-
Mitigating Disparate Impact of Differentially Private Learning through Bounded Adaptive Clipping
Authors:
Linzh Zhao,
Aki Rehn,
Mikko A. Heikkilä,
Razane Tajeddine,
Antti Honkela
Abstract:
Differential privacy (DP) has become an essential framework for privacy-preserving machine learning. Existing DP learning methods, however, often have disparate impacts on model predictions, e.g., for minority groups. Gradient clipping, which is often used in DP learning, can suppress larger gradients from challenging samples. We show that this problem is amplified by adaptive clipping, which will…
▽ More
Differential privacy (DP) has become an essential framework for privacy-preserving machine learning. Existing DP learning methods, however, often have disparate impacts on model predictions, e.g., for minority groups. Gradient clipping, which is often used in DP learning, can suppress larger gradients from challenging samples. We show that this problem is amplified by adaptive clipping, which will often shrink the clipping bound to tiny values to match a well-fitting majority, while significantly reducing the accuracy for others. We propose bounded adaptive clipping, which introduces a tunable lower bound to prevent excessive gradient suppression. Our method improves the accuracy of the worst-performing class on average over 10 percentage points on skewed MNIST and Fashion MNIST compared to the unbounded adaptive clipping, and over 5 percentage points over constant clipping.
△ Less
Submitted 2 June, 2025;
originally announced June 2025.
-
Non-IID data in Federated Learning: A Survey with Taxonomy, Metrics, Methods, Frameworks and Future Directions
Authors:
Daniel M. Jimenez G.,
David Solans,
Mikko Heikkila,
Andrea Vitaletti,
Nicolas Kourtellis,
Aris Anagnostopoulos,
Ioannis Chatzigiannakis
Abstract:
Recent advances in machine learning have highlighted Federated Learning (FL) as a promising approach that enables multiple distributed users (so-called clients) to collectively train ML models without sharing their private data. While this privacy-preserving method shows potential, it struggles when data across clients is not independent and identically distributed (non-IID) data. The latter remai…
▽ More
Recent advances in machine learning have highlighted Federated Learning (FL) as a promising approach that enables multiple distributed users (so-called clients) to collectively train ML models without sharing their private data. While this privacy-preserving method shows potential, it struggles when data across clients is not independent and identically distributed (non-IID) data. The latter remains an unsolved challenge that can result in poorer model performance and slower training times. Despite the significance of non-IID data in FL, there is a lack of consensus among researchers about its classification and quantification. This technical survey aims to fill that gap by providing a detailed taxonomy for non-IID data, partition protocols, and metrics to quantify data heterogeneity. Additionally, we describe popular solutions to address non-IID data and standardized frameworks employed in FL with heterogeneous data. Based on our state-of-the-art survey, we present key lessons learned and suggest promising future research directions.
△ Less
Submitted 12 December, 2024; v1 submitted 19 November, 2024;
originally announced November 2024.
-
Differential Privacy in Continual Learning: Which Labels to Update?
Authors:
Marlon Tobaben,
Talal Alrawajfeh,
Marcus Klasson,
Mikko Heikkilä,
Arno Solin,
Antti Honkela
Abstract:
The goal of continual learning (CL) is to retain knowledge across tasks, but this conflicts with strict privacy required for sensitive training data that prevents storing or memorising individual samples. To address that, we combine CL and differential privacy (DP). We highlight that failing to account for privacy leakage through the set of labels a model can output can break the privacy of otherw…
▽ More
The goal of continual learning (CL) is to retain knowledge across tasks, but this conflicts with strict privacy required for sensitive training data that prevents storing or memorising individual samples. To address that, we combine CL and differential privacy (DP). We highlight that failing to account for privacy leakage through the set of labels a model can output can break the privacy of otherwise valid DP algorithms. This is especially relevant in CL. We show that mitigating the issue with a data-independent overly large label space can have minimal negative impact on utility when fine-tuning a pre-trained model under DP, while learning the labels with a separate DP mechanism risks losing small classes.
△ Less
Submitted 22 May, 2025; v1 submitted 7 November, 2024;
originally announced November 2024.
-
On Using Secure Aggregation in Differentially Private Federated Learning with Multiple Local Steps
Authors:
Mikko A. Heikkilä
Abstract:
Federated learning is a distributed learning setting where the main aim is to train machine learning models without having to share raw data but only what is required for learning. To guarantee training data privacy and high-utility models, differential privacy and secure aggregation techniques are often combined with federated learning. However, with fine-grained protection granularities, e.g., w…
▽ More
Federated learning is a distributed learning setting where the main aim is to train machine learning models without having to share raw data but only what is required for learning. To guarantee training data privacy and high-utility models, differential privacy and secure aggregation techniques are often combined with federated learning. However, with fine-grained protection granularities, e.g., with the common sample-level protection, the currently existing techniques generally require the parties to communicate for each local optimization step, if they want to fully benefit from the secure aggregation in terms of the resulting formal privacy guarantees. In this paper, we show how a simple new analysis allows the parties to perform multiple local optimization steps while still benefiting from using secure aggregation. We show that our analysis enables higher utility models with guaranteed privacy protection under limited number of communication rounds.
△ Less
Submitted 24 March, 2025; v1 submitted 27 July, 2024;
originally announced July 2024.
-
PUFFLE: Balancing Privacy, Utility, and Fairness in Federated Learning
Authors:
Luca Corbucci,
Mikko A Heikkila,
David Solans Noguero,
Anna Monreale,
Nicolas Kourtellis
Abstract:
Training and deploying Machine Learning models that simultaneously adhere to principles of fairness and privacy while ensuring good utility poses a significant challenge. The interplay between these three factors of trustworthiness is frequently underestimated and remains insufficiently explored. Consequently, many efforts focus on ensuring only two of these factors, neglecting one in the process.…
▽ More
Training and deploying Machine Learning models that simultaneously adhere to principles of fairness and privacy while ensuring good utility poses a significant challenge. The interplay between these three factors of trustworthiness is frequently underestimated and remains insufficiently explored. Consequently, many efforts focus on ensuring only two of these factors, neglecting one in the process. The decentralization of the datasets and the variations in distributions among the clients exacerbate the complexity of achieving this ethical trade-off in the context of Federated Learning (FL). For the first time in FL literature, we address these three factors of trustworthiness. We introduce PUFFLE, a high-level parameterised approach that can help in the exploration of the balance between utility, privacy, and fairness in FL scenarios. We prove that PUFFLE can be effective across diverse datasets, models, and data distributions, reducing the model unfairness up to 75%, with a maximum reduction in the utility of 17% in the worst-case scenario, while maintaining strict privacy guarantees during the FL training.
△ Less
Submitted 21 July, 2024;
originally announced July 2024.
-
Speech Robust Bench: A Robustness Benchmark For Speech Recognition
Authors:
Muhammad A. Shah,
David Solans Noguero,
Mikko A. Heikkila,
Bhiksha Raj,
Nicolas Kourtellis
Abstract:
As Automatic Speech Recognition (ASR) models become ever more pervasive, it is important to ensure that they make reliable predictions under corruptions present in the physical and digital world. We propose Speech Robust Bench (SRB), a comprehensive benchmark for evaluating the robustness of ASR models to diverse corruptions. SRB is composed of 114 input perturbations which simulate an heterogeneo…
▽ More
As Automatic Speech Recognition (ASR) models become ever more pervasive, it is important to ensure that they make reliable predictions under corruptions present in the physical and digital world. We propose Speech Robust Bench (SRB), a comprehensive benchmark for evaluating the robustness of ASR models to diverse corruptions. SRB is composed of 114 input perturbations which simulate an heterogeneous range of corruptions that ASR models may encounter when deployed in the wild. We use SRB to evaluate the robustness of several state-of-the-art ASR models and observe that model size and certain modeling choices such as the use of discrete representations, or self-training appear to be conducive to robustness. We extend this analysis to measure the robustness of ASR models on data from various demographic subgroups, namely English and Spanish speakers, and males and females. Our results revealed noticeable disparities in the model's robustness across subgroups. We believe that SRB will significantly facilitate future research towards robust ASR models, by making it easier to conduct comprehensive and comparable robustness evaluations.
△ Less
Submitted 9 December, 2024; v1 submitted 8 March, 2024;
originally announced March 2024.
-
Locally unitary quantum state evolution is local
Authors:
Matias Heikkilä
Abstract:
We study the localization properties of bipartite channels, whose action on a subsystem yields a unitary channel. In particular we show that, under such channel, the subsystem must evolve independent of its environment. This point of view is another way to verify certain well-known conservation laws of quantum information in a generalized way. A no-go theorem for non classical conditional semantic…
▽ More
We study the localization properties of bipartite channels, whose action on a subsystem yields a unitary channel. In particular we show that, under such channel, the subsystem must evolve independent of its environment. This point of view is another way to verify certain well-known conservation laws of quantum information in a generalized way. A no-go theorem for non classical conditional semantics in quantum computation is obtained as an intermediate result.
△ Less
Submitted 5 February, 2024;
originally announced February 2024.
-
Differentially private partitioned variational inference
Authors:
Mikko A. Heikkilä,
Matthew Ashman,
Siddharth Swaroop,
Richard E. Turner,
Antti Honkela
Abstract:
Learning a privacy-preserving model from sensitive data which are distributed across multiple devices is an increasingly important problem. The problem is often formulated in the federated learning context, with the aim of learning a single global model while keeping the data distributed. Moreover, Bayesian learning is a popular approach for modelling, since it naturally supports reliable uncertai…
▽ More
Learning a privacy-preserving model from sensitive data which are distributed across multiple devices is an increasingly important problem. The problem is often formulated in the federated learning context, with the aim of learning a single global model while keeping the data distributed. Moreover, Bayesian learning is a popular approach for modelling, since it naturally supports reliable uncertainty estimates. However, Bayesian learning is generally intractable even with centralised non-private data and so approximation techniques such as variational inference are a necessity. Variational inference has recently been extended to the non-private federated learning setting via the partitioned variational inference algorithm. For privacy protection, the current gold standard is called differential privacy. Differential privacy guarantees privacy in a strong, mathematically clearly defined sense.
In this paper, we present differentially private partitioned variational inference, the first general framework for learning a variational approximation to a Bayesian posterior distribution in the federated learning setting while minimising the number of communication rounds and providing differential privacy guarantees for data subjects.
We propose three alternative implementations in the general framework, one based on perturbing local optimisation runs done by individual parties, and two based on perturbing updates to the global model (one using a version of federated averaging, the second one adding virtual parties to the protocol), and compare their properties both theoretically and empirically.
△ Less
Submitted 18 April, 2023; v1 submitted 23 September, 2022;
originally announced September 2022.
-
Tight Accounting in the Shuffle Model of Differential Privacy
Authors:
Antti Koskela,
Mikko A. Heikkilä,
Antti Honkela
Abstract:
Shuffle model of differential privacy is a novel distributed privacy model based on a combination of local privacy mechanisms and a secure shuffler. It has been shown that the additional randomisation provided by the shuffler improves privacy bounds compared to the purely local mechanisms. Accounting tight bounds, however, is complicated by the complexity brought by the shuffler. The recently prop…
▽ More
Shuffle model of differential privacy is a novel distributed privacy model based on a combination of local privacy mechanisms and a secure shuffler. It has been shown that the additional randomisation provided by the shuffler improves privacy bounds compared to the purely local mechanisms. Accounting tight bounds, however, is complicated by the complexity brought by the shuffler. The recently proposed numerical techniques for evaluating $(\varepsilon,δ)$-differential privacy guarantees have been shown to give tighter bounds than commonly used methods for compositions of various complex mechanisms. In this paper, we show how to obtain accurate bounds for adaptive compositions of general $\varepsilon$-LDP shufflers using the analysis by Feldman et al. (2021) and tight bounds for adaptive compositions of shufflers of $k$-randomised response mechanisms, using the analysis by Balle et al. (2019). We show how to speed up the evaluation of the resulting privacy loss distribution from $\mathcal{O}(n^2)$ to $\mathcal{O}(n)$, where $n$ is the number of users, without noticeable change in the resulting $δ(\varepsilon)$-upper bounds. We also demonstrate looseness of the existing bounds and methods found in the literature, improving previous composition results significantly.
△ Less
Submitted 31 January, 2022; v1 submitted 1 June, 2021;
originally announced June 2021.
-
Role of ALD Al2O3 surface passivation on the performance of p-type Cu2O thin film transistors
Authors:
Mari Napari,
Tahmida N. Huq,
David J. Meeth,
Mikko J. Heikkilä,
Kham M. Niang,
Han Wang,
Tomi Iivonen,
Haiyan Wang,
Markku Leskelä,
Mikko Ritala,
Andrew J. Flewitt,
Robert L. Z. Hoye,
Judith L. MacManus-Driscol
Abstract:
High-performance p-type oxide thin film transistors (TFTs) have great potential for many semiconductor applications. However, these devices typically suffer from low hole mobility and high off-state currents. We fabricated p-type TFTs with a phase-pure polycrystalline Cu2O semiconductor channel grown by atomic layer deposition (ALD). The TFT switching characteristics were improved by applying a th…
▽ More
High-performance p-type oxide thin film transistors (TFTs) have great potential for many semiconductor applications. However, these devices typically suffer from low hole mobility and high off-state currents. We fabricated p-type TFTs with a phase-pure polycrystalline Cu2O semiconductor channel grown by atomic layer deposition (ALD). The TFT switching characteristics were improved by applying a thin ALD Al2O3 passivation layer on the Cu2O channel, followed by vacuum annealing at 300 C. Detailed characterisation by TEM-EDX and XPS shows that the surface of Cu2O is reduced following Al2O3 deposition and indicates the formation of 1-2 nm thick CuAlO2 interfacial layer. This, together with field-effect passivation caused by the high negative fixed charge of the ALD Al2O3, leads to an improvement in the TFT performance by reducing the density of deep trap states as well as by reducing the accumulation of electrons in the semiconducting layer in the device off-state.
△ Less
Submitted 21 October, 2020;
originally announced October 2020.
-
Differentially private cross-silo federated learning
Authors:
Mikko A. Heikkilä,
Antti Koskela,
Kana Shimizu,
Samuel Kaski,
Antti Honkela
Abstract:
Strict privacy is of paramount importance in distributed machine learning. Federated learning, with the main idea of communicating only what is needed for learning, has been recently introduced as a general approach for distributed learning to enhance learning and improve security. However, federated learning by itself does not guarantee any privacy for data subjects. To quantify and control how m…
▽ More
Strict privacy is of paramount importance in distributed machine learning. Federated learning, with the main idea of communicating only what is needed for learning, has been recently introduced as a general approach for distributed learning to enhance learning and improve security. However, federated learning by itself does not guarantee any privacy for data subjects. To quantify and control how much privacy is compromised in the worst-case, we can use differential privacy.
In this paper we combine additively homomorphic secure summation protocols with differential privacy in the so-called cross-silo federated learning setting. The goal is to learn complex models like neural networks while guaranteeing strict privacy for the individual data subjects. We demonstrate that our proposed solutions give prediction accuracy that is comparable to the non-distributed setting, and are fast enough to enable learning models with millions of parameters in a reasonable time.
To enable learning under strict privacy guarantees that need privacy amplification by subsampling, we present a general algorithm for oblivious distributed subsampling. However, we also argue that when malicious parties are present, a simple approach using distributed Poisson subsampling gives better privacy.
Finally, we show that by leveraging random projections we can further scale-up our approach to larger models while suffering only a modest performance loss.
△ Less
Submitted 10 July, 2020;
originally announced July 2020.
-
UAV-Aided Interference Assessment for Private 5G NR Deployments: Challenges and Solutions
Authors:
Jani Urama,
Richard Wiren,
Olga Galinina,
Juhani Kauppi,
Kimmo Hiltunen,
Juha Erkkilä,
Fedor Chernogorov,
Pentti Eteläaho,
Marjo Heikkilä,
Johan Torsner,
Sergey Andreev,
Mikko Valkama
Abstract:
Industrial automation has created a high demand for private 5G networks, the deployment of which calls for an efficient and reliable solution to ensure strict compliance with the regulatory emission limits. While traditional methods for measuring outdoor interference include collecting real-world data by walking or driving, the use of unmanned aerial vehicles (UAVs) offers an attractive alternativ…
▽ More
Industrial automation has created a high demand for private 5G networks, the deployment of which calls for an efficient and reliable solution to ensure strict compliance with the regulatory emission limits. While traditional methods for measuring outdoor interference include collecting real-world data by walking or driving, the use of unmanned aerial vehicles (UAVs) offers an attractive alternative due to their flexible mobility and adaptive altitude. As UAVs perform measurements quickly and semiautomatically, they can potentially assist in near realtime adjustments of the network configuration and fine-tuning its parameters, such as antenna settings and transmit power, as well as help improve indoor connectivity while respecting outdoor emission constraints. This article offers a firsthand tutorial on using aerial 5G emission assessment for interference management in nonpublic networks (NPNs) by reviewing the key challenges of UAV-mounted radio-scanner measurements. Particularly, we (i) outline the challenges of practical assessment of the outdoor interference originating from a local indoor 5G network while discussing regulatory and other related constraints and (ii) address practical methods and tools while summarizing the recent results of our measurement campaign. The reported proof of concept confirms that UAV-based systems represent a promising tool for capturing outdoor interference from private 5G systems.
△ Less
Submitted 13 June, 2020;
originally announced June 2020.
-
A 6G White Paper on Connectivity for Remote Areas
Authors:
Harri Saarnisaari,
Sudhir Dixit,
Mohamed-Slim Alouini,
Abdelaali Chaoub,
Marco Giordani,
Adrian Kliks,
Marja Matinmikko-Blue,
Nan Zhang,
Anuj Agrawal,
Mats Andersson,
Vimal Bhatia,
Wei Cao,
Yunfei Chen,
Wei Feng,
Marjo Heikkilä,
Josep M. Jornet,
Luciano Mendes,
Heikki Karvonen,
Brejesh Lall,
Matti Latva-aho,
Xiangling Li,
Kalle Lähetkangas,
Moshe T. Masonta,
Alok Pandey,
Pekka Pirinen
, et al. (9 additional authors not shown)
Abstract:
In many places all over the world rural and remote areas lack proper connectivity that has led to increasing digital divide. These areas might have low population density, low incomes, etc., making them less attractive places to invest and operate connectivity networks. 6G could be the first mobile radio generation truly aiming to close the digital divide. However, in order to do so, special requi…
▽ More
In many places all over the world rural and remote areas lack proper connectivity that has led to increasing digital divide. These areas might have low population density, low incomes, etc., making them less attractive places to invest and operate connectivity networks. 6G could be the first mobile radio generation truly aiming to close the digital divide. However, in order to do so, special requirements and challenges have to be considered since the beginning of the design process. The aim of this white paper is to discuss requirements and challenges and point out related, identified research topics that have to be solved in 6G. This white paper first provides a generic discussion, shows some facts and discusses targets set in international bodies related to rural and remote connectivity and digital divide. Then the paper digs into technical details, i.e., into a solutions space. Each technical section ends with a discussion and then highlights identified 6G challenges and research ideas as a list.
△ Less
Submitted 30 April, 2020;
originally announced April 2020.
-
Experimental constraints on the ordinary chondrite shock darkening caused by asteroid collisions
Authors:
T. Kohout,
E. V. Petrova,
G. A. Yakovlev,
V. I. Grokhovsky,
A. Penttilä,
A. Maturilli,
J. -G. Moreau,
S. V. Berzin,
J. Wasiljeff,
I. A. Danilenko,
D. A. Zamyatin,
R. F. Muftakhetdinova,
M. Heikkilä
Abstract:
Shock-induced changes in ordinary chondrite meteorites related to impacts or planetary collisions are known to be capable of altering their optical properties. Thus, one can hypothesize that a significant portion of the ordinary chondrite material may be hidden within the observed dark C/X asteroid population. The exact pressure-temperature conditions of the shock-induced darkening are not well co…
▽ More
Shock-induced changes in ordinary chondrite meteorites related to impacts or planetary collisions are known to be capable of altering their optical properties. Thus, one can hypothesize that a significant portion of the ordinary chondrite material may be hidden within the observed dark C/X asteroid population. The exact pressure-temperature conditions of the shock-induced darkening are not well constrained. Thus, we experimentally investigate the gradual changes in the chondrite material optical properties as a function of the shock pressure. A spherical shock experiment with Chelyabinsk LL5 was performed in order to study the changes in its optical properties. The spherical shock experiment geometry allows for a gradual increase of shock pressure from $\sim$15 GPa at a rim toward hundreds of gigapascals in the center. Four distinct zones were observed with an increasing shock load. The optical changes are minimal up to $\sim$50 GPa. In the region of $\sim$50--60 GPa, shock darkening occurs due to the troilite melt infusion into silicates. This process abruptly ceases at pressures of $\sim$60 GPa due to an onset of silicate melting. At pressures higher than $\sim$150 GPa, recrystallization occurs and is associated with a second-stage shock darkening due to fine troilite-metal eutectic grains. The shock darkening affects the ultraviolet, visible, and near-infrared (UV, VIS, and NIR) region while changes to the MIR spectrum are minimal. Shock darkening is caused by two distinct mechanisms with characteristic pressure regions, which are separated by an interval where the darkening ceases. This implies a reduced amount of shock-darkened material produced during the asteroid collisions.
△ Less
Submitted 1 April, 2020;
originally announced April 2020.
-
Differentially Private Markov Chain Monte Carlo
Authors:
Mikko A. Heikkilä,
Joonas Jälkö,
Onur Dikmen,
Antti Honkela
Abstract:
Recent developments in differentially private (DP) machine learning and DP Bayesian learning have enabled learning under strong privacy guarantees for the training data subjects. In this paper, we further extend the applicability of DP Bayesian learning by presenting the first general DP Markov chain Monte Carlo (MCMC) algorithm whose privacy-guarantees are not subject to unrealistic assumptions o…
▽ More
Recent developments in differentially private (DP) machine learning and DP Bayesian learning have enabled learning under strong privacy guarantees for the training data subjects. In this paper, we further extend the applicability of DP Bayesian learning by presenting the first general DP Markov chain Monte Carlo (MCMC) algorithm whose privacy-guarantees are not subject to unrealistic assumptions on Markov chain convergence and that is applicable to posterior inference in arbitrary models. Our algorithm is based on a decomposition of the Barker acceptance test that allows evaluating the Rényi DP privacy cost of the accept-reject choice. We further show how to improve the DP guarantee through data subsampling and approximate acceptance tests.
△ Less
Submitted 17 June, 2019; v1 submitted 29 January, 2019;
originally announced January 2019.
-
Representation Transfer for Differentially Private Drug Sensitivity Prediction
Authors:
Teppo Niinimäki,
Mikko Heikkilä,
Antti Honkela,
Samuel Kaski
Abstract:
Motivation: Human genomic datasets often contain sensitive information that limits use and sharing of the data. In particular, simple anonymisation strategies fail to provide sufficient level of protection for genomic data, because the data are inherently identifiable. Differentially private machine learning can help by guaranteeing that the published results do not leak too much information about…
▽ More
Motivation: Human genomic datasets often contain sensitive information that limits use and sharing of the data. In particular, simple anonymisation strategies fail to provide sufficient level of protection for genomic data, because the data are inherently identifiable. Differentially private machine learning can help by guaranteeing that the published results do not leak too much information about any individual data point. Recent research has reached promising results on differentially private drug sensitivity prediction using gene expression data. Differentially private learning with genomic data is challenging because it is more difficult to guarantee the privacy in high dimensions. Dimensionality reduction can help, but if the dimension reduction mapping is learned from the data, then it needs to be differentially private too, which can carry a significant privacy cost. Furthermore, the selection of any hyperparameters (such as the target dimensionality) needs to also avoid leaking private information.
Results: We study an approach that uses a large public dataset of similar type to learn a compact representation for differentially private learning. We compare three representation learning methods: variational autoencoders, PCA and random projection. We solve two machine learning tasks on gene expression of cancer cell lines: cancer type classification, and drug sensitivity prediction. The experiments demonstrate significant benefit from all representation learning methods with variational autoencoders providing the most accurate predictions most often. Our results significantly improve over previous state-of-the-art in accuracy of differentially private drug sensitivity prediction.
△ Less
Submitted 29 January, 2019;
originally announced January 2019.
-
Nonparametric geometric outlier detection
Authors:
Matias Heikkilä
Abstract:
Outlier detection is a major topic in robust statistics due to the high practical significance of anomalous observations. Many existing methods are, however, either parametric or cease to perform well when the data is far from linearly structured. In this paper, we propose a quantity, Delaunay outlyingness, that is a nonparametric outlyingness score applicable to data with complicated structure. T…
▽ More
Outlier detection is a major topic in robust statistics due to the high practical significance of anomalous observations. Many existing methods are, however, either parametric or cease to perform well when the data is far from linearly structured. In this paper, we propose a quantity, Delaunay outlyingness, that is a nonparametric outlyingness score applicable to data with complicated structure. The approach is based a well known triangulation of the sample, which seems to reflect the sparsity of the pointset to different directions in a useful way. In addition to appealing to heuristics, we derive results on the asymptotic behaviour of Delaunay outlyingness in the case of a sufficiently simple set of observations. Simulations and an application to financial data are also discussed.
△ Less
Submitted 13 November, 2018;
originally announced November 2018.
-
Kinematics and Dynamic Modeling of a Planar Hydraulic Elastomer Actuator
Authors:
Mahdi Momeni Kelageri,
Mikko Heikkila,
Jarno Jokinen,
Matti Linjama,
Reza Ghabcheloo
Abstract:
This paper presents modeling of a compliant 2D manipulator, a so called soft hydraulic/fluidic elastomer actuator. Our focus is on fiber-Reinforced Fluidic Elastomer Actuators (RFEA) driven by a constant pressure hydraulic supply and modulated on/off valves. We present a model that not only provides the dynamics behavior of the system but also the kinematics of the actuator. In addition to that, t…
▽ More
This paper presents modeling of a compliant 2D manipulator, a so called soft hydraulic/fluidic elastomer actuator. Our focus is on fiber-Reinforced Fluidic Elastomer Actuators (RFEA) driven by a constant pressure hydraulic supply and modulated on/off valves. We present a model that not only provides the dynamics behavior of the system but also the kinematics of the actuator. In addition to that, the relation between the applied hydraulic pressure and the bending angle of the soft actuator and thus, its tip position is formulated in a systematic way. We also present a steady state model that calculates the bending angle given the fluid pressure which can be beneficial to find out the initial values of the parameters during the system identification process. Our experimental results verify and validate the performance of the proposed modeling approach both in transition and steady states. Due to its inherent simplicity, this model shall also be used in real-time control of the soft actuators.
△ Less
Submitted 13 June, 2018;
originally announced June 2018.
-
Design, Fabrication and Control of an Hydraulic Elastomer Actuator
Authors:
Mahdi Momeni Kelageri,
Mikko Heikkila,
Minna Poikelispaa,
Reza Ghabcheloo,
Matti Linjama,
Jyrki Vuorinen
Abstract:
This paper presents design, fabrication and control of a compliant 2D manipulator, a so called soft actuator. Our focus is on fiber-reinforced elastomer actuators driven by a constant pressure hydraulic supply and modulated on/off valves. For a given diameters, we study the effect of four different elastomer materials and that of number of reinforcement fiber turns on forces generated by the actua…
▽ More
This paper presents design, fabrication and control of a compliant 2D manipulator, a so called soft actuator. Our focus is on fiber-reinforced elastomer actuators driven by a constant pressure hydraulic supply and modulated on/off valves. For a given diameters, we study the effect of four different elastomer materials and that of number of reinforcement fiber turns on forces generated by the actuator and maximum bending angles. For the rest of the study, we use polydimethylosiloxane (PDMS) with 240 fiber turns per 170mm length of actuator which withstand highest pressures and forces in our experiments. For the rest of the paper, we introduce two control methodologies. Firstly, we show that is possible to reasonably accurately control the pressure inside tube without measuring the pressure incorporating a simple linear tube model. This can be used, for example, in an inner-outer loop configuration with a PI position control to achieve high performance without the need for pressure measurement. Secondly, we experimentally show that a switching position control exhibits very good steady state accuracy and acceptable transient. Actuator tip position is measured using an external vision system. Our experiments included performance analysis of our soft manipulator while freely moving as well as when carrying a load.
△ Less
Submitted 13 June, 2018;
originally announced June 2018.
-
Differentially Private Bayesian Learning on Distributed Data
Authors:
Mikko Heikkilä,
Eemil Lagerspetz,
Samuel Kaski,
Kana Shimizu,
Sasu Tarkoma,
Antti Honkela
Abstract:
Many applications of machine learning, for example in health care, would benefit from methods that can guarantee privacy of data subjects. Differential privacy (DP) has become established as a standard for protecting learning results. The standard DP algorithms require a single trusted party to have access to the entire data, which is a clear weakness. We consider DP Bayesian learning in a distrib…
▽ More
Many applications of machine learning, for example in health care, would benefit from methods that can guarantee privacy of data subjects. Differential privacy (DP) has become established as a standard for protecting learning results. The standard DP algorithms require a single trusted party to have access to the entire data, which is a clear weakness. We consider DP Bayesian learning in a distributed setting, where each party only holds a single sample or a few samples of the data. We propose a learning strategy based on a secure multi-party sum function for aggregating summaries from data holders and the Gaussian mechanism for DP. Our method builds on an asymptotically optimal and practically efficient DP Bayesian inference with rapidly diminishing extra cost.
△ Less
Submitted 29 May, 2017; v1 submitted 3 March, 2017;
originally announced March 2017.
-
On Asymptotic Properties of the Separating Hill Estimator
Authors:
Matias Heikkilä,
Yves Dominicy,
Pauliina Ilmonen
Abstract:
Modeling and understanding multivariate extreme events is challenging, but of great importance in various applications - e.g. in biostatistics, climatology, and finance. The separating Hill estimator can be used in estimating the extreme value index of a heavy tailed multivariate elliptical distribution. We consider the asymptotic behavior of the separating Hill estimator under estimated location…
▽ More
Modeling and understanding multivariate extreme events is challenging, but of great importance in various applications - e.g. in biostatistics, climatology, and finance. The separating Hill estimator can be used in estimating the extreme value index of a heavy tailed multivariate elliptical distribution. We consider the asymptotic behavior of the separating Hill estimator under estimated location and scatter. The asymptotic properties of the separating Hill estimator are known under elliptical distribution with known location and scatter. However, the effect of estimation of the location and scatter has previously been examined only in a simulation study. We show, analytically, that the separating Hill estimator is consistent and asymptotically normal under estimated location and scatter, when certain mild conditions are met.
△ Less
Submitted 12 January, 2016; v1 submitted 27 November, 2015;
originally announced November 2015.