-
Cross-Shaped Windows Transformer with Self-supervised Pretraining for Clinically Significant Prostate Cancer Detection in Bi-parametric MRI
Authors:
Yuheng Li,
Jacob Wynne,
Jing Wang,
Richard L. J. Qiu,
Justin Roper,
Shaoyan Pan,
Ashesh B. Jani,
Tian Liu,
Pretesh R. Patel,
Hui Mao,
Xiaofeng Yang
Abstract:
Biparametric magnetic resonance imaging (bpMRI) has demonstrated promising results in prostate cancer (PCa) detection using convolutional neural networks (CNNs). Recently, transformers have achieved competitive performance compared to CNNs in computer vision. Large scale transformers need abundant annotated data for training, which are difficult to obtain in medical imaging. Self-supervised learni…
▽ More
Biparametric magnetic resonance imaging (bpMRI) has demonstrated promising results in prostate cancer (PCa) detection using convolutional neural networks (CNNs). Recently, transformers have achieved competitive performance compared to CNNs in computer vision. Large scale transformers need abundant annotated data for training, which are difficult to obtain in medical imaging. Self-supervised learning (SSL) utilizes unlabeled data to generate meaningful semantic representations without the need for costly annotations, enhancing model performance on tasks with limited labeled data. We introduce a novel end-to-end Cross-Shaped windows (CSwin) transformer UNet model, CSwin UNet, to detect clinically significant prostate cancer (csPCa) in prostate bi-parametric MR imaging (bpMRI) and demonstrate the effectiveness of our proposed self-supervised pre-training framework. Using a large prostate bpMRI dataset with 1500 patients, we first pretrain CSwin transformer using multi-task self-supervised learning to improve data-efficiency and network generalizability. We then finetune using lesion annotations to perform csPCa detection. Five-fold cross validation shows that self-supervised CSwin UNet achieves 0.888 AUC and 0.545 Average Precision (AP), significantly outperforming four comparable models (Swin UNETR, DynUNet, Attention UNet, UNet). Using a separate bpMRI dataset with 158 patients, we evaluate our method robustness to external hold-out data. Self-supervised CSwin UNet achieves 0.79 AUC and 0.45 AP, still outperforming all other comparable methods and demonstrating good generalization to external data.
△ Less
Submitted 17 March, 2024; v1 submitted 30 April, 2023;
originally announced May 2023.
-
Learning Robot Swarm Tactics over Complex Adversarial Environments
Authors:
Amir Behjat,
Hemanth Manjunatha,
Prajit KrisshnaKumar,
Apurv Jani,
Leighton Collins,
Payam Ghassemi,
Joseph Distefano,
David Doermann,
Karthik Dantu,
Ehsan Esfahani,
Souma Chowdhury
Abstract:
To accomplish complex swarm robotic missions in the real world, one needs to plan and execute a combination of single robot behaviors, group primitives such as task allocation, path planning, and formation control, and mission-specific objectives such as target search and group coverage. Most such missions are designed manually by teams of robotics experts. Recent work in automated approaches to l…
▽ More
To accomplish complex swarm robotic missions in the real world, one needs to plan and execute a combination of single robot behaviors, group primitives such as task allocation, path planning, and formation control, and mission-specific objectives such as target search and group coverage. Most such missions are designed manually by teams of robotics experts. Recent work in automated approaches to learning swarm behavior has been limited to individual primitives with sparse work on learning complete missions. This paper presents a systematic approach to learn tactical mission-specific policies that compose primitives in a swarm to accomplish the mission efficiently using neural networks with special input and output encoding. To learn swarm tactics in an adversarial environment, we employ a combination of 1) map-to-graph abstraction, 2) input/output encoding via Pareto filtering of points of interest and clustering of robots, and 3) learning via neuroevolution and policy gradient approaches. We illustrate this combination as critical to providing tractable learning, especially given the computational cost of simulating swarm missions of this scale and complexity. Successful mission completion outcomes are demonstrated with up to 60 robots. In addition, a close match in the performance statistics in training and testing scenarios shows the potential generalizability of the proposed framework.
△ Less
Submitted 12 September, 2021;
originally announced September 2021.
-
A Novel Digital Watermarking Algorithm using Random Matrix Image
Authors:
Mahimn Pandya,
Hiren Joshi,
Ashish Jani
Abstract:
The availability of bandwidth for internet access is sufficient enough to communicate digital assets. These digital assets are subjected to various types of threats. [19] As a result of this, protection mechanism required for the protection of digital assets is of priority in research. The threat of current focus is unauthorized copying of digital assets which give boost to piracy. This under the…
▽ More
The availability of bandwidth for internet access is sufficient enough to communicate digital assets. These digital assets are subjected to various types of threats. [19] As a result of this, protection mechanism required for the protection of digital assets is of priority in research. The threat of current focus is unauthorized copying of digital assets which give boost to piracy. This under the copyright act is illegal and a robust mechanism is required to curb this kind of unauthorized copy. To safeguard the copyright digital assets, a robust digital watermarking technique is needed. The existing digital watermarking techniques protect digital assets by embedding a digital watermark into a host digital image. This embedding does induce slight distortion in the host image but the distortion is usually too small to be noticed. At the same time the embedded watermark must be robust enough to with stand deliberate attacks. There are various techniques of digital watermarking but researchers are making constant efforts to increase the robustness of the watermark image. The layered approach of watermarking based on Huffman coding [5] can soon increase the robustness of digital watermark.[11] Ultimately, increasing the security of copyright of protection. The proposed work is in similar direction where in RMI (Random Matrix Image) is used in place of Huffman coding. This innovative algorithm has considerably increased the robustness in digital watermark while also enhancing security of production
△ Less
Submitted 22 January, 2013; v1 submitted 18 January, 2013;
originally announced January 2013.