Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–18 of 18 results for author: Wood, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18133  [pdf, other

    cs.CL

    ConvoCache: Smart Re-Use of Chatbot Responses

    Authors: Conor Atkins, Ian Wood, Mohamed Ali Kaafar, Hassan Asghar, Nardine Basta, Michal Kepkowski

    Abstract: We present ConvoCache, a conversational caching system that solves the problem of slow and expensive generative AI models in spoken chatbots. ConvoCache finds a semantically similar prompt in the past and reuses the response. In this paper we evaluate ConvoCache on the DailyDialog dataset. We find that ConvoCache can apply a UniEval coherence threshold of 90% and respond to 89% of prompts using th… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    Comments: Accepted to appear at Interspeech 2024

  2. arXiv:2406.02801  [pdf, other

    cs.SI

    SenTopX: Benchmark for User Sentiment on Various Topics

    Authors: Hina Qayyum, Muhammad Ikram, Benjamin Zhao, Ian Wood, Mohamad Ali Kaafar, Nicolas Kourtellis

    Abstract: Toxic sentiment analysis on Twitter (X) often focuses on specific topics and events such as politics and elections. Datasets of toxic users in such research are typically gathered through lexicon-based techniques, providing only a cross-sectional view. his approach has a tight confine for studying toxic user behavior and effective platform moderation. To identify users consistently spreading toxic… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  3. Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users

    Authors: Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kaafar

    Abstract: In the pursuit of bolstering user safety, social media platforms deploy active moderation strategies, including content removal and user suspension. These measures target users engaged in discussions marked by hate speech or toxicity, often linked to specific keywords or hashtags. Nonetheless, the increasing prevalence of toxicity indicates that certain users adeptly circumvent these measures. Thi… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: 2023 IEEE International Conference on Big Data (BigData)

  4. arXiv:2308.08096  [pdf, other

    cs.CR

    Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study

    Authors: Michal Kepkowski, Maciej Machulak, Ian Wood, Dali Kaafar

    Abstract: Fast Identity Online 2 (FIDO2), a modern authentication protocol, is gaining popularity as a default strong authentication mechanism. It has been recognized as a leading candidate to overcome limitations (e.g., it is phishing resistant) of existing authentication solutions. However, the task of deprecating weak methods such as password-based authentication is not trivial and requires a comprehensi… ▽ More

    Submitted 13 September, 2023; v1 submitted 15 August, 2023; originally announced August 2023.

    Comments: to be published in the IEEE Secure Development Conference 2023

  5. arXiv:2307.01965  [pdf, other

    cs.CR

    An analysis of scam baiting calls: Identifying and extracting scam stages and scripts

    Authors: Ian Wood, Michal Kepkowski, Leron Zinatullin, Travis Darnley, Mohamed Ali Kaafar

    Abstract: Phone scams remain a difficult problem to tackle due to the combination of protocol limitations, legal enforcement challenges and advances in technology enabling attackers to hide their identities and reduce costs. Scammers use social engineering techniques to manipulate victims into revealing their personal details, purchasing online vouchers or transferring funds, causing significant financial l… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

  6. arXiv:2304.05371  [pdf, other

    cs.CL cs.AI cs.CR cs.LG

    Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories

    Authors: Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian Wood, Mohamed Ali Kaafar

    Abstract: One of the new developments in chit-chat bots is a long-term memory mechanism that remembers information from past conversations for increasing engagement and consistency of responses. The bot is designed to extract knowledge of personal nature from their conversation partner, e.g., stating preference for a particular color. In this paper, we show that this memory mechanism can result in unintende… ▽ More

    Submitted 6 April, 2023; originally announced April 2023.

    Comments: To be published in 21st International Conference on Applied Cryptography and Network Security, ACNS 2023

  7. A longitudinal study of the top 1% toxic Twitter profiles

    Authors: Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kaafar, Nicolas Kourtellis

    Abstract: Toxicity is endemic to online social networks including Twitter. It follows a Pareto like distribution where most of the toxicity is generated by a very small number of profiles and as such, analyzing and characterizing these toxic profiles is critical. Prior research has largely focused on sporadic, event centric toxic content to characterize toxicity on the platform. Instead, we approach the pro… ▽ More

    Submitted 25 March, 2023; originally announced March 2023.

  8. arXiv:2211.02245  [pdf, other

    cs.CR cs.AI cs.LG

    Unintended Memorization and Timing Attacks in Named Entity Recognition Models

    Authors: Rana Salal Ali, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Dali Kaafar

    Abstract: Named entity recognition models (NER), are widely used for identifying named entities (e.g., individuals, locations, and other information) in text documents. Machine learning based NER models are increasingly being applied in privacy-sensitive applications that need automatic and scalable identification of sensitive information to redact text for data sharing. In this paper, we study the setting… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

    Comments: This is the full version of the paper with the same title accepted for publication in the Proceedings of the 23rd Privacy Enhancing Technologies Symposium, PETS 2023

  9. arXiv:2205.08071  [pdf, other

    cs.CR

    How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy

    Authors: Michal Kepkowski, Lucjan Hanzlik, Ian Wood, Mohamed Ali Kaafar

    Abstract: This paper presents a timing attack on the FIDO2 (Fast IDentity Online) authentication protocol that allows attackers to link user accounts stored in vulnerable authenticators, a serious privacy concern. FIDO2 is a new standard specified by the FIDO industry alliance for secure token online authentication. It complements the W3C WebAuthn specification by providing means to use a USB token or other… ▽ More

    Submitted 16 May, 2022; originally announced May 2022.

    Comments: to be published in the 22nd Privacy Enhancing Technologies Symposium (PETS 2022)

  10. arXiv:2202.07853  [pdf, other

    cs.SI cs.CY

    A deep dive into the consistently toxic 1% of Twitter

    Authors: Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kaafar, Nicolas Kourtellis

    Abstract: Misbehavior in online social networks (OSN) is an ever-growing phenomenon. The research to date tends to focus on the deployment of machine learning to identify and classify types of misbehavior such as bullying, aggression, and racism to name a few. The main goal of identification is to curb natural and mechanical misconduct and make OSNs a safer place for social discourse. Going beyond past work… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

  11. arXiv:2201.07552  [pdf, other

    q-bio.QM cs.CY cs.SI stat.CO

    Small Cohort of Epilepsy Patients Showed Increased Activity on Facebook before Sudden Unexpected Death

    Authors: Ian B. Wood, Rion Brattig Correia, Wendy R. Miller, Luis M. Rocha

    Abstract: Sudden Unexpected Death in Epilepsy (SUDEP) remains a leading cause of death in people with epilepsy. Despite the constant risk for patients and bereavement to family members, to date the physiological mechanisms of SUDEP remain unknown. Here we explore the potential to identify putative predictive signals of SUDEP from online digital behavioral data using text and sentiment analysis. Specifically… ▽ More

    Submitted 19 January, 2022; originally announced January 2022.

    Comments: Submitted to Epilepsy & Behavior

    MSC Class: 62P10 (Primary) 92D50; 68U15; 92D30 (Secondary) ACM Class: J.3; I.5.4

  12. arXiv:2101.09865  [pdf, other

    cs.CV cs.CL

    ECOL-R: Encouraging Copying in Novel Object Captioning with Reinforcement Learning

    Authors: Yufei Wang, Ian D. Wood, Stephen Wan, Mark Johnson

    Abstract: Novel Object Captioning is a zero-shot Image Captioning task requiring describing objects not seen in the training captions, but for which information is available from external object detectors. The key challenge is to select and describe all salient detected novel objects in the input images. In this paper, we focus on this challenge and propose the ECOL-R model (Encouraging Copying of Object La… ▽ More

    Submitted 24 January, 2021; originally announced January 2021.

    Comments: long paper accepted @ EACL-2021 camera ready version

  13. Mining social media data for biomedical signals and health-related behavior

    Authors: Rion Brattig Correia, Ian B. Wood, Johan Bollen, Luis M. Rocha

    Abstract: Social media data has been increasingly used to study biomedical and health-related phenomena. From cohort level discussions of a condition to planetary level analyses of sentiment, social media has provided scientists with unprecedented amounts of data to study human behavior and response associated with a variety of health conditions and medical treatments. Here we review recent work in mining s… ▽ More

    Submitted 28 January, 2020; originally announced January 2020.

    Comments: To appear in the Annual Review of Biomedical Data Science

    ACM Class: K.4; I.7

    Journal ref: Annual Review of Biomedical Data Science, 3:1 (2020)

  14. arXiv:1902.04613  [pdf, other

    cs.SI physics.soc-ph q-fin.GN

    Global labor flow network reveals the hierarchical organization and dynamics of geo-industrial clusters in the world economy

    Authors: Jaehyuk Park, Ian Wood, Elise Jing, Azadeh Nematzadeh, Souvik Ghosh, Michael Conover, Yong-Yeol Ahn

    Abstract: Groups of firms often achieve a competitive advantage through the formation of geo-industrial clusters. Although many exemplary clusters, such as Hollywood or Silicon Valley, have been frequently studied, systematic approaches to identify and analyze the hierarchical structure of the geo-industrial clusters at the global scale are rare. In this work, we use LinkedIn's employment histories of more… ▽ More

    Submitted 19 March, 2019; v1 submitted 12 February, 2019; originally announced February 2019.

    Journal ref: Nature Communicationsvolume 10, Article number: 3449 (2019)

  15. arXiv:1707.03959  [pdf

    cs.SI cs.CY q-bio.PE

    Human Sexual Cycles are Driven by Culture and Match Collective Moods

    Authors: Ian B. Wood, Pedro Leal Varela, Johan Bollen, Luis M. Rocha, Joana Gonçalves-Sá

    Abstract: It is a long-standing question whether human sexual and reproductive cycles are affected predominantly by biology or culture. The literature is mixed with respect to whether biological or cultural factors best explain the reproduction cycle phenomenon, with biological explanations dominating the argument. The biological hypothesis proposes that human reproductive cycles are an adaptation to the se… ▽ More

    Submitted 27 October, 2017; v1 submitted 12 July, 2017; originally announced July 2017.

    Comments: Main Paper: 21 pages, 4 figures Supplementary Material: 66 pages, 15 figures, 13 tables

  16. Element-centric clustering comparison unifies overlaps and hierarchy

    Authors: Alexander J. Gates, Ian B. Wood, William P. Hetrick, Yong-Yeol Ahn

    Abstract: Clustering is one of the most universal approaches for understanding complex data. A pivotal aspect of clustering analysis is quantitatively comparing clusterings; clustering comparison is the basis for many tasks such as clustering evaluation, consensus clustering, and tracking the temporal evolution of clusters. In particular, the extrinsic evaluation of clustering methods requires comparing the… ▽ More

    Submitted 12 June, 2019; v1 submitted 19 June, 2017; originally announced June 2017.

    Journal ref: Scientific Reports 9, 8574 (2019)

  17. arXiv:1406.6873  [pdf, other

    cs.RO cs.HC

    Designing a minimalist socially aware robotic agent for the home

    Authors: Matthew R. Francisco, Ian Wood, Selma Šabanović, Luis M. Rocha

    Abstract: We present a minimalist social robot that relies on long timeseries of low resolution data such as mechanical vibration, temperature, lighting, sounds and collisions. Our goal is to develop an experimental system for growing socially situated robotic agents whose behavioral repertoire is subsumed by the social order of the space. To get there we are designing robots that use their simple sensors a… ▽ More

    Submitted 26 June, 2014; originally announced June 2014.

    Comments: 8 pages, 10 figures, To be published in the ALIFE 14 conference proceedings

  18. arXiv:1111.3854  [pdf, ps, other

    cs.IT

    (Non-)Equivalence of Universal Priors

    Authors: Ian Wood, Peter Sunehag, Marcus Hutter

    Abstract: Ray Solomonoff invented the notion of universal induction featuring an aptly termed "universal" prior probability function over all possible computable environments. The essential property of this prior was its ability to dominate all other such priors. Later, Levin introduced another construction --- a mixture of all possible priors or `universal mixture'. These priors are well known to be equiva… ▽ More

    Submitted 16 November, 2011; originally announced November 2011.

    Comments: 10 LaTeX pages, 1 figure