Skip to main content

Showing 1–27 of 27 results for author: Kennedy, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.20707  [pdf, ps, other

    cs.CL cs.AI physics.ed-ph

    Dissecting Physics Reasoning in Small Language Models: A Multi-Dimensional Analysis from an Educational Perspective

    Authors: Nicy Scaria, Silvester John Joseph Kennedy, Diksha Seth, Deepak Subramani

    Abstract: Small Language Models (SLMs) offer computational efficiency and accessibility, making them promising for educational applications. However, their capacity for complex reasoning, particularly in domains such as physics, remains underexplored. This study investigates the high school physics reasoning capabilities of state-of-the-art SLMs (under 4 billion parameters), including instruct versions of L… ▽ More

    Submitted 27 May, 2025; originally announced May 2025.

  2. arXiv:2505.19414  [pdf, ps, other

    cs.AI cs.LG

    Toward Physics-Informed Machine Learning for Data Center Operations: A Tropical Case Study

    Authors: Ruihang Wang, Zhiwei Cao, Qingang Zhang, Rui Tan, Yonggang Wen, Tommy Leung, Stuart Kennedy, Justin Teoh

    Abstract: Data centers are the backbone of computing capacity. Operating data centers in the tropical regions faces unique challenges due to consistently high ambient temperature and elevated relative humidity throughout the year. These conditions result in increased cooling costs to maintain the reliability of the computing systems. While existing machine learning-based approaches have demonstrated potenti… ▽ More

    Submitted 25 May, 2025; originally announced May 2025.

  3. arXiv:2505.02850  [pdf, other

    cs.CL cs.AI cs.CY cs.DB

    Harnessing Structured Knowledge: A Concept Map-Based Approach for High-Quality Multiple Choice Question Generation with Effective Distractors

    Authors: Nicy Scaria, Silvester John Joseph Kennedy, Diksha Seth, Ananya Thakur, Deepak Subramani

    Abstract: Generating high-quality MCQs, especially those targeting diverse cognitive levels and incorporating common misconceptions into distractor design, is time-consuming and expertise-intensive, making manual creation impractical at scale. Current automated approaches typically generate questions at lower cognitive levels and fail to incorporate domain-specific misconceptions. This paper presents a hier… ▽ More

    Submitted 2 May, 2025; originally announced May 2025.

  4. arXiv:2502.11304  [pdf, other

    cs.AI cs.CL cs.CV

    Leveraging Multimodal-LLMs Assisted by Instance Segmentation for Intelligent Traffic Monitoring

    Authors: Murat Arda Onsu, Poonam Lohan, Burak Kantarci, Aisha Syed, Matthew Andrews, Sean Kennedy

    Abstract: A robust and efficient traffic monitoring system is essential for smart cities and Intelligent Transportation Systems (ITS), using sensors and cameras to track vehicle movements, optimize traffic flow, reduce congestion, enhance road safety, and enable real-time adaptive traffic control. Traffic monitoring models must comprehensively understand dynamic urban conditions and provide an intuitive use… ▽ More

    Submitted 16 February, 2025; originally announced February 2025.

    Comments: 6 pages, 7 figures, submitted to 30th IEEE International Symposium on Computers and Communications (ISCC) 2025

  5. arXiv:2408.12226  [pdf, ps, other

    cs.CL cs.AI

    EvalYaks: Instruction Tuning Datasets and LoRA Fine-tuned Models for Automated Scoring of CEFR B2 Speaking Assessment Transcripts

    Authors: Nicy Scaria, Silvester John Joseph Kennedy, Thomas Latinovich, Deepak Subramani

    Abstract: Relying on human experts to evaluate CEFR speaking assessments in an e-learning environment creates scalability challenges, as it limits how quickly and widely assessments can be conducted. We aim to automate the evaluation of CEFR B2 English speaking assessments in e-learning environments from conversation transcripts. First, we evaluate the capability of leading open source and commercial Large… ▽ More

    Submitted 30 May, 2025; v1 submitted 22 August, 2024; originally announced August 2024.

  6. arXiv:2407.00996  [pdf, other

    cs.CL cs.LG

    Can Small Language Models Learn, Unlearn, and Retain Noise Patterns?

    Authors: Nicy Scaria, Silvester John Joseph Kennedy, Deepak Subramani

    Abstract: With the growing need for efficient language models in resource-constrained environments, Small Language Models (SLMs) have emerged as compact and practical alternatives to Large Language Models (LLMs). While studies have explored noise handling in LLMs, little is known about how SLMs handle noise, a critical factor for their reliable real-world deployment. This study investigates the ability of S… ▽ More

    Submitted 27 May, 2025; v1 submitted 1 July, 2024; originally announced July 2024.

  7. arXiv:2404.09981  [pdf, other

    cs.DM

    Robot Positioning Using Torus Packing for Multisets

    Authors: Chung Shue Chen, Peter Keevash, Sean Kennedy, Élie de Panafieu, Adrian Vetta

    Abstract: We consider the design of a positioning system where a robot determines its position from local observations. This is a well-studied problem of considerable practical importance and mathematical interest. The dominant paradigm derives from the classical theory of de Bruijn sequences, where the robot has access to a window within a larger code and can determine its position if these windows are dis… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: 22 pages, accepted at ICALP 2024

    ACM Class: G.2.1

  8. arXiv:2403.00148  [pdf, ps, other

    cs.HC

    Implications of Regulations on the Use of AI and Generative AI for Human-Centered Responsible Artificial Intelligence

    Authors: Marios Constantinides, Mohammad Tahaei, Daniele Quercia, Simone Stumpf, Michael Madaio, Sean Kennedy, Lauren Wilcox, Jessica Vitak, Henriette Cramer, Edyta Bogucka, Ricardo Baeza-Yates, Ewa Luger, Jess Holbrook, Michael Muller, Ilana Golbin Blumenfeld, Giada Pistilli

    Abstract: With the upcoming AI regulations (e.g., EU AI Act) and rapid advancements in generative AI, new challenges emerge in the area of Human-Centered Responsible Artificial Intelligence (HCR-AI). As AI becomes more ubiquitous, questions around decision-making authority, human oversight, accountability, sustainability, and the ethical and legal responsibilities of AI and their creators become paramount.… ▽ More

    Submitted 29 February, 2024; originally announced March 2024.

    Comments: 6 pages

  9. Materiality and Risk in the Age of Pervasive AI Sensors

    Authors: Mona Sloane, Emanuel Moss, Susan Kennedy, Matthew Stewart, Pete Warden, Brian Plancher, Vijay Janapa Reddi

    Abstract: Artificial intelligence (AI) systems connected to sensor-laden devices are becoming pervasive, which has notable implications for a range of AI risks, including to privacy, the environment, autonomy and more. There is therefore a growing need for increased accountability around the responsible development and deployment of these technologies. Here we highlight the dimensions of risk associated wit… ▽ More

    Submitted 24 March, 2025; v1 submitted 16 February, 2024; originally announced February 2024.

    Journal ref: Nature Machine Intelligence (2025): 1-12

  10. arXiv:2309.09928  [pdf, other

    cs.LG

    Evaluating Adversarial Robustness with Expected Viable Performance

    Authors: Ryan McCoppin, Colin Dawson, Sean M. Kennedy, Leslie M. Blaha

    Abstract: We introduce a metric for evaluating the robustness of a classifier, with particular attention to adversarial perturbations, in terms of expected functionality with respect to possible adversarial perturbations. A classifier is assumed to be non-functional (that is, has a functionality of zero) with respect to a perturbation bound if a conventional measure of performance, such as classification ac… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

    Comments: Accepted at the 22nd International Conference on Machine Learning and Applications (IEEE 2023)

  11. arXiv:2306.05952  [pdf, other

    cs.LG cs.CV

    Overcoming Adversarial Attacks for Human-in-the-Loop Applications

    Authors: Ryan McCoppin, Marla Kennedy, Platon Lukyanenko, Sean Kennedy

    Abstract: Including human analysis has the potential to positively affect the robustness of Deep Neural Networks and is relatively unexplored in the Adversarial Machine Learning literature. Neural network visual explanation maps have been shown to be prone to adversarial attacks. Further research is needed in order to select robust visualizations of explanations for the image analyst to evaluate a given mod… ▽ More

    Submitted 25 August, 2023; v1 submitted 9 June, 2023; originally announced June 2023.

    Comments: New Frontiers in Adversarial Machine Learning, ICML 2022

  12. Heterogeneous GNN-RL Based Task Offloading for UAV-aided Smart Agriculture

    Authors: Turgay Pamuklu, Aisha Syed, W. Sean Kennedy, Melike Erol-Kantarci

    Abstract: Having unmanned aerial vehicles (UAVs) with edge computing capability hover over smart farmlands supports Internet of Things (IoT) devices with low processing capacity and power to accomplish their deadline-sensitive tasks efficiently and economically. In this work, we propose a graph neural network-based reinforcement learning solution to optimize the task offloading from these IoT devices to the… ▽ More

    Submitted 8 June, 2023; v1 submitted 3 May, 2023; originally announced May 2023.

  13. Human-Centered Responsible Artificial Intelligence: Current & Future Trends

    Authors: Mohammad Tahaei, Marios Constantinides, Daniele Quercia, Sean Kennedy, Michael Muller, Simone Stumpf, Q. Vera Liao, Ricardo Baeza-Yates, Lora Aroyo, Jess Holbrook, Ewa Luger, Michael Madaio, Ilana Golbin Blumenfeld, Maria De-Arteaga, Jessica Vitak, Alexandra Olteanu

    Abstract: In recent years, the CHI community has seen significant growth in research on Human-Centered Responsible Artificial Intelligence. While different research communities may use different terminology to discuss similar topics, all of this work is ultimately aimed at developing AI that benefits humanity while being grounded in human rights and ethics, and reducing the potential harms of AI. In this sp… ▽ More

    Submitted 16 February, 2023; originally announced February 2023.

    Comments: To appear in Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems

  14. arXiv:2302.07399  [pdf, other

    cs.NI cs.AI cs.LG

    To Risk or Not to Risk: Learning with Risk Quantification for IoT Task Offloading in UAVs

    Authors: Anne Catherine Nguyen, Turgay Pamuklu, Aisha Syed, W. Sean Kennedy, Melike Erol-Kantarci

    Abstract: A deep reinforcement learning technique is presented for task offloading decision-making algorithms for a multi-access edge computing (MEC) assisted unmanned aerial vehicle (UAV) network in a smart farm Internet of Things (IoT) environment. The task offloading technique uses financial concepts such as cost functions and conditional variable at risk (CVaR) in order to quantify the damage that may b… ▽ More

    Submitted 14 February, 2023; originally announced February 2023.

    Comments: Accepted for ICC2023

  15. IoT-Aerial Base Station Task Offloading with Risk-Sensitive Reinforcement Learning for Smart Agriculture

    Authors: Turgay Pamuklu, Anne Catherine Nguyen, Aisha Syed, W. Sean Kennedy, Melike Erol-Kantarci

    Abstract: Aerial base stations (ABSs) allow smart farms to offload processing responsibility of complex tasks from internet of things (IoT) devices to ABSs. IoT devices have limited energy and computing resources, thus it is required to provide an advanced solution for a system that requires the support of ABSs. This paper introduces a novel multi-actor-based risk-sensitive reinforcement learning approach f… ▽ More

    Submitted 15 September, 2022; originally announced September 2022.

    Comments: Accepted Paper

  16. arXiv:2209.07367  [pdf, other

    cs.NI cs.AI

    Deep Reinforcement Learning for Task Offloading in UAV-Aided Smart Farm Networks

    Authors: Anne Catherine Nguyen, Turgay Pamuklu, Aisha Syed, W. Sean Kennedy, Melike Erol-Kantarci

    Abstract: The fifth and sixth generations of wireless communication networks are enabling tools such as internet of things devices, unmanned aerial vehicles (UAVs), and artificial intelligence, to improve the agricultural landscape using a network of devices to automatically monitor farmlands. Surveying a large area requires performing a lot of image classification tasks within a specific period of time in… ▽ More

    Submitted 15 September, 2022; originally announced September 2022.

    Comments: Accepted Paper

  17. Reinforcement Learning-Based Deadline and Battery-Aware Offloading in Smart Farm IoT-UAV Networks

    Authors: Anne Catherine Nguyen, Turgay Pamuklu, Aisha Syed, W. Sean Kennedy, Melike Erol-Kantarci

    Abstract: Unmanned aerial vehicles (UAVs) with mounted base stations are a promising technology for monitoring smart farms. They can provide communication and computation services to extensive agricultural regions. With the assistance of a Multi-Access Edge Computing infrastructure, an aerial base station (ABS) network can provide an energy-efficient solution for smart farms that need to process deadline cr… ▽ More

    Submitted 12 February, 2022; v1 submitted 25 January, 2022; originally announced January 2022.

    Comments: Accepted Paper. Please check footnote in Page 1 for copyright

    Journal ref: ICC 2022 - IEEE International Conference on Communications

  18. arXiv:2106.04008  [pdf, other

    cs.LG

    Widening Access to Applied Machine Learning with TinyML

    Authors: Vijay Janapa Reddi, Brian Plancher, Susan Kennedy, Laurence Moroney, Pete Warden, Anant Agarwal, Colby Banbury, Massimo Banzi, Matthew Bennett, Benjamin Brown, Sharad Chitlangia, Radhika Ghosal, Sarah Grafman, Rupert Jaeger, Srivatsan Krishnan, Maximilian Lam, Daniel Leiker, Cara Mann, Mark Mazumder, Dominic Pajak, Dhilan Ramaprasad, J. Evan Smith, Matthew Stewart, Dustin Tingley

    Abstract: Broadening access to both computational and educational resources is critical to diffusing machine-learning (ML) innovation. However, today, most ML resources and experts are siloed in a few countries and organizations. In this paper, we describe our pedagogical approach to increasing access to applied ML through a massive open online course (MOOC) on Tiny Machine Learning (TinyML). We suggest tha… ▽ More

    Submitted 9 June, 2021; v1 submitted 7 June, 2021; originally announced June 2021.

    Comments: Understanding the underpinnings of the TinyML edX course series: https://www.edx.org/professional-certificate/harvardx-tiny-machine-learning

  19. Fact or Factitious? Contextualized Opinion Spam Detection

    Authors: Stefan Kennedy, Niall Walsh, Kirils Sloka, Jennifer Foster, Andrew McCarren

    Abstract: In this paper we perform an analytic comparison of a number of techniques used to detect fake and deceptive online reviews. We apply a number machine learning approaches found to be effective, and introduce our own approach by fine-tuning state of the art contextualised embeddings. The results we obtain show the potential of contextualised embeddings for fake review detection, and lay the groundwo… ▽ More

    Submitted 28 October, 2020; originally announced October 2020.

    Comments: 6 pages, 3 figures, presented at the 2019 ACL Conference in Florence, Italy

    Report number: P19-2048 P19-2048 ACM Class: I.2.7; I.2.6

  20. arXiv:2005.09800  [pdf, other

    cs.CR

    Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning

    Authors: Chenggang Wang, Sean Kennedy, Haipeng Li, King Hudson, Gowtham Atluri, Xuetao Wei, Wenhai Sun, Boyang Wang

    Abstract: This paper investigates the privacy leakage of smart speakers under an encrypted traffic analysis attack, referred to as voice command fingerprinting. In this attack, an adversary can eavesdrop both outgoing and incoming encrypted voice traffic of a smart speaker, and infers which voice command a user says over encrypted traffic. We first built an automatic voice traffic collection tool and collec… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

    Journal ref: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20), July 8--10, 2020, Linz (Virtual Event), Austria

  21. arXiv:1804.03270  [pdf, other

    cs.CV

    Towards Deep Cellular Phenotyping in Placental Histology

    Authors: Michael Ferlaino, Craig A. Glastonbury, Carolina Motta-Mejia, Manu Vatish, Ingrid Granne, Stephen Kennedy, Cecilia M. Lindgren, Christoffer Nellåker

    Abstract: The placenta is a complex organ, playing multiple roles during fetal development. Very little is known about the association between placental morphological abnormalities and fetal physiology. In this work, we present an open sourced, computationally tractable deep learning pipeline to analyse placenta histology at the level of the cell. By utilising two deep Convolutional Neural Network architect… ▽ More

    Submitted 25 May, 2018; v1 submitted 9 April, 2018; originally announced April 2018.

    Comments: Updated MRC funding material. Corrected typo that suggested ensembling and Inception accuracy were the same (updated to reflect the fact the ensemble model is 1% better than previously reported)

  22. arXiv:1707.06903  [pdf, other

    stat.ML cs.LG

    A New Family of Near-metrics for Universal Similarity

    Authors: Chu Wang, Iraj Saniee, William S. Kennedy, Chris A. White

    Abstract: We propose a family of near-metrics based on local graph diffusion to capture similarity for a wide class of data sets. These quasi-metametrics, as their names suggest, dispense with one or two standard axioms of metric spaces, specifically distinguishability and symmetry, so that similarity between data points of arbitrary type and form could be measured broadly and effectively. The proposed near… ▽ More

    Submitted 17 October, 2017; v1 submitted 21 July, 2017; originally announced July 2017.

  23. arXiv:1604.07359  [pdf, other

    cs.DS math.MG

    Fast approximation algorithms for $p$-centres in large $δ$-hyperbolic graphs

    Authors: Katherine Edwards, W. Sean Kennedy, Iraj Saniee

    Abstract: We provide a quasilinear time algorithm for the $p$-center problem with an additive error less than or equal to 3 times the input graph's hyperbolic constant. Specifically, for the graph $G=(V,E)$ with $n$ vertices, $m$ edges and hyperbolic constant $δ$, we construct an algorithm for $p$-centers in time $O(p(δ+1)(n+m)\log(n))$ with radius not exceeding $r_p + δ$ when $p \leq 2$ and $r_p + 3δ$ when… ▽ More

    Submitted 25 April, 2016; originally announced April 2016.

    Comments: 19 pages

  24. arXiv:1411.2873  [pdf, other

    cs.DS

    Improving Robustness of Next-Hop Routing

    Authors: Glencora Borradaile, W. Sean Kennedy, Gordon Wilfong, Lisa Zhang

    Abstract: A weakness of next-hop routing is that following a link or router failure there may be no routes between some source-destination pairs, or packets may get stuck in a routing loop as the protocol operates to establish new routes. In this article, we address these weaknesses by describing mechanisms to choose alternate next hops. Our first contribution is to model the scenario as the following {\s… ▽ More

    Submitted 11 November, 2014; originally announced November 2014.

  25. arXiv:1404.5002  [pdf, ps, other

    cs.SI cs.DS

    A Geometric Distance Oracle for Large Real-World Graphs

    Authors: Deepak Ajwani, W. Sean Kennedy, Alessandra Sala, Iraj Saniee

    Abstract: Many graph processing algorithms require determination of shortest-path distances between arbitrary numbers of node pairs. Since computation of exact distances between all node-pairs of a large graph, e.g., 10M nodes and up, is prohibitively expensive both in computational time and storage space, distance approximation is often used in place of exact computation. In this paper, we present a novel… ▽ More

    Submitted 19 April, 2014; originally announced April 2014.

    Comments: 15 pages, 9 figures, 3 tables

  26. arXiv:1307.0031  [pdf, other

    physics.soc-ph cs.SI

    On the Hyperbolicity of Large-Scale Networks

    Authors: W. Sean Kennedy, Onuttom Narayan, Iraj Saniee

    Abstract: Through detailed analysis of scores of publicly available data sets corresponding to a wide range of large-scale networks, from communication and road networks to various forms of social networks, we explore a little-studied geometric characteristic of real-life networks, namely their hyperbolicity. In smooth geometry, hyperbolicity captures the notion of negative curvature; within the more abstra… ▽ More

    Submitted 28 June, 2013; originally announced July 2013.

    Comments: 22 pages, 25 figures

  27. arXiv:1103.6222  [pdf, other

    cs.DM math.CO

    Finding a smallest odd hole in a claw-free graph using global structure

    Authors: W. Sean Kennedy, Andrew D. King

    Abstract: A lemma of Fouquet implies that a claw-free graph contains an induced $C_5$, contains no odd hole, or is quasi-line. In this paper we use this result to give an improved shortest-odd-hole algorithm for claw-free graphs by exploiting the structural relationship between line graphs and quasi-line graphs suggested by Chudnovsky and Seymour's structure theorem for quasi-line graphs. Our approach invol… ▽ More

    Submitted 23 May, 2011; v1 submitted 31 March, 2011; originally announced March 2011.

    Comments: 12 pages, 1 figure