Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 14 de 14
Filtrar
1.
IEEE Trans Cybern ; 49(4): 1339-1352, 2019 Apr.
Artigo em Inglês | MEDLINE | ID: mdl-29994650

RESUMO

Collaborative filtering is widely used in recommendation systems. A user can get high-quality recommendations only when both the user himself/herself and other users actively participate, i.e., provide sufficient ratings. However, due to the rating cost, rational users tend to provide as few ratings as possible. Therefore, there exists a tradeoff between the rating cost and the recommendation quality. In this paper, we model the interactions among users as a game in satisfaction form and study the corresponding equilibrium, namely satisfaction equilibrium (SE). Considering that accumulated ratings are used for generating recommendations, we design a behavior rule which allows users to achieve an SE via iteratively rating items. We theoretically analyze under what conditions an SE can be learned via the behavior rule. Experimental results on Jester and MovieLens data sets confirm the analysis and demonstrate that, if all users have moderate expectations for recommendation quality and satisfied users are willing to provide more ratings, then all users can get satisfying recommendations without providing many ratings. The SE analysis of the proposed game in this paper is helpful for designing mechanisms to encourage user participation.

2.
IEEE Trans Biomed Eng ; 65(3): 489-501, 2018 03.
Artigo em Inglês | MEDLINE | ID: mdl-28463185

RESUMO

In this paper, we introduce TR-BREATH, a time-reversal (TR)-based contact-free breathing monitoring system. It is capable of breathing detection and multiperson breathing rate estimation within a short period of time using off-the-shelf WiFi devices. The proposed system exploits the channel state information (CSI) to capture the miniature variations in the environment caused by breathing. To magnify the CSI variations, TR-BREATH projects CSIs into the TR resonating strength (TRRS) feature space and analyzes the TRRS by the Root-MUSIC and affinity propagation algorithms. Extensive experiment results indoor demonstrate a perfect detection rate of breathing. With only 10 s of measurement, a mean accuracy of can be obtained for single-person breathing rate estimation under the non-line-of-sight (NLOS) scenario. Furthermore, it achieves a mean accuracy of in breathing rate estimation for a dozen people under the line-of-sight scenario and a mean accuracy of in breathing rate estimation of nine people under the NLOS scenario, both with 63 s of measurement. Moreover, TR-BREATH can estimate the number of people with an error around 1. We also demonstrate that TR-BREATH is robust against packet loss and motions. With the prevailing of WiFi, TR-BREATH can be applied for in-home and real-time breathing monitoring.


Assuntos
Taxa Respiratória/fisiologia , Processamento de Sinais Assistido por Computador , Tecnologia sem Fio , Algoritmos , Desenho de Equipamento , Humanos , Internet , Modelos Estatísticos
3.
IEEE Trans Image Process ; 24(3): 1087-100, 2015 Mar.
Artigo em Inglês | MEDLINE | ID: mdl-25585423

RESUMO

A signal's compression history is of particular forensic significance because it contains important information about the origin and authenticity of a signal. Because of this, antiforensic techniques have been developed that allow a forger to conceal manipulation fingerprints. However, when antiforensic techniques are applied to multimedia content, distortion maybe introduced, or the data size may be increased. Furthermore,when compressing an antiforensically modified forgery, a tradeoff between the rate and distortion is introduced into the system. As a result, a forger must balance three factors, such as how much the fingerprints can be forensically concealed, the data rate, and the distortion, are interrelated to form a 3D tradeoff. In this paper, we characterize this tradeoff by defining concealability and using it to measure the effectiveness of an antiforensic attack. Then, to demonstrate this tradeoff in a realistic scenario, we examine the concealability-rate-distortion tradeoff in double JPEG compression antiforensics. To evaluate this tradeoff, we propose flexible antiforensic dither as an attack in which the forger can vary the strength of antiforensics. To reduce the time and computational complexity associated with decoding a JPEG file, applying antiforensics, and recompressing, we propose anantiforensic transcoder to efficiently complete these tasks in one step. Through simulation, two surprising results are revealed. One is that if a forger uses a lower quality factor in the second compression, applying antiforensics can both increase concealability and decrease the data rate. The other is that for any pairing of concealability and distortion values, achieved using a higher secondary quality factor, can also be achieved using a lower secondary quality factor at a lower data rate. As a result, the forger has an incentive to always recompress using a lower secondary quality factor.

4.
IEEE Trans Image Process ; 21(5): 2667-80, 2012 May.
Artigo em Inglês | MEDLINE | ID: mdl-22434799

RESUMO

Mobile phones are among the most popular consumer devices, and the recent developments of 3G networks and smart phones enable users to watch video programs by subscribing data plans from service providers. Due to the ubiquity of mobile phones and phone-to-phone communication technologies, data-plan subscribers can redistribute the video content to nonsubscribers. Such a redistribution mechanism is a potential competitor for the mobile service provider and is very difficult to trace given users' high mobility. The service provider has to set a reasonable price for the data plan to prevent such unauthorized redistribution behavior to protect or maximize his/her own profit. In this paper, we analyze the optimal price setting for the service provider by investigating the equilibrium between the subscribers and the secondary buyers in the content-redistribution network. We model the behavior between the subscribers and the secondary buyers as a noncooperative game and find the optimal price and quantity for both groups of users. Based on the behavior of users in the redistribution network, we investigate the evolutionarily stable ratio of mobile users who decide to subscribe to the data plan. Such an analysis can help the service provider preserve his/her profit under the threat of the redistribution networks and can improve the quality of service for end users.


Assuntos
Telefone Celular/economia , Redes de Comunicação de Computadores/economia , Teoria dos Jogos , Disseminação de Informação , Modelos Econômicos , Multimídia/economia , Gravação em Vídeo/economia , Estados Unidos
5.
IEEE Trans Image Process ; 19(7): 1768-84, 2010 Jul.
Artigo em Inglês | MEDLINE | ID: mdl-20227979

RESUMO

Human behavior analysis in video sharing social networks is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates the impact of human dynamics on video sharing systems. Users watching live streaming in the same wireless network share the same limited bandwidth of backbone connection to the Internet, thus, they might want to cooperate with each other to obtain better video quality. These users form a wireless live-streaming social network. Every user wishes to watch video with high quality while paying as little as possible cost to help others. This paper focuses on providing incentives for user cooperation. We propose a game-theoretic framework to model user behavior and to analyze the optimal strategies for user cooperation simulation in wireless live streaming. We first analyze the Pareto optimality and the time-sensitive bargaining equilibrium of the two-person game. We then extend the solution to the multiuser scenario. We also consider potential selfish users' cheating behavior and malicious users' attacking behavior and analyze the performance of the proposed strategies with the existence of cheating users and malicious attackers. Both our analytical and simulation results show that the proposed strategies can effectively stimulate user cooperation, achieve cheat free and attack resistance, and help provide reliable services for wireless live streaming applications.


Assuntos
Comportamento Cooperativo , Relações Interpessoais , Processamento de Sinais Assistido por Computador , Apoio Social , Telecomunicações , Algoritmos , Redes de Comunicação de Computadores , Teoria dos Jogos , Humanos , Internet , Modelos Teóricos , Motivação , Grupo Associado , Gravação em Vídeo
6.
IEEE Trans Image Process ; 19(7): 1798-807, 2010 Jul.
Artigo em Inglês | MEDLINE | ID: mdl-20227981

RESUMO

Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. To develop an efficient collusion-resistant fingerprinting scheme, it is very important for the system designer to understand how the behavior dynamics of colluders affect the performance of collusion attack. In the literature, little effort has been made to explicitly study the relationship between risk, e.g., the probability of the colluders to be detected, and the distortion of the colluded signal. In this paper, we investigate the risk-distortion relationship for the linear video collusion attack with Gaussian fingerprint. We formulate the optimal linear collusion attack as an optimization problem of finding the optimal collusion parameters to minimize the distortion subject to a risk constraint. By varying the risk constraint and solving the corresponding optimization problem, we can derive the optimal risk-distortion curve. Moreover, based upon the observation that the detector/attacker can each improve the detection/attack performance with the knowledge of his/her opponent's strategy, we formulate the attack and detection problem as a dynamic mouse and cat game and study the optimal strategies for both the attacker and detector. We show that if the detector uses a fixed detection strategy, the attacker can estimate the detector's strategy and choose the corresponding optimal strategy to attack the fingerprinted video with a small distortion. However, if the detector is powerful, i.e., the detector can always estimate the attacker's strategy, the best strategy for the attacker is the min-max strategy. Finally, we conduct several experiments to verify the proposed risk-distortion model using real video data.

7.
IEEE Trans Inf Technol Biomed ; 13(1): 25-36, 2009 Jan.
Artigo em Inglês | MEDLINE | ID: mdl-19129021

RESUMO

Dynamic positron emission tomography (PET) imaging technique enables the measurement of neuroreceptor distributions corresponding to anatomic structures, and thus, allows image-wide quantification of physiological and biochemical parameters. Accurate quantification of the concentration of neuroreceptor has been the objective of many research efforts. Compartment modeling is the most widely used approach for receptor binding studies. However, current compartment-model-based methods often either require intrusive collection of accurate arterial blood measurements as the input function, or assume the existence of a reference region. To obviate the need for the input function or a reference region, in this paper, we propose to estimate the input function. We propose a novel concept of activity subspace, and estimate the input function by the analysis of the intersection of the activity subspaces. Then, the input function and the distribution volume (DV) parameter are refined and estimated iteratively. Thus, the underlying parametric image of the total DV is obtained. The proposed method is compared with a blind estimation method, iterative quadratic maximum-likelihood (IQML) via simulation, and the proposed method outperforms IQML. The proposed method is also evaluated in a brain PET dataset.


Assuntos
Tomografia por Emissão de Pósitrons/métodos , Processamento de Sinais Assistido por Computador , Algoritmos , Encéfalo/diagnóstico por imagem , Análise por Conglomerados , Simulação por Computador , Humanos , Modelos Teóricos , Distribuição Normal , Análise de Componente Principal , Proteínas da Membrana Plasmática de Transporte de Serotonina/química
8.
IEEE Trans Signal Process ; 53(9): 3473-3487, 2008 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-18769527

RESUMO

The positron emission tomography (PET) imaging technique enables the measurement of receptor distribution or neurotransmitter release in the living brain and the changes of the distribution with time and thus allows quantification of binding sites as well as the affinity of a radioligand. However, quantification of receptor binding studies obtained with PET is complicated by tissue heterogeneity in the sampling image elements (i.e., voxels, pixels). This effect is caused by a limited spatial resolution of the PET scanner. Spatial heterogeneity is often essential in understanding the underlying receptor binding process. Tracer kinetic modeling also often requires an intrusive collection of arterial blood samples. In this paper, we propose a likelihood-based framework in the voxel domain for quantitative imaging with or without the blood sampling of the input function. Radioligand kinetic parameters are estimated together with the input function. The parameters are initialized by a subspace-based algorithm and further refined by an iterative likelihood-based estimation procedure. The performance of the proposed scheme is examined by simulations. The results show that the proposed scheme provides reliable estimation of factor time-activity curves (TACs) and the underlying parametric images. A good match is noted between the result of the proposed approach and that of the Logan plot. Real brain PET data are also examined, and good performance is observed in determining the TACs and the underlying factor images.

9.
Bioinformatics ; 23(2): 198-206, 2007 Jan 15.
Artigo em Inglês | MEDLINE | ID: mdl-17077095

RESUMO

MOTIVATION: Our purpose is to develop a statistical modeling approach for cancer biomarker discovery and provide new insights into early cancer detection. We propose the concept of dependence network, apply it for identifying cancer biomarkers, and study the difference between the protein or gene samples from cancer and non-cancer subjects based on mass-spectrometry (MS) and microarray data. RESULTS: Three MS and two gene microarray datasets are studied. Clear differences are observed in the dependence networks for cancer and non-cancer samples. Protein/gene features are examined three at one time through an exhaustive search. Dependence networks are constructed by binding triples identified by the eigenvalue pattern of the dependence model, and are further compared to identify cancer biomarkers. Such dependence-network-based biomarkers show much greater consistency under 10-fold cross-validation than the classification-performance-based biomarkers. Furthermore, the biological relevance of the dependence-network-based biomarkers using microarray data is discussed. The proposed scheme is shown promising for cancer diagnosis and prediction. AVAILABILITY: See supplements: http://dsplab.eng.umd.edu/~genomics/dependencenetwork/


Assuntos
Biomarcadores Tumorais/análise , Diagnóstico por Computador/métodos , Espectrometria de Massas/métodos , Proteínas de Neoplasias/análise , Neoplasias/diagnóstico , Neoplasias/metabolismo , Análise de Sequência com Séries de Oligonucleotídeos/métodos , Algoritmos , Simulação por Computador , Perfilação da Expressão Gênica/métodos , Humanos , Modelos Biológicos , Transdução de Sinais
10.
Bioinformatics ; 22(8): 959-66, 2006 Apr 15.
Artigo em Inglês | MEDLINE | ID: mdl-16434439

RESUMO

MOTIVATION: Identification of genes expressed in a cell-cycle-specific periodical manner is of great interest to understand cyclic systems which play a critical role in many biological processes. However, identification of cell-cycle regulated genes by raw microarray gene expression data directly is complicated by the factor of synchronization loss, thus remains a challenging problem. Decomposing the expression measurements and extracting synchronized expression will allow to better represent the single-cell behavior and improve the accuracy in identifying periodically expressed genes. RESULTS: In this paper, we propose a resynchronization-based algorithm for identifying cell-cycle-related genes. We introduce a synchronization loss model by modeling the gene expression measurements as a superposition of different cell populations growing at different rates. The underlying expression profile is then reconstructed through resynchronization and is further fitted to the measurements in order to identify periodically expressed genes. Results from both simulations and real microarray data show that the proposed scheme is promising for identifying cyclic genes and revealing underlying gene expression profiles. AVAILABILITY: Contact the authors. SUPPLEMENTARY INFORMATION: Supplementary data are available at: http://dsplab.eng.umd.edu/~genomics/syn/


Assuntos
Algoritmos , Proteínas de Ciclo Celular/metabolismo , Perfilação da Expressão Gênica/métodos , Modelos Biológicos , Análise de Sequência com Séries de Oligonucleotídeos/métodos , Proteínas de Saccharomyces cerevisiae/metabolismo , Saccharomyces cerevisiae/metabolismo , Simulação por Computador , Análise Numérica Assistida por Computador , Periodicidade
11.
IEEE Trans Image Process ; 15(1): 12-29, 2006 Jan.
Artigo em Inglês | MEDLINE | ID: mdl-16435533

RESUMO

Digital fingerprinting is an emerging technology to protect multimedia content from illegal redistribution, where each distributed copy is labeled with unique identification information. In video streaming, huge amount of data have to be transmitted to a large number of users under stringent latency constraints, so the bandwidth-efficient distribution of uniquely fingerprinted copies is crucial. This paper investigates the secure multicast of anticollusion fingerprinted video in streaming applications and analyzes their performance. We first propose a general fingerprint multicast scheme that can be used with most spread spectrum embedding-based multimedia fingerprinting systems. To further improve the bandwidth efficiency, we explore the special structure of the fingerprint design and propose a joint fingerprint design and distribution scheme. From our simulations, the two proposed schemes can reduce the bandwidth requirement by 48% to 87%, depending on the number of users, the characteristics of video sequences, and the network and computation constraints. We also show that under the constraint that all colluders have the same probability of detection, the embedded fingerprints in the two schemes have approximately the same collusion resistance. Finally, we propose a fingerprint drift compensation scheme to improve the quality of the reconstructed sequences at the decoder's side without introducing extra communication overhead.


Assuntos
Algoritmos , Segurança Computacional , Interpretação de Imagem Assistida por Computador/métodos , Armazenamento e Recuperação da Informação/métodos , Reconhecimento Automatizado de Padrão/métodos , Processamento de Sinais Assistido por Computador , Gravação em Vídeo/métodos , Dermatoglifia , Multimídia , Reprodutibilidade dos Testes , Sensibilidade e Especificidade
12.
IEEE Trans Image Process ; 14(6): 804-21, 2005 Jun.
Artigo em Inglês | MEDLINE | ID: mdl-15971779

RESUMO

Digital fingerprinting is a method for protecting digital data in which fingerprints that are embedded in multimedia are capable of identifying unauthorized use of digital content. A powerful attack that can be employed to reduce this tracing capability is collusion, where several users combine their copies of the same content to attenuate/remove the original fingerprints. In this paper, we study the collusion resistance of a fingerprinting system employing Gaussian distributed fingerprints and orthogonal modulation. We introduce the maximum detector and the thresholding detector for colluder identification. We then analyze the collusion resistance of a system to the averaging collusion attack for the performance criteria represented by the probability of a false negative and the probability of a false positive. Lower and upper bounds for the maximum number of colluders K(max) are derived. We then show that the detectors are robust to different collusion attacks. We further study different sets of performance criteria, and our results indicate that attacks based on a few dozen independent copies can confound such a fingerprinting system. We also propose a likelihood-based approach to estimate the number of colluders. Finally, we demonstrate the performance for detecting colluders through experiments using real images.


Assuntos
Algoritmos , Gráficos por Computador , Segurança Computacional , Compressão de Dados/métodos , Interpretação de Imagem Assistida por Computador/métodos , Multimídia/classificação , Rotulagem de Produtos/métodos , Processamento de Sinais Assistido por Computador , Dermatoglifia , Ciências Forenses/métodos , Patentes como Assunto , Reconhecimento Automatizado de Padrão/métodos
13.
IEEE Trans Image Process ; 14(5): 646-61, 2005 May.
Artigo em Inglês | MEDLINE | ID: mdl-15887559

RESUMO

Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Unique identification information is embedded into each distributed copy of multimedia signal and serves as a digital fingerprint. Collusion attack is a cost-effective attack against digital fingerprinting, where colluders combine several copies with the same content but different fingerprints to remove or attenuate the original fingerprints. In this paper, we investigate the average collusion attack and several basic nonlinear collusions on independent Gaussian fingerprints, and study their effectiveness and the impact on the perceptual quality. With unbounded Gaussian fingerprints, perceivable distortion may exist in the fingerprinted copies as well as the copies after the collusion attacks. In order to remove this perceptual distortion, we introduce bounded Gaussian-like fingerprints and study their performance under collusion attacks. We also study several commonly used detection statistics and analyze their performance under collusion attacks. We further propose a preprocessing technique of the extracted fingerprints specifically for collusion scenarios to improve the detection performance.


Assuntos
Algoritmos , Segurança Computacional , Compressão de Dados/métodos , Ciências Forenses/métodos , Interpretação de Imagem Assistida por Computador/métodos , Reconhecimento Automatizado de Padrão/métodos , Rotulagem de Produtos/métodos , Gráficos por Computador , Hipermídia , Modelos Estatísticos , Dinâmica não Linear , Patentes como Assunto , Reprodutibilidade dos Testes , Sensibilidade e Especificidade , Processamento de Sinais Assistido por Computador
14.
Bioinformatics ; 21(14): 3114-21, 2005 Jul 15.
Artigo em Inglês | MEDLINE | ID: mdl-15879455

RESUMO

MOTIVATION: DNA microarray technologies make it possible to simultaneously monitor thousands of genes' expression levels. A topic of great interest is to study the different expression profiles between microarray samples from cancer patients and normal subjects, by classifying them at gene expression levels. Currently, various clustering methods have been proposed in the literature to classify cancer and normal samples based on microarray data, and they are predominantly data-driven approaches. In this paper, we propose an alternative approach, a model-driven approach, which can reveal the relationship between the global gene expression profile and the subject's health status, and thus is promising in predicting the early development of cancer. RESULTS: In this work, we propose an ensemble dependence model, aimed at exploring the group dependence relationship of gene clusters. Under the framework of hypothesis-testing, we employ genes' dependence relationship as a feature to model and classify cancer and normal samples. The proposed classification scheme is applied to several real cancer datasets, including cDNA, Affymetrix microarray and proteomic data. It is noted that the proposed method yields very promising performance. We further investigate the eigenvalue pattern of the proposed method, and we discover different patterns between cancer and normal samples. Moreover, the transition between cancer and normal patterns suggests that the eigenvalue pattern of the proposed models may have potential to predict the early stage of cancer development. In addition, we examine the effects of possible model mismatch on the proposed scheme.


Assuntos
Algoritmos , Biomarcadores Tumorais/metabolismo , Diagnóstico por Computador/métodos , Perfilação da Expressão Gênica/métodos , Proteínas de Neoplasias/metabolismo , Neoplasias/diagnóstico , Neoplasias/metabolismo , Análise de Sequência com Séries de Oligonucleotídeos/métodos , Inteligência Artificial , Biomarcadores Tumorais/análise , Simulação por Computador , Humanos , Modelos Genéticos , Proteínas de Neoplasias/análise , Neoplasias/genética , Reconhecimento Automatizado de Padrão/métodos , Reprodutibilidade dos Testes , Sensibilidade e Especificidade
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...