Skip to main content

Showing 1–23 of 23 results for author: Ward, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.11082  [pdf, other

    cs.CR cs.AI

    The AI Security Pyramid of Pain

    Authors: Chris M. Ward, Josh Harguess, Julia Tao, Daniel Christman, Paul Spicer, Mike Tan

    Abstract: We introduce the AI Security Pyramid of Pain, a framework that adapts the cybersecurity Pyramid of Pain to categorize and prioritize AI-specific threats. This framework provides a structured approach to understanding and addressing various levels of AI threats. Starting at the base, the pyramid emphasizes Data Integrity, which is essential for the accuracy and reliability of datasets and AI models… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

    Comments: SPIE DCS 2024

  2. arXiv:2308.07467  [pdf, ps, other

    cs.IT eess.SP math.CA

    Sequences with identical autocorrelation spectra

    Authors: Daniel J. Katz, Adeebur Rahman, Michael J Ward

    Abstract: Aperiodic autocorrelation measures the similarity between a finite-length sequence of complex numbers and translates of itself. Autocorrelation is important in communications, remote sensing, and scientific instrumentation. The autocorrelation function reports the aperiodic autocorrelation at every possible translation. Knowing the autocorrelation function of a sequence is equivalent to knowing th… ▽ More

    Submitted 14 August, 2023; originally announced August 2023.

    Comments: 12 pages

    MSC Class: 94A12 42A05 42A38 42A85

  3. arXiv:2212.04326  [pdf, other

    cs.CR cs.GT

    Scalable Edge Blocking Algorithms for Defending Active Directory Style Attack Graphs

    Authors: Mingyu Guo, Max Ward, Aneta Neumann, Frank Neumann, Hung Nguyen

    Abstract: Active Directory (AD) is the default security management system for Windows domain networks. An AD environment naturally describes an attack graph where nodes represent computers/accounts/security groups, and edges represent existing accesses/known exploits that allow the attacker to gain access from one node to another. Motivated by practical AD use cases, we study a Stackelberg game between one… ▽ More

    Submitted 2 December, 2022; originally announced December 2022.

  4. Defending Active Directory by Combining Neural Network based Dynamic Program and Evolutionary Diversity Optimisation

    Authors: Diksha Goel, Max Ward, Aneta Neumann, Frank Neumann, Hung Nguyen, Mingyu Guo

    Abstract: Active Directory (AD) is the default security management system for Windows domain networks. We study a Stackelberg game model between one attacker and one defender on an AD attack graph. The attacker initially has access to a set of entry nodes. The attacker can expand this set by strategically exploring edges. Every edge has a detection rate and a failure rate. The attacker aims to maximize thei… ▽ More

    Submitted 4 January, 2023; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: Added reference [12] on page 3 and 4. Corrected spelling EVC to VEC on page 10

    Journal ref: Proceedings of the Genetic and Evolutionary Computation Conference, 2022, Pages 1191 to 1199

  5. arXiv:2202.13402  [pdf, other

    cs.CV

    Concept Graph Neural Networks for Surgical Video Understanding

    Authors: Yutong Ban, Jennifer A. Eckhoff, Thomas M. Ward, Daniel A. Hashimoto, Ozanan R. Meireles, Daniela Rus, Guy Rosman

    Abstract: We constantly integrate our knowledge and understanding of the world to enhance our interpretation of what we see. This ability is crucial in application domains which entail reasoning about multiple entities and concepts, such as AI-augmented surgery. In this paper, we propose a novel way of integrating conceptual knowledge into temporal analysis tasks via temporal concept graph networks. In th… ▽ More

    Submitted 25 April, 2023; v1 submitted 27 February, 2022; originally announced February 2022.

  6. arXiv:2201.04799  [pdf, other

    cs.DM

    Finding $(s,d)$-Hypernetworks in F-Hypergraphs is NP-Hard

    Authors: Reynaldo Gil-Pons, Max Ward, Loïc Miller

    Abstract: We consider the problem of computing an $(s,d)$-hypernetwork in an acyclic F-hypergraph. This is a fundamental computational problem arising in directed hypergraphs, and is a foundational step in tackling problems of reachability and redundancy. This problem was previously explored in the context of general directed hypergraphs (containing cycles), where it is NP-hard, and acyclic B-hypergraphs, w… ▽ More

    Submitted 14 January, 2022; v1 submitted 13 January, 2022; originally announced January 2022.

  7. arXiv:2110.04933  [pdf, other

    cs.DS cs.DM

    A Faster Algorithm for Maximum Independent Set on Interval Filament Graphs

    Authors: Darcy Best, Max Ward

    Abstract: We provide an algorithm requiring only $O(N^2)$ time to compute the maximum weight independent set of interval filament graphs. This also implies an $O(N^4)$ algorithm to compute the maximum weight induced matching of interval filament graphs. Both algorithms significantly improve upon the previous best complexities for these problems. Previously, the maximum weight independent set and maximum wei… ▽ More

    Submitted 17 October, 2021; v1 submitted 10 October, 2021; originally announced October 2021.

  8. arXiv:2109.12894  [pdf, other

    cs.NE cs.ET cs.LG

    Training Spiking Neural Networks Using Lessons From Deep Learning

    Authors: Jason K. Eshraghian, Max Ward, Emre Neftci, Xinxin Wang, Gregor Lenz, Girish Dwivedi, Mohammed Bennamoun, Doo Seok Jeong, Wei D. Lu

    Abstract: The brain is the perfect place to look for inspiration to develop more efficient neural networks. The inner workings of our synapses and neurons provide a glimpse at what the future of deep learning might look like. This paper serves as a tutorial and perspective showing how to apply the lessons learnt from several decades of research in deep learning, gradient descent, backpropagation and neurosc… ▽ More

    Submitted 13 August, 2023; v1 submitted 27 September, 2021; originally announced September 2021.

  9. arXiv:2108.06891   

    cs.DS cs.NI

    Efficient Network Analysis Under Single Link Deletion

    Authors: Max Ward, Amitava Datta, Hung X. Nguyen, Jason Eshraghian

    Abstract: The problem of worst case edge deletion from a network is considered. Suppose that you have a communication network and you can delete a single edge. Which edge deletion causes the largest disruption? More formally, given a graph, which edge after deletion disconnects the maximum number of pairs of vertices, where ties for number of pairs disconnected are broken by finding an edge that increases t… ▽ More

    Submitted 15 February, 2022; v1 submitted 16 August, 2021; originally announced August 2021.

    Comments: Found previous published results with similar findings

  10. arXiv:2105.04642  [pdf, other

    cs.CV

    SUPR-GAN: SUrgical PRediction GAN for Event Anticipation in Laparoscopic and Robotic Surgery

    Authors: Yutong Ban, Guy Rosman, Jennifer A. Eckhoff, Thomas M. Ward, Daniel A. Hashimoto, Taisei Kondo, Hidekazu Iwaki, Ozanan R. Meireles, Daniela Rus

    Abstract: Comprehension of surgical workflow is the foundation upon which artificial intelligence (AI) and machine learning (ML) holds the potential to assist intraoperative decision-making and risk mitigation. In this work, we move beyond mere identification of past surgical phases, into the prediction of future surgical steps and specification of the transitions between them. We use a novel Generative Adv… ▽ More

    Submitted 9 March, 2022; v1 submitted 10 May, 2021; originally announced May 2021.

    Comments: RA-L ICRA 2022

  11. arXiv:2008.12363  [pdf, other

    cs.CV

    Analyzing Worldwide Social Distancing through Large-Scale Computer Vision

    Authors: Isha Ghodgaonkar, Subhankar Chakraborty, Vishnu Banna, Shane Allcroft, Mohammed Metwaly, Fischer Bordwell, Kohsuke Kimura, Xinxin Zhao, Abhinav Goel, Caleb Tung, Akhil Chinnakotla, Minghao Xue, Yung-Hsiang Lu, Mark Daniel Ward, Wei Zakharov, David S. Ebert, David M. Barbarash, George K. Thiruvathukal

    Abstract: In order to contain the COVID-19 pandemic, countries around the world have introduced social distancing guidelines as public health interventions to reduce the spread of the disease. However, monitoring the efficacy of these guidelines at a large scale (nationwide or worldwide) is difficult. To make matters worse, traditional observational methods such as in-person reporting is dangerous because o… ▽ More

    Submitted 27 August, 2020; originally announced August 2020.

    Comments: 10 pages, 15 figures

  12. arXiv:2005.09091  [pdf, other

    cs.CY

    Observing Responses to the COVID-19 Pandemic using Worldwide Network Cameras

    Authors: Isha Ghodgaonkar, Abhinav Goel, Fischer Bordwell, Caleb Tung, Sara Aghajanzadeh, Noah Curran, Ryan Chen, Kaiwen Yu, Sneha Mahapatra, Vishnu Banna, Gore Kao, Kate Lee, Xiao Hu, Nick Eliopolous, Akhil Chinnakotla, Damini Rijhwani, Ashley Kim, Aditya Chakraborty, Mark Daniel Ward, Yung-Hsiang Lu, George K. Thiruvathukal

    Abstract: COVID-19 has resulted in a worldwide pandemic, leading to "lockdown" policies and social distancing. The pandemic has profoundly changed the world. Traditional methods for observing these historical events are difficult because sending reporters to areas with many infected people can put the reporters' lives in danger. New technologies are needed for safely observing responses to these policies. T… ▽ More

    Submitted 18 May, 2020; originally announced May 2020.

    Comments: 7 pages, 20 figures

  13. arXiv:1905.05373  [pdf, other

    cs.CV eess.IV

    Image quality assessment for determining efficacy and limitations of Super-Resolution Convolutional Neural Network (SRCNN)

    Authors: Chris M. Ward, Josh Harguess, Brendan Crabb, Shibin Parameswaran

    Abstract: Traditional metrics for evaluating the efficacy of image processing techniques do not lend themselves to understanding the capabilities and limitations of modern image processing methods - particularly those enabled by deep learning. When applying image processing in engineering solutions, a scientist or engineer has a need to justify their design decisions with clear metrics. By applying blind/re… ▽ More

    Submitted 13 May, 2019; originally announced May 2019.

    Journal ref: Proceedings Volume 10396, Applications of Digital Image Processing XL; 1039605 (2017)

  14. Leveraging synthetic imagery for collision-at-sea avoidance

    Authors: Chris M. Ward, Josh Harguess, Alexander G. Corelli

    Abstract: Maritime collisions involving multiple ships are considered rare, but in 2017 several United States Navy vessels were involved in fatal at-sea collisions that resulted in the death of seventeen American Servicemembers. The experimentation introduced in this paper is a direct response to these incidents. We propose a shipboard Collision-At-Sea avoidance system, based on video image processing, that… ▽ More

    Submitted 12 May, 2019; originally announced May 2019.

    Journal ref: Proc. SPIE 10645, Geospatial Informatics, Motion Imagery, and Network Analytics VIII, 1064507 (4 May 2018)

  15. arXiv:1905.03894  [pdf, other

    cs.CV

    Ship classification from overhead imagery using synthetic data and domain adaptation

    Authors: Chris M. Ward, Josh Harguess, Cameron Hilton

    Abstract: In this paper, we revisit the problem of classifying ships (maritime vessels) detected from overhead imagery. Despite the last decade of research on this very important and pertinent problem, it remains largely unsolved. One of the major issues with the detection and classification of ships and other objects in the maritime domain is the lack of substantial ground truth data needed to train state-… ▽ More

    Submitted 9 May, 2019; originally announced May 2019.

    Comments: OCEANS 2018 MTS/IEEE Charleston

  16. Lost in Space: Geolocation in Event Data

    Authors: Sophie J. Lee, Howard Liu, Michael D. Ward

    Abstract: Extracting the "correct" location information from text data, i.e., determining the place of event, has long been a goal for automated text processing. To approximate human-like coding schema, we introduce a supervised machine learning algorithm that classifies each location word to be either correct or incorrect. We use news articles collected from around the world (Integrated Crisis Early Warnin… ▽ More

    Submitted 14 November, 2016; originally announced November 2016.

    Journal ref: PSRM 7 (2019) 871-888

  17. arXiv:1605.03390  [pdf, ps, other

    cs.DS

    Variance of the Internal Profile in Suffix Trees

    Authors: Jeffrey Gaither, Mark Daniel Ward

    Abstract: The precise analysis of the variance of the profile of a suffix tree has been a longstanding open problem. We analyze three regimes of the asymptotic growth of the variance of the profile of a suffix tree built from a randomly generated binary string, in the nonuniform case. We utilize combinatorics on words, singularity analysis, and the Mellin transform.

    Submitted 12 May, 2016; v1 submitted 11 May, 2016; originally announced May 2016.

    Comments: 19 pages, 0 figures

  18. arXiv:1504.08218  [pdf, other

    stat.AP cs.SI physics.soc-ph

    Relax, Tensors Are Here: Dependencies in International Processes

    Authors: Shahryar Minhas, Peter D. Hoff, Michael D. Ward

    Abstract: Previous models of international conflict have suffered two shortfalls. They tended not to embody dynamic changes, focusing rather on static slices of behavior over time. These models have also been empirically evaluated in ways that assumed the independence of each country, when in reality they are searching for the interdependence among all countries. We illustrate a solution to these two hurdle… ▽ More

    Submitted 30 April, 2015; originally announced April 2015.

  19. arXiv:1203.2670  [pdf, ps, other

    math.CO cs.DM

    Partitions with Distinct Multiplicities of Parts: On An "Unsolved Problem" Posed By Herbert Wilf

    Authors: James Allen Fill, Svante Janson, Mark Daniel Ward

    Abstract: Wilf's Sixth Unsolved Problem asks for any interesting properties of the set of partitions of integers for which the (nonzero) multiplicities of the parts are all different. We refer to these as \emph{Wilf partitions}. Using $f(n)$ to denote the number of Wilf partitions, we establish lead-order asymptotics for $\ln{f(n)}$.

    Submitted 12 March, 2012; originally announced March 2012.

    Comments: 6 pages, 1 figure

    MSC Class: 05A16; 05A17; 68W40

  20. arXiv:1110.6650  [pdf, other

    cs.DB

    Summarization and Matching of Density-Based Clusters in Streaming Environments

    Authors: Di Yang, Elke A. Rundensteiner, Matthew O. Ward

    Abstract: Density-based cluster mining is known to serve a broad range of applications ranging from stock trade analysis to moving object monitoring. Although methods for efficient extraction of density-based clusters have been studied in the literature, the problem of summarizing and matching of such clusters with arbitrary shapes and complex cluster structures remains unsolved. Therefore, the goal of our… ▽ More

    Submitted 30 October, 2011; originally announced October 2011.

    Comments: VLDB2012

    Journal ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 2, pp. 121-132 (2011)

  21. arXiv:cs/0109053  [pdf

    cs.CY

    Price Increases from Online Privacy

    Authors: Michael R. Ward, Yu-Ching Chen

    Abstract: Consumers value kee** some information about them private from potential marketers. E-commerce dramatically increases the potential for marketers to accumulate otherwise private information about potential customers. Online marketers claim that this information enables them to better market their products. Policy makers are currently drafting rules to regulate the way in which these marketers… ▽ More

    Submitted 23 September, 2001; originally announced September 2001.

    Comments: 29th TPRC Conference, 2001

    Report number: TPRC-2001-014 ACM Class: K.4.m Miscellaneous

  22. Reverse Engineering from Assembler to Formal Specifications via Program Transformations

    Authors: M. P. Ward

    Abstract: The FermaT transformation system, based on research carried out over the last sixteen years at Durham University, De Montfort University and Software Migrations Ltd., is an industrial-strength formal transformation engine with many applications in program comprehension and language migration. This paper is a case study which uses automated plus manually-directed transformations and abstractions… ▽ More

    Submitted 4 May, 2001; originally announced May 2001.

    Comments: 10 pages

    ACM Class: D.2.7; D.3.2

    Journal ref: 7th Working Conference on Reverse Engineering 2000, 23--25 Nov 2000, Brisbane, Queensland, Australia. IEEE Computer Society

  23. arXiv:cs/9810019  [pdf, ps

    cs.DC

    Gryphon: An Information Flow Based Approach to Message Brokering

    Authors: Robert Strom, Guruduth Banavar, Tushar Chandra, Marc Kaplan, Kevan Miller, Bodhi Mukherjee, Daniel Sturman, Michael Ward

    Abstract: Gryphon is a distributed computing paradigm for message brokering, which is the transferring of information in the form of streams of events from information providers to information consumers. This extended abstract outlines the major problems in message brokering and Gryphon's approach to solving them.

    Submitted 21 October, 1998; originally announced October 1998.

    Comments: Two page extended abstract

    ACM Class: C.2.4