Skip to main content

Showing 1–50 of 142 results for author: Miller, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10053  [pdf, other

    cs.LO

    Property-Based Testing by Elaborating Proof Outlines

    Authors: Dale Miller, Alberto Momigliano

    Abstract: Property-based testing (PBT) is a technique for validating code against an executable specification by automatically generating test-data. We present a proof-theoretical reconstruction of this style of testing for relational specifications and employ the Foundational Proof Certificate framework to describe test generators. We do this by encoding certain kinds of ``proof outlines'' as proof certifi… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  2. arXiv:2406.07778  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    On Trojans in Refined Language Models

    Authors: Jayaram Raghuram, George Kesidis, David J. Miller

    Abstract: A Trojan in a language model can be inserted when the model is refined for a particular application such as determining the sentiment of product reviews. In this paper, we clarify and empirically explore variations of the data-poisoning threat model. We then empirically assess two simple defenses each for a different defense scenario. Finally, we provide a brief survey of related attacks and defen… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  3. arXiv:2406.05951  [pdf, other

    cs.RO

    Open-Vocabulary Part-Based Gras**

    Authors: Tjeard van Oort, Dimity Miller, Will N. Browne, Nicolas Marticorena, Jesse Haviland, Niko Suenderhauf

    Abstract: Many robotic applications require to grasp objects not arbitrarily but at a very specific object part. This is especially important for manipulation tasks beyond simple pick-and-place scenarios or in robot-human interactions, such as object handovers. We propose AnyPart, a practical system that combines open-vocabulary object detection, open-vocabulary part segmentation and 6DOF grasp pose predict… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

  4. arXiv:2405.07169  [pdf, other

    cs.RO

    Challenges and Opportunities for Large-Scale Exploration with Air-Ground Teams using Semantics

    Authors: Fernando Cladera, Ian D. Miller, Zachary Ravichandran, Varun Murali, Jason Hughes, M. Ani Hsieh, C. J. Taylor, Vijay Kumar

    Abstract: One common and desirable application of robots is exploring potentially hazardous and unstructured environments. Air-ground collaboration offers a synergistic approach to addressing such exploration challenges. In this paper, we demonstrate a system for large-scale exploration using a team of aerial and ground robots. Our system uses semantics as lingua franca, and relies on fully opportunistic co… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    Comments: 6 pages, 5 figres

  5. arXiv:2405.03918  [pdf, other

    cs.LG cs.CR

    Unlearning Backdoor Attacks through Gradient-Based Model Pruning

    Authors: Kealan Dunnett, Reza Arablouei, Dimity Miller, Volkan Dedeoglu, Raja Jurdak

    Abstract: In the era of increasing concerns over cybersecurity threats, defending against backdoor attacks is paramount in ensuring the integrity and reliability of machine learning models. However, many existing approaches require substantial amounts of data for effective mitigation, posing significant challenges in practical deployment. To address this, we propose a novel approach to counter backdoor atta… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  6. arXiv:2403.16528  [pdf, other

    cs.CV

    Open-Set Recognition in the Age of Vision-Language Models

    Authors: Dimity Miller, Niko Sünderhauf, Alex Kenna, Keita Mason

    Abstract: Are vision-language models (VLMs) open-set models because they are trained on internet-scale datasets? We answer this question with a clear no - VLMs introduce closed-set assumptions via their finite query set, making them vulnerable to open-set conditions. We systematically evaluate VLMs for open-set recognition and find they frequently misclassify objects not contained in their query set, leadin… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: 31 pages, under review

  7. arXiv:2402.02034  [pdf, other

    cs.CR cs.LG cs.NE

    Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks

    Authors: Xi Li, Hang Wang, David J. Miller, George Kesidis

    Abstract: A variety of defenses have been proposed against backdoors attacks on deep neural network (DNN) classifiers. Universal methods seek to reliably detect and/or mitigate backdoors irrespective of the incorporation mechanism used by the attacker, while reverse-engineering methods often explicitly assume one. In this paper, we describe a new detector that: relies on internal feature map of the defended… ▽ More

    Submitted 22 May, 2024; v1 submitted 3 February, 2024; originally announced February 2024.

  8. arXiv:2312.13634  [pdf, ps, other

    cs.LO

    Peano Arithmetic and $μ$MALL

    Authors: Matteo Manighetti, Dale Miller

    Abstract: Formal theories of arithmetic have traditionally been based on either classical or intuitionistic logic, leading to the development of Peano and Heyting arithmetic, respectively. We propose a use $μ$MALL as a formal theory of arithmetic based on linear logic. This formal system is presented as a sequent calculus proof system that extends the standard proof system for multiplicative-additive linear… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Comments: 21 pages

  9. arXiv:2312.11805  [pdf, other

    cs.CL cs.AI cs.CV

    Gemini: A Family of Highly Capable Multimodal Models

    Authors: Gemini Team, Rohan Anil, Sebastian Borgeaud, Jean-Baptiste Alayrac, Jiahui Yu, Radu Soricut, Johan Schalkwyk, Andrew M. Dai, Anja Hauth, Katie Millican, David Silver, Melvin Johnson, Ioannis Antonoglou, Julian Schrittwieser, Amelia Glaese, Jilin Chen, Emily Pitler, Timothy Lillicrap, Angeliki Lazaridou, Orhan Firat, James Molloy, Michael Isard, Paul R. Barham, Tom Hennigan, Benjamin Lee , et al. (1325 additional authors not shown)

    Abstract: This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultr… ▽ More

    Submitted 17 June, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

  10. arXiv:2310.03899  [pdf, other

    cs.LG

    CrysFormer: Protein Structure Prediction via 3d Patterson Maps and Partial Structure Attention

    Authors: Chen Dun, Qiutai Pan, Shikai **, Ria Stevens, Mitchell D. Miller, George N. Phillips, Jr., Anastasios Kyrillidis

    Abstract: Determining the structure of a protein has been a decades-long open question. A protein's three-dimensional structure often poses nontrivial computation costs, when classical simulation algorithms are utilized. Advances in the transformer neural network architecture -- such as AlphaFold2 -- achieve significant improvements for this problem, by learning from a large dataset of sequence information… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  11. arXiv:2309.16827  [pdf, other

    cs.LG

    Post-Training Overfitting Mitigation in DNN Classifiers

    Authors: Hang Wang, David J. Miller, George Kesidis

    Abstract: Well-known (non-malicious) sources of overfitting in deep neural net (DNN) classifiers include: i) large class imbalances; ii) insufficient training-set diversity; and iii) over-training. In recent work, it was shown that backdoor data-poisoning also induces overfitting, with unusually large classification margins to the attacker's target class, mediated particularly by (unbounded) ReLU activation… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

  12. arXiv:2309.15975  [pdf, other

    cs.RO

    Enabling Large-scale Heterogeneous Collaboration with Opportunistic Communications

    Authors: Fernando Cladera, Zachary Ravichandran, Ian D. Miller, M. Ani Hsieh, C. J. Taylor, Vijay Kumar

    Abstract: Multi-robot collaboration in large-scale environments with limited-sized teams and without external infrastructure is challenging, since the software framework required to support complex tasks must be robust to unreliable and intermittent communication links. In this work, we present MOCHA (Multi-robot Opportunistic Communication for Heterogeneous Collaboration), a framework for resilient multi-r… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

    Comments: 7 pages, 8 figures

  13. arXiv:2308.09850  [pdf, other

    cs.LG cs.CR

    Backdoor Mitigation by Correcting the Distribution of Neural Activations

    Authors: Xi Li, Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Backdoor (Trojan) attacks are an important type of adversarial exploit against deep neural networks (DNNs), wherein a test instance is (mis)classified to the attacker's target class whenever the attacker's backdoor trigger is present. In this paper, we reveal and analyze an important property of backdoor attacks: a successful attack causes an alteration in the distribution of internal layer activa… ▽ More

    Submitted 18 August, 2023; originally announced August 2023.

  14. arXiv:2308.04617  [pdf, other

    cs.LG cs.CR

    Improved Activation Clip** for Universal Backdoor Mitigation and Test-Time Detection

    Authors: Hang Wang, Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Deep neural networks are vulnerable to backdoor attacks (Trojans), where an attacker poisons the training set with backdoor triggers so that the neural network learns to classify test-time triggers to the attacker's designated target class. Recent work shows that backdoor poisoning induces over-fitting (abnormally large activations) in the attacked model, which motivates a general, post-training c… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

  15. arXiv:2307.16506  [pdf, other

    hep-ph cs.LG hep-ex

    Explainable Equivariant Neural Networks for Particle Physics: PELICAN

    Authors: Alexander Bogatskiy, Timothy Hoffman, David W. Miller, Jan T. Offermann, Xiaoyang Liu

    Abstract: PELICAN is a novel permutation equivariant and Lorentz invariant or covariant aggregator network designed to overcome common limitations found in architectures applied to particle physics problems. Compared to many approaches that use non-specialized architectures that neglect underlying physics principles and require very large numbers of parameters, PELICAN employs a fundamentally symmetry group… ▽ More

    Submitted 23 February, 2024; v1 submitted 31 July, 2023; originally announced July 2023.

    Comments: 52 pages, 34 figures, 12 tables

  16. A system of inference based on proof search: an extended abstract

    Authors: Dale Miller

    Abstract: Gentzen designed his natural deduction proof system to ``come as close as possible to actual reasoning.'' Indeed, natural deduction proofs closely resemble the static structure of logical reasoning in mathematical arguments. However, different features of inference are compelling to capture when one wants to support the process of searching for proofs. PSF (Proof Search Framework) attempts to c… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

    Journal ref: 38th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS 2023), Jun 2023, Boston, United States. pp.1-11

  17. arXiv:2306.10770  [pdf, other

    cs.LG cs.SI

    Unsupervised Framework for Evaluating and Explaining Structural Node Embeddings of Graphs

    Authors: Ashkan Dehghan, Kinga Siuta, Agata Skorupka, Andrei Betlen, David Miller, Bogumil Kaminski, Pawel Pralat

    Abstract: An embedding is a map** from a set of nodes of a network into a real vector space. Embeddings can have various aims like capturing the underlying graph topology and structure, node-to-node relationship, or other relevant information about the graph, its subgraphs or nodes themselves. A practical challenge with using embeddings is that there are many available variants to choose from. Selecting a… ▽ More

    Submitted 19 June, 2023; originally announced June 2023.

    Comments: 21 pages, 9 figures

    MSC Class: 68T30

  18. arXiv:2305.02462  [pdf, other

    physics.optics cs.ET eess.IV

    Scalable Low-latency Optical Phase Sensor Array

    Authors: Zhanghao Sun, Sunil Pai, Carson Valdez, Maziyar Milanizadeh, Andrea Melloni, Francesco Morichetti, David A. B. Miller, Olav Solgaard

    Abstract: Optical phase measurement is critical for many applications and traditional approaches often suffer from mechanical instability, temporal latency, and computational complexity. In this paper, we describe compact phase sensor arrays based on integrated photonics, which enable accurate and scalable reference-free phase sensing in a few measurement steps. This is achieved by connecting multiple two-p… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

  19. arXiv:2304.13907  [pdf, other

    cs.SI

    Network Analysis as a Tool for Sha** Conservation and Development Policy: A Case Study of Timber Market Optimization in India

    Authors: Xiou Ge, Sarah E. Brown, Pushpendra Rana, Lav R. Varshney, Daniel C. Miller

    Abstract: The incorporation of trees on farms can help to improve livelihoods and build resilience among small-holder farmers in develo** countries. On-farm trees can help gen- erate additional income from commercial tree harvest as well as contribute significant environmental benefits and ecosystem services to increase resiliency. Long-term benefits from tree-based livelihoods, however, depend on sustain… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Comments: Paper accepted to proceedings of the 5th Data for Good Exchange (D4GX)

  20. arXiv:2303.14930  [pdf, other

    cs.CV

    Addressing the Challenges of Open-World Object Detection

    Authors: David Pershouse, Feras Dayoub, Dimity Miller, Niko Sünderhauf

    Abstract: We address the challenging problem of open world object detection (OWOD), where object detectors must identify objects from known classes while also identifying and continually learning to detect novel objects. Prior work has resulted in detectors that have a relatively low ability to detect novel objects, and a high likelihood of classifying a novel object as one of the known classes. We approach… ▽ More

    Submitted 27 March, 2023; originally announced March 2023.

  21. arXiv:2212.08568  [pdf, other

    cs.CV cs.LG

    Biomedical image analysis competitions: The state of current participation practice

    Authors: Matthias Eisenmann, Annika Reinke, Vivienn Weru, Minu Dietlinde Tizabi, Fabian Isensee, Tim J. Adler, Patrick Godau, Veronika Cheplygina, Michal Kozubek, Sharib Ali, Anubha Gupta, Jan Kybic, Alison Noble, Carlos Ortiz de Solórzano, Samiksha Pachade, Caroline Petitjean, Daniel Sage, Donglai Wei, Elizabeth Wilden, Deepak Alapatt, Vincent Andrearczyk, Ujjwal Baid, Spyridon Bakas, Niranjan Balu, Sophia Bano , et al. (331 additional authors not shown)

    Abstract: The number of international benchmarking competitions is steadily increasing in various fields of machine learning (ML) research and practice. So far, however, little is known about the common practice as well as bottlenecks faced by the community in tackling the research questions posed. To shed light on the status quo of algorithm development in the specific field of biomedical imaging analysis,… ▽ More

    Submitted 12 September, 2023; v1 submitted 16 December, 2022; originally announced December 2022.

  22. arXiv:2211.10335  [pdf, other

    eess.SP cs.LG

    Large Scale Radio Frequency Wideband Signal Detection & Recognition

    Authors: Luke Boegner, Garrett Vanhoy, Phillip Vallance, Manbir Gulati, Dresden Feitzinger, Bradley Comar, Robert D. Miller

    Abstract: Applications of deep learning to the radio frequency (RF) domain have largely concentrated on the task of narrowband signal classification after the signals of interest have already been detected and extracted from a wideband capture. To encourage broader research with wideband operations, we introduce the WidebandSig53 (WBSig53) dataset which consists of 550 thousand synthetically-generated sampl… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

  23. arXiv:2211.09722  [pdf, other

    cs.CL cs.LG

    Federated Multilingual Models for Medical Transcript Analysis

    Authors: Andre Manoel, Mirian Hipolito Garcia, Tal Baumel, Shize Su, Jialei Chen, Dan Miller, Danny Karmon, Robert Sim, Dimitrios Dimitriadis

    Abstract: Federated Learning (FL) is a novel machine learning approach that allows the model trainer to access more data samples, by training the model across multiple decentralized data sources, while data access constraints are in place. Such trained models can achieve significantly higher performance beyond what can be done when trained on a single data source. As part of FL's promises, none of the train… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

  24. arXiv:2211.00454  [pdf, other

    hep-ph cs.LG hep-ex

    PELICAN: Permutation Equivariant and Lorentz Invariant or Covariant Aggregator Network for Particle Physics

    Authors: Alexander Bogatskiy, Timothy Hoffman, David W. Miller, Jan T. Offermann

    Abstract: Many current approaches to machine learning in particle physics use generic architectures that require large numbers of parameters and disregard underlying physics principles, limiting their applicability as scientific modeling tools. In this work, we present a machine learning architecture that uses a set of inputs maximally reduced with respect to the full 6-dimensional Lorentz symmetry, and is… ▽ More

    Submitted 23 December, 2022; v1 submitted 1 November, 2022; originally announced November 2022.

  25. arXiv:2210.16935  [pdf, other

    physics.optics cs.ET eess.SP

    Scalable and self-correcting photonic computation using balanced photonic binary tree cascades

    Authors: Sunil Pai, Olav Solgaard, Shanhui Fan, David A. B. Miller

    Abstract: Programmable unitary photonic networks that interfere hundreds of modes are emerging as a key technology in energy-efficient sensing, machine learning, cryptography, and linear optical quantum computing applications. In this work, we establish a theoretical framework to quantify error tolerance and scalability in a more general class of "binary tree cascade'' programmable photonic networks that ac… ▽ More

    Submitted 30 October, 2022; originally announced October 2022.

    Comments: 32 pages, 12 figures

  26. arXiv:2210.10272  [pdf, other

    cs.LG cs.CR cs.CV

    Training set cleansing of backdoor poisoning by self-supervised representation learning

    Authors: H. Wang, S. Karami, O. Dia, H. Ritter, E. Emamjomeh-Zadeh, J. Chen, Z. Xiang, D. J. Miller, G. Kesidis

    Abstract: A backdoor or Trojan attack is an important type of data poisoning attack against deep neural network (DNN) classifiers, wherein the training dataset is poisoned with a small number of samples that each possess the backdoor pattern (usually a pattern that is either imperceptible or innocuous) and which are mislabeled to the attacker's target class. When trained on a backdoor-poisoned dataset, a DN… ▽ More

    Submitted 14 March, 2023; v1 submitted 18 October, 2022; originally announced October 2022.

  27. Comparison of different automatic solutions for resection cavity segmentation in postoperative MRI volumes including longitudinal acquisitions

    Authors: Luca Canalini, Jan Klein, Nuno Pedrosa de Barros, Diana Maria Sima, Dorothea Miller, Horst Hahn

    Abstract: In this work, we compare five deep learning solutions to automatically segment the resection cavity in postoperative MRI. The proposed methods are based on the same 3D U-Net architecture. We use a dataset of postoperative MRI volumes, each including four MRI sequences and the ground truth of the corresponding resection cavity. Four solutions are trained with a different MRI sequence. Besides, a me… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

    Journal ref: SPIE Proceedings Vol. 11598 - Medical Imaging 2021: Image-Guided Procedures, Robotic Interventions, and Modeling

  28. arXiv:2210.01361  [pdf, other

    cs.CV

    Uncertainty-Aware Lidar Place Recognition in Novel Environments

    Authors: Keita Mason, Joshua Knights, Milad Ramezani, Peyman Moghadam, Dimity Miller

    Abstract: State-of-the-art lidar place recognition models exhibit unreliable performance when tested on environments different from their training dataset, which limits their use in complex and evolving environments. To address this issue, we investigate the task of uncertainty-aware lidar place recognition, where each predicted place must have an associated uncertainty that can be used to identify and reje… ▽ More

    Submitted 11 July, 2023; v1 submitted 4 October, 2022; originally announced October 2022.

    Comments: 8 pages, 4 figures. Accepted for publication at IEEE IROS 2023

  29. arXiv:2209.08718  [pdf, other

    cs.CV

    Density-aware NeRF Ensembles: Quantifying Predictive Uncertainty in Neural Radiance Fields

    Authors: Niko Sünderhauf, Jad Abou-Chakra, Dimity Miller

    Abstract: We show that ensembling effectively quantifies model uncertainty in Neural Radiance Fields (NeRFs) if a density-aware epistemic uncertainty term is considered. The naive ensembles investigated in prior work simply average rendered RGB images to quantify the model uncertainty caused by conflicting explanations of the observed scene. In contrast, we additionally consider the termination probabilitie… ▽ More

    Submitted 18 September, 2022; originally announced September 2022.

  30. Active Metric-Semantic Map** by Multiple Aerial Robots

    Authors: Xu Liu, Ankit Prabhu, Fernando Cladera, Ian D. Miller, Lifeng Zhou, Camillo J. Taylor, Vijay Kumar

    Abstract: Traditional approaches for active map** focus on building geometric maps. For most real-world applications, however, actionable information is related to semantically meaningful objects in the environment. We propose an approach to the active metric-semantic map** problem that enables multiple heterogeneous robots to collaboratively build a map of the environment. The robots actively explore t… ▽ More

    Submitted 13 August, 2023; v1 submitted 17 September, 2022; originally announced September 2022.

    Comments: ICRA 2023 (2023 International Conference on Robotics and Automation)

    Journal ref: ICRA 2023 (2023 International Conference on Robotics and Automation)

  31. arXiv:2208.13930  [pdf, other

    cs.CV

    SAFE: Sensitivity-Aware Features for Out-of-Distribution Object Detection

    Authors: Samuel Wilson, Tobias Fischer, Feras Dayoub, Dimity Miller, Niko Sünderhauf

    Abstract: We address the problem of out-of-distribution (OOD) detection for the task of object detection. We show that residual convolutional layers with batch normalisation produce Sensitivity-Aware FEatures (SAFE) that are consistently powerful for distinguishing in-distribution from out-of-distribution detections. We extract SAFE vectors for every detected object, and train a multilayer perceptron on the… ▽ More

    Submitted 22 August, 2023; v1 submitted 29 August, 2022; originally announced August 2022.

    Journal ref: IEEE International Conference on Computer Vision 2023

  32. arXiv:2207.09918  [pdf, other

    cs.LG eess.SP

    Large Scale Radio Frequency Signal Classification

    Authors: Luke Boegner, Manbir Gulati, Garrett Vanhoy, Phillip Vallance, Bradley Comar, Silvija Kokalj-Filipovic, Craig Lennon, Robert D. Miller

    Abstract: Existing datasets used to train deep learning models for narrowband radio frequency (RF) signal classification lack enough diversity in signal types and channel impairments to sufficiently assess model performance in the real world. We introduce the Sig53 dataset consisting of 5 million synthetically-generated samples from 53 different signal classes and expertly chosen impairments. We also introd… ▽ More

    Submitted 20 July, 2022; originally announced July 2022.

  33. arXiv:2206.14289  [pdf, other

    cs.RO

    Stronger Together: Air-Ground Robotic Collaboration Using Semantics

    Authors: Ian D. Miller, Fernando Cladera, Trey Smith, Camillo Jose Taylor, Vijay Kumar

    Abstract: In this work, we present an end-to-end heterogeneous multi-robot system framework where ground robots are able to localize, plan, and navigate in a semantic map created in real time by a high-altitude quadrotor. The ground robots choose and deconflict their targets independently, without any external intervention. Moreover, they perform cross-view localization by matching their local maps with the… ▽ More

    Submitted 28 June, 2022; originally announced June 2022.

    Comments: Sumbitted to RA-L and IROS

  34. arXiv:2206.02157  [pdf, other

    cs.LG stat.ML

    Never mind the metrics -- what about the uncertainty? Visualising confusion matrix metric distributions

    Authors: David Lovell, Dimity Miller, Jaiden Capra, Andrew Bradley

    Abstract: There are strong incentives to build models that demonstrate outstanding predictive performance on various datasets and benchmarks. We believe these incentives risk a narrow focus on models and on the performance metrics used to evaluate and compare them -- resulting in a growing body of literature to evaluate and compare metrics. This paper strives for a more balanced perspective on classifier pe… ▽ More

    Submitted 5 June, 2022; originally announced June 2022.

    Comments: 60 pages, 45 figures

  35. arXiv:2205.08512  [pdf, other

    cs.ET cs.CR physics.optics

    Experimental evaluation of digitally-verifiable photonic computing for blockchain and cryptocurrency

    Authors: Sunil Pai, Taewon Park, Marshall Ball, Bogdan Penkovsky, Maziyar Milanizadeh, Michael Dubrovsky, Nathnael Abebe, Francesco Morichetti, Andrea Melloni, Shanhui Fan, Olav Solgaard, David A. B. Miller

    Abstract: As blockchain technology and cryptocurrency become increasingly mainstream, ever-increasing energy costs required to maintain the computational power running these decentralized platforms create a market for more energy-efficient hardware. Photonic cryptographic hash functions, which use photonic integrated circuits to accelerate computation, promise energy efficiency for verifying transactions an… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.

    Comments: 17 pages, 7 figures

  36. arXiv:2205.08501  [pdf, other

    cs.ET cs.LG physics.optics

    Experimentally realized in situ backpropagation for deep learning in nanophotonic neural networks

    Authors: Sunil Pai, Zhanghao Sun, Tyler W. Hughes, Taewon Park, Ben Bartlett, Ian A. D. Williamson, Momchil Minkov, Maziyar Milanizadeh, Nathnael Abebe, Francesco Morichetti, Andrea Melloni, Shanhui Fan, Olav Solgaard, David A. B. Miller

    Abstract: Neural networks are widely deployed models across many scientific disciplines and commercial endeavors ranging from edge computing and sensing to large-scale signal processing in data centers. The most efficient and well-entrenched method to train such networks is backpropagation, or reverse-mode automatic differentiation. To counter an exponentially increasing energy budget in the artificial inte… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.

    Comments: 23 pages, 10 figures

  37. arXiv:2205.06900  [pdf, other

    cs.LG cs.CR

    MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic

    Authors: Hang Wang, Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Backdoor attacks are an important type of adversarial threat against deep neural network classifiers, wherein test samples from one or more source classes will be (mis)classified to the attacker's target class when a backdoor pattern is embedded. In this paper, we focus on the post-training backdoor defense scenario commonly considered in the literature, where the defender aims to detect whether a… ▽ More

    Submitted 6 August, 2023; v1 submitted 13 May, 2022; originally announced May 2022.

  38. arXiv:2205.05150  [pdf, other

    cs.IT physics.optics

    Bounds on the Coupling Strengths of Communication Channels and Their Information Capacities

    Authors: Zeyu Kuang, David A. B. Miller, Owen D. Miller

    Abstract: The concept of optimal communication channels shapes our understanding of wave-based communication. Its analysis, however, always pertains to specific communication-domain geometries, without a general theory of scaling laws or fundamental limits. In this article, we derive shape-independent bounds on the coupling strengths and information capacities of optimal communication channels for any two d… ▽ More

    Submitted 10 May, 2022; originally announced May 2022.

  39. arXiv:2205.03322  [pdf, ps, other

    cs.CR cs.OS cs.PL

    Private delegated computations using strong isolation

    Authors: Mathias Brossard, Guilhem Bryant, Basma El Gaabouri, Xinxin Fan, Alexandre Ferreira, Edmund Grimley-Evans, Christopher Haster, Evan Johnson, Derek Miller, Fan Mo, Dominic P. Mulligan, Nick Spinale, Eric van Hensbergen, Hugo J. M. Vincent, Shale Xiong

    Abstract: Sensitive computations are now routinely delegated to third-parties. In response, Confidential Computing technologies are being introduced to microprocessors, offering a protected processing environment, which we generically call an isolate, providing confidentiality and integrity guarantees to code and data hosted within -- even in the face of a privileged attacker. Isolates, with an attestation… ▽ More

    Submitted 6 May, 2022; originally announced May 2022.

  40. Any Way You Look At It: Semantic Crossview Localization and Map** with LiDAR

    Authors: Ian D. Miller, Anthony Cowley, Ravi Konkimalla, Shreyas S. Shivakumar, Ty Nguyen, Trey Smith, Camillo Jose Taylor, Vijay Kumar

    Abstract: Currently, GPS is by far the most popular global localization method. However, it is not always reliable or accurate in all environments. SLAM methods enable local state estimation but provide no means of registering the local map to a global one, which can be important for inter-robot collaboration or human interaction. In this work, we present a real-time method for utilizing semantics to global… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Comments: Published in the IEEE Robotics and Automation Letters and presented at the IEEE 2021 International Conference on Robotics and Automation. See https://www.youtube.com/watch?v=_qwAoYK9iGU for accompanying video

    Journal ref: in IEEE Robotics and Automation Letters, vol. 6, no. 2, pp. 2397-2404, April 2021

  41. arXiv:2203.08812  [pdf

    eess.IV cs.AI cs.CV cs.LG

    Self-Supervised Deep Learning to Enhance Breast Cancer Detection on Screening Mammography

    Authors: John D. Miller, Vignesh A. Arasu, Albert X. Pu, Laurie R. Margolies, Weiva Sieh, Li Shen

    Abstract: A major limitation in applying deep learning to artificial intelligence (AI) systems is the scarcity of high-quality curated datasets. We investigate strong augmentation based self-supervised learning (SSL) techniques to address this problem. Using breast cancer detection as an example, we first identify a mammogram-specific transformation paradigm and then systematically compare four recent SSL m… ▽ More

    Submitted 15 March, 2022; originally announced March 2022.

  42. arXiv:2203.08182  [pdf, other

    cs.RO

    DSOL: A Fast Direct Sparse Odometry Scheme

    Authors: Chao Qu, Shreyas S. Shivakumar, Ian D. Miller, Camillo J. Taylor

    Abstract: In this paper, we describe Direct Sparse Odometry Lite (DSOL), an improved version of Direct Sparse Odometry (DSO). We propose several algorithmic and implementation enhancements which speed up computation by a significant factor (on average 5x) even on resource constrained platforms. The increase in speed allows us to process images at higher frame rates, which in turn provides better results on… ▽ More

    Submitted 15 March, 2022; originally announced March 2022.

  43. arXiv:2203.07662  [pdf, other

    cs.CV cs.AI cs.LG cs.RO

    What's in the Black Box? The False Negative Mechanisms Inside Object Detectors

    Authors: Dimity Miller, Peyman Moghadam, Mark Cox, Matt Wildie, Raja Jurdak

    Abstract: In object detection, false negatives arise when a detector fails to detect a target object. To understand why object detectors produce false negatives, we identify five 'false negative mechanisms', where each mechanism describes how a specific component inside the detector architecture failed. Focusing on two-stage and one-stage anchor-box object detector architectures, we introduce a framework fo… ▽ More

    Submitted 31 July, 2022; v1 submitted 15 March, 2022; originally announced March 2022.

    Comments: 8 pages, 5 figures. Contact emails: [email protected], [email protected], [email protected], [email protected], [email protected]

    Journal ref: IEEE Robotics and Automation Letters (July 2022), Volume 7, Issue 3, pages 8510-8517

  44. arXiv:2203.07620  [pdf, ps, other

    hep-ex cs.LG eess.SY physics.ins-det

    Innovations in trigger and data acquisition systems for next-generation physics facilities

    Authors: Rainer Bartoldus, Catrin Bernius, David W. Miller

    Abstract: Data-intensive physics facilities are increasingly reliant on heterogeneous and large-scale data processing and computational systems in order to collect, distribute, process, filter, and analyze the ever increasing huge volumes of data being collected. Moreover, these tasks are often performed in hard real-time or quasi real-time processing pipelines that place extreme constraints on various para… ▽ More

    Submitted 17 March, 2022; v1 submitted 14 March, 2022; originally announced March 2022.

    Comments: Contribution to Snowmass 2021

  45. arXiv:2203.06153  [pdf, other

    cs.LG astro-ph.IM cs.AI hep-ex hep-ph

    Symmetry Group Equivariant Architectures for Physics

    Authors: Alexander Bogatskiy, Sanmay Ganguly, Thomas Kipf, Risi Kondor, David W. Miller, Daniel Murnane, Jan T. Offermann, Mariel Pettee, Phiala Shanahan, Chase Shimmin, Savannah Thais

    Abstract: Physical theories grounded in mathematical symmetries are an essential component of our understanding of a wide range of properties of the universe. Similarly, in the domain of machine learning, an awareness of symmetries such as rotation or permutation invariance has driven impressive performance breakthroughs in computer vision, natural language processing, and other important applications. In t… ▽ More

    Submitted 11 March, 2022; originally announced March 2022.

    Comments: Contribution to Snowmass 2021

  46. arXiv:2203.01547  [pdf, other

    cs.RO

    The RATTLE Motion Planning Algorithm for Robust Online Parametric Model Improvement with On-Orbit Validation

    Authors: Keenan Albee, Monica Ekal, Brian Coltin, Rodrigo Ventura, Richard Linares, David W. Miller

    Abstract: Certain forms of uncertainty that robotic systems encounter can be explicitly learned within the context of a known model, like parametric model uncertainties such as mass and moments of inertia. Quantifying such parametric uncertainty is important for more accurate prediction of the system behavior, leading to safe and precise task execution. In tandem, providing a form of robustness guarantee ag… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

    Comments: 8 pages, 11 figures, RA-L with IROS 2022 option

  47. arXiv:2201.08474  [pdf, other

    cs.CR cs.LG

    Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios

    Authors: Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Backdoor attacks (BAs) are an emerging threat to deep neural network classifiers. A victim classifier will predict to an attacker-desired target class whenever a test sample is embedded with the same backdoor pattern (BP) that was used to poison the classifier's training set. Detecting whether a classifier is backdoor attacked is not easy in practice, especially when the defender is, e.g., a downs… ▽ More

    Submitted 14 March, 2022; v1 submitted 20 January, 2022; originally announced January 2022.

    Comments: Accepted to ICLR2022

  48. arXiv:2112.05878  [pdf, other

    cs.RO

    Online Information-Aware Motion Planning with Inertial Parameter Learning for Robotic Free-Flyers

    Authors: Monica Ekal, Keenan Albee, Brian Coltin, Rodrigo Ventura, Richard Linares, David W. Miller

    Abstract: Space free-flyers like the Astrobee robots currently operating aboard the International Space Station must operate with inherent system uncertainties. Parametric uncertainties like mass and moment of inertia are especially important to quantify in these safety-critical space systems and can change in scenarios such as on-orbit cargo movement, where unknown grappled payloads significantly change th… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

    Comments: 8 pages, 8 figures, IROS 2021 preprint (accepted)

  49. arXiv:2112.03350  [pdf, ps, other

    cs.CR cs.LG

    Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks

    Authors: Xi Li, Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Backdoor (Trojan) attacks are emerging threats against deep neural networks (DNN). A DNN being attacked will predict to an attacker-desired target class whenever a test sample from any source class is embedded with a backdoor pattern; while correctly classifying clean (attack-free) test samples. Existing backdoor defenses have shown success in detecting whether a DNN is attacked and in reverse-eng… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

  50. arXiv:2110.10354  [pdf, other

    cs.CR cs.CV cs.LG

    Detecting Backdoor Attacks Against Point Cloud Classifiers

    Authors: Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis

    Abstract: Backdoor attacks (BA) are an emerging threat to deep neural network classifiers. A classifier being attacked will predict to the attacker's target class when a test sample from a source class is embedded with the backdoor pattern (BP). Recently, the first BA against point cloud (PC) classifiers was proposed, creating new threats to many important applications including autonomous driving. Such PC… ▽ More

    Submitted 19 October, 2021; originally announced October 2021.