Skip to main content

Showing 1–50 of 161 results for author: Miller, D J

.
  1. arXiv:2406.07778  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    On Trojans in Refined Language Models

    Authors: Jayaram Raghuram, George Kesidis, David J. Miller

    Abstract: A Trojan in a language model can be inserted when the model is refined for a particular application such as determining the sentiment of product reviews. In this paper, we clarify and empirically explore variations of the data-poisoning threat model. We then empirically assess two simple defenses each for a different defense scenario. Finally, we provide a brief survey of related attacks and defen… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  2. arXiv:2402.02034  [pdf, other

    cs.CR cs.LG cs.NE

    Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks

    Authors: Xi Li, Hang Wang, David J. Miller, George Kesidis

    Abstract: A variety of defenses have been proposed against backdoors attacks on deep neural network (DNN) classifiers. Universal methods seek to reliably detect and/or mitigate backdoors irrespective of the incorporation mechanism used by the attacker, while reverse-engineering methods often explicitly assume one. In this paper, we describe a new detector that: relies on internal feature map of the defended… ▽ More

    Submitted 22 May, 2024; v1 submitted 3 February, 2024; originally announced February 2024.

  3. arXiv:2312.13346  [pdf, other

    hep-ph

    Phenomenology of a Deconstructed Electroweak Force

    Authors: Joe Davighi, Alastair Gosnay, David J Miller, Sophie Renner

    Abstract: We study an effective theory of flavour in which the $SU(2)_L$ interaction is `flavour-deconstructed' near the TeV scale. This arises, for example, in UV models that unify all three generations of left-handed fermions via an $Sp(6)_L$ symmetry. Flavour-universality of the electroweak force emerges accidentally (but naturally) from breaking the $\prod_{i=1}^3 SU(2)_{L,i}$ gauge group to its diagona… ▽ More

    Submitted 11 April, 2024; v1 submitted 20 December, 2023; originally announced December 2023.

    Comments: 50 pages. v2: version accepted in JHEP. Changed plot ranges to remove physically equivalent regions; added more details on some electroweak observables; fixed typos

    Report number: CERN-TH-2023-246

  4. arXiv:2309.16827  [pdf, other

    cs.LG

    Post-Training Overfitting Mitigation in DNN Classifiers

    Authors: Hang Wang, David J. Miller, George Kesidis

    Abstract: Well-known (non-malicious) sources of overfitting in deep neural net (DNN) classifiers include: i) large class imbalances; ii) insufficient training-set diversity; and iii) over-training. In recent work, it was shown that backdoor data-poisoning also induces overfitting, with unusually large classification margins to the attacker's target class, mediated particularly by (unbounded) ReLU activation… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

  5. arXiv:2308.09850  [pdf, other

    cs.LG cs.CR

    Backdoor Mitigation by Correcting the Distribution of Neural Activations

    Authors: Xi Li, Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Backdoor (Trojan) attacks are an important type of adversarial exploit against deep neural networks (DNNs), wherein a test instance is (mis)classified to the attacker's target class whenever the attacker's backdoor trigger is present. In this paper, we reveal and analyze an important property of backdoor attacks: a successful attack causes an alteration in the distribution of internal layer activa… ▽ More

    Submitted 18 August, 2023; originally announced August 2023.

  6. arXiv:2308.04617  [pdf, other

    cs.LG cs.CR

    Improved Activation Clip** for Universal Backdoor Mitigation and Test-Time Detection

    Authors: Hang Wang, Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Deep neural networks are vulnerable to backdoor attacks (Trojans), where an attacker poisons the training set with backdoor triggers so that the neural network learns to classify test-time triggers to the attacker's designated target class. Recent work shows that backdoor poisoning induces over-fitting (abnormally large activations) in the attacked model, which motivates a general, post-training c… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

  7. arXiv:2302.03680  [pdf

    cond-mat.mes-hall cond-mat.other physics.app-ph

    Spatial map** and analysis of graphene nanomechanical resonator networks

    Authors: Brittany Carter, Viva R. Horowitz, Uriel Hernandez, David J. Miller, Andrew Blaikie, Benjamín J. Alemán

    Abstract: Nanoelectromechanical (NEMS) resonator networks have drawn increasing interest due to their potential applications in emergent behavior, sensing, phononics, and mechanical information processing. A challenge toward realizing these large-scale networks is the ability to controllably tune and reconfigure the collective, macroscopic properties of the network, which relies directly on the development… ▽ More

    Submitted 7 February, 2023; originally announced February 2023.

    Comments: Main--15 pages, 3 figures; Supplementary Information--17 pages, 7 figures

  8. arXiv:2210.10272  [pdf, other

    cs.LG cs.CR cs.CV

    Training set cleansing of backdoor poisoning by self-supervised representation learning

    Authors: H. Wang, S. Karami, O. Dia, H. Ritter, E. Emamjomeh-Zadeh, J. Chen, Z. Xiang, D. J. Miller, G. Kesidis

    Abstract: A backdoor or Trojan attack is an important type of data poisoning attack against deep neural network (DNN) classifiers, wherein the training dataset is poisoned with a small number of samples that each possess the backdoor pattern (usually a pattern that is either imperceptible or innocuous) and which are mislabeled to the attacker's target class. When trained on a backdoor-poisoned dataset, a DN… ▽ More

    Submitted 14 March, 2023; v1 submitted 18 October, 2022; originally announced October 2022.

  9. arXiv:2205.06900  [pdf, other

    cs.LG cs.CR

    MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic

    Authors: Hang Wang, Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Backdoor attacks are an important type of adversarial threat against deep neural network classifiers, wherein test samples from one or more source classes will be (mis)classified to the attacker's target class when a backdoor pattern is embedded. In this paper, we focus on the post-training backdoor defense scenario commonly considered in the literature, where the defender aims to detect whether a… ▽ More

    Submitted 6 August, 2023; v1 submitted 13 May, 2022; originally announced May 2022.

  10. arXiv:2201.08474  [pdf, other

    cs.CR cs.LG

    Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios

    Authors: Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Backdoor attacks (BAs) are an emerging threat to deep neural network classifiers. A victim classifier will predict to an attacker-desired target class whenever a test sample is embedded with the same backdoor pattern (BP) that was used to poison the classifier's training set. Detecting whether a classifier is backdoor attacked is not easy in practice, especially when the defender is, e.g., a downs… ▽ More

    Submitted 14 March, 2022; v1 submitted 20 January, 2022; originally announced January 2022.

    Comments: Accepted to ICLR2022

  11. arXiv:2112.03350  [pdf, ps, other

    cs.CR cs.LG

    Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks

    Authors: Xi Li, Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Backdoor (Trojan) attacks are emerging threats against deep neural networks (DNN). A DNN being attacked will predict to an attacker-desired target class whenever a test sample from any source class is embedded with a backdoor pattern; while correctly classifying clean (attack-free) test samples. Existing backdoor defenses have shown success in detecting whether a DNN is attacked and in reverse-eng… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

  12. Improved Constraints on Effective Top Quark Interactions using Edge Convolution Networks

    Authors: Oliver Atkinson, Akanksha Bhardwaj, Stephen Brown, Christoph Englert, David J. Miller, Panagiotis Stylianou

    Abstract: We explore the potential of Graph Neural Networks (GNNs) to improve the performance of high-dimensional effective field theory parameter fits to collider data beyond traditional rectangular cut-based differential distribution analyses. In this study, we focus on a SMEFT analysis of $pp \to t\bar t$ production, including top decays, where the linear effective field deformation is parametrised by th… ▽ More

    Submitted 28 April, 2022; v1 submitted 2 November, 2021; originally announced November 2021.

    Comments: 17 pages, 7 figures, 3 tables; v2 accepted by JHEP

  13. arXiv:2110.10354  [pdf, other

    cs.CR cs.CV cs.LG

    Detecting Backdoor Attacks Against Point Cloud Classifiers

    Authors: Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis

    Abstract: Backdoor attacks (BA) are an emerging threat to deep neural network classifiers. A classifier being attacked will predict to the attacker's target class when a test sample from a source class is embedded with the backdoor pattern (BP). Recently, the first BA against point cloud (PC) classifiers was proposed, creating new threats to many important applications including autonomous driving. Such PC… ▽ More

    Submitted 19 October, 2021; originally announced October 2021.

  14. arXiv:2109.02381  [pdf, other

    cs.LG cs.CR

    Backdoor Attack and Defense for Deep Regression

    Authors: Xi Li, George Kesidis, David J. Miller, Vladimir Lucic

    Abstract: We demonstrate a backdoor attack on a deep neural network used for regression. The backdoor attack is localized based on training-set data poisoning wherein the mislabeled samples are surrounded by correctly labeled ones. We demonstrate how such localization is necessary for attack success. We also study the performance of a backdoor defense using gradient-based discovery of local error maximizers… ▽ More

    Submitted 6 September, 2021; originally announced September 2021.

  15. arXiv:2107.13124  [pdf, ps, other

    cs.LG

    Robust and Active Learning for Deep Neural Network Regression

    Authors: Xi Li, George Kesidis, David J. Miller, Maxime Bergeron, Ryan Ferguson, Vladimir Lucic

    Abstract: We describe a gradient-based method to discover local error maximizers of a deep neural network (DNN) used for regression, assuming the availability of an "oracle" capable of providing real-valued supervision (a regression target) for samples. For example, the oracle could be a numerical solver which, operationally, is much slower than the DNN. Given a discovered set of local error maximizers, the… ▽ More

    Submitted 27 July, 2021; originally announced July 2021.

  16. arXiv:2105.13530  [pdf, other

    cs.LG cs.CR

    A BIC-based Mixture Model Defense against Data Poisoning Attacks on Classifiers

    Authors: Xi Li, David J. Miller, Zhen Xiang, George Kesidis

    Abstract: Data Poisoning (DP) is an effective attack that causes trained classifiers to misclassify their inputs. DP attacks significantly degrade a classifier's accuracy by covertly injecting attack samples into the training set. Broadly applicable to different classifier structures, without strong assumptions about the attacker, an {\it unsupervised} Bayesian Information Criterion (BIC)-based mixture mode… ▽ More

    Submitted 12 May, 2022; v1 submitted 27 May, 2021; originally announced May 2021.

  17. arXiv:2105.10101  [pdf, other

    cs.LG eess.IV

    Anomaly Detection of Adversarial Examples using Class-conditional Generative Adversarial Networks

    Authors: Hang Wang, David J. Miller, George Kesidis

    Abstract: Deep Neural Networks (DNNs) have been shown vulnerable to Test-Time Evasion attacks (TTEs, or adversarial examples), which, by making small changes to the input, alter the DNN's decision. We propose an unsupervised attack detector on DNN classifiers based on class-conditional Generative Adversarial Networks (GANs). We model the distribution of clean data conditioned on the predicted class label by… ▽ More

    Submitted 12 May, 2022; v1 submitted 20 May, 2021; originally announced May 2021.

  18. arXiv:2104.05808  [pdf, other

    cs.CR

    A Backdoor Attack against 3D Point Cloud Classifiers

    Authors: Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis

    Abstract: Vulnerability of 3D point cloud (PC) classifiers has become a grave concern due to the popularity of 3D sensors in safety-critical applications. Existing adversarial attacks against 3D PC classifiers are all test-time evasion (TTE) attacks that aim to induce test-time misclassifications using knowledge of the classifier. But since the victim classifier is usually not accessible to the attacker, th… ▽ More

    Submitted 12 April, 2021; originally announced April 2021.

  19. arXiv:2010.09987  [pdf, other

    cs.CV cs.LG

    L-RED: Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set

    Authors: Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Backdoor attacks (BAs) are an emerging form of adversarial attack typically against deep neural network image classifiers. The attacker aims to have the classifier learn to classify to a target class when test images from one or more source classes contain a backdoor pattern, while maintaining high accuracy on all clean test images. Reverse-Engineering-based Defenses (REDs) against BAs do not requ… ▽ More

    Submitted 21 October, 2020; v1 submitted 19 October, 2020; originally announced October 2020.

    Report number: accepted by ICASSP 2021

  20. arXiv:2010.07489  [pdf, other

    cs.LG

    Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing

    Authors: Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Backdoor data poisoning is an emerging form of adversarial attack usually against deep neural network image classifiers. The attacker poisons the training set with a relatively small set of images from one (or several) source class(es), embedded with a backdoor pattern and labeled to a target class. For a successful attack, during operation, the trained classifier will: 1) misclassify a test image… ▽ More

    Submitted 14 October, 2020; originally announced October 2020.

  21. The Weinberg Angle and 5D RGE effects in a SO(11) GUT theory

    Authors: Christoph Englert, David J. Miller, Dumitru Dan Smaranda

    Abstract: The Weinberg angle is an important parameter in Grand Unified Theories (GUT) as its size is crucially influenced by the assumption of unification. In scenarios with different steps of symmetry breaking, in particular in models that involve gauge-Higgs unification, the connection of the ultraviolet theory and the TeV scale-relevant, effective Standard Model description is an important test of the m… ▽ More

    Submitted 5 June, 2020; v1 submitted 12 March, 2020; originally announced March 2020.

    Comments: 14 pages, 9 figures, 5 tables; v2 Version accepted for publication, updated figures and results

  22. arXiv:1911.07970  [pdf, other

    cs.LG stat.ML

    Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic

    Authors: Zhen Xiang, David J. Miller, Hang Wang, George Kesidis

    Abstract: Recently, a backdoor data poisoning attack was proposed, which adds mislabeled examples to the training set, with an embedded backdoor pattern, aiming to have the classifier learn to classify to a target class whenever the backdoor pattern is present in a test sample. Here, we address post-training detection of innocuous perceptible backdoors in DNN image classifiers, wherein the defender does not… ▽ More

    Submitted 6 April, 2020; v1 submitted 18 November, 2019; originally announced November 2019.

  23. Phenomenology of GUT-inspired gauge-Higgs unification

    Authors: Christoph Englert, David J. Miller, Dumitru Dan Smaranda

    Abstract: We perform a detailed investigation of a Grand Unified Theory (GUT)-inspired theory of gauge-Higgs unification. Scanning the model's parameter space with adapted numerical techniques, we contrast the scenario's low energy limit with existing SM and collider search constraints. We discuss potential modifications of di-Higgs phenomenology at hadron colliders as sensitive probes of the gauge-like cha… ▽ More

    Submitted 3 February, 2020; v1 submitted 13 November, 2019; originally announced November 2019.

    Comments: 10 pages, 9 figures, 1 table; v2: references added, version published in PLB

  24. arXiv:1910.08032  [pdf, other

    stat.ML cs.LG

    Notes on Margin Training and Margin p-Values for Deep Neural Network Classifiers

    Authors: George Kesidis, David J. Miller, Zhen Xiang

    Abstract: We provide a new local class-purity theorem for Lipschitz continuous DNN classifiers. In addition, we discuss how to achieve classification margin for training samples. Finally, we describe how to compute margin p-values for test samples.

    Submitted 5 December, 2019; v1 submitted 14 October, 2019; originally announced October 2019.

  25. arXiv:1909.10459  [pdf, other

    hep-ph

    The Multiple Point Principle and Extended Higgs Sectors

    Authors: John McDowall, David J Miller

    Abstract: The Higgs boson quartic self-coupling in the Standard Model appears to become zero just below the Planck scale, with interesting implications to the stability fo the Higgs vacuum at high energies. We review the Multiple Point Principle that suggests the quartic self-coupling should vanish exactly at the Planck scale. Although this vanishing is not consistent with the Standard Model, we investigate… ▽ More

    Submitted 23 September, 2019; originally announced September 2019.

    Comments: Review, 22 pages, 9 figures. Version accepted for publication

  26. arXiv:1909.09508  [pdf

    physics.app-ph cond-mat.mtrl-sci

    Measurement Anomaly of Step Width in Calibration Grating using Atomic Force Microscopy

    Authors: Gun Ahn, Yoon-Young Choi, Dean J. Miller, Hanwook Song, Kwangsoo No, Seungbum Hong

    Abstract: We imaged the topography of a silicon grating with atomic force microscopy (AFM) using different scan parameters to probe the effect of pixel pitch on resolution. We found variations in the measured step height and profile of the grating depending on scan parameters, with measured step width decreasing from 1300 to 108 nm and step height increasing from 172 to 184 nm when a pixel pitch in the scan… ▽ More

    Submitted 20 September, 2019; originally announced September 2019.

    Comments: 11 pages, 3 figures

  27. arXiv:1908.10498  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Detection of Backdoors in Trained Classifiers Without Access to the Training Set

    Authors: Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Recently, a special type of data poisoning (DP) attack targeting Deep Neural Network (DNN) classifiers, known as a backdoor, was proposed. These attacks do not seek to degrade classification accuracy, but rather to have the classifier learn to classify to a target class whenever the backdoor pattern is present in a test example. Launching backdoor attacks does not require knowledge of the classifi… ▽ More

    Submitted 19 August, 2020; v1 submitted 27 August, 2019; originally announced August 2019.

  28. arXiv:1908.07609  [pdf

    cond-mat.mes-hall physics.app-ph

    Non-volatile rewritable frequency tuning of a nanoelectromechanical resonator using photoinduced do**

    Authors: David J. Miller, Andrew Blaikie, Benjamin J. Aleman

    Abstract: Tuning the frequency of a resonant element is of vital importance in both the macroscopic world, such as when tuning a musical instrument, as well as at the nanoscale. In particular, precisely controlling the resonance frequency of isolated nanoelectromechanical resonators (NEMS) has enabled innovations such as tunable mechanical filtering and mixing as well as commercial technologies such as robu… ▽ More

    Submitted 4 December, 2019; v1 submitted 20 August, 2019; originally announced August 2019.

    Comments: 19 pages, 4 figures

  29. arXiv:1906.12310  [pdf, other

    hep-ph hep-ex

    Proposal for the validation of Monte Carlo implementations of the standard model effective field theory

    Authors: Gauthier Durieux, Ilaria Brivio, Fabio Maltoni, Michael Trott, Simone Alioli, Andy Buckley, Mauro Chiesa, Jorge de Blas, Athanasios Dedes, Céline Degrande, Ansgar Denner, Christoph Englert, James Ferrando, Benjamin Fuks, Peter Galler, Admir Greljo, Valentin Hirschi, Gino Isidori, Wolfgang Kilian, Frank Krauss, Jean-Nicolas Lang, Jonas Lindert, Michelangelo Mangano, David Marzocca, Olivier Mattelaer , et al. (16 additional authors not shown)

    Abstract: We propose a procedure to cross-validate Monte Carlo implementations of the standard model effective field theory. It is based on the numerical comparison of squared amplitudes computed at specific phase-space and parameter points in pairs of implementations. Interactions are fully linearised in the effective field theory expansion. The squares of linear effective field theory amplitudes and their… ▽ More

    Submitted 28 June, 2019; originally announced June 2019.

    Comments: agreement achieved under the auspices of the LHC Top and Electroweak Working Groups, and of the LHC Higgs Cross Section Working Group

    Report number: CERN-LPCC-2019-02

  30. arXiv:1904.06292  [pdf, other

    cs.LG cs.CR stat.ML

    Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks

    Authors: David J. Miller, Zhen Xiang, George Kesidis

    Abstract: There is great potential for damage from adversarial learning (AL) attacks on machine-learning based systems. In this paper, we provide a contemporary survey of AL, focused particularly on defenses against attacks on statistical classifiers. After introducing relevant terminology and the goals and range of possible knowledge of both attackers and defenders, we survey recent work on test-time evasi… ▽ More

    Submitted 2 December, 2019; v1 submitted 12 April, 2019; originally announced April 2019.

    Journal ref: Proceedings of the IEEE, March. 2020

  31. Scherk-Schwarz orbifolds at the LHC

    Authors: Dumitru Dan Smaranda, David J Miller

    Abstract: We examine orbifold theories of Grand Unification with Scherk-Schwarz twisting, performing a renormalisation group analysis and applying low energy experimental constraints. We rule out the minimal SU(5) models, and consider simple extensions including additional fields, such as an additional scalar field, or additional symmetries, such as $SU(5)\times U(1)$ or $E_6$. We find that it is very diffi… ▽ More

    Submitted 8 October, 2019; v1 submitted 29 January, 2019; originally announced January 2019.

    Comments: 26 pages, 12 figures; v3: Version accepted for publication; v4: Typos corrected

    Journal ref: Phys. Rev. D 100, 075016 (2019)

  32. arXiv:1901.08010  [pdf, other

    hep-ph

    Confronting Scherk-Schwarz orbifold models with LHC data

    Authors: Dumitru Dan Smaranda, David J Miller

    Abstract: We will outline our recent efforts aimed at analysing a class of models known as orbifold GUTs and their phenomenology in a variety of minimal and non-minimal settings. We examine the minimal SU(5) models, rule them out, and proceed by extending them with an additional scalar field along with a gauge extension via SU(5)xU(1) models. We end up by commenting on the future improvements needed to more… ▽ More

    Submitted 23 January, 2019; originally announced January 2019.

    Comments: Conference proceedings for ICHEP 2018, XXXIX International Conference on High Energy Physics, July 4-11, 2018, COEX, Seoul

  33. arXiv:1901.03164  [pdf, other

    hep-ph

    TopFitter: Fitting top-quark Wilson Coefficients to Run II data

    Authors: Stephen Brown, Andy Buckley, Christoph Englert, James Ferrando, Peter Galler, David J Miller, Liam Moore, Michael Russell, Chris White, Neil Warrack

    Abstract: We describe the latest TopFitter analysis, which uses top quark observables to fit the Wilson Coefficients of the SM augmented with dimension-6 operators. In particular, we discuss the inclusion of new LHC Run II data and the implementation of particle-level observables.

    Submitted 10 January, 2019; originally announced January 2019.

    Comments: Conference proceedings for ICHEP 2018, XXXIX International Conference on High Energy Physics, July 4-11, 2018, COEX, Seoul

  34. arXiv:1811.02658  [pdf, other

    cs.CV cs.LG stat.ML

    When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers

    Authors: Yujia Wang, David J. Miller, George Kesidis

    Abstract: This paper addresses detection of a reverse engineering (RE) attack targeting a deep neural network (DNN) image classifier; by querying, RE's aim is to discover the classifier's decision rule. RE can enable test-time evasion attacks, which require knowledge of the classifier. Recently, we proposed a quite effective approach (ADA) to detect test-time evasion attacks. In this paper, we extend ADA to… ▽ More

    Submitted 31 October, 2018; originally announced November 2018.

  35. arXiv:1811.00121  [pdf, other

    cs.CR cs.LG stat.ML

    A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters

    Authors: David J. Miller, Xinyi Hu, Zhen Xiang, George Kesidis

    Abstract: Naive Bayes spam filters are highly susceptible to data poisoning attacks. Here, known spam sources/blacklisted IPs exploit the fact that their received emails will be treated as (ground truth) labeled spam examples, and used for classifier training (or re-training). The attacking source thus generates emails that will skew the spam model, potentially resulting in great degradation in classifier a… ▽ More

    Submitted 31 October, 2018; originally announced November 2018.

  36. High Scale Boundary Conditions in Models with Two Higgs Doublets

    Authors: John McDowall, David J Miller

    Abstract: We investigate high scale boundary conditions on the quartic Higgs-couplings and their $β$-functions in the Type-II Two Higgs Doublet Model and the Inert Doublet Model. These conditions are associated with two possible UV physics scenarios: the Multiple Point Principle, in which the potential exhibits a second minimum at $M_{Pl}$, and Asymptotic Safety, where the scalar couplings run towards an in… ▽ More

    Submitted 19 June, 2019; v1 submitted 10 October, 2018; originally announced October 2018.

    Comments: 25 pages, 13 figures (25 plots); v3: version accepted for publication

    Journal ref: Phys. Rev. D 100, 015018 (2019)

  37. High scale boundary conditions with an additional complex singlet

    Authors: John McDowall, David J. Miller

    Abstract: We investigate Planck scale boundary conditions on Higgs quartic interactions and their $β$-functions in the SM augmented by an additional complex scalar. We use renormalisation group running at two-loops, and include both theoretical and experimental constraints. We find that the boundary condition $λ=β_λ=0$ at the Planck scale is compatible with the current Higgs and top mass measurements, but r… ▽ More

    Submitted 21 June, 2018; v1 submitted 7 February, 2018; originally announced February 2018.

    Comments: 23 pages, 13 figures; version accepted for publication

    Journal ref: Phys. Rev. D 97, 115042 (2018)

  38. arXiv:1712.06646  [pdf, other

    cs.LG cs.CR

    When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time

    Authors: David J. Miller, Yulia Wang, George Kesidis

    Abstract: A significant threat to the recent, wide deployment of machine learning-based systems, including deep neural networks (DNNs), is adversarial learning attacks. We analyze possible test-time evasion-attack mechanisms and show that, in some important cases, when the image has been attacked, correctly classifying it has no utility: i) when the image to be attacked is (even arbitrarily) selected from t… ▽ More

    Submitted 27 June, 2018; v1 submitted 18 December, 2017; originally announced December 2017.

  39. arXiv:1705.09823  [pdf, other

    cs.CR

    Adversarial Learning: A Critical Review and Active Learning Study

    Authors: David J. Miller, Xinyi Hu, Zhicong Qiu, George Kesidis

    Abstract: This papers consists of two parts. The first is a critical review of prior art on adversarial learning, identifying some significant limitations of previous works. The second part is an experimental study considering adversarial active learning and an investigation of the efficacy of a mixed sample selection strategy for combating an adversary who attempts to disrupt the classifier learning.

    Submitted 27 May, 2017; originally announced May 2017.

  40. arXiv:1612.02294  [pdf, other

    hep-ph

    Results from TopFitter

    Authors: Andy Buckley, Christoph Englert, James Ferrando, David J. Miller, Liam Moore, Karl Nordström, Michael Russell, Chris D. White

    Abstract: We discuss a global fit of top quark BSM couplings, phrased in the model-independent language of higher-dimensional effective operators, to the currently available data from the LHC and Tevatron. We examine the interplay between inclusive and differential measurements, and the complementarity of LHC and Tevatron results. We conclude with a discussion of projections for improvement over LHC Run II.

    Submitted 28 December, 2016; v1 submitted 7 December, 2016; originally announced December 2016.

    Comments: 5 pages, 4 figures, proceedings of the 9th International Workshop on the CKM Unitarity Triangle, 28 November - 3 December 2016, Tata Institute for Fundamental Research (TIFR), Mumbai, India

  41. A to Z of the Muon Anomalous Magnetic Moment in the MSSM with Pati-Salam at the GUT scale

    Authors: Alexander S. Belyaev, José E. Camargo-Molina, Steve F. King, David J. Miller, António P. Morais, Patrick B. Schaefers

    Abstract: We analyse the low energy predictions of the minimal supersymmetric standard model (MSSM) arising from a GUT scale Pati-Salam gauge group further constrained by an $A_4 \times Z_5$ family symmetry, resulting in four soft scalar masses at the GUT scale: one left-handed soft mass $m_0$ and three right-handed soft masses $m_1,m_2,m_3$, one for each generation. We demonstrate that this model, which wa… ▽ More

    Submitted 28 June, 2016; v1 submitted 6 May, 2016; originally announced May 2016.

    Comments: 29 pages, 14 figures; [v2] added references, corrected minor typos

    Journal ref: JHEP 1606 (2016) 142

  42. Decoupling and tuning competing effects of different types of defects on flux creep in irradiated YBa$_{2}$Cu$_{3}$O$_{7-δ}$ coated conductors

    Authors: S. Eley, M. Leroux, M. W. Rupich, D. J. Miller, H. Sheng, P. M. Niraula, A. Kayani, U. Welp, W. -K. Kwok, L. Civale

    Abstract: YBa$_{2}$Cu$_{3}$O$_{7-δ}$ coated conductors (CCs) have achieved high critical current densities ($\textit{J}_{c}$) that can be further increased through the introduction of additional defects using particle irradiation. However, these gains are accompanied by increases in the flux creep rate, a manifestation of competition between the different types of defects. Here, we study this competition to… ▽ More

    Submitted 6 June, 2016; v1 submitted 13 February, 2016; originally announced February 2016.

    Comments: 22 pages, 7 figures

    Journal ref: Supercond. Sci. Technol. 30 015010 (2017)

  43. arXiv:1601.01850  [pdf, ps, other

    math.AG math.CA math.LO

    Integration of Oscillatory and Subanalytic Functions

    Authors: Raf Cluckers, Georges Comte, Daniel J. Miller, Jean-Philippe Rolin, Tamara Servi

    Abstract: We prove the stability under integration and under Fourier transform of a concrete class of functions containing all globally subanalytic functions and their complex exponentials. This paper extends the investigation started in [J.-M. Lion, J.-P. Rolin: "Volumes, feuilles de Rolle de feuilletages analytiques et théorème de Wilkie" Ann. Fac. Sci. Toulouse Math. (6) 7 (1998), no. 1, 93-112] and [R.… ▽ More

    Submitted 11 December, 2017; v1 submitted 8 January, 2016; originally announced January 2016.

    Comments: Final version. Accepted for publication in Duke Math. Journal. Changes in proofs: from Section 6 to the end, we now use the theory of continuously uniformly distributed modulo 1 functions that provides a uniform technical point of view in the proofs of limit statements

    MSC Class: 26B15; 14P15; 32B20; 42B20; 42A38 (Primary) 03C64; 14P10; 33B10 (Secondary)

    Journal ref: Duke Math. J. 167, no. 7 (2018), 1239-1309

  44. ATD: Anomalous Topic Discovery in High Dimensional Discrete Data

    Authors: Hossein Soleimani, David J. Miller

    Abstract: We propose an algorithm for detecting patterns exhibited by anomalous clusters in high dimensional discrete data. Unlike most anomaly detection (AD) methods, which detect individual anomalies, our proposed method detects groups (clusters) of anomalies; i.e. sets of points which collectively exhibit abnormal patterns. In many applications this can lead to better understanding of the nature of the a… ▽ More

    Submitted 20 May, 2016; v1 submitted 20 December, 2015; originally announced December 2015.

  45. Constraining top quark effective theory in the LHC Run II era

    Authors: Andy Buckley, Christoph Englert, James Ferrando, David J. Miller, Liam Moore, Michael Russell, Chris D. White

    Abstract: We perform an up-to-date global fit of top quark effective theory to experimental data from the Tevatron, and from LHC Runs I and II. Experimental data includes total cross-sections up to 13 TeV, as well as differential distributions, for both single top and pair production. We also include the top quark width, charge asymmetries, and polarisation information from top decay products. We present bo… ▽ More

    Submitted 4 July, 2018; v1 submitted 10 December, 2015; originally announced December 2015.

    Comments: v1: 23 pages plus references (34 total), 12 figures. v2: Version accepted by JHEP. v3: Added table of numerical constraints. v4: Corrected typo in table 2

  46. arXiv:1511.01047  [pdf, ps, other

    cs.NI cs.CR cs.LG

    Detecting Clusters of Anomalies on Low-Dimensional Feature Subsets with Application to Network Traffic Flow Data

    Authors: Zhicong Qiu, David J. Miller, George Kesidis

    Abstract: In a variety of applications, one desires to detect groups of anomalous data samples, with a group potentially manifesting its atypicality (relative to a reference model) on a low-dimensional subset of the full measured set of features. Samples may only be weakly atypical individually, whereas they may be strongly atypical when considered jointly. What makes this group anomaly detection problem qu… ▽ More

    Submitted 10 June, 2015; originally announced November 2015.

  47. arXiv:1509.07556  [pdf

    cond-mat.supr-con

    Rapid Doubling of the Critical Current of YBa$_2$Cu$_3$O$_{7-δ}$ Coated Conductors for Viable High-Speed Industrial Processing

    Authors: Maxime Leroux, Karen J. Kihlstrom, Sigrid Holleis, Martin W. Rupich, Srivatsan Sathyamurthy, Steven Fleshler, Hua** Sheng, Dean J. Miller, Serena Eley, Leonardo Civale, Asghar Kayani, Prashantamani M. Niraula, Ulrich Welp, Wai-Kwong Kwok

    Abstract: We demonstrate that 3.5-MeV oxygen irradiation can markedly enhance the in-field critical current of commercial 2nd generation superconducting tapes with an exposure time of just one second per 0.8 cm2. The speed demonstrated here is now at the level required for an industrial reel-to-reel post-processing. The irradiation is made on production line samples through the protective silver coating and… ▽ More

    Submitted 24 September, 2015; originally announced September 2015.

    Comments: 4 figures

    Journal ref: Appl. Phys. Lett. 107, 192601 (2015)

  48. arXiv:1507.00415  [pdf, ps, other

    cond-mat.mtrl-sci

    Stabilization of highly polar BiFeO$_3$-like structure: a new interface design route for enhanced ferroelectricity in artificial perovskite superlattices

    Authors: Hongwei Wang, Jianguo Wen, Dean J. Miller, Qibin Zhou, Mohan Chen, Ho Nyung Lee, Karin M. Rabe, Xifan Wu

    Abstract: In ABO3 perovskites, oxygen octahedron rotations are common structural distortions that can promote large ferroelectricity in BiFeO3 with an R3c structure [1], but suppress ferroelectricity in CaTiO3 with a Pbnm symmetry [2]. For many CaTiO3-like perovskites, the BiFeO3 structure is a metastable phase. Here, we report the stabilization of the highly-polar BiFeO3-like phase of CaTiO3 in a BaTiO3/Ca… ▽ More

    Submitted 15 February, 2016; v1 submitted 1 July, 2015; originally announced July 2015.

    Comments: Phys. Rev. X, in production

    Journal ref: Phys. Rev. X 6, 011027 (2016)

  49. A global fit of top quark effective theory to data

    Authors: Andy Buckley, Christoph Englert, James Ferrando, David J. Miller, Liam Moore, Michael Russell, Chris D. White

    Abstract: In this paper we present a global fit of beyond the Standard Model (BSM) dimension six operators relevant to the top quark sector to currently available data. Experimental measurements include parton-level top-pair and single top production from the LHC and the Tevatron. Higher order QCD corrections are modelled using differential and global K-factors, and we use novel fast-fitting techniques deve… ▽ More

    Submitted 30 November, 2015; v1 submitted 29 June, 2015; originally announced June 2015.

    Comments: Additional references and preprint code added. Minor error in generation of plots fixed, no conclusions affected

    Report number: GLAS-PPE/2015-04

    Journal ref: Phys. Rev. D 92, 091501 (2015)

  50. Next-to-leading order predictions for WW+jet production

    Authors: John M. Campbell, David J. Miller, Tania Robens

    Abstract: In this work we report on a next-to-leading order calculation of WW + jet production at hadron colliders, with subsequent leptonic decays of the W-bosons included. The calculation of the one-loop contributions is performed using generalized unitarity methods in order to derive analytic expressions for the relevant amplitudes. These amplitudes have been implemented in the parton-level Monte Carlo g… ▽ More

    Submitted 4 August, 2015; v1 submitted 15 June, 2015; originally announced June 2015.

    Comments: 14 pages, 7 figures; v2: several references added, 2 typos corrected. Corresponds to published journal version

    Report number: FERMILAB-PUB-15-257-T

    Journal ref: Phys. Rev. D 92, 014033 (2015)