Skip to main content

Showing 1–5 of 5 results for author: Sampson, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10066  [pdf, other

    cs.ET

    Exemplar LCA-Decoder: A Scalable Framework for On-Chip Learning

    Authors: Sanaz Mahmoodi Takaghaj, Jack Sampson

    Abstract: Neuromorphic computing has recently gained significant attention as a promising combined approach for develo** energy-efficient, parallel computing systems inspired by the human brain. Efficient training algorithms are imperative for the effective processing of data on neuromorphic platforms; however, their absence remains a notable gap in the field. In this paper, we reduce the gap by proposing… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  2. arXiv:2406.05602  [pdf, other

    cs.CV cs.CL

    Can Prompt Modifiers Control Bias? A Comparative Analysis of Text-to-Image Generative Models

    Authors: Philip Wootaek Shin, Jihyun Janice Ahn, Wenpeng Yin, Jack Sampson, Vijaykrishnan Narayanan

    Abstract: It has been shown that many generative models inherit and amplify societal biases. To date, there is no uniform/systematic agreed standard to control/adjust for these biases. This study examines the presence and manipulation of societal biases in leading text-to-image models: Stable Diffusion, DALL-E 3, and Adobe Firefly. Through a comprehensive analysis combining base prompts with modifiers and t… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

  3. arXiv:2310.06397  [pdf, other

    cs.CR

    Top of the Heap: Efficient Memory Error Protection for Many Heap Objects

    Authors: Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger

    Abstract: Exploits against heap memory errors continue to be a major concern. Although many defenses have been proposed, heap data are not protected from attacks that exploit memory errors systematically. Research defenses focus on complete coverage of heap objects, often giving up on comprehensive memory safety protection and/or incurring high costs in performance overhead and memory usage. In this paper,… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

  4. arXiv:2211.16735  [pdf, other

    cs.CR cs.OS

    Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities

    Authors: Aditya Basu, John Sampson, Zhiyun Qian, Trent Jaeger

    Abstract: File name confusion attacks, such as malicious symbolic links and file squatting, have long been studied as sources of security vulnerabilities. However, a recently emerged type, i.e., case-sensitivity-induced name collisions, has not been scrutinized. These collisions are introduced by differences in name resolution under case-sensitive and case-insensitive file systems or directories. A prominen… ▽ More

    Submitted 29 November, 2022; originally announced November 2022.

    Comments: 15 pages, 1 appendix, 2 tables, 12 figures

  5. arXiv:2204.13106  [pdf, other

    eess.SP cs.NI

    Seeker: Synergizing Mobile and Energy Harvesting Wearable Sensors for Human Activity Recognition

    Authors: Cyan Subhra Mishra, Jack Sampson, Mahmut Taylan Kandemir, Vijaykrishnan Narayanan

    Abstract: There is an increasing demand for intelligent processing on emerging ultra-low-power internet of things (IoT) devices, and recent works have shown substantial efficiency boosts by executing inference tasks directly on the IoT device (node) rather than merely transmitting sensor data. However, the computation and power demands of Deep Neural Network (DNN)-based inference pose significant challenges… ▽ More

    Submitted 25 March, 2022; originally announced April 2022.