Skip to main content

Showing 1–21 of 21 results for author: Thorpe, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.19292  [pdf, other

    cs.MA

    Act Natural! Projecting Autonomous System Trajectories Into Naturalistic Behavior Sets

    Authors: Hamzah I. Khan, Adam J. Thorpe, David Fridovich-Keil

    Abstract: Autonomous agents operating around human actors must consider how their behaviors might affect those humans, even when not directly interacting with them. To this end, it is often beneficial to be predictable and appear naturalistic. Existing methods to address this problem use human actor intent modeling or imitation learning techniques, but these approaches rarely capture all possible motivation… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

  2. arXiv:2405.08954  [pdf, other

    cs.RO

    Zero-Shot Transfer of Neural ODEs

    Authors: Tyler Ingebrand, Adam J. Thorpe, Ufuk Topcu

    Abstract: Autonomous systems often encounter environments and scenarios beyond the scope of their training data, which underscores a critical challenge: the need to generalize and adapt to unseen scenarios in real time. This challenge necessitates new mathematical and algorithmic tools that enable adaptation and zero-shot transfer. To this end, we leverage the theory of function encoders, which enables zero… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

  3. arXiv:2403.17233  [pdf, other

    eess.SY cs.LG

    Active Learning of Dynamics Using Prior Domain Knowledge in the Sampling Process

    Authors: Kevin S. Miller, Adam J. Thorpe, Ufuk Topcu

    Abstract: We present an active learning algorithm for learning dynamics that leverages side information by explicitly incorporating prior domain knowledge into the sampling process. Our proposed algorithm guides the exploration toward regions that demonstrate high empirical discrepancy between the observed data and an imperfect prior model of the dynamics derived from side information. Through numerical exp… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

  4. arXiv:2305.05607  [pdf, ps, other

    cs.HC cs.RO eess.SY

    Refining Human-Centered Autonomy Using Side Information

    Authors: Adam J. Thorpe

    Abstract: Data-driven algorithms for human-centered autonomy use observed data to compute models of human behavior in order to ensure safety, correctness, and to avoid potential errors that arise at runtime. However, such algorithms often neglect useful a priori knowledge, known as side information, that can improve the quality of data-driven models. We identify several key challenges in human-centered auto… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Journal ref: HCPS 2023 Workshop on Humans in Cyber-Physical Systems (HCPS 2023), part of CPS-IoT Week

  5. arXiv:2304.10728  [pdf, other

    cs.CR

    PiXi: Password Inspiration by Exploring Information

    Authors: Shengqian Wang, Amirali Salehi-Abari, Julie Thorpe

    Abstract: Passwords, a first line of defense against unauthorized access, must be secure and memorable. However, people often struggle to create secure passwords they can recall. To address this problem, we design Password inspiration by eXploring information (PiXi), a novel approach to nudge users towards creating secure passwords. PiXi is the first of its kind that employs a password creation nudge to sup… ▽ More

    Submitted 28 September, 2023; v1 submitted 20 April, 2023; originally announced April 2023.

    Comments: 16 pages

  6. arXiv:2301.03565  [pdf, other

    eess.SY cs.LG math.OC

    Physics-Informed Kernel Embeddings: Integrating Prior System Knowledge with Data-Driven Control

    Authors: Adam J. Thorpe, Cyrus Neary, Franck Djeumou, Meeko M. K. Oishi, Ufuk Topcu

    Abstract: Data-driven control algorithms use observations of system dynamics to construct an implicit model for the purpose of control. However, in practice, data-driven techniques often require excessive sample sizes, which may be infeasible in real-world scenarios where only limited observations of the system are available. Furthermore, purely data-driven methods often neglect useful a priori knowledge, s… ▽ More

    Submitted 9 January, 2023; originally announced January 2023.

  7. arXiv:2204.12013  [pdf, other

    cs.DC cs.LG

    Bamboo: Making Preemptible Instances Resilient for Affordable Training of Large DNNs

    Authors: John Thorpe, Pengzhan Zhao, Jonathan Eyolfson, Yifan Qiao, Zhihao Jia, Minjia Zhang, Ravi Netravali, Guoqing Harry Xu

    Abstract: DNN models across many domains continue to grow in size, resulting in high resource requirements for effective training, and unpalatable (and often unaffordable) costs for organizations and research labs across scales. This paper aims to significantly reduce training costs with effective use of preemptible instances, i.e., those that can be obtained at a much cheaper price while idle, but may be p… ▽ More

    Submitted 25 April, 2022; originally announced April 2022.

    Comments: 17 pages

  8. arXiv:2203.06290  [pdf, other

    cs.LG eess.SY math.OC

    SOCKS: A Stochastic Optimal Control and Reachability Toolbox Using Kernel Methods

    Authors: Adam J. Thorpe, Meeko M. K. Oishi

    Abstract: We present SOCKS, a data-driven stochastic optimal control toolbox based in kernel methods. SOCKS is a collection of data-driven algorithms that compute approximate solutions to stochastic optimal control problems with arbitrary cost and constraint functions, including stochastic reachability, which seeks to determine the likelihood that a system will reach a desired target set while respecting a… ▽ More

    Submitted 11 March, 2022; originally announced March 2022.

  9. arXiv:2202.04193  [pdf, other

    eess.SY cs.RO math.OC

    Data-Driven Chance Constrained Control using Kernel Distribution Embeddings

    Authors: Adam J. Thorpe, Thomas Lew, Meeko M. K. Oishi, Marco Pavone

    Abstract: We present a data-driven algorithm for efficiently computing stochastic control policies for general joint chance constrained optimal control problems. Our approach leverages the theory of kernel distribution embeddings, which allows representing expectation operators as inner products in a reproducing kernel Hilbert space. This framework enables approximately reformulating the original problem us… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

    Comments: Submitted to 4th Annual Learning for Dynamics & Control Conference (L4DC) 2022

  10. arXiv:2111.04466  [pdf, other

    cs.CY cs.AI

    Improving Peer Assessment with Graph Convolutional Networks

    Authors: Alireza A. Namanloo, Julie Thorpe, Amirali Salehi-Abari

    Abstract: Peer assessment systems are emerging in many social and multi-agent settings, such as peer grading in large (online) classes, peer review in conferences, peer art evaluation, etc. However, peer assessments might not be as accurate as expert evaluations, thus rendering these systems unreliable. The reliability of peer assessment systems is influenced by various factors such as assessment ability of… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

  11. arXiv:2110.08971  [pdf, other

    cs.CR

    Long Passphrases: Potentials and Limits

    Authors: Christopher Bonk, Zach Parish, Julie Thorpe, Amirali Salehi-Abari

    Abstract: Passphrases offer an alternative to traditional passwords which aim to be stronger and more memorable. However, users tend to choose short passphrases with predictable patterns that may reduce the security they offer. To explore the potential of long passphrases, we formulate a set of passphrase policies and guidelines aimed at supporting their creation and use. Through a 39-day user study we anal… ▽ More

    Submitted 17 October, 2021; originally announced October 2021.

  12. arXiv:2105.11118  [pdf, other

    cs.DC cs.LG

    Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads

    Authors: John Thorpe, Yifan Qiao, Jonathan Eyolfson, Shen Teng, Guanzhou Hu, Zhihao Jia, **liang Wei, Keval Vora, Ravi Netravali, Miryung Kim, Guoqing Harry Xu

    Abstract: A graph neural network (GNN) enables deep learning on structured graph data. There are two major GNN training obstacles: 1) it relies on high-end servers with many GPUs which are expensive to purchase and maintain, and 2) limited memory on GPUs cannot scale to today's billion-edge graphs. This paper presents Dorylus: a distributed system for training GNNs. Uniquely, Dorylus can take advantage of s… ▽ More

    Submitted 24 May, 2021; v1 submitted 24 May, 2021; originally announced May 2021.

    Comments: Paper accepted in OSDI 2021

  13. arXiv:2103.09262  [pdf, other

    cs.CR

    A Study on Priming Methods for Graphical Passwords

    Authors: Zach Parish, Amirali Salehi-Abari, Julie Thorpe

    Abstract: Recent work suggests that a type of nudge or priming technique called the presentation effect may potentially improve the security of PassPoints-style graphical passwords. These nudges attempt to prime or non-intrusively bias user password choices (i.e., point selections) by gradually revealing a background image from a particular edge to another edge at password creation time. We conduct a large-… ▽ More

    Submitted 21 April, 2021; v1 submitted 16 March, 2021; originally announced March 2021.

    Comments: 13 pages, 4 figures

  14. arXiv:2010.06773  [pdf, other

    cs.CV

    Rotation Averaging with Attention Graph Neural Networks

    Authors: Joshua Thorpe, Ruwan Tennakoon, Alireza Bab-Hadiashar

    Abstract: In this paper we propose a real-time and robust solution to large-scale multiple rotation averaging. Until recently, Multiple rotation averaging problem had been solved using conventional iterative optimization algorithms. Such methods employed robust cost functions that were chosen based on assumptions made about the sensor noise and outlier distribution. In practice, these assumptions do not alw… ▽ More

    Submitted 13 October, 2020; originally announced October 2020.

  15. arXiv:2008.07986  [pdf, other

    cs.CR

    Password Guessers Under a Microscope: An In-Depth Analysis to Inform Deployments

    Authors: Zach Parish, Connor Cushing, Shourya Aggarwal, Amirali Salehi-Abari, Julie Thorpe

    Abstract: Password guessers are instrumental for assessing the strength of passwords. Despite their diversity and abundance, little is known about how different guessers compare to each other. We perform in-depth analyses and comparisons of the guessing abilities and behavior of password guessers. To extend analyses beyond number of passwords cracked, we devise an analytical framework to compare the types o… ▽ More

    Submitted 20 February, 2021; v1 submitted 18 August, 2020; originally announced August 2020.

    Comments: 14 pages, 20 individual figures including 9 scale bars; clarified that default settings were used for the guessing tools; modified table formats

  16. arXiv:1907.00998  [pdf, other

    cs.HC cs.CR

    Geographical Security Questions for Fallback Authentication

    Authors: Alaadin Addas, Julie Thorpe, Amirali Salehi-Abari

    Abstract: Fallback authentication is the backup authentication method used when the primary authentication method (e.g., passwords, fingerprints, etc.) fails. Currently, widely-deployed fallback authentication methods (e.g., security questions, email resets, and SMS resets) suffer from documented security and usability flaws that threaten the security of accounts. These flaws motivate us to design and study… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

  17. arXiv:1811.08521  [pdf, other

    cs.SD eess.AS

    Differentiable Consistency Constraints for Improved Deep Speech Enhancement

    Authors: Scott Wisdom, John R. Hershey, Kevin Wilson, Jeremy Thorpe, Michael Chinen, Brian Patton, Rif A. Saurous

    Abstract: In recent years, deep networks have led to dramatic improvements in speech enhancement by framing it as a data-driven pattern recognition problem. In many modern enhancement systems, large amounts of data are used to train a deep network to estimate masks for complex-valued short-time Fourier transforms (STFTs) to suppress noise and preserve speech. However, current masking approaches often neglec… ▽ More

    Submitted 20 November, 2018; originally announced November 2018.

  18. arXiv:1811.07030  [pdf, other

    cs.SD eess.AS

    Exploring Tradeoffs in Models for Low-latency Speech Enhancement

    Authors: Kevin Wilson, Michael Chinen, Jeremy Thorpe, Brian Patton, John Hershey, Rif A. Saurous, Jan Skoglund, Richard F. Lyon

    Abstract: We explore a variety of neural networks configurations for one- and two-channel spectrogram-mask-based speech enhancement. Our best model improves on previous state-of-the-art performance on the CHiME2 speech enhancement task by 0.4 decibels in signal-to-distortion ratio (SDR). We examine trade-offs such as non-causal look-ahead, computation, and parameter count versus enhancement performance and… ▽ More

    Submitted 16 November, 2018; originally announced November 2018.

  19. Bio-inspired digit recognition using reward-modulated spike-timing-dependent plasticity in deep convolutional networks

    Authors: Milad Mozafari, Mohammad Ganjtabesh, Abbas Nowzari-Dalini, Simon J. Thorpe, Timothée Masquelier

    Abstract: The primate visual system has inspired the development of deep artificial neural networks, which have revolutionized the computer vision domain. Yet these networks are much less energy-efficient than their biological counterparts, and they are typically trained with backpropagation, which is extremely data-hungry. To address these limitations, we used a deep convolutional spiking neural network (D… ▽ More

    Submitted 27 May, 2019; v1 submitted 31 March, 2018; originally announced April 2018.

    Comments: Pattern Recognition (2019)

  20. STDP-based spiking deep convolutional neural networks for object recognition

    Authors: Saeed Reza Kheradpisheh, Mohammad Ganjtabesh, Simon J Thorpe, Timothée Masquelier

    Abstract: Previous studies have shown that spike-timing-dependent plasticity (STDP) can be used in spiking neural networks (SNN) to extract visual features of low or intermediate complexity in an unsupervised manner. These studies, however, used relatively shallow architectures, and only one layer was trainable. Another line of research has demonstrated - using rate-based neural networks trained with back-p… ▽ More

    Submitted 25 December, 2017; v1 submitted 4 November, 2016; originally announced November 2016.

    Journal ref: Neural Networks 2018

  21. arXiv:1605.01696  [pdf, ps, other

    cs.IT

    A Many Antenna High Rate Wireless System

    Authors: Philip Gossett, Jeremy Thorpe, Bob Nuckolls, Brett Coon, Dan McCloskey, David Chang, Greg Steuck, Paul Rodman, Sasha Levitskiy, Yuan Yuan

    Abstract: We describe a TDD MIMO wireless system designed to operate at high bandwidth and low SNR. Signals are transmitted as a direct sequence. In the uplink (Multiple Access Channel), signal detection is done by a space-time whitening filter followed by a matched filter. In the downlink (Broadcast Channel), precoding is done by the transpose of these filters. We further describe an implementation of th… ▽ More

    Submitted 5 May, 2016; originally announced May 2016.