Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 84 results for author: Mitchell, C

.
  1. arXiv:2409.00672  [pdf, ps, other

    math.CO cs.DM

    Orientable and negative orientable sequences

    Authors: Chris J Mitchell, Peter R Wild

    Abstract: Analogously to de Bruijn sequences, orientable sequences have application in automatic position-location applications and, until recently, studies of these sequences focused on the binary case. In recent work by Alhakim et al., a range of methods of construction were described for orientable sequences over arbitrary finite alphabets; some of these methods involve using negative orientable sequence… ▽ More

    Submitted 1 September, 2024; originally announced September 2024.

    MSC Class: 94A55; 05C38

  2. arXiv:2408.03968  [pdf, other

    physics.acc-ph

    Report on the Advanced Linear Collider Study Group (ALEGRO) Workshop 2024

    Authors: J. Vieira, B. Cros, P. Muggli, I. A. Andriyash, O. Apsimon, M. Backhouse, C. Benedetti, S. S. Bulanov, A. Caldwell, Min Chen, V. Cilento, S. Corde, R. D'Arcy, S. Diederichs, E. Ericson, E. Esarey, J. Farmer, L. Fedeli, A. Formenti, B. Foster, M. Garten, C. G. R. Geddes, T. Grismayer, M. J. Hogan, S. Hooker , et al. (19 additional authors not shown)

    Abstract: The workshop focused on the application of ANAs to particle physics keeping in mind the ultimate goal of a collider at the energy frontier (10\,TeV, e$^+$/e$^-$, e$^-$/e$^-$, or $γγ$). The development of ANAs is conducted at universities and national laboratories worldwide. The community is thematically broad and diverse, in particular since lasers suitable for ANA research (multi-hundred-terawatt… ▽ More

    Submitted 15 August, 2024; v1 submitted 6 August, 2024; originally announced August 2024.

    Comments: 72 pages

  3. arXiv:2407.14866  [pdf, ps, other

    math.CO

    Orientable sequences over non-binary alphabets

    Authors: Abbas Alhakim, Chris J. Mitchell, Janusz Szmidt, Peter R. Wild

    Abstract: We describe new, simple, recursive methods of construction for orientable sequences over an arbitrary finite alphabet, i.e. periodic sequences in which any sub-sequence of n consecutive elements occurs at most once in a period in either direction. In particular we establish how two variants of a generalised Lempel homomorphism can be used to recursively construct such sequences, generalising previ… ▽ More

    Submitted 22 August, 2024; v1 submitted 20 July, 2024; originally announced July 2024.

    Comments: Minor bugs fixed

    MSC Class: 94A55

  4. arXiv:2407.08844  [pdf, other

    math.DS q-bio.QM

    Parameter Estimation and Identifiability in Kinetic Flux Profiling Models of Metabolism

    Authors: Breanna Guppy, Colleen Mitchell, Eric Taylor

    Abstract: Metabolic fluxes are the rates of life-sustaining chemical reactions within a cell and metabolites are the components. Determining the changes in these fluxes is crucial to understanding diseases with metabolic causes and consequences. Kinetic flux profiling (KFP) is a method for estimating flux that utilizes data from isotope tracing experiments. In these experiments, the isotope-labeled nutrient… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    MSC Class: 92

  5. arXiv:2403.03654  [pdf, ps, other

    cs.CR

    Integrity-protecting block cipher modes -- Untangling a tangled web

    Authors: Chris J Mitchell

    Abstract: This paper re-examines the security of three related block cipher modes of operation designed to provide authenticated encryption. These modes, known as PES-PCBC, IOBC and EPBC, were all proposed in the mid-1990s. However, analyses of security of the latter two modes were published more recently. In each case one or more papers describing security issues with the schemes were eventually published,… ▽ More

    Submitted 17 June, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

    Comments: Minor typos fixed

  6. arXiv:2402.17248  [pdf, other

    physics.acc-ph physics.comp-ph

    Synthesizing Particle-in-Cell Simulations Through Learning and GPU Computing for Hybrid Particle Accelerator Beamlines

    Authors: Ryan T. Sandberg, Remi Lehe, Chad E. Mitchell, Marco Garten, Andrew Myers, Ji Qiang, Jean-Luc Vay, Axel Huebl

    Abstract: Particle accelerator modeling is an important field of research and development, essential to investigating, designing and operating some of the most complex scientific devices ever built. Kinetic simulations of relativistic, charged particle beams and advanced plasma accelerator elements are often performed with high-fidelity particle-in-cell simulations, some of which fill the largest GPU superc… ▽ More

    Submitted 30 April, 2024; v1 submitted 27 February, 2024; originally announced February 2024.

    Comments: 11 pages, 10 figures. Accepted to PASC24 proceedings

    Journal ref: Proceedings of the Platform for Advanced Scientific Computing Conference PASC24 (2024)

  7. arXiv:2402.04489  [pdf, other

    cs.LG cs.CR cs.CY stat.ME

    De-amplifying Bias from Differential Privacy in Language Model Fine-tuning

    Authors: Sanjari Srivastava, Piotr Mardziel, Zhikhun Zhang, Archana Ahlawat, Anupam Datta, John C Mitchell

    Abstract: Fairness and privacy are two important values machine learning (ML) practitioners often seek to operationalize in models. Fairness aims to reduce model bias for social/demographic sub-groups. Privacy via differential privacy (DP) mechanisms, on the other hand, limits the impact of any individual's training data on the resulting model. The trade-offs between privacy and fairness goals of trustworth… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

  8. arXiv:2309.05174  [pdf, other

    cs.CR cs.AR

    Serberus: Protecting Cryptographic Code from Spectres at Compile-Time

    Authors: Nicholas Mosier, Hamed Nemati, John C. Mitchell, Caroline Trippel

    Abstract: We present Serberus, the first comprehensive mitigation for hardening constant-time (CT) code against Spectre attacks (involving the PHT, BTB, RSB, STL and/or PSF speculation primitives) on existing hardware. Serberus is based on three insights. First, some hardware control-flow integrity (CFI) protections restrict transient control-flow to the extent that it may be comprehensively considered by s… ▽ More

    Submitted 10 September, 2023; originally announced September 2023.

    Comments: Authors' version; to appear in the Proceedings of the IEEE Symposium on Security and Privacy (S&P) 2024

  9. arXiv:2309.00903  [pdf, other

    cs.CV cs.AI

    An explainable three dimension framework to uncover learning patterns: A unified look in variable sulci recognition

    Authors: Michail Mamalakis, Heloise de Vareilles, Atheer AI-Manea, Samantha C. Mitchell, Ingrid Arartz, Lynn Egeland Morch-Johnsen, Jane Garrison, Jon Simons, Pietro Lio, John Suckling, Graham Murray

    Abstract: The significant features identified in a representative subset of the dataset during the learning process of an artificial intelligence model are referred to as a 'global' explanation. Three-dimensional (3D) global explanations are crucial in neuroimaging where a complex representational space demands more than basic two-dimensional interpretations. Curently, studies in the literature lack accurat… ▽ More

    Submitted 8 July, 2024; v1 submitted 2 September, 2023; originally announced September 2023.

  10. arXiv:2308.16457  [pdf, ps, other

    math.CO

    Stack-sorting simplices: geometry and lattice-point enumeration

    Authors: Eon Lee, Carson Mitchell, Andrés R. Vindas-Meléndez

    Abstract: We study the polytopes that arise from the convex hulls of stack-sorting on particular permutations. We show that they are simplices and proceed to study their geometry and lattice-point enumeration. First, we prove some enumerative results on $Ln1$ permutations, i.e., permutations of length $n$ whose penultimate and last entries are $n$ and $1$, respectively. Additionally, we then focus on a spec… ▽ More

    Submitted 31 August, 2023; originally announced August 2023.

    Comments: 25 pages, 5 figures, 1 table, comments welcomed!

    MSC Class: 52B05; 05A15; 52B20

  11. arXiv:2308.04745  [pdf, other

    physics.acc-ph physics.comp-ph physics.plasm-ph

    Laser-Plasma Ion Beam Booster Based on Hollow-Channel Magnetic Vortex Acceleration

    Authors: Marco Garten, Stepan S. Bulanov, Sahel Hakimi, Lieselotte Obst-Huebl, Chad E. Mitchell, Carl Schroeder, Eric Esarey, Cameron G. R. Geddes, Jean-Luc Vay, Axel Huebl

    Abstract: Laser-driven ion acceleration provides ultra-short, high-charge, low-emittance beams, which are desirable for a wide range of high-impact applications. Yet after decades of research, a significant increase in maximum ion energy is still needed. This work introduces a quality-preserving staging concept for ultra-intense ion bunches that is seamlessly applicable from the non-relativistic plasma sour… ▽ More

    Submitted 5 May, 2024; v1 submitted 9 August, 2023; originally announced August 2023.

    Comments: 4 pages, 4 figures, under peer review

    Journal ref: Physical Review Research 6, 033148 (2024)

  12. arXiv:2305.05798  [pdf, other

    quant-ph physics.optics

    Tight information bounds for spontaneous emission lifetime resolution of quantum sources with varied spectral purity

    Authors: Cheyenne S. Mitchell, Mikael P. Backlund

    Abstract: We generalize the theory of resolving a mixture of two closely spaced spontaneous emission lifetimes to include pure dephasing contributions to decoherence, leading to the resurgence of Rayleigh's Curse at small lifetime separations. Considerable resolution enhancement remains possible when lifetime broadening is more significant than that due to pure dephasing. In the limit that lifetime broadeni… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Comments: 6 pages, 5 figures

  13. arXiv:2303.13567  [pdf

    cs.LG cs.CV eess.IV

    AI Models Close to your Chest: Robust Federated Learning Strategies for Multi-site CT

    Authors: Edward H. Lee, Brendan Kelly, Emre Altinmakas, Hakan Dogan, Maryam Mohammadzadeh, Errol Colak, Steve Fu, Olivia Choudhury, Ujjwal Ratan, Felipe Kitamura, Hernan Chaves, Jimmy Zheng, Mourad Said, Eduardo Reis, Jaekwang Lim, Patricia Yokoo, Courtney Mitchell, Golnaz Houshmand, Marzyeh Ghassemi, Ronan Killeen, Wendy Qiu, Joel Hayden, Farnaz Rafiee, Chad Klochko, Nicholas Bevins , et al. (5 additional authors not shown)

    Abstract: While it is well known that population differences from genetics, sex, race, and environmental factors contribute to disease, AI studies in medicine have largely focused on locoregional patient cohorts with less diverse data sources. Such limitation stems from barriers to large-scale data share and ethical concerns over data privacy. Federated learning (FL) is one potential pathway for AI developm… ▽ More

    Submitted 13 April, 2023; v1 submitted 23 March, 2023; originally announced March 2023.

  14. arXiv:2303.12873  [pdf, other

    physics.acc-ph cs.SE physics.plasm-ph

    From Compact Plasma Particle Sources to Advanced Accelerators with Modeling at Exascale

    Authors: Axel Huebl, Remi Lehe, Edoardo Zoni, Olga Shapoval, Ryan T. Sandberg, Marco Garten, Arianna Formenti, Revathi Jambunathan, Prabhat Kumar, Kevin Gott, Andrew Myers, Weiqun Zhang, Ann Almgren, Chad E. Mitchell, Ji Qiang, David Grote, Alexander Sinn, Severin Diederichs, Maxence Thevenet, Luca Fedeli, Thomas Clark, Neil Zaim, Henri Vincenti, Jean-Luc Vay

    Abstract: Developing complex, reliable advanced accelerators requires a coordinated, extensible, and comprehensive approach in modeling, from source to the end of beam lifetime. We present highlights in Exascale Computing to scale accelerator modeling software to the requirements set for contemporary science drivers. In particular, we present the first laser-plasma modeling on an exaflop supercomputer using… ▽ More

    Submitted 18 April, 2023; v1 submitted 22 March, 2023; originally announced March 2023.

    Comments: 4 pages, 3 figures, presented at the 20th Advanced Accelerator Concepts Workshop (AAC22)

  15. arXiv:2212.05037  [pdf, other

    cs.NE cs.LG stat.ML

    A Topological Deep Learning Framework for Neural Spike Decoding

    Authors: Edward C. Mitchell, Brittany Story, David Boothe, Piotr J. Franaszczuk, Vasileios Maroulas

    Abstract: The brain's spatial orientation system uses different neuron ensembles to aid in environment-based navigation. Two of the ways brains encode spatial information is through head direction cells and grid cells. Brains use head direction cells to determine orientation whereas grid cells consist of layers of decked neurons that overlay to provide environment-based navigation. These neurons fire in ens… ▽ More

    Submitted 6 September, 2023; v1 submitted 1 December, 2022; originally announced December 2022.

  16. arXiv:2211.03282  [pdf, other

    eess.SP cs.AI cs.LG

    Performance and utility trade-off in interpretable sleep staging

    Authors: Irfan Al-Hussaini, Cassie S. Mitchell

    Abstract: Recent advances in deep learning have led to the development of models approaching the human level of accuracy. However, healthcare remains an area lacking in widespread adoption. The safety-critical nature of healthcare results in a natural reticence to put these black-box deep learning models into practice. This paper explores interpretable methods for a clinical decision support system called s… ▽ More

    Submitted 5 February, 2023; v1 submitted 6 November, 2022; originally announced November 2022.

    Comments: Spotlight paper at NeurIPS 2022 Workshop on Learning from Time Series for Health

    ACM Class: I.2.1; I.2.4; I.5.4; J.3

  17. arXiv:2211.00201  [pdf, other

    cs.CL cs.AI cs.HC cs.IR cs.LG

    CCS Explorer: Relevance Prediction, Extractive Summarization, and Named Entity Recognition from Clinical Cohort Studies

    Authors: Irfan Al-Hussaini, Davi Nakajima An, Albert J. Lee, Sarah Bi, Cassie S. Mitchell

    Abstract: Clinical Cohort Studies (CCS), such as randomized clinical trials, are a great source of documented clinical research. Ideally, a clinical expert inspects these articles for exploratory analysis ranging from drug discovery for evaluating the efficacy of existing drugs in tackling emerging diseases to the first test of newly developed drugs. However, more than 100 articles are published daily on a… ▽ More

    Submitted 15 November, 2022; v1 submitted 31 October, 2022; originally announced November 2022.

    Comments: Accepted at IEEE BigData 2022

    ACM Class: I.2.1; I.2.7; I.5.5; I.5.4; J.3

  18. arXiv:2210.01163  [pdf, other

    cs.MA

    Agent swarms: cooperation and coordination under stringent communications constraint

    Authors: Paul Kinsler, Sean Holman, Andrew Elliott, Cathryn N. Mitchell, R. Eddie Wilson

    Abstract: Here we consider the communications tactics appropriate for a group of agents that need to "swarm" together in a highly adversarial environment. Specfically, whilst they need to cooperate by exchanging information with each other about their location and their plans; at the same time they also need to keep such communications to an absolute minimum. This might be due to a need for stealth, or othe… ▽ More

    Submitted 6 April, 2023; v1 submitted 3 October, 2022; originally announced October 2022.

    Comments: 13 pages, 11 figures

  19. arXiv:2209.11174  [pdf, other

    eess.SP cs.AI cs.LG

    SERF: Interpretable Sleep Staging using Embeddings, Rules, and Features

    Authors: Irfan Al-Hussaini, Cassie S. Mitchell

    Abstract: The accuracy of recent deep learning based clinical decision support systems is promising. However, lack of model interpretability remains an obstacle to widespread adoption of artificial intelligence in healthcare. Using sleep as a case study, we propose a generalizable method to combine clinical interpretability with high accuracy derived from black-box deep learning. Clinician-determined sleep… ▽ More

    Submitted 25 September, 2022; v1 submitted 21 September, 2022; originally announced September 2022.

    Comments: Accepted by CIKM 2022

    ACM Class: I.2.1; I.2.4; I.5.4; J.3

  20. arXiv:2208.02382  [pdf, ps, other

    physics.acc-ph cs.DC

    Next Generation Computational Tools for the Modeling and Design of Particle Accelerators at Exascale

    Authors: Axel Huebl, Remi Lehe, Chad E. Mitchell, Ji Qiang, Robert D. Ryne, Ryan T. Sandberg, Jean-Luc Vay

    Abstract: Particle accelerators are among the largest, most complex devices. To meet the challenges of increasing energy, intensity, accuracy, compactness, complexity and efficiency, increasingly sophisticated computational tools are required for their design and optimization. It is key that contemporary software take advantage of the latest advances in computer hardware and scientific software engineering… ▽ More

    Submitted 9 August, 2022; v1 submitted 3 August, 2022; originally announced August 2022.

    Comments: 4 pages, 8 figures; NAPAC22, Invited Oral, TUYE2

    MSC Class: 78-10 ACM Class: I.6.0; D.2.12; D.2.13

    Journal ref: NAPAC22, 2022

  21. arXiv:2204.09516  [pdf

    eess.IV physics.optics

    Extracting particle size distribution from laser speckle with a physics-enhanced autocorrelation-based estimator (PEACE)

    Authors: Qihang Zhang, Janaka C. Gamekkanda, Ajinkya Pandit, Wenlong Tang, Charles Papageorgiou, Chris Mitchell, Yihui Yang, Michael Schwaerzler, Tolutola Oyetunde, Richard D. Braatz, Allan S. Myerson, George Barbastathis

    Abstract: Extracting quantitative information about highly scattering surfaces from an imaging system is challenging because the phase of the scattered light undergoes multiple folds upon propagation, resulting in complex speckle patterns. One specific application is the drying of wet powders in the pharmaceutical industry, where quantifying the particle size distribution (PSD) is of particular interest. A… ▽ More

    Submitted 2 March, 2023; v1 submitted 20 April, 2022; originally announced April 2022.

    Journal ref: Nature Communications 14, Article number: 1159 (2023)

  22. arXiv:2204.04275  [pdf, other

    physics.acc-ph astro-ph.GA physics.comp-ph physics.data-an physics.plasm-ph

    Using Kernel-Based Statistical Distance to Study the Dynamics of Charged Particle Beams in Particle-Based Simulation Codes

    Authors: Chad E. Mitchell, Robert D. Ryne, Kilean Hwang

    Abstract: Measures of discrepancy between probability distributions (statistical distance) are widely used in the fields of artificial intelligence and machine learning. We describe how certain measures of statistical distance can be implemented as numerical diagnostics for simulations involving charged-particle beams. Related measures of statistical dependence are also described. The resulting diagnostics… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

  23. arXiv:2203.09050  [pdf, other

    cs.CY

    Insights for post-pandemic pedagogy across one CS department

    Authors: Maxwell Bigman, Yosefa Gilon, Jenny Han, John C Mitchell

    Abstract: Adaptive remote instruction has led to important lessons for the future, including rediscovery of known pedagogical principles in new contexts and new insights for supporting remote learning. Studying one computer science department that serves residential and remote undergraduate and graduate students, we conducted interviews with stakeholders in the department (n=26) and ran a department-wide st… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

  24. arXiv:2202.04205  [pdf, other

    quant-ph physics.optics

    Quantum limits to resolution and discrimination of spontaneous emission lifetimes

    Authors: Cheyenne S. Mitchell, Mikael P. Backlund

    Abstract: In this work we investigate the quantum information theoretical limits to several tasks related to lifetime estimation and discrimination of a two-level spontaneous optical emitter. We focus in particular on the model problem of resolving two mutually incoherent exponential decays with highly overlapping temporal probability profiles. Mirroring recent work on quantum-inspired super-resolution of p… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

    Comments: 13 pages, 13 figures

  25. Ability-Based Methods for Personalized Keyboard Generation

    Authors: Claire L. Mitchell, Gabriel J. Cler, Susan K. Fager, Paola Contessa, Serge H. Roy, Gianluca De Luca, Joshua C. Kline, Jennifer M. Vojtech

    Abstract: This study introduces an ability-based method for personalized keyboard generation, wherein an individual's own movement and human-computer interaction data are used to automatically compute a personalized virtual keyboard layout. Our approach integrates a multidirectional point-select task to characterize cursor control over time, distance, and direction. The characterization is automatically emp… ▽ More

    Submitted 3 August, 2022; v1 submitted 12 January, 2022; originally announced January 2022.

    Comments: 20 pages, 7 figures

    Journal ref: Multimodal Technol. Interact. 2022, 6, 67

  26. arXiv:2111.12372  [pdf, other

    cs.CR

    Privacy-Preserving Biometric Matching Using Homomorphic Encryption

    Authors: Gaëtan Pradel, Chris Mitchell

    Abstract: Biometric matching involves storing and processing sensitive user information. Maintaining the privacy of this data is thus a major challenge, and homomorphic encryption offers a possible solution. We propose a privacy-preserving biometrics-based authentication protocol based on fully homomorphic encryption, where the biometric sample for a user is gathered by a local device but matched against a… ▽ More

    Submitted 24 November, 2021; originally announced November 2021.

  27. Simulations of Future Particle Accelerators: Issues and Mitigations

    Authors: D. Sagan, M. Berz, N. M. Cook, Y. Hao, G. Hoffstaetter, A. Huebl, C. -K. Huang, M. H. Langston, C. E. Mayes, C. E. Mitchell, C. -K. Ng, J. Qiang, R. D. Ryne, A. Scheinker, E. Stern, J. -L. Vay, D. Winklehner, H. Zhang

    Abstract: The ever increasing demands placed upon machine performance have resulted in the need for more comprehensive particle accelerator modeling. Computer simulations are key to the success of particle accelerators. Many aspects of particle accelerators rely on computer modeling at some point, sometimes requiring complex simulation tools and massively parallel supercomputing. Examples include the modeli… ▽ More

    Submitted 24 August, 2021; originally announced August 2021.

    Comments: 21 pages, 1 figure. To be published in JINST

  28. arXiv:2108.03069  [pdf, ps, other

    math.CO

    Constructing orientable sequences

    Authors: Chris J Mitchell, Peter R Wild

    Abstract: This paper describes new, simple, recursive methods of construction for orientable sequences, i.e. periodic binary sequences in which any n-tuple occurs at most once in a period in either direction. As has been previously described, such sequences have potential applications in automatic position-location systems, where the sequence is encoded onto a surface and a reader needs only examine n conse… ▽ More

    Submitted 7 January, 2022; v1 submitted 6 August, 2021; originally announced August 2021.

  29. arXiv:2107.04140  [pdf, other

    cs.AR

    First-Generation Inference Accelerator Deployment at Facebook

    Authors: Michael Anderson, Benny Chen, Stephen Chen, Summer Deng, Jordan Fix, Michael Gschwind, Aravind Kalaiah, Changkyu Kim, Jaewon Lee, Jason Liang, Haixin Liu, Yinghai Lu, Jack Montgomery, Arun Moorthy, Satish Nadathur, Sam Naghshineh, Avinash Nayak, Jongsoo Park, Chris Petersen, Martin Schatz, Narayanan Sundaram, Bangsheng Tang, Peter Tang, Amy Yang, Jiecao Yu , et al. (90 additional authors not shown)

    Abstract: In this paper, we provide a deep dive into the deployment of inference accelerators at Facebook. Many of our ML workloads have unique characteristics, such as sparse memory accesses, large model sizes, as well as high compute, memory and network bandwidth requirements. We co-designed a high-performance, energy-efficient inference accelerator platform based on these requirements. We describe the in… ▽ More

    Submitted 4 August, 2021; v1 submitted 8 July, 2021; originally announced July 2021.

  30. arXiv:2106.02625  [pdf, other

    physics.acc-ph math-ph nlin.SI

    Extracting Dynamical Frequencies from Invariants of Motion in Finite-Dimensional Nonlinear Integrable Systems

    Authors: Chad E. Mitchell, Robert D. Ryne, Kilean Hwang, Sergei Nagaitsev, Timofey Zolkin

    Abstract: Integrable dynamical systems play an important role in many areas of science, including accelerator and plasma physics. An integrable dynamical system with $n$ degrees of freedom (DOF) possesses $n$ nontrivial integrals of motion, and can be solved, in principle, by covering the phase space with one or more charts in which the dynamics can be described using action-angle coordinates. To obtain the… ▽ More

    Submitted 10 June, 2021; v1 submitted 4 June, 2021; originally announced June 2021.

    Comments: Accepted, to appear in Phys. Rev. E

    Report number: Report-no: FERMILAB-PUB-21-085-AD-SCD

    Journal ref: Phys. Rev. E 103, 062216 (2021)

  31. Design of double- and multi-bend achromat lattices with large dynamic aperture and approximate invariants

    Authors: Yongjun Li, Kilean Hwang, Chad Mitchell, Robert Rainer, Robert Ryne, Victor Smaluk

    Abstract: A numerical method to design nonlinear double- and multi-bend achromat (DBA and MBA) lattices with approximate invariants of motion is investigated. The search for such nonlinear lattices is motivated by Fermilab's Integrable Optics Test Accelerator (IOTA), whose design is based on an integrable Hamiltonian system with two invariants of motion. While it may not be possible to design an achromatic… ▽ More

    Submitted 23 November, 2021; v1 submitted 10 March, 2021; originally announced March 2021.

    Comments: 10 pages, 20 figures, accepted by "Physical Review Accelerators and Beams"

  32. arXiv:2101.09153  [pdf

    q-bio.OT physics.ins-det

    QUAREP-LiMi: A community-driven initiative to establish guidelines for quality assessment and reproducibility for instruments and images in light microscopy

    Authors: Glyn Nelson, Ulrike Boehm, Steve Bagley, Peter Bajcsy, Johanna Bischof, Claire M Brown, Aurelien Dauphin, Ian M Dobbie, John E Eriksson, Orestis Faklaris, Julia Fernandez-Rodriguez, Alexia Ferrand, Laurent Gelman, Ali Gheisari, Hella Hartmann, Christian Kukat, Alex Laude, Miso Mitkovski, Sebastian Munck, Alison J North, Tobias M Rasse, Ute Resch-Genger, Lucas C Schuetz, Arne Seitz, Caterina Strambio-De-Castillia , et al. (75 additional authors not shown)

    Abstract: In April 2020, the QUality Assessment and REProducibility for Instruments and Images in Light Microscopy (QUAREP-LiMi) initiative was formed. This initiative comprises imaging scientists from academia and industry who share a common interest in achieving a better understanding of the performance and limitations of microscopes and improved quality control (QC) in light microscopy. The ultimate goal… ▽ More

    Submitted 27 January, 2021; v1 submitted 21 January, 2021; originally announced January 2021.

    Comments: 17 pages, 3 figures, shortened abstract, Co-Lead Authors: Glyn Nelson and Ulrike Boehm, Corresponding author: Roland Nitschke

    Journal ref: J. Microsc. 2021;1-18

  33. arXiv:2101.08132  [pdf, ps, other

    cs.CR

    The (in)security of some recently proposed lightweight key distribution schemes

    Authors: Chris J Mitchell

    Abstract: Two recently published papers propose some very simple key distribution schemes designed to enable two or more parties to establish a shared secret key with the aid of a third party. Unfortunately, as we show, most of the schemes are inherently insecure and all are incompletely specified - moreover, claims that the schemes are inherently lightweight are shown to be highly misleading. We also brief… ▽ More

    Submitted 13 March, 2021; v1 submitted 20 January, 2021; originally announced January 2021.

    Comments: This version adds a brief critique of a related paper on secure multiparty computation

  34. Denoising Multi-Source Weak Supervision for Neural Text Classification

    Authors: Wendi Ren, Yinghao Li, Hanting Su, David Kartchner, Cassie Mitchell, Chao Zhang

    Abstract: We study the problem of learning neural text classifiers without using any labeled data, but only easy-to-provide rules as multiple weak supervision sources. This problem is challenging because rule-induced weak labels are often noisy and incomplete. To address these two challenges, we design a label denoiser, which estimates the source reliability using a conditional soft attention mechanism and… ▽ More

    Submitted 9 October, 2020; originally announced October 2020.

    Comments: 16 pages, 7 figures

  35. arXiv:2009.09278  [pdf, ps, other

    cs.CR

    Two closely related insecure noninteractive group key establishment schemes

    Authors: Chris J Mitchell

    Abstract: Serious weaknesses in two very closely related group authentication and group key establishment schemes are described. Simple attacks against the group key establishment part of the schemes are described, which strongly suggest that the schemes should not be used.

    Submitted 7 March, 2021; v1 submitted 19 September, 2020; originally announced September 2020.

    Comments: Paper updated to describe an attack on a closely related scheme

  36. arXiv:2007.09844  [pdf

    stat.ME

    Bayesian EWMA and CUSUM Control Charts Under Different Loss Functions

    Authors: Chelsea Mitchell, Abdel-Salam Abdel-Salam, D'Arcy Mays

    Abstract: The Exponentially Weighted Moving Average (EWMA) and Cumulative Sum (CUSUM) control charts have been used in profile monitoring to track drift shifts that occur in a monitored process. We construct Bayesian EWMA and Bayesian CUSUM charts informed by posterior and posterior predictive distributions using different loss functions, prior distributions, and likelihood distributions. A simulation study… ▽ More

    Submitted 19 July, 2020; originally announced July 2020.

    Comments: 19 pages, 5 tables, 35 equations, presented at Joint Statistical Meeting (08/2020)

  37. arXiv:2007.08644  [pdf, other

    cs.CR

    Model Checking Bitcoin and other Proof-of-Work Consensus Protocols

    Authors: Max DiGiacomo-Castillo, Yiyun Liang, Advay Pal, John C. Mitchell

    Abstract: The Bitcoin Backbone Protocol [GKL15] is an abstraction of the bitcoin proof-of-work consensus protocol. We use a model-checking tool (UPPAALSMC) to examine the concrete security of proof-ofwork consensus by varying protocol parameters and using an adversary that leverages the selfish mining strategy introduced in [GKL15]. We provide insights into modeling proof-of-work protocols and demonstrate t… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

  38. arXiv:2005.05376  [pdf, ps, other

    cs.CR

    Provably insecure group authentication: Not all security proofs are what they claim to be

    Authors: Chris J Mitchell

    Abstract: A paper presented at the ICICS 2019 conference describes what is claimed to be a `provably secure group authentication [protocol] in the asynchronous communication model'. We show here that this is far from being the case, as the protocol is subject to serious attacks. To try to explain this troubling case, an earlier (2013) scheme on which the ICICS 2019 protocol is based was also examined and fo… ▽ More

    Submitted 9 June, 2021; v1 submitted 11 May, 2020; originally announced May 2020.

    Comments: The previous versions of the paper contained an incorrect description of the ICICS 2019 scheme. This has been corrected. The attack has also been changed so that it applies to the correct version of the scheme. The main conclusions are unchanged

  39. arXiv:2005.04434  [pdf, ps, other

    cs.CR

    How not to secure wireless sensor networks revisited: Even if you say it twice it's still not secure

    Authors: Chris J Mitchell

    Abstract: Two recent papers describe almost exactly the same group key establishment protocol for wireless sensor networks. Quite part from the duplication issue, we show that both protocols are insecure and should not be used - a member of a group can successfully impersonate the key generation centre and persuade any other group member to accept the wrong key value. This breaks the stated objectives of th… ▽ More

    Submitted 20 November, 2020; v1 submitted 9 May, 2020; originally announced May 2020.

    Comments: Minor typos fixed

  40. arXiv:2005.00862  [pdf, ps, other

    cs.CR

    Who Needs Trust for 5G?

    Authors: Chris J Mitchell

    Abstract: There has been much recent discussion of the criticality of the 5G infrastructure, and whether certain vendors should be able to supply 5G equipment. The key issue appears to be about trust, namely to what degree the security and reliability properties of 5G equipment and systems need to be trusted, and by whom, and how the necessary level of trust might be obtained. In this paper, by considering… ▽ More

    Submitted 2 May, 2020; originally announced May 2020.

  41. arXiv:2004.05597  [pdf, ps, other

    cs.CR

    How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes

    Authors: Chris J Mitchell

    Abstract: Three closely-related polynomial-based group key pre-distribution schemes have recently been proposed, aimed specifically at wireless sensor networks. The schemes enable any subset of a predefined set of sensor nodes to establish a shared secret key without any communications overhead. It is claimed that these schemes are both secure and lightweight, i.e. making them particularly appropriate for n… ▽ More

    Submitted 5 October, 2020; v1 submitted 12 April, 2020; originally announced April 2020.

    Comments: This version adds a brief analysis of a recently published group authentication scheme very closely related to one of the three analysed key pre-distribution schemes

  42. arXiv:2004.05106  [pdf, other

    cs.PL

    Resources: A Safe Language Abstraction for Money

    Authors: Sam Blackshear, David L. Dill, Shaz Qadeer, Clark W. Barrett, John C. Mitchell, Oded Padon, Yoni Zohar

    Abstract: Smart contracts are programs that implement potentially sophisticated transactions on modern blockchain platforms. In the rapidly evolving blockchain environment, smart contract programming languages must allow users to write expressive programs that manage and transfer assets, yet provide strong protection against sophisticated attacks. Addressing this need, we present flexible and reliable abstr… ▽ More

    Submitted 23 July, 2020; v1 submitted 10 April, 2020; originally announced April 2020.

  43. arXiv:2003.14356  [pdf, ps, other

    cs.CR

    Yet another insecure group key distribution scheme using secret sharing

    Authors: Chris J Mitchell

    Abstract: A recently proposed group key distribution scheme known as UMKESS, based on secret sharing, is shown to be insecure. Not only is it insecure, but it does not always work, and the rationale for its design is unsound. UMKESS is the latest in a long line of flawed group key distribution schemes based on secret sharing techniques.

    Submitted 18 November, 2020; v1 submitted 31 March, 2020; originally announced March 2020.

    Comments: Minor modifications to provide extra background

    ACM Class: E.3

  44. arXiv:1911.07583  [pdf, other

    cs.CR

    The impact of quantum computing on real-world security: A 5G case study

    Authors: Chris J Mitchell

    Abstract: This paper provides a detailed analysis of the impact of quantum computing on the security of 5G mobile telecommunications. This involves considering how cryptography is used in 5G, and how the security of the system would be affected by the advent of quantum computing. This leads naturally to the specification of a series of simple, phased, recommended changes intended to ensure that the security… ▽ More

    Submitted 13 December, 2019; v1 submitted 18 November, 2019; originally announced November 2019.

    Comments: The latest version corrects a couple of minor errors and adds a further reference

  45. arXiv:1908.00036  [pdf, other

    physics.acc-ph

    Complex Representation of Potentials and Fields for the Nonlinear Magnetic Insert of the Integrable Optics Test Accelerator

    Authors: Chad Mitchell

    Abstract: An alternative representation for the vector potential of the nonlinear magnetic insert for the Integrable Optics Test Accelerator (IOTA), first described in Sec. V.A. of the paper of Danilov and Nagaitsev, is determined from first principles using standard complex variable methods. In particular, it is shown that the coupled system consisting of the 2D Laplace equation and the Bertrand-Darboux eq… ▽ More

    Submitted 31 July, 2019; originally announced August 2019.

    Comments: 12 pages, 1 figure

    Report number: LBNL Report Number: LBNL-1007217

  46. arXiv:1906.09330  [pdf, ps, other

    cs.CR

    The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure

    Authors: Chris J Mitchell

    Abstract: A recently proposed authenticated key agreement protocol is shown to be insecure. In particular, one of the two parties is not authenticated, allowing an active man in the middle opponent to replay old messages. The protocol is essentially an authenticated Diffie-Hellman key agreement scheme, and the lack of authentication allows an attacker to replay old messages and have them accepted. Moreover,… ▽ More

    Submitted 21 June, 2019; originally announced June 2019.

  47. RF design of APEX2 two-cell continuous-wave normal conducting photoelectron gun cavity based on multi-objective genetic algorithm

    Authors: T. Luo, H. Feng, D. Filippetto, M. Johnson, A. Lambert, D. Li, C. Mitchell, F. Sannibale, J. Staples, S. Virostek, R. Wells

    Abstract: High brightness, high repetition rate electron beams are key components for optimizing the performance of next generation scientific instruments, such as MHz-class X-ray Free Electron Laser (XFEL) and Ultra-fast Electron Diffraction/Microscopy (UED/UEM). In the Advanced Photo-injector EXperiment (APEX) at Berkeley Lab, a photoelectron gun based on a 185.7 MHz normal conducting re-entrant RF cavity… ▽ More

    Submitted 28 May, 2019; v1 submitted 25 May, 2019; originally announced May 2019.

  48. Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking

    Authors: Nasser Mohammed Al-Fannah, Wanpeng Li, Chris J Mitchell

    Abstract: Browser fingerprinting is a relatively new method of uniquely identifying browsers that can be used to track web users. In some ways it is more privacy-threatening than tracking via cookies, as users have no direct control over it. A number of authors have considered the wide variety of techniques that can be used to fingerprint browsers; however, relatively little information is available on how… ▽ More

    Submitted 23 May, 2019; originally announced May 2019.

  49. arXiv:1901.08960  [pdf, other

    cs.CR

    OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

    Authors: Wanpeng Li, Chris J Mitchell, Thomas Chen

    Abstract: Millions of users routinely use Google to log in to websites supporting OAuth 2.0 or OpenID Connect; the security of OAuth 2.0 and OpenID Connect is therefore of critical importance. As revealed in previous studies, in practice RPs often implement OAuth 2.0 incorrectly, and so many real-world OAuth 2.0 and OpenID Connect systems are vulnerable to attack. However, users of such flawed systems are t… ▽ More

    Submitted 24 January, 2019; originally announced January 2019.

    Comments: 20 pages, 6 figures. arXiv admin note: substantial text overlap with arXiv:1801.07983

  50. arXiv:1803.05365  [pdf, ps, other

    cs.CR

    The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure

    Authors: Chris J Mitchell

    Abstract: A significant security vulnerability in a recently published group key establishment protocol is described. This vulnerability allows a malicious insider to fraudulently establish a group key with an innocent victim, with the key chosen by the attacker. This shortcoming is sufficiently serious that the protocol should not be used.

    Submitted 16 March, 2018; v1 submitted 14 March, 2018; originally announced March 2018.