Skip to main content

Showing 1–5 of 5 results for author: Spaeth, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2210.02881  [pdf, other

    q-bio.QM cs.LG

    Antibody Representation Learning for Drug Discovery

    Authors: Lin Li, Esther Gupta, John Spaeth, Leslie Shing, Tristan Bepler, Rajmonda Sulo Caceres

    Abstract: Therapeutic antibody development has become an increasingly popular approach for drug development. To date, antibody therapeutics are largely developed using large scale experimental screens of antibody libraries containing hundreds of millions of antibody sequences. The high cost and difficulty of develo** therapeutic antibodies create a pressing need for computational methods to predict antibo… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

  2. arXiv:2204.03089  [pdf, other

    cs.PL

    Fluently specifying taint-flow queries with fluentTQL

    Authors: Goran Piskachev, Johannes Späth, Ingo Budde, Eric Bodden

    Abstract: Previous work has shown that taint analyses are only useful if correctly customized to the context in which they are used. Existing domain-specific languages (DSLs) allow such customization through the definition of deny-listing data-flow rules that describe potentially vulnerable taint-flows. These languages, however, are designed primarily for security experts who are knowledgeable in taint anal… ▽ More

    Submitted 6 April, 2022; originally announced April 2022.

    Comments: 39 pages, Springer Journal on Empirical Software Engineering

  3. arXiv:2105.05734  [pdf

    cs.LG cs.CR cs.DC

    The FeatureCloud AI Store for Federated Learning in Biomedicine and Beyond

    Authors: Julian Matschinske, Julian Späth, Reza Nasirigerdeh, Reihaneh Torkzadehmahani, Anne Hartebrodt, Balázs Orbán, Sándor Fejér, Olga Zolotareva, Mohammad Bakhtiari, Béla Bihari, Marcus Bloice, Nina C Donner, Walid Fdhila, Tobias Frisch, Anne-Christin Hauschild, Dominik Heider, Andreas Holzinger, Walter Hötzendorfer, Jan Hospes, Tim Kacprowski, Markus Kastelitz, Markus List, Rudolf Mayer, Mónika Moga, Heimo Müller , et al. (7 additional authors not shown)

    Abstract: Machine Learning (ML) and Artificial Intelligence (AI) have shown promising results in many areas and are driven by the increasing amount of available data. However, this data is often distributed across different institutions and cannot be shared due to privacy concerns. Privacy-preserving methods, such as Federated Learning (FL), allow for training ML models without sharing sensitive data, but t… ▽ More

    Submitted 12 May, 2021; originally announced May 2021.

  4. Privacy-preserving Artificial Intelligence Techniques in Biomedicine

    Authors: Reihaneh Torkzadehmahani, Reza Nasirigerdeh, David B. Blumenthal, Tim Kacprowski, Markus List, Julian Matschinske, Julian Späth, Nina Kerstin Wenke, Béla Bihari, Tobias Frisch, Anne Hartebrodt, Anne-Christin Hausschild, Dominik Heider, Andreas Holzinger, Walter Hötzendorfer, Markus Kastelitz, Rudolf Mayer, Cristian Nogales, Anastasia Pustozerova, Richard Röttger, Harald H. H. W. Schmidt, Ameli Schwalber, Christof Tschohl, Andrea Wohner, Jan Baumbach

    Abstract: Artificial intelligence (AI) has been successfully applied in numerous scientific domains. In biomedicine, AI has already shown tremendous potential, e.g. in the interpretation of next-generation sequencing data and in the design of clinical decision support systems. However, training an AI model on sensitive data raises concerns about the privacy of individual participants. For example, summary s… ▽ More

    Submitted 6 November, 2020; v1 submitted 22 July, 2020; originally announced July 2020.

    Comments: 17 pages, 3 figures, 3 tables. Methods of Information in Medicine (2022)

  5. arXiv:1710.00564  [pdf, ps, other

    cs.SE

    CrySL: Validating Correct Usage of Cryptographic APIs

    Authors: Stefan Krüger, Johannes Späth, Karim Ali, Eric Bodden, Mira Mezini

    Abstract: Various studies have empirically shown that the majority of Java and Android apps misuse cryptographic libraries, causing devastating breaches of data security. Therefore, it is crucial to detect such misuses early in the development process. The fact that insecure usages are not the exception but the norm precludes approaches based on property inference and anomaly detection. In this paper, we… ▽ More

    Submitted 2 October, 2017; originally announced October 2017.

    Comments: 11 pages