We introduce survival-critical machine learning (SCML), in which a robot encounters dynamically evolving threats that it recognizes via machine learning (ML), and then neutralizes. We model survivability in SCML, and show the value of the recently developed approach of Live Learning. This edge-based ML technique embodies an iterative human-in-the-loop workflow that concurrently enlarges the training set, trains the next model in a sequence of “best-so-far” models, and performs inferencing for both threat detection and pseudo-labeling. We present experimental results using datasets from the domains of drone surveillance, planetary exploration, and underwater sensing to quantify the effectiveness of Live Learning as a mechanism for SCML.
more »
« less
This content will become publicly available on December 4, 2025
Beyond Federated Learning: Survival-Critical Machine Learning
Drawing on parallels with biological immunity, this paper introduces a new use case for learning at the edge called survival-critical machine learning (SCML). Unlike federated learning, which assumes supervised learning with pre-labeled data, SCML involves semi-supervised learning in streaming settings where labels may need to be obtained at very low network bandwidth and extreme class imbalance. We show that the recently-developed workflow of Live Learning is a good fit for SCML. Starting from a weak bootstrap model, this workflow seamlessly pipelines semi-supervised learning, active learning, and transfer learning, with asynchronous bandwidth-sensitive data transmission for labeling. As improved models evolve at the edge through periodic re-training, the threat detection ability of the SCML system improves. This, in turn, improves the survivability of the host system.
more »
« less
- Award ID(s):
- 2106862
- PAR ID:
- 10588990
- Publisher / Repository:
- IEEE
- Date Published:
- ISBN:
- 979-8-3503-7828-3
- Page Range / eLocation ID:
- 483 to 489
- Subject(s) / Keyword(s):
- immune systems, biological immunity, live learning, survival, edge computing, mobile computing, machine learning, low bandwidth, computer vision, wireless networks, robotics
- Format(s):
- Medium: X
- Location:
- Rome, Italy
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Wafer map pattern recognition is instrumental for detecting systemic manufacturing process issues. However, high cost in labeling wafer patterns renders it impossible to leverage large amounts of valuable unlabeled data in conventional machine learning based wafer map pattern prediction. We proposed a contrastive learning framework for semi-supervised learning and prediction of wafer map patterns. Our framework incorporates an encoder to learn good representation for wafer maps in an unsupervised manner, and a supervised head to recognize wafer map patterns. In particular, contrastive learning is applied for the unsupervised encoder representation learning supported by augmented data generated by different transformations (views) of wafer maps. We identified a set of transformations to effectively generate similar variants of each original pattern. We further proposed a novel rotation-twist transformation to augment wafer map data by rotating each given wafer map for which the angle of rotation is a smooth function of the radius. Experimental results demonstrate that the proposed semi-supervised learning framework greatly improves recognition accuracy compared to traditional supervised methods, and the rotation-twist transformation further enhances the recognition accuracy in both semi-supervised and supervised tasks.more » « less
-
Software testing is difficult to automate, especially in programs which have no oracle, or method of determining which output is correct. Metamorphic testing is a solution this problem. Metamorphic testing uses metamorphic relations to define test cases and expected outputs. A large amount of time is needed for a domain expert to determine which metamorphic relations can be used to test a given program. Metamorphic relation prediction removes this need for such an expert. We propose a method using semi-supervised machine learning to detect which metamorphic relations are applicable to a given code base. We compare this semi-supervised model with a supervised model, and show that the addition of unlabeled data improves the classification accuracy of the MR prediction model.more » « less
-
This paper describes how a system that performs Live Learning can be modified to use radar rather than visible light. The pipelined and iterative machine learning (ML) workflow of this system can operate at low network bandwidths for selective transmission of rare unlabeled events embedded in high-bandwidth real-time sensor data. While radar offers greater range and can overcome the severe signal attenuation experienced by visible light under conditions such as rain or fog, it poses a number of challenges for ML. This paper describes how these challenges can be overcome for Live Learning, and identifies some future directions for research.more » « less
-
null (Ed.)Smart grids integrate advanced information and communication technologies (ICTs) into traditional power grids for more efficient and resilient power delivery and management, but also introduce new security vulnerabilities that can be exploited by adversaries to launch cyber attacks, causing severe consequences such as massive blackout and infrastructure damages. Existing machine learning-based methods for detecting cyber attacks in smart grids are mostly based on supervised learning, which need the instances of both normal and attack events for training. In addition, supervised learning requires that the training dataset includes representative instances of various types of attack events to train a good model, which is sometimes hard if not impossible. This paper presents a new method for detecting cyber attacks in smart grids using PMU data, which is based on semi-supervised anomaly detection and deep representation learning. Semi-supervised anomaly detection only employs the instances of normal events to train detection models, making it suitable for finding unknown attack events. A number of popular semi-supervised anomaly detection algorithms were investigated in our study using publicly available power system cyber attack datasets to identify the best-performing ones. The performance comparison with popular supervised algorithms demonstrates that semi-supervised algorithms are more capable of finding attack events than supervised algorithms. Our results also show that the performance of semi-supervised anomaly detection algorithms can be further improved by augmenting with deep representation learning.more » « less
An official website of the United States government
