Session O-3B
Machine Learning in Biology, Interactivity, Security, and Beyond
1:00 PM to 2:30 PM | | Moderated by Richard Li
- Presenter
-
- Winston Chen, Senior, Electrical Engineering
- Mentors
-
- William Noble, Genome Sciences
- Yang Lu, Genome Sciences
- Session
-
- 1:00 PM to 2:30 PM
Commonly used in the areas of math and computer science, network propagation is a method that finds correlations within network data. Applied in the field of biology, network propagation shows powerful potential in making proximity predictions among genes, proteins, or other biological entities connected by a network structure. However, network propagation is sensitive toward perturbations in the data, making it unreliable when applied to incomplete or noisy biological network data. Therefore, performing confidence estimation on network propagation’s predictions is imperative for correctly interpreting the results. Currently, to our knowledge there is no existing method for confidence estimation in the context of network propagation. Simply applying a general-purpose confidence estimation method, such as permutation schemes, requires extensive computation. In this research we propose a novel approach that uses a recently described method, called the “knockoff filter,” to significantly reduce the computational cost of confidence estimation for network propagation. The knockoff filter is a method to perform false discovery rate (FDR) control for variable selection tasks. In a linear system that generates predictive system responses, the knockoff filter can be used to manufacture a set of knockoff variables given the original system variables. These knockoff variables can then serve as a negative control to help identify the truly important system responses. By applying the knockoff filter to network propagation-based biological proximity prediction algorithms, we are able to generate a knockoff network based on the original biological network. Then by comparing the network propagation results generated by both the original network and knockoff network, we are able to compute a confidence estimate for all the network propagation response variables. This approach provides fast and reliable confidence estimation.
- Presenter
-
- Ali (Arshia) Jahangirnezhad, Senior, Computer Science & Software Engineering Mary Gates Scholar
- Mentor
-
- Afra Mashhadi, Computing & Software Systems (Bothell Campus), UWB
- Session
-
- 1:00 PM to 2:30 PM
Deep embedded clustering (DEC) utilizes deep neural networks (DNN) in order to learn feature representations using an autoencoder which is optimized for clustering. This is done by integrating a clustering loss using Kullback-Leiber divergence (KL divergence). Autoencoder models have been successfully applied to many types of data in order to enable unsupervised representation learning. Recurrent neural networks and long-short term memory (LSTM) networks have been utilized in learning representations of audio data. In many cases, convolutional autoencoder algorithms (CAE) have been used in processing audio data, in order to extract their feature representations. However, for the purpose of clustering similar learned embedded features from audio data, there has not yet been an integration of DEC in the LSTM autoencoders. This research project focuses on implementing DEC for audio signals. For this purpose, we have integrated a clustering loss using KL divergence into a LSTM autoencoder. Mel Spectrograms of the audio data are then extracted. This time-series data is fed into the network. We have evaluated our model performance using enormous data sets of audio signals collected from deep and shallow water hydrophones. With the decrease of hardware costs, stationary hydrophones are increasingly deployed in the marine environment to record animal vocalizations amidst ocean noise over an extended period of time. Bioacoustic data collected in this way is an important and practical source to study vocally active marine species and can make an important contribution to ecosystem monitoring. However, a main challenge of this data is the lack of annotation which many supervised neural network models rely on to learn to distinguish between noise and marine animal vocalizations. In contrast to the previous works done in this field, our approach is designed for unsupervised representation learning, allowing us to use a large volume of unlabeled data.
- Presenters
-
- Annalice Ni, Senior, Computer Science UW Honors Program
- Tianyi Zhou, Senior, Computer Engineering
- Mentors
-
- Shwetak Patel, Computer Science & Engineering
- Richard Li, Computer Science & Engineering
- Session
-
- 1:00 PM to 2:30 PM
Interactive add-ons to computers offer the potential to enhance user experience and productivity, but these peripherals are often expensive and uncustomizable for normal users, designers, and differently abled individuals. AcousTickBoard uses cardboard, a ubiquitous household material due to widespread online shopping deliveries, to address accessibility in human-computer interaction (HCI) through tangible widgets that are both cheap and easily reconfigurable. First, we created the design of a pressable button made of cardboard that emits a “tick” sound when released. Then, we explored different ways of modifying the cardboard buttons in order to produce unique enough acoustic signatures to be independently recognized such that multiple buttons could be used at the same time. The modifications made to the buttons generally involved adding or subtracting material in order to manipulate the “tick”’s frequency and amplitude. Next, we developed a machine learning (ML) pipeline to recognize these different buttons through the computer’s microphone, with several modifications on the buttons producing detectably different audio signatures with an average of 90% accuracy per button. Finally, we conducted a user study in which participants replicated a subset of our button designs and provided both quantitative feedback in terms of how well their button worked as well as qualitative feedback in the form of survey questions. By understanding which modifications to the cardboard buttons yield the most accurate detection results, we can create and use the fabricated buttons as peripheral computer widgets. These low-cost widgets are easy to create and customize for educational purposes, temporary computer setups, and people with different abilities who need regular adjustments to their digital setups.
- Presenter
-
- Joshua Stuart Sterner, Senior, Computer Science & Software Engineering Mary Gates Scholar
- Mentor
-
- Afra Mashhadi, Computing & Software Systems (Bothell Campus), UWB
- Session
-
- 1:00 PM to 2:30 PM
Homomorphic encryption is a type of encryption which allows computations to be performed on encrypted data, without the need for the data to be decrypted first. Recent works have shown that homomorphic encryption can be used to train encrypted machine learning models on untrusted hardware. Federated learning enables distributed training of machine learning models on remote devices with their own private datasets. Existing federated learning techniques focus on protecting the privacy of the remote data, but not on protecting the content of the model being trained. Homomorphic encryption can be used with federated learning to protect the model. Homomorphic encryption is very computationally expensive, however, it has been shown that GPU (Graphics Processing Unit) acceleration can be used to decrease its required computation time. Modern GPUs, including those in mobile devices, can be used for general purpose computing. GPUs are well suited to data-parallel tasks in which one operation is applied to many items. Many of the computations involved in homomorphic encryption are well suited to a data-parallel approach. This research investigates the use and implementation of GPU accelerated homomorphic encryption on mobile devices and examines the potential for its use in federated learning tasks. There are many types of homomorphic encryption, some of which are better than others for certain types of computation. For instance, HEAAN (Homomorphic Encryption for Arithmetic of Approximate Numbers), also known as CKKS (the initials of the authors of HEAAN), is well suited to computations involving vectorized fixed-point values. We implement and benchmark HEAAN for mobile GPUs. We anticipate that the practically achievable model depth will be very limited even with GPU acceleration, but that it will be significantly better than CPU implementations. We also anticipate that memory requirements will be a significant limiting factor for practical model depth.
The University of Washington is committed to providing access and accommodation in its services, programs, and activities. To make a request connected to a disability or health condition contact the Office of Undergraduate Research at undergradresearch@uw.edu or the Disability Services Office at least ten days in advance.