Privacy preserving data mining multiplicative perturbation techniques

Size: px
Start display at page:

Download "Privacy preserving data mining multiplicative perturbation techniques"

Transcription

1 Privacy preserving data mining multiplicative perturbation techniques Li Xiong CS573 Data Privacy and Anonymity

2 Outline Review and critique of randomization approaches (additive noise) Multiplicative data perturbations Rotation perturbation Geometric Data Perturbation Random projection Comparison

3 Additive noise (randomization) Reveal entire database, but randomize entries User Database x x n + n x 1 xn Add random noise i to each database entry x i For example, if distribution of noise has mean 0, user can compute average of x i slide 3

4 Learning decision tree on randomized data Alice s age 30 70K K Add random number to Age 30 becomes 65 (30+35) Randomizer Reconstruct Distribution of Age Randomizer 65 20K K Reconstruct Distribution of Salary... Classification Algorithm Model

5 Summary on additive perturbations Benefits Easy to apply applied separately to each data point (record) Low cost Can be used for both web model and corporate model user 1 User 2 User n Private info x 1 + x 1 1 xn Web Apps data x n + n

6 Additive perturbations - privacy Need to publish noise distribution The column distribution is disclosed Subject to data value attacks! On the Privacy Preserving Properties of Random Data Perturbation Techniques, Kargupta, 2003a

7 The spectral filtering technique can be used to estimate the original data

8

9 The spectral filtering technique can perform poorly when there is an inherent random component in the original data

10 Randomization data utility Only preserves column distribution Need to redesign/modify existing data mining algorithms Limited data mining applications Decision tree and naïve bayes classifier

11 Randomization approaches Privacy guarantee? Data Utility/ Model accuracy Privacy guarantee Data utility/ Model accuracy Difficult to balance the two factors Low data utility Subject to attacks

12 More thoughts about perturbation 1. Preserve Privacy Hide the original data not easy to estimate the original values from the perturbed data Protect from data reconstruction techniques The attacker has prior knowledge on the published data 2. Preserve Data Utility for Tasks Single-dimensional properties - column distribution, etc. Decision tree, Bayesian classifier Multi-dimensional properties - covariance matrix, distance, etc SVM classifier, knn classification, clustering

13 Multiplicative perturbations Preserving multidimensional data properties Geometric data perturbation (GDP) [Chen 07] Rotation data perturbation Translation data perturbation Noise addition Random projection perturbation(rpp) [Liu 06] Chen, K. and Liu, L. Towards attack-resilient geometric data perturbation. SDM, 2007 Liu, K., Kargupt, H., and Ryan, J. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. TKDE, 2006

14 Rotation Perturbation G(X) = R*X R m*m - an orthonormal matrix (R T R = RR T = I) X m*n - original data set with n m-dimensional data points G(X) m*n - rotated data set Key features preserves Euclidean distance and inner product of data points preserves geometric shapes such as hyperplane and hyper curved surfaces in the multidimensional space Example: ID age rent tax = * ID age rent tax

15 Illustration of multiplicative data perturbation Preserving distances while perturbing each individual dimensions

16 Data properties A model is invariant to geometric perturbation if distance plays an important role Class/cluster members and decision boundaries are correlated in terms of distance, not the concrete locations Class 1 Class 1 2D Example: Class 2 Rotation and translation Classification boundary Class 1 Classification boundary Class 2 Distance perturbation (Noise addition) Slightly changed Classification boundary Class 2

17 Applicable DM algorithms Models invariant to GDP all Euclidean distance based clustering algorithms Classification algorithms K Nearest Neighbors Kernel methods Linear classifier Support vector machines Most regression models And potentially more

18 When to Use Multiplicative Data Perturbation Data Owner Service Provider/data user G(X)=RX+T+D G(X) F(G(X), ) Mined models/patterns Good for the corporate model or dataset publishing. Major issue!! curious service providers/data users try to break G(X)

19 Attacks! Three levels of knowledge Know nothing naïve estimation Know column distributions Independent Component Analysis Know specific points (original points and their images in perturbed data) distance inference

20 Attack 1: naïve estimation Estimate original points purely based on the perturbed data If using random rotation only Intensity of perturbation matters Points around origin Y Class 1 Class 1 Class 1 Class 2 Class 2 Class 2 X Classification boundary Classification boundary Classification boundary

21 Countering naïve estimation Maximize intensity Based on formal analysis of rotation intensity Method to maximize intensity Fast_Opt algorithm in GDP Random translation T Hide origin Increase difficulty of attacking! Need to estimate R first, in order to find out T

22 Attack 2: ICA based attacks Independent Component Analysis (ICA) Try to separate R and X from Y= R*X

23 Characteristics of ICA 1. Ordering of dimensions is not preserved. 2. Intensity (value range) is not preserved Conditions of effective ICA-attack 1. Knowing column distribution 2. Knowing value range.

24 Countering ICA attack Weakness of ICA attack Need certain amount of knowledge Cannot effectively handle dependent columns In reality Most datasets have correlated columns We can find optimal rotation perturbation maximizing the difficulty of ICA attacks

25 Attack 3: distance-inference attack If with only rotation/translation perturbation, when the attacker knows a set of original points and their mapping Known point image Original Perturbed

26 How is the Attack done Knowing points and their images find exact images of the known points Enumerate pairs by matched distances Less effective for large data we assume pairs are successfully identified Estimation 1. Cancel random translation T from pairs (x, x ) 2. calculate R with pairs: Y=RX R = Y*X calculate T with R and known pairs

27 Countering distance-inference: Noise addition Noise brings enough variance in estimation of R and T Can the noise be easily filtered? Need to know noise distribution, Need to know distribution of RX + T, Both distributions are not published, however. Note: It is very different from the attacks to noise addition data perturbation [Kargupta03]

28 Attackers with more knowledge? What if attackers know large amount of original records? Able to accurately estimate covariance matrix, column distribution, and column range, etc., of the original data Methods PCA,etc can be used What do we do? Stop releasing any kind of data anymore

29 Benefits of Geometric Data Perturbation Privacy guarantee decoupled Data Utility/ Model accuracy Applicable to many DM algorithms -Distance-based Clustering -Classification: linear, KNN, Kernel, SVM, Make optimization and balancing easier! - Almost fully preserving model accuracy - we optimize privacy only

30 A randomized perturbation optimization algorithm Start with a random rotation Goal: passing tests on simulated attacks Not simply random a hillclimbing method 1. Iteratively determine R - Test on naïve estimation (Fast_opt) - Test on ICA (2 nd level) find a better rotation R 2. Append a random translation component 3. Append an appropriate noise component

31 Privacy guarantee:gdp In terms of naïve estimation and ICA-based attacks Use only the random rotation and translation components (R*X+T) Optimized for Naïve estimation only Optimized perturbation for both attacks Worst perturbation (no optimization)

32 Privacy guarantee:gdp In terms of distance inference attacks Use all three components (R*X +T+D) Noise D : Gaussian N(0, 2 ) Assume pairs of (original, image) are identified by attackers no noise addition, privacy guarantee =0 Considerably high PG at small perturbation =0.1

33 Data utility: GDP with noise addition Noise addition vs. model accuracy - noise: N(0, ) Boolean data is more sensitive to distance perturbation

34 Random Projection Perturbation Random projection projects a set of data points from high dimensional space to a lower dimensional subspace F(X) = P*X X is m*n matrix: m columns and n rows P is a k*m random matrix, k <= m Johnson-Lindenstrauss Lemma There is a random projection F() with e is a small number <1, so that (1-e) x-y <= F(x)-F(y) <=(1+e) x-y i.e. distance is approximately preserved.

35 Data Utility: RPP Reduced # of dims vs. model accuracy KNN classifiers SVMs

36 Random projection vs. geometric perturbation Privacy preservation Subject to similar kinds of attacks RPP is more resilient to distance-based attacks Utility preservation(model accuracy) GDP: R and T exactly preserve distances, The effect of D needs experimental evaluation RPP Approximately preserves distances # of perturbed dimensions vs. utility

37 Coming up Output perturbation Cryptographic protocols

38 Methodology of attack analysis An attack is an estimate of the original data Original O(x 1, x 2,, x n ) vs. estimate P(x 1, x 2,, x n ) How similar are these two series? One of the effective methods is to evaluate the variance/standard deviation of the difference [Rakesh00] Var (P O) or std(p-o), P: estimated, O: original

39 Two multi-column privacy metrics q i : privacy guarantee for column i q i = std(p i O i ), O i normalized column values, P i estimated column values Min privacy guarantee: the weakest link of all columns min { q i, i=1..d} Avg privacy guarantee: overall privacy guarantee 1/d q i

Privacy-preserving Multiparty Collaborative Mining with Geometric Data Perturbation

Privacy-preserving Multiparty Collaborative Mining with Geometric Data Perturbation IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED COMPUTING, VOL. XX, NO. XX, JANUARY 29 1 Privacy-preserving Multiparty Collaborative Mining with Geometric Data Perturbation Keke Chen, Member, IEEE, and Ling

More information

Lecture 3 - Regression

Lecture 3 - Regression Lecture 3 - Regression Instructor: Prof Ganesh Ramakrishnan July 25, 2016 1 / 30 The Simplest ML Problem: Least Square Regression Curve Fitting: Motivation Error measurement Minimizing Error Method of

More information

Knowledge discovery & data mining Classification & fraud detection

Knowledge discovery & data mining Classification & fraud detection Knowledge discovery & data mining Classification & fraud detection Knowledge discovery & data mining Classification & fraud detection 5/24/00 Click here to start Table of Contents Author: Dino Pedreschi

More information

The Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification

The Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Parallel to AIMA 8., 8., 8.6.3, 8.9 The Automatic Classification Problem Assign object/event or sequence of objects/events

More information

An Introduction to Machine Learning for Social Scientists

An Introduction to Machine Learning for Social Scientists An Introduction to Machine Learning for Social Scientists Tyler Ransom University of Oklahoma, Dept. of Economics November 10, 2017 Outline 1. Intro 2. Examples 3. Conclusion Tyler Ransom (OU Econ) An

More information

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic

More information

Augment the Spatial Resolution of Multispectral Image Using PCA Fusion Method and Classified It s Region Using Different Techniques.

Augment the Spatial Resolution of Multispectral Image Using PCA Fusion Method and Classified It s Region Using Different Techniques. Augment the Spatial Resolution of Multispectral Image Using PCA Fusion Method and Classified It s Region Using Different Techniques. Israa Jameel Muhsin 1, Khalid Hassan Salih 2, Ebtesam Fadhel 3 1,2 Department

More information

A Machine Learning Based Approach for Predicting Undisclosed Attributes in Social Networks

A Machine Learning Based Approach for Predicting Undisclosed Attributes in Social Networks A Machine Learning Based Approach for Predicting Undisclosed Attributes in Social Networks Gergely Kótyuk Laboratory of Cryptography and Systems Security (CrySyS) Budapest University of Technology and

More information

SELECTING RELEVANT DATA

SELECTING RELEVANT DATA EXPLORATORY ANALYSIS The data that will be used comes from the reviews_beauty.json.gz file which contains information about beauty products that were bought and reviewed on Amazon.com. Each data point

More information

Workshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF

Workshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF Workshop on anonymization Berlin, March 19, 2015 Basic Knowledge Terms, Definitions and general techniques Murat Sariyar TMF Workshop Anonymisation, March 19, 2015 Outline Background Aims of Anonymization

More information

Image analysis. CS/CME/BioE/Biophys/BMI 279 Oct. 31 and Nov. 2, 2017 Ron Dror

Image analysis. CS/CME/BioE/Biophys/BMI 279 Oct. 31 and Nov. 2, 2017 Ron Dror Image analysis CS/CME/BioE/Biophys/BMI 279 Oct. 31 and Nov. 2, 2017 Ron Dror 1 Outline Images in molecular and cellular biology Reducing image noise Mean and Gaussian filters Frequency domain interpretation

More information

Voice Activity Detection

Voice Activity Detection Voice Activity Detection Speech Processing Tom Bäckström Aalto University October 2015 Introduction Voice activity detection (VAD) (or speech activity detection, or speech detection) refers to a class

More information

Contents. List of Figures List of Tables. Structure of the Book How to Use this Book Online Resources Acknowledgements

Contents. List of Figures List of Tables. Structure of the Book How to Use this Book Online Resources Acknowledgements Contents List of Figures List of Tables Preface Notation Structure of the Book How to Use this Book Online Resources Acknowledgements Notational Conventions Notational Conventions for Probabilities xiii

More information

Removal of ocular artifacts from EEG signals using adaptive threshold PCA and Wavelet transforms

Removal of ocular artifacts from EEG signals using adaptive threshold PCA and Wavelet transforms Available online at www.interscience.in Removal of ocular artifacts from s using adaptive threshold PCA and Wavelet transforms P. Ashok Babu 1, K.V.S.V.R.Prasad 2 1 Narsimha Reddy Engineering College,

More information

CS229: Machine Learning

CS229: Machine Learning CS229: Machine Learning Event Identification in Continues Seismic Data Please print out, fill in and include this cover sheet as the first page of your submission. We strongly recommend that you use this

More information

THE EXO-200 experiment searches for double beta decay

THE EXO-200 experiment searches for double beta decay CS 229 FINAL PROJECT, AUTUMN 2012 1 Classification of Induction Signals for the EXO-200 Double Beta Decay Experiment Jason Chaves, Physics, Stanford University Kevin Shin, Computer Science, Stanford University

More information

SSB Debate: Model-based Inference vs. Machine Learning

SSB Debate: Model-based Inference vs. Machine Learning SSB Debate: Model-based nference vs. Machine Learning June 3, 2018 SSB 2018 June 3, 2018 1 / 20 Machine learning in the biological sciences SSB 2018 June 3, 2018 2 / 20 Machine learning in the biological

More information

Kernels and Support Vector Machines

Kernels and Support Vector Machines Kernels and Support Vector Machines Machine Learning CSE446 Sham Kakade University of Washington November 1, 2016 2016 Sham Kakade 1 Announcements: Project Milestones coming up HW2 You ve implemented GD,

More information

Training a Minesweeper Solver

Training a Minesweeper Solver Training a Minesweeper Solver Luis Gardea, Griffin Koontz, Ryan Silva CS 229, Autumn 25 Abstract Minesweeper, a puzzle game introduced in the 96 s, requires spatial awareness and an ability to work with

More information

Image Enhancement in spatial domain. Digital Image Processing GW Chapter 3 from Section (pag 110) Part 2: Filtering in spatial domain

Image Enhancement in spatial domain. Digital Image Processing GW Chapter 3 from Section (pag 110) Part 2: Filtering in spatial domain Image Enhancement in spatial domain Digital Image Processing GW Chapter 3 from Section 3.4.1 (pag 110) Part 2: Filtering in spatial domain Mask mode radiography Image subtraction in medical imaging 2 Range

More information

GE 113 REMOTE SENSING

GE 113 REMOTE SENSING GE 113 REMOTE SENSING Topic 8. Image Classification and Accuracy Assessment Lecturer: Engr. Jojene R. Santillan jrsantillan@carsu.edu.ph Division of Geodetic Engineering College of Engineering and Information

More information

Applications of Music Processing

Applications of Music Processing Lecture Music Processing Applications of Music Processing Christian Dittmar International Audio Laboratories Erlangen christian.dittmar@audiolabs-erlangen.de Singing Voice Detection Important pre-requisite

More information

Image Forgery. Forgery Detection Using Wavelets

Image Forgery. Forgery Detection Using Wavelets Image Forgery Forgery Detection Using Wavelets Introduction Let's start with a little quiz... Let's start with a little quiz... Can you spot the forgery the below image? Let's start with a little quiz...

More information

A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics

A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics Ossia, SA; Shamsabadi, AS; Taheri, A; Rabiee, HR; Lane, N; Haddadi, H The Author(s) 2017 For additional information about this

More information

Drum Transcription Based on Independent Subspace Analysis

Drum Transcription Based on Independent Subspace Analysis Report for EE 391 Special Studies and Reports for Electrical Engineering Drum Transcription Based on Independent Subspace Analysis Yinyi Guo Center for Computer Research in Music and Acoustics, Stanford,

More information

Introduction to Machine Learning

Introduction to Machine Learning Introduction to Machine Learning Deep Learning Barnabás Póczos Credits Many of the pictures, results, and other materials are taken from: Ruslan Salakhutdinov Joshua Bengio Geoffrey Hinton Yann LeCun 2

More information

Image analysis. CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror

Image analysis. CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror Image analysis CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror A two- dimensional image can be described as a function of two variables f(x,y). For a grayscale image, the value of f(x,y) specifies the brightness

More information

Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product

Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product Justin Zhan I-Cheng Wang Abstract In the e-commerce era, recommendation systems were introduced to share customer experience

More information

A COMPARISON OF ARTIFICIAL NEURAL NETWORKS AND OTHER STATISTICAL METHODS FOR ROTATING MACHINE

A COMPARISON OF ARTIFICIAL NEURAL NETWORKS AND OTHER STATISTICAL METHODS FOR ROTATING MACHINE A COMPARISON OF ARTIFICIAL NEURAL NETWORKS AND OTHER STATISTICAL METHODS FOR ROTATING MACHINE CONDITION CLASSIFICATION A. C. McCormick and A. K. Nandi Abstract Statistical estimates of vibration signals

More information

On the Optimality of WLAN Location Determination Systems

On the Optimality of WLAN Location Determination Systems On the Optimality of WLAN Location Determination Systems Moustafa A. Youssef, Ashok Agrawala Department of Comupter Science and UMIACS University of Maryland College Park, Maryland 2742 {moustafa,agrawala}@cs.umd.edu

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

Efficient Signal Identification using the Spectral Correlation Function and Pattern Recognition

Efficient Signal Identification using the Spectral Correlation Function and Pattern Recognition Efficient Signal Identification using the Spectral Correlation Function and Pattern Recognition Theodore Trebaol, Jeffrey Dunn, and Daniel D. Stancil Acknowledgement: J. Peha, M. Sirbu, P. Steenkiste Outline

More information

Distinguishing Mislabeled Data from Correctly Labeled Data in Classifier Design

Distinguishing Mislabeled Data from Correctly Labeled Data in Classifier Design Distinguishing Mislabeled Data from Correctly Labeled Data in Classifier Design Sundara Venkataraman, Dimitris Metaxas, Dmitriy Fradkin, Casimir Kulikowski, Ilya Muchnik DCS, Rutgers University, NJ November

More information

Error Protection: Detection and Correction

Error Protection: Detection and Correction Error Protection: Detection and Correction Communication channels are subject to noise. Noise distorts analog signals. Noise can cause digital signals to be received as different values. Bits can be flipped

More information

Lane Detection in Automotive

Lane Detection in Automotive Lane Detection in Automotive Contents Introduction... 2 Image Processing... 2 Reading an image... 3 RGB to Gray... 3 Mean and Gaussian filtering... 5 Defining our Region of Interest... 6 BirdsEyeView Transformation...

More information

Outline for today s lecture Informed Search Optimal informed search: A* (AIMA 3.5.2) Creating good heuristic functions Hill Climbing

Outline for today s lecture Informed Search Optimal informed search: A* (AIMA 3.5.2) Creating good heuristic functions Hill Climbing Informed Search II Outline for today s lecture Informed Search Optimal informed search: A* (AIMA 3.5.2) Creating good heuristic functions Hill Climbing CIS 521 - Intro to AI - Fall 2017 2 Review: Greedy

More information

Machine Learning for Antenna Array Failure Analysis

Machine Learning for Antenna Array Failure Analysis Machine Learning for Antenna Array Failure Analysis Lydia de Lange Under Dr DJ Ludick and Dr TL Grobler Dept. Electrical and Electronic Engineering, Stellenbosch University MML 2019 Outline 15/03/2019

More information

A Spatial Mean and Median Filter For Noise Removal in Digital Images

A Spatial Mean and Median Filter For Noise Removal in Digital Images A Spatial Mean and Median Filter For Noise Removal in Digital Images N.Rajesh Kumar 1, J.Uday Kumar 2 Associate Professor, Dept. of ECE, Jaya Prakash Narayan College of Engineering, Mahabubnagar, Telangana,

More information

Long Range Acoustic Classification

Long Range Acoustic Classification Approved for public release; distribution is unlimited. Long Range Acoustic Classification Authors: Ned B. Thammakhoune, Stephen W. Lang Sanders a Lockheed Martin Company P. O. Box 868 Nashua, New Hampshire

More information

Scrabble Board Automatic Detector for Third Party Applications

Scrabble Board Automatic Detector for Third Party Applications Scrabble Board Automatic Detector for Third Party Applications David Hirschberg Computer Science Department University of California, Irvine hirschbd@uci.edu Abstract Abstract Scrabble is a well-known

More information

Feature analysis of EEG signals using SOM

Feature analysis of EEG signals using SOM 1 Portál pre odborné publikovanie ISSN 1338-0087 Feature analysis of EEG signals using SOM Gráfová Lucie Elektrotechnika, Medicína 21.02.2011 The most common use of EEG includes the monitoring and diagnosis

More information

Final Exam Review for Week in Review

Final Exam Review for Week in Review Final Exam Review for Week in Review. a) Consumers will buy units of a certain product if the price is $5 per unit. For each decrease of $3 in the price, they will buy more units. Suppliers will provide

More information

VARIOUS METHODS IN DIGITAL IMAGE PROCESSING. S.Selvaragini 1, E.Venkatesan 2. BIST, BIHER,Bharath University, Chennai-73

VARIOUS METHODS IN DIGITAL IMAGE PROCESSING. S.Selvaragini 1, E.Venkatesan 2. BIST, BIHER,Bharath University, Chennai-73 Volume 116 No. 16 2017, 265-269 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu VARIOUS METHODS IN DIGITAL IMAGE PROCESSING S.Selvaragini 1, E.Venkatesan

More information

Singing Voice Detection. Applications of Music Processing. Singing Voice Detection. Singing Voice Detection. Singing Voice Detection

Singing Voice Detection. Applications of Music Processing. Singing Voice Detection. Singing Voice Detection. Singing Voice Detection Detection Lecture usic Processing Applications of usic Processing Christian Dittmar International Audio Laboratories Erlangen christian.dittmar@audiolabs-erlangen.de Important pre-requisite for: usic segmentation

More information

Authentication Using Pulse-Response Biometrics

Authentication Using Pulse-Response Biometrics Authentication Using Pulse-Response Biometrics Kasper B. Rasmussen 1 Marc Roeschlin 2 Ivan Martinovic 1 Gene Tsudik 3 1 University of Oxford 2 ETH Zurich 3 UC Irvine Clermont Ferrand, 2014 Slide 1. A Bit

More information

ISudoku. Jonathon Makepeace Matthew Harris Jamie Sparrow Julian Hillebrand

ISudoku. Jonathon Makepeace Matthew Harris Jamie Sparrow Julian Hillebrand Jonathon Makepeace Matthew Harris Jamie Sparrow Julian Hillebrand ISudoku Abstract In this paper, we will analyze and discuss the Sudoku puzzle and implement different algorithms to solve the puzzle. After

More information

Design of Parallel Algorithms. Communication Algorithms

Design of Parallel Algorithms. Communication Algorithms + Design of Parallel Algorithms Communication Algorithms + Topic Overview n One-to-All Broadcast and All-to-One Reduction n All-to-All Broadcast and Reduction n All-Reduce and Prefix-Sum Operations n Scatter

More information

Multiresolution Analysis of Connectivity

Multiresolution Analysis of Connectivity Multiresolution Analysis of Connectivity Atul Sajjanhar 1, Guojun Lu 2, Dengsheng Zhang 2, Tian Qi 3 1 School of Information Technology Deakin University 221 Burwood Highway Burwood, VIC 3125 Australia

More information

Efficient Target Detection from Hyperspectral Images Based On Removal of Signal Independent and Signal Dependent Noise

Efficient Target Detection from Hyperspectral Images Based On Removal of Signal Independent and Signal Dependent Noise IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 6, Ver. III (Nov - Dec. 2014), PP 45-49 Efficient Target Detection from Hyperspectral

More information

Classification of Road Images for Lane Detection

Classification of Road Images for Lane Detection Classification of Road Images for Lane Detection Mingyu Kim minkyu89@stanford.edu Insun Jang insunj@stanford.edu Eunmo Yang eyang89@stanford.edu 1. Introduction In the research on autonomous car, it is

More information

AUTOMATED MUSIC TRACK GENERATION

AUTOMATED MUSIC TRACK GENERATION AUTOMATED MUSIC TRACK GENERATION LOUIS EUGENE Stanford University leugene@stanford.edu GUILLAUME ROSTAING Stanford University rostaing@stanford.edu Abstract: This paper aims at presenting our method to

More information

RADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology

RADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2016-04-18 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview

More information

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de

More information

PERFORMANCE ANALYSIS OF LINEAR AND NON LINEAR FILTERS FOR IMAGE DE NOISING

PERFORMANCE ANALYSIS OF LINEAR AND NON LINEAR FILTERS FOR IMAGE DE NOISING Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March - 2018 PERFORMANCE ANALYSIS OF LINEAR

More information

k-means Clustering David S. Rosenberg December 15, 2017 Bloomberg ML EDU David S. Rosenberg (Bloomberg ML EDU) ML 101 December 15, / 18

k-means Clustering David S. Rosenberg December 15, 2017 Bloomberg ML EDU David S. Rosenberg (Bloomberg ML EDU) ML 101 December 15, / 18 k-means Clustering David S. Rosenberg Bloomberg ML EDU December 15, 2017 David S. Rosenberg (Bloomberg ML EDU) ML 101 December 15, 2017 1 / 18 k-means Clustering David S. Rosenberg (Bloomberg ML EDU) ML

More information

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1.

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1. EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code Project #1 is due on Tuesday, October 6, 2009, in class. You may turn the project report in early. Late projects are accepted

More information

EXACT SIGNAL RECOVERY FROM SPARSELY CORRUPTED MEASUREMENTS

EXACT SIGNAL RECOVERY FROM SPARSELY CORRUPTED MEASUREMENTS EXACT SIGNAL RECOVERY FROM SPARSELY CORRUPTED MEASUREMENTS THROUGH THE PURSUIT OF JUSTICE Jason Laska, Mark Davenport, Richard Baraniuk SSC 2009 Collaborators Mark Davenport Richard Baraniuk Compressive

More information

Antennas and Propagation. Chapter 6d: Diversity Techniques and Spatial Multiplexing

Antennas and Propagation. Chapter 6d: Diversity Techniques and Spatial Multiplexing Antennas and Propagation d: Diversity Techniques and Spatial Multiplexing Introduction: Diversity Diversity Use (or introduce) redundancy in the communications system Improve (short time) link reliability

More information

Your Neighbors Affect Your Ratings: On Geographical Neighborhood Influence to Rating Prediction

Your Neighbors Affect Your Ratings: On Geographical Neighborhood Influence to Rating Prediction Your Neighbors Affect Your Ratings: On Geographical Neighborhood Influence to Rating Prediction Longke Hu Aixin Sun Yong Liu Nanyang Technological University Singapore Outline 1 Introduction 2 Data analysis

More information

Image analysis. CS/CME/BioE/Biophys/BMI 279 Oct. 31 and Nov. 2, 2017 Ron Dror

Image analysis. CS/CME/BioE/Biophys/BMI 279 Oct. 31 and Nov. 2, 2017 Ron Dror Image analysis CS/CME/BioE/Biophys/BMI 279 Oct. 31 and Nov. 2, 2017 Ron Dror 1 Outline Images in molecular and cellular biology Reducing image noise Mean and Gaussian filters Frequency domain interpretation

More information

Foundations of Artificial Intelligence

Foundations of Artificial Intelligence Foundations of Artificial Intelligence 20. Combinatorial Optimization: Introduction and Hill-Climbing Malte Helmert Universität Basel April 8, 2016 Combinatorial Optimization Introduction previous chapters:

More information

Twenty-fourth Annual UNC Math Contest Final Round Solutions Jan 2016 [(3!)!] 4

Twenty-fourth Annual UNC Math Contest Final Round Solutions Jan 2016 [(3!)!] 4 Twenty-fourth Annual UNC Math Contest Final Round Solutions Jan 206 Rules: Three hours; no electronic devices. The positive integers are, 2, 3, 4,.... Pythagorean Triplet The sum of the lengths of the

More information

>>> from numpy import random as r >>> I = r.rand(256,256);

>>> from numpy import random as r >>> I = r.rand(256,256); WHAT IS AN IMAGE? >>> from numpy import random as r >>> I = r.rand(256,256); Think-Pair-Share: - What is this? What does it look like? - Which values does it take? - How many values can it take? - Is it

More information

F2 - Fire 2 module: Remote Sensing Data Classification

F2 - Fire 2 module: Remote Sensing Data Classification F2 - Fire 2 module: Remote Sensing Data Classification F2.1 Task_1: Supervised and Unsupervised classification examples of a Landsat 5 TM image from the Center of Portugal, year 2005 F2.1 Task_2: Burnt

More information

Predicting 3-Dimensional Arm Trajectories from the Activity of Cortical Neurons for Use in Neural Prosthetics

Predicting 3-Dimensional Arm Trajectories from the Activity of Cortical Neurons for Use in Neural Prosthetics Predicting 3-Dimensional Arm Trajectories from the Activity of Cortical Neurons for Use in Neural Prosthetics Cynthia Chestek CS 229 Midterm Project Review 11-17-06 Introduction Neural prosthetics is a

More information

LASER server: ancestry tracing with genotypes or sequence reads

LASER server: ancestry tracing with genotypes or sequence reads LASER server: ancestry tracing with genotypes or sequence reads The LASER method Supplementary Data For each ancestry reference panel of N individuals, LASER applies principal components analysis (PCA)

More information

Image Analysis based on Spectral and Spatial Grouping

Image Analysis based on Spectral and Spatial Grouping Image Analysis based on Spectral and Spatial Grouping B. Naga Jyothi 1, K.S.R. Radhika 2 and Dr. I. V.Murali Krishna 3 1 Assoc. Prof., Dept. of ECE, DMS SVHCE, Machilipatnam, A.P., India 2 Assoc. Prof.,

More information

Generating Groove: Predicting Jazz Harmonization

Generating Groove: Predicting Jazz Harmonization Generating Groove: Predicting Jazz Harmonization Nicholas Bien (nbien@stanford.edu) Lincoln Valdez (lincolnv@stanford.edu) December 15, 2017 1 Background We aim to generate an appropriate jazz chord progression

More information

Antennas and Propagation. Chapter 5c: Array Signal Processing and Parametric Estimation Techniques

Antennas and Propagation. Chapter 5c: Array Signal Processing and Parametric Estimation Techniques Antennas and Propagation : Array Signal Processing and Parametric Estimation Techniques Introduction Time-domain Signal Processing Fourier spectral analysis Identify important frequency-content of signal

More information

Learning to Play like an Othello Master CS 229 Project Report. Shir Aharon, Amanda Chang, Kent Koyanagi

Learning to Play like an Othello Master CS 229 Project Report. Shir Aharon, Amanda Chang, Kent Koyanagi Learning to Play like an Othello Master CS 229 Project Report December 13, 213 1 Abstract This project aims to train a machine to strategically play the game of Othello using machine learning. Prior to

More information

Meta-data based secret image sharing application for different sized biomedical

Meta-data based secret image sharing application for different sized biomedical Biomedical Research 2018; Special Issue: S394-S398 ISSN 0970-938X www.biomedres.info Meta-data based secret image sharing application for different sized biomedical images. Arunkumar S 1*, Subramaniyaswamy

More information

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1 ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,

More information

Domination Rationalizability Correlated Equilibrium Computing CE Computational problems in domination. Game Theory Week 3. Kevin Leyton-Brown

Domination Rationalizability Correlated Equilibrium Computing CE Computational problems in domination. Game Theory Week 3. Kevin Leyton-Brown Game Theory Week 3 Kevin Leyton-Brown Game Theory Week 3 Kevin Leyton-Brown, Slide 1 Lecture Overview 1 Domination 2 Rationalizability 3 Correlated Equilibrium 4 Computing CE 5 Computational problems in

More information

On the Optimality of WLAN Location Determination Systems

On the Optimality of WLAN Location Determination Systems On the Optimality of WLAN Location Determination Systems Moustafa Youssef Department of Computer Science University of Maryland College Park, Maryland 20742 Email: moustafa@cs.umd.edu Ashok Agrawala Department

More information

Channel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology

Channel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2012-04-23 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview

More information

Preparing Remote Sensing Data for Natural Resources Mapping (image enhancement, rectifications )

Preparing Remote Sensing Data for Natural Resources Mapping (image enhancement, rectifications ) Preparing Remote Sensing Data for Natural Resources Mapping (image enhancement, rectifications ) Why is this important What are the major approaches Examples of digital image enhancement Follow up exercises

More information

Automatic Processing of Dance Dance Revolution

Automatic Processing of Dance Dance Revolution Automatic Processing of Dance Dance Revolution John Bauer December 12, 2008 1 Introduction 2 Training Data The video game Dance Dance Revolution is a musicbased game of timing. The game plays music and

More information

Prof. Feng Liu. Fall /04/2018

Prof. Feng Liu. Fall /04/2018 Prof. Feng Liu Fall 2018 http://www.cs.pdx.edu/~fliu/courses/cs447/ 10/04/2018 1 Last Time Image file formats Color quantization 2 Today Dithering Signal Processing Homework 1 due today in class Homework

More information

Machine Learning and Data Mining Course Summary

Machine Learning and Data Mining Course Summary Machine Learning and Data Mining Course Summary Outline Data Mining and Society Discrimination, Privacy, and Security Hype Curve Future Directions Course Summary 2 Controversial Issues Data mining (or

More information

>>> from numpy import random as r >>> I = r.rand(256,256);

>>> from numpy import random as r >>> I = r.rand(256,256); WHAT IS AN IMAGE? >>> from numpy import random as r >>> I = r.rand(256,256); Think-Pair-Share: - What is this? What does it look like? - Which values does it take? - How many values can it take? - Is it

More information

Evaluating the Effects of Shadow Detection on QuickBird Image Classification and Spectroradiometric Restoration

Evaluating the Effects of Shadow Detection on QuickBird Image Classification and Spectroradiometric Restoration Remote Sens. 2013, 5, 4450-4469; doi:10.3390/rs5094450 Article OPEN ACCESS Remote Sensing ISSN 2072-4292 www.mdpi.com/journal/remotesensing Evaluating the Effects of Shadow Detection on QuickBird Image

More information

Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1

Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1 Objective: Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1 This Matlab Project is an extension of the basic correlation theory presented in the course. It shows a practical application

More information

CSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25. Homework #1. ( Due: Oct 10 ) Figure 1: The laser game.

CSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25. Homework #1. ( Due: Oct 10 ) Figure 1: The laser game. CSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25 Homework #1 ( Due: Oct 10 ) Figure 1: The laser game. Task 1. [ 60 Points ] Laser Game Consider the following game played on an n n board,

More information

Kalman Filters and Adaptive Windows for Learning in Data Streams

Kalman Filters and Adaptive Windows for Learning in Data Streams Kalman Filters and Adaptive Windows for Learning in Data Streams Albert Bifet Ricard Gavaldà Universitat Politècnica de Catalunya DS 06 Barcelona A. Bifet, R. Gavaldà (UPC) Kalman Filters and Adaptive

More information

Empirical Rate-Distortion Study of Compressive Sensing-based Joint Source-Channel Coding

Empirical Rate-Distortion Study of Compressive Sensing-based Joint Source-Channel Coding Empirical -Distortion Study of Compressive Sensing-based Joint Source-Channel Coding Muriel L. Rambeloarison, Soheil Feizi, Georgios Angelopoulos, and Muriel Médard Research Laboratory of Electronics Massachusetts

More information

According to the proposed AWB methods as described in Chapter 3, the following

According to the proposed AWB methods as described in Chapter 3, the following Chapter 4 Experiment 4.1 Introduction According to the proposed AWB methods as described in Chapter 3, the following experiments were designed to evaluate the feasibility and robustness of the algorithms.

More information

Retrieval of Large Scale Images and Camera Identification via Random Projections

Retrieval of Large Scale Images and Camera Identification via Random Projections Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management

More information

LECTURE 19 - LAGRANGE MULTIPLIERS

LECTURE 19 - LAGRANGE MULTIPLIERS LECTURE 9 - LAGRANGE MULTIPLIERS CHRIS JOHNSON Abstract. In this lecture we ll describe a way of solving certain optimization problems subject to constraints. This method, known as Lagrange multipliers,

More information

Auto-tagging The Facebook

Auto-tagging The Facebook Auto-tagging The Facebook Jonathan Michelson and Jorge Ortiz Stanford University 2006 E-mail: JonMich@Stanford.edu, jorge.ortiz@stanford.com Introduction For those not familiar, The Facebook is an extremely

More information

Session 124TS, A Practical Guide to Machine Learning for Actuaries. Presenters: Dave M. Liner, FSA, MAAA, CERA

Session 124TS, A Practical Guide to Machine Learning for Actuaries. Presenters: Dave M. Liner, FSA, MAAA, CERA Session 124TS, A Practical Guide to Machine Learning for Actuaries Presenters: Dave M. Liner, FSA, MAAA, CERA SOA Antitrust Disclaimer SOA Presentation Disclaimer A practical guide to machine learning

More information

Image Processing (EA C443)

Image Processing (EA C443) Image Processing (EA C443) OBJECTIVES: To study components of the Image (Digital Image) To Know how the image quality can be improved How efficiently the image data can be stored and transmitted How the

More information

Constructing local discriminative features for signal classification

Constructing local discriminative features for signal classification Constructing local discriminative features for signal classification Local features for signal classification Outline Motivations Problem formulation Lifting scheme Local features Conclusions Toy example

More information

Hardware-based Image Retrieval and Classifier System

Hardware-based Image Retrieval and Classifier System Hardware-based Image Retrieval and Classifier System Jason Isaacs, Joe Petrone, Geoffrey Wall, Faizal Iqbal, Xiuwen Liu, and Simon Foo Department of Electrical and Computer Engineering Florida A&M - Florida

More information

Provably weak instances of Ring-LWE revisited

Provably weak instances of Ring-LWE revisited Provably weak instances of Ring-LWE revisited Wouter Castryck 1,2, Ilia Iliashenko 1, Frederik Vercauteren 1,3 1 COSIC, KU Leuven 2 Ghent University 3 Open Security Research EUROCRYPT, May 9, 2016 Provably

More information

Recommender Systems TIETS43 Collaborative Filtering

Recommender Systems TIETS43 Collaborative Filtering + Recommender Systems TIETS43 Collaborative Filtering Fall 2017 Kostas Stefanidis kostas.stefanidis@uta.fi https://coursepages.uta.fi/tiets43/ selection Amazon generates 35% of their sales through recommendations

More information

Color Constancy Using Standard Deviation of Color Channels

Color Constancy Using Standard Deviation of Color Channels 2010 International Conference on Pattern Recognition Color Constancy Using Standard Deviation of Color Channels Anustup Choudhury and Gérard Medioni Department of Computer Science University of Southern

More information

A Study On Preprocessing A Mammogram Image Using Adaptive Median Filter

A Study On Preprocessing A Mammogram Image Using Adaptive Median Filter A Study On Preprocessing A Mammogram Image Using Adaptive Median Filter Dr.K.Meenakshi Sundaram 1, D.Sasikala 2, P.Aarthi Rani 3 Associate Professor, Department of Computer Science, Erode Arts and Science

More information

Image Searches, Abstraction, Invariance : Data Mining 8 September 2008

Image Searches, Abstraction, Invariance : Data Mining 8 September 2008 Image Searches, Abstraction, Invariance 36-350: Data Mining 8 September 2008 1 Medical: x-rays, brain imaging, histology ( do these look like cancerous cells? ) Satellite imagery Fingerprints Finding illustrations

More information

Game Theory. Problem data representing the situation are constant. They do not vary with respect to time or any other basis.

Game Theory. Problem data representing the situation are constant. They do not vary with respect to time or any other basis. Game Theory For effective decision making. Decision making is classified into 3 categories: o Deterministic Situation: o o Problem data representing the situation are constant. They do not vary with respect

More information

Study guide for Graduate Computer Vision

Study guide for Graduate Computer Vision Study guide for Graduate Computer Vision Erik G. Learned-Miller Department of Computer Science University of Massachusetts, Amherst Amherst, MA 01003 November 23, 2011 Abstract 1 1. Know Bayes rule. What

More information