Skip to main content

Showing 1–16 of 16 results for author: Woods, W

Searching in archive cs. Search in all archives.
.
  1. Improving Quality Control Of MRI Images Using Synthetic Motion Data

    Authors: Charles Bricout, Kang Ik K. Cho, Michael Harms, Ofer Pasternak, Carrie E. Bearden, Patrick D. McGorry, Rene S. Kahn, John Kane, Barnaby Nelson, Scott W. Woods, Martha E. Shenton, Sylvain Bouix, Samira Ebrahimi Kahou

    Abstract: MRI quality control (QC) is challenging due to unbalanced and limited datasets, as well as subjective scoring, which hinder the development of reliable automated QC systems. To address these issues, we introduce an approach that pretrains a model on synthetically generated motion artifacts before applying transfer learning for QC classification. This method not only improves the accuracy in identi… ▽ More

    Submitted 13 February, 2025; v1 submitted 31 January, 2025; originally announced February 2025.

    Comments: Accepted at ISBI 2025

  2. arXiv:2501.18279  [pdf, other

    cs.CR

    SoK: Measuring Blockchain Decentralization

    Authors: Christina Ovezik, Dimitris Karakostas, Mary Milad, Aggelos Kiayias, Daniel W. Woods

    Abstract: In the context of blockchain systems, the importance of decentralization is undermined by the lack of a widely accepted methodology to measure it. To address this gap, we set out a systematization effort targeting the decentralization measurement workflow. To facilitate our systematization, we put forth a framework that categorizes all measurement techniques used in previous work based on the reso… ▽ More

    Submitted 6 February, 2025; v1 submitted 30 January, 2025; originally announced January 2025.

  3. arXiv:2409.18289  [pdf, other

    cs.LG cs.AI eess.SY

    Criticality and Safety Margins for Reinforcement Learning

    Authors: Alexander Grushin, Walt Woods, Alvaro Velasquez, Simon Khan

    Abstract: State of the art reinforcement learning methods sometimes encounter unsafe situations. Identifying when these situations occur is of interest both for post-hoc analysis and during deployment, where it might be advantageous to call out to a human overseer for help. Efforts to gauge the criticality of different points in time have been developed, but their accuracy is not well established due to a l… ▽ More

    Submitted 27 May, 2025; v1 submitted 26 September, 2024; originally announced September 2024.

    Comments: 17 pages, 10 figures

    MSC Class: 68T07 ACM Class: I.2.6

  4. arXiv:2407.03210  [pdf, other

    cs.LG cs.AI cs.NE

    Combining AI Control Systems and Human Decision Support via Robustness and Criticality

    Authors: Walt Woods, Alexander Grushin, Simon Khan, Alvaro Velasquez

    Abstract: AI-enabled capabilities are reaching the requisite level of maturity to be deployed in the real world, yet do not always make correct or safe decisions. One way of addressing these concerns is to leverage AI control systems alongside and in support of human decisions, relying on the AI control system in safe situations while calling on a human co-decider for critical situations. We extend a method… ▽ More

    Submitted 8 October, 2024; v1 submitted 3 July, 2024; originally announced July 2024.

    Comments: 19 pages, 12 figures

    MSC Class: 68T07 ACM Class: I.2.6

    Journal ref: Proc. SPIE 13058, Disruptive Technologies in Information Sciences VIII, 130580J (6 June 2024)

  5. arXiv:2404.17989  [pdf, other

    cs.CR cs.CY

    InfoSec.pptx: A Longitudinal Study of Speakers, Topics, and Sponsors at Security Conferences in Academia and Industry

    Authors: Lukas Walter, Clemens Sauerwein, Daniel W. Woods

    Abstract: Security conferences are important venues at which academics and practitioners share knowledge about new attacks and state-of-the-art defenses. Despite this, researchers have not studied who shares information and about which security topics. To address this, our study characterizes the speakers, sponsors, and topics presented at the most prestigious academic and industry conferences. We collect a… ▽ More

    Submitted 27 April, 2024; originally announced April 2024.

    Comments: Code and data can be found in the repository: https://git.uibk.ac.at/csaw9252/master_thesis

    ACM Class: H.3.1; H.3.3; I.2.7; J.4; K.4.0; E.0

  6. arXiv:2403.13736  [pdf, ps, other

    cs.CR

    Statistical Confidence in Mining Power Estimates for PoW Blockchains

    Authors: Mary Milad, Christina Ovezik, Dimitris Karakostas, Daniel W. Woods

    Abstract: The security of blockchain systems depends on the distribution of mining power across participants. If sufficient mining power is controlled by one entity, they can force their own version of events. This may allow them to double spend coins, for example. For Proof of Work (PoW) blockchains, however, the distribution of mining power cannot be read directly from the blockchain and must instead be i… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

  7. arXiv:2307.13642  [pdf, other

    cs.LG cs.AI eess.SY

    Safety Margins for Reinforcement Learning

    Authors: Alexander Grushin, Walt Woods, Alvaro Velasquez, Simon Khan

    Abstract: Any autonomous controller will be unsafe in some situations. The ability to quantitatively identify when these unsafe situations are about to occur is crucial for drawing timely human oversight in, e.g., freight transportation applications. In this work, we demonstrate that the true criticality of an agent's situation can be robustly defined as the mean reduction in reward given some number of ran… ▽ More

    Submitted 8 October, 2024; v1 submitted 25 July, 2023; originally announced July 2023.

    Comments: 2 pages, 2 figures. Presented at the 2023 IEEE Conference on Artificial Intelligence (CAI), Santa Clara, CA

    MSC Class: 68T07 ACM Class: I.2.6

  8. arXiv:2201.11657  [pdf, other

    cs.SI cs.LG

    LAGOON: An Analysis Tool for Open Source Communities

    Authors: Sourya Dey, Walt Woods

    Abstract: This paper presents LAGOON -- an open source platform for understanding the complex ecosystems of Open Source Software (OSS) communities. The platform currently utilizes spatiotemporal graphs to store and investigate the artifacts produced by these communities, and help analysts identify bad actors who might compromise an OSS project's security. LAGOON provides ingest of artifacts from several com… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

    Comments: Submitted to the 2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR)

  9. arXiv:2109.14286  [pdf, other

    cs.HC

    Conflicting Privacy Preference Signals in the Wild

    Authors: Maximilian Hils, Daniel W. Woods, Rainer Böhme

    Abstract: Privacy preference signals allow users to express preferences over how their personal data is processed. These signals become important in determining privacy outcomes when they reference an enforceable legal basis, as is the case with recent signals such as the Global Privacy Control and the Transparency & Consent Framework. However, the coexistence of multiple privacy preference signals creates… ▽ More

    Submitted 29 September, 2021; originally announced September 2021.

  10. arXiv:2108.00103  [pdf, other

    cs.LG cs.FL

    Anomaly Detection with Neural Parsers That Never Reject

    Authors: Alexander Grushin, Walt Woods

    Abstract: Reinforcement learning has recently shown promise as a technique for training an artificial neural network to parse sentences in some unknown format, through a body of work known as RL-GRIT. A key aspect of the RL-GRIT approach is that rather than explicitly inferring a grammar that describes the format, the neural network learns to perform various parsing actions (such as merging two tokens) over… ▽ More

    Submitted 20 May, 2022; v1 submitted 30 July, 2021; originally announced August 2021.

    Comments: 10 pages, 3 figures

    MSC Class: 68T07 (Primary) 68Q42 (Secondary) ACM Class: I.2.6; F.4.2

    Journal ref: Proceedings of the 2022 IEEE Security and Privacy Workshops (SPW) (2022) 88-97

  11. Privacy Preference Signals: Past, Present and Future

    Authors: Maximilian Hils, Daniel W. Woods, Rainer Böhme

    Abstract: Privacy preference signals are digital representations of how users want their personal data to be processed. Such signals must be adopted by both the sender (users) and intended recipients (data processors). Adoption represents a coordination problem that remains unsolved despite efforts dating back to the 1990s. Browsers implemented standards like the Platform for Privacy Preferences (P3P) and D… ▽ More

    Submitted 14 July, 2021; v1 submitted 4 June, 2021; originally announced June 2021.

    Journal ref: Proceedings on Privacy Enhancing Technologies 2021

  12. arXiv:2105.13114  [pdf, other

    cs.LG cs.CR cs.PL

    RL-GRIT: Reinforcement Learning for Grammar Inference

    Authors: Walt Woods

    Abstract: When working to understand usage of a data format, examples of the data format are often more representative than the format's specification. For example, two different applications might use very different JSON representations, or two PDF-writing applications might make use of very different areas of the PDF specification to realize the same rendered content. The complexity arising from these dis… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

    Comments: 13 pages, published at IEEE LangSec 2021 (https://langsec.org/spw21/papers.html). ArXiv version: lacking correct 'minted' package behavior, so some atoms may look a little off

  13. arXiv:2103.12835  [pdf

    cs.ET cond-mat.dis-nn cond-mat.mes-hall cond-mat.mtrl-sci

    Spoken Digit Classification by In-Materio Reservoir Computing with Neuromorphic Atomic Switch Networks

    Authors: Sam Lilak, Walt Woods, Kelsey Scharnhorst, Christopher Dunham, Christof Teuscher, Adam Z. Stieg, James K. Gimzewski

    Abstract: Atomic Switch Networks (ASN) comprising silver iodide (AgI) junctions, a material previously unexplored as functional memristive elements within highly-interconnected nanowire networks, were employed as a neuromorphic substrate for physical Reservoir Computing (RC). This new class of ASN-based devices has been physically characterized and utilized to classify spoken digit audio data, demonstrating… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: 11 pages, 7 figures

  14. arXiv:1908.04867  [pdf, other

    cs.CR

    Post-Incident Audits on Cyber Insurance Discounts

    Authors: Sakshyam Panda, Daniel W Woods, Aron Laszka, Andrew Fielder, Emmanouil Panaousis

    Abstract: We introduce a game-theoretic model to investigate the strategic interaction between a cyber insurance policyholder whose premium depends on her self-reported security level and an insurer with the power to audit the security level upon receiving an indemnity claim. Audits can reveal fraudulent (or simply careless) policyholders not following reported security procedures, in which case the insurer… ▽ More

    Submitted 13 August, 2019; originally announced August 2019.

  15. arXiv:1906.02896  [pdf, other

    cs.LG cs.CR stat.ML

    Adversarial Explanations for Understanding Image Classification Decisions and Improved Neural Network Robustness

    Authors: Walt Woods, Jack Chen, Christof Teuscher

    Abstract: For sensitive problems, such as medical imaging or fraud detection, Neural Network (NN) adoption has been slow due to concerns about their reliability, leading to a number of algorithms for explaining their decisions. NNs have also been found vulnerable to a class of imperceptible attacks, called adversarial examples, which arbitrarily alter the output of the network. Here we demonstrate both that… ▽ More

    Submitted 6 August, 2019; v1 submitted 7 June, 2019; originally announced June 2019.

    Comments: 23 pages with a 14 page appendix. Submitted to Nature ML for peer review

    Journal ref: Nature Machine Intelligence (2019)

  16. Fast and Accurate Sparse Coding of Visual Stimuli with a Simple, Ultra-Low-Energy Spiking Architecture

    Authors: Walt Woods, Christof Teuscher

    Abstract: Memristive crossbars have become a popular means for realizing unsupervised and supervised learning techniques. In previous neuromorphic architectures with leaky integrate-and-fire neurons, the crossbar itself has been separated from the neuron capacitors to preserve mathematical rigor. In this work, we sought to simplify the design, creating a fast circuit that consumed significantly lower power… ▽ More

    Submitted 22 January, 2019; v1 submitted 19 April, 2017; originally announced April 2017.

    Comments: 16 pages, 16 figures, published in IEEE Transactions on Neural Networks and Learning Systems