Skip to main content

Showing 1–18 of 18 results for author: Watson, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.02606  [pdf, other

    cs.CR cs.AI cs.IR cs.LG

    Know Your Neighborhood: General and Zero-Shot Capable Binary Function Search Powered by Call Graphlets

    Authors: Joshua Collyer, Tim Watson, Iain Phillips

    Abstract: Binary code similarity detection is an important problem with applications in areas like malware analysis, vulnerability research and plagiarism detection. This paper proposes a novel graph neural network architecture combined with a novel graph data representation called call graphlets. A call graphlet encodes the neighborhood around each function in a binary executable, capturing the local and g… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

  2. arXiv:2312.04940  [pdf, other

    cs.CR cs.AI cs.LG

    Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning

    Authors: Chris Hicks, Vasilios Mavroudis, Myles Foley, Thomas Davies, Kate Highnam, Tim Watson

    Abstract: Communication networks able to withstand hostile environments are critically important for disaster relief operations. In this paper, we consider a challenging scenario where drones have been compromised in the supply chain, during their manufacture, and harbour malicious software capable of wide-ranging and infectious disruption. We investigate multi-agent deep reinforcement learning as a tool fo… ▽ More

    Submitted 8 December, 2023; originally announced December 2023.

    Comments: Published in AISec '23. This version fixes some terminology to improve readability

    Journal ref: In Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security. Association for Computing Machinery, 91-101 (2023)

  3. arXiv:2310.03605  [pdf, other

    cs.CR cs.AI cs.IR cs.LG

    FASER: Binary Code Similarity Search through the use of Intermediate Representations

    Authors: Josh Collyer, Tim Watson, Iain Phillips

    Abstract: Being able to identify functions of interest in cross-architecture software is useful whether you are analysing for malware, securing the software supply chain or conducting vulnerability research. Cross-Architecture Binary Code Similarity Search has been explored in numerous studies and has used a wide range of different data sources to achieve its goals. The data sources typically used draw on c… ▽ More

    Submitted 29 November, 2023; v1 submitted 5 October, 2023; originally announced October 2023.

    Comments: 10 pages, Proceedings of the Conference on Applied Machine Learning in Information Security (CAMLIS)

  4. arXiv:2307.04427  [pdf, other

    astro-ph.HE astro-ph.GA cs.LG

    Observation of high-energy neutrinos from the Galactic plane

    Authors: R. Abbasi, M. Ackermann, J. Adams, J. A. Aguilar, M. Ahlers, M. Ahrens, J. M. Alameddine, A. A. Alves Jr., N. M. Amin, K. Andeen, T. Anderson, G. Anton, C. Argüelles, Y. Ashida, S. Athanasiadou, S. Axani, X. Bai, A. Balagopal V., S. W. Barwick, V. Basu, S. Baur, R. Bay, J. J. Beatty, K. -H. Becker, J. Becker Tjus , et al. (364 additional authors not shown)

    Abstract: The origin of high-energy cosmic rays, atomic nuclei that continuously impact Earth's atmosphere, has been a mystery for over a century. Due to deflection in interstellar magnetic fields, cosmic rays from the Milky Way arrive at Earth from random directions. However, near their sources and during propagation, cosmic rays interact with matter and produce high-energy neutrinos. We search for neutrin… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

    Comments: Submitted on May 12th, 2022; Accepted on May 4th, 2023

    Journal ref: Science 380, 6652, 1338-1343 (2023)

  5. arXiv:2301.06304  [pdf

    eess.IV cs.CV

    LYSTO: The Lymphocyte Assessment Hackathon and Benchmark Dataset

    Authors: Yi** Jiao, Jeroen van der Laak, Shadi Albarqouni, Zhang Li, Tao Tan, Abhir Bhalerao, Jiabo Ma, Jiamei Sun, Johnathan Pocock, Josien P. W. Pluim, Navid Alemi Koohbanani, Raja Muhammad Saad Bashir, Shan E Ahmed Raza, Sibo Liu, Simon Graham, Suzanne Wetstein, Syed Ali Khurram, Thomas Watson, Nasir Rajpoot, Mitko Veta, Francesco Ciompi

    Abstract: We introduce LYSTO, the Lymphocyte Assessment Hackathon, which was held in conjunction with the MICCAI 2019 Conference in Shenzen (China). The competition required participants to automatically assess the number of lymphocytes, in particular T-cells, in histopathological images of colon, breast, and prostate cancer stained with CD3 and CD8 immunohistochemistry. Differently from other challenges se… ▽ More

    Submitted 13 April, 2023; v1 submitted 16 January, 2023; originally announced January 2023.

    Comments: will be sumitted to IEEE-JBHI

    MSC Class: 68T07 ACM Class: I.4.9; I.5.4; I.2.1

  6. arXiv:2209.03042  [pdf, other

    hep-ex astro-ph.IM cs.LG physics.data-an physics.ins-det

    Graph Neural Networks for Low-Energy Event Classification & Reconstruction in IceCube

    Authors: R. Abbasi, M. Ackermann, J. Adams, N. Aggarwal, J. A. Aguilar, M. Ahlers, M. Ahrens, J. M. Alameddine, A. A. Alves Jr., N. M. Amin, K. Andeen, T. Anderson, G. Anton, C. Argüelles, Y. Ashida, S. Athanasiadou, S. Axani, X. Bai, A. Balagopal V., M. Baricevic, S. W. Barwick, V. Basu, R. Bay, J. J. Beatty, K. -H. Becker , et al. (359 additional authors not shown)

    Abstract: IceCube, a cubic-kilometer array of optical sensors built to detect atmospheric and astrophysical neutrinos between 1 GeV and 1 PeV, is deployed 1.45 km to 2.45 km below the surface of the ice sheet at the South Pole. The classification and reconstruction of events from the in-ice detectors play a central role in the analysis of data from IceCube. Reconstructing and classifying events is a challen… ▽ More

    Submitted 11 October, 2022; v1 submitted 7 September, 2022; originally announced September 2022.

    Comments: Prepared for submission to JINST

  7. arXiv:2207.06769  [pdf, other

    cs.HC

    Virtual reality (VR) as a testing bench for consumer optical solutions: A machine learning approach (GBR) to visual comfort under simulated progressive addition lenses (PALS) distortions

    Authors: Miguel García García, Yannick Sauer, Tamara Watson, Siegfried Wahl

    Abstract: For decades, manufacturers have attempted to reduce or eliminate the optical aberrations that appear on the progressive addition lens' surfaces during manufacturing. Besides every effort made, some of these distortions are inevitable given how lenses are fabricated, where in fact, astigmatism appears on the surface and cannot be entirely removed or where non-uniform magnification becomes inherent… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

  8. arXiv:2201.00968  [pdf, ps, other

    cs.DM cs.DS

    Erdős-Selfridge Theorem for Nonmonotone CNFs

    Authors: Md Lutfar Rahman, Thomas Watson

    Abstract: In an influential paper, Erdős and Selfridge introduced the Maker-Breaker game played on a hypergraph, or equivalently, on a monotone CNF. The players take turns assigning values to variables of their choosing, and Breaker's goal is to satisfy the CNF, while Maker's goal is to falsify it. The Erdős-Selfridge Theorem says that the least number of clauses in any monotone CNF with $k$ literals per cl… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

  9. Learning to Control DC Motor for Micromobility in Real Time with Reinforcement Learning

    Authors: Bibek Poudel, Thomas Watson, Weizi Li

    Abstract: Autonomous micromobility has been attracting the attention of researchers and practitioners in recent years. A key component of many micro-transport vehicles is the DC motor, a complex dynamical system that is continuous and non-linear. Learning to quickly control the DC motor in the presence of disturbances and uncertainties is desired for various applications that require robustness and stabilit… ▽ More

    Submitted 30 July, 2022; v1 submitted 30 July, 2021; originally announced August 2021.

    Comments: 7 pages, 3 figures

  10. A Convolutional Neural Network based Cascade Reconstruction for the IceCube Neutrino Observatory

    Authors: R. Abbasi, M. Ackermann, J. Adams, J. A. Aguilar, M. Ahlers, M. Ahrens, C. Alispach, A. A. Alves Jr., N. M. Amin, R. An, K. Andeen, T. Anderson, I. Ansseau, G. Anton, C. Argüelles, S. Axani, X. Bai, A. Balagopal V., A. Barbano, S. W. Barwick, B. Bastian, V. Basu, V. Baum, S. Baur, R. Bay , et al. (343 additional authors not shown)

    Abstract: Continued improvements on existing reconstruction methods are vital to the success of high-energy physics experiments, such as the IceCube Neutrino Observatory. In IceCube, further challenges arise as the detector is situated at the geographic South Pole where computational resources are limited. However, to perform real-time analyses and to issue alerts to telescopes around the world, powerful an… ▽ More

    Submitted 26 July, 2021; v1 submitted 27 January, 2021; originally announced January 2021.

    Comments: 39 pages, 15 figures, submitted to Journal of Instrumentation; added references

    Journal ref: JINST 16 (2021) P07041

  11. arXiv:2006.10957  [pdf, ps, other

    cs.CC

    When Is Amplification Necessary for Composition in Randomized Query Complexity?

    Authors: Shalev Ben-David, Mika Göös, Robin Kothari, Thomas Watson

    Abstract: Suppose we have randomized decision trees for an outer function $f$ and an inner function $g$. The natural approach for obtaining a randomized decision tree for the composed function $(f\circ g^n)(x^1,\ldots,x^n)=f(g(x^1),\ldots,g(x^n))$ involves amplifying the success probability of the decision tree for $g$, so that a union bound can be used to bound the error probability over all the coordinate… ▽ More

    Submitted 19 June, 2020; originally announced June 2020.

    Comments: 17 pages. Accepted to RANDOM 2020

  12. arXiv:2002.10904  [pdf, other

    cs.LG stat.ML

    Reward Sha** for Human Learning via Inverse Reinforcement Learning

    Authors: Mark A. Rucker, Layne T. Watson, Matthew S. Gerber, Laura E. Barnes

    Abstract: Humans are spectacular reinforcement learners, constantly learning from and adjusting to experience and feedback. Unfortunately, this doesn't necessarily mean humans are fast learners. When tasks are challenging, learning can become unacceptably slow. Fortunately, humans do not have to learn tabula rasa, and learning speed can be greatly increased with learning aids. In this work we validate a new… ▽ More

    Submitted 15 December, 2022; v1 submitted 25 February, 2020; originally announced February 2020.

    Comments: This paper has been modified considerably for resubmission to Journal of Machine Learning Research, for source code, see https://github.com/mrucker/kpirl-kla

  13. arXiv:1703.07666  [pdf, other

    cs.CC

    Query-to-Communication Lifting for BPP

    Authors: Mika Göös, Toniann Pitassi, Thomas Watson

    Abstract: For any $n$-bit boolean function $f$, we show that the randomized communication complexity of the composed function $f\circ g^n$, where $g$ is an index gadget, is characterized by the randomized decision tree complexity of $f$. In particular, this means that many query complexity separations involving randomized models (e.g., classical vs. quantum) automatically imply analogous separations in comm… ▽ More

    Submitted 22 March, 2017; originally announced March 2017.

    Comments: 21 pages

  14. arXiv:1604.07062  [pdf, other

    cs.CC cs.DM math.CO

    Extension Complexity of Independent Set Polytopes

    Authors: Mika Göös, Rahul Jain, Thomas Watson

    Abstract: We exhibit an $n$-node graph whose independent set polytope requires extended formulations of size exponential in $Ω(n/\log n)$. Previously, no explicit examples of $n$-dimensional $0/1$-polytopes were known with extension complexity larger than exponential in $Θ(\sqrt{n})$. Our construction is inspired by a relatively little-known connection between extended formulations and (monotone) circuit de… ▽ More

    Submitted 24 April, 2016; originally announced April 2016.

  15. Nonnegative Rank vs. Binary Rank

    Authors: Thomas Watson

    Abstract: Motivated by (and using tools from) communication complexity, we investigate the relationship between the following two ranks of a $0$-$1$ matrix: its nonnegative rank and its binary rank (the $\log$ of the latter being the unambiguous nondeterministic communication complexity). We prove that for partial $0$-$1$ matrices, there can be an exponential separation. For total $0$-$1$ matrices, we show… ▽ More

    Submitted 24 March, 2016; originally announced March 2016.

    Journal ref: Chicago Journal of Theoretical Computer Science 2016, Article 2, pages 1-13

  16. arXiv:1107.1265  [pdf, ps, other

    cs.DS

    Lift-and-Project Integrality Gaps for the Traveling Salesperson Problem

    Authors: Thomas Watson

    Abstract: We study the lift-and-project procedures of Lov{á}sz-Schrijver and Sherali-Adams applied to the standard linear programming relaxation of the traveling salesperson problem with triangle inequality. For the asymmetric TSP tour problem, Charikar, Goemans, and Karloff (FOCS 2004) proved that the integrality gap of the standard relaxation is at least 2. We prove that after one round of the Lov{á}sz-Sc… ▽ More

    Submitted 6 July, 2011; originally announced July 2011.

    Comments: 19 pages, 8 figures

  17. arXiv:cs/0208040  [pdf, ps, other

    cs.CE

    Using Hierarchical Data Mining to Characterize Performance of Wireless System Configurations

    Authors: Alex Verstak, Naren Ramakrishnan, Kyung Kyoon Bae, William H. Tranter, Layne T. Watson, Jian He, Clifford A. Shaffer, Theodore S. Rappaport

    Abstract: This paper presents a statistical framework for assessing wireless systems performance using hierarchical data mining techniques. We consider WCDMA (wideband code division multiple access) systems with two-branch STTD (space time transmit diversity) and 1/2 rate convolutional coding (forward error correction codes). Monte Carlo simulation estimates the bit error probability (BEP) of the system a… ▽ More

    Submitted 25 August, 2002; originally announced August 2002.

    ACM Class: I.6.4

  18. arXiv:cs/0202027  [pdf, ps, other

    cs.CE cs.SE

    BSML: A Binding Schema Markup Language for Data Interchange in Problem Solving Environments (PSEs)

    Authors: Alex Verstak, Naren Ramakrishnan, Layne T. Watson, Jian He, Clifford A. Shaffer, Kyung Kyoon Bae, **g Jiang, William H. Tranter, Theodore S. Rappaport

    Abstract: We describe a binding schema markup language (BSML) for describing data interchange between scientific codes. Such a facility is an important constituent of scientific problem solving environments (PSEs). BSML is designed to integrate with a PSE or application composition system that views model specification and execution as a problem of managing semistructured data. The data interchange proble… ▽ More

    Submitted 18 February, 2002; originally announced February 2002.

    ACM Class: D.2.6; I.2.4