Skip to main content

Showing 51–100 of 196 results for author: Wagner, D

.
  1. arXiv:2206.03400  [pdf, ps, other

    eess.AS cs.CL cs.SD

    The Influence of Dataset Partitioning on Dysfluency Detection Systems

    Authors: Sebastian P. Bayerl, Dominik Wagner, Elmar Nöth, Tobias Bocklet, Korbinian Riedhammer

    Abstract: This paper empirically investigates the influence of different data splits and splitting strategies on the performance of dysfluency detection systems. For this, we perform experiments using wav2vec 2.0 models with a classification head as well as support vector machines (SVM) in conjunction with the features extracted from the wav2vec 2.0 model to detect dysfluencies. We train and evaluate the sy… ▽ More

    Submitted 7 June, 2022; originally announced June 2022.

    Comments: Accepted at the 25th International Conference on Text, Speech and Dialogue (TSD 2022)

  2. arXiv:2205.14017  [pdf, other

    cs.CR cs.AR

    BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption

    Authors: Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer

    Abstract: Fully Homomorphic Encryption (FHE) allows for secure computation on encrypted data. Unfortunately, huge memory size, computational cost and bandwidth requirements limit its practicality. We present BASALISC, an architecture family of hardware accelerators that aims to substantially accelerate FHE computations in the cloud. BASALISC is the first to implement the BGV scheme with fully-packed bootstr… ▽ More

    Submitted 25 July, 2023; v1 submitted 27 May, 2022; originally announced May 2022.

  3. arXiv:2205.13202  [pdf, other

    cs.DS cs.LG

    More Recent Advances in (Hyper)Graph Partitioning

    Authors: Ümit V. Çatalyürek, Karen D. Devine, Marcelo Fonseca Faraj, Lars Gottesbüren, Tobias Heuer, Henning Meyerhenke, Peter Sanders, Sebastian Schlag, Christian Schulz, Daniel Seemaier, Dorothea Wagner

    Abstract: In recent years, significant advances have been made in the design and evaluation of balanced (hyper)graph partitioning algorithms. We survey trends of the last decade in practical algorithms for balanced (hyper)graph partitioning together with future research directions. Our work serves as an update to a previous survey on the topic. In particular, the survey extends the previous survey by also c… ▽ More

    Submitted 30 June, 2022; v1 submitted 26 May, 2022; originally announced May 2022.

  4. arXiv:2204.03428  [pdf, other

    eess.AS cs.CL cs.SD

    Detecting Vocal Fatigue with Neural Embeddings

    Authors: Sebastian P. Bayerl, Dominik Wagner, Ilja Baumann, Korbinian Riedhammer, Tobias Bocklet

    Abstract: Vocal fatigue refers to the feeling of tiredness and weakness of voice due to extended utilization. This paper investigates the effectiveness of neural embeddings for the detection of vocal fatigue. We compare x-vectors, ECAPA-TDNN, and wav2vec 2.0 embeddings on a corpus of academic spoken English. Low-dimensional map**s of the data reveal that neural embeddings capture information about the cha… ▽ More

    Submitted 17 January, 2023; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: Accepted for Publication in the Journal of Voice

  5. Detecting Dysfluencies in Stuttering Therapy Using wav2vec 2.0

    Authors: Sebastian P. Bayerl, Dominik Wagner, Elmar Nöth, Korbinian Riedhammer

    Abstract: Stuttering is a varied speech disorder that harms an individual's communication ability. Persons who stutter (PWS) often use speech therapy to cope with their condition. Improving speech recognition systems for people with such non-typical speech or tracking the effectiveness of speech therapy would require systems that can detect dysfluencies while at the same time being able to detect speech tec… ▽ More

    Submitted 16 June, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: Accepted at Interspeech 2022

  6. Pseudo-gauges and relativistic spin hydrodynamics for interacting Dirac and Proca fields

    Authors: Nora Weickgenannt, David Wagner, Enrico Speranza

    Abstract: We present the explicit expressions of different pseudo-gauge transformations for Dirac and Proca fields considering a general interaction term. The particular case of the interaction of Dirac and Proca fields with a background electromagnetic field is also studied. Starting from the quantum kinetic theory with collisions derived from the Wigner-function formalism for massive spin-1/2 and spin-1 p… ▽ More

    Submitted 21 July, 2022; v1 submitted 4 April, 2022; originally announced April 2022.

    Comments: 21 pages, no figures

  7. arXiv:2203.12608  [pdf, ps, other

    nucl-th physics.flu-dyn

    Inverse-Reynolds-Dominance approach to transient fluid dynamics

    Authors: David Wagner, Andrea Palermo, Victor E. Ambruş

    Abstract: We consider the evolution equations for the bulk viscous pressure, diffusion current and shear tensor derived within second-order relativistic dissipative hydrodynamics from kinetic theory. By matching the higher order moments directly to the dissipative quantities, all terms which are of second order in the Knudsen number Kn vanish, leaving only terms of order… ▽ More

    Submitted 18 July, 2022; v1 submitted 23 March, 2022; originally announced March 2022.

    Comments: 16 pages. Matches accepted version

  8. arXiv:2203.04766  [pdf, other

    nucl-th hep-ph hep-th

    Relativistic second-order dissipative spin hydrodynamics from the method of moments

    Authors: Nora Weickgenannt, David Wagner, Enrico Speranza, Dirk Rischke

    Abstract: We derive relativistic second-order dissipative fluid-dynamical equations of motion for massive spin-1/2 particles from kinetic theory using the method of moments. Besides the usual conservation laws for charge, energy, and momentum, such a theory of relativistic dissipative spin hydrodynamics features an equation of motion for the rank-3 spin tensor, which follows from the conservation of total a… ▽ More

    Submitted 25 October, 2022; v1 submitted 9 March, 2022; originally announced March 2022.

    Comments: 30 pages, 1 figure

  9. arXiv:2201.04351  [pdf, other

    cs.CR

    Diffix Elm: Simple Diffix

    Authors: Paul Francis, Sebastian Probst-Eide, David Wagner, Felix Bauer, Cristian Berneanu, Edon Gashi

    Abstract: Historically, strong data anonymization requires substantial domain expertise and custom design for the given data set and use case. Diffix is an anonymization framework designed to make strong data anonymization available to non-experts. This paper describes Diffix Elm, a version of Diffix that is very easy to use at the expense of query features. We describe Diffix Elm, and show that it provides… ▽ More

    Submitted 20 June, 2022; v1 submitted 12 January, 2022; originally announced January 2022.

  10. arXiv:2112.12750  [pdf, other

    cs.CV

    SLIP: Self-supervision meets Language-Image Pre-training

    Authors: Norman Mu, Alexander Kirillov, David Wagner, Saining Xie

    Abstract: Recent work has shown that self-supervised pre-training leads to improvements over supervised learning on challenging visual recognition tasks. CLIP, an exciting new approach to learning with language supervision, demonstrates promising performance on a wide variety of benchmarks. In this work, we explore whether self-supervised learning can aid in the use of language supervision for visual repres… ▽ More

    Submitted 23 December, 2021; originally announced December 2021.

    Comments: Code: https://github.com/facebookresearch/SLIP

  11. arXiv:2111.00487  [pdf, other

    cs.CV cs.LG

    Smart(Sampling)Augment: Optimal and Efficient Data Augmentation for Semantic Segmentation

    Authors: Misgana Negassi, Diane Wagner, Alexander Reiterer

    Abstract: Data augmentation methods enrich datasets with augmented data to improve the performance of neural networks. Recently, automated data augmentation methods have emerged, which automatically design augmentation strategies. Existing work focuses on image classification and object detection, whereas we provide the first study on semantic image segmentation and introduce two new approaches: \textit{Sma… ▽ More

    Submitted 31 October, 2021; originally announced November 2021.

    Comments: Negassi and Wagner provided an equal contribution

  12. arXiv:2105.13442  [pdf, other

    cs.CR

    Hopper: Modeling and Detecting Lateral Movement (Extended Report)

    Authors: Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner

    Abstract: In successful enterprise attacks, adversaries often need to gain access to additional machines beyond their initial point of compromise, a set of internal movements known as lateral movement. We present Hopper, a system for detecting lateral movement based on commonly available enterprise logs. Hopper constructs a graph of login activity among internal machines and then identifies suspicious seque… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

    Comments: Usenix Security Symposium 2021

  13. arXiv:2105.12250  [pdf, ps, other

    math.OA

    Approximately Multiplicative Decompositions of Nuclear Maps

    Authors: Douglas A. Wagner

    Abstract: We expand upon work from many hands on the decomposition of nuclear maps. Such maps can be characterized by their ability to be approximately written as the composition of maps to and from matrices. Under certain conditions (such as quasidiagonality), we can find a decomposition whose maps behave nicely, by preserving multiplication up to an arbitrary degree of accuracy and being constructed from… ▽ More

    Submitted 25 May, 2021; originally announced May 2021.

    Comments: 9 pages, 0 figures

    MSC Class: 46L05 (Primary) 46L45; 46B28 (Secondary)

  14. Learning Security Classifiers with Verified Global Robustness Properties

    Authors: Yizheng Chen, Shiqi Wang, Yue Qin, Xiao**g Liao, Suman Jana, David Wagner

    Abstract: Many recent works have proposed methods to train classifiers with local robustness properties, which can provably eliminate classes of evasion attacks for most inputs, but not all inputs. Since data distribution shift is very common in security applications, e.g., often observed for malware detection, local robustness cannot guarantee that the property holds for unseen inputs at the time of deploy… ▽ More

    Submitted 1 December, 2021; v1 submitted 24 May, 2021; originally announced May 2021.

    Comments: ACM Conference on Computer and Communications Security (CCS) 2021 Best Paper Award Runner-Up

  15. arXiv:2105.08714  [pdf, other

    cs.LG cs.CR cs.CV

    Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks

    Authors: Dequan Wang, An Ju, Evan Shelhamer, David Wagner, Trevor Darrell

    Abstract: Adversarial attacks optimize against models to defeat defenses. Existing defenses are static, and stay the same once trained, even while attacks change. We argue that models should fight back, and optimize their defenses against attacks at test time. We propose dynamic defenses, to adapt the model and input during testing, by defensive entropy minimization (dent). Dent alters testing, but not trai… ▽ More

    Submitted 18 May, 2021; originally announced May 2021.

  16. arXiv:2104.14175  [pdf, other

    cs.LO

    Initial Limit Datalog: a New Extensible Class of Decidable Constrained Horn Clauses

    Authors: Toby Cathcart Burn, Luke Ong, Steven Ramsay, Dominik Wagner

    Abstract: We present initial limit Datalog, a new extensible class of constrained Horn clauses for which the satisfiability problem is decidable. The class may be viewed as a generalisation to higher-order logic (with a simple restriction on types) of the first-order language limit Datalog$_Z$ (a fragment of Datalog modulo linear integer arithmetic), but can be instantiated with any suitable background theo… ▽ More

    Submitted 29 April, 2021; originally announced April 2021.

    Comments: 18 pages. To be published in LICS 2021

  17. arXiv:2104.10752  [pdf, ps, other

    eess.SY

    A Concise Guide on the Integration of Battery Electric Buses into Urban Bus Networks

    Authors: Nicolas Dirks, Dennis Wagner, Maximilian Schiffer, Grit Walther

    Abstract: With the increasing market penetration of battery-electric buses into urban bus networks, practitioners face many novel planning problems. As a result, the interest in optimization-based decision-making for these planning problems increases but practitioners' requirements on planning solutions and current academic approaches often diverge. Against this background, this survey aims to provide a con… ▽ More

    Submitted 21 April, 2021; originally announced April 2021.

    Comments: 24 pages, 8 figures, 11 tables

  18. arXiv:2103.10359  [pdf, other

    cs.DS

    Nearest-Neighbor Queries in Customizable Contraction Hierarchies and Applications

    Authors: Valentin Buchhold, Dorothea Wagner

    Abstract: Customizable contraction hierarchies are one of the most popular route planning frameworks in practice, due to their simplicity and versatility. In this work, we present a novel algorithm for finding k-nearest neighbors in customizable contraction hierarchies by systematically exploring the associated separator decomposition tree. Compared to previous bucket-based approaches, our algorithm require… ▽ More

    Submitted 18 March, 2021; originally announced March 2021.

    Comments: Will be presented at the 19th International Symposium on Experimental Algorithms (SEA'21)

  19. arXiv:2103.00663  [pdf, other

    cs.CV

    Model-Agnostic Defense for Lane Detection against Adversarial Attack

    Authors: Henry Xu, An Ju, David Wagner

    Abstract: Susceptibility of neural networks to adversarial attack prompts serious safety concerns for lane detection efforts, a domain where such models have been widely applied. Recent work on adversarial road patches have successfully induced perception of lane lines with arbitrary form, presenting an avenue for rogue control of vehicle behavior. In this paper, we propose a modular lane verification syste… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

    Comments: 6 pages, 6 figures, 3 tables. Part of AutoSec 2021 proceedings

  20. Modeling and Engineering Constrained Shortest Path Algorithms for Battery Electric Vehicles

    Authors: Moritz Baum, Julian Dibbelt, Dorothea Wagner, Tobias Zündorf

    Abstract: We study the problem of computing constrained shortest paths for battery electric vehicles. Since battery capacities are limited, fastest routes are often infeasible. Instead, users are interested in fast routes on which the energy consumption does not exceed the battery capacity. For that, drivers can deliberately reduce speed to save energy. Hence, route planning should provide both path and spe… ▽ More

    Submitted 20 November, 2020; originally announced November 2020.

    Journal ref: In Transportation Science volume 54(6), pages 1571-1600, 2020

  21. arXiv:2011.09719  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams

    Authors: Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David Wagner

    Abstract: Adversarial examples are a widely studied phenomenon in machine learning models. While most of the attention has been focused on neural networks, other practical models also suffer from this issue. In this work, we propose an algorithm for evaluating the adversarial robustness of $k$-nearest neighbor classification, i.e., finding a minimum-norm adversarial example. Diverging from previous proposal… ▽ More

    Submitted 1 November, 2021; v1 submitted 19 November, 2020; originally announced November 2020.

    Comments: Appears at NeurIPS 2021. Code is available at https://github.com/wagner-group/geoadex

  22. Spectroscopic orbit determination of the long-periodic binary system $θ$ Cep

    Authors: R. Bischoff, M. Mugrauer, O. Lux, T. Zehe, T. Heyne, D. Wagner, M. Geymeier

    Abstract: In 2015 a radial velocity monitoring campaign was started in order to redetermine and/or constrain the orbital solutions of spectroscopic binary systems. The observations were carried out at the University Observatory Jena with the Échelle spectrograph FLECHAS. The results from the main part of our target sample are already published. For the final target of this campaign, $θ$ Cep, we can now pres… ▽ More

    Submitted 10 November, 2020; originally announced November 2020.

    Comments: 8 pages, 2 figures, 4 tables, accepted for publication in AN

  23. arXiv:2011.02601  [pdf, ps, other

    cs.DS

    Fast, Exact and Scalable Dynamic Ridesharing

    Authors: Valentin Buchhold, Peter Sanders, Dorothea Wagner

    Abstract: We study the problem of servicing a set of ride requests by dispatching a set of shared vehicles, which is faced by ridesharing companies such as Uber and Lyft. Solving this problem at a large scale might be crucial in the future for effectively using large fleets of autonomous vehicles. Since finding a solution for the entire set of requests that minimizes the total driving time is NP-complete, m… ▽ More

    Submitted 17 June, 2021; v1 submitted 4 November, 2020; originally announced November 2020.

    Comments: Previous version augmented in several ways

  24. arXiv:2010.13117  [pdf, other

    cs.LG cs.AI

    Hyperparameter Transfer Across Developer Adjustments

    Authors: Danny Stoll, Jörg K. H. Franke, Diane Wagner, Simon Selg, Frank Hutter

    Abstract: After developer adjustments to a machine learning (ML) algorithm, how can the results of an old hyperparameter optimization (HPO) automatically be used to speedup a new HPO? This question poses a challenging problem, as developer adjustments can change which hyperparameter settings perform well, or even the hyperparameter search space itself. While many approaches exist that leverage knowledge obt… ▽ More

    Submitted 25 October, 2020; originally announced October 2020.

  25. The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic

    Authors: Anja Feldmann, Oliver Gasser, Franziska Lichtblau, Enric Pujol, Ingmar Poese, Christoph Dietzel, Daniel Wagner, Matthias Wichtlhuber, Juan Tapiador, Narseo Vallina-Rodriguez, Oliver Hohlfeld, Georgios Smaragdakis

    Abstract: Due to the COVID-19 pandemic, many governments imposed lock downs that forced hundreds of millions of citizens to stay at home. The implementation of confinement measures increased Internet traffic demands of residential users, in particular, for remote working, entertainment, commerce, and education, which, as a result, caused traffic shifts in the Internet core. In this paper, using data from a… ▽ More

    Submitted 5 October, 2020; v1 submitted 25 August, 2020; originally announced August 2020.

    Journal ref: Proceedings of the 2020 Internet Measurement Conference (IMC '20)

  26. arXiv:2007.14030  [pdf, other

    cs.CR cs.SI

    A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts

    Authors: Neil Shah, Grant Ho, Marco Schweighauser, M. H. Afifi, Asaf Cidon, David Wagner

    Abstract: We present a large-scale characterization of attacker activity across 111 real-world enterprise organizations. We develop a novel forensic technique for distinguishing between attacker activity and benign activity in compromised enterprise accounts that yields few false positives and enables us to perform fine-grained analysis of attacker behavior. Applying our methods to a set of 159 compromised… ▽ More

    Submitted 28 July, 2020; originally announced July 2020.

    Comments: Extended report of workshop paper presented at the 1st MLHat Workshop (MLHat Security and ML 2020). KDD, 2020

  27. arXiv:2006.11374  [pdf

    cs.CV cs.LG stat.ML

    Bombus Species Image Classification

    Authors: Venkat Margapuri, George Lavezzi, Robert Stewart, Dan Wagner

    Abstract: Entomologists, ecologists and others struggle to rapidly and accurately identify the species of bumble bees they encounter in their field work and research. The current process requires the bees to be mounted, then physically shipped to a taxonomic expert for proper categorization. We investigated whether an image classification system derived from transfer learning can do this task. We used Googl… ▽ More

    Submitted 9 June, 2020; originally announced June 2020.

  28. Tunable and precise two-bunch generation at FLASHForward

    Authors: S. Schröder, K. Ludwig, A. Aschikhin, R. D'Arcy, M. Dinter, P. Gonzalez, S. Karstensen, A. Knetsch, V. Libov, C. A. Lindstrøm, F. Marutzky, P. Niknejadi, A. Rahali, L. Schaper, A. Schleiermacher, B. Schmidt, S. Thiele, A. de Zubiaurre Wagner, S. Wesch, J. Osterhoff

    Abstract: Beam-driven plasma-wakefield acceleration based on external injection has the potential to significantly reduce the size of future accelerators. Stability and quality of the acceleration process substantially depends on the incoming bunch parameters. Precise control of the current profile is essential for optimising energy-transfer efficiency and preserving energy spread. At the FLASHForward facil… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

    Comments: 7 pages, 5 figures, to be published in the proceedings of the 4th European Advanced Accelerator Concepts Workshop, 15-21 September 2019, La Biodola Bay, Isola d'Elba, Italy

    Report number: DESY 20-039

    Journal ref: J. Phys.: Conf. Ser. 1596, 012002 (2020)

  29. arXiv:2005.09313  [pdf, ps, other

    eess.SY math.OC

    Measures and LMIs for Adaptive Control Validation

    Authors: Daniel Wagner, Didier Henrion, Martin Hrom{č}ík

    Abstract: Occupation measures and linear matrix inequality (LMI) relax-ations (called the moment sums of squares or Lasserre hierarchy) have been used previously as a means for solving control law verification and validation (VV) problems. However, these methods have been restricted to relatively simple control laws and a limited number of states. In this document, we extend these methods to model reference… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

  30. arXiv:2004.13799  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Minority Reports Defense: Defending Against Adversarial Patches

    Authors: Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David Wagner

    Abstract: Deep learning image classification is vulnerable to adversarial attack, even if the attacker changes just a small patch of the image. We propose a defense against patch attacks based on partially occluding the image around each candidate patch location, so that a few occlusions each completely hide the patch. We demonstrate on CIFAR-10, Fashion MNIST, and MNIST that our defense provides certified… ▽ More

    Submitted 28 April, 2020; originally announced April 2020.

    Comments: 9 pages, 5 figures

  31. Densities of Almost Surely Terminating Probabilistic Programs are Differentiable Almost Everywhere

    Authors: Carol Mak, C. -H. Luke Ong, Hugo Paquet, Dominik Wagner

    Abstract: We study the differential properties of higher-order statistical probabilistic programs with recursion and conditioning. Our starting point is an open problem posed by Hongseok Yang: what class of statistical probabilistic programs have densities that are differentiable almost everywhere? To formalise the problem, we consider Statistical PCF (SPCF), an extension of call-by-value PCF with real numb… ▽ More

    Submitted 21 June, 2021; v1 submitted 8 April, 2020; originally announced April 2020.

  32. Zip** Segment Trees

    Authors: Lukas Barth, Dorothea Wagner

    Abstract: Stabbing queries in sets of intervals are usually answered using segment trees. A dynamic variant of segment trees has been presented by van Kreveld and Overmars, which uses red-black trees to do rebalancing operations. This paper presents zip** segment trees - dynamic segment trees based on zip trees, which were recently introduced by Tarjan et al. To facilitate zip** segment trees, we show h… ▽ More

    Submitted 7 April, 2020; originally announced April 2020.

    Comments: Accepted for publication at SEA 2020

  33. arXiv:2003.14317  [pdf, other

    cs.DS

    Engineering Exact Quasi-Threshold Editing

    Authors: Lars Gottesbüren, Michael Hamann, Philipp Schoch, Ben Strasser, Dorothea Wagner, Sven Zühlsdorf

    Abstract: Quasi-threshold graphs are $\{C_4, P_4\}$-free graphs, i.e., they do not contain any cycle or path of four nodes as an induced subgraph. We study the $\{C_4, P_4\}$-free editing problem, which is the problem of finding a minimum number of edge insertions or deletions to transform an input graph into a quasi-threshold graph. This problem is NP-hard but fixed-parameter tractable (FPT) in the number… ▽ More

    Submitted 31 March, 2020; originally announced March 2020.

    Comments: 22 pages, 8 figures, to appear at SEA 2020

  34. arXiv:2003.12110  [pdf, other

    cs.DS

    Advanced Flow-Based Multilevel Hypergraph Partitioning

    Authors: Lars Gottesbüren, Michael Hamann, Sebastian Schlag, Dorothea Wagner

    Abstract: The balanced hypergraph partitioning problem is to partition a hypergraph into $k$ disjoint blocks of bounded size such that the sum of the number of blocks connected by each hyperedge is minimized. We present an improvement to the flow-based refinement framework of KaHyPar-MF, the current state-of-the-art multilevel $k$-way hypergraph partitioning algorithm for high-quality solutions. Our improve… ▽ More

    Submitted 26 March, 2020; originally announced March 2020.

    Comments: To appear at SEA'20

  35. arXiv:2003.11292  [pdf, ps, other

    eess.SY math.OC

    Measures and LMIs for Lateral F-16 MRAC Validation

    Authors: Daniel Wagner, Didier Henrion, Martin Hromčík

    Abstract: Occupation measures and linear matrix inequality (LMI) relax-ations (called the moment sums of squares or Lasserre hierarchy) are state-of-the-art methods for verification and validation (VV) in aerospace. In this document, we extend these results to a full F-16 closed-loop nonlinear dutch roll polynomial model complete with model reference adaptive control (MRAC). This is done through a new techn… ▽ More

    Submitted 25 March, 2020; originally announced March 2020.

  36. arXiv:2003.09347  [pdf, other

    cs.LG cs.CR stat.ML

    SAT: Improving Adversarial Training via Curriculum-Based Loss Smoothing

    Authors: Chawin Sitawarin, Supriyo Chakraborty, David Wagner

    Abstract: Adversarial training (AT) has become a popular choice for training robust networks. However, it tends to sacrifice clean accuracy heavily in favor of robustness and suffers from a large generalization error. To address these concerns, we propose Smooth Adversarial Training (SAT), guided by our analysis on the eigenspectrum of the loss Hessian. We find that curriculum learning, a scheme that emphas… ▽ More

    Submitted 8 November, 2021; v1 submitted 18 March, 2020; originally announced March 2020.

    Comments: Published at AISec '21: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security. ACM DL link: https://dl.acm.org/doi/abs/10.1145/3474369.3486878

  37. arXiv:2003.06559  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Minimum-Norm Adversarial Examples on KNN and KNN-Based Models

    Authors: Chawin Sitawarin, David Wagner

    Abstract: We study the robustness against adversarial examples of kNN classifiers and classifiers that combine kNN with neural networks. The main difficulty lies in the fact that finding an optimal attack on kNN is intractable for typical datasets. In this work, we propose a gradient-based attack on kNN and kNN-based defenses, inspired by the previous work by Sitawarin & Wagner [1]. We demonstrate that our… ▽ More

    Submitted 14 March, 2020; originally announced March 2020.

    Comments: 3rd Deep Learning and Security Workshop (co-located with the 41st IEEE Symposium on Security and Privacy)

  38. arXiv:1912.05343  [pdf, other

    astro-ph.SR astro-ph.EP

    Spectroscopic characterization of nine binary star systems as well as HIP107136 and HIP107533

    Authors: T. Heyne, M. Mugrauer, R. Bischoff, D. Wagner, S. Hoffmann, O. Lux, V. Munz, M. Geymeier, R. Neuhäuser

    Abstract: We present the results of our 2nd radial velocity monitoring campaign, carried out with the Échelle spectrograph FLECHAS at the University Observatory Jena in the course of the Großschwabhausen binary survey between December 2016 and June 2018. The aim of this project is to obtain precise radial velocity measurements for spectroscopic binary stars in order to redetermine, verify, improve and const… ▽ More

    Submitted 11 December, 2019; originally announced December 2019.

    Comments: accepted for publication in AN, 16 pages, 5 figures, 16 tables

  39. Space-Efficient, Fast and Exact Routing in Time-Dependent Road Networks

    Authors: Ben Strasser, Dorothea Wagner, Tim Zeitz

    Abstract: We study the problem of quickly computing point-to-point shortest paths in massive road networks with traffic predictions. Incorporating traffic predictions into routing allows, for example, to avoid commuter traffic congestions. Existing techniques follow a two-phase approach: In a preprocessing step, an index is built. The index depends on the road network and the traffic patterns but not on the… ▽ More

    Submitted 26 March, 2021; v1 submitted 28 October, 2019; originally announced October 2019.

    Comments: 32 pages, 11 figures, published in MDPI Algorithms and a short version at ESA 2020

  40. arXiv:1910.09812  [pdf, other

    cs.DS

    Shortest Feasible Paths with Charging Stops for Battery Electric Vehicles

    Authors: Moritz Baum, Julian Dibbelt, Andreas Gemsa, Dorothea Wagner, Tobias Zündorf

    Abstract: We study the problem of minimizing overall trip time for battery electric vehicles in road networks. As battery capacity is limited, stops at charging stations may be inevitable. Careful route planning is crucial, since charging stations are scarce and recharging is time-consuming. We extend the Constrained Shortest Path problem for electric vehicles with realistic models of charging stops, includ… ▽ More

    Submitted 22 October, 2019; originally announced October 2019.

    Comments: 43 pages, 12 figure, 6 tables

  41. Engineering Top-Down Weight-Balanced Trees

    Authors: Lukas Barth, Dorothea Wagner

    Abstract: Weight-balanced trees are a popular form of self-balancing binary search trees. Their popularity is due to desirable guarantees, for example regarding the required work to balance annotated trees. While usual weight-balanced trees perform their balancing operations in a bottom-up fashion after a modification to the tree is completed, there exists a top-down variant which performs these balancing… ▽ More

    Submitted 28 October, 2019; v1 submitted 17 October, 2019; originally announced October 2019.

    Comments: Accepted for publication at ALENEX 2020

  42. arXiv:1910.00790  [pdf, other

    cs.CR cs.SI

    Detecting and Characterizing Lateral Phishing at Scale

    Authors: Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner

    Abstract: We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to send phishing emails to other users, benefitting from both the implicit trust and the information in the hijacked user's account. We develop a cl… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

    Comments: Extended report of conference paper presented at the 26th USENIX Security Symposium (USENIX Security 19). USENIX Association, 2019

  43. arXiv:1909.08519  [pdf, other

    cs.DS

    Efficient Computation of Multi-Modal Public Transit Traffic Assignments using ULTRA

    Authors: Jonas Sauer, Dorothea Wagner, Tobias Zündorf

    Abstract: We study the problem of computing public transit traffic assignments in a multi-modal setting: Given a public transit timetable, an additional unrestricted transfer mode (in our case walking), and a set of origin-destination pairs, we aim to compute the utilization of every vehicle in the network. While it has been shown that considering unrestricted transfers can significantly improve journeys, c… ▽ More

    Submitted 18 September, 2019; originally announced September 2019.

    Comments: 11 pages, 6 figures

  44. arXiv:1908.02129  [pdf, other

    cs.DS

    Engineering Negative Cycle Canceling for Wind Farm Cabling

    Authors: Sascha Gritzbach, Torsten Ueckerdt, Dorothea Wagner, Franziska Wegner, Matthias Wolf

    Abstract: In a wind farm turbines convert wind energy into electrical energy. The generation of each turbine is transmitted, possibly via other turbines, to a substation that is connected to the power grid. On every possible interconnection there can be at most one of various different cable types. Each type comes with a cost per unit length and with a capacity. Designing a cost-minimal cable layout for a w… ▽ More

    Submitted 28 July, 2023; v1 submitted 6 August, 2019; originally announced August 2019.

    Comments: A preliminary version of this work was published in the Proceedings of the 27th Annual European Symposium on Algorithms (ESA'19). This work became part of the dissertation of the first author

  45. arXiv:1907.05587  [pdf, other

    cs.CR cs.LG

    Stateful Detection of Black-Box Adversarial Attacks

    Authors: Steven Chen, Nicholas Carlini, David Wagner

    Abstract: The problem of adversarial examples, evasion attacks on machine learning classifiers, has proven extremely difficult to solve. This is true even when, as is the case in many practical settings, the classifier is hosted as a remote service and so the adversary does not have direct access to the model parameters. This paper argues that in such settings, defenders have a much larger space of action… ▽ More

    Submitted 12 July, 2019; originally announced July 2019.

  46. arXiv:1907.02053  [pdf, other

    cs.DS

    Evaluation of a Flow-Based Hypergraph Bipartitioning Algorithm

    Authors: Lars Gottesbüren, Michael Hamann, Dorothea Wagner

    Abstract: In this paper, we propose HyperFlowCutter, an algorithm for balanced hypergraph bipartitioning. It is based on minimum S-T hyperedge cuts and maximum flows. It computes a sequence of bipartitions that optimize cut size and balance in the Pareto sense, being able to trade one for the other. HyperFlowCutter builds on the FlowCutter algorithm for partitioning graphs. We propose additional features, s… ▽ More

    Submitted 3 July, 2019; originally announced July 2019.

    Comments: 22 pages, 7 figures, 2 tables. Full version of the paper appearing in the Proceedings of the 27th Annual European Symposium on Algorithms (ESA 2019)

  47. Faster and Better Nested Dissection Orders for Customizable Contraction Hierarchies

    Authors: Lars Gottesbüren, Michael Hamann, Tim Niklas Uhl, Dorothea Wagner

    Abstract: Graph partitioning has many applications. We consider the acceleration of shortest path queries in road networks using Customizable Contraction Hierarchies (CCH). It is based on computing a nested dissection order by recursively dividing the road network into parts. Recently, with FlowCutter and Inertial Flow, two flow-based graph bipartitioning algorithms have been proposed for road networks. Whi… ▽ More

    Submitted 2 July, 2019; v1 submitted 27 June, 2019; originally announced June 2019.

    Comments: 18 pages, 8 tables; v2: re-run experiments of competing algorithms

  48. arXiv:1906.09525   

    cs.LG cs.AI cs.CR stat.ML

    Defending Against Adversarial Examples with K-Nearest Neighbor

    Authors: Chawin Sitawarin, David Wagner

    Abstract: Robustness is an increasingly important property of machine learning models as they become more and more prevalent. We propose a defense against adversarial examples based on a k-nearest neighbor (kNN) on the intermediate activation of neural networks. Our scheme surpasses state-of-the-art defenses on MNIST and CIFAR-10 against l2-perturbation by a significant margin. With our models, the mean per… ▽ More

    Submitted 18 March, 2020; v1 submitted 22 June, 2019; originally announced June 2019.

    Comments: Inadequate experimental evaluation

  49. UnLimited TRAnsfers for Multi-Modal Route Planning: An Efficient Solution

    Authors: Moritz Baum, Valentin Buchhold, Jonas Sauer, Dorothea Wagner, Tobias Zündorf

    Abstract: We study a multimodal journey planning scenario consisting of a public transit network and a transfer graph which represents a secondary transportation mode (e.g., walking, cycling, e-scooter). The objective is to compute Pareto-optimal journeys with respect to arrival time and the number of used public transit trips. While various existing algorithms can efficiently compute optimal journeys in ei… ▽ More

    Submitted 1 February, 2023; v1 submitted 11 June, 2019; originally announced June 2019.

    Journal ref: 27th Annual European Symposium on Algorithms (ESA 2019) (Leibniz International Proceedings in Informatics (LIPIcs)), Vol. 144, 14:1-14:16

  50. arXiv:1903.08333  [pdf, other

    cs.CR stat.ML

    On the Robustness of Deep K-Nearest Neighbors

    Authors: Chawin Sitawarin, David Wagner

    Abstract: Despite a large amount of attention on adversarial examples, very few works have demonstrated an effective defense against this threat. We examine Deep k-Nearest Neighbor (DkNN), a proposed defense that combines k-Nearest Neighbor (kNN) and deep learning to improve the model's robustness to adversarial examples. It is challenging to evaluate the robustness of this scheme due to a lack of efficient… ▽ More

    Submitted 19 March, 2019; originally announced March 2019.

    Comments: Published at Deep Learning and Security Workshop 2019 (IEEE S&P)