Next Article in Journal
Background Load Denoising across Complex Load Based on Generative Adversarial Network to Enhance Load Identification
Previous Article in Journal
A Visual Sensing Concept for Robustly Classifying House Types through a Convolutional Neural Network Architecture Involving a Multi-Channel Features Extraction
Previous Article in Special Issue
Terahertz Time-Domain Polarimetry in Reflection for Film Characterization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Letter

Secure Deep Learning for Intelligent Terahertz Metamaterial Identification

1
School of Cyber Science and Technology, Beihang University, Beijing 100191, China
2
School of Electronic and Information Engineering, Beihang University, Beijing 100191, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2020, 20(19), 5673; https://doi.org/10.3390/s20195673
Submission received: 3 September 2020 / Revised: 1 October 2020 / Accepted: 2 October 2020 / Published: 5 October 2020
(This article belongs to the Special Issue Advanced Industrial Terahertz Sensing Applications)

Abstract

:
Metamaterials, artificially engineered structures with extraordinary physical properties, offer multifaceted capabilities in interdisciplinary fields. To address the looming threat of stealthy monitoring, the detection and identification of metamaterials is the next research frontier but have not yet been explored. Here, we show that the crypto-oriented convolutional neural network (CNN) makes possible the secure intelligent detection of metamaterials in mixtures. Terahertz signals were encrypted by homomorphic encryption and the ciphertext was submitted to the CNN directly for results, which can only be decrypted by the data owner. The experimentally measured terahertz signals were augmented and further divided into training sets and test sets using 5-fold cross-validation. Experimental results illustrated that the model achieved an accuracy of 100% on the test sets, which highly outperformed humans and the traditional machine learning. The CNN took 9.6 s to inference on 92 encrypted test signals with homomorphic encryption backend. The proposed method with accuracy and security provides private preserving paradigm for artificial intelligence-based material identification.

1. Introduction

Metamaterials are artificial materials, designed with special structures, and can exhibit controllable electromagnetic properties [1], which are entirely different from their constituent materials. The broad application of metamaterials in (bio)sensing [2,3,4], imaging [5,6], cloaking [7,8,9,10,11], radar [12], and telecommunications [13] have drawn extensive attention. The development history of metamaterials has experience from equivalent medium metamaterials and surface plasmon metamaterials to information and smart metamaterials [14]. With the continuous efforts of scientists, people have made it possible to digitally encode metamaterials, which means that the big gap between metamaterials and the digital world has been bridged, and intelligent information metamaterials have become an effective bridge between the physical world and the digital world. In the future, metamaterials may become ubiquitous and affect our human being everyday life in many aspects. For example, the imager based on intelligent metasurfaces decorated as a part of wall has already been capable of remotely detecting body movements and restoring high-resolution images of the human body [5]. Other research [10] has designed a multi-wave metasurface carpet cloak, which can hide objects with arbitrary shapes and sizes under electromagnetic, acoustic, and water waves. Meanwhile, intelligent metasurfaces may also have the capabilities in 5G/6G wireless communication systems, where eavesdropping and anti-eavesdropping would become very important. Possessing the ability to change the direction of wave propagation, metamaterials have been used as stealth material especially in military. Although metamaterials have enabled reconfigurability, adaptability, and scalability, and the dawn of their application have already been made great strides, up to now, there are still many interesting physical and practical application researches not yet been explored, such as monitoring and eavesdropping through abusing smart metamaterials, which makes the identification of it an effective way of reconnaissance. As such, this paper proposed a secure and intelligent identification of metamaterials against the potential threat.
For different electromagnetic frequency ranges, metamaterial characterization methods are various. In terahertz (THz) band, time-domain spectroscopy (TDS) is widely employed due to its outstanding performance on extracting both amplitude and phase information. In recent years, rapid advances and considerable application has been witnessed in THz technology such as sensing [15,16], switching [17], modulation [18], and antenna [19]. Besides, numerous scientific publications have been devoted to the use of THz techniques for the detection and identification of materials in recent decades. THz–TDS has been employed as a major probing technique combining with traditional detecting methods to determine the water status incorporated in hydrous minerals [20]. The research of optical parameters of absorption coefficients and refractive index proved that THz–TDS was a promising technique in dehydration analysis. The TDS data were manually analyzed by the positions of absorption peaks or other spectral fingerprints, resulting in time consuming human identification. Until recently, machine-assisted THz technique was reported for the identification of 13 kinds of bi-heterocyclic compounds [21], where features of compounds were extracted from their THz spectra using principal component analysis (PCA), and then classified by the kernel support vector machine (SVM). The system achieved 100% accuracy of the classification of the test compounds, highly surpassing human identification ability.
These previous researches on THz spectra identification evolved from human observation to machine learning methods which mainly required the use of appropriate input features and mathematical apparatus for good performance. There is a tendency to use SVM with PCA in classification, and they indeed achieved perfect accuracy in some cases. However, SVM is based on handcrafted feature engineering. That is, the input features should be carefully selected during preprocessing in order to get good performance. This hand-tuning work is both labor intensive and time consuming, especially for identifying metamaterials whose electromagnetic responses are strongly correlated to many parameters, such as wave incidence angles, polarizations, sample azimuthal angles, geometric structures, and so on.
To this end, deep learning assisted THz identification may offer capabilities, since it is currently the widespread state-of-the-art pattern recognition method. With the historical opportunities brought by big data and hardware acceleration, unprecedented breakthroughs have been made in the field of computer vision. In the task of classification on ImageNet [22], the convolutional neural networks (CNN), i.e., the AlexNet [23], VGG [24], GoogLeNet [25] and ResNet [26] ushered in a remarkable breakthrough, and to some extent, have settled the feature extraction problem in computer vision.
Despite the recent progress on accuracy, private concerns raise because of the sensing data exposed to artificial intelligence (AI), which hinders the application of AI-based identification [27]. If we provided an online metamaterial identification service and other labs attempted to use it, they would need to upload sensing data to our server, resulting in the leakage of both sensing data and identification results. One possible solution is differential privacy [28], where one can determine the amount of data leaked by a single record. However, the concept is useless in the application stage since we are interested in individual record. Another option is the federated learning which uses a more secure aggregation protocol, secure multi-party computing, and the federated average algorithm to train a model without revealing data [29,30]. Nevertheless, the server still has to use sensing data in plaintext during the application stage. One promising solution to these problems is homomorphic encryption (HE) [31], an algorithm to perform computation on encrypted data in the application stage, which is highly practical as basic extensions of privacy-preserving [32]. HE supports essential addition and multiplication operations in CNN. Using HE, the data owner can employ the public key to encrypt his data, send them to the identification server who has no access to the secret key, and finally receive the results in ciphertext.
Inspired by the potential threat of the abuse of metamaterials, in this work, we investigated the secure application of AI techniques to THz identification, exemplified with the identification of metamaterial in mixtures. Through recording THz electromagnetic responses from metamaterial mixed samples, a large number of signals with or without metamaterial were extracted and augmented. A crypto-oriented CNN with HE-backend was applied and we achieved a remarkable accuracy of 100%.
The innovation of this article lies in (1) this work found the gap in the field of metamaterial identification and filled it with the advanced deep learning method. (2) Considering the application of proposed identification method, a crypto-oriented CNN with HE backend was developed to provide secured identification service. The primary goal of this work is to provide practical AI method for THz signal identification. To the best of our knowledge, this is the first study on the secure use of AI for THz signal identification.

2. Materials and Methods

The workflow of private preserving THz metamaterial identification is shown in Figure 1. First in THz-TDS system, the THz wave passed through two lenses, focused onto samples to get the electromagnetic response signals. To meet the need of big data, random augmentation was adopted according to the possible noises. Then, fast Fourier transformation was employed to convert these augmented signals to frequency-domain as the input of CNN. In the training stage, CNN can learn discriminative features through minimizing loss and updating parameters. Once the network was trained well enough to identify the existence of metamaterial, parameters in the model would be exported for application. Afterwards, the model was ready for a private call in application stage, where one encrypted the original data, fed into the network and got the results back in ciphertext, which can only be decrypted by oneself.

2.1. THz Measurement

In the data acquisition process, a home-built THz-TDS driven by a femtosecond fiber laser was employed [2]. The THz wave radiated from a commercial photoconductive antenna. In the first place, a femtosecond fiber laser pumps an InGaAs photoconductive antenna to generate a horizontally polarized THz pulse, which was focused onto the sample through two lenses. The transmitted THz pulse after the sample passes through both lenses to the receiving antenna. In this experiment, we collected the spectra of 66 samples, among which 32 contained metamaterials and 34 without metamaterials. For samples with metamaterial, we changed the sample azimuthal angle randomly from 0° to 180°, and added some background materials such as glucose, lactose, and medicines (Vitamin B, ibuprofen, and cimetidine). The metamaterial design parameters are the same in this literature [2]. Fourier transformation was employed to turn the probed temporal waveform signals into frequency-domain, and the amplitudes were input into CNNs to get the binary classification results.
The existence of metamaterials in the mixture is very challenging for humans to distinguish because many factors, such as wave incidence angles, polarizations, sample azimuthal angles, and geometric structures may lead to overlapping absorption peaks in the spectrum. Here we take the mixture of metamaterial and lactose as an example. As is illustrated in Figure 2a, for a specified compound, lactose, all curves with and without metamaterial have similar trends, featuring large interclass similarity. Furthermore, all mixture curves with different azimuthal angles present subtle varieties, indicating great intra-class variances. For example, both blue and orange curves represent the existence of metamaterial with different azimuthal angles, while the orange curve has higher amplitude between 0.75–1.2 THz than that from the blue one. Based on the aforementioned discussion, it is known that the similar resonant features for both the intentionally designed THz metamaterials and the mixed sample materials make the manual analysis by human alone very difficult. A more advanced method is highly demanded.

2.2. Data Augmentation

Deep learning benefits from big data, but it is prohibitively expensive to experimentally collect large-scale databases in terms of time and labor cost. Alternatively, data augmentation is convenient to extend the dataset without extra cost. The straightforward approaches for image augmentation include random flipping and random cropping, which are widely used in image identification and validated to be effective. While the aforementioned augmentations were designed for two-dimensional RGB images, which were not applicable to one-dimensional single-channel THz data.
We considered two possible ways to expand the data. First, random perturbation was added to the original time-domain data to simulate system noises. Considering that the data ranged from −9−9 to 10−8 A, three kinds of Gaussian noises with mean value 0 and variance 10−10, 10−9, 5 × 10−9 were added. The second method to enlarge data scale was simulating the power reduction of the THz source by attenuating the raw time-domain data to 70%, 80%, and 90%. Figure 2b shows the augmentation results, where one spectrum was augmented to seven with different noises and attenuations. With these augmented data, the diversity of training signals was enhanced, and, therefore, the generalization ability of AI model can be improved. We divided the augmented dataset into training set and test set using 5-fold cross-validation.

2.3. Crypto-Oriented CNN Design

The augmented Fourier transformed data was the input of the CNNs, the ability of which to construct abstract features makes it well suited to metamaterial identification. To design a crypto-oriented CNN, the depth of CNN should be constrained to prevent accumulated noises in HE decryption, and the ReLU [33] activation should also be replaced due to the limited nonlinear operation supported by HE. Our model comprised two convolutional layers, followed by a fully connected layer. After each convolutional layer, square activation was chosen to improve the ability of nonlinear expression, also alleviate the problem of gradient disappearance. Square activation is defined as Square ( x ) = x 2 . Details of CNN are exhibited in Figure 3. Convolutional layer processed the input signal, a one-dimensional array with 61 numbers, by convolving it with a bank of kernels. The shape of kernel to each convolutional layer was (32,3) and (8,3), respectively. Both convolution operations were represented in Figure 3 as cones and had a stride of 2. Subsequently, the red square activation operation worked to provide nonlinear modeling for network. Then, the output of last square activation was flattened to transform the feature to a one-dimensional shape. Finally, the fully-connected layer mapped distributed feature representation to output space. The pooling function was not adopted since max-pooling is not supported by HE and average-pooling was proved inadequate in experiments.
To be precise, assuming l to be the number of layers. Before training, weight and bias of each neuron should be initialized as random values W and b. The data-label pairs were fed through the network as training samples to generate prediction. For input tensor zl, the convolution process ’*’ resulted in tensor zl+1, as the input for next convolutional layer.
z l + 1 = Square ( z l W l + 1 + b l + 1 )
In the last fully-connected layer, the unnormalized probabilities (aka logits) o was obtained and regarded as the confidence of metamaterial existence.
o = z l W l + 1 + b l + 1
Then, sigmoid function was performed to obtain predicted class labels y ^ . The errors between y ^ and ground truth labels y were calculated using binary cross-entropy (BCE) loss function [34,35], and then back-propagated through the network employing the chain rule. The above iteration would stop when training epoch is up to 100. Sigmoid scaled each component in the interval (0,1), thus can be interpreted as probabilities. As a nonlinear function, sigmoid would not participate in the HE operation in application stage. The definition of sigmoid is shown as below.
y ^ = sigmoid ( o ) = 1 1 + exp ( o )
The goal of training CNNs was to minimize the error between y ^ and y. To penalize non-matching cases, BCE error function of batch m is defined to better align network outputs and targets.
L ( y ^ , y ) = 1 m i = 1 m ( y i log y ^ i + ( 1 y i ) log ( 1 y ^ i ) )
After that was the back-propagation, which aimed to update parameters by computing partial derivative from the output layer to the input layer.
L ( y ^ i , y i ) W = i = 1 m prod ( L ( y ^ i , y i ) o , o W i )
Function “prod” returns the product of all the values present in its arguments. The performance of the network was improved by approximately minimizing the training objective. Root mean square propagation (RMSprop) [36], an adaptive learning rate method proposed by Geoff Hinton, was expected to address sharp decline in learning rate. For parameter θt at time t, the new θt+1 was obtained.
θ t + 1 = θ t η E [ g 2 ] t + ε g t ,
E [ g 2 ] t = γ E [ g 2 ] t 1 + ( 1 γ ) g t 2 ,
where the learning rate η was suggested to be 0.001 and gt denoted the gradient at time t. The denominator was the decaying average of the root mean square of the gradient. Adding momentum γ made the speed on the dimension with constant gradient go faster and the changed gradient go slower, so it could accelerate convergence and reduce oscillation.

2.4. Private Preserving Application

Figure 4 shows how the HE enables a client to implement AI identification on confidential THz signals using a remote, untrusted server. Client encrypted his data using public key pk and sent it to remote server, which was received and fed into crypto-oriented CNN model. Afterwards, the client decrypted the output of CNN using secret key sk and performed sigmoid function to obtain the final results. In no case should the server gain access to the existence of metamaterial.
Our fully homomorphic encryption scheme is based on the assumed hardness of the Ring Learning with Errors problem [37], whose parameters contain N as the polynomial modulus degree. It is necessary to select parameters of sufficient size so that the amplification of random noise will not make the original message unrecoverable. Therefore, the multiplication times on the ciphertext should be no more than L, the maximum multiplicative depth. In experiment, we chose N = 213 and L = 8. Privacy was guaranteed through four algorithms:
  • KeyGen, a randomized algorithm that takes a security parameter λ as input, generates some representations of a finite ring R with addition operator and multiplication operator , and outputs a sk and pk.
  • Enc, a randomized algorithm that takes pk and a plaintext π as input and outputs a ciphertext ψR.
  • Dec takes sk, ψ as input and outputs the plaintext π.
  • Eval is an efficient algorithm which takes pk, ring R and a tuple of ciphertexts ψ = { ψ 1 , , ψ t } as input, and outputs a ciphertext ψ ∈ R.
For any plaintext π1, π2R, we have
Dec ( Enc ( π 1 ) ) Dec ( Enc ( π 2 ) ) = π 1 + π 2 ,
Dec ( Enc ( π 1 ) ) Dec ( Enc ( π 2 ) ) = π 1 × π 2 ,
where + and × are the standard addition and multiplication operations in the ring R. The correctness of scheme is defined as
if   ψ Eval ( p k , R , ψ ) , then   Dec ( s k , ψ ) R ( π 1 , , π t ) .

3. Results and Discussion

The CNN model was implemented by the deep learning framework Keras with TensorFlow backend on a workstation equipped with one Intel Core i7-6700 3.40 GHz Processor (64 GB memory) and one NVIDIA TITAN RTX GPU (24 GB graphic memory).
Figure 5 is the test process taking one-fold as an example, where accuracy quickly arrived at 100%, indicating the model’s robustness and ability in predicting. Compared with the red line, data augmentation also has a remarkable effect in enhancing stability.
We conducted the comparison experiment following the mainstream SVM algorithm. The method consisted of two stages. First, PCA was utilized to extract relevant features from a set of observed spectra, and then as input of the SVM with Gaussian kernel to classify the features. Considering the 61 neurons in one input tensor, we chose principal components from 5 to 60.
To prove the difficulty of distinguishing metamaterial according to its THz spectrum, we carried out an experiment on 50 people as human baseline. These people, randomly divided into five groups for each fold test, were asked to figure out which spectrum belongs to metamaterial. Figure 6a illustrates the result as follows. Inevitably, due to the anisotropy of metamaterial in mixture, the spectra are too hard to differentiate by human eyes, achieving the mean accuracy of only 56.95%. Traditional SVM method performed better, with mean accuracy of 87.9%. However, deep learning method CNN has the most outstanding performance, with the accuracy of 100% on every fold.
Frequency-domain spectrum of pure α-lactose monohydrate and its corresponding ciphertext are shown in Figure 6b. HE worked by introducing random noises to ensure privacy. Noises ranging from −4874.36 to 4013.41 are larger than the signals by exorbitant orders of magnitude, which is efficient enough to prevent information leakage.
When security is applied to sensitive data, a balance must be found between accuracy and computational complexity. Different approaches present different trade-offs in terms of accuracy and speed. Though outperforms as the fastest algorithm, SVM does not support any encryption and has poor accuracy. Several HE approaches with different parameters, N and L, all achieved the accuracy of 100%, among which we figured out the one with the shortest time and least computation, featuring N = 213, L = 8 and time of 9.6 s on a batch of 92 signals. Even though runtimes increased after employing HE, we must note that runtimes are independent of batch size since computation graphs provide a mechanism for parallel identification. Batching only increases throughput significantly.

4. Conclusions

In summary, we identified the existence of metamaterial in mixtures using THz technique and crypto-oriented CNN model. The feasibility of CNN has been demonstrated against the traditional and extensively used machine learning-based approaches, since it can be trained by the raw signals to learn discriminative features. The main contribution of this paper is to implement identification of metamaterials in mixtures which is a challenging task for human and SVM. With the assistant of AI, metamaterials can be successfully identified with high efficiency. The superiority was proved by evaluating the performance with human beings and SVM, where the classification accuracy on test set is obviously improved. Furthermore, HE was integrated for security purpose, thus, the private preserving identification service can be applied in client-server model. Although we assumed a certain structure, our method is applicable to other configurations of metamaterials only with the network structure fine-tuned.
Our work demonstrates the applicability of AI to the THz recognition field. Under the premise of sufficient data, AI will open up a new research path for the THz identification of different materials. With the improvement and popularization of THz technology in the future, AI will be closely combined with THz technology in the fields of (bio)sensing, imaging, cloaking, and 5G/6G wireless communication. Meanwhile, numerous sensitive THz detectors that can collect the electromagnetic data of celestial objects in the THz band have emerged. This advanced work may shed light in various AI-based applications, such as THz astronomy, security, and smart sensing. We also hope that AI and THz technology will cross over into better results in the future.

Author Contributions

Conceptualization, F.L. and W.Z.; methodology, Y.S.; software, F.L.; validation, F.L. and W.Z.; formal analysis, F.L. and Y.S.; investigation, F.L. and W.Z.; resources, W.Z. and X.W.; data curation, W.Z.; writing—original draft preparation, F.L. and W.Z.; writing—review and editing, Y.S. and X.W.; visualization, F.L. and W.Z.; supervision, J.L., J.M., and F.H.; project administration, Y.S., J.L., and X.W.; funding acquisition, Y.S. and X.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (61905007, 61705012, 11827807), Beijing Natural Science Foundation (4194083), and National Key R&D Project (2019YFB2203102).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ma, Q.; Bai, G.D.; Jing, H.B.; Yang, C.; Li, L.; Cui, T.J. Smart metasurface with self-adaptively reprogrammable functions. Light Sci. Appl. 2019, 8, 1–12. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Wu, X.; Quan, B.; Pan, X.; Xu, X.; Lu, X.; Gu, C.; Wang, L. Alkanethiol-functionalized terahertz metamaterial as label-free, highly-sensitive and specific biosensor. Biosens. Bioelectron. 2013, 42, 626–631. [Google Scholar] [CrossRef] [PubMed]
  3. Li, H.Y.; Zhao, H.T.; Wei, M.L.; Ruan, H.X.; Shuang, Y.; Cui, T.J.; del Hougne, P.; Li, L. Intelligent Electromagnetic Sensing with Learnable Data Acquisition and Processing. Patterns 2020, 1, 100006. [Google Scholar] [CrossRef]
  4. Zhong, B.; Yong, L.; Ru, K.; Tian, N.; Yun, S.; He, L.; Tong, S.; Chan, P.; Yi, W.; Hao, Z.; et al. Near-field Terahertz Sensing of HeLa Cells and Pseudomonas Based on Monolithic Integrated Metamaterials with a Spintronic Terahertz Emitter. ACS Appl. Mater. Interfaces 2020, 12, 35895–35902. [Google Scholar]
  5. Li, L.; Shuang, Y.; Ma, Q.; Li, H.; Zhao, H.; Wei, M.; Liu, C.; Hao, C.; Qiu, C.W.; Cui, T.J. Intelligent metasurface imager and recognizer. Light Sci. Appl. 2019, 8, 1–9. [Google Scholar] [CrossRef] [Green Version]
  6. Li, L.; Ruan, H.; Liu, C.; Li, Y.; Shuang, Y.; Alù, A.; Qiu, C.W.; Cui, T.J. Machine-learning reprogrammable metasurface imager. Nat. Commun. 2019, 10, 1–8. [Google Scholar] [CrossRef]
  7. Wang, X.; Chen, F.; Hook, S.; Semouchkina, E. Microwave cloaking by all-dielectric metamaterials. In Proceedings of the IEEE International Symposium on Antennas and Propagation (APSURSI), Spokane, WA, USA, 3–8 July 2011; pp. 2876–2878. [Google Scholar]
  8. Ozden, K.; Yucedag, O.M.; Kocer, H. Geometrical parameter investigation of metamaterial absorber for space based remote sensing applications. In Proceedings of the International Conference on Recent Advances in Space Technologies (RAST), Istanbul, Turkey, 16–19 June 2015; pp. 229–232. [Google Scholar]
  9. Singh, N.; Yadav, S.; Chahar, R. Design and analysis of ultrathin polarization-insensitive metamaterial absorber for stealth technology applications. In Proceedings of the International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 2–3 February 2017; pp. 193–195. [Google Scholar]
  10. Yang, Y.; Wang, H.; Yu, F.; Xu, Z.; Chen, H. A metasurface carpet cloak for electromagnetic, acoustic and water waves. Sci. Rep. 2016, 6, 20219. [Google Scholar] [CrossRef] [Green Version]
  11. Qian, C.; Zheng, B.; Shen, Y.; Jing, L.; Li, E.; Shen, L.; Chen, H. Deep-learning-enabled self-adaptive microwave cloak without human intervention. Nat. Photonics. 2020, 14, 383–390. [Google Scholar] [CrossRef]
  12. Brookner, E. Metamaterial advances for radar and communications. In Proceedings of the CIE International Conference on Radar (RADAR), Guangzhou, China, 10–13 October 2016; pp. 1–8. [Google Scholar]
  13. Abadal, S.; Cui, T.; Low, T.; Georgiou, J. Programmable Metamaterials for Software-Defined Electromagnetic Control: Circuits, Systems, and Architectures. IEEE J. EM SEL TOP C 2020, 10, 6–19. [Google Scholar] [CrossRef]
  14. Ma, Q.; Cui, T.J. Information Metamaterials: Bridging the physical world and digital world. PhotoniX 2020, 1, 1. [Google Scholar] [CrossRef] [Green Version]
  15. Zangeneh-Nejad, F.; Safian, R. A graphene-based THz ring resonator for label-free sensing. IEEE Sens. J. 2016, 16, 4338–4344. [Google Scholar] [CrossRef]
  16. Zangeneh-Nejad, F.; Safian, R. Hybrid graphene–molybdenum disulphide based ring resonator for label-free sensing. Opt. Commun. 2016, 371, 9–14. [Google Scholar]
  17. Yarahmadi, M.; Moravvej-Farshi, M.K.; Yousefi, L. Subwavelength graphene-based plasmonic thz switches and logic gates. IEEE Trans. Terahertz Sci. Technol. 2015, 5, 725–731. [Google Scholar] [CrossRef]
  18. Rahm, M.; Li, J.; Padilla, W.J. THz Wave Modulators: A Brief Review on Different Modulation Techniques. J. Infrared Millim. Terahertz Waves 2013, 34, 1–27. [Google Scholar] [CrossRef]
  19. Zangeneh-Nejad, F.; Safian, R. Significant enhancement in the efficiency of photoconductive antennas using a hybrid graphene molybdenum disulphide structure. J. Nanophotonics 2016, 10, 036005. [Google Scholar] [CrossRef]
  20. Ma, Y.; Huang, H.; Hao, S.; Qiu, K.; Gao, H.; Gao, L.; Tang, W.; Zhang, Z.; Zheng, Z. Insights into the water status in hydrous minerals using terahertz time-domain spectroscopy. Sci. Rep. 2019, 9, 9265. [Google Scholar] [CrossRef]
  21. Nowak, M.R.; Zdunek, R.; Plinski, E.; Swiatek, P.; Strzelecka, M.; Malinka, W.; Plinska, S. Recognition of Pharmacological Bi-Heterocyclic Compounds by Using Terahertz Time Domain Spectroscopy and Chemometrics. Sensors 2019, 19, 3349. [Google Scholar] [CrossRef] [Green Version]
  22. Deng, J.; Dong, W.; Socher, R.; Li, L.; Li, K.; Feifei, L. ImageNet: A large-scale hierarchical image database. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Miami, FL, USA, 20–25 June 2009; pp. 248–255. [Google Scholar]
  23. Krizhevsky, A.; Sutskever, I.; Hinton, G. ImageNet Classification with Deep Convolutional Neural Networks. Commun. ACM 2012, 60, 84–90. [Google Scholar] [CrossRef]
  24. Simonyan, K.; Zisserman, A. Very Deep Convolutional Networks for Large-Scale Image Recognition. In Proceedings of the International Conference on Learning Representations, San Diego, CA, USA, 7–9 May 2015; pp. 1–14. [Google Scholar]
  25. Szegedy, C.; Liu, W.; Jia, Y.; Sermanet, P.; Reed, S.; Anguelov, D.; Erhan, D.; Vanhoucke, V.; Rabinovich, A. Going deeper with convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Boston, MA, USA, 7–12 June 2015; pp. 1–9. [Google Scholar]
  26. He, K.; Zhang, X.; Ren, S.; Jian, S. Deep Residual Learning for Image Recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 26 June–1 July 2016; pp. 770–778. [Google Scholar]
  27. Dilmaghani, S.E. Privacy and Security of Big Data in AI Systems: In Proceedings of the A Research and Standards Perspective. In Proceedings of the IEEE International Conference on Big Data, Los Angeles, CA, USA, 9–12 December 2019; pp. 5737–5743. [Google Scholar]
  28. Dwork, C. Differential Privacy: A Survey of Results. In Proceedings of the International Conference on Theory and Applications of Models of Computation, Xi’an, China, 25–29 April 2008; pp. 1–19. [Google Scholar]
  29. Yang, Q.; Liu, Y.; Chen, T.; Tong, Y. Federated Machine Learning: Concept and Applications. ACM Trans. Intell. Syst. Technol. 2019, 10, 1–19. [Google Scholar] [CrossRef]
  30. Bonawitz, K.; Ivanov, V.; Kreuter, B.; Marcedone, A.; McMahan, H.B.; Patel, S.; Ramage, D.; Segal, A.; Seth, K. Practical Secure Aggregation for Privacy-Preserving Machine Learning. In Proceedings of the ACM Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; pp. 1175–1191. [Google Scholar]
  31. Dowlin, N.; Giladbachrach, R.; Laine, K.; Lauter, K.E.; Naehrig, M.; Wernsing, J. CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy. In Proceedings of the International Conference on Machine Learning, New York, NY, USA, 19–24 June 2016; pp. 201–210. [Google Scholar]
  32. Brutzkus, A.; Giladbachrach, R.; Elisha, O. Low Latency Privacy Preserving Inference. In Proceedings of the International Conference on Machine Learning, Taiwan, China, 19–22 November 2019; pp. 812–821. [Google Scholar]
  33. Glorot, X.; Bordes, A.; Bengio, Y. Deep sparse rectifier neural networks. In Proceedings of the International Conference on Artificial Intelligence and Statistics, Lauderdale, FL, USA, 11–13 April 2011; pp. 315–323. [Google Scholar]
  34. Shore, J.; Johnson, R. Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy. IEEE Trans. Inf. Theory 1980, 26, 26–37. [Google Scholar] [CrossRef] [Green Version]
  35. Rubinstein, R.Y.; Kroese, D.P. The Cross-Entropy Method: A Unified Approach to Combinatorial Optimization, Monte-Carlo Simulation and Machine Learning; Springer Science & Business Media: Berlin, Germany, 2013. [Google Scholar]
  36. Tieleman, T.; Hinton, G. Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude. COURSERA: Neural Netw. Mach. Learn. 2012, 4, 26–31. [Google Scholar]
  37. Lyubashevsky, V.; Peikert, C.; Regev, O. On Ideal Lattices and Learning with Errors over Rings. J. ACM 2013, 60, 43. [Google Scholar] [CrossRef]
Figure 1. The workflow of private preserving terahertz (THz) metamaterial identification. Photocurrent signals of samples were obtained from THz measurement system and then transformed to frequency-domain. The training stage in plaintext and the application stage in ciphertext are illustrated in the upper right and lower right parts, respectively.
Figure 1. The workflow of private preserving terahertz (THz) metamaterial identification. Photocurrent signals of samples were obtained from THz measurement system and then transformed to frequency-domain. The training stage in plaintext and the application stage in ciphertext are illustrated in the upper right and lower right parts, respectively.
Sensors 20 05673 g001
Figure 2. (a) Frequency-domain spectra of metamaterial-lactose mixtures with different azimuthal angles of 0°, 40°, 90°, respectively. The grey dotted line is the reference signal without any samples; (b) Data augmentation on THz temporal waveform signals. A-F represent signals with attenuation of 70%, 80%, 90%, and signals adding Gaussian noises with mean value 0 and variance 5 × 10−9, 10−9, 10−10, respectively.
Figure 2. (a) Frequency-domain spectra of metamaterial-lactose mixtures with different azimuthal angles of 0°, 40°, 90°, respectively. The grey dotted line is the reference signal without any samples; (b) Data augmentation on THz temporal waveform signals. A-F represent signals with attenuation of 70%, 80%, 90%, and signals adding Gaussian noises with mean value 0 and variance 5 × 10−9, 10−9, 10−10, respectively.
Sensors 20 05673 g002
Figure 3. Convolutional neural network (CNN) inferences on raw frequency-domain spectrum using two convolutional layers and one fully-connected layer. “Input” layer was a vector of 61 numbers. In the first “Conv1D” operation, which was represented as a green cone, input signals were convolved by 32 kernels with shape 1 × 3. Then the 30 × 32 shaped output was obtained and represented as a black-and-white grid. Subsequently, the “Square activation” operation was added as a light red square.
Figure 3. Convolutional neural network (CNN) inferences on raw frequency-domain spectrum using two convolutional layers and one fully-connected layer. “Input” layer was a vector of 61 numbers. In the first “Conv1D” operation, which was represented as a green cone, input signals were convolved by 32 kernels with shape 1 × 3. Then the 30 × 32 shaped output was obtained and represented as a black-and-white grid. Subsequently, the “Square activation” operation was added as a light red square.
Sensors 20 05673 g003
Figure 4. Secure application in client-server model. Possessing private data waiting for identification, client encrypted his plaintext using public key for ciphertext, which was then received by the server. Without decrypting it, the server performed calculations of CNN with homomorphic encryption (HE) backend directly and sent the decrypted results to the client, who uncovered results with his secure key.
Figure 4. Secure application in client-server model. Possessing private data waiting for identification, client encrypted his plaintext using public key for ciphertext, which was then received by the server. Without decrypting it, the server performed calculations of CNN with homomorphic encryption (HE) backend directly and sent the decrypted results to the client, who uncovered results with his secure key.
Sensors 20 05673 g004
Figure 5. Comparison of accuracy on test set with and without augmentation in one-fold, where augmentation rendered the convergence faster and smoother.
Figure 5. Comparison of accuracy on test set with and without augmentation in one-fold, where augmentation rendered the convergence faster and smoother.
Sensors 20 05673 g005
Figure 6. (a) Comparison of accuracy on each fold for human, support vector machine (SVM) and CNN; (b) Plaintext and ciphertext of one THz signal.
Figure 6. (a) Comparison of accuracy on each fold for human, support vector machine (SVM) and CNN; (b) Plaintext and ciphertext of one THz signal.
Sensors 20 05673 g006

Share and Cite

MDPI and ACS Style

Liu, F.; Zhang, W.; Sun, Y.; Liu, J.; Miao, J.; He, F.; Wu, X. Secure Deep Learning for Intelligent Terahertz Metamaterial Identification. Sensors 2020, 20, 5673. https://doi.org/10.3390/s20195673

AMA Style

Liu F, Zhang W, Sun Y, Liu J, Miao J, He F, Wu X. Secure Deep Learning for Intelligent Terahertz Metamaterial Identification. Sensors. 2020; 20(19):5673. https://doi.org/10.3390/s20195673

Chicago/Turabian Style

Liu, Feifei, Weihao Zhang, Yu Sun, Jianwei Liu, Jungang Miao, Feng He, and Xiaojun Wu. 2020. "Secure Deep Learning for Intelligent Terahertz Metamaterial Identification" Sensors 20, no. 19: 5673. https://doi.org/10.3390/s20195673

APA Style

Liu, F., Zhang, W., Sun, Y., Liu, J., Miao, J., He, F., & Wu, X. (2020). Secure Deep Learning for Intelligent Terahertz Metamaterial Identification. Sensors, 20(19), 5673. https://doi.org/10.3390/s20195673

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop