Skip to main content

Showing 1–15 of 15 results for author: Clements, J

.
  1. arXiv:2502.00638  [pdf, other

    math.NT

    Cycles and Cuts in Supersingular L-Isogeny Graphs

    Authors: Sarah Arpin, Ross Bowden, James Clements, Wissam Ghantous, Jason T. LeGrow, Krystal Maughan

    Abstract: Supersingular elliptic curve isogeny graphs underlie isogeny-based cryptography. For isogenies of a single prime degree $\ell$, their structure has been investigated graph-theoretically. We generalise the notion of $\ell$-isogeny graphs to $L$-isogeny graphs (studied in the prime field case by Delfs and Galbraith), where $L$ is a set of small primes dictating the allowed isogeny degrees in the gra… ▽ More

    Submitted 1 February, 2025; originally announced February 2025.

  2. arXiv:2406.01425  [pdf, ps, other

    cs.CV

    Adaptive Sensitivity Analysis for Robust Augmentation against Natural Corruptions in Image Segmentation

    Authors: Laura Zheng, Wenjie Wei, Tony Wu, Jacob Clements, Shreelekha Revankar, Andre Harrison, Yu Shen, Ming C. Lin

    Abstract: Achieving robustness in image segmentation models is challenging due to the fine-grained nature of pixel-level classification. These models, which are crucial for many real-time perception applications, particularly struggle when faced with natural corruptions in the wild for autonomous systems. While sensitivity analysis can help us understand how input variables influence model outputs, its appl… ▽ More

    Submitted 16 June, 2025; v1 submitted 3 June, 2024; originally announced June 2024.

    Comments: 9 pages

  3. Finding Orientations of Supersingular Elliptic Curves and Quaternion Orders

    Authors: Sarah Arpin, James Clements, Pierrick Dartois, Jonathan Komada Eriksen, Péter Kutas, Benjamin Wesolowski

    Abstract: Orientations of supersingular elliptic curves encode the information of an endomorphism of the curve. Computing the full endomorphism ring is a known hard problem, so one might consider how hard it is to find one such orientation. We prove that access to an oracle which tells if an elliptic curve is $\mathfrak{O}$-orientable for a fixed imaginary quadratic order $\mathfrak{O}$ provides non-trivial… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

  4. arXiv:2111.03437  [pdf, ps, other

    physics.soc-ph math.DS

    Agent-based modelling of sports riots

    Authors: Alastair J. Clements, Nabil T. Fadai

    Abstract: Riots originating during, or in the aftermath of, sports events can incur significant costs in damages, as well as large-scale panic and injuries. A mathematical description of sports riots is therefore sought to better understand their propagation and limit these physical and financial damages. In this work, we present an agent-based modelling framework that describes the qualitative features of… ▽ More

    Submitted 13 October, 2021; originally announced November 2021.

  5. arXiv:2012.15330  [pdf, other

    q-fin.RM cs.LG

    Sequential Deep Learning for Credit Risk Monitoring with Tabular Financial Data

    Authors: Jillian M. Clements, Di Xu, Nooshin Yousefi, Dmitry Efimov

    Abstract: Machine learning plays an essential role in preventing financial losses in the banking industry. Perhaps the most pertinent prediction task that can result in billions of dollars in losses each year is the assessment of credit risk (i.e., the risk of default on debt). Today, much of the gains from machine learning to predict credit risk are driven by gradient boosted decision tree models. However,… ▽ More

    Submitted 30 December, 2020; originally announced December 2020.

    ACM Class: I.2.1

  6. arXiv:2002.09591  [pdf, other

    cs.SI physics.soc-ph

    Dynamics of large scale networks following a merger

    Authors: John Clements, Babak Farzad, Henryk Fukś

    Abstract: We study the dynamic network of relationships among avatars in the massively multiplayer online game Planetside 2. In the spring of 2014, two separate servers of this game were merged, and as a result, two previously distinct networks were combined into one. We observed the evolution of this network in the seven month period following the merger and report our observations. We found that some stru… ▽ More

    Submitted 21 February, 2020; originally announced February 2020.

    Comments: 8 pages, 17 figures

    Journal ref: T. Ozyer and R. Alhajj (eds), Machine Learning Techniques for Online Social Networks, Lecture Notes in Social Networks, pages 173--193. Springer, 2018

  7. arXiv:1903.11688  [pdf, other

    cs.CR cs.LG

    Rallying Adversarial Techniques against Deep Learning for Network Security

    Authors: Joseph Clements, Yuzhe Yang, Ankur Sharma, Hongxin Hu, Yingjie Lao

    Abstract: Recent advances in artificial intelligence and the increasing need for powerful defensive measures in the domain of network security, have led to the adoption of deep learning approaches for use in network intrusion detection systems. These methods have achieved superior performance against conventional network attacks, which enable the deployment of practical security systems to unique and dynami… ▽ More

    Submitted 24 October, 2021; v1 submitted 27 March, 2019; originally announced March 2019.

    Comments: accepted by IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2021)

  8. arXiv:1810.03010  [pdf, other

    cs.CR

    Optimal Sabotage Attack on Composite Material Parts

    Authors: Bikash Ranabhat, Joseph Clements, Jacob Gatlin, Kuang-Ting Hsiao, Mark Yampolskiy

    Abstract: Industry 4.0 envisions a fully automated manufacturing environment, in which computerized manufacturing equipment--Cyber-Physical Systems (CPS)--performs all tasks. These machines are open to a variety of cyber and cyber-physical attacks, including sabotage. In the manufacturing context, sabotage attacks aim to damage equipment or degrade a manufactured part's mechanical properties. In this paper,… ▽ More

    Submitted 6 October, 2018; originally announced October 2018.

  9. arXiv:1806.05768  [pdf, other

    cs.LG cs.CR stat.ML

    Hardware Trojan Attacks on Neural Networks

    Authors: Joseph Clements, Yingjie Lao

    Abstract: With the rising popularity of machine learning and the ever increasing demand for computational power, there is a growing need for hardware optimized implementations of neural networks and other machine learning models. As the technology evolves, it is also plausible that machine learning or artificial intelligence will soon become consumer electronic products and military equipment, in the form o… ▽ More

    Submitted 14 June, 2018; originally announced June 2018.

  10. arXiv:1502.07786  [pdf, other

    cs.CR

    Generating 56-bit passwords using Markov Models (and Charles Dickens)

    Authors: John Clements

    Abstract: We describe a password generation scheme based on Markov models built from English text (specifically, Charles Dickens' *A Tale Of Two Cities*). We show a (linear-running-time) bijection between random bitstrings of any desired length and generated text, ensuring that all passwords are generated with equal probability. We observe that the generated passwords appear to strike a reasonable balance b… ▽ More

    Submitted 26 February, 2015; originally announced February 2015.

    Comments: 5 pages, 2 figures

    ACM Class: K.6.5; E.4; D.4.6; K.4.2; H.1.2; I.2.7

  11. arXiv:1403.1211  [pdf

    physics.optics physics.ed-ph physics.pop-ph

    Foldscope: Origami-based paper microscope

    Authors: James Cybulski, James Clements, Manu Prakash

    Abstract: Here we describe an ultra-low-cost origami-based approach for large-scale manufacturing of microscopes, specifically demonstrating brightfield, darkfield, and fluorescence microscopes. Merging principles of optical design with origami enables high-volume fabrication of microscopes from 2D media. Flexure mechanisms created via folding enable a flat compact design. Structural loops in folded paper p… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

  12. arXiv:1108.4706  [pdf, other

    cs.PL

    Stepping Lazy Programs

    Authors: Stephen Chang, John Clements, Eli Barzilay, Matthias Felleisen

    Abstract: Debugging lazy functional programs poses serious challenges. In support of the "stop, examine, and resume" debugging style of imperative languages, some debugging tools abandon lazy evaluation. Other debuggers preserve laziness but present it in a way that may confuse programmers because the focus of evaluation jumps around in a seemingly random manner. In this paper, we introduce a supplemental… ▽ More

    Submitted 23 August, 2011; originally announced August 2011.

    Comments: submitted to ICFP 2011

  13. arXiv:hep-th/0407091  [pdf, ps, other

    hep-th

    Supersymmetry and Phenomenology of Heterotic and Type I Superstring Models

    Authors: D. J. Clements

    Abstract: This thesis is the discussion of heterotic and type I string phenomenology. The heterotic string model is based on the free--fermionic formalism. This is the first case where non--Abelian VEV's, as opposed to singlet VEV's are required for the cancellation of the Fayet--Iliopoulos term. It is noted that non--Abelian fields are the only fields that can give rise to the satisfaction of the D--flat… ▽ More

    Submitted 12 July, 2004; originally announced July 2004.

  14. Open Descendants of NAHE-based free fermionic and Type I Z2^n models

    Authors: David J. Clements, Alon E. Faraggi

    Abstract: The NAHE-set, that underlies the realistic free fermionic models, corresponds to Z2XZ2 orbifold at an enhanced symmetry point, with (h_{11},h_{21})=(27,3). Alternatively, a manifold with the same data is obtained by starting with a Z2XZ2 orbifold at a generic point on the lattice and adding a freely acting Z2 involution. In this paper we study type I orientifolds on the manifolds that underly th… ▽ More

    Submitted 25 September, 2003; v1 submitted 1 February, 2003; originally announced February 2003.

    Comments: 43 pages. Standard LaTeX. 3 figures. Substantial revisions

    Report number: OUTP-03-04P

    Journal ref: Int.J.Mod.Phys.A19:2931-2970,2004

  15. Flat Directions in Left-Right Symmetric String Derived Models

    Authors: Gerald B. Cleaver, David J. Clements, Alon E. Faraggi

    Abstract: The only string models known to reproduce the Minimal Supersymmetric Standard Model in the low energy effective field theory are those constructed in the free fermionic formulation. We demonstrate the existence of quasi-realistic free fermionic heterotic-string models in which supersymmetric singlet flat directions do not exist. This raises the possibility that supersymmetry is broken perturbati… ▽ More

    Submitted 8 April, 2002; v1 submitted 5 June, 2001; originally announced June 2001.

    Comments: 20 pages. Standard Latex. References added. To appear in PRD

    Report number: ACT-09/01, BU-HEPP-01/02, CTP-TAMU-15/01, OUTP-01-27P

    Journal ref: Phys.Rev. D65 (2002) 106003