-
Initial Experience of Metabolic Imaging with Hyperpolarized [1-13C]pyruvate MRI in Kidney Transplant Patients
Authors:
Xiaoxi Liu,
Ying-Chieh Lai.,
Di Cui,
Shiang-Cheng Kung,
Meyeon Park,
Laszik Zoltan,
Peder E. Z. Larson,
Zhen J. Wang
Abstract:
BACKGROUND: Kidney transplant is the treatment of choice for patients with end-stage renal disease. Early detection of allograft injury is important to delay or prevent irreversible damage. PURPOSE: To investigate the feasibility of hyperpolarized (HP) [1-13C]pyruvate MRI for assessing kidney allograft metabolism. SUBJECTS: 6 participants (mean age, 45.2 +- 12.4 years, 2 females) scheduled for kid…
▽ More
BACKGROUND: Kidney transplant is the treatment of choice for patients with end-stage renal disease. Early detection of allograft injury is important to delay or prevent irreversible damage. PURPOSE: To investigate the feasibility of hyperpolarized (HP) [1-13C]pyruvate MRI for assessing kidney allograft metabolism. SUBJECTS: 6 participants (mean age, 45.2 +- 12.4 years, 2 females) scheduled for kidney allograft biopsy and 5 patients (mean age, 59.6 +- 10.4 years, 2 females) with renal cell carcinoma (RCC). ASSESSMENT: Five of the six kidney allograft participants underwent biopsy after MRI. Estimated glomerular filtration rate (eGFR) and urine protein-to-creatine ratio (uPCR) were collected within 4 weeks of MRI. Kidney metabolism was quantified from HP [1-13C]pyruvate MRI using the lactate-to-pyruvate ratio in allograft kidneys and non-tumor bearing kidneys from RCC patients. RESULTS: Biopsy was performed a mean of 9 days (range 5-19 days) after HP [1-13C]pyruvate MRI. Three biopsies were normal, one showed low-grade fibrosis and one showed moderate microvascular inflammation. All had stable functioning allografts with eGFR > 60 mL/min/1.73 m2 and normal uPCR. One participant who did not undergo biopsy had reduced eGFR of 49 mL/min/1.73 m2 and elevated uPCR. The mean lactate-to-pyruvate ratio was 0.373 in participants with normal findings (n = 3) and 0.552 in participants with abnormal findings (n = 2). The lactate-to-pyruvate ratio was highest (0.847) in the participant with reduced eGFR and elevated uPRC. Native non-tumor bearing kidneys had a mean lactate-to-pyruvate ratio of 0.309. DATA CONCLUSION: Stable allografts with normal findings at biopsy showed lactate-to-pyruvate ratios similar to native non-tumor bearing kidneys, whereas allografts with abnormal findings showed higher lactate-to-pyruvate ratios.
△ Less
Submitted 10 September, 2024;
originally announced September 2024.
-
Adding Conditional Control to Diffusion Models with Reinforcement Learning
Authors:
Yulai Zhao,
Masatoshi Uehara,
Gabriele Scalia,
Sunyuan Kung,
Tommaso Biancalani,
Sergey Levine,
Ehsan Hajiramezanali
Abstract:
Diffusion models are powerful generative models that allow for precise control over the characteristics of the generated samples. While these diffusion models trained on large datasets have achieved success, there is often a need to introduce additional controls in downstream fine-tuning processes, treating these powerful models as pre-trained diffusion models. This work presents a novel method ba…
▽ More
Diffusion models are powerful generative models that allow for precise control over the characteristics of the generated samples. While these diffusion models trained on large datasets have achieved success, there is often a need to introduce additional controls in downstream fine-tuning processes, treating these powerful models as pre-trained diffusion models. This work presents a novel method based on reinforcement learning (RL) to add such controls using an offline dataset comprising inputs and labels. We formulate this task as an RL problem, with the classifier learned from the offline dataset and the KL divergence against pre-trained models serving as the reward functions. Our method, $\textbf{CTRL}$ ($\textbf{C}$onditioning pre-$\textbf{T}$rained diffusion models with $\textbf{R}$einforcement $\textbf{L}$earning), produces soft-optimal policies that maximize the abovementioned reward functions. We formally demonstrate that our method enables sampling from the conditional distribution with additional controls during inference. Our RL-based approach offers several advantages over existing methods. Compared to classifier-free guidance, it improves sample efficiency and can greatly simplify dataset construction by leveraging conditional independence between the inputs and additional controls. Additionally, unlike classifier guidance, it eliminates the need to train classifiers from intermediate states to additional controls. The code is available at https://github.com/zhaoyl18/CTRL.
△ Less
Submitted 23 February, 2025; v1 submitted 17 June, 2024;
originally announced June 2024.
-
A versatile laser-based apparatus for time-resolved ARPES with micro-scale spatial resolution
Authors:
Sydney K. Y. Dufresne,
Sergey Zhdanovich,
Matteo Michiardi,
Bradley G. Guislain,
Marta Zonno,
Sean Kung,
Giorgio Levy,
Arthur K. Mills,
Fabio Boschini,
David J. Jones,
Andrea Damascelli
Abstract:
We present the development of a versatile apparatus for a 6.2 eV laser-based time and angle-resolved photoemission spectroscopy with micrometer spatial resolution (time-resolved $μ$-ARPES). With a combination of tunable spatial resolution down to $\sim$11 $μ$m, high energy resolution ($\sim$11 meV), near-transform-limited temporal resolution ($\sim$280 fs), and tunable 1.55 eV pump fluence up to…
▽ More
We present the development of a versatile apparatus for a 6.2 eV laser-based time and angle-resolved photoemission spectroscopy with micrometer spatial resolution (time-resolved $μ$-ARPES). With a combination of tunable spatial resolution down to $\sim$11 $μ$m, high energy resolution ($\sim$11 meV), near-transform-limited temporal resolution ($\sim$280 fs), and tunable 1.55 eV pump fluence up to $\sim$3 mJ/cm$^2$, this time-resolved $μ$-ARPES system enables the measurement of ultrafast electron dynamics in exfoliated and inhomogeneous materials. We demonstrate the performance of our system by correlating the spectral broadening of the topological surface state of Bi$_2$Se$_3$ with the spatial dimension of the probe pulse, as well as resolving the spatial inhomogeneity contribution to the observed spectral broadening. Finally, after in-situ exfoliation, we performed time-resolved $μ$-ARPES on a $\sim$30 $μ$m few-layer-thick flake of transition metal dichalcogenide WTe$_2$, thus demonstrating the ability to access ultrafast electron dynamics with momentum resolution on micro-exfoliated and twisted materials.
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
3D-FM GAN: Towards 3D-Controllable Face Manipulation
Authors:
Yuchen Liu,
Zhixin Shu,
Yijun Li,
Zhe Lin,
Richard Zhang,
S. Y. Kung
Abstract:
3D-controllable portrait synthesis has significantly advanced, thanks to breakthroughs in generative adversarial networks (GANs). However, it is still challenging to manipulate existing face images with precise 3D control. While concatenating GAN inversion and a 3D-aware, noise-to-image GAN is a straight-forward solution, it is inefficient and may lead to noticeable drop in editing quality. To fil…
▽ More
3D-controllable portrait synthesis has significantly advanced, thanks to breakthroughs in generative adversarial networks (GANs). However, it is still challenging to manipulate existing face images with precise 3D control. While concatenating GAN inversion and a 3D-aware, noise-to-image GAN is a straight-forward solution, it is inefficient and may lead to noticeable drop in editing quality. To fill this gap, we propose 3D-FM GAN, a novel conditional GAN framework designed specifically for 3D-controllable face manipulation, and does not require any tuning after the end-to-end learning phase. By carefully encoding both the input face image and a physically-based rendering of 3D edits into a StyleGAN's latent spaces, our image generator provides high-quality, identity-preserved, 3D-controllable face manipulation. To effectively learn such novel framework, we develop two essential training strategies and a novel multiplicative co-modulation architecture that improves significantly upon naive schemes. With extensive evaluations, we show that our method outperforms the prior arts on various tasks, with better editability, stronger identity preservation, and higher photo-realism. In addition, we demonstrate a better generalizability of our design on large pose editing and out-of-domain images.
△ Less
Submitted 23 August, 2022;
originally announced August 2022.
-
MILAN: Masked Image Pretraining on Language Assisted Representation
Authors:
Zejiang Hou,
Fei Sun,
Yen-Kuang Chen,
Yuan Xie,
Sun-Yuan Kung
Abstract:
Self-attention based transformer models have been dominating many computer vision tasks in the past few years. Their superb model qualities heavily depend on the excessively large labeled image datasets. In order to reduce the reliance on large labeled datasets, reconstruction based masked autoencoders are gaining popularity, which learn high quality transferable representations from unlabeled ima…
▽ More
Self-attention based transformer models have been dominating many computer vision tasks in the past few years. Their superb model qualities heavily depend on the excessively large labeled image datasets. In order to reduce the reliance on large labeled datasets, reconstruction based masked autoencoders are gaining popularity, which learn high quality transferable representations from unlabeled images. For the same purpose, recent weakly supervised image pretraining methods explore language supervision from text captions accompanying the images. In this work, we propose masked image pretraining on language assisted representation, dubbed as MILAN. Instead of predicting raw pixels or low level features, our pretraining objective is to reconstruct the image features with substantial semantic signals that are obtained using caption supervision. Moreover, to accommodate our reconstruction target, we propose a more effective prompting decoder architecture and a semantic aware mask sampling mechanism, which further advance the transfer performance of the pretrained model. Experimental results demonstrate that MILAN delivers higher accuracy than the previous works. When the masked autoencoder is pretrained and finetuned on ImageNet-1K dataset with an input resolution of 224x224, MILAN achieves a top-1 accuracy of 85.4% on ViT-Base, surpassing previous state-of-the-arts by 1%. In the downstream semantic segmentation task, MILAN achieves 52.7 mIoU using ViT-Base on ADE20K dataset, outperforming previous masked pretraining results by 4 points.
△ Less
Submitted 19 December, 2022; v1 submitted 11 August, 2022;
originally announced August 2022.
-
CHEX: CHannel EXploration for CNN Model Compression
Authors:
Zejiang Hou,
Minghai Qin,
Fei Sun,
Xiaolong Ma,
Kun Yuan,
Yi Xu,
Yen-Kuang Chen,
Rong Jin,
Yuan Xie,
Sun-Yuan Kung
Abstract:
Channel pruning has been broadly recognized as an effective technique to reduce the computation and memory cost of deep convolutional neural networks. However, conventional pruning methods have limitations in that: they are restricted to pruning process only, and they require a fully pre-trained large model. Such limitations may lead to sub-optimal model quality as well as excessive memory and tra…
▽ More
Channel pruning has been broadly recognized as an effective technique to reduce the computation and memory cost of deep convolutional neural networks. However, conventional pruning methods have limitations in that: they are restricted to pruning process only, and they require a fully pre-trained large model. Such limitations may lead to sub-optimal model quality as well as excessive memory and training cost. In this paper, we propose a novel Channel Exploration methodology, dubbed as CHEX, to rectify these problems. As opposed to pruning-only strategy, we propose to repeatedly prune and regrow the channels throughout the training process, which reduces the risk of pruning important channels prematurely. More exactly: From intra-layer's aspect, we tackle the channel pruning problem via a well known column subset selection (CSS) formulation. From inter-layer's aspect, our regrowing stages open a path for dynamically re-allocating the number of channels across all the layers under a global channel sparsity constraint. In addition, all the exploration process is done in a single training from scratch without the need of a pre-trained large model. Experimental results demonstrate that CHEX can effectively reduce the FLOPs of diverse CNN architectures on a variety of computer vision tasks, including image classification, object detection, instance segmentation, and 3D vision. For example, our compressed ResNet-50 model on ImageNet dataset achieves 76% top1 accuracy with only 25% FLOPs of the original ResNet-50 model, outperforming previous state-of-the-art channel pruning methods. The checkpoints and code are available at here .
△ Less
Submitted 29 March, 2022;
originally announced March 2022.
-
Multi-Dimensional Model Compression of Vision Transformer
Authors:
Zejiang Hou,
Sun-Yuan Kung
Abstract:
Vision transformers (ViT) have recently attracted considerable attentions, but the huge computational cost remains an issue for practical deployment. Previous ViT pruning methods tend to prune the model along one dimension solely, which may suffer from excessive reduction and lead to sub-optimal model quality. In contrast, we advocate a multi-dimensional ViT compression paradigm, and propose to ha…
▽ More
Vision transformers (ViT) have recently attracted considerable attentions, but the huge computational cost remains an issue for practical deployment. Previous ViT pruning methods tend to prune the model along one dimension solely, which may suffer from excessive reduction and lead to sub-optimal model quality. In contrast, we advocate a multi-dimensional ViT compression paradigm, and propose to harness the redundancy reduction from attention head, neuron and sequence dimensions jointly. We firstly propose a statistical dependence based pruning criterion that is generalizable to different dimensions for identifying deleterious components. Moreover, we cast the multi-dimensional compression as an optimization, learning the optimal pruning policy across the three dimensions that maximizes the compressed model's accuracy under a computational budget. The problem is solved by our adapted Gaussian process search with expected improvement. Experimental results show that our method effectively reduces the computational cost of various ViT models. For example, our method reduces 40\% FLOPs without top-1 accuracy loss for DeiT and T2T-ViT models, outperforming previous state-of-the-arts.
△ Less
Submitted 31 December, 2021;
originally announced January 2022.
-
Evolving Transferable Neural Pruning Functions
Authors:
Yuchen Liu,
S. Y. Kung,
David Wentzlaff
Abstract:
Structural design of neural networks is crucial for the success of deep learning. While most prior works in evolutionary learning aim at directly searching the structure of a network, few attempts have been made on another promising track, channel pruning, which recently has made major headway in designing efficient deep learning models. In fact, prior pruning methods adopt human-made pruning func…
▽ More
Structural design of neural networks is crucial for the success of deep learning. While most prior works in evolutionary learning aim at directly searching the structure of a network, few attempts have been made on another promising track, channel pruning, which recently has made major headway in designing efficient deep learning models. In fact, prior pruning methods adopt human-made pruning functions to score a channel's importance for channel pruning, which requires domain knowledge and could be sub-optimal. To this end, we pioneer the use of genetic programming (GP) to discover strong pruning metrics automatically. Specifically, we craft a novel design space to express high-quality and transferable pruning functions, which ensures an end-to-end evolution process where no manual modification is needed on the evolved functions for their transferability after evolution. Unlike prior methods, our approach can provide both compact pruned networks for efficient inference and novel closed-form pruning metrics which are mathematically explainable and thus generalizable to different pruning tasks. While the evolution is conducted on small datasets, our functions shows promising results when applied to more challenging datasets, different from those used in the evolution process. For example, on ILSVRC-2012, an evolved function achieves state-of-the-art pruning results.
△ Less
Submitted 3 August, 2022; v1 submitted 20 October, 2021;
originally announced October 2021.
-
Class-Discriminative CNN Compression
Authors:
Yuchen Liu,
David Wentzlaff,
S. Y. Kung
Abstract:
Compressing convolutional neural networks (CNNs) by pruning and distillation has received ever-increasing focus in the community. In particular, designing a class-discrimination based approach would be desired as it fits seamlessly with the CNNs training objective. In this paper, we propose class-discriminative compression (CDC), which injects class discrimination in both pruning and distillation…
▽ More
Compressing convolutional neural networks (CNNs) by pruning and distillation has received ever-increasing focus in the community. In particular, designing a class-discrimination based approach would be desired as it fits seamlessly with the CNNs training objective. In this paper, we propose class-discriminative compression (CDC), which injects class discrimination in both pruning and distillation to facilitate the CNNs training goal. We first study the effectiveness of a group of discriminant functions for channel pruning, where we include well-known single-variate binary-class statistics like Student's T-Test in our study via an intuitive generalization. We then propose a novel layer-adaptive hierarchical pruning approach, where we use a coarse class discrimination scheme for early layers and a fine one for later layers. This method naturally accords with the fact that CNNs process coarse semantics in the early layers and extract fine concepts at the later. Moreover, we leverage discriminant component analysis (DCA) to distill knowledge of intermediate representations in a subspace with rich discriminative information, which enhances hidden layers' linear separability and classification accuracy of the student. Combining pruning and distillation, CDC is evaluated on CIFAR and ILSVRC 2012, where we consistently outperform the state-of-the-art results.
△ Less
Submitted 20 October, 2021;
originally announced October 2021.
-
Few-shot Learning via Dependency Maximization and Instance Discriminant Analysis
Authors:
Zejiang Hou,
Sun-Yuan Kung
Abstract:
We study the few-shot learning (FSL) problem, where a model learns to recognize new objects with extremely few labeled training data per category. Most of previous FSL approaches resort to the meta-learning paradigm, where the model accumulates inductive bias through learning many training tasks so as to solve a new unseen few-shot task. In contrast, we propose a simple approach to exploit unlabel…
▽ More
We study the few-shot learning (FSL) problem, where a model learns to recognize new objects with extremely few labeled training data per category. Most of previous FSL approaches resort to the meta-learning paradigm, where the model accumulates inductive bias through learning many training tasks so as to solve a new unseen few-shot task. In contrast, we propose a simple approach to exploit unlabeled data accompanying the few-shot task for improving few-shot performance. Firstly, we propose a Dependency Maximization method based on the Hilbert-Schmidt norm of the cross-covariance operator, which maximizes the statistical dependency between the embedded feature of those unlabeled data and their label predictions, together with the supervised loss over the support set. We then use the obtained model to infer the pseudo-labels for those unlabeled data. Furthermore, we propose anInstance Discriminant Analysis to evaluate the credibility of each pseudo-labeled example and select the most faithful ones into an augmented support set to retrain the model as in the first step. We iterate the above process until the pseudo-labels for the unlabeled data becomes stable. Following the standard transductive and semi-supervised FSL setting, our experiments show that the proposed method out-performs previous state-of-the-art methods on four widely used benchmarks, including mini-ImageNet, tiered-ImageNet, CUB, and CIFARFS.
△ Less
Submitted 6 September, 2021;
originally announced September 2021.
-
A compressive multi-kernel method for privacy-preserving machine learning
Authors:
Thee Chanyaswad,
J. Morris Chang,
S. Y. Kung
Abstract:
As the analytic tools become more powerful, and more data are generated on a daily basis, the issue of data privacy arises. This leads to the study of the design of privacy-preserving machine learning algorithms. Given two objectives, namely, utility maximization and privacy-loss minimization, this work is based on two previously non-intersecting regimes -- Compressive Privacy and multi-kernel met…
▽ More
As the analytic tools become more powerful, and more data are generated on a daily basis, the issue of data privacy arises. This leads to the study of the design of privacy-preserving machine learning algorithms. Given two objectives, namely, utility maximization and privacy-loss minimization, this work is based on two previously non-intersecting regimes -- Compressive Privacy and multi-kernel method. Compressive Privacy is a privacy framework that employs utility-preserving lossy-encoding scheme to protect the privacy of the data, while multi-kernel method is a kernel based machine learning regime that explores the idea of using multiple kernels for building better predictors. The compressive multi-kernel method proposed consists of two stages -- the compression stage and the multi-kernel stage. The compression stage follows the Compressive Privacy paradigm to provide the desired privacy protection. Each kernel matrix is compressed with a lossy projection matrix derived from the Discriminant Component Analysis (DCA). The multi-kernel stage uses the signal-to-noise ratio (SNR) score of each kernel to non-uniformly combine multiple compressive kernels. The proposed method is evaluated on two mobile-sensing datasets -- MHEALTH and HAR -- where activity recognition is defined as utility and person identification is defined as privacy. The results show that the compression regime is successful in privacy preservation as the privacy classification accuracies are almost at the random-guess level in all experiments. On the other hand, the novel SNR-based multi-kernel shows utility classification accuracy improvement upon the state-of-the-art in both datasets. These results indicate a promising direction for research in privacy-preserving machine learning.
△ Less
Submitted 20 June, 2021;
originally announced June 2021.
-
CodeNet: A Large-Scale AI for Code Dataset for Learning a Diversity of Coding Tasks
Authors:
Ruchir Puri,
David S. Kung,
Geert Janssen,
Wei Zhang,
Giacomo Domeniconi,
Vladimir Zolotov,
Julian Dolby,
Jie Chen,
Mihir Choudhury,
Lindsey Decker,
Veronika Thost,
Luca Buratti,
Saurabh Pujar,
Shyam Ramji,
Ulrich Finkler,
Susan Malaika,
Frederick Reiss
Abstract:
Over the last several decades, software has been woven into the fabric of every aspect of our society. As software development surges and code infrastructure of enterprise applications ages, it is now more critical than ever to increase software development productivity and modernize legacy applications. Advances in deep learning and machine learning algorithms have enabled numerous breakthroughs,…
▽ More
Over the last several decades, software has been woven into the fabric of every aspect of our society. As software development surges and code infrastructure of enterprise applications ages, it is now more critical than ever to increase software development productivity and modernize legacy applications. Advances in deep learning and machine learning algorithms have enabled numerous breakthroughs, motivating researchers to leverage AI techniques to improve software development efficiency. Thus, the fast-emerging research area of AI for Code has garnered new interest and gathered momentum. In this paper, we present a large-scale dataset CodeNet, consisting of over 14 million code samples and about 500 million lines of code in 55 different programming languages, which is aimed at teaching AI to code. In addition to its large scale, CodeNet has a rich set of high-quality annotations to benchmark and help accelerate research in AI techniques for a variety of critical coding tasks, including code similarity and classification, code translation between a large variety of programming languages, and code performance (runtime and memory) improvement techniques. Additionally, CodeNet provides sample input and output test sets for 98.5% of the code samples, which can be used as an oracle for determining code correctness and potentially guide reinforcement learning for code quality improvements. As a usability feature, we provide several pre-processing tools in CodeNet to transform source code into representations that can be readily used as inputs into machine learning models. Results of code classification and code similarity experiments using the CodeNet dataset are provided as a reference. We hope that the scale, diversity and rich, high-quality annotations of CodeNet will offer unprecedented research opportunities at the intersection of AI and Software Engineering.
△ Less
Submitted 29 August, 2021; v1 submitted 24 May, 2021;
originally announced May 2021.
-
Inconsequential results on the Merino-Welsh conjecture for Tutte polynomials
Authors:
Joseph P. S. Kung
Abstract:
The Merino-Welsh conjectures say that subject to conditions, there is an inequality among the Tutte-polynomial evaluations $T(M;2,0)$, $T(M;0,2)$, and $T(M;1,1)$. We present three results on a Merino-Welsh conjecture. These results are "inconsequential" in the sense that although they imply a version of the conjecture for many matroids, they seem to be dead ends.
The Merino-Welsh conjectures say that subject to conditions, there is an inequality among the Tutte-polynomial evaluations $T(M;2,0)$, $T(M;0,2)$, and $T(M;1,1)$. We present three results on a Merino-Welsh conjecture. These results are "inconsequential" in the sense that although they imply a version of the conjecture for many matroids, they seem to be dead ends.
△ Less
Submitted 19 May, 2021; v1 submitted 4 May, 2021;
originally announced May 2021.
-
The $\barγ$-frame for Tutte polynomials of matroids
Authors:
Joseph P. S. Kung
Abstract:
Specializing the $γ$-basis for the vector space $\mathcal{G}(n,r)$ spanned by the set of symbols on bit sequences with $r$ $1$'s and $n-r$ $0$'s, we obtain a frame or spanning set for the vector space $\mathcal{T}(n,r)$ spanned by Tutte polynomials of matroids having rank $r$ and size $n$. Every Tutte polynomial can be expanded as a linear combination with non-negative integer coefficients of elem…
▽ More
Specializing the $γ$-basis for the vector space $\mathcal{G}(n,r)$ spanned by the set of symbols on bit sequences with $r$ $1$'s and $n-r$ $0$'s, we obtain a frame or spanning set for the vector space $\mathcal{T}(n,r)$ spanned by Tutte polynomials of matroids having rank $r$ and size $n$. Every Tutte polynomial can be expanded as a linear combination with non-negative integer coefficients of elements in this frame. We give explicit formulas for the elements in this frame. These formulas combine to give an expansion of the Tutte polynomial with coefficients obtained by summing numerical invariants over all flats with a given rank and size.
△ Less
Submitted 5 June, 2021; v1 submitted 8 April, 2021;
originally announced April 2021.
-
Content-Aware GAN Compression
Authors:
Yuchen Liu,
Zhixin Shu,
Yijun Li,
Zhe Lin,
Federico Perazzi,
S. Y. Kung
Abstract:
Generative adversarial networks (GANs), e.g., StyleGAN2, play a vital role in various image generation and synthesis tasks, yet their notoriously high computational cost hinders their efficient deployment on edge devices. Directly applying generic compression approaches yields poor results on GANs, which motivates a number of recent GAN compression works. While prior works mainly accelerate condit…
▽ More
Generative adversarial networks (GANs), e.g., StyleGAN2, play a vital role in various image generation and synthesis tasks, yet their notoriously high computational cost hinders their efficient deployment on edge devices. Directly applying generic compression approaches yields poor results on GANs, which motivates a number of recent GAN compression works. While prior works mainly accelerate conditional GANs, e.g., pix2pix and CycleGAN, compressing state-of-the-art unconditional GANs has rarely been explored and is more challenging. In this paper, we propose novel approaches for unconditional GAN compression. We first introduce effective channel pruning and knowledge distillation schemes specialized for unconditional GANs. We then propose a novel content-aware method to guide the processes of both pruning and distillation. With content-awareness, we can effectively prune channels that are unimportant to the contents of interest, e.g., human faces, and focus our distillation on these regions, which significantly enhances the distillation quality. On StyleGAN2 and SN-GAN, we achieve a substantial improvement over the state-of-the-art compression method. Notably, we reduce the FLOPs of StyleGAN2 by 11x with visually negligible image quality loss compared to the full-size model. More interestingly, when applied to various image manipulation tasks, our compressed model forms a smoother and better disentangled latent manifold, making it more effective for image editing.
△ Less
Submitted 5 April, 2021;
originally announced April 2021.
-
A Novel Multi-Stage Training Approach for Human Activity Recognition from Multimodal Wearable Sensor Data Using Deep Neural Network
Authors:
Tanvir Mahmud,
A. Q. M. Sazzad Sayyed,
Shaikh Anowarul Fattah,
Sun-Yuan Kung
Abstract:
Deep neural network is an effective choice to automatically recognize human actions utilizing data from various wearable sensors. These networks automate the process of feature extraction relying completely on data. However, various noises in time series data with complex inter-modal relationships among sensors make this process more complicated. In this paper, we have proposed a novel multi-stage…
▽ More
Deep neural network is an effective choice to automatically recognize human actions utilizing data from various wearable sensors. These networks automate the process of feature extraction relying completely on data. However, various noises in time series data with complex inter-modal relationships among sensors make this process more complicated. In this paper, we have proposed a novel multi-stage training approach that increases diversity in this feature extraction process to make accurate recognition of actions by combining varieties of features extracted from diverse perspectives. Initially, instead of using single type of transformation, numerous transformations are employed on time series data to obtain variegated representations of the features encoded in raw data. An efficient deep CNN architecture is proposed that can be individually trained to extract features from different transformed spaces. Later, these CNN feature extractors are merged into an optimal architecture finely tuned for optimizing diversified extracted features through a combined training stage or multiple sequential training stages. This approach offers the opportunity to explore the encoded features in raw sensor data utilizing multifarious observation windows with immense scope for efficient selection of features for final convergence. Extensive experimentations have been carried out in three publicly available datasets that provide outstanding performance consistently with average five-fold cross-validation accuracy of 99.29% on UCI HAR database, 99.02% on USC HAR database, and 97.21% on SKODA database outperforming other state-of-the-art approaches.
△ Less
Submitted 3 January, 2021;
originally announced January 2021.
-
CovSegNet: A Multi Encoder-Decoder Architecture for Improved Lesion Segmentation of COVID-19 Chest CT Scans
Authors:
Tanvir Mahmud,
Md Awsafur Rahman,
Shaikh Anowarul Fattah,
Sun-Yuan Kung
Abstract:
Automatic lung lesions segmentation of chest CT scans is considered a pivotal stage towards accurate diagnosis and severity measurement of COVID-19. Traditional U-shaped encoder-decoder architecture and its variants suffer from diminutions of contextual information in pooling/upsampling operations with increased semantic gaps among encoded and decoded feature maps as well as instigate vanishing gr…
▽ More
Automatic lung lesions segmentation of chest CT scans is considered a pivotal stage towards accurate diagnosis and severity measurement of COVID-19. Traditional U-shaped encoder-decoder architecture and its variants suffer from diminutions of contextual information in pooling/upsampling operations with increased semantic gaps among encoded and decoded feature maps as well as instigate vanishing gradient problems for its sequential gradient propagation that result in sub-optimal performance. Moreover, operating with 3D CT-volume poses further limitations due to the exponential increase of computational complexity making the optimization difficult. In this paper, an automated COVID-19 lesion segmentation scheme is proposed utilizing a highly efficient neural network architecture, namely CovSegNet, to overcome these limitations. Additionally, a two-phase training scheme is introduced where a deeper 2D-network is employed for generating ROI-enhanced CT-volume followed by a shallower 3D-network for further enhancement with more contextual information without increasing computational burden. Along with the traditional vertical expansion of Unet, we have introduced horizontal expansion with multi-stage encoder-decoder modules for achieving optimum performance. Additionally, multi-scale feature maps are integrated into the scale transition process to overcome the loss of contextual information. Moreover, a multi-scale fusion module is introduced with a pyramid fusion scheme to reduce the semantic gaps between subsequent encoder/decoder modules while facilitating the parallel optimization for efficient gradient propagation. Outstanding performances have been achieved in three publicly available datasets that largely outperform other state-of-the-art approaches. The proposed scheme can be easily extended for achieving optimum segmentation performances in a wide variety of applications.
△ Less
Submitted 2 December, 2020;
originally announced December 2020.
-
Privacy Enhancing Machine Learning via Removal of Unwanted Dependencies
Authors:
Mert Al,
Semih Yagli,
Sun-Yuan Kung
Abstract:
The rapid rise of IoT and Big Data has facilitated copious data driven applications to enhance our quality of life. However, the omnipresent and all-encompassing nature of the data collection can generate privacy concerns. Hence, there is a strong need to develop techniques that ensure the data serve only the intended purposes, giving users control over the information they share. To this end, thi…
▽ More
The rapid rise of IoT and Big Data has facilitated copious data driven applications to enhance our quality of life. However, the omnipresent and all-encompassing nature of the data collection can generate privacy concerns. Hence, there is a strong need to develop techniques that ensure the data serve only the intended purposes, giving users control over the information they share. To this end, this paper studies new variants of supervised and adversarial learning methods, which remove the sensitive information in the data before they are sent out for a particular application. The explored methods optimize privacy preserving feature mappings and predictive models simultaneously in an end-to-end fashion. Additionally, the models are built with an emphasis on placing little computational burden on the user side so that the data can be desensitized on device in a cheap manner. Experimental results on mobile sensing and face datasets demonstrate that our models can successfully maintain the utility performances of predictive models while causing sensitive predictions to perform poorly.
△ Less
Submitted 7 September, 2021; v1 submitted 30 July, 2020;
originally announced July 2020.
-
A Feature-map Discriminant Perspective for Pruning Deep Neural Networks
Authors:
Zejiang Hou,
Sun-Yuan Kung
Abstract:
Network pruning has become the de facto tool to accelerate deep neural networks for mobile and edge applications. Recently, feature-map discriminant based channel pruning has shown promising results, as it aligns well with the CNN objective of differentiating multiple classes and offers better interpretability of the pruning decision. However, existing discriminant-based methods are challenged by…
▽ More
Network pruning has become the de facto tool to accelerate deep neural networks for mobile and edge applications. Recently, feature-map discriminant based channel pruning has shown promising results, as it aligns well with the CNN objective of differentiating multiple classes and offers better interpretability of the pruning decision. However, existing discriminant-based methods are challenged by computation inefficiency, as there is a lack of theoretical guidance on quantifying the feature-map discriminant power. In this paper, we present a new mathematical formulation to accurately and efficiently quantify the feature-map discriminativeness, which gives rise to a novel criterion,Discriminant Information(DI). We analyze the theoretical property of DI, specifically the non-decreasing property, that makes DI a valid selection criterion. DI-based pruning removes channels with minimum influence to DI value, as they contain little information regarding to the discriminant power. The versatility of DI criterion also enables an intra-layer mixed precision quantization to further compress the network. Moreover, we propose a DI-based greedy pruning algorithm and structure distillation technique to automatically decide the pruned structure that satisfies certain resource budget, which is a common requirement in reality. Extensive experiments demonstratethe effectiveness of our method: our pruned ResNet50 on ImageNet achieves 44% FLOPs reduction without any Top-1 accuracy loss compared to unpruned model
△ Less
Submitted 28 May, 2020;
originally announced May 2020.
-
Rethinking Class-Discrimination Based CNN Channel Pruning
Authors:
Yuchen Liu,
David Wentzlaff,
S. Y. Kung
Abstract:
Channel pruning has received ever-increasing focus on network compression. In particular, class-discrimination based channel pruning has made major headway, as it fits seamlessly with the classification objective of CNNs and provides good explainability. Prior works singly propose and evaluate their discriminant functions, while further study on the effectiveness of the adopted metrics is absent.…
▽ More
Channel pruning has received ever-increasing focus on network compression. In particular, class-discrimination based channel pruning has made major headway, as it fits seamlessly with the classification objective of CNNs and provides good explainability. Prior works singly propose and evaluate their discriminant functions, while further study on the effectiveness of the adopted metrics is absent. To this end, we initiate the first study on the effectiveness of a broad range of discriminant functions on channel pruning. Conventional single-variate binary-class statistics like Student's T-Test are also included in our study via an intuitive generalization. The winning metric of our study has a greater ability to select informative channels over other state-of-the-art methods, which is substantiated by our qualitative and quantitative analysis. Moreover, we develop a FLOP-normalized sensitivity analysis scheme to automate the structural pruning procedure. On CIFAR-10, CIFAR-100, and ILSVRC-2012 datasets, our pruned models achieve higher accuracy with less inference cost compared to state-of-the-art results. For example, on ILSVRC-2012, our 44.3% FLOPs-pruned ResNet-50 has only a 0.3% top-1 accuracy drop, which significantly outperforms the state of the art.
△ Less
Submitted 29 April, 2020;
originally announced April 2020.
-
Soft-Root-Sign Activation Function
Authors:
Yuan Zhou,
Dandan Li,
Shuwei Huo,
Sun-Yuan Kung
Abstract:
The choice of activation function in deep networks has a significant effect on the training dynamics and task performance. At present, the most effective and widely-used activation function is ReLU. However, because of the non-zero mean, negative missing and unbounded output, ReLU is at a potential disadvantage during optimization. To this end, we introduce a novel activation function to manage to…
▽ More
The choice of activation function in deep networks has a significant effect on the training dynamics and task performance. At present, the most effective and widely-used activation function is ReLU. However, because of the non-zero mean, negative missing and unbounded output, ReLU is at a potential disadvantage during optimization. To this end, we introduce a novel activation function to manage to overcome the above three challenges. The proposed nonlinearity, namely "Soft-Root-Sign" (SRS), is smooth, non-monotonic, and bounded. Notably, the bounded property of SRS distinguishes itself from most state-of-the-art activation functions. In contrast to ReLU, SRS can adaptively adjust the output by a pair of independent trainable parameters to capture negative information and provide zero-mean property, which leading not only to better generalization performance, but also to faster learning speed. It also avoids and rectifies the output distribution to be scattered in the non-negative real number space, making it more compatible with batch normalization (BN) and less sensitive to initialization. In experiments, we evaluated SRS on deep networks applied to a variety of tasks, including image classification, machine translation and generative modelling. Our SRS matches or exceeds models with ReLU and other state-of-the-art nonlinearities, showing that the proposed activation function is generalized and can achieve high performance across tasks. Ablation study further verified the compatibility with BN and self-adaptability for different initialization.
△ Less
Submitted 1 March, 2020;
originally announced March 2020.
-
Exploiting Operation Importance for Differentiable Neural Architecture Search
Authors:
Xukai Xie,
Yuan Zhou,
Sun-Yuan Kung
Abstract:
Recently, differentiable neural architecture search methods significantly reduce the search cost by constructing a super network and relax the architecture representation by assigning architecture weights to the candidate operations. All the existing methods determine the importance of each operation directly by architecture weights. However, architecture weights cannot accurately reflect the impo…
▽ More
Recently, differentiable neural architecture search methods significantly reduce the search cost by constructing a super network and relax the architecture representation by assigning architecture weights to the candidate operations. All the existing methods determine the importance of each operation directly by architecture weights. However, architecture weights cannot accurately reflect the importance of each operation; that is, the operation with the highest weight might not related to the best performance. To alleviate this deficiency, we propose a simple yet effective solution to neural architecture search, termed as exploiting operation importance for effective neural architecture search (EoiNAS), in which a new indicator is proposed to fully exploit the operation importance and guide the model search. Based on this new indicator, we propose a gradual operation pruning strategy to further improve the search efficiency and accuracy. Experimental results have demonstrated the effectiveness of the proposed method. Specifically, we achieve an error rate of 2.50\% on CIFAR-10, which significantly outperforms state-of-the-art methods. When transferred to ImageNet, it achieves the top-1 error of 25.6\%, comparable to the state-of-the-art performance under the mobile setting.
△ Less
Submitted 24 November, 2019;
originally announced November 2019.
-
Cross-Scale Residual Network for Multiple Tasks:Image Super-resolution, Denoising, and Deblocking
Authors:
Yuan Zhou,
Xiaoting Du,
Yeda Zhang,
Sun-Yuan Kung
Abstract:
In general, image restoration involves mapping from low quality images to their high-quality counterparts. Such optimal mapping is usually non-linear and learnable by machine learning. Recently, deep convolutional neural networks have proven promising for such learning processing. It is desirable for an image processing network to support well with three vital tasks, namely, super-resolution, deno…
▽ More
In general, image restoration involves mapping from low quality images to their high-quality counterparts. Such optimal mapping is usually non-linear and learnable by machine learning. Recently, deep convolutional neural networks have proven promising for such learning processing. It is desirable for an image processing network to support well with three vital tasks, namely, super-resolution, denoising, and deblocking. It is commonly recognized that these tasks have strong correlations. Therefore, it is imperative to harness the inter-task correlations. To this end, we propose the cross-scale residual network to exploit scale-related features and the inter-task correlations among the three tasks. The proposed network can extract multiple spatial scale features and establish multiple temporal feature reusage. Our experiments show that the proposed approach outperforms state-of-the-art methods in both quantitative and qualitative evaluations for multiple image restoration tasks.
△ Less
Submitted 4 November, 2019;
originally announced November 2019.
-
Temporal Action Localization using Long Short-Term Dependency
Authors:
Yuan Zhou,
Hongru Li,
Sun-Yuan Kung
Abstract:
Temporal action localization in untrimmed videos is an important but difficult task. Difficulties are encountered in the application of existing methods when modeling temporal structures of videos. In the present study, we developed a novel method, referred to as Gemini Network, for effective modeling of temporal structures and achieving high-performance temporal action localization. The significa…
▽ More
Temporal action localization in untrimmed videos is an important but difficult task. Difficulties are encountered in the application of existing methods when modeling temporal structures of videos. In the present study, we developed a novel method, referred to as Gemini Network, for effective modeling of temporal structures and achieving high-performance temporal action localization. The significant improvements afforded by the proposed method are attributable to three major factors. First, the developed network utilizes two subnets for effective modeling of temporal structures. Second, three parallel feature extraction pipelines are used to prevent interference between the extractions of different stage features. Third, the proposed method utilizes auxiliary supervision, with the auxiliary classifier losses affording additional constraints for improving the modeling capability of the network. As a demonstration of its effectiveness, the Gemini Network was used to achieve state-of-the-art temporal action localization performance on two challenging datasets, namely, THUMOS14 and ActivityNet.
△ Less
Submitted 4 November, 2019;
originally announced November 2019.
-
Comb Convolution for Efficient Convolutional Architecture
Authors:
Dandan Li,
Yuan Zhou,
Shuwei Huo,
Sun-Yuan Kung
Abstract:
Convolutional neural networks (CNNs) are inherently suffering from massively redundant computation (FLOPs) due to the dense connection pattern between feature maps and convolution kernels. Recent research has investigated the sparse relationship between channels, however, they ignored the spatial relationship within a channel. In this paper, we present a novel convolutional operator, namely comb c…
▽ More
Convolutional neural networks (CNNs) are inherently suffering from massively redundant computation (FLOPs) due to the dense connection pattern between feature maps and convolution kernels. Recent research has investigated the sparse relationship between channels, however, they ignored the spatial relationship within a channel. In this paper, we present a novel convolutional operator, namely comb convolution, to exploit the intra-channel sparse relationship among neurons. The proposed convolutional operator eliminates nearly 50% of connections by inserting uniform mappings into standard convolutions and removing about half of spatial connections in convolutional layer. Notably, our work is orthogonal and complementary to existing methods that reduce channel-wise redundancy. Thus, it has great potential to further increase efficiency through integrating the comb convolution to existing architectures. Experimental results demonstrate that by simply replacing standard convolutions with comb convolutions on state-of-the-art CNN architectures (e.g., VGGNets, Xception and SE-Net), we can achieve 50% FLOPs reduction while still maintaining the accuracy.
△ Less
Submitted 1 November, 2019;
originally announced November 2019.
-
Scalable Kernel Learning via the Discriminant Information
Authors:
Mert Al,
Zejiang Hou,
Sun-Yuan Kung
Abstract:
Kernel approximation methods create explicit, low-dimensional kernel feature maps to deal with the high computational and memory complexity of standard techniques. This work studies a supervised kernel learning methodology to optimize such mappings. We utilize the Discriminant Information criterion, a measure of class separability with a strong connection to Discriminant Analysis. By generalizing…
▽ More
Kernel approximation methods create explicit, low-dimensional kernel feature maps to deal with the high computational and memory complexity of standard techniques. This work studies a supervised kernel learning methodology to optimize such mappings. We utilize the Discriminant Information criterion, a measure of class separability with a strong connection to Discriminant Analysis. By generalizing this measure to cover a wider range of kernel maps and learning settings, we develop scalable methods to learn kernel features with high discriminant power. Experimental results on several datasets showcase that our techniques can improve optimization and generalization performances over state of the art kernel learning methods.
△ Less
Submitted 14 February, 2020; v1 submitted 23 September, 2019;
originally announced September 2019.
-
HGC: Hierarchical Group Convolution for Highly Efficient Neural Network
Authors:
Xukai Xie,
Yuan Zhou,
Sun-Yuan Kung
Abstract:
Group convolution works well with many deep convolutional neural networks (CNNs) that can effectively compress the model by reducing the number of parameters and computational cost. Using this operation, feature maps of different group cannot communicate, which restricts their representation capability. To address this issue, in this work, we propose a novel operation named Hierarchical Group Conv…
▽ More
Group convolution works well with many deep convolutional neural networks (CNNs) that can effectively compress the model by reducing the number of parameters and computational cost. Using this operation, feature maps of different group cannot communicate, which restricts their representation capability. To address this issue, in this work, we propose a novel operation named Hierarchical Group Convolution (HGC) for creating computationally efficient neural networks. Different from standard group convolution which blocks the inter-group information exchange and induces the severe performance degradation, HGC can hierarchically fuse the feature maps from each group and leverage the inter-group information effectively. Taking advantage of the proposed method, we introduce a family of compact networks called HGCNets. Compared to networks using standard group convolution, HGCNets have a huge improvement in accuracy at the same model size and complexity level. Extensive experimental results on the CIFAR dataset demonstrate that HGCNets obtain significant reduction of parameters and computational cost to achieve comparable performance over the prior CNN architectures designed for mobile devices such as MobileNet and ShuffleNet.
△ Less
Submitted 9 June, 2019;
originally announced June 2019.
-
Supervising Nyström Methods via Negative Margin Support Vector Selection
Authors:
Mert Al,
Thee Chanyaswad,
Sun-Yuan Kung
Abstract:
The Nyström methods have been popular techniques for scalable kernel based learning. They approximate explicit, low-dimensional feature mappings for kernel functions from the pairwise comparisons with the training data. However, Nyström methods are generally applied without the supervision provided by the training labels in the classification/regression problems. This leads to pairwise comparisons…
▽ More
The Nyström methods have been popular techniques for scalable kernel based learning. They approximate explicit, low-dimensional feature mappings for kernel functions from the pairwise comparisons with the training data. However, Nyström methods are generally applied without the supervision provided by the training labels in the classification/regression problems. This leads to pairwise comparisons with randomly chosen training samples in the model. Conversely, this work studies a supervised Nyström method that chooses the critical subsets of samples for the success of the Machine Learning model. Particularly, we select the Nyström support vectors via the negative margin criterion, and create explicit feature maps that are more suitable for the classification task on the data. Experimental results on six datasets show that, without increasing the complexity over unsupervised techniques, our method can significantly improve the classification performance achieved via kernel approximation methods and reduce the number of features needed to reach or exceed the performance of the full-dimensional kernel machines.
△ Less
Submitted 17 May, 2018; v1 submitted 10 May, 2018;
originally announced May 2018.
-
Algebra and valuations related to the Tutte polynomial
Authors:
Michael J. Falk,
Joseph P. S. Kung
Abstract:
This is a chapter destined for the book "Handbook of the Tutte Polynomial". The chapter is a composite. The first part is a brief introduction to Orlik-Solomon algebras. The second part sketches the theory of evaluative functions on matroid base polytopes and in particular, the G-invariant (as the subject is known late 2015). A third very short section is on Hopf-algebra or coalgebra structures in…
▽ More
This is a chapter destined for the book "Handbook of the Tutte Polynomial". The chapter is a composite. The first part is a brief introduction to Orlik-Solomon algebras. The second part sketches the theory of evaluative functions on matroid base polytopes and in particular, the G-invariant (as the subject is known late 2015). A third very short section is on Hopf-algebra or coalgebra structures in Tutte polynomial theory.
△ Less
Submitted 23 November, 2017;
originally announced November 2017.
-
Protecting Genomic Privacy by a Sequence-Similarity Based Obfuscation Method
Authors:
Shibiao Wan,
Man-Wai Mak,
Sun-Yuan Kung
Abstract:
In the post-genomic era, large-scale personal DNA sequences are produced and collected for genetic medical diagnoses and new drug discovery, which, however, simultaneously poses serious challenges to the protection of personal genomic privacy. Existing genomic privacy-protection methods are either time-consuming or with low accuracy. To tackle these problems, this paper proposes a sequence similar…
▽ More
In the post-genomic era, large-scale personal DNA sequences are produced and collected for genetic medical diagnoses and new drug discovery, which, however, simultaneously poses serious challenges to the protection of personal genomic privacy. Existing genomic privacy-protection methods are either time-consuming or with low accuracy. To tackle these problems, this paper proposes a sequence similarity-based obfuscation method, namely IterMegaBLAST, for fast and reliable protection of personal genomic privacy. Specifically, given a randomly selected sequence from a dataset of DNA sequences, we first use MegaBLAST to find its most similar sequence from the dataset. These two aligned sequences form a cluster, for which an obfuscated sequence was generated via a DNA generalization lattice scheme. These procedures are iteratively performed until all of the sequences in the dataset are clustered and their obfuscated sequences are generated. Experimental results on two benchmark datasets demonstrate that under the same degree of anonymity, IterMegaBLAST significantly outperforms existing state-of-the-art approaches in terms of both utility accuracy and time complexity.
△ Less
Submitted 8 August, 2017;
originally announced August 2017.
-
Desensitized RDCA Subspaces for Compressive Privacy in Machine Learning
Authors:
Artur Filipowicz,
Thee Chanyaswad,
S. Y. Kung
Abstract:
The quest for better data analysis and artificial intelligence has lead to more and more data being collected and stored. As a consequence, more data are exposed to malicious entities. This paper examines the problem of privacy in machine learning for classification. We utilize the Ridge Discriminant Component Analysis (RDCA) to desensitize data with respect to a privacy label. Based on five exper…
▽ More
The quest for better data analysis and artificial intelligence has lead to more and more data being collected and stored. As a consequence, more data are exposed to malicious entities. This paper examines the problem of privacy in machine learning for classification. We utilize the Ridge Discriminant Component Analysis (RDCA) to desensitize data with respect to a privacy label. Based on five experiments, we show that desensitization by RDCA can effectively protect privacy (i.e. low accuracy on the privacy label) with small loss in utility. On HAR and CMU Faces datasets, the use of desensitized data results in random guess level accuracies for privacy at a cost of 5.14% and 0.04%, on average, drop in the utility accuracies. For Semeion Handwritten Digit dataset, accuracies of the privacy-sensitive digits are almost zero, while the accuracies for the utility-relevant digits drop by 7.53% on average. This presents a promising solution to the problem of privacy in machine learning for classification.
△ Less
Submitted 24 July, 2017;
originally announced July 2017.
-
Ratio Utility and Cost Analysis for Privacy Preserving Subspace Projection
Authors:
Mert Al,
Shibiao Wan,
Sun-Yuan Kung
Abstract:
With a rapidly increasing number of devices connected to the internet, big data has been applied to various domains of human life. Nevertheless, it has also opened new venues for breaching users' privacy. Hence it is highly required to develop techniques that enable data owners to privatize their data while keeping it useful for intended applications. Existing methods, however, do not offer enough…
▽ More
With a rapidly increasing number of devices connected to the internet, big data has been applied to various domains of human life. Nevertheless, it has also opened new venues for breaching users' privacy. Hence it is highly required to develop techniques that enable data owners to privatize their data while keeping it useful for intended applications. Existing methods, however, do not offer enough flexibility for controlling the utility-privacy trade-off and may incur unfavorable results when privacy requirements are high. To tackle these drawbacks, we propose a compressive-privacy based method, namely RUCA (Ratio Utility and Cost Analysis), which can not only maximize performance for a privacy-insensitive classification task but also minimize the ability of any classifier to infer private information from the data. Experimental results on Census and Human Activity Recognition data sets demonstrate that RUCA significantly outperforms existing privacy preserving data projection techniques for a wide range of privacy pricings.
△ Less
Submitted 25 February, 2017;
originally announced February 2017.
-
The $\mathcal{G}$-invariant and catenary data of a matroid
Authors:
Joseph E. Bonin,
Joseph P. S. Kung
Abstract:
The catenary data of a matroid $M$ of rank $r$ on $n$ elements is the vector $(ν(M;a_0,a_1,\ldots,a_r))$, indexed by compositions $(a_0,a_1,\ldots,a_r)$, where $a_0 \geq 0$,\, $a_i > 0$ for $i \geq 1$, and $a_0+ a_1 + \cdots + a_r = n$, with the coordinate $ν(M;a_0,a_1, \ldots,a_r)$ equal to the number of maximal chains or flags $(X_0,X_1, \ldots,X_r)$ of flats or closed sets such that $X_i$ has r…
▽ More
The catenary data of a matroid $M$ of rank $r$ on $n$ elements is the vector $(ν(M;a_0,a_1,\ldots,a_r))$, indexed by compositions $(a_0,a_1,\ldots,a_r)$, where $a_0 \geq 0$,\, $a_i > 0$ for $i \geq 1$, and $a_0+ a_1 + \cdots + a_r = n$, with the coordinate $ν(M;a_0,a_1, \ldots,a_r)$ equal to the number of maximal chains or flags $(X_0,X_1, \ldots,X_r)$ of flats or closed sets such that $X_i$ has rank $i$,\, $|X_0| = a_0$, and $|X_i - X_{i-1}| = a_i$. We show that the catenary data of $M$ contains the same information about $M$ as its $\mathcal{G}$-invariant, which was defined by H. Derksen [\emph{J.\ Algebr.\ Combin.}\ 30 (2009) 43--86]. The Tutte polynomial is a specialization of the $\mathcal{G}$-invariant. We show that many known results for the Tutte polynomial have analogs for the $\mathcal{G}$-invariant. In particular, we show that for many matroid constructions, the $\mathcal{G}$-invariant of the construction can be calculated from the $\mathcal{G}$-invariants of the constituents and that the $\mathcal{G}$-invariant of a matroid can be calculated from its size, the isomorphism class of the lattice of cyclic flats with lattice elements labeled by the rank and size of the underlying set. We also show that the number of flats and cyclic flats of a given rank and size can be derived from the $\mathcal{G}$-invariant, that the $\mathcal{G}$-invariant of $M$ is reconstructible from the deck of $\mathcal{G}$-invariants of restrictions of $M$ to its copoints, and that, apart from free extensions and coextensions, one can detect whether a matroid is a free product from its $\mathcal{G}$-invariant.
△ Less
Submitted 11 February, 2025; v1 submitted 2 October, 2015;
originally announced October 2015.
-
Efficient Divide-And-Conquer Classification Based on Feature-Space Decomposition
Authors:
Qi Guo,
Bo-Wei Chen,
Feng Jiang,
Xiangyang Ji,
Sun-Yuan Kung
Abstract:
This study presents a divide-and-conquer (DC) approach based on feature space decomposition for classification. When large-scale datasets are present, typical approaches usually employed truncated kernel methods on the feature space or DC approaches on the sample space. However, this did not guarantee separability between classes, owing to overfitting. To overcome such problems, this work proposes…
▽ More
This study presents a divide-and-conquer (DC) approach based on feature space decomposition for classification. When large-scale datasets are present, typical approaches usually employed truncated kernel methods on the feature space or DC approaches on the sample space. However, this did not guarantee separability between classes, owing to overfitting. To overcome such problems, this work proposes a novel DC approach on feature spaces consisting of three steps. Firstly, we divide the feature space into several subspaces using the decomposition method proposed in this paper. Subsequently, these feature subspaces are sent into individual local classifiers for training. Finally, the outcomes of local classifiers are fused together to generate the final classification results. Experiments on large-scale datasets are carried out for performance evaluation. The results show that the error rates of the proposed DC method decreased comparing with the state-of-the-art fast SVM solvers, e.g., reducing error rates by 10.53% and 7.53% on RCV1 and covtype datasets respectively.
△ Less
Submitted 29 January, 2015;
originally announced January 2015.
-
Exploring universal patterns in human home-work commuting from mobile phone data
Authors:
Kevin S. Kung,
Kael Greco,
Stanislav Sobolevsky,
Carlo Ratti
Abstract:
Home-work commuting has always attracted significant research attention because of its impact on human mobility. One of the key assumptions in this domain of study is the universal uniformity of commute times. However, a true comparison of commute patterns has often been hindered by the intrinsic differences in data collection methods, which make observation from different countries potentially bi…
▽ More
Home-work commuting has always attracted significant research attention because of its impact on human mobility. One of the key assumptions in this domain of study is the universal uniformity of commute times. However, a true comparison of commute patterns has often been hindered by the intrinsic differences in data collection methods, which make observation from different countries potentially biased and unreliable. In the present work, we approach this problem through the use of mobile phone call detail records (CDRs), which offers a consistent method for investigating mobility patterns in wholly different parts of the world. We apply our analysis to a broad range of datasets, at both the country and city scale. Additionally, we compare these results with those obtained from vehicle GPS traces in Milan. While different regions have some unique commute time characteristics, we show that the home-work time distributions and average values within a single region are indeed largely independent of commute distance or country (Portugal, Ivory Coast, and Boston)--despite substantial spatial and infrastructural differences. Furthermore, a comparative analysis demonstrates that such distance-independence holds true only if we consider multimodal commute behaviors--as consistent with previous studies. In car-only (Milan GPS traces) and car-heavy (Saudi Arabia) commute datasets, we see that commute time is indeed influenced by commute distance.
△ Less
Submitted 24 September, 2014; v1 submitted 12 November, 2013;
originally announced November 2013.
-
Maximum size binary matroids with no AG(3,2)-minor are graphic
Authors:
Joseph P. S. Kung,
Dillon Mayhew,
Irene Pivotto,
Gordon F. Royle
Abstract:
We prove that the maximum size of a simple binary matroid of rank $r \geq 5$ with no AG(3,2)-minor is $\binom{r+1}{2}$ and characterise those matroids achieving this bound. When $r \geq 6$, the graphic matroid $M(K_{r+1})$ is the unique matroid meeting the bound, but there are a handful of smaller examples. In addition, we determine the size function for non-regular simple binary matroids with no…
▽ More
We prove that the maximum size of a simple binary matroid of rank $r \geq 5$ with no AG(3,2)-minor is $\binom{r+1}{2}$ and characterise those matroids achieving this bound. When $r \geq 6$, the graphic matroid $M(K_{r+1})$ is the unique matroid meeting the bound, but there are a handful of smaller examples. In addition, we determine the size function for non-regular simple binary matroids with no AG(3,2)-minor and characterise the matroids of maximum size for each rank.
△ Less
Submitted 8 April, 2013;
originally announced April 2013.
-
Semidirect sums of matroids
Authors:
Joseph E. Bonin,
Joseph P. S. Kung
Abstract:
For matroids M and N on disjoint sets S and T, a semidirect sum of M and N is a matroid K on the union of S and T that, like the direct sum and the free product, has the restriction of K to S equal to M and the contraction of K to T equal to N. We abstract a matrix construction to get a general matroid construction: the matroid union of any rank-preserving extension of M on the union of S and T wi…
▽ More
For matroids M and N on disjoint sets S and T, a semidirect sum of M and N is a matroid K on the union of S and T that, like the direct sum and the free product, has the restriction of K to S equal to M and the contraction of K to T equal to N. We abstract a matrix construction to get a general matroid construction: the matroid union of any rank-preserving extension of M on the union of S and T with the direct sum of N and the rank-0 matroid on S is a semidirect sum of M and N. We study principal sums in depth; these are such matroid unions where the extension of M has each element of T added either as a loop or freely on a fixed flat of M. A second construction of semidirect sums, defined by a Higgs lift, also specializes to principal sums. We also explore what can be deduced if M and N, or certain of their semidirect sums, are transversal or fundamental transversal matroids.
△ Less
Submitted 1 October, 2012;
originally announced October 2012.
-
Rook and queen paths with boundaries
Authors:
Joseph P. S. Kung,
Anna de Mier
Abstract:
A rook path is a path on lattice points in the plane in which any proper horizontal step to the right or vertical step north is allowed. If, in addition, one allow bishop steps, that is, proper diagonal steps of slope 1, then one has queen paths. A rook or queen path is Catalan if it starts at the origin and stays strictly to the left of the line y = x-1. We give explicit formulas for the ordinary…
▽ More
A rook path is a path on lattice points in the plane in which any proper horizontal step to the right or vertical step north is allowed. If, in addition, one allow bishop steps, that is, proper diagonal steps of slope 1, then one has queen paths. A rook or queen path is Catalan if it starts at the origin and stays strictly to the left of the line y = x-1. We give explicit formulas for the ordinary generating function of the number of Catalan rook and queen paths finishing at $(n,n).$ These generating functions are algebraic; indeed, they satisfy quadratic equations. In the second version, we also consider paths with "spider steps", that is, proper steps on lattice points with slope strictly greater than one. In the third version, we give step-enumerator versions of our results.
△ Less
Submitted 3 July, 2012; v1 submitted 8 September, 2011;
originally announced September 2011.
-
Characterizations of transversal and fundamental transversal matroids
Authors:
Joseph E. Bonin,
Joseph P. S. Kung,
Anna de Mier
Abstract:
A result of Mason, as refined by Ingleton, characterizes transversal matroids as the matroids that satisfy a set of inequalities that relate the ranks of intersections and unions of nonempty sets of cyclic flats. We prove counterparts, for fundamental transversal matroids, of this and other characterizations of transversal matroids. In particular, we show that fundamental transversal matroids are…
▽ More
A result of Mason, as refined by Ingleton, characterizes transversal matroids as the matroids that satisfy a set of inequalities that relate the ranks of intersections and unions of nonempty sets of cyclic flats. We prove counterparts, for fundamental transversal matroids, of this and other characterizations of transversal matroids. In particular, we show that fundamental transversal matroids are precisely the matroids that yield equality in Mason's inequalities and we deduce a characterization of fundamental transversal matroids due to Brylawski from this simpler characterization.
△ Less
Submitted 17 September, 2010;
originally announced September 2010.
-
Congruence conditions, parcels, and Tutte polynomials of graphs and matroids
Authors:
Joseph P. S. Kung
Abstract:
Let $G$ be a matrix and $M(G)$ be the matroid defined by linear dependence on the set $E$ of column vectors of $G.$ Roughly speaking, a parcel is a subset of pairs $(f,g)$ of functions defined on $E$ to an Abelian group $A$ satisfying a coboundary condition (that $f-g$ is a flow over $A$ relative to $G$) and a congruence condition (that the size of the supports of $f$ and $g$ satisfy some congruen…
▽ More
Let $G$ be a matrix and $M(G)$ be the matroid defined by linear dependence on the set $E$ of column vectors of $G.$ Roughly speaking, a parcel is a subset of pairs $(f,g)$ of functions defined on $E$ to an Abelian group $A$ satisfying a coboundary condition (that $f-g$ is a flow over $A$ relative to $G$) and a congruence condition (that the size of the supports of $f$ and $g$ satisfy some congruence condition modulo an integer). We prove several theorems of the form: a linear combination of sizes of parcels, with coefficients roots of unity, equals an evaluation of the Tutte polynomial of $M(G)$ at a point $(λ-1,x-1)$ on the complex hyperbola $(λ- 1)(x-1) = |A|.$
△ Less
Submitted 3 December, 2011; v1 submitted 1 July, 2010;
originally announced July 2010.
-
Convolution-multiplication identities for Tutte polynomials of matroids
Authors:
Joseph P. S. Kung
Abstract:
We give a general multiplication-convolution identity for the multivariate and bivariate rank generating polynomial of a matroid. The bivariate rank generating polynomial is transformable to and from the Tutte polynomial by simple algebraic operations. Several identities, almost all already known in some form, are specializations of this identity. Combinatorial or probabilistic interpretations a…
▽ More
We give a general multiplication-convolution identity for the multivariate and bivariate rank generating polynomial of a matroid. The bivariate rank generating polynomial is transformable to and from the Tutte polynomial by simple algebraic operations. Several identities, almost all already known in some form, are specializations of this identity. Combinatorial or probabilistic interpretations are given for the specialized identities.
△ Less
Submitted 11 September, 2009;
originally announced September 2009.
-
Graphs whose flow polynomials have only integral roots
Authors:
Joseph P. S. Kung,
Gordon F. Royle
Abstract:
We show if the flow polynomial of a bridgeless graph G has only integral roots, then G is the dual graph to a planar chordal graph. We also show that for 3-connected cubic graphs, the same conclusion holds under the weaker hypothesis that it has only real flow roots. Expressed in the language of matroid theory, this result says that the cographic matroids with only integral characteristic roots…
▽ More
We show if the flow polynomial of a bridgeless graph G has only integral roots, then G is the dual graph to a planar chordal graph. We also show that for 3-connected cubic graphs, the same conclusion holds under the weaker hypothesis that it has only real flow roots. Expressed in the language of matroid theory, this result says that the cographic matroids with only integral characteristic roots are the cycle matroids of planar chordal graphs.
△ Less
Submitted 10 September, 2009; v1 submitted 2 August, 2009;
originally announced August 2009.
-
Lattice and Schroder paths with periodic boundaries
Authors:
Joseph P. S. Kung,
Anna de Mier,
Xinyu Sun,
Catherine H. Yan
Abstract:
We consider paths in the plane with $(1,0),$ $(0,1),$ and $(a,b)$-steps that start at the origin, end at height $n,$ and stay to the left of a given non-decreasing right boundary. We show that if the boundary is periodic and has slope at most $b/a,$ then the ordinary generating function for the number of such paths ending at height $n$ is algebraic. Our argument is in two parts. We use a simple…
▽ More
We consider paths in the plane with $(1,0),$ $(0,1),$ and $(a,b)$-steps that start at the origin, end at height $n,$ and stay to the left of a given non-decreasing right boundary. We show that if the boundary is periodic and has slope at most $b/a,$ then the ordinary generating function for the number of such paths ending at height $n$ is algebraic. Our argument is in two parts. We use a simple combinatorial decomposition to obtain an Appell relation or ``umbral'' generating function, in which the power $z^n$ is replaced by a power series of the form $z^n φ_n(z),$ where $φ_n(0) = 1.$ Then we convert (in an explicit way) the umbral generating function to an ordinary generating function by solving a system of linear equations and a polynomial equation. This conversion implies that the ordinary generating function is algebraic.
△ Less
Submitted 27 September, 2007; v1 submitted 11 September, 2007;
originally announced September 2007.
-
Derivation modules of orthogonal duals of hyperplane arrangements
Authors:
Joseph P. S. Kung,
Hal Schenck
Abstract:
Let A be an n by d matrix having full rank n. An orthogonal dual A^{\perp} of A is a (d-n) by d matrix of rank (d-n) such that every row of A^{\perp} is orthogonal (under the usual dot product) to every row of A. We define the orthogonal dual for arrangements by identifying an essential (central) arrangement of d hyperplanes in n-dimensional space with the n by d matrix of coefficients of the ho…
▽ More
Let A be an n by d matrix having full rank n. An orthogonal dual A^{\perp} of A is a (d-n) by d matrix of rank (d-n) such that every row of A^{\perp} is orthogonal (under the usual dot product) to every row of A. We define the orthogonal dual for arrangements by identifying an essential (central) arrangement of d hyperplanes in n-dimensional space with the n by d matrix of coefficients of the homogeneous linear forms for which the hyperplanes are kernels. If n is at least 5, we show that if the matroid (or the intersection lattice) of an n-dimensional essential arrangement A contains a modular copoint whose complement spans, then the derivation module of the orthogonally dual arrangement \A^{\perp} has projective dimension at least [n(n+2)/4] - 3,([ ] denotes ceiling).
△ Less
Submitted 7 April, 2006;
originally announced April 2006.
-
A low-cost time-hopping impulse radio system for high data rate transmission
Authors:
Andreas F. Molisch,
Ye Geoffrey Li,
Yves-Paul Nakache,
Philip Orlik,
Makoto Miyake,
Yunnan Wu,
Sinan Gezici,
Harry Sheng,
S. Y. Kung,
H. Kobayashi,
H. Vincent Poor,
Alexander Haimovich,
Jinyun Zhang
Abstract:
We present an efficient, low-cost implementation of time-hopping impulse radio that fulfills the spectral mask mandated by the FCC and is suitable for high-data-rate, short-range communications. Key features are: (i) all-baseband implementation that obviates the need for passband components, (ii) symbol-rate (not chip rate) sampling, A/D conversion, and digital signal processing, (iii) fast acqu…
▽ More
We present an efficient, low-cost implementation of time-hopping impulse radio that fulfills the spectral mask mandated by the FCC and is suitable for high-data-rate, short-range communications. Key features are: (i) all-baseband implementation that obviates the need for passband components, (ii) symbol-rate (not chip rate) sampling, A/D conversion, and digital signal processing, (iii) fast acquisition due to novel search algorithms, (iv) spectral shaping that can be adapted to accommodate different spectrum regulations and interference environments. Computer simulations show that this system can provide 110Mbit/s at 7-10m distance, as well as higher data rates at shorter distances under FCC emissions limits. Due to the spreading concept of time-hopping impulse radio, the system can sustain multiple simultaneous users, and can suppress narrowband interference effectively.
△ Less
Submitted 9 February, 2005;
originally announced February 2005.
-
Pressure-induced phonon frequency shifts in transition-metal nitrides
Authors:
Xiao-Jia Chen,
Viktor V. Struzhkin,
Simon Kung,
Ho-kwang Mao,
Russell J. Hemley,
Axel N. Christensen
Abstract:
We report the first experiments on the high pressure phonon spectra of transition-metal nitrides HfN, ZrN, and NbN, obtained by Raman scattering measurements. Two pronounced bands, which are related to the acoustic part at low frequency around 200 cm$^{-1}$ and the optical part at high frequency around 550 cm$^{-1}$ of the phonon spectrum, respectively, shift to high frequency values with increa…
▽ More
We report the first experiments on the high pressure phonon spectra of transition-metal nitrides HfN, ZrN, and NbN, obtained by Raman scattering measurements. Two pronounced bands, which are related to the acoustic part at low frequency around 200 cm$^{-1}$ and the optical part at high frequency around 550 cm$^{-1}$ of the phonon spectrum, respectively, shift to high frequency values with increasing pressure. An analysis of the results allows us to reproduce the experimental pressure dependence of the superconducting transition temperature $T_{c}$ of ZrN and NbN.
△ Less
Submitted 9 January, 2004;
originally announced January 2004.