Skip to main content

Showing 1–11 of 11 results for author: Larson, E C

.
  1. arXiv:2404.02440  [pdf, other

    cs.CR physics.optics

    Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks

    Authors: Elena R. Henderson, Jessie M. Henderson, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton

    Abstract: Physically unclonable functions (PUFs) are designed to act as device 'fingerprints.' Given an input challenge, the PUF circuit should produce an unpredictable response for use in situations such as root-of-trust applications and other hardware-level cybersecurity applications. PUFs are typically subcircuits present within integrated circuits (ICs), and while conventional IC PUFs are well-understoo… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: 14 pages, 8 figures

  2. arXiv:2403.01299  [pdf, other

    cs.CR cs.LG

    A Photonic Physically Unclonable Function's Resilience to Multiple-Valued Machine Learning Attacks

    Authors: Jessie M. Henderson, Elena R. Henderson, Clayton A. Harper, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton

    Abstract: Physically unclonable functions (PUFs) identify integrated circuits using nonlinearly-related challenge-response pairs (CRPs). Ideally, the relationship between challenges and corresponding responses is unpredictable, even if a subset of CRPs is known. Previous work developed a photonic PUF offering improved security compared to non-optical counterparts. Here, we investigate this PUF's susceptibil… ▽ More

    Submitted 2 March, 2024; originally announced March 2024.

    Comments: 6 pages, 4 figures

  3. arXiv:2309.01028  [pdf, other

    quant-ph

    Demonstration of a Hardware-Independent Toolkit for Automated Quantum Subcircuit Synthesis

    Authors: Elena R. Henderson, Jessie M. Henderson, Aviraj Sinha, Eric C. Larson, Mitchell A. Thornton

    Abstract: The quantum computer has become contemporary reality, with the first two-qubit machine of mere decades ago transforming into cloud-accessible devices with tens, hundreds, or -- in a few cases -- even thousands of qubits. While such hardware is noisy and still relatively small, the increasing number of operable qubits raises another challenge: how to develop the now-sizeable quantum circuits execut… ▽ More

    Submitted 8 February, 2024; v1 submitted 2 September, 2023; originally announced September 2023.

    Comments: 48 pages, 23 figures, 20 tables

  4. arXiv:2304.12503  [pdf, other

    cs.CR cs.LG cs.MM

    CNN-Assisted Steganography -- Integrating Machine Learning with Established Steganographic Techniques

    Authors: Andrew Havard, Theodore Manikas, Eric C. Larson, Mitchell A. Thornton

    Abstract: We propose a method to improve steganography by increasing the resilience of stego-media to discovery through steganalysis. Our approach enhances a class of steganographic approaches through the inclusion of a steganographic assistant convolutional neural network (SA-CNN). Previous research showed success in discovering the presence of hidden information within stego-images using trained neural ne… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

    Comments: 6 pages, 6 figures

  5. arXiv:2304.03830  [pdf, other

    quant-ph

    A Programmable True Random Number Generator Using Commercial Quantum Computers

    Authors: Aviraj Sinha, Elena R. Henderson, Jessie M. Henderson, Eric C. Larson, Mitchell A. Thornton

    Abstract: Random number generators (RNG) are essential elements in many cryptographic systems. True random number generators (TRNG) rely upon sources of randomness from natural processes such as those arising from quantum mechanics phenomena. We demonstrate that a quantum computer can serve as a high-quality, weakly random source for a generalized user-defined probability mass function (PMF). Specifically,… ▽ More

    Submitted 7 April, 2023; originally announced April 2023.

    Comments: 15 pages, 7 figures, SPIE Defense + Commercial Sensing: Quantum Information Science, Sensing, and Computation XV

  6. arXiv:2204.13040  [pdf, other

    q-bio.QM

    LAST: Latent Space Assisted Adaptive Sampling for Protein Trajectories

    Authors: Hao Tian, Xi Jiang, Sian Xiao, Hunter La Force, Eric C. Larson, Peng Tao

    Abstract: Molecular dynamics (MD) simulation is widely used to study protein conformations and dynamics. However, conventional simulation suffers from being trapped in some local energy minima that are hard to escape. Thus, most computational time is spent sampling in the already visited regions. This leads to an inefficient sampling process and further hinders the exploration of protein movements in afford… ▽ More

    Submitted 27 April, 2022; originally announced April 2022.

  7. arXiv:2104.00038  [pdf, other

    cs.LG cs.HC

    Smartphone Camera Oximetry in an Induced Hypoxemia Study

    Authors: Jason S. Hoffman, Varun Viswanath, Xinyi Ding, Matthew J. Thompson, Eric C. Larson, Shwetak N. Patel, Edward Wang

    Abstract: Hypoxemia, a medical condition that occurs when the blood is not carrying enough oxygen to adequately supply the tissues, is a leading indicator for dangerous complications of respiratory diseases like asthma, COPD, and COVID-19. While purpose-built pulse oximeters can provide accurate blood-oxygen saturation (SpO$_2$) readings that allow for diagnosis of hypoxemia, enabling this capability in unm… ▽ More

    Submitted 31 March, 2021; originally announced April 2021.

    Comments: 26 pages, 8 figures

  8. arXiv:2101.11335  [pdf, other

    cs.LG cs.CY

    On the Interpretability of Deep Learning Based Models for Knowledge Tracing

    Authors: Xinyi Ding, Eric C. Larson

    Abstract: Knowledge tracing allows Intelligent Tutoring Systems to infer which topics or skills a student has mastered, thus adjusting curriculum accordingly. Deep Learning based models like Deep Knowledge Tracing (DKT) and Dynamic Key-Value Memory Network (DKVMN) have achieved significant improvements compared with models like Bayesian Knowledge Tracing (BKT) and Performance Factors Analysis (PFA). However… ▽ More

    Submitted 27 January, 2021; originally announced January 2021.

    Journal ref: AAAI 2021 workshop

  9. arXiv:2101.10245  [pdf, other

    cs.HC

    AirWare: Utilizing Embedded Audio and Infrared Signals for In-Air Hand-Gesture Recognition

    Authors: Nibhrat Lohia, Raunak Mundada, Arya D. McCarthy, Eric C. Larson

    Abstract: We introduce AirWare, an in-air hand-gesture recognition system that uses the already embedded speaker and microphone in most electronic devices, together with embedded infrared proximity sensors. Gestures identified by AirWare are performed in the air above a touchscreen or a mobile phone. AirWare utilizes convolutional neural networks to classify a large vocabulary of hand gestures using multi-m… ▽ More

    Submitted 25 January, 2021; originally announced January 2021.

  10. arXiv:2101.10191  [pdf, other

    cs.HC

    Writers Gonna Wait: The Effectiveness of Notifications to Initiate Aversive Action in Writing Procrastination

    Authors: Chatchai Wangwiwattana, Sunjoli Aggarwal, Eric C. Larson

    Abstract: This paper evaluates the use of notifications to reduce aversive-task-procrastination by hel** initiate action. Specifically, we focus on aversion to graded writing tasks. We evaluate software designs commonly used by behavior change applications, such as goal setting and action support systems. We conduct a two-phase control trial experiment with 21 college students tasked to write two 3000-wor… ▽ More

    Submitted 25 January, 2021; originally announced January 2021.

    ACM Class: H.5.m

  11. arXiv:1909.04217  [pdf, other

    cs.LG cs.CV stat.ML

    Swapped Face Detection using Deep Learning and Subjective Assessment

    Authors: Xinyi Ding, Zohreh Raziei, Eric C. Larson, Eli V. Olinick, Paul Krueger, Michael Hahsler

    Abstract: The tremendous success of deep learning for imaging applications has resulted in numerous beneficial advances. Unfortunately, this success has also been a catalyst for malicious uses such as photo-realistic face swap** of parties without consent. Transferring one person's face from a source image to a target image of another person, while kee** the image photo-realistic overall has become incr… ▽ More

    Submitted 9 September, 2019; originally announced September 2019.

    Comments: 8 pages, 5 figures