-
Improved Channel Coding Performance Through Cost Variability
Authors:
Adeel Mahmood,
Aaron B. Wagner
Abstract:
Channel coding for discrete memoryless channels (DMCs) with mean and variance cost constraints has been studied recently. In this work, we show that there is coding performance improvement due to the cost variability, both with feedback and without feedback. We demonstrate this improvement over the almost-sure cost constraint that prohibits any cost variation above a fixed threshold.
Channel coding for discrete memoryless channels (DMCs) with mean and variance cost constraints has been studied recently. In this work, we show that there is coding performance improvement due to the cost variability, both with feedback and without feedback. We demonstrate this improvement over the almost-sure cost constraint that prohibits any cost variation above a fixed threshold.
△ Less
Submitted 7 July, 2024;
originally announced July 2024.
-
A time-to-digital converter with steady calibration through single-photon detection
Authors:
Matías Rubén Bolaños Wagner,
Daniele Vogrig,
Paolo Villoresi,
Giuseppe Vallone,
Andrea Stanco
Abstract:
Time-to-Digital Converters (TDCs) are a crucial tool in a wide array of fields, in particular for quantum communication, where time taggers performance can severely affect the quality of the entire application. Nowadays, FPGA-based TDCs present a viable alternative to ASIC ones, once the nonlinear behaviour due to the intrinsic nature of the device is properly mitigated. To compensate said nonline…
▽ More
Time-to-Digital Converters (TDCs) are a crucial tool in a wide array of fields, in particular for quantum communication, where time taggers performance can severely affect the quality of the entire application. Nowadays, FPGA-based TDCs present a viable alternative to ASIC ones, once the nonlinear behaviour due to the intrinsic nature of the device is properly mitigated. To compensate said nonlinearities, a calibration procedure is required, usually based on an interpolation methods. Here we present the design and the demonstration of a TDC that is FPGA-based and showing a residual jitter of 27 ps, that is scalable for multichannel operation. The application in Quantum Key Distribution (QKD) is discussed with a unique calibration method based on the exploitation of single-photon detection that does not require to stop the data acquisition or to use any interpolation methods, thus increasing accuracy and removing data loss. The calibration was tested in a relevant environment, investigating the device behaviour between 5°C and 80°C. Moreover, our design is capable of continuously streaming up to 12 Mevents/s for up to ~1 week without the TDC overflowing.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
Accessing the Free Expansion and Melting of a Crystalline Drop of Charged Colloidal Spheres in a Particle-Free Environment by Optical Experiments
Authors:
Marcus Witt,
G. H. Philipp Nguyen,
Josefine R. von Puttkamer-Luerssen,
Can H. Yilderim,
Johannes A. B. Wagner,
Ebrahim Malek,
Sabrina Juretzka,
Jorge L. Meyrelles Jr.,
Maximilan Hofmann,
Hartmut Löwen,
Thomas Palberg
Abstract:
We address crystals of non-attractive colloidal spheres freely expanding into particle-free environ-ments and melting during dilution. This problem has been studied in two dimensions, both numeri-cally and in experiments on colloidal model crystals. Here, we place three-dimensional drops of aqueous colloidal charged sphere suspensions in a colloid-free, deionized aqueous environment. Initially in…
▽ More
We address crystals of non-attractive colloidal spheres freely expanding into particle-free environ-ments and melting during dilution. This problem has been studied in two dimensions, both numeri-cally and in experiments on colloidal model crystals. Here, we place three-dimensional drops of aqueous colloidal charged sphere suspensions in a colloid-free, deionized aqueous environment. Initially in a shear-molten state, they rapidly crystallize to a fine-grained polycrystalline material of body centred cubic structure. They stabilize their spherical shape within a few seconds. We over-come the challenges provided by drop turbidity and use a combination of optical methods to follow the drop evolution. The crystal ball shows a nearly fourfold increase of the volume followed by slow shrinkage due to melting, which is nearly linear in time. Exploiting coherent multiple-scattering by (110) Bragg reflecting crystals, time-dependent density profiles were recorded within the drop interior. These show a continuously flattening radial density gradient. Our experimental situation is close to the isothermal three-dimensional expansion of a spherical crystallite as described by a theoretical model based on dynamical density functional theory. We obtain an overall good agree-ment of measured and calculated expansion curves at most probed densities. We anticipate that our study opens novel experimental and theoretical access to a long-standing condensed matter issue.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
The Rate-Distortion-Perception Trade-off: The Role of Private Randomness
Authors:
Yassine Hamdi,
Aaron B. Wagner,
Deniz Gündüz
Abstract:
In image compression, with recent advances in generative modeling, the existence of a trade-off between the rate and the perceptual quality (realism) has been brought to light, where the realism is measured by the closeness of the output distribution to the source. It has been shown that randomized codes can be strictly better under a number of formulations. In particular, the role of common rando…
▽ More
In image compression, with recent advances in generative modeling, the existence of a trade-off between the rate and the perceptual quality (realism) has been brought to light, where the realism is measured by the closeness of the output distribution to the source. It has been shown that randomized codes can be strictly better under a number of formulations. In particular, the role of common randomness has been well studied. We elucidate the role of private randomness in the compression of a memoryless source $X^n=(X_1,...,X_n)$ under two kinds of realism constraints. The near-perfect realism constraint requires the joint distribution of output symbols $(Y_1,...,Y_n)$ to be arbitrarily close the distribution of the source in total variation distance (TVD). The per-symbol near-perfect realism constraint requires that the TVD between the distribution of output symbol $Y_t$ and the source distribution be arbitrarily small, uniformly in the index $t.$ We characterize the corresponding asymptotic rate-distortion trade-off and show that encoder private randomness is not useful if the compression rate is lower than the entropy of the source, however limited the resources in terms of common randomness and decoder private randomness may be.
△ Less
Submitted 1 April, 2024;
originally announced April 2024.
-
Low-Rate, Low-Distortion Compression with Wasserstein Distortion
Authors:
Yang Qiu,
Aaron B. Wagner
Abstract:
Wasserstein distortion is a one-parameter family of distortion measures that was recently proposed to unify fidelity and realism constraints. After establishing continuity results for Wasserstein in the extreme cases of pure fidelity and pure realism, we prove the first coding theorems for compression under Wasserstein distortion focusing on the regime in which both the rate and the distortion are…
▽ More
Wasserstein distortion is a one-parameter family of distortion measures that was recently proposed to unify fidelity and realism constraints. After establishing continuity results for Wasserstein in the extreme cases of pure fidelity and pure realism, we prove the first coding theorems for compression under Wasserstein distortion focusing on the regime in which both the rate and the distortion are small.
△ Less
Submitted 30 January, 2024;
originally announced January 2024.
-
Optimal Redundancy in Exact Channel Synthesis
Authors:
Sharang M. Sriramu,
Aaron B. Wagner
Abstract:
We consider the redundancy of the exact channel synthesis problem under an i.i.d. assumption. Existing results provide an upper bound on the unnormalized redundancy that is logarithmic in the block length. We show, via an improved scheme, that the logarithmic term can be halved for most channels and eliminated for all others. For full-support discrete memoryless channels, we show that this is the…
▽ More
We consider the redundancy of the exact channel synthesis problem under an i.i.d. assumption. Existing results provide an upper bound on the unnormalized redundancy that is logarithmic in the block length. We show, via an improved scheme, that the logarithmic term can be halved for most channels and eliminated for all others. For full-support discrete memoryless channels, we show that this is the best possible.
△ Less
Submitted 29 January, 2024;
originally announced January 2024.
-
Channel Coding with Mean and Variance Cost Constraints
Authors:
Adeel Mahmood,
Aaron B. Wagner
Abstract:
We consider channel coding for discrete memoryless channels (DMCs) with a novel cost constraint that constrains both the mean and the variance of the cost of the codewords. We show that the maximum (asymptotically) achievable rate under the new cost formulation is equal to the capacity-cost function; in particular, the strong converse holds. We further characterize the optimal second-order coding…
▽ More
We consider channel coding for discrete memoryless channels (DMCs) with a novel cost constraint that constrains both the mean and the variance of the cost of the codewords. We show that the maximum (asymptotically) achievable rate under the new cost formulation is equal to the capacity-cost function; in particular, the strong converse holds. We further characterize the optimal second-order coding rate of these cost-constrained codes; in particular, the optimal second-order coding rate is finite. We then show that the second-order coding performance is strictly improved with feedback using a new variation of timid/bold coding, significantly broadening the applicability of timid/bold coding schemes from unconstrained compound-dispersion channels to all cost-constrained channels. Equivalent results on the minimum average probability of error are also given.
△ Less
Submitted 12 May, 2024; v1 submitted 29 January, 2024;
originally announced January 2024.
-
Wasserstein Distortion: Unifying Fidelity and Realism
Authors:
Yang Qiu,
Aaron B. Wagner,
Johannes Ballé,
Lucas Theis
Abstract:
We introduce a distortion measure for images, Wasserstein distortion, that simultaneously generalizes pixel-level fidelity on the one hand and realism or perceptual quality on the other. We show how Wasserstein distortion reduces to a pure fidelity constraint or a pure realism constraint under different parameter choices and discuss its metric properties. Pairs of images that are close under Wasse…
▽ More
We introduce a distortion measure for images, Wasserstein distortion, that simultaneously generalizes pixel-level fidelity on the one hand and realism or perceptual quality on the other. We show how Wasserstein distortion reduces to a pure fidelity constraint or a pure realism constraint under different parameter choices and discuss its metric properties. Pairs of images that are close under Wasserstein distortion illustrate its utility. In particular, we generate random textures that have high fidelity to a reference texture in one location of the image and smoothly transition to an independent realization of the texture as one moves away from this point. Wasserstein distortion attempts to generalize and unify prior work on texture generation, image realism and distortion, and models of the early human visual system, in the form of an optimizable metric in the mathematical sense.
△ Less
Submitted 28 March, 2024; v1 submitted 5 October, 2023;
originally announced October 2023.
-
Counterion-controlled phase equilibria in a charge-regulated polymer solution
Authors:
Giulia L. Celora,
Ralf Blossey,
Andreas Münch,
Barbara Wagner
Abstract:
We study phase equilibria in a minimal model of charge-regulated polymer solutions. Our model consists of a single polymer species whose charge state arises from protonation-deprotonation processes in the presence of a dissolved acid, whose anions serve as screening counterions. We explicitly account for variability in the polymers' charge states. Homogeneous equilibria in this model system are ch…
▽ More
We study phase equilibria in a minimal model of charge-regulated polymer solutions. Our model consists of a single polymer species whose charge state arises from protonation-deprotonation processes in the presence of a dissolved acid, whose anions serve as screening counterions. We explicitly account for variability in the polymers' charge states. Homogeneous equilibria in this model system are characterised by the total concentration of polymers, the concentration of counter-ions and the charge distributions of polymers which can be computed with the help of analytical approximations. We use these analytical results to characterise how parameter values and solution acidity influence equilibrium charge distributions and identify for which regimes uni-modal and multi-modal charge distributions arise. We then study the interplay between charge regulation, solution acidity and phase separation. We find that charge regulation has a significant impact on polymer solubility and allows for non-linear responses to the solution acidity: re-entrant phase behaviour is possible in response to increasing solution acidity. Moreover, we show that phase separation can yield to the coexistence of local environments characterised by different charge distributions and mixture compositions.
△ Less
Submitted 7 July, 2023;
originally announced July 2023.
-
FIDO2 With Two Displays-Or How to Protect Security-Critical Web Transactions Against Malware Attacks
Authors:
Timon Hackenjos,
Benedikt Wagner,
Julian Herr,
Jochen Rill,
Marek Wehmer,
Niklas Goerke,
Ingmar Baumgart
Abstract:
With the rise of attacks on online accounts in the past years, more and more services offer two-factor authentication for their users. Having factors out of two of the three categories something you know, something you have and something you are should ensure that an attacker cannot compromise two of them at once. Thus, an adversary should not be able to maliciously interact with one's account. Ho…
▽ More
With the rise of attacks on online accounts in the past years, more and more services offer two-factor authentication for their users. Having factors out of two of the three categories something you know, something you have and something you are should ensure that an attacker cannot compromise two of them at once. Thus, an adversary should not be able to maliciously interact with one's account. However, this is only true if one considers a weak adversary. In particular, since most current solutions only authenticate a session and not individual transactions, they are noneffective if one's device is infected with malware. For online banking, the banking industry has long since identified the need for authenticating transactions. However, specifications of such authentication schemes are not public and implementation details vary wildly from bank to bank with most still being unable to protect against malware. In this work, we present a generic approach to tackle the problem of malicious account takeovers, even in the presence of malware. To this end, we define a new paradigm to improve two-factor authentication that involves the concepts of one-out-of-two security and transaction authentication. Web authentication schemes following this paradigm can protect security-critical transactions against manipulation, even if one of the factors is completely compromised. Analyzing existing authentication schemes, we find that they do not realize one-out-of-two security. We give a blueprint of how to design secure web authentication schemes in general. Based on this blueprint we propose FIDO2 With Two Displays (FIDO2D), a new web authentication scheme based on the FIDO2 standard and prove its security using Tamarin. We hope that our work inspires a new wave of more secure web authentication schemes, which protect security-critical transactions even against attacks with malware.
△ Less
Submitted 6 July, 2022; v1 submitted 27 June, 2022;
originally announced June 2022.
-
Do Neural Networks Compress Manifolds Optimally?
Authors:
Sourbh Bhadane,
Aaron B. Wagner,
Johannes Ballé
Abstract:
Artificial Neural-Network-based (ANN-based) lossy compressors have recently obtained striking results on several sources. Their success may be ascribed to an ability to identify the structure of low-dimensional manifolds in high-dimensional ambient spaces. Indeed, prior work has shown that ANN-based compressors can achieve the optimal entropy-distortion curve for some such sources. In contrast, we…
▽ More
Artificial Neural-Network-based (ANN-based) lossy compressors have recently obtained striking results on several sources. Their success may be ascribed to an ability to identify the structure of low-dimensional manifolds in high-dimensional ambient spaces. Indeed, prior work has shown that ANN-based compressors can achieve the optimal entropy-distortion curve for some such sources. In contrast, we determine the optimal entropy-distortion tradeoffs for two low-dimensional manifolds with circular structure and show that state-of-the-art ANN-based compressors fail to optimally compress them.
△ Less
Submitted 9 September, 2022; v1 submitted 17 May, 2022;
originally announced May 2022.
-
Federated Learning Enables Big Data for Rare Cancer Boundary Detection
Authors:
Sarthak Pati,
Ujjwal Baid,
Brandon Edwards,
Micah Sheller,
Shih-Han Wang,
G Anthony Reina,
Patrick Foley,
Alexey Gruzdev,
Deepthi Karkada,
Christos Davatzikos,
Chiharu Sako,
Satyam Ghodasara,
Michel Bilello,
Suyash Mohan,
Philipp Vollmuth,
Gianluca Brugnara,
Chandrakanth J Preetha,
Felix Sahm,
Klaus Maier-Hein,
Maximilian Zenk,
Martin Bendszus,
Wolfgang Wick,
Evan Calabrese,
Jeffrey Rudie,
Javier Villanueva-Meyer
, et al. (254 additional authors not shown)
Abstract:
Although machine learning (ML) has shown promise in numerous domains, there are concerns about generalizability to out-of-sample data. This is currently addressed by centrally sharing ample, and importantly diverse, data from multiple sites. However, such centralization is challenging to scale (or even not feasible) due to various limitations. Federated ML (FL) provides an alternative to train acc…
▽ More
Although machine learning (ML) has shown promise in numerous domains, there are concerns about generalizability to out-of-sample data. This is currently addressed by centrally sharing ample, and importantly diverse, data from multiple sites. However, such centralization is challenging to scale (or even not feasible) due to various limitations. Federated ML (FL) provides an alternative to train accurate and generalizable ML models, by only sharing numerical model updates. Here we present findings from the largest FL study to-date, involving data from 71 healthcare institutions across 6 continents, to generate an automatic tumor boundary detector for the rare disease of glioblastoma, utilizing the largest dataset of such patients ever used in the literature (25,256 MRI scans from 6,314 patients). We demonstrate a 33% improvement over a publicly trained model to delineate the surgically targetable tumor, and 23% improvement over the tumor's entire extent. We anticipate our study to: 1) enable more studies in healthcare informed by large and diverse data, ensuring meaningful results for rare diseases and underrepresented populations, 2) facilitate further quantitative analyses for glioblastoma via performance optimization of our consensus model for eventual public release, and 3) demonstrate the effectiveness of FL at such scale and task complexity as a paradigm shift for multi-site collaborations, alleviating the need for data sharing.
△ Less
Submitted 25 April, 2022; v1 submitted 22 April, 2022;
originally announced April 2022.
-
Functional Covering of Point Processes
Authors:
Nirmal V. Shende,
Aaron B. Wagner
Abstract:
We introduce a new distortion measure for point processes called functional-covering distortion. It is inspired by intensity theory and is related to both the covering of point processes and logarithmic loss distortion. We obtain the distortion-rate function with feedforward under this distortion measure for a large class of point processes. For Poisson processes, the rate-distortion function is o…
▽ More
We introduce a new distortion measure for point processes called functional-covering distortion. It is inspired by intensity theory and is related to both the covering of point processes and logarithmic loss distortion. We obtain the distortion-rate function with feedforward under this distortion measure for a large class of point processes. For Poisson processes, the rate-distortion function is obtained under a general condition called constrained functional-covering distortion, of which both covering and functional-covering are special cases. Also for Poisson processes, we characterize the rate-distortion region for a two-encoder CEO problem and show that feedforward does not enlarge this region.
△ Less
Submitted 19 April, 2022;
originally announced April 2022.
-
Modeling COVID-19 optimal testing strategies in long-term care facilities: An optimization-based approach
Authors:
Mansoor Davoodi,
Ana Batista,
Abhishek Senapati,
Weronika Schlechte-Welnicz,
Birgit Wagner,
Justin M. Calabrese
Abstract:
Long-term care facilities have been widely affected by the COVID-19 pandemic. Retirement homes are particularly vulnerable due to the higher mortality risk of infected elderly individuals. Once an outbreak occurs, suppressing the spread of the virus in retirement homes is challenging because the residents are in contact with each other, and isolation measures cannot be widely enforced. Regular tes…
▽ More
Long-term care facilities have been widely affected by the COVID-19 pandemic. Retirement homes are particularly vulnerable due to the higher mortality risk of infected elderly individuals. Once an outbreak occurs, suppressing the spread of the virus in retirement homes is challenging because the residents are in contact with each other, and isolation measures cannot be widely enforced. Regular testing strategies, on the other hand, have been shown to effectively prevent outbreaks in retirement homes. However, high frequency testing may consume substantial staff working time, which results in a trade-off between the time invested in testing, and the time spent providing essential care to residents. Thus, developing an optimal testing strategy is crucial to proactively detect infections while guaranteeing efficient use of limited staff time in these facilities. Although numerous efforts have been made to prevent the virus from spreading in long-term care facilities, this is the first study to develop testing strategies based on formal optimization methods. This paper proposes two novel optimization models for testing schedules. The models aim to minimize the risk of infection in retirement homes, considering the trade-off between the probability of infection and staff workload. We employ a probabilistic approach in conjunction with the optimization models, to compute the risk of infection, including contact rates, incidence status, and the probability of infection of the residents. To solve the models, we propose an enhanced local search algorithm by leveraging the symmetry property of the optimal solution. We perform several experiments with realistically sized instances and show that the proposed approach can derive optimal testing strategies.
△ Less
Submitted 5 April, 2022;
originally announced April 2022.
-
Exploration of Differentiability in a Proton Computed Tomography Simulation Framework
Authors:
Max Aehle,
Johan Alme,
Gergely Gábor Barnaföldi,
Johannes Blühdorn,
Tea Bodova,
Vyacheslav Borshchov,
Anthony van den Brink,
Viljar Eikeland,
Gregory Feofilov,
Christoph Garth,
Nicolas R. Gauger,
Ola Grøttvik,
Håvard Helstrup,
Sergey Igolkin,
Ralf Keidel,
Chinorat Kobdaj,
Tobias Kortus,
Lisa Kusch,
Viktor Leonhardt,
Shruti Mehendale,
Raju Ningappa Mulawade,
Odd Harald Odland,
George O'Neill,
Gábor Papp,
Thomas Peitzmann
, et al. (25 additional authors not shown)
Abstract:
Objective. Algorithmic differentiation (AD) can be a useful technique to numerically optimize design and algorithmic parameters by, and quantify uncertainties in, computer simulations. However, the effectiveness of AD depends on how "well-linearizable" the software is. In this study, we assess how promising derivative information of a typical proton computed tomography (pCT) scan computer simulati…
▽ More
Objective. Algorithmic differentiation (AD) can be a useful technique to numerically optimize design and algorithmic parameters by, and quantify uncertainties in, computer simulations. However, the effectiveness of AD depends on how "well-linearizable" the software is. In this study, we assess how promising derivative information of a typical proton computed tomography (pCT) scan computer simulation is for the aforementioned applications.
Approach. This study is mainly based on numerical experiments, in which we repeatedly evaluate three representative computational steps with perturbed input values. We support our observations with a review of the algorithmic steps and arithmetic operations performed by the software, using debugging techniques.
Main results. The model-based iterative reconstruction (MBIR) subprocedure (at the end of the software pipeline) and the Monte Carlo (MC) simulation (at the beginning) were piecewise differentiable. Jumps in the MBIR function arose from the discrete computation of the set of voxels intersected by a proton path. Jumps in the MC function likely arose from changes in the control flow that affect the amount of consumed random numbers. The tracking algorithm solves an inherently non-differentiable problem.
Significance. The MC and MBIR codes are ready for the integration of AD, and further research on surrogate models for the tracking subprocedure is necessary.
△ Less
Submitted 12 May, 2023; v1 submitted 11 February, 2022;
originally announced February 2022.
-
On One-Bit Quantization
Authors:
Sourbh Bhadane,
Aaron B. Wagner
Abstract:
We consider the one-bit quantizer that minimizes the mean squared error for a source living in a real Hilbert space. The optimal quantizer is a projection followed by a thresholding operation, and we provide methods for identifying the optimal direction along which to project. As an application of our methods, we characterize the optimal one-bit quantizer for a continuous-time random process that…
▽ More
We consider the one-bit quantizer that minimizes the mean squared error for a source living in a real Hilbert space. The optimal quantizer is a projection followed by a thresholding operation, and we provide methods for identifying the optimal direction along which to project. As an application of our methods, we characterize the optimal one-bit quantizer for a continuous-time random process that exhibits low-dimensional structure. We numerically show that this optimal quantizer is found by a neural-network-based compressor trained via stochastic gradient descent.
△ Less
Submitted 10 February, 2022;
originally announced February 2022.
-
Minimax Rate-Distortion
Authors:
Adeel Mahmood,
Aaron B. Wagner
Abstract:
We show the existence of variable-rate rate-distortion codes that meet the disortion constraint almost surely and are minimax, i.e., strongly, universal with respect to an unknown source distribution and a distortion measure that is revealed only to the encoder and only at runtime. If we only require minimax universality with respect to the source distribution and not the distortion measure, then…
▽ More
We show the existence of variable-rate rate-distortion codes that meet the disortion constraint almost surely and are minimax, i.e., strongly, universal with respect to an unknown source distribution and a distortion measure that is revealed only to the encoder and only at runtime. If we only require minimax universality with respect to the source distribution and not the distortion measure, then we provide an achievable $\tilde{O}(1/\sqrt{n})$ redundancy rate, which we show is optimal. This is in contrast to prior work on universal lossy compression, which provides $O(\log n/n)$ redundancy guarantees for weakly universal codes under various regularity conditions. We show that either eliminating the regularity conditions or upgrading to strong universality while keeping these regularity conditions entails an inevitable increase in the redundancy to $\tilde{O}(1/\sqrt{n})$. Our construction involves random coding with non-i.i.d.\ codewords and a zero-rate uncoded transmission scheme. The proof uses exact asymptotics from large deviations, acceptance-rejection sampling, and the VC dimension of distortion measures.
△ Less
Submitted 27 November, 2022; v1 submitted 9 February, 2022;
originally announced February 2022.
-
Efficiently Computable Converses for Finite-Blocklength Communication
Authors:
Felipe Areces,
Dan Song,
Richard Wesel,
Aaron B. Wagner
Abstract:
This paper presents a method for computing a finite-blocklength converse for the rate of fixed-length codes with feedback used on discrete memoryless channels (DMCs). The new converse is expressed in terms of a stochastic control problem whose solution can be efficiently computed using dynamic programming and Fourier methods. For channels such as the binary symmetric channel (BSC) and binary erasu…
▽ More
This paper presents a method for computing a finite-blocklength converse for the rate of fixed-length codes with feedback used on discrete memoryless channels (DMCs). The new converse is expressed in terms of a stochastic control problem whose solution can be efficiently computed using dynamic programming and Fourier methods. For channels such as the binary symmetric channel (BSC) and binary erasure channel (BEC), the accuracy of the proposed converse is similar to that of existing special-purpose converse bounds, but the new converse technique can be applied to arbitrary DMCs. We provide example applications of the new converse technique to the binary asymmetric channel (BAC) and the quantized amplitude-constrained AWGN channel.
△ Less
Submitted 8 February, 2022;
originally announced February 2022.
-
The Rate-Distortion-Perception Tradeoff: The Role of Common Randomness
Authors:
Aaron B. Wagner
Abstract:
A rate-distortion-perception (RDP) tradeoff has recently been proposed by Blau and Michaeli and also Matsumoto. Focusing on the case of perfect realism, which coincides with the problem of distribution-preserving lossy compression studied by Li et al., a coding theorem for the RDP tradeoff that allows for a specified amount of common randomness between the encoder and decoder is provided. The exis…
▽ More
A rate-distortion-perception (RDP) tradeoff has recently been proposed by Blau and Michaeli and also Matsumoto. Focusing on the case of perfect realism, which coincides with the problem of distribution-preserving lossy compression studied by Li et al., a coding theorem for the RDP tradeoff that allows for a specified amount of common randomness between the encoder and decoder is provided. The existing RDP tradeoff is recovered by allowing for the amount of common randomness to be infinite. The quadratic Gaussian case is examined in detail.
△ Less
Submitted 8 February, 2022;
originally announced February 2022.
-
The electric double layer at the interface between a polyelectrolyte gel and salt bath
Authors:
Matthew G. Hennessy,
Giulia L. Celora,
Andreas Münch,
Barbara Wagner,
Sarah L. Waters
Abstract:
The electric double layer (EDL) that forms at the interface between a polyelectrolyte gel and a salt bath is studied using asymptotic and numerical methods. Specifically, matched asymptotic expansions, based on the smallness of the Debye length relative to the typical gel dimensions, are used to construct solutions of the governing equations and derive electroneutral models with consistent jump co…
▽ More
The electric double layer (EDL) that forms at the interface between a polyelectrolyte gel and a salt bath is studied using asymptotic and numerical methods. Specifically, matched asymptotic expansions, based on the smallness of the Debye length relative to the typical gel dimensions, are used to construct solutions of the governing equations and derive electroneutral models with consistent jump conditions across the gel-bath interface. A general approach for solving the equations of incompressible nonlinear elasticity in a curved boundary layer is developed and used to resolve the gel mechanics in the EDL. A critical feature of the model is that it accounts for phase separation within the gel, which gives rise to diffuse interfaces with a characteristic thickness described by the Kuhn length. We show that the solutions of the electroneutral model can only be asymptotically matched to the solutions in the EDL, in general, when the Kuhn length greatly exceeds the Debye length. Conversely, if the Debye length is similar to or larger than the Kuhn length, then the entire gel can self-organise into periodic, electrically charged domains via phase separation. The breakdown of electroneutrality demonstrates that the commonly invoked electroneutral assumption must be used with caution, as it generally only applies when the Debye length is much smaller than the Kuhn length.
△ Less
Submitted 27 January, 2022;
originally announced January 2022.
-
Neural-Symbolic Integration for Interactive Learning and Conceptual Grounding
Authors:
Benedikt Wagner,
Artur d'Avila Garcez
Abstract:
We propose neural-symbolic integration for abstract concept explanation and interactive learning. Neural-symbolic integration and explanation allow users and domain-experts to learn about the data-driven decision making process of large neural models. The models are queried using a symbolic logic language. Interaction with the user then confirms or rejects a revision of the neural model using logi…
▽ More
We propose neural-symbolic integration for abstract concept explanation and interactive learning. Neural-symbolic integration and explanation allow users and domain-experts to learn about the data-driven decision making process of large neural models. The models are queried using a symbolic logic language. Interaction with the user then confirms or rejects a revision of the neural model using logic-based constraints that can be distilled into the model architecture. The approach is illustrated using the Logic Tensor Network framework alongside Concept Activation Vectors and applied to a Convolutional Neural Network.
△ Less
Submitted 17 January, 2022; v1 submitted 22 December, 2021;
originally announced December 2021.
-
QU-BraTS: MICCAI BraTS 2020 Challenge on Quantifying Uncertainty in Brain Tumor Segmentation - Analysis of Ranking Scores and Benchmarking Results
Authors:
Raghav Mehta,
Angelos Filos,
Ujjwal Baid,
Chiharu Sako,
Richard McKinley,
Michael Rebsamen,
Katrin Datwyler,
Raphael Meier,
Piotr Radojewski,
Gowtham Krishnan Murugesan,
Sahil Nalawade,
Chandan Ganesh,
Ben Wagner,
Fang F. Yu,
Baowei Fei,
Ananth J. Madhuranthakam,
Joseph A. Maldjian,
Laura Daza,
Catalina Gomez,
Pablo Arbelaez,
Chengliang Dai,
Shuo Wang,
Hadrien Reynaud,
Yuan-han Mo,
Elsa Angelini
, et al. (67 additional authors not shown)
Abstract:
Deep learning (DL) models have provided state-of-the-art performance in various medical imaging benchmarking challenges, including the Brain Tumor Segmentation (BraTS) challenges. However, the task of focal pathology multi-compartment segmentation (e.g., tumor and lesion sub-regions) is particularly challenging, and potential errors hinder translating DL models into clinical workflows. Quantifying…
▽ More
Deep learning (DL) models have provided state-of-the-art performance in various medical imaging benchmarking challenges, including the Brain Tumor Segmentation (BraTS) challenges. However, the task of focal pathology multi-compartment segmentation (e.g., tumor and lesion sub-regions) is particularly challenging, and potential errors hinder translating DL models into clinical workflows. Quantifying the reliability of DL model predictions in the form of uncertainties could enable clinical review of the most uncertain regions, thereby building trust and paving the way toward clinical translation. Several uncertainty estimation methods have recently been introduced for DL medical image segmentation tasks. Developing scores to evaluate and compare the performance of uncertainty measures will assist the end-user in making more informed decisions. In this study, we explore and evaluate a score developed during the BraTS 2019 and BraTS 2020 task on uncertainty quantification (QU-BraTS) and designed to assess and rank uncertainty estimates for brain tumor multi-compartment segmentation. This score (1) rewards uncertainty estimates that produce high confidence in correct assertions and those that assign low confidence levels at incorrect assertions, and (2) penalizes uncertainty measures that lead to a higher percentage of under-confident correct assertions. We further benchmark the segmentation uncertainties generated by 14 independent participating teams of QU-BraTS 2020, all of which also participated in the main BraTS segmentation task. Overall, our findings confirm the importance and complementary value that uncertainty estimates provide to segmentation algorithms, highlighting the need for uncertainty quantification in medical image analyses. Finally, in favor of transparency and reproducibility, our evaluation code is made publicly available at: https://github.com/RagMeh11/QU-BraTS.
△ Less
Submitted 23 August, 2022; v1 submitted 19 December, 2021;
originally announced December 2021.
-
A Practical guide on Explainable AI Techniques applied on Biomedical use case applications
Authors:
Adrien Bennetot,
Ivan Donadello,
Ayoub El Qadi,
Mauro Dragoni,
Thomas Frossard,
Benedikt Wagner,
Anna Saranti,
Silvia Tulli,
Maria Trocan,
Raja Chatila,
Andreas Holzinger,
Artur d'Avila Garcez,
Natalia Díaz-Rodríguez
Abstract:
Last years have been characterized by an upsurge of opaque automatic decision support systems, such as Deep Neural Networks (DNNs). Although they have great generalization and prediction skills, their functioning does not allow obtaining detailed explanations of their behaviour. As opaque machine learning models are increasingly being employed to make important predictions in critical environments…
▽ More
Last years have been characterized by an upsurge of opaque automatic decision support systems, such as Deep Neural Networks (DNNs). Although they have great generalization and prediction skills, their functioning does not allow obtaining detailed explanations of their behaviour. As opaque machine learning models are increasingly being employed to make important predictions in critical environments, the danger is to create and use decisions that are not justifiable or legitimate. Therefore, there is a general agreement on the importance of endowing machine learning models with explainability. EXplainable Artificial Intelligence (XAI) techniques can serve to verify and certify model outputs and enhance them with desirable notions such as trustworthiness, accountability, transparency and fairness. This guide is meant to be the go-to handbook for any audience with a computer science background aiming at getting intuitive insights on machine learning models, accompanied with straight, fast, and intuitive explanations out of the box. This article aims to fill the lack of compelling XAI guide by applying XAI techniques in their particular day-to-day models, datasets and use-cases. Figure 1 acts as a flowchart/map for the reader and should help him to find the ideal method to use according to his type of data. In each chapter, the reader will find a description of the proposed method as well as an example of use on a Biomedical application and a Python notebook. It can be easily modified in order to be applied to specific applications.
△ Less
Submitted 5 September, 2022; v1 submitted 13 November, 2021;
originally announced November 2021.
-
Lossy Compression with Universal Distortion
Authors:
Adeel Mahmood,
Aaron B. Wagner
Abstract:
We consider a novel variant of $d$-semifaithful lossy coding in which the distortion measure is revealed only to the encoder and only at run-time, as well as an extension of it in which the distortion constraint $d$ is also revealed at run-time. Two forms of rate redundancy are used to analyze the performance, and achievability results of both a pointwise and minimax nature are demonstrated. The f…
▽ More
We consider a novel variant of $d$-semifaithful lossy coding in which the distortion measure is revealed only to the encoder and only at run-time, as well as an extension of it in which the distortion constraint $d$ is also revealed at run-time. Two forms of rate redundancy are used to analyze the performance, and achievability results of both a pointwise and minimax nature are demonstrated. The first coding scheme uses ideas from VC dimension and growth functions, the second uses appropriate quantization of the space of distortion measures, and the third relies on a random coding argument.
△ Less
Submitted 4 October, 2022; v1 submitted 13 October, 2021;
originally announced October 2021.
-
Sharp-interface problem of the Ohta-Kawasaki model for symmetric diblock copolymers
Authors:
Amlan K. Barua,
Ray Chew,
Shuwang Li,
John Lowengrub,
Andreas Münch,
Barbara Wagner
Abstract:
The Ohta-Kawasaki model for diblock-copolymers is well known to the scientific community of diffuse-interface methods. To accurately capture the long-time evolution of the moving interfaces, we present a derivation of the corresponding sharp-interface limit using matched asymptotic expansions, and show that the limiting process leads to a Hele-Shaw type moving interface problem. The numerical trea…
▽ More
The Ohta-Kawasaki model for diblock-copolymers is well known to the scientific community of diffuse-interface methods. To accurately capture the long-time evolution of the moving interfaces, we present a derivation of the corresponding sharp-interface limit using matched asymptotic expansions, and show that the limiting process leads to a Hele-Shaw type moving interface problem. The numerical treatment of the sharp-interface limit is more complicated due to the stiffness of the equations. To address this problem, we present a boundary integral formulation corresponding to a sharp interface limit of the Ohta-Kawasaki model. Starting with the governing equations defined on separate phase domains, we develop boundary integral equations valid for multi-connected domains in a 2D plane. For numerical simplicity we assume our problem is driven by a uniform Dirichlet condition on a circular far-field boundary. The integral formulation of the problem involves both double- and single-layer potentials due to the modified boundary condition. In particular, our formulation allows one to compute the nonlinear dynamics of a non-equilibrium system and pattern formation of an equilibrating system. Numerical tests on an evolving slightly perturbed circular interface (separating the two phases) are in excellent agreement with the linear analysis, demonstrating that the method is stable, efficient and spectrally accurate in space.
△ Less
Submitted 9 July, 2021;
originally announced July 2021.
-
Principal Bit Analysis: Autoencoding with Schur-Concave Loss
Authors:
Sourbh Bhadane,
Aaron B. Wagner,
Jayadev Acharya
Abstract:
We consider a linear autoencoder in which the latent variables are quantized, or corrupted by noise, and the constraint is Schur-concave in the set of latent variances. Although finding the optimal encoder/decoder pair for this setup is a nonconvex optimization problem, we show that decomposing the source into its principal components is optimal. If the constraint is strictly Schur-concave and the…
▽ More
We consider a linear autoencoder in which the latent variables are quantized, or corrupted by noise, and the constraint is Schur-concave in the set of latent variances. Although finding the optimal encoder/decoder pair for this setup is a nonconvex optimization problem, we show that decomposing the source into its principal components is optimal. If the constraint is strictly Schur-concave and the empirical covariance matrix has only simple eigenvalues, then any optimal encoder/decoder must decompose the source in this way. As one application, we consider a strictly Schur-concave constraint that estimates the number of bits needed to represent the latent variables under fixed-rate encoding, a setup that we call \emph{Principal Bit Analysis (PBA)}. This yields a practical, general-purpose, fixed-rate compressor that outperforms existing algorithms. As a second application, we show that a prototypical autoencoder-based variable-rate compressor is guaranteed to decompose the source into its principal components.
△ Less
Submitted 8 June, 2021; v1 submitted 5 June, 2021;
originally announced June 2021.
-
A kinetic model of a polyelectrolyte gel undergoing phase separation
Authors:
Giulia L. Celora,
Matthew G. Hennessy,
Andreas Münch,
Barbara Wagner,
Sarah L. Waters
Abstract:
In this study we use non-equilibrium thermodynamics to systematically derive a phase-field model of a polyelectrolyte gel coupled to a hydrodynamic model for a salt solution surrounding the gel. The governing equations for the gel account for the free energy of the internal interfaces which form upon phase separation, the nonlinear elasticity of the polyelectrolyte network, and multi-component dif…
▽ More
In this study we use non-equilibrium thermodynamics to systematically derive a phase-field model of a polyelectrolyte gel coupled to a hydrodynamic model for a salt solution surrounding the gel. The governing equations for the gel account for the free energy of the internal interfaces which form upon phase separation, the nonlinear elasticity of the polyelectrolyte network, and multi-component diffusive transport following a Stefan--Maxwell approach. The time-dependent model describes the evolution of the gel across multiple time and spatial scales and so is able to capture the large-scale solvent flux and the emergence of long-time pattern formation in the system. We explore the model for the case of a constrained gel undergoing uni-axial deformations. Numerical simulations show that rapid changes in the gel volume occur once the volume phase transition sets in, as well as the triggering of spinodal decomposition that leads to strong inhomogeneities in the lateral stresses, potentially leading to experimentally visible patterns.
△ Less
Submitted 28 May, 2021;
originally announced May 2021.
-
The dynamics of a collapsing polyelectrolyte gel
Authors:
Giulia L. Celora,
Matthew G. Hennessy,
Andreas Münch,
Barbara Wagner,
Sarah L. Waters
Abstract:
We analyse the dynamics of different routes to collapse of a constrained polyelectrolyte gel in contact with an ionic bath. The evolution of the gel is described by a model that incorporates non-linear elasticity, Stefan-Maxwell diffusion and interfacial gradient free energy to account for phase separation of the gel. A bifurcation analysis of the homogeneous equilibrium states reveals three solut…
▽ More
We analyse the dynamics of different routes to collapse of a constrained polyelectrolyte gel in contact with an ionic bath. The evolution of the gel is described by a model that incorporates non-linear elasticity, Stefan-Maxwell diffusion and interfacial gradient free energy to account for phase separation of the gel. A bifurcation analysis of the homogeneous equilibrium states reveals three solution branches at low ion concentrations in the bath, giving way to only one above a critical ion concentration. We present numerical solutions that capture both the spatial heterogeneity and the multiple time-scales involved in the process of collapse. These solutions are complemented by two analytical studies. Firstly, a phase-plane analysis that reveals the existence of a depletion front for the transition from the highly swollen to the new collapsed equilibrium state. This depletion front is initiated after the fast ionic diffusion has set the initial condition for this time regime. Secondly, we perform a linear stability analysis about the homogeneous states that show that for a range of ion concentrations in the bath, spinodal decomposition of the swollen state gives rise to localized solvent-rich(poor) and, due to the electro-neutrality condition, ion-poor(rich) phases that coarsen on the route to collapse. This dynamics of a collapsing polyelectrolyte gel has not been described before.
△ Less
Submitted 13 May, 2021;
originally announced May 2021.
-
A coding theorem for the rate-distortion-perception function
Authors:
Lucas Theis,
Aaron B. Wagner
Abstract:
The rate-distortion-perception function (RDPF; Blau and Michaeli, 2019) has emerged as a useful tool for thinking about realism and distortion of reconstructions in lossy compression. Unlike the rate-distortion function, however, it is unknown whether encoders and decoders exist that achieve the rate suggested by the RDPF. Building on results by Li and El Gamal (2018), we show that the RDPF can in…
▽ More
The rate-distortion-perception function (RDPF; Blau and Michaeli, 2019) has emerged as a useful tool for thinking about realism and distortion of reconstructions in lossy compression. Unlike the rate-distortion function, however, it is unknown whether encoders and decoders exist that achieve the rate suggested by the RDPF. Building on results by Li and El Gamal (2018), we show that the RDPF can indeed be achieved using stochastic, variable-length codes. For this class of codes, we also prove that the RDPF lower-bounds the achievable rate
△ Less
Submitted 28 April, 2021;
originally announced April 2021.
-
Ge thin-films with tantalum diffusion-barriers for use in Nb-based superconductor technology
Authors:
C. Kopas,
S. Zhang,
J. Gonzales,
D. R. Queen,
B. Wagner,
R. W. Carpenter,
N. Newman
Abstract:
Germanium thin films are an excellent candidate for use as a low-loss dielectric in superconducting microwave resonators, a low-loss inter-layer metal wiring dielectric, and passivation layers in microwave and Josephson junction devices. In Ge/Nb structures deposited at 400 °C, we observe intermixing over as much as 20 nm. The addition of a 10 nm Ta diffusion barrier layer reduces the superconduct…
▽ More
Germanium thin films are an excellent candidate for use as a low-loss dielectric in superconducting microwave resonators, a low-loss inter-layer metal wiring dielectric, and passivation layers in microwave and Josephson junction devices. In Ge/Nb structures deposited at 400 °C, we observe intermixing over as much as 20 nm. The addition of a 10 nm Ta diffusion barrier layer reduces the superconductor/dielectric intermixing to less than 5 nm and enhances the structural properties of deposited a-Ge layers based on Raman spectroscopy. Additionally, superconducting microwave resonators fabricated at room-temperature on crystalline Ge substrates with a Ta barrier layer show marked improvement in total and power-dependent two-level system microwave losses.
△ Less
Submitted 26 April, 2021;
originally announced April 2021.
-
In-flight positional and energy use data set of a DJI Matrice 100 quadcopter for small package delivery
Authors:
Thiago A. Rodrigues,
Jay Patrikar,
Arnav Choudhry,
Jacob Feldgoise,
Vaibhav Arcot,
Aradhana Gahlaut,
Sophia Lau,
Brady Moon,
Bastian Wagner,
H. Scott Matthews,
Sebastian Scherer,
Constantine Samaras
Abstract:
We autonomously direct a small quadcopter package delivery Uncrewed Aerial Vehicle (UAV) or "drone" to take off, fly a specified route, and land for a total of 209 flights while varying a set of operational parameters. The vehicle was equipped with onboard sensors, including GPS, IMU, voltage and current sensors, and an ultrasonic anemometer, to collect high-resolution data on the inertial states,…
▽ More
We autonomously direct a small quadcopter package delivery Uncrewed Aerial Vehicle (UAV) or "drone" to take off, fly a specified route, and land for a total of 209 flights while varying a set of operational parameters. The vehicle was equipped with onboard sensors, including GPS, IMU, voltage and current sensors, and an ultrasonic anemometer, to collect high-resolution data on the inertial states, wind speed, and power consumption. Operational parameters, such as commanded ground speed, payload, and cruise altitude, are varied for each flight. This large data set has a total flight time of 10 hours and 45 minutes and was collected from April to October of 2019 covering a total distance of approximately 65 kilometers. The data collected were validated by comparing flights with similar operational parameters. We believe these data will be of great interest to the research and industrial communities, who can use the data to improve UAV designs, safety, and energy efficiency, as well as advance the physical understanding of in-flight operations for package delivery drones.
△ Less
Submitted 24 March, 2021;
originally announced March 2021.
-
A Practical Coding Scheme for the BSC with Feedback
Authors:
Ke Wu,
Aaron B. Wagner
Abstract:
We provide a practical implementation of the rubber method of Ahlswede et al. for binary alphabets. The idea is to create the "skeleton" sequence therein via an arithmetic decoder designed for a particular $k$-th order Markov chain. For the stochastic binary symmetric channel, we show that the scheme is nearly optimal in a strong sense for certain parameters.
We provide a practical implementation of the rubber method of Ahlswede et al. for binary alphabets. The idea is to create the "skeleton" sequence therein via an arithmetic decoder designed for a particular $k$-th order Markov chain. For the stochastic binary symmetric channel, we show that the scheme is nearly optimal in a strong sense for certain parameters.
△ Less
Submitted 3 February, 2021;
originally announced February 2021.
-
Low microwave loss in deposited Si and Ge thin-film dielectrics at single-photon power and low temperatures
Authors:
Cameron J. Kopas,
Justin Gonzales,
Shengke Zhang,
Daniel R. Queen,
Brian Wagner,
Mac Robinson,
James Huffman,
Nate Newman
Abstract:
Our study shows that deposited Ge and Si dielectric thin-films can exhibit low microwave losses at near single-photon powers and sub-Kelvin temperatures ($\approx$40 mK). This low loss enables their use in a wide range of devices, including low-loss coplanar, microstrip, and stripline resonators, as well as layers for device isolation, inter-wiring dielectrics, and passivation in microwave and Jos…
▽ More
Our study shows that deposited Ge and Si dielectric thin-films can exhibit low microwave losses at near single-photon powers and sub-Kelvin temperatures ($\approx$40 mK). This low loss enables their use in a wide range of devices, including low-loss coplanar, microstrip, and stripline resonators, as well as layers for device isolation, inter-wiring dielectrics, and passivation in microwave and Josephson junction circuit fabrication. We use coplanar microwave resonator structures with narrow trace widths of 2-16 $μ\textrm{m}$ to maximize the sensitivity of loss tangent measurements to the interface and properties of the deposited dielectrics, rather than to optimize the quality factor. In this configuration, thermally-evaporated $\approx 1 μ\textrm{m}$ thick amorphous germanium (a-Ge) films deposited on Si (100) have a single photon loss tangent of $1-2\times10^{-6}$ and, $9 μ\textrm{m}$-thick chemical vapor deposited (CVD) homoepitaxial Si has a single photon loss tangent of $0.6-2\times 10^{-5}$. Interface contamination limits the loss in these devices.
△ Less
Submitted 6 April, 2021; v1 submitted 19 November, 2020;
originally announced November 2020.
-
Characterization of the Chemical and Electrical Properties of Defects at the Niobium-Silicon Interface
Authors:
Cameron Kopas,
Madhu Krishna Murthy,
Christopher Gregory,
Bryan Ibarra Mercado,
Daniel R. Queen,
Brian Wagner,
Nathan Newman
Abstract:
The nature and concentration of defects near niobium-silicon interfaces prepared with different silicon surface treatments were characterized using current-voltage (I-V), deep level transient spectroscopy (DLTS), and secondary ion mass spectroscopy (SIMS). All samples have H, C, O, F, and Cl chemical contamination in the Si within 50 nm of the interface and electrically active defects with activat…
▽ More
The nature and concentration of defects near niobium-silicon interfaces prepared with different silicon surface treatments were characterized using current-voltage (I-V), deep level transient spectroscopy (DLTS), and secondary ion mass spectroscopy (SIMS). All samples have H, C, O, F, and Cl chemical contamination in the Si within 50 nm of the interface and electrically active defects with activation energies of 0.147, 0.247, 0.339, and 0.556 eV above the valence band maximum (E$_{vbm}$). In all cases, the deep level defect concentration is dominated by the hole trap at E$_{vbm}$ + 0.556eV, which we assign to a Nb point defect in Si, presumably Nb$_\textrm{Si}$. This defect is present with concentrations ranging from $7\times10^{13}$ to $5\times10^{14}$ cm$^{-3}$ and depends on the final surface clean process.
The optimum surface treatment used in this study is an HF etch followed by an in-situ 100 eV Ar-gas ion milling process. Higher energy ion milling is found to increase the electrically active Nb defect concentration in the Si, and increase the concentration of defects. The HF etch alone removes O from the interface, but results in significant H and F contamination, electrically-active point defect concentrations, and levels of Shockley-Reed-Hall recombination (i.e. Nb/Si Schottky diodes with an ideality factor, n, of $\approx$ 1.6). The RCA clean increases the depth and concentration of H, F, C, and Nb contamination.
△ Less
Submitted 16 November, 2020;
originally announced November 2020.
-
Neural Networks Optimally Compress the Sawbridge
Authors:
Aaron B. Wagner,
Johannes Ballé
Abstract:
Neural-network-based compressors have proven to be remarkably effective at compressing sources, such as images, that are nominally high-dimensional but presumed to be concentrated on a low-dimensional manifold. We consider a continuous-time random process that models an extreme version of such a source, wherein the realizations fall along a one-dimensional "curve" in function space that has infini…
▽ More
Neural-network-based compressors have proven to be remarkably effective at compressing sources, such as images, that are nominally high-dimensional but presumed to be concentrated on a low-dimensional manifold. We consider a continuous-time random process that models an extreme version of such a source, wherein the realizations fall along a one-dimensional "curve" in function space that has infinite-dimensional linear span. We precisely characterize the optimal entropy-distortion tradeoff for this source and show numerically that it is achieved by neural-network-based compressors trained via stochastic gradient descent. In contrast, we show both analytically and experimentally that compressors based on the classical Karhunen-Loève transform are highly suboptimal at high rates.
△ Less
Submitted 10 November, 2020;
originally announced November 2020.
-
(15-crown-5)BiI$_3$ as a Building Block for Halogen Bonded Supramolecular Aggregates
Authors:
Bettina Wagner,
Johanna Heine
Abstract:
We present the synthesis and characterization of (15-crown-5)BiI$_3$ (1) and (15-crown-5)BiI$_3$*0.5TIE (2), a halogen bonded adduct with tetraiodoethylene (TIE), a typical halogen bond donor. Our results show that crown ether complexes of main group metal halides can be employed as halogen bond acceptors for the synthesis of new supramolecular aggregates and highlight the significant interaction…
▽ More
We present the synthesis and characterization of (15-crown-5)BiI$_3$ (1) and (15-crown-5)BiI$_3$*0.5TIE (2), a halogen bonded adduct with tetraiodoethylene (TIE), a typical halogen bond donor. Our results show that crown ether complexes of main group metal halides can be employed as halogen bond acceptors for the synthesis of new supramolecular aggregates and highlight the significant interaction between the two building blocks.
△ Less
Submitted 9 October, 2020;
originally announced October 2020.
-
Ferroelectricity in AlScN: Switching, Imprint and sub-150 nm Films
Authors:
Simon Fichtner,
Georg Schönweger,
Tom-Niklas Kreutzer,
Fabian Lofink,
Adrian Petraru,
Hermann Kohlstedt,
Bernhard Wagner
Abstract:
The discovery of ferroelectricity in AlScN allowed the first clear observation of the effect in the wurtzite crystal structure, resulting in a material with a previously unprecedented combination of very large coercive fields (2-5 MV/cm) and remnant polarizations (70-110 $μ$C/cm$^2$). We obtained initial insight into the switching dynamics of AlScN, which suggests a domain wall motion limited proc…
▽ More
The discovery of ferroelectricity in AlScN allowed the first clear observation of the effect in the wurtzite crystal structure, resulting in a material with a previously unprecedented combination of very large coercive fields (2-5 MV/cm) and remnant polarizations (70-110 $μ$C/cm$^2$). We obtained initial insight into the switching dynamics of AlScN, which suggests a domain wall motion limited process progressing from the electrode interfaces. Further, imprint was generally observed in AlScN films and can tentatively be traced to the alignment of charged defects with the internal and external polarization and field, respectively. Potentially crucial from the application point of view, ferroelectricity could be observed in films with thicknesses below 30 nm - as the coercive fields of AlScN were found to be largely independent of thickness between 600 nm and 27 nm.
△ Less
Submitted 12 October, 2020;
originally announced October 2020.
-
Strong Asymptotic Composition Theorems for Mutual Information Measures
Authors:
Benjamin Wu,
Aaron B. Wagner,
Ibrahim Issa,
G. Edward Suh
Abstract:
We characterize the growth of the Sibson and Arimoto mutual informations and $α$-maximal leakage, of any order that is at least unity, between a random variable and a growing set of noisy, conditionally independent and identically-distributed observations of the random variable. Each of these measures increases exponentially fast to a limit that is order- and measure-dependent, with an exponent th…
▽ More
We characterize the growth of the Sibson and Arimoto mutual informations and $α$-maximal leakage, of any order that is at least unity, between a random variable and a growing set of noisy, conditionally independent and identically-distributed observations of the random variable. Each of these measures increases exponentially fast to a limit that is order- and measure-dependent, with an exponent that is order- and measure-independent.
△ Less
Submitted 20 November, 2021; v1 submitted 12 May, 2020;
originally announced May 2020.
-
A Case for Maximal Leakage as a Side Channel Leakage Metric
Authors:
Benjamin Wu,
Aaron B. Wagner,
G. Edward Suh
Abstract:
Side channels represent a broad class of security vulnerabilities that have been demonstrated to exist in many applications. Because completely eliminating side channels often leads to prohibitively high overhead, there is a need for a principled trade-off between cost and leakage. In this paper, we make a case for the use of maximal leakage to analyze such trade-offs. Maximal leakage is an operat…
▽ More
Side channels represent a broad class of security vulnerabilities that have been demonstrated to exist in many applications. Because completely eliminating side channels often leads to prohibitively high overhead, there is a need for a principled trade-off between cost and leakage. In this paper, we make a case for the use of maximal leakage to analyze such trade-offs. Maximal leakage is an operationally interpretable leakage metric designed for side channels. We present the most useful theoretical properties of maximal leakage from previous work and demonstrate empirically that conventional metrics such as mutual information and channel capacity underestimate the threat posed by side channels whereas maximal leakage does not. We also study the cost-leakage trade-off as an optimization problem using maximal leakage. We demonstrate that not only can this problem be represented as a linear program, but also that optimal protection can be achieved using a combination of at most two deterministic schemes.
△ Less
Submitted 16 April, 2020;
originally announced April 2020.
-
A New Method for Employing Feedback to Improve Coding Performance
Authors:
Aaron B. Wagner,
Nirmal V. Shende,
Yücel Altuğ
Abstract:
We introduce a novel mechanism, called timid/bold coding, by which feedback can be used to improve coding performance. For a certain class of DMCs, called compound-dispersion channels, we show that timid/bold coding allows for an improved second-order coding rate compared with coding without feedback. For DMCs that are not compound dispersion, we show that feedback does not improve the second-orde…
▽ More
We introduce a novel mechanism, called timid/bold coding, by which feedback can be used to improve coding performance. For a certain class of DMCs, called compound-dispersion channels, we show that timid/bold coding allows for an improved second-order coding rate compared with coding without feedback. For DMCs that are not compound dispersion, we show that feedback does not improve the second-order coding rate. Thus we completely determine the class of DMCs for which feedback improves the second-order coding rate. An upper bound on the second-order coding rate is provided for compound-dispersion DMCs. We also show that feedback does not improve the second-order coding rate for very noisy DMCs. The main results are obtained by relating feedback codes to certain controlled diffusions.
△ Less
Submitted 29 August, 2019;
originally announced August 2019.
-
On exact asymptotics of the error probability in channel coding: symmetric channels
Authors:
Yücel Altuğ,
Aaron B. Wagner
Abstract:
The exact order of the optimal sub-exponentially decaying factor in the classical bounds on the error probability of fixed-length codes over a Gallager-symmetric discrete memoryless channel with and without ideal feedback is determined. Regardless of the availability of feedback, it is shown that the order of the optimal sub-exponential factor exhibits a dichotomy. Moreover, the proof technique is…
▽ More
The exact order of the optimal sub-exponentially decaying factor in the classical bounds on the error probability of fixed-length codes over a Gallager-symmetric discrete memoryless channel with and without ideal feedback is determined. Regardless of the availability of feedback, it is shown that the order of the optimal sub-exponential factor exhibits a dichotomy. Moreover, the proof technique is used to establish the third-order term in the normal approximation for symmetric channels, where a similar dichotomy is shown to exist.
△ Less
Submitted 29 August, 2019;
originally announced August 2019.
-
Semantic Deep Intermodal Feature Transfer: Transferring Feature Descriptors Between Imaging Modalities
Authors:
Sebastian P. Kleinschmidt,
Bernardo Wagner
Abstract:
Under difficult environmental conditions, the view of RGB cameras may be restricted by fog, dust or difficult lighting situations. Because thermal cameras visualize thermal radiation, they are not subject to the same limitations as RGB cameras. However, because RGB and thermal imaging differ significantly in appearance, common, state-of-the-art feature descriptors are unsuitable for intermodal fea…
▽ More
Under difficult environmental conditions, the view of RGB cameras may be restricted by fog, dust or difficult lighting situations. Because thermal cameras visualize thermal radiation, they are not subject to the same limitations as RGB cameras. However, because RGB and thermal imaging differ significantly in appearance, common, state-of-the-art feature descriptors are unsuitable for intermodal feature matching between these imaging modalities. As a consequence, visual maps created with an RGB camera can currently not be used for localization using a thermal camera. In this paper, we introduce the Semantic Deep Intermodal Feature Transfer (Se-DIFT), an approach for transferring image feature descriptors from the visual to the thermal spectrum and vice versa. For this purpose, we predict potential feature appearance in varying imaging modalities using a deep convolutional encoder-decoder architecture in combination with a global feature vector. Since the representation of a thermal image is not only affected by features which can be extracted from an RGB image, we introduce the global feature vector which augments the auto encoder's coding. The global feature vector contains additional information about the thermal history of a scene which is automatically extracted from external data sources. By augmenting the encoder's coding, we decrease the L1 error of the prediction by more than 7% compared to the prediction of a traditional U-Net architecture. To evaluate our approach, we match image feature descriptors detected in RGB and thermal images using Se-DIFT. Subsequently, we make a competitive comparison on the intermodal transferability of SIFT, SURF, and ORB features using our approach.
△ Less
Submitted 26 July, 2019;
originally announced July 2019.
-
Understanding Counterexamples for Relational Properties with DIbugger
Authors:
Mihai Herda,
Michael Kirsten,
Etienne Brunner,
Joana Plewnia,
Ulla Scheler,
Chiara Staudenmaier,
Benedikt Wagner,
Pascal Zwick,
Bernhard Beckert
Abstract:
Software verification is a tedious process that involves the analysis of multiple failed verification attempts, and adjustments of the program or specification. This is especially the case for complex requirements, e.g., regarding security or fairness, when one needs to compare multiple related runs of the same software. Verification tools often provide counterexamples consisting of program inputs…
▽ More
Software verification is a tedious process that involves the analysis of multiple failed verification attempts, and adjustments of the program or specification. This is especially the case for complex requirements, e.g., regarding security or fairness, when one needs to compare multiple related runs of the same software. Verification tools often provide counterexamples consisting of program inputs when a proof attempt fails, however it is often not clear why the reported counterexample leads to a violation of the checked property. In this paper, we enhance this aspect of the software verification process by providing DIbugger, a tool for analyzing counterexamples of relational properties, allowing the user to debug multiple related programs simultaneously.
△ Less
Submitted 9 July, 2019;
originally announced July 2019.
-
Artificial Intelligence Governance and Ethics: Global Perspectives
Authors:
Angela Daly,
Thilo Hagendorff,
Li Hui,
Monique Mann,
Vidushi Marda,
Ben Wagner,
Wei Wang,
Saskia Witteborn
Abstract:
Artificial intelligence (AI) is a technology which is increasingly being utilised in society and the economy worldwide, and its implementation is planned to become more prevalent in coming years. AI is increasingly being embedded in our lives, supplementing our pervasive use of digital technologies. But this is being accompanied by disquiet over problematic and dangerous implementations of AI, or…
▽ More
Artificial intelligence (AI) is a technology which is increasingly being utilised in society and the economy worldwide, and its implementation is planned to become more prevalent in coming years. AI is increasingly being embedded in our lives, supplementing our pervasive use of digital technologies. But this is being accompanied by disquiet over problematic and dangerous implementations of AI, or indeed, even AI itself deciding to do dangerous and problematic actions, especially in fields such as the military, medicine and criminal justice. These developments have led to concerns about whether and how AI systems adhere, and will adhere to ethical standards. These concerns have stimulated a global conversation on AI ethics, and have resulted in various actors from different countries and sectors issuing ethics and governance initiatives and guidelines for AI. Such developments form the basis for our research in this report, combining our international and interdisciplinary expertise to give an insight into what is happening in Australia, China, Europe, India and the US.
△ Less
Submitted 28 June, 2019;
originally announced July 2019.
-
A generic framework for privacy preserving deep learning
Authors:
Theo Ryffel,
Andrew Trask,
Morten Dahl,
Bobby Wagner,
Jason Mancuso,
Daniel Rueckert,
Jonathan Passerat-Palmbach
Abstract:
We detail a new framework for privacy preserving deep learning and discuss its assets. The framework puts a premium on ownership and secure processing of data and introduces a valuable representation based on chains of commands and tensors. This abstraction allows one to implement complex privacy preserving constructs such as Federated Learning, Secure Multiparty Computation, and Differential Priv…
▽ More
We detail a new framework for privacy preserving deep learning and discuss its assets. The framework puts a premium on ownership and secure processing of data and introduces a valuable representation based on chains of commands and tensors. This abstraction allows one to implement complex privacy preserving constructs such as Federated Learning, Secure Multiparty Computation, and Differential Privacy while still exposing a familiar deep learning API to the end-user. We report early results on the Boston Housing and Pima Indian Diabetes datasets. While the privacy features apart from Differential Privacy do not impact the prediction accuracy, the current implementation of the framework introduces a significant overhead in performance, which will be addressed at a later stage of the development. We believe this work is an important milestone introducing the first reliable, general framework for privacy preserving deep learning.
△ Less
Submitted 13 November, 2018; v1 submitted 9 November, 2018;
originally announced November 2018.
-
AlScN: A III-V semiconductor based ferroelectric
Authors:
Simon Fichtner,
Niklas Wolff,
Fabian Lofink,
Lorenz Kienle,
Bernhard Wagner
Abstract:
Ferroelectric switching is unambigiously demonstrated for the first time in a III-V semiconductor based material: AlScN -- A discovery which could help to satisfy the urgent demand for thin film ferroelectrics with high performance and good technological compatibility with generic semiconductor technology which arises from a multitude of memory, micro/nano-actuator and emerging applications based…
▽ More
Ferroelectric switching is unambigiously demonstrated for the first time in a III-V semiconductor based material: AlScN -- A discovery which could help to satisfy the urgent demand for thin film ferroelectrics with high performance and good technological compatibility with generic semiconductor technology which arises from a multitude of memory, micro/nano-actuator and emerging applications based on controlling electrical polarization. The appearance of ferroelectricity in AlScN can be related to the continuous distortion of the original wurtzite-type crystal structure towards a layered-hexagonal structure with increasing Sc content and tensile strain, which is expected to be extendable to other III-nitride based solid solutions. Coercive fields which are systematically adjustable by more than 3 MV/cm, high remnant polarizations in excess of 100 μC/cm$^2$ which constitute the first experimental estimate of the previously inaccessible spontaneous polarization in a III-nitride based material, an almost ideally square-like hysteresis resulting in excellent piezoelectric linearity over a wide strain interval from -0.3% to +0.4% as well as a paraelectric transition temperature in excess of 600°C are confirmed. This intriguing combination of properties is to our knowledge as of now unprecedented in the field of polycrystalline ferroelectric thin films and promises to significantly advance the commencing integration of ferroelectric functionality to micro- and nanotechnology, while at the same time providing substantial insight to one of the central open questions of the III-nitride semiconductors - that of their actual spontaneous polarization.
△ Less
Submitted 26 November, 2018; v1 submitted 18 October, 2018;
originally announced October 2018.
-
An Operational Approach to Information Leakage
Authors:
Ibrahim Issa,
Aaron B. Wagner,
Sudeep Kamath
Abstract:
Given two random variables $X$ and $Y$, an operational approach is undertaken to quantify the ``leakage'' of information from $X$ to $Y$. The resulting measure $\mathcal{L}(X \!\! \to \!\! Y)$ is called \emph{maximal leakage}, and is defined as the multiplicative increase, upon observing $Y$, of the probability of correctly guessing a randomized function of $X$, maximized over all such randomized…
▽ More
Given two random variables $X$ and $Y$, an operational approach is undertaken to quantify the ``leakage'' of information from $X$ to $Y$. The resulting measure $\mathcal{L}(X \!\! \to \!\! Y)$ is called \emph{maximal leakage}, and is defined as the multiplicative increase, upon observing $Y$, of the probability of correctly guessing a randomized function of $X$, maximized over all such randomized functions. A closed-form expression for $\mathcal{L}(X \!\! \to \!\! Y)$ is given for discrete $X$ and $Y$, and it is subsequently generalized to handle a large class of random variables. The resulting properties are shown to be consistent with an axiomatic view of a leakage measure, and the definition is shown to be robust to variations in the setup. Moreover, a variant of the Shannon cipher system is studied, in which performance of an encryption scheme is measured using maximal leakage. A single-letter characterization of the optimal limit of (normalized) maximal leakage is derived and asymptotically-optimal encryption schemes are demonstrated. Furthermore, the sample complexity of estimating maximal leakage from data is characterized up to subpolynomial factors. Finally, the \emph{guessing} framework used to define maximal leakage is used to give operational interpretations of commonly used leakage measures, such as Shannon capacity, maximal correlation, and local differential privacy.
△ Less
Submitted 20 July, 2018;
originally announced July 2018.
-
A deep learning approach to identify local structures in atomic-resolution transmission electron microscopy images
Authors:
Jacob Madsen,
Pei Liu,
Jens Kling,
Jakob Birkedal Wagner,
Thomas Willum Hansen,
Ole Winther,
Jakob Schiøtz
Abstract:
Recording atomic-resolution transmission electron microscopy (TEM) images is becoming increasingly routine. A new bottleneck is then analyzing this information, which often involves time-consuming manual structural identification. We have developed a deep learning-based algorithm for recognition of the local structure in TEM images, which is stable to microscope parameters and noise. The neural ne…
▽ More
Recording atomic-resolution transmission electron microscopy (TEM) images is becoming increasingly routine. A new bottleneck is then analyzing this information, which often involves time-consuming manual structural identification. We have developed a deep learning-based algorithm for recognition of the local structure in TEM images, which is stable to microscope parameters and noise. The neural network is trained entirely from simulation but is capable of making reliable predictions on experimental images. We apply the method to single sheets of defected graphene, and to metallic nanoparticles on an oxide support.
△ Less
Submitted 9 February, 2018; v1 submitted 8 February, 2018;
originally announced February 2018.
-
Stability of concentrated suspensions under Couette and Poiseuille flow
Authors:
Tobias Ahnert,
Andreas Münch,
Barbara Niethammer,
Barbara Wagner
Abstract:
The stability of two-dimensional Poiseuille flow and plane Couette flow for concentrated suspensions is investigated. Linear stability analysis of the two-phase flow model for both flow geometries shows the existence of a convectively driven instability with increasing growth rates of the unstable modes as the particle volume fraction of the suspension increases. In addition it is shown that there…
▽ More
The stability of two-dimensional Poiseuille flow and plane Couette flow for concentrated suspensions is investigated. Linear stability analysis of the two-phase flow model for both flow geometries shows the existence of a convectively driven instability with increasing growth rates of the unstable modes as the particle volume fraction of the suspension increases. In addition it is shown that there exists a bound for the particle phase viscosity below which the two-phase flow model may become ill-posed as the particle phase approaches its maximum packing fraction. The case of two-dimensional Poiseuille flow gives rise to base state solutions that exhibit a jammed and unyielded region, due to shear-induced migration, as the maximum packing fraction is approached. The stability characteristics of the resulting Bingham-type flow is investigated and connections to the stability problem for the related classical Bingham-flow problem are discussed.
△ Less
Submitted 6 January, 2018;
originally announced January 2018.
-
Impact of energy dissipation on interface shapes and on rates for dewetting from liquid substrates
Authors:
Dirk Peschka,
Stefan Bommer,
Sebastian Jachalski,
Ralf Seemann,
Barbara Wagner
Abstract:
We revisit the fundamental problem of liquid-liquid dewetting and perform a detailed comparison of theoretical predictions based on thin-film models with experimental measurements obtained by atomic force microscopy (AFM). Specifically, we consider the dewetting of a liquid polystyrene (PS) layer from a liquid polymethyl methacrylate (PMMA) layer, where the thicknesses and the viscosities of PS an…
▽ More
We revisit the fundamental problem of liquid-liquid dewetting and perform a detailed comparison of theoretical predictions based on thin-film models with experimental measurements obtained by atomic force microscopy (AFM). Specifically, we consider the dewetting of a liquid polystyrene (PS) layer from a liquid polymethyl methacrylate (PMMA) layer, where the thicknesses and the viscosities of PS and PMMA layers are similar. The excellent agreement of experiment and theory reveals that dewetting rates for such systems follow no universal power law, in contrast to dewetting scenarios on solid substrates. Our new energetic approach allows to assess the physical importance of different contributions to the energy-dissipation mechanism, for which we analyze the local flow fields and the local dissipation rates.
△ Less
Submitted 24 December, 2017;
originally announced December 2017.