Skip to main content

Showing 1–15 of 15 results for author: Bates, A

Searching in archive cs. Search in all archives.
.
  1. Unified Modeling Language Code Generation from Diagram Images Using Multimodal Large Language Models

    Authors: Averi Bates, Ryan Vavricka, Shane Carleton, Ruosi Shao, Chongle Pan

    Abstract: The Unified Modeling Language is a standardized visual language widely used for modeling and documenting the design of software systems. Although many tools generate UML diagrams from UML code, generating executable UML code from image-based UML diagrams remains challenging. This paper proposes a new approach to generate UML code using a large multimodal language model automatically. Synthetic UML… ▽ More

    Submitted 15 May, 2025; v1 submitted 15 March, 2025; originally announced March 2025.

    Comments: Published in the Journal of Machine Learning with Applications, Author Contributions: Averi Bates: Methodology, Development, Analysis, Data Curation, Drafting, Review. Ryan Vavricka: Data Curation, Development, Review. Shane Carleton: Supervision, Funding. Ruosi Shao: Review. Chongle Pan: Supervision, Review

    ACM Class: D.2.2; D.2.3; I.2.7; I.4.9

    Journal ref: Mach. Learn. Appl. 20 (2025) 100660

  2. arXiv:2503.08589  [pdf

    cs.CV

    Integration of nested cross-validation, automated hyperparameter optimization, high-performance computing to reduce and quantify the variance of test performance estimation of deep learning models

    Authors: Paul Calle, Averi Bates, Justin C. Reynolds, Yunlong Liu, Haoyang Cui, Sinaro Ly, Chen Wang, Qinghao Zhang, Alberto J. de Armendi, Shashank S. Shettar, Kar Ming Fung, Qinggong Tang, Chongle Pan

    Abstract: The variability and biases in the real-world performance benchmarking of deep learning models for medical imaging compromise their trustworthiness for real-world deployment. The common approach of holding out a single fixed test set fails to quantify the variance in the estimation of test performance metrics. This study introduces NACHOS (Nested and Automated Cross-validation and Hyperparameter Op… ▽ More

    Submitted 11 March, 2025; originally announced March 2025.

  3. arXiv:2408.13347  [pdf, other

    cs.CR

    ORCHID: Streaming Threat Detection over Versioned Provenance Graphs

    Authors: Akul Goyal, Jason Liu, Adam Bates, Gang Wang

    Abstract: While Endpoint Detection and Response (EDR) are able to efficiently monitor threats by comparing static rules to the event stream, their inability to incorporate past system context leads to high rates of false alarms. Recent work has demonstrated Provenance-based Intrusion Detection Systems (Prov-IDS) that can examine the causal relationships between abnormal behaviors to improve threat classific… ▽ More

    Submitted 23 August, 2024; originally announced August 2024.

  4. arXiv:2405.04691  [pdf, other

    cs.CR cs.LG

    Carbon Filter: Real-time Alert Triage Using Large Scale Clustering and Fast Search

    Authors: Jonathan Oliver, Raghav Batta, Adam Bates, Muhammad Adil Inam, Shelly Mehta, Shugao Xia

    Abstract: "Alert fatigue" is one of the biggest challenges faced by the Security Operations Center (SOC) today, with analysts spending more than half of their time reviewing false alerts. Endpoint detection products raise alerts by pattern matching on event telemetry against behavioral rules that describe potentially malicious behavior, but can suffer from high false positives that distract from actual atta… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

  5. arXiv:2401.01341  [pdf, other

    cs.CR

    ATLASv2: ATLAS Attack Engagements, Version 2

    Authors: Andy Riddle, Kim Westfall, Adam Bates

    Abstract: ATLASv2 is based on a previously generated dataset included in "ATLAS: A Sequence-based Learning Approach for Attack Investigation." The original ATLAS dataset is comprised of Windows Security Auditing system logs, Firefox logs, and DNS logs via WireShark. In ATLASv2, we aim to enrich the ATLAS dataset with higher quality background noise and additional logging vantage points. This work replicates… ▽ More

    Submitted 3 October, 2023; originally announced January 2024.

  6. arXiv:2208.02699  [pdf, other

    cs.CR cs.OS

    Ellipsis: Towards Efficient System Auditing for Real-Time Systems

    Authors: Ayoosh Bansal, Anant Kandikuppa, Chien-Ying Chen, Monowar Hasan, Adam Bates, Sibin Mohan

    Abstract: System auditing is a powerful tool that provides insight into the nature of suspicious events in computing systems, allowing machine operators to detect and subsequently investigate security incidents. While auditing has proven invaluable to the security of traditional computers, existing audit frameworks are rarely designed with consideration for Real-Time Systems (RTS). The transparency provided… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Comments: Extended version of a paper accepted at ESORICS 2022

    ACM Class: D.4.6; C.3

  7. Dynamic imaging using Motion-Compensated SmooThness Regularization on Manifolds (MoCo-SToRM)

    Authors: Qing Zou, Luis A. Torres, Sean B. Fain, Nara S. Higano, Alister J. Bates, Mathews Jacob

    Abstract: We introduce an unsupervised motion-compensated reconstruction scheme for high-resolution free-breathing pulmonary MRI. We model the image frames in the time series as the deformed version of the 3D template image volume. We assume the deformation maps to be points on a smooth manifold in high-dimensional space. Specifically, we model the deformation map at each time instant as the output of a CNN… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

  8. arXiv:2109.13412  [pdf, other

    cs.LG cs.CV

    Discriminative Attribution from Counterfactuals

    Authors: Nils Eckstein, Alexander S. Bates, Gregory S. X. E. Jefferis, Jan Funke

    Abstract: We present a method for neural network interpretability by combining feature attribution with counterfactual explanations to generate attribution maps that highlight the most discriminative features between pairs of classes. We show that this method can be used to quantitatively evaluate the performance of feature attribution methods in an objective manner, thus preventing potential observer bias.… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

  9. arXiv:2010.15973  [pdf, other

    hep-lat cs.DC physics.comp-ph

    Toward Lattice QCD On Billion Core Approximate Computers

    Authors: Alexandra Bates, Joseph Bates

    Abstract: We present evidence of the feasibility of using billion core approximate computers to run simple U(1) sigma models, and discuss how the approach might be extended to Lattice Quantum Chromodynamics (LQCD) models. This work is motivated by the extreme time, power, and cost needed to run LQCD on current computing hardware. We show that, using massively parallel approximate hardware, at least some mod… ▽ More

    Submitted 29 October, 2020; originally announced October 2020.

  10. UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats

    Authors: Xueyuan Han, Thomas Pasquier, Adam Bates, James Mickens, Margo Seltzer

    Abstract: Advanced Persistent Threats (APTs) are difficult to detect due to their "low-and-slow" attack patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based APT detector that effectively leverages data provenance analysis. From modeling to detection, UNICORN tailors its design specifically for the unique characteristics of APTs. Through extensive yet time-efficient graph anal… ▽ More

    Submitted 14 January, 2020; v1 submitted 6 January, 2020; originally announced January 2020.

    Comments: 19 pages

  11. arXiv:1808.06049  [pdf, other

    cs.CR cs.OS

    Runtime Analysis of Whole-System Provenance

    Authors: Thomas Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David Eyers, Jean Bacon, Margo Seltzer

    Abstract: Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance provides a detailed history of the flow of information within a computing system, connecting suspicious events to their root causes. Although existing provenance-based auditing techniques provide value in forensic analysis, they assume that such analysis takes place… ▽ More

    Submitted 25 August, 2018; v1 submitted 18 August, 2018; originally announced August 2018.

    Comments: 16 pages, 12 figures, 25th ACM Conference on Computer and Communications Security 2018

  12. arXiv:1705.04336  [pdf, other

    cs.CV

    An Optimal Dimensionality Multi-shell Sampling Scheme with Accurate and Efficient Transforms for Diffusion MRI

    Authors: Alice P. Bates, Zubair Khalid, Jason D. McEwen, Rodney A. Kennedy

    Abstract: This paper proposes a multi-shell sampling scheme and corresponding transforms for the accurate reconstruction of the diffusion signal in diffusion MRI by expansion in the spherical polar Fourier (SPF) basis. The sampling scheme uses an optimal number of samples, equal to the degrees of freedom of the band-limited diffusion signal in the SPF domain, and allows for computationally efficient reconst… ▽ More

    Submitted 20 April, 2017; originally announced May 2017.

    Comments: 4 pages, 4 figures presented at ISBI 2017

  13. arXiv:1702.07056  [pdf, other

    cs.DM

    Multi-shell Sampling Scheme with Accurate and Efficient Transforms for Diffusion MRI

    Authors: Alice P. Bates, Zubair Khalid, Rodney A. Kennedy, Jason D. McEwen

    Abstract: We propose a multi-shell sampling grid and develop corresponding transforms for the accurate reconstruction of the diffusion signal in diffusion MRI by expansion in the spherical polar Fourier (SPF) basis. The transform is exact in the radial direction and accurate, on the order of machine precision, in the angular direction. The sampling scheme uses an optimal number of samples equal to the degre… ▽ More

    Submitted 22 February, 2017; originally announced February 2017.

    Comments: 1 page, 1 figure, presented as a poster at the 2017 Biomedical and Astronomical Image Processing (BASP) Workshop

  14. arXiv:1609.00266  [pdf, other

    cs.CR

    Retrofitting Applications with Provenance-Based Security Monitoring

    Authors: Adam Bates, Kevin Butler, Alin Dobra, Brad Reaves, Patrick Cable, Thomas Moyer, Nabil Schear

    Abstract: Data provenance is a valuable tool for detecting and preventing cyber attack, providing insight into the nature of suspicious events. For example, an administrator can use provenance to identify the perpetrator of a data leak, track an attacker's actions following an intrusion, or even control the flow of outbound data within an organization. Unfortunately, providing relevant data provenance for c… ▽ More

    Submitted 1 September, 2016; originally announced September 2016.

  15. Efficient Computation of Slepian Functions for Arbitrary Regions on the Sphere

    Authors: Alice P. Bates, Zubair Khalid, Rodney A. Kennedy

    Abstract: In this paper, we develop a new method for the fast and memory-efficient computation of Slepian functions on the sphere. Slepian functions, which arise as the solution of the Slepian concentration problem on the sphere, have desirable properties for applications where measurements are only available within a spatially limited region on the sphere and/or a function is required to be analyzed over t… ▽ More

    Submitted 31 August, 2017; v1 submitted 18 August, 2016; originally announced August 2016.

    Comments: 16 pages, 10 figures accepted to IEEE Transactions on Signal Processing

    Journal ref: A. P. Bates, Z. Khalid and R. A. Kennedy, "Efficient Computation of Slepian Functions for Arbitrary Regions on the Sphere," in IEEE Transactions on Signal Processing, vol. 65, no. 16, pp. 4379-4393, Aug.15, 15 2017