Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–31 of 31 results for author: Edwards, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.14983  [pdf, other

    cs.LG cs.CR q-fin.RM

    Privacy-Enhancing Collaborative Information Sharing through Federated Learning -- A Case of the Insurance Industry

    Authors: Panyi Dong, Zhiyu Quan, Brandon Edwards, Shih-han Wang, Runhuan Feng, Tianyang Wang, Patrick Foley, Prashant Shah

    Abstract: The report demonstrates the benefits (in terms of improved claims loss modeling) of harnessing the value of Federated Learning (FL) to learn a single model across multiple insurance industry datasets without requiring the datasets themselves to be shared from one company to another. The application of FL addresses two of the most pressing concerns: limited data volume and data variety, which are c… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

  2. arXiv:2312.00169  [pdf

    cs.CV physics.med-ph

    Integration of Swin UNETR and statistical shape modeling for a semi-automated segmentation of the knee and biomechanical modeling of articular cartilage

    Authors: Reza Kakavand, Mehrdad Palizi, Peyman Tahghighi, Reza Ahmadi, Neha Gianchandani, Samer Adeeb, Roberto Souza, W. Brent Edwards, Amin Komeili

    Abstract: Simulation studies like finite element (FE) modeling provide insight into knee joint mechanics without patient experimentation. Generic FE models represent biomechanical behavior of the tissue by overlooking variations in geometry, loading, and material properties of a population. On the other hand, subject-specific models include these specifics, resulting in enhanced predictive precision. Howeve… ▽ More

    Submitted 18 September, 2023; originally announced December 2023.

  3. arXiv:2311.16196  [pdf, other

    cs.SE cs.AI

    Variational Exploration Module VEM: A Cloud-Native Optimization and Validation Tool for Geospatial Modeling and AI Workflows

    Authors: Julian Kuehnert, Hiwot Tadesse, Chris Dearden, Rosie Lickorish, Paolo Fraccaro, Anne Jones, Blair Edwards, Sekou L. Remy, Peter Melling, Tim Culmer

    Abstract: Geospatial observations combined with computational models have become key to understanding the physical systems of our environment and enable the design of best practices to reduce societal harm. Cloud-based deployments help to scale up these modeling and AI workflows. Yet, for practitioners to make robust conclusions, model tuning and testing is crucial, a resource intensive process which involv… ▽ More

    Submitted 26 November, 2023; originally announced November 2023.

    Comments: Submitted to IAAI 2024: Deployed Innovative Tools for Enabling AI Applications

  4. arXiv:2310.18660  [pdf, other

    cs.CV cs.LG

    Foundation Models for Generalist Geospatial Artificial Intelligence

    Authors: Johannes Jakubik, Sujit Roy, C. E. Phillips, Paolo Fraccaro, Denys Godwin, Bianca Zadrozny, Daniela Szwarcman, Carlos Gomes, Gabby Nyirjesy, Blair Edwards, Daiki Kimura, Naomi Simumba, Linsong Chu, S. Karthik Mukkavilli, Devyani Lambhate, Kamal Das, Ranjini Bangalore, Dario Oliveira, Michal Muszynski, Kumar Ankur, Muthukumaran Ramasubramanian, Iksha Gurung, Sam Khallaghi, Hanxi, Li , et al. (8 additional authors not shown)

    Abstract: Significant progress in the development of highly adaptable and reusable Artificial Intelligence (AI) models is expected to have a significant impact on Earth science and remote sensing. Foundation models are pre-trained on large unlabeled datasets through self-supervision, and then fine-tuned for various downstream tasks with small labeled datasets. This paper introduces a first-of-a-kind framewo… ▽ More

    Submitted 8 November, 2023; v1 submitted 28 October, 2023; originally announced October 2023.

  5. arXiv:2302.14172  [pdf, other

    cs.CR

    Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights

    Authors: Jay Jacobs, Sasha Romanosky, Octavian Suciu, Benjamin Edwards, Armin Sarabi

    Abstract: The number of disclosed vulnerabilities has been steadily increasing over the years. At the same time, organizations face significant challenges patching their systems, leading to a need to prioritize vulnerability remediation in order to reduce the risk of attacks. Unfortunately, existing vulnerability scoring systems are either vendor-specific, proprietary, or are only commercially available. Mo… ▽ More

    Submitted 15 June, 2023; v1 submitted 27 February, 2023; originally announced February 2023.

  6. arXiv:2209.12080  [pdf, other

    cs.DC cs.AI

    Climate Impact Modelling Framework

    Authors: Blair Edwards, Paolo Fraccaro, Nikola Stoyanov, Nelson Bore, Julian Kuehnert, Kommy Weldemariam, Anne Jones

    Abstract: The application of models to assess the risk of the physical impacts of weather and climate and their subsequent consequences for society and business is of the utmost importance in our changing climate. The operation of such models is historically bespoke and constrained to specific compute infrastructure, driving datasets and predefined configurations. These constraints introduce challenges with… ▽ More

    Submitted 27 September, 2022; v1 submitted 24 September, 2022; originally announced September 2022.

    Comments: KDD Fragile Earth workshop 2022

  7. arXiv:2209.10743  [pdf, other

    cs.RO cs.CG

    Output Mode Switching for Parallel Five-bar Manipulators Using a Graph-based Path Planner

    Authors: Parker B. Edwards, Aravind Baskar, Caroline Hills, Mark Plecnik, Jonathan D. Hauenstein

    Abstract: The configuration manifolds of parallel manipulators exhibit more nonlinearity than serial manipulators. Qualitatively, they can be seen to possess extra folds. By projecting such manifolds onto spaces of engineering relevance, such as an output workspace or an input actuator space, these folds cast edges that exhibit nonsmooth behavior. For example, inside the global workspace bounds of a five-ba… ▽ More

    Submitted 21 September, 2022; originally announced September 2022.

    Comments: 7 pages, 6 figures

  8. arXiv:2209.01654  [pdf, other

    math.AG cs.CG

    Computing geometric feature sizes for algebraic manifolds

    Authors: Sandra Di Rocco, Parker B. Edwards, David Eklund, Oliver Gäfvert, Jonathan D. Hauenstein

    Abstract: We introduce numerical algebraic geometry methods for computing lower bounds on the reach, local feature size, and the weak feature size of the real part of an equidimensional and smooth algebraic variety using the variety's defining polynomials as input. For the weak feature size, we also show that non-quadratic complete intersections generically have finitely many geometric bottlenecks, and desc… ▽ More

    Submitted 4 September, 2022; originally announced September 2022.

  9. Federated Learning Enables Big Data for Rare Cancer Boundary Detection

    Authors: Sarthak Pati, Ujjwal Baid, Brandon Edwards, Micah Sheller, Shih-Han Wang, G Anthony Reina, Patrick Foley, Alexey Gruzdev, Deepthi Karkada, Christos Davatzikos, Chiharu Sako, Satyam Ghodasara, Michel Bilello, Suyash Mohan, Philipp Vollmuth, Gianluca Brugnara, Chandrakanth J Preetha, Felix Sahm, Klaus Maier-Hein, Maximilian Zenk, Martin Bendszus, Wolfgang Wick, Evan Calabrese, Jeffrey Rudie, Javier Villanueva-Meyer , et al. (254 additional authors not shown)

    Abstract: Although machine learning (ML) has shown promise in numerous domains, there are concerns about generalizability to out-of-sample data. This is currently addressed by centrally sharing ample, and importantly diverse, data from multiple sites. However, such centralization is challenging to scale (or even not feasible) due to various limitations. Federated ML (FL) provides an alternative to train acc… ▽ More

    Submitted 25 April, 2022; v1 submitted 22 April, 2022; originally announced April 2022.

    Comments: federated learning, deep learning, convolutional neural network, segmentation, brain tumor, glioma, glioblastoma, FeTS, BraTS

  10. arXiv:2203.01277  [pdf, other

    cs.CV cs.AI cs.LG

    Deep Temporal Interpolation of Radar-based Precipitation

    Authors: Michiaki Tatsubori, Takao Moriyama, Tatsuya Ishikawa, Paolo Fraccaro, Anne Jones, Blair Edwards, Julian Kuehnert, Sekou L. Remy

    Abstract: When providing the boundary conditions for hydrological flood models and estimating the associated risk, interpolating precipitation at very high temporal resolutions (e.g. 5 minutes) is essential not to miss the cause of flooding in local regions. In this paper, we study optical flow-based interpolation of globally available weather radar images from satellites. The proposed approach uses deep ne… ▽ More

    Submitted 1 March, 2022; originally announced March 2022.

    Comments: 5 pagers, 4 figures, ICASSP-22. arXiv admin note: text overlap with arXiv:1712.00080 by other authors

    ACM Class: I.2.10; I.3.7; I.6.5; J.2

  11. arXiv:2201.08357  [pdf

    cs.AR

    The Specialized High-Performance Network on Anton 3

    Authors: Keun Sup Shim, Brian Greskamp, Brian Towles, Bruce Edwards, J. P. Grossman, David E. Shaw

    Abstract: Molecular dynamics (MD) simulation, a computationally intensive method that provides invaluable insights into the behavior of biomolecules, typically requires large-scale parallelization. Implementation of fast parallel MD simulation demands both high bandwidth and low latency for inter-node communication, but in current semiconductor technology, neither of these properties is scaling as quickly a… ▽ More

    Submitted 20 January, 2022; originally announced January 2022.

    Comments: Accepted by the 28th IEEE International Symposium on High-Performance Computer Architecture (HPCA 2022)

  12. OpenFL: An open-source framework for Federated Learning

    Authors: G Anthony Reina, Alexey Gruzdev, Patrick Foley, Olga Perepelkina, Mansi Sharma, Igor Davidyuk, Ilya Trushkin, Maksim Radionov, Aleksandr Mokrov, Dmitry Agapov, Jason Martin, Brandon Edwards, Micah J. Sheller, Sarthak Pati, Prakash Narayana Moorthy, Shih-han Wang, Prashant Shah, Spyridon Bakas

    Abstract: Federated learning (FL) is a computational paradigm that enables organizations to collaborate on machine learning (ML) projects without sharing sensitive data, such as, patient records, financial data, or classified secrets. Open Federated Learning (OpenFL https://github.com/intel/openfl) is an open-source framework for training ML algorithms using the data-private collaborative learning paradigm… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

  13. arXiv:2105.05874  [pdf, other

    eess.IV cs.CV

    The Federated Tumor Segmentation (FeTS) Challenge

    Authors: Sarthak Pati, Ujjwal Baid, Maximilian Zenk, Brandon Edwards, Micah Sheller, G. Anthony Reina, Patrick Foley, Alexey Gruzdev, Jason Martin, Shadi Albarqouni, Yong Chen, Russell Taki Shinohara, Annika Reinke, David Zimmerer, John B. Freymann, Justin S. Kirby, Christos Davatzikos, Rivka R. Colen, Aikaterini Kotrotsou, Daniel Marcus, Mikhail Milchenko, Arash Nazeri, Hassan Fathallah-Shaykh, Roland Wiest, Andras Jakab , et al. (7 additional authors not shown)

    Abstract: This manuscript describes the first challenge on Federated Learning, namely the Federated Tumor Segmentation (FeTS) challenge 2021. International challenges have become the standard for validation of biomedical image analysis methods. However, the actual performance of participating (even the winning) algorithms on "real-world" clinical data often remains unclear, as the data included in challenge… ▽ More

    Submitted 13 May, 2021; v1 submitted 12 May, 2021; originally announced May 2021.

  14. GaNDLF: A Generally Nuanced Deep Learning Framework for Scalable End-to-End Clinical Workflows in Medical Imaging

    Authors: Sarthak Pati, Siddhesh P. Thakur, İbrahim Ethem Hamamcı, Ujjwal Baid, Bhakti Baheti, Megh Bhalerao, Orhun Güley, Sofia Mouchtaris, David Lang, Spyridon Thermos, Karol Gotkowski, Camila González, Caleb Grenko, Alexander Getka, Brandon Edwards, Micah Sheller, Junwen Wu, Deepthi Karkada, Ravi Panchumarthy, Vinayak Ahluwalia, Chunrui Zou, Vishnu Bashyam, Yuemeng Li, Babak Haghighi, Rhea Chitalia , et al. (17 additional authors not shown)

    Abstract: Deep Learning (DL) has the potential to optimize machine learning in both the scientific and clinical communities. However, greater expertise is required to develop DL algorithms, and the variability of implementations hinders their reproducibility, translation, and deployment. Here we present the community-driven Generally Nuanced Deep Learning Framework (GaNDLF), with the goal of lowering these… ▽ More

    Submitted 16 May, 2023; v1 submitted 25 February, 2021; originally announced March 2021.

    Comments: Deep Learning, Framework, Segmentation, Regression, Classification, Cross-validation, Data augmentation, Deployment, Clinical, Workflows

    Journal ref: Commun Eng 2, 23 (2023)

  15. arXiv:2102.00115  [pdf, other

    cs.SC math.NA

    Certified evaluations of Hölder continuous functions at roots of polynomials

    Authors: Parker B. Edwards, Jonathan D. Hauenstein, Clifford D. Smyth

    Abstract: Various methods can obtain certified estimates for roots of polynomials. Many applications in science and engineering additionally utilize the value of functions evaluated at roots. For example, critical values are obtained by evaluating an objective function at critical points. For analytic evaluation functions, Newton's method naturally applies to yield certified estimates. These estimates no lo… ▽ More

    Submitted 29 January, 2021; originally announced February 2021.

    Comments: 15 pages, 1 figure, associated software package at https://github.com/P-Edwards/EvalCertification

    MSC Class: 65H14 (Primary) 65H04; 14-04 (Secondary) ACM Class: I.1.2

  16. arXiv:2011.11284  [pdf, other

    astro-ph.EP astro-ph.IM cs.LG

    Peeking inside the Black Box: Interpreting Deep Learning Models for Exoplanet Atmospheric Retrievals

    Authors: Kai Hou Yip, Quentin Changeat, Nikolaos Nikolaou, Mario Morvan, Billy Edwards, Ingo P. Waldmann, Giovanna Tinetti

    Abstract: Deep learning algorithms are growing in popularity in the field of exoplanetary science due to their ability to model highly non-linear relations and solve interesting problems in a data-driven manner. Several works have attempted to perform fast retrievals of atmospheric parameters with the use of machine learning algorithms like deep neural networks (DNNs). Yet, despite their high predictive pow… ▽ More

    Submitted 23 July, 2021; v1 submitted 23 November, 2020; originally announced November 2020.

    Comments: 32 pages, 22 figures. Submitted to AJ. Accepted July 20, 2021

  17. arXiv:2010.15996  [pdf, other

    astro-ph.IM cs.LG

    Lessons Learned from the 1st ARIEL Machine Learning Challenge: Correcting Transiting Exoplanet Light Curves for Stellar Spots

    Authors: Nikolaos Nikolaou, Ingo P. Waldmann, Angelos Tsiaras, Mario Morvan, Billy Edwards, Kai Hou Yip, Giovanna Tinetti, Subhajit Sarkar, James M. Dawson, Vadim Borisov, Gjergji Kasneci, Matej Petkovic, Tomaz Stepisnik, Tarek Al-Ubaidi, Rachel Louise Bailey, Michael Granitzer, Sahib Julka, Roman Kern, Patrick Ofner, Stefan Wagner, Lukas Heppe, Mirko Bunse, Katharina Morik

    Abstract: The last decade has witnessed a rapid growth of the field of exoplanet discovery and characterisation. However, several big challenges remain, many of which could be addressed using machine learning methodology. For instance, the most prolific method for detecting exoplanets and inferring several of their characteristics, transit photometry, is very sensitive to the presence of stellar spots. The… ▽ More

    Submitted 29 October, 2020; originally announced October 2020.

    Comments: 20 pages, 7 figures, 2 tables, Submitted to The Astrophysics Journal (ApJ)

  18. Toward Few-step Adversarial Training from a Frequency Perspective

    Authors: Hans Shih-Han Wang, Cory Cornelius, Brandon Edwards, Jason Martin

    Abstract: We investigate adversarial-sample generation methods from a frequency domain perspective and extend standard $l_{\infty}$ Projected Gradient Descent (PGD) to the frequency domain. The resulting method, which we call Spectral Projected Gradient Descent (SPGD), has better success rate compared to PGD during early steps of the method. Adversarially training models using SPGD achieves greater adversar… ▽ More

    Submitted 13 October, 2020; originally announced October 2020.

    Comments: 9 pages, 9 figures, SPAI'20, ACM ASIACCS 2020

    MSC Class: 68T07; 68T99 ACM Class: I.2.m

    Journal ref: Proceedings of the 1st ACM Workshop on Security and Privacy on Artificial Intelligence (2020)

  19. arXiv:1908.04856  [pdf

    cs.CR

    Exploit Prediction Scoring System (EPSS)

    Authors: Jay Jacobs, Sasha Romanosky, Benjamin Edwards, Michael Roytman, Idris Adjerid

    Abstract: Despite the massive investments in information security technologies and research over the past decades, the information security industry is still immature. In particular, the prioritization of remediation efforts within vulnerability management programs predominantly relies on a mixture of subjective expert opinion, severity scores, and incomplete data. Compounding the need for prioritization is… ▽ More

    Submitted 13 August, 2019; originally announced August 2019.

    Comments: 25 pages, 8 figures, 7 tables, Presented at Blackhat 2019

  20. arXiv:1904.11052  [pdf, other

    cs.CR

    Risky Business: Assessing Security with External Measurements

    Authors: Benjamin Edwards, Jay Jacobs, Stephanie Forrest

    Abstract: Security practices in large organizations are notoriously difficult to assess. The challenge only increases when organizations turn to third parties to provide technology and business services, which typically require tight network integration and sharing of confidential data, potentially increasing the organization's attack surface. The security maturity of an organization describes how well it m… ▽ More

    Submitted 22 May, 2019; v1 submitted 24 April, 2019; originally announced April 2019.

    Comments: Updated data provider capitalization in text abstract

  21. arXiv:1811.03728  [pdf, other

    cs.LG cs.CR stat.ML

    Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering

    Authors: Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy, Biplav Srivastava

    Abstract: While machine learning (ML) models are being increasingly trusted to make decisions in different and varying areas, the safety of systems using such models has become an increasing concern. In particular, ML models are often trained on data from potentially untrustworthy sources, providing adversaries with the opportunity to manipulate them by inserting carefully crafted samples into the training… ▽ More

    Submitted 8 November, 2018; originally announced November 2018.

  22. arXiv:1810.04304  [pdf, other

    cs.LG stat.ML

    Multi-Institutional Deep Learning Modeling Without Sharing Patient Data: A Feasibility Study on Brain Tumor Segmentation

    Authors: Micah J Sheller, G Anthony Reina, Brandon Edwards, Jason Martin, Spyridon Bakas

    Abstract: Deep learning models for semantic segmentation of images require large amounts of data. In the medical imaging domain, acquiring sufficient data is a significant challenge. Labeling medical image data requires expert knowledge. Collaboration between institutions could address this challenge, but sharing medical data to a centralized location faces various legal, privacy, technical, and data-owners… ▽ More

    Submitted 22 October, 2018; v1 submitted 9 October, 2018; originally announced October 2018.

    Comments: MICCAI, Brain Lesion (BrainLes) workshop, September 16, 2018, Granada, Spain

  23. arXiv:1807.01069  [pdf, other

    cs.LG stat.ML

    Adversarial Robustness Toolbox v1.0.0

    Authors: Maria-Irina Nicolae, Mathieu Sinn, Minh Ngoc Tran, Beat Buesser, Ambrish Rawat, Martin Wistuba, Valentina Zantedeschi, Nathalie Baracaldo, Bryant Chen, Heiko Ludwig, Ian M. Molloy, Ben Edwards

    Abstract: Adversarial Robustness Toolbox (ART) is a Python library supporting developers and researchers in defending Machine Learning models (Deep Neural Networks, Gradient Boosted Decision Trees, Support Vector Machines, Random Forests, Logistic Regression, Gaussian Processes, Decision Trees, Scikit-learn Pipelines, etc.) against adversarial threats and helps making AI systems more secure and trustworthy.… ▽ More

    Submitted 15 November, 2019; v1 submitted 3 July, 2018; originally announced July 2018.

    Comments: 34 pages

  24. arXiv:1806.00054  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Defending Against Machine Learning Model Stealing Attacks Using Deceptive Perturbations

    Authors: Taesung Lee, Benjamin Edwards, Ian Molloy, Dong Su

    Abstract: Machine learning models are vulnerable to simple model stealing attacks if the adversary can obtain output labels for chosen inputs. To protect against these attacks, it has been proposed to limit the information provided to the adversary by omitting probability scores, significantly impacting the utility of the provided service. In this work, we illustrate how a service provider can still provide… ▽ More

    Submitted 13 December, 2018; v1 submitted 31 May, 2018; originally announced June 2018.

    Comments: Under review for a peer review conference

  25. Supervised learning of sparse context reconstruction coefficients for data representation and classification

    Authors: Xuejie Liu, Jingbin Wang, Ming Yin, Benjamin Edwards, Peijuan Xu

    Abstract: Context of data points, which is usually defined as the other data points in a data set, has been found to play important roles in data representation and classification. In this paper, we study the problem of using context of a data point for its classification problem. Our work is inspired by the observation that actually only very few data points are critical in the context of a data point for… ▽ More

    Submitted 18 August, 2015; originally announced August 2015.

    Comments: arXiv admin note: substantial text overlap with arXiv:1507.00019

  26. arXiv:1507.00019  [pdf, ps, other

    cs.CV

    Representing data by sparse combination of contextual data points for classification

    Authors: Jingyan Wang, Yihua Zhou, Ming Yin, Shaochang Chen, Benjamin Edwards

    Abstract: In this paper, we study the problem of using contextual da- ta points of a data point for its classification problem. We propose to represent a data point as the sparse linear reconstruction of its context, and learn the sparse context to gather with a linear classifier in a su- pervised way to increase its discriminative ability. We proposed a novel formulation for context learning, by modeling t… ▽ More

    Submitted 18 August, 2015; v1 submitted 30 June, 2015; originally announced July 2015.

  27. arXiv:1410.8772  [pdf, other

    cs.AR cs.DC cs.MS

    Programming the Adapteva Epiphany 64-core Network-on-chip Coprocessor

    Authors: Anish Varghese, Bob Edwards, Gaurav Mitra, Alistair P. Rendell

    Abstract: In the construction of exascale computing systems energy efficiency and power consumption are two of the major challenges. Low-power high performance embedded systems are of increasing interest as building blocks for large scale high- performance systems. However, extracting maximum performance out of such systems presents many challenges. Various aspects from the hardware architecture to the prog… ▽ More

    Submitted 30 October, 2014; originally announced October 2014.

    Comments: 14 pages, submitted to IJHPCA Journal special edition

  28. arXiv:1202.4008  [pdf, other

    cs.NI cs.CR cs.MA

    Modeling Internet-Scale Policies for Cleaning up Malware

    Authors: Steven Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, George Stelle

    Abstract: An emerging consensus among policy makers is that interventions undertaken by Internet Service Providers are the best way to counter the rising incidence of malware. However, assessing the suitability of countermeasures at this scale is hard. In this paper, we use an agent-based model, called ASIM, to investigate the impact of policy interventions at the Autonomous System level of the Internet. Fo… ▽ More

    Submitted 17 February, 2012; originally announced February 2012.

    Comments: 22 pages, 9 Figures, Presented at the Tenth Workshop on the Economics of Information Security, Jun 2011

    ACM Class: K.5.5; K.6.m; C.2.0

  29. arXiv:1202.3993  [pdf, other

    cs.NI cs.SI

    Internet Topology over Time

    Authors: Benjamin Edwards, Steven Hofmeyr, George Stelle, Stephanie Forrest

    Abstract: There are few studies that look closely at how the topology of the Internet evolves over time; most focus on snapshots taken at a particular point in time. In this paper, we investigate the evolution of the topology of the Autonomous Systems graph of the Internet, examining how eight commonly-used topological measures change from January 2002 to January 2010. We find that the distributions of most… ▽ More

    Submitted 17 February, 2012; originally announced February 2012.

    Comments: 6 pages, 5 figures

    ACM Class: C.2.5; H.3.4

  30. arXiv:1202.3987  [pdf, other

    cs.CR cs.SI

    Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions

    Authors: Benjamin Edwards, Tyler Moore, George Stelle, Steven Hofmeyr, Stephanie Forrest

    Abstract: Malware spread among websites and between websites and clients is an increasing problem. Search engines play an important role in directing users to websites and are a natural control point for intervening, using mechanisms such as blacklisting. The paper presents a simple Markov model of malware spread through large populations of websites and studies the effect of two interventions that might be… ▽ More

    Submitted 17 February, 2012; originally announced February 2012.

    Comments: 13 pages, 11 figures

    ACM Class: K.6.5; K.6.m

  31. arXiv:1103.2811  [pdf, ps, other

    cs.LO quant-ph

    Three qubit entanglement within graphical Z/X-calculus

    Authors: Bob Coecke, Bill Edwards

    Abstract: The compositional techniques of categorical quantum mechanics are applied to analyse 3-qubit quantum entanglement. In particular the graphical calculus of complementary observables and corresponding phases due to Duncan and one of the authors is used to construct representative members of the two genuinely tripartite SLOCC classes of 3-qubit entangled states, GHZ and W. This nicely illustrates the… ▽ More

    Submitted 14 March, 2011; originally announced March 2011.

    Comments: In Proceedings HPC 2010, arXiv:1103.2268

    Journal ref: EPTCS 52, 2011, pp. 22-33