Skip to main content

Showing 1–23 of 23 results for author: Mei, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.13751  [pdf, other

    cs.RO cs.AI

    GameVLM: A Decision-making Framework for Robotic Task Planning Based on Visual Language Models and Zero-sum Games

    Authors: Aoran Mei, Jianhua Wang, Guo-Niu Zhu, Zhongxue Gan

    Abstract: With their prominent scene understanding and reasoning capabilities, pre-trained visual-language models (VLMs) such as GPT-4V have attracted increasing attention in robotic task planning. Compared with traditional task planning strategies, VLMs are strong in multimodal information parsing and code generation and show remarkable efficiency. Although VLMs demonstrate great potential in robotic task… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  2. arXiv:2310.15977  [pdf, other

    cs.CY

    The Conspiracy Money Machine: Uncovering Telegram's Conspiracy Channels and their Profit Model

    Authors: Vincenzo Imperati, Massimo La Morgia, Alessandro Mei, Alberto Maria Mongardini, Francesco Sassi

    Abstract: In recent years, major social media platforms have implemented increasingly strict moderation policies, resulting in bans and restrictions on conspiracy theory-related content. To circumvent these restrictions, conspiracy theorists are turning to alternatives, such as Telegram, where they can express and spread their views with fewer limitations. Telegram offers channels -- virtual rooms where onl… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

  3. arXiv:2310.09624  [pdf, other

    cs.CL cs.AI cs.LG

    ASSERT: Automated Safety Scenario Red Teaming for Evaluating the Robustness of Large Language Models

    Authors: Alex Mei, Sharon Levy, William Yang Wang

    Abstract: As large language models are integrated into society, robustness toward a suite of prompts is increasingly important to maintain reliability in a high-variance environment.Robustness evaluations must comprehensively encapsulate the various settings in which a user may invoke an intelligent system. This paper proposes ASSERT, Automated Safety Scenario Red Teaming, consisting of three methods -- sem… ▽ More

    Submitted 11 November, 2023; v1 submitted 14 October, 2023; originally announced October 2023.

    Comments: In Findings of the 2023 Conference on Empirical Methods in Natural Language Processing

  4. arXiv:2305.13903  [pdf, other

    cs.CL cs.CV

    Let's Think Frame by Frame with VIP: A Video Infilling and Prediction Dataset for Evaluating Video Chain-of-Thought

    Authors: Vaishnavi Himakunthala, Andy Ouyang, Daniel Rose, Ryan He, Alex Mei, Yujie Lu, Chinmay Sonar, Michael Saxon, William Yang Wang

    Abstract: Despite exciting recent results showing vision-language systems' capacity to reason about images using natural language, their capacity for video reasoning remains under-explored. We motivate framing video reasoning as the sequential understanding of a small number of keyframes, thereby leveraging the power and robustness of vision-language while alleviating the computational complexities of proce… ▽ More

    Submitted 9 November, 2023; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: Accepted to the 2023 Conference on Empirical Methods in Natural Language Processing (EMNLP 2023)

  5. arXiv:2305.02317  [pdf, other

    cs.CL cs.CV

    Visual Chain of Thought: Bridging Logical Gaps with Multimodal Infillings

    Authors: Daniel Rose, Vaishnavi Himakunthala, Andy Ouyang, Ryan He, Alex Mei, Yujie Lu, Michael Saxon, Chinmay Sonar, Diba Mirza, William Yang Wang

    Abstract: Recent advances in large language models elicit reasoning in a chain-of-thought that allows models to decompose problems in a human-like fashion. Though this paradigm improves multi-step reasoning ability in language models, it is limited by being unimodal and applied mainly to question-answering tasks. We claim that incorporating visual augmentation into reasoning is essential, especially for com… ▽ More

    Submitted 22 January, 2024; v1 submitted 3 May, 2023; originally announced May 2023.

  6. arXiv:2303.05500  [pdf, ps, other

    cs.CY cs.AI cs.HC

    Users are the North Star for AI Transparency

    Authors: Alex Mei, Michael Saxon, Shiyu Chang, Zachary C. Lipton, William Yang Wang

    Abstract: Despite widespread calls for transparent artificial intelligence systems, the term is too overburdened with disparate meanings to express precise policy aims or to orient concrete lines of research. Consequently, stakeholders often talk past each other, with policymakers expressing vague demands and practitioners devising solutions that may not address the underlying concerns. Part of why this hap… ▽ More

    Submitted 9 March, 2023; originally announced March 2023.

    Comments: 9 pages, 3 tables

  7. arXiv:2303.05345  [pdf, other

    cs.CY

    TGDataset: a Collection of Over One Hundred Thousand Telegram Channels

    Authors: Massimo La Morgia, Alessandro Mei, Alberto Maria Mongardini

    Abstract: Telegram is one of the most popular instant messaging apps in today's digital age. In addition to providing a private messaging service, Telegram, with its channels, represents a valid medium for rapidly broadcasting content to a large audience (COVID-19 announcements), but, unfortunately, also for disseminating radical ideologies and coordinating attacks (Capitol Hill riot). This paper presents t… ▽ More

    Submitted 9 March, 2023; originally announced March 2023.

    Comments: 10 pages, 4 figures

  8. arXiv:2212.09667  [pdf, other

    cs.CL cs.AI cs.LG

    Foveate, Attribute, and Rationalize: Towards Physically Safe and Trustworthy AI

    Authors: Alex Mei, Sharon Levy, William Yang Wang

    Abstract: Users' physical safety is an increasing concern as the market for intelligent systems continues to grow, where unconstrained systems may recommend users dangerous actions that can lead to serious injury. Covertly unsafe text is an area of particular interest, as such text may arise from everyday scenarios and are challenging to detect as harmful. We propose FARM, a novel framework leveraging exter… ▽ More

    Submitted 19 May, 2023; v1 submitted 19 December, 2022; originally announced December 2022.

    Comments: In Findings of the 2023 Conference of the Association for Computational Linguistics

  9. A Game of NFTs: Characterizing NFT Wash Trading in the Ethereum Blockchain

    Authors: Massimo La Morgia, Alessandro Mei, Alberto Maria Mongardini, Eugenio Nerio Nemmi

    Abstract: The Non-Fungible Token (NFT) market in the Ethereum blockchain experienced explosive growth in 2021, with a monthly trade volume reaching \… ▽ More

    Submitted 11 April, 2023; v1 submitted 2 December, 2022; originally announced December 2022.

    Comments: 12 pages, 7 figures, 3 tables

  10. arXiv:2210.09306  [pdf, other

    cs.AI cs.CL cs.LG

    Mitigating Covertly Unsafe Text within Natural Language Systems

    Authors: Alex Mei, Anisha Kabir, Sharon Levy, Melanie Subbiah, Emily Allaway, John Judge, Desmond Patton, Bruce Bimber, Kathleen McKeown, William Yang Wang

    Abstract: An increasingly prevalent problem for intelligent technologies is text safety, as uncontrolled systems may generate recommendations to their users that lead to injury or life-threatening consequences. However, the degree of explicitness of a generated statement that can cause physical harm varies. In this paper, we distinguish types of text that can lead to physical harm and establish one particul… ▽ More

    Submitted 20 March, 2023; v1 submitted 17 October, 2022; originally announced October 2022.

    Comments: In Findings of the 2022 Conference on Empirical Methods in Natural Language Processing

  11. arXiv:2206.08202  [pdf, other

    cs.CY

    Token Spammers, Rug Pulls, and SniperBots: An Analysis of the Ecosystem of Tokens in Ethereum and the Binance Smart Chain (BNB)

    Authors: Federico Cernera, Massimo La Morgia, Alessandro Mei, Francesco Sassi

    Abstract: In this work, we perform a longitudinal analysis of the BNB Smart Chain and Ethereum blockchain from their inception to March 2022. We study the ecosystem of the tokens and liquidity pools, highlighting analogies and differences between the two blockchains. We estimate the lifetime of the tokens, discovering that about 60% of them are active for less than one day. Moreover, we find that 1% of addr… ▽ More

    Submitted 14 May, 2024; v1 submitted 16 June, 2022; originally announced June 2022.

    Comments: This paper is included in the Proceedings of the 32nd USENIX Security Symposium

    Report number: 32nd USENIX Security Symposium (USENIX Security 23)

    Journal ref: https://www.usenix.org/conference/usenixsecurity23/presentation/cernera ISBN: 978-1-939133-37-3 Year:2023

  12. arXiv:2111.13530  [pdf, other

    cs.CY cs.LG cs.SI

    Uncovering the Dark Side of Telegram: Fakes, Clones, Scams, and Conspiracy Movements

    Authors: Massimo La Morgia, Alessandro Mei, Alberto Maria Mongardini, Jie Wu

    Abstract: Telegram is one of the most used instant messaging apps worldwide. Some of its success lies in providing high privacy protection and social network features like the channels -- virtual rooms in which only the admins can post and broadcast messages to all its subscribers. However, these same features contributed to the emergence of borderline activities and, as is common with Online Social Network… ▽ More

    Submitted 29 November, 2021; v1 submitted 26 November, 2021; originally announced November 2021.

    Comments: 12 pages, 6 figures, and 3 tables

    MSC Class: K.4.2

  13. arXiv:2105.00733  [pdf, other

    cs.CY

    The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations

    Authors: Massimo La Morgia, Alessandro Mei, Francesco Sassi, Julinda Stefa

    Abstract: Cryptocurrencies are increasingly popular. Even people who are not experts have started to invest in these securities, and nowadays, cryptocurrency exchanges process transactions for over 100 billion US dollars per month. In spite of this, many cryptocurrencies have low liquidity, and therefore, they are highly prone to market manipulation. This paper performs an in-depth analysis of two market ma… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2005.06610

  14. arXiv:2005.06610  [pdf, other

    cs.CY cs.CR cs.LG q-fin.ST

    Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations

    Authors: Massimo La Morgia, Alessandro Mei, Francesco Sassi, Julinda Stefa

    Abstract: In the last years, cryptocurrencies are increasingly popular. Even people who are not experts have started to invest in these securities and nowadays cryptocurrency exchanges process transactions for over 100 billion US dollars per month. However, many cryptocurrencies have low liquidity and therefore they are highly prone to market manipulation schemes. In this paper, we perform an in-depth analy… ▽ More

    Submitted 4 May, 2020; originally announced May 2020.

    Comments: Accepted for publication at The 29th International Conference on Computer Communications and Networks (ICCCN 2020)

  15. GDPR: When the Right to Access Personal Data Becomes a Threat

    Authors: Luca Bufalieri, Massimo La Morgia, Alessandro Mei, Julinda Stefa

    Abstract: After one year since the entry into force of the GDPR, all web sites and data controllers have updated their procedures to store users' data. The GDPR does not only cover how and what data should be saved by the service providers, but it also guarantees an easy way to know what data are collected and the freedom to export them. In this paper, we carry out a comprehensive study on the right to ac… ▽ More

    Submitted 4 May, 2020; originally announced May 2020.

    Comments: Accepted for publication at IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS) 2020

  16. arXiv:1905.10141  [pdf, other

    cs.CR cs.HC cs.OS

    Scan-and-Pay on Android is Dangerous

    Authors: Enis Ulqinaku, Julinda Stefa, Alessandro Mei

    Abstract: Mobile payments have increased significantly in the recent years and one-to-one money transfers are offered by a wide variety of smartphone applications. These applications usually support scan-and-pay -- a technique that allows a payer to easily scan the destination address of the payment directly from the payee's smartphone screen. This technique is pervasive because it does not require any part… ▽ More

    Submitted 24 May, 2019; originally announced May 2019.

    Comments: Published in Infocom MobiSec Workshop 2019, Paris, France

  17. arXiv:1611.01477  [pdf, other

    cs.CR

    Using Hover to Compromise the Confidentiality of User Input on Android

    Authors: Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, Srdjan Capkun

    Abstract: We show that the new hover (floating touch) technology, available in a number of today's smartphone models, can be abused by any Android application running with a common SYSTEM_ALERT_WINDOW permission to record all touchscreen input into other applications. Leveraging this attack, a malicious application running on the system is therefore able to profile user's behavior, capture sensitive input s… ▽ More

    Submitted 2 August, 2017; v1 submitted 4 November, 2016; originally announced November 2016.

    Comments: 11 pages

  18. arXiv:1105.3716  [pdf, other

    cs.CR

    Personal Marks and Community Certificates: Detecting Clones in Mobile Wireless Networks of Smart-Phones

    Authors: Marco Valerio Barbera, Alessandro Mei

    Abstract: We consider the problem of detecting clones in wireless mobile adhoc networks. We assume that one of the devices of the network has been cloned. Everything, including certificates and secret keys. This can happen quite easily, because of a virus that immediately after sending all the content of the infected device to the adversary destroys itself, or just because the owner has left his device unat… ▽ More

    Submitted 18 May, 2011; originally announced May 2011.

    Comments: 12 pages, 22 figures

    ACM Class: H.4; D.2.8

  19. arXiv:0912.2199  [pdf, ps, other

    cs.CR cs.NI

    The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack

    Authors: Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei

    Abstract: Mobile Ad Hoc networks, due to the unattended nature of the network itself and the dispersed location of nodes, are subject to several unique security issues. One of the most vexed security threat is node capture. A few solutions have already been proposed to address this problem; however, those solutions are either centralized or focused on theoretical mobility models alone. In the former case… ▽ More

    Submitted 11 December, 2009; originally announced December 2009.

  20. arXiv:0809.2730  [pdf, ps, other

    cs.DC cs.NI

    SWIM: A Simple Model to Generate Small Mobile Worlds

    Authors: Alessandro Mei, Julinda Stefa

    Abstract: This paper presents small world in motion (SWIM), a new mobility model for ad-hoc networking. SWIM is relatively simple, is easily tuned by setting just a few parameters, and generates traces that look real--synthetic traces have the same statistical properties of real traces. SWIM shows experimentally and theoretically the presence of the power law and exponential decay dichotomy of inter-conta… ▽ More

    Submitted 22 January, 2009; v1 submitted 16 September, 2008; originally announced September 2008.

    Comments: Accepted for publication in IEEE INFOCOM 09, Rio de Janeiro, Brazil, April 2009

    ACM Class: C.2; C.2.1; C.2.2; C.4

  21. arXiv:0711.0892  [pdf, other

    cs.NI

    Routing in Outer Space: Improved Security and Energy-Efficiency in Multi-Hop Wireless Networks

    Authors: Alessandro Mei, Julinda Stefa

    Abstract: In this paper we consider security-related and energy-efficiency issues in multi-hop wireless networks. We start our work from the observation, known in the literature, that shortest path routing creates congested areas in multi-hop wireless networks. These areas are critical--they generate both security and energy efficiency issues. We attack these problems and set out routing in outer space, a… ▽ More

    Submitted 6 November, 2007; originally announced November 2007.

    Comments: Short version invited to INFOCOM 2008 mini-conference

    ACM Class: C.2.2

  22. arXiv:cs/0502093  [pdf, ps, other

    cs.DC

    Online Permutation Routing in Partitioned Optical Passive Star Networks

    Authors: Alessandro Mei, Romeo Rizzi

    Abstract: This paper establishes the state of the art in both deterministic and randomized online permutation routing in the POPS network. Indeed, we show that any permutation can be routed online on a POPS network either with $O(\frac{d}{g}\log g)$ deterministic slots, or, with high probability, with $5c\lceil d/g\rceil+o(d/g)+O(\log\log g)$ randomized slots, where constant… ▽ More

    Submitted 25 February, 2005; originally announced February 2005.

  23. arXiv:cs/0109027  [pdf, ps, other

    cs.DC cs.DS

    Routing Permutations in Partitioned Optical Passive Star Networks

    Authors: Alessandro Mei, Romeo Rizzi

    Abstract: It is shown that a POPS network with g groups and d processors per group can efficiently route any permutation among the n=dg processors. The number of slots used is optimal in the worst case, and is at most the double of the optimum for all permutations p such that p(i)<>i for all i.

    Submitted 18 September, 2001; originally announced September 2001.

    Comments: 8 pages, 3 figures

    ACM Class: C.1.4