-
Noise-Resilient Homomorphic Encryption: A Framework for Secure Data Processing in Health care Domain
Authors:
B. Shuriya,
S. Vimal Kumar,
K. Bagyalakshmi
Abstract:
In this paper, we introduce the Fully Homomorphic Integrity Model (HIM), a novel approach designed to enhance security, efficiency, and reliability in encrypted data processing, primarily within the health care industry. HIM addresses the key challenges that noise accumulation, computational overheads, and data integrity pose during homomorphic operations. Our contribution of HIM: advances in nois…
▽ More
In this paper, we introduce the Fully Homomorphic Integrity Model (HIM), a novel approach designed to enhance security, efficiency, and reliability in encrypted data processing, primarily within the health care industry. HIM addresses the key challenges that noise accumulation, computational overheads, and data integrity pose during homomorphic operations. Our contribution of HIM: advances in noise management through the rational number adjustment; key generation based on personalized prime numbers; and time complexity analysis details for key operations. In HIM, some additional mechanisms were introduced, including robust mechanisms of decryption. Indeed, the decryption mechanism ensures that the data recovered upon doing complex homomorphic computation will be valid and reliable. The healthcare id model is tested, and it supports real-time processing of data with privacy maintained concerning patients. It supports analytics and decision-making processes without any compromise on the integrity of information concerning patients. Output HIM promotes the efficiency of encryption to a greater extent as it reduces the encryption time up to 35ms and decryption time up to 140ms, which is better when compared to other models in the existence. Ciphertext size also becomes the smallest one, which is 4KB. Our experiments confirm that HIM is indeed a very efficient and secure privacy-preserving solution for healthcare applications
△ Less
Submitted 16 December, 2024;
originally announced December 2024.
-
Generalization of Deep Reinforcement Learning for Jammer-Resilient Frequency and Power Allocation
Authors:
Swatantra Kafle,
Jithin Jagannath,
Zackary Kane,
Noor Biswas,
Prem Sagar Vasanth Kumar,
Anu Jagannath
Abstract:
We tackle the problem of joint frequency and power allocation while emphasizing the generalization capability of a deep reinforcement learning model. Most of the existing methods solve reinforcement learning-based wireless problems for a specific pre-determined wireless network scenario. The performance of a trained agent tends to be very specific to the network and deteriorates when used in a dif…
▽ More
We tackle the problem of joint frequency and power allocation while emphasizing the generalization capability of a deep reinforcement learning model. Most of the existing methods solve reinforcement learning-based wireless problems for a specific pre-determined wireless network scenario. The performance of a trained agent tends to be very specific to the network and deteriorates when used in a different network operating scenario (e.g., different in size, neighborhood, and mobility, among others). We demonstrate our approach to enhance training to enable a higher generalization capability during inference of the deployed model in a distributed multi-agent setting in a hostile jamming environment. With all these, we show the improved training and inference performance of the proposed methods when tested on previously unseen simulated wireless networks of different sizes and architectures. More importantly, to prove practical impact, the end-to-end solution was implemented on the embedded software-defined radio and validated using over-the-air evaluation.
△ Less
Submitted 6 May, 2023; v1 submitted 4 February, 2023;
originally announced February 2023.
-
A Symbolic Temporal Pooling method for Video-based Person Re-Identification
Authors:
S V Aruna Kumar,
Ehsan Yaghoubi,
Hugo Proença
Abstract:
In video-based person re-identification, both the spatial and temporal features are known to provide orthogonal cues to effective representations. Such representations are currently typically obtained by aggregating the frame-level features using max/avg pooling, at different points of the models. However, such operations also decrease the amount of discriminating information available, which is p…
▽ More
In video-based person re-identification, both the spatial and temporal features are known to provide orthogonal cues to effective representations. Such representations are currently typically obtained by aggregating the frame-level features using max/avg pooling, at different points of the models. However, such operations also decrease the amount of discriminating information available, which is particularly hazardous in case of poor separability between the different classes. To alleviate this problem, this paper introduces a symbolic temporal pooling method, where frame-level features are represented in the distribution valued symbolic form, yielding from fitting an Empirical Cumulative Distribution Function (ECDF) to each feature. Also, considering that the original triplet loss formulation cannot be applied directly to this kind of representations, we introduce a symbolic triplet loss function that infers the similarity between two symbolic objects. Having carried out an extensive empirical evaluation of the proposed solution against the state-of-the-art, in four well known data sets (MARS, iLIDS-VID, PRID2011 and P-DESTRE), the observed results point for consistent improvements in performance over the previous best performing techniques.
△ Less
Submitted 19 June, 2020;
originally announced June 2020.
-
The P-DESTRE: A Fully Annotated Dataset for Pedestrian Detection, Tracking, Re-Identification and Search from Aerial Devices
Authors:
S. V. Aruna Kumar,
Ehsan Yaghoubi,
Abhijit Das,
B. S. Harish,
Hugo Proença
Abstract:
Over the last decades, the world has been witnessing growing threats to the security in urban spaces, which has augmented the relevance given to visual surveillance solutions able to detect, track and identify persons of interest in crowds. In particular, unmanned aerial vehicles (UAVs) are a potential tool for this kind of analysis, as they provide a cheap way for data collection, cover large and…
▽ More
Over the last decades, the world has been witnessing growing threats to the security in urban spaces, which has augmented the relevance given to visual surveillance solutions able to detect, track and identify persons of interest in crowds. In particular, unmanned aerial vehicles (UAVs) are a potential tool for this kind of analysis, as they provide a cheap way for data collection, cover large and difficult-to-reach areas, while reducing human staff demands. In this context, all the available datasets are exclusively suitable for the pedestrian re-identification problem, in which the multi-camera views per ID are taken on a single day, and allows the use of clothing appearance features for identification purposes. Accordingly, the main contributions of this paper are two-fold: 1) we announce the UAV-based P-DESTRE dataset, which is the first of its kind to provide consistent ID annotations across multiple days, making it suitable for the extremely challenging problem of person search, i.e., where no clothing information can be reliably used. Apart this feature, the P-DESTRE annotations enable the research on UAV-based pedestrian detection, tracking, re-identification and soft biometric solutions; and 2) we compare the results attained by state-of-the-art pedestrian detection, tracking, reidentification and search techniques in well-known surveillance datasets, to the effectiveness obtained by the same techniques in the P-DESTRE data. Such comparison enables to identify the most problematic data degradation factors of UAV-based data for each task, and can be used as baselines for subsequent advances in this kind of technology. The dataset and the full details of the empirical evaluation carried out are freely available at http://p-destre.di.ubi.pt/.
△ Less
Submitted 6 April, 2020;
originally announced April 2020.
-
Joint Routing, Scheduling and Power Control Providing Hard Deadline in Wireless Multihop Networks
Authors:
Satya V Kumar,
Vinod Sharma
Abstract:
We consider optimal/efficient power allocation policies in a single/multihop wireless network in the presence of hard end-to-end deadline delay constraints on the transmitted packets. Such constraints can be useful for real time voice and video. Power is consumed in only transmission of the data. We consider the case when the power used in transmission is a convex function of the data transmitted.…
▽ More
We consider optimal/efficient power allocation policies in a single/multihop wireless network in the presence of hard end-to-end deadline delay constraints on the transmitted packets. Such constraints can be useful for real time voice and video. Power is consumed in only transmission of the data. We consider the case when the power used in transmission is a convex function of the data transmitted. We develop a computationally efficient online algorithm, which minimizes the average power for the single hop. We model this problem as dynamic program (DP) and obtain the optimal solution. Next, we generalize it to the multiuser, multihop scenario when there are multiple real time streams with different hard deadline constraints.
△ Less
Submitted 15 February, 2017;
originally announced February 2017.
-
Ultrafast stratified diffusion of water inside carbon nanotubes. Direct experimental evidence with 2D (D-T2) NMR spectroscopy
Authors:
J. Hassan,
G. Diamantopoulos,
L. Gkoura,
M. Karayanni,
S. Alhassan,
S. V. Kumar,
M. S. Katsiotis,
T. Karagiannis,
M. Fardis,
N. Panopoulos,
H. J. Kim,
M. Katsioti,
G. Papavassiliou
Abstract:
Water, when confined at the nanoscale acquires extraordinary transport properties. And yet there is no direct experimental evidence of these properties at nanoscale resolution. Here, by using 2D NMR diffusion-relaxation (D-T2) and spin-lattice - spin-spin relaxation (T1-T2) spectroscopy, we succeeded to resolve at the nanoscale water diffusion in single and double-walled carbon nanotubes (SWCNT/DW…
▽ More
Water, when confined at the nanoscale acquires extraordinary transport properties. And yet there is no direct experimental evidence of these properties at nanoscale resolution. Here, by using 2D NMR diffusion-relaxation (D-T2) and spin-lattice - spin-spin relaxation (T1-T2) spectroscopy, we succeeded to resolve at the nanoscale water diffusion in single and double-walled carbon nanotubes (SWCNT/DWCNT). In SWCNTs, spectra display the characteristic shape of uniform water diffusion restricted in one dimension. Remarkably, in DWCNTs water is shown to split into two axial components with the inner one acquiring unusual flow properties: high fragility, ultrafast self-diffusion coefficient, and "rigid" molecular environment, revealing a stratified cooperative motion mechanism to underlie fast diffusion in water saturated CNTs.
△ Less
Submitted 18 December, 2017; v1 submitted 4 December, 2016;
originally announced December 2016.
-
Quantum Information processing by NMR: Preparation of pseudopure states and implementation of unitary operations in a single-qutrit system
Authors:
Ranabir Das,
Avik Mitra,
S. Vijay Kumar,
Anil Kumar
Abstract:
Theoretical Quantum Information Processing (QIP) has matured from the use of qubits to the use of qudits (systems having states> 2). Where as most of the experimental implementations have been performed using qubits, little experimental work has been carried out using qudits as yet. In this paper we demonstrate experimental realization of a qutrit system by nuclear magnetic resonance (NMR), util…
▽ More
Theoretical Quantum Information Processing (QIP) has matured from the use of qubits to the use of qudits (systems having states> 2). Where as most of the experimental implementations have been performed using qubits, little experimental work has been carried out using qudits as yet. In this paper we demonstrate experimental realization of a qutrit system by nuclear magnetic resonance (NMR), utilizing deuterium (spin-1) nuclei partially oriented in liquid crystalline phase. Preparation of pseudopure states and implementation of unitary operations are demonstrated in this single-qutrit system, using transition selective pulses.
△ Less
Submitted 31 July, 2003;
originally announced July 2003.