Skip to main content

Showing 1–25 of 25 results for author: Ivanov, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.24616  [pdf, ps, other

    cs.CL cs.AI

    Eye of Judgement: Dissecting the Evaluation of Russian-speaking LLMs with POLLUX

    Authors: Nikita Martynov, Anastasia Mordasheva, Dmitriy Gorbetskiy, Danil Astafurov, Ulyana Isaeva, Elina Basyrova, Sergey Skachkov, Victoria Berestova, Nikolay Ivanov, Valeriia Zanina, Alena Fenogenova

    Abstract: We introduce POLLUX, a comprehensive open-source benchmark designed to evaluate the generative capabilities of large language models (LLMs) in Russian. Our main contribution is a novel evaluation methodology that enhances the interpretability of LLM assessment. For each task type, we define a set of detailed criteria and develop a scoring protocol where models evaluate responses and provide justif… ▽ More

    Submitted 27 June, 2025; v1 submitted 30 May, 2025; originally announced May 2025.

    Comments: 178 pages

  2. arXiv:2505.21115  [pdf, other

    cs.CL

    Will It Still Be True Tomorrow? Multilingual Evergreen Question Classification to Improve Trustworthy QA

    Authors: Sergey Pletenev, Maria Marina, Nikolay Ivanov, Daria Galimzianova, Nikita Krayko, Mikhail Salnikov, Vasily Konovalov, Alexander Panchenko, Viktor Moskvoretskii

    Abstract: Large Language Models (LLMs) often hallucinate in question answering (QA) tasks. A key yet underexplored factor contributing to this is the temporality of questions -- whether they are evergreen (answers remain stable over time) or mutable (answers change). In this work, we introduce EverGreenQA, the first multilingual QA dataset with evergreen labels, supporting both evaluation and training. Usin… ▽ More

    Submitted 27 May, 2025; originally announced May 2025.

  3. arXiv:2505.17884  [pdf, ps, other

    cs.CV

    Track Anything Annotate: Video annotation and dataset generation of computer vision models

    Authors: Nikita Ivanov, Mark Klimov, Dmitry Glukhikh, Tatiana Chernysheva, Igor Glukhikh

    Abstract: Modern machine learning methods require significant amounts of labelled data, making the preparation process time-consuming and resource-intensive. In this paper, we propose to consider the process of prototyping a tool for annotating and generating training datasets based on video tracking and segmentation. We examine different approaches to solving this problem, from technology selection through… ▽ More

    Submitted 23 May, 2025; originally announced May 2025.

    Comments: 9 pages, 11 figures

  4. arXiv:2505.04253  [pdf, other

    cs.CL cs.LG

    LLM-Independent Adaptive RAG: Let the Question Speak for Itself

    Authors: Maria Marina, Nikolay Ivanov, Sergey Pletenev, Mikhail Salnikov, Daria Galimzianova, Nikita Krayko, Vasily Konovalov, Alexander Panchenko, Viktor Moskvoretskii

    Abstract: Large Language Models~(LLMs) are prone to hallucinations, and Retrieval-Augmented Generation (RAG) helps mitigate this, but at a high computational cost while risking misinformation. Adaptive retrieval aims to retrieve only when necessary, but existing approaches rely on LLM-based uncertainty estimation, which remain inefficient and impractical. In this study, we introduce lightweight LLM-independ… ▽ More

    Submitted 7 May, 2025; originally announced May 2025.

    Comments: 11 pages, 5 figures, 2 tables

  5. arXiv:2503.22997  [pdf, ps, other

    cs.CC

    Disjunctive Complexity

    Authors: Nikita Ivanov, Alexander Rubtsov, Michael Vyalyi

    Abstract: A recently introduced measure of Boolean functions complexity--disjunc\-tive complexity (DC)--is compared with other complexity measures: the space complexity of streaming algorithms and the complexity of nondeterministic branching programs (NBP). We show that DC is incomparable with NBP. Specifically, we present a function that has low NBP but has subexponential DC. Conversely, we provide argumen… ▽ More

    Submitted 29 March, 2025; originally announced March 2025.

    Comments: Submitted to DCFS 2025

    ACM Class: F.1.3

  6. arXiv:2503.17385  [pdf, other

    eess.SY cs.LG stat.ML

    Uncertainty Quantification for Data-Driven Machine Learning Models in Nuclear Engineering Applications: Where We Are and What Do We Need?

    Authors: Xu Wu, Lesego E. Moloko, Pavel M. Bokov, Gregory K. Delipei, Joshua Kaizer, Kostadin N. Ivanov

    Abstract: Machine learning (ML) has been leveraged to tackle a diverse range of tasks in almost all branches of nuclear engineering. Many of the successes in ML applications can be attributed to the recent performance breakthroughs in deep learning, the growing availability of computational power, data, and easy-to-use ML libraries. However, these empirical successes have often outpaced our formal understan… ▽ More

    Submitted 16 March, 2025; originally announced March 2025.

    Comments: 34 pages, 13 figures, invited journal article from BEPU-2024 conference

  7. arXiv:2501.12835  [pdf, other

    cs.CL cs.LG

    Adaptive Retrieval Without Self-Knowledge? Bringing Uncertainty Back Home

    Authors: Viktor Moskvoretskii, Maria Lysyuk, Mikhail Salnikov, Nikolay Ivanov, Sergey Pletenev, Daria Galimzianova, Nikita Krayko, Vasily Konovalov, Irina Nikishina, Alexander Panchenko

    Abstract: Retrieval Augmented Generation (RAG) improves correctness of Question Answering (QA) and addresses hallucinations in Large Language Models (LLMs), yet greatly increase computational costs. Besides, RAG is not always needed as may introduce irrelevant information. Recent adaptive retrieval methods integrate LLMs' intrinsic knowledge with external information appealing to LLM self-knowledge, but the… ▽ More

    Submitted 21 February, 2025; v1 submitted 22 January, 2025; originally announced January 2025.

    Comments: The code and data are at https://github.com/s-nlp/AdaRAGUE

  8. arXiv:2402.16654  [pdf, other

    cs.AI cs.CL cs.HC

    GigaPevt: Multimodal Medical Assistant

    Authors: Pavel Blinov, Konstantin Egorov, Ivan Sviridov, Nikolay Ivanov, Stepan Botman, Evgeniy Tagin, Stepan Kudin, Galina Zubkova, Andrey Savchenko

    Abstract: Building an intelligent and efficient medical assistant is still a challenging AI problem. The major limitation comes from the data modality scarceness, which reduces comprehensive patient perception. This demo paper presents the GigaPevt, the first multimodal medical assistant that combines the dialog capabilities of large language models with specialized medical models. Such an approach shows im… ▽ More

    Submitted 30 July, 2024; v1 submitted 26 February, 2024; originally announced February 2024.

    Comments: IJCAI 2024, 4 pages, 2 figures, 2 tables

    MSC Class: 68T07 ACM Class: I.2.1

    Journal ref: Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence (IJCAI) Demo Track, 2024, pp. 8614-8618

  9. arXiv:2402.02198  [pdf

    cond-mat.mtrl-sci cs.LG

    Co-orchestration of Multiple Instruments to Uncover Structure-Property Relationships in Combinatorial Libraries

    Authors: Boris N. Slautin, Utkarsh Pratiush, Ilia N. Ivanov, Yongtao Liu, Rohit Pant, Xiaohang Zhang, Ichiro Takeuchi, Maxim A. Ziatdinov, Sergei V. Kalinin

    Abstract: The rapid growth of automated and autonomous instrumentations brings forth an opportunity for the co-orchestration of multimodal tools, equipped with multiple sequential detection methods, or several characterization tools to explore identical samples. This can be exemplified by the combinatorial libraries that can be explored in multiple locations by multiple tools simultaneously, or downstream c… ▽ More

    Submitted 17 March, 2024; v1 submitted 3 February, 2024; originally announced February 2024.

    Comments: 22 pages, 9 figures

  10. arXiv:2312.06010  [pdf, other

    cs.CR cs.SD eess.AS

    A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?

    Authors: Yuanda Wang, Qiben Yan, Nikolay Ivanov, Xun Chen

    Abstract: The emergence of Artificial Intelligence (AI)-driven audio attacks has revealed new security vulnerabilities in voice control systems. While researchers have introduced a multitude of attack strategies targeting voice control systems (VCS), the continual advancements of VCS have diminished the impact of many such attacks. Recognizing this dynamic landscape, our study endeavors to comprehensively a… ▽ More

    Submitted 4 January, 2024; v1 submitted 10 December, 2023; originally announced December 2023.

    Comments: 14 pages

  11. arXiv:2308.06267  [pdf, other

    cs.DC cs.LG

    DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning

    Authors: Bocheng Chen, Nikolay Ivanov, Guangjing Wang, Qiben Yan

    Abstract: Federated Learning (FL) is a distributed machine learning (ML) paradigm, aiming to train a global model by exploiting the decentralized data across millions of edge devices. Compared with centralized learning, FL preserves the clients' privacy by refraining from explicitly downloading their data. However, given the geo-distributed edge devices (e.g., mobile, car, train, or subway) with highly dyna… ▽ More

    Submitted 16 July, 2023; originally announced August 2023.

    Journal ref: 2023 SECON

  12. arXiv:2302.07347  [pdf, other

    cs.CR cs.DC

    Security Defense For Smart Contracts: A Comprehensive Survey

    Authors: Nikolay Ivanov, Chenning Li, Qiben Yan, Zhiyuan Sun, Zhichao Cao, Xiapu Luo

    Abstract: The blockchain technology has been used for recording state transitions of smart contracts - decentralized applications that can be invoked through external transactions. Smart contracts gained popularity and accrued hundreds of billions of dollars in market capitalization in recent years. Unfortunately, like all other programs, smart contracts are prone to security vulnerabilities that have incur… ▽ More

    Submitted 9 May, 2023; v1 submitted 14 February, 2023; originally announced February 2023.

    Comments: ACM Computing Surveys (CSUR)

  13. TxT: Real-time Transaction Encapsulation for Ethereum Smart Contracts

    Authors: Nikolay Ivanov, Qiben Yan, Anurag Kompalli

    Abstract: Ethereum is a permissionless blockchain ecosystem that supports execution of smart contracts, the key enablers of decentralized finance (DeFi) and non-fungible tokens (NFT). However, the expressiveness of Ethereum smart contracts is a double-edged sword: while it enables blockchain programmability, it also introduces security vulnerabilities, i.e., the exploitable discrepancies between expected an… ▽ More

    Submitted 20 January, 2023; originally announced January 2023.

    Comments: To appear in IEEE Transactions on Information Forensics and Security

  14. arXiv:2211.08654  [pdf, other

    stat.ML cs.LG physics.comp-ph

    Prediction and Uncertainty Quantification of SAFARI-1 Axial Neutron Flux Profiles with Neural Networks

    Authors: Lesego E. Moloko, Pavel M. Bokov, Xu Wu, Kostadin N. Ivanov

    Abstract: Artificial Neural Networks (ANNs) have been successfully used in various nuclear engineering applications, such as predicting reactor physics parameters within reasonable time and with a high level of accuracy. Despite this success, they cannot provide information about the model prediction uncertainties, making it difficult to assess ANN prediction credibility, especially in extrapolated domains.… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Comments: 34 pages, 12 figures

  15. arXiv:2209.09127  [pdf, other

    cs.PL cs.PF

    Is Rust C++-fast? Benchmarking System Languages on Everyday Routines

    Authors: Nikolay Ivanov

    Abstract: Rust is a relatively new system programming language that has been experiencing a rapid adoption in the past 10 years. Rust incorporates a memory ownership model enforced at a compile time. Since this model involves zero runtime overhead, programs written in Rust are not only memory-safe but also fast, leading to performance comparable to C and C++. Multiple existing benchmarks comparing the perfo… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Comments: Michigan State University

  16. arXiv:2209.08370  [pdf, other

    cs.CR

    Decentralization Paradox: A Study of Hegemonic and Risky ERC-20 Tokens

    Authors: Nikolay Ivanov, Qiben Yan

    Abstract: In this work, we explore the class of Ethereum smart contracts called the administrated ERC20 tokens. We demonstrate that these contracts are more owner-controlled and less safe than the services they try to disrupt, such as banks and centralized online payment systems. We develop a binary classifier for identification of administrated ERC20 tokens, and conduct extensive data analysis, which revea… ▽ More

    Submitted 17 September, 2022; originally announced September 2022.

    Comments: 2022 Engineering Graduate Research Symposium (EGRS)

  17. arXiv:2209.08356  [pdf, other

    cs.CR

    Et tu, Blockchain? Outsmarting Smart Contracts via Social Engineering

    Authors: Nikolay Ivanov, Qiben Yan

    Abstract: We reveal six zero-day social engineering attacks in Ethereum, and subdivide them into two classes: Address Manipulation and Homograph. We demonstrate the attacks by embedding them in source codes of five popular smart contracts with combined market capitalization of over \$29 billion, and show that the attacks have the ability to remain dormant during the testing phase and activate only after pro… ▽ More

    Submitted 17 September, 2022; originally announced September 2022.

    Comments: 14th annual Graduate Academic Conference (GAC). arXiv admin note: text overlap with arXiv:2105.00132

  18. arXiv:2205.14496  [pdf, other

    cs.SD cs.HC cs.LG eess.AS

    SuperVoice: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech

    Authors: Hanqing Guo, Qiben Yan, Nikolay Ivanov, Ying Zhu, Li Xiao, Eric J. Hunter

    Abstract: Voice-activated systems are integrated into a variety of desktop, mobile, and Internet-of-Things (IoT) devices. However, voice spoofing attacks, such as impersonation and replay attacks, in which malicious attackers synthesize the voice of a victim or simply replay it, have brought growing security concerns. Existing speaker verification techniques distinguish individual speakers via the spectrogr… ▽ More

    Submitted 28 May, 2022; originally announced May 2022.

  19. arXiv:2108.14004  [pdf, other

    cs.CR

    EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion

    Authors: Nikolay Ivanov, Qiben Yan

    Abstract: Hardware wallets are designed to withstand malware attacks by isolating their private keys from the cyberspace, but they are vulnerable to the attacks that fake an address stored in a clipboard. To prevent such attacks, a hardware wallet asks the user to verify the recipient address shown on the wallet display. Since crypto addresses are long sequences of random symbols, their manual verification… ▽ More

    Submitted 31 August, 2021; originally announced August 2021.

    Comments: IEEE Conference on Communications and Network Security (CNS 2021)

  20. arXiv:2107.10979  [pdf, other

    cs.CR cs.CY cs.DC

    Rectifying Administrated ERC20 Tokens

    Authors: Nikolay Ivanov, Hanqing Guo, Qiben Yan

    Abstract: The developers of Ethereum smart contracts often implement administrating patterns, such as censoring certain users, creating or destroying balances on demand, destroying smart contracts, or injecting arbitrary code. These routines turn an ERC20 token into an administrated token - the type of Ethereum smart contract that we scrutinize in this research. We discover that many smart contracts are adm… ▽ More

    Submitted 17 July, 2021; originally announced July 2021.

    Comments: 23rd International Conference on Information and Communications Security (ICICS 2021)

  21. arXiv:2107.08490  [pdf, other

    cs.DC cs.CR cs.NI eess.SY

    System-Wide Security for Offline Payment Terminals

    Authors: Nikolay Ivanov, Qiben Yan

    Abstract: Most self-service payment terminals require network connectivity for processing electronic payments. The necessity to maintain network connectivity increases costs, introduces cybersecurity risks, and significantly limits the number of places where the terminals can be installed. Leading payment service providers have proposed offline payment solutions that rely on algorithmically generated paymen… ▽ More

    Submitted 18 July, 2021; originally announced July 2021.

    Comments: 17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2021)

  22. arXiv:2107.04904  [pdf, other

    cs.DC cs.PF

    Blockumulus: A Scalable Framework for Smart Contracts on the Cloud

    Authors: Nikolay Ivanov, Qiben Yan, Qingyang Wang

    Abstract: Public blockchains have spurred the growing popularity of decentralized transactions and smart contracts, but they exhibit limitations on the transaction throughput, storage, and computation. To avoid transaction gridlock, public blockchains impose large fees and per-block resource limits, making it difficult to accommodate the ever-growing transaction demand. Previous research endeavors to improv… ▽ More

    Submitted 10 July, 2021; originally announced July 2021.

    Comments: 41st IEEE International Conference on Distributed Computing Systems (ICDCS 2021)

  23. arXiv:2105.14194  [pdf, other

    q-fin.ST cs.AI cs.CE cs.LG

    Constraint-Based Inference of Heuristics for Foreign Exchange Trade Model Optimization

    Authors: Nikolay Ivanov, Qiben Yan

    Abstract: The Foreign Exchange (Forex) is a large decentralized market, on which trading analysis and algorithmic trading are popular. Research efforts have been focusing on proof of efficiency of certain technical indicators. We demonstrate, however, that the values of indicator functions are not reproducible and often reduce the number of trade opportunities, compared to price-action trading. In this wo… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

    Comments: 8 pages

  24. arXiv:2105.00132  [pdf, other

    cs.CR

    Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts

    Authors: Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan

    Abstract: Ethereum holds multiple billions of U.S. dollars in the form of Ether cryptocurrency and ERC-20 tokens, with millions of deployed smart contracts algorithmically operating these funds. Unsurprisingly, the security of Ethereum smart contracts has been under rigorous scrutiny. In recent years, numerous defense tools have been developed to detect different types of smart contract code vulnerabilities… ▽ More

    Submitted 29 May, 2021; v1 submitted 30 April, 2021; originally announced May 2021.

    Comments: ACM ASIA Conference on Computer and Communications Security 2021, 15 pages

  25. A system of relational syllogistic incorporating full Boolean reasoning

    Authors: Nikolay Ivanov, Dimiter Vakarelov

    Abstract: We present a system of relational syllogistic, based on classical propositional logic, having primitives of the following form: Some A are R-related to some B; Some A are R-related to all B; All A are R-related to some B; All A are R-related to all B. Such primitives formalize sentences from natural language like `All students read some textbooks'. Here A and B denote arbitrary sets (of… ▽ More

    Submitted 23 January, 2013; v1 submitted 22 February, 2011; originally announced February 2011.

    Comments: Available at http://link.springer.com/article/10.1007/s10849-012-9165-1

    MSC Class: 03B65

    Journal ref: Journal of Logic, Language and Information, 21 (2012) 433-459