-
Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information (PHI) Sharing
Authors:
Md Al Amin,
Hemanth Tummala,
Rushabh Shah,
Indrajit Ray
Abstract:
Protected Health Information (PHI) sharing significantly enhances patient care quality and coordination, contributing to more accurate diagnoses, efficient treatment plans, and a comprehensive understanding of patient history. Compliance with strict privacy and security policies, such as those required by laws like HIPAA, is critical to protect PHI. Blockchain technology, which offers a decentrali…
▽ More
Protected Health Information (PHI) sharing significantly enhances patient care quality and coordination, contributing to more accurate diagnoses, efficient treatment plans, and a comprehensive understanding of patient history. Compliance with strict privacy and security policies, such as those required by laws like HIPAA, is critical to protect PHI. Blockchain technology, which offers a decentralized and tamper-evident ledger system, hold promise in policy compliance. This system ensures the authenticity and integrity of PHI while facilitating patient consent management. In this work, we propose a blockchain technology that integrates smart contracts to partially automate consent-related processes and ensuring that PHI access and sharing follow patient preferences and legal requirements.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
TALYS calculation and a short review of the experimental status of proton capture studies on p-nuclei: A guide to future investigation
Authors:
Indrani Ray,
Argha Deb
Abstract:
TALYS calculations were performed to obtain the theoretical proton capture cross-sections on the p-nuclei. A short review on the status of related experimental studies was also conducted. Some basic properties such as Q-values, Coulomb barrier, Gamow peak, Gamow Window, and decay properties of the parent and daughter nuclei were studied. Various experimental parameters, e.g., beam energy, beam cur…
▽ More
TALYS calculations were performed to obtain the theoretical proton capture cross-sections on the p-nuclei. A short review on the status of related experimental studies was also conducted. Some basic properties such as Q-values, Coulomb barrier, Gamow peak, Gamow Window, and decay properties of the parent and daughter nuclei were studied. Various experimental parameters, e.g., beam energy, beam current, targets, and detectors, used in experimental investigations reported in the literature, were tabulated. The results of the TALYS calculations in the Gamow region were compared with the corresponding experimental values wherever available. This study is expected to facilitate the planning of future experiments.
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
Probing the inverse moment of $B_s$-meson distribution amplitude via $B_s \to η_s$ form factors
Authors:
Rusa Mandal,
Praveen S Patil,
Ipsita Ray
Abstract:
We investigate the inverse moment of the $B_s$-meson light-cone distribution amplitude (LCDA), denoted as $λ_{B_s}$ and defined within the heavy quark effective theory, through the calculation of $B_s \to η_s$ form factors. The presence of the $s$-quark inside the $B_s$-meson dictates a notable departure of approximately $20\%$ in the $λ_{B_s}$ value compared to the non-strange case $λ_{B_q}$, as…
▽ More
We investigate the inverse moment of the $B_s$-meson light-cone distribution amplitude (LCDA), denoted as $λ_{B_s}$ and defined within the heavy quark effective theory, through the calculation of $B_s \to η_s$ form factors. The presence of the $s$-quark inside the $B_s$-meson dictates a notable departure of approximately $20\%$ in the $λ_{B_s}$ value compared to the non-strange case $λ_{B_q}$, as computed within the QCD sum rule approach, albeit with significant uncertainty. First, we compute the decay constant of the $η_s$-meson utilizing two-point sum rules while retaining finite $s$-quark mass contributions. Next, we constrain the parameter $λ_{B_s}$ by calculating $B_s \to η_s$ form factors within the light-cone sum rule approach, using $B_s$-meson LCDAs, and leveraging Lattice QCD estimates at zero momentum transfer from the HPQCD collaboration. Our findings yield $λ_{B_s}$ = 480 $\pm$ 92 MeV when expressing the $B_s$-meson LCDAs in the Exponential model, consistent with previous QCD sum rule estimate yet exhibiting a 1.5-fold improvement in uncertainty. Furthermore, we compare the form factor predictions, based on the extracted $λ_{B_s}$ value, with earlier analyses for other channels such as $B_s \to D_s$ and $B_s \to K$.
△ Less
Submitted 3 July, 2024; v1 submitted 26 February, 2024;
originally announced February 2024.
-
Tarski's least fixed point theorem: A predicative type theoretic formulation
Authors:
Ian Ray
Abstract:
We provide a type theoretic treatment of the paper "On Tarski's fixed point theorem" by Giovanni Curi. There are benefits to having a type theoretic formulation apart from routine implementation in a proof assistant. By taking advantage of (higher) inductive types, we can avoid complicated set theoretic constructions. Arguably, this results in a presentation that is conceptually clearer. Additiona…
▽ More
We provide a type theoretic treatment of the paper "On Tarski's fixed point theorem" by Giovanni Curi. There are benefits to having a type theoretic formulation apart from routine implementation in a proof assistant. By taking advantage of (higher) inductive types, we can avoid complicated set theoretic constructions. Arguably, this results in a presentation that is conceptually clearer. Additionally, due the predicative admissibility of (higher) inductive types we take a step towards the "system independent" derivation that Curi calls for in his conclusion. Finally, we explore a condition on monotone maps that guarantees they are `generated' and give an alternative statement of the least fixed point theorem in terms of this condition.
△ Less
Submitted 19 February, 2024; v1 submitted 1 January, 2024;
originally announced January 2024.
-
Healthcare Policy Compliance: A Blockchain Smart Contract-Based Approach
Authors:
Md Al Amin,
Hemanth Tummala,
Seshamalini Mohan,
Indrajit Ray
Abstract:
This paper addresses the critical challenge of ensuring healthcare policy compliance in the context of Electronic Health Records (EHRs). Despite stringent regulations like HIPAA, significant gaps in policy compliance often remain undetected until a data breach occurs. To bridge this gap, we propose a novel blockchain-powered, smart contract-based access control model. This model is specifically de…
▽ More
This paper addresses the critical challenge of ensuring healthcare policy compliance in the context of Electronic Health Records (EHRs). Despite stringent regulations like HIPAA, significant gaps in policy compliance often remain undetected until a data breach occurs. To bridge this gap, we propose a novel blockchain-powered, smart contract-based access control model. This model is specifically designed to enforce patient-provider agreements (PPAs) and other relevant policies, thereby ensuring both policy compliance and provenance. Our approach integrates components of informed consent into PPAs, employing blockchain smart contracts to automate and secure policy enforcement. The authorization module utilizes these contracts to make informed access decisions, recording all actions in a transparent, immutable blockchain ledger. This system not only ensures that policies are rigorously applied but also maintains a verifiable record of all actions taken, thus facilitating an easy audit and proving compliance. We implement this model in a private Ethereum blockchain setup, focusing on maintaining the integrity and lineage of policies and ensuring that audit trails are accurately and securely recorded. The Proof of Compliance (PoC) consensus mechanism enables decentralized, independent auditor nodes to verify compliance status based on the audit trails recorded. Experimental evaluation demonstrates the effectiveness of the proposed model in a simulated healthcare environment. The results show that our approach not only strengthens policy compliance and provenance but also enhances the transparency and accountability of the entire process. In summary, this paper presents a comprehensive, blockchain-based solution to a longstanding problem in healthcare data management, offering a robust framework for ensuring policy compliance and provenance through smart contracts and blockchain technology.
△ Less
Submitted 15 December, 2023;
originally announced December 2023.
-
Cross-Silo Federated Learning Across Divergent Domains with Iterative Parameter Alignment
Authors:
Matt Gorbett,
Hossein Shirazi,
Indrakshi Ray
Abstract:
Learning from the collective knowledge of data dispersed across private sources can provide neural networks with enhanced generalization capabilities. Federated learning, a method for collaboratively training a machine learning model across remote clients, achieves this by combining client models via the orchestration of a central server. However, current approaches face two critical limitations:…
▽ More
Learning from the collective knowledge of data dispersed across private sources can provide neural networks with enhanced generalization capabilities. Federated learning, a method for collaboratively training a machine learning model across remote clients, achieves this by combining client models via the orchestration of a central server. However, current approaches face two critical limitations: i) they struggle to converge when client domains are sufficiently different, and ii) current aggregation techniques produce an identical global model for each client. In this work, we address these issues by reformulating the typical federated learning setup: rather than learning a single global model, we learn N models each optimized for a common objective. To achieve this, we apply a weighted distance minimization to model parameters shared in a peer-to-peer topology. The resulting framework, Iterative Parameter Alignment, applies naturally to the cross-silo setting, and has the following properties: (i) a unique solution for each participant, with the option to globally converge each model in the federation, and (ii) an optional early-stop** mechanism to elicit fairness among peers in collaborative learning settings. These characteristics jointly provide a flexible new framework for iteratively learning from peer models trained on disparate datasets. We find that the technique achieves competitive results on a variety of data partitions compared to state-of-the-art approaches. Further, we show that the method is robust to divergent domains (i.e. disjoint classes across peers) where existing approaches struggle.
△ Less
Submitted 17 May, 2024; v1 submitted 8 November, 2023;
originally announced November 2023.
-
Constraining inverse moment of $B$-meson distribution amplitude using Lattice QCD data
Authors:
Rusa Mandal,
Soumitra Nandi,
Ipsita Ray
Abstract:
We constrain the inverse moment of the $B$-meson light-cone distribution amplitude (LCDA), $λ_B$ in heavy quark effective theory, using form factor estimates from Lattice QCD collaboration. The estimation of the parameter $λ_B$ has, until now, relied solely on QCD sum rule methods and deals with significant uncertainty. In this work, we express the form factors for the $B \to K$ channel, calculate…
▽ More
We constrain the inverse moment of the $B$-meson light-cone distribution amplitude (LCDA), $λ_B$ in heavy quark effective theory, using form factor estimates from Lattice QCD collaboration. The estimation of the parameter $λ_B$ has, until now, relied solely on QCD sum rule methods and deals with significant uncertainty. In this work, we express the form factors for the $B \to K$ channel, calculated within the light-cone sum rule (LCSR) approach, in terms of the $B$-meson LCDAs. By incorporating recent Lattice results from the HPQCD collaboration for the $B \to K$ form factors at zero momentum transfer ($q^2$ = 0), we impose constraints on this parameter. Consequently, we achieve a twofold reduction in uncertainty compared to the QCD sum rule estimate, yielding $λ_B=338\pm 68$ MeV, when the $B$-meson LCDAs are expressed in the Exponential model. Additionally, we compare the form factor predictions, using the constrained $λ_B$ value, with the earlier analyses for other channels as well, such as $B\to π$ and $B \to D$.
△ Less
Submitted 20 November, 2023; v1 submitted 14 August, 2023;
originally announced August 2023.
-
Sparse Binary Transformers for Multivariate Time Series Modeling
Authors:
Matt Gorbett,
Hossein Shirazi,
Indrakshi Ray
Abstract:
Compressed Neural Networks have the potential to enable deep learning across new applications and smaller computational environments. However, understanding the range of learning tasks in which such models can succeed is not well studied. In this work, we apply sparse and binary-weighted Transformers to multivariate time series problems, showing that the lightweight models achieve accuracy compara…
▽ More
Compressed Neural Networks have the potential to enable deep learning across new applications and smaller computational environments. However, understanding the range of learning tasks in which such models can succeed is not well studied. In this work, we apply sparse and binary-weighted Transformers to multivariate time series problems, showing that the lightweight models achieve accuracy comparable to that of dense floating-point Transformers of the same structure. Our model achieves favorable results across three time series learning tasks: classification, anomaly detection, and single-step forecasting. Additionally, to reduce the computational complexity of the attention mechanism, we apply two modifications, which show little to no decline in model performance: 1) in the classification task, we apply a fixed mask to the query, key, and value activations, and 2) for forecasting and anomaly detection, which rely on predicting outputs at a single point in time, we propose an attention mask to allow computation only at the current time step. Together, each compression technique and attention modification substantially reduces the number of non-zero operations necessary in the Transformer. We measure the computational savings of our approach over a range of metrics including parameter count, bit size, and floating point operation (FLOPs) count, showing up to a 53x reduction in storage size and up to 10.5x reduction in FLOPs.
△ Less
Submitted 8 August, 2023;
originally announced August 2023.
-
Test of new physics effects in $\bar{B} \to (D^{(*)}, π) \ell^-\barν_{\ell}$ decays with heavy and light leptons
Authors:
Ipsita Ray,
Soumitra Nandi
Abstract:
We study the $\bar{B}\to D(D^*) \ell^-\barν_{\ell}$ decays based on the up-to-date available inputs from experiments and the lattice. First, we review the standard model (SM) predictions of the different observables associated with these decay channels. In the analyses, we consider new physics (NP) effects in the channels with the heavy ($τ$), as well as the light leptons ($μ, e$). We have extract…
▽ More
We study the $\bar{B}\to D(D^*) \ell^-\barν_{\ell}$ decays based on the up-to-date available inputs from experiments and the lattice. First, we review the standard model (SM) predictions of the different observables associated with these decay channels. In the analyses, we consider new physics (NP) effects in the channels with the heavy ($τ$), as well as the light leptons ($μ, e$). We have extracted $|V_{cb}|$ along with the new physics Wilson coefficients (WCs) from the available data on light leptons; the extracted value of $|V_{cb}|$ is $(40.3 \pm 0.5)\times 10^{-3}$. The extracted WCs are zero consistent, but some could be of order $10^{-2}$. Also, we have done the simultaneous analysis of the data in $\bar{B} \to D^{(*)}(μ^-,e^-)\barν$ alongside the inputs on $R(D^{(*)}) = \frac{Γ(\bar{B}\to D^{(*)}τ^-\barν_τ)}{Γ(\bar{B}\to D^{(*)}\ell^-\barν_{\ell})}$ and the $D^*$ longitudinal polarisation fraction $F_L^{D^*}$ in different NP scenarios and extracted $|V_{cb}|$ which is consistent with the number mentioned above. Also, the simultaneous explanation of $R(D^{(*)})$ and $F_L^{D^*}$ is not possible in the one-operator scenarios. However, the two operator scenarios with $\mathcal{O}_{S_2}^τ = (\bar{q}_R b_L)(\barτ_Rν_{τL})$ as one of the operators could explain all these three measurements. Finally, we have given predictions of all the related observables in $\bar{B} \to D^{(*)}(τ^-,μ^-,e^-)\barν$ decays in the NP scenarios, which could be tested in future experiments. We have repeated this exercise for $\bar{B} \to π\ell^-\barν_{\ell}$ decays with the light lepton and extracted $|V_{ub}|$ and the new WCs. Finally, using all these available data for the light and heavy leptons, we have given bounds on the couplings of the relevant SM effective field theory (SMEFT) operators and the probable NP scale $Λ$.
△ Less
Submitted 21 December, 2023; v1 submitted 19 May, 2023;
originally announced May 2023.
-
Extractions of $|V_{ub}|/|V_{cb}|$ from a combined study of the exclusive $b\to u(c) \ellν_{\ell}$ decays
Authors:
Aritra Biswas,
Soumitra Nandi,
Ipsita Ray
Abstract:
We have extracted the ratio $|V_{ub}|/|V_{cb}|$ from a combined study of the available inputs on $\bar{B}\to (π,ρ,ω)\ell^- \barν_{\ell}$ and $\bar{B}(\bar{B}_s)\to (D^{(\ast)}, D_s^{(\ast)})\ell^- \barν_{\ell}$ ($\ell = μ$ or $e$) decays. We have done our analysis with and without the inclusion of the available experimental results on the branching fraction…
▽ More
We have extracted the ratio $|V_{ub}|/|V_{cb}|$ from a combined study of the available inputs on $\bar{B}\to (π,ρ,ω)\ell^- \barν_{\ell}$ and $\bar{B}(\bar{B}_s)\to (D^{(\ast)}, D_s^{(\ast)})\ell^- \barν_{\ell}$ ($\ell = μ$ or $e$) decays. We have done our analysis with and without the inclusion of the available experimental results on the branching fraction $\mathcal{BR}(\bar{B}_s\to K^+μ^-\barν_μ)$ or the ratio of the rates $Γ(\bar{B}_s\to K^+ \ell^-\barν_{\ell})/ Γ(\bar{B}_s \to D_s^+ \ell^- \barν_{\ell})$. We have used all the available experimental data on the branching fractions in different $q^2$-bins, the available theory inputs on the form factors from lattice and the light cone sum rule (LCSR) approach; analysed the data in different possible scenarios and presented the results. From a combined analysis of all the $b\to c\ell^- \barν_{\ell}$ exclusive decays, we have obtained $|V_{cb}|=(40.5 \pm 0.6)\times 10^{-3}$ and from all the $b\to u\ell^- \barν_{\ell}$ modes, we obtain $|V_{ub}|=(3.46\pm 0.12)\times 10^{-3}$ which changes to $|V_{ub}|=(3.51 \pm 0.13)\times 10^{-3}$ after drop** $\mathcal{BR}(\bar{B}_s\to K^+μ^-\barν_μ)$. We hence report the values of the ratio $|V_{ub}|/|V_{cb}| = 0.085 \pm 0.003$ and $0.087 \pm 0.003$ with and without the input from $\bar{B}_s\to K^+μ^-\barν_μ$ modes, respectively. We have also predicted the ratio $Γ(\bar{B}_s\to K^+ \ell^-\barν_{\ell})/ Γ(\bar{B}_s \to D_s^+ \ell^- \barν_{\ell})$ using the fit results. In addition, we provide the predictions of $\mathcal{BR}(\bar{B}_s\to K^+μ^-\barν_μ)$ and $\mathcal{BR}(\bar{B}\to (ρ,ω)\ell^- \barν_{\ell})$ in the Standard Model (SM) in small $q^2$-bins.
△ Less
Submitted 24 June, 2023; v1 submitted 5 December, 2022;
originally announced December 2022.
-
Study of the $b \to d \ell\ell$ transitions in the Standard Model and test of New Physics sensitivities
Authors:
Aritra Biswas,
Soumitra Nandi,
Sunando Kumar Patra,
Ipsita Ray
Abstract:
After incorporating all the available experimental data and the most up-to-date Lattice and light cone sum rule (LCSR) inputs on the form factors, we analyze the exclusive $b\to u\ellν_{\ell}$ and $b\to d\ell \ell$ decays simultaneously. We have extracted the shape of all the associated form factors using which we provide predictions in the standard model for the branching ratios, direct CP asymme…
▽ More
After incorporating all the available experimental data and the most up-to-date Lattice and light cone sum rule (LCSR) inputs on the form factors, we analyze the exclusive $b\to u\ellν_{\ell}$ and $b\to d\ell \ell$ decays simultaneously. We have extracted the shape of all the associated form factors using which we provide predictions in the standard model for the branching ratios, direct CP asymmetries and isospin asymmetry for $B\toπ\ell \ell$ and various angular observables for $B\toρ\ell \ell$ transitions. Also, we have tested the sensitivities of these observables towards physics beyond the standard model (BSM).For the $B\toρ\ell \ell$ decays, we have defined tagged and untagged observables and predicted them in the SM and BSM. In the context of BSM, we have found some compelling information. The respective predictions in a few benchmark scenarios are given, which can be tested in the experiments at the LHCb and the Belle.
△ Less
Submitted 18 May, 2023; v1 submitted 30 August, 2022;
originally announced August 2022.
-
A closer look at the extraction of $|V_{ub}|$ from $B\toπlν$
Authors:
Aritra Biswas,
Soumitra Nandi,
Sunando Kumar Patra,
Ipsita Ray
Abstract:
To extract the Cabibbo-Kobayashi-Maskawa (CKM) matrix element $|V_{ub}|$, we have re-analyzed all the available inputs (data and theory) on the $B\toπlν$ decays including the newly available inputs on the form-factors from light cone sum rule (LCSR) approach. We have reproduced and compared the results with the procedure taken up by the Heavy Flavor Averaging Group (HFLAV), while commenting on the…
▽ More
To extract the Cabibbo-Kobayashi-Maskawa (CKM) matrix element $|V_{ub}|$, we have re-analyzed all the available inputs (data and theory) on the $B\toπlν$ decays including the newly available inputs on the form-factors from light cone sum rule (LCSR) approach. We have reproduced and compared the results with the procedure taken up by the Heavy Flavor Averaging Group (HFLAV), while commenting on the effect of outliers on the fits. After removing the outliers and creating a comparable group of data-sets, we mention a few scenarios in the extraction of $|V_{ub}|$. In all those scenarios, the extracted values of $|V_{ub}|$ are higher than that obtained by HFLAV. Our best results for $|V_{ub}|^{exc.}$ are $(3.88 \pm 0.13)\times 10^{-3}$ and $(3.87 \pm 0.13)\times 10^{-3}$ in frequentist and Bayesian approaches, respectively, which are consistent with that extracted from inclusive decays $|V_{ub}|^{inc}$ within $1~σ$ confidence interval.
△ Less
Submitted 22 June, 2021; v1 submitted 2 March, 2021;
originally announced March 2021.
-
New physics in $b\to s \ell\ell$ decays with complex Wilson coefficients
Authors:
Aritra Biswas,
Soumitra Nandi,
Ipsita Ray,
Sunando Kumar Patra
Abstract:
We perform a data-driven analysis of new physics (NP) effects in exclusive $b \to s \ell^+\ell^-$ decays in a model-independent effective theory approach with dimension six operators considering scalar, pseudo-scalar, vector and axial-vector operators with the corresponding Wilson coefficients (WC) taken to be complex. The analysis has been done with the most recent data while comparing the outcom…
▽ More
We perform a data-driven analysis of new physics (NP) effects in exclusive $b \to s \ell^+\ell^-$ decays in a model-independent effective theory approach with dimension six operators considering scalar, pseudo-scalar, vector and axial-vector operators with the corresponding Wilson coefficients (WC) taken to be complex. The analysis has been done with the most recent data while comparing the outcome with that from the relatively old data-set. We find that a left-handed quark current with vector muon coupling is the only one-operator $(\mathcal{O}_9)$ scenario that can explain the data in both the cases with real and complex WC with a large non-zero imaginary contribution. We simultaneously apply model selection tools like cross-validation and information-theoretic approach like Akaike Information Criterion (AIC) to find out the operator or sets of operators that can best explain the available data in this channel. The $\mathcal{O}_9$ with complex WC is the only one-operator scenario which survives the test. However, there are a few two and three-operator scenarios (with real or complex WCs) which survive the test, and the operator $\mathcal{O}_9$ is common among them.
△ Less
Submitted 29 June, 2021; v1 submitted 30 April, 2020;
originally announced April 2020.
-
Towards a Virtual Reality Home IoT Network Visualizer
Authors:
Drew Johnston,
Jarret Flack,
Indrakshi Ray,
Francisco R. Ortega
Abstract:
We present an IoT home network visualizer that utilizes virtual reality (VR). This prototype demonstrates the potential that VR has to aid in the understanding of home IoT networks. This is particularly important due the increased number of household devices now connected to the Internet. This prototype is able to function in a standard display or a VR headset. A prototype was developed to aid in…
▽ More
We present an IoT home network visualizer that utilizes virtual reality (VR). This prototype demonstrates the potential that VR has to aid in the understanding of home IoT networks. This is particularly important due the increased number of household devices now connected to the Internet. This prototype is able to function in a standard display or a VR headset. A prototype was developed to aid in the understanding of home IoT networks for homeowners.
△ Less
Submitted 17 January, 2020;
originally announced January 2020.
-
Systematization of Knowledge and Implementation: Short Identity-Based Signatures
Authors:
Diptendu M. Kar,
Indrajit Ray
Abstract:
Identity-Based signature schemes are gaining a lot of popularity every day. Over the last decade, there has been a lot of schemes that have been proposed. Several libraries are there that implement identity-based cryptosystems that include identity-based signature schemes like the JPBC library which is written in Java and the charm-crypto library written in python. However, these libraries do not…
▽ More
Identity-Based signature schemes are gaining a lot of popularity every day. Over the last decade, there has been a lot of schemes that have been proposed. Several libraries are there that implement identity-based cryptosystems that include identity-based signature schemes like the JPBC library which is written in Java and the charm-crypto library written in python. However, these libraries do not contain all of the popular schemes, rather the JPBC library contains only one identity-based signature scheme and the charm-crypto contains three. Furthermore, the implemented schemes are designed to work on one particular pairing curve. In pairing-based cryptosystems, even for a given signature scheme, the size of the signature and the performance i.e. the time to sign and verify depends on the chosen pairing curve. There are many applications in which the signature size is of more importance than the performance and similarly other applications where the performance is of more importance than signature size. In this work, we describe the popular signature schemes and their implementation using the JPBC library and describe how different pairing curves affect the signature size and performance. We also provide two methods to further shorten the signature size which is not present in the libraries by default.
△ Less
Submitted 14 August, 2019;
originally announced August 2019.
-
Enterprise Cyber Resiliency Against Lateral Movement: A Graph Theoretic Approach
Authors:
Pin-Yu Chen,
Sutanay Choudhury,
Luke Rodriguez,
Alfred Hero,
Indrajit Ray
Abstract:
Lateral movement attacks are a serious threat to enterprise security. In these attacks, an attacker compromises a trusted user account to get a foothold into the enterprise network and uses it to attack other trusted users, increasingly gaining higher and higher privileges. Such lateral attacks are very hard to model because of the unwitting role that users play in the attack and even harder to de…
▽ More
Lateral movement attacks are a serious threat to enterprise security. In these attacks, an attacker compromises a trusted user account to get a foothold into the enterprise network and uses it to attack other trusted users, increasingly gaining higher and higher privileges. Such lateral attacks are very hard to model because of the unwitting role that users play in the attack and even harder to detect and prevent because of their low and slow nature. In this paper, a theoretical framework is presented for modeling lateral movement attacks and for proposing a methodology for designing resilient cyber systems against such attacks. The enterprise is modeled as a tripartite graph capturing the interaction between users, machines, and applications, and a set of procedures is proposed to harden the network by increasing the cost of lateral movement. Strong theoretical guarantees on system resilience are established and experimentally validated for large enterprise networks.
△ Less
Submitted 2 May, 2019;
originally announced May 2019.
-
IoTSense: Behavioral Fingerprinting of IoT Devices
Authors:
Bruhadeshwar Bezawada,
Maalvika Bachani,
Jordan Peterson,
Hossein Shirazi,
Indrakshi Ray,
Indrajit Ray
Abstract:
The Internet-of-Things (IoT) has brought in new challenges in, device identification --what the device is, and, authentication --is the device the one it claims to be. Traditionally, the authentication problem is solved by means of a cryptographic protocol. However, the computational complexity of cryptographic protocols and/or scalability problems related to key management, render almost all cryp…
▽ More
The Internet-of-Things (IoT) has brought in new challenges in, device identification --what the device is, and, authentication --is the device the one it claims to be. Traditionally, the authentication problem is solved by means of a cryptographic protocol. However, the computational complexity of cryptographic protocols and/or scalability problems related to key management, render almost all cryptography based authentication protocols impractical for IoT. The problem of device identification is, on the other hand, sadly neglected. We believe that device fingerprinting can be used to solve both these problems effectively. In this work, we present a methodology to perform device behavioral fingerprinting that can be employed to undertake device type identification. A device behavior is approximated using features extracted from the network traffic of the device. These features are used to train a machine learning model that can be used to detect similar device types. We validate our approach using five-fold cross validation; we report a identification rate of 86-99% and a mean accuracy of 99%, across all our experiments. Our approach is successful even when a device uses encrypted communication. Furthermore, we show preliminary results for fingerprinting device categories, i.e., identifying different device types having similar functionality.
△ Less
Submitted 11 April, 2018;
originally announced April 2018.
-
Scalable Nonlinear AUC Maximization Methods
Authors:
Majdi Khalid,
Indrakshi Ray,
Hamidreza Chitsaz
Abstract:
The area under the ROC curve (AUC) is a measure of interest in various machine learning and data mining applications. It has been widely used to evaluate classification performance on heavily imbalanced data. The kernelized AUC maximization machines have established a superior generalization ability compared to linear AUC machines because of their capability in modeling the complex nonlinear struc…
▽ More
The area under the ROC curve (AUC) is a measure of interest in various machine learning and data mining applications. It has been widely used to evaluate classification performance on heavily imbalanced data. The kernelized AUC maximization machines have established a superior generalization ability compared to linear AUC machines because of their capability in modeling the complex nonlinear structure underlying most real-world data. However, the high training complexity renders the kernelized AUC machines infeasible for large-scale data. In this paper, we present two nonlinear AUC maximization algorithms that optimize pairwise linear classifiers over a finite-dimensional feature space constructed via the k-means Nyström method. Our first algorithm maximize the AUC metric by optimizing a pairwise squared hinge loss function using the truncated Newton method. However, the second-order batch AUC maximization method becomes expensive to optimize for extremely massive datasets. This motivate us to develop a first-order stochastic AUC maximization algorithm that incorporates a scheduled regularization update and scheduled averaging techniques to accelerate the convergence of the classifier. Experiments on several benchmark datasets demonstrate that the proposed AUC classifiers are more efficient than kernelized AUC machines while they are able to surpass or at least match the AUC performance of the kernelized AUC machines. The experiments also show that the proposed stochastic AUC classifier outperforms the state-of-the-art online AUC maximization methods in terms of AUC classification accuracy.
△ Less
Submitted 29 April, 2019; v1 submitted 2 October, 2017;
originally announced October 2017.
-
Shape coexistence in 153Ho
Authors:
Dibyadyuti Pramanik,
S. Sarkar,
M. Saha Sarkar,
Abhijit Bisoi,
Sudatta Ray,
Shin**ee Dasgupta,
A. Chakraborty,
Krishichayan,
Ritesh Kshetri,
Indrani Ray,
S. Ganguly,
M. K. Pradhan,
M. Ray Basu,
R. Raut,
G. Ganguly,
S. S. Ghugre,
A. K. Sinha,
S. K. Basu,
S. Bhattacharya,
A. Mukherjee,
P. Banerjee,
A. Goswami
Abstract:
The high-spin states in 153Ho, have been studied by 139 57 La(20Ne, 6n) reaction at a projectile energy of 139 MeV at Variable Energy Cyclotron Centre (VECC), Kolkata, India, utilizing an earlier campaign of Indian National Gamma Array (INGA) setup. Data from gamma-gamma coincidence, directional correlation and polarization measurements have been analyzed to assign and confirm the spins and pariti…
▽ More
The high-spin states in 153Ho, have been studied by 139 57 La(20Ne, 6n) reaction at a projectile energy of 139 MeV at Variable Energy Cyclotron Centre (VECC), Kolkata, India, utilizing an earlier campaign of Indian National Gamma Array (INGA) setup. Data from gamma-gamma coincidence, directional correlation and polarization measurements have been analyzed to assign and confirm the spins and parities of the levels. We have suggested a few additions and revisions of the reported level scheme of 153Ho. The RF-gamma time difference spectra have been useful to confirm the half-life of an isomer in this nucleus. From the comparison of experimental and theoretical results, it is found that there are definite indications of shape coexistence in this nucleus. The experimental and calculated lifetimes of several isomers have been compared to follow the coexistence and evolution of shape with increasing spin.
△ Less
Submitted 23 July, 2016;
originally announced July 2016.
-
Confidence-Weighted Bipartite Ranking
Authors:
Majdi Khalid,
Indrakshi Ray,
Hamidreza Chitsaz
Abstract:
Bipartite ranking is a fundamental machine learning and data mining problem. It commonly concerns the maximization of the AUC metric. Recently, a number of studies have proposed online bipartite ranking algorithms to learn from massive streams of class-imbalanced data. These methods suggest both linear and kernel-based bipartite ranking algorithms based on first and second-order online learning. U…
▽ More
Bipartite ranking is a fundamental machine learning and data mining problem. It commonly concerns the maximization of the AUC metric. Recently, a number of studies have proposed online bipartite ranking algorithms to learn from massive streams of class-imbalanced data. These methods suggest both linear and kernel-based bipartite ranking algorithms based on first and second-order online learning. Unlike kernelized ranker, linear ranker is more scalable learning algorithm. The existing linear online bipartite ranking algorithms lack either handling non-separable data or constructing adaptive large margin. These limitations yield unreliable bipartite ranking performance. In this work, we propose a linear online confidence-weighted bipartite ranking algorithm (CBR) that adopts soft confidence-weighted learning. The proposed algorithm leverages the same properties of soft confidence-weighted learning in a framework for bipartite ranking. We also develop a diagonal variation of the proposed confidence-weighted bipartite ranking algorithm to deal with high-dimensional data by maintaining only the diagonal elements of the covariance matrix. We empirically evaluate the effectiveness of the proposed algorithms on several benchmark and high-dimensional datasets. The experimental results validate the reliability of the proposed algorithms. The results also show that our algorithms outperform or are at least comparable to the competing online AUC maximization methods.
△ Less
Submitted 10 March, 2019; v1 submitted 4 July, 2016;
originally announced July 2016.
-
An above-barrier narrow resonance in $^{15}$F
Authors:
F. De Grancey,
A. Mercenne,
F. de Oliveira Santos,
T. Davinson,
O. Sorlin,
J. C. Angélique,
M. Assié,
E. Berthoumieux,
R. Borcea,
A. Buta,
I. Celikovic,
V. Chudoba,
J. M. Daugas,
G. Dumitru,
M. Fadil,
S. Grévy,
J. Kiener,
A. Lefebvre-Schuhl,
N. Michel,
J. Mrazek,
F. Negoita,
J. Okolowicz,
D. Pantelica,
M. G. Pellegriti,
L. Perrot
, et al. (15 additional authors not shown)
Abstract:
Intense and purified radioactive beam of post-accelerated $^{14}$O was used to study the low-lying states in the unbound $^{15}$F nucleus. Exploiting resonant elastic scattering in inverse kinematics with a thick target, the second excited state, a resonance at E$\_R$=4.757(6)(10)~MeV with a width of $Γ$=36(5)(14)~keV was measured for the first time with high precision. The structure of this narro…
▽ More
Intense and purified radioactive beam of post-accelerated $^{14}$O was used to study the low-lying states in the unbound $^{15}$F nucleus. Exploiting resonant elastic scattering in inverse kinematics with a thick target, the second excited state, a resonance at E$\_R$=4.757(6)(10)~MeV with a width of $Γ$=36(5)(14)~keV was measured for the first time with high precision. The structure of this narrow above-barrier state in a nucleus located two neutrons beyond the proton drip line was investigated using the Gamow Shell Model in the coupled channel representation with a $^{12}$C core and three valence protons. It is found that it is an almost pure wave function of two quasi-bound protons in the $2s\_{1/2}$ shell.
△ Less
Submitted 1 March, 2016;
originally announced March 2016.
-
Probing Nuclear forces beyond the drip-line using the mirror nuclei $^{16}$N and $^{16}$F
Authors:
I. Stefan,
F. de Oliveira Santos,
O. Sorlin,
T. Davinson,
M. Lewitowicz,
G. Dumitru,
J. C. Angélique,
M. Angélique,
E. Berthoumieux,
C. Borcea,
R. Borcea,
A. Buta,
J. M. Daugas,
F. De Grancey,
M. Fadil,
S. Grévy,
J. Kiener,
A. Lefebvre-Schuhl,
M. Lenhardt,
J. Mrazek,
F. Negoita,
D. Pantelica,
M. G. Pellegriti,
L. Perrot,
M. Ploszajczak
, et al. (7 additional authors not shown)
Abstract:
Radioactive beams of $^{14}$O and $^{15}$O were used to populate the resonant states 1/2$^+$, 5/2$^+$ and $0^-,1^-,2^-$ in the unbound $^{15}$F and $^{16}$F nuclei respectively by means of proton elastic scattering reactions in inverse kinematics. Based on their large proton spectroscopic factor values, the resonant states in $^{16}$F can be viewed as a core of $^{14}$O plus a proton in the 2s…
▽ More
Radioactive beams of $^{14}$O and $^{15}$O were used to populate the resonant states 1/2$^+$, 5/2$^+$ and $0^-,1^-,2^-$ in the unbound $^{15}$F and $^{16}$F nuclei respectively by means of proton elastic scattering reactions in inverse kinematics. Based on their large proton spectroscopic factor values, the resonant states in $^{16}$F can be viewed as a core of $^{14}$O plus a proton in the 2s$_{1/2}$ or 1d$_{5/2}$ shell and a neutron in 1p$_{1/2}$. Experimental energies were used to derive the strength of the 2s$_{1/2}$-1p$_{1/2}$ and 1d$_{5/2}$-1p$_{1/2}$ proton-neutron interactions. It is found that the former changes by 40% compared with the mirror nucleus $^{16}$N, and the second by 10%. This apparent symmetry breaking of the nuclear force between mirror nuclei finds explanation in the role of the large coupling to the continuum for the states built on an $\ell=0$ proton configuration.
△ Less
Submitted 13 June, 2014;
originally announced June 2014.
-
Towards a Networks-of-Networks Framework for Cyber Security
Authors:
Mahantesh Halappanavar,
Sutanay Choudhury,
Emilie Hogan,
Peter Hui,
John R. Johnson,
Indrajit Ray,
Lawrence Holder
Abstract:
Networks-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in thi…
▽ More
Networks-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in this position paper we build towards a three-layered NoN model for an enterprise cyber system. Each layer captures a different facet of a cyber system. We present in-depth discussion for four major graph- theoretic applications to demonstrate how the three-layered NoN model can be leveraged for continuous system monitoring and mission assurance.
△ Less
Submitted 24 April, 2013;
originally announced April 2013.
-
New pathway to bypass the 15O waiting point
Authors:
I. Stefan,
F. de Oliveira Santos,
M. G. Pellegriti,
G. Dumitru,
J. C. Angélique,
M. Angélique,
E. Berthoumieux,
A. Buta,
R. Borcea,
A. Coc,
J. M. Daugas,
T. Davinson,
M. Fadil,
S. Grévy,
J. Kiener,
A. Lefebvre-Schuhl,
M. Lenhardt,
M. Lewitowicz,
F. Negoita,
D. Pantelica,
L. Perrot,
O. Roig,
M. G. Saint Laurent,
I. Ray,
O. Sorlin
, et al. (4 additional authors not shown)
Abstract:
We propose the sequential reaction process $^{15}$O($p$,$γ)(β^{+}$)$^{16}$O as a new pathway to bypass of the $^{15}$O waiting point. This exotic reaction is found to have a surprisingly high cross section, approximately 10$^{10}$ times higher than the $^{15}$O($p$,$β^{+}$)$^{16}$O. These cross sections were calculated after precise measurements of energies and widths of the proton-unbound…
▽ More
We propose the sequential reaction process $^{15}$O($p$,$γ)(β^{+}$)$^{16}$O as a new pathway to bypass of the $^{15}$O waiting point. This exotic reaction is found to have a surprisingly high cross section, approximately 10$^{10}$ times higher than the $^{15}$O($p$,$β^{+}$)$^{16}$O. These cross sections were calculated after precise measurements of energies and widths of the proton-unbound $^{16}$F low lying states, obtained using the H($^{15}$O,p)$^{15}$O reaction. The large $(p,γ)(β^{+})$ cross section can be understood to arise from the more efficient feeding of the low energy wing of the ground state resonance by the gamma decay. The implications of the new reaction in novae explosions and X-ray bursts are discussed.
△ Less
Submitted 14 April, 2006; v1 submitted 22 March, 2006;
originally announced March 2006.
-
Absence of M2 Retardation in $^{35}Cl$: Evidence for Stronger Isospin-Mixing Effects in A=35 Mirror Nuclei
Authors:
Ritesh Kshetri,
Indrani Ray,
P. Banerjee,
R. Raut,
A. Goswami,
J. M. Chatterjee,
S. Chattopadhyay,
U. Datta Pramanik,
A. Mukherjee,
C. C. Dey,
S. Bhattacharya,
B. Dasmahapatra,
M. Saha Sarkar,
S. Sarkar,
S. Bhowal,
G. Ganguly,
K. S. Golda,
R. Kumar,
R. P. Singh,
S. Muralithar,
P. V. Madhusudhana Rao,
N. Madhavan,
J. J. Das,
S. Nath,
P. Sugathan
, et al. (5 additional authors not shown)
Abstract:
The lifetime of the 3163 keV, 7/2$^-$ isomeric state in $^{35}Cl$ that decays by a stretched M2 transition to the $3/2^+$ ground state, has been re-measured using the Doppler Shift Attenuation Method, by gating on the 1185 keV transition which directly feeds this state. This eliminates the uncertainties in the measurement arising from the direct feedings from the continuum. A mean life of 0.6…
▽ More
The lifetime of the 3163 keV, 7/2$^-$ isomeric state in $^{35}Cl$ that decays by a stretched M2 transition to the $3/2^+$ ground state, has been re-measured using the Doppler Shift Attenuation Method, by gating on the 1185 keV transition which directly feeds this state. This eliminates the uncertainties in the measurement arising from the direct feedings from the continuum. A mean life of 0.6$^{+0.5}_{-0.2}$ ps has been obtained from the present work. This is considerably smaller than the adopted value 45.3(6) ps. Implication of this major reduction in the lifetime has been pointed out.
△ Less
Submitted 13 July, 2005;
originally announced July 2005.