Skip to main content

Showing 1–9 of 9 results for author: Dillon, R

.
  1. arXiv:2505.05015  [pdf

    cs.LG cs.AI cs.CR

    An Agent-Based Modeling Approach to Free-Text Keyboard Dynamics for Continuous Authentication

    Authors: Roberto Dillon, Arushi

    Abstract: Continuous authentication systems leveraging free-text keyboard dynamics offer a promising additional layer of security in a multifactor authentication setup that can be used in a transparent way with no impact on user experience. This study investigates the efficacy of behavioral biometrics by employing an Agent-Based Model (ABM) to simulate diverse typing profiles across mechanical and membrane… ▽ More

    Submitted 8 May, 2025; originally announced May 2025.

    Comments: 16 pages, 5 figures, 12 tables

    MSC Class: 68T10; 62H30 ACM Class: I.2.6; I.5.4; I.6.3

  2. arXiv:2410.02955  [pdf, other

    cs.AI cs.AR cs.ET cs.HC

    AiBAT: Artificial Intelligence/Instructions for Build, Assembly, and Test

    Authors: Benjamin Nuernberger, Anny Liu, Heather Stefanini, Richard Otis, Amanda Towler, R. Peter Dillon

    Abstract: Instructions for Build, Assembly, and Test (IBAT) refers to the process used whenever any operation is conducted on hardware, including tests, assembly, and maintenance. Currently, the generation of IBAT documents is time-intensive, as users must manually reference and transfer information from engineering diagrams and parts lists into IBAT instructions. With advances in machine learning and compu… ▽ More

    Submitted 3 October, 2024; originally announced October 2024.

    Comments: 9 pages, 6 figures, 2 tables

  3. arXiv:2308.06963  [pdf

    cs.CY

    The Future of Cybersecurity in Southeast Asia along the Maritime Silk Road

    Authors: Roberto Dillon

    Abstract: This paper proposes an analysis of the prospects of the cyber security industry and educational ecosystems in four Southeast Asian countries, namely Vietnam, Singapore, Malaysia, and Indonesia, which are along the Maritime Silk Road, by using two novel metrics: the "Cybersecurity Education Prospects Index" (CEPI) and the "Cybersecurity Industry Prospects Index" (CIPI). The CEPI evaluates the state… ▽ More

    Submitted 14 August, 2023; originally announced August 2023.

    Comments: 8 pages, 2 figures, 8 tables

    ACM Class: K.4.0; K.7.0

  4. arXiv:2305.11198  [pdf

    q-bio.QM

    Facilitating Bioinformatics Reproducibility

    Authors: Christopher R. Keefe, Matthew R. Dillon, Chloe Herman, Mary Jewell, Colin V. Wood, Evan Bolyen, J. Gregory Caporaso

    Abstract: Study reproducibility is essential to corroborate, build on, and learn from the results of scientific research but is notoriously challenging in bioinformatics, which often involves large data sets and complex analytic workflows involving many different tools. Additionally many biologists aren't trained in how to effectively record their bioinformatics analysis steps to ensure reproducibility, so… ▽ More

    Submitted 18 May, 2023; originally announced May 2023.

    Comments: 5 pages, 2 figures

  5. arXiv:2208.01041  [pdf

    eess.AS cs.HC cs.LG cs.MM cs.SD

    Voice Analysis for Stress Detection and Application in Virtual Reality to Improve Public Speaking in Real-time: A Review

    Authors: Arushi, Roberto Dillon, Ai Ni Teoh, Denise Dillon

    Abstract: Stress during public speaking is common and adversely affects performance and self-confidence. Extensive research has been carried out to develop various models to recognize emotional states. However, minimal research has been conducted to detect stress during public speaking in real time using voice analysis. In this context, the current review showed that the application of algorithms was not pr… ▽ More

    Submitted 31 July, 2022; originally announced August 2022.

    Comments: 41 pages, 7 figures, 4 tables

    ACM Class: I.6; K.3; K.4; A.2

  6. arXiv:2208.00235  [pdf

    cs.CR

    'PeriHack': Designing a Serious Game for Cybersecurity Awareness

    Authors: Roberto Dillon, Arushi

    Abstract: This paper describes the design process for the cybersecurity serious game 'PeriHack'. Publicly released under a CC (BY-NC-SA) license, PeriHack is a board and card game for two players or teams that simulates the struggle between a red team (attackers) and a blue team (defenders). The game requires players to explore a sample network looking for vulnerabilities and then chain different attacks to… ▽ More

    Submitted 30 July, 2022; originally announced August 2022.

    Comments: 5 pages, 6 figures, 2 tables. For associated files see https://github.com/rdillon73/PeriHack

  7. The u-index: a simple metric to objectively measure academic impact of individual researchers

    Authors: Roberto Dillon

    Abstract: This short paper introduces the u-index, a simple and objective metric to evaluate the impact and relevance of academic research output, as a possible alternative to widespread metrics such as the h-index or the i10-index. The proposed index is designed to address possible issues with standard metrics such as inflated ratings resulting from self-citations or by means of extended co-authorship numb… ▽ More

    Submitted 2 June, 2022; v1 submitted 30 May, 2022; originally announced May 2022.

    Comments: 3 pages, 1 table, no figures

  8. arXiv:2102.11938  [pdf, other

    cs.AI cs.LG

    Baby Intuitions Benchmark (BIB): Discerning the goals, preferences, and actions of others

    Authors: Kanishk Gandhi, Gala Stojnic, Brenden M. Lake, Moira R. Dillon

    Abstract: To achieve human-like common sense about everyday life, machine learning systems must understand and reason about the goals, preferences, and actions of other agents in the environment. By the end of their first year of life, human infants intuitively achieve such common sense, and these cognitive achievements lay the foundation for humans' rich and complex understanding of the mental states of ot… ▽ More

    Submitted 11 February, 2022; v1 submitted 23 February, 2021; originally announced February 2021.

    Comments: Published in Advances in Neural Information Processing Systems (NeurIPS) 34

  9. Compositionally Graded SS316 to C300 Maraging Steel using Additive Manufacturing

    Authors: A. Ben-Artzy, A. Reichardt, J-P. Borgonia, R. P. Dillon, B. McEnerney, A. A. Shapiro, P. Hosemann

    Abstract: Joining of dissimilar metals is required for numerous applications in industries such as chemical, energy and automotive. It is challenging due to differences in melting point, density, and thermal expansion of the metals being joined. Common welding techniques involve limiting melting and solidification to a narrow area leading to high thermal stresses and potentially brittle intermetallic phases… ▽ More

    Submitted 20 January, 2021; originally announced January 2021.