Skip to main content

Showing 1–8 of 8 results for author: Clements, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.01425  [pdf, ps, other

    cs.CV

    Adaptive Sensitivity Analysis for Robust Augmentation against Natural Corruptions in Image Segmentation

    Authors: Laura Zheng, Wenjie Wei, Tony Wu, Jacob Clements, Shreelekha Revankar, Andre Harrison, Yu Shen, Ming C. Lin

    Abstract: Achieving robustness in image segmentation models is challenging due to the fine-grained nature of pixel-level classification. These models, which are crucial for many real-time perception applications, particularly struggle when faced with natural corruptions in the wild for autonomous systems. While sensitivity analysis can help us understand how input variables influence model outputs, its appl… ▽ More

    Submitted 16 June, 2025; v1 submitted 3 June, 2024; originally announced June 2024.

    Comments: 9 pages

  2. arXiv:2012.15330  [pdf, other

    q-fin.RM cs.LG

    Sequential Deep Learning for Credit Risk Monitoring with Tabular Financial Data

    Authors: Jillian M. Clements, Di Xu, Nooshin Yousefi, Dmitry Efimov

    Abstract: Machine learning plays an essential role in preventing financial losses in the banking industry. Perhaps the most pertinent prediction task that can result in billions of dollars in losses each year is the assessment of credit risk (i.e., the risk of default on debt). Today, much of the gains from machine learning to predict credit risk are driven by gradient boosted decision tree models. However,… ▽ More

    Submitted 30 December, 2020; originally announced December 2020.

    ACM Class: I.2.1

  3. arXiv:2002.09591  [pdf, other

    cs.SI physics.soc-ph

    Dynamics of large scale networks following a merger

    Authors: John Clements, Babak Farzad, Henryk FukÅ›

    Abstract: We study the dynamic network of relationships among avatars in the massively multiplayer online game Planetside 2. In the spring of 2014, two separate servers of this game were merged, and as a result, two previously distinct networks were combined into one. We observed the evolution of this network in the seven month period following the merger and report our observations. We found that some stru… ▽ More

    Submitted 21 February, 2020; originally announced February 2020.

    Comments: 8 pages, 17 figures

    Journal ref: T. Ozyer and R. Alhajj (eds), Machine Learning Techniques for Online Social Networks, Lecture Notes in Social Networks, pages 173--193. Springer, 2018

  4. arXiv:1903.11688  [pdf, other

    cs.CR cs.LG

    Rallying Adversarial Techniques against Deep Learning for Network Security

    Authors: Joseph Clements, Yuzhe Yang, Ankur Sharma, Hongxin Hu, Yingjie Lao

    Abstract: Recent advances in artificial intelligence and the increasing need for powerful defensive measures in the domain of network security, have led to the adoption of deep learning approaches for use in network intrusion detection systems. These methods have achieved superior performance against conventional network attacks, which enable the deployment of practical security systems to unique and dynami… ▽ More

    Submitted 24 October, 2021; v1 submitted 27 March, 2019; originally announced March 2019.

    Comments: accepted by IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2021)

  5. arXiv:1810.03010  [pdf, other

    cs.CR

    Optimal Sabotage Attack on Composite Material Parts

    Authors: Bikash Ranabhat, Joseph Clements, Jacob Gatlin, Kuang-Ting Hsiao, Mark Yampolskiy

    Abstract: Industry 4.0 envisions a fully automated manufacturing environment, in which computerized manufacturing equipment--Cyber-Physical Systems (CPS)--performs all tasks. These machines are open to a variety of cyber and cyber-physical attacks, including sabotage. In the manufacturing context, sabotage attacks aim to damage equipment or degrade a manufactured part's mechanical properties. In this paper,… ▽ More

    Submitted 6 October, 2018; originally announced October 2018.

  6. arXiv:1806.05768  [pdf, other

    cs.LG cs.CR stat.ML

    Hardware Trojan Attacks on Neural Networks

    Authors: Joseph Clements, Yingjie Lao

    Abstract: With the rising popularity of machine learning and the ever increasing demand for computational power, there is a growing need for hardware optimized implementations of neural networks and other machine learning models. As the technology evolves, it is also plausible that machine learning or artificial intelligence will soon become consumer electronic products and military equipment, in the form o… ▽ More

    Submitted 14 June, 2018; originally announced June 2018.

  7. arXiv:1502.07786  [pdf, other

    cs.CR

    Generating 56-bit passwords using Markov Models (and Charles Dickens)

    Authors: John Clements

    Abstract: We describe a password generation scheme based on Markov models built from English text (specifically, Charles Dickens' *A Tale Of Two Cities*). We show a (linear-running-time) bijection between random bitstrings of any desired length and generated text, ensuring that all passwords are generated with equal probability. We observe that the generated passwords appear to strike a reasonable balance b… ▽ More

    Submitted 26 February, 2015; originally announced February 2015.

    Comments: 5 pages, 2 figures

    ACM Class: K.6.5; E.4; D.4.6; K.4.2; H.1.2; I.2.7

  8. arXiv:1108.4706  [pdf, other

    cs.PL

    Stepping Lazy Programs

    Authors: Stephen Chang, John Clements, Eli Barzilay, Matthias Felleisen

    Abstract: Debugging lazy functional programs poses serious challenges. In support of the "stop, examine, and resume" debugging style of imperative languages, some debugging tools abandon lazy evaluation. Other debuggers preserve laziness but present it in a way that may confuse programmers because the focus of evaluation jumps around in a seemingly random manner. In this paper, we introduce a supplemental… ▽ More

    Submitted 23 August, 2011; originally announced August 2011.

    Comments: submitted to ICFP 2011