Bar-Ilan Faculty of Engineering

2114 articles

52 publishers

Join mailing list

Dec 2024 • arXiv preprint arXiv:2312.02102

Mitigating Data Injection Attacks on Federated Learning

Or Shalom, Amir Leshem, Waheed U Bajwa

Federated learning is a technique that allows multiple entities to collaboratively train models using their data without compromising data privacy. However, despite its advantages, federated learning can be susceptible to false data injection attacks. In these scenarios, a malicious entity with control over specific agents in the network can manipulate the learning process, leading to a suboptimal model. Consequently, addressing these data injection attacks presents a significant research challenge in federated learning systems. In this paper, we propose a novel technique to detect and mitigate data injection attacks on federated learning systems. Our mitigation method is a local scheme, performed during a single instance of training by the coordinating node, allowing the mitigation during the convergence of the algorithm. Whenever an agent is suspected to be an attacker, its data will be ignored for a certain period, this decision will often be re-evaluated. We prove that with probability 1, after a finite time, all attackers will be ignored while the probability of ignoring a trustful agent becomes 0, provided that there is a majority of truthful agents. Simulations show that when the coordinating node detects and isolates all the attackers, the model recovers and converges to the truthful model.

Show more

Dec 2024 • Quantum Science and Technology

Quantum circuits for measuring weak values, Kirkwood–Dirac quasiprobability distributions, and state spectra

Rafael Wagner, Zohar Schwartzman-Nowik, Ismael Lucas Paiva, Amit Te'eni, Antonio Ruiz-Molero, Rui Soares Barbosa, Eliahu Cohen, Ernesto Galvão

Weak values and Kirkwood--Dirac (KD) quasiprobability distributions have been independently associated with both foundational issues in quantum theory and advantages in quantum metrology. We propose simple quantum circuits to measure weak values, KD distributions, and spectra of density matrices without the need for post-selection. This is achieved by measuring unitary-invariant, relational properties of quantum states, which are functions of Bargmann invariants, the concept that underpins our unified perspective. Our circuits also enable experimental implementation of various functions of KD distributions, such as out-of-time-ordered correlators (OTOCs) and the quantum Fisher information in post-selected parameter estimation, among others. An upshot is a unified view of nonclassicality in all those tasks. In particular, we discuss how negativity and imaginarity of Bargmann invariants relate to set coherence.

Show more

Dec 2024 • Intelligent Systems with Applications

An adaptive cost-sensitive learning approach in neural networks to minimize local training–test class distributions mismatch

Ohad Volk, Gonen Singer

We design an adaptive learning algorithm for binary classification problems whose objective is to reduce the cost of misclassified instances derived from the consequences of errors. Our algorithm (Adaptive Cost-Sensitive Learning — AdaCSL) adaptively adjusts the loss function to bridge the difference between the class distributions between subgroups of samples in the training and validation data sets. This adjustment is made for samples with similar predicted probabilities, in such a way that the local cost decreases. This process usually leads to a reduction in cost when applied to the test data set (i.e., local training–test class distributions mismatch). We present empirical evidence that neural networks used with the proposed algorithm yields better cost results on several data sets compared to other approaches. In addition, the proposed AdaCSL algorithm can optimize evaluation metrics other than cost. We …

Show more

Dec 2024 • arXiv preprint arXiv:2312.13240

Efficient Verification-Based Face Identification

Amit Rozner, Barak Battash, Ofir Lindenbaum, Lior Wolf

We study the problem of performing face verification with an efficient neural model . The efficiency of stems from simplifying the face verification problem from an embedding nearest neighbor search into a binary problem; each user has its own neural network . To allow information sharing between different individuals in the training set, we do not train directly but instead generate the model weights using a hypernetwork . This leads to the generation of a compact personalized model for face identification that can be deployed on edge devices. Key to the method's success is a novel way of generating hard negatives and carefully scheduling the training objectives. Our model leads to a substantially small requiring only 23k parameters and 5M floating point operations (FLOPS). We use six face verification datasets to demonstrate that our method is on par or better than state-of-the-art models, with a significantly reduced number of parameters and computational burden. Furthermore, we perform an extensive ablation study to demonstrate the importance of each element in our method.

Show more

Dec 2024 • arXiv e-prints

Contextual Feature Selection with Conditional Stochastic Gates

Ram Dyuthi Sristi, Ofir Lindenbaum, Maria Lavzin, Jackie Schiller, Gal Mishne, Hadas Benisty

We study the problem of contextual feature selection, where the goal is to learn a predictive function while identifying subsets of informative features conditioned on specific contexts. Towards this goal, we generalize the recently proposed stochastic gates (STG) Yamada et al.[2020] by modeling the probabilistic gates as conditional Bernoulli variables whose parameters are predicted based on the contextual variables. Our new scheme, termed conditional-STG (c-STG), comprises two networks: a hypernetwork that establishes the mapping between contextual variables and probabilistic feature selection parameters and a prediction network that maps the selected feature to the response variable. Training the two networks simultaneously ensures the comprehensive incorporation of context and feature selection within a unified model. We provide a theoretical analysis to examine several properties of the proposed …

Show more

Nov 2024 • arXiv preprint arXiv:2311.12980

Nonlinear self-calibrated spectrometer with single GeSe-InSe heterojunction device

Rana Darweesh, Rajesh Kumar Yadav, Elior Adler, Michal Poplinger, Adi Levi, Jea-Jung Lee, Amir Leshem, Ashwin Ramasubramaniam, Fengnian Xia, Doron Naveh

Optical spectroscopy the measurement of electromagnetic spectra is fundamental to various scientific domains and serves as the building block of numerous technologies. Computational spectrometry is an emerging field that employs an array of photodetectors with different spectral responses or a single photodetector device with tunable spectral response, in conjunction with numerical algorithms, for spectroscopic measurements. Compact single photodetectors made from layered materials are particularly attractive, since they eliminate the need for bulky mechanical and optical components used in traditional spectrometers and can easily be engineered as heterostructures to optimize device performance. However, compact tunable photodetectors are typically nonlinear devices and this adds complexity to extracting optical spectra from the device response. Here, we report on the training of an artificial neural network (ANN) to recover the full nonlinear spectral photoresponse of a nonlinear problem of high dimensionality of a single GeSe-InSe p-n heterojunction device. We demonstrate the functionality of a calibrated spectrometer in the spectral range of 400-1100 nm, with a small device footprint of ~25X25 micrometers, and we achieve a mean reconstruction error of 0.0002 for the power-spectrum at a spectral resolution of 0.35 nm. Using our device, we demonstrate a solution to metamerism, an apparent matching of colors with different power spectral distributions, which is a fundamental problem in optical imaging.

Show more

Nov 2024 • Journal of Biomedical Optics 29 (3), 037003-037003, 2024

Remote and low-cost intraocular pressure monitoring by deep learning of speckle patterns

Zeev Kalyuzhner, Sergey Agdarov, Yevgeny Beiderman, Aviya Bennett, Yafim Beiderman, Zeev Zalevsky

Intraocular pressure (IOP) measurements comprise an essential tool in modern medicine for the early diagnosis of glaucoma, the second leading cause of human blindness. The world's highest prevalence of glaucoma is in low-income countries.Current diagnostic methods require experience in running expensive equipment as well as the use of anesthetic eye drops. We present herein a remote photonic IOP biomonitoring method based on deep learning of secondary speckle patterns, captured by a fast camera, that are reflected from eye sclera stimulated by an external sound wave. By combining speckle pattern analysis with deep learning, high precision measurements are possible.

Show more

Nov 2024 • bioRxiv

Characterization of alternative splicing in high-risk Wilms’ tumors

Yaron Trink, Achia Urbach, Benjamin Dekel, Peter Hohenstein, Jacob Goldberger, Tomer Kalisky

The significant heterogeneity of Wilms’ tumors between different patients is thought to arise from genetic and epigenetic distortions that occur during various stages of fetal kidney development in a way that is poorly understood. To address this, we characterized the heterogeneity of alternative mRNA splicing in Wilms’ tumors using a publicly available RNAseq dataset of high-risk Wilms’ tumors and normal kidney samples. Through Pareto task inference and cell deconvolution, we found that the tumors and normal kidney samples are organized according to progressive stages of kidney development within a triangle-shaped region in latent space, whose vertices, or “archetypes,” resemble the cap mesenchyme, the nephrogenic stroma, and epithelial tubular structures of the fetal kidney. We identified a set of genes that are alternatively spliced between tumors located in different regions of latent space and found that many of these genes are associated with the Epithelial to Mesenchymal Transition (EMT) and muscle development. Using motif enrichment analysis, we identified putative splicing regulators, some of which are associated with kidney development. Our findings provide new insights into the etiology of Wilms’ tumors and suggest that specific splicing mechanisms in early stages of development may contribute to tumor development in different patients.

Show more

Nov 2024 • bioRxiv

Characterization of alternative splicing in high-risk Wilms’ tumors

Yaron Trink, Achia Urbach, Benjamin Dekel, Peter Hohenstein, Jacob Goldberger, Tomer Kalisky

The significant heterogeneity of Wilms’ tumors between different patients is thought to arise from genetic and epigenetic distortions that occur during various stages of fetal kidney development in a way that is poorly understood. To address this, we characterized the heterogeneity of alternative mRNA splicing in Wilms’ tumors using a publicly available RNAseq dataset of high-risk Wilms’ tumors and normal kidney samples. Through Pareto task inference and cell deconvolution, we found that the tumors and normal kidney samples are organized according to progressive stages of kidney development within a triangle-shaped region in latent space, whose vertices, or “archetypes,” resemble the cap mesenchyme, the nephrogenic stroma, and epithelial tubular structures of the fetal kidney. We identified a set of genes that are alternatively spliced between tumors located in different regions of latent space and found that many of these genes are associated with the Epithelial to Mesenchymal Transition (EMT) and muscle development. Using motif enrichment analysis, we identified putative splicing regulators, some of which are associated with kidney development. Our findings provide new insights into the etiology of Wilms’ tumors and suggest that specific splicing mechanisms in early stages of development may contribute to tumor development in different patients.

Show more

Oct 2024 • bioRxiv

Resolving haplotype variation and complex genetic architecture in the human immunoglobulin kappa chain locus in individuals of diverse ancestry

Eric Engelbrecht, Oscar L Rodriguez, Kaitlyn Shields, Steven Schulze, David Tieri, Uddalok Jana, Gur Yaari, William Lees, Melissa L Smith, Corey T Watson

Immunoglobulins (IGs), critical components of the human immune system, are composed of heavy and light protein chains encoded at three genomic loci. The IG Kappa (IGK) chain locus consists of two large, inverted segmental duplications. The complexity of IG loci has hindered effective use of standard high-throughput methods for characterizing genetic variation within these regions. To overcome these limitations, we leverage long-read sequencing to create haplotype-resolved IGK assemblies in an ancestrally diverse cohort (n=36), representing the first comprehensive description of IGK haplotype variation at population-scale. We identify extensive locus polymorphism, including novel single nucleotide variants (SNVs) and a common novel ~24.7 Kbp structural variant harboring a functional IGKV gene. Among 47 functional IGKV genes, we identify 141 alleles, 64 (45.4%) of which were not previously curated. We report inter-population differences in allele frequencies for 14 of the IGKV genes, including alleles unique to specific populations within this dataset. Finally, we identify haplotypes carrying signatures of gene conversion that associate with enrichment of SNVs in the IGK distal region. These data provide a critical resource of curated genomic reference information from diverse ancestries, laying a foundation for advancing our understanding of population-level genetic variation in the IGK locus.

Show more

Oct 2024 • arXiv preprint arXiv:2110.00494

Transductive and Inductive Outlier Detection with Robust Autoencoders

Ofir Lindenbaum, Yariv Aizenbud, Yuval Kluger

Anomalies (or outliers) are prevalent in real-world empirical observations and potentially mask important underlying structures. Accurate identification of anomalous samples is crucial for the success of downstream data analysis tasks. To automatically identify anomalies, we propose Probabilistic Robust AutoEncoder (PRAE). PRAE aims to simultaneously remove outliers and identify a low-dimensional representation for the inlier samples. We first present the Robust AutoEncoder (RAE) objective as a minimization problem for splitting the data into inliers and outliers. Our objective is designed to exclude outliers while including a subset of samples (inliers) that can be effectively reconstructed using an AutoEncoder (AE). RAE minimizes the autoencoder's reconstruction error while incorporating as many samples as possible. This could be formulated via regularization by subtracting an norm counting the number of selected samples from the reconstruction term. Unfortunately, this leads to an intractable combinatorial problem. Therefore, we propose two probabilistic relaxations of RAE, which are differentiable and alleviate the need for a combinatorial search. We prove that the solution to the PRAE problem is equivalent to the solution of RAE. We use synthetic data to show that PRAE can accurately remove outliers in a wide range of contamination levels. Finally, we demonstrate that using PRAE for anomaly detection leads to state-of-the-art results on various benchmark datasets.

Show more

Oct 2024 • Optics & Laser Technology

Quantitative phase imaging by automated Cepstrum-based interferometric microscopy (CIM)

Ricardo Rubio-Oliver, Vicente Micó, Zeev Zalevsky, Javier García, Jose Angel Picazo-Bueno

Digital holographic microscopy (DHM) is a very popular interferometric technique for quantitative phase imaging (QPI). In DHM, an interferometer is combined with a microscope to create interference between an imaging beam containing information about the analysed sample and a clear reference beam carrying no sample information. To exploit the capability of reference beam in terms of useful sample information, we have recently proposed Cepstrum-based Interferometric Microscopy (CIM) [Opt. Las. Tech. 174, 110,626 (2024)] as a novel methodology involving the interference of two imaging beams carrying different sample information and to accurately retrieve quantitative phase data of both beams. In the earlier implementation, proof-of-concept of CIM was demonstrated for a Michelson-based layout requiring manual adjustments during the CIM methodology and validated only for low numerical aperture (NA …

Show more

Oct 2024 • Nature nanotechnology

High-energy all-solid-state lithium batteries enabled by Co-free LiNiO2 cathodes with robust outside-in structures

Longlong Wang, Ayan Mukherjee, Chang-Yang Kuo, Sankalpita Chakrabarty, Reut Yemini, Arrelaine A Dameron, Jaime W DuMont, Sri Harsha Akella, Arka Saha, Sarah Taragin, Hagit Aviv, Doron Naveh, Daniel Sharon, Ting-Shan Chan, Hong-Ji Lin, Jyh-Fu Lee, Chien-Te Chen, Boyang Liu, Xiangwen Gao, Suddhasatwa Basu, Zhiwei Hu, Doron Aurbach, Peter G Bruce, Malachi Noked

A critical current challenge in the development of all-solid-state lithium batteries (ASSLBs) is reducing the cost of fabrication without compromising the performance. Here we report a sulfide ASSLB based on a high-energy, Co-free LiNiO2 cathode with a robust outside-in structure. This promising cathode is enabled by the high-pressure O2 synthesis and subsequent atomic layer deposition of a unique ultrathin LixAlyZnzOδ protective layer comprising a LixAlyZnzOδ surface coating region and an Al and Zn near-surface doping region. This high-quality artificial interphase enhances the structural stability and interfacial dynamics of the cathode as it mitigates the contact loss and continuous side reactions at the cathode/solid electrolyte interface. As a result, our ASSLBs exhibit a high areal capacity (4.65 mAh cm−2), a high specific cathode capacity (203 mAh g−1), superior cycling stability (92% capacity retention …

Show more

Sep 2024 • Personality and Individual Differences

Sex similarities and differences in executive functions: Examining measurement invariance in a multi-group confirmatory factor analysis with replication

Dror Garbi, Yair Noam, Hila Sorek-Pozes, Uri Hefetz-Haroush, Nachshon Meiran

Sex differences in three functions, broadly defined as executive functions: Shifting, Inhibition (anti-saccade) and Decision under Load (DUL) were examined in two highly variable samples each of N > 500, 16–18 and 18–50-year-olds. Mental Speed was assessed and executive functions were defined after integrating reaction-time and accuracy and after residualizing from Speed. Measurement Invariance (MI) was examined using multi-group Confirmatory Factor Analysis. Scalar/ strict MI was achieved and inter-factor correlations were statistically equivalent in the two sexes. This measurement equivalence across the sexes legitimized comparing the sexes in latent variable means, showing that men outperformed women in Inhibition and in (the somewhat older) Sample 2 only, women outperformed men in DuL and Shifting. The possibility that these latter differences reflect a particular sample makeup cannot be …

Show more

Sep 2024 • arXiv preprint arXiv:2309.01347

Piezoelectric electrostatic superlattices in monolayer

Ashwin Ramasubramaniam, Doron Naveh

Modulation of electronic properties of materials by electric fields is central to the operation of modern semiconductor devices, providing access to complex electronic behaviors and greater freedom in tuning the energy bands of materials. Here, we explore one-dimensional superlattices induced by a confining electrostatic potential in monolayer MoS, a prototypical two-dimensional semiconductor. Using first-principles calculations, we show that periodic potentials applied to monolayer MoS induce electrostatic superlattices in which the response is dominated by structural distortions relative to purely electronic effects. These structural distortions reduce the intrinsic band gap of the monolayer substantially while also polarizing the monolayer through piezoelectric coupling, resulting in spatial separation of charge carriers as well as Stark shifts that produce dispersive minibands. Importantly, these minibands inherit the valley-selective magnetic properties of monolayer MoS, enabling fine control over spin-valley coupling in MoS and similar transition-metal dichalcogenides.

Show more

Aug 2024 • arXiv preprint arXiv:2208.09888

Iteration-Free quantum approximate optimization algorithm using neural networks

Ohad Amosy, Tamuz Danzig, Ely Porat, Gal Chechik, Adi Makmal

The quantum approximate optimization algorithm (QAOA) is a leading iterative variational quantum algorithm for heuristically solving combinatorial optimization problems. A large portion of the computational effort in QAOA is spent by the optimization steps, which require many executions of the quantum circuit. Therefore, there is active research focusing on finding better initial circuit parameters, which would reduce the number of required iterations and hence the overall execution time. While existing methods for parameter initialization have shown great success, they often offer a single set of parameters for all problem instances. We propose a practical method that uses a simple, fully connected neural network that leverages previous executions of QAOA to find better initialization parameters tailored to a new given problem instance. We benchmark state-of-the-art initialization methods for solving the MaxCut problem of Erd\H{o}s-R\'enyi graphs using QAOA and show that our method is consistently the fastest to converge while also yielding the best final result. Furthermore, the parameters predicted by the neural network are shown to match very well with the fully optimized parameters, to the extent that no iterative steps are required, thereby effectively realizing an iterative-free QAOA scheme.

Show more

Aug 2024 • arXiv preprint arXiv:2308.14075

FaceCoresetNet: Differentiable Coresets for Face Set Recognition

Gil Shapira, Yosi Keller

In set-based face recognition, we aim to compute the most discriminative descriptor from an unbounded set of images and videos showing a single person. A discriminative descriptor balances two policies when aggregating information from a given set. The first is a quality-based policy: emphasizing high-quality and down-weighting low-quality images. The second is a diversity-based policy: emphasizing unique images in the set and down-weighting multiple occurrences of similar images as found in video clips which can overwhelm the set representation. This work frames face-set representation as a differentiable coreset selection problem. Our model learns how to select a small coreset of the input set that balances quality and diversity policies using a learned metric parameterized by the face quality, optimized end-to-end. The selection process is a differentiable farthest-point sampling (FPS) realized by approximating the non-differentiable Argmax operation with differentiable sampling from the Gumbel-Softmax distribution of distances. The small coreset is later used as queries in a self and cross-attention architecture to enrich the descriptor with information from the whole set. Our model is order-invariant and linear in the input set size. We set a new SOTA to set face verification on the IJB-B and IJB-C datasets. Our code is publicly available.

Show more

Jul 2024 • arXiv preprint arXiv:2307.01874

Nonrelativistic spatiotemporal quantum reference frames

Michael Suleymanov, Ismael L Paiva, Eliahu Cohen

Quantum reference frames have attracted renewed interest recently, as their exploration is relevant and instructive in many areas of quantum theory. Among the different types, position and time reference frames have captivated special attention. Here, we introduce and analyze a non-relativistic framework in which each system contains an internal clock, in addition to its external (spatial) degree of freedom and, hence, can be used as a spatiotemporal quantum reference frame. Among other applications of this framework, we show that even in simple scenarios with no interactions, the relative uncertainty between clocks affects the relative spatial spread of the systems.

Show more

Jul 2024 • arXiv preprint arXiv:2407.09463

Interactive Coding with Unbounded Noise

Eden Fargion, Ran Gelles, Meghal Gupta

Interactive coding allows two parties to conduct a distributed computation despite noise corrupting a certain fraction of their communication. Dani et al.\@ (Inf.\@ and Comp., 2018) suggested a novel setting in which the amount of noise is unbounded and can significantly exceed the length of the (noise-free) computation. While no solution is possible in the worst case, under the restriction of oblivious noise, Dani et al.\@ designed a coding scheme that succeeds with a polynomially small failure probability. We revisit the question of conducting computations under this harsh type of noise and devise a computationally-efficient coding scheme that guarantees the success of the computation, except with an exponentially small probability. This higher degree of correctness matches the case of coding schemes with a bounded fraction of noise. Our simulation of an -bit noise-free computation in the presence of corruptions, communicates an optimal number of bits and succeeds with probability . We design this coding scheme by introducing an intermediary noise model, where an oblivious adversary can choose the locations of corruptions in a worst-case manner, but the effect of each corruption is random: the noise either flips the transmission with some probability or otherwise erases it. This randomized abstraction turns out to be instrumental in achieving an optimal coding scheme.

Show more

Jul 2024 • Advanced Quantum Technologies

Back Cover: Photon Number Splitting Attack–Proposal and Analysis of an Experimental Scheme (Adv. Quantum Technol. 7/2024)

Ariel Ashkenazy, Yuval Idan, Dor Korn, Dror Fixler, Barak Dayan, Eliahu Cohen

Depicted is a novel setup for realizing the photon number splitting (PNS) attack with current-day technology, namely, using the single-photon Raman interaction. In article number 2300437, Eliahu Cohen and co-workers analyze the amount of information which the eavesdropper (Eve) can obtain using this physical realization of PNS, concluding that while part of the secret key is at risk when weak coherent states are used, there is still a price for Eve to pay in terms of the induced noise. This stresses the importance of proper countermeasures.

Show more

Jul 2024 • Journal of Cryptology

The Price of Active Security in Cryptographic Protocols

Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss

We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting, for an arbitrary field with constant communication overhead over the “passive-GMW” protocol (Goldreich, Micali and Wigderson, STOC ‘87). Our protocols rely on passive implementations of Oblivious Transfer (OT) in the Boolean setting and Oblivious Linear function Evaluation (OLE) in the arithmetic setting. Previously, such protocols were only known over sufficiently large fields (Genkin et al. STOC ‘14) or a constant number of parties (Ishai et al. CRYPTO ‘08). Conceptually, our protocols are obtained via a new compiler from a passively-secure protocol for a distributed multiplication functionality , to an actively-secure protocol for general functionalities. Roughly, is parameterized by a linear-secret sharing scheme , where it takes -shares of two secrets and returns …

Show more

logo
Articali

Powered by Articali

TermsPrivacy