Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Labeling Privacy Protection SVM Using Privileged Information for COVID-19 Diagnosis

Published: 29 November 2021 Publication History

Abstract

Edge/fog computing works at the local area network level or devices connected to the sensor or the gateway close to the sensor. These nodes are located in different degrees of proximity to the user, while the data processing and storage are distributed among multiple nodes. In healthcare applications in the Internet of things, when data is transmitted through insecure channels, its privacy and security are the main issues. In recent years, learning from label proportion methods, represented by inverse calibration (InvCal) method, have tried to predict the class label based on class label proportions in certain groups. For privacy protection, the class label of the sample is often sensitive and invisible. As a compromise, only the proportion of class labels in certain groups can be used in these methods. However, due to their weak labeling scheme, their classification performance is often unsatisfactory. In this article, a labeling privacy protection support vector machine using privileged information, called LPP-SVM-PI, is proposed to promote the accuracy of the classifier in infectious disease diagnosis. Based on the framework of the InvCal method, besides using the proportion information of the class label, the idea of learning using privileged information is also introduced to capture the additional information of groups. The slack variables in LPP-SVM-PI are represented as correcting function and projected into the correcting space so that the hidden information of training samples in groups is captured by relaxing the constraints of the classification model. The solution of LPP-SVM-PI can be transformed into a classic quadratic programming problem. The experimental dataset is collected from the Coronavirus disease 2019 (COVID-19) transcription polymerase chain reaction at Hospital Israelita Albert Einstein in Brazil. In the experiment, LPP-SVM-PI is efficiently applied for COVID-19 diagnosis.

References

[1]
Giovanni Merlino, Rustem Dautov, Salvatore Distefano, and Dario Bruneo. 2019. Enabling workload engineering in edge, fog, and cloud computing through open-stack-based middleware. ACM Trans. Internet Technol. 19, 2 (2019), 28, 1–22.
[2]
D. R. Vasconcelos, Rossana Maria De Castro Andrade, V. Severino, and José Neuman De Souza. 2019. Cloud, fog, or mist in IoT? That is the question. ACM Trans. Internet Technol. 19, 2 (2019), 1533–5399.
[3]
Zakaria Benomar, Francesco Longo, Giovanni Merlino, and Antonio Puliafito. 2020. Cloud-based enabling mechanisms for container deployment and migration at the network edge. ACM Trans. Internet Technol. 20, 3 (2020), 1–28.
[4]
Ayten Ozge Akmandor and Niraj K. Jha. 2017. Smart health care: an edge-side computing perspective. IEEE Consum. Electron. Mag. 7, 1 (2017), 29–37.
[5]
Sandeep K. Sood and Isha Mahajan. 2018. A fog-based healthcare framework for Chikungunya. IEEE Internet Things J. 5, 2 (2018), 794–801.
[6]
Frank Alexander Kraemer, Anders Eivind Braten, Nattachart Tamkittikhun, and David Palma. 2017. Fog computing in healthcare-a review and discussion. IEEE Access 5 (2017), 9206–9222.
[7]
Federico Concone, Giuseppe Lo Re, and Marco Morana. 2019. A fog-based application for human activity recognition using personal smart devices. ACM Trans. Internet Technol. 19, 2 (2019), 20, 1–20.
[8]
Alaa Awad Abdellatif, Amr Mohamed, Carla Fabiana Chiasserini, Mounira Tlili, and Aiman Erbad. 2019. Edge computing for smart health: Context-aware approaches, opportunities, and challenges. IEEE Netw. 33, 3 (2019), 196–203.
[9]
Mohamed Abdel-Basset, Gunasekaran Manogaran, and Mai Mohamed. 2019. A neutrosophic theory-based security approach for fog and mobile-edge computing. Comput. Netw. 157, 5 (2019), 122–132.
[10]
Sanjay Sareen, Sunil Kumar Gupta, and Sandeep K. Sood. 2017. An intelligent and secure system for predicting and preventing zika virus outbreak using fog computing. Enterprise Info. Syst. 11, 9 (2017), 1436–1456.
[11]
Hafedh Ben Hassen, Nadia Ayari, and Belgacem Hamdi. 2020. A home hospitalization system based on the Internet of things, Fog computing and cloud computing. Info. Med. Unlocked 20 (2020), 100368.
[12]
Abu Sufian, Anirudha Ghosh, Ali Safaa Sadiq, and Florentin Smarandache. 2020. A survey on deep transfer learning to edge computing for mitigating the COVID-19 pandemic. J. Syst. Architect. 108, 9 (2020), 101830.
[13]
Sandeep K. Sood and Isha Mahajan. 2018. Fog-cloud based cyber-physical system for distinguishing, detecting and preventing mosquito borne diseases. Future Gen. Comput. Syst. 88, 11 (2018), 764–775.
[14]
Adarsh Kumar, Kriti Sharma, Harvinder Singh, Sagar Gupta Naugriya, Sukhpal Singh Gill, and Rajkumar Buyy. 2021. A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic. Future Gen. Comput. Syst. 115, 2 (2021) 1–19.
[15]
Prabal Verma and Sandeep K. Sood. 2018. Fog assisted-IoT enabled patient health monitoring in smart homes. IEEE Internet Things J. 5, 3 (2018), 1789–1796.
[16]
V. Jagadeeswari, V. Subramaniyaswamy, R. Logesh, and V. Vijayakumar. 2018. A study on medical Internet of Things and big data in personalized healthcare system. Health Info. Sci. Syst. 6, 14 (2018), 1–20.
[17]
Samaher Al-Janabi, Ibrahim Al-Shourbaji, Mohammad Shojafar, and Shahaboddin Shamshirband. 2017. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt. Info. J. 18, 2 (2017), 113–122.
[18]
Yanshan Xiao, Huaipei Wang, and Bo Liu. 2020. A new transfer learning-based method for label proportions problem. Info. Sci. 541, 12 (2020), 391–408.
[19]
Jerónimo Hernández-González, Iñaki Inza, and Jose A. Lozano. 2013. Learning Bayesian network classifiers from label proportions. Pattern Recogn. 46, 12 (2013), 3425–3440.
[20]
Tongguang Ni, Fu-Lai Chung, and Shitong Wang. 2015. Support vector machine with manifold regularization and partially labeling privacy protection. Info. Sci. 294, 10 (2015), 390–407.
[21]
Kai Fan, Hongyi Zhang, Songbai Yan, Liwei Wang, Wensheng Zhang, and Jufu Feng. 2014. Learning a generative classifier from label proportions. Neurocomputing 139, 9 (2014), 47–55.
[22]
Hendrik Kück and Nando De Freitas. 2005. Learning about individuals from group statistics. Proceedings of the 21st Conference on Uncertainty in Artificial Intelligence. AUAI Press, Corvallis, July 2005, 332–339.
[23]
Novi Quadrianto, Alex J. Smola, Tibério S. Caetano, and Quoc V. Le. 2009. Estimating labels from label proportions. J. Mach. Learn. Res. 10, 82 (2009), 2349–2374.
[24]
Felix X. Yu, Dong Liu, Sanjiv Kumar, Tony Jebara, and Shih-Fu Chang. 2013. ∝SVM for learning with label proportions. In Proceedings of the 30th International Conference on Machine Learning. 504–512.
[25]
Zhiquan Qi, Fan Meng, Yingjie Tian, Lingfeng Niu, Yong Shi, and Peng Zhang. 2018. Adaboost-LLP: A boosting method for learning with label proportions. IEEE Trans. Neural Netw. Learn. Syst. 29, 8 (2018), 3548–3559.
[26]
Yong Shi, Limeng Cui, Zhensong Chen, and Zhiquan Qi. 2019. Learning from label proportions with pinball loss. International J. Mach. Learn. Cybernet. 10 (2019), 187–205.
[27]
Stefan Ruping. 2010. SVM classifier estimation from group probabilities. In Proceedings of the 27th International Conference on Machine Learning (ICML’10). 911–918.
[28]
Vladimir Vapnik and Akshay Vashist. 2009. A new learning paradigm: Learning using privileged information. Neural Netw. 22, 5 (2009), 544–557.
[29]
Wenxin Zhu and Ping Zhong. 2014. A new one-class SVM based on hidden information. Knowl.-Based Syst. 60, 4 (2014), 35–43.
[30]
Zhiquan Qi, Bo Wang, Fan Meng, and Lingfeng Niu. 2016. Learning with label proportions via NPSVM. IEEE Trans. Cybernet. 47, 10 (2017), 3293–3305.
[31]
Vladimir Vapnik and Rauf Izmailov. 2015. Learning using privileged information: Similarity control and knowledge transfer. J. Mach. Learn. Res. 16 (2015), 2023–2049.
[32]
Peipei Wang, Xinqi Zheng, Jiayang Li, and Bangren Zhu. 2020. Prediction of epidemic trends in COVID-19 with logistic model and machine learning technics. Chaos, Solitons Fractals 139 (2020), 110058.
[33]
Talha Burak Alakus and Ibrahim Turkoglu. 2020. Comparison of deep learning approaches to predict COVID-19 infection. Chaos, Solitons Fractals 140 (2020), 110120.
[34]
Xiaoqing Gu, Fu-Lai Chung, and Shitong Wang. 2020. Extreme vector machine for fast training on large data. Int. J. Mach. Learn. Cybernet. 11, 1 (2020), 33–53.

Cited By

View all
  • (2024)Multisensor data fusion in Digital Twins for smart healthcareData Fusion Techniques and Applications for Smart Healthcare10.1016/B978-0-44-313233-9.00008-4(21-44)Online publication date: 2024
  • (2023)Homomorphic encryption-based ciphertext anomaly detection method for e-health recordsSCIENTIA SINICA Informationis10.1360/SSI-2022-021453:7(1368)Online publication date: 6-Jul-2023
  • (2023)A Novel Long-Term Noise Prediction System Based on $\alpha$DTW-DCRNN Using Periodically Unaligned Spatiotemporal Distribution SequencesIEEE Systems Journal10.1109/JSYST.2023.326977817:3(4591-4602)Online publication date: Sep-2023
  • Show More Cited By

Index Terms

  1. Labeling Privacy Protection SVM Using Privileged Information for COVID-19 Diagnosis

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 22, Issue 3
      August 2022
      631 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3498359
      • Editor:
      • Ling Liu
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 29 November 2021
      Accepted: 01 July 2021
      Revised: 01 June 2021
      Received: 01 November 2020
      Published in TOIT Volume 22, Issue 3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Fog/edge computing
      2. labeling privacy protection
      3. supervised classifier
      4. learning using privileged information
      5. COVID-19

      Qualifiers

      • Research-article
      • Refereed

      Funding Sources

      • National Natural Science Foundation of China
      • Natural Science Foundation of Jiangsu Province

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)35
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 02 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Multisensor data fusion in Digital Twins for smart healthcareData Fusion Techniques and Applications for Smart Healthcare10.1016/B978-0-44-313233-9.00008-4(21-44)Online publication date: 2024
      • (2023)Homomorphic encryption-based ciphertext anomaly detection method for e-health recordsSCIENTIA SINICA Informationis10.1360/SSI-2022-021453:7(1368)Online publication date: 6-Jul-2023
      • (2023)A Novel Long-Term Noise Prediction System Based on $\alpha$DTW-DCRNN Using Periodically Unaligned Spatiotemporal Distribution SequencesIEEE Systems Journal10.1109/JSYST.2023.326977817:3(4591-4602)Online publication date: Sep-2023
      • (2022)A survey of COVID-19 detection and prediction approaches using mobile devices, AI, and telemedicineFrontiers in Artificial Intelligence10.3389/frai.2022.10347325Online publication date: 2-Dec-2022

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media