Skip to main content

Showing 1–50 of 63 results for author: Moore, S

  1. arXiv:2406.01518  [pdf, other

    cs.CR

    BISON: Blind Identification through Stateless scOpe-specific derivatioN

    Authors: Jakob Heher, Lena Heimberger, Stefan More

    Abstract: Delegating authentication to identity providers like Google or Facebook, while convenient, compromises user privacy. Global identifiers enable internet-wide tracking; furthermore, identity providers can also record users' associations. We show that neither is a necessary evil by presenting the BISON pseudonym derivation protocol, inspired by Oblivious Pseudorandom Functions. It hides the service… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: Paper artifacts (Source code, Firefox extension, etc) available at https://github.com/iaik-jheher/BISON

  2. arXiv:2405.20529  [pdf

    cs.AI cs.CL

    An Automatic Question Usability Evaluation Toolkit

    Authors: Steven Moore, Eamon Costello, Huy A. Nguyen, John Stamper

    Abstract: Evaluating multiple-choice questions (MCQs) involves either labor intensive human assessments or automated methods that prioritize readability, often overlooking deeper question design flaws. To address this issue, we introduce the Scalable Automatic Question Usability Evaluation Toolkit (SAQUET), an open-source tool that leverages the Item-Writing Flaws (IWF) rubric for a comprehensive and automa… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: Artificial Intelligence in Education 2024

  3. Automated Generation and Tagging of Knowledge Components from Multiple-Choice Questions

    Authors: Steven Moore, Robin Schmucker, Tom Mitchell, John Stamper

    Abstract: Knowledge Components (KCs) linked to assessments enhance the measurement of student learning, enrich analytics, and facilitate adaptivity. However, generating and linking KCs to assessment items requires significant effort and domain-specific knowledge. To streamline this process for higher-education courses, we employed GPT-4 to generate KCs for multiple-choice questions (MCQs) in Chemistry and E… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: Learning @ Scale 2024

  4. arXiv:2405.07898  [pdf, other

    physics.comp-ph cs.DC cs.ET

    Breaking the Molecular Dynamics Timescale Barrier Using a Wafer-Scale System

    Authors: Kylee Santos, Stan Moore, Tomas Oppelstrup, Amirali Sharifian, Ilya Sharapov, Aidan Thompson, Delyan Z Kalchev, Danny Perez, Robert Schreiber, Scott Pakin, Edgar A Leon, James H Laros III, Michael James, Sivasankaran Rajamanickam

    Abstract: Molecular dynamics (MD) simulations have transformed our understanding of the nanoscale, driving breakthroughs in materials science, computational chemistry, and several other fields, including biophysics and drug design. Even on exascale supercomputers, however, runtimes are excessive for systems and timescales of scientific interest. Here, we demonstrate strong scaling of MD simulations on the C… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: 10 pages, 10 figures, 5 tables

  5. arXiv:2402.01580  [pdf, other

    cs.CY cs.AI

    Generative AI for Education (GAIED): Advances, Opportunities, and Challenges

    Authors: Paul Denny, Sumit Gulwani, Neil T. Heffernan, Tanja Käser, Steven Moore, Anna N. Rafferty, Adish Singla

    Abstract: This survey article has grown out of the GAIED (pronounced "guide") workshop organized by the authors at the NeurIPS 2023 conference. We organized the GAIED workshop as part of a community-building effort to bring together researchers, educators, and practitioners to explore the potential of generative AI for enhancing education. This article aims to provide an overview of the workshop activities… ▽ More

    Submitted 6 February, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

  6. arXiv:2312.11283  [pdf, other

    stat.AP cs.CR econ.EM

    The 2010 Census Confidentiality Protections Failed, Here's How and Why

    Authors: John M. Abowd, Tamara Adams, Robert Ashmead, David Darais, Sourya Dey, Simson L. Garfinkel, Nathan Goldschlag, Daniel Kifer, Philip Leclerc, Ethan Lew, Scott Moore, Rolando A. Rodríguez, Ramy N. Tadros, Lars Vilhuber

    Abstract: Using only 34 published tables, we reconstruct five variables (census block, sex, age, race, and ethnicity) in the confidential 2010 Census person records. Using the 38-bin age variable tabulated at the census block level, at most 20.1% of reconstructed records can differ from their confidential source on even a single value for these five variables. Using only published data, an attacker can veri… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

  7. arXiv:2311.16115  [pdf

    cs.CR cs.AI cs.CY cs.HC

    AI and Democracy's Digital Identity Crisis

    Authors: Shrey Jain, Connor Spelliscy, Samuel Vance-Law, Scott Moore

    Abstract: AI-enabled tools have become sophisticated enough to allow a small number of individuals to run disinformation campaigns of an unprecedented scale. Privacy-preserving identity attestations can drastically reduce instances of impersonation and make disinformation easy to identify and potentially hinder. By understanding how identity attestations are positioned across the spectrum of decentralizatio… ▽ More

    Submitted 25 September, 2023; originally announced November 2023.

  8. arXiv:2311.09828  [pdf, other

    cs.CL

    AfriMTE and AfriCOMET: Enhancing COMET to Embrace Under-resourced African Languages

    Authors: Jiayi Wang, David Ifeoluwa Adelani, Sweta Agrawal, Marek Masiak, Ricardo Rei, Eleftheria Briakou, Marine Carpuat, Xuanli He, Sofia Bourhim, Andiswa Bukula, Muhidin Mohamed, Temitayo Olatoye, Tosin Adewumi, Hamam Mokayed, Christine Mwase, Wangui Kimotho, Foutse Yuehgoh, Anuoluwapo Aremu, Jessica Ojo, Shamsuddeen Hassan Muhammad, Salomey Osei, Abdul-Hakeem Omotayo, Chiamaka Chukwuneke, Perez Ogayo, Oumaima Hourrane , et al. (33 additional authors not shown)

    Abstract: Despite the recent progress on scaling multilingual machine translation (MT) to several under-resourced African languages, accurately measuring this progress remains challenging, since evaluation is often performed on n-gram matching metrics such as BLEU, which typically show a weaker correlation with human judgments. Learned metrics such as COMET have higher correlation; however, the lack of eval… ▽ More

    Submitted 23 April, 2024; v1 submitted 16 November, 2023; originally announced November 2023.

    Comments: Accepted by NAACL 2024

  9. arXiv:2311.08856  [pdf, ps, other

    cs.AI cs.LO cs.SE

    Advances in ACL2 Proof Debugging Tools

    Authors: Matt Kaufmann, J Strother Moore

    Abstract: The experience of an ACL2 user generally includes many failed proof attempts. A key to successful use of the ACL2 prover is the effective use of tools to debug those failures. We focus on changes made after ACL2 Version 8.5: the improved break-rewrite utility and the new utility, with-brr-data.

    Submitted 15 November, 2023; originally announced November 2023.

    Comments: In Proceedings ACL2-2023, arXiv:2311.08373

    Journal ref: EPTCS 393, 2023, pp. 67-81

  10. arXiv:2311.01574  [pdf

    eess.IV cs.CV cs.LG

    Improving Lesion Segmentation in FDG-18 Whole-Body PET/CT scans using Multilabel approach: AutoPET II challenge

    Authors: Gowtham Krishnan Murugesan, Diana McCrumb, Eric Brunner, Jithendra Kumar, Rahul Soni, Vasily Grigorash, Stephen Moore, Jeff Van Oss

    Abstract: Automatic segmentation of lesions in FDG-18 Whole Body (WB) PET/CT scans using deep learning models is instrumental for determining treatment response, optimizing dosimetry, and advancing theranostic applications in oncology. However, the presence of organs with elevated radiotracer uptake, such as the liver, spleen, brain, and bladder, often leads to challenges, as these regions are often misiden… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    Comments: AutoPET II challenge paper

  11. arXiv:2310.14084  [pdf, other

    math.NA cs.CE cs.LG

    Graph Neural Networks and Applied Linear Algebra

    Authors: Nicholas S. Moore, Eric C. Cyr, Peter Ohm, Christopher M. Siefert, Raymond S. Tuminaro

    Abstract: Sparse matrix computations are ubiquitous in scientific computing. With the recent interest in scientific machine learning, it is natural to ask how sparse matrix computations can leverage neural networks (NN). Unfortunately, multi-layer perceptron (MLP) neural networks are typically not natural for either graph or sparse matrix computations. The issue lies with the fact that MLPs require fixed-si… ▽ More

    Submitted 21 October, 2023; originally announced October 2023.

    Report number: SAND2023-10755O

  12. arXiv:2310.12568  [pdf, other

    cs.LG q-bio.NC

    Julearn: an easy-to-use library for leakage-free evaluation and inspection of ML models

    Authors: Sami Hamdan, Shammi More, Leonard Sasse, Vera Komeyer, Kaustubh R. Patil, Federico Raimondo

    Abstract: The fast-paced development of machine learning (ML) methods coupled with its increasing adoption in research poses challenges for researchers without extensive training in ML. In neuroscience, for example, ML can help understand brain-behavior relationships, diagnose diseases, and develop biomarkers using various data sources like magnetic resonance imaging and electroencephalography. The primary… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

    Comments: 13 pages, 5 figures

  13. arXiv:2310.08864  [pdf, other

    cs.RO

    Open X-Embodiment: Robotic Learning Datasets and RT-X Models

    Authors: Open X-Embodiment Collaboration, Abby O'Neill, Abdul Rehman, Abhinav Gupta, Abhiram Maddukuri, Abhishek Gupta, Abhishek Padalkar, Abraham Lee, Acorn Pooley, Agrim Gupta, Ajay Mandlekar, Ajinkya Jain, Albert Tung, Alex Bewley, Alex Herzog, Alex Irpan, Alexander Khazatsky, Anant Rai, Anchit Gupta, Andrew Wang, Andrey Kolobov, Anikait Singh, Animesh Garg, Aniruddha Kembhavi, Annie Xie , et al. (267 additional authors not shown)

    Abstract: Large, high-capacity models trained on diverse datasets have shown remarkable successes on efficiently tackling downstream applications. In domains from NLP to Computer Vision, this has led to a consolidation of pretrained models, with general pretrained backbones serving as a starting point for many applications. Can such a consolidation happen in robotics? Conventionally, robotic learning method… ▽ More

    Submitted 1 June, 2024; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: Project website: https://robotics-transformer-x.github.io

  14. Robotic Table Tennis: A Case Study into a High Speed Learning System

    Authors: David B. D'Ambrosio, Jonathan Abelian, Saminda Abeyruwan, Michael Ahn, Alex Bewley, Justin Boyd, Krzysztof Choromanski, Omar Cortes, Erwin Coumans, Tianli Ding, Wenbo Gao, Laura Graesser, Atil Iscen, Navdeep Jaitly, Deepali Jain, Juhana Kangaspunta, Satoshi Kataoka, Gus Kouretas, Yuheng Kuang, Nevena Lazic, Corey Lynch, Reza Mahjourian, Sherry Q. Moore, Thinh Nguyen, Ken Oslund , et al. (10 additional authors not shown)

    Abstract: We present a deep-dive into a real-world robotic learning system that, in previous work, was shown to be capable of hundreds of table tennis rallies with a human and has the ability to precisely return the ball to desired targets. This system puts together a highly optimized perception subsystem, a high-speed low-latency robot controller, a simulation paradigm that can prevent damage in the real w… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

    Comments: Published and presented at Robotics: Science and Systems (RSS2023)

  15. arXiv:2308.12882  [pdf, other

    cs.SD cs.CR cs.LG eess.AS

    LCANets++: Robust Audio Classification using Multi-layer Neural Networks with Lateral Competition

    Authors: Sayanton V. Dibbo, Juston S. Moore, Garrett T. Kenyon, Michael A. Teti

    Abstract: Audio classification aims at recognizing audio signals, including speech commands or sound events. However, current audio classifiers are susceptible to perturbations and adversarial attacks. In addition, real-world audio classification tasks often suffer from limited labeled data. To help bridge these gaps, previous work developed neuro-inspired convolutional neural networks (CNNs) with sparse co… ▽ More

    Submitted 27 March, 2024; v1 submitted 23 August, 2023; originally announced August 2023.

    Comments: Accepted at 2024 IEEE International Conference on Acoustics, Speech and Signal Processing Workshops (ICASSPW)

  16. arXiv:2307.08161  [pdf

    cs.CL cs.AI cs.HC

    Assessing the Quality of Multiple-Choice Questions Using GPT-4 and Rule-Based Methods

    Authors: Steven Moore, Huy A. Nguyen, Tianying Chen, John Stamper

    Abstract: Multiple-choice questions with item-writing flaws can negatively impact student learning and skew analytics. These flaws are often present in student-generated questions, making it difficult to assess their quality and suitability for classroom usage. Existing methods for evaluating multiple-choice questions often focus on machine readability metrics, without considering their intended use within… ▽ More

    Submitted 16 July, 2023; originally announced July 2023.

    Comments: Accepted as a Research Paper in 18th European Conference on Technology Enhanced Learning

  17. Learnersourcing in the Age of AI: Student, Educator and Machine Partnerships for Content Creation

    Authors: Hassan Khosravi, Paul Denny, Steven Moore, John Stamper

    Abstract: Engaging students in creating novel content, also referred to as learnersourcing, is increasingly recognised as an effective approach to promoting higher-order learning, deeply engaging students with course material and developing large repositories of content suitable for personalized learning. Despite these benefits, some common concerns and criticisms are associated with learnersourcing (e.g.,… ▽ More

    Submitted 10 June, 2023; originally announced June 2023.

  18. arXiv:2303.10473  [pdf

    cs.CR cs.CV eess.IV

    Report of the Medical Image De-Identification (MIDI) Task Group -- Best Practices and Recommendations

    Authors: David A. Clunie, Adam Flanders, Adam Taylor, Brad Erickson, Brian Bialecki, David Brundage, David Gutman, Fred Prior, J Anthony Seibert, John Perry, Judy Wawira Gichoya, Justin Kirby, Katherine Andriole, Luke Geneslaw, Steve Moore, TJ Fitzgerald, Wyatt Tellis, Ying Xiao, Keyvan Farahani

    Abstract: This report addresses the technical aspects of de-identification of medical images of human subjects and biospecimens, such that re-identification risk of ethical, moral, and legal concern is sufficiently reduced to allow unrestricted public sharing for any purpose, regardless of the jurisdiction of the source and distribution sites. All medical images, regardless of the mode of acquisition, are c… ▽ More

    Submitted 1 April, 2023; v1 submitted 18 March, 2023; originally announced March 2023.

    Comments: 131 pages

  19. arXiv:2303.07452  [pdf, other

    cs.LG cs.DC

    Network Anomaly Detection Using Federated Learning

    Authors: William Marfo, Deepak K. Tosh, Shirley V. Moore

    Abstract: Due to the veracity and heterogeneity in network traffic, detecting anomalous events is challenging. The computational load on global servers is a significant challenge in terms of efficiency, accuracy, and scalability. Our primary motivation is to introduce a robust and scalable framework that enables efficient network anomaly detection. We address the issue of scalability and efficiency for netw… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

  20. arXiv:2302.11703  [pdf, other

    cs.LG cs.CV cs.HC

    fAIlureNotes: Supporting Designers in Understanding the Limits of AI Models for Computer Vision Tasks

    Authors: Steven Moore, Q. Vera Liao, Hariharan Subramonyam

    Abstract: To design with AI models, user experience (UX) designers must assess the fit between the model and user needs. Based on user research, they need to contextualize the model's behavior and potential failures within their product-specific data instances and user scenarios. However, our formative interviews with ten UX professionals revealed that such a proactive discovery of model limitations is chal… ▽ More

    Submitted 22 February, 2023; originally announced February 2023.

  21. arXiv:2301.09030  [pdf, other

    cs.LG

    Condition monitoring and anomaly detection in cyber-physical systems

    Authors: William Marfo, Deepak K. Tosh, Shirley V. Moore

    Abstract: The modern industrial environment is equipping myriads of smart manufacturing machines where the state of each device can be monitored continuously. Such monitoring can help identify possible future failures and develop a cost-effective maintenance plan. However, it is a daunting task to perform early detection with low false positives and negatives from the huge volume of collected data. This req… ▽ More

    Submitted 21 January, 2023; originally announced January 2023.

    Comments: 6 pages

  22. arXiv:2212.06303  [pdf, other

    stat.ME cs.LG stat.ML

    MAntRA: A framework for model agnostic reliability analysis

    Authors: Yogesh Chandrakant Mathpati, Kalpesh Sanjay More, Tapas Tripura, Rajdip Nayek, Souvik Chakraborty

    Abstract: We propose a novel model agnostic data-driven reliability analysis framework for time-dependent reliability analysis. The proposed approach -- referred to as MAntRA -- combines interpretable machine learning, Bayesian statistics, and identifying stochastic dynamic equation to evaluate reliability of stochastically-excited dynamical systems for which the governing physics is \textit{apriori} unknow… ▽ More

    Submitted 12 December, 2022; originally announced December 2022.

  23. arXiv:2212.02454  [pdf, other

    cs.CR

    Extending Expressive Access Policies with Privacy Features

    Authors: Stefan More, Sebastian Ramacher, Lukas Alber, Marco Herzl

    Abstract: Authentication, authorization, and trust verification are central parts of an access control system. The conditions for granting access in such a system are collected in access policies. Since access conditions are often complex, dedicated languages -- policy languages -- for defining policies are in use. However, current policy languages are unable to express such conditions having privacy of u… ▽ More

    Submitted 5 December, 2022; originally announced December 2022.

    Comments: This is the full version of a paper which appears in 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022)

  24. arXiv:2208.12264  [pdf, other

    cs.LG stat.AP

    Identifying and Overcoming Transformation Bias in Forecasting Models

    Authors: Sushant More

    Abstract: Log and square root transformations of target variable are routinely used in forecasting models to predict future sales. These transformations often lead to better performing models. However, they also introduce a systematic negative bias (under-forecasting). In this paper, we demonstrate the existence of this bias, dive deep into its root cause and introduce two methods to correct for the bias. W… ▽ More

    Submitted 24 August, 2022; originally announced August 2022.

    Comments: KDD 2022 Workshop on Mining and Learning from Time Series -- Deep Forecasting: Models, Interpretability, and Applications (accepted as a poster)

  25. Offline-verifiable Data from Distributed Ledger-based Registries

    Authors: Stefan More, Jakob Heher, Clemens Walluschek

    Abstract: Trust management systems often use registries to authenticate data, or form trust decisions. Examples are revocation registries and trust status lists. By introducing distributed ledgers (DLs), it is also possible to create decentralized registries. A verifier then queries a node of the respective ledger, e.g., to retrieve trust status information during the verification of a credential. While thi… ▽ More

    Submitted 19 July, 2022; originally announced July 2022.

    Comments: This is the full version of a paper which was presented at the 19th International Conference on Security and Cryptography (SECRYPT '22)

  26. YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC

    Authors: Stefan More, Lukas Alber

    Abstract: Personal data is an attractive source of insights for a diverse field of research and business. While our data is highly valuable, it is often privacy-sensitive. Thus, regulations like the GDPR restrict what data can be legally published, and what a buyer may do with this sensitive data. While personal data must be protected, we can still sell some insights gathered from our data that do not hurt… ▽ More

    Submitted 15 June, 2022; originally announced June 2022.

    Comments: This paper was published in the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 23--26, 2022, Vienna, Austria, ACM

  27. arXiv:2206.02852  [pdf, other

    cs.CR

    CompartOS: CHERI Compartmentalization for Embedded Systems

    Authors: Hesham Almatary, Michael Dodson, Jessica Clarke, Peter Rugg, Ivan Gomes, Michal Podhradsky, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson

    Abstract: Existing high-end embedded systems face frequent security attacks. Software compartmentalization is one technique to limit the attacks' effects to the compromised compartment and not the entire system. Unfortunately, the existing state-of-the-art embedded hardware-software solutions do not work well to enforce software compartmentalization for high-end embedded systems. MPUs are not fine-grained a… ▽ More

    Submitted 11 June, 2022; v1 submitted 6 June, 2022; originally announced June 2022.

  28. arXiv:2205.11698  [pdf, other

    cs.LO cs.MS cs.SC

    VWSIM: A Circuit Simulator

    Authors: Warren A. Hunt Jr., Vivek Ramanathan, J Strother Moore

    Abstract: VWSIM is a circuit simulator for rapid, single-flux, quantum (RSFQ) circuits. The simulator is designed to model and simulate primitive-circuit devices such as capacitors, inductors, Josephson Junctions, and can be extended to simulate other circuit families, such as CMOS. Circuit models can be provided in the native VWSIM netlist format or as SPICE-compatible netlists, which are flattened and tra… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

    Comments: In Proceedings ACL2 2022, arXiv:2205.11103

    ACM Class: B.1.2; B.7.2; D.1.1; D.2.4; F.3.1; F.4.1; G.1.3; I.1.3; I.2.3; I.6.4; J.2

    Journal ref: EPTCS 359, 2022, pp. 61-75

  29. arXiv:2205.10564  [pdf, other

    cs.RO

    Shared-Control Robotic Manipulation in Virtual Reality

    Authors: Shiyu Xu, Scott Moore, Akansel Cosgun

    Abstract: In this paper, we present the implementation details of a Virtual Reality (VR)-based teleoperation interface for moving a robotic manipulator. We propose an iterative human-in-the-loop design where the user sets the next task-space waypoint for the robot's end effector and executes the action on the physical robot before setting the next waypoints. Information from the robot's surroundings is prov… ▽ More

    Submitted 21 May, 2022; originally announced May 2022.

    Comments: 6 pages, 8 figures, submitted to HORA 2022

  30. arXiv:2201.11872  [pdf, other

    cs.LG stat.ML

    Local Latent Space Bayesian Optimization over Structured Inputs

    Authors: Natalie Maus, Haydn T. Jones, Juston S. Moore, Matt J. Kusner, John Bradshaw, Jacob R. Gardner

    Abstract: Bayesian optimization over the latent spaces of deep autoencoder models (DAEs) has recently emerged as a promising new approach for optimizing challenging black-box functions over structured, discrete, hard-to-enumerate search spaces (e.g., molecules). Here the DAE dramatically simplifies the search space by mapping inputs into a continuous latent space where familiar Bayesian optimization tools c… ▽ More

    Submitted 22 February, 2023; v1 submitted 27 January, 2022; originally announced January 2022.

  31. Enabling particle applications for exascale computing platforms

    Authors: Susan M Mniszewski, James Belak, Jean-Luc Fattebert, Christian FA Negre, Stuart R Slattery, Adetokunbo A Adedoyin, Robert F Bird, Choongseok Chang, Guangye Chen, Stephane Ethier, Shane Fogerty, Salman Habib, Christoph Junghans, Damien Lebrun-Grandie, Jamaludin Mohd-Yusof, Stan G Moore, Daniel Osei-Kuffuor, Steven J Plimpton, Adrian Pope, Samuel Temple Reeve, Lee Ricketson, Aaron Scheinberg, Amil Y Sharma, Michael E Wall

    Abstract: The Exascale Computing Project (ECP) is invested in co-design to assure that key applications are ready for exascale computing. Within ECP, the Co-design Center for Particle Applications (CoPA) is addressing challenges faced by particle-based applications across four sub-motifs: short-range particle-particle interactions (e.g., those which often dominate molecular dynamics (MD) and smoothed partic… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Comments: 26 pages, 17 figures

    Report number: LA-UR-20-26599

  32. Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials

    Authors: Stefan More, Peter Grassberger, Felix Hörandner, Andreas Abraham, Lukas Daniel Klausner

    Abstract: Recruiters and institutions around the world struggle with the verification of diplomas issued in a diverse and global education setting. Firstly, it is a nontrivial problem to identify bogus institutions selling education credentials. While institutions are often accredited by qualified authorities on a regional level, there is no global authority fulfilling this task. Secondly, many different da… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

    Comments: 16 pages, 4 figures

    Journal ref: Proceedings of the 36th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2021)/IFIP Advances in Information and Communication Technology, vol. 625, 2021, 19-35

  33. arXiv:2103.15963  [pdf, ps, other

    cs.CL cs.AI

    Contextual Text Embeddings for Twi

    Authors: Paul Azunre, Salomey Osei, Salomey Addo, Lawrence Asamoah Adu-Gyamfi, Stephen Moore, Bernard Adabankah, Bernard Opoku, Clara Asare-Nyarko, Samuel Nyarko, Cynthia Amoaba, Esther Dansoa Appiah, Felix Akwerh, Richard Nii Lante Lawson, Joel Budu, Emmanuel Debrah, Nana Boateng, Wisdom Ofori, Edwin Buabeng-Munkoh, Franklin Adjei, Isaac Kojo Essel Ampomah, Joseph Otoo, Reindorf Borkor, Standylove Birago Mensah, Lucien Mensah, Mark Amoako Marcel , et al. (2 additional authors not shown)

    Abstract: Transformer-based language models have been changing the modern Natural Language Processing (NLP) landscape for high-resource languages such as English, Chinese, Russian, etc. However, this technology does not yet exist for any Ghanaian language. In this paper, we introduce the first of such models for Twi or Akan, the most widely spoken Ghanaian language. The specific contribution of this researc… ▽ More

    Submitted 31 March, 2021; v1 submitted 29 March, 2021; originally announced March 2021.

    Comments: 10 pages paper; Accepted at African NLP Workshop @ EACL 2021

  34. arXiv:2103.15625  [pdf, other

    cs.CL cs.AI

    English-Twi Parallel Corpus for Machine Translation

    Authors: Paul Azunre, Salomey Osei, Salomey Addo, Lawrence Asamoah Adu-Gyamfi, Stephen Moore, Bernard Adabankah, Bernard Opoku, Clara Asare-Nyarko, Samuel Nyarko, Cynthia Amoaba, Esther Dansoa Appiah, Felix Akwerh, Richard Nii Lante Lawson, Joel Budu, Emmanuel Debrah, Nana Boateng, Wisdom Ofori, Edwin Buabeng-Munkoh, Franklin Adjei, Isaac Kojo Essel Ampomah, Joseph Otoo, Reindorf Borkor, Standylove Birago Mensah, Lucien Mensah, Mark Amoako Marcel , et al. (2 additional authors not shown)

    Abstract: We present a parallel machine translation training corpus for English and Akuapem Twi of 25,421 sentence pairs. We used a transformer-based translator to generate initial translations in Akuapem Twi, which were later verified and corrected where necessary by native speakers to eliminate any occurrence of translationese. In addition, 697 higher quality crowd-sourced sentences are provided for use a… ▽ More

    Submitted 1 April, 2021; v1 submitted 29 March, 2021; originally announced March 2021.

    Comments: 9 pages paper, Accepted at African NLP workshop @EACL 2021

  35. arXiv:2103.15475  [pdf, ps, other

    cs.CL cs.AI

    NLP for Ghanaian Languages

    Authors: Paul Azunre, Salomey Osei, Salomey Addo, Lawrence Asamoah Adu-Gyamfi, Stephen Moore, Bernard Adabankah, Bernard Opoku, Clara Asare-Nyarko, Samuel Nyarko, Cynthia Amoaba, Esther Dansoa Appiah, Felix Akwerh, Richard Nii Lante Lawson, Joel Budu, Emmanuel Debrah, Nana Boateng, Wisdom Ofori, Edwin Buabeng-Munkoh, Franklin Adjei, Isaac Kojo Essel Ampomah, Joseph Otoo, Reindorf Borkor, Standylove Birago Mensah, Lucien Mensah, Mark Amoako Marcel , et al. (2 additional authors not shown)

    Abstract: NLP Ghana is an open-source non-profit organization aiming to advance the development and adoption of state-of-the-art NLP techniques and digital language tools to Ghanaian languages and problems. In this paper, we first present the motivation and necessity for the efforts of the organization; by introducing some popular Ghanaian languages while presenting the state of NLP in Ghana. We then presen… ▽ More

    Submitted 1 April, 2021; v1 submitted 29 March, 2021; originally announced March 2021.

    Comments: 6 pages paper; Accepted at AfricaNLP @EACL 2021

  36. arXiv:2011.12875  [pdf, other

    cs.DC cs.PF

    Rapid Exploration of Optimization Strategies on Advanced Architectures using TestSNAP and LAMMPS

    Authors: Rahulkumar Gayatri, Stan Moore, Evan Weinberg, Nicholas Lubbers, Sarah Anderson, Jack Deslippe, Danny Perez, Aidan P. Thompson

    Abstract: The exascale race is at an end with the announcement of the Aurora and Frontier machines. This next generation of supercomputers utilize diverse hardware architectures to achieve their compute performance, providing an added onus on the performance portability of applications. An expanding fragmentation of programming models would provide a compounding optimization challenge were it not for the ev… ▽ More

    Submitted 25 November, 2020; originally announced November 2020.

    Comments: Submitted to IPDPS 2021, October 19, 2020

  37. arXiv:2010.15584  [pdf, ps, other

    cs.CY

    Future Directions of the Cyberinfrastructure for Sustained Scientific Innovation (CSSI) Program

    Authors: Ritu Arora, Xiaosong Li, Bonnie Hurwitz, Daniel Fay, Dhabaleswar K. Panda, Edward Valeev, Shaowen Wang, Shirley Moore, Sunita Chandrasekaran, Ting Cao, Holly Bik, Matthew Curry, Tanzima Islam

    Abstract: The CSSI 2019 workshop was held on October 28-29, 2019, in Austin, Texas. The main objectives of this workshop were to (1) understand the impact of the CSSI program on the community over the last 9 years, (2) engage workshop participants in identifying gaps and opportunities in the current CSSI landscape, (3) gather ideas on the cyberinfrastructure needs and expectations of the community with resp… ▽ More

    Submitted 15 October, 2020; originally announced October 2020.

    Comments: This report was submitted in April 2020 to the National Science Foundation (NSF)

  38. Iteration in ACL2

    Authors: Matt Kaufmann, J Strother Moore

    Abstract: Iterative algorithms are traditionally expressed in ACL2 using recursion. On the other hand, Common Lisp provides a construct, loop, which -- like most programming languages -- provides direct support for iteration. We describe an ACL2 analogue loop$ of loop that supports efficient ACL2 programming and reasoning with iteration.

    Submitted 29 September, 2020; originally announced September 2020.

    Comments: In Proceedings ACL2 2020, arXiv:2009.12521

    Journal ref: EPTCS 327, 2020, pp. 16-31

  39. Short-Lived Forward-Secure Delegation for TLS

    Authors: Lukas Alber, Stefan More, Sebastian Ramacher

    Abstract: On today's Internet, combining the end-to-end security of TLS with Content Delivery Networks (CDNs) while ensuring the authenticity of connections results in a challenging delegation problem. When CDN servers provide content, they have to authenticate themselves as the origin server to establish a valid end-to-end TLS connection with the client. In standard TLS, the latter requires access to the s… ▽ More

    Submitted 18 November, 2020; v1 submitted 4 September, 2020; originally announced September 2020.

    Comments: This is the full version of a paper which appears in 2020 Cloud Computing Security Workshop (CCSW '20), November 9, 2020, Virtual Event, USA, ACM

  40. arXiv:2006.07187  [pdf, other

    eess.IV cs.AI cs.CV cs.LG stat.ML

    HMIC: Hierarchical Medical Image Classification, A Deep Learning Approach

    Authors: Kamran Kowsari, Rasoul Sali, Lubaina Ehsan, William Adorno, Asad Ali, Sean Moore, Beatrice Amadi, Paul Kelly, Sana Syed, Donald Brown

    Abstract: Image classification is central to the big data revolution in medicine. Improved information processing methods for diagnosis and classification of digital medical images have shown to be successful via deep learning approaches. As this field is explored, there are limitations to the performance of traditional supervised classifiers. This paper outlines an approach that is different from the curre… ▽ More

    Submitted 23 June, 2020; v1 submitted 12 June, 2020; originally announced June 2020.

    Journal ref: Information 11, no. 6 (2020): 318

  41. arXiv:2005.03868  [pdf, other

    eess.IV cs.LG stat.ML

    Hierarchical Deep Convolutional Neural Networks for Multi-category Diagnosis of Gastrointestinal Disorders on Histopathological Images

    Authors: Rasoul Sali, Sodiq Adewole, Lubaina Ehsan, Lee A. Denson, Paul Kelly, Beatrice C. Amadi, Lori Holtz, Syed Asad Ali, Sean R. Moore, Sana Syed, Donald E. Brown

    Abstract: Deep convolutional neural networks(CNNs) have been successful for a wide range of computer vision tasks, including image classification. A specific area of the application lies in digital pathology for pattern recognition in the tissue-based diagnosis of gastrointestinal(GI) diseases. This domain can utilize CNNs to translate histopathological images into precise diagnostics. This is challenging s… ▽ More

    Submitted 6 August, 2020; v1 submitted 8 May, 2020; originally announced May 2020.

    Comments: accepted at IEEE International Conference on Healthcare Informatics (ICHI 2020)

  42. arXiv:2003.10976  [pdf, other

    cs.LG nlin.CD stat.ML

    A Model-Free Sampling Method for Estimating Basins of Attraction Using Hybrid Active Learning (HAL)

    Authors: Xue-She Wang, Samuel A. Moore, James D. Turner, Brian P. Mann

    Abstract: Understanding the basins of attraction (BoA) is often a paramount consideration for nonlinear systems. Most existing approaches to determining a high-resolution BoA require prior knowledge of the system's dynamical model (e.g., differential equation or point mapping for continuous systems, cell mapping for discrete systems, etc.), which allows derivation of approximate analytical solutions or para… ▽ More

    Submitted 10 May, 2022; v1 submitted 24 March, 2020; originally announced March 2020.

    Comments: Update: 1) add time trajectory of additional sampling

  43. arXiv:2001.08383  [pdf, other

    eess.IV cs.CV cs.LG

    A Multi-site Study of a Breast Density Deep Learning Model for Full-field Digital Mammography Images and Synthetic Mammography Images

    Authors: Thomas P. Matthews, Sadanand Singh, Brent Mombourquette, Jason Su, Meet P. Shah, Stefano Pedemonte, Aaron Long, David Maffit, Jenny Gurney, Rodrigo Morales Hoil, Nikita Ghare, Douglas Smith, Stephen M. Moore, Susan C. Marks, Richard L. Wahl

    Abstract: Purpose: To develop a Breast Imaging Reporting and Data System (BI-RADS) breast density deep learning (DL) model in a multi-site setting for synthetic two-dimensional mammography (SM) images derived from digital breast tomosynthesis exams using full-field digital mammography (FFDM) images and limited SM data. Materials and Methods: A DL model was trained to predict BI-RADS breast density using F… ▽ More

    Submitted 2 October, 2020; v1 submitted 23 January, 2020; originally announced January 2020.

    MSC Class: 68T45 ACM Class: I.5.4; J.3; I.2.10; I.4.8

  44. arXiv:1911.00157  [pdf, other

    cs.CR

    Weird Machines as Insecure Compilation

    Authors: Jennifer Paykin, Eric Mertens, Mark Tullsen, Luke Maurer, Benoît Razet, Alexander Bakst, Scott Moore

    Abstract: Weird machines---the computational models accessible by exploiting security vulnerabilities---arise from the difference between the model a programmer has in her head of how her program should run and the implementation that actually executes. Previous attempts to reason about or identify weird machines have viewed these models through the lens of formal computational structures such as state mach… ▽ More

    Submitted 31 October, 2019; originally announced November 2019.

  45. Fine-Grained, Language-Based Access Control for Database-Backed Applications

    Authors: Ezra Zigmond, Stephen Chong, Christos Dimoulas, Scott Moore

    Abstract: Context: Database-backed applications often run queries with more authority than necessary. Since programs can access more data than they legitimately need, flaws in security checks at the application level can enable malicious or buggy code to view or modify data in violation of intended access control policies. Inquiry: Although database management systems provide tools to control access to da… ▽ More

    Submitted 26 September, 2019; originally announced September 2019.

    Journal ref: The Art, Science, and Engineering of Programming, 2020, Vol. 4, Issue 2, Article 3

  46. arXiv:1909.02457  [pdf, other

    cs.PL quant-ph

    QCOR: A Language Extension Specification for the Heterogeneous Quantum-Classical Model of Computation

    Authors: Tiffany M. Mintz, Alexander J. Mccaskey, Eugene F. Dumitrescu, Shirley V. Moore, Sarah Powers, Pavel Lougovski

    Abstract: Quantum computing is an emerging computational paradigm that leverages the laws of quantum mechanics to perform elementary logic operations. Existing programming models for quantum computing were designed with fault-tolerant hardware in mind, envisioning standalone applications. However, near-term quantum computers are susceptible to noise which limits their standalone utility. To better leverage… ▽ More

    Submitted 5 September, 2019; originally announced September 2019.

  47. arXiv:1909.01963  [pdf, other

    eess.IV cs.CV q-bio.QM

    Self-Attentive Adversarial Stain Normalization

    Authors: Aman Shrivastava, Will Adorno, Yash Sharma, Lubaina Ehsan, S. Asad Ali, Sean R. Moore, Beatrice C. Amadi, Paul Kelly, Sana Syed, Donald E. Brown

    Abstract: Hematoxylin and Eosin (H&E) stained Whole Slide Images (WSIs) are utilized for biopsy visualization-based diagnostic and prognostic assessment of diseases. Variation in the H&E staining process across different lab sites can lead to significant variations in biopsy image appearance. These variations introduce an undesirable bias when the slides are examined by pathologists or used for training dee… ▽ More

    Submitted 22 November, 2020; v1 submitted 4 September, 2019; originally announced September 2019.

    Comments: Accepted at AIDP (ICPR 2021)

  48. arXiv:1908.03272  [pdf, other

    q-bio.QM cs.CV eess.IV

    Deep Learning for Visual Recognition of Environmental Enteropathy and Celiac Disease

    Authors: Aman Shrivastava, Karan Kant, Saurav Sengupta, Sung-Jun Kang, Marium Khan, Asad Ali, Sean R. Moore, Beatrice C. Amadi, Paul Kelly, Donald E. Brown, Sana Syed

    Abstract: Physicians use biopsies to distinguish between different but histologically similar enteropathies. The range of syndromes and pathologies that could cause different gastrointestinal conditions makes this a difficult problem. Recently, deep learning has been used successfully in helping diagnose cancerous tissues in histopathological images. These successes motivated the research presented in this… ▽ More

    Submitted 8 August, 2019; originally announced August 2019.

  49. arXiv:1904.05773  [pdf, other

    eess.IV cs.CV cs.LG q-bio.QM stat.ML

    Diagnosis of Celiac Disease and Environmental Enteropathy on Biopsy Images Using Color Balancing on Convolutional Neural Networks

    Authors: Kamran Kowsari, Rasoul Sali, Marium N. Khan, William Adorno, S. Asad Ali, Sean R. Moore, Beatrice C. Amadi, Paul Kelly, Sana Syed, Donald E. Brown

    Abstract: Celiac Disease (CD) and Environmental Enteropathy (EE) are common causes of malnutrition and adversely impact normal childhood development. CD is an autoimmune disorder that is prevalent worldwide and is caused by an increased sensitivity to gluten. Gluten exposure destructs the small intestinal epithelial barrier, resulting in nutrient mal-absorption and childhood under-nutrition. EE also results… ▽ More

    Submitted 9 October, 2019; v1 submitted 10 April, 2019; originally announced April 2019.

  50. arXiv:1811.03208  [pdf, other

    cs.CV

    Deep Semantic Instance Segmentation of Tree-like Structures Using Synthetic Data

    Authors: Kerry Halupka, Rahil Garnavi, Stephen Moore

    Abstract: Tree-like structures, such as blood vessels, often express complexity at very fine scales, requiring high-resolution grids to adequately describe their shape. Such sparse morphology can alternately be represented by locations of centreline points, but learning from this type of data with deep learning is challenging due to it being unordered, and permutation invariant. In this work, we propose a d… ▽ More

    Submitted 7 November, 2018; originally announced November 2018.

    Comments: Accepted to WACV 2019