Skip to main content

Showing 1–18 of 18 results for author: Jacob, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.24703  [pdf, ps, other

    cs.CR cs.CV cs.LG

    PatchDEMUX: A Certifiably Robust Framework for Multi-label Classifiers Against Adversarial Patches

    Authors: Dennis Jacob, Chong Xiang, Prateek Mittal

    Abstract: Deep learning techniques have enabled vast improvements in computer vision technologies. Nevertheless, these models are vulnerable to adversarial patch attacks which catastrophically impair performance. The physically realizable nature of these attacks calls for certifiable defenses, which feature provable guarantees on robustness. While certifiable defenses have been successfully applied to singl… ▽ More

    Submitted 30 May, 2025; originally announced May 2025.

    Comments: CVPR 2025

  2. arXiv:2504.19440  [pdf, other

    cs.CR

    JailbreaksOverTime: Detecting Jailbreak Attacks Under Distribution Shift

    Authors: Julien Piet, Xiao Huang, Dennis Jacob, Annabella Chow, Maha Alrashed, Geng Zhao, Zhanhao Hu, Chawin Sitawarin, Basel Alomair, David Wagner

    Abstract: Safety and security remain critical concerns in AI deployment. Despite safety training through reinforcement learning with human feedback (RLHF) [ 32], language models remain vulnerable to jailbreak attacks that bypass safety guardrails. Universal jailbreaks - prefixes that can circumvent alignment for any payload - are particularly concerning. We show empirically that jailbreak detection systems… ▽ More

    Submitted 27 April, 2025; originally announced April 2025.

    Comments: 18 pages, 19 figures

  3. arXiv:2501.15145  [pdf, other

    cs.CR

    PromptShield: Deployable Detection for Prompt Injection Attacks

    Authors: Dennis Jacob, Hend Alzahrani, Zhanhao Hu, Basel Alomair, David Wagner

    Abstract: Application designers have moved to integrate large language models (LLMs) into their products. However, many LLM-integrated applications are vulnerable to prompt injections. While attempts have been made to address this problem by building prompt injection detectors, many are not yet suitable for practical deployment. To support research in this area, we introduce PromptShield, a benchmark for tr… ▽ More

    Submitted 11 April, 2025; v1 submitted 25 January, 2025; originally announced January 2025.

    Comments: ACM CODASPY 2025; extended technical report

  4. arXiv:2411.04681  [pdf, other

    nlin.AO cs.SI physics.soc-ph

    A dynamical model of platform choice and online segregation

    Authors: Sven Banisch, Dennis Jacob, Tom Willaert, Eckehard Olbrich

    Abstract: In order to truly understand how social media might shape online discourses or contribute to societal polarization, we need refined models of platform choice, that is: models that help us understand why users prefer one social media platform over another. This study develops a dynamic model of platform selection, extending Social Feedback Theory by incorporating multi-agent reinforcement learning… ▽ More

    Submitted 7 November, 2024; originally announced November 2024.

    MSC Class: 91C20; 91D10; 68U20; 37N25; 37M05 ACM Class: J.4; K.4.3; H.1.2; I.2.11; I.6.3; I.6.5

  5. arXiv:2402.18984  [pdf, ps, other

    math.CO cs.DM

    Graph Burning: Bounds and Hardness

    Authors: Dhanyamol Antony, Anita Das, Shirish Gosavi, Dalu Jacob, Shashanka Kulamarva

    Abstract: For an undirected graph $G$, graph burning is defined as follows: at step $t=0$ all vertices in $G$ are unburned. At each step $t\ge 1$, one new unburned vertex is selected to burn until we exhaust all the vertices. If a vertex is burned at step $t$, then all its unburned neighbors are burned in step $t+1$, and the process continues until there are no unburned vertices in $G$. The burning number o… ▽ More

    Submitted 28 January, 2025; v1 submitted 29 February, 2024; originally announced February 2024.

    Comments: 205 pages, 12 figures

    MSC Class: 05C38; 05C05; 05C85

  6. Spanning caterpillar in biconvex bipartite graphs

    Authors: Dhanyamol Antony, Anita Das, Shirish Gosavi, Dalu Jacob, Shashanka Kulamarva

    Abstract: A bipartite graph $G=(A, B, E)$ is said to be a biconvex bipartite graph if there exist orderings $<_A$ in $A$ and $<_B$ in $B$ such that the neighbors of every vertex in $A$ are consecutive with respect to $<_B$ and the neighbors of every vertex in $B$ are consecutive with respect to $<_A$. A caterpillar is a tree that will result in a path upon deletion of all the leaves. In this note, we prove… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

    Comments: 6 pages, 1 figure

    MSC Class: 05C75; 05C05

    Journal ref: Discrete Applied Mathematics, 356, (2024), 32-36

  7. arXiv:2312.08759  [pdf, ps, other

    cs.DM math.CO

    $χ$-binding functions for squares of bipartite graphs and its subclasses

    Authors: Dibyayan Chakraborty, L. Sunil Chandran, Dalu Jacob, Raji R. Pillai

    Abstract: A class of graphs $\mathcal{G}$ is $χ$-bounded if there exists a function $f$ such that $χ(G) \leq f(ω(G))$ for each graph $G \in \mathcal{G}$, where $χ(G)$ and $ω(G)$ are the chromatic and clique number of $G$, respectively. The square of a graph $G$, denoted as $G^2$, is the graph with the same vertex set as $G$ in which two vertices are adjacent when they are at a distance at most two in $G$. I… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

    Comments: 22 pages, 5 figures

  8. arXiv:2308.05076  [pdf, other

    cs.PL cs.CY

    CHERI Performance Enhancement for a Bytecode Interpreter

    Authors: Duncan Lowther, Dejice Jacob, Jeremy Singer

    Abstract: During our port of the MicroPython bytecode interpreter to the CHERI-based Arm Morello platform, we encountered a number of serious performance degradations. This paper explores several of these performance issues in detail, in each case we characterize the cause of the problem, the fix, and the corresponding interpreter performance improvement over a set of standard Python benchmarks. While we… ▽ More

    Submitted 12 September, 2023; v1 submitted 9 August, 2023; originally announced August 2023.

    Comments: 9 pages, 9 figures

  9. arXiv:2307.12073  [pdf, other

    cs.DS cs.DM

    Total Domination, Separated Clusters, CD-Coloring: Algorithms and Hardness

    Authors: Dhanyamol Antony, L. Sunil Chandran, Ankit Gayen, Shirish Gosavi, Dalu Jacob

    Abstract: Domination and coloring are two classic problems in graph theory. The major focus of this paper is the CD-COLORING problem which combines the flavours of domination and colouring. Let $G$ be an undirected graph. A proper vertex coloring of $G$ is a $cd-coloring$ if each color class has a dominating vertex in $G$. The minimum integer $k$ for which there exists a $cd-coloring$ of $G$ using $k$ color… ▽ More

    Submitted 30 September, 2024; v1 submitted 22 July, 2023; originally announced July 2023.

  10. arXiv:2303.15130  [pdf, other

    cs.SE cs.CR cs.PL

    Picking a CHERI Allocator: Security and Performance Considerations

    Authors: Jacob Bramley, Dejice Jacob, Andrei Lascu, Jeremy Singer, Laurence Tratt

    Abstract: Several open-source memory allocators have been ported to CHERI, a hardware capability platform. In this paper we examine the security and performance of these allocators when run under CheriBSD on Arm's experimental Morello platform. We introduce a number of security attacks and show that all but one allocator are vulnerable to some of the attacks - including the default CheriBSD allocator. We th… ▽ More

    Submitted 15 May, 2023; v1 submitted 27 March, 2023; originally announced March 2023.

  11. arXiv:2302.01923  [pdf, other

    cs.CV eess.IV

    Real-Time Traffic End-of-Queue Detection and Tracking in UAV Video

    Authors: Russ Messenger, Md Zobaer Islam, Matthew Whitlock, Erik Spong, Nate Morton, Layne Claggett, Chris Matthews, Jordan Fox, Leland Palmer, Dane C. Johnson, John F. O'Hara, Christopher J. Crick, Jamey D. Jacob, Sabit Ekin

    Abstract: Highway work zones are susceptible to undue accumulation of motorized vehicles which calls for dynamic work zone warning signs to prevent accidents. The work zone signs are placed according to the location of the end-of-queue of vehicles which usually changes rapidly. The detection of moving objects in video captured by Unmanned Aerial Vehicles (UAV) has been extensively researched so far, and is… ▽ More

    Submitted 31 October, 2023; v1 submitted 9 January, 2023; originally announced February 2023.

    Comments: 13 pages, 7 figures excluding photos of authors, Published in International Journal of Intelligent Transportation Systems Research. Link to the published version: https://link.springer.com/article/10.1007/s13177-023-00374-0

  12. arXiv:2107.08278  [pdf, ps, other

    cs.DM math.CO

    On the Kernel and Related Problems in Interval Digraphs

    Authors: Mathew C. Francis, Pavol Hell, Dalu Jacob

    Abstract: Given a digraph $G$, a set $X\subseteq V(G)$ is said to be absorbing set (resp. dominating set) if every vertex in the graph is either in $X$ or is an in-neighbour (resp. out-neighbour) of a vertex in $X$. A set $S\subseteq V(G)$ is said to be an independent set if no two vertices in $S$ are adjacent in $G$. A kernel (resp. solution) of $G$ is an independent and absorbing (resp. dominating) set in… ▽ More

    Submitted 7 November, 2021; v1 submitted 17 July, 2021; originally announced July 2021.

    Comments: 26 pages, 3 figures

    MSC Class: 05C85; 05C62; 05C20; 05C69; 68R10

  13. arXiv:1912.05819  [pdf, ps, other

    cs.DM cs.DS math.CO

    The Lexicographic Method for the Threshold Cover Problem

    Authors: Mathew C. Francis, Dalu Jacob

    Abstract: Threshold graphs are a class of graphs that have many equivalent definitions and have applications in integer programming and set packing problems. A graph is said to have a threshold cover of size $k$ if its edges can be covered using $k$ threshold graphs. Chvátal and Hammer, in 1977, defined the threshold dimension $\mathrm{th}(G)$ of a graph $G$ to be the least integer $k$ such that $G$ has a t… ▽ More

    Submitted 17 December, 2020; v1 submitted 12 December, 2019; originally announced December 2019.

    Comments: 14 pages

    MSC Class: 05C75; 05C85; 68R10 ACM Class: G.2.2; F.2.2

  14. arXiv:1910.00393  [pdf, other

    cs.LG stat.AP stat.ML

    Affordable Uplift: Supervised Randomization in Controlled Experiments

    Authors: Johannes Haupt, Daniel Jacob, Robin M. Gubela, Stefan Lessmann

    Abstract: Customer scoring models are the core of scalable direct marketing. Uplift models provide an estimate of the incremental benefit from a treatment that is used for operational decision-making. Training and monitoring of uplift models require experimental data. However, the collection of data under randomized treatment assignment is costly, since random targeting deviates from an established targetin… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    MSC Class: 68U35

  15. arXiv:1810.00624  [pdf, ps, other

    cs.DM math.CO

    New bounds on the anti-Ramsey numbers of star graphs

    Authors: L. Sunil Chandran, Talha Hashim, Dalu Jacob, Rogers Mathew, Deepak Rajendraprasad, Nitin Singh

    Abstract: The anti-Ramsey number $ar(G,H)$ with input graph $G$ and pattern graph $H$, is the maximum positive integer $k$ such that there exists an edge coloring of $G$ using $k$ colors, in which there are no rainbow subgraphs isomorphic to $H$ in $G$. ($H$ is rainbow if all its edges get distinct colors). The concept of anti-Ramsey number was introduced by Erdös, Simanovitz, and Sós in 1973. Thereafter se… ▽ More

    Submitted 12 January, 2023; v1 submitted 1 October, 2018; originally announced October 2018.

    Comments: 19 pages, 3 figures

    MSC Class: 05C15; 68W25 ACM Class: G.2.2

  16. arXiv:1808.02247  [pdf, ps, other

    cs.DM math.CO

    Extending some results on the second neighborhood conjecture

    Authors: Suresh Dara, Mathew C. Francis, Dalu Jacob, N. Narayanan

    Abstract: A vertex in a directed graph is said to have a large second neighborhood if it has at least as many second out-neighbors as out-neighbors. The Second Neighborhood Conjecture, first stated by Seymour, asserts that there is a vertex having a large second neighborhood in every oriented graph (a directed graph without loops or digons). We prove that oriented graphs whose missing edges can be partition… ▽ More

    Submitted 22 October, 2021; v1 submitted 7 August, 2018; originally announced August 2018.

    Comments: 23 pages, 2 figures

    MSC Class: 05C20

  17. arXiv:1611.07633  [pdf

    cs.CR

    Towards the Secure Storage of Images on Multi-Cloud System

    Authors: Dr. Grasha Jacob, Dr. A. Murugan

    Abstract: With the rapidly changing technological realm, there is an urgent need to provide and protect the confidentiality of confidential images when stored in a cloud environment. To overcome the security risks associated with single cloud, multiple clouds offered by unrelated cloud providers have to be used. This paper outlines an integrated encryption scheme for the secure storage of confidential image… ▽ More

    Submitted 22 November, 2016; originally announced November 2016.

    Comments: 6 pages, 6 figures

  18. arXiv:1604.07016  [pdf, ps, other

    cs.DM math.CO

    Uniquely Restricted Matchings in Interval Graphs

    Authors: Mathew C. Francis, Dalu Jacob, Satyabrata Jana

    Abstract: A matching $M$ in a graph $G$ is said to be uniquely restricted if there is no other matching in $G$ that matches the same set of vertices as $M$. We describe a polynomial-time algorithm to compute a maximum cardinality uniquely restricted matching in an interval graph, thereby answering a question of Golumbic et al. ("Uniquely restricted matchings", M. C. Golumbic, T. Hirst and M. Lewenstein, Alg… ▽ More

    Submitted 10 May, 2016; v1 submitted 24 April, 2016; originally announced April 2016.

    Comments: 18 pages, 3 figures

    MSC Class: 05C62; 05C85 ACM Class: G.2.2