-
PatchDEMUX: A Certifiably Robust Framework for Multi-label Classifiers Against Adversarial Patches
Authors:
Dennis Jacob,
Chong Xiang,
Prateek Mittal
Abstract:
Deep learning techniques have enabled vast improvements in computer vision technologies. Nevertheless, these models are vulnerable to adversarial patch attacks which catastrophically impair performance. The physically realizable nature of these attacks calls for certifiable defenses, which feature provable guarantees on robustness. While certifiable defenses have been successfully applied to singl…
▽ More
Deep learning techniques have enabled vast improvements in computer vision technologies. Nevertheless, these models are vulnerable to adversarial patch attacks which catastrophically impair performance. The physically realizable nature of these attacks calls for certifiable defenses, which feature provable guarantees on robustness. While certifiable defenses have been successfully applied to single-label classification, limited work has been done for multi-label classification. In this work, we present PatchDEMUX, a certifiably robust framework for multi-label classifiers against adversarial patches. Our approach is a generalizable method which can extend any existing certifiable defense for single-label classification; this is done by considering the multi-label classification task as a series of isolated binary classification problems to provably guarantee robustness. Furthermore, in the scenario where an attacker is limited to a single patch we propose an additional certification procedure that can provide tighter robustness bounds. Using the current state-of-the-art (SOTA) single-label certifiable defense PatchCleanser as a backbone, we find that PatchDEMUX can achieve non-trivial robustness on the MS-COCO and PASCAL VOC datasets while maintaining high clean performance
△ Less
Submitted 30 May, 2025;
originally announced May 2025.
-
JailbreaksOverTime: Detecting Jailbreak Attacks Under Distribution Shift
Authors:
Julien Piet,
Xiao Huang,
Dennis Jacob,
Annabella Chow,
Maha Alrashed,
Geng Zhao,
Zhanhao Hu,
Chawin Sitawarin,
Basel Alomair,
David Wagner
Abstract:
Safety and security remain critical concerns in AI deployment. Despite safety training through reinforcement learning with human feedback (RLHF) [ 32], language models remain vulnerable to jailbreak attacks that bypass safety guardrails. Universal jailbreaks - prefixes that can circumvent alignment for any payload - are particularly concerning. We show empirically that jailbreak detection systems…
▽ More
Safety and security remain critical concerns in AI deployment. Despite safety training through reinforcement learning with human feedback (RLHF) [ 32], language models remain vulnerable to jailbreak attacks that bypass safety guardrails. Universal jailbreaks - prefixes that can circumvent alignment for any payload - are particularly concerning. We show empirically that jailbreak detection systems face distribution shift, with detectors trained at one point in time performing poorly against newer exploits. To study this problem, we release JailbreaksOverTime, a comprehensive dataset of timestamped real user interactions containing both benign requests and jailbreak attempts collected over 10 months. We propose a two-pronged method for defenders to detect new jailbreaks and continuously update their detectors. First, we show how to use continuous learning to detect jailbreaks and adapt rapidly to new emerging jailbreaks. While detectors trained at a single point in time eventually fail due to drift, we find that universal jailbreaks evolve slowly enough for self-training to be effective. Retraining our detection model weekly using its own labels - with no new human labels - reduces the false negative rate from 4% to 0.3% at a false positive rate of 0.1%. Second, we introduce an unsupervised active monitoring approach to identify novel jailbreaks. Rather than classifying inputs directly, we recognize jailbreaks by their behavior, specifically, their ability to trigger models to respond to known-harmful prompts. This approach has a higher false negative rate (4.1%) than supervised methods, but it successfully identified some out-of-distribution attacks that were missed by the continuous learning approach.
△ Less
Submitted 27 April, 2025;
originally announced April 2025.
-
PromptShield: Deployable Detection for Prompt Injection Attacks
Authors:
Dennis Jacob,
Hend Alzahrani,
Zhanhao Hu,
Basel Alomair,
David Wagner
Abstract:
Application designers have moved to integrate large language models (LLMs) into their products. However, many LLM-integrated applications are vulnerable to prompt injections. While attempts have been made to address this problem by building prompt injection detectors, many are not yet suitable for practical deployment. To support research in this area, we introduce PromptShield, a benchmark for tr…
▽ More
Application designers have moved to integrate large language models (LLMs) into their products. However, many LLM-integrated applications are vulnerable to prompt injections. While attempts have been made to address this problem by building prompt injection detectors, many are not yet suitable for practical deployment. To support research in this area, we introduce PromptShield, a benchmark for training and evaluating deployable prompt injection detectors. Our benchmark is carefully curated and includes both conversational and application-structured data. In addition, we use insights from our curation process to fine-tune a new prompt injection detector that achieves significantly higher performance in the low false positive rate (FPR) evaluation regime compared to prior schemes. Our work suggests that careful curation of training data and larger models can contribute to strong detector performance.
△ Less
Submitted 11 April, 2025; v1 submitted 25 January, 2025;
originally announced January 2025.
-
A dynamical model of platform choice and online segregation
Authors:
Sven Banisch,
Dennis Jacob,
Tom Willaert,
Eckehard Olbrich
Abstract:
In order to truly understand how social media might shape online discourses or contribute to societal polarization, we need refined models of platform choice, that is: models that help us understand why users prefer one social media platform over another. This study develops a dynamic model of platform selection, extending Social Feedback Theory by incorporating multi-agent reinforcement learning…
▽ More
In order to truly understand how social media might shape online discourses or contribute to societal polarization, we need refined models of platform choice, that is: models that help us understand why users prefer one social media platform over another. This study develops a dynamic model of platform selection, extending Social Feedback Theory by incorporating multi-agent reinforcement learning to capture how user decisions are shaped by past rewards across different platforms. A key parameter ($μ$) in the model governs users' tendencies to either seek approval from like-minded peers or engage with opposing views. Our findings reveal that online environments can evolve into suboptimal states characterized by polarized, strongly opinionated echo chambers, even when users prefer diverse perspectives. Interestingly, this polarizing state coexists with another equilibrium, where users gravitate toward a single dominant platform, marginalizing other platforms into extremity. Using agent-based simulations and dynamical systems analysis, our model underscores the complex interplay of user preferences and platform dynamics, offering insights into how digital spaces might be better managed to foster diverse discourse.
△ Less
Submitted 7 November, 2024;
originally announced November 2024.
-
Graph Burning: Bounds and Hardness
Authors:
Dhanyamol Antony,
Anita Das,
Shirish Gosavi,
Dalu Jacob,
Shashanka Kulamarva
Abstract:
For an undirected graph $G$, graph burning is defined as follows: at step $t=0$ all vertices in $G$ are unburned. At each step $t\ge 1$, one new unburned vertex is selected to burn until we exhaust all the vertices. If a vertex is burned at step $t$, then all its unburned neighbors are burned in step $t+1$, and the process continues until there are no unburned vertices in $G$. The burning number o…
▽ More
For an undirected graph $G$, graph burning is defined as follows: at step $t=0$ all vertices in $G$ are unburned. At each step $t\ge 1$, one new unburned vertex is selected to burn until we exhaust all the vertices. If a vertex is burned at step $t$, then all its unburned neighbors are burned in step $t+1$, and the process continues until there are no unburned vertices in $G$. The burning number of a graph $G$, denoted by $b(G)$, is the minimum number of steps required to burn all the vertices of $G$. The Burning Number problem asks whether the burning number of an input graph $G$ is at most $k$ or not. In this paper, we study the Burning Number problem both from an algorithmic and a structural point of view. The Burning Number problem is known to be NP-complete for trees with maximum degree at most three and interval graphs. Here, we prove that this problem is NP-complete even when restricted to connected cubic graphs and connected proper interval graphs. The well-known burning number conjecture asserts that all the vertices of a graph of order $n$ can be burned in $\lceil \sqrt{n}~\rceil$ steps. In line with this conjecture, upper and lower bounds of $b(G)$ are well-studied for various graph classes. Here, we provide an improved upper bound for the burning number of connected $P_k$-free graphs and show that the bound is tight up to an additive constant $1$. Finally, we study two variants of the problem, namely edge burning (only edges are burned) and total burning (both vertices and edges are burned). In particular, we establish their relationship with the burning number problem and evaluate the algorithmic complexity of these variants.
△ Less
Submitted 28 January, 2025; v1 submitted 29 February, 2024;
originally announced February 2024.
-
Spanning caterpillar in biconvex bipartite graphs
Authors:
Dhanyamol Antony,
Anita Das,
Shirish Gosavi,
Dalu Jacob,
Shashanka Kulamarva
Abstract:
A bipartite graph $G=(A, B, E)$ is said to be a biconvex bipartite graph if there exist orderings $<_A$ in $A$ and $<_B$ in $B$ such that the neighbors of every vertex in $A$ are consecutive with respect to $<_B$ and the neighbors of every vertex in $B$ are consecutive with respect to $<_A$. A caterpillar is a tree that will result in a path upon deletion of all the leaves. In this note, we prove…
▽ More
A bipartite graph $G=(A, B, E)$ is said to be a biconvex bipartite graph if there exist orderings $<_A$ in $A$ and $<_B$ in $B$ such that the neighbors of every vertex in $A$ are consecutive with respect to $<_B$ and the neighbors of every vertex in $B$ are consecutive with respect to $<_A$. A caterpillar is a tree that will result in a path upon deletion of all the leaves. In this note, we prove that there exists a spanning caterpillar in any connected biconvex bipartite graph. Besides being interesting on its own, this structural result has other consequences. For instance, this directly resolves the burning number conjecture for biconvex bipartite graphs.
△ Less
Submitted 18 December, 2023;
originally announced December 2023.
-
$χ$-binding functions for squares of bipartite graphs and its subclasses
Authors:
Dibyayan Chakraborty,
L. Sunil Chandran,
Dalu Jacob,
Raji R. Pillai
Abstract:
A class of graphs $\mathcal{G}$ is $χ$-bounded if there exists a function $f$ such that $χ(G) \leq f(ω(G))$ for each graph $G \in \mathcal{G}$, where $χ(G)$ and $ω(G)$ are the chromatic and clique number of $G$, respectively. The square of a graph $G$, denoted as $G^2$, is the graph with the same vertex set as $G$ in which two vertices are adjacent when they are at a distance at most two in $G$. I…
▽ More
A class of graphs $\mathcal{G}$ is $χ$-bounded if there exists a function $f$ such that $χ(G) \leq f(ω(G))$ for each graph $G \in \mathcal{G}$, where $χ(G)$ and $ω(G)$ are the chromatic and clique number of $G$, respectively. The square of a graph $G$, denoted as $G^2$, is the graph with the same vertex set as $G$ in which two vertices are adjacent when they are at a distance at most two in $G$. In this paper, we study the $χ$-boundedness of squares of bipartite graphs and its subclasses. Note that the class of squares of graphs, in general, admit a quadratic $χ$-binding function. Moreover there exist bipartite graphs $B$ for which $χ\left(B^2\right)$ is $Ω\left(\frac{\left(ω\left(B^2\right)\right)^2 }{\log ω\left(B^2\right)}\right)$. We first ask the following question: "What sub-classes of bipartite graphs have a linear $χ$-binding function?" We focus on the class of convex bipartite graphs and prove the following result: for any convex bipartite graph $G$, $χ\left(G^2\right) \leq \frac{3 ω\left(G^2\right)}{2}$. Our proof also yields a polynomial-time $3/2$-approximation algorithm for coloring squares of convex bipartite graphs. We then introduce a notion called "partite testable properties" for the squares of bipartite graphs. We say that a graph property $P$ is partite testable for the squares of bipartite graphs if for a bipartite graph $G=(A,B,E)$, whenever the induced subgraphs $G^2[A]$ and $G^2[B]$ satisfies the property $P$ then $G^2$ also satisfies the property $P$. Here, we discuss whether some of the well-known graph properties like perfectness, chordality, (anti-hole)-freeness, etc. are partite testable or not. As a consequence, we prove that the squares of biconvex bipartite graphs are perfect.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
-
CHERI Performance Enhancement for a Bytecode Interpreter
Authors:
Duncan Lowther,
Dejice Jacob,
Jeremy Singer
Abstract:
During our port of the MicroPython bytecode interpreter to the CHERI-based Arm Morello platform, we encountered a number of serious performance degradations. This paper explores several of these performance issues in detail, in each case we characterize the cause of the problem, the fix, and the corresponding interpreter performance improvement over a set of standard Python benchmarks.
While we…
▽ More
During our port of the MicroPython bytecode interpreter to the CHERI-based Arm Morello platform, we encountered a number of serious performance degradations. This paper explores several of these performance issues in detail, in each case we characterize the cause of the problem, the fix, and the corresponding interpreter performance improvement over a set of standard Python benchmarks.
While we recognize that Morello is a prototypical physical instantiation of the CHERI concept, we show that it is possible to eliminate certain kinds of software-induced runtime overhead that occur due to the larger size of CHERI capabilities (128 bits) relative to native pointers (generally 64 bits). In our case, we reduce a geometric mean benchmark slowdown from 5x (before optimization) to 1.7x (after optimization) relative to AArch64, non-capability, execution. The worst-case slowdowns are greatly improved, from 100x (before optimization) to 2x (after optimization).
The key insight is that implicit pointer size presuppositions pervade systems code; whereas previous CHERI porting projects highlighted compile-time and execution-time errors exposed by pointer size assumptions, we instead focus on the performance implications of such assumptions.
△ Less
Submitted 12 September, 2023; v1 submitted 9 August, 2023;
originally announced August 2023.
-
Total Domination, Separated Clusters, CD-Coloring: Algorithms and Hardness
Authors:
Dhanyamol Antony,
L. Sunil Chandran,
Ankit Gayen,
Shirish Gosavi,
Dalu Jacob
Abstract:
Domination and coloring are two classic problems in graph theory. The major focus of this paper is the CD-COLORING problem which combines the flavours of domination and colouring. Let $G$ be an undirected graph. A proper vertex coloring of $G$ is a $cd-coloring$ if each color class has a dominating vertex in $G$. The minimum integer $k$ for which there exists a $cd-coloring$ of $G$ using $k$ color…
▽ More
Domination and coloring are two classic problems in graph theory. The major focus of this paper is the CD-COLORING problem which combines the flavours of domination and colouring. Let $G$ be an undirected graph. A proper vertex coloring of $G$ is a $cd-coloring$ if each color class has a dominating vertex in $G$. The minimum integer $k$ for which there exists a $cd-coloring$ of $G$ using $k$ colors is called the cd-chromatic number, $χ_{cd}(G)$. A set $S\subseteq V(G)$ is a total dominating set if any vertex in $G$ has a neighbor in $S$. The total domination number, $γ_t(G)$ of $G$ is the minimum integer $k$ such that $G$ has a total dominating set of size $k$. A set $S\subseteq V(G)$ is a $separated-cluster$ if no two vertices in $S$ lie at a distance 2 in $G$. The separated-cluster number, $ω_s(G)$, of $G$ is the maximum integer $k$ such that $G$ has a separated-cluster of size $k$.
In this paper, first we explore the connection between CD-COLORING and TOTAL DOMINATION. We prove that CD-COLORING and TOTAL DOMINATION are NP-Complete on triangle-free $d$-regular graphs for each fixed integer $d\geq 3$. We also study the relationship between the parameters $χ_{cd}(G)$ and $ω_s(G)$. Analogous to the well-known notion of `perfectness', here we introduce the notion of `cd-perfectness'. We prove a sufficient condition for a graph $G$ to be cd-perfect (i.e. $χ_{cd}(H)= ω_s(H)$, for any induced subgraph $H$ of $G$) which is also necessary for certain graph classes (like triangle-free graphs). Here, we propose a generalized framework via which we obtain several exciting consequences in the algorithmic complexities of special graph classes. In addition, we settle an open problem by showing that the SEPARATED-CLUSTER is polynomially solvable for interval graphs.
△ Less
Submitted 30 September, 2024; v1 submitted 22 July, 2023;
originally announced July 2023.
-
Picking a CHERI Allocator: Security and Performance Considerations
Authors:
Jacob Bramley,
Dejice Jacob,
Andrei Lascu,
Jeremy Singer,
Laurence Tratt
Abstract:
Several open-source memory allocators have been ported to CHERI, a hardware capability platform. In this paper we examine the security and performance of these allocators when run under CheriBSD on Arm's experimental Morello platform. We introduce a number of security attacks and show that all but one allocator are vulnerable to some of the attacks - including the default CheriBSD allocator. We th…
▽ More
Several open-source memory allocators have been ported to CHERI, a hardware capability platform. In this paper we examine the security and performance of these allocators when run under CheriBSD on Arm's experimental Morello platform. We introduce a number of security attacks and show that all but one allocator are vulnerable to some of the attacks - including the default CheriBSD allocator. We then show that while some forms of allocator performance are meaningful, comparing the performance of hybrid and pure capability (i.e. 'running in non-CHERI vs. running in CHERI modes') allocators does not appear to be meaningful. Although we do not fully understand the reasons for this, it seems to be at least as much due to factors such as immature compiler toolchains as it is due to the effects of capabilities on hardware.
△ Less
Submitted 15 May, 2023; v1 submitted 27 March, 2023;
originally announced March 2023.
-
Real-Time Traffic End-of-Queue Detection and Tracking in UAV Video
Authors:
Russ Messenger,
Md Zobaer Islam,
Matthew Whitlock,
Erik Spong,
Nate Morton,
Layne Claggett,
Chris Matthews,
Jordan Fox,
Leland Palmer,
Dane C. Johnson,
John F. O'Hara,
Christopher J. Crick,
Jamey D. Jacob,
Sabit Ekin
Abstract:
Highway work zones are susceptible to undue accumulation of motorized vehicles which calls for dynamic work zone warning signs to prevent accidents. The work zone signs are placed according to the location of the end-of-queue of vehicles which usually changes rapidly. The detection of moving objects in video captured by Unmanned Aerial Vehicles (UAV) has been extensively researched so far, and is…
▽ More
Highway work zones are susceptible to undue accumulation of motorized vehicles which calls for dynamic work zone warning signs to prevent accidents. The work zone signs are placed according to the location of the end-of-queue of vehicles which usually changes rapidly. The detection of moving objects in video captured by Unmanned Aerial Vehicles (UAV) has been extensively researched so far, and is used in a wide array of applications including traffic monitoring. Unlike the fixed traffic cameras, UAVs can be used to monitor the traffic at work zones in real-time and also in a more cost-effective way. This study presents a method as a proof of concept for detecting End-of-Queue (EOQ) of traffic by processing the real-time video footage of a highway work zone captured by UAV. EOQ is detected in the video by image processing which includes background subtraction and blob detection methods. This dynamic localization of EOQ of vehicles will enable faster and more accurate relocation of work zone warning signs for drivers and thus will reduce work zone fatalities. The method can be applied to detect EOQ of vehicles and notify drivers in any other roads or intersections too where vehicles are rapidly accumulating due to special events, traffic jams, construction, or accidents.
△ Less
Submitted 31 October, 2023; v1 submitted 9 January, 2023;
originally announced February 2023.
-
On the Kernel and Related Problems in Interval Digraphs
Authors:
Mathew C. Francis,
Pavol Hell,
Dalu Jacob
Abstract:
Given a digraph $G$, a set $X\subseteq V(G)$ is said to be absorbing set (resp. dominating set) if every vertex in the graph is either in $X$ or is an in-neighbour (resp. out-neighbour) of a vertex in $X$. A set $S\subseteq V(G)$ is said to be an independent set if no two vertices in $S$ are adjacent in $G$. A kernel (resp. solution) of $G$ is an independent and absorbing (resp. dominating) set in…
▽ More
Given a digraph $G$, a set $X\subseteq V(G)$ is said to be absorbing set (resp. dominating set) if every vertex in the graph is either in $X$ or is an in-neighbour (resp. out-neighbour) of a vertex in $X$. A set $S\subseteq V(G)$ is said to be an independent set if no two vertices in $S$ are adjacent in $G$. A kernel (resp. solution) of $G$ is an independent and absorbing (resp. dominating) set in $G$. We explore the algorithmic complexity of these problems in the well known class of interval digraphs. A digraph $G$ is an interval digraph if a pair of intervals $(S_u,T_u)$ can be assigned to each vertex $u$ of $G$ such that $(u,v)\in E(G)$ if and only if $S_u\cap T_v\neq\emptyset$. Many different subclasses of interval digraphs have been defined and studied in the literature by restricting the kinds of pairs of intervals that can be assigned to the vertices. We observe that several of these classes, like interval catch digraphs, interval nest digraphs, adjusted interval digraphs and chronological interval digraphs, are subclasses of the more general class of reflexive interval digraphs -- which arise when we require that the two intervals assigned to a vertex have to intersect. We show that all the problems mentioned above are efficiently solvable, in most of the cases even linear-time solvable, in the class of reflexive interval digraphs, but are APX-hard on even the very restricted class of interval digraphs called point-point digraphs, where the two intervals assigned to each vertex are required to be degenerate, i.e. they consist of a single point each. The results we obtain improve and generalize several existing algorithms and structural results for subclasses of reflexive interval digraphs.
△ Less
Submitted 7 November, 2021; v1 submitted 17 July, 2021;
originally announced July 2021.
-
The Lexicographic Method for the Threshold Cover Problem
Authors:
Mathew C. Francis,
Dalu Jacob
Abstract:
Threshold graphs are a class of graphs that have many equivalent definitions and have applications in integer programming and set packing problems. A graph is said to have a threshold cover of size $k$ if its edges can be covered using $k$ threshold graphs. Chvátal and Hammer, in 1977, defined the threshold dimension $\mathrm{th}(G)$ of a graph $G$ to be the least integer $k$ such that $G$ has a t…
▽ More
Threshold graphs are a class of graphs that have many equivalent definitions and have applications in integer programming and set packing problems. A graph is said to have a threshold cover of size $k$ if its edges can be covered using $k$ threshold graphs. Chvátal and Hammer, in 1977, defined the threshold dimension $\mathrm{th}(G)$ of a graph $G$ to be the least integer $k$ such that $G$ has a threshold cover of size $k$ and observed that $\mathrm{th}(G)\geqχ(G^*)$, where $G^*$ is a suitably constructed auxiliary graph. Raschle and Simon~[Proceedings of the Twenty-seventh Annual ACM Symposium on Theory of Computing, STOC '95, pages 650--661, 1995] proved that $\mathrm{th}(G)=χ(G^*)$ whenever $G^*$ is bipartite. We show how the lexicographic method of Hell and Huang can be used to obtain a completely new and, we believe, simpler proof for this result. For the case when $G$ is a split graph, our method yields a proof that is much shorter than the ones known in the literature.
△ Less
Submitted 17 December, 2020; v1 submitted 12 December, 2019;
originally announced December 2019.
-
Affordable Uplift: Supervised Randomization in Controlled Experiments
Authors:
Johannes Haupt,
Daniel Jacob,
Robin M. Gubela,
Stefan Lessmann
Abstract:
Customer scoring models are the core of scalable direct marketing. Uplift models provide an estimate of the incremental benefit from a treatment that is used for operational decision-making. Training and monitoring of uplift models require experimental data. However, the collection of data under randomized treatment assignment is costly, since random targeting deviates from an established targetin…
▽ More
Customer scoring models are the core of scalable direct marketing. Uplift models provide an estimate of the incremental benefit from a treatment that is used for operational decision-making. Training and monitoring of uplift models require experimental data. However, the collection of data under randomized treatment assignment is costly, since random targeting deviates from an established targeting policy. To increase the cost-efficiency of experimentation and facilitate frequent data collection and model training, we introduce supervised randomization. It is a novel approach that integrates existing scoring models into randomized trials to target relevant customers, while ensuring consistent estimates of treatment effects through correction for active sample selection. An empirical Monte Carlo study shows that data collection under supervised randomization is cost-efficient, while downstream uplift models perform competitively.
△ Less
Submitted 1 October, 2019;
originally announced October 2019.
-
New bounds on the anti-Ramsey numbers of star graphs
Authors:
L. Sunil Chandran,
Talha Hashim,
Dalu Jacob,
Rogers Mathew,
Deepak Rajendraprasad,
Nitin Singh
Abstract:
The anti-Ramsey number $ar(G,H)$ with input graph $G$ and pattern graph $H$, is the maximum positive integer $k$ such that there exists an edge coloring of $G$ using $k$ colors, in which there are no rainbow subgraphs isomorphic to $H$ in $G$. ($H$ is rainbow if all its edges get distinct colors). The concept of anti-Ramsey number was introduced by Erdös, Simanovitz, and Sós in 1973. Thereafter se…
▽ More
The anti-Ramsey number $ar(G,H)$ with input graph $G$ and pattern graph $H$, is the maximum positive integer $k$ such that there exists an edge coloring of $G$ using $k$ colors, in which there are no rainbow subgraphs isomorphic to $H$ in $G$. ($H$ is rainbow if all its edges get distinct colors). The concept of anti-Ramsey number was introduced by Erdös, Simanovitz, and Sós in 1973. Thereafter several researchers investigated this concept in the combinatorial setting. Recently, Feng et al. revisited the anti-Ramsey problem for the pattern graph $K_{1,t}$ (for $t \geq 3$) purely from an algorithmic point of view due to its applications in interference modeling of wireless networks. They posed it as an optimization problem, the maximum edge $q$-coloring problem. For a graph $G$ and an integer $q\geq 2$, an edge $q$-coloring of $G$ is an assignment of colors to edges of $G$, such that edges incident on a vertex span at most $q$ distinct colors. The maximum edge $q$-coloring problem seeks to maximize the number of colors in an edge $q$-coloring of the graph $G$. Note that the optimum value of the edge $q$-coloring problem of $G$ equals $ar(G,K_{1,q+1})$. In this paper, we study $ar(G,K_{1,t})$, the anti-Ramsey number of stars, for each fixed integer $t\geq 3$, both from combinatorial and algorithmic point of view. The first of our main results presents an upper bound for $ar(G,K_{1,q+1})$, in terms of number of vertices and the minimum degree of $G$. The second one improves this result for the case of triangle-free input graphs. For a positive integer $t$, let $H_t$ denote a subgraph of $G$ with maximum number of possible edges and maximum degree $t$. Our third main result presents an upper bound for $ar(G,K_{1,q+1})$ in terms of $|E(H_{q-1})|$. All our results have algorithmic consequences.
△ Less
Submitted 12 January, 2023; v1 submitted 1 October, 2018;
originally announced October 2018.
-
Extending some results on the second neighborhood conjecture
Authors:
Suresh Dara,
Mathew C. Francis,
Dalu Jacob,
N. Narayanan
Abstract:
A vertex in a directed graph is said to have a large second neighborhood if it has at least as many second out-neighbors as out-neighbors. The Second Neighborhood Conjecture, first stated by Seymour, asserts that there is a vertex having a large second neighborhood in every oriented graph (a directed graph without loops or digons). We prove that oriented graphs whose missing edges can be partition…
▽ More
A vertex in a directed graph is said to have a large second neighborhood if it has at least as many second out-neighbors as out-neighbors. The Second Neighborhood Conjecture, first stated by Seymour, asserts that there is a vertex having a large second neighborhood in every oriented graph (a directed graph without loops or digons). We prove that oriented graphs whose missing edges can be partitioned into a (possibly empty) matching and a (possibly empty) star satisfy this conjecture. This generalizes a result of Fidler and Yuster. An implication of our result is that every oriented graph without a sink and whose missing edges form a (possibly empty) matching has at least two vertices with large second neighborhoods. This is a strengthening of a theorem of Havet and Thomasse, who showed that the same holds for tournaments without a sink. Moreover, we also show that the conjecture is true for oriented graphs whose vertex set can be partitioned into an independent set and a 2-degenerate graph.
△ Less
Submitted 22 October, 2021; v1 submitted 7 August, 2018;
originally announced August 2018.
-
Towards the Secure Storage of Images on Multi-Cloud System
Authors:
Dr. Grasha Jacob,
Dr. A. Murugan
Abstract:
With the rapidly changing technological realm, there is an urgent need to provide and protect the confidentiality of confidential images when stored in a cloud environment. To overcome the security risks associated with single cloud, multiple clouds offered by unrelated cloud providers have to be used. This paper outlines an integrated encryption scheme for the secure storage of confidential image…
▽ More
With the rapidly changing technological realm, there is an urgent need to provide and protect the confidentiality of confidential images when stored in a cloud environment. To overcome the security risks associated with single cloud, multiple clouds offered by unrelated cloud providers have to be used. This paper outlines an integrated encryption scheme for the secure storage of confidential images on multiple clouds based on DNA sequences.
△ Less
Submitted 22 November, 2016;
originally announced November 2016.
-
Uniquely Restricted Matchings in Interval Graphs
Authors:
Mathew C. Francis,
Dalu Jacob,
Satyabrata Jana
Abstract:
A matching $M$ in a graph $G$ is said to be uniquely restricted if there is no other matching in $G$ that matches the same set of vertices as $M$. We describe a polynomial-time algorithm to compute a maximum cardinality uniquely restricted matching in an interval graph, thereby answering a question of Golumbic et al. ("Uniquely restricted matchings", M. C. Golumbic, T. Hirst and M. Lewenstein, Alg…
▽ More
A matching $M$ in a graph $G$ is said to be uniquely restricted if there is no other matching in $G$ that matches the same set of vertices as $M$. We describe a polynomial-time algorithm to compute a maximum cardinality uniquely restricted matching in an interval graph, thereby answering a question of Golumbic et al. ("Uniquely restricted matchings", M. C. Golumbic, T. Hirst and M. Lewenstein, Algorithmica, 31:139--154, 2001). Our algorithm actually solves the more general problem of computing a maximum cardinality "strong independent set" in an interval nest digraph, which may be of independent interest. Further, we give linear-time algorithms for computing maximum cardinality uniquely restricted matchings in proper interval graphs and bipartite permutation graphs.
△ Less
Submitted 10 May, 2016; v1 submitted 24 April, 2016;
originally announced April 2016.