Sale!

CS 489/698 Assignment 5 Population Coding, LSTMs, Adversarial Inputs Solved

Original price was: $40.00.Current price is: $35.00.

Category:

Description

5/5 - (1 vote)

Population Coding, LSTMs, Adversarial Inputs

What you need to know

In Q1 of this assignment, you will pretend you are a neurophysiologist performing an experiment on a monkey. However, you will simulate the monkey’s neurons using spiking leaky integrate-and-fire (LIF) neurons.

You are an electrophysiologist and have successfully installed 40 probes in a monkey’s nuclei prepositus hipoglossi (NPH, the name is not important, but it sounds cool to say it to your friends at a party). You have noticed that these neurons seem to be involved in the coding of up-down gaze direction.

To measure the association of the neural responses to gaze direction, you have created a lab setup like the one shown in the figure on the right.

The monkey’s vertical gaze direction is measured on a scale from 0 to 9. Since you don’t really have a monkey with electrodes in its brain (do you?), you will simulate the experiment. The notebook YOU_a5.ipynb contains a function called MonkeyFixationSpikes, which can be called like this: st = MonkeyFixationSpikes(x, T, pop) 0 1 2 3 4 5 7 8 9 6 where x is the gaze direction (on the scale from 0 to 9), T is the duration of the fixation (in seconds), and pop is the matrix containing the parameters for the neurons (the notebook will read this matrix in from a file).

The output st holds the resulting spike times; it’s a list that contains 40 arrays, and each array holds the spike times for one neuron. The script YOU_a5.ipynb sets up the experiment. It reads in a matrix containing the parameters for a population of 20 LIF neurons and stores them as an array in the variable pop (each column holds the 6 LIF parameters of a single neuron).

While recording the neural spikes, the monkey performed a sequence of 5 fixations, each 0.5 seconds long. The corresponding spike-times are stored in a file that this script reads in. The goal of Q1 is to decode the secret code directly from the monkey’s neural spikes.  Page 1 CS 489/698 Neural Networks Assignment 5

What to do

1. Electrophysiology Experiment

(a) Behavioural Sampling [4 marks]

Edit the script to sample the tuning curves for the 40 neurons over a range of different inputs. Here is your experimental protocol:

i. Choose 100 different gaze directions. In other words, choose 100 x-values in the range [0,9]. Store them in an array X.

ii. Fix the monkey’s gaze on each chosen direction for 0.4 seconds. Record the corresponding spikes. In other words, call MonkeyFixationSpikes for each of those x-values. For each value, estimate the firing rate of each neuron. Store all these firing rates in a 100 × 40 matrix called A.

(b) View Tuning Curves [1 mark]

Plot the tuning curves of the 40 neurons on a single axis. The plot should have gaze direction on the horizontal axis, and firing rate (Hz) on the vertical axis, plotting one curve for each of the 40 neurons (all on the same axis).

That is, plot the tuning curves for all of the neurons. Be sure to label your axes appropriately. An example is shown on the right. 0 2 4 6 8 Gaze Direction 0 20 40 60 80 100 Firing Rate (Hz) Tuning Curves

(c) Compute the Decoding Weights [2 marks]

Edit the notebook to compute the optimal linear decoding weights from your behavioural sampling data. Use your dataset of gaze directions and associated firing rates (X and A) to compute the optimal linear decoders. To solve the resulting least-squares problem, you may only use NumPy’s built-in inv and dot functions; you may NOT use lstsq, solve, or pinv.

(d) View Spike Raster of Unknown Sequence [1 mark]

Edit the notebook to display the spikes for the 40 probed neurons as the monkey selected its secret code. The monkey chose an unknown 5-digit code by fixating on a sequence of 5 digits on the scale. For each digit, the monkey held its gaze for 0.5 seconds.

The notebook automatically reads in these spike times from a file. Create a spike raster plot by calling the function PlotSpikeRaster supplied in lif.py. Label it. c Jeff Orchard 2019 v1.0 Page 2 CS 489/698 Neural Networks Assignment 5

(e) Decode the Unknown Code [3 marks]

Edit the notebook to decode the supplied spike trains so you can tell where the monkey’s gaze was fixed. Add lines to the notebook to estimate the firing rate of each of the 40 neurons for each fixation. You can use the function CountSpikes from the lif.py module if you like (type ‘? lif.CountSpikes’ to see its help file). Use those firing rates, and the decoding weights from part 1c, to infer the monkey’s gaze direction.

(f) Display the Unknown Code [2 marks]

Plot the sequence of gaze directions, and display the secret code. Add lines to the notebook to plot the estimated gaze direction (vertical axis) over the 5 fixations (horizontal axis). Plotting a single dot per fixation is sufficient. Turn on the grid using the command grid(’on’). Label, as usual, and add the decoded secret code to the plot title.

2. LSTM

The figure on the right shows a Long Short-Term Memory (LSTM) unit. At each step, it receives an input, x, and also recurrently recycles its hidden state, h, and the “cell” state, C. The formulas on the left detail the operation of the various gates. Let vt =  ht−1 xt  be the aggregated input. ft = σ (Wf vt + bf ) it = σ (Wivt + bi) ot = σ (Wovt + bo) C˜ t = tanh (WCvt + bC) Ct = ft Ct−1 + it C˜ t ht = ot tanh (Ct) Ct1 Ct it ft ot C˜t

This figure was adapted from Colah’s blog. Let the connection weights be, Wf = [0 8 0 0] bf = −4 Wi = [0 0 9 0] bi = −4.5 Wo = [0 0 0 10] bo = −5 WC = [1 0 0 0] bC = 0 And the initial states be, h0 = [0.05] C0 = [−0.02] Note that d dφ tanh φ ≈ 1 for small values of φ.

(a) [6 marks] Determine the outputs, Ct and ht , for the inputs listed below. For each, show the values of the gates (ft , it , ot) and describe how the updated values, Ct and ht , relate to the input values Ct−1 and ht−1. i. xt = [1 0 0] ii. xt = [0 1 0] iii. xt = [1 0 1] c Jeff Orchard 2019 v1.0 Page 3 CS 489/698 Neural Networks Assignment 5

(b) [2 marks] Suppose you want your new cell state, Ct , to approximate the sum of your old cell state and your hidden state, ht−1. What should your input xt be? Justify your answer, and demonstrate your solution on the LSTM setup given above.

(c) [3 marks] Suppose, instead, that you want your LSTM’s output, ht , to approximate the average of your previous cell state and the input value of ht−1. What should your input xt be? Justify your answer, and demonstrate your solution on the LSTM setup given above.

3. Adversarial Inputs

(a) Gradient with respect to Input: [3 marks] Implement the function GradientInput to compute ∂E ∂x for a network given input x and target t.

(b) FGSM: [6 marks] Complete the function FGSM, which implements the Fast Gradient Sign Method. See the code for details on how it is supposed to work. You function must call your GradientInput function, and it must work for both targeted and untargeted adversarial attacks.

(c) Untargeted Adversarial Perturbation: [4 marks] Create and train a neural network on the MNIST dataset. Your network should use logistic hidden layers, softmax activation for the output layer, and categorical cross entropy as a cost function. You can use the supplied SGD to train your network, which should achieve at least 90% accuracy on the MNIST test set. Alternatively, you can load the pre-trained network (see the notebook for how).

Extract one of each digit (from 0 to 9) from either the MNIST test or training set and ensure that each digit sample is correctly classified by your network. For each digit, make a copy of it, then run your FGSM function until it is incorrectly classified by your network with classification value of at least 50%.

Print the original class of the digit, the perturbed class, the perturbed classification value, and show the original images in one row, and the adversarial images in the row below. Try to make the adversarial images look as similar to the original images as possible. An example of what you should print is shown below.

(d) Targeted Adversarial Perturbation: [4 marks] Find and make a copy of a correctly-classified and unperturbed 5, 1, and 7 from either the MNIST train or test set. Use your FGSM function again to do each of the following: c Jeff Orchard 2019 v1.0 Page 4 CS 489/698 Neural Networks Assignment 5

i. Perturb the 5 until your network incorrectly classifies it as either a 3 or a 9 with classification value of at least 80%.

ii. Perturb the 1 until your network incorrectly classifies it as either a 0, a 2, or an 8 with classification value of at least 80%.

iii. Perturb the 7 until your network incorrectly classifies it as either a 6 or a 4 with classification value of at least 80%. For each digit, print the original class, the perturbed class, the perturbed classification value, and show just the perturbed images. As before, try to make the perturbed digit look as similar to the original digit as possible. An example of what you should print is shown below.

What to submit

Your assignment submission should be a single jupyter notebook file, named (_a5.ipynb), where is your UW WatIAM login ID (not your student number). The notebook must include solutions to all the questions. Submit this file to Desire2Learn. You do not need to submit any of the additional files supplied for the assignment. c Jeff Orchard 2019 v1.0 Page 5