Skip to main content

Showing 1–34 of 34 results for author: Jensen, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.05003  [pdf, other

    cs.RO cs.HC

    Designs for Enabling Collaboration in Human-Machine Teaming via Interactive and Explainable Systems

    Authors: Rohan Paleja, Michael Munje, Kimberlee Chang, Reed Jensen, Matthew Gombolay

    Abstract: Collaborative robots and machine learning-based virtual agents are increasingly entering the human workspace with the aim of increasing productivity and enhancing safety. Despite this, we show in a ubiquitous experimental domain, Overcooked-AI, that state-of-the-art techniques for human-machine teaming (HMT), which rely on imitation or reinforcement learning, are brittle and result in a machine ag… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  2. arXiv:2404.11076  [pdf

    cs.HC

    Do you need a DAO?

    Authors: Henrik Axelsen, Johannes Rude Jensen, Omri Ross

    Abstract: Decentralized Autonomous Organizations (DAOs) have seen exponential growth and interest due to their potential to redefine organizational structure and governance. Despite this, there is a discrepancy between the ideals of autonomy and decentralization and the actual experiences of DAO stakeholders. The Information Systems (IS) literature has yet to fully explore whether DAOs are the optimal organ… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

    ACM Class: C.2.4; H.5.3; K.4.3

    Journal ref: The European Conference on Information Systems (ECIS) 2024

  3. arXiv:2403.08429  [pdf, ps, other

    cs.SE cs.AI

    Software Vulnerability and Functionality Assessment using LLMs

    Authors: Rasmus Ingemann Tuffveson Jensen, Vali Tawosi, Salwa Alamir

    Abstract: While code review is central to the software development process, it can be tedious and expensive to carry out. In this paper, we investigate whether and how Large Language Models (LLMs) can aid with code reviews. Our investigation focuses on two tasks that we argue are fundamental to good reviews: (i) flagging code with security vulnerabilities and (ii) performing software functionality validatio… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

    Comments: 4 pages, accepted to NLBSE'24

  4. arXiv:2402.05401  [pdf, other

    cs.LG cs.NE stat.ML

    Adaptive Activation Functions for Predictive Modeling with Sparse Experimental Data

    Authors: Farhad Pourkamali-Anaraki, Tahamina Nasrin, Robert E. Jensen, Amy M. Peterson, Christopher J. Hansen

    Abstract: A pivotal aspect in the design of neural networks lies in selecting activation functions, crucial for introducing nonlinear structures that capture intricate input-output patterns. While the effectiveness of adaptive or trainable activation functions has been studied in domains with ample data, like image classification problems, significant gaps persist in understanding their influence on classif… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

    Comments: 7 figures

  5. arXiv:2310.16969  [pdf, other

    cs.CY cs.CR

    Security Patchworking in Lebanon: Infrastructuring Across Failing Infrastructures

    Authors: Jessica McClearn, Rikke Bjerg Jensen, Reem Talhouk

    Abstract: In this paper we bring to light the infrastructuring work carried out by people in Lebanon to establish and maintain everyday security in response to multiple simultaneously failing infrastructures. We do so through interviews with 13 participants from 12 digital and human rights organisations and two weeks of ethnographically informed fieldwork in Beirut, Lebanon, in July 2022. Through our analys… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

    Comments: To appear at ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW) 2024

  6. arXiv:2306.10149  [pdf, other

    cs.CY cs.CR

    Othered, Silenced and Scapegoated: Understanding the Situated Security of Marginalised Populations in Lebanon

    Authors: Jessica McClearn, Rikke Bjerg Jensen, Reem Talhouk

    Abstract: In this paper we explore the digital security experiences of marginalised populations in Lebanon such as LGBTQI+ identifying people, refugees and women. We situate our work in the post-conflict Lebanese context, which is shaped by sectarian divides, failing governance and economic collapse. We do so through an ethnographically informed study conducted in Beirut, Lebanon, in July 2022 and through i… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

    Comments: To appear at the USENIX Security Symposium 2023

  7. arXiv:2306.05122  [pdf

    cs.CY

    Can AI Moderate Online Communities?

    Authors: Henrik Axelsen, Johannes Rude Jensen, Sebastian Axelsen, Valdemar Licht, Omri Ross

    Abstract: The task of cultivating healthy communication in online communities becomes increasingly urgent, as gaming and social media experiences become progressively more immersive and life-like. We approach the challenge of moderating online communities by training student models using a large language model (LLM). We use zero-shot learning models to distill and expand datasets followed by a few-shot lear… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

  8. When is a DAO Decentralized?

    Authors: Henrik Axelsen, Johannes Rude Jensen, Omri Ross

    Abstract: While previously a nascent theoretical construct, decentralized autonomous organizations have grown rapidly in recent years. DAOs typically emerge around the management of decentralized financial applications and thus benefit from the rapid growth of innovation in this sector. In response, global regulators increasingly voice the intent to regulate these activities. This may impose an excessive co… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

    Journal ref: Complex Systems Informatics and Modeling Quarterly No 31 (2022)

  9. arXiv:2304.08154  [pdf

    cs.DC

    Trading green bonds using distributed ledger technology

    Authors: Henrik Axelsen, Ulrik Rasmussen, Johannes Rude Jensen, Omri Ross, Fritz Henglein

    Abstract: The promising markets for voluntary carbon credits are faced with crippling challenges to the certification of carbon sequestration and the lack of scalable market infrastructure in which companies and institutions can invest in carbon offsetting. This amounts to a funding problem for green transition projects, such as in the agricultural sector, since farmers need access to the liquidity needed t… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

  10. arXiv:2303.04430  [pdf, other

    cs.CR cs.DC

    Multi-block MEV

    Authors: Johannes Rude Jensen, Victor von Wachter, Omri Ross

    Abstract: Multi-block MEV (MMEV) denotes the practice of securing k-consecutive blocks in an attempt at extracting surplus value by manipulating transaction ordering. Following the implementation of pro-poser/builder separation (PBS) on Ethereum, savvy builders can secure consecutive block space by implementing targeted bidding strategies through relays. To estimate the extent to which this practice might b… ▽ More

    Submitted 12 June, 2023; v1 submitted 8 March, 2023; originally announced March 2023.

  11. arXiv:2302.12048  [pdf, ps, other

    eess.AS cs.SD

    Frequency bin-wise single channel speech presence probability estimation using multiple DNNs

    Authors: Shuai Tao, Himavanth Reddy, Jesper Rindom Jensen, Mads Græsbøll Christensen

    Abstract: In this work, we propose a frequency bin-wise method to estimate the single-channel speech presence probability (SPP) with multiple deep neural networks (DNNs) in the short-time Fourier transform domain. Since all frequency bins are typically considered simultaneously as input features for conventional DNN-based SPP estimators, high model complexity is inevitable. To reduce the model complexity an… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

    Comments: Accepted for ICASSP 2023

  12. arXiv:2210.06345  [pdf, other

    cs.CL cs.IR cs.LG

    Variational Open-Domain Question Answering

    Authors: Valentin Liévin, Andreas Geert Motzfeldt, Ida Riis Jensen, Ole Winther

    Abstract: Retrieval-augmented models have proven to be effective in natural language processing tasks, yet there remains a lack of research on their optimization using variational inference. We introduce the Variational Open-Domain (VOD) framework for end-to-end training and evaluation of retrieval-augmented models, focusing on open-domain question answering and language modelling. The VOD objective, a self… ▽ More

    Submitted 31 May, 2023; v1 submitted 23 September, 2022; originally announced October 2022.

    Comments: 28 pages, 5 figures. Accepted at ICML 2023

    ACM Class: I.2.7; H.3.3; I.2.1

  13. arXiv:2209.03943  [pdf, other

    cs.AI cs.HC

    The Utility of Explainable AI in Ad Hoc Human-Machine Teaming

    Authors: Rohan Paleja, Muyleng Ghuy, Nadun Ranawaka Arachchige, Reed Jensen, Matthew Gombolay

    Abstract: Recent advances in machine learning have led to growing interest in Explainable AI (xAI) to enable humans to gain insight into the decision-making of machine learning models. Despite this recent interest, the utility of xAI techniques has not yet been characterized in human-machine teaming. Importantly, xAI offers the promise of enhancing team situational awareness (SA) and shared mental model dev… ▽ More

    Submitted 8 September, 2022; originally announced September 2022.

    Comments: Part of Advances in Neural Information Processing Systems 34 (NeurIPS 2021)

  14. arXiv:2206.03270  [pdf

    cs.CY cs.HC

    DLT Compliance Reporting

    Authors: Henrik Axelsen, Johannes Rude Jensen, Omri Ross

    Abstract: The IS discourse on the potential of distributed ledger technology (DLT) in the financial services has grown at a tremendous pace in recent years. Yet, little has been said about the related implications for the costly and highly regulated process of compliance reporting. Working with a group of representatives from industry and regulatory authorities, we employ the design science research methodo… ▽ More

    Submitted 31 May, 2022; originally announced June 2022.

    Comments: Regulatory reporting, DLT, Compliance, Blockchain, Governance, 3 lines of defense, DSR, Design Science Research, EU supervisory data strategy, supervision

  15. arXiv:2202.12755  [pdf, ps, other

    cs.CY cs.CR

    'Cyber security is a dark art': The CISO as soothsayer

    Authors: Joseph Da Silva, Rikke Bjerg Jensen

    Abstract: Commercial organisations continue to face a growing and evolving threat of data breaches and system compromises, making their cyber-security function critically important. Many organisations employ a Chief Information Security Officer (CISO) to lead such a function. We conducted in-depth, semi-structured interviews with 15 CISOs and six senior organisational leaders, between October 2019 and July… ▽ More

    Submitted 25 February, 2022; originally announced February 2022.

    Comments: To appear at ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW) 2022

  16. arXiv:2202.03866  [pdf, other

    cs.CR

    NFT Wash Trading: Quantifying suspicious behaviour in NFT markets

    Authors: Victor von Wachter, Johannes Rude Jensen, Ferdinand Regner, Omri Ross

    Abstract: The smart contract-based markets for non-fungible tokens (NFTs) on the Ethereum blockchain have seen tremendous growth in 2021, with trading volumes peaking at 3.5b in September 2021. This dramatic surge has led to industry observers questioning the authenticity of on-chain volumes, given the absence of identity requirements and the ease with which agents can control multiple addresses. We examine… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

    Comments: DeFi, Blockchain, NFT, wash trading, graph analysis Financial Cryptography & Data Security 2022 (To appear)

  17. arXiv:2201.04207  [pdf, other

    stat.ML cs.LG

    Fighting Money Laundering with Statistics and Machine Learning

    Authors: Rasmus Jensen, Alexandros Iosifidis

    Abstract: Money laundering is a profound global problem. Nonetheless, there is little scientific literature on statistical and machine learning methods for anti-money laundering. In this paper, we focus on anti-money laundering in banks and provide an introduction and review of the literature. We propose a unifying terminology with two central elements: (i) client risk profiling and (ii) suspicious behavior… ▽ More

    Submitted 21 March, 2023; v1 submitted 11 January, 2022; originally announced January 2022.

    Comments: Accepted for publication in IEEE Access, vol. 11, pp. 8889-8903, doi:10.1109/ACCESS.2023.3239549

  18. arXiv:2105.14869  [pdf, other

    cs.CR

    Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong

    Authors: Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková

    Abstract: The Anti-Extradition Law Amendment Bill protests in Hong Kong present a rich context for exploring information security practices among protesters due to their large-scale urban setting and highly digitalised nature. We conducted in-depth, semi-structured interviews with 11 participants of these protests. Research findings reveal how protesters favoured Telegram and relied on its security for inte… ▽ More

    Submitted 31 May, 2021; originally announced May 2021.

  19. arXiv:2105.02782  [pdf

    q-fin.TR cs.CE

    The Homogenous Properties of Automated Market Makers

    Authors: Johannes Rude Jensen, Mohsen Pourpouneh, Kurt Nielsen, Omri Ross

    Abstract: Automated market makers (AMM) have grown to obtain significant market share within the cryptocurrency ecosystem, resulting in a proliferation of new products pursuing exotic strategies for horizontal differentiation. Yet, their theoretical properties are curiously homogeneous when a set of basic assumptions are met. In this paper, we start by presenting a universal approach to deriving a formula f… ▽ More

    Submitted 31 March, 2021; originally announced May 2021.

    Comments: Automated Market Maker, DeFi, Blockchain, Constant Function Market Maker

  20. arXiv:2102.13488  [pdf

    cs.CR

    Leveraged Trading on Blockchain Technology

    Authors: Johannes Rude Jensen, Victor von Wachter, Omri Ross

    Abstract: We document an ongoing research process towards the implementation and integration of a digital artefact, executing the lifecycle of a leveraged trade with permissionless blockchain technology. By employing core functions of the 'Dai Stablecoin system' deployed on the Ethereum blockchain, we produce the equivalent exposure of a leveraged position while deterministically automating the monitoring a… ▽ More

    Submitted 25 February, 2021; originally announced February 2021.

    Comments: Blockchain Technology, Distributed Ledger Technology, Leveraged Trading, Design Science Research, Decentralized Finance (DeFi)

  21. Measuring Asset Composability as a Proxy for DeFi Integration

    Authors: Victor von Wachter, Johannes Rude Jensen, Omri Ross

    Abstract: Decentralized financial (DeFi) applications on the Ethereum blockchain are highly interoperable because they share a single state in a deterministic computational environment. Stakeholders can deposit claims on assets, referred to as 'liquidity shares', across applications producing effects equivalent to rehypothecation in traditional financial systems. We seek to understand the degree to which th… ▽ More

    Submitted 29 March, 2021; v1 submitted 2 February, 2021; originally announced February 2021.

    Comments: Blockchain, DeFi, Asset Composability, Ethereum

    Journal ref: International Conference on Financial Cryptography and Data Security (2021)

  22. arXiv:2011.00251  [pdf, ps, other

    cs.CY

    Fragmented digital connectivity and security at sea

    Authors: Rikke Bjerg Jensen

    Abstract: This paper explores how uneven and often unreliable digital connections shape the patterns and routines of everyday life, work and rest for seafarers, during long periods at sea. Such fragmented connections, which surface when the ship moves in and out of connectivity or when onboard data allowances run out, create a series of uncertainties that might unsettle individual and collective notions of… ▽ More

    Submitted 31 October, 2020; originally announced November 2020.

  23. arXiv:2010.06377  [pdf, ps, other

    cs.CR

    The Vacuity of the Open Source Security Testing Methodology Manual

    Authors: Martin R. Albrecht, Rikke Bjerg Jensen

    Abstract: The Open Source Security Testing Methodology Manual (OSSTMM) provides a "scientific methodology for the accurate characterization of operational security" [Her10, p.13]. It is extensively referenced in writings aimed at security testing professionals such as textbooks, standards and academic papers. In this work we offer a fundamental critique of OSSTMM and argue that it fails to deliver on its pr… ▽ More

    Submitted 13 October, 2020; originally announced October 2020.

  24. arXiv:2004.11768  [pdf

    cs.CY

    Cyber Security Behaviour In Organisations

    Authors: Amy Ertan, Georgia Crossland, Claude Heath, David Denny, Rikke Jensen

    Abstract: This review explores the academic and policy literature in the context of everyday cyber security in organisations. In so doing, it identifies four behavioural sets that influences how people practice cyber security. These are compliance with security policy, intergroup coordination and communication, phishing/email behaviour, and password behaviour. However, it is important to note that these are… ▽ More

    Submitted 24 April, 2020; originally announced April 2020.

    Comments: 31 pages, no figures

  25. arXiv:1905.11785  [pdf, other

    eess.AS cs.SD

    Automatic Quality Control and Enhancement for Voice-Based Remote Parkinson's Disease Detection

    Authors: Amir Hossein Poorjam, Mathew Shaji Kavalekalam, Liming Shi, Yordan P. Raykov, Jesper Rindom Jensen, Max A. Little, Mads Græsbøll Christensen

    Abstract: The performance of voice-based Parkinson's disease (PD) detection systems degrades when there is an acoustic mismatch between training and operating conditions caused mainly by degradation in test signals. In this paper, we address this mismatch by considering three types of degradation commonly encountered in remote voice analysis, namely background noise, reverberation and nonlinear distortion,… ▽ More

    Submitted 31 May, 2019; v1 submitted 28 May, 2019; originally announced May 2019.

    Comments: Preprint, 12 pages, 6 figures

  26. arXiv:1905.08557  [pdf, other

    cs.SD cs.LG eess.AS

    Bayesian Pitch Tracking Based on the Harmonic Model

    Authors: Liming Shi, Jesper Kjaer Nielsen, Jesper Rindom Jensen, Max A. Little, Mads Graesboll Christensen

    Abstract: Fundamental frequency is one of the most important characteristics of speech and audio signals. Harmonic model-based fundamental frequency estimators offer a higher estimation accuracy and robustness against noise than the widely used autocorrelation-based methods. However, the traditional harmonic model-based estimators do not take the temporal smoothness of the fundamental frequency, the model o… ▽ More

    Submitted 21 May, 2019; originally announced May 2019.

  27. arXiv:1805.04220  [pdf, other

    cs.AI cs.LG

    Human-Machine Collaborative Optimization via Apprenticeship Scheduling

    Authors: Matthew Gombolay, Reed Jensen, Jessica Stigile, Toni Golen, Neel Shah, Sung-Hyun Son, Julie Shah

    Abstract: Coordinating agents to complete a set of tasks with intercoupled temporal and resource constraints is computationally challenging, yet human domain experts can solve these difficult scheduling problems using paradigms learned through years of apprenticeship. A process for manually codifying this domain knowledge within a computational framework is necessary to scale beyond the ``single-expert, sin… ▽ More

    Submitted 10 May, 2018; originally announced May 2018.

    Comments: Portions of this paper were published in the Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI) in 2016 and in the Proceedings of Robotics: Science and Systems (RSS) in 2016. The paper consists of 50 pages with 11 figures and 4 tables

  28. Network Traffic Driven Storage Repair

    Authors: Danilo Gligoroski, Katina Kralevska, Rune E. Jensen, Per Simonsen

    Abstract: Recently we constructed an explicit family of locally repairable and locally regenerating codes. Their existence was proven by Kamath et al. but no explicit construction was given. Our design is based on HashTag codes that can have different sub-packetization levels. In this work we emphasize the importance of having two ways to repair a node: repair only with local parity nodes or repair with bot… ▽ More

    Submitted 25 June, 2018; v1 submitted 9 March, 2018; originally announced March 2018.

    Comments: arXiv admin note: text overlap with arXiv:1701.06664

    Report number: Published in International Journal of Big Data Intelligence, 2018

  29. arXiv:1706.07927  [pdf, other

    cs.SD cs.LG

    A Variational EM Method for Pole-Zero Modeling of Speech with Mixed Block Sparse and Gaussian Excitation

    Authors: Liming Shi, Jesper Kjær Nielsen, Jesper Rindom Jensen, Mads Græsbøll Christensen

    Abstract: The modeling of speech can be used for speech synthesis and speech recognition. We present a speech analysis method based on pole-zero modeling of speech with mixed block sparse and Gaussian excitation. By using a pole-zero model, instead of the all-pole model, a better spectral fitting can be expected. Moreover, motivated by the block sparse glottal flow excitation during voiced speech and the wh… ▽ More

    Submitted 24 June, 2017; originally announced June 2017.

    Comments: Accepted in the 25th European Signal Processing Conference (EUSIPCO 2017), published by EUROSIP, scheduled for Aug. 28 - Sep. 2 in Kos island, Greece

  30. Repair Duality with Locally Repairable and Locally Regenerating Codes

    Authors: Danilo Gligoroski, Katina Kralevska, Rune E. Jensen, Per Simonsen

    Abstract: We construct an explicit family of locally repairable and locally regenerating codes whose existence was proven in a recent work by Kamath et al. about codes with local regeneration but no explicit construction was given. This explicit family of codes is based on HashTag codes. HashTag codes are recently defined vector codes with different vector length $α$ (also called a sub-packetization level)… ▽ More

    Submitted 30 August, 2017; v1 submitted 23 January, 2017; originally announced January 2017.

    Comments: Accepted as a full paper for publication at IEEE DataCom 2017

    Journal ref: 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), Orlando, FL, 2017, pp. 979-984

  31. HashTag Erasure Codes: From Theory to Practice

    Authors: Katina Kralevska, Danilo Gligoroski, Rune E. Jensen, Harald Øverby

    Abstract: Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. Although several MSR constructions exist, so far they have not been practically implemented mainly due to the big number of I/O operations. In this paper, we analyze high-rate MDS co… ▽ More

    Submitted 3 July, 2017; v1 submitted 8 September, 2016; originally announced September 2016.

    Comments: Submitted to IEEE Transactions on Big Data

    Journal ref: Published in: IEEE Transactions on Big Data Volume: 4 , Issue: 4 , Dec. 1 2018

  32. OBDD-based Universal Planning for Synchronized Agents in Non-Deterministic Domains

    Authors: R. M. Jensen, M. M. Veloso

    Abstract: Recently model checking representation and search techniques were shown to be efficiently applicable to planning, in particular to non-deterministic planning. Such planning approaches use Ordered Binary Decision Diagrams (OBDDs) to encode a planning domain as a non-deterministic finite automaton and then apply fast algorithms from model checking to search for a solution. OBDDs can e… ▽ More

    Submitted 1 June, 2011; originally announced June 2011.

    Journal ref: Journal Of Artificial Intelligence Research, Volume 13, pages 189-226, 2000

  33. arXiv:1010.3163  [pdf, ps, other

    cs.CR

    The Digital Signature Scheme MQQ-SIG

    Authors: Danilo Gligoroski, Svein Johan Knapskog, Smile Markovski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère

    Abstract: This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientific publication covering the design rationale and the security analysis will be given in a separate publication. MQQ-SIG consists of $n - \frac{n}{4}$ quadratic polynomials with $n$ Boolean variables where n=160, 196, 224 or 256.

    Submitted 15 October, 2010; originally announced October 2010.

  34. arXiv:0704.1394  [pdf, ps, other

    cs.AI

    Calculating Valid Domains for BDD-Based Interactive Configuration

    Authors: Tarik Hadzic, Rune Moller Jensen, Henrik Reif Andersen

    Abstract: In these notes we formally describe the functionality of Calculating Valid Domains from the BDD representing the solution space of valid configurations. The formalization is largely based on the CLab configuration framework.

    Submitted 11 April, 2007; originally announced April 2007.