-
Direct numerical simulation of a thermal turbulent boundary layer: an analogy to simulate bushfires and a testbed for artificial intelligence remote sensing of bushfire propagation
Authors:
Julio Soria,
Shahram Karami,
Callum Atkinson,
Minghang Li
Abstract:
Direct numerical simulation of a turbulent thermal boundary layer (TTBL) can perform the role of an analogy to simulate bushfires that can serve as a testbed for artificial intelligence (AI) enhanced remote sensing of bushfire propagation. By solving the Navier-Stokes equations for a turbulent flow, DNS predicts the flow field and allows for a detailed study of the interactions between the turbule…
▽ More
Direct numerical simulation of a turbulent thermal boundary layer (TTBL) can perform the role of an analogy to simulate bushfires that can serve as a testbed for artificial intelligence (AI) enhanced remote sensing of bushfire propagation. By solving the Navier-Stokes equations for a turbulent flow, DNS predicts the flow field and allows for a detailed study of the interactions between the turbulent flow and thermal plumes. In addition to potentially providing insights into the complex bushfire behaviour, direct numerical simulation (DNS) can generate synthetic remote sensing data to train AI algorithms such as convolutional neural networks (CNNs) and recurrent neural networks (RNNs), which can process large amounts of remotely sensed data associated with bushfire. Using the results of DNS as training data can improve the accuracy of AI remote sensing in predicting firefront propagation of bushfires. DNS can also test the accuracy of the AI remote sensing algorithms by generating synthetic remote sensing data that allows their performance assessment and uncertainty quantification in predicting the evolution of a bushfire. The combination of DNS and AI can improve our understanding of bushfire dynamics, develop more accurate prediction models, and aid in bushfire management and mitigation.
△ Less
Submitted 12 February, 2024;
originally announced February 2024.
-
Training set cleansing of backdoor poisoning by self-supervised representation learning
Authors:
H. Wang,
S. Karami,
O. Dia,
H. Ritter,
E. Emamjomeh-Zadeh,
J. Chen,
Z. Xiang,
D. J. Miller,
G. Kesidis
Abstract:
A backdoor or Trojan attack is an important type of data poisoning attack against deep neural network (DNN) classifiers, wherein the training dataset is poisoned with a small number of samples that each possess the backdoor pattern (usually a pattern that is either imperceptible or innocuous) and which are mislabeled to the attacker's target class. When trained on a backdoor-poisoned dataset, a DN…
▽ More
A backdoor or Trojan attack is an important type of data poisoning attack against deep neural network (DNN) classifiers, wherein the training dataset is poisoned with a small number of samples that each possess the backdoor pattern (usually a pattern that is either imperceptible or innocuous) and which are mislabeled to the attacker's target class. When trained on a backdoor-poisoned dataset, a DNN behaves normally on most benign test samples but makes incorrect predictions to the target class when the test sample has the backdoor pattern incorporated (i.e., contains a backdoor trigger). Here we focus on image classification tasks and show that supervised training may build stronger association between the backdoor pattern and the associated target class than that between normal features and the true class of origin. By contrast, self-supervised representation learning ignores the labels of samples and learns a feature embedding based on images' semantic content. %We thus propose to use unsupervised representation learning to avoid emphasising backdoor-poisoned training samples and learn a similar feature embedding for samples of the same class. Using a feature embedding found by self-supervised representation learning, a data cleansing method, which combines sample filtering and re-labeling, is developed. Experiments on CIFAR-10 benchmark datasets show that our method achieves state-of-the-art performance in mitigating backdoor attacks.
△ Less
Submitted 14 March, 2023; v1 submitted 18 October, 2022;
originally announced October 2022.
-
Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking
Authors:
Peter Snyder,
Soroush Karami,
Arthur Edelstein,
Benjamin Livshits,
Hamed Haddadi
Abstract:
We identify class of covert channels in browsers that are not mitigated by current defenses, which we call "pool-party" attacks. Pool-party attacks allow sites to create covert channels by manipulating limited-but-unpartitioned resource pools. These class of attacks have been known, but in this work we show that they are both more prevalent, more practical for exploitation, and allow exploitation…
▽ More
We identify class of covert channels in browsers that are not mitigated by current defenses, which we call "pool-party" attacks. Pool-party attacks allow sites to create covert channels by manipulating limited-but-unpartitioned resource pools. These class of attacks have been known, but in this work we show that they are both more prevalent, more practical for exploitation, and allow exploitation in more ways, than previously identified. These covert channels have sufficient bandwidth to pass cookies and identifiers across site boundaries under practical and real-world conditions. We identify pool-party attacks in all popular browsers, and show they are practical cross-site tracking techniques (i.e., attacks take 0.6s in Chrome and Edge, and 7s in Firefox and Tor Browser).
In this paper we make the following contributions: first, we describe pool-party covert channel attacks that exploit limits in application-layer resource pools in browsers. Second, we demonstrate that pool-party attacks are practical, and can be used to track users in all popular browsers; we also share open source implementations of the attack and evaluate them through a representative web crawl. Third, we show that in Gecko based-browsers (including the Tor Browser) pool-party attacks can also be used for cross-profile tracking (e.g., linking user behavior across normal and private browsing sessions). Finally, we discuss possible mitigation strategies and defenses
△ Less
Submitted 21 March, 2023; v1 submitted 12 December, 2021;
originally announced December 2021.
-
Intra-Basis Multiplication of Polynomials Given in Various Polynomial Bases
Authors:
S. Karami,
M. Ahmadnasab,
M. Hadizadeh,
A. Amiraslani
Abstract:
Multiplication of polynomials is among key operations in computer algebra which plays important roles in develo** techniques for other commonly used polynomial operations such as division, evaluation/interpolation, and factorization. In this work, we present formulas and techniques for polynomial multiplications expressed in a variety of well-known polynomial bases without any change of basis. I…
▽ More
Multiplication of polynomials is among key operations in computer algebra which plays important roles in develo** techniques for other commonly used polynomial operations such as division, evaluation/interpolation, and factorization. In this work, we present formulas and techniques for polynomial multiplications expressed in a variety of well-known polynomial bases without any change of basis. In particular, we take into consideration degree-graded polynomial bases including, but not limited to orthogonal polynomial bases and non-degree-graded polynomial bases including the Bernstein and Lagrange bases. All of the described polynomial multiplication formulas and techniques in this work, which are mostly presented in matrix-vector forms, preserve the basis in which the polynomials are given. Furthermore, using the results of direct multiplication of polynomials, we devise techniques for intra-basis polynomial division in the polynomial bases. A generalization of the well-known "long division" algorithm to any degree-graded polynomial basis is also given. The proposed framework deals with matrix-vector computations which often leads to well-structured matrices. Finally, an application of the presented techniques in constructing the Galerkin representation of polynomial multiplication operators is illustrated for discretization of a linear elliptic problem with stochastic coefficients.
△ Less
Submitted 1 June, 2022; v1 submitted 3 August, 2021;
originally announced August 2021.
-
Treatment Effects in Interactive Fixed Effects Models with a Small Number of Time Periods
Authors:
Brantly Callaway,
Sonia Karami
Abstract:
This paper considers identifying and estimating the Average Treatment Effect on the Treated (ATT) when untreated potential outcomes are generated by an interactive fixed effects model. That is, in addition to time-period and individual fixed effects, we consider the case where there is an unobserved time invariant variable whose effect on untreated potential outcomes may change over time and which…
▽ More
This paper considers identifying and estimating the Average Treatment Effect on the Treated (ATT) when untreated potential outcomes are generated by an interactive fixed effects model. That is, in addition to time-period and individual fixed effects, we consider the case where there is an unobserved time invariant variable whose effect on untreated potential outcomes may change over time and which can therefore cause outcomes (in the absence of participating in the treatment) to follow different paths for the treated group relative to the untreated group. The models that we consider in this paper generalize many commonly used models in the treatment effects literature including difference in differences and individual-specific linear trend models. Unlike the majority of the literature on interactive fixed effects models, we do not require the number of time periods to go to infinity to consistently estimate the ATT. Our main identification result relies on having the effect of some time invariant covariate (e.g., race or sex) not vary over time. Using our approach, we show that the ATT can be identified with as few as three time periods and with panel or repeated cross sections data.
△ Less
Submitted 14 February, 2022; v1 submitted 28 June, 2020;
originally announced June 2020.