Skip to main content

Showing 1–8 of 8 results for author: Clark, J A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.12331  [pdf, other

    physics.med-ph cs.CV

    Deep Few-view High-resolution Photon-counting Extremity CT at Halved Dose for a Clinical Trial

    Authors: Mengzhou Li, Chuang Niu, Ge Wang, Maya R Amma, Krishna M Chapagain, Stefan Gabrielson, Andrew Li, Kevin Jonker, Niels de Ruiter, Jennifer A Clark, Phil Butler, Anthony Butler, Hengyong Yu

    Abstract: The latest X-ray photon-counting computed tomography (PCCT) for extremity allows multi-energy high-resolution (HR) imaging for tissue characterization and material decomposition. However, both radiation dose and imaging speed need improvement for contrast-enhanced and other studies. Despite the success of deep learning methods for 2D few-view reconstruction, applying them to HR volumetric reconstr… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

    Comments: 9 figures, 5 tables

  2. arXiv:2309.07730  [pdf, other

    cs.CR cs.AI

    AIDPS:Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks

    Authors: Soumadeep Das, Aryan Mohammadi Pasikhani, Prosanta Gope, John A. Clark, Chintan Patel, Biplab Sikdar

    Abstract: Underwater Acoustic Sensor Networks (UW-ASNs) are predominantly used for underwater environments and find applications in many areas. However, a lack of security considerations, the unstable and challenging nature of the underwater environment, and the resource-constrained nature of the sensor nodes used for UW-ASNs (which makes them incapable of adopting security primitives) make the UW-ASN prone… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

  3. arXiv:2303.13204  [pdf, other

    cs.CR

    A Privacy-Preserving Energy Theft Detection Model for Effective Demand-Response Management in Smart Grids

    Authors: Arwa Alromih, John A. Clark, Prosanta Gope

    Abstract: The detection of energy thefts is vital for the safety of the whole smart grid system. However, the detection alone is not enough since energy thefts can crucially affect the electricity supply leading to some blackouts. Moreover, privacy is one of the major challenges that must be preserved when dealing with clients' energy data. This is often overlooked in energy theft detection research as most… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  4. arXiv:2205.09170  [pdf, other

    cs.CR

    Adaptive Hybrid Heterogeneous IDS for 6LoWPAN

    Authors: Aryan Mohammadi Pasikhani, John A Clark, Prosanta Gope

    Abstract: IPv6 over Low-powered Wireless Personal Area Networks (6LoWPAN) have grown in importance in recent years, with the Routing Protocol for Low Power and Lossy Networks (RPL) emerging as a major enabler. However, RPL can be subject to attack, with severe consequences. Most proposed IDSs have been limited to specific RPL attacks and typically assume a stationary environment. In this article, we propose… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

  5. arXiv:2011.14995  [pdf, other

    cs.DC physics.comp-ph

    Adapting LIGO workflows to run in the Open Science Grid

    Authors: Edgar Fajardo, Frank Wuerthwein, Brian Bockelman, Miron Livny, Greg Thain, James Alexander Clark, Peter Couvares, Josh Willis

    Abstract: During the first observation run the LIGO collaboration needed to offload some of its most, intense CPU workflows from its dedicated computing sites to opportunistic resources. Open Science Grid enabled LIGO to run PyCbC, RIFT and Bayeswave workflows to seamlessly run in a combination of owned and opportunistic resources. One of the challenges is enabling the workflows to use several heterogeneous… ▽ More

    Submitted 30 November, 2020; originally announced November 2020.

  6. arXiv:1904.01336  [pdf, other

    cs.NE quant-ph

    Optimising Trotter-Suzuki Decompositions for Quantum Simulation Using Evolutionary Strategies

    Authors: Benjamin D. M. Jones, George O. O'Brien, David R. White, Earl T. Campbell, John A. Clark

    Abstract: One of the most promising applications of near-term quantum computing is the simulation of quantum systems, a classically intractable task. Quantum simulation requires computationally expensive matrix exponentiation; Trotter-Suzuki decomposition of this exponentiation enables efficient simulation to a desired accuracy on a quantum computer. We apply the Covariance Matrix Adaptation Evolutionary St… ▽ More

    Submitted 23 April, 2019; v1 submitted 2 April, 2019; originally announced April 2019.

    Comments: A version of this paper is to appear in GECCO'19

  7. arXiv:1301.6972  [pdf, ps, other

    cs.CR

    Using evolutionary computation to create vectorial Boolean functions with low differential uniformity and high nonlinearity

    Authors: James McLaughlin, John A. Clark

    Abstract: The two most important criteria for vectorial Boolean functions used as S-boxes in block ciphers are differential uniformity and nonlinearity. Previous work in this field has focused only on nonlinearity and a different criterion, autocorrelation. In this paper, we describe the results of experiments in using simulated annealing, memetic algorithms, and ant colony optimisation to create vectorial… ▽ More

    Submitted 29 January, 2013; originally announced January 2013.

  8. arXiv:1111.2744  [pdf, ps, other

    cs.CR

    Cryptanalysis of Song's advanced smart card based password authentication protocol

    Authors: Juan E. Tapiador, Julio C. Hernandez-Castro, P. Peris-Lopez, John A. Clark

    Abstract: Song \cite{Song10} proposed very recently a password-based authentication and key establishment protocol using smart cards which attempts to solve some weaknesses found in a previous scheme suggested by Xu, Zhu, and Feng \cite{XZF09}. In this paper, we present attacks on the improved protocol, showing that it fails to achieve the claimed security goals.

    Submitted 11 November, 2011; originally announced November 2011.

    Comments: 7 pages