Skip to main content

Showing 1–14 of 14 results for author: Woodard, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.09910  [pdf, other

    cs.LG cs.AI

    eXpLogic: Explaining Logic Types and Patterns in DiffLogic Networks

    Authors: Stephen Wormald, David Koblah, Matheus Kunzler Maldaner, Domenic Forte, Damon L. Woodard

    Abstract: Constraining deep neural networks (DNNs) to learn individual logic types per node, as performed using the DiffLogic network architecture, opens the door to model-specific explanation techniques that quell the complexity inherent to DNNs. Inspired by principles of circuit analysis from computer engineering, this work presents an algorithm (eXpLogic) for producing saliency maps which explain input p… ▽ More

    Submitted 12 March, 2025; originally announced March 2025.

    Comments: Conference submission, 6 pages, 2 figures

  2. Maximizing Relation Extraction Potential: A Data-Centric Study to Unveil Challenges and Opportunities

    Authors: Anushka Swarup, Avanti Bhandarkar, Olivia P. Dizon-Paradis, Ronald Wilson, Damon L. Woodard

    Abstract: Relation extraction is a Natural Language Processing task that aims to extract relationships from textual data. It is a critical step for information extraction. Due to its wide-scale applicability, research in relation extraction has rapidly scaled to using highly advanced neural networks. Despite their computational superiority, modern relation extractors fail to handle complicated extraction sc… ▽ More

    Submitted 25 November, 2024; v1 submitted 7 September, 2024; originally announced September 2024.

    Comments: This work has been published to the IEEE Access (2024)

  3. arXiv:2407.17870  [pdf, other

    cs.CR cs.CL

    Is the Digital Forensics and Incident Response Pipeline Ready for Text-Based Threats in LLM Era?

    Authors: Avanti Bhandarkar, Ronald Wilson, Anushka Swarup, Mengdi Zhu, Damon Woodard

    Abstract: In the era of generative AI, the widespread adoption of Neural Text Generators (NTGs) presents new cybersecurity challenges, particularly within the realms of Digital Forensics and Incident Response (DFIR). These challenges primarily involve the detection and attribution of sources behind advanced attacks like spearphishing and disinformation campaigns. As NTGs evolve, the task of distinguishing b… ▽ More

    Submitted 25 July, 2024; originally announced July 2024.

    Comments: This work has been submitted to the IEEE for possible publication

  4. arXiv:2402.13244  [pdf, other

    cs.SI

    Are Fact-Checking Tools Helpful? An Exploration of the Usability of Google Fact Check

    Authors: Qiangeng Yang, Tess Christensen, Shlok Gilda, Juliana Fernandes, Daniela Oliveira, Ronald Wilson, Damon Woodard

    Abstract: Fact-checking-specific search tools such as Google Fact Check are a promising way to combat misinformation on social media, especially during events bringing significant social influence, such as the COVID-19 pandemic and the U.S. presidential elections. However, the usability of such an approach has not been thoroughly studied. We evaluated the performance of Google Fact Check by analyzing the re… ▽ More

    Submitted 24 May, 2025; v1 submitted 20 February, 2024; originally announced February 2024.

    Comments: Accepted and presented at the 5th EAI International Conference on Data and Information in Online Environments (EAI DIONE 2024)

  5. arXiv:2401.06293  [pdf, other

    cs.AI cs.IR

    MultiSlot ReRanker: A Generic Model-based Re-Ranking Framework in Recommendation Systems

    Authors: Qiang Charles Xiao, Ajith Muralidharan, Birjodh Tiwana, Johnson Jia, Fedor Borisyuk, Aman Gupta, Dawn Woodard

    Abstract: In this paper, we propose a generic model-based re-ranking framework, MultiSlot ReRanker, which simultaneously optimizes relevance, diversity, and freshness. Specifically, our Sequential Greedy Algorithm (SGA) is efficient enough (linear time complexity) for large-scale production recommendation engines. It achieved a lift of $+6\%$ to $ +10\%$ offline Area Under the receiver operating characteris… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

    Comments: 10 pages

  6. arXiv:2305.03699  [pdf, ps, other

    cs.HC

    Multimodal User Authentication in Smart Environments: Survey of User Attitudes

    Authors: Aishat Aloba, Sarah Morrison-Smith, Aaliyah Richlen, Kimberly Suarez, Yu-Peng Chen, Shaghayegh Esmaeili, Damon L. Woodard, Jaime Ruiz, Lisa Anthony

    Abstract: As users shift from interacting actively with devices with screens to interacting seamlessly with smart environments, novel models of user authentication will be needed to maintain the security and privacy of user data. To understand users' attitudes toward new models of authentication (e.g., voice recognition), we surveyed 117 Amazon Turk workers and 43 computer science students about their authe… ▽ More

    Submitted 23 May, 2023; v1 submitted 5 May, 2023; originally announced May 2023.

    Comments: 23 pages, 4 figures

  7. arXiv:2206.10706   

    cs.CL cs.AI cs.LG

    TraSE: Towards Tackling Authorial Style from a Cognitive Science Perspective

    Authors: Ronald Wilson, Avanti Bhandarkar, Damon Woodard

    Abstract: Stylistic analysis of text is a key task in research areas ranging from authorship attribution to forensic analysis and personality profiling. The existing approaches for stylistic analysis are plagued by issues like topic influence, lack of discriminability for large number of authors and the requirement for large amounts of diverse data. In this paper, the source of these issues are identified a… ▽ More

    Submitted 5 December, 2023; v1 submitted 21 June, 2022; originally announced June 2022.

    Comments: Experimental results in the paper are incorrectly reported due to an unforeseen glitch in the software prototype. The paper and its findings are withdrawn

  8. arXiv:2204.09579  [pdf, other

    cs.LG cs.AI cs.CR

    A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation

    Authors: David Selasi Koblah, Rabin Yu Acharya, Daniel Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte

    Abstract: Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly used in several fields to improve performance and the level of automation. In recent years, this use has exponentially increased due to the advancement of high-performance computing and the ever increasing size of data. One of such fields is that of hardware design; specifically the design of digital and analo… ▽ More

    Submitted 20 April, 2022; v1 submitted 19 April, 2022; originally announced April 2022.

  9. arXiv:2202.08414  [pdf, other

    cs.CV eess.IV

    FPIC: A Novel Semantic Dataset for Optical PCB Assurance

    Authors: Nathan Jessurun, Olivia P. Dizon-Paradis, Jacob Harrison, Shajib Ghosh, Mark M. Tehranipoor, Damon L. Woodard, Navid Asadizanjani

    Abstract: Outsourced printed circuit board (PCB) fabrication necessitates increased hardware assurance capabilities. Several assurance techniques based on automated optical inspection (AOI) have been proposed that leverage PCB images acquired using digital cameras. We review state-of-the-art AOI techniques and observe a strong, rapid trend toward machine learning (ML) solutions. These require significant am… ▽ More

    Submitted 14 March, 2023; v1 submitted 16 February, 2022; originally announced February 2022.

    Comments: Dataset is available at https://www.trust-hub.org/#/data/pcb-images ; Submitted to ACM JETC in Feb 2022; Accepted February 2023

  10. arXiv:2006.04029  [pdf

    cs.CY

    Ethics, Data Science, and Health and Human Services: Embedded Bias in Policy Approaches to Teen Pregnancy Prevention

    Authors: Davon Woodard, Huthaifa I. Ashqar, Taoran Ji

    Abstract: Background: This study aims to evaluate the Chicago Teen Pregnancy Prevention Initiative delivery optimization outcomes given policy-neutral and policy-focused approaches to deliver this program to at-risk teens across the City of Chicago. Methods: We collect and compile several datasets from public sources including: Chicago Department of Public Health clinic locations, two public health statisti… ▽ More

    Submitted 6 June, 2020; originally announced June 2020.

    Comments: Submitted to the Health Policy Open journal

  11. arXiv:2004.13874  [pdf, other

    eess.IV cs.CR cs.CV

    Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images

    Authors: Ronald Wilson, Navid Asadizanjani, Domenic Forte, Damon L. Woodard

    Abstract: In the Reverse Engineering and Hardware Assurance domain, a majority of the data acquisition is done through electron microscopy techniques such as Scanning Electron Microscopy (SEM). However, unlike its counterparts in optical imaging, only a limited number of techniques are available to enhance and extract information from the raw SEM images. In this paper, we introduce an algorithm to segment o… ▽ More

    Submitted 28 April, 2020; originally announced April 2020.

  12. arXiv:2002.04210  [pdf, other

    eess.IV cs.CR

    Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives

    Authors: Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil A. Mallaiyan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte

    Abstract: In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action. Generally speaking, reverse engineering aims to retrieve information from a product, i.e., integrated circuits (ICs) and printed circuit boards (PCBs) in hardware security-related scenarios, in the hope of understanding the functionality of the device and determining its constituent… ▽ More

    Submitted 7 April, 2021; v1 submitted 11 February, 2020; originally announced February 2020.

    Comments: It is essential not to reduce the size of the figures as high quality ones are required to discuss the image processing algorithms and methods

  13. arXiv:1804.07651  [pdf

    cs.CR

    Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization (NATO) Workshop IST-153

    Authors: Alexander Kott, Benjamin Blakely, Diane Henshel, Gregory Wehner, James Rowell, Nathaniel Evans, Luis Muñoz-González, Nandi Leslie, Donald W French, Donald Woodard, Kerry Krutilla, Amanda Joyce, Igor Linkov, Carmen Mas-Machuca, Janos Sztipanovits, Hugh Harney, Dennis Kergl, Perri Nejib, Edward Yakabovicz, Steven Noel, Tim Dudman, Pierre Trepagnier, Sowdagar Badesha, Alfred Møller

    Abstract: This report summarizes the discussions and findings of the 2017 North Atlantic Treaty Organization (NATO) Workshop, IST-153, on Cyber Resilience, held in Munich, Germany, on 23-25 October 2017, at the University of Bundeswehr. Despite continual progress in managing risks in the cyber domain, anticipation and prevention of all possible attacks and malfunctions are not feasible for the current or fu… ▽ More

    Submitted 20 April, 2018; originally announced April 2018.

    Report number: ARL-SR-0396

  14. arXiv:1803.09710  [pdf, other

    cs.CR

    Secure and Reliable Biometric Access Control for Resource-Constrained Systems and IoT

    Authors: Nima Karimian, Zimu Guo, Fatemeh Tehranipoor, Damon Woodard, Mark Tehranipoor, Domenic Forte

    Abstract: With the emergence of the Internet-of-Things (IoT), there is a growing need for access control and data protection on low-power, pervasive devices. Biometric-based authentication is promising for IoT due to its convenient nature and lower susceptibility to attacks. However, the costs associated with biometric processing and template protection are nontrivial for smart cards, key fobs, and so forth… ▽ More

    Submitted 26 March, 2018; originally announced March 2018.

    Comments: 11 pages, 9 figures