Skip to main content

Showing 1–50 of 57 results for author: Larson, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2507.03594  [pdf, ps, other

    cs.SD cs.AI cs.CL eess.AS

    RECA-PD: A Robust Explainable Cross-Attention Method for Speech-based Parkinson's Disease Classification

    Authors: Terry Yi Zhong, Cristian Tejedor-Garcia, Martha Larson, Bastiaan R. Bloem

    Abstract: Parkinson's Disease (PD) affects over 10 million people globally, with speech impairments often preceding motor symptoms by years, making speech a valuable modality for early, non-invasive detection. While recent deep-learning models achieve high accuracy, they typically lack the explainability required for clinical use. To address this, we propose RECA-PD, a novel, robust, and explainable cross-a… ▽ More

    Submitted 4 July, 2025; originally announced July 2025.

    Comments: Accepted for TSD 2025

  2. arXiv:2505.18722  [pdf, ps, other

    eess.AS cs.AI cs.CL cs.SD

    Evaluating the Usefulness of Non-Diagnostic Speech Data for Developing Parkinson's Disease Classifiers

    Authors: Terry Yi Zhong, Esther Janse, Cristian Tejedor-Garcia, Louis ten Bosch, Martha Larson

    Abstract: Speech-based Parkinson's disease (PD) detection has gained attention for its automated, cost-effective, and non-intrusive nature. As research studies usually rely on data from diagnostic-oriented speech tasks, this work explores the feasibility of diagnosing PD on the basis of speech data not originally intended for diagnostic purposes, using the Turn-Taking (TT) dataset. Our findings indicate tha… ▽ More

    Submitted 24 May, 2025; originally announced May 2025.

    Comments: Accepted for Interspeech 2025 (Camera-Ready)

  3. arXiv:2505.18095  [pdf

    cond-mat.soft cs.RO

    Rotational Multi-material 3D Printing of Soft Robotic Matter with Asymmetrical Embedded Pneumatics

    Authors: Jackson K. Wilt, Natalie M. Larson, Jennifer A. Lewis

    Abstract: The rapid design and fabrication of soft robotic matter is of growing interest for shape morphing, actuation, and wearable devices. Here, we report a facile fabrication method for creating soft robotic materials with embedded pneumatics that exhibit programmable shape morphing behavior. Using rotational multi-material 3D printing, asymmetrical core-shell filaments composed of elastomeric shells an… ▽ More

    Submitted 23 May, 2025; originally announced May 2025.

    Comments: 33 pages, 5 main text figures, 4 supporting text figures, 10 movies (movie repository link - https://drive.google.com/drive/folders/11SKVM-4viqbc-MqxsXlotrn01nusKMkY?usp=sharing)

  4. arXiv:2503.16309  [pdf, other

    eess.IV cs.CV physics.med-ph

    Rapid patient-specific neural networks for intraoperative X-ray to volume registration

    Authors: Vivek Gopalakrishnan, Neel Dey, David-Dimitris Chlorogiannis, Andrew Abumoussa, Anna M. Larson, Darren B. Orbach, Sarah Frisken, Polina Golland

    Abstract: The integration of artificial intelligence in image-guided interventions holds transformative potential, promising to extract 3D geometric and quantitative information from conventional 2D imaging modalities during complex procedures. Achieving this requires the rapid and precise alignment of 2D intraoperative images (e.g., X-ray) with 3D preoperative volumes (e.g., CT, MRI). However, current 2D/3… ▽ More

    Submitted 20 March, 2025; originally announced March 2025.

  5. arXiv:2503.04271  [pdf, other

    cs.CL cs.CY

    On Fact and Frequency: LLM Responses to Misinformation Expressed with Uncertainty

    Authors: Yana van de Sande, Gunes Açar, Thabo van Woudenberg, Martha Larson

    Abstract: We study LLM judgments of misinformation expressed with uncertainty. Our experiments study the response of three widely used LLMs (GPT-4o, LlaMA3, DeepSeek-v2) to misinformation propositions that have been verified false and then are transformed into uncertain statements according to an uncertainty typology. Our results show that after transformation, LLMs change their factchecking classification… ▽ More

    Submitted 6 March, 2025; originally announced March 2025.

    Comments: 4 pages, 1 figure, 3 tables, conference

    MSC Class: 91F20 ACM Class: I.2.7; I.2.4; K.4; J.4

  6. arXiv:2503.04024  [pdf, other

    math.NA cs.LG

    An optimal Petrov-Galerkin framework for operator networks

    Authors: Philip Charles, Deep Ray, Yue Yu, Joost Prins, Hugo Melchers, Michael R. A. Abdelmalik, Jeffrey Cochran, Assad A. Oberai, Thomas J. R. Hughes, Mats G. Larson

    Abstract: The optimal Petrov-Galerkin formulation to solve partial differential equations (PDEs) recovers the best approximation in a specified finite-dimensional (trial) space with respect to a suitable norm. However, the recovery of this optimal solution is contingent on being able to construct the optimal weighting functions associated with the trial basis. While explicit constructions are available for… ▽ More

    Submitted 5 March, 2025; originally announced March 2025.

    Comments: 39 pages, 22 figures, 5 tables

    MSC Class: 65N99; 35J20

  7. arXiv:2502.08193  [pdf, other

    cs.CR

    Typographic Attacks in a Multi-Image Setting

    Authors: Xiaomeng Wang, Zhengyu Zhao, Martha Larson

    Abstract: Large Vision-Language Models (LVLMs) are susceptible to typographic attacks, which are misclassifications caused by an attack text that is added to an image. In this paper, we introduce a multi-image setting for studying typographic attacks, broadening the current emphasis of the literature on attacking individual images. Specifically, our focus is on attacking image sets without repeating the att… ▽ More

    Submitted 12 February, 2025; originally announced February 2025.

    Comments: Accepted by NAACL2025. Our code is available at https://github.com/XiaomengWang-AI/Typographic-Attacks-in-a-Multi-Image-Setting

  8. arXiv:2412.16148  [pdf, other

    cs.CV

    Frequency Is What You Need: Word-frequency Masking Benefits Vision-Language Model Pre-training

    Authors: Mingliang Liang, Martha Larson

    Abstract: Vision Language Models (VLMs) can be trained more efficiently if training sets can be reduced in size. Recent work has shown the benefits of masking text during VLM training using a variety of approaches: truncation, random masking, block masking and syntax masking. In this paper, we show that the best masking strategy changes over training epochs and that, given sufficient training epochs. We ana… ▽ More

    Submitted 14 April, 2025; v1 submitted 20 December, 2024; originally announced December 2024.

  9. arXiv:2412.04596  [pdf, other

    cs.LG math.NA

    Nonlinear Operator Learning Using Energy Minimization and MLPs

    Authors: Mats G. Larson, Carl Lundholm, Anna Persson

    Abstract: We develop and evaluate a method for learning solution operators to nonlinear problems governed by partial differential equations. The approach is based on a finite element discretization and aims at representing the solution operator by an MLP that takes latent variables as input. The latent variables will typically correspond to parameters in a parametrization of input data such as boundary cond… ▽ More

    Submitted 5 December, 2024; originally announced December 2024.

    Comments: 13 pages, 3 figures (8 subfigures in total)

    MSC Class: 65K10 65N30 65Y20 68T07 ACM Class: G.1.8; I.2.6; J.2

  10. arXiv:2412.04409  [pdf, other

    math.NA cs.LG

    Stabilizing and Solving Unique Continuation Problems by Parameterizing Data and Learning Finite Element Solution Operators

    Authors: Erik Burman, Mats G. Larson, Karl Larsson, Carl Lundholm

    Abstract: We consider an inverse problem involving the reconstruction of the solution to a nonlinear partial differential equation (PDE) with unknown boundary conditions. Instead of direct boundary data, we are provided with a large dataset of boundary observations for typical solutions (collective data) and a bulk measurement of a specific realization. To leverage this collective data, we first compress th… ▽ More

    Submitted 5 May, 2025; v1 submitted 5 December, 2024; originally announced December 2024.

  11. arXiv:2410.10879  [pdf, other

    cs.LG cs.AI cs.CL cs.CV

    Enhancing Vision-Language Model Pre-training with Image-text Pair Pruning Based on Word Frequency

    Authors: Mingliang Liang, Martha Larson

    Abstract: We propose Word-Frequency-based Image-Text Pair Pruning (WFPP), a novel data pruning method that improves the efficiency of VLMs. Unlike MetaCLIP, our method does not need metadata for pruning, but selects text-image pairs to prune based on the content of the text. Specifically, WFPP prunes text-image pairs containing high-frequency words across the entire training dataset. The effect of WFPP is t… ▽ More

    Submitted 10 December, 2024; v1 submitted 9 October, 2024; originally announced October 2024.

  12. arXiv:2409.16106  [pdf

    eess.AS cs.AI cs.CR cs.SD

    Scenario of Use Scheme: Threat Model Specification for Speaker Privacy Protection in the Medical Domain

    Authors: Mehtab Ur Rahman, Martha Larson, Louis ten Bosch, Cristian Tejedor-García

    Abstract: Speech recordings are being more frequently used to detect and monitor disease, leading to privacy concerns. Beyond cryptography, protection of speech can be addressed by approaches, such as perturbation, disentanglement, and re-synthesis, that eliminate sensitive information of the speaker, leaving the information necessary for medical analysis purposes. In order for such privacy protective appro… ▽ More

    Submitted 26 September, 2024; v1 submitted 24 September, 2024; originally announced September 2024.

    Comments: Accepted and published at SPSC Symposium 2024 4th Symposium on Security and Privacy in Speech Communication. Interspeech 2024

    Journal ref: Pages: 21-25, Proc. 4th Symposium on Security and Privacy in Speech Communication (SPSC) at Interspeech 2024

  13. arXiv:2407.03851  [pdf, other

    cs.LG

    Implicit Hypersurface Approximation Capacity in Deep ReLU Networks

    Authors: Jonatan Vallin, Karl Larsson, Mats G. Larson

    Abstract: We develop a geometric approximation theory for deep feed-forward neural networks with ReLU activations. Given a $d$-dimensional hypersurface in $\mathbb{R}^{d+1}$ represented as the graph of a $C^2$-function $φ$, we show that a deep fully-connected ReLU network of width $d+1$ can implicitly construct an approximation as its zero contour with a precision bound depending on the number of layers. Th… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  14. arXiv:2405.00778  [pdf, ps, other

    math.CO cs.DM cs.IT

    Rigidity matroids and linear algebraic matroids with applications to matrix completion and tensor codes

    Authors: Joshua Brakensiek, Manik Dhar, Jiyang Gao, Sivakanth Gopi, Matt Larson

    Abstract: We establish a connection between problems studied in rigidity theory and matroids arising from linear algebraic constructions like tensor products and symmetric products. A special case of this correspondence identifies the problem of giving a description of the correctable erasure patterns in a maximally recoverable tensor code with the problem of describing bipartite rigid graphs or low-rank co… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    MSC Class: 94B05; 52C25; 05B35

  15. Centered Masking for Language-Image Pre-Training

    Authors: Mingliang Liang, Martha Larson

    Abstract: We introduce Gaussian masking for Language-Image Pre-Training (GLIP) a novel, straightforward, and effective technique for masking image patches during pre-training of a vision-language model. GLIP builds on Fast Language-Image Pre-Training (FLIP), which randomly masks image patches while training a CLIP model. GLIP replaces random masking with centered masking, that uses a Gaussian distribution a… ▽ More

    Submitted 27 March, 2024; v1 submitted 23 March, 2024; originally announced March 2024.

  16. arXiv:2311.07550  [pdf, other

    cs.CR cs.LG

    Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data

    Authors: Bart Pleiter, Behrad Tajalli, Stefanos Koffas, Gorka Abad, Jing Xu, Martha Larson, Stjepan Picek

    Abstract: Deep Neural Networks (DNNs) have shown great promise in various domains. Alongside these developments, vulnerabilities associated with DNN training, such as backdoor attacks, are a significant concern. These attacks involve the subtle insertion of triggers during model training, allowing for manipulated predictions. More recently, DNNs for tabular data have gained increasing attention due to the r… ▽ More

    Submitted 25 April, 2024; v1 submitted 13 November, 2023; originally announced November 2023.

  17. arXiv:2310.08775  [pdf, ps, other

    cs.LG

    When Machine Learning Models Leak: An Exploration of Synthetic Training Data

    Authors: Manel Slokom, Peter-Paul de Wolf, Martha Larson

    Abstract: We investigate an attack on a machine learning model that predicts whether a person or household will relocate in the next two years, i.e., a propensity-to-move classifier. The attack assumes that the attacker can query the model to obtain predictions and that the marginal distribution of the data on which the model was trained is publicly available. The attack also assumes that the attacker has o… ▽ More

    Submitted 19 May, 2024; v1 submitted 12 October, 2023; originally announced October 2023.

    Comments: Original paper published at PSD 2022. The paper was subsequently updated

  18. arXiv:2310.03482  [pdf, other

    cs.LG

    The Geometric Structure of Fully-Connected ReLU Layers

    Authors: Jonatan Vallin, Karl Larsson, Mats G. Larson

    Abstract: We formalize and interpret the geometric structure of $d$-dimensional fully connected ReLU layers in neural networks. The parameters of a ReLU layer induce a natural partition of the input domain, such that the ReLU layer can be significantly simplified in each sector of the partition. This leads to a geometric interpretation of a ReLU layer as a projection onto a polyhedral cone followed by an af… ▽ More

    Submitted 8 November, 2023; v1 submitted 5 October, 2023; originally announced October 2023.

  19. arXiv:2307.04427  [pdf, other

    astro-ph.HE astro-ph.GA cs.LG

    Observation of high-energy neutrinos from the Galactic plane

    Authors: R. Abbasi, M. Ackermann, J. Adams, J. A. Aguilar, M. Ahlers, M. Ahrens, J. M. Alameddine, A. A. Alves Jr., N. M. Amin, K. Andeen, T. Anderson, G. Anton, C. Argüelles, Y. Ashida, S. Athanasiadou, S. Axani, X. Bai, A. Balagopal V., S. W. Barwick, V. Basu, S. Baur, R. Bay, J. J. Beatty, K. -H. Becker, J. Becker Tjus , et al. (364 additional authors not shown)

    Abstract: The origin of high-energy cosmic rays, atomic nuclei that continuously impact Earth's atmosphere, has been a mystery for over a century. Due to deflection in interstellar magnetic fields, cosmic rays from the Milky Way arrive at Earth from random directions. However, near their sources and during propagation, cosmic rays interact with matter and produce high-energy neutrinos. We search for neutrin… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

    Comments: Submitted on May 12th, 2022; Accepted on May 4th, 2023

    Journal ref: Science 380, 6652, 1338-1343 (2023)

  20. arXiv:2306.17700  [pdf, other

    eess.AS cs.CL cs.CR cs.CY cs.LG cs.SD

    Beyond Neural-on-Neural Approaches to Speaker Gender Protection

    Authors: Loes van Bemmel, Zhuoran Liu, Nik Vaessen, Martha Larson

    Abstract: Recent research has proposed approaches that modify speech to defend against gender inference attacks. The goal of these protection algorithms is to control the availability of information about a speaker's gender, a privacy-sensitive attribute. Currently, the common practice for developing and testing gender protection algorithms is "neural-on-neural", i.e., perturbations are generated and tested… ▽ More

    Submitted 30 June, 2023; originally announced June 2023.

    Journal ref: 2023 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2023)

  21. arXiv:2302.03819  [pdf, other

    cs.CV cs.LG q-bio.NC

    The XPRESS Challenge: Xray Projectomic Reconstruction -- Extracting Segmentation with Skeletons

    Authors: Tri Nguyen, Mukul Narwani, Mark Larson, Yicong Li, Shuhan Xie, Hanspeter Pfister, Donglai Wei, Nir Shavit, Lu Mi, Alexandra Pacureanu, Wei-Chung Lee, Aaron T. Kuan

    Abstract: The wiring and connectivity of neurons form a structural basis for the function of the nervous system. Advances in volume electron microscopy (EM) and image segmentation have enabled mapping of circuit diagrams (connectomics) within local regions of the mouse brain. However, applying volume EM over the whole brain is not currently feasible due to technological challenges. As a result, comprehensiv… ▽ More

    Submitted 24 February, 2023; v1 submitted 7 February, 2023; originally announced February 2023.

    Comments: 6 pages, 2 figures

  22. arXiv:2301.13838  [pdf, other

    cs.CR cs.CV cs.LG

    Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression

    Authors: Zhuoran Liu, Zhengyu Zhao, Martha Larson

    Abstract: Perturbative availability poisons (PAPs) add small changes to images to prevent their use for model training. Current research adopts the belief that practical and effective approaches to countering PAPs do not exist. In this paper, we argue that it is time to abandon this belief. We present extensive experiments showing that 12 state-of-the-art PAP methods are vulnerable to Image Shortcut Squeezi… ▽ More

    Submitted 23 June, 2023; v1 submitted 31 January, 2023; originally announced January 2023.

    Comments: To appear at ICML 2023. Our code is available at https://github.com/liuzrcc/ImageShortcutSqueezing

  23. arXiv:2211.01917  [pdf, other

    cs.CV cs.AI cs.LG

    Expanding Accurate Person Recognition to New Altitudes and Ranges: The BRIAR Dataset

    Authors: David Cornett III, Joel Brogan, Nell Barber, Deniz Aykac, Seth Baird, Nick Burchfield, Carl Dukes, Andrew Duncan, Regina Ferrell, Jim Goddard, Gavin Jager, Matt Larson, Bart Murphy, Christi Johnson, Ian Shelley, Nisha Srinivas, Brandon Stockwell, Leanne Thompson, Matt Yohe, Robert Zhang, Scott Dolvin, Hector J. Santos-Villalobos, David S. Bolme

    Abstract: Face recognition technology has advanced significantly in recent years due largely to the availability of large and increasingly complex training datasets for use in deep learning models. These datasets, however, typically comprise images scraped from news sites or social media platforms and, therefore, have limited utility in more advanced security, forensics, and military applications. These app… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

  24. arXiv:2211.01086  [pdf, other

    cs.LG cs.CR cs.CV

    Generative Poisoning Using Random Discriminators

    Authors: Dirren van Vlijmen, Alex Kolmus, Zhuoran Liu, Zhengyu Zhao, Martha Larson

    Abstract: We introduce ShortcutGen, a new data poisoning attack that generates sample-dependent, error-minimizing perturbations by learning a generator. The key novelty of ShortcutGen is the use of a randomly-initialized discriminator, which provides spurious shortcuts needed for generating poisons. Different from recent, iterative methods, our ShortcutGen can generate perturbations with only one forward pa… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

    Comments: 6 pages, 2 figures, 4 tables, accepted as an oral presentation at RCV (ECCV 2022 Workshop)

  25. arXiv:2209.03042  [pdf, other

    hep-ex astro-ph.IM cs.LG physics.data-an physics.ins-det

    Graph Neural Networks for Low-Energy Event Classification & Reconstruction in IceCube

    Authors: R. Abbasi, M. Ackermann, J. Adams, N. Aggarwal, J. A. Aguilar, M. Ahlers, M. Ahrens, J. M. Alameddine, A. A. Alves Jr., N. M. Amin, K. Andeen, T. Anderson, G. Anton, C. Argüelles, Y. Ashida, S. Athanasiadou, S. Axani, X. Bai, A. Balagopal V., M. Baricevic, S. W. Barwick, V. Basu, R. Bay, J. J. Beatty, K. -H. Becker , et al. (359 additional authors not shown)

    Abstract: IceCube, a cubic-kilometer array of optical sensors built to detect atmospheric and astrophysical neutrinos between 1 GeV and 1 PeV, is deployed 1.45 km to 2.45 km below the surface of the ice sheet at the South Pole. The classification and reconstruction of events from the in-ice detectors play a central role in the analysis of data from IceCube. Reconstructing and classifying events is a challen… ▽ More

    Submitted 11 October, 2022; v1 submitted 7 September, 2022; originally announced September 2022.

    Comments: Prepared for submission to JINST

  26. arXiv:2208.03242  [pdf, ps, other

    cs.IR

    Minimizing Mindless Mentions: Recommendation with Minimal Necessary User Reviews

    Authors: Danny Stax, Manel Slokom, Martha Larson

    Abstract: Recently, researchers have turned their attention to recommender systems that use only minimal necessary data. This trend is informed by the idea that recommender systems should use no more user interactions than are needed in order to provide users with useful recommendations. In this position paper, we make the case for applying the idea of minimal necessary data to recommender systems that use… ▽ More

    Submitted 9 September, 2022; v1 submitted 5 August, 2022; originally announced August 2022.

  27. arXiv:2207.14218  [pdf, ps, other

    cs.LG

    Gender In Gender Out: A Closer Look at User Attributes in Context-Aware Recommendation

    Authors: Manel Slokom, Özlem Özgöbek, Martha Larson

    Abstract: This paper studies user attributes in light of current concerns in the recommender system community: diversity, coverage, calibration, and data minimization. In experiments with a conventional context-aware recommender system that leverages side information, we show that user attributes do not always improve recommendation. Then, we demonstrate that user attributes can negatively impact diversity… ▽ More

    Submitted 28 July, 2022; originally announced July 2022.

  28. arXiv:2206.01467  [pdf, other

    cs.CV cs.CR cs.LG

    The Importance of Image Interpretation: Patterns of Semantic Misclassification in Real-World Adversarial Images

    Authors: Zhengyu Zhao, Nga Dang, Martha Larson

    Abstract: Adversarial images are created with the intention of causing an image classifier to produce a misclassification. In this paper, we propose that adversarial images should be evaluated based on semantic mismatch, rather than label mismatch, as used in current work. In other words, we propose that an image of a "mug" would be considered adversarial if classified as "turnip", but not as "cup", as curr… ▽ More

    Submitted 13 December, 2022; v1 submitted 3 June, 2022; originally announced June 2022.

    Comments: International Conference on Multimedia Modeling (MMM) 2023. Resources are publicly available at https://github.com/ZhengyuZhao/Targeted-Transfer/tree/main/human_eval

  29. arXiv:2205.08813  [pdf, other

    cs.CL

    Regex in a Time of Deep Learning: The Role of an Old Technology in Age Discrimination Detection in Job Advertisements

    Authors: Anna Pillar, Kyrill Poelmans, Martha Larson

    Abstract: Deep learning holds great promise for detecting discriminatory language in the public sphere. However, for the detection of illegal age discrimination in job advertisements, regex approaches are still strong performers. In this paper, we investigate job advertisements in the Netherlands. We present a qualitative analysis of the benefits of the 'old' approach based on regexes and investigate how ne… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

  30. Federated Learning Enables Big Data for Rare Cancer Boundary Detection

    Authors: Sarthak Pati, Ujjwal Baid, Brandon Edwards, Micah Sheller, Shih-Han Wang, G Anthony Reina, Patrick Foley, Alexey Gruzdev, Deepthi Karkada, Christos Davatzikos, Chiharu Sako, Satyam Ghodasara, Michel Bilello, Suyash Mohan, Philipp Vollmuth, Gianluca Brugnara, Chandrakanth J Preetha, Felix Sahm, Klaus Maier-Hein, Maximilian Zenk, Martin Bendszus, Wolfgang Wick, Evan Calabrese, Jeffrey Rudie, Javier Villanueva-Meyer , et al. (254 additional authors not shown)

    Abstract: Although machine learning (ML) has shown promise in numerous domains, there are concerns about generalizability to out-of-sample data. This is currently addressed by centrally sharing ample, and importantly diverse, data from multiple sites. However, such centralization is challenging to scale (or even not feasible) due to various limitations. Federated ML (FL) provides an alternative to train acc… ▽ More

    Submitted 25 April, 2022; v1 submitted 22 April, 2022; originally announced April 2022.

    Comments: federated learning, deep learning, convolutional neural network, segmentation, brain tumor, glioma, glioblastoma, FeTS, BraTS

  31. arXiv:2202.08596  [pdf, ps, other

    cs.CE math.NA

    Augmented Lagrangian approach to deriving discontinuous Galerkin methods for nonlinear elasticity problems

    Authors: Peter Hansbo, Mats G. Larson

    Abstract: We use the augmented Lagrangian formalism to derive discontinuous Galerkin formulations for problems in nonlinear elasticity. In elasticity stress is typically a symmetric function of strain, leading to symmetric tangent stiffness matrices in Newtons method when conforming finite elements are used for discretization. By use of the augmented Lagrangian framework, we can also obtain symmetric tangen… ▽ More

    Submitted 17 February, 2022; originally announced February 2022.

  32. arXiv:2111.13244  [pdf, other

    cs.CV cs.CR

    Going Grayscale: The Road to Understanding and Improving Unlearnable Examples

    Authors: Zhuoran Liu, Zhengyu Zhao, Alex Kolmus, Tijn Berns, Twan van Laarhoven, Tom Heskes, Martha Larson

    Abstract: Recent work has shown that imperceptible perturbations can be applied to craft unlearnable examples (ULEs), i.e. images whose content cannot be used to improve a classifier during training. In this paper, we reveal the road that researchers should follow for understanding ULEs and improving ULEs as they were originally formulated (ULEOs). The paper makes four contributions. First, we show that ULE… ▽ More

    Submitted 25 November, 2021; originally announced November 2021.

  33. arXiv:2110.03275  [pdf, ps, other

    cs.IR

    Doing Data Right: How Lessons Learned Working with Conventional Data should Inform the Future of Synthetic Data for Recommender Systems

    Authors: Manel Slokom, Martha Larson

    Abstract: We present a case that the newly emerging field of synthetic data in the area of recommender systems should prioritize `doing data right'. We consider this catchphrase to have two aspects: First, we should not repeat the mistakes of the past, and, second, we should explore the full scope of opportunities presented by synthetic data as we move into the future. We argue that explicit attention to da… ▽ More

    Submitted 7 October, 2021; originally announced October 2021.

    Comments: Contribution to the SimuRec Workshop at RecSys 2021

  34. A Convolutional Neural Network based Cascade Reconstruction for the IceCube Neutrino Observatory

    Authors: R. Abbasi, M. Ackermann, J. Adams, J. A. Aguilar, M. Ahlers, M. Ahrens, C. Alispach, A. A. Alves Jr., N. M. Amin, R. An, K. Andeen, T. Anderson, I. Ansseau, G. Anton, C. Argüelles, S. Axani, X. Bai, A. Balagopal V., A. Barbano, S. W. Barwick, B. Bastian, V. Basu, V. Baum, S. Baur, R. Bay , et al. (343 additional authors not shown)

    Abstract: Continued improvements on existing reconstruction methods are vital to the success of high-energy physics experiments, such as the IceCube Neutrino Observatory. In IceCube, further challenges arise as the detector is situated at the geographic South Pole where computational resources are limited. However, to perform real-time analyses and to issue alerts to telescopes around the world, powerful an… ▽ More

    Submitted 26 July, 2021; v1 submitted 27 January, 2021; originally announced January 2021.

    Comments: 39 pages, 15 figures, submitted to Journal of Instrumentation; added references

    Journal ref: JINST 16 (2021) P07041

  35. arXiv:2012.11207  [pdf, other

    cs.LG cs.CR cs.CV

    On Success and Simplicity: A Second Look at Transferable Targeted Attacks

    Authors: Zhengyu Zhao, Zhuoran Liu, Martha Larson

    Abstract: Achieving transferability of targeted attacks is reputed to be remarkably difficult. Currently, state-of-the-art approaches are resource-intensive because they necessitate training model(s) for each target class with additional data. In our investigation, we find, however, that simple transferable attacks which require neither additional data nor model training can achieve surprisingly high target… ▽ More

    Submitted 26 October, 2021; v1 submitted 21 December, 2020; originally announced December 2020.

    Comments: NeurIPS 2021

  36. arXiv:2011.09877  [pdf, other

    cs.CR

    Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel

    Authors: Zhuoran Liu, Niels Samwel, Léo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, Martha Larson

    Abstract: We introduce screen gleaning, a TEMPEST attack in which the screen of a mobile device is read without a visual line of sight, revealing sensitive information displayed on the phone screen. The screen gleaning attack uses an antenna and a software-defined radio (SDR) to pick up the electromagnetic signal that the device sends to the screen to display, e.g., a message with a security code. This spec… ▽ More

    Submitted 19 November, 2020; originally announced November 2020.

    Comments: To appear at NDSS 2021

  37. Adversarial Image Color Transformations in Explicit Color Filter Space

    Authors: Zhengyu Zhao, Zhuoran Liu, Martha Larson

    Abstract: Deep Neural Networks have been shown to be vulnerable to adversarial images. Conventional attacks strive for indistinguishable adversarial images with strictly restricted perturbations. Recently, researchers have moved to explore distinguishable yet non-suspicious adversarial images and demonstrated that color transformation attacks are effective. In this work, we propose Adversarial Color Filter… ▽ More

    Submitted 16 June, 2023; v1 submitted 12 November, 2020; originally announced November 2020.

    Comments: Published at IEEE Transactions on Information Forensics and Security 2023. Code is available at https://github.com/ZhengyuZhao/ACE/tree/master/Journal_version

  38. arXiv:2008.03797  [pdf, other

    cs.IR

    Partially Synthetic Data for Recommender Systems: Prediction Performance and Preference Hiding

    Authors: Manel Slokom, Martha Larson, Alan Hanjalic

    Abstract: This paper demonstrates the potential of statistical disclosure control for protecting the data used to train recommender systems. Specifically, we use a synthetic data generation approach to hide specific information in the user-item matrix. We apply a transformation to the original data that changes some values, but leaves others the same. The result is a partially synthetic data set that can be… ▽ More

    Submitted 9 August, 2020; originally announced August 2020.

    Comments: 11 pages, 4 figures

  39. arXiv:2006.01888  [pdf, other

    cs.IR cs.CR cs.CV

    Adversarial Item Promotion: Vulnerabilities at the Core of Top-N Recommenders that Use Images to Address Cold Start

    Authors: Zhuoran Liu, Martha Larson

    Abstract: E-commerce platforms provide their customers with ranked lists of recommended items matching the customers' preferences. Merchants on e-commerce platforms would like their items to appear as high as possible in the top-N of these ranked lists. In this paper, we demonstrate how unscrupulous merchants can create item images that artificially promote their products, improving their rankings. Recommen… ▽ More

    Submitted 20 October, 2020; v1 submitted 2 June, 2020; originally announced June 2020.

    Comments: Our code is available at https://github.com/liuzrcc/AIP

  40. arXiv:2002.01008  [pdf, other

    cs.CV

    Adversarial Color Enhancement: Generating Unrestricted Adversarial Images by Optimizing a Color Filter

    Authors: Zhengyu Zhao, Zhuoran Liu, Martha Larson

    Abstract: We introduce an approach that enhances images using a color filter in order to create adversarial effects, which fool neural networks into misclassification. Our approach, Adversarial Color Enhancement (ACE), generates unrestricted adversarial images by optimizing the color filter via gradient descent. The novelty of ACE is its incorporation of established practice for image enhancement in a trans… ▽ More

    Submitted 9 August, 2020; v1 submitted 3 February, 2020; originally announced February 2020.

    Comments: Accepted by BMVC 2020. Code is available at https://github.com/ZhengyuZhao/ACE

  41. arXiv:1911.02466  [pdf, other

    cs.CV

    Towards Large yet Imperceptible Adversarial Image Perturbations with Perceptual Color Distance

    Authors: Zhengyu Zhao, Zhuoran Liu, Martha Larson

    Abstract: The success of image perturbations that are designed to fool image classifier is assessed in terms of both adversarial effect and visual imperceptibility. The conventional assumption on imperceptibility is that perturbations should strive for tight $L_p$-norm bounds in RGB space. In this work, we drop this assumption by pursuing an approach that exploits human color perception, and more specifical… ▽ More

    Submitted 31 March, 2020; v1 submitted 6 November, 2019; originally announced November 2019.

    Comments: Accepted at CVPR 2020; Code is available at https://github.com/ZhengyuZhao/PerC-Adversarial

  42. Remembering Winter Was Coming: Character-Oriented Video Summaries of TV Series

    Authors: Xavier Bost, Serigne Gueye, Vincent Labatut, Martha Larson, Georges Linarès, Damien Malinas, Raphaël Roth

    Abstract: Today's popular TV series tend to develop continuous, complex plots spanning several seasons, but are often viewed in controlled and discontinuous conditions. Consequently, most viewers need to be re-immersed in the story before watching a new season. Although discussions with friends and family can help, we observe that most viewers make extensive use of summaries to re-engage with the plot. Auto… ▽ More

    Submitted 18 March, 2020; v1 submitted 5 September, 2019; originally announced September 2019.

    Journal ref: Multimedia Tools and Applications, Springer, 2019, 78(24):35373-35399

  43. arXiv:1901.10332  [pdf, other

    cs.CV cs.IR cs.MM

    Who's Afraid of Adversarial Queries? The Impact of Image Modifications on Content-based Image Retrieval

    Authors: Zhuoran Liu, Zhengyu Zhao, Martha Larson

    Abstract: An adversarial query is an image that has been modified to disrupt content-based image retrieval (CBIR) while appearing nearly untouched to the human eye. This paper presents an analysis of adversarial queries for CBIR based on neural, local, and global features. We introduce an innovative neural image perturbation approach, called Perturbations for Image Retrieval Error (PIRE), that is capable of… ▽ More

    Submitted 2 May, 2019; v1 submitted 29 January, 2019; originally announced January 2019.

    Comments: To appear at the ACM International Conference on Multimedia Retrieval (ICMR 2019). Our code is available at https://github.com/liuzrcc/PIRE

  44. arXiv:1812.08254  [pdf, other

    cs.IR

    Factorization Machines for Data with Implicit Feedback

    Authors: Babak Loni, Martha Larson, Alan Hanjalic

    Abstract: In this work, we propose FM-Pair, an adaptation of Factorization Machines with a pairwise loss function, making them effective for datasets with implicit feedback. The optimization model in FM-Pair is based on the BPR (Bayesian Personalized Ranking) criterion, which is a well-established pairwise optimization model. FM-Pair retains the advantages of FMs on generality, expressiveness and performanc… ▽ More

    Submitted 19 December, 2018; originally announced December 2018.

  45. From Volcano to Toyshop: Adaptive Discriminative Region Discovery for Scene Recognition

    Authors: Zhengyu Zhao, Martha Larson

    Abstract: As deep learning approaches to scene recognition emerge, they have continued to leverage discriminative regions at multiple scales, building on practices established by conventional image classification research. However, approaches remain largely generic, and do not carefully consider the special properties of scenes. In this paper, inspired by the intuitive differences between scenes and objects… ▽ More

    Submitted 15 August, 2018; v1 submitted 23 July, 2018; originally announced July 2018.

    Comments: To appear at the ACM International Conference on Multimedia (ACM MM 2018). Code available at https://github.com/ZhengyuZhao/Adi-Red-Scene

  46. arXiv:1807.01480  [pdf, ps, other

    math.NA cs.CE

    A Stabilized Cut Streamline Diffusion Finite Element Method for Convection-Diffusion Problems on Surfaces

    Authors: Erik Burman, Peter Hansbo, Mats G. Larson, Andre Massing, Sara Zahedi

    Abstract: We develop a stabilized cut finite element method for the stationary convection diffusion problem on a surface embedded in ${\mathbb{R}}^d$. The cut finite element method is based on using an embedding of the surface into a three dimensional mesh consisting of tetrahedra and then using the restriction of the standard piecewise linear continuous elements to a piecewise linear approximation of the s… ▽ More

    Submitted 4 July, 2018; originally announced July 2018.

    Comments: 26 pages, 6 figures

  47. arXiv:1806.03192  [pdf

    cs.AI cs.HC

    Assessing the impact of machine intelligence on human behaviour: an interdisciplinary endeavour

    Authors: Emilia Gómez, Carlos Castillo, Vicky Charisi, Verónica Dahl, Gustavo Deco, Blagoj Delipetrev, Nicole Dewandre, Miguel Ángel González-Ballester, Fabien Gouyon, José Hernández-Orallo, Perfecto Herrera, Anders Jonsson, Ansgar Koene, Martha Larson, Ramón López de Mántaras, Bertin Martens, Marius Miron, Rubén Moreno-Bote, Nuria Oliver, Antonio Puertas Gallardo, Heike Schweitzer, Nuria Sebastian, Xavier Serra, Joan Serrà, Songül Tolan , et al. (1 additional authors not shown)

    Abstract: This document contains the outcome of the first Human behaviour and machine intelligence (HUMAINT) workshop that took place 5-6 March 2018 in Barcelona, Spain. The workshop was organized in the context of a new research programme at the Centre for Advanced Studies, Joint Research Centre of the European Commission, which focuses on studying the potential impact of artificial intelligence on human b… ▽ More

    Submitted 7 June, 2018; originally announced June 2018.

    Comments: Proceedings of 1st HUMAINT (Human Behaviour and Machine Intelligence) workshop, Barcelona, Spain, March 5-6, 2018, edited by European Commission, Seville, 2018, JRC111773 https://ec.europa.eu/jrc/communities/community/humaint/document/assessing-impact-machine-intelligence-human-behaviour-interdisciplinary. arXiv admin note: text overlap with arXiv:1409.3097 by other authors

    Report number: JRC111773

  48. arXiv:1803.05058  [pdf

    cs.SD cs.CL eess.AS

    Investigating the Effect of Music and Lyrics on Spoken-Word Recognition

    Authors: Odette Scharenborg, Martha Larson

    Abstract: Background music in social interaction settings can hinder conversation. Yet, little is known of how specific properties of music impact speech processing. This paper addresses this knowledge gap by investigating 1) whether the masking effect of background music with lyrics is larger than that of music without lyrics, and 2) whether the masking effect is larger for more complex music. To answer th… ▽ More

    Submitted 13 March, 2018; originally announced March 2018.

    Comments: Preliminary study

  49. Exploring Deep Space: Learning Personalized Ranking in a Semantic Space

    Authors: Jeroen B. P. Vuurens, Martha Larson, Arjen P. de Vries

    Abstract: Recommender systems leverage both content and user interactions to generate recommendations that fit users' preferences. The recent surge of interest in deep learning presents new opportunities for exploiting these two sources of information. To recommend items we propose to first learn a user-independent high-dimensional semantic space in which items are positioned according to their substitutabi… ▽ More

    Submitted 22 August, 2016; v1 submitted 31 July, 2016; originally announced August 2016.

    Comments: 6 pages, RecSys 2016 RSDL workshop

  50. arXiv:1603.01335  [pdf, other

    cs.CY

    Where to be wary: The impact of widespread photo-taking and image enhancement practices on users' geo-privacy

    Authors: Jaeyoung Choi, Martha Larson, Xinchao Li, Gerald Friedland, Alan Hanjalic

    Abstract: Today's geo-location estimation approaches are able to infer the location of a target image using its visual content alone. These approaches exploit visual matching techniques, applied to a large collection of background images with known geo-locations. Users who are unaware that visual retrieval approaches can compromise their geo-privacy, unwittingly open themselves to risks of crime or other un… ▽ More

    Submitted 3 March, 2016; originally announced March 2016.