Skip to main content

Showing 1–11 of 11 results for author: Kremer, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.15268   

    cs.LG cs.AI

    Towards Stable Preferences for Stakeholder-aligned Machine Learning

    Authors: Haleema Sheraz, Stefan C. Kremer, Joshua August Skorburg, Graham Taylor, Walter Sinnott-Armstrong, Kyle Boerstler

    Abstract: In response to the pressing challenge of kidney allocation, characterized by growing demands for organs, this research sets out to develop a data-driven solution to this problem, which also incorporates stakeholder values. The primary objective of this study is to create a method for learning both individual and group-level preferences pertaining to kidney allocations. Drawing upon data from the '… ▽ More

    Submitted 2 February, 2024; v1 submitted 26 January, 2024; originally announced January 2024.

    Comments: Work in Progress

  2. DeepSec: Deciding Equivalence Properties for Security Protocols -- Improved theory and practice

    Authors: Vincent Cheval, Steve Kremer, Itsaka Rakotonirina

    Abstract: Automated verification has become an essential part in the security evaluation of cryptographic protocols. In this context privacy-type properties are often modelled by indistinguishability statements, expressed as behavioural equivalences in a process calculus. In this paper we contribute both to the theory and practice of this verification problem. We establish new complexity results for static… ▽ More

    Submitted 11 March, 2024; v1 submitted 6 November, 2022; originally announced November 2022.

    Comments: 136 pages

    ACM Class: C.2.2; D.2.4; F.3.1

    Journal ref: TheoretiCS (March 13, 2024) theoretics:10298

  3. arXiv:2111.15646  [pdf, other

    cs.LG cs.CV stat.ML

    The Exponentially Tilted Gaussian Prior for Variational Autoencoders

    Authors: Griffin Floto, Stefan Kremer, Mihai Nica

    Abstract: An important property for deep neural networks is the ability to perform robust out-of-distribution detection on previously unseen data. This property is essential for safety purposes when deploying models for real world applications. Recent studies show that probabilistic generative models can perform poorly on this task, which is surprising given that they seek to estimate the likelihood of trai… ▽ More

    Submitted 12 April, 2022; v1 submitted 30 November, 2021; originally announced November 2021.

  4. arXiv:1902.09324  [pdf, other

    cs.CV

    Similarity Learning Networks for Animal Individual Re-Identification -- Beyond the Capabilities of a Human Observer

    Authors: Stefan Schneider, Graham W. Taylor, Stefan Linquist, Stefan C. Kremer

    Abstract: Deep learning has become the standard methodology to approach computer vision tasks when large amounts of labeled data are available. One area where traditional deep learning approaches fail to perform is one-shot learning tasks where a model must correctly classify a new category after seeing only one example. One such domain is animal re-identification, an application of computer vision which ca… ▽ More

    Submitted 1 July, 2020; v1 submitted 21 February, 2019; originally announced February 2019.

    Comments: 9 pages, 4 figures, 3 table. WACV 2020 - Deep Learning for Animal Re-ID Workshop

  5. arXiv:1811.07749  [pdf, other

    cs.CV

    Past, Present, and Future Approaches Using Computer Vision for Animal Re-Identification from Camera Trap Data

    Authors: Stefan Schneider, Graham W. Taylor, Stefan S. Linquist, Stefan C. Kremer

    Abstract: The ability of a researcher to re-identify (re-ID) an individual animal upon re-encounter is fundamental for addressing a broad range of questions in the study of ecosystem function, community and population dynamics, and behavioural ecology. In this review, we describe a brief history of camera traps for re-ID, present a collection of computer vision feature engineering methodologies previously u… ▽ More

    Submitted 19 November, 2018; originally announced November 2018.

    Comments: 25 pages, 1 picture

  6. arXiv:1803.10842  [pdf, other

    cs.CV

    Deep Learning Object Detection Methods for Ecological Camera Trap Data

    Authors: Stefan Schneider, Graham W. Taylor, Stefan C. Kremer

    Abstract: Deep learning methods for computer vision tasks show promise for automating the data analysis of camera trap images. Ecological camera traps are a common approach for monitoring an ecosystem's animal population, as they provide continual insight into an environment without being intrusive. However, the analysis of camera trap images is expensive, labour intensive, and time consuming. Recent advanc… ▽ More

    Submitted 28 March, 2018; originally announced March 2018.

    Comments: 8 pages, 6 figures, Conference of Computer and Robot Vision

  7. Dynamic Tags for Security Protocols

    Authors: Myrto Arapinis, Stéphanie Delaune, Steve Kremer

    Abstract: The design and verification of cryptographic protocols is a notoriously difficult task, even in symbolic models which take an abstract view of cryptography. This is mainly due to the fact that protocols may interact with an arbitrary attacker which yields a verification problem that has several sources of unboundedness (size of messages, number of sessions, etc. In this paper, we characterize a cl… ▽ More

    Submitted 17 June, 2014; v1 submitted 12 May, 2014; originally announced May 2014.

    Comments: 50 pages with 30 references

    Journal ref: Logical Methods in Computer Science, Volume 10, Issue 2 (June 19, 2014) lmcs:690

  8. arXiv:1403.1142  [pdf, ps, other

    cs.CR

    Automated analysis of security protocols with global state

    Authors: Steve Kremer, Robert Künnemann

    Abstract: Security APIs, key servers and protocols that need to keep the status of transactions, require to maintain a global, non-monotonic state, e.g., in the form of a database or register. However, most existing automated verification tools do not support the analysis of such stateful security protocols - sometimes because of fundamental reasons, such as the encoding of the protocol as Horn clauses, whi… ▽ More

    Submitted 12 May, 2014; v1 submitted 5 March, 2014; originally announced March 2014.

  9. Focusing Testing by Using Inspection and Product Metrics

    Authors: Frank Elberzhager, Stephan Kremer, Jürgen Münch, Danilo Assmann

    Abstract: A well-known approach for identifying defect-prone parts of software in order to focus testing is to use different kinds of product metrics such as size or complexity. Although this approach has been evaluated in many contexts, the question remains if there are further opportunities to improve test focusing. One idea is to identify other types of information that may indicate the location of defec… ▽ More

    Submitted 4 February, 2014; v1 submitted 30 January, 2014; originally announced January 2014.

    Comments: 29 pages. The final publication is available at http://www.worldscientific.com/doi/abs/10.1142/s0218194013400093. arXiv admin note: substantial text overlap with arXiv:1312.0713

    Journal ref: International Journal of Software Engineering and Knowledge Engineering, 23(04):433-462, 2013

  10. Guiding Testing Activities by Predicting Defect-prone Parts Using Product and Inspection Metrics

    Authors: Frank Elberzhager, Stephan Kremer, Jürgen Münch, Danilo Assmann

    Abstract: Product metrics, such as size or complexity, are often used to identify defect-prone parts or to focus quality assurance activities. In contrast, quality information that is available early, such as information provided by inspections, is usually not used. Currently, only little experience is documented in the literature on whether data from early defect detection activities can support the identi… ▽ More

    Submitted 3 December, 2013; originally announced December 2013.

    Comments: 8 pages. The final publication is available at http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6328182

  11. arXiv:0910.4420   

    cs.CR cs.LO cs.PL

    Proceedings 7th International Workshop on Security Issues in Concurrency

    Authors: Michele Boreale, Steve Kremer

    Abstract: This volume contains the proceedings of the 7th Workshop on Security Issues in Concurrency (SecCo'09). The workshop was held in Bologna, Italy on September 5th 2009, as a satellite workshop of CONCUR'09. The aim of the SecCo workshop series is to cover the gap between the security and the concurrency communities. More precisely, the workshop promotes the exchange of ideas, trying to focus on com… ▽ More

    Submitted 22 October, 2009; originally announced October 2009.

    Journal ref: EPTCS 7, 2009