Skip to main content

Showing 1–50 of 71 results for author: Moore, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.01260  [pdf, other

    cs.CR

    DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for Self-contained Tracking

    Authors: Alsharif Abuadbba, Nicholas Rhodes, Kristen Moore, Bushra Sabir, Shuo Wang, Yansong Gao

    Abstract: Deep learning solutions in critical domains like autonomous vehicles, facial recognition, and sentiment analysis require caution due to the severe consequences of errors. Research shows these models are vulnerable to adversarial attacks, such as data poisoning and neural trojaning, which can covertly manipulate model behavior, compromising reliability and safety. Current defense strategies like wa… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: 13 pages

  2. arXiv:2406.19596  [pdf, other

    cs.CR cs.AI cs.LG

    Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning

    Authors: Diksha Goel, Kristen Moore, Mingyu Guo, Derui Wang, Minjune Kim, Seyit Camtepe

    Abstract: This paper addresses a significant gap in Autonomous Cyber Operations (ACO) literature: the absence of effective edge-blocking ACO strategies in dynamic, real-world networks. It specifically targets the cybersecurity vulnerabilities of organizational Active Directory (AD) systems. Unlike the existing literature on edge-blocking defenses which considers AD systems as static entities, our study coun… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: The manuscript has been accepted as full paper at European Symposium on Research in Computer Security (ESORICS) 2024

  3. arXiv:2406.11634  [pdf, other

    cs.CL cs.AI

    The Base-Rate Effect on LLM Benchmark Performance: Disambiguating Test-Taking Strategies from Benchmark Performance

    Authors: Kyle Moore, Jesse Roberts, Thao Pham, Oseremhen Ewaleifoh, Doug Fisher

    Abstract: Cloze testing is a common method for measuring the behavior of large language models on a number of benchmark tasks. Using the MMLU dataset, we show that the base-rate probability (BRP) differences across answer tokens are significant and affect task performance ie. guess A if uncertain. We find that counterfactual prompting does sufficiently mitigate the BRP effect. The BRP effect is found to hav… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  4. arXiv:2404.08710  [pdf, other

    cs.GT cs.AI

    Do Large Language Models Learn Human-Like Strategic Preferences?

    Authors: Jesse Roberts, Kyle Moore, Doug Fisher

    Abstract: We evaluate whether LLMs learn to make human-like preference judgements in strategic scenarios as compared with known empirical results. We show that Solar and Mistral exhibit stable value-based preference consistent with human in the prisoner's dilemma, including stake-size effect, and traveler's dilemma, including penalty-size effect. We establish a relationship between model size, value based p… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

  5. arXiv:2404.03823  [pdf, other

    cs.CR cs.CL cs.CY

    An Investigation into Misuse of Java Security APIs by Large Language Models

    Authors: Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar

    Abstract: The increasing trend of using Large Language Models (LLMs) for code generation raises the question of their capability to generate trustworthy code. While many researchers are exploring the utility of code generation for uncovering software vulnerabilities, one crucial but often overlooked aspect is the security Application Programming Interfaces (APIs). APIs play an integral role in upholding sof… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: This paper has been accepted by ACM ASIACCS 2024

  6. arXiv:2402.02653  [pdf, other

    cs.LG cs.CV

    Learning with Mixture of Prototypes for Out-of-Distribution Detection

    Authors: Haodong Lu, Dong Gong, Shuo Wang, Jason Xue, Lina Yao, Kristen Moore

    Abstract: Out-of-distribution (OOD) detection aims to detect testing samples far away from the in-distribution (ID) training data, which is crucial for the safe deployment of machine learning models in the real world. Distance-based OOD detection methods have emerged with enhanced deep representation learning. They identify unseen OOD samples by measuring their distances from ID class centroids or prototype… ▽ More

    Submitted 4 February, 2024; originally announced February 2024.

    Comments: Accepted at ICLR 2024

  7. arXiv:2402.00890  [pdf, other

    cs.CR cs.NI cs.SE

    Utilizing Large Language Models to Translate RFC Protocol Specifications to CPSA Definitions

    Authors: Martin Duclos, Ivan A. Fernandez, Kaneesha Moore, Sudip Mittal, Edward Zieglar

    Abstract: This paper proposes the use of Large Language Models (LLMs) for translating Request for Comments (RFC) protocol specifications into a format compatible with the Cryptographic Protocol Shapes Analyzer (CPSA). This novel approach aims to reduce the complexities and efforts involved in protocol analysis, by offering an automated method for translating protocol specifications into structured models su… ▽ More

    Submitted 30 January, 2024; originally announced February 2024.

  8. arXiv:2401.04364  [pdf, other

    cs.CV cs.CR cs.LG

    SoK: Facial Deepfake Detectors

    Authors: Binh M. Le, Jiwon Kim, Shahroz Tariq, Kristen Moore, Alsharif Abuadbba, Simon S. Woo

    Abstract: Deepfakes have rapidly emerged as a profound and serious threat to society, primarily due to their ease of creation and dissemination. This situation has triggered an accelerated development of deepfake detection technologies. However, many existing detectors rely heavily on lab-generated datasets for validation, which may not effectively prepare them for novel, emerging, and real-world deepfake t… ▽ More

    Submitted 25 June, 2024; v1 submitted 9 January, 2024; originally announced January 2024.

    Comments: 18 pages, 6 figures, 5 table, under peer-review

  9. arXiv:2312.09478  [pdf, other

    cs.LG cs.AI

    Entropy Causal Graphs for Multivariate Time Series Anomaly Detection

    Authors: Falih Gozi Febrinanto, Kristen Moore, Chandra Thapa, Mujie Liu, Vidya Saikrishna, Jiangang Ma, Feng Xia

    Abstract: Many multivariate time series anomaly detection frameworks have been proposed and widely applied. However, most of these frameworks do not consider intrinsic relationships between variables in multivariate time series data, thus ignoring the causal relationship among variables and degrading anomaly detection performance. This work proposes a novel framework called CGAD, an entropy Causal Graph for… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

  10. arXiv:2312.06566  [pdf, other

    cs.RO cs.HC

    One Size Does not Fit All: Personalised Affordance Design for Social Robots

    Authors: Guanyu Huang, Roger K. Moore

    Abstract: Personalisation is essential to achieve more acceptable and effective results in human-robot interaction. Placing users in the central role, many studies have focused on enhancing the abilities of social robots to perceive and understand users. However, little is known about improving user perceptions and interpretation of a social robot in spoken interactions. The work described in the paper aims… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Comments: The proceedings of the CONCATENATE workshop at HRI23, Stockholm, Sweden. 4 pages with 2 figures and 2 tables

    Report number: CONCATENATE/2023/02

  11. arXiv:2310.04059  [pdf, other

    cs.LG

    DEFT: A new distance-based feature set for keystroke dynamics

    Authors: Nuwan Kaluarachchi, Sevvandi Kandanaarachchi, Kristen Moore, Arathi Arakala

    Abstract: Keystroke dynamics is a behavioural biometric utilised for user identification and authentication. We propose a new set of features based on the distance between keys on the keyboard, a concept that has not been considered before in keystroke dynamics. We combine flight times, a popular metric, with the distance between keys on the keyboard and call them as Distance Enhanced Flight Time features (… ▽ More

    Submitted 6 October, 2023; originally announced October 2023.

    Comments: 12 pages, 5 figures, 3 tables, conference paper

  12. arXiv:2309.12597  [pdf, other

    math.MG cs.CG

    On Axial Symmetry in Convex Bodies

    Authors: Ritesh Goenka, Kenneth Moore, Wen Rui Sun, Ethan Patrick White

    Abstract: For a two-dimensional convex body, the Kovner-Besicovitch measure of symmetry is defined as the volume ratio of the largest centrally symmetric body contained inside the body to the original body. A classical result states that the Kovner-Besicovitch measure is at least $2/3$ for every convex body and equals $2/3$ for triangles. Lassak showed that an alternative measure of symmetry, i.e., symmetry… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

    Comments: 26 pages, 14 figures

    MSC Class: 52A10; 52A38 (Primary) 52A20; 52A41 (Secondary)

  13. arXiv:2309.07087  [pdf

    cs.CV physics.data-an physics.med-ph

    Develo** a Novel Image Marker to Predict the Responses of Neoadjuvant Chemotherapy (NACT) for Ovarian Cancer Patients

    Authors: Ke Zhang, Neman Abdoli, Patrik Gilley, Youkabed Sadri, Xuxin Chen, Theresa C. Thai, Lauren Dockery, Kathleen Moore, Robert S. Mannel, Yuchen Qiu

    Abstract: Objective: Neoadjuvant chemotherapy (NACT) is one kind of treatment for advanced stage ovarian cancer patients. However, due to the nature of tumor heterogeneity, the patients' responses to NACT varies significantly among different subgroups. To address this clinical challenge, the purpose of this study is to develop a novel image marker to achieve high accuracy response prediction of the NACT at… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

  14. Towards Understanding of Deepfake Videos in the Wild

    Authors: Beomsang Cho, Binh M. Le, Jiwon Kim, Simon Woo, Shahroz Tariq, Alsharif Abuadbba, Kristen Moore

    Abstract: Deepfakes have become a growing concern in recent years, prompting researchers to develop benchmark datasets and detection algorithms to tackle the issue. However, existing datasets suffer from significant drawbacks that hamper their effectiveness. Notably, these datasets fail to encompass the latest deepfake videos produced by state-of-the-art methods that are being shared across various platform… ▽ More

    Submitted 6 September, 2023; v1 submitted 4 September, 2023; originally announced September 2023.

    Journal ref: 32nd ACM International Conference on Information & Knowledge Management (CIKM), UK, 2023

  15. Using Artificial Populations to Study Psychological Phenomena in Neural Models

    Authors: Jesse Roberts, Kyle Moore, Drew Wilenzick, Doug Fisher

    Abstract: The recent proliferation of research into transformer based natural language processing has led to a number of studies which attempt to detect the presence of human-like cognitive behavior in the models. We contend that, as is true of human psychology, the investigation of cognitive behavior in language models must be conducted in an appropriate population of an appropriate size for the results to… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

  16. arXiv:2308.02546  [pdf, other

    cs.SI cs.DM

    Mathematical Foundations of Data Cohesion

    Authors: Katherine E. Moore

    Abstract: Data cohesion, a recently introduced measure inspired by social interactions, uses distance comparisons to assess relative proximity. In this work, we provide a collection of results which can guide the development of cohesion-based methods in exploratory data analysis and human-aided computation. Here, we observe the important role of highly clustered "point-like" sets and the ways in which cohes… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

    Comments: 20 pages, 5 figures

    MSC Class: 05C82; 62H30; 91D30

  17. arXiv:2308.02482  [pdf, other

    cs.CL

    Adapting the NICT-JLE Corpus for Disfluency Detection Models

    Authors: Lucy Skidmore, Roger K. Moore

    Abstract: The detection of disfluencies such as hesitations, repetitions and false starts commonly found in speech is a widely studied area of research. With a standardised process for evaluation using the Switchboard Corpus, model performance can be easily compared across approaches. This is not the case for disfluency detection research on learner speech, however, where such datasets have restricted acces… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

  18. arXiv:2307.09364  [pdf, other

    cs.AI cs.MA cs.RO

    Local Minima Drive Communications in Cooperative Interaction

    Authors: Roger K. Moore

    Abstract: An important open question in human-robot interaction (HRI) is precisely when an agent should decide to communicate, particularly in a cooperative task. Perceptual Control Theory (PCT) tells us that agents are able to cooperate on a joint task simply by sharing the same 'intention', thereby distributing the effort required to complete the task among the agents. This is even true for agents that do… ▽ More

    Submitted 18 July, 2023; originally announced July 2023.

    Comments: 6 page conference paper

  19. arXiv:2307.01984  [pdf, other

    cs.CV cs.AI cs.LG

    The KiTS21 Challenge: Automatic segmentation of kidneys, renal tumors, and renal cysts in corticomedullary-phase CT

    Authors: Nicholas Heller, Fabian Isensee, Dasha Trofimova, Resha Tejpaul, Zhongchen Zhao, Huai Chen, Lisheng Wang, Alex Golts, Daniel Khapun, Daniel Shats, Yoel Shoshan, Flora Gilboa-Solomon, Yasmeen George, Xi Yang, Jianpeng Zhang, **g Zhang, Yong Xia, Mengran Wu, Zhiyang Liu, Ed Walczak, Sean McSweeney, Ranveer Vasdev, Chris Hornung, Rafat Solaiman, Jamee Schoephoerster , et al. (20 additional authors not shown)

    Abstract: This paper presents the challenge report for the 2021 Kidney and Kidney Tumor Segmentation Challenge (KiTS21) held in conjunction with the 2021 international conference on Medical Image Computing and Computer Assisted Interventions (MICCAI). KiTS21 is a sequel to its first edition in 2019, and it features a variety of innovations in how the challenge was designed, in addition to a larger dataset.… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

    Comments: 34 pages, 12 figures

  20. arXiv:2306.08869  [pdf, other

    cs.CR cs.SE

    Detecting Misuse of Security APIs: A Systematic Review

    Authors: Zahra Mousavi, Chadni Islam, M. Ali Babar, Alsharif Abuadbba, Kristen Moore

    Abstract: Security Application Programming Interfaces (APIs) are crucial for ensuring software security. However, their misuse introduces vulnerabilities, potentially leading to severe data breaches and substantial financial loss. Complex API design, inadequate documentation, and insufficient security training often lead to unintentional misuse by developers. The software security community has devised and… ▽ More

    Submitted 25 June, 2024; v1 submitted 15 June, 2023; originally announced June 2023.

  21. arXiv:2306.05484  [pdf, other

    stat.ME cs.LG stat.ML

    Task-specific experimental design for treatment effect estimation

    Authors: Bethany Connolly, Kim Moore, Tobias Schwedes, Alexander Adam, Gary Willis, Ilya Feige, Christopher Frye

    Abstract: Understanding causality should be a core requirement of any attempt to build real impact through AI. Due to the inherent unobservability of counterfactuals, large randomised trials (RCTs) are the standard for causal inference. But large experiments are generically expensive, and randomisation carries its own costs, e.g. when suboptimal decisions are trialed. Recent work has proposed more sample-ef… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

    Comments: To appear in ICML 2023; 8 pages, 7 figures, 4 appendices

  22. arXiv:2306.04894  [pdf, other

    stat.ML cs.LG

    A Bayesian Framework for learning governing Partial Differential Equation from Data

    Authors: Kalpesh More, Tapas Tripura, Rajdip Nayek, Souvik Chakraborty

    Abstract: The discovery of partial differential equations (PDEs) is a challenging task that involves both theoretical and empirical methods. Machine learning approaches have been developed and used to solve this problem; however, it is important to note that existing methods often struggle to identify the underlying equation accurately in the presence of noise. In this study, we present a new approach to di… ▽ More

    Submitted 7 June, 2023; originally announced June 2023.

  23. arXiv:2305.18769  [pdf

    cs.CV cs.LG

    DualVAE: Controlling Colours of Generated and Real Images

    Authors: Keerth Rathakumar, David Liebowitz, Christian Walder, Kristen Moore, Salil S. Kanhere

    Abstract: Colour controlled image generation and manipulation are of interest to artists and graphic designers. Vector Quantised Variational AutoEncoders (VQ-VAEs) with autoregressive (AR) prior are able to produce high quality images, but lack an explicit representation mechanism to control colour attributes. We introduce DualVAE, a hybrid representation model that provides such control by learning disenta… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

  24. arXiv:2304.03920  [pdf, other

    math.CO cs.CG math.MG

    Improved estimates on the number of unit perimeter triangles

    Authors: Ritesh Goenka, Kenneth Moore, Ethan Patrick White

    Abstract: We obtain new upper and lower bounds on the number of unit perimeter triangles spanned by points in the plane. We also establish improved bounds in the special case where the point set is a section of the integer grid.

    Submitted 8 April, 2023; originally announced April 2023.

    Comments: 8 pages, 1 figure

    MSC Class: 52C10

  25. arXiv:2304.01405  [pdf

    cs.HC cs.CY

    The Work Avatar Face-Off: Knowledge Worker Preferences for Realism in Meetings

    Authors: Vrushank Phadnis, Kristin Moore, Mar Gonzalez Franco

    Abstract: While avatars have grown in popularity in social settings, their use in the workplace is still debatable. We conducted a large-scale survey to evaluate knowledge worker sentiment towards avatars, particularly the effects of realism on their acceptability for work meetings. Our survey of 2509 knowledge workers from multiple countries rated five avatar styles for use by managers, known colleagues an… ▽ More

    Submitted 8 October, 2023; v1 submitted 3 April, 2023; originally announced April 2023.

    Comments: 10 pages, accepted at ISMAR 2023 conference

  26. arXiv:2303.16123   

    eess.IV cs.CV

    Evaluating the Effectiveness of 2D and 3D Features for Predicting Tumor Response to Chemotherapy

    Authors: Neman Abdoli, Ke Zhang, Patrik Gilley, Xuxin Chen, Youkabed Sadri, Theresa C. Thai, Lauren E. Dockery, Kathleen Moore, Robert S. Mannel, Yuchen Qiu

    Abstract: 2D and 3D tumor features are widely used in a variety of medical image analysis tasks. However, for chemotherapy response prediction, the effectiveness between different kinds of 2D and 3D features are not comprehensively assessed, especially in ovarian cancer-related applications. This investigation aims to accomplish such a comprehensive evaluation. For this purpose, CT images were collected ret… ▽ More

    Submitted 14 April, 2023; v1 submitted 28 March, 2023; originally announced March 2023.

    Comments: For Some modifications and error pruning, we need to withdraw the paper

  27. Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices

    Authors: Shahroz Tariq, Alsharif Abuadbba, Kristen Moore

    Abstract: The metaverse has gained significant attention from various industries due to its potential to create a fully immersive and interactive virtual world. However, the integration of deepfakes in the metaverse brings serious security implications, particularly with regard to impersonation. This paper examines the security implications of deepfakes in the metaverse, specifically in the context of gamin… ▽ More

    Submitted 9 September, 2023; v1 submitted 25 March, 2023; originally announced March 2023.

    Comments: 3 pages. Published to ACM ASIACCS 2023 workshop - The 2nd security implications of Deepfakes and Cheapfakes

  28. Why Do Facial Deepfake Detectors Fail?

    Authors: Binh Le, Shahroz Tariq, Alsharif Abuadbba, Kristen Moore, Simon Woo

    Abstract: Recent rapid advancements in deepfake technology have allowed the creation of highly realistic fake media, such as video, image, and audio. These materials pose significant challenges to human authentication, such as impersonation, misinformation, or even a threat to national security. To keep pace with these rapid advancements, several deepfake detection algorithms have been proposed, leading to… ▽ More

    Submitted 10 September, 2023; v1 submitted 25 February, 2023; originally announced February 2023.

    Comments: 5 pages, ACM ASIACCS 2023

  29. arXiv:2212.06303  [pdf, other

    stat.ME cs.LG stat.ML

    MAntRA: A framework for model agnostic reliability analysis

    Authors: Yogesh Chandrakant Mathpati, Kalpesh Sanjay More, Tapas Tripura, Rajdip Nayek, Souvik Chakraborty

    Abstract: We propose a novel model agnostic data-driven reliability analysis framework for time-dependent reliability analysis. The proposed approach -- referred to as MAntRA -- combines interpretable machine learning, Bayesian statistics, and identifying stochastic dynamic equation to evaluate reliability of stochastically-excited dynamical systems for which the governing physics is \textit{apriori} unknow… ▽ More

    Submitted 12 December, 2022; originally announced December 2022.

  30. arXiv:2211.13535  [pdf, other

    cs.CR cs.LG

    DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks

    Authors: Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal

    Abstract: Training deep neural networks (DNNs) requires large datasets and powerful computing resources, which has led some owners to restrict redistribution without permission. Watermarking techniques that embed confidential data into DNNs have been used to protect ownership, but these can degrade model performance and are vulnerable to watermark removal attacks. Recently, DeepJudge was introduced as an al… ▽ More

    Submitted 3 January, 2024; v1 submitted 24 November, 2022; originally announced November 2022.

    Journal ref: In Proceedings of the 39th Annual Computer Security Applications Conference, pp. 535-549. 2023

  31. arXiv:2209.13547  [pdf, other

    cs.CL cs.CY

    Interactivism in Spoken Dialogue Systems

    Authors: T. Rodríguez Muñoz, Emily Y. J. Ip, G. Huang, R. K. Moore

    Abstract: The interactivism model introduces a dynamic approach to language, communication and cognition. In this work, we explore this fundamental theory in the context of dialogue modelling for spoken dialogue systems (SDS). To extend such a theoretical framework, we present a set of design principles which adhere to central psycholinguistic and communication theories to achieve interactivism in SDS. From… ▽ More

    Submitted 28 September, 2022; v1 submitted 27 September, 2022; originally announced September 2022.

    MSC Class: H.1.2; H.5.2; I.2.11; J.4

    Journal ref: In the Proceedings of the 26th Workshop on the Semantics and Pragmatics of Dialogue (SemDial 2022), August 22-24 2022, Dublin, pg 263-265

  32. arXiv:2208.07801  [pdf, other

    cs.CR cs.NE

    Designing an Artificial Immune System inspired Intrusion Detection System

    Authors: William Anderson, Kaneesha Moore, Jesse Ables, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

    Abstract: The Human Immune System (HIS) works to protect a body from infection, illness, and disease. This system can inspire cybersecurity professionals to design an Artificial Immune System (AIS) based Intrusion Detection System (IDS). These biologically inspired algorithms using Self/Nonself and Danger Theory can directly augmentIDS designs and implementations. In this paper, we include an examination in… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

  33. Deception for Cyber Defence: Challenges and Opportunities

    Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar

    Abstract: Deception is rapidly growing as an important tool for cyber defence, complementing existing perimeter security measures to rapidly detect breaches and data theft. One of the factors limiting the use of deception has been the cost of generating realistic artefacts by hand. Recent advances in Machine Learning have, however, created opportunities for scalable, automated generation of realistic decept… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Journal ref: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2021, pp. 173-182

  34. arXiv:2203.10902  [pdf, other

    cs.CR cs.AI

    PublicCheck: Public Integrity Verification for Services of Run-time Deep Models

    Authors: Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil Kanhere

    Abstract: Existing integrity verification approaches for deep models are designed for private verification (i.e., assuming the service provider is honest, with white-box access to model parameters). However, private verification approaches do not allow model users to verify the model at run-time. Instead, they must trust the service provider, who may tamper with the verification results. In contrast, a publ… ▽ More

    Submitted 19 December, 2022; v1 submitted 21 March, 2022; originally announced March 2022.

    Comments: 18 pages, 9 figures. Accepted to IEEE S&P 2023

  35. arXiv:2203.08578  [pdf, other

    cs.RO cs.CL cs.HC

    Whither the Priors for (Vocal) Interactivity?

    Authors: Roger K. Moore

    Abstract: Voice-based communication is often cited as one of the most `natural' ways in which humans and robots might interact, and the recent availability of accurate automatic speech recognition and intelligible speech synthesis has enabled researchers to integrate advanced off-the-shelf spoken language technology components into their robot platforms. Despite this, the resulting interactions are anything… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Comments: Accepted for the THEORIA Workshop "Towards a Common Understanding and Vision for Theory-Grounded Human-Robot Interaction" at HRI-2022, 7 March 2022

  36. arXiv:2203.06250  [pdf, other

    cs.LG eess.SY

    Combining imitation and deep reinforcement learning to accomplish human-level performance on a virtual foraging task

    Authors: Vittorio Giammarino, Matthew F Dunne, Kylie N Moore, Michael E Hasselmo, Chantal E Stern, Ioannis Ch. Paschalidis

    Abstract: We develop a simple framework to learn bio-inspired foraging policies using human data. We conduct an experiment where humans are virtually immersed in an open field foraging environment and are trained to collect the highest amount of rewards. A Markov Decision Process (MDP) framework is introduced to model the human decision dynamics. Then, Imitation Learning (IL) based on maximum likelihood est… ▽ More

    Submitted 6 December, 2022; v1 submitted 11 March, 2022; originally announced March 2022.

    Comments: 24 pages, 15 figures

  37. arXiv:2202.10688  [pdf, other

    cs.LG cs.AI

    Graph Lifelong Learning: A Survey

    Authors: Falih Gozi Febrinanto, Feng Xia, Kristen Moore, Chandra Thapa, Charu Aggarwal

    Abstract: Graph learning is a popular approach for performing machine learning on graph-structured data. It has revolutionized the machine learning ability to model graph data to address downstream tasks. Its application is wide due to the availability of graph data ranging from all types of networks to information systems. Most graph learning methods assume that the graph is static and its complete structu… ▽ More

    Submitted 3 November, 2022; v1 submitted 22 February, 2022; originally announced February 2022.

    Comments: 19 pages, 4 figures

    MSC Class: 68T07; 68T05 ACM Class: I.2.6

    Journal ref: IEEE Computational Intelligence Magazine 2022

  38. arXiv:2202.08303  [pdf, other

    physics.med-ph cs.AI cs.CV

    OpenKBP-Opt: An international and reproducible evaluation of 76 knowledge-based planning pipelines

    Authors: Aaron Babier, Rafid Mahmood, Binghao Zhang, Victor G. L. Alves, Ana Maria Barragán-Montero, Joel Beaudry, Carlos E. Cardenas, Yankui Chang, Zijie Chen, Jaehee Chun, Kelly Diaz, Harold David Eraso, Erik Faustmann, Sibaji Gaj, Skylar Gay, Mary Gronberg, Bingqi Guo, Junjun He, Gerd Heilemann, Sanchit Hira, Yuliang Huang, Fuxin Ji, Dashan Jiang, Jean Carlo Jimenez Giraldo, Hoyeon Lee , et al. (34 additional authors not shown)

    Abstract: We establish an open framework for develo** plan optimization models for knowledge-based planning (KBP) in radiotherapy. Our framework includes reference plans for 100 patients with head-and-neck cancer and high-quality dose predictions from 19 KBP models that were developed by different research groups during the OpenKBP Grand Challenge. The dose predictions were input to four optimization mode… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

    Comments: 19 pages, 7 tables, 6 figures

  39. arXiv:2201.10675  [pdf

    cs.CV cs.AI eess.IV eess.SP

    Virtual Adversarial Training for Semi-supervised Breast Mass Classification

    Authors: Xuxin Chen, Ximin Wang, Ke Zhang, Kar-Ming Fung, Theresa C. Thai, Kathleen Moore, Robert S. Mannel, Hong Liu, Bin Zheng, Yuchen Qiu

    Abstract: This study aims to develop a novel computer-aided diagnosis (CAD) scheme for mammographic breast mass classification using semi-supervised learning. Although supervised deep learning has achieved huge success across various medical image analysis tasks, its success relies on large amounts of high-quality annotations, which can be challenging to acquire in practice. To overcome this limitation, we… ▽ More

    Submitted 25 January, 2022; originally announced January 2022.

    Comments: To appear in the conference Biophotonics and Immune Responses of SPIE

  40. arXiv:2111.12835  [pdf, other

    cs.DB cs.LG

    SchemaDB: Structures in Relational Datasets

    Authors: Cody James Christopher, Kristen Moore, David Liebowitz

    Abstract: In this paper we introduce the SchemaDB data-set; a collection of relational database schemata in both sql and graph formats. Databases are not commonly shared publicly for reasons of privacy and security, so schemata are not available for study. Consequently, an understanding of database structures in the wild is lacking, and most examples found publicly belong to common development frameworks or… ▽ More

    Submitted 24 November, 2021; originally announced November 2021.

    Comments: Draft

  41. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception

    Authors: Kristen Moore, Cody J. Christopher, David Liebowitz, Surya Nepal, Renee Selvey

    Abstract: Cyber deception is emerging as a promising approach to defending networks and systems against attackers and data thieves. However, despite being relatively cheap to deploy, the generation of realistic content at scale is very costly, due to the fact that rich, interactive deceptive technologies are largely hand-crafted. With recent improvements in Machine Learning, we now have the opportunity to b… ▽ More

    Submitted 23 November, 2022; v1 submitted 21 November, 2021; originally announced November 2021.

    Journal ref: 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P)

  42. arXiv:2106.06139  [pdf, other

    cs.CL cs.AI cs.LG

    A comprehensive solution to retrieval-based chatbot construction

    Authors: Kristen Moore, Shenjun Zhong, Zhen He, Torsten Rudolf, Nils Fisher, Brandon Victor, Neha **dal

    Abstract: In this paper we present the results of our experiments in training and deploying a self-supervised retrieval-based chatbot trained with contrastive learning for assisting customer support agents. In contrast to most existing research papers in this area where the focus is on solving just one component of a deployable chatbot, we present an end-to-end set of solutions to take the reader from an un… ▽ More

    Submitted 10 June, 2021; originally announced June 2021.

  43. Recent advances and clinical applications of deep learning in medical image analysis

    Authors: Xuxin Chen, Ximin Wang, Ke Zhang, Kar-Ming Fung, Theresa C. Thai, Kathleen Moore, Robert S. Mannel, Hong Liu, Bin Zheng, Yuchen Qiu

    Abstract: Deep learning has received extensive research interest in develo** new medical image processing algorithms, and deep learning based models have been remarkably successful in a variety of medical imaging tasks to support disease detection and diagnosis. Despite the success, the further improvement of deep learning models in medical image analysis is majorly bottlenecked by the lack of large-sized… ▽ More

    Submitted 8 April, 2022; v1 submitted 27 May, 2021; originally announced May 2021.

    Comments: To appear in the journal Medical Image Analysis. The registration section was revised

  44. RAIDER: Reinforcement-aided Spear Phishing Detector

    Authors: Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone

    Abstract: Spear Phishing is a harmful cyber-attack facing business and individuals worldwide. Considerable research has been conducted recently into the use of Machine Learning (ML) techniques to detect spear-phishing emails. ML-based solutions may suffer from zero-day attacks; unseen attacks unaccounted for in the training data. As new attacks emerge, classifiers trained on older data are unable to detect… ▽ More

    Submitted 3 January, 2023; v1 submitted 16 May, 2021; originally announced May 2021.

    Comments: 16 pages

    Journal ref: International Conference on Network and System Security, 2022

  45. arXiv:2105.04070  [pdf, other

    cs.CV cs.LG

    Robust Training Using Natural Transformation

    Authors: Shuo Wang, Lingjuan Lyu, Surya Nepal, Carsten Rudolph, Marthie Grobler, Kristen Moore

    Abstract: Previous robustness approaches for deep learning models such as data augmentation techniques via data transformation or adversarial training cannot capture real-world variations that preserve the semantics of the input, such as a change in lighting conditions. To bridge this gap, we present NaTra, an adversarial training scheme that is designed to improve the robustness of image classification alg… ▽ More

    Submitted 9 May, 2021; originally announced May 2021.

    Comments: arXiv admin note: text overlap with arXiv:1912.03192, arXiv:2004.02546 by other authors

  46. Rethinking Sustainability Requirements: Drivers, Barriers and Impacts of Digitalisation from the Viewpoint of Experts

    Authors: Alessio Ferrari, Manlio Bacco, Kirsten Moore, Andreas Jedlitschka, Steffen Hess, Jouni Kaipainen, Panagiota Koltsida, Eleni Toli, Gianluca Brunori

    Abstract: Requirements engineering (RE) is a key area to address sustainability concerns in system development. Approaches have been proposed to elicit sustainability requirements from interested stakeholders before system design. However, existing strategies lack the proper high-level view to deal with the societal and long-term impacts of the transformation entailed by the introduction of a new technologi… ▽ More

    Submitted 6 May, 2021; originally announced May 2021.

    ACM Class: D.2.1; K.4.2; K.4.3

  47. OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning

    Authors: Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba

    Abstract: The diversity and quantity of data warehouses, gathering data from distributed devices such as mobile devices, can enhance the success and robustness of machine learning algorithms. Federated learning enables distributed participants to collaboratively learn a commonly-shared model while holding data locally. However, it is also faced with expensive communication and limitations due to the heterog… ▽ More

    Submitted 3 March, 2022; v1 submitted 2 May, 2021; originally announced May 2021.

  48. arXiv:2102.11420  [pdf, other

    cs.SD eess.AS

    Investigating Deep Neural Structures and their Interpretability in the Domain of Voice Conversion

    Authors: Samuel J. Broughton, Md Asif Jalal, Roger K. Moore

    Abstract: Generative Adversarial Networks (GANs) are machine learning networks based around creating synthetic data. Voice Conversion (VC) is a subset of voice translation that involves translating the paralinguistic features of a source speaker to a target speaker while preserving the linguistic information. The aim of non-parallel conditional GANs for VC is to translate an acoustic speech feature sequence… ▽ More

    Submitted 22 February, 2021; originally announced February 2021.

    Comments: For demo, see https://samuelbroughton.github.io/interpretability-demo-2020/

  49. arXiv:2011.14076  [pdf, other

    physics.med-ph cs.CV

    OpenKBP: The open-access knowledge-based planning grand challenge

    Authors: Aaron Babier, Binghao Zhang, Rafid Mahmood, Kevin L. Moore, Thomas G. Purdie, Andrea L. McNiven, Timothy C. Y. Chan

    Abstract: The purpose of this work is to advance fair and consistent comparisons of dose prediction methods for knowledge-based planning (KBP) in radiation therapy research. We hosted OpenKBP, a 2020 AAPM Grand Challenge, and challenged participants to develop the best method for predicting the dose of contoured CT images. The models were evaluated according to two separate scores: (1) dose score, which eva… ▽ More

    Submitted 13 January, 2021; v1 submitted 28 November, 2020; originally announced November 2020.

    Comments: 26 pages, 6 figures, 5 tables

  50. arXiv:1912.01054  [pdf, other

    eess.IV cs.CV cs.LG

    The state of the art in kidney and kidney tumor segmentation in contrast-enhanced CT imaging: Results of the KiTS19 Challenge

    Authors: Nicholas Heller, Fabian Isensee, Klaus H. Maier-Hein, Xiaoshuai Hou, Chunmei Xie, Fengyi Li, Yang Nan, Guangrui Mu, Zhiyong Lin, Miofei Han, Guang Yao, Yaozong Gao, Yao Zhang, Yixin Wang, Feng Hou, Jiawei Yang, Guangwei Xiong, Jiang Tian, Cheng Zhong, Jun Ma, Jack Rickman, Joshua Dean, Bethany Stai, Resha Tejpaul, Makinna Oestreich , et al. (16 additional authors not shown)

    Abstract: There is a large body of literature linking anatomic and geometric characteristics of kidney tumors to perioperative and oncologic outcomes. Semantic segmentation of these tumors and their host kidneys is a promising tool for quantitatively characterizing these lesions, but its adoption is limited due to the manual effort required to produce high-quality 3D segmentations of these structures. Recen… ▽ More

    Submitted 7 August, 2020; v1 submitted 2 December, 2019; originally announced December 2019.

    Comments: 24 pages, 11 figures