Skip to main content

Showing 1–16 of 16 results for author: Goldsmith, M

.
  1. arXiv:2311.05486  [pdf, other

    quant-ph cs.LG q-bio.MN

    Disease Gene Prioritization With Quantum Walks

    Authors: Harto Saarinen, Mark Goldsmith, Rui-Sheng Wang, Joseph Loscalzo, Sabrina Maniscalco

    Abstract: Disease gene prioritization assigns scores to genes or proteins according to their likely relevance for a given disease based on a provided set of seed genes. Here, we describe a new algorithm for disease gene prioritization based on continuous-time quantum walks using the adjacency matrix of a protein-protein interaction (PPI) network. Our algorithm can be seen as a quantum version of a previous… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

    Comments: 12 pages, 9 figures

  2. arXiv:2307.05734  [pdf, other

    quant-ph q-bio.QM

    Towards quantum-enabled cell-centric therapeutics

    Authors: Saugata Basu, Jannis Born, Aritra Bose, Sara Capponi, Dimitra Chalkia, Timothy A Chan, Hakan Doga, Frederik F. Flother, Gad Getz, Mark Goldsmith, Tanvi Gujarati, Aldo Guzman-Saenz, Dimitrios Iliopoulos, Gavin O. Jones, Stefan Knecht, Dhiraj Madan, Sabrina Maniscalco, Nicola Mariella, Joseph A. Morrone, Khadijeh Najafi, Pushpak Pati, Daniel Platt, Maria Anna Rapsomaniki, Anupama Ray, Kahn Rhrissorrakrai , et al. (8 additional authors not shown)

    Abstract: In recent years, there has been tremendous progress in the development of quantum computing hardware, algorithms and services leading to the expectation that in the near future quantum computers will be capable of performing simulations for natural science applications, operations research, and machine learning at scales mostly inaccessible to classical computers. Whereas the impact of quantum com… ▽ More

    Submitted 1 August, 2023; v1 submitted 11 July, 2023; originally announced July 2023.

    Comments: 6 figures

  3. arXiv:2304.14095  [pdf, other

    cs.NI

    Securing Autonomous Air Traffic Management: Blockchain Networks Driven by Explainable AI

    Authors: Louise Axon, Dimitrios Panagiotakopoulos, Samuel Ayo, Carolina Sanchez-Hernandez, Yan Zong, Simon Brown, Lei Zhang, Michael Goldsmith, Sadie Creese, Weisi Guo

    Abstract: Air Traffic Management data systems today are inefficient and not scalable to enable future unmanned systems. Current data is fragmented, siloed, and not easily accessible. There is data conflict, misuse, and eroding levels of trust in provenance and accuracy. With increased autonomy in aviation, Artificially Intelligent (AI) enabled unmanned traffic management (UTM) will be more reliant on secure… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

    Comments: under review in IEEE

  4. arXiv:2208.11030  [pdf, ps, other

    quant-ph cs.LG cs.SI q-bio.MN

    Link prediction with continuous-time classical and quantum walks

    Authors: Mark Goldsmith, Guillermo García-Pérez, Joonas Malmi, Matteo A. C. Rossi, Harto Saarinen, Sabrina Maniscalco

    Abstract: Protein-protein interaction (PPI) networks consist of the physical and/or functional interactions between the proteins of an organism. Since the biophysical and high-throughput methods used to form PPI networks are expensive, time-consuming, and often contain inaccuracies, the resulting networks are usually incomplete. In order to infer missing interactions in these networks, we propose a novel cl… ▽ More

    Submitted 23 August, 2022; originally announced August 2022.

    Comments: 9 pages, 5 figures

  5. arXiv:2206.12405  [pdf, other

    quant-ph q-bio.MN q-bio.QM

    Quantum network medicine: rethinking medicine with network science and quantum algorithms

    Authors: Sabrina Maniscalco, Elsi-Mari Borrelli, Daniel Cavalcanti, Caterina Foti, Adam Glos, Mark Goldsmith, Stefan Knecht, Keijo Korhonen, Joonas Malmi, Anton Nykänen, Matteo A. C. Rossi, Harto Saarinen, Boris Sokolov, N. Walter Talarico, Jussi Westergren, Zoltán Zimborás, Guillermo García-Pérez

    Abstract: Scientific and technological advances in medicine and systems biology have unequivocally shown that health and disease must be viewed in the context of the interplay among multiple molecular and environmental factors. Understanding the effects of cellular interconnection on disease progression may lead to the identification of novel disease genes and pathways, and hence influence precision diagnos… ▽ More

    Submitted 22 June, 2022; originally announced June 2022.

  6. arXiv:2202.01302  [pdf, other

    cs.CL cs.AI cs.CY cs.LG

    A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election

    Authors: Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith

    Abstract: The rapid integration of the Internet into our daily lives has led to many benefits but also to a number of new, wide-spread threats such as online hate, trolling, bullying, and generally aggressive behaviours. While research has traditionally explored online hate, in particular, on one platform, the reality is that such hate is a phenomenon that often makes use of multiple online networks. In thi… ▽ More

    Submitted 2 February, 2022; originally announced February 2022.

    Comments: 2022 ACM Symposium on Applied Computing (SAC'22)

  7. arXiv:2008.11808  [pdf, other

    cs.CY

    #ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives

    Authors: Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith

    Abstract: The rapid expansion of cyberspace has greatly facilitated the strategic shift of traditional crimes to online platforms. This has included malicious actors, such as extremist organisations, making use of online networks to disseminate propaganda and incite violence through radicalising individuals. In this article, we seek to advance current research by exploring how supporters of extremist organi… ▽ More

    Submitted 26 August, 2020; originally announced August 2020.

    Comments: In the proceedings of the 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)

  8. The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes

    Authors: Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese

    Abstract: Cyber insurance is a key component in risk management, intended to transfer risks and support business recovery in the event of a cyber incident. As cyber insurance is still a new concept in practice and research, there are many unanswered questions regarding the data and economic models that drive it, the coverage options and pricing of premiums, and its more procedural policy-related aspects. Th… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

    Journal ref: 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)

  9. arXiv:1905.08067  [pdf, other

    cs.SI cs.CL cs.CY cs.LG stat.ML

    Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter

    Authors: Mariam Nouh, Jason R. C. Nurse, Michael Goldsmith

    Abstract: The Internet and, in particular, Online Social Networks have changed the way that terrorist and extremist groups can influence and radicalise individuals. Recent reports show that the mode of operation of these groups starts by exposing a wide audience to extremist material online, before migrating them to less open online platforms for further radicalization. Thus, identifying radical content onl… ▽ More

    Submitted 15 May, 2019; originally announced May 2019.

    Journal ref: 17th IEEE International Conference on Intelligence and Security Informatics (ISI), 2019

  10. arXiv:1902.06961  [pdf, other

    cs.HC cs.CR cs.CY

    Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement

    Authors: Mariam Nouh, Jason R. C. Nurse, Helena Webb, Michael Goldsmith

    Abstract: Cybercrime investigators face numerous challenges when policing online crimes. Firstly, the methods and processes they use when dealing with traditional crimes do not necessarily apply in the cyber-world. Additionally, cyber criminals are usually technologically-aware and constantly adapting and develo** new tools that allow them to stay ahead of law enforcement investigations. In order to provi… ▽ More

    Submitted 19 February, 2019; originally announced February 2019.

    Comments: 11 pages, Proceedings of the 2019 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS)

  11. arXiv:1808.01947  [pdf, ps, other

    cs.CR

    Nonsense Attacks on Google Assistant

    Authors: Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith

    Abstract: This paper presents a novel attack on voice-controlled digital assistants using nonsensical word sequences. We present the results of experimental work which demonstrates that it is possible for malicious actors to gain covert access to a voice-controlled system by hiding commands in apparently nonsensical sounds of which the meaning is opaque to humans. Several instances of nonsensical word seque… ▽ More

    Submitted 6 August, 2018; originally announced August 2018.

  12. arXiv:1807.06706  [pdf, other

    cs.HC cs.CR cs.SD eess.AS

    Sonification in security operations centres: what do security practitioners think?

    Authors: Louise M. Axon, Bushra Alahmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese

    Abstract: In Security Operations Centres (SOCs) security practitioners work using a range of tools to detect and mitigate malicious computer-network activity. Sonification, in which data is represented as sound, is said to have potential as an approach to addressing some of the unique challenges faced by SOCs. For example, sonification has been shown to enable peripheral monitoring of processes, which could… ▽ More

    Submitted 17 July, 2018; originally announced July 2018.

    ACM Class: K.6.5; H.5.5

    Journal ref: Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium 2018

  13. arXiv:1610.03875  [pdf

    physics.ins-det

    A compact neutron scatter camera for field deployment

    Authors: John E. M. Goldsmith, Mark D. Gerling, James S. Brennan

    Abstract: We describe a very compact (0.9 m high, 0.4 m diameter, 40 kg) battery operable neutron scatter camera designed for field deployment. Unlike most other systems, the configuration of the sixteen liquid-scintillator detection cells are arranged to provide omnidirectional (4π) imaging with sensitivity comparable to a conventional two-plane system. Although designed primarily to operate as a neutron s… ▽ More

    Submitted 12 October, 2016; originally announced October 2016.

    Journal ref: Rev. Sci. Instrum. 87, 083307 (2016)

  14. arXiv:1603.01573  [pdf, ps, other

    math.DS cs.CR

    McCulloch-Pitts brains and pseudorandom functions

    Authors: Vašek Chvátal, Mark Goldsmith, Nan Yang

    Abstract: In a pioneering classic, Warren McCulloch and Walter Pitts proposed a model of the central nervous system. Motivated by EEG recordings of normal brain activity, Chvátal and Goldsmith asked whether or not these dynamical systems can be engineered to produce trajectories which are irregular, disorderly, apparently unpredictable. We show that they cannot build weak pseudorandom functions.

    Submitted 4 March, 2016; originally announced March 2016.

    Comments: Supersedes arXiv:1311.6531 [math.DS]

    MSC Class: 92B20; 65C10; 37B15; 62P10

    Journal ref: Neural Computation 28 (2016), 1042--1050

  15. arXiv:1311.6531   

    math.DS cs.CR cs.NE math.NA

    Brains and pseudorandom generators

    Authors: Vašek Chvátal, Mark Goldsmith, Nan Yang

    Abstract: In a pioneering classic, Warren McCulloch and Walter Pitts proposed a model of the central nervous system; motivated by EEG recordings of normal brain activity, Chv\' atal and Goldsmith asked whether or not this model can be engineered to provide pseudorandom number generators. We supply evidence suggesting that the answer is negative.

    Submitted 7 March, 2016; v1 submitted 25 November, 2013; originally announced November 2013.

    Comments: This paper misinterprets the notion of a pseudorandom generator. For this reason, it has been withdrawn by the authors. Its main result, interpreted in terms of pseudorandom functions, reappears in arXiv:1603.01573 [math.DS]

    MSC Class: 92B20; 65C10; 37B15; 62P10

  16. arXiv:1208.6451  [pdf, ps, other

    math.DS math.NA q-bio.NC

    Can brains generate random numbers?

    Authors: Vašek Chvátal, Mark Goldsmith

    Abstract: Motivated by EEG recordings of normal brain activity, we construct arbitrarily large McCulloch-Pitts neural networks that, without any external input, make every subset of their neurons fire in some iteration (and therefore in infinitely many iterations).

    Submitted 31 August, 2012; originally announced August 2012.

    MSC Class: 92B20; 65C10; 37B15; 62P10