Privacy preserving data mining multiplicative perturbation techniques
|
|
- Bryce Stevens
- 5 years ago
- Views:
Transcription
1 Privacy preserving data mining multiplicative perturbation techniques Li Xiong CS573 Data Privacy and Anonymity
2 Outline Review and critique of randomization approaches (additive noise) Multiplicative data perturbations Rotation perturbation Geometric Data Perturbation Random projection Comparison
3 Additive noise (randomization) Reveal entire database, but randomize entries User Database x x n + n x 1 xn Add random noise i to each database entry x i For example, if distribution of noise has mean 0, user can compute average of x i slide 3
4 Learning decision tree on randomized data Alice s age 30 70K K Add random number to Age 30 becomes 65 (30+35) Randomizer Reconstruct Distribution of Age Randomizer 65 20K K Reconstruct Distribution of Salary... Classification Algorithm Model
5 Summary on additive perturbations Benefits Easy to apply applied separately to each data point (record) Low cost Can be used for both web model and corporate model user 1 User 2 User n Private info x 1 + x 1 1 xn Web Apps data x n + n
6 Additive perturbations - privacy Need to publish noise distribution The column distribution is disclosed Subject to data value attacks! On the Privacy Preserving Properties of Random Data Perturbation Techniques, Kargupta, 2003a
7 The spectral filtering technique can be used to estimate the original data
8
9 The spectral filtering technique can perform poorly when there is an inherent random component in the original data
10 Randomization data utility Only preserves column distribution Need to redesign/modify existing data mining algorithms Limited data mining applications Decision tree and naïve bayes classifier
11 Randomization approaches Privacy guarantee? Data Utility/ Model accuracy Privacy guarantee Data utility/ Model accuracy Difficult to balance the two factors Low data utility Subject to attacks
12 More thoughts about perturbation 1. Preserve Privacy Hide the original data not easy to estimate the original values from the perturbed data Protect from data reconstruction techniques The attacker has prior knowledge on the published data 2. Preserve Data Utility for Tasks Single-dimensional properties - column distribution, etc. Decision tree, Bayesian classifier Multi-dimensional properties - covariance matrix, distance, etc SVM classifier, knn classification, clustering
13 Multiplicative perturbations Preserving multidimensional data properties Geometric data perturbation (GDP) [Chen 07] Rotation data perturbation Translation data perturbation Noise addition Random projection perturbation(rpp) [Liu 06] Chen, K. and Liu, L. Towards attack-resilient geometric data perturbation. SDM, 2007 Liu, K., Kargupt, H., and Ryan, J. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. TKDE, 2006
14 Rotation Perturbation G(X) = R*X R m*m - an orthonormal matrix (R T R = RR T = I) X m*n - original data set with n m-dimensional data points G(X) m*n - rotated data set Key features preserves Euclidean distance and inner product of data points preserves geometric shapes such as hyperplane and hyper curved surfaces in the multidimensional space Example: ID age rent tax = * ID age rent tax
15 Illustration of multiplicative data perturbation Preserving distances while perturbing each individual dimensions
16 Data properties A model is invariant to geometric perturbation if distance plays an important role Class/cluster members and decision boundaries are correlated in terms of distance, not the concrete locations Class 1 Class 1 2D Example: Class 2 Rotation and translation Classification boundary Class 1 Classification boundary Class 2 Distance perturbation (Noise addition) Slightly changed Classification boundary Class 2
17 Applicable DM algorithms Models invariant to GDP all Euclidean distance based clustering algorithms Classification algorithms K Nearest Neighbors Kernel methods Linear classifier Support vector machines Most regression models And potentially more
18 When to Use Multiplicative Data Perturbation Data Owner Service Provider/data user G(X)=RX+T+D G(X) F(G(X), ) Mined models/patterns Good for the corporate model or dataset publishing. Major issue!! curious service providers/data users try to break G(X)
19 Attacks! Three levels of knowledge Know nothing naïve estimation Know column distributions Independent Component Analysis Know specific points (original points and their images in perturbed data) distance inference
20 Attack 1: naïve estimation Estimate original points purely based on the perturbed data If using random rotation only Intensity of perturbation matters Points around origin Y Class 1 Class 1 Class 1 Class 2 Class 2 Class 2 X Classification boundary Classification boundary Classification boundary
21 Countering naïve estimation Maximize intensity Based on formal analysis of rotation intensity Method to maximize intensity Fast_Opt algorithm in GDP Random translation T Hide origin Increase difficulty of attacking! Need to estimate R first, in order to find out T
22 Attack 2: ICA based attacks Independent Component Analysis (ICA) Try to separate R and X from Y= R*X
23 Characteristics of ICA 1. Ordering of dimensions is not preserved. 2. Intensity (value range) is not preserved Conditions of effective ICA-attack 1. Knowing column distribution 2. Knowing value range.
24 Countering ICA attack Weakness of ICA attack Need certain amount of knowledge Cannot effectively handle dependent columns In reality Most datasets have correlated columns We can find optimal rotation perturbation maximizing the difficulty of ICA attacks
25 Attack 3: distance-inference attack If with only rotation/translation perturbation, when the attacker knows a set of original points and their mapping Known point image Original Perturbed
26 How is the Attack done Knowing points and their images find exact images of the known points Enumerate pairs by matched distances Less effective for large data we assume pairs are successfully identified Estimation 1. Cancel random translation T from pairs (x, x ) 2. calculate R with pairs: Y=RX R = Y*X calculate T with R and known pairs
27 Countering distance-inference: Noise addition Noise brings enough variance in estimation of R and T Can the noise be easily filtered? Need to know noise distribution, Need to know distribution of RX + T, Both distributions are not published, however. Note: It is very different from the attacks to noise addition data perturbation [Kargupta03]
28 Attackers with more knowledge? What if attackers know large amount of original records? Able to accurately estimate covariance matrix, column distribution, and column range, etc., of the original data Methods PCA,etc can be used What do we do? Stop releasing any kind of data anymore
29 Benefits of Geometric Data Perturbation Privacy guarantee decoupled Data Utility/ Model accuracy Applicable to many DM algorithms -Distance-based Clustering -Classification: linear, KNN, Kernel, SVM, Make optimization and balancing easier! - Almost fully preserving model accuracy - we optimize privacy only
30 A randomized perturbation optimization algorithm Start with a random rotation Goal: passing tests on simulated attacks Not simply random a hillclimbing method 1. Iteratively determine R - Test on naïve estimation (Fast_opt) - Test on ICA (2 nd level) find a better rotation R 2. Append a random translation component 3. Append an appropriate noise component
31 Privacy guarantee:gdp In terms of naïve estimation and ICA-based attacks Use only the random rotation and translation components (R*X+T) Optimized for Naïve estimation only Optimized perturbation for both attacks Worst perturbation (no optimization)
32 Privacy guarantee:gdp In terms of distance inference attacks Use all three components (R*X +T+D) Noise D : Gaussian N(0, 2 ) Assume pairs of (original, image) are identified by attackers no noise addition, privacy guarantee =0 Considerably high PG at small perturbation =0.1
33 Data utility: GDP with noise addition Noise addition vs. model accuracy - noise: N(0, ) Boolean data is more sensitive to distance perturbation
34 Random Projection Perturbation Random projection projects a set of data points from high dimensional space to a lower dimensional subspace F(X) = P*X X is m*n matrix: m columns and n rows P is a k*m random matrix, k <= m Johnson-Lindenstrauss Lemma There is a random projection F() with e is a small number <1, so that (1-e) x-y <= F(x)-F(y) <=(1+e) x-y i.e. distance is approximately preserved.
35 Data Utility: RPP Reduced # of dims vs. model accuracy KNN classifiers SVMs
36 Random projection vs. geometric perturbation Privacy preservation Subject to similar kinds of attacks RPP is more resilient to distance-based attacks Utility preservation(model accuracy) GDP: R and T exactly preserve distances, The effect of D needs experimental evaluation RPP Approximately preserves distances # of perturbed dimensions vs. utility
37 Coming up Output perturbation Cryptographic protocols
38 Methodology of attack analysis An attack is an estimate of the original data Original O(x 1, x 2,, x n ) vs. estimate P(x 1, x 2,, x n ) How similar are these two series? One of the effective methods is to evaluate the variance/standard deviation of the difference [Rakesh00] Var (P O) or std(p-o), P: estimated, O: original
39 Two multi-column privacy metrics q i : privacy guarantee for column i q i = std(p i O i ), O i normalized column values, P i estimated column values Min privacy guarantee: the weakest link of all columns min { q i, i=1..d} Avg privacy guarantee: overall privacy guarantee 1/d q i
Privacy-preserving Multiparty Collaborative Mining with Geometric Data Perturbation
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED COMPUTING, VOL. XX, NO. XX, JANUARY 29 1 Privacy-preserving Multiparty Collaborative Mining with Geometric Data Perturbation Keke Chen, Member, IEEE, and Ling
More informationLecture 3 - Regression
Lecture 3 - Regression Instructor: Prof Ganesh Ramakrishnan July 25, 2016 1 / 30 The Simplest ML Problem: Least Square Regression Curve Fitting: Motivation Error measurement Minimizing Error Method of
More informationKnowledge discovery & data mining Classification & fraud detection
Knowledge discovery & data mining Classification & fraud detection Knowledge discovery & data mining Classification & fraud detection 5/24/00 Click here to start Table of Contents Author: Dino Pedreschi
More informationThe Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification
Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Parallel to AIMA 8., 8., 8.6.3, 8.9 The Automatic Classification Problem Assign object/event or sequence of objects/events
More informationAn Introduction to Machine Learning for Social Scientists
An Introduction to Machine Learning for Social Scientists Tyler Ransom University of Oklahoma, Dept. of Economics November 10, 2017 Outline 1. Intro 2. Examples 3. Conclusion Tyler Ransom (OU Econ) An
More informationChapter 2 Distributed Consensus Estimation of Wireless Sensor Networks
Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic
More informationAugment the Spatial Resolution of Multispectral Image Using PCA Fusion Method and Classified It s Region Using Different Techniques.
Augment the Spatial Resolution of Multispectral Image Using PCA Fusion Method and Classified It s Region Using Different Techniques. Israa Jameel Muhsin 1, Khalid Hassan Salih 2, Ebtesam Fadhel 3 1,2 Department
More informationA Machine Learning Based Approach for Predicting Undisclosed Attributes in Social Networks
A Machine Learning Based Approach for Predicting Undisclosed Attributes in Social Networks Gergely Kótyuk Laboratory of Cryptography and Systems Security (CrySyS) Budapest University of Technology and
More informationSELECTING RELEVANT DATA
EXPLORATORY ANALYSIS The data that will be used comes from the reviews_beauty.json.gz file which contains information about beauty products that were bought and reviewed on Amazon.com. Each data point
More informationWorkshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF
Workshop on anonymization Berlin, March 19, 2015 Basic Knowledge Terms, Definitions and general techniques Murat Sariyar TMF Workshop Anonymisation, March 19, 2015 Outline Background Aims of Anonymization
More informationImage analysis. CS/CME/BioE/Biophys/BMI 279 Oct. 31 and Nov. 2, 2017 Ron Dror
Image analysis CS/CME/BioE/Biophys/BMI 279 Oct. 31 and Nov. 2, 2017 Ron Dror 1 Outline Images in molecular and cellular biology Reducing image noise Mean and Gaussian filters Frequency domain interpretation
More informationVoice Activity Detection
Voice Activity Detection Speech Processing Tom Bäckström Aalto University October 2015 Introduction Voice activity detection (VAD) (or speech activity detection, or speech detection) refers to a class
More informationContents. List of Figures List of Tables. Structure of the Book How to Use this Book Online Resources Acknowledgements
Contents List of Figures List of Tables Preface Notation Structure of the Book How to Use this Book Online Resources Acknowledgements Notational Conventions Notational Conventions for Probabilities xiii
More informationRemoval of ocular artifacts from EEG signals using adaptive threshold PCA and Wavelet transforms
Available online at www.interscience.in Removal of ocular artifacts from s using adaptive threshold PCA and Wavelet transforms P. Ashok Babu 1, K.V.S.V.R.Prasad 2 1 Narsimha Reddy Engineering College,
More informationCS229: Machine Learning
CS229: Machine Learning Event Identification in Continues Seismic Data Please print out, fill in and include this cover sheet as the first page of your submission. We strongly recommend that you use this
More informationTHE EXO-200 experiment searches for double beta decay
CS 229 FINAL PROJECT, AUTUMN 2012 1 Classification of Induction Signals for the EXO-200 Double Beta Decay Experiment Jason Chaves, Physics, Stanford University Kevin Shin, Computer Science, Stanford University
More informationSSB Debate: Model-based Inference vs. Machine Learning
SSB Debate: Model-based nference vs. Machine Learning June 3, 2018 SSB 2018 June 3, 2018 1 / 20 Machine learning in the biological sciences SSB 2018 June 3, 2018 2 / 20 Machine learning in the biological
More informationKernels and Support Vector Machines
Kernels and Support Vector Machines Machine Learning CSE446 Sham Kakade University of Washington November 1, 2016 2016 Sham Kakade 1 Announcements: Project Milestones coming up HW2 You ve implemented GD,
More informationTraining a Minesweeper Solver
Training a Minesweeper Solver Luis Gardea, Griffin Koontz, Ryan Silva CS 229, Autumn 25 Abstract Minesweeper, a puzzle game introduced in the 96 s, requires spatial awareness and an ability to work with
More informationImage Enhancement in spatial domain. Digital Image Processing GW Chapter 3 from Section (pag 110) Part 2: Filtering in spatial domain
Image Enhancement in spatial domain Digital Image Processing GW Chapter 3 from Section 3.4.1 (pag 110) Part 2: Filtering in spatial domain Mask mode radiography Image subtraction in medical imaging 2 Range
More informationGE 113 REMOTE SENSING
GE 113 REMOTE SENSING Topic 8. Image Classification and Accuracy Assessment Lecturer: Engr. Jojene R. Santillan jrsantillan@carsu.edu.ph Division of Geodetic Engineering College of Engineering and Information
More informationApplications of Music Processing
Lecture Music Processing Applications of Music Processing Christian Dittmar International Audio Laboratories Erlangen christian.dittmar@audiolabs-erlangen.de Singing Voice Detection Important pre-requisite
More informationImage Forgery. Forgery Detection Using Wavelets
Image Forgery Forgery Detection Using Wavelets Introduction Let's start with a little quiz... Let's start with a little quiz... Can you spot the forgery the below image? Let's start with a little quiz...
More informationA Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics
A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics Ossia, SA; Shamsabadi, AS; Taheri, A; Rabiee, HR; Lane, N; Haddadi, H The Author(s) 2017 For additional information about this
More informationDrum Transcription Based on Independent Subspace Analysis
Report for EE 391 Special Studies and Reports for Electrical Engineering Drum Transcription Based on Independent Subspace Analysis Yinyi Guo Center for Computer Research in Music and Acoustics, Stanford,
More informationIntroduction to Machine Learning
Introduction to Machine Learning Deep Learning Barnabás Póczos Credits Many of the pictures, results, and other materials are taken from: Ruslan Salakhutdinov Joshua Bengio Geoffrey Hinton Yann LeCun 2
More informationImage analysis. CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror
Image analysis CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror A two- dimensional image can be described as a function of two variables f(x,y). For a grayscale image, the value of f(x,y) specifies the brightness
More informationPrivacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product
Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product Justin Zhan I-Cheng Wang Abstract In the e-commerce era, recommendation systems were introduced to share customer experience
More informationA COMPARISON OF ARTIFICIAL NEURAL NETWORKS AND OTHER STATISTICAL METHODS FOR ROTATING MACHINE
A COMPARISON OF ARTIFICIAL NEURAL NETWORKS AND OTHER STATISTICAL METHODS FOR ROTATING MACHINE CONDITION CLASSIFICATION A. C. McCormick and A. K. Nandi Abstract Statistical estimates of vibration signals
More informationOn the Optimality of WLAN Location Determination Systems
On the Optimality of WLAN Location Determination Systems Moustafa A. Youssef, Ashok Agrawala Department of Comupter Science and UMIACS University of Maryland College Park, Maryland 2742 {moustafa,agrawala}@cs.umd.edu
More informationGame Theory and Randomized Algorithms
Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international
More informationEfficient Signal Identification using the Spectral Correlation Function and Pattern Recognition
Efficient Signal Identification using the Spectral Correlation Function and Pattern Recognition Theodore Trebaol, Jeffrey Dunn, and Daniel D. Stancil Acknowledgement: J. Peha, M. Sirbu, P. Steenkiste Outline
More informationDistinguishing Mislabeled Data from Correctly Labeled Data in Classifier Design
Distinguishing Mislabeled Data from Correctly Labeled Data in Classifier Design Sundara Venkataraman, Dimitris Metaxas, Dmitriy Fradkin, Casimir Kulikowski, Ilya Muchnik DCS, Rutgers University, NJ November
More informationError Protection: Detection and Correction
Error Protection: Detection and Correction Communication channels are subject to noise. Noise distorts analog signals. Noise can cause digital signals to be received as different values. Bits can be flipped
More informationLane Detection in Automotive
Lane Detection in Automotive Contents Introduction... 2 Image Processing... 2 Reading an image... 3 RGB to Gray... 3 Mean and Gaussian filtering... 5 Defining our Region of Interest... 6 BirdsEyeView Transformation...
More informationOutline for today s lecture Informed Search Optimal informed search: A* (AIMA 3.5.2) Creating good heuristic functions Hill Climbing
Informed Search II Outline for today s lecture Informed Search Optimal informed search: A* (AIMA 3.5.2) Creating good heuristic functions Hill Climbing CIS 521 - Intro to AI - Fall 2017 2 Review: Greedy
More informationMachine Learning for Antenna Array Failure Analysis
Machine Learning for Antenna Array Failure Analysis Lydia de Lange Under Dr DJ Ludick and Dr TL Grobler Dept. Electrical and Electronic Engineering, Stellenbosch University MML 2019 Outline 15/03/2019
More informationA Spatial Mean and Median Filter For Noise Removal in Digital Images
A Spatial Mean and Median Filter For Noise Removal in Digital Images N.Rajesh Kumar 1, J.Uday Kumar 2 Associate Professor, Dept. of ECE, Jaya Prakash Narayan College of Engineering, Mahabubnagar, Telangana,
More informationLong Range Acoustic Classification
Approved for public release; distribution is unlimited. Long Range Acoustic Classification Authors: Ned B. Thammakhoune, Stephen W. Lang Sanders a Lockheed Martin Company P. O. Box 868 Nashua, New Hampshire
More informationScrabble Board Automatic Detector for Third Party Applications
Scrabble Board Automatic Detector for Third Party Applications David Hirschberg Computer Science Department University of California, Irvine hirschbd@uci.edu Abstract Abstract Scrabble is a well-known
More informationFeature analysis of EEG signals using SOM
1 Portál pre odborné publikovanie ISSN 1338-0087 Feature analysis of EEG signals using SOM Gráfová Lucie Elektrotechnika, Medicína 21.02.2011 The most common use of EEG includes the monitoring and diagnosis
More informationFinal Exam Review for Week in Review
Final Exam Review for Week in Review. a) Consumers will buy units of a certain product if the price is $5 per unit. For each decrease of $3 in the price, they will buy more units. Suppliers will provide
More informationVARIOUS METHODS IN DIGITAL IMAGE PROCESSING. S.Selvaragini 1, E.Venkatesan 2. BIST, BIHER,Bharath University, Chennai-73
Volume 116 No. 16 2017, 265-269 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu VARIOUS METHODS IN DIGITAL IMAGE PROCESSING S.Selvaragini 1, E.Venkatesan
More informationSinging Voice Detection. Applications of Music Processing. Singing Voice Detection. Singing Voice Detection. Singing Voice Detection
Detection Lecture usic Processing Applications of usic Processing Christian Dittmar International Audio Laboratories Erlangen christian.dittmar@audiolabs-erlangen.de Important pre-requisite for: usic segmentation
More informationAuthentication Using Pulse-Response Biometrics
Authentication Using Pulse-Response Biometrics Kasper B. Rasmussen 1 Marc Roeschlin 2 Ivan Martinovic 1 Gene Tsudik 3 1 University of Oxford 2 ETH Zurich 3 UC Irvine Clermont Ferrand, 2014 Slide 1. A Bit
More informationISudoku. Jonathon Makepeace Matthew Harris Jamie Sparrow Julian Hillebrand
Jonathon Makepeace Matthew Harris Jamie Sparrow Julian Hillebrand ISudoku Abstract In this paper, we will analyze and discuss the Sudoku puzzle and implement different algorithms to solve the puzzle. After
More informationDesign of Parallel Algorithms. Communication Algorithms
+ Design of Parallel Algorithms Communication Algorithms + Topic Overview n One-to-All Broadcast and All-to-One Reduction n All-to-All Broadcast and Reduction n All-Reduce and Prefix-Sum Operations n Scatter
More informationMultiresolution Analysis of Connectivity
Multiresolution Analysis of Connectivity Atul Sajjanhar 1, Guojun Lu 2, Dengsheng Zhang 2, Tian Qi 3 1 School of Information Technology Deakin University 221 Burwood Highway Burwood, VIC 3125 Australia
More informationEfficient Target Detection from Hyperspectral Images Based On Removal of Signal Independent and Signal Dependent Noise
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 6, Ver. III (Nov - Dec. 2014), PP 45-49 Efficient Target Detection from Hyperspectral
More informationClassification of Road Images for Lane Detection
Classification of Road Images for Lane Detection Mingyu Kim minkyu89@stanford.edu Insun Jang insunj@stanford.edu Eunmo Yang eyang89@stanford.edu 1. Introduction In the research on autonomous car, it is
More informationAUTOMATED MUSIC TRACK GENERATION
AUTOMATED MUSIC TRACK GENERATION LOUIS EUGENE Stanford University leugene@stanford.edu GUILLAUME ROSTAING Stanford University rostaing@stanford.edu Abstract: This paper aims at presenting our method to
More informationRADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology
RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2016-04-18 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview
More informationDetecting Resized Double JPEG Compressed Images Using Support Vector Machine
Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de
More informationPERFORMANCE ANALYSIS OF LINEAR AND NON LINEAR FILTERS FOR IMAGE DE NOISING
Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March - 2018 PERFORMANCE ANALYSIS OF LINEAR
More informationk-means Clustering David S. Rosenberg December 15, 2017 Bloomberg ML EDU David S. Rosenberg (Bloomberg ML EDU) ML 101 December 15, / 18
k-means Clustering David S. Rosenberg Bloomberg ML EDU December 15, 2017 David S. Rosenberg (Bloomberg ML EDU) ML 101 December 15, 2017 1 / 18 k-means Clustering David S. Rosenberg (Bloomberg ML EDU) ML
More informationEE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1.
EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code Project #1 is due on Tuesday, October 6, 2009, in class. You may turn the project report in early. Late projects are accepted
More informationEXACT SIGNAL RECOVERY FROM SPARSELY CORRUPTED MEASUREMENTS
EXACT SIGNAL RECOVERY FROM SPARSELY CORRUPTED MEASUREMENTS THROUGH THE PURSUIT OF JUSTICE Jason Laska, Mark Davenport, Richard Baraniuk SSC 2009 Collaborators Mark Davenport Richard Baraniuk Compressive
More informationAntennas and Propagation. Chapter 6d: Diversity Techniques and Spatial Multiplexing
Antennas and Propagation d: Diversity Techniques and Spatial Multiplexing Introduction: Diversity Diversity Use (or introduce) redundancy in the communications system Improve (short time) link reliability
More informationYour Neighbors Affect Your Ratings: On Geographical Neighborhood Influence to Rating Prediction
Your Neighbors Affect Your Ratings: On Geographical Neighborhood Influence to Rating Prediction Longke Hu Aixin Sun Yong Liu Nanyang Technological University Singapore Outline 1 Introduction 2 Data analysis
More informationImage analysis. CS/CME/BioE/Biophys/BMI 279 Oct. 31 and Nov. 2, 2017 Ron Dror
Image analysis CS/CME/BioE/Biophys/BMI 279 Oct. 31 and Nov. 2, 2017 Ron Dror 1 Outline Images in molecular and cellular biology Reducing image noise Mean and Gaussian filters Frequency domain interpretation
More informationFoundations of Artificial Intelligence
Foundations of Artificial Intelligence 20. Combinatorial Optimization: Introduction and Hill-Climbing Malte Helmert Universität Basel April 8, 2016 Combinatorial Optimization Introduction previous chapters:
More informationTwenty-fourth Annual UNC Math Contest Final Round Solutions Jan 2016 [(3!)!] 4
Twenty-fourth Annual UNC Math Contest Final Round Solutions Jan 206 Rules: Three hours; no electronic devices. The positive integers are, 2, 3, 4,.... Pythagorean Triplet The sum of the lengths of the
More information>>> from numpy import random as r >>> I = r.rand(256,256);
WHAT IS AN IMAGE? >>> from numpy import random as r >>> I = r.rand(256,256); Think-Pair-Share: - What is this? What does it look like? - Which values does it take? - How many values can it take? - Is it
More informationF2 - Fire 2 module: Remote Sensing Data Classification
F2 - Fire 2 module: Remote Sensing Data Classification F2.1 Task_1: Supervised and Unsupervised classification examples of a Landsat 5 TM image from the Center of Portugal, year 2005 F2.1 Task_2: Burnt
More informationPredicting 3-Dimensional Arm Trajectories from the Activity of Cortical Neurons for Use in Neural Prosthetics
Predicting 3-Dimensional Arm Trajectories from the Activity of Cortical Neurons for Use in Neural Prosthetics Cynthia Chestek CS 229 Midterm Project Review 11-17-06 Introduction Neural prosthetics is a
More informationLASER server: ancestry tracing with genotypes or sequence reads
LASER server: ancestry tracing with genotypes or sequence reads The LASER method Supplementary Data For each ancestry reference panel of N individuals, LASER applies principal components analysis (PCA)
More informationImage Analysis based on Spectral and Spatial Grouping
Image Analysis based on Spectral and Spatial Grouping B. Naga Jyothi 1, K.S.R. Radhika 2 and Dr. I. V.Murali Krishna 3 1 Assoc. Prof., Dept. of ECE, DMS SVHCE, Machilipatnam, A.P., India 2 Assoc. Prof.,
More informationGenerating Groove: Predicting Jazz Harmonization
Generating Groove: Predicting Jazz Harmonization Nicholas Bien (nbien@stanford.edu) Lincoln Valdez (lincolnv@stanford.edu) December 15, 2017 1 Background We aim to generate an appropriate jazz chord progression
More informationAntennas and Propagation. Chapter 5c: Array Signal Processing and Parametric Estimation Techniques
Antennas and Propagation : Array Signal Processing and Parametric Estimation Techniques Introduction Time-domain Signal Processing Fourier spectral analysis Identify important frequency-content of signal
More informationLearning to Play like an Othello Master CS 229 Project Report. Shir Aharon, Amanda Chang, Kent Koyanagi
Learning to Play like an Othello Master CS 229 Project Report December 13, 213 1 Abstract This project aims to train a machine to strategically play the game of Othello using machine learning. Prior to
More informationMeta-data based secret image sharing application for different sized biomedical
Biomedical Research 2018; Special Issue: S394-S398 ISSN 0970-938X www.biomedres.info Meta-data based secret image sharing application for different sized biomedical images. Arunkumar S 1*, Subramaniyaswamy
More informationIntroduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1
ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,
More informationDomination Rationalizability Correlated Equilibrium Computing CE Computational problems in domination. Game Theory Week 3. Kevin Leyton-Brown
Game Theory Week 3 Kevin Leyton-Brown Game Theory Week 3 Kevin Leyton-Brown, Slide 1 Lecture Overview 1 Domination 2 Rationalizability 3 Correlated Equilibrium 4 Computing CE 5 Computational problems in
More informationOn the Optimality of WLAN Location Determination Systems
On the Optimality of WLAN Location Determination Systems Moustafa Youssef Department of Computer Science University of Maryland College Park, Maryland 20742 Email: moustafa@cs.umd.edu Ashok Agrawala Department
More informationChannel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology
RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2012-04-23 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview
More informationPreparing Remote Sensing Data for Natural Resources Mapping (image enhancement, rectifications )
Preparing Remote Sensing Data for Natural Resources Mapping (image enhancement, rectifications ) Why is this important What are the major approaches Examples of digital image enhancement Follow up exercises
More informationAutomatic Processing of Dance Dance Revolution
Automatic Processing of Dance Dance Revolution John Bauer December 12, 2008 1 Introduction 2 Training Data The video game Dance Dance Revolution is a musicbased game of timing. The game plays music and
More informationProf. Feng Liu. Fall /04/2018
Prof. Feng Liu Fall 2018 http://www.cs.pdx.edu/~fliu/courses/cs447/ 10/04/2018 1 Last Time Image file formats Color quantization 2 Today Dithering Signal Processing Homework 1 due today in class Homework
More informationMachine Learning and Data Mining Course Summary
Machine Learning and Data Mining Course Summary Outline Data Mining and Society Discrimination, Privacy, and Security Hype Curve Future Directions Course Summary 2 Controversial Issues Data mining (or
More information>>> from numpy import random as r >>> I = r.rand(256,256);
WHAT IS AN IMAGE? >>> from numpy import random as r >>> I = r.rand(256,256); Think-Pair-Share: - What is this? What does it look like? - Which values does it take? - How many values can it take? - Is it
More informationEvaluating the Effects of Shadow Detection on QuickBird Image Classification and Spectroradiometric Restoration
Remote Sens. 2013, 5, 4450-4469; doi:10.3390/rs5094450 Article OPEN ACCESS Remote Sensing ISSN 2072-4292 www.mdpi.com/journal/remotesensing Evaluating the Effects of Shadow Detection on QuickBird Image
More informationIntroduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1
Objective: Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1 This Matlab Project is an extension of the basic correlation theory presented in the course. It shows a practical application
More informationCSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25. Homework #1. ( Due: Oct 10 ) Figure 1: The laser game.
CSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25 Homework #1 ( Due: Oct 10 ) Figure 1: The laser game. Task 1. [ 60 Points ] Laser Game Consider the following game played on an n n board,
More informationKalman Filters and Adaptive Windows for Learning in Data Streams
Kalman Filters and Adaptive Windows for Learning in Data Streams Albert Bifet Ricard Gavaldà Universitat Politècnica de Catalunya DS 06 Barcelona A. Bifet, R. Gavaldà (UPC) Kalman Filters and Adaptive
More informationEmpirical Rate-Distortion Study of Compressive Sensing-based Joint Source-Channel Coding
Empirical -Distortion Study of Compressive Sensing-based Joint Source-Channel Coding Muriel L. Rambeloarison, Soheil Feizi, Georgios Angelopoulos, and Muriel Médard Research Laboratory of Electronics Massachusetts
More informationAccording to the proposed AWB methods as described in Chapter 3, the following
Chapter 4 Experiment 4.1 Introduction According to the proposed AWB methods as described in Chapter 3, the following experiments were designed to evaluate the feasibility and robustness of the algorithms.
More informationRetrieval of Large Scale Images and Camera Identification via Random Projections
Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management
More informationLECTURE 19 - LAGRANGE MULTIPLIERS
LECTURE 9 - LAGRANGE MULTIPLIERS CHRIS JOHNSON Abstract. In this lecture we ll describe a way of solving certain optimization problems subject to constraints. This method, known as Lagrange multipliers,
More informationAuto-tagging The Facebook
Auto-tagging The Facebook Jonathan Michelson and Jorge Ortiz Stanford University 2006 E-mail: JonMich@Stanford.edu, jorge.ortiz@stanford.com Introduction For those not familiar, The Facebook is an extremely
More informationSession 124TS, A Practical Guide to Machine Learning for Actuaries. Presenters: Dave M. Liner, FSA, MAAA, CERA
Session 124TS, A Practical Guide to Machine Learning for Actuaries Presenters: Dave M. Liner, FSA, MAAA, CERA SOA Antitrust Disclaimer SOA Presentation Disclaimer A practical guide to machine learning
More informationImage Processing (EA C443)
Image Processing (EA C443) OBJECTIVES: To study components of the Image (Digital Image) To Know how the image quality can be improved How efficiently the image data can be stored and transmitted How the
More informationConstructing local discriminative features for signal classification
Constructing local discriminative features for signal classification Local features for signal classification Outline Motivations Problem formulation Lifting scheme Local features Conclusions Toy example
More informationHardware-based Image Retrieval and Classifier System
Hardware-based Image Retrieval and Classifier System Jason Isaacs, Joe Petrone, Geoffrey Wall, Faizal Iqbal, Xiuwen Liu, and Simon Foo Department of Electrical and Computer Engineering Florida A&M - Florida
More informationProvably weak instances of Ring-LWE revisited
Provably weak instances of Ring-LWE revisited Wouter Castryck 1,2, Ilia Iliashenko 1, Frederik Vercauteren 1,3 1 COSIC, KU Leuven 2 Ghent University 3 Open Security Research EUROCRYPT, May 9, 2016 Provably
More informationRecommender Systems TIETS43 Collaborative Filtering
+ Recommender Systems TIETS43 Collaborative Filtering Fall 2017 Kostas Stefanidis kostas.stefanidis@uta.fi https://coursepages.uta.fi/tiets43/ selection Amazon generates 35% of their sales through recommendations
More informationColor Constancy Using Standard Deviation of Color Channels
2010 International Conference on Pattern Recognition Color Constancy Using Standard Deviation of Color Channels Anustup Choudhury and Gérard Medioni Department of Computer Science University of Southern
More informationA Study On Preprocessing A Mammogram Image Using Adaptive Median Filter
A Study On Preprocessing A Mammogram Image Using Adaptive Median Filter Dr.K.Meenakshi Sundaram 1, D.Sasikala 2, P.Aarthi Rani 3 Associate Professor, Department of Computer Science, Erode Arts and Science
More informationImage Searches, Abstraction, Invariance : Data Mining 8 September 2008
Image Searches, Abstraction, Invariance 36-350: Data Mining 8 September 2008 1 Medical: x-rays, brain imaging, histology ( do these look like cancerous cells? ) Satellite imagery Fingerprints Finding illustrations
More informationGame Theory. Problem data representing the situation are constant. They do not vary with respect to time or any other basis.
Game Theory For effective decision making. Decision making is classified into 3 categories: o Deterministic Situation: o o Problem data representing the situation are constant. They do not vary with respect
More informationStudy guide for Graduate Computer Vision
Study guide for Graduate Computer Vision Erik G. Learned-Miller Department of Computer Science University of Massachusetts, Amherst Amherst, MA 01003 November 23, 2011 Abstract 1 1. Know Bayes rule. What
More information