describe updates to the Roman simulation pipeline, changes in how astrophysical objects are simulated relative to the original DC2 simulations, and the resulting simulated Roman data products. We use these simulations to explore the relative fraction of unrecognized blends in LSST images, finding that 20-30% of objects identified in LSST images with $i$-band magnitudes brighter than 25 can be identified as multiple objects in Roman images. These simulations provide a unique testing ground for the development and validation of joint pixel-level analysis techniques of ground- and space-based imaging data sets in the second half of the 2020s -- in particular the case of joint Roman--LSST analyses.
△ Less
Submitted 14 September, 2022;
originally announced September 2022.
-
Quadratic Gradient: Combining Gradient Algorithms and Newton's Method as One
Authors:
John Chiang
Abstract:
It might be inadequate for the line search technique for Newton's method to use only one floating point number. A column vector of the same size as the gradient might be better than a mere float number to accelerate each of the gradient elements with different rates. Moreover, a square matrix of the same order as the Hessian matrix might be helpful to correct the Hessian matrix. Chiang applied som…
▽ More
It might be inadequate for the line search technique for Newton's method to use only one floating point number. A column vector of the same size as the gradient might be better than a mere float number to accelerate each of the gradient elements with different rates. Moreover, a square matrix of the same order as the Hessian matrix might be helpful to correct the Hessian matrix. Chiang applied something between a column vector and a square matrix, namely a diagonal matrix, to accelerate the gradient and further proposed a faster gradient variant called quadratic gradient. In this paper, we present a new way to build a new version of the quadratic gradient. This new quadratic gradient doesn't satisfy the convergence conditions of the fixed Hessian Newton's method. However, experimental results show that it sometimes has a better performance than the original one in convergence rate. Also, Chiang speculates that there might be a relation between the Hessian matrix and the learning rate for the first-order gradient descent method. We prove that the floating number $\frac{1}{ε+ \max \{| λ_i | \}}$ can be a good learning rate of the gradient methods, where $ε$ is a number to avoid division by zero and $λ_i$ the eigenvalues of the Hessian matrix.
△ Less
Submitted 29 March, 2023; v1 submitted 3 September, 2022;
originally announced September 2022.
-
Multinomial Logistic Regression Algorithms via Quadratic Gradient
Authors:
John Chiang
Abstract:
Multinomial logistic regression, also known by other names such as multiclass logistic regression and softmax regression, is a fundamental classification method that generalizes binary logistic regression to multiclass problems. A recently work proposed a faster gradient called $\texttt{quadratic gradient}$ that can accelerate the binary logistic regression training, and presented an enhanced Nest…
▽ More
Multinomial logistic regression, also known by other names such as multiclass logistic regression and softmax regression, is a fundamental classification method that generalizes binary logistic regression to multiclass problems. A recently work proposed a faster gradient called $\texttt{quadratic gradient}$ that can accelerate the binary logistic regression training, and presented an enhanced Nesterov's accelerated gradient (NAG) method for binary logistic regression.
In this paper, we extend this work to multiclass logistic regression and propose an enhanced Adaptive Gradient Algorithm (Adagrad) that can accelerate the original Adagrad method. We test the enhanced NAG method and the enhanced Adagrad method on some multiclass-problem datasets. Experimental results show that both enhanced methods converge faster than their original ones respectively.
△ Less
Submitted 29 March, 2023; v1 submitted 14 August, 2022;
originally announced August 2022.
-
Connection Reduction of DenseNet for Image Recognition
Authors:
Rui-Yang Ju,
Jen-Shiun Chiang,
Chih-Chia Chen,
Yu-Shian Lin
Abstract:
Convolutional Neural Networks (CNN) increase depth by stacking convolutional layers, and deeper network models perform better in image recognition. Empirical research shows that simply stacking convolutional layers does not make the network train better, and skip connection (residual learning) can improve network model performance. For the image classification task, models with global densely conn…
▽ More
Convolutional Neural Networks (CNN) increase depth by stacking convolutional layers, and deeper network models perform better in image recognition. Empirical research shows that simply stacking convolutional layers does not make the network train better, and skip connection (residual learning) can improve network model performance. For the image classification task, models with global densely connected architectures perform well in large datasets like ImageNet, but are not suitable for small datasets such as CIFAR-10 and SVHN. Different from dense connections, we propose two new algorithms to connect layers. Baseline is a densely connected network, and the networks connected by the two new algorithms are named ShortNet1 and ShortNet2 respectively. The experimental results of image classification on CIFAR-10 and SVHN show that ShortNet1 has a 5% lower test error rate and 25% faster inference time than Baseline. ShortNet2 speeds up inference time by 40% with less loss in test accuracy. Code and pre-trained models are available at https://github.com/RuiyangJu/Connection_Reduction.
△ Less
Submitted 14 November, 2022; v1 submitted 2 August, 2022;
originally announced August 2022.
-
Formal Analysis of Lending Pools in Decentralized Finance
Authors:
Massimo Bartoletti,
James Chiang,
Tommi Junttila,
Alberto Lluch Lafuente,
Massimiliano Mirelli,
Andrea Vandin
Abstract:
Decentralised Finance (DeFi) applications constitute an entire financial ecosystem deployed on blockchains. Such applications are based on complex protocols and incentive mechanisms whose financial safety is hard to determine. Besides, their adoption is rapidly growing, hence imperilling an increasingly higher amount of assets. Therefore, accurate formalisation and verification of DeFi application…
▽ More
Decentralised Finance (DeFi) applications constitute an entire financial ecosystem deployed on blockchains. Such applications are based on complex protocols and incentive mechanisms whose financial safety is hard to determine. Besides, their adoption is rapidly growing, hence imperilling an increasingly higher amount of assets. Therefore, accurate formalisation and verification of DeFi applications is essential to assess their safety. We have developed a tool for the formal analysis of one of the most widespread DeFi applications: Lending Pools (LP). This was achieved by leveraging an existing formal model for LPs, the Maude verification environment and the MultiVeStA statistical analyser. The tool supports several analyses including reachability analysis, LTL model checking and statistical model checking. In this paper we show how the tool can be used to analyse several parameters of LPs that are fundamental to assess and predict their behaviour. In particular, we use statistical analysis to search for threshold and reward parameters that minimize the risk of unrecoverable loans.
△ Less
Submitted 16 September, 2022; v1 submitted 1 June, 2022;
originally announced June 2022.
-
Efficient Convolutional Neural Networks on Raspberry Pi for Image Classification
Authors:
Rui-Yang Ju,
Ting-Yu Lin,
Jia-Hao Jian,
Jen-Shiun Chiang
Abstract:
With the good performance of deep learning algorithms in the field of computer vision (CV), the convolutional neural network (CNN) architecture has become a main backbone of the computer vision task. With the widespread use of mobile devices, neural network models based on platforms with low computing power are gradually being paid attention. However, due to the limitation of computing power, deep…
▽ More
With the good performance of deep learning algorithms in the field of computer vision (CV), the convolutional neural network (CNN) architecture has become a main backbone of the computer vision task. With the widespread use of mobile devices, neural network models based on platforms with low computing power are gradually being paid attention. However, due to the limitation of computing power, deep learning algorithms are usually not available on mobile devices. This paper proposes a lightweight convolutional neural network, TripleNet, which can operate easily on Raspberry Pi. Adopted from the concept of block connections in ThreshNet, the newly proposed network model compresses and accelerates the network model, reduces the amount of parameters of the network, and shortens the inference time of each image while ensuring the accuracy. Our proposed TripleNet and other state-of-the-art (SOTA) neural networks perform image classification experiments with the CIFAR-10 and SVHN datasets on Raspberry Pi. The experimental results show that, compared with GhostNet, MobileNet, ThreshNet, EfficientNet, and HarDNet, the inference time of TripleNet per image is shortened by 15%, 16%, 17%, 24%, and 30%, respectively. The detail codes of this work are available at https://github.com/RuiyangJu/TripleNet.
△ Less
Submitted 19 November, 2022; v1 submitted 2 April, 2022;
originally announced April 2022.
-
Aggregated Pyramid Vision Transformer: Split-transform-merge Strategy for Image Recognition without Convolutions
Authors:
Rui-Yang Ju,
Ting-Yu Lin,
Jen-Shiun Chiang,
Jia-Hao Jian,
Yu-Shian Lin,
Liu-Rui-Yi Huang
Abstract:
With the achievements of Transformer in the field of natural language processing, the encoder-decoder and the attention mechanism in Transformer have been applied to computer vision. Recently, in multiple tasks of computer vision (image classification, object detection, semantic segmentation, etc.), state-of-the-art convolutional neural networks have introduced some concepts of Transformer. This p…
▽ More
With the achievements of Transformer in the field of natural language processing, the encoder-decoder and the attention mechanism in Transformer have been applied to computer vision. Recently, in multiple tasks of computer vision (image classification, object detection, semantic segmentation, etc.), state-of-the-art convolutional neural networks have introduced some concepts of Transformer. This proves that Transformer has a good prospect in the field of image recognition. After Vision Transformer was proposed, more and more works began to use self-attention to completely replace the convolutional layer. This work is based on Vision Transformer, combined with the pyramid architecture, using Split-transform-merge to propose the group encoder and name the network architecture Aggregated Pyramid Vision Transformer (APVT). We perform image classification tasks on the CIFAR-10 dataset and object detection tasks on the COCO 2017 dataset. Compared with other network architectures that use Transformer as the backbone, APVT has excellent results while reducing the computational cost. We hope this improved strategy can provide a reference for future Transformer research in computer vision.
△ Less
Submitted 2 March, 2022;
originally announced March 2022.
-
On Polynomial Approximation of Activation Function
Authors:
John Chiang
Abstract:
In this work, we propose an interesting method that aims to approximate an activation function over some domain by polynomials of the presupposing low degree. The main idea behind this method can be seen as an extension of the ordinary least square method and includes the gradient of activation function into the cost function to minimize.
In this work, we propose an interesting method that aims to approximate an activation function over some domain by polynomials of the presupposing low degree. The main idea behind this method can be seen as an extension of the ordinary least square method and includes the gradient of activation function into the cost function to minimize.
△ Less
Submitted 29 January, 2022;
originally announced February 2022.
-
Volley Revolver: A Novel Matrix-Encoding Method for Privacy-Preserving Neural Networks (Inference)
Authors:
John Chiang
Abstract:
In this work, we present a novel matrix-encoding method that is particularly convenient for neural networks to make predictions in a privacy-preserving manner using homomorphic encryption. Based on this encoding method, we implement a convolutional neural network for handwritten image classification over encryption. For two matrices $A$ and $B$ to perform homomorphic multiplication, the main idea…
▽ More
In this work, we present a novel matrix-encoding method that is particularly convenient for neural networks to make predictions in a privacy-preserving manner using homomorphic encryption. Based on this encoding method, we implement a convolutional neural network for handwritten image classification over encryption. For two matrices $A$ and $B$ to perform homomorphic multiplication, the main idea behind it, in a simple version, is to encrypt matrix $A$ and the transpose of matrix $B$ into two ciphertexts respectively. With additional operations, the homomorphic matrix multiplication can be calculated over encrypted matrices efficiently. For the convolution operation, we in advance span each convolution kernel to a matrix space of the same size as the input image so as to generate several ciphertexts, each of which is later used together with the ciphertext encrypting input images for calculating some of the final convolution results. We accumulate all these intermediate results and thus complete the convolution operation.
In a public cloud with 40 vCPUs, our convolutional neural network implementation on the MNIST testing dataset takes $\sim$ 287 seconds to compute ten likelihoods of 32 encrypted images of size $28 \times 28$ simultaneously. The data owner only needs to upload one ciphertext ($\sim 19.8$ MB) encrypting these 32 images to the public cloud.
△ Less
Submitted 8 January, 2024; v1 submitted 29 January, 2022;
originally announced January 2022.
-
Privacy-Preserving Logistic Regression Training with A Faster Gradient Variant
Authors:
John Chiang
Abstract:
Logistic regression training over encrypted data has been an attractive idea to security concerns for years. In this paper, we propose a faster gradient variant called $\texttt{quadratic gradient}$ for privacy-preserving logistic regression training. The core of $\texttt{quadratic gradient}$ can be seen as an extension of the simplified fixed Hessian.
We enhance Nesterov's accelerated gradient (…
▽ More
Logistic regression training over encrypted data has been an attractive idea to security concerns for years. In this paper, we propose a faster gradient variant called $\texttt{quadratic gradient}$ for privacy-preserving logistic regression training. The core of $\texttt{quadratic gradient}$ can be seen as an extension of the simplified fixed Hessian.
We enhance Nesterov's accelerated gradient (NAG) and Adaptive Gradient Algorithm (Adagrad) respectively with $\texttt{quadratic gradient}$ and evaluate the enhanced algorithms on several datasets. %gradient $ascent$ methods with this gradient variant on the gene dataset provided by the 2017 iDASH competition and other datasets. Experiments show that the enhanced methods have a state-of-the-art performance in convergence speed compared to the raw first-order gradient methods. We then adopt the enhanced NAG method to implement homomorphic logistic regression training, obtaining a comparable result by only $3$ iterations.
There is a promising chance that $\texttt{quadratic gradient}$ could be used to enhance other first-order gradient methods for general numerical optimization problems.
△ Less
Submitted 6 June, 2024; v1 submitted 26 January, 2022;
originally announced January 2022.
-
ThreshNet: An Efficient DenseNet Using Threshold Mechanism to Reduce Connections
Authors:
Rui-Yang Ju,
Ting-Yu Lin,
Jia-Hao Jian,
Jen-Shiun Chiang,
Wei-Bin Yang
Abstract:
With the continuous development of neural networks for computer vision tasks, more and more network architectures have achieved outstanding success. As one of the most advanced neural network architectures, DenseNet shortcuts all feature maps to solve the model depth problem. Although this network architecture has excellent accuracy with low parameters, it requires an excessive inference time. To…
▽ More
With the continuous development of neural networks for computer vision tasks, more and more network architectures have achieved outstanding success. As one of the most advanced neural network architectures, DenseNet shortcuts all feature maps to solve the model depth problem. Although this network architecture has excellent accuracy with low parameters, it requires an excessive inference time. To solve this problem, HarDNet reduces the connections between the feature maps, making the remaining connections resemble harmonic waves. However, this compression method may result in a decrease in the model accuracy and an increase in the parameters and model size. This network architecture may reduce the memory access time, but its overall performance can still be improved. Therefore, we propose a new network architecture, ThreshNet, using a threshold mechanism to further optimize the connection method. Different numbers of connections for different convolution layers are discarded to accelerate the inference of the network. The proposed network has been evaluated with image classification using CIFAR 10 and SVHN datasets under platforms of NVIDIA RTX 3050 and Raspberry Pi 4. The experimental results show that, compared with HarDNet68, GhostNet, MobileNetV2, ShuffleNet, and EfficientNet, the inference time of the proposed ThreshNet79 is 5%, 9%, 10%, 18%, and 20% faster, respectively. The number of parameters of ThreshNet95 is 55% less than that of HarDNet85. The new model compression and model acceleration methods can speed up the inference time, enabling network models to operate on mobile devices.
△ Less
Submitted 7 August, 2022; v1 submitted 9 January, 2022;
originally announced January 2022.
-
A Deep Learning Based Workflow for Detection of Lung Nodules With Chest Radiograph
Authors:
Yang Tai,
Yu-Wen Fang,
Fang-Yi Su,
Jung-Hsien Chiang
Abstract:
PURPOSE: This study aimed to develop a deep learning-based tool to detect and localize lung nodules with chest radiographs(CXRs). We expected it to enhance the efficiency of interpreting CXRs and reduce the possibilities of delayed diagnosis of lung cancer.
MATERIALS AND METHODS: We collected CXRs from NCKUH database and VBD, an open-source medical image dataset, as our training and validation d…
▽ More
PURPOSE: This study aimed to develop a deep learning-based tool to detect and localize lung nodules with chest radiographs(CXRs). We expected it to enhance the efficiency of interpreting CXRs and reduce the possibilities of delayed diagnosis of lung cancer.
MATERIALS AND METHODS: We collected CXRs from NCKUH database and VBD, an open-source medical image dataset, as our training and validation data. A number of CXRs from the Ministry of Health and Welfare(MOHW) database served as our test data. We built a segmentation model to identify lung areas from CXRs, and sliced them into 16 patches. Physicians labeled the CXRs by clicking the patches. These labeled patches were then used to train and fine-tune a deep neural network(DNN) model, classifying the patches as positive or negative. Finally, we test the DNN model with the lung patches of CXRs from MOHW.
RESULTS: Our segmentation model identified the lung regions well from the whole CXR. The Intersection over Union(IoU) between the ground truth and the segmentation result was 0.9228. In addition, our DNN model achieved a sensitivity of 0.81, specificity of 0.82, and AUROC of 0.869 in 98 of 125 cases. For the other 27 difficult cases, the sensitivity was 0.54, specificity 0.494, and AUROC 0.682. Overall, we obtained a sensitivity of 0.78, specificity of 0.79, and AUROC 0.837.
CONCLUSIONS: Our two-step workflow is comparable to state-of-the-art algorithms in the sensitivity and specificity of localizing lung nodules from CXRs. Notably, our workflow provides an efficient way for specialists to label the data, which is valuable for relevant researches because of the relative rarity of labeled medical image data.
△ Less
Submitted 11 March, 2022; v1 submitted 19 December, 2021;
originally announced December 2021.
-
SNIa-Cosmology Analysis Results from Simulated LSST Images: from Difference Imaging to Constraints on Dark Energy
Authors:
B. Sánchez,
R. Kessler,
D. Scolnic,
B. Armstrong,
R. Biswas,
J. Bogart,
J. Chiang,
J. Cohen-Tanugi,
D. Fouchez,
Ph. Gris,
K. Heitmann,
R. Hložek,
S. Jha,
H. Kelly,
S. Liu,
G. Narayan,
B. Racine,
E. Rykoff,
M. Sullivan,
C. Walter,
M. Wood-Vasey,
The LSST Dark Energy Science Collaboration
Abstract:
The Vera Rubin Observatory Legacy Survey of Space and Time (LSST) is expected to process ${\sim}10^6$ transient detections per night. For precision measurements of cosmological parameters and rates, it is critical to understand the detection efficiency, magnitude limits, artifact contamination levels, and biases in the selection and photometry. Here we rigorously test the LSST Difference Image Ana…
▽ More
The Vera Rubin Observatory Legacy Survey of Space and Time (LSST) is expected to process ${\sim}10^6$ transient detections per night. For precision measurements of cosmological parameters and rates, it is critical to understand the detection efficiency, magnitude limits, artifact contamination levels, and biases in the selection and photometry. Here we rigorously test the LSST Difference Image Analysis (DIA) pipeline using simulated images from the Rubin Observatory LSST Dark Energy Science Collaboration (DESC) Data Challenge (DC2) simulation for the Wide-Fast-Deep (WFD) survey area. DC2 is the first large-scale (300 deg$^2$) image simulation of a transient survey that includes realistic cadence, variable observing conditions, and CCD image artifacts. We analyze ${\sim}$15 deg$^2$ of DC2 over a 5-year time-span in which artificial point-sources from Type Ia Supernovae (SNIa) light curves have been overlaid onto the images. We measure the detection efficiency as a function of Signal-to-Noise Ratio (SNR) and find a $50\%$ efficiency at $\rm{SNR}=5.8$. The magnitude limits for each filter are: $u=23.66$, $g=24.69$, $r=24.06$, $i=23.45$, $z=22.54$, $y=21.62$ $\rm{mag}$. The artifact contamination is $\sim90\%$ of detections, corresponding to $\sim1000$ artifacts/deg$^2$ in $g$ band, and falling to 300 per deg$^2$ in $y$ band. The photometry has biases $<1\%$ for magnitudes $19.5 < m <23$. Our DIA performance on simulated images is similar to that of the Dark Energy Survey pipeline applied to real images. We also characterize DC2 image properties to produce catalog-level simulations needed for distance bias corrections. We find good agreement between DC2 data and simulations for distributions of SNR, redshift, and fitted light-curve properties. Applying a realistic SNIa-cosmology analysis for redshifts $z<1$, we recover the input cosmology parameters to within statistical uncertainties.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.
-
New Pruning Method Based on DenseNet Network for Image Classification
Authors:
Rui-Yang Ju,
Ting-Yu Lin,
Jen-Shiun Chiang
Abstract:
Deep neural networks have made significant progress in the field of computer vision. Recent studies have shown that depth, width and shortcut connections of neural network architectures play a crucial role in their performance. One of the most advanced neural network architectures, DenseNet, has achieved excellent convergence rates through dense connections. However, it still has obvious shortcomi…
▽ More
Deep neural networks have made significant progress in the field of computer vision. Recent studies have shown that depth, width and shortcut connections of neural network architectures play a crucial role in their performance. One of the most advanced neural network architectures, DenseNet, has achieved excellent convergence rates through dense connections. However, it still has obvious shortcomings in the usage of amount of memory. In this paper, we introduce a new type of pruning tool, threshold, which refers to the principle of the threshold voltage in MOSFET. This work employs this method to connect blocks of different depths in different ways to reduce the usage of memory. It is denoted as ThresholdNet. We evaluate ThresholdNet and other different networks on datasets of CIFAR10. Experiments show that HarDNet is twice as fast as DenseNet, and on this basis, ThresholdNet is 10% faster and 10% lower error rate than HarDNet.
△ Less
Submitted 27 December, 2021; v1 submitted 28 August, 2021;
originally announced August 2021.
-
Maximizing Extractable Value from Automated Market Makers
Authors:
Massimo Bartoletti,
James Hsin-yu Chiang,
Alberto Lluch-Lafuente
Abstract:
Automated Market Makers (AMMs) are decentralized applications that allow users to exchange crypto-tokens without the need for a matching exchange order. AMMs are one of the most successful DeFi use cases: indeed, major AMM platforms process a daily volume of transactions worth USD billions. Despite their popularity, AMMs are well-known to suffer from transaction-ordering issues: adversaries can in…
▽ More
Automated Market Makers (AMMs) are decentralized applications that allow users to exchange crypto-tokens without the need for a matching exchange order. AMMs are one of the most successful DeFi use cases: indeed, major AMM platforms process a daily volume of transactions worth USD billions. Despite their popularity, AMMs are well-known to suffer from transaction-ordering issues: adversaries can influence the ordering of user transactions, and possibly front-run them with their own, to extract value from AMMs, to the detriment of users. We devise an effective procedure to construct a strategy through which an adversary can maximize the value extracted from user transactions.
△ Less
Submitted 19 July, 2022; v1 submitted 2 June, 2021;
originally announced June 2021.
-
CUAB: Convolutional Uncertainty Attention Block Enhanced the Chest X-ray Image Analysis
Authors:
Chi-Shiang Wang,
Fang-Yi Su,
Tsung-Lu Michael Lee,
Yi-Shan Tsai,
Jung-Hsien Chiang
Abstract:
In recent years, convolutional neural networks (CNNs) have been successfully implemented to various image recognition applications, such as medical image analysis, object detection, and image segmentation. Many studies and applications have been working on improving the performance of CNN algorithms and models. The strategies that aim to improve the performance of CNNs can be grouped into three ma…
▽ More
In recent years, convolutional neural networks (CNNs) have been successfully implemented to various image recognition applications, such as medical image analysis, object detection, and image segmentation. Many studies and applications have been working on improving the performance of CNN algorithms and models. The strategies that aim to improve the performance of CNNs can be grouped into three major approaches: (1) deeper and wider network architecture, (2) automatic architecture search, and (3) convolutional attention block. Unlike approaches (1) and (2), the convolutional attention block approach is more flexible with lower cost. It enhances the CNN performance by extracting more efficient features. However, the existing attention blocks focus on enhancing the significant features, which lose some potential features in the uncertainty information. Inspired by the test time augmentation and test-time dropout approaches, we developed a novel convolutional uncertainty attention block (CUAB) that can leverage the uncertainty information to improve CNN-based models. The proposed module discovers potential information from the uncertain regions on feature maps in computer vision tasks. It is a flexible functional attention block that can be applied to any position in the convolutional block in CNN models. We evaluated the CUAB with notable backbone models, ResNet and ResNeXt, on a medical image segmentation task. The CUAB achieved a dice score of 73% and 84% in pneumonia and pneumothorax segmentation, respectively, thereby outperforming the original model and other notable attention approaches. The results demonstrated that the CUAB can efficiently utilize the uncertainty information to improve the model performance.
△ Less
Submitted 4 May, 2021;
originally announced May 2021.
-
A theory of Automated Market Makers in DeFi
Authors:
Massimo Bartoletti,
James Hsin-yu Chiang,
Alberto Lluch-Lafuente
Abstract:
Automated market makers (AMMs) are one of the most prominent decentralized finance (DeFi) applications. AMMs allow users to trade different types of crypto-tokens, without the need to find a counter-party. There are several implementations and models for AMMs, featuring a variety of sophisticated economic mechanisms. We present a theory of AMMs. The core of our theory is an abstract operational mo…
▽ More
Automated market makers (AMMs) are one of the most prominent decentralized finance (DeFi) applications. AMMs allow users to trade different types of crypto-tokens, without the need to find a counter-party. There are several implementations and models for AMMs, featuring a variety of sophisticated economic mechanisms. We present a theory of AMMs. The core of our theory is an abstract operational model of the interactions between users and AMMs, which can be concretised by instantiating the economic mechanisms. We exploit our theory to formally prove a set of fundamental properties of AMMs, characterizing both structural and economic aspects. We do this by abstracting from the actual economic mechanisms used in implementations, and identifying sufficient conditions which ensure the relevant properties. Notably, we devise a general solution to the arbitrage problem, the main game-theoretic foundation behind the economic mechanisms of AMMs.
△ Less
Submitted 16 December, 2022; v1 submitted 22 February, 2021;
originally announced February 2021.
-
Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions
Authors:
Todd Huster,
Jeremy E. J. Cohen,
Zinan Lin,
Kevin Chan,
Charles Kamhoua,
Nandi Leslie,
Cho-Yu Jason Chiang,
Vyas Sekar
Abstract:
Generative adversarial networks (GANs) are often billed as "universal distribution learners", but precisely what distributions they can represent and learn is still an open question. Heavy-tailed distributions are prevalent in many different domains such as financial risk-assessment, physics, and epidemiology. We observe that existing GAN architectures do a poor job of matching the asymptotic beha…
▽ More
Generative adversarial networks (GANs) are often billed as "universal distribution learners", but precisely what distributions they can represent and learn is still an open question. Heavy-tailed distributions are prevalent in many different domains such as financial risk-assessment, physics, and epidemiology. We observe that existing GAN architectures do a poor job of matching the asymptotic behavior of heavy-tailed distributions, a problem that we show stems from their construction. Additionally, when faced with the infinite moments and large distances between outlier points that are characteristic of heavy-tailed distributions, common loss functions produce unstable or near-zero gradients. We address these problems with the Pareto GAN. A Pareto GAN leverages extreme value theory and the functional properties of neural networks to learn a distribution that matches the asymptotic behavior of the marginal distributions of the features. We identify issues with standard loss functions and propose the use of alternative metric spaces that enable stable and efficient learning. Finally, we evaluate our proposed approach on a variety of heavy-tailed datasets.
△ Less
Submitted 22 January, 2021;
originally announced January 2021.
-
DESC DC2 Data Release Note
Authors:
LSST Dark Energy Science Collaboration,
Bela Abolfathi,
Robert Armstrong,
Humna Awan,
Yadu N. Babuji,
Franz Erik Bauer,
George Beckett,
Rahul Biswas,
Joanne R. Bogart,
Dominique Boutigny,
Kyle Chard,
James Chiang,
Johann Cohen-Tanugi,
Andrew J. Connolly,
Scott F. Daniel,
Seth W. Digel,
Alex Drlica-Wagner,
Richard Dubois,
Eric Gawiser,
Thomas Glanzman,
Salman Habib,
Andrew P. Hearin,
Katrin Heitmann,
Fabio Hernandez,
Renée Hložek
, et al. (32 additional authors not shown)
Abstract:
In preparation for cosmological analyses of the Vera C. Rubin Observatory Legacy Survey of Space and Time (LSST), the LSST Dark Energy Science Collaboration (LSST DESC) has created a 300 deg$^2$ simulated survey as part of an effort called Data Challenge 2 (DC2). The DC2 simulated sky survey, in six optical bands with observations following a reference LSST observing cadence, was processed with th…
▽ More
In preparation for cosmological analyses of the Vera C. Rubin Observatory Legacy Survey of Space and Time (LSST), the LSST Dark Energy Science Collaboration (LSST DESC) has created a 300 deg$^2$ simulated survey as part of an effort called Data Challenge 2 (DC2). The DC2 simulated sky survey, in six optical bands with observations following a reference LSST observing cadence, was processed with the LSST Science Pipelines (19.0.0). In this Note, we describe the public data release of the resulting object catalogs for the coadded images of five years of simulated observations along with associated truth catalogs. We include a brief description of the major features of the available data sets. To enable convenient access to the data products, we have developed a web portal connected to Globus data services. We describe how to access the data and provide example Jupyter Notebooks in Python to aid first interactions with the data. We welcome feedback and questions about the data release via a GitHub repository.
△ Less
Submitted 13 June, 2022; v1 submitted 12 January, 2021;
originally announced January 2021.
-
Laboratory Measurements of Instrumental Signatures of the LSST Camera Focal Plane
Authors:
Adam Snyder,
Aurelien Barrau,
Andrew Bradshaw,
Boyd Bowdish,
James Chiang,
Celine Combet,
Seth Digel,
Richard Dubois,
Ludovic Eraud,
Claire Juramy,
Craig Lage,
Travis Lange,
Myriam Migliore,
Andrei Nomerotski,
Paul O'Connor,
HyeYun Park,
Andrew Rasmussen,
Kevin Reil,
Aaron Roodman,
Adrian Shestakov,
Yousuke Utsumi,
Duncan Wood
Abstract:
Electro-optical testing and characterization of the Vera C. Rubin Observatory Legacy Survey of Space and Time (LSST) Camera focal plane, consisting of 205 charge-coupled devices (CCDs) arranged into 21 stand-alone Raft Tower Modules (RTMs) and 4 Corner Raft Tower Modules (CRTMs), is currently being performed at the SLAC National Accelerator Laboratory. Testing of the camera sensors is performed us…
▽ More
Electro-optical testing and characterization of the Vera C. Rubin Observatory Legacy Survey of Space and Time (LSST) Camera focal plane, consisting of 205 charge-coupled devices (CCDs) arranged into 21 stand-alone Raft Tower Modules (RTMs) and 4 Corner Raft Tower Modules (CRTMs), is currently being performed at the SLAC National Accelerator Laboratory. Testing of the camera sensors is performed using a set of custom-built optical projectors, designed to illuminate the full focal plane or specific regions of the focal plane with a series of light illumination patterns: the crosstalk projector, the flat illuminator projector, and the spot grid projector. In addition to measurements of crosstalk, linearity and full well, the ability to project realistically-sized sources, using the spot grid projector, makes possible unique measurements of instrumental signatures such as deferred charge distortions, astrometric shifts due to sensor effects, and the brighter-fatter effect, prior to camera first light. Here we present the optical projector designs and usage, the electro-optical measurements and how these results have been used in testing and improving the LSST Camera instrumental signature removal algorithms.
△ Less
Submitted 4 January, 2021;
originally announced January 2021.
-
SoK: Lending Pools in Decentralized Finance
Authors:
Massimo Bartoletti,
James Hsin-yu Chiang,
Alberto Lluch-Lafuente
Abstract:
Lending pools are decentralized applications which allow mutually untrusted users to lend and borrow crypto-assets. These applications feature complex, highly parametric incentive mechanisms to equilibrate the loan market. This complexity makes the behaviour of lending pools difficult to understand and to predict: indeed, ineffective incentives and attacks could potentially lead to emergent unwant…
▽ More
Lending pools are decentralized applications which allow mutually untrusted users to lend and borrow crypto-assets. These applications feature complex, highly parametric incentive mechanisms to equilibrate the loan market. This complexity makes the behaviour of lending pools difficult to understand and to predict: indeed, ineffective incentives and attacks could potentially lead to emergent unwanted behaviours. Reasoning about lending pools is made even harder by the lack of executable models of their behaviour: to precisely understand how users interact with lending pools, eventually one has to inspect their implementations, where the incentive mechanisms are intertwined with low-level implementation details. Further, the variety of existing implementations makes it difficult to distill the common aspects of lending pools. We systematize the existing knowledge about lending pools, leveraging a new formal model of interactions with users, which reflects the archetypal features of mainstream implementations. This enables us to prove some general properties of lending pools, such as the correct handling of funds, and to precisely describe vulnerabilities and attacks. We also discuss the role of lending pools in the broader context of decentralized finance.
△ Less
Submitted 24 December, 2020;
originally announced December 2020.
-
The LSST DESC DC2 Simulated Sky Survey
Authors:
LSST Dark Energy Science Collaboration,
Bela Abolfathi,
David Alonso,
Robert Armstrong,
Éric Aubourg,
Humna Awan,
Yadu N. Babuji,
Franz Erik Bauer,
Rachel Bean,
George Beckett,
Rahul Biswas,
Joanne R. Bogart,
Dominique Boutigny,
Kyle Chard,
James Chiang,
Chuck F. Claver,
Johann Cohen-Tanugi,
Céline Combet,
Andrew J. Connolly,
Scott F. Daniel,
Seth W. Digel,
Alex Drlica-Wagner,
Richard Dubois,
Emmanuel Gangler,
Eric Gawiser
, et al. (55 additional authors not shown)
Abstract:
We describe the simulated sky survey underlying the second data challenge (DC2) carried out in preparation for analysis of the Vera C. Rubin Observatory Legacy Survey of Space and Time (LSST) by the LSST Dark Energy Science Collaboration (LSST DESC). Significant connections across multiple science domains will be a hallmark of LSST; the DC2 program represents a unique modeling effort that stresses…
▽ More
We describe the simulated sky survey underlying the second data challenge (DC2) carried out in preparation for analysis of the Vera C. Rubin Observatory Legacy Survey of Space and Time (LSST) by the LSST Dark Energy Science Collaboration (LSST DESC). Significant connections across multiple science domains will be a hallmark of LSST; the DC2 program represents a unique modeling effort that stresses this interconnectivity in a way that has not been attempted before. This effort encompasses a full end-to-end approach: starting from a large N-body simulation, through setting up LSST-like observations including realistic cadences, through image simulations, and finally processing with Rubin's LSST Science Pipelines. This last step ensures that we generate data products resembling those to be delivered by the Rubin Observatory as closely as is currently possible. The simulated DC2 sky survey covers six optical bands in a wide-fast-deep (WFD) area of approximately 300 deg^2 as well as a deep drilling field (DDF) of approximately 1 deg^2. We simulate 5 years of the planned 10-year survey. The DC2 sky survey has multiple purposes. First, the LSST DESC working groups can use the dataset to develop a range of DESC analysis pipelines to prepare for the advent of actual data. Second, it serves as a realistic testbed for the image processing software under development for LSST by the Rubin Observatory. In particular, simulated data provide a controlled way to investigate certain image-level systematic effects. Finally, the DC2 sky survey enables the exploration of new scientific ideas in both static and time-domain cosmology.
△ Less
Submitted 26 January, 2021; v1 submitted 12 October, 2020;
originally announced October 2020.
-
Bitcoin Trace-Net: Formal Contract Verification at Signing Time
Authors:
James Chiang
Abstract:
Smart contracting protocols promise to regulate the transfer of cryptocurrency amongst participants in a trustless manner. A safe smart contract implementation should ensure that each participant can always append a contract transaction to the blockchain in order move the contract towards secure completion. To this goal, we propose Bitcoin Trace-Net, a contract verification framework which generat…
▽ More
Smart contracting protocols promise to regulate the transfer of cryptocurrency amongst participants in a trustless manner. A safe smart contract implementation should ensure that each participant can always append a contract transaction to the blockchain in order move the contract towards secure completion. To this goal, we propose Bitcoin Trace-Net, a contract verification framework which generates an executable symbolic model from the underlying contract implementation. A Trace-Net model consists of a Petri Net formalism enriched with a Dolev-Yao-like actor knowledge model. The explicit symbolic actor knowledge model supports the verification of contracts featuring cryptographic sub-protocols, which may not be observable on the blockchain. Trace-Net is sufficiently expressive to accurately model blockchain semantics such as the delay between a transaction broadcast and its subsequent confirmation, as well as adversarial blockchain reorganizations of finite depths, both of which can break smart contract safety. As an implementation level framework, Trace-Net can be instantiated at run-time to monitor and verify smart contract protocol executions.
△ Less
Submitted 15 July, 2020;
originally announced July 2020.
-
The LSST DESC Data Challenge 1: Generation and Analysis of Synthetic Images for Next Generation Surveys
Authors:
F. Javier Sánchez,
Chris W. Walter,
Humna Awan,
James Chiang,
Scott F. Daniel,
Eric Gawiser,
Tom Glanzman,
David P. Kirkby,
Rachel Mandelbaum,
Anže Slosar,
W. Michael Wood-Vasey,
Yusra AlSayyad,
Colin J. Burke,
Seth W. Digel,
Mike Jarvis,
Tony Johnson,
Heather Kelly,
Simon Krughoff,
Robert H. Lupton,
Phil J. Marshall,
John R. Peterson,
Paul A. Price,
Glenn Sembroski,
Brian Van Klaveren,
Matthew P. Wiesner
, et al. (1 additional authors not shown)
Abstract:
Data Challenge 1 (DC1) is the first synthetic dataset produced by the Rubin Observatory Legacy Survey of Space and Time (LSST) Dark Energy Science Collaboration (DESC). DC1 is designed to develop and validate data reduction and analysis and to study the impact of systematic effects that will affect the LSST dataset. DC1 is comprised of $r$-band observations of 40 deg$^{2}$ to 10-year LSST depth. W…
▽ More
Data Challenge 1 (DC1) is the first synthetic dataset produced by the Rubin Observatory Legacy Survey of Space and Time (LSST) Dark Energy Science Collaboration (DESC). DC1 is designed to develop and validate data reduction and analysis and to study the impact of systematic effects that will affect the LSST dataset. DC1 is comprised of $r$-band observations of 40 deg$^{2}$ to 10-year LSST depth. We present each stage of the simulation and analysis process: a) generation, by synthesizing sources from cosmological N-body simulations in individual sensor-visit images with different observing conditions; b) reduction using a development version of the LSST Science Pipelines; and c) matching to the input cosmological catalog for validation and testing. We verify that testable LSST requirements pass within the fidelity of DC1. We establish a selection procedure that produces a sufficiently clean extragalactic sample for clustering analyses and we discuss residual sample contamination, including contributions from inefficiency in star-galaxy separation and imperfect deblending. We compute the galaxy power spectrum on the simulated field and conclude that: i) survey properties have an impact of 50\% of the statistical uncertainty for the scales and models used in DC1 ii) a selection to eliminate artifacts in the catalogs is necessary to avoid biases in the measured clustering; iii) the presence of bright objects has a significant impact (2- to 6-$σ$) in the estimated power spectra at small scales ($\ell > 1200$), highlighting the impact of blending in studies at small angular scales in LSST;
△ Less
Submitted 5 July, 2020; v1 submitted 3 January, 2020;
originally announced January 2020.