-
Grain boundaries control lithiation of solid solution substrates in lithium metal batteries
Authors:
Leonardo Shoji Aota,
Chanwon Jung,
Siyuan Zhang,
Ömer K. Büyükuslu,
Poonam Yadav,
Mahander Pratap Singh,
Xinren Chen,
Eric Woods,
Christina Scheu,
Se-Ho Kim,
Dierk Raabe,
Baptiste Gault
Abstract:
The development of sustainable transportation and communication systems requires an increase in both energy density and capacity retention of Li-batteries. Using substrates forming a solid solution with body centered cubic Li enhances the cycle stability of anode-less batteries. However, it remains unclear how the substrate microstructure affects the lithiation behavior. Here, we deploy a correlat…
▽ More
The development of sustainable transportation and communication systems requires an increase in both energy density and capacity retention of Li-batteries. Using substrates forming a solid solution with body centered cubic Li enhances the cycle stability of anode-less batteries. However, it remains unclear how the substrate microstructure affects the lithiation behavior. Here, we deploy a correlative, near-atomic scale probing approach through combined ion- and electron-microscopy to examine the distribution of Li in Li-Ag diffusion couples as model system. We reveal that Li regions with over 93.8% at.% nucleate within Ag at random high angle grain boundaries, whereas grain interiors are not lithiated. We evidence the role of kinetics and mechanical constraint from the microstructure over equilibrium thermodynamics in dictating the lithiation process. The findings suggest that grain size and grain boundary character are critical to enhance the electrochemical performance of interlayers/electrodes, particularly for improving lithiation kinetics and hence reducing dendrite formation.
△ Less
Submitted 12 July, 2024;
originally announced July 2024.
-
Computational complexity and quantum interpretations
Authors:
Vivek Kumar,
M. P. Singh,
R. Srikanth
Abstract:
In computational complexity theory, it remains to be understood whether $\textbf{BQP}$ is the same as $\textbf{BPP}$. Prima facie, one would expect that this mathematical question is quite unrelated to the foundational question of whether the quantum state is an element of reality or of the observer's knowledge. By contrast, here we argue that the complexity of computation in a physical theory may…
▽ More
In computational complexity theory, it remains to be understood whether $\textbf{BQP}$ is the same as $\textbf{BPP}$. Prima facie, one would expect that this mathematical question is quite unrelated to the foundational question of whether the quantum state is an element of reality or of the observer's knowledge. By contrast, here we argue that the complexity of computation in a physical theory may constrain its physical interpretation. Specifically in the quantum case, we argue that a subjective interpretation of the quantum mechanics favors the proposition $\textbf{BQP} = \textbf{BPP}$. Therefore, if $\textbf{BPP} \subset \textbf{BQP}$, then a realist interpretation of quantum mechanics would be favored.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Longitudinal Momentum Spectra of pair created in a pulsed field at finite times: Are Oscillations "Real"
Authors:
Deepak Sah,
Manoranjan P. Singh
Abstract:
We discuss the mechanism of production of electron-positron pairs from the vacuum in a time-varying, spatially uniform pulsed electric field. We analytically compute the probability of $(e^+ e^-) $pair production in momentum space using the exact solution of the one-particle time-dependent Dirac equation and compare the result with quantum kinetic theory (QKT). Both approaches allow us to study th…
▽ More
We discuss the mechanism of production of electron-positron pairs from the vacuum in a time-varying, spatially uniform pulsed electric field. We analytically compute the probability of $(e^+ e^-) $pair production in momentum space using the exact solution of the one-particle time-dependent Dirac equation and compare the result with quantum kinetic theory (QKT). Both approaches allow us to study the particle momentum spectrum at any instant in time and can potentially unveil valuable information regarding quantum non-equilibrium physics. We analyze both approaches' momentum spectra of the created particles at any instant. We observe a multi-profile structure in the LMS. This multi-profile structure clearly illustrates the quantum interference effects associated with pair production. It is worth noting that both approaches exhibit quantum interference patterns at finite times, manifested as oscillations observed in the LMS. We highlight that this quantum signature is a universal behavior seen in the momentum spectra at finite times, where the electric field is nearly zero.
△ Less
Submitted 14 June, 2024; v1 submitted 5 May, 2024;
originally announced May 2024.
-
Mapping the path to Cryogenic Atom Probe Tomography Analysis of biomolecules
Authors:
Eric V. Woods,
Tim M. Schwarz,
Mahander P. Singh,
Shuo Zhang,
Se-Ho Kim,
Ayman A. El-Zoka,
Lothar Gremer,
Dieter Willbold,
Ingrid McCarroll,
B. Gault
Abstract:
The understanding of protein structure, folding, and interaction with other proteins remains one of the grand challenges of modern biology. Tremendous progress has been made thanks to X-ray- or electron-based techniques that have provided atomic configurations of proteins, and their solvation shell. These techniques though require a large number of similar molecules to provide an average view, and…
▽ More
The understanding of protein structure, folding, and interaction with other proteins remains one of the grand challenges of modern biology. Tremendous progress has been made thanks to X-ray- or electron-based techniques that have provided atomic configurations of proteins, and their solvation shell. These techniques though require a large number of similar molecules to provide an average view, and lack detailed compositional information that might play a major role in the biochemical activity of these macromolecules. Based on its intrinsic performance and recent impact in materials science, atom probe tomography (APT) has been touted as a potential novel tool to analyse biological materials, including proteins. However, analysis of biomolecules in their native, hydrated state by APT have not yet been routinely achieved, and the technique's true capabilities remain to be demonstrated. Here, we present and discuss systematic analyses of individual amino-acids in frozen aqueous solutions on two different nanoporous metal supports across a wide range of analysis conditions. Using a ratio of the molecular ions of water as a descriptor for the conditions of electrostatic field, we study the fragmentation and behavior of those amino acids. We discuss the importance sample support, specimen preparation route, acquisition conditions and data analysis, to pave the way towards establishing guidelines for cryo-APT analysis of biomolecules.
△ Less
Submitted 19 April, 2024;
originally announced April 2024.
-
Extracting Norms from Contracts Via ChatGPT: Opportunities and Challenges
Authors:
Amanul Haque,
Munindar P. Singh
Abstract:
We investigate the effectiveness of ChatGPT in extracting norms from contracts. Norms provide a natural way to engineer multiagent systems by capturing how to govern the interactions between two or more autonomous parties. We extract norms of commitment, prohibition, authorization, and power, along with associated norm elements (the parties involved, antecedents, and consequents) from contracts. O…
▽ More
We investigate the effectiveness of ChatGPT in extracting norms from contracts. Norms provide a natural way to engineer multiagent systems by capturing how to govern the interactions between two or more autonomous parties. We extract norms of commitment, prohibition, authorization, and power, along with associated norm elements (the parties involved, antecedents, and consequents) from contracts. Our investigation reveals ChatGPT's effectiveness and limitations in norm extraction from contracts. ChatGPT demonstrates promising performance in norm extraction without requiring training or fine-tuning, thus obviating the need for annotated data, which is not generally available in this domain. However, we found some limitations of ChatGPT in extracting these norms that lead to incorrect norm extractions. The limitations include oversight of crucial details, hallucination, incorrect parsing of conjunctions, and empty norm elements. Enhanced norm extraction from contracts can foster the development of more transparent and trustworthy formal agent interaction specifications, thereby contributing to the improvement of multiagent systems.
△ Less
Submitted 2 April, 2024;
originally announced April 2024.
-
Information Security and Privacy in the Digital World: Some Selected Topics
Authors:
Jaydip Sen,
Joceli Mayer,
Subhasis Dasgupta,
Subrata Nandi,
Srinivasan Krishnaswamy,
Pinaki Mitra,
Mahendra Pratap Singh,
Naga Prasanthi Kundeti,
Chandra Sekhara Rao MVP,
Sudha Sree Chekuri,
Seshu Babu Pallapothu,
Preethi Nanjundan,
Jossy P. George,
Abdelhadi El Allahi,
Ilham Morino,
Salma AIT Oussous,
Siham Beloualid,
Ahmed Tamtaoui,
Abderrahim Bajit
Abstract:
In the era of generative artificial intelligence and the Internet of Things, while there is explosive growth in the volume of data and the associated need for processing, analysis, and storage, several new challenges are faced in identifying spurious and fake information and protecting the privacy of sensitive data. This has led to an increasing demand for more robust and resilient schemes for aut…
▽ More
In the era of generative artificial intelligence and the Internet of Things, while there is explosive growth in the volume of data and the associated need for processing, analysis, and storage, several new challenges are faced in identifying spurious and fake information and protecting the privacy of sensitive data. This has led to an increasing demand for more robust and resilient schemes for authentication, integrity protection, encryption, non-repudiation, and privacy-preservation of data. The chapters in this book present some of the state-of-the-art research works in the field of cryptography and security in computing and communications.
△ Less
Submitted 29 March, 2024;
originally announced April 2024.
-
Decision Theory-Guided Deep Reinforcement Learning for Fast Learning
Authors:
Zelin Wan,
Jin-Hee Cho,
Mu Zhu,
Ahmed H. Anwar,
Charles Kamhoua,
Munindar P. Singh
Abstract:
This paper introduces a novel approach, Decision Theory-guided Deep Reinforcement Learning (DT-guided DRL), to address the inherent cold start problem in DRL. By integrating decision theory principles, DT-guided DRL enhances agents' initial performance and robustness in complex environments, enabling more efficient and reliable convergence during learning. Our investigation encompasses two primary…
▽ More
This paper introduces a novel approach, Decision Theory-guided Deep Reinforcement Learning (DT-guided DRL), to address the inherent cold start problem in DRL. By integrating decision theory principles, DT-guided DRL enhances agents' initial performance and robustness in complex environments, enabling more efficient and reliable convergence during learning. Our investigation encompasses two primary problem contexts: the cart pole and maze navigation challenges. Experimental results demonstrate that the integration of decision theory not only facilitates effective initial guidance for DRL agents but also promotes a more structured and informed exploration strategy, particularly in environments characterized by large and intricate state spaces. The results of experiment demonstrate that DT-guided DRL can provide significantly higher rewards compared to regular DRL. Specifically, during the initial phase of training, the DT-guided DRL yields up to an 184% increase in accumulated reward. Moreover, even after reaching convergence, it maintains a superior performance, ending with up to 53% more reward than standard DRL in large maze problems. DT-guided DRL represents an advancement in mitigating a fundamental challenge of DRL by leveraging functions informed by human (designer) knowledge, setting a foundation for further research in this promising interdisciplinary domain.
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
Norm Enforcement with a Soft Touch: Faster Emergence, Happier Agents
Authors:
Sz-Ting Tzeng,
Nirav Ajmeri,
Munindar P. Singh
Abstract:
A multiagent system is a society of autonomous agents whose interactions can be regulated via social norms. In general, the norms of a society are not hardcoded but emerge from the agents' interactions. Specifically, how the agents in a society react to each other's behavior and respond to the reactions of others determines which norms emerge in the society. We think of these reactions by an agent…
▽ More
A multiagent system is a society of autonomous agents whose interactions can be regulated via social norms. In general, the norms of a society are not hardcoded but emerge from the agents' interactions. Specifically, how the agents in a society react to each other's behavior and respond to the reactions of others determines which norms emerge in the society. We think of these reactions by an agent to the satisfactory or unsatisfactory behaviors of another agent as communications from the first agent to the second agent. Understanding these communications is a kind of social intelligence: these communications provide natural drivers for norm emergence by pushing agents toward certain behaviors, which can become established as norms. Whereas it is well-known that sanctioning can lead to the emergence of norms, we posit that a broader kind of social intelligence can prove more effective in promoting cooperation in a multiagent system.
Accordingly, we develop Nest, a framework that models social intelligence via a wider variety of communications and understanding of them than in previous work. To evaluate Nest, we develop a simulated pandemic environment and conduct simulation experiments to compare Nest with baselines considering a combination of three kinds of social communication: sanction, tell, and hint.
We find that societies formed of Nest agents achieve norms faster. Moreover, Nest agents effectively avoid undesirable consequences, which are negative sanctions and deviation from goals, and yield higher satisfaction for themselves than baseline agents despite requiring only an equivalent amount of information.
△ Less
Submitted 5 March, 2024; v1 submitted 29 January, 2024;
originally announced January 2024.
-
Nanoporous gold thin films as substrates to analyze liquids by cryo-atom probe tomography
Authors:
E. V. Woods,
A. Saksena,
A. A. El-Zoka,
L. T. Stephenson,
T. M. Schwarz,
M. P. Singh,
L. S. Aota,
S. -H. Kim,
J. Schneider,
B. Gault
Abstract:
Cryogenic atom probe tomography (cryo-APT) is being developed to enable nanoscale compositional analyses of frozen liquids. Yet, the availability of readily available substrates that allow for the fixation of liquids while providing sufficient strength to their interface, is still an issue. Here we propose the use of 1-2 microns thick binary alloy film of gold-silver (AuAg) sputtered onto flat sil…
▽ More
Cryogenic atom probe tomography (cryo-APT) is being developed to enable nanoscale compositional analyses of frozen liquids. Yet, the availability of readily available substrates that allow for the fixation of liquids while providing sufficient strength to their interface, is still an issue. Here we propose the use of 1-2 microns thick binary alloy film of gold-silver (AuAg) sputtered onto flat silicon, with sufficient adhesion without an additional layer. Through chemical dealloying, we successfully fabricate a nanoporous substrate, with open-pore structure, which is mounted on a microarray of Si posts by lift out in the focused-ion beam, allowing for cryogenic fixation of liquids. We present cryo-APT results obtained after cryogenic sharpening, vacuum cryo-transfer and analysis of pure water on top and inside the nanoporous film. We demonstrate that this new substrate has the requisite characteristics for facilitating cryo-APT of frozen liquids, with a relatively lower volume of precious metals. This complete workflow represents an improved approach for frozen liquid analysis, from preparation of the films to the successful fixation of the liquid in the porous network, to cryo-atom probe tomography.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
Moral Sparks in Social Media Narratives
Authors:
Ruijie Xi,
Munindar P. Singh
Abstract:
There is increasing interest in building computational models of moral reasoning by people to enable effective interaction by Artificial Intelligence (AI) agents. We examine interactions on social media to understand human moral judgments in real-life ethical scenarios. Specifically, we examine posts from a popular Reddit subreddit (i.e., a subcommunity) called r/AmITheAsshole, where authors and c…
▽ More
There is increasing interest in building computational models of moral reasoning by people to enable effective interaction by Artificial Intelligence (AI) agents. We examine interactions on social media to understand human moral judgments in real-life ethical scenarios. Specifically, we examine posts from a popular Reddit subreddit (i.e., a subcommunity) called r/AmITheAsshole, where authors and commenters share their moral judgments on who (i.e., which participant of the described scenario) is blameworthy. To investigate the underlying reasoning influencing moral judgments, we focus on excerpts-which we term moral sparks-from original posts that some commenters include to indicate what motivates their judgments. To this end, we examine how (1) events activating social commonsense and (2) linguistic signals affect the identified moral sparks and their subsequent judgments. By examining over 24672 posts and 175988 comments, we find that event-related negative character traits (e.g., immature and rude) attract attention and stimulate blame, implying a dependent relationship between character traits and moral values. Specifically, we focus on causal graphs involving events (c-events) that activate social commonsense. We observe that c-events are perceived with varying levels of informativeness, influencing moral spark and judgment assignment in distinct ways. This observation is reinforced by examining linguistic features describing semantically similar c-events. Moreover, language influencing commenters' cognitive processes enhances the probability of an excerpt becoming a moral spark, while factual and concrete descriptions tend to inhibit this effect.
△ Less
Submitted 21 April, 2024; v1 submitted 30 October, 2023;
originally announced October 2023.
-
Pair Production in time-dependent Electric field at Finite times
Authors:
Deepak Sah,
Manoranjan P. Singh
Abstract:
We investigate the finite-time behavior of pair production from the vacuum by a time-dependent Sauter pulsed electric field using the spinor quantum electrodynamics (QED). In the adiabatic basis, the one-particle distribution function in momentum space is determined by utilizing the exact analytical solution of the Dirac equation. By examining the temporal behavior of the one-particle distribution…
▽ More
We investigate the finite-time behavior of pair production from the vacuum by a time-dependent Sauter pulsed electric field using the spinor quantum electrodynamics (QED). In the adiabatic basis, the one-particle distribution function in momentum space is determined by utilizing the exact analytical solution of the Dirac equation. By examining the temporal behavior of the one-particle distribution function and the momentum spectrum of created pairs in the sub-critical field limit $(E_0 = 0.2E_c)$, we observe oscillatory patterns in the longitudinal momentum spectrum(LMS) of particles at finite times. These oscillations arise due to quantum interference effects resulting from the dynamical tunneling. Furthermore, we derive an approximate and simplified analytical expression for the distribution function at finite times, which allows us to explain the origin and behavior of these oscillations. Additionally, we discuss the role of the vacuum polarization function and its counter term to the oscillations in LMS vacuum excitation. We also analyse the transverse momentum spectrum (TMS).
△ Less
Submitted 24 May, 2024; v1 submitted 21 September, 2023;
originally announced September 2023.
-
Facilitating the systematic nanoscale study of battery materials by atom probe tomography through in-situ metal coating
Authors:
Mahander P Singh,
Eric V Woods,
Se Ho Kim,
Chanwon Jung,
Leonardo S. Aota,
Baptiste Gault
Abstract:
Through its capability for 3D mapping of Li at the nanoscale, atom probe tomography (APT) is poised to play a key role in understanding the microstructural degradation of lithium-ion batteries (LIB) during successive charge and discharge cycles. However, APT application to materials for LIB is plagued by the field induced delithiation (deintercalation) of Li-ions during the analysis itself that pr…
▽ More
Through its capability for 3D mapping of Li at the nanoscale, atom probe tomography (APT) is poised to play a key role in understanding the microstructural degradation of lithium-ion batteries (LIB) during successive charge and discharge cycles. However, APT application to materials for LIB is plagued by the field induced delithiation (deintercalation) of Li-ions during the analysis itself that prevents the precise assessment of the Li distribution. Here, we showcase how a thin Cr-coating, in-situ formed on APT specimens of NMC811 in the focused-ion beam (FIB), preserves the sample's integrity and circumvent this deleterious delithiation. Cr-coated specimens demonstrated remarkable improvements in data quality and virtually eliminated premature specimen failures, allowing for more precise measurements via. improved statistics. Through improved data analysis, we reveal substantial cation fluctuations in commercial grade NMC811, including complete grains of LiMnO. The current methodology stands out for its simplicity and cost-effectiveness and is a viable approach to prepare battery cathodes and anodes for systematic APT studies.
△ Less
Submitted 14 September, 2023;
originally announced September 2023.
-
In-situ metallic coating of atom probe specimen for enhanced yield, performance, and increased field-of-view
Authors:
Tim M. Schwarz,
Eric Woods,
Mahander P. Singh,
Chanwon Jung,
Leonardo S. Aota,
Kyuseon Jang,
Mathias Krämer,
Se-Ho Kim,
Ingrid McCarroll,
Baptiste Gault
Abstract:
Atom probe tomography requires needle-shaped specimens with a diameter typically below 100 nm, making them both very fragile and reactive, and defects (notches at grain boundaries or precipitates) are known to affect the yield and data quality. The use of a conformal coating directly on the sharpened specimen has been proposed to increase yield and reduce background. However, to date, these coatin…
▽ More
Atom probe tomography requires needle-shaped specimens with a diameter typically below 100 nm, making them both very fragile and reactive, and defects (notches at grain boundaries or precipitates) are known to affect the yield and data quality. The use of a conformal coating directly on the sharpened specimen has been proposed to increase yield and reduce background. However, to date, these coatings have been applied ex-situ and mostly are not uniformly. Here, we report on the controlled focused ion beam in-situ deposition of a thin metal film on specimens immediately after specimen preparation. Different metallic targets e.g. Cr were attached to a micromanipulator via a conventional lift-out method and sputtered using the Ga or Xe ions. We showcase the many advantages of coating specimens from metallic to non-metallic materials. We have identified an increase in data quality and yield, an improvement of the mass resolution, as well as an increase in the effective field-of-view enabling visualization of the entire original specimen, including the complete surface oxide layer. The ease of implementation of the approach makes it very attractive for generalizing its use across a very wide range of atom probe analyses.
△ Less
Submitted 17 January, 2024; v1 submitted 14 September, 2023;
originally announced September 2023.
-
CoSiNES: Contrastive Siamese Network for Entity Standardization
Authors:
Jiaqing Yuan,
Michele Merler,
Mihir Choudhury,
Raju Pavuluri,
Munindar P. Singh,
Maja Vukovic
Abstract:
Entity standardization maps noisy mentions from free-form text to standard entities in a knowledge base. The unique challenge of this task relative to other entity-related tasks is the lack of surrounding context and numerous variations in the surface form of the mentions, especially when it comes to generalization across domains where labeled data is scarce. Previous research mostly focuses on de…
▽ More
Entity standardization maps noisy mentions from free-form text to standard entities in a knowledge base. The unique challenge of this task relative to other entity-related tasks is the lack of surrounding context and numerous variations in the surface form of the mentions, especially when it comes to generalization across domains where labeled data is scarce. Previous research mostly focuses on developing models either heavily relying on context, or dedicated solely to a specific domain. In contrast, we propose CoSiNES, a generic and adaptable framework with Contrastive Siamese Network for Entity Standardization that effectively adapts a pretrained language model to capture the syntax and semantics of the entities in a new domain.
We construct a new dataset in the technology domain, which contains 640 technical stack entities and 6,412 mentions collected from industrial content management systems. We demonstrate that CoSiNES yields higher accuracy and faster runtime than baselines derived from leading methods in this domain. CoSiNES also achieves competitive performance in four standard datasets from the chemistry, medicine, and biomedical domains, demonstrating its cross-domain applicability.
△ Less
Submitted 5 June, 2023;
originally announced June 2023.
-
A versatile and reproducible cryo-sample preparation methodology for atom probe studies
Authors:
Eric V. Woods,
Mahander P. Singh,
Se-Ho Kim,
Tim M. Schwarz,
James O. Douglas,
Ayman El-Zoka,
Finn Giulani,
Baptiste Gault
Abstract:
Repeatable and reliable site-specific preparation of specimens for atom probe tomography (APT) at cryogenic temperatures has proven challenging. A generalized workflow is required for cryogenic-specimen preparation including lift-out via focused-ion beam and in-situ deposition of capping layers, to strengthen specimens that will be exposed to high electric field and stresses during field evaporati…
▽ More
Repeatable and reliable site-specific preparation of specimens for atom probe tomography (APT) at cryogenic temperatures has proven challenging. A generalized workflow is required for cryogenic-specimen preparation including lift-out via focused-ion beam and in-situ deposition of capping layers, to strengthen specimens that will be exposed to high electric field and stresses during field evaporation in APT, and protect them from environment during transfer into the atom probe. Here, we build on existing protocols, and showcase preparation and analysis of a variety of metals, oxides and supported frozen liquids and battery materials. We demonstrate reliable in-situ deposition of a metallic capping layer that significantly improve the atom probe data quality for challenging material systems, particularly battery cathode materials which are subjected to delithiation during the atom probe analysis itself. Our workflow designed is versatile and transferable widely to other instruments.
△ Less
Submitted 31 March, 2023;
originally announced March 2023.
-
PACO: Provocation Involving Action, Culture, and Oppression
Authors:
Vaibhav Garg,
Ganning Xu,
Munindar P. Singh
Abstract:
In India, people identify with a particular group based on certain attributes such as religion. The same religious groups are often provoked against each other. Previous studies show the role of provocation in increasing tensions between India's two prominent religious groups: Hindus and Muslims. With the advent of the Internet, such provocation also surfaced on social media platforms such as What…
▽ More
In India, people identify with a particular group based on certain attributes such as religion. The same religious groups are often provoked against each other. Previous studies show the role of provocation in increasing tensions between India's two prominent religious groups: Hindus and Muslims. With the advent of the Internet, such provocation also surfaced on social media platforms such as WhatsApp.
By leveraging an existing dataset of Indian WhatsApp posts, we identified three categories of provoking sentences against Indian Muslims. Further, we labeled 7,000 sentences for three provocation categories and called this dataset PACO. We leveraged PACO to train a model that can identify provoking sentences from a WhatsApp post. Our best model is fine-tuned RoBERTa and achieved a 0.851 average AUC score over five-fold cross-validation. Automatically identifying provoking sentences could stop provoking text from reaching out to the masses, and can prevent possible discrimination or violence against the target religious group.
Further, we studied the provocative speech through a pragmatic lens, by identifying the dialog acts and impoliteness super-strategies used against the religious group.
△ Less
Submitted 19 March, 2023;
originally announced March 2023.
-
Conversation Modeling to Predict Derailment
Authors:
Jiaqing Yuan,
Munindar P. Singh
Abstract:
Conversations among online users sometimes derail, i.e., break down into personal attacks. Such derailment has a negative impact on the healthy growth of cyberspace communities. The ability to predict whether ongoing conversations are likely to derail could provide valuable real-time insight to interlocutors and moderators. Prior approaches predict conversation derailment retrospectively without t…
▽ More
Conversations among online users sometimes derail, i.e., break down into personal attacks. Such derailment has a negative impact on the healthy growth of cyberspace communities. The ability to predict whether ongoing conversations are likely to derail could provide valuable real-time insight to interlocutors and moderators. Prior approaches predict conversation derailment retrospectively without the ability to forestall the derailment proactively. Some works attempt to make dynamic prediction as the conversation develops, but fail to incorporate multisource information, such as conversation structure and distance to derailment.
We propose a hierarchical transformer-based framework that combines utterance-level and conversation-level information to capture fine-grained contextual semantics. We propose a domain-adaptive pretraining objective to integrate conversational structure information and a multitask learning scheme to leverage the distance from each utterance to derailment. An evaluation of our framework on two conversation derailment datasets yields improvement over F1 score for the prediction of derailment. These results demonstrate the effectiveness of incorporating multisource information.
△ Less
Submitted 20 March, 2023;
originally announced March 2023.
-
iRogue: Identifying Rogue Behavior from App Reviews
Authors:
Vaibhav Garg,
Hui Guo,
Nirav Ajmeri,
Saikath Bhattacharya,
Munindar P. Singh
Abstract:
An app user can access information of other users or third parties. We define rogue mobile apps as those that enable a user (abuser) to access information of another user or third party (victim), in a way that violates the victim's privacy expectations. Such apps are dual-use and their identification is nontrivial. We propose iRogue, an approach for identifying rogue apps based on their reviews, p…
▽ More
An app user can access information of other users or third parties. We define rogue mobile apps as those that enable a user (abuser) to access information of another user or third party (victim), in a way that violates the victim's privacy expectations. Such apps are dual-use and their identification is nontrivial. We propose iRogue, an approach for identifying rogue apps based on their reviews, posted by victims, abusers, and others. iRogue involves training on deep learning features extracted from their 1,884 manually labeled reviews. iRogue first identifies how alarming a review is with respect to rogue behavior and, second, generates a rogue score for an app. iRogue predicts 100 rogue apps from a seed dataset curated following a previous study. Also, iRogue examines apps in other datasets of scraped reviews, and predicts an additional 139 rogue apps. On labeled ground truth, iRogue achieves the highest recall, and outperforms baseline approaches that leverage app descriptions and reviews. A qualitative analysis of alarming reviews reveals rogue functionalities. App users, platforms, and developers should be aware of such apps and their functionalities and take measures to curb privacy risk.
△ Less
Submitted 19 March, 2023;
originally announced March 2023.
-
Extracting Incidents, Effects, and Requested Advice from MeToo Posts
Authors:
Vaibhav Garg,
Jiaqing Yuan,
Rujie Xi,
Munindar P. Singh
Abstract:
Survivors of sexual harassment frequently share their experiences on social media, revealing their feelings and emotions and seeking advice. We observed that on Reddit, survivors regularly share long posts that describe a combination of (i) a sexual harassment incident, (ii) its effect on the survivor, including their feelings and emotions, and (iii) the advice being sought. We term such posts MeT…
▽ More
Survivors of sexual harassment frequently share their experiences on social media, revealing their feelings and emotions and seeking advice. We observed that on Reddit, survivors regularly share long posts that describe a combination of (i) a sexual harassment incident, (ii) its effect on the survivor, including their feelings and emotions, and (iii) the advice being sought. We term such posts MeToo posts, even though they may not be so tagged and may appear in diverse subreddits. A prospective helper (such as a counselor or even a casual reader) must understand a survivor's needs from such posts. But long posts can be time-consuming to read and respond to.
Accordingly, we address the problem of extracting key information from a long MeToo post. We develop a natural language-based model to identify sentences from a post that describe any of the above three categories.
On ten-fold cross-validation of a dataset, our model achieves a macro F1 score of 0.82.
In addition, we contribute MeThree, a dataset comprising 8,947 labeled sentences extracted from Reddit posts. We apply the LIWC-22 toolkit on MeThree to understand how different language patterns in sentences of the three categories can reveal differences in emotional tone, authenticity, and other aspects.
△ Less
Submitted 19 March, 2023;
originally announced March 2023.
-
The blame game: Understanding blame assignment in social media
Authors:
Ruijie Xi,
Munindar P. Singh
Abstract:
Cognitive and psychological studies on morality have proposed underlying linguistic and semantic factors. However, laboratory experiments in the philosophical literature often lack the nuances and complexity of real life. This paper examines how well the findings of these cognitive studies generalize to a corpus of over 30,000 narratives of tense social situations submitted to a popular social med…
▽ More
Cognitive and psychological studies on morality have proposed underlying linguistic and semantic factors. However, laboratory experiments in the philosophical literature often lack the nuances and complexity of real life. This paper examines how well the findings of these cognitive studies generalize to a corpus of over 30,000 narratives of tense social situations submitted to a popular social media forum. These narratives describe interpersonal moral situations or misgivings; other users judge from the post whether the author (protagonist) or the opposing side (antagonist) is morally culpable. Whereas previous work focuses on predicting the polarity of normative behaviors, we extend and apply natural language processing (NLP) techniques to understand the effects of descriptions of the people involved in these posts. We conduct extensive experiments to investigate the effect sizes of features to understand how they affect the assignment of blame on social media. Our findings show that aggregating psychology theories enables understanding real-life moral situations. Moreover, our results suggest that there exist biases in blame assignment on social media, such as males are more likely to receive blame no matter whether they are protagonists or antagonists.
△ Less
Submitted 26 February, 2023;
originally announced February 2023.
-
Morality in the mundane: Categorizing moral reasoning in real-life social situations
Authors:
Ruijie Xi,
Munindar P. Singh
Abstract:
Moral reasoning reflects how people acquire and apply moral rules in particular situations. With increasingly social interactions happening online, social media data provides an unprecedented opportunity to assess in-the-wild moral reasoning. We investigate the commonsense aspects of morality in ordinary matters empirically. To this end, we examine data from a Reddit subcommunity (i.e., a subreddi…
▽ More
Moral reasoning reflects how people acquire and apply moral rules in particular situations. With increasingly social interactions happening online, social media data provides an unprecedented opportunity to assess in-the-wild moral reasoning. We investigate the commonsense aspects of morality in ordinary matters empirically. To this end, we examine data from a Reddit subcommunity (i.e., a subreddit) where an author may describe their behavior in a situation to seek comments about whether that behavior was appropriate. Other users comment to provide judgments and reasoning. We focus on the novel problem of understanding the moral reasoning implicit in user comments about the propriety of an author's behavior. Especially, we explore associations between the common elements of the indicated reasoning and the extractable social factors. Our results suggest the reasoning depends on the author's gender and the topic of a post, such as when expressing anger emotion and using sensible words (e.g., f-ck, hell, and damn) in work-related situations. Moreover, we find that the commonly expressed semantics also depends on commenters' interests.
△ Less
Submitted 26 July, 2023; v1 submitted 24 February, 2023;
originally announced February 2023.
-
Pair Production in time-dependent Electric field at Finite times
Authors:
Deepak Sah,
Manoranjan P. Singh
Abstract:
We investigate the finite time behavior of pair production from the vacuum by time-dependent Sauter pulsed electric fields in spinor quantum electrodynamics (QED). Using the exact analytic solution of the mode function, we find the one-particle distribution function in momentum space. The longitudinal momentum spectrum of particles shows oscillatory behavior at a finite time in a small window of l…
▽ More
We investigate the finite time behavior of pair production from the vacuum by time-dependent Sauter pulsed electric fields in spinor quantum electrodynamics (QED). Using the exact analytic solution of the mode function, we find the one-particle distribution function in momentum space. The longitudinal momentum spectrum of particles shows oscillatory behavior at a finite time in a small window of longitudinal momentum where the electric field diminishes to around one-hundredth of its maximum magnitude and its oscillation time is close to Compton time. This oscillation is asymmetric, i.e., the amplitude of oscillation is maximum for negative longitudinal momentum compared to positive rate. The change in the longitudinal momentum spectrum can occur due to the quantum interference effect, and this quantum interference effect comes from the result of dynamical tunneling. The transverse momentum spectrum shows the Gaussian structure with a peak at zero transverse momentum when $t = 0$. After $t \approx τ/2$, the smooth Gaussian design becomes distorted, and we see inconstancy in spectrum structure, either a dip at the origin with an off-axis maximum or a peak at zero transverse momentum with small mountains up to $t \approx 2τ$ observed. After that, the spectrum shows a maximum height at zero transverse momentum with weakly pronounced peaks.
△ Less
Submitted 16 January, 2023;
originally announced January 2023.
-
Socially Intelligent Genetic Agents for the Emergence of Explicit Norms
Authors:
Rishabh Agrawal,
Nirav Ajmeri,
Munindar P. Singh
Abstract:
Norms help regulate a society. Norms may be explicit (represented in structured form) or implicit. We address the emergence of explicit norms by developing agents who provide and reason about explanations for norm violations in deciding sanctions and identifying alternative norms. These agents use a genetic algorithm to produce norms and reinforcement learning to learn the values of these norms. W…
▽ More
Norms help regulate a society. Norms may be explicit (represented in structured form) or implicit. We address the emergence of explicit norms by developing agents who provide and reason about explanations for norm violations in deciding sanctions and identifying alternative norms. These agents use a genetic algorithm to produce norms and reinforcement learning to learn the values of these norms. We find that applying explanations leads to norms that provide better cohesion and goal satisfaction for the agents. Our results are stable for societies with differing attitudes of generosity.
△ Less
Submitted 7 August, 2022;
originally announced August 2022.
-
Atomic scale evolution of the surface chemistry in Li[Ni,Mn,Co]O2 cathode for Li-ion batteries stored in air
Authors:
Mahander P. Singh,
Se-Ho Kim,
Xuyang Zhou,
Hiram Kwak,
Stoichko Antonov,
Leonardo Shoji Aota,
Chanwon Jung,
Yoon Seok Jung,
Baptiste Gault
Abstract:
Layered LiMO2 (M = Ni, Co, Mn, and Al mixture) cathode materials used for Li-ion batteries are reputed to be highly reactive through their surface, where the chemistry changes rapidly when exposed to ambient air. However, conventional electron/spectroscopy-based techniques or thermogravimetric analysis fails to capture the underlying atom-scale chemistry of vulnerable Li species. To study the evol…
▽ More
Layered LiMO2 (M = Ni, Co, Mn, and Al mixture) cathode materials used for Li-ion batteries are reputed to be highly reactive through their surface, where the chemistry changes rapidly when exposed to ambient air. However, conventional electron/spectroscopy-based techniques or thermogravimetric analysis fails to capture the underlying atom-scale chemistry of vulnerable Li species. To study the evolution of the surface composition at the atomic scale, here we use atom probe tomography and probed the surface species formed during exposure of a LiNi0.8Mn0.1Co0.1O2 (NMC811) cathode material to air. The compositional analysis evidences the formation of Li2CO3. Site specific examination from a cracked region of an NMC811 particle also suggests the predominant presence of Li2CO3. These insights will help to design improved protocols for cathode synthesis and cell assembly, as well as critical knowledge for cathode degradation
△ Less
Submitted 25 July, 2022;
originally announced July 2022.
-
Light Dark Matter Detection and Neutrino Floor: Role of Anomalous $(g-2)_μ$
Authors:
Kuldeep Deka,
Soumya Sadhukhan,
Manvinder Pal Singh
Abstract:
In this work, we explore the impact of dark matter (DM) relic density and direct detection constraints on a GeV scale DM in the context of recent anomalous muon magnetic moment $(g-2)_μ$ measurement; a $ 5.1 σ$ discrepancy with the SM. In $U(1)_{L_μ-L_τ}$ scenario the additional $Z'$ boson modifies the $(g-2)_μ$ value readily explaining the discrepancy, which restricts the $Z^{\prime}$ mass in the…
▽ More
In this work, we explore the impact of dark matter (DM) relic density and direct detection constraints on a GeV scale DM in the context of recent anomalous muon magnetic moment $(g-2)_μ$ measurement; a $ 5.1 σ$ discrepancy with the SM. In $U(1)_{L_μ-L_τ}$ scenario the additional $Z'$ boson modifies the $(g-2)_μ$ value readily explaining the discrepancy, which restricts the $Z^{\prime}$ mass in the range of $20-200$~MeV. Bounds imposed on the $Z^{\prime}$ mass along with the gauge coupling, limit possible enhancement of the neutrino floor in an $U(1)_{L_μ-L_τ}$ model. Neutrino floor is enhanced for a lighter $Z^{\prime}$ inside the $(g-2)_μ$ allowed parameter space, whereas for a heavier $Z^{\prime}$, enhancement is less significant. The $(g-2)_μ$ constraint for the GeV scale Fermionic DM makes s-channel resonant annihilation insignificant, placing emphasis on a t-channel reliance to create the observed DM relic. Although a t-channel annihilation aided by relatively large couplings can explain the measured relic density, it increases the direct detection cross-section of the GeV DM. Consequently, super-GeV (with mass $1-10$~GeV) DM almost gets ruled out except for a small parameter region with heavier $Z^{\prime}$, whereas sub-GeV (with mass $0.1-1$~GeV) DM detection possibility remains bright with more detection possibility for heavier $Z^{\prime}$. In our analysis, we have discovered that direct detection constraints have a greater impact on the GeV DM compared to indirect detection measurements.
△ Less
Submitted 31 August, 2023; v1 submitted 31 March, 2022;
originally announced March 2022.
-
Consent as a Foundation for Responsible Autonomy
Authors:
Munindar P. Singh
Abstract:
This paper focuses on a dynamic aspect of responsible autonomy, namely, to make intelligent agents be responsible at run time. That is, it considers settings where decision making by agents impinges upon the outcomes perceived by other agents. For an agent to act responsibly, it must accommodate the desires and other attitudes of its users and, through other agents, of their users.
The contribut…
▽ More
This paper focuses on a dynamic aspect of responsible autonomy, namely, to make intelligent agents be responsible at run time. That is, it considers settings where decision making by agents impinges upon the outcomes perceived by other agents. For an agent to act responsibly, it must accommodate the desires and other attitudes of its users and, through other agents, of their users.
The contribution of this paper is twofold. First, it provides a conceptual analysis of consent, its benefits and misuses, and how understanding consent can help achieve responsible autonomy. Second, it outlines challenges for AI (in particular, for agents and multiagent systems) that merit investigation to form as a basis for modeling consent in multiagent systems and applying consent to achieve responsible autonomy.
△ Less
Submitted 21 March, 2022;
originally announced March 2022.
-
Pippi: Practical Protocol Instantiation
Authors:
Samuel H. Christie V,
Amit K. Chopra,
Munindar P. Singh
Abstract:
A protocol specifies interactions between roles, which together constitute a multiagent system (MAS). Enacting a protocol presupposes that agents are bound to the its roles. Existing protocol-based approaches, however, do not adequately treat the practical aspects of how roles bindings come about.
Pippi addresses this problem of MAS instantiation. It proposes the notion of a metaprotocol, enacti…
▽ More
A protocol specifies interactions between roles, which together constitute a multiagent system (MAS). Enacting a protocol presupposes that agents are bound to the its roles. Existing protocol-based approaches, however, do not adequately treat the practical aspects of how roles bindings come about.
Pippi addresses this problem of MAS instantiation. It proposes the notion of a metaprotocol, enacting which instantiates a MAS suitable for enacting a given protocol. Pippi demonstrates the subtleties involved in instantiating MAS arising from protocol composition, correlation, and decentralization. To address these subtleties and further support practical application patterns, we introduce an enhanced protocol language, with support for parameter types (including role and protocol typed parameters, for metaprotocols), interface flexibility, and binding constraints. We discuss the realization of our approach through an extended agent architecture, including the novel concept of a MAS adapter for contact management. We evaluate Pippi's expressiveness by demonstrating common patterns for agent discovery.
△ Less
Submitted 28 February, 2022;
originally announced March 2022.
-
k^{th} order Slant Hankel Operators on the Polydisk
Authors:
M. P. Singh,
Oinam Nilbir Singh
Abstract:
In this paper, we initiate the notion of k^{th} order slant Hankel operators on L^2(T^n) for k greater than or equal to 2 and n greater than or equal to 1 where T^n denotes the n-torus. We give the necessary and sufficient condition for a bounded operator on L^2(T^n) to be a k^{th} order slant Hankel and discuss their commutative, compactness, hyponormal and isometric property.
In this paper, we initiate the notion of k^{th} order slant Hankel operators on L^2(T^n) for k greater than or equal to 2 and n greater than or equal to 1 where T^n denotes the n-torus. We give the necessary and sufficient condition for a bounded operator on L^2(T^n) to be a k^{th} order slant Hankel and discuss their commutative, compactness, hyponormal and isometric property.
△ Less
Submitted 18 February, 2022;
originally announced February 2022.
-
Governance of Autonomous Agents on the Web: Challenges and Opportunities
Authors:
Timotheus Kampik,
Adnane Mansour,
Olivier Boissier,
Sabrina Kirrane,
Julian Padget,
Terry R. Payne,
Munindar P. Singh,
Valentina Tamma,
Antoine Zimmermann
Abstract:
The study of autonomous agents has a long tradition in the Multiagent Systems and the Semantic Web communities, with applications ranging from automating business processes to personal assistants. More recently, the Web of Things (WoT), which is an extension of the Internet of Things (IoT) with metadata expressed in Web standards, and its community provide further motivation for pushing the autono…
▽ More
The study of autonomous agents has a long tradition in the Multiagent Systems and the Semantic Web communities, with applications ranging from automating business processes to personal assistants. More recently, the Web of Things (WoT), which is an extension of the Internet of Things (IoT) with metadata expressed in Web standards, and its community provide further motivation for pushing the autonomous agents research agenda forward. Although representing and reasoning about norms, policies and preferences is crucial to ensuring that autonomous agents act in a manner that satisfies stakeholder requirements, normative concepts, policies and preferences have yet to be considered as first-class abstractions in Web-based multiagent systems. Towards this end, this paper motivates the need for alignment and joint research across the Multiagent Systems, Semantic Web, and WoT communities, introduces a conceptual framework for governance of autonomous agents on the Web, and identifies several research challenges and opportunities.
△ Less
Submitted 5 February, 2022;
originally announced February 2022.
-
Noe: Norms Emergence and Robustness Based on Emotions in Multiagent Systems
Authors:
Sz-Ting Tzeng,
Nirav Ajmeri,
Munindar P. Singh
Abstract:
Social norms characterize collective and acceptable group conducts in human society. Furthermore, some social norms emerge from interactions of agents or humans. To achieve agent autonomy and make norm satisfaction explainable, we include emotions into the normative reasoning process, which evaluates whether to comply or violate a norm. Specifically, before selecting an action to execute, an agent…
▽ More
Social norms characterize collective and acceptable group conducts in human society. Furthermore, some social norms emerge from interactions of agents or humans. To achieve agent autonomy and make norm satisfaction explainable, we include emotions into the normative reasoning process, which evaluates whether to comply or violate a norm. Specifically, before selecting an action to execute, an agent observes the environment and infers the state and consequences with its internal states after norm satisfaction or violation of a social norm. Both norm satisfaction and violation provoke further emotions, and the subsequent emotions affect norm enforcement. This paper investigates how modeling emotions affect the emergence and robustness of social norms via social simulation experiments. We find that an ability in agents to consider emotional responses to the outcomes of norm satisfaction and violation (1) promotes norm compliance; and (2) improves societal welfare.
△ Less
Submitted 7 May, 2022; v1 submitted 30 April, 2021;
originally announced April 2021.
-
Hercule: Representing and Reasoning about Norms as a Foundation for Declarative Contracts over Blockchain
Authors:
Samuel H. Christie V,
Amit K. Chopra,
Munindar P. Singh
Abstract:
Current blockchain approaches for business contracts are based on smart contracts, namely, software programs placed on a blockchain that are automatically executed to realize a contract. However, smart contracts lack flexibility and interfere with the autonomy of the parties concerned.
We propose Hercule, an approach for declaratively specifying blockchain applications in a manner that reflects…
▽ More
Current blockchain approaches for business contracts are based on smart contracts, namely, software programs placed on a blockchain that are automatically executed to realize a contract. However, smart contracts lack flexibility and interfere with the autonomy of the parties concerned.
We propose Hercule, an approach for declaratively specifying blockchain applications in a manner that reflects business contracts. Hercule represents a contract via regulatory norms that capture the involved parties' expectations of one another. It computes the states of norms (hence, of contracts) from events in the blockchain. Hercule's novelty and significance lie in that it operationalizes declarative contracts over semistructured databases, the underlying representation for practical blockchain such as Hyperledger Fabric and Ethereum. Specifically, it exploits the map-reduce capabilities of such stores to compute norm states.
We demonstrate that our implementation over Hyperledger Fabric can process thousands of events per second, sufficient for many applications.
△ Less
Submitted 16 April, 2021;
originally announced April 2021.
-
Toward a Rational and Ethical Sociotechnical System of Autonomous Vehicles: A Novel Application of Multi-Criteria Decision Analysis
Authors:
Veljko Dubljević,
George F. List,
Jovan Milojevich,
Nirav Ajmeri,
William Bauer,
Munindar P. Singh,
Eleni Bardaka,
Thomas Birkland,
Charles Edwards,
Roger Mayer,
Ioan Muntean,
Thomas Powers,
Hesham Rakha,
Vance Ricks,
M. Shoaib Samandar
Abstract:
The expansion of artificial intelligence (AI) and autonomous systems has shown the potential to generate enormous social good while also raising serious ethical and safety concerns. AI technology is increasingly adopted in transportation. A survey of various in-vehicle technologies found that approximately 64% of the respondents used a smartphone application to assist with their travel. The top-us…
▽ More
The expansion of artificial intelligence (AI) and autonomous systems has shown the potential to generate enormous social good while also raising serious ethical and safety concerns. AI technology is increasingly adopted in transportation. A survey of various in-vehicle technologies found that approximately 64% of the respondents used a smartphone application to assist with their travel. The top-used applications were navigation and real-time traffic information systems. Among those who used smartphones during their commutes, the top-used applications were navigation and entertainment. There is a pressing need to address relevant social concerns to allow for the development of systems of intelligent agents that are informed and cognizant of ethical standards. Doing so will facilitate the responsible integration of these systems in society. To this end, we have applied Multi-Criteria Decision Analysis (MCDA) to develop a formal Multi-Attribute Impact Assessment (MAIA) questionnaire for examining the social and ethical issues associated with the uptake of AI. We have focused on the domain of autonomous vehicles (AVs) because of their imminent expansion. However, AVs could serve as a stand-in for any domain where intelligent, autonomous agents interact with humans, either on an individual level (e.g., pedestrians, passengers) or a societal level.
△ Less
Submitted 4 February, 2021;
originally announced February 2021.
-
Moral and Social Ramifications of Autonomous Vehicles
Authors:
Veljko Dubljević,
Sean Douglas,
Jovan Milojevich,
Nirav Ajmeri,
William A. Bauer,
George F. List,
Munindar P. Singh
Abstract:
Autonomous Vehicles (AVs) raise important social and ethical concerns, especially about accountability, dignity, and justice. We focus on the specific concerns arising from how AV technology will affect the lives and livelihoods of professional and semi-professional drivers. Whereas previous studies of such concerns have focused on the opinions of experts, we seek to understand these ethical and s…
▽ More
Autonomous Vehicles (AVs) raise important social and ethical concerns, especially about accountability, dignity, and justice. We focus on the specific concerns arising from how AV technology will affect the lives and livelihoods of professional and semi-professional drivers. Whereas previous studies of such concerns have focused on the opinions of experts, we seek to understand these ethical and societal challenges from the perspectives of the drivers themselves.
To this end, we adopted a qualitative research methodology based on semi-structured interviews. This is an established social science methodology that helps understand the core concerns of stakeholders in depth by avoiding the biases of superficial methods such as surveys.
We find that whereas drivers agree with the experts that AVs will significantly impact transportation systems, they are apprehensive about the prospects for their livelihoods and dismiss the suggestions that driving jobs are unsatisfying and their profession does not merit protection.
By showing how drivers differ from the experts, our study has ramifications beyond AVs to AI and other advanced technologies. Our findings suggest that qualitative research applied to the relevant, especially disempowered, stakeholders is essential to ensuring that new technologies are introduced ethically.
△ Less
Submitted 29 January, 2021; v1 submitted 27 January, 2021;
originally announced January 2021.
-
Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey
Authors:
Mu Zhu,
Ahmed H. Anwar,
Zelin Wan,
Jin-Hee Cho,
Charles Kamhoua,
Munindar P. Singh
Abstract:
Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources. Although defensive deception is increasingly popular in the research community, there has not been a systematic investigation of its key components, the underlying principles, and its tradeoffs in various prob…
▽ More
Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources. Although defensive deception is increasingly popular in the research community, there has not been a systematic investigation of its key components, the underlying principles, and its tradeoffs in various problem settings. This survey paper focuses on defensive deception research centered on game theory and machine learning, since these are prominent families of artificial intelligence approaches that are widely employed in defensive deception. This paper brings forth insights, lessons, and limitations from prior work. It closes with an outline of some research directions to tackle major gaps in current defensive deception research.
△ Less
Submitted 8 May, 2021; v1 submitted 21 January, 2021;
originally announced January 2021.
-
Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats
Authors:
Zelin Wan,
Jin-Hee Cho,
Mu Zhu,
Ahmed H. Anwar,
Charles Kamhoua,
Munindar P. Singh
Abstract:
Defensive deception techniques have emerged as a promising proactive defense mechanism to mislead an attacker and thereby achieve attack failure. However, most game-theoretic defensive deception approaches have assumed that players maintain consistent views under uncertainty. They do not consider players' possible, subjective beliefs formed due to asymmetric information given to them. In this work…
▽ More
Defensive deception techniques have emerged as a promising proactive defense mechanism to mislead an attacker and thereby achieve attack failure. However, most game-theoretic defensive deception approaches have assumed that players maintain consistent views under uncertainty. They do not consider players' possible, subjective beliefs formed due to asymmetric information given to them. In this work, we formulate a hypergame between an attacker and a defender where they can interpret the same game differently and accordingly choose their best strategy based on their respective beliefs. This gives a chance for defensive deception strategies to manipulate an attacker's belief, which is the key to the attacker's decision making. We consider advanced persistent threat (APT) attacks, which perform multiple attacks in the stages of the cyber kill chain where both the attacker and the defender aim to select optimal strategies based on their beliefs. Through extensive simulation experiments, we demonstrated how effectively the defender can leverage defensive deception techniques while dealing with multi-staged APT attacks in a hypergame in which the imperfect information is reflected based on perceived uncertainty, cost, and expected utilities of both attacker and defender, the system lifetime (i.e., mean time to security failure), and improved false positive rates in detecting attackers.
△ Less
Submitted 30 January, 2021; v1 submitted 8 January, 2021;
originally announced January 2021.
-
Prosocial Norm Emergence in Multiagent Systems
Authors:
Mehdi Mashayekhi,
Nirav Ajmeri,
George F. List,
Munindar P. Singh
Abstract:
Multiagent systems provide a basis for developing systems of autonomous entities and thus find application in a variety of domains. We consider a setting where not only the member agents are adaptive but also the multiagent system viewed as an entity in its own right is adaptive. Specifically, the social structure of a multiagent system can be reflected in the social norms among its members. It is…
▽ More
Multiagent systems provide a basis for developing systems of autonomous entities and thus find application in a variety of domains. We consider a setting where not only the member agents are adaptive but also the multiagent system viewed as an entity in its own right is adaptive. Specifically, the social structure of a multiagent system can be reflected in the social norms among its members. It is well recognized that the norms that arise in society are not always beneficial to its members. We focus on prosocial norms, which help achieve positive outcomes for society and often provide guidance to agents to act in a manner that takes into account the welfare of others.
Specifically, we propose Cha, a framework for the emergence of prosocial norms. Unlike previous norm emergence approaches, Cha supports continual change to a system (agents may enter and leave) and dynamism (norms may change when the environment changes). Importantly, Cha agents incorporate prosocial decision making based on inequity aversion theory, reflecting an intuition of guilt arising from being antisocial. In this manner, Cha brings together two important themes in prosociality: decision making by individuals and fairness of system-level outcomes. We demonstrate via simulation that Cha can improve aggregate societal gains and fairness of outcomes.
△ Less
Submitted 4 May, 2022; v1 submitted 28 December, 2020;
originally announced December 2020.
-
Neutrino Floor in Leptophilic $U(1)$ Models: Modification in $U(1)_{L_μ-L_τ}$
Authors:
Soumya Sadhukhan,
Manvinder Pal Singh
Abstract:
In this work, we investigate the beyond standard model (BSM) impact of leptophilic U(1) models, namely $ U(1)_{L_μ-L_e}$, $U(1)_{L_e-L_τ}$ and $U(1)_{L_μ-L_τ}$ on coherent elastic neutrino-nucleus scattering (CE$ν$NS) and hence its effect on dark matter (DM) direct detection experiments. Imposing the latest relevant experimental constraints on these models, we obtain $\mathcal{O}(50\%)$ enhancemen…
▽ More
In this work, we investigate the beyond standard model (BSM) impact of leptophilic U(1) models, namely $ U(1)_{L_μ-L_e}$, $U(1)_{L_e-L_τ}$ and $U(1)_{L_μ-L_τ}$ on coherent elastic neutrino-nucleus scattering (CE$ν$NS) and hence its effect on dark matter (DM) direct detection experiments. Imposing the latest relevant experimental constraints on these models, we obtain $\mathcal{O}(50\%)$ enhancement for case of $U(1)_{L_μ-L_τ}$ in a region $m_Z' \approx 20~$MeV. Subsequently, we observe that the enhancement seen in CE$ν$NS is roughly getting translated to enhancement by a factor of 2.7 (for Germanium based detectors) and 1.8 (for Xenon based detectors) in the neutrino scattering event rate which eventually enhances the neutrino floor by same amount. This enhancement is more prominent in the region with DM masses less than 10 GeV. The model parameter space that leads to this enhancement, can simultaneously explain both anomalous magnetic moment of muon ($(g-2)_μ$) and observed DM relic density, in a modified scenario. Enhancement of neutrino floor requires increased number of DM-nucleon scattering events in the future DM direct detection experiments, to establish themselves to be DM signal events. In absence of any DM signal, those experiments can directly be used to measure the neutrino rate, quantifying the BSM effects.
△ Less
Submitted 18 January, 2021; v1 submitted 10 June, 2020;
originally announced June 2020.
-
Octa: Omissions and Conflicts in Target-Aspect Sentiment Analysis
Authors:
Zhe Zhang,
Chung-Wei Hang,
Munindar P. Singh
Abstract:
Sentiments in opinionated text are often determined by both aspects and target words (or targets). We observe that targets and aspects interrelate in subtle ways, often yielding conflicting sentiments. Thus, a naive aggregation of sentiments from aspects and targets treated separately, as in existing sentiment analysis models, impairs performance.
We propose Octa, an approach that jointly consid…
▽ More
Sentiments in opinionated text are often determined by both aspects and target words (or targets). We observe that targets and aspects interrelate in subtle ways, often yielding conflicting sentiments. Thus, a naive aggregation of sentiments from aspects and targets treated separately, as in existing sentiment analysis models, impairs performance.
We propose Octa, an approach that jointly considers aspects and targets when inferring sentiments. To capture and quantify relationships between targets and context words, Octa uses a selective self-attention mechanism that handles implicit or missing targets. Specifically, Octa involves two layers of attention mechanisms for, respectively, selective attention between targets and context words and attention over words based on aspects. On benchmark datasets, Octa outperforms leading models by a large margin, yielding (absolute) gains in accuracy of 1.6% to 4.3%.
△ Less
Submitted 6 October, 2020; v1 submitted 27 April, 2020;
originally announced April 2020.
-
Norms and Sanctions as a Basis for Promoting Cybersecurity Practices
Authors:
Nirav Ajmeri,
Shubham Goyal,
Munindar P. Singh
Abstract:
Many cybersecurity breaches occur due to users not following good cybersecurity practices, chief among them being regulations for applying software patches to operating systems, updating applications, and maintaining strong passwords.
We capture cybersecurity expectations on users as norms. We empirically investigate sanctioning mechanisms in promoting compliance with those norms as well as the…
▽ More
Many cybersecurity breaches occur due to users not following good cybersecurity practices, chief among them being regulations for applying software patches to operating systems, updating applications, and maintaining strong passwords.
We capture cybersecurity expectations on users as norms. We empirically investigate sanctioning mechanisms in promoting compliance with those norms as well as the detrimental effect of sanctions on the ability of users to complete their work. We realize these ideas in a game that emulates the decision making of workers in a research lab.
Through a human-subject study, we find that whereas individual sanctions are more effective than group sanctions in achieving compliance and less detrimental on the ability of users to complete their work, individual sanctions offer significantly lower resilience especially for organizations comprising risk seekers. Our findings have implications for workforce training in cybersecurity.
△ Less
Submitted 24 March, 2020;
originally announced March 2020.
-
Optimizing Vulnerability-Driven Honey Traffic Using Game Theory
Authors:
Iffat Anjum,
Mohammad Sujan Miah,
Mu Zhu,
Nazia Sharmin,
Christopher Kiekintveld,
William Enck,
Munindar P Singh
Abstract:
Enterprises are increasingly concerned about adversaries that slowly and deliberately exploit resources over the course of months or even years. A key step in this kill chain is network reconnaissance, which has historically been active (e.g., network scans) and therefore detectable. However, new networking technology increases the possibility of passive network reconnaissance, which will be large…
▽ More
Enterprises are increasingly concerned about adversaries that slowly and deliberately exploit resources over the course of months or even years. A key step in this kill chain is network reconnaissance, which has historically been active (e.g., network scans) and therefore detectable. However, new networking technology increases the possibility of passive network reconnaissance, which will be largely undetectable by defenders. In this paper, we propose Snaz, a technique that uses deceptively crafted honey traffic to confound the knowledge gained through passive network reconnaissance. We present a two-player non-zero-sum Stackelberg game model that characterizes how a defender should deploy honey traffic in the presence of an adversary who is aware of Snaz. In doing so, we demonstrate the existence of optimal defender strategies that will either dissuade an adversary from acting on the existence of real vulnerabilities observed within network traffic, or reveal the adversary's presence when it attempts to unknowingly attack an intrusion detection node.
△ Less
Submitted 20 February, 2020;
originally announced February 2020.
-
Leveraging Structural and Semantic Correspondence for Attribute-Oriented Aspect Sentiment Discovery
Authors:
Zhe Zhang,
Munindar P. Singh
Abstract:
Opinionated text often involves attributes such as authorship and location that influence the sentiments expressed for different aspects. We posit that structural and semantic correspondence is both prevalent in opinionated text, especially when associated with attributes, and crucial in accurately revealing its latent aspect and sentiment structure. However, it is not recognized by existing appro…
▽ More
Opinionated text often involves attributes such as authorship and location that influence the sentiments expressed for different aspects. We posit that structural and semantic correspondence is both prevalent in opinionated text, especially when associated with attributes, and crucial in accurately revealing its latent aspect and sentiment structure. However, it is not recognized by existing approaches.
We propose Trait, an unsupervised probabilistic model that discovers aspects and sentiments from text and associates them with different attributes. To this end, Trait infers and leverages structural and semantic correspondence using a Markov Random Field. We show empirically that by incorporating attributes explicitly Trait significantly outperforms state-of-the-art baselines both by generating attribute profiles that accord with our intuitions, as shown via visualization, and yielding topics of greater semantic cohesion.
△ Less
Submitted 28 August, 2019;
originally announced August 2019.
-
An Evaluation of Communication Protocol Languages for Engineering Multiagent Systems
Authors:
Amit K. Chopra,
Samuel H. Christie V,
Munindar P. Singh
Abstract:
Communication protocols are central to engineering decentralized multiagent systems. Modern protocol languages are typically formal and address aspects of decentralization, such as asynchrony. However, modern languages differ in important ways in their basic abstractions and operational assumptions. This diversity makes a comparative evaluation of protocol languages a challenging task.
We contri…
▽ More
Communication protocols are central to engineering decentralized multiagent systems. Modern protocol languages are typically formal and address aspects of decentralization, such as asynchrony. However, modern languages differ in important ways in their basic abstractions and operational assumptions. This diversity makes a comparative evaluation of protocol languages a challenging task.
We contribute a rich evaluation of modern protocol languages based on diverse approaches. Among the selected languages, Scribble is based on session types; Trace-C and Trace-F on trace expressions; HAPN on hierarchical state machines, and BSPL on information causality. Our contribution is four-fold. One, we contribute important criteria for evaluating protocol languages. Two, for each criterion, we compare the languages on the basis of whether they are able to specify elementary protocols that go to the heart of the criterion. Three, for each language, we map our findings to a canonical architecture style for multiagent systems, highlighting where the languages depart from the architecture. Four, we identify a few design principles for protocol languages as guidance for future research.
△ Less
Submitted 4 August, 2020; v1 submitted 24 January, 2019;
originally announced January 2019.
-
Lepto-philic 2-HDM + singlet scalar portal induced fermionic dark matter
Authors:
Sukanta Dutta,
Ashok Goyal,
Manvinder Pal Singh
Abstract:
We explore the possibility that the discrepancy in the observed anomalous magnetic moment of the muon $Δa _μ$ and the predicted relic abundance of Dark Matter by Planck data, can be explained in a lepto-philic 2-HDM augmented by a real SM singlet scalar of mass $\sim$ 10-80 GeV. We constrain the model from the observed Higgs Decay width at LHC, LEP searches for low mass exotic scalars and anomalou…
▽ More
We explore the possibility that the discrepancy in the observed anomalous magnetic moment of the muon $Δa _μ$ and the predicted relic abundance of Dark Matter by Planck data, can be explained in a lepto-philic 2-HDM augmented by a real SM singlet scalar of mass $\sim$ 10-80 GeV. We constrain the model from the observed Higgs Decay width at LHC, LEP searches for low mass exotic scalars and anomalous magnetic moment of an electron $Δa_e$. This constrained light singlet scalar serves as a portal for the fermionic Dark Matter, which contributes to the required relic density of the universe. A large region of model parameter space is found to be consistent with the present observations from the Direct and Indirect DM detection experiments.
△ Less
Submitted 11 July, 2019; v1 submitted 20 September, 2018;
originally announced September 2018.
-
Transient and pre-transient stages in field induced phase transition of vacuum state
Authors:
Chitradip Banerjee,
Manoranjan P. Singh
Abstract:
Evolution of modulus and phase of complex order parameter associated with field induced phase transition (FIPT) of the vacuum state interacting with time dependent Sauter pulse is studied to analyse different evolution stages of the order parameter e.g., quasi electron positron plasma (QEPP), transient, and residual electron-positron plasma (REPP) stages. By revisiting FIPT in presence of single-s…
▽ More
Evolution of modulus and phase of complex order parameter associated with field induced phase transition (FIPT) of the vacuum state interacting with time dependent Sauter pulse is studied to analyse different evolution stages of the order parameter e.g., quasi electron positron plasma (QEPP), transient, and residual electron-positron plasma (REPP) stages. By revisiting FIPT in presence of single-sheeted and multi-sheeted pulses, we attribute the transient stage to the nonlinear coupling in the differential equations governing the dynamics of the phase and the modulus of the order parameter. The appearance of the rapid oscillations in the modulus is shown to be associated with the abrupt change in the phase of the order parameter in the transient stage. FIPT is also studied for multi-sheeted Sauter pulse with linear and quadratic frequency chirp. QEEP stage is found to show complex dynamical behaviour with fast and irregular oscillations due to the frequency chirp. The formation of pre-transient region due to the quadratic frequency chirping is observed in the accelerating part of the QEPP stage before the electric field attains the maximum value. As the quadratic chirp is increased the pre-transient and transient stages move closer to the electric field maximum which leads to a decrease in temporal separation between the two stages. The early appearance of the transient stage and hence of the following REPP stage results in the enhancement of pair production rate.
△ Less
Submitted 18 September, 2018;
originally announced September 2018.
-
Imprint of temporal envelope of ultrashort laser pulses on longitudinal momentum spectrum of $e^+e^-$ pairs
Authors:
Chitradip Banerjee,
Manoranjan P. Singh
Abstract:
The effect of the temporal pulse shape of intense pulses on the momentum distribution of $e^+e^-$ pairs is studied using the quantum kinetic equation. Two closely resembling temporal envelopes namely, Gaussian and Sauter, keeping all the other pulse parameters the same, are considered to this end. Contrary to the common perception which can be gauged from the interchangeable use of these temporal…
▽ More
The effect of the temporal pulse shape of intense pulses on the momentum distribution of $e^+e^-$ pairs is studied using the quantum kinetic equation. Two closely resembling temporal envelopes namely, Gaussian and Sauter, keeping all the other pulse parameters the same, are considered to this end. Contrary to the common perception which can be gauged from the interchangeable use of these temporal profiles, the longitudinal momentum spectrum of the pairs created by the two pulses is found to differ significantly in all the temporal regimes. For the pulses having a few cycles of oscillations, the temporal profile of the pulse is revealed in the oscillatory interference pattern riding over the otherwise smooth longitudinal momentum spectrum at asymptotic times. The onset of the oscillation due to the quantum interference of reflection amplitudes from the scattering potential due to the pulses having a temporal structure of multiple barriers takes place for few-cycle oscillations for the Gaussian pulse than that for the Sauter pulse. Furthermore, the oscillation amplitude for the same number of oscillations within the pulse duration is larger for the Gaussian pulse. The presence of the carrier-envelope phase and the frequency chirping is found to magnify these differences. In the absence of any appreciable interference effect for the pulses having less than five oscillations, the longitudinal momentum spectrum has a higher peak value for the Sauter pulse at asymptotic times. On the hand, before the transient stage of evolution, the peak of the spectrum shows the opposite trend.
△ Less
Submitted 19 April, 2022; v1 submitted 12 July, 2018;
originally announced July 2018.
-
Phase control of Schwinger pair production by colliding laser pulses
Authors:
Chitradip Banerjee,
Manoranjan P. Singh,
Alexander M. Fedotov
Abstract:
We study the Schwinger electron-positron pair production by a strong electromagnetic field of two colliding e-polarized laser pulses with a relative phase shift $Ψ$. The spatio-temporal distribution of created pairs is very sensitive to this phase shift and to polarization of the pulses. We study this dependence in detail and demonstrate how it can be explained in terms of the underlying invariant…
▽ More
We study the Schwinger electron-positron pair production by a strong electromagnetic field of two colliding e-polarized laser pulses with a relative phase shift $Ψ$. The spatio-temporal distribution of created pairs is very sensitive to this phase shift and to polarization of the pulses. We study this dependence in detail and demonstrate how it can be explained in terms of the underlying invariant field structure of the counterpropagating focused pulses.
△ Less
Submitted 19 June, 2018;
originally announced June 2018.
-
Violable Contracts and Governance for Blockchain Applications
Authors:
Munindar P. Singh,
Amit K. Chopra
Abstract:
We examine blockchain technologies, especially smart contracts, as a platform for decentralized applications. By providing a basis for consensus, blockchain promises to upend business models that presuppose a central authority. However, blockchain suffers from major shortcomings arising from an over-regimented way of organizing computation that limits its prospects. We propose a sociotechnical, ye…
▽ More
We examine blockchain technologies, especially smart contracts, as a platform for decentralized applications. By providing a basis for consensus, blockchain promises to upend business models that presuppose a central authority. However, blockchain suffers from major shortcomings arising from an over-regimented way of organizing computation that limits its prospects. We propose a sociotechnical, yet computational, perspective that avoids those shortcomings. A centerpiece of our vision is the notion of a declarative, violable contract in contradistinction to smart contracts. This new way of thinking enables flexible governance, by formalizing organizational structures; verification of correctness without obstructing autonomy; and a meaningful basis for trust.
△ Less
Submitted 8 January, 2018;
originally announced January 2018.
-
Tosca: Operationalizing Commitments Over Information Protocols
Authors:
Thomas C. King,
Akın Günay,
Amit K. Chopra,
Munindar P. Singh
Abstract:
The notion of commitment is widely studied as a high-level abstraction for modeling multiagent interaction. An important challenge is supporting flexible decentralized enactments of commitment specifications. In this paper, we combine recent advances on specifying commitments and information protocols. Specifically, we contribute Tosca, a technique for automatically synthesizing information protoc…
▽ More
The notion of commitment is widely studied as a high-level abstraction for modeling multiagent interaction. An important challenge is supporting flexible decentralized enactments of commitment specifications. In this paper, we combine recent advances on specifying commitments and information protocols. Specifically, we contribute Tosca, a technique for automatically synthesizing information protocols from commitment specifications. Our main result is that the synthesized protocols support commitment alignment, which is the idea that agents must make compatible inferences about their commitments despite decentralization.
△ Less
Submitted 10 August, 2017;
originally announced August 2017.
-
Electron-positron Pair Creation by Counterpropagating Laser Pulses: Role of Carrier Envelope phase
Authors:
Chitradip Banerjee,
Maoranjan P. Singh
Abstract:
The effect of carrier envelope phase (CEP) on the spatio-temporal distribution of the electron-positron pairs created by untraintense counterpropagating femtosecond laser pulses is studied. When the laser pulses are linearly polarized, the temporal distribution of the pairs is found to be sensitive to CEP. On the hand, it is found to be largely insensitive to CEP for circularly polarized pulses.
The effect of carrier envelope phase (CEP) on the spatio-temporal distribution of the electron-positron pairs created by untraintense counterpropagating femtosecond laser pulses is studied. When the laser pulses are linearly polarized, the temporal distribution of the pairs is found to be sensitive to CEP. On the hand, it is found to be largely insensitive to CEP for circularly polarized pulses.
△ Less
Submitted 17 July, 2017;
originally announced July 2017.
-
Blockchains for Business Process Management - Challenges and Opportunities
Authors:
Jan Mendling,
Ingo Weber,
Wil van der Aalst,
Jan vom Brocke,
Cristina Cabanillas,
Florian Daniel,
Soren Debois,
Claudio Di Ciccio,
Marlon Dumas,
Schahram Dustdar,
Avigdor Gal,
Luciano Garcia-Banuelos,
Guido Governatori,
Richard Hull,
Marcello La Rosa,
Henrik Leopold,
Frank Leymann,
Jan Recker,
Manfred Reichert,
Hajo A. Reijers,
Stefanie Rinderle-Ma,
Andreas Rogge-Solti,
Michael Rosemann,
Stefan Schulte,
Munindar P. Singh
, et al. (7 additional authors not shown)
Abstract:
Blockchain technology promises a sizable potential for executing inter-organizational business processes without requiring a central party serving as a single point of trust (and failure). This paper analyzes its impact on business process management (BPM). We structure the discussion using two BPM frameworks, namely the six BPM core capabilities and the BPM lifecycle. This paper provides research…
▽ More
Blockchain technology promises a sizable potential for executing inter-organizational business processes without requiring a central party serving as a single point of trust (and failure). This paper analyzes its impact on business process management (BPM). We structure the discussion using two BPM frameworks, namely the six BPM core capabilities and the BPM lifecycle. This paper provides research directions for investigating the application of blockchain technology to BPM.
△ Less
Submitted 31 January, 2018; v1 submitted 11 April, 2017;
originally announced April 2017.