Skip to main content

Showing 1–31 of 31 results for author: Butler, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19573  [pdf, other

    cs.LG eess.SP stat.ME

    On Counterfactual Interventions in Vector Autoregressive Models

    Authors: Kurt Butler, Marija Iloska, Petar M. Djuric

    Abstract: Counterfactual reasoning allows us to explore hypothetical scenarios in order to explain the impacts of our decisions. However, addressing such inquires is impossible without establishing the appropriate mathematical framework. In this work, we introduce the problem of counterfactual reasoning in the context of vector autoregressive (VAR) processes. We also formulate the inference of a causal mode… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

  2. arXiv:2406.10318  [pdf, other

    cs.CV cs.AI

    Creating a Lens of Chinese Culture: A Multimodal Dataset for Chinese Pun Rebus Art Understanding

    Authors: Tuo Zhang, Tiantian Feng, Yibin Ni, Mengqin Cao, Ruying Liu, Katharine Butler, Yanjun Weng, Mi Zhang, Shrikanth S. Narayanan, Salman Avestimehr

    Abstract: Large vision-language models (VLMs) have demonstrated remarkable abilities in understanding everyday content. However, their performance in the domain of art, particularly culturally rich art forms, remains less explored. As a pearl of human wisdom and creativity, art encapsulates complex cultural narratives and symbolism. In this paper, we offer the Pun Rebus Art Dataset, a multimodal dataset for… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  3. arXiv:2404.15143  [pdf, other

    cs.SD cs.CR cs.MM eess.AS

    Every Breath You Don't Take: Deepfake Speech Detection Using Breath

    Authors: Seth Layton, Thiago De Andrade, Daniel Olszewski, Kevin Warren, Kevin Butler, Patrick Traynor

    Abstract: Deepfake speech represents a real and growing threat to systems and society. Many detectors have been created to aid in defense against speech deepfakes. While these detectors implement myriad methodologies, many rely on low-level fragments of the speech generation process. We hypothesize that breath, a higher-level part of speech, is a key component of natural speech and thus improper generation… ▽ More

    Submitted 26 April, 2024; v1 submitted 23 April, 2024; originally announced April 2024.

    Comments: Submitted to ACM journal -- Digital Threats: Research and Practice

  4. arXiv:2404.11815  [pdf, other

    cs.CR

    AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management

    Authors: Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi

    Abstract: Underwater datacenters (UDCs) hold promise as next-generation data storage due to their energy efficiency and environmental sustainability benefits. While the natural cooling properties of water save power, the isolated aquatic environment and long-range sound propagation in water create unique vulnerabilities which differ from those of on-land data centers. Our research discovers the unique vulne… ▽ More

    Submitted 7 May, 2024; v1 submitted 17 April, 2024; originally announced April 2024.

    Comments: Accepted to IEEE S&P 2024

  5. arXiv:2403.07072  [pdf, other

    cs.LG eess.SP

    Explainable Learning with Gaussian Processes

    Authors: Kurt Butler, Guanchao Feng, Petar M. Djuric

    Abstract: The field of explainable artificial intelligence (XAI) attempts to develop methods that provide insight into how complicated machine learning methods make predictions. Many methods of explanation have focused on the concept of feature attribution, a decomposition of the model's prediction into individual contributions corresponding to each input feature. In this work, we explore the problem of fea… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: 38 pages, 7 figures

    MSC Class: 60G15

  6. arXiv:2402.07687  [pdf, other

    cs.HC cs.CR

    Privacy-Preserving Gaze Data Streaming in Immersive Interactive Virtual Reality: Robustness and User Experience

    Authors: Ethan Wilson, Azim Ibragimov, Michael J. Proulx, Sai Deep Tetali, Kevin Butler, Eakta Jain

    Abstract: Eye tracking is routinely being incorporated into virtual reality (VR) systems. Prior research has shown that eye tracking data, if exposed, can be used for re-identification attacks. The state of our knowledge about currently existing privacy mechanisms is limited to privacy-utility trade-off curves based on data-centric metrics of utility, such as prediction error, and black-box threat models. W… ▽ More

    Submitted 21 February, 2024; v1 submitted 12 February, 2024; originally announced February 2024.

    Comments: To appear in IEEE Transactions on Visualization and Computer Graphics

  7. arXiv:2401.02930  [pdf, other

    cs.LG stat.ME stat.ML

    Dagma-DCE: Interpretable, Non-Parametric Differentiable Causal Discovery

    Authors: Daniel Waxman, Kurt Butler, Petar M. Djuric

    Abstract: We introduce Dagma-DCE, an interpretable and model-agnostic scheme for differentiable causal discovery. Current non- or over-parametric methods in differentiable causal discovery use opaque proxies of ``independence'' to justify the inclusion or exclusion of a causal relationship. We show theoretically and empirically that these proxies may be arbitrarily different than the actual causal strength.… ▽ More

    Submitted 5 January, 2024; originally announced January 2024.

    Comments: 9 pages, 2 figures. Accepted to the IEEE Open Journal of Signal Processing

    Journal ref: IEEE Open Journal of Signal Processing, vol. 5, pp. 393-401, 2024

  8. arXiv:2305.14080  [pdf, other

    cs.HC cs.AI cs.CR cs.GR cs.LG

    Eye-tracked Virtual Reality: A Comprehensive Survey on Methods and Privacy Challenges

    Authors: Efe Bozkir, Süleyman Özdel, Mengdi Wang, Brendan David-John, Hong Gao, Kevin Butler, Eakta Jain, Enkelejda Kasneci

    Abstract: Latest developments in computer hardware, sensor technologies, and artificial intelligence can make virtual reality (VR) and virtual spaces an important part of human everyday life. Eye tracking offers not only a hands-free way of interaction but also the possibility of a deeper understanding of human visual attention and cognitive processes in VR. Despite these possibilities, eye-tracking data al… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  9. arXiv:2303.04201  [pdf, other

    cs.LG stat.ME

    DR-VIDAL -- Doubly Robust Variational Information-theoretic Deep Adversarial Learning for Counterfactual Prediction and Treatment Effect Estimation on Real World Data

    Authors: Shantanu Ghosh, Zheng Feng, Jiang Bian, Kevin Butler, Mattia Prosperi

    Abstract: Determining causal effects of interventions onto outcomes from real-world, observational (non-randomized) data, e.g., treatment repurposing using electronic health records, is challenging due to underlying bias. Causal deep learning has improved over traditional techniques for estimating individualized treatment effects (ITE). We present the Doubly Robust Variational Information-theoretic Deep Adv… ▽ More

    Submitted 7 May, 2023; v1 submitted 7 March, 2023; originally announced March 2023.

    Comments: AMIA Annual Symposium, 2022 (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10148269/)

    Journal ref: Journal="AMIA Annu Symp Proc", Year="2022", Volume="2022",Pages="485--494"

  10. arXiv:2301.10056  [pdf

    cs.CR cs.CV cs.MM cs.SD eess.AS

    Side Eye: Characterizing the Limits of POV Acoustic Eavesdrop** from Smartphone Cameras with Rolling Shutters and Movable Lenses

    Authors: Yan Long, Pirouz Naghavi, Blas Kojusner, Kevin Butler, Sara Rampazzi, Kevin Fu

    Abstract: Our research discovers how the rolling shutter and movable lens structures widely found in smartphone cameras modulate structure-borne sounds onto camera images, creating a point-of-view (POV) optical-acoustic side channel for acoustic eavesdrop**. The movement of smartphone camera hardware leaks acoustic information because images unwittingly modulate ambient sound as imperceptible distortions.… ▽ More

    Submitted 26 January, 2023; v1 submitted 24 January, 2023; originally announced January 2023.

    Journal ref: 2023 IEEE Symposium on Security and Privacy

  11. arXiv:2206.10746  [pdf

    cs.CR

    A Practical Methodology for ML-Based EM Side Channel Disassemblers

    Authors: Cesar N. Arguello, Hunter Searle, Sara Rampazzi, Kevin R. B. Butler

    Abstract: Providing security guarantees for embedded devices with limited interface capabilities is an increasingly crucial task. Although these devices don't have traditional interfaces, they still generate unintentional electromagnetic signals that correlate with the instructions being executed. By collecting these traces using our methodology and leveraging a random forest algorithm to develop a machine… ▽ More

    Submitted 20 July, 2022; v1 submitted 21 June, 2022; originally announced June 2022.

    Comments: Accepted to the poster section of the 7th IEEE European Symposium on Security and Privacy 2022

  12. arXiv:2204.01516  [pdf, other

    cs.CR cs.SE

    SAUSAGE: Security Analysis of Unix domain Socket Usage in Android

    Authors: Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef

    Abstract: The Android operating system is currently the most popular mobile operating system in the world. Android is based on Linux and therefore inherits its features including its Inter-Process Communication (IPC) mechanisms. These mechanisms are used by processes to communicate with one another and are extensively used in Android. While Android-specific IPC mechanisms have been studied extensively, Unix… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

    Comments: Accepted to EuroS&P 2022

  13. arXiv:2111.01037  [pdf, other

    cond-mat.mtrl-sci cs.LG

    Interpretable and Explainable Machine Learning for Materials Science and Chemistry

    Authors: Felipe Oviedo, Juan Lavista Ferres, Tonio Buonassisi, Keith Butler

    Abstract: While the uptake of data-driven approaches for materials science and chemistry is at an exciting, early stage, to realise the true potential of machine learning models for successful scientific discovery, they must have qualities beyond purely predictive power. The predictions and inner workings of models should provide a certain degree of explainability by human experts, permitting the identifica… ▽ More

    Submitted 3 November, 2021; v1 submitted 1 November, 2021; originally announced November 2021.

    Comments: Under review Accounts of Material Research

    Journal ref: 2022 Account of Materials Research

  14. arXiv:2107.14664  [pdf, other

    cond-mat.mtrl-sci cs.LG

    Distributed Representations of Atoms and Materials for Machine Learning

    Authors: Luis M. Antunes, Ricardo Grau-Crespo, Keith T. Butler

    Abstract: The use of machine learning is becoming increasingly common in computational materials science. To build effective models of the chemistry of materials, useful machine-based representations of atoms and their compounds are required. We derive distributed representations of compounds from their chemical formulas only, via pooling operations of distributed representations of atoms. These compound re… ▽ More

    Submitted 30 July, 2021; originally announced July 2021.

  15. arXiv:2103.03325  [pdf, other

    cs.LG

    Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples

    Authors: Washington Garcia, Pin-Yu Chen, Somesh Jha, Scott Clouse, Kevin R. B. Butler

    Abstract: Designing deep networks robust to adversarial examples remains an open problem. Likewise, recent zeroth order hard-label attacks on image classification models have shown comparable performance to their first-order, gradient-level alternatives. It was recently shown in the gradient-level setting that regular adversarial examples leave the data manifold, while their on-manifold counterparts are in… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

    Comments: Preprint

  16. A privacy-preserving approach to streaming eye-tracking data

    Authors: Brendan David-John, Diane Hosfelt, Kevin Butler, Eakta Jain

    Abstract: Eye-tracking technology is being increasingly integrated into mixed reality devices. Although critical applications are being enabled, there are significant possibilities for violating user privacy expectations. We show that there is an appreciable risk of unique user identification even under natural viewing conditions in virtual reality. This identification would allow an app to connect a user's… ▽ More

    Submitted 19 March, 2021; v1 submitted 2 February, 2021; originally announced February 2021.

    Comments: 12 pages, 4 figures, to appear in IEEE TVCG Special Issue on IEEE VR 2021

  17. arXiv:2008.01623  [pdf

    cs.SE stat.ML

    Semantic based model of Conceptual Work Products for formal verification of complex interactive systems

    Authors: Mohcine Madkour, Keith Butler, Eric Mercer, Ali Bahrami, Cui Tao

    Abstract: Many clinical workflows depend on interactive computer systems for highly technical, conceptual work products, such as diagnoses, treatment plans, care coordination, and case management. We describe an automatic logic reasoner to verify objective specifications for these highly technical, but abstract, work products that are essential to care. The conceptual work products specifications serve as a… ▽ More

    Submitted 4 August, 2020; originally announced August 2020.

  18. arXiv:1910.07631  [pdf

    physics.comp-ph cs.LG

    Machine Learning and Big Scientific Data

    Authors: Tony Hey, Keith Butler, Sam Jackson, Jeyarajan Thiyagalingam

    Abstract: This paper reviews some of the challenges posed by the huge growth of experimental data generated by the new generation of large-scale experiments at UK national facilities at the Rutherford Appleton Laboratory site at Harwell near Oxford. Such "Big Scientific Data" comes from the Diamond Light Source and Electron Microscopy Facilities, the ISIS Neutron and Muon Facility, and the UK's Central Lase… ▽ More

    Submitted 12 October, 2019; originally announced October 2019.

    Comments: 42 Pages with full colour images

  19. arXiv:1907.00935  [pdf, other

    cs.CR

    One-Time Programs made Practical

    Authors: Lianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, Jeremy Clark

    Abstract: A one-time program (OTP) works as follows: Alice provides Bob with the implementation of some function. Bob can have the function evaluated exclusively on a single input of his choosing. Once executed, the program will fail to evaluate on any other input. State-of-the-art one-time programs have remained theoretical, requiring custom hardware that is cost-ineffective/unavailable, or confined to adh… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

  20. A Hybrid Approach to Secure Function Evaluation Using SGX

    Authors: Joseph I. Choi, Dave '**g' Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor

    Abstract: A protocol for two-party secure function evaluation (2P-SFE) aims to allow the parties to learn the output of function $f$ of their private inputs, while leaking nothing more. In a sense, such a protocol realizes a trusted oracle that computes $f$ and returns the result to both parties. There have been tremendous strides in efficiency over the past ten years, yet 2P-SFE protocols remain impractica… ▽ More

    Submitted 6 May, 2019; v1 submitted 3 May, 2019; originally announced May 2019.

    Comments: Full version, with proofs, of conference paper at AsiaCCS 2019; updated to include copyright information

  21. arXiv:1904.05734  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

    Authors: Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson

    Abstract: Voice Processing Systems (VPSes), now widely deployed, have been made significantly more accurate through the application of recent advances in machine learning. However, adversarial machine learning has similarly advanced and has been used to demonstrate that VPSes are vulnerable to the injection of hidden commands - audio obscured by noise that is correctly recognized by a VPS but not by human b… ▽ More

    Submitted 18 March, 2019; originally announced April 2019.

    Journal ref: The Network and Distributed System Security Symposium (NDSS) 2019

  22. arXiv:1810.00024  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Explainable Black-Box Attacks Against Model-based Authentication

    Authors: Washington Garcia, Joseph I. Choi, Suman K. Adari, Somesh Jha, Kevin R. B. Butler

    Abstract: Establishing unique identities for both humans and end systems has been an active research problem in the security community, giving rise to innovative machine learning-based authentication techniques. Although such techniques offer an automated method to establish identity, they have not been vetted against sophisticated attacks that target their core machine learning technique. This paper demons… ▽ More

    Submitted 28 September, 2018; originally announced October 2018.

  23. FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution

    Authors: Grant Hernandez, Farhaan Fowze, Dave Tian, Tuba Yavuz, Kevin R. B. Butler

    Abstract: The USB protocol has become ubiquitous, supporting devices from high-powered computing devices to small embedded devices and control systems. USB's greatest feature, its openness and expandability, is also its weakness, and attacks such as BadUSB exploit the unconstrained functionality afforded to these devices as a vector for compromise. Fundamentally, it is virtually impossible to know whether a… ▽ More

    Submitted 30 August, 2017; originally announced August 2017.

    Comments: 18 pages, CCS 2017

  24. arXiv:1609.00266  [pdf, other

    cs.CR

    Retrofitting Applications with Provenance-Based Security Monitoring

    Authors: Adam Bates, Kevin Butler, Alin Dobra, Brad Reaves, Patrick Cable, Thomas Moyer, Nabil Schear

    Abstract: Data provenance is a valuable tool for detecting and preventing cyber attack, providing insight into the nature of suspicious events. For example, an administrator can use provenance to identify the perpetrator of a data leak, track an attacker's actions following an intrusion, or even control the flow of outbound data within an organization. Unfortunately, providing relevant data provenance for c… ▽ More

    Submitted 1 September, 2016; originally announced September 2016.

  25. arXiv:1602.02831  [pdf, other

    cs.IT

    Minimum Distances of the QC-LDPC Codes in IEEE 802 Communication Standards

    Authors: Brian K. Butler

    Abstract: This work applies earlier results on Quasi-Cyclic (QC) LDPC codes to the codes specified in six separate IEEE 802 standards, specifying wireless communications from 54 MHz to 60 GHz. First, we examine the weight matrices specified to upper bound the codes' minimum distance independent of block length. Next, we search for the minimum distance achieved for the parity check matrices selected at each… ▽ More

    Submitted 8 February, 2016; originally announced February 2016.

    Comments: Submitted to IEEE ISIT 2016. 5 pages, 2 figures, and 7 tables

  26. arXiv:1506.02954  [pdf, other

    cs.CR

    Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values

    Authors: Benjamin Mood, Debayan Gupta, Kevin Butler, Joan Feigenbaum

    Abstract: Two-party secure function evaluation (SFE) has become significantly more feasible, even on resource-constrained devices, because of advances in server-aided computation systems. However, there are still bottlenecks, particularly in the input validation stage of a computation. Moreover, SFE research has not yet devoted sufficient attention to the important problem of retaining state after a computa… ▽ More

    Submitted 9 June, 2015; originally announced June 2015.

    Comments: 20 pages, shorter conference version published in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Pages 582-596, ACM New York, NY, USA

  27. arXiv:1409.5783  [pdf, other

    cs.IT

    LDPC Code Density Evolution in the Error Floor Region

    Authors: Brian K. Butler, Paul H. Siegel

    Abstract: This short paper explores density evolution (DE) for low-density parity-check (LDPC) codes at signal-to-noise-ratios (SNRs) that are significantly above the decoding threshold. The focus is on the additive white Gaussian noise channel and LDPC codes in which the variable nodes have regular degree. Prior work, using DE, produced results in the error floor region which were asymptotic in the belie… ▽ More

    Submitted 19 September, 2014; originally announced September 2014.

    Comments: 5 pages, 2 figures

  28. arXiv:1208.1326  [pdf, other

    cs.IT math.NA

    Numerical Issues Affecting LDPC Error Floors

    Authors: Brian K. Butler, Paul H. Siegel

    Abstract: Numerical issues related to the occurrence of error floors in floating-point simulations of belief propagation (BP) decoders are examined. Careful processing of messages corresponding to highly-certain bit values can sometimes reduce error floors by several orders of magnitude. Computational solutions for properly handling such messages are provided for the sum-product algorithm (SPA) and several… ▽ More

    Submitted 6 August, 2012; originally announced August 2012.

    Comments: 7 pages, 5 figures. Submitted to IEEE Globecom (Selected Area of Communications Data Storage Track)

  29. arXiv:1202.2826  [pdf, other

    cs.IT

    Error Floor Approximation for LDPC Codes in the AWGN Channel

    Authors: Brian K. Butler, Paul H. Siegel

    Abstract: This paper addresses the prediction of error floors of low-density parity-check (LDPC) codes with variable nodes of constant degree in the additive white Gaussian noise (AWGN) channel. Specifically, we focus on the performance of the sum-product algorithm (SPA) decoder formulated in the log-likelihood ratio (LLR) domain. We hypothesize that several published error floor levels are due to the manne… ▽ More

    Submitted 9 June, 2013; v1 submitted 13 February, 2012; originally announced February 2012.

    Comments: 24 pages, 15 figures, submitted to IEEE Transactions on Information Theory

  30. arXiv:1201.2386  [pdf, other

    cs.IT

    Bounds on the Minimum Distance of Punctured Quasi-Cyclic LDPC Codes

    Authors: Brian K. Butler, Paul H. Siegel

    Abstract: Recent work by Divsalar et al. has shown that properly designed protograph-based low-density parity-check (LDPC) codes typically have minimum (Hamming) distance linearly increasing with block length. This fact rests on ensemble arguments over all possible expansions of the base protograph. However, when implementation complexity is considered, the expansions are frequently selected from a smaller… ▽ More

    Submitted 20 February, 2013; v1 submitted 11 January, 2012; originally announced January 2012.

    Comments: 13 pages, 6 figures, 6 tables. Submitted to IEEE Transactions on Information Theory

  31. On Distance Properties of Quasi-Cyclic Protograph-Based LDPC Codes

    Authors: Brian K. Butler, Paul H. Siegel

    Abstract: Recent work has shown that properly designed protograph-based LDPC codes may have minimum distance linearly increasing with block length. This notion rests on ensemble arguments over all possible expansions of the base protograph. When implementation complexity is considered, the expansion is typically chosen to be quite orderly. For example, protograph expansion by cyclically shifting connections… ▽ More

    Submitted 29 April, 2010; originally announced April 2010.

    Comments: Submitted to IEEE International Symposium on Information Theory, to be held June 2010