Skip to main content

Showing 1–19 of 19 results for author: Lund, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.12958  [pdf, ps, other

    cs.LG

    Domain Specific Benchmarks for Evaluating Multimodal Large Language Models

    Authors: Khizar Anjum, Muhammad Arbab Arshad, Kadhim Hayawi, Efstathios Polyzos, Asadullah Tariq, Mohamed Adel Serhani, Laiba Batool, Brady Lund, Nishith Reddy Mannuru, Ravi Varma Kumar Bevara, Taslim Mahbub, Muhammad Zeeshan Akram, Sakib Shahriar

    Abstract: Large language models (LLMs) are increasingly being deployed across disciplines due to their advanced reasoning and problem solving capabilities. To measure their effectiveness, various benchmarks have been developed that measure aspects of LLM reasoning, comprehension, and problem-solving. While several surveys address LLM evaluation and benchmarks, a domain-specific analysis remains underexplore… ▽ More

    Submitted 20 June, 2025; v1 submitted 15 June, 2025; originally announced June 2025.

  2. What Does Information Science Offer for Data Science Research?: A Review of Data and Information Ethics Literature

    Authors: Brady D. Lund, Ting Wang

    Abstract: This paper reviews literature pertaining to the development of data science as a discipline, current issues with data bias and ethics, and the role that the discipline of information science may play in addressing these concerns. Information science research and researchers have much to offer for data science, owing to their background as transdisciplinary scholars who apply human-centered and soc… ▽ More

    Submitted 26 May, 2025; originally announced June 2025.

    Journal ref: Journal of Data and Information Science (2022)

  3. Zero Trust Cybersecurity: Procedures and Considerations in Context

    Authors: Brady D. Lund, Tae Hee Lee, Ziang Wang, Ting Wang, Nishith Reddy Mannuru

    Abstract: In response to the increasing complexity and sophistication of cyber threats, particularly those enhanced by advancements in artificial intelligence, traditional security methods are proving insufficient. This paper explores the Zero Trust cybersecurity framework, which operates on the principle of never trust, always verify to mitigate vulnerabilities within organizations. Specifically, it examin… ▽ More

    Submitted 24 May, 2025; originally announced May 2025.

    Journal ref: Encyclopedia (2024)

  4. arXiv:2505.18870  [pdf

    cs.CR

    Understanding the Relationship Between Personal Data Privacy Literacy and Data Privacy Information Sharing by University Students

    Authors: Brady D. Lund, Bryan Anderson, Ana Roeschley, Gahangir Hossain

    Abstract: With constant threats to the safety of personal data in the United States, privacy literacy has become an increasingly important competency among university students, one that ties intimately to the information sharing behavior of these students. This survey based study examines how university students in the United States perceive personal data privacy and how their privacy literacy influences th… ▽ More

    Submitted 24 May, 2025; originally announced May 2025.

  5. arXiv:2407.09519  [pdf

    cs.AI cs.CL

    Putting GPT-4o to the Sword: A Comprehensive Evaluation of Language, Vision, Speech, and Multimodal Proficiency

    Authors: Sakib Shahriar, Brady Lund, Nishith Reddy Mannuru, Muhammad Arbab Arshad, Kadhim Hayawi, Ravi Varma Kumar Bevara, Aashrith Mannuru, Laiba Batool

    Abstract: As large language models (LLMs) continue to advance, evaluating their comprehensive capabilities becomes significant for their application in various fields. This research study comprehensively evaluates the language, vision, speech, and multimodal capabilities of GPT-4o. The study employs standardized exam questions, reasoning tasks, and translation assessments to assess the model's language capa… ▽ More

    Submitted 19 June, 2024; originally announced July 2024.

  6. arXiv:2406.06009  [pdf

    cs.DL cs.AI cs.CY

    The Impact of AI on Academic Research and Publishing

    Authors: Brady Lund, Manika Lamba, Sang Hoo Oh

    Abstract: Generative artificial intelligence (AI) technologies like ChatGPT, have significantly impacted academic writing and publishing through their ability to generate content at levels comparable to or surpassing human writers. Through a review of recent interdisciplinary literature, this paper examines ethical considerations surrounding the integration of AI into academia, focusing on the potential for… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  7. arXiv:2308.02030  [pdf

    cs.CY cs.AI

    Perceptions of the Fourth Industrial Revolution and Artificial Intelligence Impact on Society

    Authors: Daniel Agbaji, Brady Lund, Nishith Reddy Mannuru

    Abstract: The Fourth Industrial Revolution, particularly Artificial Intelligence (AI), has had a profound impact on society, raising concerns about its implications and ethical considerations. The emergence of text generative AI tools like ChatGPT has further intensified concerns regarding ethics, security, privacy, and copyright. This study aims to examine the perceptions of individuals in different inform… ▽ More

    Submitted 31 July, 2023; originally announced August 2023.

    Comments: 17 pages, 7 figures

    MSC Class: 68-XX(Primary) 68TXX; 68T42 (Secondary) ACM Class: I.2.1; H.4

  8. arXiv:2307.05495  [pdf

    quant-ph cs.CR

    Experimental Demonstration of Secure Frequency Hopping Communication Enabled by Quantum Key Distribution

    Authors: Bernardo A. Huberman, Bob Lund, Jing Wang, Lin Cheng

    Abstract: We propose and experimentally demonstrate a method of frequency hopping spread spectrum communication using a quantum key distribution network to deliver the frequency hopping pattern for secure wireless communications. Results show low interception and jamming probabilities.

    Submitted 20 June, 2023; originally announced July 2023.

  9. arXiv:2303.13367  [pdf

    cs.CL cs.CY

    ChatGPT and a New Academic Reality: Artificial Intelligence-Written Research Papers and the Ethics of the Large Language Models in Scholarly Publishing

    Authors: Brady Lund, Ting Wang, Nishith Reddy Mannuru, Bing Nie, Somipam Shimray, Ziang Wang

    Abstract: This paper discusses OpenAIs ChatGPT, a generative pre-trained transformer, which uses natural language processing to fulfill text-based user requests (i.e., a chatbot). The history and principles behind ChatGPT and similar models are discussed. This technology is then discussed in relation to its potential impact on academia and scholarly research and publishing. ChatGPT is seen as a potential mo… ▽ More

    Submitted 31 March, 2023; v1 submitted 21 March, 2023; originally announced March 2023.

    Journal ref: Journal of the Association for Information Science and Technology (2023)

  10. arXiv:2212.08568  [pdf, other

    cs.CV cs.LG

    Biomedical image analysis competitions: The state of current participation practice

    Authors: Matthias Eisenmann, Annika Reinke, Vivienn Weru, Minu Dietlinde Tizabi, Fabian Isensee, Tim J. Adler, Patrick Godau, Veronika Cheplygina, Michal Kozubek, Sharib Ali, Anubha Gupta, Jan Kybic, Alison Noble, Carlos Ortiz de Solórzano, Samiksha Pachade, Caroline Petitjean, Daniel Sage, Donglai Wei, Elizabeth Wilden, Deepak Alapatt, Vincent Andrearczyk, Ujjwal Baid, Spyridon Bakas, Niranjan Balu, Sophia Bano , et al. (331 additional authors not shown)

    Abstract: The number of international benchmarking competitions is steadily increasing in various fields of machine learning (ML) research and practice. So far, however, little is known about the common practice as well as bottlenecks faced by the community in tackling the research questions posed. To shed light on the status quo of algorithm development in the specific field of biomedical imaging analysis,… ▽ More

    Submitted 12 September, 2023; v1 submitted 16 December, 2022; originally announced December 2022.

  11. arXiv:2109.05816  [pdf, other

    cs.CV eess.IV

    Leveraging Clinical Characteristics for Improved Deep Learning-Based Kidney Tumor Segmentation on CT

    Authors: Christina B. Lund, Bas H. M. van der Velden

    Abstract: This paper assesses whether using clinical characteristics in addition to imaging can improve automated segmentation of kidney cancer on contrast-enhanced computed tomography (CT). A total of 300 kidney cancer patients with contrast-enhanced CT scans and clinical characteristics were included. A baseline segmentation of the kidney cancer was performed using a 3D U-Net. Input to the U-Net were the… ▽ More

    Submitted 13 September, 2021; originally announced September 2021.

    Comments: Submitted to the Kidney and Kidney Tumor Segmentation Challenge (KiTS21), MICCAI 2021

  12. arXiv:2107.04300  [pdf, ps, other

    cs.GT cs.CC

    Computational Complexity of Computing a Quasi-Proper Equilibrium

    Authors: Kristoffer Arnsfelt Hansen, Troels Bjerre Lund

    Abstract: We study the computational complexity of computing or approximating a quasi-proper equilibrium for a given finite extensive form game of perfect recall. We show that the task of computing a symbolic quasi-proper equilibrium is $\mathrm{PPAD}$-complete for two-player games. For the case of zero-sum games we obtain a polynomial time algorithm based on Linear Programming. For general $n$-player games… ▽ More

    Submitted 9 July, 2021; originally announced July 2021.

    Comments: Full version of paper to appear at the 23rd International Symposium on Fundamentals of Computation Theory (FCT 2021)

  13. arXiv:2007.05522  [pdf

    cs.CR cs.CY cs.NI quant-ph

    Quantum Secured Internet Transport

    Authors: Bernardo Huberman, Bob Lund, Jing Wang

    Abstract: Quantum computing represents an emerging threat to the public key infrastructure underlying transport layer security (TLS) widely used in the Internet. This paper describes how QKD symmetric keys can be used with TLS to provide quantum computing resistant security for existing Internet applications. We also implement and test a general hybrid key delivery architecture with QKD over long distance f… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.

    Comments: 9 pages, 8 figures

  14. arXiv:2005.02478  [pdf, ps, other

    math.CO cs.CC cs.DM cs.IT

    On the list recoverability of randomly punctured codes

    Authors: Ben Lund, Aditya Potukuchi

    Abstract: We show that a random puncturing of a code with good distance is list recoverable beyond the Johnson bound. In particular, this implies that there are Reed-Solomon codes that are list recoverable beyond the Johnson bound. It was previously known that there are Reed-Solomon codes that do not have this property. As an immediate corollary to our main theorem, we obtain better degree bounds on unbalan… ▽ More

    Submitted 3 July, 2020; v1 submitted 4 May, 2020; originally announced May 2020.

    Comments: 13 pages, several changes in introductory sections

  15. arXiv:1903.04535  [pdf

    cs.NI cs.ET quant-ph

    A Quantum Router for the Entangled Web

    Authors: Bernardo A. Huberman, Bob Lund

    Abstract: Qubit transmission protocols are presently point-to-point, and thus restrictive in their functionality. A quantum router is necessary for the quantum Internet to become a reality. We present a quantum router design based on teleportation, as well as mechanisms for entangled pair management. The prototype was validated using a quantum simulator.

    Submitted 11 March, 2019; originally announced March 2019.

  16. arXiv:1202.3110  [pdf, other

    math.CO cs.CG

    A Pseudoline Counterexample to the Strong Dirac Conjecture

    Authors: Ben D. Lund, George B. Purdy, Justin W. Smith

    Abstract: We demonstrate an infinite family of pseudoline arrangements, in which an arrangement of n pseudolines has no member incident to more than 4n/9 points of intersection. This shows the "Strong Dirac" conjecture to be false for pseudolines. We also raise a number of open problems relating to possible differences between the structure of incidences between points and lines versus the structure of in… ▽ More

    Submitted 11 January, 2014; v1 submitted 14 February, 2012; originally announced February 2012.

  17. arXiv:1105.3078  [pdf, other

    cs.CG math.CO

    Collinearities in Kinetic Point Sets

    Authors: Ben D. Lund, George B. Purdy, Justin W. Smith, Csaba D. Tóth

    Abstract: Let $P$ be a set of $n$ points in the plane, each point moving along a given trajectory. A {\em $k$-collinearity} is a pair $(L,t)$ of a line $L$ and a time $t$ such that $L$ contains at least $k$ points at time $t$, the points along $L$ do not all coincide, and not all of them are collinear at all times. We show that, if the points move with constant velocity, then the number of 3-collinearities… ▽ More

    Submitted 16 May, 2011; originally announced May 2011.

    Comments: Submitted to CCCG11

    MSC Class: 68R99 ACM Class: F.2.2

  18. A Bichromatic Incidence Bound and an Application

    Authors: Ben D. Lund, George B. Purdy, Justin W. Smith

    Abstract: We prove a new, tight upper bound on the number of incidences between points and hyperplanes in Euclidean d-space. Given n points, of which k are colored red, there are O_d(m^{2/3}k^{2/3}n^{(d-2)/3} + kn^{d-2} + m) incidences between the k red points and m hyperplanes spanned by all n points provided that m = Ω(n^{d-2}). For the monochromatic case k = n, this was proved by Agarwal and Aronov. We… ▽ More

    Submitted 26 April, 2011; v1 submitted 19 June, 2010; originally announced June 2010.

    Comments: 12 pages

    MSC Class: 51D20

    Journal ref: Discrete & Computational Geometry, Volume 46, Number 4, 2011, 611-625

  19. arXiv:1001.4108  [pdf, ps, other

    cs.DC cs.PF

    A Multi-Stage CUDA Kernel for Floyd-Warshall

    Authors: Ben Lund, Justin W Smith

    Abstract: We present a new implementation of the Floyd-Warshall All-Pairs Shortest Paths algorithm on CUDA. Our algorithm runs approximately 5 times faster than the previously best reported algorithm. In order to achieve this speedup, we applied a new technique to reduce usage of on-chip shared memory and allow the CUDA scheduler to more effectively hide instruction latency.

    Submitted 24 February, 2010; v1 submitted 22 January, 2010; originally announced January 2010.

    Comments: 9 pages, 7 figures, 1 table

    ACM Class: D.1.3