Difference between revisions of "Identifying Appropriate Machine Learning Models for Multi Robot Secure Coordination in a Healthcare Facility"
Line 38: | Line 38: | ||
| | | | ||
* Recreate L-BFGS-B method for finding adversarial examples | * Recreate L-BFGS-B method for finding adversarial examples | ||
− | * Find other potential optimization methods for | + | * Learn about finding the Jacobian of a neural network |
+ | * Find other potential optimization methods for finding adversarial examples | ||
|- | |- | ||
Line 44: | Line 45: | ||
| | | | ||
* Present Current Progress | * Present Current Progress | ||
+ | * Recreate a Black-Box Adversarial Attack | ||
|- | |- | ||
|6: Implement System | |6: Implement System | ||
| | | | ||
− | * | + | * Recreate Hop Skip Jump Attack on a simple MNIST model |
+ | * Find a healthcare model to attack | ||
|- | |- | ||
|7: Run Experiments | |7: Run Experiments | ||
| | | | ||
− | * | + | * Train model for arrhythmia detection on electrocardiograms (ECGS) |
+ | * Adapt Hop Skip Jump Attack to apply to arrhythmia model | ||
+ | * Generate some adversarial electrocardiograms | ||
|- | |- | ||
|8: Evaluation | |8: Evaluation | ||
| | | | ||
− | * | + | * Automate creation of adversarial examples on ECG dataset |
− | * | + | * Gather statistics and evaluate success of algorithm |
|- | |- | ||
Line 66: | Line 71: | ||
* Create graphics for poster and paper | * Create graphics for poster and paper | ||
* Write descriptions of experiments and methods | * Write descriptions of experiments and methods | ||
+ | * Adjust parameters for Hop Skip Jump Attack and create more adversarial ECGs as needed | ||
|- | |- | ||
Revision as of 19:02, 25 August 2020
Student Researcher: Shota Nemoto
Mentor: Dr. Debbie Perouli
Project Description
In the near future, the U.S. will experience a severe shortage of Registered Nurses. A proposed solution is the development of Robotic Caregivers (RCGs), both service and social robots, which will be able to provide care autonomously. Commercial service robots that are currently available, such as Temi and Loomo, provide APIs for developers to create applications for these RCGs. Many applications will input sensor data into machine learning models, which may leave it vulnerable to attack from an adversary attempting to retrieve a patient’s personal data or fool a model into mislabeling or misclassifying an input.
The objective of this project is to research an adversarial attack on these robots.
Milestones and Goals
Week | Description |
---|---|
1: Orientation |
|
2: Initial Reading |
|
3: Form Research Hypothesis |
|
4: Design Experiements and Methodology |
|
5: Begin Poster and Paper Creation |
|
6: Implement System |
|
7: Run Experiments |
|
8: Evaluation |
|
9: Finalize Poster and Paper |
|
10: Present Research |
|