Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–17 of 17 results for author: Poellabauer, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.03083  [pdf, other

    cs.CE

    Predicting Opioid Use Outcomes in Minoritized Communities

    Authors: Abhay Goyal, Nimay Parekh, Lam Yin Cheung, Koustuv Saha, Frederick L Altice, Robin O'hanlon, Roger Ho Chun Man, Christian Poellabauer, Honoria Guarino, Pedro Mateu Gelabert, Navin Kumar

    Abstract: Machine learning algorithms can sometimes exacerbate health disparities based on ethnicity, gender, and other factors. There has been limited work at exploring potential biases within algorithms deployed on a small scale, and/or within minoritized communities. Understanding the nature of potential biases may improve the prediction of various health outcomes. As a case study, we used data from a sa… ▽ More

    Submitted 6 July, 2023; originally announced July 2023.

  2. arXiv:2201.03035  [pdf, other

    cs.CL cs.LG

    Medication Error Detection Using Contextual Language Models

    Authors: Yu Jiang, Christian Poellabauer

    Abstract: Medication errors most commonly occur at the ordering or prescribing stage, potentially leading to medical complications and poor health outcomes. While it is possible to catch these errors using different techniques; the focus of this work is on textual and contextual analysis of prescription information to detect and prevent potential medication errors. In this paper, we demonstrate how to use B… ▽ More

    Submitted 9 January, 2022; originally announced January 2022.

    Comments: AAAI-22 workshop: W3PHIAI-22

  3. arXiv:2011.06007  [pdf

    cs.HC cs.CY

    Understanding College Students' Phone Call Behaviors Towards a Sustainable Mobile Health and Wellbeing Solution

    Authors: Yugyeong Kim, Sudip Vhaduri, Christian Poellabauer

    Abstract: During the transition from high school to on-campus college life, a student leaves home and starts facing enormous life changes, including meeting new people, more responsibilities, being away from family, and academic challenges. These recent changes lead to an elevation of stress and anxiety, affecting a student's health and wellbeing. With the help of smartphones and their rich collection of se… ▽ More

    Submitted 11 November, 2020; originally announced November 2020.

    Comments: Accepted for publication in the 3rd International Conference on Systems Engineering (CIIS 2020)

  4. arXiv:2003.08225  [pdf, other

    cs.SD cs.CR cs.LG eess.AS

    Detecting Replay Attacks Using Multi-Channel Audio: A Neural Network-Based Method

    Authors: Yuan Gong, Jian Yang, Christian Poellabauer

    Abstract: With the rapidly growing number of security-sensitive systems that use voice as the primary input, it becomes increasingly important to address these systems' potential vulnerability to replay attacks. Previous efforts to address this concern have focused primarily on single-channel audio. In this paper, we introduce a novel neural network-based replay attack detection model that further leverages… ▽ More

    Submitted 3 July, 2020; v1 submitted 18 March, 2020; originally announced March 2020.

    Comments: Code of this work is available here: https://github.com/YuanGongND/multichannel-antispoof

    Journal ref: in IEEE Signal Processing Letters, vol. 27, pp. 920-924, 2020

  5. arXiv:1909.11737  [pdf, ps, other

    cs.NI

    Beyond Beaconing: Emerging Applications and Challenges of BLE

    Authors: Jian Yang, Christian Poellabauer, Pramita Mitra, Cynthia Neubecker

    Abstract: As an emerging technology with exceptional low energy consumption and low-latency data transmissions, Bluetooth Low Energy (BLE) has gained significant momentum in various application domains, such as Indoor Positioning, Home Automation, and Wireless Personal Area Network (WPAN) communications. With various novel protocol stack features, BLE is finding use on resource-constrained sensor nodes as w… ▽ More

    Submitted 25 September, 2019; originally announced September 2019.

    Comments: submitted to ELSEVIER Journal of Ad Hoc Networks

  6. arXiv:1909.00295  [pdf, other

    cs.CV cs.AI cs.LG

    Second-order Non-local Attention Networks for Person Re-identification

    Authors: Bryan, Xia, Yuan Gong, Yizhe Zhang, Christian Poellabauer

    Abstract: Recent efforts have shown promising results for person re-identification by designing part-based architectures to allow a neural network to learn discriminative representations from semantically coherent parts. Some efforts use soft attention to reallocate distant outliers to their most similar parts, while others adjust part granularity to incorporate more distant positions for learning the relat… ▽ More

    Submitted 31 August, 2019; originally announced September 2019.

    Comments: ICCV 2019

  7. arXiv:1908.02614  [pdf, other

    cs.SI cs.LG stat.ML

    The power of dynamic social networks to predict individuals' mental health

    Authors: Shikang Liu, David Hachen, Omar Lizardo, Christian Poellabauer, Aaron Striegel, Tijana Milenkovic

    Abstract: Precision medicine has received attention both in and outside the clinic. We focus on the latter, by exploiting the relationship between individuals' social interactions and their mental health to develop a predictive model of one's likelihood to be depressed or anxious from rich dynamic social network data. To our knowledge, we are the first to do this. Existing studies differ from our work in at… ▽ More

    Submitted 5 August, 2019; originally announced August 2019.

  8. arXiv:1907.06563  [pdf, other

    cs.CR cs.HC

    Summary: Multi-modal Biometric-based Implicit Authentication of Wearable Device Users

    Authors: Sudip Vhaduri, Christian Poellabauer

    Abstract: The Internet of Things (IoT) is increasingly empowering people with an interconnected world of physical objects ranging from smart buildings to portable smart devices such as wearables. With recent advances in mobile sensing, wearables have become a rich collection of portable sensors and are able to provide various types of services including tracking of health and fitness, making financial trans… ▽ More

    Submitted 15 July, 2019; originally announced July 2019.

    Comments: This will be published in the IEEE Biometrics Council newsletter, volume 31, 2019

  9. arXiv:1906.04346  [pdf, other

    cs.SI cs.LG stat.ML

    Heterogeneous network approach to predict individuals' mental health

    Authors: Shikang Liu, Fatemeh Vahedian, David Hachen, Omar Lizardo, Christian Poellabauer, Aaron Striegel, Tijana Milenkovic

    Abstract: Depression and anxiety are critical public health issues affecting millions of people around the world. To identify individuals who are vulnerable to depression and anxiety, predictive models have been built that typically utilize data from one source. Unlike these traditional models, in this study, we leverage a rich heterogeneous data set from the University of Notre Dame's NetHealth study that… ▽ More

    Submitted 12 January, 2020; v1 submitted 10 June, 2019; originally announced June 2019.

    Comments: Revised on Dec. 2019

  10. arXiv:1905.13399  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    Real-Time Adversarial Attacks

    Authors: Yuan Gong, Boyang Li, Christian Poellabauer, Yiyu Shi

    Abstract: In recent years, many efforts have demonstrated that modern machine learning algorithms are vulnerable to adversarial attacks, where small, but carefully crafted, perturbations on the input can make them fail. While these attack methods are very effective, they only focus on scenarios where the target model takes static input, i.e., an attacker can observe the entire original sample and then add a… ▽ More

    Submitted 22 June, 2019; v1 submitted 30 May, 2019; originally announced May 2019.

    Comments: To Appear in the Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI 2019). Code: https://github.com/YuanGongND/realtime-adversarial-attack

  11. arXiv:1904.03365  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    ReMASC: Realistic Replay Attack Corpus for Voice Controlled Systems

    Authors: Yuan Gong, Jian Yang, Jacob Huber, Mitchell MacKnight, Christian Poellabauer

    Abstract: This paper introduces a new database of voice recordings with the goal of supporting research on vulnerabilities and protection of voice-controlled systems (VCSs). In contrast to prior efforts, the proposed database contains both genuine voice commands and replayed recordings of such commands, collected in realistic VCSs usage scenarios and using modern voice assistant development kits. Specifical… ▽ More

    Submitted 2 July, 2019; v1 submitted 6 April, 2019; originally announced April 2019.

    Comments: To appear in Interspeech 2019. Data set available at https://github.com/YuanGongND/ReMASC

  12. arXiv:1811.07060  [pdf, other

    cs.CR

    Biometric-Based Wearable User Authentication During Sedentary and Non-sedentary Periods

    Authors: Sudip Vhaduri, Christian Poellabauer

    Abstract: The Internet of Things (IoT) is increasingly empowering people with an interconnected world of physical objects ranging from smart buildings to portable smart devices such as wearables. With the recent advances in mobile sensing, wearables have become a rich collection of portable sensors and are able to provide various types of services including health and fitness tracking, financial transaction… ▽ More

    Submitted 16 November, 2018; originally announced November 2018.

    Comments: 1st International Workshop on Security and Privacy for the Internet-of-Things (IoTSec)

  13. arXiv:1811.07018  [pdf, ps, other

    cs.CR cs.SD eess.AS

    Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues

    Authors: Yuan Gong, Christian Poellabauer

    Abstract: Over the last few years, a rapidly increasing number of Internet-of-Things (IoT) systems that adopt voice as the primary user input have emerged. These systems have been shown to be vulnerable to various types of voice spoofing attacks. Existing defense techniques can usually only protect from a specific type of attack or require an additional authentication step that involves another device. Such… ▽ More

    Submitted 16 November, 2018; originally announced November 2018.

    Comments: Proceedings of the 27th International Conference on Computer Communications and Networks (ICCCN), Hangzhou, China, July-August 2018. arXiv admin note: text overlap with arXiv:1803.09156

  14. arXiv:1808.02939  [pdf, ps, other

    cs.SD cs.CL cs.LG eess.AS

    Towards Learning Fine-Grained Disentangled Representations from Speech

    Authors: Yuan Gong, Christian Poellabauer

    Abstract: Learning disentangled representations of high-dimensional data is currently an active research area. However, compared to the field of computer vision, less work has been done for speech processing. In this paper, we provide a review of two representative efforts on this topic and propose the novel concept of fine-grained disentangled speech representation learning.

    Submitted 8 August, 2018; originally announced August 2018.

  15. arXiv:1803.10384  [pdf, ps, other

    cs.CL cs.IR cs.LG cs.SD eess.AS

    Topic Modeling Based Multi-modal Depression Detection

    Authors: Yuan Gong, Christian Poellabauer

    Abstract: Major depressive disorder is a common mental disorder that affects almost 7% of the adult U.S. population. The 2017 Audio/Visual Emotion Challenge (AVEC) asks participants to build a model to predict depression levels based on the audio, video, and text of an interview ranging between 7-33 minutes. Since averaging features over the entire interview will lose most temporal information, how to disco… ▽ More

    Submitted 27 March, 2018; originally announced March 2018.

    Comments: Proceedings of the 7th Audio/Visual Emotion Challenge and Workshop (AVEC). (Official Depression Challenge Winner)

  16. arXiv:1803.09156  [pdf, ps, other

    cs.CR cs.AI

    An Overview of Vulnerabilities of Voice Controlled Systems

    Authors: Yuan Gong, Christian Poellabauer

    Abstract: Over the last few years, a rapidly increasing number of Internet-of-Things (IoT) systems that adopt voice as the primary user input have emerged. These systems have been shown to be vulnerable to various types of voice spoofing attacks. However, how exactly these techniques differ or relate to each other has not been extensively studied. In this paper, we provide a survey of recent attack and defe… ▽ More

    Submitted 24 March, 2018; originally announced March 2018.

    Comments: 1st International Workshop on Security and Privacy for the Internet-of-Things (IoTSec)

  17. arXiv:1711.03280  [pdf, ps, other

    cs.LG cs.CR cs.SD eess.AS stat.ML

    Crafting Adversarial Examples For Speech Paralinguistics Applications

    Authors: Yuan Gong, Christian Poellabauer

    Abstract: Computational paralinguistic analysis is increasingly being used in a wide range of cyber applications, including security-sensitive applications such as speaker verification, deceptive speech detection, and medical diagnostics. While state-of-the-art machine learning techniques, such as deep neural networks, can provide robust and accurate speech analysis, they are susceptible to adversarial atta… ▽ More

    Submitted 11 January, 2019; v1 submitted 9 November, 2017; originally announced November 2017.

    Comments: Published in DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security (DYNAMICS) Workshop in conjunction with ACSAC'18, San Juan, Puerto Rico, December 2018