Skip to main content

Showing 1–26 of 26 results for author: Marshall, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.05627  [pdf, other

    cs.RO eess.SY

    OtterROS: Picking and Programming an Uncrewed Surface Vessel for Experimental Field Robotics Research with ROS 2

    Authors: Thomas M. C. Sears, M. Riley Cooper, Sabrina R. Button, Joshua A. Marshall

    Abstract: There exist a wide range of options for field robotics research using ground and aerial mobile robots, but there are comparatively few robust and research-ready uncrewed surface vessels (USVs). This workshop paper starts with a snapshot of USVs currently available to the research community and then describes "OtterROS", an open source ROS 2 solution for the Otter USV. Field experiments using Otter… ▽ More

    Submitted 22 April, 2024; v1 submitted 8 April, 2024; originally announced April 2024.

    Comments: 8 pages, 6 figures. Accepted to the IEEE ICRA Workshop on Field Robotics 2024

  2. arXiv:2401.17226  [pdf, other

    cs.LO

    Knowledge Problems in Protocol Analysis: Extending the Notion of Subterm Convergent

    Authors: Carter Bunch, Saraid Dwyer Satterfield, Serdar Erbatur, Andrew M. Marshall, Christophe Ringeissen

    Abstract: We introduce a new form of restricted term rewrite system, the graph-embedded term rewrite system. These systems, and thus the name, are inspired by the graph minor relation and are more flexible extensions of the well-known homeomorphic-embedded property of term rewrite systems. As a motivating application area, we consider the symbolic analysis of security protocols, and more precisely the two k… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

    Comments: Preprint submitted to Logical Methods in Computer Science

  3. arXiv:2312.05212  [pdf, other

    cs.AR

    Enabling Normally-off In-Situ Computing with a Magneto-Electric FET-based SRAM Design

    Authors: Deniz Najafi, Mehrdad Morsali, Ranyang Zhou, Arman Roohi, Andrew Marshall, Durga Misra, Shaahin Angizi

    Abstract: As an emerging post-CMOS Field Effect Transistor, Magneto-Electric FETs (MEFETs) offer compelling design characteristics for logic and memory applications, such as high-speed switching, low power consumption, and non-volatility. In this paper, for the first time, a non-volatile MEFET-based SRAM design named ME-SRAM is proposed for edge applications which can remarkably save the SRAM static power c… ▽ More

    Submitted 8 December, 2023; originally announced December 2023.

    Comments: 7 pages, 10 Figures, 4 Tables

  4. arXiv:2308.07433  [pdf, other

    cs.CR

    White-Box Adversarial Attacks on Deep Learning-Based Radio Frequency Fingerprint Identification

    Authors: Jie Ma, Junqing Zhang, Guanxiong Shen, Alan Marshall, Chip-Hong Chang

    Abstract: Radio frequency fingerprint identification (RFFI) is an emerging technique for the lightweight authentication of wireless Internet of things (IoT) devices. RFFI exploits unique hardware impairments as device identifiers, and deep learning is widely deployed as the feature extractor and classifier for RFFI. However, deep learning is vulnerable to adversarial attacks, where adversarial examples are… ▽ More

    Submitted 14 August, 2023; originally announced August 2023.

    Comments: 6 pages, 9 figures, Accepeted by International Conference on Communications 2023

  5. arXiv:2209.10321  [pdf, other

    cs.LO cs.CR cs.SC

    CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms

    Authors: Dalton Chichester, Wei Du, Raymond Kauffman, Hai Lin, Christopher Lynch, Andrew M. Marshall, Catherine A. Meadows, Paliath Narendran, Veena Ravishankar, Luis Rovira, Brandon Rozek

    Abstract: Recently, interest has been emerging in the application of symbolic techniques to the specification and analysis of cryptosystems. These techniques, when accompanied by suitable proofs of soundness/completeness, can be used both to identify insecure cryptosystems and prove sound ones secure. But although a number of such symbolic algorithms have been developed and implemented, they remain scattere… ▽ More

    Submitted 21 September, 2022; originally announced September 2022.

    Comments: In Proceedings GandALF 2022, arXiv:2209.09333

    Journal ref: EPTCS 370, 2022, pp. 147-161

  6. arXiv:2101.01668  [pdf, other

    eess.SP cs.LG

    Radio Frequency Fingerprint Identification for LoRa Using Spectrogram and CNN

    Authors: Guanxiong Shen, Junqing Zhang, Alan Marshall, Linning Peng, Xianbin Wang

    Abstract: Radio frequency fingerprint identification (RFFI) is an emerging device authentication technique that relies on intrinsic hardware characteristics of wireless devices. We designed an RFFI scheme for Long Range (LoRa) systems based on spectrogram and convolutional neural network (CNN). Specifically, we used spectrogram to represent the fine-grained time-frequency characteristics of LoRa signals. In… ▽ More

    Submitted 30 December, 2020; originally announced January 2021.

    Comments: Accepted for publication in IEEE INFOCOM 2021

  7. arXiv:2009.06119  [pdf, other

    cs.ET

    MERAM: Non-Volatile Cache Memory Based on Magneto-Electric FETs

    Authors: Shaahin Angizi, Navid Khoshavi, Andrew Marshall, Peter Dowben, Deliang Fan

    Abstract: Magneto-Electric FET (MEFET) is a recently developed post-CMOS FET, which offers intriguing characteristics for high speed and low-power design in both logic and memory applications. In this paper, for the first time, we propose a non-volatile 2T-1MEFET memory bit-cell with separate read and write paths. We show that with proper co-design at the device, cell and array levels, such a design is a pr… ▽ More

    Submitted 13 September, 2020; originally announced September 2020.

    Comments: 8 pages, 9 figures

  8. arXiv:2002.05646  [pdf, other

    cs.CY cs.CR cs.LG stat.ML

    Adversarial Machine Learning -- Industry Perspectives

    Authors: Ram Shankar Siva Kumar, Magnus Nyström, John Lambert, Andrew Marshall, Mario Goertzel, Andi Comissoneru, Matt Swann, Sharon Xia

    Abstract: Based on interviews with 28 organizations, we found that industry practitioners are not equipped with tactical and strategic tools to protect, detect and respond to attacks on their Machine Learning (ML) systems. We leverage the insights from the interviews and we enumerate the gaps in perspective in securing machine learning systems when viewed in the context of traditional software security deve… ▽ More

    Submitted 19 March, 2021; v1 submitted 3 February, 2020; originally announced February 2020.

    Comments: Minor Typos corrected 7 pages, 1 figure

  9. arXiv:1912.06802  [pdf, other

    cs.DC

    A memory and communication efficient algorithm for decentralized counting of nodes in networks

    Authors: Arindam Saha, James A. R. Marshall, Andreagiovanni Reina

    Abstract: Node counting on a graph is subject to some fundamental theoretical limitations, yet a solution to such problems is necessary in many applications of graph theory to real-world systems, such as collective robotics and distributed sensor networks. Thus several stochastic and na{ï}ve deterministic algorithms for distributed graph size estimation or calculation have been provided. Here we present a d… ▽ More

    Submitted 28 May, 2020; v1 submitted 14 December, 2019; originally announced December 2019.

    Comments: 20 Pages, 3 Figures

  10. arXiv:1910.12294  [pdf, other

    cs.RO cs.AI

    Robots as Actors in a Film: No War, A Robot Story

    Authors: Andreagiovanni Reina, Viktor Ioannou, Jun** Chen, Lu Lu, Charles Kent, James A. R. Marshall

    Abstract: Will the Third World War be fought by robots? This short film is a light-hearted comedy that aims to trigger an interesting discussion and reflexion on the terrifying killer-robot stories that increasingly fill us with dread when we read the news headlines. The fictional scenario takes inspiration from current scientific research and describes a future where robots are asked by humans to join the… ▽ More

    Submitted 27 October, 2019; originally announced October 2019.

  11. arXiv:1908.09766  [pdf

    cs.NI eess.SY

    A Hybrid of Adaptation and Dynamic Routing based on SDN for Improving QoE in HTTP Adaptive VBR Video Streaming

    Authors: Hong Thinh Pham, Ngoc Nam Pham, Huu Thanh Nguyen, Alan Marshall, Thu Huong Truong

    Abstract: Recently, HTTP Adaptive Streaming HAS has received significant attention from both industry and academia based on its ability to enhancing media streaming services over the Internet. Recent research solutions that have tried to improve HAS by adaptation at the client side only may not be completely effective without interacting with routing decisions in the upper layers. In this paper, we address… ▽ More

    Submitted 26 August, 2019; originally announced August 2019.

    Comments: 14 pages, 17 figures, IJCSNS International Journal of Computer Science and Network Security, http://paper.ijcsns.org/07_book/201907/20190708.pdf

    Journal ref: VOL.19 No.7, July 2019

  12. arXiv:1907.00227  [pdf, ps, other

    cs.CC cs.CR

    On Asymmetric Unification for the Theory of XOR with a Homomorphism

    Authors: Christopher Lynch, Andrew M. Marshall, Catherine Meadows, Paliath Narendran, Veena Ravishankar

    Abstract: Asymmetric unification, or unification with irreducibility constraints, is a newly developed paradigm that arose out of the automated analysis of cryptographic protocols. However, there are still relatively few asymmetric unification algorithms. In this paper we address this lack by exploring the application of automata-based unification methods. We examine the theory of xor with a homomorphism, A… ▽ More

    Submitted 29 June, 2019; originally announced July 2019.

  13. arXiv:1906.09037  [pdf, other

    cs.NI cs.PF

    A Beaconless Asymmetric Energy-Efficient Time Synchronization Scheme for Resource-Constrained Multi-Hop Wireless Sensor Networks

    Authors: Xintao Huan, Kyeong Soo Kim, Sanghyuk Lee, Eng Gee Lim, Alan Marshall

    Abstract: The ever-increasing number of WSN deployments based on a large number of battery-powered, low-cost sensor nodes, which are limited in their computing and power resources, puts the focus of WSN time synchronization research on three major aspects, i.e., accuracy, energy consumption and computational complexity. In the literature, the latter two aspects have not received much attention compared to t… ▽ More

    Submitted 21 June, 2019; originally announced June 2019.

    Comments: 12 pages, 16 figures

  14. arXiv:1810.08031  [pdf, other

    cs.CR

    Channel-Envelope Differencing Eliminates Secret Key Correlation: LoRa-Based Key Generation in Low Power Wide Area Networks

    Authors: Junqing Zhang, Alan Marshall, Lajos Hanzo

    Abstract: This paper presents automatic key generation for long-range wireless communications in low power wide area networks (LPWANs), employing LoRa as a case study. Differential quantization is adopted to extract a high level of randomness. Experiments conducted both in an outdoor urban environment and in an indoor environment demonstrate that this key generation technique is applicable for LPWANs, and s… ▽ More

    Submitted 18 October, 2018; originally announced October 2018.

  15. arXiv:1805.04496  [pdf, ps, other

    cs.IT

    Cell-free Massive MIMO Networks: Optimal Power Control against Active Eavesdrop**

    Authors: Tiep M. Hoang, Hien Quoc Ngo, Trung Q. Duong, Hoang D. Tuan, Alan Marshall

    Abstract: This paper studies the security aspect of a recently introduced network ("cell-free massive MIMO") under a pilot spoofing attack. Firstly, a simple method to recognize the presence of this type of an active eavesdrop** attack to a particular user is shown. In order to deal with this attack, we consider the problem of maximizing the achievable data rate of the attacked user or its achievable secr… ▽ More

    Submitted 11 May, 2018; originally announced May 2018.

    Comments: This paper has been accepted for publication in the IEEE Transactions on Communications

  16. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    Authors: Junqing Zhang, Trung Q. Duong, Roger Woods, Alan Marshall

    Abstract: The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of ke… ▽ More

    Submitted 16 August, 2017; originally announced August 2017.

  17. arXiv:1702.05425  [pdf

    cs.DS cs.DB

    Exact clustering in linear time

    Authors: Jonathan A. Marshall, Lawrence C. Rafsky

    Abstract: The time complexity of data clustering has been viewed as fundamentally quadratic, slowing with the number of data items, as each item is compared for similarity to preceding items. Clustering of large data sets has been infeasible without resorting to probabilistic methods or to cap** the number of clusters. Here we introduce MIMOSA, a novel class of algorithms which achieve linear time computa… ▽ More

    Submitted 27 February, 2017; v1 submitted 17 February, 2017; originally announced February 2017.

    Comments: 16 pages, 4 figures

    ACM Class: H.3.3; I.5.3; F.2.2; E.1

  18. arXiv:1608.00634  [pdf, other

    cs.IT

    Defining Spatial Security Outage Probability for Exposure Region Based Beamforming

    Authors: Yuanrui Zhang, Youngwook Ko, Roger Woods, Alan Marshall

    Abstract: With increasing number of antennae in base stations, there is considerable interest in using beamfomining to improve physical layer security, by creating an `exposure region' that enhances the received signal quality for a legitimate user and reduces the possibility of leaking information to a randomly located passive eavesdropper. The paper formalises this concept by proposing a novel definition… ▽ More

    Submitted 1 August, 2016; originally announced August 2016.

    Comments: Submitted to the IEEE Transactions on Wireless Communications

  19. arXiv:1509.06338  [pdf

    q-bio.QM cs.CC cs.IT

    Approximations of Algorithmic and Structural Complexity Validate Cognitive-behavioural Experimental Results

    Authors: Hector Zenil, James A. R. Marshall, Jesper Tegnér

    Abstract: Being able to objectively characterise the intrinsic complexity of behavioural patterns resulting from human or animal decisions is fundamental for deconvolving cognition and designing autonomous artificial intelligence systems. Yet complexity is difficult in practice, particularly when strings are short. By numerically approximating algorithmic (Kolmogorov) complexity (K), we establish an objecti… ▽ More

    Submitted 20 December, 2022; v1 submitted 21 September, 2015; originally announced September 2015.

    Comments: 42 pages, 7 figures and 3 tables

  20. arXiv:1507.06800  [pdf, ps, other

    math.CO cs.DM

    The Characterization of planar, 4-connected, K_{2,5}-minor-free graphs

    Authors: Emily Abernethy Marshall, Liana Yepremyan, Zach Gaslowitz

    Abstract: We show that every planar, 4-connected, K2;5-minor- free graph is the square of a cycle of even length at least six.

    Submitted 20 August, 2015; v1 submitted 24 July, 2015; originally announced July 2015.

    Comments: 6 pages

  21. On Unification Modulo One-Sided Distributivity: Algorithms, Variants and Asymmetry

    Authors: Andrew M Marshall, Catherine Meadows, Paliath Narendran

    Abstract: An algorithm for unification modulo one-sided distributivity is an early result by Tidén and Arnborg. More recently this theory has been of interest in cryptographic protocol analysis due to the fact that many cryptographic operators satisfy this property. Unfortunately the algorithm presented in the paper, although correct, has recently been shown not to be polynomial time bounded as claimed. In… ▽ More

    Submitted 18 June, 2015; v1 submitted 23 March, 2015; originally announced March 2015.

    Journal ref: Logical Methods in Computer Science, Volume 11, Issue 2 (June 19, 2015) lmcs:1571

  22. arXiv:1206.0375  [pdf, ps, other

    cs.CC cs.IT nlin.AO nlin.PS

    Some Computational Aspects of Essential Properties of Evolution and Life

    Authors: Hector Zenil, James A. R. Marshall

    Abstract: While evolution has inspired algorithmic methods of heuristic optimisation, little has been done in the way of using concepts of computation to advance our understanding of salient aspects of biological phenomena. We argue that under reasonable assumptions, interesting conclusions can be drawn that are of relevance to behavioural evolution. We will focus on two important features of life--robustne… ▽ More

    Submitted 2 June, 2012; originally announced June 2012.

    Comments: Invited contribution to the ACM Ubiquity Symposium on Evolutionary Computation

    Journal ref: ACM Ubiquity, Symposium on Evolutionary Computation, 2012

  23. On the Complexity of the Tiden-Arnborg Algorithm for Unification modulo One-Sided Distributivity

    Authors: Paliath Narendran, Andrew Marshall, Bibhu Mahapatra

    Abstract: We prove that the Tiden and Arnborg algorithm for equational unification modulo one-sided distributivity is not polynomial time bounded as previously thought. A set of counterexamples is developed that demonstrates that the algorithm goes through exponentially many steps.

    Submitted 22 December, 2010; originally announced December 2010.

    Comments: In Proceedings UNIF 2010, arXiv:1012.4554

    Journal ref: EPTCS 42, 2010, pp. 54-63

  24. Unification modulo a partial theory of exponentiation

    Authors: Deepak Kapur, Andrew Marshall, Paliath Narendran

    Abstract: Modular exponentiation is a common mathematical operation in modern cryptography. This, along with modular multiplication at the base and exponent levels (to different moduli) plays an important role in a large number of key agreement protocols. In our earlier work, we gave many decidability as well as undecidability results for multiple equational theories, involving various properties of modula… ▽ More

    Submitted 22 December, 2010; originally announced December 2010.

    Comments: In Proceedings UNIF 2010, arXiv:1012.4554

    Journal ref: EPTCS 42, 2010, pp. 12-23

  25. arXiv:0907.1597  [pdf, ps, other

    cs.IT cs.NE

    Beyond No Free Lunch: Realistic Algorithms for Arbitrary Problem Classes

    Authors: James A. R. Marshall, Thomas G. Hinton

    Abstract: We show how the necessary and sufficient conditions for the NFL to apply can be reduced to the single requirement of the set of objective functions under consideration being closed under permutation, and quantify the extent to which a set of objectives not closed under permutation can give rise to a performance difference between two algorithms. Then we provide a more refined definition of perform… ▽ More

    Submitted 16 March, 2010; v1 submitted 9 July, 2009; originally announced July 2009.

    Comments: (V3 fixed some other typos and improved some results)

  26. arXiv:cs/0306128  [pdf

    cs.GT

    On the suitability of the 2 x 2 games for studying reciprocal cooperation and kin selection

    Authors: James A. R. Marshall

    Abstract: The 2 x 2 games, in particular the Prisoner's Dilemma, have been extensively used in studies into reciprocal cooperation and, to a lesser extent, kin selection. This paper examines the suitability of the 2 x 2 games for modelling the evolution of cooperation through reciprocation and kin selection. This examination is not restricted to the Prisoner's Dilemma, but includes the other non-trivial s… ▽ More

    Submitted 14 June, 2006; v1 submitted 24 June, 2003; originally announced June 2003.

    Comments: 20 pages, 10 tables, 5 figures

    ACM Class: J.3; J.4