-
A Practical Guide for Evaluating LLMs and LLM-Reliant Systems
Authors:
Ethan M. Rudd,
Christopher Andrews,
Philip Tully
Abstract:
Recent advances in generative AI have led to remarkable interest in using systems that rely on large language models (LLMs) for practical applications. However, meaningful evaluation of these systems in real-world scenarios comes with a distinct set of challenges, which are not well-addressed by synthetic benchmarks and de-facto metrics that are often seen in the literature. We present a practical…
▽ More
Recent advances in generative AI have led to remarkable interest in using systems that rely on large language models (LLMs) for practical applications. However, meaningful evaluation of these systems in real-world scenarios comes with a distinct set of challenges, which are not well-addressed by synthetic benchmarks and de-facto metrics that are often seen in the literature. We present a practical evaluation framework which outlines how to proactively curate representative datasets, select meaningful evaluation metrics, and employ meaningful evaluation methodologies that integrate well with practical development and deployment of LLM-reliant systems that must adhere to real-world requirements and meet user-facing needs.
△ Less
Submitted 15 June, 2025;
originally announced June 2025.
-
Simulating the blood transfusion system in Kenya: Modelling methods and exploratory analyses
Authors:
Yiqi Tian,
Bo Zeng,
Jana MacLeod,
Gatwiri Murithi,
Cindy M. Makanga,
Hillary Barmasai,
Linda Barnes,
Rahul S. Bidanda,
Tonny Ejilkon Epuu,
Robert Kamu Kaburu,
Tecla Chelagat,
Jason Madan,
Jennifer Makin,
Alejandro Munoz-Valencia,
Carolyne Njoki,
Kevin Ochieng,
Bernard Olayo,
Jose Paiz,
Kristina E. Rudd,
Mark Yazer,
Juan Carlos Puyana,
Bopaya Bidanda,
Jayant Rajgopal,
Pratap Kumar
Abstract:
The process of collecting blood from donors and making it available for transfusion requires a complex series of operations involving multiple actors and resources at each step. Ensuring hospitals receive adequate and safe blood for transfusion is a common challenge across low- and middle-income countries, but is rarely addressed from a system level. This paper presents the first use of discrete e…
▽ More
The process of collecting blood from donors and making it available for transfusion requires a complex series of operations involving multiple actors and resources at each step. Ensuring hospitals receive adequate and safe blood for transfusion is a common challenge across low- and middle-income countries, but is rarely addressed from a system level. This paper presents the first use of discrete event simulation to study the blood system in Kenya and to explore the effect of variations and perturbations at different steps of the system on meeting patient blood demand. A process map of the Kenyan blood system was developed to capture critical steps from blood donation to transfusion using interviews with blood bank, hospital, and laboratory personnel at four public hospitals across three counties in Kenya. The blood system was simulated starting with blood collection, a blood bank where blood is tested and stored before it is issued, a major hospital attached to the blood bank, and several smaller hospitals served by the same blood bank. Values for supply-side parameters were based mainly on expert opinion; demand-side parameters were based on data from blood requisitions made in hospital wards, and dispatch of blood from the hospital laboratory. Illustrative examples demonstrate how the model can be used to explore the impacts of changes in blood collection (e.g., prioritising different donor types), blood demand (e.g., differing clinical case mix), and blood distribution (e.g., restocking strategies) on meeting demand at patient level. The model can reveal potential process impediments in the blood system and aid in choosing strategies for improving blood collection, distribution or use. Such a systems approach allows for interventions at different steps in the blood continuum to be tested on blood availability for different patients presenting at diverse hospitals across the country.
△ Less
Submitted 9 October, 2024;
originally announced October 2024.
-
Computing virtual dark-field X-ray microscopy images of complex discrete dislocation structures from large-scale molecular dynamics simulations
Authors:
Yifan Wang,
Nicolas Bertin,
Dayeeta Pal,
Sara J. Irvine,
Kento Katagiri,
Robert E. Rudd,
Leora E. Dresselhaus-Marais
Abstract:
Dark-field X-ray Microscopy (DFXM) is a novel diffraction-based imaging technique that non-destructively maps the local deformation from crystalline defects in bulk materials. While studies have demonstrated that DFXM can spatially map 3D defect geometries, it is still challenging to interpret DFXM images of the high dislocation density systems relevant to macroscopic crystal plasticity. This work…
▽ More
Dark-field X-ray Microscopy (DFXM) is a novel diffraction-based imaging technique that non-destructively maps the local deformation from crystalline defects in bulk materials. While studies have demonstrated that DFXM can spatially map 3D defect geometries, it is still challenging to interpret DFXM images of the high dislocation density systems relevant to macroscopic crystal plasticity. This work develops a scalable forward model to calculate virtual DFXM images for complex discrete dislocation (DD) structures obtained from atomistic simulations. Our new DD-DFXM model integrates a non-singular formulation for calculating the local strain from the DD structures and an efficient geometrical optics algorithm for computing the DFXM image from the strain. We apply the model to complex DD structures obtained from a large-scale molecular dynamics (MD) simulation of compressive loading on a single-crystal silicon. Simulated DFXM images exhibit prominent feature contrast for dislocations between the multiple slip systems, demonstrating the DFXM's potential to resolve features from dislocation multiplication. The integrated DD-DFXM model provides a toolbox for DFXM experimental design and image interpretation in the context of bulk crystal plasticity for the breadth of measurements across shock plasticity and the broader materials science community.
△ Less
Submitted 20 September, 2024; v1 submitted 2 September, 2024;
originally announced September 2024.
-
A Novel Mechanism for the Formation of Dislocation Cell Patterns in BCC Metal
Authors:
Jaehyun Cho,
Luke L. Hsiung,
Robert E. Rudd,
Sylvie Aubry
Abstract:
In this study, we present the first simulation results of the formation of dislocation cell wall microstructures in tantalum subjected to shock loading. Dislocation patterns and cell wall formation are important to understanding the mechanical properties of the materials in which they spontaneously arise, and yet the processing and self-assembly mechanisms leading to their formation are poorly und…
▽ More
In this study, we present the first simulation results of the formation of dislocation cell wall microstructures in tantalum subjected to shock loading. Dislocation patterns and cell wall formation are important to understanding the mechanical properties of the materials in which they spontaneously arise, and yet the processing and self-assembly mechanisms leading to their formation are poorly understood. By employing transmission electron microscopy and discrete dislocation dynamics, we propose a new mechanism involving coplanar dislocations and pseudo-dipole mixed dislocation arrays that is essential to the pattern formation process. Our large-scale 3D DDD simulations demonstrate the self-organization of dislocation networks into cell walls in deformed BCC metal (tantalum) persisting at the strain 20%. The simulation analysis captures several crucial aspects of how the dislocation cell pattern affects metal plasticity, as observed in experiments. Although experimental evidence is inconclusive regarding whether cell wall formation takes place at the shock front, after the shock, during release, or when the sample has had enough time to relax post-recovery, our simulations indicate cell wall formation occurs after the shock and before release. The extended Taylor hardening composite model effectively considers the non-uniform dislocation density when cell walls form and accurately describes the corresponding flow stress.
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
Cross-Subject Deep Transfer Models for Evoked Potentials in Brain-Computer Interface
Authors:
Chad Mello,
Troy Weingart,
Ethan M. Rudd
Abstract:
Brain Computer Interface (BCI) technologies have the potential to improve the lives of millions of people around the world, whether through assistive technologies or clinical diagnostic tools. Despite advancements in the field, however, at present consumer and clinical viability remains low. A key reason for this is that many of the existing BCI deployments require substantial data collection per…
▽ More
Brain Computer Interface (BCI) technologies have the potential to improve the lives of millions of people around the world, whether through assistive technologies or clinical diagnostic tools. Despite advancements in the field, however, at present consumer and clinical viability remains low. A key reason for this is that many of the existing BCI deployments require substantial data collection per end-user, which can be cumbersome, tedious, and error-prone to collect. We address this challenge via a deep learning model, which, when trained across sufficient data from multiple subjects, offers reasonable performance out-of-the-box, and can be customized to novel subjects via a transfer learning process. We demonstrate the fundamental viability of our approach by repurposing an older but well-curated electroencephalography (EEG) dataset and benchmarking against several common approaches/techniques. We then partition this dataset into a transfer learning benchmark and demonstrate that our approach significantly reduces data collection burden per-subject. This suggests that our model and methodology may yield improvements to BCI technologies and enhance their consumer/clinical viability.
△ Less
Submitted 28 January, 2023;
originally announced January 2023.
-
Transformers for End-to-End InfoSec Tasks: A Feasibility Study
Authors:
Ethan M. Rudd,
Mohammad Saidur Rahman,
Philip Tully
Abstract:
In this paper, we assess the viability of transformer models in end-to-end InfoSec settings, in which no intermediate feature representations or processing steps occur outside the model. We implement transformer models for two distinct InfoSec data formats - specifically URLs and PE files - in a novel end-to-end approach, and explore a variety of architectural designs, training regimes, and experi…
▽ More
In this paper, we assess the viability of transformer models in end-to-end InfoSec settings, in which no intermediate feature representations or processing steps occur outside the model. We implement transformer models for two distinct InfoSec data formats - specifically URLs and PE files - in a novel end-to-end approach, and explore a variety of architectural designs, training regimes, and experimental settings to determine the ingredients necessary for performant detection models. We show that in contrast to conventional transformers trained on more standard NLP-related tasks, our URL transformer model requires a different training approach to reach high performance levels. Specifically, we show that 1) pre-training on a massive corpus of unlabeled URL data for an auto-regressive task does not readily transfer to binary classification of malicious or benign URLs, but 2) that using an auxiliary auto-regressive loss improves performance when training from scratch. We introduce a method for mixed objective optimization, which dynamically balances contributions from both loss terms so that neither one of them dominates. We show that this method yields quantitative evaluation metrics comparable to that of several top-performing benchmark classifiers. Unlike URLs, binary executables contain longer and more distributed sequences of information-rich bytes. To accommodate such lengthy byte sequences, we introduce additional context length into the transformer by providing its self-attention layers with an adaptive span similar to Sukhbaatar et al. We demonstrate that this approach performs comparably to well-established malware detection models on benchmark PE file datasets, but also point out the need for further exploration into model improvements in scalability and compute efficiency.
△ Less
Submitted 5 December, 2022;
originally announced December 2022.
-
Efficient Malware Analysis Using Metric Embeddings
Authors:
Ethan M. Rudd,
David Krisiloff,
Scott Coull,
Daniel Olszewski,
Edward Raff,
James Holt
Abstract:
In this paper, we explore the use of metric learning to embed Windows PE files in a low-dimensional vector space for downstream use in a variety of applications, including malware detection, family classification, and malware attribute tagging. Specifically, we enrich labeling on malicious and benign PE files using computationally expensive, disassembly-based malicious capabilities. Using these ca…
▽ More
In this paper, we explore the use of metric learning to embed Windows PE files in a low-dimensional vector space for downstream use in a variety of applications, including malware detection, family classification, and malware attribute tagging. Specifically, we enrich labeling on malicious and benign PE files using computationally expensive, disassembly-based malicious capabilities. Using these capabilities, we derive several different types of metric embeddings utilizing an embedding neural network trained via contrastive loss, Spearman rank correlation, and combinations thereof. We then examine performance on a variety of transfer tasks performed on the EMBER and SOREL datasets, demonstrating that for several tasks, low-dimensional, computationally efficient metric embeddings maintain performance with little decay, which offers the potential to quickly retrain for a variety of transfer tasks at significantly reduced storage overhead. We conclude with an examination of practical considerations for the use of our proposed embedding approach, such as robustness to adversarial evasion and introduction of task-specific auxiliary objectives to improve performance on mission critical tasks.
△ Less
Submitted 5 December, 2022;
originally announced December 2022.
-
Characterization and visualization of grain boundary disconnections
Authors:
I. S. Winter,
T. Oppelstrup,
T. Frolov,
R. E. Rudd
Abstract:
We introduce a method to visualize dislocations along grain boundaries at the atomic level. It uses an atomic-level Nye tensor, representing the dislocation density. To calculate the Nye tensor at grain boundaries, we extend the Hartley-Mishin strain gradient calculation to the displacement shift complete lattice. We show that the method is effective in visualizing disconnections and the dislocati…
▽ More
We introduce a method to visualize dislocations along grain boundaries at the atomic level. It uses an atomic-level Nye tensor, representing the dislocation density. To calculate the Nye tensor at grain boundaries, we extend the Hartley-Mishin strain gradient calculation to the displacement shift complete lattice. We show that the method is effective in visualizing disconnections and the dislocation content of grain boundary phase junctions in body-centered cubic tungsten, as well as face-centered cubic copper. In addition, we use the method to characterize the morphology of a two-dimensional grain boundary phase nucleus in a symmetric tilt grain boundary in tungsten. This method can be applied to both bulk dislocations and grain boundary disconnections, which makes it ideal for studying the interactions and reactions of bulk dislocations with grain boundaries, and grain boundary disconnections.
△ Less
Submitted 31 January, 2022;
originally announced January 2022.
-
Development of slurry targets for high repetition-rate XFEL experiments
Authors:
Raymond F. Smith,
Vinay Rastogi,
Amy E. Lazicki,
Martin G. Gorman,
Richard Briggs,
Amy L. Coleman,
Carol Davis,
Saransh Singh,
David McGonegle,
Samantha M. Clarke,
Travis Volz,
Trevor Hutchinson,
Christopher McGuire,
Dayne E. Fratanduono,
Damian C. Swift,
Eric Folsom,
Cynthia A. Bolme,
Arianna E. Gleason,
Federica Coppari,
Hae Ja Lee,
Bob Nagler,
Eric Cunningham,
Eduardo Granados,
Phil Heimann,
Richard G. Kraus
, et al. (4 additional authors not shown)
Abstract:
Combining an x-ray free electron laser (XFEL) with high power laser drivers enables the study of phase transitions, equation-of-state, grain growth, strength, and transformation pathways as a function of pressure to 100s GPa along different thermodynamic compression paths. Future high-repetition rate laser operation will enable data to be accumulated at >1 Hz which poses a number of experimental c…
▽ More
Combining an x-ray free electron laser (XFEL) with high power laser drivers enables the study of phase transitions, equation-of-state, grain growth, strength, and transformation pathways as a function of pressure to 100s GPa along different thermodynamic compression paths. Future high-repetition rate laser operation will enable data to be accumulated at >1 Hz which poses a number of experimental challenges including the need to rapidly replenish the target. Here, we present a combined shock-compression and X-ray diffraction study on vol% epoxy(50)-crystalline grains(50) (slurry) targets, which can be fashioned into extruded ribbons for high repetition-rate operation. For shock-loaded NaCl-slurry samples, we observe pressure, density and temperature states within the embedded NaCl grains consistent with observations for shock-compressed single-crystal NaCl.
△ Less
Submitted 11 January, 2022;
originally announced January 2022.
-
Nucleation of Grain Boundary Phases
Authors:
Ian S. Winter,
Robert E. Rudd,
Tomas Oppelstrup,
Timofey Frolov
Abstract:
We derive a theory that describes homogeneous nucleation of grain boundary (GB) phases. Our analysis takes account of the energy resulting from the GB phase junction, the line defect separating two different GB structures, which is necessarily a dislocation as well as an elastic line force due to the jump in GB stresses. The theory provides analytic forms for the elastic interactions and the core…
▽ More
We derive a theory that describes homogeneous nucleation of grain boundary (GB) phases. Our analysis takes account of the energy resulting from the GB phase junction, the line defect separating two different GB structures, which is necessarily a dislocation as well as an elastic line force due to the jump in GB stresses. The theory provides analytic forms for the elastic interactions and the core energy of the GB phase junction that, along with the change in GB energy, determine the nucleation barrier. We apply the resulting nucleation model to simulations of GB phase transformations in tungsten. Our theory explains why under certain conditions GBs cannot spontaneously change their structure even to a lower energy state.
△ Less
Submitted 15 August, 2021;
originally announced August 2021.
-
SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection
Authors:
Richard Harang,
Ethan M. Rudd
Abstract:
In this paper we describe the SOREL-20M (Sophos/ReversingLabs-20 Million) dataset: a large-scale dataset consisting of nearly 20 million files with pre-extracted features and metadata, high-quality labels derived from multiple sources, information about vendor detections of the malware samples at the time of collection, and additional ``tags'' related to each malware sample to serve as additional…
▽ More
In this paper we describe the SOREL-20M (Sophos/ReversingLabs-20 Million) dataset: a large-scale dataset consisting of nearly 20 million files with pre-extracted features and metadata, high-quality labels derived from multiple sources, information about vendor detections of the malware samples at the time of collection, and additional ``tags'' related to each malware sample to serve as additional targets. In addition to features and metadata, we also provide approximately 10 million ``disarmed'' malware samples -- samples with both the optional\_headers.subsystem and file\_header.machine flags set to zero -- that may be used for further exploration of features and detection strategies. We also provide Python code to interact with the data and features, as well as baseline neural network and gradient boosted decision tree models and their results, with full training and evaluation code, to serve as a starting point for further experimentation.
△ Less
Submitted 14 December, 2020;
originally announced December 2020.
-
Training Transformers for Information Security Tasks: A Case Study on Malicious URL Prediction
Authors:
Ethan M. Rudd,
Ahmed Abdallah
Abstract:
Machine Learning (ML) for information security (InfoSec) utilizes distinct data types and formats which require different treatments during optimization/training on raw data. In this paper, we implement a malicious/benign URL predictor based on a transformer architecture that is trained from scratch. We show that in contrast to conventional natural language processing (NLP) transformers, this mode…
▽ More
Machine Learning (ML) for information security (InfoSec) utilizes distinct data types and formats which require different treatments during optimization/training on raw data. In this paper, we implement a malicious/benign URL predictor based on a transformer architecture that is trained from scratch. We show that in contrast to conventional natural language processing (NLP) transformers, this model requires a different training approach to work well. Specifically, we show that 1) pre-training on a massive corpus of unlabeled URL data for an auto-regressive task does not readily transfer to malicious/benign prediction but 2) that using an auxiliary auto-regressive loss improves performance when training from scratch. We introduce a method for mixed objective optimization, which dynamically balances contributions from both loss terms so that neither one of them dominates. We show that this method yields performance comparable to that of several top-performing benchmark classifiers.
△ Less
Submitted 5 November, 2020;
originally announced November 2020.
-
Review of the First Charged-Particle Transport Coefficient Comparison Workshop
Authors:
P. E. Grabowski,
S. B. Hansen,
M. S. Murillo,
L. G. Stanton,
F. R. Graziani,
A. B. Zylstra,
S. D. Baalrud,
P. Arnault,
A. D. Baczewski,
L. X. Benedict,
C. Blancard,
O. Certik,
J. Clerouin,
L. A. Collins,
S. Copeland,
A. A. Correa,
J. Dai,
J. Daligault,
M. P. Desjarlais,
M. W. C. Dharma-wardana,
G. Faussurier,
J. Haack,
T. Haxhimali,
A. Hayes-Sterbenz,
Y. Hou
, et al. (20 additional authors not shown)
Abstract:
We present the results of the first Charged-Particle Transport Coefficient Code Comparison Workshop, which was held in Albuquerque, NM October 4-6, 2016. In this first workshop, scientists from eight institutions and four countries gathered to compare calculations of transport coefficients including thermal and electrical conduction, electron-ion coupling, inter-ion diffusion, ion viscosity, and c…
▽ More
We present the results of the first Charged-Particle Transport Coefficient Code Comparison Workshop, which was held in Albuquerque, NM October 4-6, 2016. In this first workshop, scientists from eight institutions and four countries gathered to compare calculations of transport coefficients including thermal and electrical conduction, electron-ion coupling, inter-ion diffusion, ion viscosity, and charged particle stopping powers. Here, we give general background on Coulomb coupling and computational expense, review where some transport coefficients appear in hydrodynamic equations, and present the submitted data. Large variations are found when either the relevant Coulomb coupling parameter is large or computational expense causes difficulties. Understanding the general accuracy and uncertainty associated with such transport coefficients is important for quantifying errors in hydrodynamic simulations of inertial confinement fusion and high-energy density experiments.
△ Less
Submitted 29 September, 2020; v1 submitted 1 July, 2020;
originally announced July 2020.
-
Analytic binary alloy volume-concentration relations and the deviation from Zen`s law
Authors:
A. Landa,
J. E. Klepeis,
R. E. Rudd,
K. J. Caspersen,
D. A. Young
Abstract:
Alloys expand or contract as concentrations change, and the resulting relationship between atomic volume and alloy content is an important property of the solid. While a well-known approximation posits that the atomic volume varies linearly with concentration (Zen`s law), the actual variation is more complicated. Here we use an apparent size of the solute (solvent) atom and the elasticity to deriv…
▽ More
Alloys expand or contract as concentrations change, and the resulting relationship between atomic volume and alloy content is an important property of the solid. While a well-known approximation posits that the atomic volume varies linearly with concentration (Zen`s law), the actual variation is more complicated. Here we use an apparent size of the solute (solvent) atom and the elasticity to derive explicit analytical expressions for the atomic volume of binary solid alloys. Two approximations, continuum and terminal, are proposed. Deviations from Zen`s law are studied for 22 binary alloy systems.
△ Less
Submitted 27 April, 2020;
originally announced April 2020.
-
Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection
Authors:
Adarsh Kyadige,
Ethan M. Rudd,
Konstantin Berlin
Abstract:
Machine learning (ML) used for static portable executable (PE) malware detection typically employs per-file numerical feature vector representations as input with one or more target labels during training. However, there is much orthogonal information that can be gleaned from the \textit{context} in which the file was seen. In this paper, we propose utilizing a static source of contextual informat…
▽ More
Machine learning (ML) used for static portable executable (PE) malware detection typically employs per-file numerical feature vector representations as input with one or more target labels during training. However, there is much orthogonal information that can be gleaned from the \textit{context} in which the file was seen. In this paper, we propose utilizing a static source of contextual information -- the path of the PE file -- as an auxiliary input to the classifier. While file paths are not malicious or benign in and of themselves, they do provide valuable context for a malicious/benign determination. Unlike dynamic contextual information, file paths are available with little overhead and can seamlessly be integrated into a multi-view static ML detector, yielding higher detection rates at very high throughput with minimal infrastructural changes. Here we propose a multi-view neural network, which takes feature vectors from PE file content as well as corresponding file paths as inputs and outputs a detection score. To ensure realistic evaluation, we use a dataset of approximately 10 million samples -- files and file paths from user endpoints of an actual security vendor network. We then conduct an interpretability analysis via LIME modeling to ensure that our classifier has learned a sensible representation and see which parts of the file path most contributed to change in the classifier's score. We find that our model learns useful aspects of the file path for classification, while also learning artifacts from customers testing the vendor's product, e.g., by downloading a directory of malware samples each named as their hash. We prune these artifacts from our test dataset and demonstrate reductions in false negative rate of 32.3% at a $10^{-3}$ false positive rate (FPR) and 33.1% at $10^{-4}$ FPR, over a similar topology single input PE file content only model.
△ Less
Submitted 16 May, 2019;
originally announced May 2019.
-
Automatic Malware Description via Attribute Tagging and Similarity Embedding
Authors:
Felipe N. Ducau,
Ethan M. Rudd,
Tad M. Heppner,
Alex Long,
Konstantin Berlin
Abstract:
With the rapid proliferation and increased sophistication of malicious software (malware), detection methods no longer rely only on manually generated signatures but have also incorporated more general approaches like machine learning detection. Although powerful for conviction of malicious artifacts, these methods do not produce any further information about the type of threat that has been detec…
▽ More
With the rapid proliferation and increased sophistication of malicious software (malware), detection methods no longer rely only on manually generated signatures but have also incorporated more general approaches like machine learning detection. Although powerful for conviction of malicious artifacts, these methods do not produce any further information about the type of threat that has been detected neither allows for identifying relationships between malware samples. In this work, we address the information gap between machine learning and signature-based detection methods by learning a representation space for malware samples in which files with similar malicious behaviors appear close to each other. We do so by introducing a deep learning based tagging model trained to generate human-interpretable semantic descriptions of malicious software, which, at the same time provides potentially more useful and flexible information than malware family names.
We show that the malware descriptions generated with the proposed approach correctly identify more than 95% of eleven possible tag descriptions for a given sample, at a deployable false positive rate of 1% per tag. Furthermore, we use the learned representation space to introduce a similarity index between malware files, and empirically demonstrate using dynamic traces from files' execution, that is not only more effective at identifying samples from the same families, but also 32 times smaller than those based on raw feature vectors.
△ Less
Submitted 23 January, 2020; v1 submitted 15 May, 2019;
originally announced May 2019.
-
ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
Authors:
Ethan M. Rudd,
Felipe N. Ducau,
Cody Wild,
Konstantin Berlin,
Richard Harang
Abstract:
Malware detection is a popular application of Machine Learning for Information Security (ML-Sec), in which an ML classifier is trained to predict whether a given file is malware or benignware. Parameters of this classifier are typically optimized such that outputs from the model over a set of input samples most closely match the samples' true malicious/benign (1/0) target labels. However, there ar…
▽ More
Malware detection is a popular application of Machine Learning for Information Security (ML-Sec), in which an ML classifier is trained to predict whether a given file is malware or benignware. Parameters of this classifier are typically optimized such that outputs from the model over a set of input samples most closely match the samples' true malicious/benign (1/0) target labels. However, there are often a number of other sources of contextual metadata for each malware sample, beyond an aggregate malicious/benign label, including multiple labeling sources and malware type information (e.g., ransomware, trojan, etc.), which we can feed to the classifier as auxiliary prediction targets. In this work, we fit deep neural networks to multiple additional targets derived from metadata in a threat intelligence feed for Portable Executable (PE) malware and benignware, including a multi-source malicious/benign loss, a count loss on multi-source detections, and a semantic malware attribute tag loss. We find that incorporating multiple auxiliary loss terms yields a marked improvement in performance on the main detection task. We also demonstrate that these gains likely stem from a more informed neural network representation and are not due to a regularization artifact of multi-target learning. Our auxiliary loss architecture yields a significant reduction in detection error rate (false negatives) of 42.6% at a false positive rate (FPR) of $10^{-3}$ when compared to a similar model with only one target, and a decrease of 53.8% at $10^{-5}$ FPR.
△ Less
Submitted 13 March, 2019;
originally announced March 2019.
-
Towards Principled Uncertainty Estimation for Deep Neural Networks
Authors:
Richard Harang,
Ethan M. Rudd
Abstract:
When the cost of misclassifying a sample is high, it is useful to have an accurate estimate of uncertainty in the prediction for that sample. There are also multiple types of uncertainty which are best estimated in different ways, for example, uncertainty that is intrinsic to the training set may be well-handled by a Bayesian approach, while uncertainty introduced by shifts between training and qu…
▽ More
When the cost of misclassifying a sample is high, it is useful to have an accurate estimate of uncertainty in the prediction for that sample. There are also multiple types of uncertainty which are best estimated in different ways, for example, uncertainty that is intrinsic to the training set may be well-handled by a Bayesian approach, while uncertainty introduced by shifts between training and query distributions may be better-addressed by density/support estimation. In this paper, we examine three types of uncertainty: model capacity uncertainty, intrinsic data uncertainty, and open set uncertainty, and review techniques that have been derived to address each one. We then introduce a unified hierarchical model, which combines methods from Bayesian inference, invertible latent density inference, and discriminative classification in a single end-to-end deep neural network topology to yield efficient per-sample uncertainty estimation in a detection context. This approach addresses all three uncertainty types and can readily accommodate prior/base rates for binary detection. We then discuss how to extend this model to a more generic multiclass recognition context.
△ Less
Submitted 14 March, 2019; v1 submitted 29 October, 2018;
originally announced October 2018.
-
Free energy of grain boundary phases: Atomistic calculations for $Σ$5(310)[001] grain boundary in Cu
Authors:
Rodrigo Freitas,
Robert E. Rudd,
Mark Asta,
Timofey Frolov
Abstract:
Atomistic simulations are employed to demonstrate the existence of a well-defined thermodynamic phase transformation between grain boundary (GB) phases with different atomic structures. The free energy of different interface structures for an embedded-atom-method model of the $Σ5 (310) [001]$ symmetric tilt boundary in elemental Cu is computed using the nonequilibrium Frenkel-Ladd thermodynamic in…
▽ More
Atomistic simulations are employed to demonstrate the existence of a well-defined thermodynamic phase transformation between grain boundary (GB) phases with different atomic structures. The free energy of different interface structures for an embedded-atom-method model of the $Σ5 (310) [001]$ symmetric tilt boundary in elemental Cu is computed using the nonequilibrium Frenkel-Ladd thermodynamic integration method through molecular dynamics simulations. It is shown that the free-energy curves predict a temperature-induced first-order interfacial phase transition in the GB structure in agreement with computational studies of the same model system. Moreover, the role of vibrational entropy in the stabilization of the high-temperature GB phase is clarified. The calculated results are able to determine the GB phase stability at homologous temperatures less than $0.5$, a temperature range particularly important given the limitation of the methods available hitherto in modeling GB phase transitions at low temperatures. The calculation of GB free energies complements currently available $0\,\mathrm{K}$ GB structure search methods, making feasible the characterization of GB phase diagrams.
△ Less
Submitted 10 September, 2018; v1 submitted 9 July, 2018;
originally announced July 2018.
-
MEADE: Towards a Malicious Email Attachment Detection Engine
Authors:
Ethan M. Rudd,
Richard Harang,
Joshua Saxe
Abstract:
Malicious email attachments are a growing delivery vector for malware. While machine learning has been successfully applied to portable executable (PE) malware detection, we ask, can we extend similar approaches to detect malware across heterogeneous file types commonly found in email attachments? In this paper, we explore the feasibility of applying machine learning as a static countermeasure to…
▽ More
Malicious email attachments are a growing delivery vector for malware. While machine learning has been successfully applied to portable executable (PE) malware detection, we ask, can we extend similar approaches to detect malware across heterogeneous file types commonly found in email attachments? In this paper, we explore the feasibility of applying machine learning as a static countermeasure to detect several types of malicious email attachments including Microsoft Office documents and Zip archives. To this end, we collected a dataset of over 5 million malicious/benign Microsoft Office documents from VirusTotal for evaluation as well as a dataset of benign Microsoft Office documents from the Common Crawl corpus, which we use to provide more realistic estimates of thresholds for false positive rates on in-the-wild data. We also collected a dataset of approximately 500k malicious/benign Zip archives, which we scraped using the VirusTotal service, on which we performed a separate evaluation. We analyze predictive performance of several classifiers on each of the VirusTotal datasets using a 70/30 train/test split on first seen time, evaluating feature and classifier types that have been applied successfully in commercial antimalware products and R&D contexts. Using deep neural networks and gradient boosted decision trees, we are able to obtain ROC curves with > 0.99 AUC on both Microsoft Office document and Zip archive datasets. Discussion of deployment viability in various antimalware contexts is provided.
△ Less
Submitted 22 April, 2018;
originally announced April 2018.
-
Structures and transitions in bcc tungsten grain boundaries and their role in the absorption of point defects
Authors:
Timofey Frolov,
Qiang Zhu,
Tomas Oppelstrup,
Jaime Marian,
Robert E. Rudd
Abstract:
We use atomistic simulations to investigate grain boundary (GB) phase transitions in el- emental body-centered cubic (bcc) metal tungsten. Motivated by recent modeling study of grain boundary phase transitions in [100] symmetric tilt boundaries in face-centered cu- bic (fcc) copper, we perform a systematic investigation of [100] and [110] symmetric tilt high-angle and low-angle boundaries in bcc t…
▽ More
We use atomistic simulations to investigate grain boundary (GB) phase transitions in el- emental body-centered cubic (bcc) metal tungsten. Motivated by recent modeling study of grain boundary phase transitions in [100] symmetric tilt boundaries in face-centered cu- bic (fcc) copper, we perform a systematic investigation of [100] and [110] symmetric tilt high-angle and low-angle boundaries in bcc tungsten. The structures of these boundaries have been investigated previously by atomistic simulations in several different bcc metals including tungsten using the the γ-surface method, which has limitations. In this work we use a recently developed computational tool based on the USPEX structure prediction code to perform an evolutionary grand canonical search of GB structure at 0 K. For high-angle [100] tilt boundaries the ground states generated by the evolutionary algorithm agree with the predictions of the γ-surface method. For the [110] tilt boundaries, the search predicts novel high-density low-energy grain boundary structures and multiple grain boundary phases within the entire misorientation range. Molecular dynamics simulation demonstrate that the new structures are more stable at high temperature. We observe first-order grain boundary phase transitions and investigate how the structural multiplicity affects the mechanisms of the point defect absorption. Specifically, we demonstrate a two-step nucleation process, when initially the point defects are absorbed through a formation of a metastable GB structure with higher density, followed by a transformation of this structure into a GB interstitial loop or a different GB phase.
△ Less
Submitted 13 April, 2018;
originally announced April 2018.
-
Facial Attributes: Accuracy and Adversarial Robustness
Authors:
Andras Rozsa,
Manuel Günther,
Ethan M. Rudd,
Terrance E. Boult
Abstract:
Facial attributes, emerging soft biometrics, must be automatically and reliably extracted from images in order to be usable in stand-alone systems. While recent methods extract facial attributes using deep neural networks (DNNs) trained on labeled facial attribute data, the robustness of deep attribute representations has not been evaluated. In this paper, we examine the representational stability…
▽ More
Facial attributes, emerging soft biometrics, must be automatically and reliably extracted from images in order to be usable in stand-alone systems. While recent methods extract facial attributes using deep neural networks (DNNs) trained on labeled facial attribute data, the robustness of deep attribute representations has not been evaluated. In this paper, we examine the representational stability of several approaches that recently advanced the state of the art on the CelebA benchmark by generating adversarial examples formed by adding small, non-random perturbations to inputs yielding altered classifications. We show that our fast flipping attribute (FFA) technique generates more adversarial examples than traditional algorithms, and that the adversarial robustness of DNNs varies highly between facial attributes. We also test the correlation of facial attributes and find that only for related attributes do the formed adversarial perturbations change the classification of others. Finally, we introduce the concept of natural adversarial samples, i.e., misclassified images where predictions can be corrected via small perturbations. We demonstrate that natural adversarial samples commonly occur and show that many of these images remain misclassified even with additional training epochs, even though their correct classification may require only a small adjustment to network parameters.
△ Less
Submitted 20 April, 2018; v1 submitted 3 January, 2018;
originally announced January 2018.
-
Grain boundary phases in bcc metals
Authors:
T. Frolov,
W. Setyawan,
R. J. Kurtz,
J. Marian,
A. R. Oganov,
R. E. Rudd,
Q. Zhu
Abstract:
We report a computational discovery of novel grain boundary structures and multiple grain boundary phases in elemental bcc tungsten. While grain boundary structures created by the γ-surface method as a union of two perfect half crystals have been studied extensively, it is known that the method has limitations and does not always predict the correct ground states. Here, we use a newly developed co…
▽ More
We report a computational discovery of novel grain boundary structures and multiple grain boundary phases in elemental bcc tungsten. While grain boundary structures created by the γ-surface method as a union of two perfect half crystals have been studied extensively, it is known that the method has limitations and does not always predict the correct ground states. Here, we use a newly developed computational tool, based on evolutionary algorithms, to perform a grand-canonical search of a high-angle symmetric tilt boundary in tungsten, and we find new ground states and multiple phases that cannot be described using the conventional structural unit model. We use MD simulations to demonstrate that the new structures can coexist at finite temperature in a closed system, confirming these are examples of different GB phases. The new ground state is confirmed by first-principles calculations.
△ Less
Submitted 17 November, 2017;
originally announced November 2017.
-
Predicting phase behavior of grain boundaries with evolutionary search and machine learning
Authors:
Qiang Zhu,
Amit Samanta,
Bingxi Li,
Robert E. Rudd,
Timofey Frolov
Abstract:
The study of grain boundary phase transitions is an emerging field until recently dominated by experiments. The major bottleneck in exploration of this phenomenon with atomistic modeling has been the lack of a robust computational tool that can predict interface structure. Here we develop a new computational tool based on evolutionary algorithms that performs efficient grand-canonical grain bounda…
▽ More
The study of grain boundary phase transitions is an emerging field until recently dominated by experiments. The major bottleneck in exploration of this phenomenon with atomistic modeling has been the lack of a robust computational tool that can predict interface structure. Here we develop a new computational tool based on evolutionary algorithms that performs efficient grand-canonical grain boundary structure search and we design a clustering analysis that automatically identifies different grain boundary phases. Its application to a model system of symmetric tilt boundaries in Cu uncovers an unexpected rich polymorphism in the grain boundary structures. We find new ground and metastable states by exploring structures with different atomic densities. Our results demonstrate that the grain boundaries within the entire misorientation range have multiple phases and exhibit structural transitions, suggesting that phase behavior of interfaces is likely a general phenomenon.
△ Less
Submitted 30 July, 2017;
originally announced July 2017.
-
Toward Open-Set Face Recognition
Authors:
Manuel Günther,
Steve Cruz,
Ethan M. Rudd,
Terrance E. Boult
Abstract:
Much research has been conducted on both face identification and face verification, with greater focus on the latter. Research on face identification has mostly focused on using closed-set protocols, which assume that all probe images used in evaluation contain identities of subjects that are enrolled in the gallery. Real systems, however, where only a fraction of probe sample identities are enrol…
▽ More
Much research has been conducted on both face identification and face verification, with greater focus on the latter. Research on face identification has mostly focused on using closed-set protocols, which assume that all probe images used in evaluation contain identities of subjects that are enrolled in the gallery. Real systems, however, where only a fraction of probe sample identities are enrolled in the gallery, cannot make this closed-set assumption. Instead, they must assume an open set of probe samples and be able to reject/ignore those that correspond to unknown identities. In this paper, we address the widespread misconception that thresholding verification-like scores is a good way to solve the open-set face identification problem, by formulating an open-set face identification protocol and evaluating different strategies for assessing similarity. Our open-set identification protocol is based on the canonical labeled faces in the wild (LFW) dataset. Additionally to the known identities, we introduce the concepts of known unknowns (known, but uninteresting persons) and unknown unknowns (people never seen before) to the biometric community. We compare three algorithms for assessing similarity in a deep feature space under an open-set protocol: thresholded verification-like scores, linear discriminant analysis (LDA) scores, and an extreme value machine (EVM) probabilities. Our findings suggest that thresholding EVM probabilities, which are open-set by design, outperforms thresholding verification-like scores.
△ Less
Submitted 18 May, 2017; v1 submitted 3 May, 2017;
originally announced May 2017.
-
Automated U.S Diplomatic Cables Security Classification: Topic Model Pruning vs. Classification Based on Clusters
Authors:
Khudran Alzhrani,
Ethan M. Rudd,
C. Edward Chow,
Terrance E. Boult
Abstract:
The U.S Government has been the target for cyber-attacks from all over the world. Just recently, former President Obama accused the Russian government of the leaking emails to Wikileaks and declared that the U.S. might be forced to respond. While Russia denied involvement, it is clear that the U.S. has to take some defensive measures to protect its data infrastructure. Insider threats have been th…
▽ More
The U.S Government has been the target for cyber-attacks from all over the world. Just recently, former President Obama accused the Russian government of the leaking emails to Wikileaks and declared that the U.S. might be forced to respond. While Russia denied involvement, it is clear that the U.S. has to take some defensive measures to protect its data infrastructure. Insider threats have been the cause of other sensitive information leaks too, including the infamous Edward Snowden incident. Most of the recent leaks were in the form of text. Due to the nature of text data, security classifications are assigned manually. In an adversarial environment, insiders can leak texts through E-mail, printers, or any untrusted channels. The optimal defense is to automatically detect the unstructured text security class and enforce the appropriate protection mechanism without degrading services or daily tasks. Unfortunately, existing Data Leak Prevention (DLP) systems are not well suited for detecting unstructured texts. In this paper, we compare two recent approaches in the literature for text security classification, evaluating them on actual sensitive text data from the WikiLeaks dataset.
△ Less
Submitted 7 March, 2017;
originally announced March 2017.
-
Open Set Intrusion Recognition for Fine-Grained Attack Categorization
Authors:
Steve Cruz,
Cora Coleman,
Ethan M. Rudd,
Terrance E. Boult
Abstract:
Confidently distinguishing a malicious intrusion over a network is an important challenge. Most intrusion detection system evaluations have been performed in a closed set protocol in which only classes seen during training are considered during classification. Thus far, there has been no realistic application in which novel types of behaviors unseen at training -- unknown classes as it were -- mus…
▽ More
Confidently distinguishing a malicious intrusion over a network is an important challenge. Most intrusion detection system evaluations have been performed in a closed set protocol in which only classes seen during training are considered during classification. Thus far, there has been no realistic application in which novel types of behaviors unseen at training -- unknown classes as it were -- must be recognized for manual categorization. This paper comparatively evaluates malware classification using both closed set and open set protocols for intrusion recognition on the KDDCUP'99 dataset. In contrast to much of the previous work, we employ a fine-grained recognition protocol, in which the dataset is loosely open set -- i.e., recognizing individual intrusion types -- e.g., "sendmail", "snmp guess", ..., etc., rather than more general attack categories (e.g., "DoS","Probe","R2L","U2R","Normal"). We also employ two different classifier types -- Gaussian RBF kernel SVMs, which are not theoretically guaranteed to bound open space risk, and W-SVMs, which are theoretically guaranteed to bound open space risk. We find that the W-SVM offers superior performance under the open set regime, particularly as the cost of misclassifying unknown classes at query time (i.e., classes not present in the training set) increases. Results of performance tradeoff with respect to cost of unknown as well as discussion of the ramifications of these findings in an operational setting are presented.
△ Less
Submitted 7 March, 2017;
originally announced March 2017.
-
Automated Big Text Security Classification
Authors:
Khudran Alzhrani,
Ethan M. Rudd,
Terrance E. Boult,
C. Edward Chow
Abstract:
In recent years, traditional cybersecurity safeguards have proven ineffective against insider threats. Famous cases of sensitive information leaks caused by insiders, including the WikiLeaks release of diplomatic cables and the Edward Snowden incident, have greatly harmed the U.S. government's relationship with other governments and with its own citizens. Data Leak Prevention (DLP) is a solution f…
▽ More
In recent years, traditional cybersecurity safeguards have proven ineffective against insider threats. Famous cases of sensitive information leaks caused by insiders, including the WikiLeaks release of diplomatic cables and the Edward Snowden incident, have greatly harmed the U.S. government's relationship with other governments and with its own citizens. Data Leak Prevention (DLP) is a solution for detecting and preventing information leaks from within an organization's network. However, state-of-art DLP detection models are only able to detect very limited types of sensitive information, and research in the field has been hindered due to the lack of available sensitive texts. Many researchers have focused on document-based detection with artificially labeled "confidential documents" for which security labels are assigned to the entire document, when in reality only a portion of the document is sensitive. This type of whole-document based security labeling increases the chances of preventing authorized users from accessing non-sensitive information within sensitive documents. In this paper, we introduce Automated Classification Enabled by Security Similarity (ACESS), a new and innovative detection model that penetrates the complexity of big text security classification/detection. To analyze the ACESS system, we constructed a novel dataset, containing formerly classified paragraphs from diplomatic cables made public by the WikiLeaks organization. To our knowledge this paper is the first to analyze a dataset that contains actual formerly sensitive information annotated at paragraph granularity.
△ Less
Submitted 21 October, 2016;
originally announced October 2016.
-
Are Facial Attributes Adversarially Robust?
Authors:
Andras Rozsa,
Manuel Günther,
Ethan M. Rudd,
Terrance E. Boult
Abstract:
Facial attributes are emerging soft biometrics that have the potential to reject non-matches, for example, based on mismatching gender. To be usable in stand-alone systems, facial attributes must be extracted from images automatically and reliably. In this paper, we propose a simple yet effective solution for automatic facial attribute extraction by training a deep convolutional neural network (DC…
▽ More
Facial attributes are emerging soft biometrics that have the potential to reject non-matches, for example, based on mismatching gender. To be usable in stand-alone systems, facial attributes must be extracted from images automatically and reliably. In this paper, we propose a simple yet effective solution for automatic facial attribute extraction by training a deep convolutional neural network (DCNN) for each facial attribute separately, without using any pre-training or dataset augmentation, and we obtain new state-of-the-art facial attribute classification results on the CelebA benchmark. To test the stability of the networks, we generated adversarial images -- formed by adding imperceptible non-random perturbations to original inputs which result in classification errors -- via a novel fast flipping attribute (FFA) technique. We show that FFA generates more adversarial examples than other related algorithms, and that DCNNs for certain attributes are generally robust to adversarial inputs, while DCNNs for other attributes are not. This result is surprising because no DCNNs tested to date have exhibited robustness to adversarial images without explicit augmentation in the training procedure to account for adversarial examples. Finally, we introduce the concept of natural adversarial samples, i.e., images that are misclassified but can be easily turned into correctly classified images by applying small perturbations. We demonstrate that natural adversarial samples commonly occur, even within the training set, and show that many of these images remain misclassified even with additional training epochs. This phenomenon is surprising because correcting the misclassification, particularly when guided by training data, should require only a small adjustment to the DCNN parameters.
△ Less
Submitted 16 September, 2016; v1 submitted 17 May, 2016;
originally announced May 2016.
-
PARAPH: Presentation Attack Rejection by Analyzing Polarization Hypotheses
Authors:
Ethan M. Rudd,
Manuel Gunther,
Terrance E. Boult
Abstract:
For applications such as airport border control, biometric technologies that can process many capture subjects quickly, efficiently, with weak supervision, and with minimal discomfort are desirable. Facial recognition is particularly appealing because it is minimally invasive yet offers relatively good recognition performance. Unfortunately, the combination of weak supervision and minimal invasive…
▽ More
For applications such as airport border control, biometric technologies that can process many capture subjects quickly, efficiently, with weak supervision, and with minimal discomfort are desirable. Facial recognition is particularly appealing because it is minimally invasive yet offers relatively good recognition performance. Unfortunately, the combination of weak supervision and minimal invasiveness makes even highly accurate facial recognition systems susceptible to spoofing via presentation attacks. Thus, there is great demand for an effective and low cost system capable of rejecting such attacks.To this end we introduce PARAPH -- a novel hardware extension that exploits different measurements of light polarization to yield an image space in which presentation media are readily discernible from Bona Fide facial characteristics. The PARAPH system is inexpensive with an added cost of less than 10 US dollars. The system makes two polarization measurements in rapid succession, allowing them to be approximately pixel-aligned, with a frame rate limited by the camera, not the system. There are no moving parts above the molecular level, due to the efficient use of twisted nematic liquid crystals. We present evaluation images using three presentation attack media next to an actual face -- high quality photos on glossy and matte paper and a video of the face on an LCD. In each case, the actual face in the image generated by PARAPH is structurally discernible from the presentations, which appear either as noise (print attacks) or saturated images (replay attacks).
△ Less
Submitted 10 May, 2016;
originally announced May 2016.
-
CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition
Authors:
Ethan M. Rudd,
Terrance E. Boult
Abstract:
Architectures relying on continuous authentication require a secure way to challenge the user's identity without trusting that the Continuous Authentication Subsystem (CAS) has not been compromised, i.e., that the response to the layer which manages service/application access is not fake. In this paper, we introduce the CALIPER protocol, in which a separate Continuous Access Verification Entity (C…
▽ More
Architectures relying on continuous authentication require a secure way to challenge the user's identity without trusting that the Continuous Authentication Subsystem (CAS) has not been compromised, i.e., that the response to the layer which manages service/application access is not fake. In this paper, we introduce the CALIPER protocol, in which a separate Continuous Access Verification Entity (CAVE) directly challenges the user's identity in a continuous authentication regime. Instead of simply returning authentication probabilities or confidence scores, CALIPER's CAS uses live hard and soft biometric samples from the user to extract a cryptographic private key embedded in a challenge posed by the CAVE. The CAS then uses this key to sign a response to the CAVE. CALIPER supports multiple modalities, key lengths, and security levels and can be applied in two scenarios: One where the CAS must authenticate its user to a CAVE running on a remote server (device-server) for access to remote application data, and another where the CAS must authenticate its user to a locally running trusted computing module (TCM) for access to local application data (device-TCM). We further demonstrate that CALIPER can leverage device hardware resources to enable privacy and security even when the device's kernel is compromised, and we show how this authentication protocol can even be expanded to obfuscate direct kernel object manipulation (DKOM) malwares.
△ Less
Submitted 10 May, 2016;
originally announced May 2016.
-
Adversarial Diversity and Hard Positive Generation
Authors:
Andras Rozsa,
Ethan M. Rudd,
Terrance E. Boult
Abstract:
State-of-the-art deep neural networks suffer from a fundamental problem - they misclassify adversarial examples formed by applying small perturbations to inputs. In this paper, we present a new psychometric perceptual adversarial similarity score (PASS) measure for quantifying adversarial images, introduce the notion of hard positive generation, and use a diverse set of adversarial perturbations -…
▽ More
State-of-the-art deep neural networks suffer from a fundamental problem - they misclassify adversarial examples formed by applying small perturbations to inputs. In this paper, we present a new psychometric perceptual adversarial similarity score (PASS) measure for quantifying adversarial images, introduce the notion of hard positive generation, and use a diverse set of adversarial perturbations - not just the closest ones - for data augmentation. We introduce a novel hot/cold approach for adversarial example generation, which provides multiple possible adversarial perturbations for every single image. The perturbations generated by our novel approach often correspond to semantically meaningful image structures, and allow greater flexibility to scale perturbation-amplitudes, which yields an increased diversity of adversarial images. We present adversarial images on several network topologies and datasets, including LeNet on the MNIST dataset, and GoogLeNet and ResidualNet on the ImageNet dataset. Finally, we demonstrate on LeNet and GoogLeNet that fine-tuning with a diverse set of hard positives improves the robustness of these networks compared to training with prior methods of generating adversarial images.
△ Less
Submitted 16 May, 2016; v1 submitted 5 May, 2016;
originally announced May 2016.
-
MOON: A Mixed Objective Optimization Network for the Recognition of Facial Attributes
Authors:
Ethan Rudd,
Manuel Günther,
Terrance Boult
Abstract:
Attribute recognition, particularly facial, extracts many labels for each image. While some multi-task vision problems can be decomposed into separate tasks and stages, e.g., training independent models for each task, for a growing set of problems joint optimization across all tasks has been shown to improve performance. We show that for deep convolutional neural network (DCNN) facial attribute ex…
▽ More
Attribute recognition, particularly facial, extracts many labels for each image. While some multi-task vision problems can be decomposed into separate tasks and stages, e.g., training independent models for each task, for a growing set of problems joint optimization across all tasks has been shown to improve performance. We show that for deep convolutional neural network (DCNN) facial attribute extraction, multi-task optimization is better. Unfortunately, it can be difficult to apply joint optimization to DCNNs when training data is imbalanced, and re-balancing multi-label data directly is structurally infeasible, since adding/removing data to balance one label will change the sampling of the other labels. This paper addresses the multi-label imbalance problem by introducing a novel mixed objective optimization network (MOON) with a loss function that mixes multiple task objectives with domain adaptive re-weighting of propagated loss. Experiments demonstrate that not only does MOON advance the state of the art in facial attribute recognition, but it also outperforms independently trained DCNNs using the same data. When using facial attributes for the LFW face recognition task, we show that our balanced (domain adapted) network outperforms the unbalanced trained network.
△ Less
Submitted 21 October, 2016; v1 submitted 22 March, 2016;
originally announced March 2016.
-
A Survey of Stealth Malware: Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions
Authors:
Ethan M. Rudd,
Andras Rozsa,
Manuel Günther,
Terrance E. Boult
Abstract:
As our professional, social, and financial existences become increasingly digitized and as our government, healthcare, and military infrastructures rely more on computer technologies, they present larger and more lucrative targets for malware. Stealth malware in particular poses an increased threat because it is specifically designed to evade detection mechanisms, spreading dormant, in the wild fo…
▽ More
As our professional, social, and financial existences become increasingly digitized and as our government, healthcare, and military infrastructures rely more on computer technologies, they present larger and more lucrative targets for malware. Stealth malware in particular poses an increased threat because it is specifically designed to evade detection mechanisms, spreading dormant, in the wild for extended periods of time, gathering sensitive information or positioning itself for a high-impact zero-day attack. Policing the growing attack surface requires the development of efficient anti-malware solutions with improved generalization to detect novel types of malware and resolve these occurrences with as little burden on human experts as possible. In this paper, we survey malicious stealth technologies as well as existing solutions for detecting and categorizing these countermeasures autonomously. While machine learning offers promising potential for increasingly autonomous solutions with improved generalization to new malware types, both at the network level and at the host level, our findings suggest that several flawed assumptions inherent to most recognition algorithms prevent a direct mapping between the stealth malware recognition problem and a machine learning solution. The most notable of these flawed assumptions is the closed world assumption: that no sample belonging to a class outside of a static training set will appear at query time. We present a formalized adaptive open world framework for stealth malware recognition and relate it mathematically to research from other machine learning domains.
△ Less
Submitted 2 December, 2016; v1 submitted 18 March, 2016;
originally announced March 2016.
-
The Extreme Value Machine
Authors:
Ethan M. Rudd,
Lalit P. Jain,
Walter J. Scheirer,
Terrance E. Boult
Abstract:
It is often desirable to be able to recognize when inputs to a recognition function learned in a supervised manner correspond to classes unseen at training time. With this ability, new class labels could be assigned to these inputs by a human operator, allowing them to be incorporated into the recognition function --- ideally under an efficient incremental update mechanism. While good algorithms t…
▽ More
It is often desirable to be able to recognize when inputs to a recognition function learned in a supervised manner correspond to classes unseen at training time. With this ability, new class labels could be assigned to these inputs by a human operator, allowing them to be incorporated into the recognition function --- ideally under an efficient incremental update mechanism. While good algorithms that assume inputs from a fixed set of classes exist, e.g., artificial neural networks and kernel machines, it is not immediately obvious how to extend them to perform incremental learning in the presence of unknown query classes. Existing algorithms take little to no distributional information into account when learning recognition functions and lack a strong theoretical foundation. We address this gap by formulating a novel, theoretically sound classifier --- the Extreme Value Machine (EVM). The EVM has a well-grounded interpretation derived from statistical Extreme Value Theory (EVT), and is the first classifier to be able to perform nonlinear kernel-free variable bandwidth incremental learning. Compared to other classifiers in the same deep network derived feature space, the EVM is accurate and efficient on an established benchmark partition of the ImageNet dataset.
△ Less
Submitted 20 May, 2017; v1 submitted 19 June, 2015;
originally announced June 2015.
-
Void Growth in BCC Metals Simulated with Molecular Dynamics using the Finnis-Sinclair Potential
Authors:
Robert E. Rudd
Abstract:
The process of fracture in ductile metals involves the nucleation, growth, and linking of voids. This process takes place both at the low rates involved in typical engineering applications and at the high rates associated with dynamic fracture processes such as spallation. Here we study the growth of a void in a single crystal at high rates using molecular dynamics (MD) based on Finnis-Sinclair…
▽ More
The process of fracture in ductile metals involves the nucleation, growth, and linking of voids. This process takes place both at the low rates involved in typical engineering applications and at the high rates associated with dynamic fracture processes such as spallation. Here we study the growth of a void in a single crystal at high rates using molecular dynamics (MD) based on Finnis-Sinclair interatomic potentials for the body-centred cubic (bcc) metals V, Nb, Mo, Ta, and W. The use of the Finnis-Sinclair potential enables the study of plasticity associated with void growth at the atomic level at room temperature and strain rates from 10^9/s down to 10^6/s and systems as large as 128 million atoms. The atomistic systems are observed to undergo a transition from twinning at the higher end of this range to dislocation flow at the lower end. We analyze the simulations for the specific mechanisms of plasticity associated with void growth as dislocation loops are punched out to accommodate the growing void. We also analyse the process of nucleation and growth of voids in simulations of nanocrystalline Ta expanding at different strain rates. We comment on differences in the plasticity associated with void growth in the bcc metals compared to earlier studies in face-centred cubic (fcc) metals.
△ Less
Submitted 2 June, 2009;
originally announced June 2009.
-
High-rate Plastic Deformation of Nanocrystalline Tantalum to Large Strains: Molecular Dynamics Simulation
Authors:
Robert E. Rudd
Abstract:
Here we use large-scale molecular dynamics (MD) simulations of the high-rate deformation of nanocrystalline tantalum to investigate the processes associated with plastic deformation for strains up to 100%. We use initial atomic configurations that were produced through simulations of solidification in the work of Streitz et al [Phys. Rev. Lett. 96, (2006) 225701]. These 3D polycrystalline system…
▽ More
Here we use large-scale molecular dynamics (MD) simulations of the high-rate deformation of nanocrystalline tantalum to investigate the processes associated with plastic deformation for strains up to 100%. We use initial atomic configurations that were produced through simulations of solidification in the work of Streitz et al [Phys. Rev. Lett. 96, (2006) 225701]. These 3D polycrystalline systems have typical grain sizes of 10-20 nm. We also study a rapidly quenched liquid (amorphous solid) tantalum. We apply a constant volume (isochoric), constant temperature (isothermal) shear deformation over a range of strain rates, and compute the resulting stress-strain curves to large strains for both uniaxial and biaxial compression. We study the rate dependence and identify plastic deformation mechanisms. The identification of the mechanisms is facilitated through a novel technique that computes the local grain orientation, returning it as a quaternion for each atom. We find both dislocation and twinning processes are important, and they interact in the weak strain hardening in these extremely fine-grained microstructures.
△ Less
Submitted 25 February, 2009;
originally announced February 2009.
-
Atoms in the Surf: Molecular Dynamics Simulation of the Kelvin-Helmholtz Instability using 9 Billion Atoms
Authors:
D. F. Richards,
L. D. Krauss,
W. H. Cabot,
K. J. Caspersen,
A. W. Cook,
J. N. Glosli,
R. E. Rudd,
F. H. Streitz
Abstract:
We present a fluid dynamics video showing the results of a 9-billion atom molecular dynamics simulation of complex fluid flow in molten copper and aluminum. Starting with an atomically flat interface, a shear is imposed along the copper-aluminum interface and random atomic fluctuations seed the formation of vortices. These vortices grow due to the Kelvin-Helmholtz instability. The resulting vort…
▽ More
We present a fluid dynamics video showing the results of a 9-billion atom molecular dynamics simulation of complex fluid flow in molten copper and aluminum. Starting with an atomically flat interface, a shear is imposed along the copper-aluminum interface and random atomic fluctuations seed the formation of vortices. These vortices grow due to the Kelvin-Helmholtz instability. The resulting vortical structures are beautifully intricate, decorated with secondary instabilities and complex mixing phenomena. This work performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344.
△ Less
Submitted 16 October, 2008;
originally announced October 2008.
-
Elastic constants and volume changes associated with two high-pressure rhombohedral phase transformations in vanadium
Authors:
B. Lee,
R. E. Rudd,
J. E. Klepeis,
R. Becker
Abstract:
We present results from ab initio calculations of the mechanical properties of the rhombohedral phase (beta) of vanadium metal reported in recent experiments, and other predicted high-pressure phases (gamma and bcc), focusing on properties relevant to dynamic experiments. We find that the volume change associated with these transitions is small: no more than 0.15% (for beta - gamma). Calculation…
▽ More
We present results from ab initio calculations of the mechanical properties of the rhombohedral phase (beta) of vanadium metal reported in recent experiments, and other predicted high-pressure phases (gamma and bcc), focusing on properties relevant to dynamic experiments. We find that the volume change associated with these transitions is small: no more than 0.15% (for beta - gamma). Calculations of the single crystal and polycrystal elastic moduli (stress-strain coefficients) reveal a remarkably small discontinuity in the shear modulus and other elastic properties across the phase transitions even at zero temperature where the transitions are first order.
△ Less
Submitted 18 January, 2008; v1 submitted 27 November, 2007;
originally announced November 2007.
-
The Role of Reconstructed Surfaces in the Intrinsic Dissipative Dynamics of Silicon Nanoresonators
Authors:
M. Chu,
R. E. Rudd,
M. P. Blencowe
Abstract:
Dissipation in the flexural dynamics of doubly clamped nanomechanical bar resonators is investigated using molecular dynamics simulation. The dependence of the quality factor Q on temperature and the size of the resonator is calculated from direct simulation of the oscillation of a series of Si <001> bars with bare {100} dimerized surfaces. The bar widths range from 3.3 to 8.7nm, all with a fixe…
▽ More
Dissipation in the flexural dynamics of doubly clamped nanomechanical bar resonators is investigated using molecular dynamics simulation. The dependence of the quality factor Q on temperature and the size of the resonator is calculated from direct simulation of the oscillation of a series of Si <001> bars with bare {100} dimerized surfaces. The bar widths range from 3.3 to 8.7nm, all with a fixed length of 22nm. The fundamental mode frequencies range from 40 to 90GHz and Q from 10^2 near 1000K to 10^4 near 50K. The quality factor is shown to be limited by defects in the reconstructed surface.
△ Less
Submitted 30 April, 2007;
originally announced May 2007.
-
First-principles calculation of mechanical properties of Si <001> nanowires and comparison to nanomechanical theory
Authors:
Byeongchan Lee,
Robert E. Rudd
Abstract:
We report the results of first-principles density functional theory calculations of the Young's modulus and other mechanical properties of hydrogen-passivated Si <001> nanowires. The nanowires are taken to have predominantly {100} surfaces, with small {110} facets according to the Wulff shape. The Young's modulus, the equilibrium length and the constrained residual stress of a series of prismati…
▽ More
We report the results of first-principles density functional theory calculations of the Young's modulus and other mechanical properties of hydrogen-passivated Si <001> nanowires. The nanowires are taken to have predominantly {100} surfaces, with small {110} facets according to the Wulff shape. The Young's modulus, the equilibrium length and the constrained residual stress of a series of prismatic beams of differing sizes are found to have size dependences that scale like the surface area to volume ratio for all but the smallest beam. The results are compared with a continuum model and the results of classical atomistic calculations based on an empirical potential. We attribute the size dependence to specific physical structures and interactions. In particular, the hydrogen interactions on the surface and the charge density variations within the beam are quantified and used both to parameterize the continuum model and to account for the discrepancies between the two models and the first-principles results.
△ Less
Submitted 22 February, 2007;
originally announced February 2007.
-
First-principles study of the Young's modulus of Si <001> nanowires
Authors:
Byeongchan Lee,
Robert E. Rudd
Abstract:
We report the results of first-principles density functional theory calculations of the Young's modulus and other mechanical properties of hydrogen-passivated Si <001> nanowires. The nanowires are taken to have predominantly {100} surfaces, with small {110} facets. The Young's modulus, the equilibrium length and the residual stress of a series of prismatic wires are found to have a size dependen…
▽ More
We report the results of first-principles density functional theory calculations of the Young's modulus and other mechanical properties of hydrogen-passivated Si <001> nanowires. The nanowires are taken to have predominantly {100} surfaces, with small {110} facets. The Young's modulus, the equilibrium length and the residual stress of a series of prismatic wires are found to have a size dependence that scales like the surface area to volume ratio for all but the smallest wires. We analyze the physical origin of the size dependence, and compare the results to two existing models.
△ Less
Submitted 2 November, 2006;
originally announced November 2006.
-
Coarse-grained molecular dynamics: Nonlinear finite elements and finite temperature
Authors:
Robert E. Rudd,
Jeremy Q. Broughton
Abstract:
Coarse-grained molecular dynamics (CGMD) is a technique developed as a concurrent multiscale model that couples conventional molecular dynamics (MD) to a more coarse-grained description of the periphery. The coarse-grained regions are modeled on a mesh in a formulation that generalizes conventional finite element modeling (FEM) of continuum elasticity. CGMD is derived solely from the MD model, h…
▽ More
Coarse-grained molecular dynamics (CGMD) is a technique developed as a concurrent multiscale model that couples conventional molecular dynamics (MD) to a more coarse-grained description of the periphery. The coarse-grained regions are modeled on a mesh in a formulation that generalizes conventional finite element modeling (FEM) of continuum elasticity. CGMD is derived solely from the MD model, however, and has no continuum parameters. As a result, it provides a coupling that is smooth and provides control of errors that arise at the coupling between the atomistic and coarse-grained regions. In this article, we elaborate on the formulation of CGMD, describing in detail how CGMD is applied to anharmonic solids and finite temperature simulations. As tests of CGMD, we present in detail the calculation of the phonon spectra for solid argon and tantalum in 3D, demonstrating how CGMD provides a better description of the elastic waves than that provided by FEM. We also present elastic wave scattering calculations that show the elastic wave scattering is more benign in CGMD than FEM. We also discuss the dependence of scattering on the properties of the mesh. We introduce a rigid approximation to CGMD that eliminates internal relaxation, similar to the Quasicontinuum technique, and compare it to the full CGMD.
△ Less
Submitted 22 August, 2005;
originally announced August 2005.
-
Three-dimensional molecular dynamics simulations of void coalescence during dynamic fracture of ductile metals
Authors:
E. T. Seppälä,
J. Belak,
R. E. Rudd
Abstract:
Void coalescence and interaction in dynamic fracture of ductile metals have been investigated using three-dimensional strain-controlled multi-million atom molecular dynamics simulations of copper. The correlated growth of two voids during the coalescence process leading to fracture is investigated, both in terms of its onset and the ensuing dynamical interactions. Void interactions are quantifie…
▽ More
Void coalescence and interaction in dynamic fracture of ductile metals have been investigated using three-dimensional strain-controlled multi-million atom molecular dynamics simulations of copper. The correlated growth of two voids during the coalescence process leading to fracture is investigated, both in terms of its onset and the ensuing dynamical interactions. Void interactions are quantified through the rate of reduction of the distance between the voids, through the correlated directional growth of the voids, and through correlated shape evolution of the voids. The critical inter-void ligament distance marking the onset of coalescence is shown to be approximately one void radius based on the quantification measurements used, independent of the initial separation distance between the voids and the strain-rate of the expansion of the system. The interaction of the voids is not reflected in the volumetric asymptotic growth rate of the voids, as demonstrated here. Finally, the practice of using a single void and periodic boundary conditions to study coalescence is examined critically and shown to produce results markedly different than the coalescence of a pair of isolated voids.
△ Less
Submitted 16 January, 2005;
originally announced January 2005.
-
The onset of void coalescence during dynamic fracture of ductile metals
Authors:
E. T. Seppälä,
J. Belak,
R. E. Rudd
Abstract:
Molecular dynamics simulations in three-dimensional copper have been performed to quantify the void coalescence process leading to fracture. The correlated growth of the voids during their linking is investigated both in terms of the onset of coalescence and the ensuing dynamical interactions through the rate of reduction of the distance between the voids and the directional growth of the voids.…
▽ More
Molecular dynamics simulations in three-dimensional copper have been performed to quantify the void coalescence process leading to fracture. The correlated growth of the voids during their linking is investigated both in terms of the onset of coalescence and the ensuing dynamical interactions through the rate of reduction of the distance between the voids and the directional growth of the voids. The critical inter-void ligament distance marking the onset of coalescence is shown to be approximately one void radius in both measures.
△ Less
Submitted 24 October, 2004;
originally announced October 2004.
-
Nucleation and Growth of GaN/AlN Quantum Dots
Authors:
C. Adelmann,
B. Daudin,
R. A. Oliver,
G. A. D. Briggs,
R. E. Rudd
Abstract:
We study the nucleation of GaN islands grown by plasma-assisted molecular-beam epitaxy on AlN(0001) in a Stranski-Krastanov mode. In particular, we assess the variation of their height and density as a function of GaN coverage. We show that the GaN growth passes four stages: initially, the growth is layer-by-layer; subsequently, two-dimensional precursor islands form, which transform into genuin…
▽ More
We study the nucleation of GaN islands grown by plasma-assisted molecular-beam epitaxy on AlN(0001) in a Stranski-Krastanov mode. In particular, we assess the variation of their height and density as a function of GaN coverage. We show that the GaN growth passes four stages: initially, the growth is layer-by-layer; subsequently, two-dimensional precursor islands form, which transform into genuine three-dimensional islands. During the latter stage, island height and density increase with GaN coverage until the density saturates. During further GaN growth, the density remains constant and a bimodal height distribution appears. The variation of island height and density as a function of substrate temperature is discussed in the framework of an equilibrium model for Stranski-Krastanov growth.
△ Less
Submitted 3 November, 2003;
originally announced November 2003.
-
Effect of stress-triaxiality on void growth in dynamic fracture of metals: a molecular dynamics study
Authors:
E. T. Seppälä,
J. Belak,
R. E. Rudd
Abstract:
The effect of stress-triaxiality on growth of a void in a three dimensional single-crystal face-centered-cubic (FCC) lattice has been studied. Molecular dynamics (MD) simulations using an embedded-atom (EAM) potential for copper have been performed at room temperature and using strain controlling with high strain rates ranging from 10^7/sec to 10^10/sec. Strain-rates of these magnitudes can be s…
▽ More
The effect of stress-triaxiality on growth of a void in a three dimensional single-crystal face-centered-cubic (FCC) lattice has been studied. Molecular dynamics (MD) simulations using an embedded-atom (EAM) potential for copper have been performed at room temperature and using strain controlling with high strain rates ranging from 10^7/sec to 10^10/sec. Strain-rates of these magnitudes can be studied experimentally, e.g. using shock waves induced by laser ablation. Void growth has been simulated in three different conditions, namely uniaxial, biaxial, and triaxial expansion. The response of the system in the three cases have been compared in terms of the void growth rate, the detailed void shape evolution, and the stress-strain behavior including the development of plastic strain. Also macroscopic observables as plastic work and porosity have been computed from the atomistic level. The stress thresholds for void growth are found to be comparable with spall strength values determined by dynamic fracture experiments. The conventional macroscopic assumption that the mean plastic strain results from the growth of the void is validated. The evolution of the system in the uniaxial case is found to exhibit four different regimes: elastic expansion; plastic yielding, when the mean stress is nearly constant, but the stress-triaxiality increases rapidly together with exponential growth of the void; saturation of the stress-triaxiality; and finally the failure.
△ Less
Submitted 1 April, 2004; v1 submitted 22 October, 2003;
originally announced October 2003.
-
Frenkel-Kontorova Model of Vacancy-Line Interactions on Ga/Si(112): Formalism
Authors:
S. C. Erwin,
A. A. Baski,
L. J. Whitman,
R. E. Rudd
Abstract:
We describe in greater detail the exactly solvable microscopic model we have developed for analyzing the strain-mediated interaction of vacancy lines in a pseudomorphic adsorbate system (Phys. Rev. Lett., to appear). The model is applied to Ga/Si(112) by extracting values for the microscopic parameters from total-energy calculations. The results, which are in good agreement with experimental obs…
▽ More
We describe in greater detail the exactly solvable microscopic model we have developed for analyzing the strain-mediated interaction of vacancy lines in a pseudomorphic adsorbate system (Phys. Rev. Lett., to appear). The model is applied to Ga/Si(112) by extracting values for the microscopic parameters from total-energy calculations. The results, which are in good agreement with experimental observations, reveal an unexpectedly complex interplay between compressive and tensile strain within the mixed Ga-Si surface layer.
△ Less
Submitted 12 July, 1999; v1 submitted 12 May, 1999;
originally announced May 1999.
-
Coupling of Length Scales and Atomistic Simulation of MEMS Resonators
Authors:
Robert E. Rudd,
Jeremy Q. Broughton
Abstract:
We present simulations of the dynamic and temperature dependent behavior of Micro-Electro-Mechanical Systems (MEMS) by utilizing recently developed parallel codes which enable a coupling of length scales. The novel techniques used in this simulation accurately model the behavior of the mechanical components of MEMS down to the atomic scale. We study the vibrational behavior of one class of MEMS…
▽ More
We present simulations of the dynamic and temperature dependent behavior of Micro-Electro-Mechanical Systems (MEMS) by utilizing recently developed parallel codes which enable a coupling of length scales. The novel techniques used in this simulation accurately model the behavior of the mechanical components of MEMS down to the atomic scale. We study the vibrational behavior of one class of MEMS devices: micron-scale resonators made of silicon and quartz. The algorithmic and computational avenue applied here represents a significant departure from the usual finite element approach based on continuum elastic theory. The approach is to use an atomistic simulation in regions of significantly anharmonic forces and large surface area to volume ratios or where internal friction due to defects is anticipated. Peripheral regions of MEMS which are well-described by continuum elastic theory are simulated using finite elements for efficiency. Thus, in central regions of the device, the motion of millions of individual atoms is simulated, while the relatively large peripheral regions are modeled with finite elements. The two techniques run concurrently and mesh seamlessly, passing information back and forth. This coupling of length scales gives a natural domain decomposition, so that the code runs on multiprocessor workstations and supercomputers. We present novel simulations of the vibrational behavior of micron-scale silicon and quartz oscillators. Our results are contrasted with the predictions of continuum elastic theory as a function of size, and the failure of the continuum techniques is clear in the limit of small sizes. We also extract the Q value for the resonators and study the corresponding dissipative processes.
△ Less
Submitted 14 December, 1998;
originally announced December 1998.
-
The Josephson Effect in Single Spin Superconductors
Authors:
Robert E. Rudd,
Warren E. Pickett
Abstract:
The Josephson Effect provides a primary signature of single spin superconductivity (SSS), the as yet unobserved superconducting state which was proposed recently as a low temperature phase of half-metallic antiferromagnets. These materials are insulating in the spin-down channel but are metallic in the spin-up channel. The SSS state is characterized by a unique form of p-wave pairing within a si…
▽ More
The Josephson Effect provides a primary signature of single spin superconductivity (SSS), the as yet unobserved superconducting state which was proposed recently as a low temperature phase of half-metallic antiferromagnets. These materials are insulating in the spin-down channel but are metallic in the spin-up channel. The SSS state is characterized by a unique form of p-wave pairing within a single spin channel. We develop the theory of a rich variety of Josephson effects that arise due to the form of the SSS order parameter. Tunneling is allowed at a SSS-SSS' junction but of course depends on the relative orientation of their order parameters. No current flows between an SSS and an s-wave BCS system due to their orthogonal symmetries, which potentially can be used to distinguish SSS from other superconducting states. Single spin superconductors also offer a means to probe other materials, where tunneling is a litmus test for any form of ``triplet'' order parameter.
△ Less
Submitted 10 June, 1998;
originally announced June 1998.