-
Designs for Enabling Collaboration in Human-Machine Teaming via Interactive and Explainable Systems
Authors:
Rohan Paleja,
Michael Munje,
Kimberlee Chang,
Reed Jensen,
Matthew Gombolay
Abstract:
Collaborative robots and machine learning-based virtual agents are increasingly entering the human workspace with the aim of increasing productivity and enhancing safety. Despite this, we show in a ubiquitous experimental domain, Overcooked-AI, that state-of-the-art techniques for human-machine teaming (HMT), which rely on imitation or reinforcement learning, are brittle and result in a machine ag…
▽ More
Collaborative robots and machine learning-based virtual agents are increasingly entering the human workspace with the aim of increasing productivity and enhancing safety. Despite this, we show in a ubiquitous experimental domain, Overcooked-AI, that state-of-the-art techniques for human-machine teaming (HMT), which rely on imitation or reinforcement learning, are brittle and result in a machine agent that aims to decouple the machine and human's actions to act independently rather than in a synergistic fashion. To remedy this deficiency, we develop HMT approaches that enable iterative, mixed-initiative team development allowing end-users to interactively reprogram interpretable AI teammates. Our 50-subject study provides several findings that we summarize into guidelines. While all approaches underperform a simple collaborative heuristic (a critical, negative result for learning-based methods), we find that white-box approaches supported by interactive modification can lead to significant team development, outperforming white-box approaches alone, and black-box approaches are easier to train and result in better HMT performance highlighting a tradeoff between explainability and interactivity versus ease-of-training. Together, these findings present three important directions: 1) Improving the ability to generate collaborative agents with white-box models, 2) Better learning methods to facilitate collaboration rather than individualized coordination, and 3) Mixed-initiative interfaces that enable users, who may vary in ability, to improve collaboration.
△ Less
Submitted 7 June, 2024;
originally announced June 2024.
-
Do you need a DAO?
Authors:
Henrik Axelsen,
Johannes Rude Jensen,
Omri Ross
Abstract:
Decentralized Autonomous Organizations (DAOs) have seen exponential growth and interest due to their potential to redefine organizational structure and governance. Despite this, there is a discrepancy between the ideals of autonomy and decentralization and the actual experiences of DAO stakeholders. The Information Systems (IS) literature has yet to fully explore whether DAOs are the optimal organ…
▽ More
Decentralized Autonomous Organizations (DAOs) have seen exponential growth and interest due to their potential to redefine organizational structure and governance. Despite this, there is a discrepancy between the ideals of autonomy and decentralization and the actual experiences of DAO stakeholders. The Information Systems (IS) literature has yet to fully explore whether DAOs are the optimal organizational choice. Addressing this gap, our research asks, "Is a DAO suitable for your organizational needs?" We derive a gated decision-making framework through a thematic review of the academic and grey literature on DAOs. Through five scenarios, the framework critically emphasizes the gaps between DAOs' theoretical capabilities and practical challenges. Our findings contribute to the IS discourse on blockchain technologies, with some ancillary contributions to the IS literature on organizational management and practitioner literature.
△ Less
Submitted 17 April, 2024;
originally announced April 2024.
-
Software Vulnerability and Functionality Assessment using LLMs
Authors:
Rasmus Ingemann Tuffveson Jensen,
Vali Tawosi,
Salwa Alamir
Abstract:
While code review is central to the software development process, it can be tedious and expensive to carry out. In this paper, we investigate whether and how Large Language Models (LLMs) can aid with code reviews. Our investigation focuses on two tasks that we argue are fundamental to good reviews: (i) flagging code with security vulnerabilities and (ii) performing software functionality validatio…
▽ More
While code review is central to the software development process, it can be tedious and expensive to carry out. In this paper, we investigate whether and how Large Language Models (LLMs) can aid with code reviews. Our investigation focuses on two tasks that we argue are fundamental to good reviews: (i) flagging code with security vulnerabilities and (ii) performing software functionality validation, i.e., ensuring that code meets its intended functionality. To test performance on both tasks, we use zero-shot and chain-of-thought prompting to obtain final ``approve or reject'' recommendations. As data, we employ seminal code generation datasets (HumanEval and MBPP) along with expert-written code snippets with security vulnerabilities from the Common Weakness Enumeration (CWE). Our experiments consider a mixture of three proprietary models from OpenAI and smaller open-source LLMs. We find that the former outperforms the latter by a large margin. Motivated by promising results, we finally ask our models to provide detailed descriptions of security vulnerabilities. Results show that 36.7% of LLM-generated descriptions can be associated with true CWE vulnerabilities.
△ Less
Submitted 13 March, 2024;
originally announced March 2024.
-
Adaptive Activation Functions for Predictive Modeling with Sparse Experimental Data
Authors:
Farhad Pourkamali-Anaraki,
Tahamina Nasrin,
Robert E. Jensen,
Amy M. Peterson,
Christopher J. Hansen
Abstract:
A pivotal aspect in the design of neural networks lies in selecting activation functions, crucial for introducing nonlinear structures that capture intricate input-output patterns. While the effectiveness of adaptive or trainable activation functions has been studied in domains with ample data, like image classification problems, significant gaps persist in understanding their influence on classif…
▽ More
A pivotal aspect in the design of neural networks lies in selecting activation functions, crucial for introducing nonlinear structures that capture intricate input-output patterns. While the effectiveness of adaptive or trainable activation functions has been studied in domains with ample data, like image classification problems, significant gaps persist in understanding their influence on classification accuracy and predictive uncertainty in settings characterized by limited data availability. This research aims to address these gaps by investigating the use of two types of adaptive activation functions. These functions incorporate shared and individual trainable parameters per hidden layer and are examined in three testbeds derived from additive manufacturing problems containing fewer than one hundred training instances. Our investigation reveals that adaptive activation functions, such as Exponential Linear Unit (ELU) and Softplus, with individual trainable parameters, result in accurate and confident prediction models that outperform fixed-shape activation functions and the less flexible method of using identical trainable activation functions in a hidden layer. Therefore, this work presents an elegant way of facilitating the design of adaptive neural networks in scientific and engineering problems.
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
Security Patchworking in Lebanon: Infrastructuring Across Failing Infrastructures
Authors:
Jessica McClearn,
Rikke Bjerg Jensen,
Reem Talhouk
Abstract:
In this paper we bring to light the infrastructuring work carried out by people in Lebanon to establish and maintain everyday security in response to multiple simultaneously failing infrastructures. We do so through interviews with 13 participants from 12 digital and human rights organisations and two weeks of ethnographically informed fieldwork in Beirut, Lebanon, in July 2022. Through our analys…
▽ More
In this paper we bring to light the infrastructuring work carried out by people in Lebanon to establish and maintain everyday security in response to multiple simultaneously failing infrastructures. We do so through interviews with 13 participants from 12 digital and human rights organisations and two weeks of ethnographically informed fieldwork in Beirut, Lebanon, in July 2022. Through our analysis we develop the notion of security patchworking that makes visible the infrastructuring work necessitated to secure basic needs such as electricity provision, identity authentication and financial resources. Such practices are rooted in differing mechanisms of protection that often result in new forms of insecurity. We discuss the implications for CSCW and HCI researchers and point to security patchworking as a lens to be used when designing technologies to support infrastructuring, while advocating for collaborative work across CSCW and security research.
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
Othered, Silenced and Scapegoated: Understanding the Situated Security of Marginalised Populations in Lebanon
Authors:
Jessica McClearn,
Rikke Bjerg Jensen,
Reem Talhouk
Abstract:
In this paper we explore the digital security experiences of marginalised populations in Lebanon such as LGBTQI+ identifying people, refugees and women. We situate our work in the post-conflict Lebanese context, which is shaped by sectarian divides, failing governance and economic collapse. We do so through an ethnographically informed study conducted in Beirut, Lebanon, in July 2022 and through i…
▽ More
In this paper we explore the digital security experiences of marginalised populations in Lebanon such as LGBTQI+ identifying people, refugees and women. We situate our work in the post-conflict Lebanese context, which is shaped by sectarian divides, failing governance and economic collapse. We do so through an ethnographically informed study conducted in Beirut, Lebanon, in July 2022 and through interviews with 13 people with Lebanese digital and human rights expertise. Our research highlights how LGBTQI+ identifying people and refugees are scapegoated for the failings of the Lebanese government, while women who speak out against such failings are silenced. We show how government-supported incitements of violence aimed at transferring blame from the political leadership to these groups lead to amplified digital security risks for already at-risk populations. Positioning our work in broader sociological understandings of security, we discuss how the Lebanese context impacts identity and ontological security. We conclude by proposing to design for and with positive security in post-conflict settings.
△ Less
Submitted 16 June, 2023;
originally announced June 2023.
-
Can AI Moderate Online Communities?
Authors:
Henrik Axelsen,
Johannes Rude Jensen,
Sebastian Axelsen,
Valdemar Licht,
Omri Ross
Abstract:
The task of cultivating healthy communication in online communities becomes increasingly urgent, as gaming and social media experiences become progressively more immersive and life-like. We approach the challenge of moderating online communities by training student models using a large language model (LLM). We use zero-shot learning models to distill and expand datasets followed by a few-shot lear…
▽ More
The task of cultivating healthy communication in online communities becomes increasingly urgent, as gaming and social media experiences become progressively more immersive and life-like. We approach the challenge of moderating online communities by training student models using a large language model (LLM). We use zero-shot learning models to distill and expand datasets followed by a few-shot learning and a fine-tuning approach, leveraging open-access generative pre-trained transformer models (GPT) from OpenAI. Our preliminary findings suggest, that when properly trained, LLMs can excel in identifying actor intentions, moderating toxic comments, and rewarding positive contributions. The student models perform above-expectation in non-contextual assignments such as identifying classically toxic behavior and perform sufficiently on contextual assignments such as identifying positive contributions to online discourse. Further, using open-access models like OpenAI's GPT we experience a step-change in the development process for what has historically been a complex modeling task. We contribute to the information system (IS) discourse with a rapid development framework on the application of generative AI in content online moderation and management of culture in decentralized, pseudonymous communities by providing a sample model suite of industrial-ready generative AI models based on open-access LLMs.
△ Less
Submitted 8 June, 2023;
originally announced June 2023.
-
When is a DAO Decentralized?
Authors:
Henrik Axelsen,
Johannes Rude Jensen,
Omri Ross
Abstract:
While previously a nascent theoretical construct, decentralized autonomous organizations have grown rapidly in recent years. DAOs typically emerge around the management of decentralized financial applications and thus benefit from the rapid growth of innovation in this sector. In response, global regulators increasingly voice the intent to regulate these activities. This may impose an excessive co…
▽ More
While previously a nascent theoretical construct, decentralized autonomous organizations have grown rapidly in recent years. DAOs typically emerge around the management of decentralized financial applications and thus benefit from the rapid growth of innovation in this sector. In response, global regulators increasingly voice the intent to regulate these activities. This may impose an excessive compliance burden on DAOs, unless they are deemed sufficiently decentralized to be regulated. Yet, decentralization is an abstract concept with scarce legal precedence. We investigate dimensions of decentralization through thematic analysis, combining extant literature with a series of expert interviews. We propose a definition of 'sufficient decentralization' and present a general framework for the assessment of decentralization. We derive five dimensions for the assessment of decentralization in DAOs: Token-weighted voting, Infrastructure, Governance, Escalation and Reputation. We present a discretionary sample application of the framework and five propositions on the future regulation and supervision of DAOs. We contribute new practical insights on the topic of compliance and decentralized organizations to the growing discourse on the application of blockchain technology in information systems and management disciplines
△ Less
Submitted 17 April, 2023;
originally announced April 2023.
-
Trading green bonds using distributed ledger technology
Authors:
Henrik Axelsen,
Ulrik Rasmussen,
Johannes Rude Jensen,
Omri Ross,
Fritz Henglein
Abstract:
The promising markets for voluntary carbon credits are faced with crippling challenges to the certification of carbon sequestration and the lack of scalable market infrastructure in which companies and institutions can invest in carbon offsetting. This amounts to a funding problem for green transition projects, such as in the agricultural sector, since farmers need access to the liquidity needed t…
▽ More
The promising markets for voluntary carbon credits are faced with crippling challenges to the certification of carbon sequestration and the lack of scalable market infrastructure in which companies and institutions can invest in carbon offsetting. This amounts to a funding problem for green transition projects, such as in the agricultural sector, since farmers need access to the liquidity needed to fund the transition to sustainable practices. We explore the feasibility of mitigating infrastructural challenges based on a DLT Trading and Settlement System for green bonds. The artefact employs a multi-sharded architecture in which the nodes retain carefully orchestrated responsibilities in the functioning of the network. We evaluate the artefact in a supranational context with an EU-based regulator as part of a regulatory sandbox program targeting the new EU DLT Pilot regime. By conducting design-driven research with stakeholders from industrial and governmental bodies, we contribute to the IS literature on the practical implications of DLT.
△ Less
Submitted 17 April, 2023;
originally announced April 2023.
-
Multi-block MEV
Authors:
Johannes Rude Jensen,
Victor von Wachter,
Omri Ross
Abstract:
Multi-block MEV (MMEV) denotes the practice of securing k-consecutive blocks in an attempt at extracting surplus value by manipulating transaction ordering. Following the implementation of pro-poser/builder separation (PBS) on Ethereum, savvy builders can secure consecutive block space by implementing targeted bidding strategies through relays. To estimate the extent to which this practice might b…
▽ More
Multi-block MEV (MMEV) denotes the practice of securing k-consecutive blocks in an attempt at extracting surplus value by manipulating transaction ordering. Following the implementation of pro-poser/builder separation (PBS) on Ethereum, savvy builders can secure consecutive block space by implementing targeted bidding strategies through relays. To estimate the extent to which this practice might be taking place today, we collect data on all bids submitted by builders through relays in the period from the 15th of September (the merge) 2022 until the 31st of January 2023. We hypothesize that builders might secure consecutive blocks in order to deploy sophisticated MMEV strategies, such as creating artificial momentum in Uniswap pools, by withholding and prioritizing transactions from the mempool. In this talk proposal, we present preliminary and non-conclusive results, indicating the builders employ super-linear bidding strategies to secure consecutive block space. We hypothesize that builders act rationally and increase bids only if this is profitable. With this WIP talk proposal, we hope to stimulate an interesting discussion on the feasibility of sophisticated MMEV strategies at SBC23, with the aim of collecting feedback from researchers and practitioners working on MEV.
△ Less
Submitted 12 June, 2023; v1 submitted 8 March, 2023;
originally announced March 2023.
-
Frequency bin-wise single channel speech presence probability estimation using multiple DNNs
Authors:
Shuai Tao,
Himavanth Reddy,
Jesper Rindom Jensen,
Mads Græsbøll Christensen
Abstract:
In this work, we propose a frequency bin-wise method to estimate the single-channel speech presence probability (SPP) with multiple deep neural networks (DNNs) in the short-time Fourier transform domain. Since all frequency bins are typically considered simultaneously as input features for conventional DNN-based SPP estimators, high model complexity is inevitable. To reduce the model complexity an…
▽ More
In this work, we propose a frequency bin-wise method to estimate the single-channel speech presence probability (SPP) with multiple deep neural networks (DNNs) in the short-time Fourier transform domain. Since all frequency bins are typically considered simultaneously as input features for conventional DNN-based SPP estimators, high model complexity is inevitable. To reduce the model complexity and the requirements on the training data, we take a single frequency bin and some of its neighboring frequency bins into account to train separate gate recurrent units. In addition, the noisy speech and the a posteriori probability SPP representation are used to train our model. The experiments were performed on the Deep Noise Suppression challenge dataset. The experimental results show that the speech detection accuracy can be improved when we employ the frequency bin-wise model. Finally, we also demonstrate that our proposed method outperforms most of the state-of-the-art SPP estimation methods in terms of speech detection accuracy and model complexity.
△ Less
Submitted 23 February, 2023;
originally announced February 2023.
-
Variational Open-Domain Question Answering
Authors:
Valentin Liévin,
Andreas Geert Motzfeldt,
Ida Riis Jensen,
Ole Winther
Abstract:
Retrieval-augmented models have proven to be effective in natural language processing tasks, yet there remains a lack of research on their optimization using variational inference. We introduce the Variational Open-Domain (VOD) framework for end-to-end training and evaluation of retrieval-augmented models, focusing on open-domain question answering and language modelling. The VOD objective, a self…
▽ More
Retrieval-augmented models have proven to be effective in natural language processing tasks, yet there remains a lack of research on their optimization using variational inference. We introduce the Variational Open-Domain (VOD) framework for end-to-end training and evaluation of retrieval-augmented models, focusing on open-domain question answering and language modelling. The VOD objective, a self-normalized estimate of the Rényi variational bound, approximates the task marginal likelihood and is evaluated under samples drawn from an auxiliary sampling distribution (cached retriever and/or approximate posterior). It remains tractable, even for retriever distributions defined on large corpora. We demonstrate VOD's versatility by training reader-retriever BERT-sized models on multiple-choice medical exam questions. On the MedMCQA dataset, we outperform the domain-tuned Med-PaLM by +5.3% despite using 2.500$\times$ fewer parameters. Our retrieval-augmented BioLinkBERT model scored 62.9% on the MedMCQA and 55.0% on the MedQA-USMLE. Last, we show the effectiveness of our learned retriever component in the context of medical semantic search.
△ Less
Submitted 31 May, 2023; v1 submitted 23 September, 2022;
originally announced October 2022.
-
The Utility of Explainable AI in Ad Hoc Human-Machine Teaming
Authors:
Rohan Paleja,
Muyleng Ghuy,
Nadun Ranawaka Arachchige,
Reed Jensen,
Matthew Gombolay
Abstract:
Recent advances in machine learning have led to growing interest in Explainable AI (xAI) to enable humans to gain insight into the decision-making of machine learning models. Despite this recent interest, the utility of xAI techniques has not yet been characterized in human-machine teaming. Importantly, xAI offers the promise of enhancing team situational awareness (SA) and shared mental model dev…
▽ More
Recent advances in machine learning have led to growing interest in Explainable AI (xAI) to enable humans to gain insight into the decision-making of machine learning models. Despite this recent interest, the utility of xAI techniques has not yet been characterized in human-machine teaming. Importantly, xAI offers the promise of enhancing team situational awareness (SA) and shared mental model development, which are the key characteristics of effective human-machine teams. Rapidly develo** such mental models is especially critical in ad hoc human-machine teaming, where agents do not have a priori knowledge of others' decision-making strategies. In this paper, we present two novel human-subject experiments quantifying the benefits of deploying xAI techniques within a human-machine teaming scenario. First, we show that xAI techniques can support SA ($p<0.05)$. Second, we examine how different SA levels induced via a collaborative AI policy abstraction affect ad hoc human-machine teaming performance. Importantly, we find that the benefits of xAI are not universal, as there is a strong dependence on the composition of the human-machine team. Novices benefit from xAI providing increased SA ($p<0.05$) but are susceptible to cognitive overhead ($p<0.05$). On the other hand, expert performance degrades with the addition of xAI-based support ($p<0.05$), indicating that the cost of paying attention to the xAI outweighs the benefits obtained from being provided additional information to enhance SA. Our results demonstrate that researchers must deliberately design and deploy the right xAI techniques in the right scenario by carefully considering human-machine team composition and how the xAI method augments SA.
△ Less
Submitted 8 September, 2022;
originally announced September 2022.
-
DLT Compliance Reporting
Authors:
Henrik Axelsen,
Johannes Rude Jensen,
Omri Ross
Abstract:
The IS discourse on the potential of distributed ledger technology (DLT) in the financial services has grown at a tremendous pace in recent years. Yet, little has been said about the related implications for the costly and highly regulated process of compliance reporting. Working with a group of representatives from industry and regulatory authorities, we employ the design science research methodo…
▽ More
The IS discourse on the potential of distributed ledger technology (DLT) in the financial services has grown at a tremendous pace in recent years. Yet, little has been said about the related implications for the costly and highly regulated process of compliance reporting. Working with a group of representatives from industry and regulatory authorities, we employ the design science research methodology (DSR) in the design, development, and evaluation of an artefact, enabling the automated collection and enrichment of transactional data. Our findings indicate that DLT may facilitate the automation of key compliance processes through the implementation of a "pull-model", in which regulators can access compliance data in near real-time to stage aggregate exposures at the supranational level. Generalizing our preliminary results, we present four propositions on the implications of DLT in compliance. The findings contribute new practical insights on the topic of compliance to the growing IS discourse on DLT.
△ Less
Submitted 31 May, 2022;
originally announced June 2022.
-
'Cyber security is a dark art': The CISO as soothsayer
Authors:
Joseph Da Silva,
Rikke Bjerg Jensen
Abstract:
Commercial organisations continue to face a growing and evolving threat of data breaches and system compromises, making their cyber-security function critically important. Many organisations employ a Chief Information Security Officer (CISO) to lead such a function. We conducted in-depth, semi-structured interviews with 15 CISOs and six senior organisational leaders, between October 2019 and July…
▽ More
Commercial organisations continue to face a growing and evolving threat of data breaches and system compromises, making their cyber-security function critically important. Many organisations employ a Chief Information Security Officer (CISO) to lead such a function. We conducted in-depth, semi-structured interviews with 15 CISOs and six senior organisational leaders, between October 2019 and July 2020, as part of a wider exploration into the purpose of CISOs and cyber-security functions. In this paper, we employ broader security scholarship related to ontological security and sociological notions of identity work to provide an interpretative analysis of the CISO role in organisations. Research findings reveal that cyber security is an expert system that positions the CISO as an interpreter of something that is mystical, unknown and fearful to the uninitiated. They show how the fearful nature of cyber security contributes to it being considered an ontological threat by the organisation, while responding to that threat contributes to the organisation's overall identity. We further show how cyber security is analogous to a belief system and how one of the roles of the CISO is akin to that of a modern-day soothsayer for senior management; that this role is precarious and, at the same time, superior, leading to alienation within the organisation. Our study also highlights that the CISO identity of protector-from-threat, linked to the precarious position, motivates self-serving actions that we term `cyber sophistry'. We conclude by outlining a series of implications for both organisations and CISOs.
△ Less
Submitted 25 February, 2022;
originally announced February 2022.
-
NFT Wash Trading: Quantifying suspicious behaviour in NFT markets
Authors:
Victor von Wachter,
Johannes Rude Jensen,
Ferdinand Regner,
Omri Ross
Abstract:
The smart contract-based markets for non-fungible tokens (NFTs) on the Ethereum blockchain have seen tremendous growth in 2021, with trading volumes peaking at 3.5b in September 2021. This dramatic surge has led to industry observers questioning the authenticity of on-chain volumes, given the absence of identity requirements and the ease with which agents can control multiple addresses. We examine…
▽ More
The smart contract-based markets for non-fungible tokens (NFTs) on the Ethereum blockchain have seen tremendous growth in 2021, with trading volumes peaking at 3.5b in September 2021. This dramatic surge has led to industry observers questioning the authenticity of on-chain volumes, given the absence of identity requirements and the ease with which agents can control multiple addresses. We examine potentially illicit trading patterns in the NFT markets from January 2018 to mid-November 2021, gathering data from the 52 largest collections by volume. Our findings indicate that within our sample 3.93% of addresses, processing a total of 2.04% of sale transactions, trigger suspicions of market abuse. Flagged transactions contaminate nearly all collections and may have inflated the authentic trading volumes by as much as 149,5m for the period. Most flagged transaction patterns alternate between a few addresses, indicating a predisposition for manual trading. We submit that the results presented here may serve as a viable lower bound estimate for NFT wash trading on Ethereum. Even so, we argue that wash trading may be less common than what industry observers have previously estimated. We contribute to the emerging discourse on the identification and deterrence of market abuse in the cryptocurrency markets.
△ Less
Submitted 7 February, 2022;
originally announced February 2022.
-
Fighting Money Laundering with Statistics and Machine Learning
Authors:
Rasmus Jensen,
Alexandros Iosifidis
Abstract:
Money laundering is a profound global problem. Nonetheless, there is little scientific literature on statistical and machine learning methods for anti-money laundering. In this paper, we focus on anti-money laundering in banks and provide an introduction and review of the literature. We propose a unifying terminology with two central elements: (i) client risk profiling and (ii) suspicious behavior…
▽ More
Money laundering is a profound global problem. Nonetheless, there is little scientific literature on statistical and machine learning methods for anti-money laundering. In this paper, we focus on anti-money laundering in banks and provide an introduction and review of the literature. We propose a unifying terminology with two central elements: (i) client risk profiling and (ii) suspicious behavior flagging. We find that client risk profiling is characterized by diagnostics, i.e., efforts to find and explain risk factors. On the other hand, suspicious behavior flagging is characterized by non-disclosed features and hand-crafted risk indices. Finally, we discuss directions for future research. One major challenge is the need for more public data sets. This may potentially be addressed by synthetic data generation. Other possible research directions include semi-supervised and deep learning, interpretability, and fairness of the results.
△ Less
Submitted 21 March, 2023; v1 submitted 11 January, 2022;
originally announced January 2022.
-
Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong
Authors:
Martin R. Albrecht,
Jorge Blasco,
Rikke Bjerg Jensen,
Lenka Mareková
Abstract:
The Anti-Extradition Law Amendment Bill protests in Hong Kong present a rich context for exploring information security practices among protesters due to their large-scale urban setting and highly digitalised nature. We conducted in-depth, semi-structured interviews with 11 participants of these protests. Research findings reveal how protesters favoured Telegram and relied on its security for inte…
▽ More
The Anti-Extradition Law Amendment Bill protests in Hong Kong present a rich context for exploring information security practices among protesters due to their large-scale urban setting and highly digitalised nature. We conducted in-depth, semi-structured interviews with 11 participants of these protests. Research findings reveal how protesters favoured Telegram and relied on its security for internal communication and organisation of on-the-ground collective action; were organised in small private groups and large public groups to enable collective action; adopted tactics and technologies that enable pseudonymity; and developed a variety of strategies to detect compromises and to achieve forms of forward secrecy and post-compromise security when group members were (presumed) arrested. We further show how group administrators had assumed the roles of leaders in these 'leaderless' protests and were critical to collective protest efforts.
△ Less
Submitted 31 May, 2021;
originally announced May 2021.
-
The Homogenous Properties of Automated Market Makers
Authors:
Johannes Rude Jensen,
Mohsen Pourpouneh,
Kurt Nielsen,
Omri Ross
Abstract:
Automated market makers (AMM) have grown to obtain significant market share within the cryptocurrency ecosystem, resulting in a proliferation of new products pursuing exotic strategies for horizontal differentiation. Yet, their theoretical properties are curiously homogeneous when a set of basic assumptions are met. In this paper, we start by presenting a universal approach to deriving a formula f…
▽ More
Automated market makers (AMM) have grown to obtain significant market share within the cryptocurrency ecosystem, resulting in a proliferation of new products pursuing exotic strategies for horizontal differentiation. Yet, their theoretical properties are curiously homogeneous when a set of basic assumptions are met. In this paper, we start by presenting a universal approach to deriving a formula for liquidity provisioning for AMMs. Next, we show that the constant function market maker and token swap market maker models are theoretically equivalent when liquidity reserves are uniform. Proceeding with an examination of AMM market microstructure, we show how non-linear price effect translates into slippage for traders and impermanent losses for liquidity providers. We proceed by showing how impermanent losses are a function of both volatility and market depth and discuss the implications of these findings within the context of the literature.
△ Less
Submitted 31 March, 2021;
originally announced May 2021.
-
Leveraged Trading on Blockchain Technology
Authors:
Johannes Rude Jensen,
Victor von Wachter,
Omri Ross
Abstract:
We document an ongoing research process towards the implementation and integration of a digital artefact, executing the lifecycle of a leveraged trade with permissionless blockchain technology. By employing core functions of the 'Dai Stablecoin system' deployed on the Ethereum blockchain, we produce the equivalent exposure of a leveraged position while deterministically automating the monitoring a…
▽ More
We document an ongoing research process towards the implementation and integration of a digital artefact, executing the lifecycle of a leveraged trade with permissionless blockchain technology. By employing core functions of the 'Dai Stablecoin system' deployed on the Ethereum blockchain, we produce the equivalent exposure of a leveraged position while deterministically automating the monitoring and liquidation processes. We demonstrate the implementation and early integration of the artefact into a hardened exchange environment through a microservice utilizing standardized API calls. The early results presented in this paper were produced in collaboration with a team of stakeholders at a hosting organization, a multi-national online brokerage and cryptocurrency exchange. We utilize the design science research methodology (DSR) guiding the design, development, and evaluation of the artefact. Our findings indicate that, while it is feasible to implement the lifecycle of a leveraged trade on the blockchain, the integration of the artefact into a traditional exchange environment involves multiple compromises and drawback. Generalizing the tentative findings presented in this paper, we introduce three propositions on the implementation, integration, and implications of executing key business processes with permissionless blockchain technologies. By conducting computational design science research, we contribute to the information systems discourse on the applied utility of permissionless blockchain technologies in finance and beyond.
△ Less
Submitted 25 February, 2021;
originally announced February 2021.
-
Measuring Asset Composability as a Proxy for DeFi Integration
Authors:
Victor von Wachter,
Johannes Rude Jensen,
Omri Ross
Abstract:
Decentralized financial (DeFi) applications on the Ethereum blockchain are highly interoperable because they share a single state in a deterministic computational environment. Stakeholders can deposit claims on assets, referred to as 'liquidity shares', across applications producing effects equivalent to rehypothecation in traditional financial systems. We seek to understand the degree to which th…
▽ More
Decentralized financial (DeFi) applications on the Ethereum blockchain are highly interoperable because they share a single state in a deterministic computational environment. Stakeholders can deposit claims on assets, referred to as 'liquidity shares', across applications producing effects equivalent to rehypothecation in traditional financial systems. We seek to understand the degree to which this practice may contribute to financial integration on Ethereum by examining transactions in 'composed' derivatives for the assets DAI, USDC, USDT, ETH and tokenized BTC for the full set of 344.8 million Ethereum transactions computed in 2020. We identify a salient trend for 'composing' assets in multiple sequential generations of derivatives and comment on potential systemic implications for the Ethereum network.
△ Less
Submitted 29 March, 2021; v1 submitted 2 February, 2021;
originally announced February 2021.
-
Fragmented digital connectivity and security at sea
Authors:
Rikke Bjerg Jensen
Abstract:
This paper explores how uneven and often unreliable digital connections shape the patterns and routines of everyday life, work and rest for seafarers, during long periods at sea. Such fragmented connections, which surface when the ship moves in and out of connectivity or when onboard data allowances run out, create a series of uncertainties that might unsettle individual and collective notions of…
▽ More
This paper explores how uneven and often unreliable digital connections shape the patterns and routines of everyday life, work and rest for seafarers, during long periods at sea. Such fragmented connections, which surface when the ship moves in and out of connectivity or when onboard data allowances run out, create a series of uncertainties that might unsettle individual and collective notions of security. Ethnographic in nature, the study engaged 43 seafarers on board two container ships in European waters, during two two-week voyages between February and April 2018. This provided an empirically grounded exploration of how digitally facilitated connections, relations and networks, enabled through increasingly connected ships, shape and reshape seafarer lives. Findings from this study demonstrate the creative ways in which seafarers navigate and negotiate digitally facilitated connections to maintain relational ties with family and friends. The paper concludes by setting out future research directions and practical implications that speak to connectivity and security at sea.
△ Less
Submitted 31 October, 2020;
originally announced November 2020.
-
The Vacuity of the Open Source Security Testing Methodology Manual
Authors:
Martin R. Albrecht,
Rikke Bjerg Jensen
Abstract:
The Open Source Security Testing Methodology Manual (OSSTMM) provides a "scientific methodology for the accurate characterization of operational security" [Her10, p.13]. It is extensively referenced in writings aimed at security testing professionals such as textbooks, standards and academic papers. In this work we offer a fundamental critique of OSSTMM and argue that it fails to deliver on its pr…
▽ More
The Open Source Security Testing Methodology Manual (OSSTMM) provides a "scientific methodology for the accurate characterization of operational security" [Her10, p.13]. It is extensively referenced in writings aimed at security testing professionals such as textbooks, standards and academic papers. In this work we offer a fundamental critique of OSSTMM and argue that it fails to deliver on its promise of actual security. Our contribution is threefold and builds on a textual critique of this methodology. First, OSSTMM's central principle is that security can be understood as a quantity of which an entity has more or less. We show why this is wrong and how OSSTMM's unified security score, the rav, is an empty abstraction. Second, OSSTMM disregards risk by replacing it with a trust metric which confuses multiple definitions of trust and, as a result, produces a meaningless score. Finally, OSSTMM has been hailed for its attention to human security. Yet it understands all human agency as a security threat that needs to be constantly monitored and controlled. Thus, we argue that OSSTMM is neither fit for purpose nor can it be salvaged, and it should be abandoned by security professionals.
△ Less
Submitted 13 October, 2020;
originally announced October 2020.
-
Cyber Security Behaviour In Organisations
Authors:
Amy Ertan,
Georgia Crossland,
Claude Heath,
David Denny,
Rikke Jensen
Abstract:
This review explores the academic and policy literature in the context of everyday cyber security in organisations. In so doing, it identifies four behavioural sets that influences how people practice cyber security. These are compliance with security policy, intergroup coordination and communication, phishing/email behaviour, and password behaviour. However, it is important to note that these are…
▽ More
This review explores the academic and policy literature in the context of everyday cyber security in organisations. In so doing, it identifies four behavioural sets that influences how people practice cyber security. These are compliance with security policy, intergroup coordination and communication, phishing/email behaviour, and password behaviour. However, it is important to note that these are not exhaustive and they do not exist in isolation. In addition, the review explores the notion of security culture as an overarching theme that overlaps and frames the four behavioural sets. The aim of this review is therefore to provide a summary of the existing literature in the area of everyday cyber security within the social sciences, with a particular focus on organisational contexts. In doing so, it develops a series of suggestions for future research directions based on existing gaps in the literature. The review also includes a theoretical lens that will aid the understanding of existing studies and wider literatures. Where possible, the review makes recommendations for organisations in relation to everyday cyber security.
△ Less
Submitted 24 April, 2020;
originally announced April 2020.
-
Automatic Quality Control and Enhancement for Voice-Based Remote Parkinson's Disease Detection
Authors:
Amir Hossein Poorjam,
Mathew Shaji Kavalekalam,
Liming Shi,
Yordan P. Raykov,
Jesper Rindom Jensen,
Max A. Little,
Mads Græsbøll Christensen
Abstract:
The performance of voice-based Parkinson's disease (PD) detection systems degrades when there is an acoustic mismatch between training and operating conditions caused mainly by degradation in test signals. In this paper, we address this mismatch by considering three types of degradation commonly encountered in remote voice analysis, namely background noise, reverberation and nonlinear distortion,…
▽ More
The performance of voice-based Parkinson's disease (PD) detection systems degrades when there is an acoustic mismatch between training and operating conditions caused mainly by degradation in test signals. In this paper, we address this mismatch by considering three types of degradation commonly encountered in remote voice analysis, namely background noise, reverberation and nonlinear distortion, and investigate how these degradations influence the performance of a PD detection system. Given that the specific degradation is known, we explore the effectiveness of a variety of enhancement algorithms in compensating this mismatch and improving the PD detection accuracy. Then, we propose two approaches to automatically control the quality of recordings by identifying the presence and type of short-term and long-term degradations and protocol violations in voice signals. Finally, we experiment with using the proposed quality control methods to inform the choice of enhancement algorithm. Experimental results using the voice recordings of the mPower mobile PD data set under different degradation conditions show the effectiveness of the quality control approaches in selecting an appropriate enhancement method and, consequently, in improving the PD detection accuracy. This study is a step towards the development of a remote PD detection system capable of operating in unseen acoustic environments.
△ Less
Submitted 31 May, 2019; v1 submitted 28 May, 2019;
originally announced May 2019.
-
Bayesian Pitch Tracking Based on the Harmonic Model
Authors:
Liming Shi,
Jesper Kjaer Nielsen,
Jesper Rindom Jensen,
Max A. Little,
Mads Graesboll Christensen
Abstract:
Fundamental frequency is one of the most important characteristics of speech and audio signals. Harmonic model-based fundamental frequency estimators offer a higher estimation accuracy and robustness against noise than the widely used autocorrelation-based methods. However, the traditional harmonic model-based estimators do not take the temporal smoothness of the fundamental frequency, the model o…
▽ More
Fundamental frequency is one of the most important characteristics of speech and audio signals. Harmonic model-based fundamental frequency estimators offer a higher estimation accuracy and robustness against noise than the widely used autocorrelation-based methods. However, the traditional harmonic model-based estimators do not take the temporal smoothness of the fundamental frequency, the model order, and the voicing into account as they process each data segment independently. In this paper, a fully Bayesian fundamental frequency tracking algorithm based on the harmonic model and a first-order Markov process model is proposed. Smoothness priors are imposed on the fundamental frequencies, model orders, and voicing using first-order Markov process models. Using these Markov models, fundamental frequency estimation and voicing detection errors can be reduced. Using the harmonic model, the proposed fundamental frequency tracker has an improved robustness to noise. An analytical form of the likelihood function, which can be computed efficiently, is derived. Compared to the state-of-the-art neural network and non-parametric approaches, the proposed fundamental frequency tracking algorithm reduces the mean absolute errors and gross errors by 15\% and 20\% on the Keele pitch database and 36\% and 26\% on sustained /a/ sounds from a database of Parkinson's disease voices under 0 dB white Gaussian noise. A MATLAB version of the proposed algorithm is made freely available for reproduction of the results\footnote{An implementation of the proposed algorithm using MATLAB may be found in \url{https://tinyurl.com/yxn4a543}
△ Less
Submitted 21 May, 2019;
originally announced May 2019.
-
Human-Machine Collaborative Optimization via Apprenticeship Scheduling
Authors:
Matthew Gombolay,
Reed Jensen,
Jessica Stigile,
Toni Golen,
Neel Shah,
Sung-Hyun Son,
Julie Shah
Abstract:
Coordinating agents to complete a set of tasks with intercoupled temporal and resource constraints is computationally challenging, yet human domain experts can solve these difficult scheduling problems using paradigms learned through years of apprenticeship. A process for manually codifying this domain knowledge within a computational framework is necessary to scale beyond the ``single-expert, sin…
▽ More
Coordinating agents to complete a set of tasks with intercoupled temporal and resource constraints is computationally challenging, yet human domain experts can solve these difficult scheduling problems using paradigms learned through years of apprenticeship. A process for manually codifying this domain knowledge within a computational framework is necessary to scale beyond the ``single-expert, single-trainee" apprenticeship model. However, human domain experts often have difficulty describing their decision-making processes, causing the codification of this knowledge to become laborious. We propose a new approach for capturing domain-expert heuristics through a pairwise ranking formulation. Our approach is model-free and does not require enumerating or iterating through a large state space. We empirically demonstrate that this approach accurately learns multifaceted heuristics on a synthetic data set incorporating job-shop scheduling and vehicle routing problems, as well as on two real-world data sets consisting of demonstrations of experts solving a weapon-to-target assignment problem and a hospital resource allocation problem. We also demonstrate that policies learned from human scheduling demonstration via apprenticeship learning can substantially improve the efficiency of a branch-and-bound search for an optimal schedule. We employ this human-machine collaborative optimization technique on a variant of the weapon-to-target assignment problem. We demonstrate that this technique generates solutions substantially superior to those produced by human domain experts at a rate up to 9.5 times faster than an optimization approach and can be applied to optimally solve problems twice as complex as those solved by a human demonstrator.
△ Less
Submitted 10 May, 2018;
originally announced May 2018.
-
Network Traffic Driven Storage Repair
Authors:
Danilo Gligoroski,
Katina Kralevska,
Rune E. Jensen,
Per Simonsen
Abstract:
Recently we constructed an explicit family of locally repairable and locally regenerating codes. Their existence was proven by Kamath et al. but no explicit construction was given. Our design is based on HashTag codes that can have different sub-packetization levels. In this work we emphasize the importance of having two ways to repair a node: repair only with local parity nodes or repair with bot…
▽ More
Recently we constructed an explicit family of locally repairable and locally regenerating codes. Their existence was proven by Kamath et al. but no explicit construction was given. Our design is based on HashTag codes that can have different sub-packetization levels. In this work we emphasize the importance of having two ways to repair a node: repair only with local parity nodes or repair with both local and global parity nodes. We say that the repair strategy is network traffic driven since it is in connection with the concrete system and code parameters: the repair bandwidth of the code, the number of I/O operations, the access time for the contacted parts and the size of the stored file. We show the benefits of having repair duality in one practical example implemented in Hadoop. We also give algorithms for efficient repair of the global parity nodes.
△ Less
Submitted 25 June, 2018; v1 submitted 9 March, 2018;
originally announced March 2018.
-
A Variational EM Method for Pole-Zero Modeling of Speech with Mixed Block Sparse and Gaussian Excitation
Authors:
Liming Shi,
Jesper Kjær Nielsen,
Jesper Rindom Jensen,
Mads Græsbøll Christensen
Abstract:
The modeling of speech can be used for speech synthesis and speech recognition. We present a speech analysis method based on pole-zero modeling of speech with mixed block sparse and Gaussian excitation. By using a pole-zero model, instead of the all-pole model, a better spectral fitting can be expected. Moreover, motivated by the block sparse glottal flow excitation during voiced speech and the wh…
▽ More
The modeling of speech can be used for speech synthesis and speech recognition. We present a speech analysis method based on pole-zero modeling of speech with mixed block sparse and Gaussian excitation. By using a pole-zero model, instead of the all-pole model, a better spectral fitting can be expected. Moreover, motivated by the block sparse glottal flow excitation during voiced speech and the white noise excitation for unvoiced speech, we model the excitation sequence as a combination of block sparse signals and white noise. A variational EM (VEM) method is proposed for estimating the posterior PDFs of the block sparse residuals and point estimates of mod- elling parameters within a sparse Bayesian learning framework. Compared to conventional pole-zero and all-pole based methods, experimental results show that the proposed method has lower spectral distortion and good performance in reconstructing of the block sparse excitation.
△ Less
Submitted 24 June, 2017;
originally announced June 2017.
-
Repair Duality with Locally Repairable and Locally Regenerating Codes
Authors:
Danilo Gligoroski,
Katina Kralevska,
Rune E. Jensen,
Per Simonsen
Abstract:
We construct an explicit family of locally repairable and locally regenerating codes whose existence was proven in a recent work by Kamath et al. about codes with local regeneration but no explicit construction was given. This explicit family of codes is based on HashTag codes. HashTag codes are recently defined vector codes with different vector length $α$ (also called a sub-packetization level)…
▽ More
We construct an explicit family of locally repairable and locally regenerating codes whose existence was proven in a recent work by Kamath et al. about codes with local regeneration but no explicit construction was given. This explicit family of codes is based on HashTag codes. HashTag codes are recently defined vector codes with different vector length $α$ (also called a sub-packetization level) that achieve the optimal repair bandwidth of MSR codes or near-optimal repair bandwidth depending on the sub-packetization level. We applied the technique of parity-splitting code construction. We show that the lower bound on the size of the finite field for the presented explicit code constructions can be lower than the one given in the work of Kamath et al. Finally, we discuss the importance of having two ways for node repair with locally regenerating HashTag codes: repair only with local parity nodes or repair with both local and global parity nodes. To the best of the authors' knowledge, this is the first work where this duality in repair process is discussed. We give a practical example and experimental results in Hadoop where we show the benefits of having this repair duality.
△ Less
Submitted 30 August, 2017; v1 submitted 23 January, 2017;
originally announced January 2017.
-
HashTag Erasure Codes: From Theory to Practice
Authors:
Katina Kralevska,
Danilo Gligoroski,
Rune E. Jensen,
Harald Øverby
Abstract:
Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. Although several MSR constructions exist, so far they have not been practically implemented mainly due to the big number of I/O operations. In this paper, we analyze high-rate MDS co…
▽ More
Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. Although several MSR constructions exist, so far they have not been practically implemented mainly due to the big number of I/O operations. In this paper, we analyze high-rate MDS codes that are simultaneously optimized in terms of storage, reliability, I/O operations, and repair-bandwidth for single and multiple failures of the systematic nodes. The codes were recently introduced in \cite{7463553} without any specific name. Due to the resemblance between the hashtag sign \# and the procedure of the code construction, we call them in this paper \emph{HashTag Erasure Codes (HTECs)}. HTECs provide the lowest data-read and data-transfer, and thus the lowest repair time for an arbitrary sub-packetization level $α$, where $α\leq r^{\lceil \sfrac{k}{r} \rceil}$, among all existing MDS codes for distributed storage including MSR codes. The repair process is linear and highly parallel. Additionally, we show that HTECs are the first high-rate MDS codes that reduce the repair bandwidth for more than one failure. Practical implementations of HTECs in Hadoop release 3.0.0-alpha2 demonstrate their great potentials.
△ Less
Submitted 3 July, 2017; v1 submitted 8 September, 2016;
originally announced September 2016.
-
OBDD-based Universal Planning for Synchronized Agents in Non-Deterministic Domains
Authors:
R. M. Jensen,
M. M. Veloso
Abstract:
Recently model checking representation and search techniques were shown to be efficiently applicable to planning, in particular to non-deterministic planning. Such planning approaches use Ordered Binary Decision Diagrams (OBDDs) to encode a planning domain as a non-deterministic finite automaton and then apply fast algorithms from model checking to search for a solution. OBDDs can e…
▽ More
Recently model checking representation and search techniques were shown to be efficiently applicable to planning, in particular to non-deterministic planning. Such planning approaches use Ordered Binary Decision Diagrams (OBDDs) to encode a planning domain as a non-deterministic finite automaton and then apply fast algorithms from model checking to search for a solution. OBDDs can effectively scale and can provide universal plans for complex planning domains. We are particularly interested in addressing the complexities arising in non-deterministic, multi-agent domains. In this article, we present UMOP, a new universal OBDD-based planning framework for non-deterministic, multi-agent domains. We introduce a new planning domain description language, NADL, to specify non-deterministic, multi-agent domains. The language contributes the explicit definition of controllable agents and uncontrollable environment agents. We describe the syntax and semantics of NADL and show how to build an efficient OBDD-based representation of an NADL description. The UMOP planning system uses NADL and different OBDD-based universal planning algorithms. It includes the previously developed strong and strong cyclic planning algorithms. In addition, we introduce our new optimistic planning algorithm that relaxes optimality guarantees and generates plausible universal plans in some domains where no strong nor strong cyclic solution exists. We present empirical results applying UMOP to domains ranging from deterministic and single-agent with no environment actions to non-deterministic and multi-agent with complex environment actions. UMOP is shown to be a rich and efficient planning system.
△ Less
Submitted 1 June, 2011;
originally announced June 2011.
-
The Digital Signature Scheme MQQ-SIG
Authors:
Danilo Gligoroski,
Svein Johan Knapskog,
Smile Markovski,
Rune Steinsmo Ødegård,
Rune Erlend Jensen,
Ludovic Perret,
Jean-Charles Faugère
Abstract:
This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientific publication covering the design rationale and the security analysis will be given in a separate publication. MQQ-SIG consists of $n - \frac{n}{4}$ quadratic polynomials with $n$ Boolean variables where n=160, 196, 224 or 256.
This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientific publication covering the design rationale and the security analysis will be given in a separate publication. MQQ-SIG consists of $n - \frac{n}{4}$ quadratic polynomials with $n$ Boolean variables where n=160, 196, 224 or 256.
△ Less
Submitted 15 October, 2010;
originally announced October 2010.
-
Calculating Valid Domains for BDD-Based Interactive Configuration
Authors:
Tarik Hadzic,
Rune Moller Jensen,
Henrik Reif Andersen
Abstract:
In these notes we formally describe the functionality of Calculating Valid Domains from the BDD representing the solution space of valid configurations. The formalization is largely based on the CLab configuration framework.
In these notes we formally describe the functionality of Calculating Valid Domains from the BDD representing the solution space of valid configurations. The formalization is largely based on the CLab configuration framework.
△ Less
Submitted 11 April, 2007;
originally announced April 2007.