-
Post-hoc reweighting of hadron production in the Lund string model
Authors:
Benoît Assi,
Christan Bierlich,
Philip Ilten,
Tony Menzo,
Stephen Mrenna,
Manuel Szewc,
Michael K. Wilkinson,
Ahmed Youssef,
Jure Zupan
Abstract:
We present a method for reweighting flavor selection in the Lund string fragmentation model. This is the process of calculating and applying event weights enabling fast and exact variation of hadronization parameters on pre-generated event samples. The procedure is post hoc, requiring only a small amount of additional information stored per event, and allowing for efficient estimation of hadroniza…
▽ More
We present a method for reweighting flavor selection in the Lund string fragmentation model. This is the process of calculating and applying event weights enabling fast and exact variation of hadronization parameters on pre-generated event samples. The procedure is post hoc, requiring only a small amount of additional information stored per event, and allowing for efficient estimation of hadronization uncertainties without repeated simulation. Weight expressions are derived from the hadronization algorithm itself, and validated against direct simulation for a wide range of observables and parameter shifts. The hadronization algorithm can be viewed as a hierarchical Markov process with stochastic rejections, a structure common to many complex simulations outside of high-energy physics. This perspective makes the method modular, extensible, and potentially transferable to other domains. We demonstrate the approach in Pythia, including both numerical stability and timing benefits.
△ Less
Submitted 30 April, 2025;
originally announced May 2025.
-
A BERT-Style Self-Supervised Learning CNN for Disease Identification from Retinal Images
Authors:
Xin Li,
Wenhui Zhu,
Peijie Qiu,
Oana M. Dumitrascu,
Amal Youssef,
Yalin Wang
Abstract:
In the field of medical imaging, the advent of deep learning, especially the application of convolutional neural networks (CNNs) has revolutionized the analysis and interpretation of medical images. Nevertheless, deep learning methods usually rely on large amounts of labeled data. In medical imaging research, the acquisition of high-quality labels is both expensive and difficult. The introduction…
▽ More
In the field of medical imaging, the advent of deep learning, especially the application of convolutional neural networks (CNNs) has revolutionized the analysis and interpretation of medical images. Nevertheless, deep learning methods usually rely on large amounts of labeled data. In medical imaging research, the acquisition of high-quality labels is both expensive and difficult. The introduction of Vision Transformers (ViT) and self-supervised learning provides a pre-training strategy that utilizes abundant unlabeled data, effectively alleviating the label acquisition challenge while broadening the breadth of data utilization. However, ViT's high computational density and substantial demand for computing power, coupled with the lack of localization characteristics of its operations on image patches, limit its efficiency and applicability in many application scenarios. In this study, we employ nn-MobileNet, a lightweight CNN framework, to implement a BERT-style self-supervised learning approach. We pre-train the network on the unlabeled retinal fundus images from the UK Biobank to improve downstream application performance. We validate the results of the pre-trained model on Alzheimer's disease (AD), Parkinson's disease (PD), and various retinal diseases identification. The results show that our approach can significantly improve performance in the downstream tasks. In summary, this study combines the benefits of CNNs with the capabilities of advanced self-supervised learning in handling large-scale unlabeled data, demonstrating the potential of CNNs in the presence of label scarcity.
△ Less
Submitted 24 April, 2025;
originally announced April 2025.
-
Analysis of the MICCAI Brain Tumor Segmentation -- Metastases (BraTS-METS) 2025 Lighthouse Challenge: Brain Metastasis Segmentation on Pre- and Post-treatment MRI
Authors:
Nazanin Maleki,
Raisa Amiruddin,
Ahmed W. Moawad,
Nikolay Yordanov,
Athanasios Gkampenis,
Pascal Fehringer,
Fabian Umeh,
Crystal Chukwurah,
Fatima Memon,
Bojan Petrovic,
Justin Cramer,
Mark Krycia,
Elizabeth B. Shrickel,
Ichiro Ikuta,
Gerard Thompson,
Lorenna Vidal,
Vilma Kosovic,
Adam E. Goldman-Yassen,
Virginia Hill,
Tiffany So,
Sedra Mhana,
Albara Alotaibi,
Nathan Page,
Prisha Bhatia,
Yasaman Sharifi
, et al. (218 additional authors not shown)
Abstract:
Despite continuous advancements in cancer treatment, brain metastatic disease remains a significant complication of primary cancer and is associated with an unfavorable prognosis. One approach for improving diagnosis, management, and outcomes is to implement algorithms based on artificial intelligence for the automated segmentation of both pre- and post-treatment MRI brain images. Such algorithms…
▽ More
Despite continuous advancements in cancer treatment, brain metastatic disease remains a significant complication of primary cancer and is associated with an unfavorable prognosis. One approach for improving diagnosis, management, and outcomes is to implement algorithms based on artificial intelligence for the automated segmentation of both pre- and post-treatment MRI brain images. Such algorithms rely on volumetric criteria for lesion identification and treatment response assessment, which are still not available in clinical practice. Therefore, it is critical to establish tools for rapid volumetric segmentations methods that can be translated to clinical practice and that are trained on high quality annotated data. The BraTS-METS 2025 Lighthouse Challenge aims to address this critical need by establishing inter-rater and intra-rater variability in dataset annotation by generating high quality annotated datasets from four individual instances of segmentation by neuroradiologists while being recorded on video (two instances doing "from scratch" and two instances after AI pre-segmentation). This high-quality annotated dataset will be used for testing phase in 2025 Lighthouse challenge and will be publicly released at the completion of the challenge. The 2025 Lighthouse challenge will also release the 2023 and 2024 segmented datasets that were annotated using an established pipeline of pre-segmentation, student annotation, two neuroradiologists checking, and one neuroradiologist finalizing the process. It builds upon its previous edition by including post-treatment cases in the dataset. Using these high-quality annotated datasets, the 2025 Lighthouse challenge plans to test benchmark algorithms for automated segmentation of pre-and post-treatment brain metastases (BM), trained on diverse and multi-institutional datasets of MRI images obtained from patients with brain metastases.
△ Less
Submitted 6 May, 2025; v1 submitted 16 April, 2025;
originally announced April 2025.
-
Beyond Feature Importance: Feature Interactions in Predicting Post-Stroke Rigidity with Graph Explainable AI
Authors:
Jiawei Xu,
Yonggeon Lee,
Anthony Elkommos Youssef,
Eunjin Yun,
Tinglin Huang,
Tianjian Guo,
Hamidreza Saber,
Rex Ying,
Ying Ding
Abstract:
This study addresses the challenge of predicting post-stroke rigidity by emphasizing feature interactions through graph-based explainable AI. Post-stroke rigidity, characterized by increased muscle tone and stiffness, significantly affects survivors' mobility and quality of life. Despite its prevalence, early prediction remains limited, delaying intervention. We analyze 519K stroke hospitalization…
▽ More
This study addresses the challenge of predicting post-stroke rigidity by emphasizing feature interactions through graph-based explainable AI. Post-stroke rigidity, characterized by increased muscle tone and stiffness, significantly affects survivors' mobility and quality of life. Despite its prevalence, early prediction remains limited, delaying intervention. We analyze 519K stroke hospitalization records from the Healthcare Cost and Utilization Project dataset, where 43% of patients exhibited rigidity. We compare traditional approaches such as Logistic Regression, XGBoost, and Transformer with graph-based models like Graphormer and Graph Attention Network. These graph models inherently capture feature interactions and incorporate intrinsic or post-hoc explainability. Our results show that graph-based methods outperform others (AUROC 0.75), identifying key predictors such as NIH Stroke Scale and APR-DRG mortality risk scores. They also uncover interactions missed by conventional models. This research provides a novel application of graph-based XAI in stroke prognosis, with potential to guide early identification and personalized rehabilitation strategies.
△ Less
Submitted 10 April, 2025;
originally announced April 2025.
-
Characterizing the hadronization of parton showers using the HOMER method
Authors:
Benoit Assi,
Christan Bierlich,
Philip Ilten,
Tony Menzo,
Stephen Mrenna,
Manuel Szewc,
Michael K. Wilkinson,
Ahmed Youssef,
Jure Zupan
Abstract:
We update the HOMER method, a technique to solve a restricted version of the inverse problem of hadronization -- extracting the Lund string fragmentation function $f(z)$ from data using only observable information. Here, we demonstrate its utility by extracting $f(z)$ from synthetic Pythia simulations using high-level observables constructed on an event-by-event basis, such as multiplicities and s…
▽ More
We update the HOMER method, a technique to solve a restricted version of the inverse problem of hadronization -- extracting the Lund string fragmentation function $f(z)$ from data using only observable information. Here, we demonstrate its utility by extracting $f(z)$ from synthetic Pythia simulations using high-level observables constructed on an event-by-event basis, such as multiplicities and shape variables. Four cases of increasing complexity are considered, corresponding to $e^+e^-$ collisions at a center-of-mass energy of $90$ GeV producing either a string stretched between a $q$ and $\bar{q}$ containing no gluons; the same string containing one gluon $g$ with fixed kinematics; the same but the gluon has varying kinematics; and the most realistic case, strings with an unrestricted number of gluons that is the end-result of a parton shower. We demonstrate the extraction of $f(z)$ in each case, with the result of only a relatively modest degradation in performance of the HOMER method with the increased complexity of the string system.
△ Less
Submitted 7 March, 2025;
originally announced March 2025.
-
A Kolmogorov-Arnold Network for Explainable Detection of Cyberattacks on EV Chargers
Authors:
Ahmad Mohammad Saber,
Max Mauro Dias Santos,
Mohammad Al Janaideh,
Amr Youssef,
Deepa Kundur
Abstract:
The increasing adoption of Electric Vehicles (EVs) and the expansion of charging infrastructure and their reliance on communication expose Electric Vehicle Supply Equipment (EVSE) to cyberattacks. This paper presents a novel Kolmogorov-Arnold Network (KAN)-based framework for detecting cyberattacks on EV chargers using only power consumption measurements. Leveraging the KAN's capability to model n…
▽ More
The increasing adoption of Electric Vehicles (EVs) and the expansion of charging infrastructure and their reliance on communication expose Electric Vehicle Supply Equipment (EVSE) to cyberattacks. This paper presents a novel Kolmogorov-Arnold Network (KAN)-based framework for detecting cyberattacks on EV chargers using only power consumption measurements. Leveraging the KAN's capability to model nonlinear, high-dimensional functions and its inherently interpretable architecture, the framework effectively differentiates between normal and malicious charging scenarios. The model is trained offline on a comprehensive dataset containing over 100,000 cyberattack cases generated through an experimental setup. Once trained, the KAN model can be deployed within individual chargers for real-time detection of abnormal charging behaviors indicative of cyberattacks. Our results demonstrate that the proposed KAN-based approach can accurately detect cyberattacks on EV chargers with Precision and F1-score of 99% and 92%, respectively, outperforming existing detection methods. Additionally, the proposed KANs's enable the extraction of mathematical formulas representing KAN's detection decisions, addressing interpretability, a key challenge in deep learning-based cybersecurity frameworks. This work marks a significant step toward building secure and explainable EV charging infrastructure.
△ Less
Submitted 4 March, 2025;
originally announced March 2025.
-
Deep Photometric and Astrometric Investigation of the Non-relaxed Star Cluster Stock 3 using Gaia DR3
Authors:
A. Ahmed,
Amira R. Youssef,
M. S. El-Nawawy,
W. H. Elsanhoury
Abstract:
The study presents both photometric and kinematic analyses of the non-relaxed open cluster Stock 3 with Gaia DR3 which found to be positioned at 2.945 $\pm$ 0.700 kpc and having an age of 16.00 $\pm$ 4.00 Myr. We analyse the data to infer the membership and thus determine the total mass, IMF and the dynamical and kinematical status.
The study presents both photometric and kinematic analyses of the non-relaxed open cluster Stock 3 with Gaia DR3 which found to be positioned at 2.945 $\pm$ 0.700 kpc and having an age of 16.00 $\pm$ 4.00 Myr. We analyse the data to infer the membership and thus determine the total mass, IMF and the dynamical and kinematical status.
△ Less
Submitted 21 January, 2025;
originally announced January 2025.
-
Foundation Models in Radiology: What, How, When, Why and Why Not
Authors:
Magdalini Paschali,
Zhihong Chen,
Louis Blankemeier,
Maya Varma,
Alaa Youssef,
Christian Bluethgen,
Curtis Langlotz,
Sergios Gatidis,
Akshay Chaudhari
Abstract:
Recent advances in artificial intelligence have witnessed the emergence of large-scale deep learning models capable of interpreting and generating both textual and imaging data. Such models, typically referred to as foundation models, are trained on extensive corpora of unlabeled data and demonstrate high performance across various tasks. Foundation models have recently received extensive attentio…
▽ More
Recent advances in artificial intelligence have witnessed the emergence of large-scale deep learning models capable of interpreting and generating both textual and imaging data. Such models, typically referred to as foundation models, are trained on extensive corpora of unlabeled data and demonstrate high performance across various tasks. Foundation models have recently received extensive attention from academic, industry, and regulatory bodies. Given the potentially transformative impact that foundation models can have on the field of radiology, this review aims to establish a standardized terminology concerning foundation models, with a specific focus on the requirements of training data, model training paradigms, model capabilities, and evaluation strategies. We further outline potential pathways to facilitate the training of radiology-specific foundation models, with a critical emphasis on elucidating both the benefits and challenges associated with such models. Overall, we envision that this review can unify technical advances and clinical needs in the training of foundation models for radiology in a safe and responsible manner, for ultimately benefiting patients, providers, and radiologists.
△ Less
Submitted 6 February, 2025; v1 submitted 27 November, 2024;
originally announced November 2024.
-
Transforming the Hybrid Cloud for Emerging AI Workloads
Authors:
Deming Chen,
Alaa Youssef,
Ruchi Pendse,
André Schleife,
Bryan K. Clark,
Hendrik Hamann,
Jingrui He,
Teodoro Laino,
Lav Varshney,
Yuxiong Wang,
Avirup Sil,
Reyhaneh Jabbarvand,
Tianyin Xu,
Volodymyr Kindratenko,
Carlos Costa,
Sarita Adve,
Charith Mendis,
Minjia Zhang,
Santiago Núñez-Corrales,
Raghu Ganti,
Mudhakar Srivatsa,
Nam Sung Kim,
Josep Torrellas,
Jian Huang,
Seetharami Seelam
, et al. (20 additional authors not shown)
Abstract:
This white paper, developed through close collaboration between IBM Research and UIUC researchers within the IIDAI Institute, envisions transforming hybrid cloud systems to meet the growing complexity of AI workloads through innovative, full-stack co-design approaches, emphasizing usability, manageability, affordability, adaptability, efficiency, and scalability. By integrating cutting-edge techno…
▽ More
This white paper, developed through close collaboration between IBM Research and UIUC researchers within the IIDAI Institute, envisions transforming hybrid cloud systems to meet the growing complexity of AI workloads through innovative, full-stack co-design approaches, emphasizing usability, manageability, affordability, adaptability, efficiency, and scalability. By integrating cutting-edge technologies such as generative and agentic AI, cross-layer automation and optimization, unified control plane, and composable and adaptive system architecture, the proposed framework addresses critical challenges in energy efficiency, performance, and cost-effectiveness. Incorporating quantum computing as it matures will enable quantum-accelerated simulations for materials science, climate modeling, and other high-impact domains. Collaborative efforts between academia and industry are central to this vision, driving advancements in foundation models for material design and climate solutions, scalable multimodal data processing, and enhanced physics-based AI emulators for applications like weather forecasting and carbon sequestration. Research priorities include advancing AI agentic systems, LLM as an Abstraction (LLMaaA), AI model optimization and unified abstractions across heterogeneous infrastructure, end-to-end edge-cloud transformation, efficient programming model, middleware and platform, secure infrastructure, application-adaptive cloud systems, and new quantum-classical collaborative workflows. These ideas and solutions encompass both theoretical and practical research questions, requiring coordinated input and support from the research community. This joint initiative aims to establish hybrid clouds as secure, efficient, and sustainable platforms, fostering breakthroughs in AI-driven applications and scientific discovery across academia, industry, and society.
△ Less
Submitted 21 May, 2025; v1 submitted 20 November, 2024;
originally announced November 2024.
-
IUMENTA: A generic framework for animal digital twins within the Open Digital Twin Platform
Authors:
Ali Youssef,
Kristina Vodorezova,
Yannick Aarts,
Wisdom E. K. Agbeti,
Arjan P. Palstra,
Edwin Foekema,
Leonel Aguilar,
Ricardo da Silva Torres,
Jascha Grübel
Abstract:
IUMENTA (Latin for livestock) is an innovative software framework designed to construct and simulate digital twins of animals. By leveraging the powerful capability of the Open Digital Twin Platform (ODTP) alongside advanced software sensors, IUMENTA offers researchers a user-friendly tool to seamlessly develop adaptive digital replicas of animal-based processes. This framework establishes a dynam…
▽ More
IUMENTA (Latin for livestock) is an innovative software framework designed to construct and simulate digital twins of animals. By leveraging the powerful capability of the Open Digital Twin Platform (ODTP) alongside advanced software sensors, IUMENTA offers researchers a user-friendly tool to seamlessly develop adaptive digital replicas of animal-based processes. This framework establishes a dynamic ecosystem that integrates insights from diverse experiments, consequently enhancing our understanding of animal behavioural and physiological responses. Through real-time tracking of an animal's energy balance. IUMENTA provides valuable insights into metabolic rates, nutritional needs, emotional states, and overall well-being of animals. In this article, we explore the application of the IUMENTA framework in developing a digital twin focused on the animal's energy balance. IUMENTA includes the EnergyTag system, a state-of-the-art wearable software sensor, which facilitates real-time monitoring of energy expenditure, allowing for continuous updates and personalisation of the energy balance digital twin.
△ Less
Submitted 4 November, 2024;
originally announced November 2024.
-
Rejection Sampling with Autodifferentiation - Case study: Fitting a Hadronization Model
Authors:
Nick Heller,
Phil Ilten,
Tony Menzo,
Stephen Mrenna,
Benjamin Nachman,
Andrzej Siodmok,
Manuel Szewc,
Ahmed Youssef
Abstract:
We present an autodifferentiable rejection sampling algorithm termed Rejection Sampling with Autodifferentiation (RSA). In conjunction with reweighting, we show that RSA can be used for efficient parameter estimation and model exploration. Additionally, this approach facilitates the use of unbinned machine-learning-based observables, allowing for more precise, data-driven fits. To showcase these c…
▽ More
We present an autodifferentiable rejection sampling algorithm termed Rejection Sampling with Autodifferentiation (RSA). In conjunction with reweighting, we show that RSA can be used for efficient parameter estimation and model exploration. Additionally, this approach facilitates the use of unbinned machine-learning-based observables, allowing for more precise, data-driven fits. To showcase these capabilities, we apply an RSA-based parameter fit to a simplified hadronization model.
△ Less
Submitted 6 December, 2024; v1 submitted 4 November, 2024;
originally announced November 2024.
-
Describing Hadronization via Histories and Observables for Monte-Carlo Event Reweighting
Authors:
Christian Bierlich,
Phil Ilten,
Tony Menzo,
Stephen Mrenna,
Manuel Szewc,
Michael K. Wilkinson,
Ahmed Youssef,
Jure Zupan
Abstract:
We introduce a novel method for extracting a fragmentation model directly from experimental data without requiring an explicit parametric form, called Histories and Observables for Monte-Carlo Event Reweighting (HOMER), consisting of three steps: the training of a classifier between simulation and data, the inference of single fragmentation weights, and the calculation of the weight for the full h…
▽ More
We introduce a novel method for extracting a fragmentation model directly from experimental data without requiring an explicit parametric form, called Histories and Observables for Monte-Carlo Event Reweighting (HOMER), consisting of three steps: the training of a classifier between simulation and data, the inference of single fragmentation weights, and the calculation of the weight for the full hadronization chain. We illustrate the use of HOMER on a simplified hadronization problem, a $q\bar{q}$ string fragmenting into pions, and extract a modified Lund string fragmentation function $f(z)$. We then demonstrate the use of HOMER on three types of experimental data: (i) binned distributions of high level observables, (ii) unbinned event-by-event distributions of these observables, and (iii) full particle cloud information. After demonstrating that $f(z)$ can be extracted from data (the inverse of hadronization), we also show that, at least in this limited setup, the fidelity of the extracted $f(z)$ suffers only limited loss when moving from (i) to (ii) to (iii). Public code is available at https://gitlab.com/uchep/mlhad.
△ Less
Submitted 10 January, 2025; v1 submitted 8 October, 2024;
originally announced October 2024.
-
A House United Within Itself: SLO-Awareness for On-Premises Containerized ML Inference Clusters via Faro
Authors:
Beomyeol Jeon,
Chen Wang,
Diana Arroyo,
Alaa Youssef,
Indranil Gupta
Abstract:
This paper tackles the challenge of running multiple ML inference jobs (models) under time-varying workloads, on a constrained on-premises production cluster. Our system Faro takes in latency Service Level Objectives (SLOs) for each job, auto-distills them into utility functions, "sloppifies" these utility functions to make them amenable to mathematical optimization, automatically predicts workloa…
▽ More
This paper tackles the challenge of running multiple ML inference jobs (models) under time-varying workloads, on a constrained on-premises production cluster. Our system Faro takes in latency Service Level Objectives (SLOs) for each job, auto-distills them into utility functions, "sloppifies" these utility functions to make them amenable to mathematical optimization, automatically predicts workload via probabilistic prediction, and dynamically makes implicit cross-job resource allocations, in order to satisfy cluster-wide objectives, e.g., total utility, fairness, and other hybrid variants. A major challenge Faro tackles is that using precise utilities and high-fidelity predictors, can be too slow (and in a sense too precise!) for the fast adaptation we require. Faro's solution is to "sloppify" (relax) its multiple design components to achieve fast adaptation without overly degrading solution quality. Faro is implemented in a stack consisting of Ray Serve running atop a Kubernetes cluster. Trace-driven cluster deployments show that Faro achieves 2.3$\times$-23$\times$ lower SLO violations compared to state-of-the-art systems.
△ Less
Submitted 28 September, 2024;
originally announced September 2024.
-
Unmasking Covert Intrusions: Detection of Fault-Masking Cyberattacks on Differential Protection Systems
Authors:
Ahmad Mohammad Saber,
Amr Youssef,
Davor Svetinovic,
Hatem Zeineldin,
Ehab F. El-Saadany
Abstract:
Line Current Differential Relays (LCDRs) are high-speed relays progressively used to protect critical transmission lines. However, LCDRs are vulnerable to cyberattacks. Fault-Masking Attacks (FMAs) are stealthy cyberattacks performed by manipulating the remote measurements of the targeted LCDR to disguise faults on the protected line. Hence, they remain undetected by this LCDR. In this paper, we p…
▽ More
Line Current Differential Relays (LCDRs) are high-speed relays progressively used to protect critical transmission lines. However, LCDRs are vulnerable to cyberattacks. Fault-Masking Attacks (FMAs) are stealthy cyberattacks performed by manipulating the remote measurements of the targeted LCDR to disguise faults on the protected line. Hence, they remain undetected by this LCDR. In this paper, we propose a two-module framework to detect FMAs. The first module is a Mismatch Index (MI) developed from the protected transmission line's equivalent physical model. The MI is triggered only if there is a significant mismatch in the LCDR's local and remote measurements while the LCDR itself is untriggered, which indicates an FMA. After the MI is triggered, the second module, a neural network-based classifier, promptly confirms that the triggering event is a physical fault that lies on the line protected by the LCDR before declaring the occurrence of an FMA. The proposed framework is tested using the IEEE 39-bus benchmark system. Our simulation results confirm that the proposed framework can accurately detect FMAs on LCDRs and is not affected by normal system disturbances, variations, or measurement noise. Our experimental results using OPAL-RT's real-time simulator confirm the proposed solution's real-time performance capability.
△ Less
Submitted 6 September, 2024;
originally announced September 2024.
-
A Novel Approach to Classify Power Quality Signals Using Vision Transformers
Authors:
Ahmad Mohammad Saber,
Alaa Selim,
Mohamed M. Hammad,
Amr Youssef,
Deepa Kundur,
Ehab El-Saadany
Abstract:
With the rapid integration of electronically interfaced renewable energy resources and loads into smart grids, there is increasing interest in power quality disturbances (PQD) classification to enhance the security and efficiency of these grids. This paper introduces a new approach to PQD classification based on the Vision Transformer (ViT) model. When a PQD occurs, the proposed approach first con…
▽ More
With the rapid integration of electronically interfaced renewable energy resources and loads into smart grids, there is increasing interest in power quality disturbances (PQD) classification to enhance the security and efficiency of these grids. This paper introduces a new approach to PQD classification based on the Vision Transformer (ViT) model. When a PQD occurs, the proposed approach first converts the power quality signal into an image and then utilizes a pre-trained ViT to accurately determine the class of the PQD. Unlike most previous works, which were limited to a few disturbance classes or small datasets, the proposed method is trained and tested on a large dataset with 17 disturbance classes. Our experimental results show that the proposed ViT-based approach achieves PQD classification precision and recall of 98.28% and 97.98%, respectively, outperforming recently proposed techniques applied to the same dataset.
△ Less
Submitted 3 September, 2024; v1 submitted 16 August, 2024;
originally announced September 2024.
-
A Verifiable Computing Scheme for Encrypted Control Systems
Authors:
Francesca Stabile,
Walter Lucia,
Amr Youssef,
Giuseppe Franze
Abstract:
The proliferation of cloud computing technologies has paved the way for deploying networked encrypted control systems, offering high performance, remote accessibility and privacy. However, in scenarios where the control algorithms run on third-party cloud service providers, the control logic might be changed by a malicious agent on the cloud. Consequently, it is imperative to verify the correctnes…
▽ More
The proliferation of cloud computing technologies has paved the way for deploying networked encrypted control systems, offering high performance, remote accessibility and privacy. However, in scenarios where the control algorithms run on third-party cloud service providers, the control logic might be changed by a malicious agent on the cloud. Consequently, it is imperative to verify the correctness of the control signals received from the cloud. Traditional verification methods, like zero-knowledge proof techniques, are computationally demanding in both proof generation and verification, may require several rounds of interactions between the prover and verifier and, consequently, are inapplicable in realtime control system applications. In this paper, we present a novel computationally inexpensive verifiable computing solution inspired by the probabilistic cut-and-choose approach. The proposed scheme allows the plant's actuator to validate the computations accomplished by the encrypted cloud-based networked controller without compromising the control scheme's performance. We showcase the effectiveness and real-time applicability of the proposed verifiable computation scheme using a remotely controlled Khepera IV differential-drive robot.
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
An in-depth analysis of the differentially expanding star cluster Stock 18 (Villafranca O-036) using Gaia DR3 and ground-based data
Authors:
J. Maíz Apellániz,
A. R. Youssef,
M. S. El-Nawawy,
W. H. Elsanhoury,
A. Sota,
M. Pantaleoni González,
A. Ahmed
Abstract:
(ABRIDGED)
CONTEXT: The Villafranca project is combining Gaia data with ground-based surveys to analyze Galactic stellar groups with OB stars.
AIMS: We want to analyze Stock 18 within the Villafranca project, a very young stellar cluster with a symmetrical and compact H II region around it.
METHODS: We analyze the core, massive-star population, extinction, distance, membership, internal dyna…
▽ More
(ABRIDGED)
CONTEXT: The Villafranca project is combining Gaia data with ground-based surveys to analyze Galactic stellar groups with OB stars.
AIMS: We want to analyze Stock 18 within the Villafranca project, a very young stellar cluster with a symmetrical and compact H II region around it.
METHODS: We analyze the core, massive-star population, extinction, distance, membership, internal dynamics, density profile, age, IMF, total mass, stellar variability, and Galactic location of Stock 18 with Gaia data and ground-based spectroscopy.
RESULTS: Stock 18 is a very young (~1.0 Ma) cluster located at a distance of 2.91+-0.10 kpc dominated by the GLS 13 370 system, whose primary is an O9 V star. We propose that Stock 18 was in a very compact state (~0.1 pc) about 1.0 Ma ago and that most massive stars were ejected at that time without significantly affecting the less massive stars as a result of multi-body dynamical interactions. Given its age close to 1.0 Ma, the dynamical interactions took place very soon after massive star formation. Well defined expanding stellar clusters have been observed before but none as young as this one. The IMF is top heavy but if we discard the ejected ones it becomes nearly canonical. Therefore, this is another example in addition to the one we previously found (the Bermuda cluster) of (a) a very young cluster with an already evolved PDMF (b) that has significantly contributed to the future population of free-floating compact objects. If confirmed in more clusters, the number of such compact objects may be higher in the Milky Way than previously thought. Stock 18 has a variable extinction with an average value of R_5495 higher than the canonical one of 3.1. The cluster is above our Galactic mid-plane and has a distinct motion with respect to its surrounding old population, which is possibly an influence of the Perseus spiral arm.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
GPS-IDS: An Anomaly-based GPS Spoofing Attack Detection Framework for Autonomous Vehicles
Authors:
Murad Mehrab Abrar,
Amal Youssef,
Raian Islam,
Shalaka Satam,
Banafsheh Saber Latibari,
Salim Hariri,
Sicong Shao,
Soheil Salehi,
Pratik Satam
Abstract:
Autonomous Vehicles (AVs) heavily rely on sensors and communication networks like Global Positioning System (GPS) to navigate autonomously. Prior research has indicated that networks like GPS are vulnerable to cyber-attacks such as spoofing and jamming, thus posing serious risks like navigation errors and system failures. These threats are expected to intensify with the widespread deployment of AV…
▽ More
Autonomous Vehicles (AVs) heavily rely on sensors and communication networks like Global Positioning System (GPS) to navigate autonomously. Prior research has indicated that networks like GPS are vulnerable to cyber-attacks such as spoofing and jamming, thus posing serious risks like navigation errors and system failures. These threats are expected to intensify with the widespread deployment of AVs, making it crucial to detect and mitigate such attacks. This paper proposes GPS Intrusion Detection System, or GPS-IDS, an Anomaly-based intrusion detection framework to detect GPS spoofing attacks on AVs. The framework uses a novel physics-based vehicle behavior model where a GPS navigation model is integrated into the conventional dynamic bicycle model for accurate AV behavior representation. Temporal features derived from this behavior model are analyzed using machine learning to detect normal and abnormal navigation behaviors. The performance of the GPS-IDS framework is evaluated on the AV-GPS-Dataset -- a GPS security dataset for AVs comprising real-world data collected using an AV testbed, and simulated data representing urban traffic environments. To the best of our knowledge, this dataset is the first of its kind and has been publicly released for the global research community to address such security challenges.
△ Less
Submitted 17 December, 2024; v1 submitted 14 May, 2024;
originally announced May 2024.
-
A Survey on Data-Driven Fault Diagnostic Techniques for Marine Diesel Engines
Authors:
Ayah Youssef,
Hassan Noura,
Abderrahim El Amrani,
El Mostafa El Adel,
Mustapha Ouladsine
Abstract:
Fault diagnosis in marine diesel engines is vital for maritime safety and operational efficiency.These engines are integral to marine vessels, and their reliable performance is crucial for safenavigation. Swift identification and resolution of faults are essential to prevent breakdowns,enhance safety, and reduce the risk of catastrophic failures at sea. Proactive fault diagnosisfacilitates timely…
▽ More
Fault diagnosis in marine diesel engines is vital for maritime safety and operational efficiency.These engines are integral to marine vessels, and their reliable performance is crucial for safenavigation. Swift identification and resolution of faults are essential to prevent breakdowns,enhance safety, and reduce the risk of catastrophic failures at sea. Proactive fault diagnosisfacilitates timely maintenance, minimizes downtime, and ensures the overall reliability andlongevity of marine diesel engines. This paper explores the importance of fault diagnosis,emphasizing subsystems, common faults, and recent advancements in data-driven approachesfor effective marine diesel engine maintenance
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
Towards Pareto Optimal Throughput in Small Language Model Serving
Authors:
Pol G. Recasens,
Yue Zhu,
Chen Wang,
Eun Kyung Lee,
Olivier Tardieu,
Alaa Youssef,
Jordi Torres,
Josep Ll. Berral
Abstract:
Large language models (LLMs) have revolutionized the state-of-the-art of many different natural language processing tasks. Although serving LLMs is computationally and memory demanding, the rise of Small Language Models (SLMs) offers new opportunities for resource-constrained users, who now are able to serve small models with cutting-edge performance. In this paper, we present a set of experiments…
▽ More
Large language models (LLMs) have revolutionized the state-of-the-art of many different natural language processing tasks. Although serving LLMs is computationally and memory demanding, the rise of Small Language Models (SLMs) offers new opportunities for resource-constrained users, who now are able to serve small models with cutting-edge performance. In this paper, we present a set of experiments designed to benchmark SLM inference at performance and energy levels. Our analysis provides a new perspective in serving, highlighting that the small memory footprint of SLMs allows for reaching the Pareto-optimal throughput within the resource capacity of a single accelerator. In this regard, we present an initial set of findings demonstrating how model replication can effectively improve resource utilization for serving SLMs.
△ Less
Submitted 4 April, 2024;
originally announced April 2024.
-
NeRF-Supervised Feature Point Detection and Description
Authors:
Ali Youssef,
Francisco Vasconcelos
Abstract:
Feature point detection and description is the backbone for various computer vision applications, such as Structure-from-Motion, visual SLAM, and visual place recognition. While learning-based methods have surpassed traditional handcrafted techniques, their training often relies on simplistic homography-based simulations of multi-view perspectives, limiting model generalisability. This paper prese…
▽ More
Feature point detection and description is the backbone for various computer vision applications, such as Structure-from-Motion, visual SLAM, and visual place recognition. While learning-based methods have surpassed traditional handcrafted techniques, their training often relies on simplistic homography-based simulations of multi-view perspectives, limiting model generalisability. This paper presents a novel approach leveraging Neural Radiance Fields (NeRFs) to generate a diverse and realistic dataset consisting of indoor and outdoor scenes. Our proposed methodology adapts state-of-the-art feature detectors and descriptors for training on multi-view NeRF-synthesised data, with supervision achieved through perspective projective geometry. Experiments demonstrate that the proposed methodology achieves competitive or superior performance on standard benchmarks for relative pose estimation, point cloud registration, and homography estimation while requiring significantly less training data and time compared to existing approaches.
△ Less
Submitted 20 September, 2024; v1 submitted 12 March, 2024;
originally announced March 2024.
-
Standing on FURM ground -- A framework for evaluating Fair, Useful, and Reliable AI Models in healthcare systems
Authors:
Alison Callahan,
Duncan McElfresh,
Juan M. Banda,
Gabrielle Bunney,
Danton Char,
Jonathan Chen,
Conor K. Corbin,
Debadutta Dash,
Norman L. Downing,
Sneha S. Jain,
Nikesh Kotecha,
Jonathan Masterson,
Michelle M. Mello,
Keith Morse,
Srikar Nallan,
Abby Pandya,
Anurang Revri,
Aditya Sharma,
Christopher Sharp,
Rahul Thapa,
Michael Wornow,
Alaa Youssef,
Michael A. Pfeffer,
Nigam H. Shah
Abstract:
The impact of using artificial intelligence (AI) to guide patient care or operational processes is an interplay of the AI model's output, the decision-making protocol based on that output, and the capacity of the stakeholders involved to take the necessary subsequent action. Estimating the effects of this interplay before deployment, and studying it in real time afterwards, are essential to bridge…
▽ More
The impact of using artificial intelligence (AI) to guide patient care or operational processes is an interplay of the AI model's output, the decision-making protocol based on that output, and the capacity of the stakeholders involved to take the necessary subsequent action. Estimating the effects of this interplay before deployment, and studying it in real time afterwards, are essential to bridge the chasm between AI model development and achievable benefit. To accomplish this, the Data Science team at Stanford Health Care has developed a Testing and Evaluation (T&E) mechanism to identify fair, useful and reliable AI models (FURM) by conducting an ethical review to identify potential value mismatches, simulations to estimate usefulness, financial projections to assess sustainability, as well as analyses to determine IT feasibility, design a deployment strategy, and recommend a prospective monitoring and evaluation plan. We report on FURM assessments done to evaluate six AI guided solutions for potential adoption, spanning clinical and operational settings, each with the potential to impact from several dozen to tens of thousands of patients each year. We describe the assessment process, summarize the six assessments, and share our framework to enable others to conduct similar assessments. Of the six solutions we assessed, two have moved into a planning and implementation phase. Our novel contributions - usefulness estimates by simulation, financial projections to quantify sustainability, and a process to do ethical assessments - as well as their underlying methods and open source tools, are available for other healthcare systems to conduct actionable evaluations of candidate AI solutions.
△ Less
Submitted 14 March, 2024; v1 submitted 26 February, 2024;
originally announced March 2024.
-
Enhancing Power Quality Event Classification with AI Transformer Models
Authors:
Ahmad Mohammad Saber,
Amr Youssef,
Davor Svetinovic,
Hatem Zeineldin,
Deepa Kundur,
Ehab El-Saadany
Abstract:
Recently, there has been a growing interest in utilizing machine learning for accurate classification of power quality events (PQEs). However, most of these studies are performed assuming an ideal situation, while in reality, we can have measurement noise, DC offset, and variations in the voltage signal's amplitude and frequency. Building on the prior PQE classification works using deep learning,…
▽ More
Recently, there has been a growing interest in utilizing machine learning for accurate classification of power quality events (PQEs). However, most of these studies are performed assuming an ideal situation, while in reality, we can have measurement noise, DC offset, and variations in the voltage signal's amplitude and frequency. Building on the prior PQE classification works using deep learning, this paper proposes a deep-learning framework that leverages attention-enabled Transformers as a tool to accurately classify PQEs under the aforementioned considerations. The proposed framework can operate directly on the voltage signals with no need for a separate feature extraction or calculation phase. Our results show that the proposed framework outperforms recently proposed learning-based techniques. It can accurately classify PQEs under the aforementioned conditions with an accuracy varying between 99.81%$-$91.43% depending on the signal-to-noise ratio, DC offsets, and variations in the signal amplitude and frequency.
△ Less
Submitted 22 February, 2024;
originally announced February 2024.
-
A Vision-Language Foundation Model to Enhance Efficiency of Chest X-ray Interpretation
Authors:
Zhihong Chen,
Maya Varma,
Justin Xu,
Magdalini Paschali,
Dave Van Veen,
Andrew Johnston,
Alaa Youssef,
Louis Blankemeier,
Christian Bluethgen,
Stephan Altmayer,
Jeya Maria Jose Valanarasu,
Mohamed Siddig Eltayeb Muneer,
Eduardo Pontes Reis,
Joseph Paul Cohen,
Cameron Olsen,
Tanishq Mathew Abraham,
Emily B. Tsai,
Christopher F. Beaulieu,
Jenia Jitsev,
Sergios Gatidis,
Jean-Benoit Delbrouck,
Akshay S. Chaudhari,
Curtis P. Langlotz
Abstract:
Over 1.4 billion chest X-rays (CXRs) are performed annually due to their cost-effectiveness as an initial diagnostic test. This scale of radiological studies provides a significant opportunity to streamline CXR interpretation and documentation. While foundation models are a promising solution, the lack of publicly available large-scale datasets and benchmarks inhibits their iterative development a…
▽ More
Over 1.4 billion chest X-rays (CXRs) are performed annually due to their cost-effectiveness as an initial diagnostic test. This scale of radiological studies provides a significant opportunity to streamline CXR interpretation and documentation. While foundation models are a promising solution, the lack of publicly available large-scale datasets and benchmarks inhibits their iterative development and real-world evaluation. To overcome these challenges, we constructed a large-scale dataset (CheXinstruct), which we utilized to train a vision-language foundation model (CheXagent). We systematically demonstrated competitive performance across eight distinct task types on our novel evaluation benchmark (CheXbench). Beyond technical validation, we assessed the real-world utility of CheXagent in directly drafting radiology reports. Our clinical assessment with eight radiologists revealed a 36% time saving for residents using CheXagent-drafted reports, while attending radiologists showed no significant time difference editing resident-drafted or CheXagent-drafted reports. The CheXagent-drafted reports improved the writing efficiency of both radiology residents and attending radiologists in 81% and 61% of cases, respectively, without loss of quality. Overall, we demonstrate that CheXagent can effectively perform a variety of CXR interpretation tasks and holds potential to assist radiologists in routine clinical workflows.
△ Less
Submitted 18 December, 2024; v1 submitted 22 January, 2024;
originally announced January 2024.
-
Necknasium: A Virtual Reality Rehabilitation Game for Managing Faulty Neck Posture
Authors:
Aliaa Rehan Youssef,
Mohammed Gumaa,
Ahmad Al-Kabbany
Abstract:
This study is concerned with the application of virtual reality (VR) in rehabilitation programs for faulty neck posture which is a primary source of neck pain (NP). The latter is a highly prevalent musculoskeletal disorder that is associated with serious societal and economic burden. VR has been shown to be effective in the physical rehabilitation of various diseases. Specifically, it has been sho…
▽ More
This study is concerned with the application of virtual reality (VR) in rehabilitation programs for faulty neck posture which is a primary source of neck pain (NP). The latter is a highly prevalent musculoskeletal disorder that is associated with serious societal and economic burden. VR has been shown to be effective in the physical rehabilitation of various diseases. Specifically, it has been shown to improve the adherence of patients and engagement to carry out physical exercises on a regular basis. Many games have been used to manage NP with different immersion levels. Towards this goal, we present a VR-based system that targets a specific neck problem, the so called forward head posture (FHP), which is a faulty head position that abnormally stresses neck structures. The system can also generalize well to other neck-related disorders and rehabilitation goals. We show the steps for designing and developing the system, and we highlight the aspects of interaction between usability and various game elements. Using a three-point scale for user experience, we also present preliminary insights on the evaluation of the system prototype, and we discuss future enhancement directions based on the feedback from users.
△ Less
Submitted 21 December, 2023;
originally announced December 2023.
-
Performance testing of gas-tight portable RPC for muography applications
Authors:
V. Kumar,
S. Basnet,
E. Cortina Gil,
P. Demin,
R. M. I. D. Gamage,
A. Giammanco,
R. Karnam,
M. Moussawi,
A. Samalan,
M. Tytgat,
A. Youssef
Abstract:
This paper reports the latest developmental efforts for a position-sensitive glass-based Resistive Plate Chamber (RPC) and a multi-channel Data AcQuisition (DAQ) system tailored for muon tracking in muography applications. The designed setup prioritizes portability, aiming for field applications where both the detector and the DAQ operate effectively in external environmental conditions. Comprehen…
▽ More
This paper reports the latest developmental efforts for a position-sensitive glass-based Resistive Plate Chamber (RPC) and a multi-channel Data AcQuisition (DAQ) system tailored for muon tracking in muography applications. The designed setup prioritizes portability, aiming for field applications where both the detector and the DAQ operate effectively in external environmental conditions. Comprehensive discussions on hardware development activities and signal processing techniques are included, incorporating noise filtering to enhance the accurate detection of real muons. A muon absorption measurement has also been carried out to understand the behavior of these detectors from an application perspective.
△ Less
Submitted 23 February, 2024; v1 submitted 12 December, 2023;
originally announced December 2023.
-
Small-area Portable Resistive Plate Chambers for Muography
Authors:
Amrutha Samalan,
Samip Basnet,
Eduardo Cortina Gil,
Pavel Demin,
Ishan Darshana Ran Muthugalalage,
Andrea Giammanco,
Raveendrababu Karnam,
Vishal Kumar,
Marwa Al Moussawi,
Michael Tytgat,
Ayman Youssef
Abstract:
Muography is finding applications in various domains such as volcanology, archaeology, civil engineering, industry, mining, and nuclear waste surveys. To simplify transportation and installation in remote locations after laboratory testing, a fully portable and autonomous muon telescope based on Resistive Plate Chambers (RPCs) is being developed. Two glass-RPC prototypes have been created, sharing…
▽ More
Muography is finding applications in various domains such as volcanology, archaeology, civil engineering, industry, mining, and nuclear waste surveys. To simplify transportation and installation in remote locations after laboratory testing, a fully portable and autonomous muon telescope based on Resistive Plate Chambers (RPCs) is being developed. Two glass-RPC prototypes have been created, sharing the same design goals but with different detector parameters, and comparative studies are ongoing. Drawing from prototype experience, a double-gap RPC with advanced features and improved spatial resolution is constructed. Resistive electrodes are produced manually, and a new data acquisition board is currently undergoing calibration. The results on prototype performance, readout board comparisons and the technical progress on the double-gap RPC are presented.
△ Less
Submitted 19 November, 2023;
originally announced November 2023.
-
Towards a data-driven model of hadronization using normalizing flows
Authors:
Christian Bierlich,
Phil Ilten,
Tony Menzo,
Stephen Mrenna,
Manuel Szewc,
Michael K. Wilkinson,
Ahmed Youssef,
Jure Zupan
Abstract:
We introduce a model of hadronization based on invertible neural networks that faithfully reproduces a simplified version of the Lund string model for meson hadronization. Additionally, we introduce a new training method for normalizing flows, termed MAGIC, that improves the agreement between simulated and experimental distributions of high-level (macroscopic) observables by adjusting single-emiss…
▽ More
We introduce a model of hadronization based on invertible neural networks that faithfully reproduces a simplified version of the Lund string model for meson hadronization. Additionally, we introduce a new training method for normalizing flows, termed MAGIC, that improves the agreement between simulated and experimental distributions of high-level (macroscopic) observables by adjusting single-emission (microscopic) dynamics. Our results constitute an important step toward realizing a machine-learning based model of hadronization that utilizes experimental data during training. Finally, we demonstrate how a Bayesian extension to this normalizing-flow architecture can be used to provide analysis of statistical and modeling uncertainties on the generated observable distributions.
△ Less
Submitted 19 April, 2024; v1 submitted 15 November, 2023;
originally announced November 2023.
-
Hacking Generative Models with Differentiable Network Bending
Authors:
Giacomo Aldegheri,
Alina Rogalska,
Ahmed Youssef,
Eugenia Iofinova
Abstract:
In this work, we propose a method to 'hack' generative models, pushing their outputs away from the original training distribution towards a new objective. We inject a small-scale trainable module between the intermediate layers of the model and train it for a low number of iterations, keeping the rest of the network frozen. The resulting output images display an uncanny quality, given by the tensi…
▽ More
In this work, we propose a method to 'hack' generative models, pushing their outputs away from the original training distribution towards a new objective. We inject a small-scale trainable module between the intermediate layers of the model and train it for a low number of iterations, keeping the rest of the network frozen. The resulting output images display an uncanny quality, given by the tension between the original and new objectives that can be exploited for artistic purposes.
△ Less
Submitted 12 December, 2023; v1 submitted 7 October, 2023;
originally announced October 2023.
-
Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters
Authors:
Ahmad Mohammad Saber,
Amr Youssef,
Davor Svetinovic,
Hatem Zeineldin,
Ehab El-Saadany
Abstract:
Distributed Volt-Var Control (VVC) is a widely used control mode of smart inverters. However, necessary VVC curve parameters are remotely communicated to the smart inverter, which opens doors for cyberattacks. If the VVC curves of an inverter are maliciously manipulated, the attacked inverter's reactive power injection will oscillate, causing undesirable voltage oscillations to manifest in the dis…
▽ More
Distributed Volt-Var Control (VVC) is a widely used control mode of smart inverters. However, necessary VVC curve parameters are remotely communicated to the smart inverter, which opens doors for cyberattacks. If the VVC curves of an inverter are maliciously manipulated, the attacked inverter's reactive power injection will oscillate, causing undesirable voltage oscillations to manifest in the distribution system, which, in turn, threatens the system's stability. In contrast with previous works that proposed methods to mitigate the oscillations after they are already present in the system, this paper presents an intrusion detection method to detect malicious VVC curves once they are communicated to the inverter. The proposed method utilizes a Multi-Layer Perceptron (MLP) that is trained on features extracted from only the local measurements of the inverter. After a smart inverter is equipped with the proposed method, any communicated VVC curve will be verified by the MLP once received. If the curve is found to be malicious, it will be rejected, thus preventing unwanted oscillations beforehand. Otherwise, legitimate curves will be permitted. The performance of the proposed scheme is verified using the 9-bus Canadian urban benchmark distribution system simulated in PSCAD/EMTDC environment. Our results show that the proposed solution can accurately detect malicious VVC curves.
△ Less
Submitted 19 September, 2023;
originally announced September 2023.
-
Reweighting Monte Carlo Predictions and Automated Fragmentation Variations in Pythia 8
Authors:
Christan Bierlich,
Philip Ilten,
Tony Menzo,
Stephen Mrenna,
Manuel Szewc,
Michael K. Wilkinson,
Ahmed Youssef,
Jure Zupan
Abstract:
This work reports on a method for uncertainty estimation in simulated collider-event predictions. The method is based on a Monte Carlo-veto algorithm, and extends previous work on uncertainty estimates in parton showers by including uncertainty estimates for the Lund string-fragmentation model. This method is advantageous from the perspective of simulation costs: a single ensemble of generated eve…
▽ More
This work reports on a method for uncertainty estimation in simulated collider-event predictions. The method is based on a Monte Carlo-veto algorithm, and extends previous work on uncertainty estimates in parton showers by including uncertainty estimates for the Lund string-fragmentation model. This method is advantageous from the perspective of simulation costs: a single ensemble of generated events can be reinterpreted as though it was obtained using a different set of input parameters, where each event now is accompanied with a corresponding weight. This allows for a robust exploration of the uncertainties arising from the choice of input model parameters, without the need to rerun full simulation pipelines for each input parameter choice. Such explorations are important when determining the sensitivities of precision physics measurements. Accompanying code is available at https://gitlab.com/uchep/mlhad-weights-validation.
△ Less
Submitted 12 March, 2024; v1 submitted 25 August, 2023;
originally announced August 2023.
-
Security Weaknesses in IoT Management Platforms
Authors:
Bhaskar Tejaswi,
Mohammad Mannan,
Amr Youssef
Abstract:
A diverse set of Internet of Things (IoT) devices are becoming an integrated part of daily lives, and playing an increasingly vital role in various industry, enterprise and agricultural settings. The current IoT ecosystem relies on several IoT management platforms to manage and operate a large number of IoT devices, their data, and their connectivity. Considering their key role, these platforms mu…
▽ More
A diverse set of Internet of Things (IoT) devices are becoming an integrated part of daily lives, and playing an increasingly vital role in various industry, enterprise and agricultural settings. The current IoT ecosystem relies on several IoT management platforms to manage and operate a large number of IoT devices, their data, and their connectivity. Considering their key role, these platforms must be properly secured against cyber attacks. In this work, we first explore the core operations/features of leading platforms to design a framework to perform a systematic security evaluation of these platforms. Subsequently, we use our framework to analyze a representative set of 52 IoT management platforms, including 42 web-hosted and 10 locally-deployable platforms. We discover a number of high severity unauthorized access vulnerabilities in 9/52 evaluated IoT management platforms, which could be abused to perform attacks such as remote IoT SIM deactivation, IoT SIM overcharging and IoT device data forgery. More seriously, we also uncover instances of broken authentication in 13/52 platforms, including complete account takeover on 8/52 platforms along with remote code execution on 2/52 platforms. In effect, 17/52 platforms were affected by vulnerabilities that could lead to platform-wide attacks. Overall, vulnerabilities were uncovered in 33 platforms, out of which 28 platforms responded to our responsible disclosure. We were also assigned 11 CVEs and awarded bounty for our findings.
△ Less
Submitted 26 July, 2023;
originally announced July 2023.
-
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case
Authors:
Supraja Baskaran,
Lianying Zhao,
Mohammad Mannan,
Amr Youssef
Abstract:
We conduct a large-scale measurement of developers' insecure practices leading to mini-app to super-app authentication bypass, among which hard-coding developer secrets for such authentication is a major contributor. We also analyze the exploitability and security consequences of developer secret leakage in mini-apps by examining individual super-app server-side APIs. We develop an analysis framew…
▽ More
We conduct a large-scale measurement of developers' insecure practices leading to mini-app to super-app authentication bypass, among which hard-coding developer secrets for such authentication is a major contributor. We also analyze the exploitability and security consequences of developer secret leakage in mini-apps by examining individual super-app server-side APIs. We develop an analysis framework for measuring such secret leakage, and primarily analyze 110,993 WeChat mini-apps, and 10,000 Baidu mini-apps (two of the most prominent super-app platforms), along with a few more datasets to test the evolution of developer practices and platform security enforcement over time. We found a large number of WeChat mini-apps (36,425, 32.8%) and a few Baidu mini-apps (112) leak their developer secrets, which can cause severe security and privacy problems for the users and developers of mini-apps. A network attacker who does not even have an account on the super-app platform, can effectively take down a mini-app, send malicious and phishing links to users, and access sensitive information of the mini-app developer and its users. We responsibly disclosed our findings and also put forward potential directions that could be considered to alleviate/eliminate the root causes of developers hard-coding the app secrets in the mini-app's front-end code.
△ Less
Submitted 18 July, 2023;
originally announced July 2023.
-
The Brain Tumor Segmentation (BraTS-METS) Challenge 2023: Brain Metastasis Segmentation on Pre-treatment MRI
Authors:
Ahmed W. Moawad,
Anastasia Janas,
Ujjwal Baid,
Divya Ramakrishnan,
Rachit Saluja,
Nader Ashraf,
Nazanin Maleki,
Leon Jekel,
Nikolay Yordanov,
Pascal Fehringer,
Athanasios Gkampenis,
Raisa Amiruddin,
Amirreza Manteghinejad,
Maruf Adewole,
Jake Albrecht,
Udunna Anazodo,
Sanjay Aneja,
Syed Muhammad Anwar,
Timothy Bergquist,
Veronica Chiang,
Verena Chung,
Gian Marco Conte,
Farouk Dako,
James Eddy,
Ivan Ezhov
, et al. (207 additional authors not shown)
Abstract:
The translation of AI-generated brain metastases (BM) segmentation into clinical practice relies heavily on diverse, high-quality annotated medical imaging datasets. The BraTS-METS 2023 challenge has gained momentum for testing and benchmarking algorithms using rigorously annotated internationally compiled real-world datasets. This study presents the results of the segmentation challenge and chara…
▽ More
The translation of AI-generated brain metastases (BM) segmentation into clinical practice relies heavily on diverse, high-quality annotated medical imaging datasets. The BraTS-METS 2023 challenge has gained momentum for testing and benchmarking algorithms using rigorously annotated internationally compiled real-world datasets. This study presents the results of the segmentation challenge and characterizes the challenging cases that impacted the performance of the winning algorithms. Untreated brain metastases on standard anatomic MRI sequences (T1, T2, FLAIR, T1PG) from eight contributed international datasets were annotated in stepwise method: published UNET algorithms, student, neuroradiologist, final approver neuroradiologist. Segmentations were ranked based on lesion-wise Dice and Hausdorff distance (HD95) scores. False positives (FP) and false negatives (FN) were rigorously penalized, receiving a score of 0 for Dice and a fixed penalty of 374 for HD95. Eight datasets comprising 1303 studies were annotated, with 402 studies (3076 lesions) released on Synapse as publicly available datasets to challenge competitors. Additionally, 31 studies (139 lesions) were held out for validation, and 59 studies (218 lesions) were used for testing. Segmentation accuracy was measured as rank across subjects, with the winning team achieving a LesionWise mean score of 7.9. Common errors among the leading teams included false negatives for small lesions and misregistration of masks in space.The BraTS-METS 2023 challenge successfully curated well-annotated, diverse datasets and identified common errors, facilitating the translation of BM segmentation across varied clinical environments and providing personalized volumetric reports to patients undergoing BM treatment.
△ Less
Submitted 8 December, 2024; v1 submitted 1 June, 2023;
originally announced June 2023.
-
All models are local: time to replace external validation with recurrent local validation
Authors:
Alex Youssef,
Michael Pencina,
Anshul Thakur,
Tingting Zhu,
David Clifton,
Nigam H. Shah
Abstract:
External validation is often recommended to ensure the generalizability of ML models. However, it neither guarantees generalizability nor equates to a model's clinical usefulness (the ultimate goal of any clinical decision-support tool). External validation is misaligned with current healthcare ML needs. First, patient data changes across time, geography, and facilities. These changes create signi…
▽ More
External validation is often recommended to ensure the generalizability of ML models. However, it neither guarantees generalizability nor equates to a model's clinical usefulness (the ultimate goal of any clinical decision-support tool). External validation is misaligned with current healthcare ML needs. First, patient data changes across time, geography, and facilities. These changes create significant volatility in the performance of a single fixed model (especially for deep learning models, which dominate clinical ML). Second, newer ML techniques, current market forces, and updated regulatory frameworks are enabling frequent updating and monitoring of individual deployed model instances. We submit that external validation is insufficient to establish ML models' safety or utility. Proposals to fix the external validation paradigm do not go far enough. Continued reliance on it as the ultimate test is likely to lead us astray. We propose the MLOps-inspired paradigm of recurring local validation as an alternative that ensures the validity of models while protecting against performance-disruptive data variability. This paradigm relies on site-specific reliability tests before every deployment, followed by regular and recurrent checks throughout the life cycle of the deployed algorithm. Initial and recurrent reliability tests protect against performance-disruptive distribution shifts, and concept drifts that jeopardize patient safety.
△ Less
Submitted 13 May, 2023; v1 submitted 4 May, 2023;
originally announced May 2023.
-
An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile Robots
Authors:
Amir Mohammad Naseri,
Walter Lucia,
Amr Youssef
Abstract:
Remotely controlled mobile robots are important examples of Cyber-Physical Systems (CPSs). Recently, these robots are being deployed in many safety critical applications. Therefore, ensuring their cyber-security is of paramount importance. Different control schemes that have been proposed to secure such systems against sophisticated cyber-attacks require the exchange of secret messages between the…
▽ More
Remotely controlled mobile robots are important examples of Cyber-Physical Systems (CPSs). Recently, these robots are being deployed in many safety critical applications. Therefore, ensuring their cyber-security is of paramount importance. Different control schemes that have been proposed to secure such systems against sophisticated cyber-attacks require the exchange of secret messages between their smart actuators and the remote controller. Thus, these schemes require pre-shared secret keys, or an established Public Key Infrastructure (PKI) that allows for key agreement. Such cryptographic approaches might not always be suitable for the deployment environments of such remotely mobile robots. To address this problem, in this paper, we consider a control theoretic approach for establishing a secret key between the remotely controlled robot and the networked controller without resorting to traditional cryptographic techniques. Our key agreement scheme leverages a nonlinear unknown input observer and an error correction code mechanism to allow the robot to securely agree on a secret key with its remote controller. To validate the proposed scheme, we implement it using a Khepera-IV differential drive robot and evaluate its efficiency and the additional control cost acquired by it. Our experimental results confirm the effectiveness of the proposed key establishment scheme.
△ Less
Submitted 23 October, 2023; v1 submitted 8 March, 2023;
originally announced March 2023.
-
The FluidFlower International Benchmark Study: Process, Modeling Results, and Comparison to Experimental Data
Authors:
Bernd Flemisch,
Jan M. Nordbotten,
Martin Fernø,
Ruben Juanes,
Holger Class,
Mojdeh Delshad,
Florian Doster,
Jonathan Ennis-King,
Jacques Franc,
Sebastian Geiger,
Dennis Gläser,
Christopher Green,
James Gunning,
Hadi Hajibeygi,
Samuel J. Jackson,
Mohamad Jammoul,
Satish Karra,
Jiawei Li,
Stephan K. Matthäi,
Terry Miller,
Qi Shao,
Catherine Spurin,
Philip Stauffer,
Hamdi Tchelepi,
Xiaoming Tian
, et al. (8 additional authors not shown)
Abstract:
Successful deployment of geological carbon storage (GCS) requires an extensive use of reservoir simulators for screening, ranking and optimization of storage sites. However, the time scales of GCS are such that no sufficient long-term data is available yet to validate the simulators against. As a consequence, there is currently no solid basis for assessing the quality with which the dynamics of la…
▽ More
Successful deployment of geological carbon storage (GCS) requires an extensive use of reservoir simulators for screening, ranking and optimization of storage sites. However, the time scales of GCS are such that no sufficient long-term data is available yet to validate the simulators against. As a consequence, there is currently no solid basis for assessing the quality with which the dynamics of large-scale GCS operations can be forecasted.
To meet this knowledge gap, we have conducted a major GCS validation benchmark study. To achieve reasonable time scales, a laboratory-size geological storage formation was constructed (the "FluidFlower"), forming the basis for both the experimental and computational work. A validation experiment consisting of repeated GCS operations was conducted in the FluidFlower, providing what we define as the true physical dynamics for this system. Nine different research groups from around the world provided forecasts, both individually and collaboratively, based on a detailed physical and petrophysical characterization of the FluidFlower sands.
The major contribution of this paper is a report and discussion of the results of the validation benchmark study, complemented by a description of the benchmarking process and the participating computational models. The forecasts from the participating groups are compared to each other and to the experimental data by means of various indicative qualitative and quantitative measures. By this, we provide a detailed assessment of the capabilities of reservoir simulators and their users to capture both the injection and post-injection dynamics of the GCS operations.
△ Less
Submitted 9 February, 2023;
originally announced February 2023.
-
Earth mover's distance as a measure of CP violation
Authors:
Adam Davis,
Tony Menzo,
Ahmed Youssef,
Jure Zupan
Abstract:
We introduce a new unbinned two sample test statistic sensitive to CP violation utilizing the optimal transport plan associated with the Wasserstein (earth mover's) distance. The efficacy of the test statistic is shown via two examples of CP asymmetric distributions with varying sample sizes: the Dalitz distributions of $B^0 \rightarrow K^+π^-π^0$ and of $D^0 \rightarrow π^+π^-π^0$ decays. The win…
▽ More
We introduce a new unbinned two sample test statistic sensitive to CP violation utilizing the optimal transport plan associated with the Wasserstein (earth mover's) distance. The efficacy of the test statistic is shown via two examples of CP asymmetric distributions with varying sample sizes: the Dalitz distributions of $B^0 \rightarrow K^+π^-π^0$ and of $D^0 \rightarrow π^+π^-π^0$ decays. The windowed version of the Wasserstein distance test statistic is shown to have comparable sensitivity to CP violation as the commonly used energy test statistic, but also retains information about the localized distributions of CP asymmetry over the Dalitz plot. For large statistic datasets we introduce two modified Wasserstein distance based test statistics -- the binned and the sliced Wasserstein distance statistics, which show comparable sensitivity to CP violation, but improved computing time and memory scalings. Finally, general extensions and applications of the introduced statistics are discussed.
△ Less
Submitted 30 January, 2023;
originally announced January 2023.
-
Simplified Numeric Simulation Approach for CO$_{2,g}$-Water Flow and Trapping at Near-Surface Conditions
Authors:
AbdAllah A. Youssef,
Qi Shao,
S. K. Matthäi
Abstract:
To simulate CO$_{2,g}$-water flow in tank experiments, subject to viscous, gravitational and capillary forces as well as the dissolution of this gas (CO$_{2,aq}$), we constructed a simple pseudo black-oil model. Simple PVT correlations were used for gas density, viscosity, and solubility as based on experimental studies and equations of state from the literature. These solubility calculations assu…
▽ More
To simulate CO$_{2,g}$-water flow in tank experiments, subject to viscous, gravitational and capillary forces as well as the dissolution of this gas (CO$_{2,aq}$), we constructed a simple pseudo black-oil model. Simple PVT correlations were used for gas density, viscosity, and solubility as based on experimental studies and equations of state from the literature. These solubility calculations assume instantaneous chemical equilibrium. The applicability of the approach is investigated by modeling the FluidFlower tank experiment (Nordbotten et al., 2022). The simulation captures the expected physical phenomena, including capillary filtration, gravitational segregation, and dissolution fingering. An error in the total mass, due to ignoring solubility variations with pressure remains acceptable as long as the pressure variation in the tank is small.
△ Less
Submitted 21 January, 2023;
originally announced January 2023.
-
Portable Resistive Plate Chambers for Muography in confined environments
Authors:
R. M. I. D Gamage,
Samip Basnet,
Eduardo Cortina Gil,
Andrea Giammanco,
Pavel Demin,
Marwa Moussawi,
Amrutha Samalan,
Michael Tytgat,
Raveendrababu Karnam,
Ayman Youssef
Abstract:
Muography (or muon radiography) is an imaging technique that relies on the use of cosmogenic muons as a free and safe radiation source. It can be applied in various fields such as archaeology, civil engineering, geology, nuclear reactor monitoring, nuclear waste characterization, underground surveys, etc. In such applications, sometimes deploying muon detectors is challenging due to logistics, e.g…
▽ More
Muography (or muon radiography) is an imaging technique that relies on the use of cosmogenic muons as a free and safe radiation source. It can be applied in various fields such as archaeology, civil engineering, geology, nuclear reactor monitoring, nuclear waste characterization, underground surveys, etc. In such applications, sometimes deploying muon detectors is challenging due to logistics, e.g. in a narrow underground tunnel or mine. Therefore, we are developing muon detectors whose design goals include portability, robustness, autonomy, versatility, and safety. Our portable muon detectors (or ``muoscopes'') are based on Resistive Plate Chambers (RPC), planar detectors that use ionization in a thin gas gap to detect cosmic muons. Prototype RPCs of active area $16 \times 16~cm^2$ and $28 \times 28~cm^2$ were built in our laboratories at Louvain-la-Neuve (UCLouvain) and Ghent (UGent) to test and compare various design options. Benefiting from the experience gained in building and operating these prototypes, we are proceeding towards the development of improved prototypes with more advanced technical layout and readiness. In this paper we provide the status of our performance studies, including the cross-validation of the two types of prototypes in a joint data taking, and an outline of the direction ahead.
△ Less
Submitted 20 September, 2022;
originally announced September 2022.
-
A general-purpose method for applying Explainable AI for Anomaly Detection
Authors:
John Sipple,
Abdou Youssef
Abstract:
The need for explainable AI (XAI) is well established but relatively little has been published outside of the supervised learning paradigm. This paper focuses on a principled approach to applying explainability and interpretability to the task of unsupervised anomaly detection. We argue that explainability is principally an algorithmic task and interpretability is principally a cognitive task, and…
▽ More
The need for explainable AI (XAI) is well established but relatively little has been published outside of the supervised learning paradigm. This paper focuses on a principled approach to applying explainability and interpretability to the task of unsupervised anomaly detection. We argue that explainability is principally an algorithmic task and interpretability is principally a cognitive task, and draw on insights from the cognitive sciences to propose a general-purpose method for practical diagnosis using explained anomalies. We define Attribution Error, and demonstrate, using real-world labeled datasets, that our method based on Integrated Gradients (IG) yields significantly lower attribution errors than alternative methods.
△ Less
Submitted 23 July, 2022;
originally announced July 2022.
-
Blindfold: Keeping Private Keys in PKIs and CDNs out of Sight
Authors:
Hisham Galal,
Mohammad Mannan,
Amr Youssef
Abstract:
Public key infrastructure (PKI) is a certificate-based technology that helps in authenticating systems identities. HTTPS/TLS relies mainly on PKI to minimize fraud over the Internet. Nowadays, websites utilize CDNs to improve user experience, performance, and resilience against cyber attacks. However, combining HTTPS/TLS with CDNs has raised new security challenges. In any PKI system, keeping priv…
▽ More
Public key infrastructure (PKI) is a certificate-based technology that helps in authenticating systems identities. HTTPS/TLS relies mainly on PKI to minimize fraud over the Internet. Nowadays, websites utilize CDNs to improve user experience, performance, and resilience against cyber attacks. However, combining HTTPS/TLS with CDNs has raised new security challenges. In any PKI system, keeping private keys private is of utmost importance. However, it has become the norm for CDN-powered websites to violate that fundamental assumption. Several solutions have been proposed to make HTTPS CDN-friendly. However, protection of private keys from the very instance of generation; and how they can be made secure against exposure by malicious (CDN) administrators and malware remain unexplored. We utilize trusted execution environments to protect private keys by never exposing them to human operators or untrusted software. We design Blindfold to protect private keys in HTTPS/TLS infrastructures, including CAs, website on-premise servers, and CDNs. We implemented a prototype to assess Blindfold's performance and performed several experiments on both the micro and macro levels. We found that Blindfold slightly outperforms SoftHSM in key generation by 1% while lagging by 0.01% for certificate issuance operations.
△ Less
Submitted 19 July, 2022;
originally announced July 2022.
-
Electroweak Corrections to the Charm-Top-Quark Contribution to $ε_K$
Authors:
Joachim Brod,
Sandra Kvedaraite,
Zachary Polonsky,
Ahmed Youssef
Abstract:
We calculate the leading-logarithmic and next-to-leading-logarithmic electroweak corrections to the charm-top-quark contribution to the effective $|ΔS| = 2$ Lagrangian, relevant for the parameter $ε_K$. We find that these corrections lead to a $-0.5\%$ shift in the corresponding Wilson coefficient. Moreover, our calculation removes an implicit ambiguity in the standard-model prediction of $ε_K$, b…
▽ More
We calculate the leading-logarithmic and next-to-leading-logarithmic electroweak corrections to the charm-top-quark contribution to the effective $|ΔS| = 2$ Lagrangian, relevant for the parameter $ε_K$. We find that these corrections lead to a $-0.5\%$ shift in the corresponding Wilson coefficient. Moreover, our calculation removes an implicit ambiguity in the standard-model prediction of $ε_K$, by fixing the renormalization scheme of the electroweak input parameters.
△ Less
Submitted 15 July, 2022;
originally announced July 2022.
-
Metasurface-enhanced Light Detection and Ranging Technology
Authors:
Renato Juliano Martins,
Emil Marinov,
M. Aziz Ben Youssef,
Christina Kyrou,
Mathilde Joubert,
Constance Colmagro,
Valentin Gâté,
Colette Turbil,
Pierre-Marie Coulon,
Daniel Turover,
Samira Khadir,
Massimo Giudici,
Charalambos Klitis,
Marc Sorel,
Patrice Genevet
Abstract:
Deploying advanced imaging solutions to robotic and autonomous systems by mimicking human vision requires simultaneous acquisition of multiple fields of views, named the peripheral and fovea regions. Low-resolution peripheral field provides coarse scene exploration to direct the eye to focus to a highly resolved fovea region for sharp imaging. Among 3D computer vision techniques, Light Detection a…
▽ More
Deploying advanced imaging solutions to robotic and autonomous systems by mimicking human vision requires simultaneous acquisition of multiple fields of views, named the peripheral and fovea regions. Low-resolution peripheral field provides coarse scene exploration to direct the eye to focus to a highly resolved fovea region for sharp imaging. Among 3D computer vision techniques, Light Detection and Ranging (LiDAR) is currently considered at the industrial level for robotic vision. LiDAR is an imaging technique that monitors pulses of light at optical frequencies to sense the space and to recover three-dimensional ranging information. Notwithstanding the efforts on LiDAR integration and optimization, commercially available devices have slow frame rate and low image resolution, notably limited by the performance of mechanical or slow solid-state deflection systems. Metasurfaces (MS) are versatile optical components that can distribute the optical power in desired regions of space. Here, we report on an advanced LiDAR technology that uses ultrafast low FoV deflectors cascaded with large area metasurfaces to achieve large FoV and simultaneous peripheral and central imaging zones. This technology achieves MHz frame rate for 2D imaging, and up to KHz for 3D imaging, with extremely large FoV (up to 150°deg. on both vertical and horizontal scanning axes). The use of this disruptive LiDAR technology with advanced learning algorithms offers perspectives to improve further the perception capabilities and decision-making process of autonomous vehicles and robotic systems.
△ Less
Submitted 7 April, 2022;
originally announced April 2022.
-
Thermodynamic and cosmological parameters of early stages of the Universe
Authors:
Amr Abd Al-Rahman Youssef,
Gaber Faisel,
Hakan Akyildirim
Abstract:
The early Universe was characterized by the presence of heavy particles that decoupled at different temperatures leading to different phases of the Universe. This had a consequences on the time evolution of the thermodynamic and the cosmological parameters characterizing each phase of the early Universe. In this study, we derive the analytic expressions of the equations governing the time evolutio…
▽ More
The early Universe was characterized by the presence of heavy particles that decoupled at different temperatures leading to different phases of the Universe. This had a consequences on the time evolution of the thermodynamic and the cosmological parameters characterizing each phase of the early Universe. In this study, we derive the analytic expressions of the equations governing the time evolution of these parameters in the early eras of the Universe namely, the radiation era, the quark-gluon plasma era, the hadron era and the mixed era. The parameters under concern include the energy density, the entropy density, the temperature, the pressure in addition to Hubble parameter and the scale factor. Having these expressions allows us to give estimations of the times corresponding to the beginning and ending of each era of the Universe as will be presented in this work.
△ Less
Submitted 7 April, 2022;
originally announced April 2022.
-
SAUSAGE: Security Analysis of Unix domain Socket Usage in Android
Authors:
Mounir Elgharabawy,
Blas Kojusner,
Mohammad Mannan,
Kevin R. B. Butler,
Byron Williams,
Amr Youssef
Abstract:
The Android operating system is currently the most popular mobile operating system in the world. Android is based on Linux and therefore inherits its features including its Inter-Process Communication (IPC) mechanisms. These mechanisms are used by processes to communicate with one another and are extensively used in Android. While Android-specific IPC mechanisms have been studied extensively, Unix…
▽ More
The Android operating system is currently the most popular mobile operating system in the world. Android is based on Linux and therefore inherits its features including its Inter-Process Communication (IPC) mechanisms. These mechanisms are used by processes to communicate with one another and are extensively used in Android. While Android-specific IPC mechanisms have been studied extensively, Unix domain sockets have not been examined comprehensively, despite playing a crucial role in the IPC of highly privileged system daemons. In this paper, we propose SAUSAGE, an efficient novel static analysis framework to study the security properties of these sockets. SAUSAGE considers access control policies implemented in the Android security model, as well as authentication checks implemented by the daemon binaries. It is a fully static analysis framework, specifically designed to analyze Unix domain socket usage in Android system daemons, at scale. We use this framework to analyze 200 Android images across eight popular smartphone vendors spanning Android versions 7-9. As a result, we uncover multiple access control misconfigurations and insecure authentication checks. Our notable findings include a permission bypass in highly privileged Qualcomm system daemons and an unprotected socket that allows an untrusted app to set the scheduling priority of other processes running on the system, despite the implementation of mandatory SELinux policies. Ultimately, the results of our analysis are worrisome; all vendors except the Android Open Source Project (AOSP) have access control issues, allowing an untrusted app to communicate to highly privileged daemons through Unix domain sockets introduced by hardware manufacturer or vendor customization.
△ Less
Submitted 4 April, 2022;
originally announced April 2022.
-
Modeling hadronization using machine learning
Authors:
Phil Ilten,
Tony Menzo,
Ahmed Youssef,
Jure Zupan
Abstract:
We present the first steps in the development of a new class of hadronization models utilizing machine learning techniques. We successfully implement, validate, and train a conditional sliced-Wasserstein autoencoder to replicate the Pythia generated kinematic distributions of first-hadron emissions, when the Lund string model of hadronization implemented in Pythia is restricted to the emissions of…
▽ More
We present the first steps in the development of a new class of hadronization models utilizing machine learning techniques. We successfully implement, validate, and train a conditional sliced-Wasserstein autoencoder to replicate the Pythia generated kinematic distributions of first-hadron emissions, when the Lund string model of hadronization implemented in Pythia is restricted to the emissions of pions only. The trained models are then used to generate the full hadronization chains, with an IR cutoff energy imposed externally. The hadron multiplicities and cumulative kinematic distributions are shown to match the Pythia generated ones. We also discuss possible future generalizations of our results.
△ Less
Submitted 9 March, 2022;
originally announced March 2022.
-
Dispute-free Scalable Open Vote Network using zk-SNARKs
Authors:
Muhammad ElSheikh,
Amr M. Youssef
Abstract:
The Open Vote Network is a self-tallying decentralized e-voting protocol suitable for boardroom elections. Currently, it has two Ethereum-based implementations: the first, by McCorry et al., has a scalability issue since all the computations are performed on-chain. The second implementation, by Seifelnasr et al., solves this issue partially by assigning a part of the heavy computations to an off-c…
▽ More
The Open Vote Network is a self-tallying decentralized e-voting protocol suitable for boardroom elections. Currently, it has two Ethereum-based implementations: the first, by McCorry et al., has a scalability issue since all the computations are performed on-chain. The second implementation, by Seifelnasr et al., solves this issue partially by assigning a part of the heavy computations to an off-chain untrusted administrator in a verifiable manner. As a side effect, this second implementation became not dispute-free; there is a need for a tally dispute phase where an observer interrupts the protocol when the administrator cheats, i.e., announces a wrong tally result. In this work, we propose a new smart contract design to tackle the problems in the previous implementations by (i) preforming all the heavy computations off-chain hence achieving higher scalability, and (ii) utilizing zero-knowledge Succinct Non-interactive Argument of Knowledge (zk-SNARK) to verify the correctness of the off-chain computations, hence maintaining the dispute-free property. To demonstrate the effectiveness of our design, we develop prototype implementations on Ethereum and conduct multiple experiments for different implementation options that show a trade-off between the zk-SNARK proof generation time and the smart contract gas cost, including an implementation in which the smart contract consumes a constant amount of gas independent of the number of voters.
△ Less
Submitted 7 March, 2022;
originally announced March 2022.
-
Comparative Verification of the Digital Library of Mathematical Functions and Computer Algebra Systems
Authors:
André Greiner-Petter,
Howard S. Cohl,
Abdou Youssef,
Moritz Schubotz,
Avi Trost,
Rajen Dey,
Akiko Aizawa,
Bela Gipp
Abstract:
Digital mathematical libraries assemble the knowledge of years of mathematical research. Numerous disciplines (e.g., physics, engineering, pure and applied mathematics) rely heavily on compendia gathered findings. Likewise, modern research applications rely more and more on computational solutions, which are often calculated and verified by computer algebra systems. Hence, the correctness, accurac…
▽ More
Digital mathematical libraries assemble the knowledge of years of mathematical research. Numerous disciplines (e.g., physics, engineering, pure and applied mathematics) rely heavily on compendia gathered findings. Likewise, modern research applications rely more and more on computational solutions, which are often calculated and verified by computer algebra systems. Hence, the correctness, accuracy, and reliability of both digital mathematical libraries and computer algebra systems is a crucial attribute for modern research.
In this paper, we present a novel approach to verify a digital mathematical library and two computer algebra systems with one another by converting mathematical expressions from one system to the other. We use our previously eveloped conversion tool (referred to as LaCASt) to translate formulae from the NIST Digital Library of Mathematical Functions to the computer algebra systems Maple and Mathematica. The contributions of our presented work are as follows: (1) we present the most comprehensive verification of computer algebra systems and digital mathematical libraries with one another; (2) we significantly enhance the performance of the underlying translator in terms of coverage and accuracy; and (3) we provide open access to translations for Maple and Mathematica of the formulae in the NIST Digital Library of Mathematical Functions.
△ Less
Submitted 31 March, 2022; v1 submitted 24 January, 2022;
originally announced January 2022.
-
EUSO@TurLab project in view of Mini-EUSO and EUSO-SPB2 missions
Authors:
H. Miyamoto,
M. E. Bertaina,
D. Barghini,
M. Battisti,
A. Belov,
F. Bisconti,
S. Blin-Bondil,
K. Bolmgren,
G. Cambie,
F. Capel,
R. Caruso,
M. Casolino,
I. Churilo,
G. Contino,
G. Cotto,
T. Ebisuzaki,
F. Fenu,
C. Fuglesang,
A. Golzio,
P. Gorodetzky,
F. Kajino,
P. Klimov,
M. Manfrin,
L. Marcelli,
M. Marengo
, et al. (15 additional authors not shown)
Abstract:
The TurLab facility is a laboratory, equipped with a 5 m diameter and 1 m depth rotating tank, located in the fourth basement level of the Physics Department of the University of Turin. In the past years, we have used the facility to perform experiments related to the observations of Extreme Energy Cosmic Rays (EECRs) from space using the fluorescence technique for JEM- EUSO missions with the main…
▽ More
The TurLab facility is a laboratory, equipped with a 5 m diameter and 1 m depth rotating tank, located in the fourth basement level of the Physics Department of the University of Turin. In the past years, we have used the facility to perform experiments related to the observations of Extreme Energy Cosmic Rays (EECRs) from space using the fluorescence technique for JEM- EUSO missions with the main objective to test the response of the trigger logic. In the missions, the diffuse night brightness and artificial and natural light sources can vary significantly in time and space in the Field of View (FoV) of the telescope. Therefore, it is essential to verify the detector performance and test the trigger logic under such an environment. By means of the tank rotation, a various terrestrial surface with the different optical characteristics such as ocean, land, forest, desert and clouds, as well as artificial and natural light sources such as city lights, lightnings and meteors passing by the detector FoV one after the other is reproduced. The fact that the tank located in a very dark place enables the tests under an optically controlled environment. Using the Mini-EUSO data taken since 2019 onboard the ISS, we will report on the comparison between TurLab and ISS measurements in view of future experiments at TurLab. Moreover, in the forthcoming months we will start testing the trigger logic of the EUSO-SPB2 mission. We report also on the plans and status for this purpose.
△ Less
Submitted 23 December, 2021;
originally announced December 2021.