skip to main content
research-article

Labeling Privacy Protection SVM Using Privileged Information for COVID-19 Diagnosis

Authors Info & Claims
Published:29 November 2021Publication History
Skip Abstract Section

Abstract

Edge/fog computing works at the local area network level or devices connected to the sensor or the gateway close to the sensor. These nodes are located in different degrees of proximity to the user, while the data processing and storage are distributed among multiple nodes. In healthcare applications in the Internet of things, when data is transmitted through insecure channels, its privacy and security are the main issues. In recent years, learning from label proportion methods, represented by inverse calibration (InvCal) method, have tried to predict the class label based on class label proportions in certain groups. For privacy protection, the class label of the sample is often sensitive and invisible. As a compromise, only the proportion of class labels in certain groups can be used in these methods. However, due to their weak labeling scheme, their classification performance is often unsatisfactory. In this article, a labeling privacy protection support vector machine using privileged information, called LPP-SVM-PI, is proposed to promote the accuracy of the classifier in infectious disease diagnosis. Based on the framework of the InvCal method, besides using the proportion information of the class label, the idea of learning using privileged information is also introduced to capture the additional information of groups. The slack variables in LPP-SVM-PI are represented as correcting function and projected into the correcting space so that the hidden information of training samples in groups is captured by relaxing the constraints of the classification model. The solution of LPP-SVM-PI can be transformed into a classic quadratic programming problem. The experimental dataset is collected from the Coronavirus disease 2019 (COVID-19) transcription polymerase chain reaction at Hospital Israelita Albert Einstein in Brazil. In the experiment, LPP-SVM-PI is efficiently applied for COVID-19 diagnosis.

REFERENCES

  1. [1] Merlino Giovanni, Dautov Rustem, Distefano Salvatore, and Bruneo Dario. 2019. Enabling workload engineering in edge, fog, and cloud computing through open-stack-based middleware. ACM Trans. Internet Technol. 19, 2 (2019), 28, 122. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Vasconcelos D. R., Maria De Castro Andrade Rossana, Severino V., and Neuman De Souza José. 2019. Cloud, fog, or mist in IoT? That is the question. ACM Trans. Internet Technol. 19, 2 (2019), 15335399. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Benomar Zakaria, Longo Francesco, Merlino Giovanni, and Puliafito Antonio. 2020. Cloud-based enabling mechanisms for container deployment and migration at the network edge. ACM Trans. Internet Technol. 20, 3 (2020), 128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Akmandor Ayten Ozge and Jha Niraj K.. 2017. Smart health care: an edge-side computing perspective. IEEE Consum. Electron. Mag. 7, 1 (2017), 2937.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Sood Sandeep K. and Mahajan Isha. 2018. A fog-based healthcare framework for Chikungunya. IEEE Internet Things J. 5, 2 (2018), 794801.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Kraemer Frank Alexander, Braten Anders Eivind, Tamkittikhun Nattachart, and Palma David. 2017. Fog computing in healthcare-a review and discussion. IEEE Access 5 (2017), 92069222.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Concone Federico, Lo Re Giuseppe, and Morana Marco. 2019. A fog-based application for human activity recognition using personal smart devices. ACM Trans. Internet Technol. 19, 2 (2019), 20, 120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Awad Abdellatif Alaa, Mohamed Amr, Chiasserini Carla Fabiana, Tlili Mounira, and Erbad Aiman. 2019. Edge computing for smart health: Context-aware approaches, opportunities, and challenges. IEEE Netw. 33, 3 (2019), 196203.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Abdel-Basset Mohamed, Manogaran Gunasekaran, and Mohamed. Mai 2019. A neutrosophic theory-based security approach for fog and mobile-edge computing. Comput. Netw. 157, 5 (2019), 122132.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Sareen Sanjay, Gupta Sunil Kumar, and Sood Sandeep K.. 2017. An intelligent and secure system for predicting and preventing zika virus outbreak using fog computing. Enterprise Info. Syst. 11, 9 (2017), 14361456. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Hassen Hafedh Ben, Ayari Nadia, and Hamdi Belgacem. 2020. A home hospitalization system based on the Internet of things, Fog computing and cloud computing. Info. Med. Unlocked 20 (2020), 100368.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Sufian Abu, Ghosh Anirudha, Sadiq Ali Safaa, and Smarandache Florentin. 2020. A survey on deep transfer learning to edge computing for mitigating the COVID-19 pandemic. J. Syst. Architect. 108, 9 (2020), 101830.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Sood Sandeep K. and Mahajan Isha. 2018. Fog-cloud based cyber-physical system for distinguishing, detecting and preventing mosquito borne diseases. Future Gen. Comput. Syst. 88, 11 (2018), 764775.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Kumar Adarsh, Sharma Kriti, Singh Harvinder, Gupta Naugriya Sagar, Singh Gill Sukhpal, and Buyy Rajkumar. 2021. A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic. Future Gen. Comput. Syst. 115, 2 (2021) 119.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Verma Prabal and Sood Sandeep K.. 2018. Fog assisted-IoT enabled patient health monitoring in smart homes. IEEE Internet Things J. 5, 3 (2018), 17891796.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Jagadeeswari V., Subramaniyaswamy V., Logesh R., and Vijayakumar V.. 2018. A study on medical Internet of Things and big data in personalized healthcare system. Health Info. Sci. Syst. 6, 14 (2018), 120.Google ScholarGoogle Scholar
  17. [17] Al-Janabi Samaher, Al-Shourbaji Ibrahim, Shojafar Mohammad, and Shamshirband Shahaboddin. 2017. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt. Info. J. 18, 2 (2017), 113122.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Xiao Yanshan, Wang Huaipei, and Liu Bo. 2020. A new transfer learning-based method for label proportions problem. Info. Sci. 541, 12 (2020), 391408.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Hernández-González Jerónimo, Inza Iñaki, and Lozano Jose A.. 2013. Learning Bayesian network classifiers from label proportions. Pattern Recogn. 46, 12 (2013), 34253440. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Ni Tongguang, Chung Fu-Lai, and Wang Shitong. 2015. Support vector machine with manifold regularization and partially labeling privacy protection. Info. Sci. 294, 10 (2015), 390407. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Fan Kai, Zhang Hongyi, Yan Songbai, Wang Liwei, Zhang Wensheng, and Feng Jufu. 2014. Learning a generative classifier from label proportions. Neurocomputing 139, 9 (2014), 4755. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Kück Hendrik and De Freitas Nando. 2005. Learning about individuals from group statistics. Proceedings of the 21st Conference on Uncertainty in Artificial Intelligence. AUAI Press, Corvallis, July 2005, 332339. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Quadrianto Novi, Smola Alex J., Caetano Tibério S., and Le Quoc V.. 2009. Estimating labels from label proportions. J. Mach. Learn. Res. 10, 82 (2009), 23492374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Yu Felix X., Liu Dong, Kumar Sanjiv, Jebara Tony, and Chang Shih-Fu. 2013. ∝SVM for learning with label proportions. In Proceedings of the 30th International Conference on Machine Learning. 504512. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Qi Zhiquan, Meng Fan, Tian Yingjie, Niu Lingfeng, Shi Yong, and Zhang Peng. 2018. Adaboost-LLP: A boosting method for learning with label proportions. IEEE Trans. Neural Netw. Learn. Syst. 29, 8 (2018), 35483559.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Shi Yong, Cui Limeng, Chen Zhensong, and Zhiquan Qi. 2019. Learning from label proportions with pinball loss. International J. Mach. Learn. Cybernet. 10 (2019), 187205.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Ruping Stefan. 2010. SVM classifier estimation from group probabilities. In Proceedings of the 27th International Conference on Machine Learning (ICML’10). 911918. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Vapnik Vladimir and Vashist Akshay. 2009. A new learning paradigm: Learning using privileged information. Neural Netw. 22, 5 (2009), 544557. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Zhu Wenxin and Zhong Ping. 2014. A new one-class SVM based on hidden information. Knowl.-Based Syst. 60, 4 (2014), 3543. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Qi Zhiquan, Wang Bo, Meng Fan, and Niu Lingfeng. 2016. Learning with label proportions via NPSVM. IEEE Trans. Cybernet. 47, 10 (2017), 32933305.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Vapnik Vladimir and Izmailov Rauf. 2015. Learning using privileged information: Similarity control and knowledge transfer. J. Mach. Learn. Res. 16 (2015), 20232049. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Wang Peipei, Zheng Xinqi, Li Jiayang, and Zhu Bangren. 2020. Prediction of epidemic trends in COVID-19 with logistic model and machine learning technics. Chaos, Solitons Fractals 139 (2020), 110058.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Alakus Talha Burak and Turkoglu. Ibrahim 2020. Comparison of deep learning approaches to predict COVID-19 infection. Chaos, Solitons Fractals 140 (2020), 110120.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Gu Xiaoqing, Chung Fu-Lai, and Wang Shitong. 2020. Extreme vector machine for fast training on large data. Int. J. Mach. Learn. Cybernet. 11, 1 (2020), 3353.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Labeling Privacy Protection SVM Using Privileged Information for COVID-19 Diagnosis

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 22, Issue 3
        August 2022
        631 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/3498359
        • Editor:
        • Ling Liu
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 November 2021
        • Accepted: 1 July 2021
        • Revised: 1 June 2021
        • Received: 1 November 2020
        Published in toit Volume 22, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!