-
The aesthetics of cyber security: How do users perceive them?
Authors:
Mark Quinlan,
Aaron Cross,
Andrew Simpson
Abstract:
While specific aesthetic philosophies may differ across cultures, all human societies have used aesthetics to support communication and learning. Within the fields of usability and usable security, aesthetics have been deployed for such diverse purposes as enhancing students' e-learning experiences and optimising user interface design. In this paper, we seek to understand how individual users perc…
▽ More
While specific aesthetic philosophies may differ across cultures, all human societies have used aesthetics to support communication and learning. Within the fields of usability and usable security, aesthetics have been deployed for such diverse purposes as enhancing students' e-learning experiences and optimising user interface design. In this paper, we seek to understand how individual users perceive the visual assets that accompany cyber security information, and how these visual assets and user perceptions underwrite a distinct \emph{cyber security aesthetic}. We ask, (1) What constitutes cyber security aesthetics, from the perspective of an individual user? and (2) How might these aesthetics affect users' perceived self-efficacy as they informally learn cyber security precepts? To begin answering these questions, we compile an image-set from cyber security web articles and analyse the distinct visual properties and sentiments of these images.
△ Less
Submitted 13 June, 2023;
originally announced June 2023.
-
Deep RL at Scale: Sorting Waste in Office Buildings with a Fleet of Mobile Manipulators
Authors:
Alexander Herzog,
Kanishka Rao,
Karol Hausman,
Yao Lu,
Paul Wohlhart,
Mengyuan Yan,
Jessica Lin,
Montserrat Gonzalez Arenas,
Ted Xiao,
Daniel Kappler,
Daniel Ho,
Jarek Rettinghouse,
Yevgen Chebotar,
Kuang-Huei Lee,
Keerthana Gopalakrishnan,
Ryan Julian,
Adrian Li,
Chuyuan Kelly Fu,
Bob Wei,
Sangeetha Ramesh,
Khem Holden,
Kim Kleiven,
David Rendleman,
Sean Kirmani,
Jeff Bingham
, et al. (15 additional authors not shown)
Abstract:
We describe a system for deep reinforcement learning of robotic manipulation skills applied to a large-scale real-world task: sorting recyclables and trash in office buildings. Real-world deployment of deep RL policies requires not only effective training algorithms, but the ability to bootstrap real-world training and enable broad generalization. To this end, our system combines scalable deep RL…
▽ More
We describe a system for deep reinforcement learning of robotic manipulation skills applied to a large-scale real-world task: sorting recyclables and trash in office buildings. Real-world deployment of deep RL policies requires not only effective training algorithms, but the ability to bootstrap real-world training and enable broad generalization. To this end, our system combines scalable deep RL from real-world data with bootstrapping from training in simulation, and incorporates auxiliary inputs from existing computer vision systems as a way to boost generalization to novel objects, while retaining the benefits of end-to-end training. We analyze the tradeoffs of different design decisions in our system, and present a large-scale empirical validation that includes training on real-world data gathered over the course of 24 months of experimentation, across a fleet of 23 robots in three office buildings, with a total training set of 9527 hours of robotic experience. Our final validation also consists of 4800 evaluation trials across 240 waste station configurations, in order to evaluate in detail the impact of the design decisions in our system, the scaling effects of including more real-world data, and the performance of the method on novel objects. The projects website and videos can be found at \href{http://rl-at-scale.github.io}{rl-at-scale.github.io}.
△ Less
Submitted 5 May, 2023;
originally announced May 2023.
-
The efficacy potential of cyber security advice as presented in news articles
Authors:
Mark Quinlan,
Aaron Ceross,
Andrew Simpson
Abstract:
Cyber security advice is a broad church: it is thematically expansive, comprising expert texts, user-generated data consumed by individual users via informal learning, and much in-between. While there is evidence that cyber security news articles play a role in disseminating cyber security advice, the nature and extent of that role are not clear. We present a corpus of cyber security advice genera…
▽ More
Cyber security advice is a broad church: it is thematically expansive, comprising expert texts, user-generated data consumed by individual users via informal learning, and much in-between. While there is evidence that cyber security news articles play a role in disseminating cyber security advice, the nature and extent of that role are not clear. We present a corpus of cyber security advice generated from mainstream news articles. The work was driven by two research objectives. The first objective was to ascertain what kind of actionable advice is being disseminated; the second was to explore ways of determining the efficacy potential of news-mediated security advice. The results show an increase in the generation of cyber security news articles, together with increases in vocabulary complexity and reading difficulty. We argue that these could present challenges for vulnerable users. We believe that this corpus and the accompanying analysis have the potential to inform future efforts to quantify and improve the efficacy potential of security advice dissemination.
△ Less
Submitted 16 October, 2024; v1 submitted 11 April, 2023;
originally announced April 2023.
-
Disconnected from Reality: Do the core concepts of the metaverse exclude disabled individuals?
Authors:
Mark Quinlan
Abstract:
Commercially-driven metaverse development has been driven by philosophical and science fiction concepts. Through translating these concepts into products, the developers may have inadvertently excluded individuals with disabilities from this new expanded reality. This ideologically-driven development is presented in this paper through a brief background of what we see as the most influential of th…
▽ More
Commercially-driven metaverse development has been driven by philosophical and science fiction concepts. Through translating these concepts into products, the developers may have inadvertently excluded individuals with disabilities from this new expanded reality. This ideologically-driven development is presented in this paper through a brief background of what we see as the most influential of these concepts, and explain how these might affect disabled individuals wishing to engage with said products. It is our hope that these ideas prompt conversation on future inclusivity access from the concept stage of future metaverse development.
△ Less
Submitted 11 January, 2025; v1 submitted 14 March, 2023;
originally announced March 2023.
-
Connected Vehicles: A Privacy Analysis
Authors:
Mark Quinlan,
Jun Zhao,
Andrew Simpson
Abstract:
Just as the world of consumer devices was forever changed by the introduction of computer controlled solutions, the introduction of the engine control unit (ECU) gave rise to the automobile's transformation from a transportation product to a technology platform. A modern car is capable of processing, analysing and transmitting data in ways that could not have been foreseen only a few years ago. Th…
▽ More
Just as the world of consumer devices was forever changed by the introduction of computer controlled solutions, the introduction of the engine control unit (ECU) gave rise to the automobile's transformation from a transportation product to a technology platform. A modern car is capable of processing, analysing and transmitting data in ways that could not have been foreseen only a few years ago. These cars often incorporate telematics systems, which are used to provide navigation and internet connectivity over cellular networks, as well as data-recording devices for insurance and product development purposes. We examine the telematics system of a production vehicle, and aim to ascertain some of the associated privacy-related threats. We also consider how this analysis might underpin further research.
△ Less
Submitted 13 July, 2022;
originally announced July 2022.
-
A Real-Time Model-Based Reinforcement Learning Architecture for Robot Control
Authors:
Todd Hester,
Michael Quinlan,
Peter Stone
Abstract:
Reinforcement Learning (RL) is a method for learning decision-making tasks that could enable robots to learn and adapt to their situation on-line. For an RL algorithm to be practical for robotic control tasks, it must learn in very few actions, while continually taking those actions in real-time. Existing model-based RL methods learn in relatively few actions, but typically take too much time betw…
▽ More
Reinforcement Learning (RL) is a method for learning decision-making tasks that could enable robots to learn and adapt to their situation on-line. For an RL algorithm to be practical for robotic control tasks, it must learn in very few actions, while continually taking those actions in real-time. Existing model-based RL methods learn in relatively few actions, but typically take too much time between each action for practical on-line learning. In this paper, we present a novel parallel architecture for model-based RL that runs in real-time by 1) taking advantage of sample-based approximate planning methods and 2) parallelizing the acting, model learning, and planning processes such that the acting process is sufficiently fast for typical robot control cycles. We demonstrate that algorithms using this architecture perform nearly as well as methods using the typical sequential architecture when both are given unlimited time, and greatly out-perform these methods on tasks that require real-time actions such as controlling an autonomous vehicle.
△ Less
Submitted 21 May, 2011; v1 submitted 9 May, 2011;
originally announced May 2011.