Skip to main content

Showing 1–18 of 18 results for author: Ivanov, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.16654  [pdf, other

    cs.AI cs.CL cs.HC

    GigaPevt: Multimodal Medical Assistant

    Authors: Pavel Blinov, Konstantin Egorov, Ivan Sviridov, Nikolay Ivanov, Stepan Botman, Evgeniy Tagin, Stepan Kudin, Galina Zubkova, Andrey Savchenko

    Abstract: Building an intelligent and efficient medical assistant is still a challenging AI problem. The major limitation comes from the data modality scarceness, which reduces comprehensive patient perception. This demo paper presents the GigaPevt, the first multimodal medical assistant that combines the dialog capabilities of large language models with specialized medical models. Such an approach shows im… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

    Comments: 4 pages, 2 figures, 2 tables

    MSC Class: 68T07 ACM Class: I.2.1

  2. arXiv:2402.02198  [pdf

    cond-mat.mtrl-sci cs.LG

    Co-orchestration of Multiple Instruments to Uncover Structure-Property Relationships in Combinatorial Libraries

    Authors: Boris N. Slautin, Utkarsh Pratiush, Ilia N. Ivanov, Yongtao Liu, Rohit Pant, Xiaohang Zhang, Ichiro Takeuchi, Maxim A. Ziatdinov, Sergei V. Kalinin

    Abstract: The rapid growth of automated and autonomous instrumentations brings forth an opportunity for the co-orchestration of multimodal tools, equipped with multiple sequential detection methods, or several characterization tools to explore identical samples. This can be exemplified by the combinatorial libraries that can be explored in multiple locations by multiple tools simultaneously, or downstream c… ▽ More

    Submitted 17 March, 2024; v1 submitted 3 February, 2024; originally announced February 2024.

    Comments: 22 pages, 9 figures

  3. arXiv:2312.06010  [pdf, other

    cs.CR cs.SD eess.AS

    A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?

    Authors: Yuanda Wang, Qiben Yan, Nikolay Ivanov, Xun Chen

    Abstract: The emergence of Artificial Intelligence (AI)-driven audio attacks has revealed new security vulnerabilities in voice control systems. While researchers have introduced a multitude of attack strategies targeting voice control systems (VCS), the continual advancements of VCS have diminished the impact of many such attacks. Recognizing this dynamic landscape, our study endeavors to comprehensively a… ▽ More

    Submitted 4 January, 2024; v1 submitted 10 December, 2023; originally announced December 2023.

    Comments: 14 pages

  4. arXiv:2308.06267  [pdf, other

    cs.DC cs.LG

    DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning

    Authors: Bocheng Chen, Nikolay Ivanov, Guang**g Wang, Qiben Yan

    Abstract: Federated Learning (FL) is a distributed machine learning (ML) paradigm, aiming to train a global model by exploiting the decentralized data across millions of edge devices. Compared with centralized learning, FL preserves the clients' privacy by refraining from explicitly downloading their data. However, given the geo-distributed edge devices (e.g., mobile, car, train, or subway) with highly dyna… ▽ More

    Submitted 16 July, 2023; originally announced August 2023.

    Journal ref: 2023 SECON

  5. arXiv:2302.07347  [pdf, other

    cs.CR cs.DC

    Security Defense For Smart Contracts: A Comprehensive Survey

    Authors: Nikolay Ivanov, Chenning Li, Qiben Yan, Zhiyuan Sun, Zhichao Cao, Xiapu Luo

    Abstract: The blockchain technology has been used for recording state transitions of smart contracts - decentralized applications that can be invoked through external transactions. Smart contracts gained popularity and accrued hundreds of billions of dollars in market capitalization in recent years. Unfortunately, like all other programs, smart contracts are prone to security vulnerabilities that have incur… ▽ More

    Submitted 9 May, 2023; v1 submitted 14 February, 2023; originally announced February 2023.

    Comments: ACM Computing Surveys (CSUR)

  6. TxT: Real-time Transaction Encapsulation for Ethereum Smart Contracts

    Authors: Nikolay Ivanov, Qiben Yan, Anurag Kompalli

    Abstract: Ethereum is a permissionless blockchain ecosystem that supports execution of smart contracts, the key enablers of decentralized finance (DeFi) and non-fungible tokens (NFT). However, the expressiveness of Ethereum smart contracts is a double-edged sword: while it enables blockchain programmability, it also introduces security vulnerabilities, i.e., the exploitable discrepancies between expected an… ▽ More

    Submitted 20 January, 2023; originally announced January 2023.

    Comments: To appear in IEEE Transactions on Information Forensics and Security

  7. arXiv:2211.08654  [pdf, other

    stat.ML cs.LG physics.comp-ph

    Prediction and Uncertainty Quantification of SAFARI-1 Axial Neutron Flux Profiles with Neural Networks

    Authors: Lesego E. Moloko, Pavel M. Bokov, Xu Wu, Kostadin N. Ivanov

    Abstract: Artificial Neural Networks (ANNs) have been successfully used in various nuclear engineering applications, such as predicting reactor physics parameters within reasonable time and with a high level of accuracy. Despite this success, they cannot provide information about the model prediction uncertainties, making it difficult to assess ANN prediction credibility, especially in extrapolated domains.… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Comments: 34 pages, 12 figures

  8. arXiv:2209.09127  [pdf, other

    cs.PL cs.PF

    Is Rust C++-fast? Benchmarking System Languages on Everyday Routines

    Authors: Nikolay Ivanov

    Abstract: Rust is a relatively new system programming language that has been experiencing a rapid adoption in the past 10 years. Rust incorporates a memory ownership model enforced at a compile time. Since this model involves zero runtime overhead, programs written in Rust are not only memory-safe but also fast, leading to performance comparable to C and C++. Multiple existing benchmarks comparing the perfo… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Comments: Michigan State University

  9. arXiv:2209.08370  [pdf, other

    cs.CR

    Decentralization Paradox: A Study of Hegemonic and Risky ERC-20 Tokens

    Authors: Nikolay Ivanov, Qiben Yan

    Abstract: In this work, we explore the class of Ethereum smart contracts called the administrated ERC20 tokens. We demonstrate that these contracts are more owner-controlled and less safe than the services they try to disrupt, such as banks and centralized online payment systems. We develop a binary classifier for identification of administrated ERC20 tokens, and conduct extensive data analysis, which revea… ▽ More

    Submitted 17 September, 2022; originally announced September 2022.

    Comments: 2022 Engineering Graduate Research Symposium (EGRS)

  10. arXiv:2209.08356  [pdf, other

    cs.CR

    Et tu, Blockchain? Outsmarting Smart Contracts via Social Engineering

    Authors: Nikolay Ivanov, Qiben Yan

    Abstract: We reveal six zero-day social engineering attacks in Ethereum, and subdivide them into two classes: Address Manipulation and Homograph. We demonstrate the attacks by embedding them in source codes of five popular smart contracts with combined market capitalization of over \$29 billion, and show that the attacks have the ability to remain dormant during the testing phase and activate only after pro… ▽ More

    Submitted 17 September, 2022; originally announced September 2022.

    Comments: 14th annual Graduate Academic Conference (GAC). arXiv admin note: text overlap with arXiv:2105.00132

  11. arXiv:2205.14496  [pdf, other

    cs.SD cs.HC cs.LG eess.AS

    SuperVoice: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech

    Authors: Hanqing Guo, Qiben Yan, Nikolay Ivanov, Ying Zhu, Li Xiao, Eric J. Hunter

    Abstract: Voice-activated systems are integrated into a variety of desktop, mobile, and Internet-of-Things (IoT) devices. However, voice spoofing attacks, such as impersonation and replay attacks, in which malicious attackers synthesize the voice of a victim or simply replay it, have brought growing security concerns. Existing speaker verification techniques distinguish individual speakers via the spectrogr… ▽ More

    Submitted 28 May, 2022; originally announced May 2022.

  12. arXiv:2108.14004  [pdf, other

    cs.CR

    EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion

    Authors: Nikolay Ivanov, Qiben Yan

    Abstract: Hardware wallets are designed to withstand malware attacks by isolating their private keys from the cyberspace, but they are vulnerable to the attacks that fake an address stored in a clipboard. To prevent such attacks, a hardware wallet asks the user to verify the recipient address shown on the wallet display. Since crypto addresses are long sequences of random symbols, their manual verification… ▽ More

    Submitted 31 August, 2021; originally announced August 2021.

    Comments: IEEE Conference on Communications and Network Security (CNS 2021)

  13. arXiv:2107.10979  [pdf, other

    cs.CR cs.CY cs.DC

    Rectifying Administrated ERC20 Tokens

    Authors: Nikolay Ivanov, Hanqing Guo, Qiben Yan

    Abstract: The developers of Ethereum smart contracts often implement administrating patterns, such as censoring certain users, creating or destroying balances on demand, destroying smart contracts, or injecting arbitrary code. These routines turn an ERC20 token into an administrated token - the type of Ethereum smart contract that we scrutinize in this research. We discover that many smart contracts are adm… ▽ More

    Submitted 17 July, 2021; originally announced July 2021.

    Comments: 23rd International Conference on Information and Communications Security (ICICS 2021)

  14. arXiv:2107.08490  [pdf, other

    cs.DC cs.CR cs.NI eess.SY

    System-Wide Security for Offline Payment Terminals

    Authors: Nikolay Ivanov, Qiben Yan

    Abstract: Most self-service payment terminals require network connectivity for processing electronic payments. The necessity to maintain network connectivity increases costs, introduces cybersecurity risks, and significantly limits the number of places where the terminals can be installed. Leading payment service providers have proposed offline payment solutions that rely on algorithmically generated paymen… ▽ More

    Submitted 18 July, 2021; originally announced July 2021.

    Comments: 17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2021)

  15. arXiv:2107.04904  [pdf, other

    cs.DC cs.PF

    Blockumulus: A Scalable Framework for Smart Contracts on the Cloud

    Authors: Nikolay Ivanov, Qiben Yan, Qingyang Wang

    Abstract: Public blockchains have spurred the growing popularity of decentralized transactions and smart contracts, but they exhibit limitations on the transaction throughput, storage, and computation. To avoid transaction gridlock, public blockchains impose large fees and per-block resource limits, making it difficult to accommodate the ever-growing transaction demand. Previous research endeavors to improv… ▽ More

    Submitted 10 July, 2021; originally announced July 2021.

    Comments: 41st IEEE International Conference on Distributed Computing Systems (ICDCS 2021)

  16. arXiv:2105.14194  [pdf, other

    q-fin.ST cs.AI cs.CE cs.LG

    Constraint-Based Inference of Heuristics for Foreign Exchange Trade Model Optimization

    Authors: Nikolay Ivanov, Qiben Yan

    Abstract: The Foreign Exchange (Forex) is a large decentralized market, on which trading analysis and algorithmic trading are popular. Research efforts have been focusing on proof of efficiency of certain technical indicators. We demonstrate, however, that the values of indicator functions are not reproducible and often reduce the number of trade opportunities, compared to price-action trading. In this wo… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

    Comments: 8 pages

  17. arXiv:2105.00132  [pdf, other

    cs.CR

    Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts

    Authors: Nikolay Ivanov, Jianzhi Lou, Ting Chen, ** Li, Qiben Yan

    Abstract: Ethereum holds multiple billions of U.S. dollars in the form of Ether cryptocurrency and ERC-20 tokens, with millions of deployed smart contracts algorithmically operating these funds. Unsurprisingly, the security of Ethereum smart contracts has been under rigorous scrutiny. In recent years, numerous defense tools have been developed to detect different types of smart contract code vulnerabilities… ▽ More

    Submitted 29 May, 2021; v1 submitted 30 April, 2021; originally announced May 2021.

    Comments: ACM ASIA Conference on Computer and Communications Security 2021, 15 pages

  18. A system of relational syllogistic incorporating full Boolean reasoning

    Authors: Nikolay Ivanov, Dimiter Vakarelov

    Abstract: We present a system of relational syllogistic, based on classical propositional logic, having primitives of the following form: Some A are R-related to some B; Some A are R-related to all B; All A are R-related to some B; All A are R-related to all B. Such primitives formalize sentences from natural language like `All students read some textbooks'. Here A and B denote arbitrary sets (of… ▽ More

    Submitted 23 January, 2013; v1 submitted 22 February, 2011; originally announced February 2011.

    Comments: Available at http://link.springer.com/article/10.1007/s10849-012-9165-1

    MSC Class: 03B65

    Journal ref: Journal of Logic, Language and Information, 21 (2012) 433-459