Communications in Computer and Information Science
Label noise and class imbalance are two of the critical challenges when training image-based deep... more Label noise and class imbalance are two of the critical challenges when training image-based deep neural networks, especially in the biomedical image processing domain. Our work focuses on how to effectively and accurately address the two challenges in the task of lesion segmentation from biomedical/medical images. To address the pixel-level label noise problem, an advanced transfer training and learning approach with a detailed DICOM pre-processing work is proposed in this paper. To address the tumor/non-tumor class imbalance problem, we exploit a self-adaptive fully convolutional neural network with an automated weight distribution mechanism to accurately spot the Radiomics lung tumor regions. Furthermore, an improved conditional random field method is utilized to obtain a sophisticated lung tumor contour delineation and segmentation. Finally, our approach has been evaluated using several well-known evaluation metrics on the Radiomics Lung Tumor segmentation dataset used in the 2018 IEEE VIP-CUP Challenge, which totally contains 422 patient records with 51513 Radiomics Lung slices. Experimental results show that our weakly supervised learning algorithm outperforms other deep models and state-of-the-art approaches.
Crowdsourcing is the process of engaging a crowd to provide services that can take place on many ... more Crowdsourcing is the process of engaging a crowd to provide services that can take place on many different levels and across various domains. The human-centric and cooperationoriented feature of crowdsourcing prompts us to reexamine the trust, privacy, and security issues in this new paradigm since the individuals in the crowd typically are unfamiliar with each other and usually have different motivation behind participation. The goal of this special issue is to solicit high quality, original research contributions on all aspects of trust, privacy and security on crowdsourcing computing, thereby capturing the state of the art and stimulating further developments in the related areas. This will serve as not only a reference to all researchers working in the area, but also an important resource for the industry, showing the maturity of trust, privacy and security technology and creating an atmosphere for funding new trust, privacy and security projects. Following an open call for papers, we received 26 submissions. Manuscripts passing the initial screening went through a rigorous two-round review process, during which each submission was evaluated by at least two reviewers based on topic relevance, originality of ideas, technical quality, significance of results, and quality of presentation. Finally, we accepted 12 papers. In the following, we will highlight the contributions of each paper. Paper "A Survey of Blockchain Technology on Security, Privacy, and Trust in Crowdsourcing Services" by Ying Ma, Yu Sun, Yunjie Lei, Nan Qin, and Junwen Lu surveys existing blockchain technology to security, privacy, and trust issues in crowdsourcing services from the direction of industry and research, by discussing background knowledge, related concepts and basic models of blockchain, and analysing the current research status and the application of blockchain. The authors summarise the advantages and challenges of
Research in event detection from the Twitter streaming data has been gaining momentum in the last... more Research in event detection from the Twitter streaming data has been gaining momentum in the last couple of years. Although such data is noisy and often contains misleading information, Twitter can be a rich source of information if harnessed properly. In this paper, we propose a scalable event detection system, TwitterNews, to detect and track newsworthy events in real time from Twitter. TwitterNews provides a novel approach, by combining random indexing based term vector model with locality sensitive hashing, that aids in performing incremental clustering of tweets related to various events within a fixed time. TwitterNews also incorporates an effective strategy to deal with the cluster fragmentation issue prevalent in incremental clustering. The set of candidate events generated by TwitterNews are then filtered, to report the newsworthy events along with an automatically selected representative tweet from each event cluster. Finally, we evaluate the effectiveness of TwitterNews, ...
This paper proposes a high-rate and high-capacity measurement-device-independent quantum key dist... more This paper proposes a high-rate and high-capacity measurement-device-independent quantum key distribution (MDI-QKD) protocol with Fibonacci-valued and Lucas-valued orbital angular momentum (OAM) entangled states in free space. In the existing MDI-OAM-QKD protocols, the main encoding algorithm handles encoded numbers in a bit-by-bit manner. To design a fast encoding algorithm, we introduce a Fibonacci matrix coding algorithm, by which, encoded numbers are separated into segments longer than one bit. By doing so, when compared to the existing MDI-OAM-QKD protocols, the new protocol can effectively increase the key rate and the coding capacity. This is because Fibonacci sequences are used in preparing OAM entangled states, reducing the misattribution errors (which slow down the execution cycle of the entire QKD) in QKD protocols. Moreover, our protocol keeps the data blocks as small as possible, so as to have more blocks in a given time interval. Most importantly, our proposed protocol can distill multiple Fibonacci key matrices from the same block of data, thus reducing the statistical fluctuations in the sample and increasing the final QKD rate. Last but not the least, the sender and the receiver can omit classical information exchange and bit flipping in the secure key distillation stage.
Social media has enabled information-sharing across massively large networks of people without sp... more Social media has enabled information-sharing across massively large networks of people without spending much financial resources and time that are otherwise required in the print and electronic media. Mobile-based social media applications have overwhelmingly changed the information-sharing perspective. However, with the advent of such applications at an unprecedented scale, the privacy of the information is compromised to a larger extent if breach mitigation is not adequate. Since healthcare applications are also being developed for mobile devices so that they also benefit from the power of social media, cybersecurity privacy concerns for such sensitive applications have become critical. This article discusses the architecture of a typical mobile healthcare application, in which customized privacy levels are defined for the individuals participating in the system. It then elaborates on how the communication across a social network in a multi-cloud environment can be made more secur...
Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmiss... more Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix ...
E-Healthcare is an emerging field that provides mobility to its users. The protected health infor... more E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.
With prevalent attacks in communication, sharing a secret between communicating parties is an ong... more With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in compari...
International Journal of Functional Informatics and Personalised Medicine, Mar 20, 2015
... living cells. However, the most important application of such discovery is in drug design, as... more ... living cells. However, the most important application of such discovery is in drug design, as pathological effects of a drug can only be addressed with precise knowledge of what functions and dysfunctions really are. Living cells ...
Proceedings of the 12th International Symposium on Foundations of Intelligent Systems, 2000
Abstract. Data mining, often called knowledge discovery in databases (KDD), aims at semiautomatic... more Abstract. Data mining, often called knowledge discovery in databases (KDD), aims at semiautomatic tools for the analysis of large data sets. This report is first intended to serve as a timely overview of a rapidly emerging area of research, called temporal data mining (that is, data mining ...
Twenty Fourth Aaai Conference on Artificial Intelligence, 2010
Online social networks are becoming increasingly popular and are being used as the means for a va... more Online social networks are becoming increasingly popular and are being used as the means for a variety of rich activities. This demands the evaluation of the trustworthiness between two unknown participants along a certain social trust path between them in the social network. However, there are usually many social trust paths between participants. Thus, a challenging problem is finding which social trust path is the optimal one that can yield the most trustworthy evaluation result. In this paper, we first present a new complex social network structure and a new concept of Quality of Trust (QoT) to illustrate the ability to guarantee a certain level of trustworthiness in trust evaluation. We then model the optimal social trust path selection as a Multi-Constrained Optimal Path (MCOP) selection problem which is NP-Complete. For solving this problem, we propose an efficient approximation algorithm MONTE K based on the Monte Carlo method. The results of our experiments conducted on a real dataset of social networks illustrate that our proposed algorithm significantly outperforms existing approaches in both efficiency and the quality of selected social trust paths.
Sixth International Conference on Intelligent Systems Design and Applications, 2006
Unsupervised learning plays an important role in knowledge exploration and discovery. Two basic e... more Unsupervised learning plays an important role in knowledge exploration and discovery. Two basic examples of unsupervised learning are clustering and dimensionality reduction. In this paper, we introduce an improved model for clustering based on a hierarchical analysis method. In our model, there are three main steps. In the first step, we use a structural clustering model to find qualitative patterns from a given dataset. Then, the second step applies a quantitative-based clustering algorithm to find quantitative patterns from the dataset. The third and the last step generates hybrid patterns by combining the patterns obtained from the first two steps based on a certain criterion so that deeply hidden relationships can be extracted from the dataset. In this paper, we also discuss the results of our experiments with the proposed model and algorithms on longitudinal medical records.
This paper introduces an extension of logic programming based on multi-dimensional logics. In a m... more This paper introduces an extension of logic programming based on multi-dimensional logics. In a multi-dimensional logic the values of elements vary depending on more than one dimension, such as time and space. The resulting logic programming language is suitable for modelling objects which involve implicit and/or explicit temporal and spatial dependencies. The execution of programs of the language is based on a resolution-type proof procedure called MSLD-resolution. MSLDresolution is based on the axioms and rules of inference of the underlying multidimensional logic. Several example programs are given, including Conway's game of life. A spreadsheet interface to multi-dimensional logic programming is also outlined; it can be used as a powerful display tool with the advantage of non-determinism inherent in logic programming.
Proceedings of the 2004 Acm Workshop on Next Generation Residential Broadband Challenges, Oct 15, 2004
This paper aims to study the concept of a distributed World Wide Web archive that complements the... more This paper aims to study the concept of a distributed World Wide Web archive that complements the existing WWW and "lives" across a vast Peer-to-Peer network of broadband-connected user nodes. It proposes the sharing of a web browser's cached data with other peers in an effort to provide an alternative resource to "discontinued" web documents with [normally] short life spans such as video and audio content as well as frequently restructured text pages. We have based this study on the success of existing file-sharing Peer-to-Peer networks and aim to extend their use further to facilitate content-oriented usage more appropriately while at the same time, addressing some of the major problems that arise from this.
Proceedings of the 2009 International Conference on Computational Science and Engineering Volume 04, 2009
... Yan Wang Department of Computing Macquarie University Sydney, NSW 2109, Australia yanwang@sci... more ... Yan Wang Department of Computing Macquarie University Sydney, NSW 2109, Australia [email protected] Mehmet Orgun Department of Computing Macquarie University Sydney, NSW 2109, Australia [email protected] Abstract ...
Communications in Computer and Information Science
Label noise and class imbalance are two of the critical challenges when training image-based deep... more Label noise and class imbalance are two of the critical challenges when training image-based deep neural networks, especially in the biomedical image processing domain. Our work focuses on how to effectively and accurately address the two challenges in the task of lesion segmentation from biomedical/medical images. To address the pixel-level label noise problem, an advanced transfer training and learning approach with a detailed DICOM pre-processing work is proposed in this paper. To address the tumor/non-tumor class imbalance problem, we exploit a self-adaptive fully convolutional neural network with an automated weight distribution mechanism to accurately spot the Radiomics lung tumor regions. Furthermore, an improved conditional random field method is utilized to obtain a sophisticated lung tumor contour delineation and segmentation. Finally, our approach has been evaluated using several well-known evaluation metrics on the Radiomics Lung Tumor segmentation dataset used in the 2018 IEEE VIP-CUP Challenge, which totally contains 422 patient records with 51513 Radiomics Lung slices. Experimental results show that our weakly supervised learning algorithm outperforms other deep models and state-of-the-art approaches.
Crowdsourcing is the process of engaging a crowd to provide services that can take place on many ... more Crowdsourcing is the process of engaging a crowd to provide services that can take place on many different levels and across various domains. The human-centric and cooperationoriented feature of crowdsourcing prompts us to reexamine the trust, privacy, and security issues in this new paradigm since the individuals in the crowd typically are unfamiliar with each other and usually have different motivation behind participation. The goal of this special issue is to solicit high quality, original research contributions on all aspects of trust, privacy and security on crowdsourcing computing, thereby capturing the state of the art and stimulating further developments in the related areas. This will serve as not only a reference to all researchers working in the area, but also an important resource for the industry, showing the maturity of trust, privacy and security technology and creating an atmosphere for funding new trust, privacy and security projects. Following an open call for papers, we received 26 submissions. Manuscripts passing the initial screening went through a rigorous two-round review process, during which each submission was evaluated by at least two reviewers based on topic relevance, originality of ideas, technical quality, significance of results, and quality of presentation. Finally, we accepted 12 papers. In the following, we will highlight the contributions of each paper. Paper "A Survey of Blockchain Technology on Security, Privacy, and Trust in Crowdsourcing Services" by Ying Ma, Yu Sun, Yunjie Lei, Nan Qin, and Junwen Lu surveys existing blockchain technology to security, privacy, and trust issues in crowdsourcing services from the direction of industry and research, by discussing background knowledge, related concepts and basic models of blockchain, and analysing the current research status and the application of blockchain. The authors summarise the advantages and challenges of
Research in event detection from the Twitter streaming data has been gaining momentum in the last... more Research in event detection from the Twitter streaming data has been gaining momentum in the last couple of years. Although such data is noisy and often contains misleading information, Twitter can be a rich source of information if harnessed properly. In this paper, we propose a scalable event detection system, TwitterNews, to detect and track newsworthy events in real time from Twitter. TwitterNews provides a novel approach, by combining random indexing based term vector model with locality sensitive hashing, that aids in performing incremental clustering of tweets related to various events within a fixed time. TwitterNews also incorporates an effective strategy to deal with the cluster fragmentation issue prevalent in incremental clustering. The set of candidate events generated by TwitterNews are then filtered, to report the newsworthy events along with an automatically selected representative tweet from each event cluster. Finally, we evaluate the effectiveness of TwitterNews, ...
This paper proposes a high-rate and high-capacity measurement-device-independent quantum key dist... more This paper proposes a high-rate and high-capacity measurement-device-independent quantum key distribution (MDI-QKD) protocol with Fibonacci-valued and Lucas-valued orbital angular momentum (OAM) entangled states in free space. In the existing MDI-OAM-QKD protocols, the main encoding algorithm handles encoded numbers in a bit-by-bit manner. To design a fast encoding algorithm, we introduce a Fibonacci matrix coding algorithm, by which, encoded numbers are separated into segments longer than one bit. By doing so, when compared to the existing MDI-OAM-QKD protocols, the new protocol can effectively increase the key rate and the coding capacity. This is because Fibonacci sequences are used in preparing OAM entangled states, reducing the misattribution errors (which slow down the execution cycle of the entire QKD) in QKD protocols. Moreover, our protocol keeps the data blocks as small as possible, so as to have more blocks in a given time interval. Most importantly, our proposed protocol can distill multiple Fibonacci key matrices from the same block of data, thus reducing the statistical fluctuations in the sample and increasing the final QKD rate. Last but not the least, the sender and the receiver can omit classical information exchange and bit flipping in the secure key distillation stage.
Social media has enabled information-sharing across massively large networks of people without sp... more Social media has enabled information-sharing across massively large networks of people without spending much financial resources and time that are otherwise required in the print and electronic media. Mobile-based social media applications have overwhelmingly changed the information-sharing perspective. However, with the advent of such applications at an unprecedented scale, the privacy of the information is compromised to a larger extent if breach mitigation is not adequate. Since healthcare applications are also being developed for mobile devices so that they also benefit from the power of social media, cybersecurity privacy concerns for such sensitive applications have become critical. This article discusses the architecture of a typical mobile healthcare application, in which customized privacy levels are defined for the individuals participating in the system. It then elaborates on how the communication across a social network in a multi-cloud environment can be made more secur...
Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmiss... more Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix ...
E-Healthcare is an emerging field that provides mobility to its users. The protected health infor... more E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.
With prevalent attacks in communication, sharing a secret between communicating parties is an ong... more With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in compari...
International Journal of Functional Informatics and Personalised Medicine, Mar 20, 2015
... living cells. However, the most important application of such discovery is in drug design, as... more ... living cells. However, the most important application of such discovery is in drug design, as pathological effects of a drug can only be addressed with precise knowledge of what functions and dysfunctions really are. Living cells ...
Proceedings of the 12th International Symposium on Foundations of Intelligent Systems, 2000
Abstract. Data mining, often called knowledge discovery in databases (KDD), aims at semiautomatic... more Abstract. Data mining, often called knowledge discovery in databases (KDD), aims at semiautomatic tools for the analysis of large data sets. This report is first intended to serve as a timely overview of a rapidly emerging area of research, called temporal data mining (that is, data mining ...
Twenty Fourth Aaai Conference on Artificial Intelligence, 2010
Online social networks are becoming increasingly popular and are being used as the means for a va... more Online social networks are becoming increasingly popular and are being used as the means for a variety of rich activities. This demands the evaluation of the trustworthiness between two unknown participants along a certain social trust path between them in the social network. However, there are usually many social trust paths between participants. Thus, a challenging problem is finding which social trust path is the optimal one that can yield the most trustworthy evaluation result. In this paper, we first present a new complex social network structure and a new concept of Quality of Trust (QoT) to illustrate the ability to guarantee a certain level of trustworthiness in trust evaluation. We then model the optimal social trust path selection as a Multi-Constrained Optimal Path (MCOP) selection problem which is NP-Complete. For solving this problem, we propose an efficient approximation algorithm MONTE K based on the Monte Carlo method. The results of our experiments conducted on a real dataset of social networks illustrate that our proposed algorithm significantly outperforms existing approaches in both efficiency and the quality of selected social trust paths.
Sixth International Conference on Intelligent Systems Design and Applications, 2006
Unsupervised learning plays an important role in knowledge exploration and discovery. Two basic e... more Unsupervised learning plays an important role in knowledge exploration and discovery. Two basic examples of unsupervised learning are clustering and dimensionality reduction. In this paper, we introduce an improved model for clustering based on a hierarchical analysis method. In our model, there are three main steps. In the first step, we use a structural clustering model to find qualitative patterns from a given dataset. Then, the second step applies a quantitative-based clustering algorithm to find quantitative patterns from the dataset. The third and the last step generates hybrid patterns by combining the patterns obtained from the first two steps based on a certain criterion so that deeply hidden relationships can be extracted from the dataset. In this paper, we also discuss the results of our experiments with the proposed model and algorithms on longitudinal medical records.
This paper introduces an extension of logic programming based on multi-dimensional logics. In a m... more This paper introduces an extension of logic programming based on multi-dimensional logics. In a multi-dimensional logic the values of elements vary depending on more than one dimension, such as time and space. The resulting logic programming language is suitable for modelling objects which involve implicit and/or explicit temporal and spatial dependencies. The execution of programs of the language is based on a resolution-type proof procedure called MSLD-resolution. MSLDresolution is based on the axioms and rules of inference of the underlying multidimensional logic. Several example programs are given, including Conway's game of life. A spreadsheet interface to multi-dimensional logic programming is also outlined; it can be used as a powerful display tool with the advantage of non-determinism inherent in logic programming.
Proceedings of the 2004 Acm Workshop on Next Generation Residential Broadband Challenges, Oct 15, 2004
This paper aims to study the concept of a distributed World Wide Web archive that complements the... more This paper aims to study the concept of a distributed World Wide Web archive that complements the existing WWW and "lives" across a vast Peer-to-Peer network of broadband-connected user nodes. It proposes the sharing of a web browser's cached data with other peers in an effort to provide an alternative resource to "discontinued" web documents with [normally] short life spans such as video and audio content as well as frequently restructured text pages. We have based this study on the success of existing file-sharing Peer-to-Peer networks and aim to extend their use further to facilitate content-oriented usage more appropriately while at the same time, addressing some of the major problems that arise from this.
Proceedings of the 2009 International Conference on Computational Science and Engineering Volume 04, 2009
... Yan Wang Department of Computing Macquarie University Sydney, NSW 2109, Australia yanwang@sci... more ... Yan Wang Department of Computing Macquarie University Sydney, NSW 2109, Australia [email protected] Mehmet Orgun Department of Computing Macquarie University Sydney, NSW 2109, Australia [email protected] Abstract ...
Uploads
Papers by Mehmet Orgun