{"title":"Secure Integer Comparison Protocol For ML-based Disease Diagnosis In MHN With Energy Efficient Edge Computing","authors":"Sona Alex, Kirubai Dhanaraj, P. Deepthi","doi":"10.1109/CISS53076.2022.9751179","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751179","url":null,"abstract":"The benefits that MHN offers to healthcare services are not fully garnered due to concerns on privacy and security of sensitive medical data. Severe constraints on battery capacity and computing resources at the edge devices of MHN impose restrictions in deploying strong secure systems. Medical data need to be stored, communicated, and processed securely in real-time. Homomorphic encryption help to perform linear operations securely on the encrypted data. More complicated operations like ML-based disease diagnosis require nonlinear operations such as integer comparison. Hence a secure multiparty computation over homomorphically encrypted data is required for secure integer comparison. However, comparison protocols available in the literature use energy-hungry public-key cryptosystems. This article presents the design of an energy-efficient additively homomorphic modified Rivest scheme (AHMRS) to support secure integer comparison protocol (SICP-AHMRS), which facilitates fast and energy-efficient ML-based disease diagnosis. The proposed SICP-AHMRS guarantees the privacy of the data being compared. The experiments using the Raspberry Pi 3B+ board show that the energy consumption, processing delay, and bandwidth efficiency of the proposed SICP-AHMRS are much better than those of the existing schemes.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134590428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning and generalization of one-hidden-layer neural networks, going beyond standard Gaussian data","authors":"Hongkang Li, Shuai Zhang, M. Wang","doi":"10.1109/CISS53076.2022.9751184","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751184","url":null,"abstract":"This paper analyzes the convergence and generalization of training a one-hidden-layer neural network when the input features follow the Gaussian mixture model consisting of a finite number of Gaussian distributions. Assuming the labels are generated from a teacher model with an unknown ground truth weight, the learning problem is to estimate the underlying teacher model by minimizing a non-convex risk function over a student neural network. With a finite number of training samples, referred to the sample complexity, the iterations are proved to converge linearly to a critical point with guaranteed generalization error. In addition, for the first time, this paper characterizes the impact of the input distributions on the sample complexity and the learning rate.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131262258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fairness in Sensor Detection Systems","authors":"Benedito J. B. Fonseca","doi":"10.1109/CISS53076.2022.9751155","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751155","url":null,"abstract":"Considering a sensor system to detect the occurrence of an emitter in multiple communities, this paper discusses the issue of fairness in such systems. Fairness can be an issue because sensor detection systems can be configured in multiple ways and the resulting detection performance can vary from community to community. In this paper, we argue for a framework based on max-min envy-free fairness; and we show that there are conditions when it is possible to design distributed detection systems that are max-min envy-free fair. We discuss the loss of detection power in a fair system and we propose a procedure to allocate sensors to reduce the loss of detection power and design a max-min envy-free fair system.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124925660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Convergence of Hybrid Federated Learning with Server-Clients Collaborative Training","authors":"Kun Yang, Cong Shen","doi":"10.1109/CISS53076.2022.9751161","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751161","url":null,"abstract":"State-of-the-art federated learning (FL) paradigms utilize data collected and stored in massively distributed clients to train a global machine learning (ML) model, in which local datasets never leave the devices and the server performs simple model aggregation for better privacy protection. In reality, however, the parameter server often has access to certain (possibly small) amount of data, and it is computationally more powerful than the clients. This work focuses on analyzing the convergence behavior of hybrid federated learning that leverages the server dataset and its computation power for collaborative model training. Different from standard FL where stochastic gradient descent (SGD) is always computed in a parallel fashion across all clients, this architecture enjoys both parallel SGD at clients and sequential SGD at the server, by using the aggregated model from clients as a new starting point for server SGD. The main contribution of this work is the convergence rate upper bounds of this aggregate-then-advance hybrid FL design. In particular, when the local SGD keeps an $mathcal{O}(1/t)$ stepsize, the server SGD must adjust its stepsize to scale no slower than $mathcal{O}(1/t^{2})$ to strictly outperform local SGD with strongly convex loss functions. Numerical experiments are carried out using standard FL tasks, where the accuracy and convergence rate advantages over clients-only (FEDAVG) and server-only training are demonstrated.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125433066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Designated Receiver Authentication-Codes with Information-Theoretic Security","authors":"Takenobu Seito, Junji Shikata, Yohei Watanabe","doi":"10.1109/CISS53076.2022.9751164","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751164","url":null,"abstract":"A multi-designated receiver authentication code (MDRA-code) with information-theoretic security is proposed as an extension of the traditional multi-receiver authentication code. The purpose of the MDRA-code is to securely transmit a message via a broadcast channel from a single sender to an arbitrary subset of multiple receivers that have been designated by the sender, and only the receivers in the subset (i.e., not all receivers) should accept the message if an adversary is absent. This paper proposes a model and security formalization of MDRA-codes, and provides constructions of MDRA-codes.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116823073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural Language Modeling of Unstructured Clinical Notes for Automated Patient Phenotyping","authors":"Akshara Prabhakar, S. Shidharth, Sowmya S Kamath","doi":"10.1109/CISS53076.2022.9751198","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751198","url":null,"abstract":"The availability of huge volume and variety of healthcare data provides a wide scope for designing cutting-edge clinical decision support systems (CDSS) that can improve the quality of patient care. Identifying patients suffering from certain conditions/symptoms, commonly referred to as phenotyping, is a fundamental problem that can be addressed using the rich health-related data collected for generation of Electronic Health Records (EHRs). Phenotyping forms the foundation for translational research, effectiveness studies, and is used for analyzing population health using regularly collected EHR data. Also, determining if a patient has a particular medical condition is crucial for secondary analysis, such as in critical care situations to predict potential drug interactions and adverse events. In this paper, we consider all categories of unstructured clinical notes of patients, typically stored as part of EHRs in the raw form. The standard MIMIC-III dataset is considered for benchmark experiments for patient phenotyping. Experiments revealed that our proposed models outperformed state-of-the art works built on vanilla BERT & ClinicalBERT models on the patient cohort considered, measured in terms of standard multi-label classification metrics like AUROC score (improvement by 6%), F1-score (by 4%), and Hamming Loss (by 17%) when we considered only patient discharge summaries and radiology notes. Further experiments with other note categories showed that using discharge summaries and physician notes yields significant improvements on the entire dataset giving 0.8 AUROC score, 0.72 F1 score, 0.09 Hamming loss.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131229434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Policy Gradient for Ratio Optimization: A Case Study","authors":"Wesley A. Suttle, Alec Koppel, Ji Liu","doi":"10.1109/CISS53076.2022.9751163","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751163","url":null,"abstract":"We consider policy gradient methods for ratio optimization problems by way of an illustrative case study: maximizing the Omega ratio of a financial portfolio. We propose a general framework for ratio optimization in sequential decision-making problems, explore the notion of hidden quasiconcavity in such problems, and propose an actor-critic algorithm for the Omega ratio problem. Our central contribution is to show that the algorithm converges almost surely to (a neighborhood of) a global optimum and to demonstrate its performance in practice.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130967640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Doubly Pessimistic Algorithms for Strictly Safe Off-Policy Optimization","authors":"Sanae Amani, Lin F. Yang","doi":"10.1109/CISS53076.2022.9751158","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751158","url":null,"abstract":"We study offline reinforcement learning (RL) in the presence of safety requirements: from a dataset collected a priori and without direct access to the true environment, learn an optimal policy that is guaranteed to respect the safety constraints. We address this problem by modeling the safety requirement as an unknown cost function of states and actions, whose expected value with respect to the policy must fall below a certain threshold. We then present an algorithm in the context of finite-horizon Markov decision processes (MDPs), termed Safe-DPVI that performs in a doubly pessimistic manner when 1) it constructs a conservative set of safe policies; and 2) when it selects a good policy from that conservative set. Without assuming the sufficient coverage of the dataset or any structure for the underlying MDPs, we establish a data-dependent upper bound on the suboptimality gap of the safe policy Safe-DPVI returns. We then specialize our results to linear MDPs with appropriate assumptions on dataset being well-explored. Both data-dependent and specialized bounds nearly match that of state-of-the-art unsafe offline RL algorithms, with an additional multiplicative factor $frac{Sigma_{h=1}^{H}alpha_{h}}{H}$, where αh characterizes the safety constraint at time-step $h$. We further present numerical simulations that corroborate our theoretical findings. A full version referred to as technical report of this paper is accessible at: https://offline-rl-neurips.github.io/2021/pdf/21.pdf","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116154572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of a Steganography-based System that Provides Protection for Breast Cancer Patient's Data","authors":"Sewar Khalifeh, Jude Georgi, Shatha Shakhatreh","doi":"10.1109/CISS53076.2022.9751183","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751183","url":null,"abstract":"In recent years, several data breach attacks have occurred in the healthcare systems. These attacks violated the confidentiality of the Health Information System (HIS) and resulted in the exposure of a massive number of medical records. This paper aims to provide protection and privacy to the breast cancer patients' data, by using digital mammograms as the cover image in the steganography process. The steganography method used is the Least Significant Bit (LSB) was enhanced by integrating cryptography of the medical data using Advanced Encryption Standard (AES) and RSA encryption for the secret key. Also, the K-Means algorithm is used in the segmentation process of the mammogram to choose the image segment that is used in the hiding process. This paper resulted in enhancing the Mean Squared Error (MSE) values in the Stego-Images to reach 0.00257 and the Peak Signal to Noise Ratio (PSNR) to reach 78.79652 with 0% loss or manipulation in the medical data.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129725410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sarah Parsons, Nathan P. Whitener, Sapana Bhandari, Natalia Khuri
{"title":"Interpretable Hierarchical Bayesian Modeling of Cell-Type Distributions in COVID-19 Disease","authors":"Sarah Parsons, Nathan P. Whitener, Sapana Bhandari, Natalia Khuri","doi":"10.1109/CISS53076.2022.9751177","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751177","url":null,"abstract":"High-throughput sequencing of ribonucleic acid molecules is used increasingly to understand gene expression in organs, tissues, and therapies, at a single-cell level. To facilitate the discovery of the heterogeneity and cell-specific factors of the COVID-19 disease, we use an interpretable computational approach that derives cell mixtures from peripheral blood mononuclear cells of healthy donors, and influenza, asymptomatic, mild and severe COVID-19 patients. Cell mixtures are generated using hierarchical Bayesian modeling and are subsequently used as features in the gradient boosting tree classifier. Balanced accuracy of five-fold cross-validation was 68%, significantly higher than expected by random chance. Moreover, 11 out of 19 donors' samples were classified accurately. The main advantage of the mixture-based approach compared to the traditional feature-based classification, is its ability to capture associations between genes as well as between cells.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"1949 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129208486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}