Skip to main content

Showing 1–12 of 12 results for author: Burkhart, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.10422  [pdf, other

    cs.LG

    Foundation models for electronic health records: representation dynamics and transferability

    Authors: Michael C. Burkhart, Bashar Ramadan, Zewei Liao, Kaveri Chhikara, Juan C. Rojas, William F. Parker, Brett K. Beaulieu-Jones

    Abstract: Foundation models (FMs) trained on electronic health records (EHRs) have shown strong performance on a range of clinical prediction tasks. However, adapting these models to local health systems remains challenging due to limited data availability and resource constraints. In this study, we investigated what these models learn and evaluated the transferability of an FM trained on MIMIC-IV to an ins… ▽ More

    Submitted 14 April, 2025; originally announced April 2025.

  2. arXiv:2504.08713  [pdf, other

    cs.LG cs.AI

    ProtoECGNet: Case-Based Interpretable Deep Learning for Multi-Label ECG Classification with Contrastive Learning

    Authors: Sahil Sethi, David Chen, Thomas Statchen, Michael C. Burkhart, Nipun Bhandari, Bashar Ramadan, Brett Beaulieu-Jones

    Abstract: Deep learning-based electrocardiogram (ECG) classification has shown impressive performance but clinical adoption has been slowed by the lack of transparent and faithful explanations. Post hoc methods such as saliency maps may fail to reflect a model's true decision process. Prototype-based reasoning offers a more transparent alternative by grounding decisions in similarity to learned representati… ▽ More

    Submitted 17 May, 2025; v1 submitted 11 April, 2025; originally announced April 2025.

  3. arXiv:2303.01513  [pdf

    cs.LG cs.AI

    Safe AI for health and beyond -- Monitoring to transform a health service

    Authors: Mahed Abroshan, Michael Burkhart, Oscar Giles, Sam Greenbury, Zoe Kourtzi, Jack Roberts, Mihaela van der Schaar, Jannetta S Steyn, Alan Wilson, May Yong

    Abstract: Machine learning techniques are effective for building predictive models because they identify patterns in large datasets. Development of a model for complex real-life problems often stop at the point of publication, proof of concept or when made accessible through some mode of deployment. However, a model in the medical domain risks becoming obsolete as patient demographics, systems and clinical… ▽ More

    Submitted 6 June, 2023; v1 submitted 2 March, 2023; originally announced March 2023.

    Comments: 12 pages, 3 figures

    ACM Class: I.2.1

  4. Deep Low-Density Separation for Semi-Supervised Classification

    Authors: Michael C. Burkhart, Kyle Shan

    Abstract: Given a small set of labeled data and a large set of unlabeled data, semi-supervised learning (SSL) attempts to leverage the location of the unlabeled datapoints in order to create a better classifier than could be obtained from supervised methods applied to the labeled training set alone. Effective SSL imposes structural assumptions on the data, e.g. that neighbors are more likely to share a clas… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

    MSC Class: 68T10; 62H30 (Primary) 68T20; 68T30 (Secondary)

    Journal ref: Computational Science - ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3-5, 2020, Proceedings, Part III, pp. 297-311

  5. Neuroevolutionary Feature Representations for Causal Inference

    Authors: Michael C. Burkhart, Gabriel Ruiz

    Abstract: Within the field of causal inference, we consider the problem of estimating heterogeneous treatment effects from data. We propose and validate a novel approach for learning feature representations to aid the estimation of the conditional average treatment effect or CATE. Our method focuses on an intermediate layer in a neural network trained to predict the outcome from the features. In contrast to… ▽ More

    Submitted 21 May, 2022; originally announced May 2022.

    MSC Class: 62D20; 68T30; 68W50 (Primary) 68T20; 68T07 (Secondary)

    Journal ref: Computational Science - ICCS 2022: 22nd International Conference, London, United Kingdom, June 21-23, 2022, Proceedings, Part II, pp. 3-10

  6. arXiv:2104.12949  [pdf

    stat.ML cs.LG math.OC

    Discriminative Bayesian filtering lends momentum to the stochastic Newton method for minimizing log-convex functions

    Authors: Michael C. Burkhart

    Abstract: To minimize the average of a set of log-convex functions, the stochastic Newton method iteratively updates its estimate using subsampled versions of the full objective's gradient and Hessian. We contextualize this optimization problem as sequential Bayesian inference on a latent state-space model with a discriminatively-specified observation process. Applying Bayesian filtering then yields a novel… ▽ More

    Submitted 21 August, 2023; v1 submitted 26 April, 2021; originally announced April 2021.

    MSC Class: 49M15; 90C15; 62M20 (Primary); 90C25 (Secondary)

    Journal ref: Optimization Letters 17 (2023) 657-673

  7. arXiv:1807.06173  [pdf, other

    stat.ML cs.LG cs.NE

    A Discriminative Approach to Bayesian Filtering with Applications to Human Neural Decoding

    Authors: Michael C. Burkhart

    Abstract: Given a stationary state-space model that relates a sequence of hidden states and corresponding measurements or observations, Bayesian filtering provides a principled statistical framework for inferring the posterior distribution of the current state given all measurements up to the present time. For example, the Apollo lunar module implemented a Kalman filter to infer its location from a sequence… ▽ More

    Submitted 16 July, 2018; originally announced July 2018.

    Comments: Ph.D. dissertation, Brown University, Division of Applied Mathematics

    MSC Class: 60G35; 93E10; 62M20; 93E11; 62G99 ACM Class: G.3.6; G.3.7; I.2.6

  8. arXiv:1101.5509  [pdf, other

    cs.NI

    Reduce to the Max: A Simple Approach for Massive-Scale Privacy-Preserving Collaborative Network Measurements (Extended Version)

    Authors: Fabio Ricciato, Martin Burkhart

    Abstract: Privacy-preserving techniques for distributed computation have been proposed recently as a promising framework in collaborative inter-domain network monitoring. Several different approaches exist to solve such class of problems, e.g., Homomorphic Encryption (HE) and Secure Multiparty Computation (SMC) based on Shamir's Secret Sharing algorithm (SSS). Such techniques are complete from a computation… ▽ More

    Submitted 28 January, 2011; originally announced January 2011.

    Comments: This is an extended version of the paper presented at the Third International Workshop on Traffic Monitoring and Analysis (TMA'11), Vienna, 27 April 2011

    Journal ref: Third International Workshop on Traffic Monitoring and Analysis (TMA), 2011

  9. arXiv:0903.4266  [pdf, ps, other

    cs.NI

    The Risk-Utility Tradeoff for IP Address Truncation

    Authors: Martin Burkhart, Daniela Brauckhoff, Martin May, Elisa Boschi

    Abstract: Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generalizing the latest results in network and security research. Anonymization is a possible solution in this context; however, it is unclear how the sanitization of data preserves characteristics important for traffic analysis… ▽ More

    Submitted 25 March, 2009; originally announced March 2009.

    ACM Class: C.2.3

    Journal ref: 1st ACM Workshop on Network Data Anonymization (NDA), Fairfax, Virginia, USA, October, 2008

  10. arXiv:0903.4258  [pdf, other

    cs.NI cs.CR

    SEPIA: Security through Private Information Aggregation

    Authors: Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos

    Abstract: Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that are practical in terms of computation and communication cost is still a major challenge. In this paper, we investigate the practical usefulness of MPC for multi-domain network security and monitoring. We first optimize… ▽ More

    Submitted 16 February, 2010; v1 submitted 25 March, 2009; originally announced March 2009.

    Report number: TIK-Report No. 298

  11. arXiv:0810.1655  [pdf, ps, other

    cs.NI

    On the Utility of Anonymized Flow Traces for Anomaly Detection

    Authors: Martin Burkhart, Daniela Brauckhoff, Martin May

    Abstract: The sharing of network traces is an important prerequisite for the development and evaluation of efficient anomaly detection mechanisms. Unfortunately, privacy concerns and data protection laws prevent network operators from sharing these data. Anonymization is a promising solution in this context; however, it is unclear if the sanitization of data preserves the traffic characteristics or introd… ▽ More

    Submitted 9 October, 2008; originally announced October 2008.

    Journal ref: Proceedings of the 19th ITC Specialist Seminar on Network Usage and Traffic (ITC SS 19), October 2008, Berlin, Germany

  12. arXiv:0808.4104  [pdf, ps, other

    cs.NI

    Flow-level Characteristics of Spam and Ham

    Authors: Dominik Schatzmann, Martin Burkhart, Thrasyvoulos Spyropoulos

    Abstract: Despite a large amount of effort devoted in the past years trying to limit unsolicited mail, spam is still a major global concern. Content-analysis techniques and blacklists, the most popular methods used to identify and block spam, are beginning to lose their edge in the battle. We argue here that one not only needs to look into the network-related characteristics of spam traffic, as has been r… ▽ More

    Submitted 29 August, 2008; originally announced August 2008.

    Report number: TIK-Report No. 291