-
CleftGAN: Adapting A Style-Based Generative Adversarial Network To Create Images Depicting Cleft Lip Deformity
Authors:
Abdullah Hayajneh,
Erchin Serpedin,
Mohammad Shaqfeh,
Graeme Glass,
Mitchell A. Stotland
Abstract:
A major obstacle when attempting to train a machine learning system to evaluate facial clefts is the scarcity of large datasets of high-quality, ethics board-approved patient images. In response, we have built a deep learning-based cleft lip generator designed to produce an almost unlimited number of artificial images exhibiting high-fidelity facsimiles of cleft lip with wide variation. We underto…
▽ More
A major obstacle when attempting to train a machine learning system to evaluate facial clefts is the scarcity of large datasets of high-quality, ethics board-approved patient images. In response, we have built a deep learning-based cleft lip generator designed to produce an almost unlimited number of artificial images exhibiting high-fidelity facsimiles of cleft lip with wide variation. We undertook a transfer learning protocol testing different versions of StyleGAN-ADA (a generative adversarial network image generator incorporating adaptive data augmentation (ADA)) as the base model. Training images depicting a variety of cleft deformities were pre-processed to adjust for rotation, scaling, color adjustment and background blurring. The ADA modification of the primary algorithm permitted construction of our new generative model while requiring input of a relatively small number of training images. Adversarial training was carried out using 514 unique frontal photographs of cleft-affected faces to adapt a pre-trained model based on 70,000 normal faces. The Frechet Inception Distance (FID) was used to measure the similarity of the newly generated facial images to the cleft training dataset, while Perceptual Path Length (PPL) and the novel Divergence Index of Severity Histograms (DISH) measures were also used to assess the performance of the image generator that we dub CleftGAN. We found that StyleGAN3 with translation invariance (StyleGAN3-t) performed optimally as a base model. Generated images achieved a low FID reflecting a close similarity to our training input dataset of genuine cleft images. Low PPL and DISH measures reflected a smooth and semantically valid interpolation of images through the transfer learning process and a similar distribution of severity in the training and generated images, respectively.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
Unsupervised Anomaly Appraisal of Cleft Faces Using a StyleGAN2-based Model Adaptation Technique
Authors:
Abdullah Hayajneh,
Mohammad Shaqfeh,
Erchin Serpedin,
Mitchell A. Stotland
Abstract:
This paper presents a novel machine learning framework to consistently detect, localize and rate congenital cleft lip anomalies in human faces. The goal is to provide a universal, objective measure of facial differences and reconstructive surgical outcomes that matches human judgments. The proposed method employs the StyleGAN2 generative adversarial network with model adaptation to produce normali…
▽ More
This paper presents a novel machine learning framework to consistently detect, localize and rate congenital cleft lip anomalies in human faces. The goal is to provide a universal, objective measure of facial differences and reconstructive surgical outcomes that matches human judgments. The proposed method employs the StyleGAN2 generative adversarial network with model adaptation to produce normalized transformations of cleft-affected faces in order to allow for subsequent measurement of deformity using a pixel-wise subtraction approach. The complete pipeline of the proposed framework consists of the following steps: image preprocessing, face normalization, color transformation, morphological erosion, heat-map generation and abnormality scoring. Heatmaps that finely discern anatomic anomalies are proposed by exploiting the features of the considered framework. The proposed framework is validated through computer simulations and surveys containing human ratings. The anomaly scores yielded by the proposed computer model correlate closely with the human ratings of facial differences, leading to 0.942 Pearson's r score.
△ Less
Submitted 12 November, 2022;
originally announced November 2022.
-
Multi-Task and Transfer Learning for Federated Learning Applications
Authors:
Cihat Keçeci,
Mohammad Shaqfeh,
Hayat Mbayed,
Erchin Serpedin
Abstract:
Federated learning enables many applications benefiting distributed and private datasets of a large number of potential data-holding clients. However, different clients usually have their own particular objectives in terms of the tasks to be learned from the data. So, supporting federated learning with meta-learning tools such as multi-task learning and transfer learning will help enlarge the set…
▽ More
Federated learning enables many applications benefiting distributed and private datasets of a large number of potential data-holding clients. However, different clients usually have their own particular objectives in terms of the tasks to be learned from the data. So, supporting federated learning with meta-learning tools such as multi-task learning and transfer learning will help enlarge the set of potential applications of federated learning by letting clients of different but related tasks share task-agnostic models that can be then further updated and tailored by each individual client for its particular task. In a federated multi-task learning problem, the trained deep neural network model should be fine-tuned for the respective objective of each client while sharing some parameters for more generalizability. We propose to train a deep neural network model with more generalized layers closer to the input and more personalized layers to the output. We achieve that by introducing layer types such as pre-trained, common, task-specific, and personal layers. We provide simulation results to highlight particular scenarios in which meta-learning-based federated learning proves to be useful.
△ Less
Submitted 17 July, 2022;
originally announced July 2022.
-
Clustered Scheduling and Communication Pipelining For Efficient Resource Management Of Wireless Federated Learning
Authors:
Cihat Keçeci,
Mohammad Shaqfeh,
Fawaz Al-Qahtani,
Muhammad Ismail,
Erchin Serpedin
Abstract:
This paper proposes using communication pipelining to enhance the wireless spectrum utilization efficiency and convergence speed of federated learning in mobile edge computing applications. Due to limited wireless sub-channels, a subset of the total clients is scheduled in each iteration of federated learning algorithms. On the other hand, the scheduled clients wait for the slowest client to finis…
▽ More
This paper proposes using communication pipelining to enhance the wireless spectrum utilization efficiency and convergence speed of federated learning in mobile edge computing applications. Due to limited wireless sub-channels, a subset of the total clients is scheduled in each iteration of federated learning algorithms. On the other hand, the scheduled clients wait for the slowest client to finish its computation. We propose to first cluster the clients based on the time they need per iteration to compute the local gradients of the federated learning model. Then, we schedule a mixture of clients from all clusters to send their local updates in a pipelined manner. In this way, instead of just waiting for the slower clients to finish their computation, more clients can participate in each iteration. While the time duration of a single iteration does not change, the proposed method can significantly reduce the number of required iterations to achieve a target accuracy. We provide a generic formulation for optimal client clustering under different settings, and we analytically derive an efficient algorithm for obtaining the optimal solution. We also provide numerical results to demonstrate the gains of the proposed method for different datasets and deep learning architectures.
△ Less
Submitted 15 June, 2022;
originally announced June 2022.
-
Utility of Traffic Information in Dynamic Routing: Is Sharing Information Always Useful?
Authors:
Mohammad Shaqfeh,
Salah Hessien,
Erchin Serpedin
Abstract:
Real-time traffic information can be utilized to enhance the efficiency of transportation networks by dynamically updating routing plans to mitigate traffic jams. However, an interesting question is whether the network coordinator should broadcast real-time traffic information to all network users or communicate it selectively to some of them. Which option enhances the network efficiency more? In…
▽ More
Real-time traffic information can be utilized to enhance the efficiency of transportation networks by dynamically updating routing plans to mitigate traffic jams. However, an interesting question is whether the network coordinator should broadcast real-time traffic information to all network users or communicate it selectively to some of them. Which option enhances the network efficiency more? In this work, we demonstrate using simulation experiments that sharing real-time traffic information with all network users is sub-optimal, and it is actually better to share the information with a majority subset of the total population in order to improve the overall network performance. This result is valid under the assumption that each network user decides its route to destination locally.
△ Less
Submitted 11 March, 2021;
originally announced March 2021.
-
Thresholds Optimization for One-Bit Feedback Multi-User Scheduling
Authors:
Mohammed Hafez,
Ahmed El Shafie,
Mohammed Shaqfeh,
Tamer Khattab,
Hussein Alnuweiri,
Huseyin Arslan
Abstract:
We propose a new one-bit feedback scheme with scheduling decision based on the maximum expected weighted rate. We show the concavity of the $2$-user case and provide the optimal solution which achieves the maximum weighted rate of the users. For the general asymmetric M-user case, we provide a heuristic method to achieve the maximum expected weighted rate. We show that the sum rate of our proposed…
▽ More
We propose a new one-bit feedback scheme with scheduling decision based on the maximum expected weighted rate. We show the concavity of the $2$-user case and provide the optimal solution which achieves the maximum weighted rate of the users. For the general asymmetric M-user case, we provide a heuristic method to achieve the maximum expected weighted rate. We show that the sum rate of our proposed scheme is very close to the sum rate of the full channel state information case, which is the upper bound performance.
△ Less
Submitted 30 August, 2017;
originally announced August 2017.
-
Robust Layered Transmission in Secure MISO Multiuser Unicast Cognitive Radio Systems
Authors:
Derrick Wing Kwan Ng,
Mohammad Shaqfeh,
Robert Schober,
Hussein Alnuweiri
Abstract:
This paper studies robust resource allocation algorithm design for a multiuser multiple-input single-output (MISO) cognitive radio (CR) downlink communication network. We focus on a secondary system which provides unicast secure wireless layered video information to multiple single-antenna secondary receivers. The resource allocation algorithm design is formulated as a non-convex optimization prob…
▽ More
This paper studies robust resource allocation algorithm design for a multiuser multiple-input single-output (MISO) cognitive radio (CR) downlink communication network. We focus on a secondary system which provides unicast secure wireless layered video information to multiple single-antenna secondary receivers. The resource allocation algorithm design is formulated as a non-convex optimization problem for minimization of the total transmit power at the secondary transmitter. The proposed framework takes into account a quality of service (QoS) requirement regarding video communication secrecy in the secondary system, the imperfection of the channel state information (CSI) of potential eavesdroppers (primary receivers) at the secondary transmitter, and a limit for the maximum tolerable received interference power at the primary receivers. Thereby, the proposed problem formulation exploits the self-protecting architecture of layered transmission and artificial noise generation to ensure communication secrecy. Semidefinite programming (SDP) relaxation is employed to derive a resource allocation algorithm which finds the global optimal solution to the formulated problem. Simulation results demonstrate significant transmit power savings and robustness against CSI imperfection for the proposed resource allocation algorithm for layered transmission compared to baseline schemes with traditional single-layer transmission.
△ Less
Submitted 26 November, 2015; v1 submitted 25 June, 2014;
originally announced June 2014.
-
Joint Power and Resource Allocation for Block-Fading Relay-Assisted Broadcast Channels
Authors:
Mohammad Shaqfeh,
Hussein Alnuweiri
Abstract:
We provide the solution for optimizing the power and resource allocation over block-fading relay-assisted broadcast channels in order to maximize the long term average achievable rates region of the users. The problem formulation assumes regenerative (repetition coding) decode-and-forward (DF) relaying strategy, long-term average total transmitted power constraint, orthogonal multiplexing of the u…
▽ More
We provide the solution for optimizing the power and resource allocation over block-fading relay-assisted broadcast channels in order to maximize the long term average achievable rates region of the users. The problem formulation assumes regenerative (repetition coding) decode-and-forward (DF) relaying strategy, long-term average total transmitted power constraint, orthogonal multiplexing of the users messages within the channel blocks, possibility to use a direct transmission (DT) mode from the base station to the user terminal directly or a relaying (DF) transmission mode, and partial channel state information. We show that our optimization problem can be transformed into an equivalent "no-relaying" broadcast channel optimization problem with each actual user substituted by two virtual users having different channel qualities and multiplexing weights. The proposed power and resource allocation strategies are expressed in closed-form that can be applied practically in centralized relay-assisted wireless networks. Furthermore, we show by numerical examples that our scheme enlarges the achievable rates region significantly.
△ Less
Submitted 1 May, 2012;
originally announced May 2012.
-
Multiuser Switched Diversity Scheduling Schemes
Authors:
Mohammad Shaqfeh,
Hussein Alnuweiri,
Mohamed-Slim Alouini
Abstract:
Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings…
▽ More
Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions.
△ Less
Submitted 12 April, 2012;
originally announced April 2012.
-
Comments on the Boundary of the Capacity Region of Multiaccess Fading Channels
Authors:
Mohamed Shaqfeh,
Norbert Goertz
Abstract:
A modification is proposed for the formula known from the literature that characterizes the boundary of the capacity region of Gaussian multiaccess fading channels. The modified version takes into account potentially negative arguments of the cumulated density function that would affect the accuracy of the numerical capacity results.
A modification is proposed for the formula known from the literature that characterizes the boundary of the capacity region of Gaussian multiaccess fading channels. The modified version takes into account potentially negative arguments of the cumulated density function that would affect the accuracy of the numerical capacity results.
△ Less
Submitted 21 October, 2008;
originally announced October 2008.