-
From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in the Age of LLMs
Authors:
Alsharif Abuadbba,
Chris Hicks,
Kristen Moore,
Vasilios Mavroudis,
Burak Hasircioglu,
Diksha Goel,
Piers Jennings
Abstract:
Large Language Models (LLMs) are set to reshape cybersecurity by augmenting red and blue team operations. Red teams can exploit LLMs to plan attacks, craft phishing content, simulate adversaries, and generate exploit code. Conversely, blue teams may deploy them for threat intelligence synthesis, root cause analysis, and streamlined documentation. This dual capability introduces both transformative…
▽ More
Large Language Models (LLMs) are set to reshape cybersecurity by augmenting red and blue team operations. Red teams can exploit LLMs to plan attacks, craft phishing content, simulate adversaries, and generate exploit code. Conversely, blue teams may deploy them for threat intelligence synthesis, root cause analysis, and streamlined documentation. This dual capability introduces both transformative potential and serious risks.
This position paper maps LLM applications across cybersecurity frameworks such as MITRE ATT&CK and the NIST Cybersecurity Framework (CSF), offering a structured view of their current utility and limitations. While LLMs demonstrate fluency and versatility across various tasks, they remain fragile in high-stakes, context-heavy environments. Key limitations include hallucinations, limited context retention, poor reasoning, and sensitivity to prompts, which undermine their reliability in operational settings.
Moreover, real-world integration raises concerns around dual-use risks, adversarial misuse, and diminished human oversight. Malicious actors could exploit LLMs to automate reconnaissance, obscure attack vectors, and lower the technical threshold for executing sophisticated attacks.
To ensure safer adoption, we recommend maintaining human-in-the-loop oversight, enhancing model explainability, integrating privacy-preserving mechanisms, and building systems robust to adversarial exploitation. As organizations increasingly adopt AI driven cybersecurity, a nuanced understanding of LLMs' risks and operational impacts is critical to securing their defensive value while mitigating unintended consequences.
△ Less
Submitted 16 June, 2025;
originally announced June 2025.
-
Co-Evolutionary Defence of Active Directory Attack Graphs via GNN-Approximated Dynamic Programming
Authors:
Diksha Goel,
Hussain Ahmad,
Kristen Moore,
Mingyu Guo
Abstract:
Modern enterprise networks increasingly rely on Active Directory (AD) for identity and access management. However, this centralization exposes a single point of failure, allowing adversaries to compromise high-value assets. Existing AD defense approaches often assume static attacker behavior, but real-world adversaries adapt dynamically, rendering such methods brittle. To address this, we model at…
▽ More
Modern enterprise networks increasingly rely on Active Directory (AD) for identity and access management. However, this centralization exposes a single point of failure, allowing adversaries to compromise high-value assets. Existing AD defense approaches often assume static attacker behavior, but real-world adversaries adapt dynamically, rendering such methods brittle. To address this, we model attacker-defender interactions in AD as a Stackelberg game between an adaptive attacker and a proactive defender. We propose a co-evolutionary defense framework that combines Graph Neural Network Approximated Dynamic Programming (GNNDP) to model attacker strategies, with Evolutionary Diversity Optimization (EDO) to generate resilient blocking strategies. To ensure scalability, we introduce a Fixed-Parameter Tractable (FPT) graph reduction method that reduces complexity while preserving strategic structure. Our framework jointly refines attacker and defender policies to improve generalization and prevent premature convergence. Experiments on synthetic AD graphs show near-optimal results (within 0.1 percent of optimality on r500) and improved performance on larger graphs (r1000 and r2000), demonstrating the framework's scalability and effectiveness.
△ Less
Submitted 16 May, 2025;
originally announced May 2025.
-
Unveiling the Black Box: A Multi-Layer Framework for Explaining Reinforcement Learning-Based Cyber Agents
Authors:
Diksha Goel,
Kristen Moore,
Jeff Wang,
Minjune Kim,
Thanh Thi Nguyen
Abstract:
Reinforcement Learning (RL) agents are increasingly used to simulate sophisticated cyberattacks, but their decision-making processes remain opaque, hindering trust, debugging, and defensive preparedness. In high-stakes cybersecurity contexts, explainability is essential for understanding how adversarial strategies are formed and evolve over time. In this paper, we propose a unified, multi-layer ex…
▽ More
Reinforcement Learning (RL) agents are increasingly used to simulate sophisticated cyberattacks, but their decision-making processes remain opaque, hindering trust, debugging, and defensive preparedness. In high-stakes cybersecurity contexts, explainability is essential for understanding how adversarial strategies are formed and evolve over time. In this paper, we propose a unified, multi-layer explainability framework for RL-based attacker agents that reveals both strategic (MDP-level) and tactical (policy-level) reasoning. At the MDP level, we model cyberattacks as a Partially Observable Markov Decision Processes (POMDPs) to expose exploration-exploitation dynamics and phase-aware behavioural shifts. At the policy level, we analyse the temporal evolution of Q-values and use Prioritised Experience Replay (PER) to surface critical learning transitions and evolving action preferences. Evaluated across CyberBattleSim environments of increasing complexity, our framework offers interpretable insights into agent behaviour at scale. Unlike previous explainable RL methods, which are often post-hoc, domain-specific, or limited in depth, our approach is both agent- and environment-agnostic, supporting use cases ranging from red-team simulation to RL policy debugging. By transforming black-box learning into actionable behavioural intelligence, our framework enables both defenders and developers to better anticipate, analyse, and respond to autonomous cyber threats.
△ Less
Submitted 16 May, 2025;
originally announced May 2025.
-
eARCO: Efficient Automated Root Cause Analysis with Prompt Optimization
Authors:
Drishti Goel,
Raghav Magazine,
Supriyo Ghosh,
Akshay Nambi,
Prathamesh Deshpande,
Xuchao Zhang,
Chetan Bansal,
Saravan Rajmohan
Abstract:
Root cause analysis (RCA) for incidents in large-scale cloud systems is a complex, knowledge-intensive task that often requires significant manual effort from on-call engineers (OCEs). Improving RCA is vital for accelerating the incident resolution process and reducing service downtime and manual efforts. Recent advancements in Large-Language Models (LLMs) have proven to be effective in solving di…
▽ More
Root cause analysis (RCA) for incidents in large-scale cloud systems is a complex, knowledge-intensive task that often requires significant manual effort from on-call engineers (OCEs). Improving RCA is vital for accelerating the incident resolution process and reducing service downtime and manual efforts. Recent advancements in Large-Language Models (LLMs) have proven to be effective in solving different stages of the incident management lifecycle including RCA. However, existing LLM-based RCA recommendations typically leverage default finetuning or retrieval augmented generation (RAG) methods with static, manually designed prompts, which lead to sub-optimal recommendations. In this work, we leverage 'PromptWizard', a state-of-the-art prompt optimization technique, to automatically identify the best optimized prompt instruction that is combined with semantically similar historical examples for querying underlying LLMs during inference. Moreover, by utilizing more than 180K historical incident data from Microsoft, we developed cost-effective finetuned small language models (SLMs) for RCA recommendation generation and demonstrate the power of prompt optimization on such domain-adapted models. Our extensive experimental results show that prompt optimization can improve the accuracy of RCA recommendations by 21% and 13% on 3K test incidents over RAG-based LLMs and finetuned SLMs, respectively. Lastly, our human evaluation with incident owners have demonstrated the efficacy of prompt optimization on RCA recommendation tasks. These findings underscore the advantages of incorporating prompt optimization into AI for Operations (AIOps) systems, delivering substantial gains without increasing computational overhead.
△ Less
Submitted 15 April, 2025;
originally announced April 2025.
-
CyberAlly: Leveraging LLMs and Knowledge Graphs to Empower Cyber Defenders
Authors:
Minjune Kim,
Jeff Wang,
Kristen Moore,
Diksha Goel,
Derui Wang,
Ahmad Mohsin,
Ahmed Ibrahim,
Robin Doss,
Seyit Camtepe,
Helge Janicke
Abstract:
The increasing frequency and sophistication of cyberattacks demand innovative approaches to strengthen defense capabilities. Training on live infrastructure poses significant risks to organizations, making secure, isolated cyber ranges an essential tool for conducting Red vs. Blue Team training events. These events enable security teams to refine their skills without impacting operational environm…
▽ More
The increasing frequency and sophistication of cyberattacks demand innovative approaches to strengthen defense capabilities. Training on live infrastructure poses significant risks to organizations, making secure, isolated cyber ranges an essential tool for conducting Red vs. Blue Team training events. These events enable security teams to refine their skills without impacting operational environments. While such training provides a strong foundation, the ever-evolving nature of cyber threats necessitates additional support for effective defense. To address this challenge, we introduce CyberAlly, a knowledge graph-enhanced AI assistant designed to enhance the efficiency and effectiveness of Blue Teams during incident response. Integrated into our cyber range alongside an open-source SIEM platform, CyberAlly monitors alerts, tracks Blue Team actions, and suggests tailored mitigation recommendations based on insights from prior Red vs. Blue Team exercises. This demonstration highlights the feasibility and impact of CyberAlly in augmenting incident response and equipping defenders to tackle evolving threats with greater precision and confidence.
△ Less
Submitted 10 April, 2025;
originally announced April 2025.
-
Convolutional neural networks for mineral prospecting through alteration mapping with remote sensing data
Authors:
Ehsan Farahbakhsh,
Dakshi Goel,
Dhiraj Pimparkar,
R. Dietmar Muller,
Rohitash Chandra
Abstract:
Traditional geological mapping, based on field observations and rock sample analysis, is inefficient for continuous spatial mapping of features like alteration zones. Deep learning models, such as convolutional neural networks (CNNs), have revolutionised remote sensing data analysis by automatically extracting features for classification and regression tasks. CNNs can detect specific mineralogical…
▽ More
Traditional geological mapping, based on field observations and rock sample analysis, is inefficient for continuous spatial mapping of features like alteration zones. Deep learning models, such as convolutional neural networks (CNNs), have revolutionised remote sensing data analysis by automatically extracting features for classification and regression tasks. CNNs can detect specific mineralogical changes linked to mineralisation by identifying subtle features in remote sensing data. This study uses CNNs with Landsat 8, Landsat 9, and ASTER data to map alteration zones north of Broken Hill, New South Wales, Australia. The model is trained using ground truth data and an automated approach with selective principal component analysis (PCA). We compare CNNs with traditional machine learning models, including k-nearest neighbours, support vector machines, and multilayer perceptron. Results show that ground truth-based training yields more reliable maps, with CNNs slightly outperforming conventional models in capturing spatial patterns. Landsat 9 outperforms Landsat 8 in mapping iron oxide areas using ground truth-trained CNNs, while ASTER data provides the most accurate argillic and propylitic alteration maps. This highlights CNNs' effectiveness in improving geological mapping precision, especially for identifying subtle mineralisation-related alterations.
△ Less
Submitted 24 February, 2025;
originally announced February 2025.
-
Time Warp: The Gap Between Developers' Ideal vs Actual Workweeks in an AI-Driven Era
Authors:
Sukrit Kumar,
Drishti Goel,
Thomas Zimmermann,
Brian Houck,
B. Ashok,
Chetan Bansal
Abstract:
Software developers balance a variety of different tasks in a workweek, yet the allocation of time often differs from what they consider ideal. Identifying and addressing these deviations is crucial for organizations aiming to enhance the productivity and well-being of the developers. In this paper, we present the findings from a survey of 484 software developers at Microsoft, which aims to identi…
▽ More
Software developers balance a variety of different tasks in a workweek, yet the allocation of time often differs from what they consider ideal. Identifying and addressing these deviations is crucial for organizations aiming to enhance the productivity and well-being of the developers. In this paper, we present the findings from a survey of 484 software developers at Microsoft, which aims to identify the key differences between how developers would like to allocate their time during an ideal workweek versus their actual workweek. Our analysis reveals significant deviations between a developer's ideal workweek and their actual workweek, with a clear correlation: as the gap between these two workweeks widens, we observe a decline in both productivity and satisfaction. By examining these deviations in specific activities, we assess their direct impact on the developers' satisfaction and productivity. Additionally, given the growing adoption of AI tools in software engineering, both in the industry and academia, we identify specific tasks and areas that could be strong candidates for automation. In this paper, we make three key contributions: 1) We quantify the impact of workweek deviations on developer productivity and satisfaction 2) We identify individual tasks that disproportionately affect satisfaction and productivity 3) We provide actual data-driven insights to guide future AI automation efforts in software engineering, aligning them with the developers' requirements and ideal workflows for maximizing their productivity and satisfaction.
△ Less
Submitted 21 February, 2025;
originally announced February 2025.
-
Maintenance of Structural Hole Spanners in Dynamic Networks
Authors:
Diksha Goel,
Hong Shen,
Hui Tian,
Mingyu Guo
Abstract:
Structural Hole (SH) spanners are the set of users who bridge different groups of users and are vital in numerous applications. Despite their importance, existing work for identifying SH spanners focuses only on static networks. However, real-world networks are highly dynamic where the underlying structure of the network evolves continuously. Consequently, we study SH spanner problem for dynamic n…
▽ More
Structural Hole (SH) spanners are the set of users who bridge different groups of users and are vital in numerous applications. Despite their importance, existing work for identifying SH spanners focuses only on static networks. However, real-world networks are highly dynamic where the underlying structure of the network evolves continuously. Consequently, we study SH spanner problem for dynamic networks. We propose an efficient solution for updating SH spanners in dynamic networks. Our solution reuses the information obtained during the initial runs of the static algorithm and avoids the recomputations for the nodes unaffected by the updates. Experimental results show that the proposed solution achieves a minimum speedup of 3.24 over recomputation. To the best of our knowledge, this is the first attempt to address the problem of maintaining SH spanners in dynamic networks.
△ Less
Submitted 16 February, 2025;
originally announced February 2025.
-
CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization
Authors:
Derui Wang,
Kristen Moore,
Diksha Goel,
Minjune Kim,
Gang Li,
Yang Li,
Robin Doss,
Minhui Xue,
Bo Li,
Seyit Camtepe,
Liming Zhu
Abstract:
Deep reinforcement learning (DRL) has gained widespread adoption in control and decision-making tasks due to its strong performance in dynamic environments. However, DRL agents are vulnerable to noisy observations and adversarial attacks, and concerns about the adversarial robustness of DRL systems have emerged. Recent efforts have focused on addressing these robustness issues by establishing rigo…
▽ More
Deep reinforcement learning (DRL) has gained widespread adoption in control and decision-making tasks due to its strong performance in dynamic environments. However, DRL agents are vulnerable to noisy observations and adversarial attacks, and concerns about the adversarial robustness of DRL systems have emerged. Recent efforts have focused on addressing these robustness issues by establishing rigorous theoretical guarantees for the returns achieved by DRL agents in adversarial settings. Among these approaches, policy smoothing has proven to be an effective and scalable method for certifying the robustness of DRL agents. Nevertheless, existing certifiably robust DRL relies on policies trained with simple Gaussian augmentations, resulting in a suboptimal trade-off between certified robustness and certified return. To address this issue, we introduce a novel paradigm dubbed \texttt{C}ertified-r\texttt{A}dius-\texttt{M}aximizing \texttt{P}olicy (\texttt{CAMP}) training. \texttt{CAMP} is designed to enhance DRL policies, achieving better utility without compromising provable robustness. By leveraging the insight that the global certified radius can be derived from local certified radii based on training-time statistics, \texttt{CAMP} formulates a surrogate loss related to the local certified radius and optimizes the policy guided by this surrogate loss. We also introduce \textit{policy imitation} as a novel technique to stabilize \texttt{CAMP} training. Experimental results demonstrate that \texttt{CAMP} significantly improves the robustness-return trade-off across various tasks. Based on the results, \texttt{CAMP} can achieve up to twice the certified expected return compared to that of baselines. Our code is available at https://github.com/NeuralSec/camp-robust-rl.
△ Less
Submitted 29 March, 2025; v1 submitted 29 January, 2025;
originally announced January 2025.
-
The Future of AI: Exploring the Potential of Large Concept Models
Authors:
Hussain Ahmad,
Diksha Goel
Abstract:
The field of Artificial Intelligence (AI) continues to drive transformative innovations, with significant progress in conversational interfaces, autonomous vehicles, and intelligent content creation. Since the launch of ChatGPT in late 2022, the rise of Generative AI has marked a pivotal era, with the term Large Language Models (LLMs) becoming a ubiquitous part of daily life. LLMs have demonstrate…
▽ More
The field of Artificial Intelligence (AI) continues to drive transformative innovations, with significant progress in conversational interfaces, autonomous vehicles, and intelligent content creation. Since the launch of ChatGPT in late 2022, the rise of Generative AI has marked a pivotal era, with the term Large Language Models (LLMs) becoming a ubiquitous part of daily life. LLMs have demonstrated exceptional capabilities in tasks such as text summarization, code generation, and creative writing. However, these models are inherently limited by their token-level processing, which restricts their ability to perform abstract reasoning, conceptual understanding, and efficient generation of long-form content. To address these limitations, Meta has introduced Large Concept Models (LCMs), representing a significant shift from traditional token-based frameworks. LCMs use concepts as foundational units of understanding, enabling more sophisticated semantic reasoning and context-aware decision-making. Given the limited academic research on this emerging technology, our study aims to bridge the knowledge gap by collecting, analyzing, and synthesizing existing grey literature to provide a comprehensive understanding of LCMs. Specifically, we (i) identify and describe the features that distinguish LCMs from LLMs, (ii) explore potential applications of LCMs across multiple domains, and (iii) propose future research directions and practical strategies to advance LCM development and adoption.
△ Less
Submitted 8 January, 2025;
originally announced January 2025.
-
Detection and Prevention of Smishing Attacks
Authors:
Diksha Goel
Abstract:
Phishing is an online identity theft technique where attackers steal users personal information, leading to financial losses for individuals and organizations. With the increasing adoption of smartphones, which provide functionalities similar to desktop computers, attackers are targeting mobile users. Smishing, a phishing attack carried out through Short Messaging Service (SMS), has become prevale…
▽ More
Phishing is an online identity theft technique where attackers steal users personal information, leading to financial losses for individuals and organizations. With the increasing adoption of smartphones, which provide functionalities similar to desktop computers, attackers are targeting mobile users. Smishing, a phishing attack carried out through Short Messaging Service (SMS), has become prevalent due to the widespread use of SMS-based services. It involves deceptive messages designed to extract sensitive information. Despite the growing number of smishing attacks, limited research focuses on detecting these threats. This work presents a smishing detection model using a content-based analysis approach. To address the challenge posed by slang, abbreviations, and short forms in text communication, the model normalizes these into standard forms. A machine learning classifier is employed to classify messages as smishing or ham. Experimental results demonstrate the model effectiveness, achieving classification accuracies of 97.14% for smishing and 96.12% for ham messages, with an overall accuracy of 96.20%.
△ Less
Submitted 30 December, 2024;
originally announced January 2025.
-
Machine Learning Driven Smishing Detection Framework for Mobile Security
Authors:
Diksha Goel,
Hussain Ahmad,
Ankit Kumar Jain,
Nikhil Kumar Goel
Abstract:
The increasing reliance on smartphones for communication, financial transactions, and personal data management has made them prime targets for cyberattacks, particularly smishing, a sophisticated variant of phishing conducted via SMS. Despite the growing threat, traditional detection methods often struggle with the informal and evolving nature of SMS language, which includes abbreviations, slang,…
▽ More
The increasing reliance on smartphones for communication, financial transactions, and personal data management has made them prime targets for cyberattacks, particularly smishing, a sophisticated variant of phishing conducted via SMS. Despite the growing threat, traditional detection methods often struggle with the informal and evolving nature of SMS language, which includes abbreviations, slang, and short forms. This paper presents an enhanced content-based smishing detection framework that leverages advanced text normalization techniques to improve detection accuracy. By converting nonstandard text into its standardized form, the proposed model enhances the efficacy of machine learning classifiers, particularly the Naive Bayesian classifier, in distinguishing smishing messages from legitimate ones. Our experimental results, validated on a publicly available dataset, demonstrate a detection accuracy of 96.2%, with a low False Positive Rate of 3.87% and False Negative Rate of 2.85%. This approach significantly outperforms existing methodologies, providing a robust solution to the increasingly sophisticated threat of smishing in the mobile environment.
△ Less
Submitted 9 December, 2024;
originally announced December 2024.
-
Normalized Solutions to the Kirchhoff-Choquard Equations with Combined Growth
Authors:
Divya Goel,
Shilpa Gupta
Abstract:
This paper is devoted to the study of the following nonlocal equation: \begin{equation*} -\left(a+b\|\nabla u\|_{2}^{2(θ-1)}\right) Δu =λu+α(I_μ\ast|u|^{q})|u|^{q-2}u+(I_μ\ast|u|^{p})|u|^{p-2}u \ \hbox{in} \ \mathbb{R}^{N}, \end{equation*} with the prescribed norm $ \int_{\mathbb{R}^{N}} |u|^{2}= c^2,$ where $N\geq 3$, $0<μ<N$, $a,b,c>0$, $1<θ<\frac{2N-μ}{N-2}$,…
▽ More
This paper is devoted to the study of the following nonlocal equation: \begin{equation*} -\left(a+b\|\nabla u\|_{2}^{2(θ-1)}\right) Δu =λu+α(I_μ\ast|u|^{q})|u|^{q-2}u+(I_μ\ast|u|^{p})|u|^{p-2}u \ \hbox{in} \ \mathbb{R}^{N}, \end{equation*} with the prescribed norm $ \int_{\mathbb{R}^{N}} |u|^{2}= c^2,$ where $N\geq 3$, $0<μ<N$, $a,b,c>0$, $1<θ<\frac{2N-μ}{N-2}$, $\frac{2N-μ}{N}<q<p\leq \frac{2N-μ}{N-2}$, $α>0$ is a suitably small real parameter, $λ\in\mathbb{R}$ is the unknown parameter which appears as the Lagrange's multiplier and $I_μ$ is the Riesz potential. We establish existence and multiplicity results and further demonstrate the existence of ground state solutions under the suitable range of $α$. We demonstrate the existence of solution in the case of $q$ is $L^2-$supercritical and $p= \frac{2N-μ}{N-2}$, which is not investigated in the literature till now. In addition, we present certain asymptotic properties of the solutions. To establish the existence results, we rely on variational methods, with a particular focus on the mountain pass theorem, the min-max principle, and Ekeland's variational principle.
△ Less
Submitted 9 December, 2024;
originally announced December 2024.
-
ChatNVD: Advancing Cybersecurity Vulnerability Assessment with Large Language Models
Authors:
Shivansh Chopra,
Hussain Ahmad,
Diksha Goel,
Claudia Szabo
Abstract:
The increasing frequency and sophistication of cybersecurity vulnerabilities in software systems underscores the need for more robust and effective vulnerability assessment methods. However, existing approaches often rely on highly technical and abstract frameworks, which hinder understanding and increase the likelihood of exploitation, resulting in severe cyberattacks. In this paper, we introduce…
▽ More
The increasing frequency and sophistication of cybersecurity vulnerabilities in software systems underscores the need for more robust and effective vulnerability assessment methods. However, existing approaches often rely on highly technical and abstract frameworks, which hinder understanding and increase the likelihood of exploitation, resulting in severe cyberattacks. In this paper, we introduce ChatNVD, a support tool powered by Large Language Models (LLMs) that leverages the National Vulnerability Database (NVD) to generate accessible, context-rich summaries of software vulnerabilities. We develop three variants of ChatNVD, utilizing three prominent LLMs: GPT-4o Mini by OpenAI, LLaMA 3 by Meta, and Gemini 1.5 Pro by Google. To evaluate their performance, we conduct a comparative evaluation focused on their ability to identify, interpret, and explain software vulnerabilities. Our results demonstrate that GPT-4o Mini outperforms the other models, achieving over 92% accuracy and the lowest error rates, making it the most reliable option for real-world vulnerability assessment.
△ Less
Submitted 19 May, 2025; v1 submitted 5 December, 2024;
originally announced December 2024.
-
Least Privilege Access for Persistent Storage Mechanisms in Web Browsers
Authors:
Gayatri Priyadarsini Kancherla,
Dishank Goel,
Abhishek Bichhawat
Abstract:
Web applications often include third-party content and scripts to personalize a user's online experience. These scripts have unrestricted access to a user's private data stored in the browser's persistent storage like cookies, localstorage and IndexedDB, associated with the host page. Various mechanisms have been implemented to restrict access to these storage objects, e.g., content security polic…
▽ More
Web applications often include third-party content and scripts to personalize a user's online experience. These scripts have unrestricted access to a user's private data stored in the browser's persistent storage like cookies, localstorage and IndexedDB, associated with the host page. Various mechanisms have been implemented to restrict access to these storage objects, e.g., content security policy, the HttpOnly attribute with cookies, etc. However, the existing mechanisms provide an all-or-none access and do not work in scenarios where web applications need to allow controlled access to cookies and localstorage objects by third-party scripts. If some of these scripts behave maliciously, they can easily access and modify private user information that are stored in the browser objects. The goal of our work is to design a mechanism to enforce fine-grained control of persistent storage objects. We perform an empirical study of persistent storage access by third-party scripts on Tranco's top 10,000 websites and find that 89.84% of all cookie accesses, 90.98% of all localstorage accesses and 72.49% of IndexedDB accesses are done by third-party scripts. Our approach enforces least privilege access for third-party scripts on these objects to ensure their security by attaching labels to the storage objects that specify which domains are allowed to read from and write to these objects. We implement our approach on the Firefox browser and show that it effectively blocks scripts from other domains, which are not allowed access based on these labels, from accessing the storage objects. We show that our enforcement results in some functionality breakage in websites with the default settings, which can be fixed by correctly labeling the storage objects used by the third-party scripts.
△ Less
Submitted 22 November, 2024;
originally announced November 2024.
-
Label-Free Subjective Player Experience Modelling via Let's Play Videos
Authors:
Dave Goel,
Athar Mahmoudi-Nejad,
Matthew Guzdial
Abstract:
Player Experience Modelling (PEM) is the study of AI techniques applied to modelling a player's experience within a video game. PEM development can be labour-intensive, requiring expert hand-authoring or specialized data collection. In this work, we propose a novel PEM development approach, approximating player experience from gameplay video. We evaluate this approach predicting affect in the game…
▽ More
Player Experience Modelling (PEM) is the study of AI techniques applied to modelling a player's experience within a video game. PEM development can be labour-intensive, requiring expert hand-authoring or specialized data collection. In this work, we propose a novel PEM development approach, approximating player experience from gameplay video. We evaluate this approach predicting affect in the game Angry Birds via a human subject study. We validate that our PEM can strongly correlate with self-reported and sensor measures of affect, demonstrating the potential of this approach.
△ Less
Submitted 3 October, 2024;
originally announced October 2024.
-
Machine Learning Interventions for Weed Detection using Multispectral Imagery and Unmanned Aerial Vehicles -- A Systematic Review
Authors:
Drishti Goel,
Bhavya Kapur,
Prem Prakash Vuppuluri
Abstract:
The growth of weeds poses a significant challenge to agricultural productivity, necessitating efficient and accurate weed detection and management strategies. The combination of multispectral imaging and drone technology has emerged as a promising approach to tackle this issue, enabling rapid and cost-effective monitoring of large agricultural fields. This systematic review surveys and evaluates t…
▽ More
The growth of weeds poses a significant challenge to agricultural productivity, necessitating efficient and accurate weed detection and management strategies. The combination of multispectral imaging and drone technology has emerged as a promising approach to tackle this issue, enabling rapid and cost-effective monitoring of large agricultural fields. This systematic review surveys and evaluates the state-of-the-art in machine learning interventions for weed detection that utilize multispectral images captured by unmanned aerial vehicles. The study describes the various models used for training, features extracted from multi-spectral data, their efficiency and effect on the results, the performance analysis parameters, and also the current challenges faced by researchers in this domain. The review was conducted in accordance with the PRISMA guidelines. Three sources were used to obtain the relevant material, and the screening and data extraction were done on the COVIDENCE platform. The search string resulted in 600 papers from all sources. The review also provides insights into potential research directions and opportunities for further advancements in the field. These insights would serve as a valuable guide for researchers, agricultural scientists, and practitioners in developing precise and sustainable weed management strategies to enhance agricultural productivity and minimize ecological impact.
△ Less
Submitted 13 August, 2024;
originally announced August 2024.
-
PRECISe : Prototype-Reservation for Explainable Classification under Imbalanced and Scarce-Data Settings
Authors:
Vaibhav Ganatra,
Drishti Goel
Abstract:
Deep learning models used for medical image classification tasks are often constrained by the limited amount of training data along with severe class imbalance. Despite these problems, models should be explainable to enable human trust in the models' decisions to ensure wider adoption in high-risk situations. In this paper, we propose PRECISe, an explainable-by-design model meticulously constructe…
▽ More
Deep learning models used for medical image classification tasks are often constrained by the limited amount of training data along with severe class imbalance. Despite these problems, models should be explainable to enable human trust in the models' decisions to ensure wider adoption in high-risk situations. In this paper, we propose PRECISe, an explainable-by-design model meticulously constructed to concurrently address all three challenges. Evaluation on 2 imbalanced medical image datasets reveals that PRECISe outperforms the current state-of-the-art methods on data efficient generalization to minority classes, achieving an accuracy of ~87% in detecting pneumonia in chest x-rays upon training on <60 images only. Additionally, a case study is presented to highlight the model's ability to produce easily interpretable predictions, reinforcing its practical utility and reliability for medical imaging tasks.
△ Less
Submitted 11 August, 2024;
originally announced August 2024.
-
Microservice Vulnerability Analysis: A Literature Review with Empirical Insights
Authors:
Raveen Kanishka Jayalath,
Hussain Ahmad,
Diksha Goel,
Muhammad Shuja Syed,
Faheem Ullah
Abstract:
Microservice architectures are revolutionizing both small businesses and large corporations, igniting a new era of innovation with their exceptional advantages in maintainability, reusability, and scalability. However, these benefits come with significant security challenges, as the increased complexity of service interactions, expanded attack surfaces, and intricate dependency management introduc…
▽ More
Microservice architectures are revolutionizing both small businesses and large corporations, igniting a new era of innovation with their exceptional advantages in maintainability, reusability, and scalability. However, these benefits come with significant security challenges, as the increased complexity of service interactions, expanded attack surfaces, and intricate dependency management introduce a new array of cybersecurity vulnerabilities. While security concerns are mounting, there is a lack of comprehensive research that integrates a review of existing knowledge with empirical analysis of microservice vulnerabilities. This study aims to fill this gap by gathering, analyzing, and synthesizing existing literature on security vulnerabilities associated with microservice architectures. Through a thorough examination of 62 studies, we identify, analyze, and report 126 security vulnerabilities inherent in microservice architectures. This comprehensive analysis enables us to (i) propose a taxonomy that categorizes microservice vulnerabilities based on the distinctive features of microservice architectures; (ii) conduct an empirical analysis by performing vulnerability scans on four diverse microservice benchmark applications using three different scanning tools to validate our taxonomy; and (iii) map our taxonomy vulnerabilities with empirically identified vulnerabilities, providing an in-depth vulnerability analysis at microservice, application, and scanning tool levels. Our study offers crucial guidelines for practitioners and researchers to advance both the state-of-the-practice and the state-of-the-art in securing microservice architectures.
△ Less
Submitted 31 July, 2024;
originally announced August 2024.
-
Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning
Authors:
Diksha Goel,
Kristen Moore,
Mingyu Guo,
Derui Wang,
Minjune Kim,
Seyit Camtepe
Abstract:
This paper addresses a significant gap in Autonomous Cyber Operations (ACO) literature: the absence of effective edge-blocking ACO strategies in dynamic, real-world networks. It specifically targets the cybersecurity vulnerabilities of organizational Active Directory (AD) systems. Unlike the existing literature on edge-blocking defenses which considers AD systems as static entities, our study coun…
▽ More
This paper addresses a significant gap in Autonomous Cyber Operations (ACO) literature: the absence of effective edge-blocking ACO strategies in dynamic, real-world networks. It specifically targets the cybersecurity vulnerabilities of organizational Active Directory (AD) systems. Unlike the existing literature on edge-blocking defenses which considers AD systems as static entities, our study counters this by recognizing their dynamic nature and developing advanced edge-blocking defenses through a Stackelberg game model between attacker and defender. We devise a Reinforcement Learning (RL)-based attack strategy and an RL-assisted Evolutionary Diversity Optimization-based defense strategy, where the attacker and defender improve each other strategy via parallel gameplay. To address the computational challenges of training attacker-defender strategies on numerous dynamic AD graphs, we propose an RL Training Facilitator that prunes environments and neural networks to eliminate irrelevant elements, enabling efficient and scalable training for large graphs. We extensively train the attacker strategy, as a sophisticated attacker model is essential for a robust defense. Our empirical results successfully demonstrate that our proposed approach enhances defender's proficiency in hardening dynamic AD graphs while ensuring scalability for large-scale AD.
△ Less
Submitted 27 June, 2024;
originally announced June 2024.
-
X-lifecycle Learning for Cloud Incident Management using LLMs
Authors:
Drishti Goel,
Fiza Husain,
Aditya Singh,
Supriyo Ghosh,
Anjaly Parayil,
Chetan Bansal,
Xuchao Zhang,
Saravan Rajmohan
Abstract:
Incident management for large cloud services is a complex and tedious process and requires significant amount of manual efforts from on-call engineers (OCEs). OCEs typically leverage data from different stages of the software development lifecycle [SDLC] (e.g., codes, configuration, monitor data, service properties, service dependencies, trouble-shooting documents, etc.) to generate insights for d…
▽ More
Incident management for large cloud services is a complex and tedious process and requires significant amount of manual efforts from on-call engineers (OCEs). OCEs typically leverage data from different stages of the software development lifecycle [SDLC] (e.g., codes, configuration, monitor data, service properties, service dependencies, trouble-shooting documents, etc.) to generate insights for detection, root causing and mitigating of incidents. Recent advancements in large language models [LLMs] (e.g., ChatGPT, GPT-4, Gemini) created opportunities to automatically generate contextual recommendations to the OCEs assisting them to quickly identify and mitigate critical issues. However, existing research typically takes a silo-ed view for solving a certain task in incident management by leveraging data from a single stage of SDLC. In this paper, we demonstrate that augmenting additional contextual data from different stages of SDLC improves the performance of two critically important and practically challenging tasks: (1) automatically generating root cause recommendations for dependency failure related incidents, and (2) identifying ontology of service monitors used for automatically detecting incidents. By leveraging 353 incident and 260 monitor dataset from Microsoft, we demonstrate that augmenting contextual information from different stages of the SDLC improves the performance over State-of-The-Art methods.
△ Less
Submitted 15 February, 2024;
originally announced April 2024.
-
Towards Deep Learning Enabled Cybersecurity Risk Assessment for Microservice Architectures
Authors:
Majid Abdulsatar,
Hussain Ahmad,
Diksha Goel,
Faheem Ullah
Abstract:
The widespread adoption of microservice architectures has given rise to a new set of software security challenges. These challenges stem from the unique features inherent in microservices. It is important to systematically assess and address software security challenges such as software security risk assessment. However, existing approaches prove inefficient in accurately evaluating the security r…
▽ More
The widespread adoption of microservice architectures has given rise to a new set of software security challenges. These challenges stem from the unique features inherent in microservices. It is important to systematically assess and address software security challenges such as software security risk assessment. However, existing approaches prove inefficient in accurately evaluating the security risks associated with microservice architectures. To address this issue, we propose CyberWise Predictor, a framework designed for predicting and assessing security risks associated with microservice architectures. Our framework employs deep learning-based natural language processing models to analyze vulnerability descriptions for predicting vulnerability metrics to assess security risks. Our experimental evaluation shows the effectiveness of CyberWise Predictor, achieving an average accuracy of 92% in automatically predicting vulnerability metrics for new vulnerabilities. Our framework and findings serve as a guide for software developers to identify and mitigate security risks in microservice architectures.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
The Chow Ring Classes of $\mathrm{PGL}_3$ Orbit Closures in $\mathbb{G}(1, 5)$
Authors:
Gaurav Dhruv Goel
Abstract:
The space of all pencils of conics in the plane $\mathbb{P} V$ (where $\dim V = 3$) is a projective Grassmannian $\mathbb{G} (1, \mathbb{P} \mathrm{Sym}^2 V^*)$ and admits a natural $\mathrm{PGL}(V)$ action. It is a classical theorem that this action has exactly eight orbits, and in fact that the orbit of a pencil $\ell \subset \mathbb{P} \mathrm{Sym}^2 V^*$ is determined completely by its positio…
▽ More
The space of all pencils of conics in the plane $\mathbb{P} V$ (where $\dim V = 3$) is a projective Grassmannian $\mathbb{G} (1, \mathbb{P} \mathrm{Sym}^2 V^*)$ and admits a natural $\mathrm{PGL}(V)$ action. It is a classical theorem that this action has exactly eight orbits, and in fact that the orbit of a pencil $\ell \subset \mathbb{P} \mathrm{Sym}^2 V^*$ is determined completely by its position with respect to the Veronese surface $X \subset \mathbb{P} \mathrm{Sym}^2V^*$ of rank 1 conics and its secant variety $S(X) \subset \mathbb{P} \mathrm{Sym}^2 V^*$, which is the cubic fourfold of rank 2 conics. In this paper, we present some geometric descriptions of these orbits. Then, using a mixture of direct enumerative techniques and some Chern class computations, we present a calculation of the classes of the orbit closures in the Chow ring of this Grassmannian (and consequently also of their degrees under the Plücker embedding $\mathbb{G} (1, \mathbb{P} \mathrm{Sym}^2 V^*)\hookrightarrow \mathbb{P} Λ^2 \mathrm{Sym}^2 V^*$).
△ Less
Submitted 27 October, 2023;
originally announced October 2023.
-
Enhancing Network Resilience through Machine Learning-powered Graph Combinatorial Optimization: Applications in Cyber Defense and Information Diffusion
Authors:
Diksha Goel
Abstract:
With the burgeoning advancements of computing and network communication technologies, network infrastructures and their application environments have become increasingly complex. Due to the increased complexity, networks are more prone to hardware faults and highly susceptible to cyber-attacks. Therefore, for rapidly growing network-centric applications, network resilience is essential to minimize…
▽ More
With the burgeoning advancements of computing and network communication technologies, network infrastructures and their application environments have become increasingly complex. Due to the increased complexity, networks are more prone to hardware faults and highly susceptible to cyber-attacks. Therefore, for rapidly growing network-centric applications, network resilience is essential to minimize the impact of attacks and to ensure that the network provides an acceptable level of services during attacks, faults or disruptions. In this regard, this thesis focuses on developing effective approaches for enhancing network resilience. Existing approaches for enhancing network resilience emphasize on determining bottleneck nodes and edges in the network and designing proactive responses to safeguard the network against attacks. However, existing solutions generally consider broader application domains and possess limited applicability when applied to specific application areas such as cyber defense and information diffusion, which are highly popular application domains among cyber attackers.
This thesis aims to design effective, efficient and scalable techniques for discovering bottleneck nodes and edges in the network to enhance network resilience in cyber defense and information diffusion application domains. We first investigate a cyber defense graph optimization problem, i.e., hardening active directory systems by discovering bottleneck edges in the network. We then study the problem of identifying bottleneck structural hole spanner nodes, which are crucial for information diffusion in the network. We transform both problems into graph-combinatorial optimization problems and design machine learning based approaches for discovering bottleneck points vital for enhancing network resilience.
△ Less
Submitted 21 September, 2023;
originally announced October 2023.
-
High energy solutions for $p$-Kirchhoff elliptic problems with Hardy-Littlewood-Sobolev nonlinearity
Authors:
Divya Goel,
Sushmita Rawat,
K. Sreenadh
Abstract:
This article deals with the study of the following Kirchhoff-Choquard problem:
\begin{equation*}
\begin{array}{cc}
\displaystyle M\left(\, \int\limits_{\mathbb{R}^N}|\nabla u|^p\right) (-Δ_p) u + V(x)|u|^{p-2}u = \left(\, \int\limits_{\mathbb{R}^N}\frac{F(u)(y)}{|x-y|^μ}\,dy \right) f(u), \;\;\text{in} \; \mathbb{R}^N,
u > 0, \;\; \text{in} \; \mathbb{R}^N,
\end{array}
\end{equation*}…
▽ More
This article deals with the study of the following Kirchhoff-Choquard problem:
\begin{equation*}
\begin{array}{cc}
\displaystyle M\left(\, \int\limits_{\mathbb{R}^N}|\nabla u|^p\right) (-Δ_p) u + V(x)|u|^{p-2}u = \left(\, \int\limits_{\mathbb{R}^N}\frac{F(u)(y)}{|x-y|^μ}\,dy \right) f(u), \;\;\text{in} \; \mathbb{R}^N,
u > 0, \;\; \text{in} \; \mathbb{R}^N,
\end{array}
\end{equation*}
where $M$ models Kirchhoff-type nonlinear term of the form $M(t) = a + bt^{θ-1}$, where $a, b > 0$ are given constants; $1<p<N$, $Δ_p = \text{div}(|\nabla u|^{p-2}\nabla u)$ is the $p$-Laplacian operator; potential $V \in C^2(\mathbb{R}^N)$; $f$ is monotonic function with suitable growth conditions. We obtain the existence of a positive high energy solution for $θ\in \left[1, \frac{2N-μ}{N-p}\right) $ via the Pohožaev manifold and linking theorem. Apart from this, we also studied the radial symmetry of solutions of the associated limit problem.
△ Less
Submitted 18 June, 2023;
originally announced June 2023.
-
Cost Sharing Public Project with Minimum Release Delay
Authors:
Mingyu Guo,
Diksha Goel,
Guanhua Wang,
Yong Yang,
Muhammad Ali Babar
Abstract:
We study the excludable public project model where the decision is binary (build or not build). In a classic excludable and binary public project model, an agent either consumes the project in its whole or is completely excluded. We study a setting where the mechanism can set different project release time for different agents, in the sense that high-paying agents can consume the project earlier t…
▽ More
We study the excludable public project model where the decision is binary (build or not build). In a classic excludable and binary public project model, an agent either consumes the project in its whole or is completely excluded. We study a setting where the mechanism can set different project release time for different agents, in the sense that high-paying agents can consume the project earlier than low-paying agents. The release delay, while hurting the social welfare, is implemented to incentivize payments to cover the project cost. The mechanism design objective is to minimize the maximum release delay and the total release delay among all agents.
We first consider the setting where we know the prior distribution of the agents' types. Our objectives are minimizing the expected maximum release delay and the expected total release delay. We propose the single deadline mechanisms. We show that the optimal single deadline mechanism is asymptotically optimal for both objectives, regardless of the prior distribution. For small number of agents, we propose the sequential unanimous mechanisms by extending the largest unanimous mechanisms from [Ohseto 2000]. We propose an automated mechanism design approach via evolutionary computation to optimize within the sequential unanimous mechanisms.
We next study prior-free mechanism design. We propose the group-based optimal deadline mechanism and show that it is competitive against an undominated mechanism under minor technical assumptions.
△ Less
Submitted 19 May, 2023;
originally announced May 2023.
-
Evolving Reinforcement Learning Environment to Minimize Learner's Achievable Reward: An Application on Hardening Active Directory Systems
Authors:
Diksha Goel,
Aneta Neumann,
Frank Neumann,
Hung Nguyen,
Mingyu Guo
Abstract:
We study a Stackelberg game between one attacker and one defender in a configurable environment. The defender picks a specific environment configuration. The attacker observes the configuration and attacks via Reinforcement Learning (RL trained against the observed environment). The defender's goal is to find the environment with minimum achievable reward for the attacker. We apply Evolutionary Di…
▽ More
We study a Stackelberg game between one attacker and one defender in a configurable environment. The defender picks a specific environment configuration. The attacker observes the configuration and attacks via Reinforcement Learning (RL trained against the observed environment). The defender's goal is to find the environment with minimum achievable reward for the attacker. We apply Evolutionary Diversity Optimization (EDO) to generate diverse population of environments for training. Environments with clearly high rewards are killed off and replaced by new offsprings to avoid wasting training time. Diversity not only improves training quality but also fits well with our RL scenario: RL agents tend to improve gradually, so a slightly worse environment earlier on may become better later. We demonstrate the effectiveness of our approach by focusing on a specific application, Active Directory (AD). AD is the default security management system for Windows domain networks. AD environment describes an attack graph, where nodes represent computers/accounts/etc., and edges represent accesses. The attacker aims to find the best attack path to reach the highest-privilege node. The defender can change the graph by removing a limited number of edges (revoke accesses). Our approach generates better defensive plans than the existing approach and scales better.
△ Less
Submitted 8 April, 2023;
originally announced April 2023.
-
Discovering Top-k Structural Hole Spanners in Dynamic Networks
Authors:
Diksha Goel,
Hong Shen,
Hui Tian,
Mingyu Guo
Abstract:
Structural Hole (SH) theory states that the node which acts as a connecting link among otherwise disconnected communities gets positional advantages in the network. These nodes are called Structural Hole Spanners (SHS). Numerous solutions are proposed to discover SHSs; however, most of the solutions are only applicable to static networks. Since real-world networks are dynamic networks; consequentl…
▽ More
Structural Hole (SH) theory states that the node which acts as a connecting link among otherwise disconnected communities gets positional advantages in the network. These nodes are called Structural Hole Spanners (SHS). Numerous solutions are proposed to discover SHSs; however, most of the solutions are only applicable to static networks. Since real-world networks are dynamic networks; consequently, in this study, we aim to discover SHSs in dynamic networks. Discovering SHSs is an NP-hard problem, due to which, instead of discovering exact k SHSs, we adopt a greedy approach to discover Top-k SHSs. We first propose an efficient Tracking-SHS algorithm for updating SHSs in dynamic networks. Our algorithm reuses the information obtained during the initial runs of the static algorithm and avoids the recomputations for the nodes unaffected by the updates. Besides, motivated from the success of Graph Neural Networks (GNNs) on various graph mining problems, we also design a Graph Neural Network-based model, GNN-SHS, to discover SHSs in dynamic networks, aiming to reduce the computational cost while achieving high accuracy. We provide a theoretical analysis of the Tracking-SHS algorithm, and our theoretical results prove that for a particular type of graphs, such as Preferential Attachment graphs [1], Tracking-SHS algorithm achieves 1.6 times of speedup compared with the static algorithm. We perform extensive experiments, and our results demonstrate that the Tracking-SHS algorithm attains a minimum of 3.24 times speedup over the static algorithm. Also, the proposed second model GNN-SHS is on an average 671.6 times faster than the Tracking-SHS algorithm.
△ Less
Submitted 16 December, 2024; v1 submitted 26 February, 2023;
originally announced February 2023.
-
Effective Graph-Neural-Network based Models for Discovering Structural Hole Spanners in Large-Scale and Diverse Networks
Authors:
Diksha Goel,
Hong Shen,
Hui Tian,
Mingyu Guo
Abstract:
A Structural Hole Spanner (SHS) is a set of nodes in a network that act as a bridge among different otherwise disconnected communities. Numerous solutions have been proposed to discover SHSs that generally require high run time on large-scale networks. Another challenge is discovering SHSs across different types of networks for which the traditional one-model-fit-all approach fails to capture the…
▽ More
A Structural Hole Spanner (SHS) is a set of nodes in a network that act as a bridge among different otherwise disconnected communities. Numerous solutions have been proposed to discover SHSs that generally require high run time on large-scale networks. Another challenge is discovering SHSs across different types of networks for which the traditional one-model-fit-all approach fails to capture the inter-graph difference, particularly in the case of diverse networks. Therefore, there is an urgent need of developing effective solutions for discovering SHSs in large-scale and diverse networks. Inspired by the recent advancement of graph neural network approaches on various graph problems, we propose graph neural network-based models to discover SHS nodes in large scale networks and diverse networks. We transform the problem into a learning problem and propose an efficient model GraphSHS, that exploits both the network structure and node features to discover SHS nodes in large scale networks, endeavouring to lessen the computational cost while maintaining high accuracy. To effectively discover SHSs across diverse networks, we propose another model Meta-GraphSHS based on meta-learning that learns generalizable knowledge from diverse training graphs (instead of directly learning the model) and utilizes the learned knowledge to create a customized model to identify SHSs in each new graph. We theoretically show that the depth of the proposed graph neural network model should be at least $Ω(\sqrt{n}/\log n)$ to accurately calculate the SHSs discovery problem. We evaluate the performance of the proposed models through extensive experiments on synthetic and real-world datasets. Our experimental results show that GraphSHS discovers SHSs with high accuracy and is at least 167.1 times faster than the comparative methods on large-scale real-world datasets.
△ Less
Submitted 17 February, 2025; v1 submitted 23 February, 2023;
originally announced February 2023.
-
Discovering Structural Hole Spanners in Dynamic Networks via Graph Neural Networks
Authors:
Diksha Goel,
Hong Shen,
Hui Tian,
Mingyu Guo
Abstract:
Structural Hole (SH) theory states that the node which acts as a connecting link among otherwise disconnected communities gets positional advantages in the network. These nodes are called Structural Hole Spanners (SHS). SHSs have many applications, including viral marketing, information dissemination, community detection, etc. Numerous solutions are proposed to discover SHSs; however, most of the…
▽ More
Structural Hole (SH) theory states that the node which acts as a connecting link among otherwise disconnected communities gets positional advantages in the network. These nodes are called Structural Hole Spanners (SHS). SHSs have many applications, including viral marketing, information dissemination, community detection, etc. Numerous solutions are proposed to discover SHSs; however, most of the solutions are only applicable to static networks. Since real-world networks are dynamic networks; consequently, in this study, we aim to discover SHSs in dynamic networks. Discovering SHSs is an NP-hard problem, due to which, instead of discovering exact k SHSs, we adopt a greedy approach to discover top-k SHSs. Motivated from the success of Graph Neural Networks (GNNs) on various graph mining problems, we design a Graph Neural Network-based model, GNN-SHS, to discover SHSs in dynamic networks, aiming to reduce the computational cost while achieving high accuracy. We analyze the efficiency of the proposed model through exhaustive experiments, and our results show that the proposed GNN-SHS model is at least 31.8 times faster and, on an average 671.6 times faster than the comparative method, providing a considerable efficiency advantage.
△ Less
Submitted 16 February, 2025; v1 submitted 15 December, 2022;
originally announced December 2022.
-
Nighttime Dehaze-Enhancement
Authors:
Harshan Baskar,
Anirudh S Chakravarthy,
Prateek Garg,
Divyam Goel,
Abhijith S Raj,
Kshitij Kumar,
Lakshya,
Ravichandra Parvatham,
V Sushant,
Bijay Kumar Rout
Abstract:
In this paper, we introduce a new computer vision task called nighttime dehaze-enhancement. This task aims to jointly perform dehazing and lightness enhancement. Our task fundamentally differs from nighttime dehazing -- our goal is to jointly dehaze and enhance scenes, while nighttime dehazing aims to dehaze scenes under a nighttime setting. In order to facilitate further research on this task, we…
▽ More
In this paper, we introduce a new computer vision task called nighttime dehaze-enhancement. This task aims to jointly perform dehazing and lightness enhancement. Our task fundamentally differs from nighttime dehazing -- our goal is to jointly dehaze and enhance scenes, while nighttime dehazing aims to dehaze scenes under a nighttime setting. In order to facilitate further research on this task, we release a new benchmark dataset called Reside-$β$ Night dataset, consisting of 4122 nighttime hazed images from 2061 scenes and 2061 ground truth images. Moreover, we also propose a new network called NDENet (Nighttime Dehaze-Enhancement Network), which jointly performs dehazing and low-light enhancement in an end-to-end manner. We evaluate our method on the proposed benchmark and achieve SSIM of 0.8962 and PSNR of 26.25. We also compare our network with other baseline networks on our benchmark to demonstrate the effectiveness of our approach. We believe that nighttime dehaze-enhancement is an essential task particularly for autonomous navigation applications, and hope that our work will open up new frontiers in research. Our dataset and code will be made publicly available upon acceptance of our paper.
△ Less
Submitted 18 October, 2022;
originally announced October 2022.
-
HammingMesh: A Network Topology for Large-Scale Deep Learning
Authors:
Torsten Hoefler,
Tommaso Bonato,
Daniele De Sensi,
Salvatore Di Girolamo,
Shigang Li,
Marco Heddes,
Jon Belk,
Deepak Goel,
Miguel Castro,
Steve Scott
Abstract:
Numerous microarchitectural optimizations unlocked tremendous processing power for deep neural networks that in turn fueled the AI revolution. With the exhaustion of such optimizations, the growth of modern AI is now gated by the performance of training systems, especially their data movement. Instead of focusing on single accelerators, we investigate data-movement characteristics of large-scale t…
▽ More
Numerous microarchitectural optimizations unlocked tremendous processing power for deep neural networks that in turn fueled the AI revolution. With the exhaustion of such optimizations, the growth of modern AI is now gated by the performance of training systems, especially their data movement. Instead of focusing on single accelerators, we investigate data-movement characteristics of large-scale training at full system scale. Based on our workload analysis, we design HammingMesh, a novel network topology that provides high bandwidth at low cost with high job scheduling flexibility. Specifically, HammingMesh can support full bandwidth and isolation to deep learning training jobs with two dimensions of parallelism. Furthermore, it also supports high global bandwidth for generic traffic. Thus, HammingMesh will power future large-scale deep learning systems with extreme bandwidth requirements.
△ Less
Submitted 21 October, 2022; v1 submitted 3 September, 2022;
originally announced September 2022.
-
Leveraging Dependency Grammar for Fine-Grained Offensive Language Detection using Graph Convolutional Networks
Authors:
Divyam Goel,
Raksha Sharma
Abstract:
The last few years have witnessed an exponential rise in the propagation of offensive text on social media. Identification of this text with high precision is crucial for the well-being of society. Most of the existing approaches tend to give high toxicity scores to innocuous statements (e.g., "I am a gay man"). These false positives result from over-generalization on the training data where speci…
▽ More
The last few years have witnessed an exponential rise in the propagation of offensive text on social media. Identification of this text with high precision is crucial for the well-being of society. Most of the existing approaches tend to give high toxicity scores to innocuous statements (e.g., "I am a gay man"). These false positives result from over-generalization on the training data where specific terms in the statement may have been used in a pejorative sense (e.g., "gay"). Emphasis on such words alone can lead to discrimination against the classes these systems are designed to protect. In this paper, we address the problem of offensive language detection on Twitter, while also detecting the type and the target of the offence. We propose a novel approach called SyLSTM, which integrates syntactic features in the form of the dependency parse tree of a sentence and semantic features in the form of word embeddings into a deep learning architecture using a Graph Convolutional Network. Results show that the proposed approach significantly outperforms the state-of-the-art BERT model with orders of magnitude fewer number of parameters.
△ Less
Submitted 26 May, 2022;
originally announced May 2022.
-
On The Cross-Modal Transfer from Natural Language to Code through Adapter Modules
Authors:
Divyam Goel,
Ramansh Grover,
Fatemeh H. Fard
Abstract:
Pre-trained neural Language Models (PTLM), such as CodeBERT, are recently used in software engineering as models pre-trained on large source code corpora. Their knowledge is transferred to downstream tasks (e.g. code clone detection) via fine-tuning. In natural language processing (NLP), other alternatives for transferring the knowledge of PTLMs are explored through using adapters, compact, parame…
▽ More
Pre-trained neural Language Models (PTLM), such as CodeBERT, are recently used in software engineering as models pre-trained on large source code corpora. Their knowledge is transferred to downstream tasks (e.g. code clone detection) via fine-tuning. In natural language processing (NLP), other alternatives for transferring the knowledge of PTLMs are explored through using adapters, compact, parameter efficient modules inserted in the layers of the PTLM. Although adapters are known to facilitate adapting to many downstream tasks compared to fine-tuning the model that require retraining all of the models' parameters -- which owes to the adapters' plug and play nature and being parameter efficient -- their usage in software engineering is not explored.
Here, we explore the knowledge transfer using adapters and based on the Naturalness Hypothesis proposed by Hindle et. al \cite{hindle2016naturalness}. Thus, studying the bimodality of adapters for two tasks of cloze test and code clone detection, compared to their benchmarks from the CodeXGLUE platform. These adapters are trained using programming languages and are inserted in a PTLM that is pre-trained on English corpora (N-PTLM). Three programming languages, C/C++, Python, and Java, are studied along with extensive experiments on the best setup used for adapters. Improving the results of the N-PTLM confirms the success of the adapters in knowledge transfer to software engineering, which sometimes are in par with or exceed the results of a PTLM trained on source code; while being more efficient in terms of the number of parameters, memory usage, and inference time. Our results can open new directions to build smaller models for more software engineering tasks. We open source all the scripts and the trained adapters.
△ Less
Submitted 19 April, 2022;
originally announced April 2022.
-
Defending Active Directory by Combining Neural Network based Dynamic Program and Evolutionary Diversity Optimisation
Authors:
Diksha Goel,
Max Ward,
Aneta Neumann,
Frank Neumann,
Hung Nguyen,
Mingyu Guo
Abstract:
Active Directory (AD) is the default security management system for Windows domain networks. We study a Stackelberg game model between one attacker and one defender on an AD attack graph. The attacker initially has access to a set of entry nodes. The attacker can expand this set by strategically exploring edges. Every edge has a detection rate and a failure rate. The attacker aims to maximize thei…
▽ More
Active Directory (AD) is the default security management system for Windows domain networks. We study a Stackelberg game model between one attacker and one defender on an AD attack graph. The attacker initially has access to a set of entry nodes. The attacker can expand this set by strategically exploring edges. Every edge has a detection rate and a failure rate. The attacker aims to maximize their chance of successfully reaching the destination before getting detected. The defender's task is to block a constant number of edges to decrease the attacker's chance of success. We show that the problem is #P-hard and, therefore, intractable to solve exactly. We convert the attacker's problem to an exponential sized Dynamic Program that is approximated by a Neural Network (NN). Once trained, the NN provides an efficient fitness function for the defender's Evolutionary Diversity Optimisation (EDO). The diversity emphasis on the defender's solution provides a diverse set of training samples, which improves the training accuracy of our NN for modelling the attacker. We go back and forth between NN training and EDO. Experimental results show that for R500 graph, our proposed EDO based defense is less than 1% away from the optimal defense.
△ Less
Submitted 4 January, 2023; v1 submitted 7 April, 2022;
originally announced April 2022.
-
Critical growth fractional Kirchhoff elliptic problems
Authors:
Divya Goel,
Sushmita Rawat,
K. Sreenadh
Abstract:
This article is concerned with the existence and multiplicity of positive weak solutions for the following fractional Kirchhoff-Choquard problem:
\begin{equation*}
\begin{array}{cc}
\displaystyle M\left( \|u\|^2\right) (-Δ)^s u = \dsλf(x)|u|^{q-2}u + \left( \int\limits_Ω \frac{|u(y)|^{2^{*}_{μ,s}}}{|x-y|^ μ}\, dy\right) |u|^{2^{*}_{μ,s}-2}u \;\text{in} \; Ω,
u > 0\quad \text{in} \; Ω, \,\,…
▽ More
This article is concerned with the existence and multiplicity of positive weak solutions for the following fractional Kirchhoff-Choquard problem:
\begin{equation*}
\begin{array}{cc}
\displaystyle M\left( \|u\|^2\right) (-Δ)^s u = \dsλf(x)|u|^{q-2}u + \left( \int\limits_Ω \frac{|u(y)|^{2^{*}_{μ,s}}}{|x-y|^ μ}\, dy\right) |u|^{2^{*}_{μ,s}-2}u \;\text{in} \; Ω,
u > 0\quad \text{in} \; Ω, \,\,
u = 0\quad \text{in} \; \mathbb{R}^{N}\backslashΩ,
\end{array}
\end{equation*}
where $Ω$ is open bounded domain of $\mathbb{R}^{N}$ with $C^2$ boundary, $N > 2s$ and $s \in (0,1)$, here $M$ models Kirchhoff-type coefficient of the form $M(t) = a + bt^{\te-1}$, where $a, b > 0$ are given constants.
$(-Δ)^s$ is fractional Laplace operator, $λ> 0$ is a real parameter. We explore using the variational methods, the existence of solution for ${q} \in (1,2^*_s)$ and $\te \geq 1$.
% and we also consider the case when $\te > 2^*_{μ,s}$ for $2< q < 2^*_{s}$.
Here $2^*_s = \frac{2N}{N-2s}$ and $2^{*}_{μ,s} = \frac{2N-μ}{N-2s}$ is the critical exponent in the sense of Hardy-Littlewood-Sobolev inequality.
△ Less
Submitted 11 December, 2022; v1 submitted 12 March, 2022;
originally announced March 2022.
-
Variational framework and Lewy-Stampacchia type estimates for nonlocal operators on Heisenberg group
Authors:
Divya Goel,
Vicentiu D. Radulescu,
K. Sreenadh
Abstract:
The aim of this article is to derive some Lewy-Stampacchia estimates and existence of solutions for equations driven by a nonlocal integro-differential operator on the Heisenberg group.
The aim of this article is to derive some Lewy-Stampacchia estimates and existence of solutions for equations driven by a nonlocal integro-differential operator on the Heisenberg group.
△ Less
Submitted 31 December, 2020;
originally announced December 2020.
-
On weighted $L^p$-Hardy inequality on domains in $\mathbb{R}^n$
Authors:
Divya Goel,
Yehuda Pinchover,
Georgios Psaradakis
Abstract:
We consider weighted $L^p$-Hardy inequalities involving the distance to the boundary of a domain in the $n$-dimensional Euclidean space with nonempty boundary. Using criticality theory, we give an alternative proof of the following result of F.~G.~Avkhadiev (2006) Theorem: Let $Ω\subsetneqq \mathbb{R}^n$, $n\geq 2$, be an arbitrary domain, $1<p<\infty$ and $α+ p>n$. Let…
▽ More
We consider weighted $L^p$-Hardy inequalities involving the distance to the boundary of a domain in the $n$-dimensional Euclidean space with nonempty boundary. Using criticality theory, we give an alternative proof of the following result of F.~G.~Avkhadiev (2006) Theorem: Let $Ω\subsetneqq \mathbb{R}^n$, $n\geq 2$, be an arbitrary domain, $1<p<\infty$ and $α+ p>n$. Let $\mathrm{d}_Ω(x) =\mathrm{dist}(x,\partial Ω)$ denote the distance of a point $x\in Ω$ to $\partial Ω$. Then the following Hardy-type inequality holds
$$
\int_{Ω}\frac{|\nabla \varphi |^p}{\mathrm{d}_Ω^α}\,\mathrm{d}x \geq \left( \frac{α+p-n}{p}\right)^p \int_{Ω}\frac{|\varphi|^p}{\mathrm{d}_Ω^{p+α}}\,\mathrm{d}x \qquad \forall \varphi\in C^{\infty }_c(Ω),$$
and the lower bound constant $\left( \frac{α+p-n}{p}\right)^p$ is sharp.
△ Less
Submitted 20 January, 2021; v1 submitted 23 December, 2020;
originally announced December 2020.
-
Singular doubly nonlocal elliptic problems with Choquard type critical growth nonlinearities
Authors:
Jacques Giacomoni,
Divya Goel,
K. Sreenadh
Abstract:
The theory of elliptic equations involving singular nonlinearities is well studied topic but the interaction of singular type nonlinearity with nonlocal nonlinearity in elliptic problems has not been investigated so far. In this article, we study the very singular and doubly nonlocal singular problem $(P_λ)$(See below). Firstly, we establish a very weak comparison principle and the optimal Sobolev…
▽ More
The theory of elliptic equations involving singular nonlinearities is well studied topic but the interaction of singular type nonlinearity with nonlocal nonlinearity in elliptic problems has not been investigated so far. In this article, we study the very singular and doubly nonlocal singular problem $(P_λ)$(See below). Firstly, we establish a very weak comparison principle and the optimal Sobolev regularity. Next using the critical point theory of non-smooth analysis and the geometry of the energy functional, we establish the global multiplicity of positive weak solutions.
△ Less
Submitted 7 February, 2020;
originally announced February 2020.
-
Regularity results on a class of doubly nonlocal problems
Authors:
Jacques Giacomoni,
Divya Goel,
K. Sreenadh
Abstract:
The purpose of this article is twofold. First, an issue of regularity of weak solution to the problem $(P)$ (See below) is addressed. Secondly, we investigate the question of $H^s$ versus $C^0$- weighted minimizers of the functional associated to problem $(P)$ and then give applications to existence and multiplicity results.
The purpose of this article is twofold. First, an issue of regularity of weak solution to the problem $(P)$ (See below) is addressed. Secondly, we investigate the question of $H^s$ versus $C^0$- weighted minimizers of the functional associated to problem $(P)$ and then give applications to existence and multiplicity results.
△ Less
Submitted 23 September, 2019;
originally announced September 2019.
-
Brezis-Nirenberg type result for Kohn Laplacian with critical Choquard Nonlinearity
Authors:
Divya Goel,
K. Sreenadh
Abstract:
In this article, we are study the following Dirichlet problem with Choquard type non linearity \[ -Δ_{\mathbb{H}} u = a u+ \left(\int_Ω\frac{|u(η)|^{Q^*_λ}}{|η^{-1}ξ|^λ}dη\right)|u|^{Q^*_λ-2}u \; \text{in}\; Ω,\quad
u = 0 \; \text{ on } \partial Ω, \]
where $Ω$ is a smooth bounded subset of the Heisenberg group $\mathbb{H}^N, N\in \mathbb N$ with $C^2$ boundary and $Δ_{\mathbb{H}}$ is the Kohn…
▽ More
In this article, we are study the following Dirichlet problem with Choquard type non linearity \[ -Δ_{\mathbb{H}} u = a u+ \left(\int_Ω\frac{|u(η)|^{Q^*_λ}}{|η^{-1}ξ|^λ}dη\right)|u|^{Q^*_λ-2}u \; \text{in}\; Ω,\quad
u = 0 \; \text{ on } \partial Ω, \]
where $Ω$ is a smooth bounded subset of the Heisenberg group $\mathbb{H}^N, N\in \mathbb N$ with $C^2$ boundary and $Δ_{\mathbb{H}}$ is the Kohn Laplacian on the Heisenberg group $\mathbb{H}^N$. Here, $Q^*_λ=\frac{2Q-λ}{Q-2},\; Q= 2N+2$ and $a$ is a positive real parameter. We derive the Brezis-Nirenberg type result for the above problem. Moreover, we also prove the regularity of solutions and nonexistence of solutions depending on the range of $a$.
△ Less
Submitted 1 July, 2019; v1 submitted 25 June, 2019;
originally announced June 2019.
-
Critical growth elliptic problems involving Hardy-Littlewood-Sobolev critical exponent in non-contractible domains
Authors:
Divya Goel,
K. Sreenadh
Abstract:
The paper is concerned with the existence and multiplicity of positive solutions of the nonhomogeneous Choquard equation over an annular type bounded domain. Precisely, we consider the following equation
\[
-\De u = \left(\int_{\Om}\frac{|u(y)|^{2^*_μ}}{|x-y|^μ}dy\right)|u|^{2^*_μ-2}u+f \; \text{in}\;
\Om,\quad
u = 0 \; \text{ on } \pa \Om ,
\]
where $\Om$ is a smooth bounded annular d…
▽ More
The paper is concerned with the existence and multiplicity of positive solutions of the nonhomogeneous Choquard equation over an annular type bounded domain. Precisely, we consider the following equation
\[
-\De u = \left(\int_{\Om}\frac{|u(y)|^{2^*_μ}}{|x-y|^μ}dy\right)|u|^{2^*_μ-2}u+f \; \text{in}\;
\Om,\quad
u = 0 \; \text{ on } \pa \Om ,
\]
where $\Om$ is a smooth bounded annular domain in $\mathbb{R}^N( N\geq 3)$, $2^*_μ=\frac{2N-μ}{N-2}$, $f \in L^{\infty}(\Om)$ and $f \geq 0$. We prove the existence of four positive solutions of the above problem using the Lusternik-Schnirelmann theory and varitaional methods, when the inner hole of the annulus is sufficiently small.
△ Less
Submitted 8 March, 2019;
originally announced March 2019.
-
The effect of topology on the number of positive solutions of elliptic equation involving Hardy-Littlewood-Sobolev critical exponent
Authors:
Divya Goel
Abstract:
In this article we are concern for the following Choquard equation \[ -Δu = λ|u|^{q-2}u +\left(\int_Ω\frac{|u(y)|^{2^*_μ}}{|x-y|^μ} dy \right)|u|^{2^*_μ-2} u \; \text{in}\; Ω,\quad u = 0 \; \text{ on } \partial Ω, \] where $Ω$ is an open bounded set with continuous boundary in $\mathbb{R}^N( N\geq 3)$, $2^*_μ=\frac{2N-μ}{N-2}$ and $q \in [2,2^*)$ where $2^*=\frac{2N}{N-2}$. Using Lusternik-Schni…
▽ More
In this article we are concern for the following Choquard equation \[ -Δu = λ|u|^{q-2}u +\left(\int_Ω\frac{|u(y)|^{2^*_μ}}{|x-y|^μ} dy \right)|u|^{2^*_μ-2} u \; \text{in}\; Ω,\quad u = 0 \; \text{ on } \partial Ω, \] where $Ω$ is an open bounded set with continuous boundary in $\mathbb{R}^N( N\geq 3)$, $2^*_μ=\frac{2N-μ}{N-2}$ and $q \in [2,2^*)$ where $2^*=\frac{2N}{N-2}$. Using Lusternik-Schnirelman theory, we associate the number of positive solutions of the above problem with the topology of $Ω$. Indeed, we prove if $λ< λ_1$ then problem has $\text{cat}_Ω(Ω)$ positive solutions whenever $q \in [2,2^*)$ and $N>3 $ or $4<q<6 $ and $N=3$.
△ Less
Submitted 20 February, 2019;
originally announced February 2019.
-
Regularity and multiplicity results for fractional $(p,q)$-Laplacian equations
Authors:
Divya Goel,
Deepak Kumar,
K. Sreenadh
Abstract:
This article deals with the study of the following nonlinear doubly nonlocal equation:
\begin{equation*}
(-Δ)^{s_1}_{p}u+\ba(-Δ)^{s_2}_{q}u = \la a(x)|u|^{δ-2}u+ b(x)|u|^{r-2} u,\; \text{ in }\; \Om, \; u=0 \text{ on } \mathbb{R}^n\setminus \Om,
\end{equation*}
where $\Om$ is a bounded domain in $\mathbb{R}^n$ with smooth boundary, $1< \de \le q\leq p<r \leq p^{*}_{s_1}$, with…
▽ More
This article deals with the study of the following nonlinear doubly nonlocal equation:
\begin{equation*}
(-Δ)^{s_1}_{p}u+\ba(-Δ)^{s_2}_{q}u = \la a(x)|u|^{δ-2}u+ b(x)|u|^{r-2} u,\; \text{ in }\; \Om, \; u=0 \text{ on } \mathbb{R}^n\setminus \Om,
\end{equation*}
where $\Om$ is a bounded domain in $\mathbb{R}^n$ with smooth boundary, $1< \de \le q\leq p<r \leq p^{*}_{s_1}$, with $p^{*}_{s_1}=\ds \frac{np}{n-ps_1}$, $0<s_2 < s_1<1$, $n> p s_1$ and $\la, \ba>0$ are parameters. Here $a\in L^{\frac{r}{r-\de}}(\Om)$ and $b\in L^{\infty}(\Om)$ are sign changing functions. We prove the $L^\infty$ estimates, weak Harnack inequality and Interior Hölder regularity of the weak solutions of the above problem in the subcritical case $(r<p_{s_1}^*).$ Also, by analyzing the fibering maps and minimizing the energy functional over suitable
subsets of the Nehari manifold, we prove existence and multiplicity of weak solutions to above
convex-concave problem. In case of $\de=q$, we show the existence of solution.
△ Less
Submitted 1 February, 2019;
originally announced February 2019.
-
Kirchhoff equations with Hardy-Littlewood-Sobolev critical nonlinearity
Authors:
Divya Goel,
K. Sreenadh
Abstract:
We consider the following Kirchhoff - Choquard equation \[ -M(\|\na u\|_{L^2}^{2})\De u = \la f(x)|u|^{q-2}u+ \left(\int_{\Om}\frac{|u(y)|^{2^*_μ}}{|x-y|^μ}dy\right)|u|^{2^*_μ-2}u \; \text{in}\; \Om,\quad
u = 0 \; \text{ on } \pa \Om , \]
where $\Om$ is a bounded domain in $\mathbb{R}^N( N\geq 3)$ with $C^2$ boundary, $2^*_μ=\frac{2N-μ}{N-2}$, $1<q\leq 2$, and $f$ is a continuous real valued s…
▽ More
We consider the following Kirchhoff - Choquard equation \[ -M(\|\na u\|_{L^2}^{2})\De u = \la f(x)|u|^{q-2}u+ \left(\int_{\Om}\frac{|u(y)|^{2^*_μ}}{|x-y|^μ}dy\right)|u|^{2^*_μ-2}u \; \text{in}\; \Om,\quad
u = 0 \; \text{ on } \pa \Om , \]
where $\Om$ is a bounded domain in $\mathbb{R}^N( N\geq 3)$ with $C^2$ boundary, $2^*_μ=\frac{2N-μ}{N-2}$, $1<q\leq 2$, and $f$ is a continuous real valued sign changing function. When $1<q< 2$, using the method of Nehari manifold and Concentration-compactness Lemma, we prove the existence and multiplicity of positive solutions of the above problem. We also prove the existence of a positive solution when $q=2$ using the Mountain Pass Lemma.
△ Less
Submitted 31 January, 2019;
originally announced January 2019.
-
On the Second Eigenvalue of Combination Between Local and Nonlocal $p$-Laplacian
Authors:
Divya Goel,
K. Sreenadh
Abstract:
In this paper, we study Mountain Pass Characterization of the second eigenvalue of the operator $-\De_p u -\De_{J,p}u$ and study shape optimization problems related to these eigenvalues.
In this paper, we study Mountain Pass Characterization of the second eigenvalue of the operator $-\De_p u -\De_{J,p}u$ and study shape optimization problems related to these eigenvalues.
△ Less
Submitted 10 January, 2019;
originally announced January 2019.
-
Coron problem for nonlocal equations invloving Choquard nonlinearity
Authors:
Divya Goel,
Vicentiu D. Radulescu,
K. Sreenadh
Abstract:
We study the problem \[ -\De u = \left(\int_{\Om}\frac{|u(y)|^{2^*_μ}}{|x-y|^μ}dy\right)|u|^{2^*_μ-2}u, \; \text{in}\; \Om,\quad
u = 0 \; \text{ on } \pa \Om , \] where $\Om$ is a smooth bounded domain in $\mathbb{R}^N( N\geq 3)$, $2^*_μ=\frac{2N-μ}{N-2}$. we prove the existence of a positive solution of the above problem in an annular type domain when the inner hole is sufficiently small.
We study the problem \[ -\De u = \left(\int_{\Om}\frac{|u(y)|^{2^*_μ}}{|x-y|^μ}dy\right)|u|^{2^*_μ-2}u, \; \text{in}\; \Om,\quad
u = 0 \; \text{ on } \pa \Om , \] where $\Om$ is a smooth bounded domain in $\mathbb{R}^N( N\geq 3)$, $2^*_μ=\frac{2N-μ}{N-2}$. we prove the existence of a positive solution of the above problem in an annular type domain when the inner hole is sufficiently small.
△ Less
Submitted 17 May, 2019; v1 submitted 22 April, 2018;
originally announced April 2018.
-
On the first curve of Fučik Spectrum Of $p$-fractional Laplacian Operator with nonlocal normal boundary conditions
Authors:
Divya Goel,
Sarika Goyal,
K. Sreenadh
Abstract:
In this article, we study the Fučik spectrum of the $p$-fractional Laplace operator with nonlocal normal derivative conditions which is defined as the set of all $(a,b)\in \mb R^2$ such that…
▽ More
In this article, we study the Fučik spectrum of the $p$-fractional Laplace operator with nonlocal normal derivative conditions which is defined as the set of all $(a,b)\in \mb R^2$ such that $$ \mc (F_p)\left\{ \begin{array}{lr} Λ_{n,p}(1-\al)(-Δ)_{p}^{\al} u + |u|^{p-2}u = \frac{χ_{Ω_\e}}{\e} (a (u^{+})^{p-1} - b (u^{-})^{p-1}) \;\quad \text{in}\; Ω,\quad \\ \mc{N}_{\al,p} u = 0 \; \quad \mbox{in}\; \mb R^n \setminus \overlineΩ, \end{array} \right. $$ has a non-trivial solution $u$, where $Ω$ is a bounded domain in $\mb R^n$ with Lipschitz boundary, $p \geq 2$, $n>p \al $, $\e, \al \in(0,1)$ and $Ω{_\e}:=\{x \in Ω: d(x,\pa Ω)\leq \e \}$. We showed existence of the first non-trivial curve $\mc C$ of this spectrum which is used to obtain the variational characterization of a second eigenvalue of the problem $\mc (F_p)$. We also discuss some properties of this curve $\mc C$, e.g. Lipschitz continuous, strictly decreasing and asymptotic behaviour and nonresonance with respect to the Fučik spectrum.
△ Less
Submitted 17 October, 2017;
originally announced October 2017.
-
Light bending and perihelion precession: A unified approach
Authors:
Dieter R. Brill,
Deepak Goel
Abstract:
The standard General Relativity results for precession of particle orbits and for bending of null rays are derived as special cases of perturbation of a quantity that is conserved in Newtonian physics, the Runge-Lenz vector. First this method is applied to give a derivation of these General Relativity effects for the case of the spherically symmetric Schwarzschild geometry. Then the lowest order…
▽ More
The standard General Relativity results for precession of particle orbits and for bending of null rays are derived as special cases of perturbation of a quantity that is conserved in Newtonian physics, the Runge-Lenz vector. First this method is applied to give a derivation of these General Relativity effects for the case of the spherically symmetric Schwarzschild geometry. Then the lowest order correction due to an angular momentum of the central body is considered. The results obtained are well known, but the method used is rather more efficient than that found in the standard texts, and it provides a good occasion to use the Runge-Lenz vector beyond its standard applications in Newtonian physics.
△ Less
Submitted 19 December, 1997;
originally announced December 1997.