Logo

ITU AI/ML in 5G Challenge Grand Challenge Finale (Final Conference) - Shared screen with speaker view
Thomas Basikolo (ITU)
43:10
Good day everyone. Thank you for joiningFor Participants in The ITU AI/ML in 5G Challenge, please respond to this survey:https://forms.office.com/Pages/ResponsePage.aspx?id=12TkI-YEh0uRPCS9iSGf0-yqkfLCoQ9IpTbc_XELf95URExJWlM2OExXVEQ5VFhFSTUzWUU3SDU1WS4uThe Grand Challenge Finale (Keynotes + Awards) will take place on 17 Dec.Please register here: https://itu.zoom.us/webinar/register/WN_bm4oJ_OeRH-Ilnb4GY_gMQ
CARMELO JOSE ALBANEZ BASTOS FILHO
51:39
good morning from 🇧🇷
Vishnu Ram
51:54
Hi :)
Fathi Abdeldayem
57:37
Dear all,"du supports the proposal to form the FG for autonomous networks, we think the deliverables are valuable for operators like du"
MP SINGHAL
01:06:01
Greeting to All - M P Singhal India
Vishnu Ram
01:06:52
Hello Singhal ji, thanks for joining :)
Usha Rani S
01:12:41
Greetings to all.
Usha Rani S
01:13:55
Is it possible to share the presentations after the event. Thanks.
Vishnu Ram
01:16:02
how do you measure packet loss? at layer 2? layer 3 or application APIs?
Vishnu Ram
01:18:10
how does the model work? offline or online?
Ming Ai
01:18:23
Why choose video traffic?
abdi shakib
01:18:36
Is it a possibility to view the slides?
Abdulnasser Mohammed
01:19:23
can I ask a question pls?
abdi shakib
01:20:51
Is it a possibility to view the slides after the presentation?
Thomas Basikolo
01:23:44
Program is here (includes slides): https://www.itu.int/en/ITU-T/AI/challenge/2020/Pages/PROGRAMME.aspx
Abdulnasser Mohammed
01:31:18
My question to Mr. Yuusuke : 1. Could please tell us how did you choose the percentage of packet loss that you show it your presentation ? Does these value are the required values to meet the QoS. ?
Yuusuke Hashimoto
01:35:18
Thanks for the question.The dataset we used in this project was not generated by ourselves, but by NEC. We are using the dataset provided by NEC to train and test our model. Therefore, the packet loss rate is determined by NEC.
Abdulnasser Mohammed
01:36:17
Ok. thank you . The second question to Mr Yuusuke. about the bandwidth. You aim to increase the bandwidth in your work? if yes. could you pls explain the mechanism that you follow it to increase it. ,
Yuusuke Hashimoto
01:39:14
OK. The goal of this challenge is to estimate the network state.
Abdulnasser Mohammed
02:09:43
Could pls tell us the objectives of your work ?
Abdulnasser Mohammed
02:09:57
to mr >thomas
Artem Volkov
02:11:43
Hello yo everyone! My question is: what the technical requirements for the devices in this framework (AI/MEC)? Limitations?
Abdulnasser Mohammed
02:12:12
I mean the person who is presenting right now.
Abdulnasser Mohammed
02:15:08
ok thank you I got it
Abdulnasser Mohammed
02:17:25
what is the relation between your work and the consumption energy . you mentioned it in the background in your presentation but I did not see what did yo do to make the power consumption low while the data transmission is increased.
Ming Ai
02:33:55
What is the differece from that of Federate Learning?
Ming Ai
02:37:53
Thanks a lot!
Thomas Basikolo
02:58:27
For Participants in The ITU AI/ML in 5G Challenge, please respond to this survey:https://forms.office.com/Pages/ResponsePage.aspx?id=12TkI-YEh0uRPCS9iSGf0-yqkfLCoQ9IpTbc_XELf95URExJWlM2OExXVEQ5VFhFSTUzWUU3SDU1WS4uThe Grand Challenge Finale (Keynotes + Awards) will take place on 17 Dec.Please register here: https://itu.zoom.us/webinar/register/WN_bm4oJ_OeRH-Ilnb4GY_gMQ
Vishnu Ram
02:58:51
Comments for Mohammad:1. how to measure privacy?2. how to evaluate the overheard in transmitting the models and training the models at the devices?3. You may want to look at ITU's FGAI4H
Burak Hasircioglu
02:59:48
Related to the question of Akihiro Nakao about private training of medical data: There is no reason not to use this work in real world applications. Such applications are in their infancy right now. That is why it is rare to find already deployed applications for now, but in the future such approaches will be in use for sure. Also the solutions presented here is not limited to the medical applications but can be extended to any distributed learning problem.
Bo Lv-CAICT
03:06:34
so far as I know, The technical solution and application requirements of FL are discussed in IEEE 3652.1 as
Bo Lv-CAICT
03:06:36
https://standards.ieee.org/standard/3652_1-2020.html
Mikolaj Jankowski
03:06:43
Sorry, weren't we supposed to vote in a poll after the break?
Mohammad Malekzadeh
03:06:53
Thanks Vishnu, about Q 1 ) the patient-level privacy is measured by two Differential Privacy parameters, one is epsilon-D and another is delta-DP. delta-DP is the probability of failure which we set it to be 0.0001 and in general must be > 1/N, if N is the number of patients. As we had <10000 patients, we set it to be 0.0001. which is a very small probability of failure. The other one is epsilon which we have shown in the results. It depends on the amount of accuracy you needed. We tried to keep epsilon less than 5.
Akihiro Nakao
03:07:30
Burak thanks for your clarification.
nitish mital
03:09:05
Thanks to Vishnu for the comments. The differential privacy is quantifiable with well known techniques in literature, as Mohammad just explained above. For secure aggregation using homomorphic encryption, privacy is measurable by the computational hardness of solving the LWE problem on which homomorphic encryption is based on.
Vishnu Ram
03:10:57
Thank you Nitish and Mohammad. We should talk offline :)
Mohammad Malekzadeh
03:11:31
About Q2) how to evaluate the overheard in transmitting the models and training the models at the devices? That’s for sure important. We assume that patients trust their hospitals. And so, hospitals can afford the required computation to keep their patients private and also to collaborate with other hospitals in training a model. So, to compute the overhead we need to consider a real world setting which for sure is a very good direction for expanding this solution.
Mohammad Malekzadeh
03:12:00
Thanks all. Please reach us offline :-)
nitish mital
03:13:53
There is a trade-off between the level of privacy from homomorphic encryption and the communication overhead, because the ciphertext size needs to be increased for a larger amount of privacy. However, state-of-art techniques like batching, which packs many values within one ciphertext, are able to reduce the communication and computational load by as much as 3-4 orders of magnitude, which we use in our implementation.
José Suárez-Varela
03:15:46
Great demo! I could see in your report that for the aggregation you use a concatenation of avg/sum/min/max/var. To what extent did it improve the accuracy compared to a simple sum?
José Suárez-Varela
03:22:48
And what is the cost during inference? What is the approximate cost over a middle-size nnetwork topology?
Vishnu Ram
03:28:00
Question for Loick: how dynamic are the hidden parameters? (e.g. I see that you are using capacity as one of them, practically the capacity of the link could change if it is wireless).
Loïck Bonniot
03:32:28
Vishnu: we can basically put any feature we want to initialize hidden states, and these hidden states are "propagated" during inference using weights learned during training. Capacity is one feature available for links, the type of link could also be one feature. I hope this answers your question!
NARANMANDAKH Tumen-Ulzii
03:33:04
Greetings from Mongolia.
José Suárez-Varela
03:39:04
Did you consider using a one-hot encoding vector for the queue scheduling configuration instead of numerical values?
Thomas Basikolo
03:48:23
on 17 Dec (during the awards + keynotes)​15:30- 15:35 ​Call for papers: Special issue of ITU Journal on Future and Evolving Technologies (ITU J-FET)​): “AI/ML Solutions in 5G and Future Networks”Please register: https://itu.zoom.us/webinar/register/WN_bm4oJ_OeRH-Ilnb4GY_gMQ
Loïck Bonniot
03:51:22
Impressive results! I'm curious, how did you manage to embed node's features (QoS policies) into links' states?
Aynalem Aregawi
03:57:58
Thank you for all RouteNer challenge presenters and everyone. Signing off for today.
Vishnu Ram
04:16:30
@Dheeraj: we want to explore the generalization of the solutions for such dataset. Do you have suggestions? E.g. If we have a standard mechanism of representing the "pattern" that you mentioned, is it better to generalize across the data from Chennai to Istanbul?
Dheeraj Kotagiri
04:33:16
An important aspect to achieve generalization is take network topology and geographical features (like forest, urban areas etc.) into consideration. In fact, we designed our solution for generalization as original problem statement said we will be evaluated on different topology. However, we need to test over multiple data-sets from different locations to validate above idea.
Азат Билялов
04:41:08
Thank you very much for very interesting presentation
Thomas Basikolo
05:01:40
For Participants in The ITU AI/ML in 5G Challenge, please respond to this survey:https://forms.office.com/Pages/ResponsePage.aspx?id=12TkI-YEh0uRPCS9iSGf0-yqkfLCoQ9IpTbc_XELf95URExJWlM2OExXVEQ5VFhFSTUzWUU3SDU1WS4uThe Grand Challenge Finale (Keynotes + Awards) will take place on 17 Dec.Please register here: https://itu.zoom.us/webinar/register/WN_bm4oJ_OeRH-Ilnb4GY_gMQ
Eoghan Furey
05:29:31
Well done to everyone, excellent presentations. Thank you to our wonderful hosts Vishnu and Thomas, what a team :)
Akihiro Nakao
05:30:28
See you tomorrow!