Ändra sökning
Avgränsa sökresultatet
1 - 18 av 18
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1. Abo, H.
    et al.
    Eklund, David
    Kahle, T.
    Peterson, C.
    Eigenschemes and the Jordan canonical form2016Ingår i: Linear Algebra and Its Applications, Vol. 496, s. 121-151Artikel i tidskrift (Refereegranskat)
  • 2. Bates, D. J.
    et al.
    Davis, B.
    Eklund, David
    Hanson, E.
    Peterson, C.
    Perturbed homotopies for finding all isolated solutions of polynomial systems2014Ingår i: Applied Mathematics and Computation, Vol. 247, s. 301-311Artikel i tidskrift (Refereegranskat)
  • 3. Bates, D. J.
    et al.
    Eklund, David
    Peterson, C.
    Computing intersection numbers of Chern classes2013Ingår i: Journal of Symbolic Computation, Vol. 50, s. 493-507Artikel i tidskrift (Refereegranskat)
  • 4.
    Bates, Daniel
    et al.
    United States Naval Academy, USA.
    Eklund, David
    DTU, Denmark.
    Hauenstein, Jonathan
    Peterson, Chris
    Excess Intersections and Numerical Irreducible Decompositions2022Konferensbidrag (Refereegranskat)
  • 5. Di Rocco, S.
    et al.
    Eklund, David
    Peterson, C.
    Numerical polar calculus and cohomology of line bundles2018Ingår i: Advances in Applied Mathematics, Vol. 100, s. 148-162Artikel i tidskrift (Refereegranskat)
  • 6. Di Rocco, S.
    et al.
    Eklund, David
    Peterson, C.
    Sommese, A. J.
    Chern numbers of smooth varieties via homotopy continuation and intersection theory2011Ingår i: Journal of Symbolic Computation, Vol. 46, nr 1, s. 23-33Artikel i tidskrift (Refereegranskat)
  • 7. Di Rocco, S.
    et al.
    Eklund, David
    Sommese, A. J.
    Wampler, C. W.
    Algebraic C*-actions and the inverse kinematics of a general 6R manipulator2010Ingår i: Applied Mathematics and Computation, Vol. 216, nr 9, s. 2512-2524Artikel i tidskrift (Refereegranskat)
  • 8. Eklund, David
    Curves on Heisenberg invariant quartic surfaces in projective 3-space2018Ingår i: European Journal of Mathematics, Vol. 4, nr 3, s. 931-952Artikel i tidskrift (Refereegranskat)
  • 9.
    Eklund, David
    RISE Research Institutes of Sweden, Digitala system, Industriella system.
    The numerical algebraic geometry of bottlenecks2023Ingår i: Advances in Applied Mathematics, ISSN 0196-8858, E-ISSN 1090-2074, Vol. 142, artikel-id 102416Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    This is a computational study of bottlenecks on algebraic varieties. The bottlenecks of a smooth variety X⊆Cn are the lines in Cn which are normal to X at two distinct points. The main result is a numerical homotopy that can be used to approximate all isolated bottlenecks. This homotopy has the optimal number of paths under certain genericity assumptions. In the process we prove bounds on the number of bottlenecks in terms of the Euclidean distance degree. Applications include the optimization problem of computing the distance between two real varieties. Also, computing bottlenecks may be seen as part of the problem of computing the reach of a smooth real variety and efficient methods to compute the reach are still to be developed. Relations to triangulation of real varieties and meshing algorithms used in computer graphics are discussed in the paper. The resulting algorithms have been implemented with Bertini [4] and Macaulay2 [17]. 

  • 10.
    Eklund, David
    et al.
    RISE Research Institutes of Sweden, Digitala system, Industriella system.
    Iacovazzi, Alfonso
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Wang, Han
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Pyrgelis, Apostolos
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Raza, Shahid
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap. Mälardalen University, Sweden.
    BMI: Bounded Mutual Information for Efficient Privacy-Preserving Feature Selection2024Ingår i: Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349, Vol. 14983 LNCS, s. 353-373Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    We introduce low complexity bounds on mutual information for efficient privacy-preserving feature selection with secure multi-party computation (MPC). Considering a discrete feature with N possible values and a discrete label with M possible values, our approach requires O(N) multiplications as opposed to O(NM) in a direct MPC implementation of mutual information. Our experimental results show that for regression tasks, we achieve a computation speed up of over 1,000× compared to a straightforward MPC implementation of mutual information, while achieving similar accuracy for the downstream machine learning model.

  • 11. Eklund, David
    et al.
    Jost, C.
    Peterson, C.
    A method to compute segre classes of subschemes of projective space2013Ingår i: Journal of Algebra and its Applications, Vol. 12, nr 2Artikel i tidskrift (Refereegranskat)
  • 12. Kalatzis, Dimitrios
    et al.
    Eklund, David
    Arvanitidis, Georgios
    Hauberg, Soren
    Variational Autoencoders with Riemannian Brownian Motion Priors2020Ingår i: Proceedings of the 37th International Conference on Machine Learning, PMLR , 2020, Vol. 119, s. 5053-5066Konferensbidrag (Refereegranskat)
    Abstract [en]

    Variational Autoencoders (VAEs) represent the given data in a low-dimensional latent space, which is generally assumed to be Euclidean. This assumption naturally leads to the common choice of a standard Gaussian prior over continuous latent variables. Recent work has, however, shown that this prior has a detrimental effect on model capacity, leading to subpar performance. We propose that the Euclidean assumption lies at the heart of this failure mode. To counter this, we assume a Riemannian structure over the latent space, which constitutes a more principled geometric view of the latent codes, and replace the standard Gaussian prior with a Riemannian Brownian motion prior. We propose an efficient inference scheme that does not rely on the unknown normalizing factor of this prior. Finally, we demonstrate that this prior significantly increases model capacity using only one additional scalar parameter.

  • 13.
    Mohammadi, Mohammadreza
    et al.
    RISE Research Institutes of Sweden, Digitala system, Industriella system. University of Padova, Italy.
    Allocca, Roberto
    University of Naples Federico II, Italy.
    Eklund, David
    RISE Research Institutes of Sweden, Digitala system, Industriella system.
    Shrestha, Rakesh
    RISE Research Institutes of Sweden, Digitala system, Industriella system.
    Sinaei, Sima
    RISE Research Institutes of Sweden, Digitala system, Industriella system.
    Privacy-preserving Federated Learning System for Fatigue Detection2023Ingår i: Proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience, CSR 2023, s. 624-629Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Context:. Drowsiness affects the driver’s cognitive abilities, which are all important for safe driving. Fatigue detection is a critical technique to avoid traffic accidents. Data sharing among vehicles can be used to optimize fatigue detection models and ensure driving safety. However, data privacy issues hinder the sharing process. To tackle these challenges, we propose a Federated Learning (FL) approach for fatigue-driving behavior monitoring. However, in the FL system, the privacy information of the drivers might be leaked. In this paper, we propose to combine the concept of differential privacy (DP) with Federated Learning for the fatigue detection application, in which artificial noise is added to parameters at the drivers’ side before aggregating. This approach will ensure the privacy of drivers’ data and the convergence of the federated learning algorithms. In this paper, the privacy level in the system is determined in order to achieve a balance between the noise scale and the model’s accuracy. In addition, we have evaluated our models resistance against a model inversion attack. The effectiveness of the attack is measured by the Mean Squared Error (MSE) between the reconstructed data point and the training data. The proposed approach, compared to the non-DP case, has a 6% accuracy loss while decreasing the effectiveness of the attacks by increasing the MSE from 5.0 to 7.0, so a balance between accuracy and noise scale is achieved.

  • 14.
    Rocco, Sandra Di
    et al.
    KTH Royal institute of Technology, Sweden.
    Edwards, Parker B.
    University of Notre Dame, United States.
    Eklund, David
    RISE Research Institutes of Sweden, Digitala system, Industriella system.
    Gäfvert, Oliver
    University of Oxford, United Kingdom.
    Hauenstein, Jonathan D.
    University of Notre Dame, United States.
    Computing Geometric Feature Sizes for Algebraic Manifolds2023Ingår i: SIAM Journal on Applied Algebra and Geometry, ISSN 2470-6566, Vol. 7, nr 4, s. 716-741Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    We introduce numerical algebraic geometry methods for computing lower bounds on the reach, local feature size, and weak feature size of the real part of an equidimensional and smooth algebraic variety using the variety’s defining polynomials as input. For the weak feature size, we also show that nonquadratic complete intersections generically have finitely many geometric bottlenecks, and we describe how to compute the weak feature size directly rather than a lower bound in this case. In all other cases, we describe additional computations that can be used to determine feature size values rather than lower bounds. 

  • 15. Rocco, Sandra Di
    et al.
    Eklund, David
    Weinstein, Madeleine
    The Bottleneck Degree of Algebraic Varieties2020Ingår i: SIAM Journal on Applied Algebra and Geometry, Vol. 4, nr 1, s. 227-253Artikel i tidskrift (Refereegranskat)
  • 16.
    Wang, Han
    et al.
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Eklund, David
    RISE Research Institutes of Sweden, Digitala system, Industriella system.
    Oprea, Alina
    Northeastern University, USA.
    Raza, Shahid
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    FL4IoT: IoT Device Fingerprinting and Identification Using Federated Learning2023Ingår i: ACM Trans. Internet Things, ISSN 2691-1914, Vol. 4, nr 3Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Unidentified devices in a network can result in devastating consequences. It is, therefore, necessary to fingerprint and identify IoT devices connected to private or critical networks. With the proliferation of massive but heterogeneous IoT devices, it is getting challenging to detect vulnerable devices connected to networks. Current machine learning-based techniques for fingerprinting and identifying devices necessitate a significant amount of data gathered from IoT networks that must be transmitted to a central cloud. Nevertheless, private IoT data cannot be shared with the central cloud in numerous sensitive scenarios. Federated learning (FL) has been regarded as a promising paradigm for decentralized learning and has been applied in many different use cases. It enables machine learning models to be trained in a privacy-preserving way. In this article, we propose a privacy-preserved IoT device fingerprinting and identification mechanisms using FL; we call it FL4IoT. FL4IoT is a two-phased system combining unsupervised-learning-based device fingerprinting and supervised-learning-based device identification. FL4IoT shows its practicality in different performance metrics in a federated and centralized setup. For instance, in the best cases, empirical results show that FL4IoT achieves ∌99% accuracy and F1-Score in identifying IoT devices using a federated setup without exposing any private data to a centralized cloud entity. In addition, FL4IoT can detect spoofed devices with over 99% accuracy.

  • 17.
    Wang, Han
    et al.
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Muñoz-González, Luis
    Imperial College London, UK.
    Eklund, David
    RISE Research Institutes of Sweden, Digitala system, Industriella system.
    Raza, Shahid
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Non-IID Data Re-Balancing at IoT Edge with Peer-to-Peer Federated Learning for Anomaly Detection2021Ingår i: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Association for Computing Machinery , 2021, s. 153-163Konferensbidrag (Refereegranskat)
    Abstract [en]

    The increase of the computational power in edge devices has enabled the penetration of distributed machine learning technologies such as federated learning, which allows to build collaborative models performing the training locally in the edge devices, improving the efficiency and the privacy for training of machine learning models, as the data remains in the edge devices. However, in some IoT networks the connectivity between devices and system components can be limited, which prevents the use of federated learning, as it requires a central node to orchestrate the training of the model. To sidestep this, peer-to-peer learning appears as a promising solution, as it does not require such an orchestrator. On the other side, the security challenges in IoT deployments have fostered the use of machine learning for attack and anomaly detection. In these problems, under supervised learning approaches, the training datasets are typically imbalanced, i.e. the number of anomalies is very small compared to the number of benign data points, which requires the use of re-balancing techniques to improve the algorithms’ performance. In this paper, we propose a novel peer-to-peer algorithm,P2PK-SMOTE, to train supervised anomaly detection machine learning models in non-IID scenarios, including mechanisms to locally re-balance the training datasets via synthetic generation of data points from the minority class. To improve the performance in non-IID scenarios, we also include a mechanism for sharing a small fraction of synthetic data from the minority class across devices, aiming to reduce the risk of data de-identification. Our experimental evaluation in real datasets for IoT anomaly detection across a different set of scenarios validates the benefits of our proposed approach.

  • 18.
    Wang, Han
    et al.
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    Muñoz-González, Luis
    Imperial College London, UK.
    Hameed, Muhammad Zaid
    IBM Research Europe, Ireland.
    Eklund, David
    RISE Research Institutes of Sweden, Digitala system, Industriella system.
    Raza, Shahid
    RISE Research Institutes of Sweden, Digitala system, Datavetenskap.
    SparSFA: Towards robust and communication-efficient peer-to-peer federated learning2023Ingår i: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 129, artikel-id 103182Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Federated Learning (FL) has emerged as a powerful paradigm to train collaborative machine learning (ML) models, preserving the privacy of the participants’ datasets. However, standard FL approaches present some limitations that can hinder their applicability in some applications. Thus, the need of a server or aggregator to orchestrate the learning process may not be possible in scenarios with limited connectivity, as in some IoT applications, and offer less flexibility to personalize the ML models for the different participants. To sidestep these limitations, peer-to-peer FL (P2PFL) provides more flexibility, allowing participants to train their own models in collaboration with their neighbors. However, given the huge number of parameters of typical Deep Neural Network architectures, the communication burden can also be very high. On the other side, it has been shown that standard aggregation schemes for FL are very brittle against data and model poisoning attacks. In this paper, we propose SparSFA, an algorithm for P2PFL capable of reducing the communication costs. We show that our method outperforms competing sparsification methods in P2P scenarios, speeding the convergence and enhancing the stability during training. SparSFA also includes a mechanism to mitigate poisoning attacks for each participant in any random network topology. Our empirical evaluation on real datasets for intrusion detection in IoT, considering both balanced and imbalanced-dataset scenarios, shows that SparSFA is robust to different indiscriminate poisoning attacks launched by one or multiple adversaries, outperforming other robust aggregation methods whilst reducing the communication costs through sparsification. 

1 - 18 av 18
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf