Skip to main content

Showing 1–11 of 11 results for author: Rowe, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.00203  [pdf, ps, other

    cs.CR

    Evidence Tampering and Chain of Custody in Layered Attestations

    Authors: Ian D. Kretz, Clare C. Parran, John D. Ramsdell, Paul D. Rowe

    Abstract: In distributed systems, trust decisions are made on the basis of integrity evidence generated via remote attestation. Examples of the kinds of evidence that might be collected are boot time image hash values; fingerprints of initialization files for userspace applications; and a comprehensive measurement of a running kernel. In layered attestations, evidence is typically composed of measurements o… ▽ More

    Submitted 31 January, 2024; originally announced February 2024.

    Comments: 25 pages

  2. arXiv:2311.16197  [pdf, other

    eess.IV cs.AI cs.LG

    Generation of patient specific cardiac chamber models using generative neural networks under a Bayesian framework for electroanatomical map**

    Authors: Sunil Mathew, Jasbir Sra, Daniel B. Rowe

    Abstract: Electroanatomical map** is a technique used in cardiology to create a detailed 3D map of the electrical activity in the heart. It is useful for diagnosis, treatment planning and real time guidance in cardiac ablation procedures to treat arrhythmias like atrial fibrillation. A probabilistic machine learning model trained on a library of CT/MRI scans of the heart can be used during electroanatomic… ▽ More

    Submitted 26 November, 2023; originally announced November 2023.

  3. arXiv:2308.02451  [pdf, other

    stat.ML cs.LG

    Pruning a neural network using Bayesian inference

    Authors: Sunil Mathew, Daniel B. Rowe

    Abstract: Neural network pruning is a highly effective technique aimed at reducing the computational and memory demands of large neural networks. In this research paper, we present a novel approach to pruning neural networks utilizing Bayesian inference, which can seamlessly integrate into the training procedure. Our proposed method leverages the posterior probabilities of the neural network prior to and fo… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

  4. arXiv:2207.04672  [pdf

    cs.CL cs.AI

    No Language Left Behind: Scaling Human-Centered Machine Translation

    Authors: NLLB Team, Marta R. Costa-jussà, James Cross, Onur Çelebi, Maha Elbayad, Kenneth Heafield, Kevin Heffernan, Elahe Kalbassi, Janice Lam, Daniel Licht, Jean Maillard, Anna Sun, Skyler Wang, Guillaume Wenzek, Al Youngblood, Bapi Akula, Loic Barrault, Gabriel Mejia Gonzalez, Prangthip Hansanti, John Hoffman, Semarley Jarrett, Kaushik Ram Sadagopan, Dirk Rowe, Shannon Spruit, Chau Tran , et al. (14 additional authors not shown)

    Abstract: Driven by the goal of eradicating language barriers on a global scale, machine translation has solidified itself as a key focus of artificial intelligence research today. However, such efforts have coalesced around a small subset of languages, leaving behind the vast majority of mostly low-resource languages. What does it take to break the 200 language barrier while ensuring safe, high quality res… ▽ More

    Submitted 25 August, 2022; v1 submitted 11 July, 2022; originally announced July 2022.

    Comments: 190 pages

    MSC Class: 68T50 ACM Class: I.2.7

  5. arXiv:2103.15138  [pdf, other

    eess.IV cs.LG cs.NE math.NA math.OC

    Graph Convolutional Networks for Model-Based Learning in Nonlinear Inverse Problems

    Authors: William Herzberg, Daniel B. Rowe, Andreas Hauptmann, Sarah J. Hamilton

    Abstract: The majority of model-based learned image reconstruction methods in medical imaging have been limited to uniform domains, such as pixelated images. If the underlying model is solved on nonuniform meshes, arising from a finite element method typical for nonlinear inverse problems, interpolation and embeddings are needed. To overcome this, we present a flexible framework to extend model-based learni… ▽ More

    Submitted 8 July, 2021; v1 submitted 28 March, 2021; originally announced March 2021.

    Comments: 9 figures, 5 tables

  6. arXiv:1903.09482  [pdf, other

    cs.CR

    Limitations on Observability of Effects in Cyber-Physical Systems

    Authors: Suresh K. Damodaran, Paul D. Rowe

    Abstract: Increased interconnectivity of Cyber-Physical Systems, by design or otherwise, increases the cyber attack surface and attack vectors. Observing the effects of these attacks is helpful in detecting them. In this paper, we show that many attacks on such systems result in a control loop effect we term Process Model Inconsistency (PMI). Our formal approach elucidates the relationships among incomplete… ▽ More

    Submitted 22 March, 2019; originally announced March 2019.

    Comments: Hot Topics on Science of Security (HotSoS 2019)

  7. arXiv:1804.05713  [pdf, other

    cs.CR

    Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version)

    Authors: Moses D. Liskov, Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe, F. Javier Thayer

    Abstract: Enrich-by-need protocol analysis is a style of symbolic protocol analysis that characterizes all executions of a protocol that extend a given scenario. In effect, it computes a strongest security goal the protocol achieves in that scenario. CPSA, a Cryptographic Protocol Shapes Analyzer, implements enrich-by-need protocol analysis. In this paper, we describe how to analyze protocols using the Di… ▽ More

    Submitted 16 April, 2018; originally announced April 2018.

    Comments: 53 pages

  8. arXiv:1603.01244  [pdf, ps, other

    cs.CR cs.MA

    Principles of Layered Attestation

    Authors: Paul D. Rowe

    Abstract: Systems designed with measurement and attestation in mind are often layered, with the lower layers measuring the layers above them. Attestations of such systems, which we call layered attestations, must bundle together the results of a diverse set of application-specific measurements of various parts of the system. Some methods of layered attestation are more trustworthy than others, so it is impo… ▽ More

    Submitted 3 March, 2016; originally announced March 2016.

    Comments: 30 pages

  9. Formal Support for Standardizing Protocols with State

    Authors: Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe

    Abstract: Many cryptographic protocols are designed to achieve their goals using only messages passed over an open network. Numerous tools, based on well-understood foundations, exist for the design and analysis of protocols that rely purely on message passing. However, these tools encounter difficulties when faced with protocols that rely on non-local, mutable state to coordinate several local sessions.… ▽ More

    Submitted 24 September, 2015; originally announced September 2015.

  10. A Cut Principle for Information Flow

    Authors: Joshua D. Guttman, Paul D. Rowe

    Abstract: We view a distributed system as a graph of active locations with unidirectional channels between them, through which they pass messages. In this context, the graph structure of a system constrains the propagation of information through it. Suppose a set of channels is a cut set between an information source and a potential sink. We prove that, if there is no disclosure from the source to the cut… ▽ More

    Submitted 24 March, 2015; v1 submitted 16 October, 2014; originally announced October 2014.

    Comments: 31 pages

  11. arXiv:1404.3899  [pdf, ps, other

    cs.CR

    A Hybrid Analysis for Security Protocols with State

    Authors: John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman, Paul D. Rowe

    Abstract: Cryptographic protocols rely on message-passing to coordinate activity among principals. Each principal maintains local state in individual local sessions only as needed to complete that session. However, in some protocols a principal also uses state to coordinate its different local sessions. Sometimes the non-local, mutable state is used as a means, for example with smart cards or Trusted Platfo… ▽ More

    Submitted 16 June, 2014; v1 submitted 15 April, 2014; originally announced April 2014.