• Smartphone Impostor Detection with Built-in Sensors and Deep Learning

    Authors:

    Guangyuan Hu,

    Zecheng He,

    Ruby Lee

    Abstract:

    In this paper, we show that sensor-based impostor detection with deep learning can achieve excellent impostor detection accuracy at lower hardware cost compared to past work on sensor-based user authentication (the inverse problem) which used more conventional machine learning algorithms. While these methods use other smartphone users’ sensor data to build the (user, non-user) classification model…
    ▽ More

    Submitted 10 February, 2020;
    originally announced February 2020.

  • A Deep Learning Approach to Automate High-Resolution Blood Vessel Reconstruction on Computerized Tomography Images With or Without the Use of Contrast Agent

    Authors:

    Anirudh Chandrashekar,

    Ashok Handa,

    Natesh Shivakumar,

    Pierfrancesco Lapolla,

    Vicente Grau,

    Regent Lee

    Abstract:

    Existing methods to reconstruct vascular structures from a computed tomography (CT) angiogram rely on injection of intravenous contrast to enhance the radio-density within the vessel lumen. However, pathological changes can be present in the blood lumen, vessel wall or a combination of both that prevent accurate reconstruction. In the example of aortic aneurysmal disease, a blood clot or thrombus…
    ▽ More

    Submitted 9 February, 2020;
    originally announced February 2020.

  • Model-free vision-based shaping of deformable plastic materials

    Authors:

    Andrea Cherubini,

    Valerio Ortenzi,

    Akansel Cosgun,

    Robert Lee,

    Peter Corke

    Abstract:

    We address the problem of shaping deformable plastic materials using non-prehensile actions. Shaping plastic objects is challenging, since they are difficult to model and to track visually. We study this problem, by using kinetic sand, a plastic toy material which mimics the physical properties of wet sand. Inspired by a pilot study where humans shape kinetic sand, we define two types of actions:…
    ▽ More

    Submitted 30 January, 2020;
    originally announced January 2020.

  • Designing a Socially Assistive Robot for Long-Term In-Home Use for Children with Autism Spectrum Disorders

    Authors:

    Roxanna Pakkar,

    Caitlyn Clabaugh,

    Rhianna Lee,

    Eric Deng,

    Maja J Mataric

    Abstract:

    Socially assistive robotics (SAR) research has shown great potential for supplementing and augmenting therapy for children with autism spectrum disorders (ASD). However, the vast majority of SAR research has been limited to short-term studies in highly controlled environments. The design and development of a SAR system capable of interacting autonomously {it in situ} for long periods of time invo…
    ▽ More

    Submitted 21 January, 2020;
    originally announced January 2020.

  • Machine learning transfer efficiencies for noisy quantum walks

    Authors:

    Alexey A. Melnikov,

    Leonid E. Fedichkin,

    Ray-Kuang Lee,

    Alexander Alodjants

    Abstract:

    Quantum effects are known to provide an advantage in particle transfer across networks. In order to achieve this advantage, requirements on both a graph type and a quantum system coherence must be found. Here we show that the process of finding these requirements can be automated by learning from simulated examples. The automation is done by using a convolutional neural network of a particular typ…
    ▽ More

    Submitted 15 January, 2020;
    originally announced January 2020.

  • Evaluating task-agnostic exploration for fixed-batch learning of arbitrary future tasks

    Authors:

    Vibhavari Dasagi,

    Robert Lee,

    Jake Bruce,

    Jürgen Leitner

    Abstract:

    Deep reinforcement learning has been shown to solve challenging tasks where large amounts of training experience is available, usually obtained online while learning the task. Robotics is a significant potential application domain for many of these algorithms, but generating robot experience in the real world is expensive, especially when each task requires a lengthy online training procedure. Off…
    ▽ More

    Submitted 19 November, 2019;
    originally announced November 2019.

  • Long-Term Personalization of an In-Home Socially Assistive Robot for Children With Autism Spectrum Disorders

    Authors:

    Caitlyn Clabaugh,

    Kartik Mahajan,

    Shomik Jain,

    Roxanna Pakkar,

    David Becerra,

    Zhonghao Shi,

    Eric Deng,

    Rhianna Lee,

    Gisele Ragusa,

    Maja Matarić

    Abstract:

    Socially assistive robots (SAR) have shown great potential to augment the social and educational development of children with autism spectrum disorders (ASD). As SAR continues to substantiate itself as an effective enhancement to human intervention, researchers have sought to study its longitudinal impacts in real-world environments, including the home. Computational personalization stands out as…
    ▽ More

    Submitted 18 November, 2019;
    originally announced November 2019.

  • Learning-Assisted Competitive Algorithms for Peak-Aware Energy Scheduling

    Authors:

    Russell Lee,

    Mohammad H. Hajiesmaili,

    Jian Li

    Abstract:

    In this paper, we study the peak-aware energy scheduling problem using the competitive framework with machine learning prediction. With the uncertainty of energy demand as the fundamental challenge, the goal is to schedule the energy output of local generation units such that the electricity bill is minimized. While this problem has been tackled using classic competitive design with worst-case gua…
    ▽ More

    Submitted 18 November, 2019;
    originally announced November 2019.

  • Proceedings of the SREC (Social Robots in Therapy and Care) Workshop at HRI 2019

    Authors:

    Pablo Gomez Esteban,

    Daniel Hernández García,

    Hee Rin Lee,

    Marta Romeo,

    Emmanuel Senft,

    Erik Billing

    Abstract:

    Robot-Assisted Therapy (RAT) has successfully been used in Human Robot Interaction (HRI) research by including social robots in health-care interventions by virtue of their ability to engage human users in both social and emotional dimensions. Robots used for these tasks must be designed with several user groups in mind, including both individuals receiving therapy and care professionals responsib…
    ▽ More

    Submitted 5 September, 2019;
    originally announced September 2019.

  • MobiSR: Efficient On-Device Super-Resolution through Heterogeneous Mobile Processors

    Authors:

    Royson Lee,

    Stylianos I. Venieris,

    Łukasz Dudziak,

    Sourav Bhattacharya,

    Nicholas D. Lane

    Abstract:

    In recent years, convolutional networks have demonstrated unprecedented performance in the image restoration task of super-resolution (SR). SR entails the upscaling of a single low-resolution image in order to meet application-specific image quality demands and plays a key role in mobile devices. To comply with privacy regulations and reduce the overhead of cloud computing, executing SR models loc…
    ▽ More

    Submitted 21 August, 2019;
    originally announced August 2019.

  • Pure entropic regularization for metrical task systems

    Authors:

    Christian Coester,

    James R. Lee

    Abstract:

    We show that on every $n$-point HST metric, there is a randomized online algorithm for metrical task systems (MTS) that is $1$-competitive for service costs and $O(log n)$-competitive for movement costs. In general, these refined guarantees are optimal up to the implicit constant. While an $O(log n)$-competitive algorithm for MTS on HST metrics was developed by Bubeck et al. (SODA 2019), that ap…
    ▽ More

    Submitted 7 July, 2019; v1 submitted 10 June, 2019;
    originally announced June 2019.

  • Data-efficient Learning of Morphology and Controller for a Microrobot

    Authors:

    Thomas Liao,

    Grant Wang,

    Brian Yang,

    Rene Lee,

    Kristofer Pister,

    Sergey Levine,

    Roberto Calandra

    Abstract:

    Robot design is often a slow and difficult process requiring the iterative construction and testing of prototypes, with the goal of sequentially optimizing the design. For most robots, this process is further complicated by the need, when validating the capabilities of the hardware to solve the desired task, to already have an appropriate controller, which is in turn designed and tuned for the spe…
    ▽ More

    Submitted 3 May, 2019;
    originally announced May 2019.

  • Mirroring to Build Trust in Digital Assistants

    Authors:

    Katherine Metcalf,

    Barry-John Theobald,

    Garrett Weinberg,

    Robert Lee,

    Ing-Marie Jonsson,

    Russ Webb,

    Nicholas Apostoloff

    Abstract:

    We describe experiments towards building a conversational digital assistant that considers the preferred conversational style of the user. In particular, these experiments are designed to measure whether users prefer and trust an assistant whose conversational style matches their own. To this end we conducted a user study where subjects interacted with a digital assistant that responded in a way t…
    ▽ More

    Submitted 2 April, 2019;
    originally announced April 2019.

  • Linky: Visualizing User Identity Linkage Results For Multiple Online Social Networks

    Authors:

    Roy Ka-Wei Lee,

    Ming Shan Hee,

    Philips Kokoh Prasetyo,

    Ee-Peng Lim

    Abstract:

    User identity linkage across online social networks is an emerging research topic that has attracted attention in recent years. Many user identity linkage methods have been proposed so far and most of them utilize user profile, content and network information to determine if two social media accounts belong to the same person. In most cases, user identity linkage methods are evaluated by performin…
    ▽ More

    Submitted 23 February, 2019;
    originally announced February 2019.

  • Adaptive Stress Testing for Autonomous Vehicles

    Authors:

    Mark Koren,

    Saud Alsaif,

    Ritchie Lee,

    Mykel J. Kochenderfer

    Abstract:

    This paper presents a method for testing the decision making systems of autonomous vehicles. Our approach involves perturbing stochastic elements in the vehicle’s environment until the vehicle is involved in a collision. Instead of applying direct Monte Carlo sampling to find collision scenarios, we formulate the problem as a Markov decision process and use reinforcement learning algorithms to fin…
    ▽ More

    Submitted 5 February, 2019;
    originally announced February 2019.

  • Unsupervised User Identity Linkage via Factoid Embedding

    Authors:

    Wei Xie,

    Xin Mu,

    Roy Ka-Wei Lee,

    Feida Zhu,

    Ee-Peng Lim

    Abstract:

    User identity linkage (UIL), the problem of matching user account across multiple online social networks (OSNs), is widely studied and important to many real-world applications. Most existing UIL solutions adopt a supervised or semi-supervised approach which generally suffer from scarcity of labeled data. In this paper, we propose Factoid Embedding, a novel framework that adopts an unsupervised ap…
    ▽ More

    Submitted 20 January, 2019;
    originally announced January 2019.

  • Proceedings of the Workshop on Social Robots in Therapy: Focusing on Autonomy and Ethical Challenges

    Authors:

    Pablo G. Esteban,

    Daniel Hernández García,

    Hee Rin Lee,

    Pauline Chevalier,

    Paul Baxter,

    Cindy L. Bethel,

    Jainendra Shukla,

    Joan Oliver,

    Domènec Puig,

    Jason R. Wilson,

    Linda Tickle-Degnen,

    Madeleine Bartlett,

    Tony Belpaeme,

    Serge Thill,

    Kim Baraka,

    Francisco S. Melo,

    Manuela Veloso,

    David Becerra,

    Maja Matarić,

    Eduard Fosch-Villaronga,

    Jordi Albo-Canals,

    Gloria Beraldo,

    Emanuele Menegatti,

    Valentina De Tommasi,

    Roberto Mancin
    , et al. (13 additional authors not shown)

    Abstract:

    Robot-Assisted Therapy (RAT) has successfully been used in HRI research by including social robots in health-care interventions by virtue of their ability to engage human users both social and emotional dimensions. Research projects on this topic exist all over the globe in the USA, Europe, and Asia. All of these projects have the overall ambitious goal to increase the well-being of a vulnerable p…
    ▽ More

    Submitted 18 December, 2018;
    originally announced December 2018.

  • Flow-Cut Gaps and Face Covers in Planar Graphs

    Authors:

    Robert Krauthgamer,

    James R. Lee,

    Havana Rika

    Abstract:

    The relationship between the sparsest cut and the maximum concurrent multi-flow in graphs has been studied extensively. For general graphs with $k$ terminal pairs, the flow-cut gap is $O(log k)$, and this is tight. But when topological restrictions are placed on the flow network, the situation is far less clear. In particular, it has been conjectured that the flow-cut gap in planar networks is…
    ▽ More

    Submitted 6 November, 2018;
    originally announced November 2018.

  • Adaptive Stress Testing: Finding Failure Events with Reinforcement Learning

    Authors:

    Ritchie Lee,

    Ole J. Mengshoel,

    Anshu Saksena,

    Ryan Gardner,

    Daniel Genin,

    Joshua Silbermann,

    Michael Owen,

    Mykel J. Kochenderfer

    Abstract:

    Finding the most likely path to a set of failure states is important to the analysis of safety-critical dynamic systems. While efficient solutions exist for certain classes of systems, a scalable general solution for stochastic, partially-observable, and continuous-valued systems remains challenging. Existing approaches in formal and simulation-based methods either cannot scale to large systems or…
    ▽ More

    Submitted 6 November, 2018;
    originally announced November 2018.

  • Sim-to-Real Transfer of Robot Learning with Variable Length Inputs

    Authors:

    Vibhavari Dasagi,

    Robert Lee,

    Serena Mou,

    Jake Bruce,

    Niko Sünderhauf,

    Jürgen Leitner

    Abstract:

    Current end-to-end deep Reinforcement Learning (RL) approaches require jointly learning perception, decision-making and low-level control from very sparse reward signals and high-dimensional inputs, with little capability of incorporating prior knowledge. This results in prohibitively long training times for use on real-world robotic tasks. Existing algorithms capable of extracting task-level repr…
    ▽ More

    Submitted 8 October, 2019; v1 submitted 20 September, 2018;
    originally announced September 2018.

  • VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting

    Authors:

    Zecheng He,

    Tianwei Zhang,

    Ruby B. Lee

    Abstract:

    Deep learning has become popular, and numerous cloud-based services are provided to help customers develop and deploy deep learning applications. Meanwhile, various attack techniques have also been discovered to stealthily compromise the model’s integrity. When a cloud customer deploys a deep learning model in the cloud and serves it to end-users, it is important for him to be able to verify that…
    ▽ More

    Submitted 19 August, 2018; v1 submitted 9 August, 2018;
    originally announced August 2018.

  • Metrical task systems on trees via mirror descent and unfair gluing

    Authors:

    Sébastien Bubeck,

    Michael B. Cohen,

    James R. Lee,

    Yin Tat Lee

    Abstract:

    We consider metrical task systems on tree metrics, and present an $O(mathrm{depth} times log n)$-competitive randomized algorithm based on the mirror descent framework introduced in our prior work on the $k$-server problem. For the special case of hierarchically separated trees (HSTs), we use mirror descent to refine the standard approach based on gluing unfair metrical task systems. This yield…
    ▽ More

    Submitted 8 January, 2019; v1 submitted 11 July, 2018;
    originally announced July 2018.

  • Privacy-preserving Machine Learning through Data Obfuscation

    Authors:

    Tianwei Zhang,

    Zecheng He,

    Ruby B. Lee

    Abstract:

    As machine learning becomes a practice and commodity, numerous cloud-based services and frameworks are provided to help customers develop and deploy machine learning applications. While it is prevalent to outsource model training and serving tasks in the cloud, it is important to protect the privacy of sensitive samples in the training dataset and prevent information leakage to untrusted third par…
    ▽ More

    Submitted 12 July, 2018; v1 submitted 5 July, 2018;
    originally announced July 2018.

  • Practical and Scalable Security Verification of Secure Architectures

    Authors:

    Jakub Szefer,

    Tianwei Zhang,

    Ruby B. Lee

    Abstract:

    We present a new and practical framework for security verification of secure architectures. Specifically, we break the verification task into external verification and internal verification. External verification considers the external protocols, i.e. interactions between users, compute servers, network entities, etc. Meanwhile, internal verification considers the interactions between hardware and…
    ▽ More

    Submitted 5 July, 2018;
    originally announced July 2018.

  • Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning

    Authors:

    Zecheng He,

    Aswin Raghavan,

    Guangyuan Hu,

    Sek Chai,

    Ruby Lee

    Abstract:

    Controllers of security-critical cyber-physical systems, like the power grid, are a very important class of computer systems. Attacks against the control code of a power-grid system, especially zero-day attacks, can be catastrophic. Earlier detection of the anomalies can prevent further damage. However, detecting zero-day attacks is extremely challenging because they have no known code and have un…
    ▽ More

    Submitted 22 June, 2019; v1 submitted 18 June, 2018;
    originally announced June 2018.

  • Wisdom in Sum of Parts: Multi-Platform Activity Prediction in Social Collaborative Sites

    Authors:

    Roy Ka-Wei Lee,

    David Lo

    Abstract:

    In this paper, we proposed a novel framework which uses user interests inferred from activities (a.k.a., activity interests) in multiple social collaborative platforms to predict users’ platform activities. Included in the framework are two prediction approaches: (i) direct platform activity prediction, which predicts a user’s activities in a platform using his or her activity interests from the s…
    ▽ More

    Submitted 8 May, 2018;
    originally announced May 2018.

  • Object Detection and Geometric Profiling through Dirty Water Media Using Asymmetry Properties of Backscattered Signals

    Authors:

    Chensheng Wu,

    Robert Lee,

    Christopher C. Davis

    Abstract:

    The scattering of light observed through the turbid underwater channel is often regarded as the leading challenge when designing underwater electro-optical imaging systems. There have been many approaches to address the effects of scattering such as using pulsed laser sources to reject scattered light temporally, or using intensity modulated waveforms and matched filters to remove the scattered li…
    ▽ More

    Submitted 13 April, 2018;
    originally announced April 2018.

  • Mixed-Integer Convex Nonlinear Optimization with Gradient-Boosted Trees Embedded

    Authors:

    Miten Mistry,

    Dimitrios Letsios,

    Gerhard Krennrich,

    Robert M. Lee,

    Ruth Misener

    Abstract:

    Decision trees usefully represent sparse, high dimensional and noisy data. Having learned a function from this data, we may want to thereafter integrate the function into a larger decision-making problem, e.g., for picking the best chemical process catalyst. We study a large-scale, industrially-relevant mixed-integer nonlinear nonconvex optimization problem involving both gradient-boosted trees an…
    ▽ More

    Submitted 25 September, 2019; v1 submitted 2 March, 2018;
    originally announced March 2018.

  • Discovering Hidden Topical Hubs and Authorities in Online Social Networks

    Authors:

    Roy Ka-Wei Lee,

    Tuan-Anh Hoang,

    Ee-Peng Lim

    Abstract:

    Finding influential users in online social networks is an important problem with many possible useful applications. HITS and other link analysis methods, in particular, have been often used to identify hub and authority users in web graphs and online social networks. These works, however, have not considered topical aspect of links in their analysis. A straightforward approach to overcome this lim…
    ▽ More

    Submitted 20 February, 2018;
    originally announced February 2018.

  • Blind De-anonymization Attacks using Social Networks

    Authors:

    Wei-Han Lee,

    Changchang Liu,

    Shouling Ji,

    Prateek Mittal,

    Ruby Lee

    Abstract:

    It is important to study the risks of publishing privacy-sensitive data. Even if sensitive identities (e.g., name, social security number) were removed and advanced data perturbation techniques were applied, several de-anonymization attacks have been proposed to re-identify individuals. However, existing attacks have some limitations: 1) they are limited in de-anonymization accuracy; 2) they requi…
    ▽ More

    Submitted 16 January, 2018;
    originally announced January 2018.

  • Time Series Segmentation through Automatic Feature Learning

    Authors:

    Wei-Han Lee,

    Jorge Ortiz,

    Bongjun Ko,

    Ruby Lee

    Abstract:

    Internet of things (IoT) applications have become increasingly popular in recent years, with applications ranging from building energy monitoring to personal health tracking and activity recognition. In order to leverage these data, automatic knowledge extraction – whereby we map from observations to interpretable states and transitions – must be done at scale. As such, we have seen many recent Io…
    ▽ More

    Submitted 26 January, 2018; v1 submitted 16 January, 2018;
    originally announced January 2018.

  • Fusible HSTs and the randomized k-server conjecture

    Authors:

    James R. Lee

    Abstract:

    We exhibit an $O((log k)^6)$-competitive randomized algorithm for the $k$-server problem on any metric space. It is shown that a potential-based algorithm for the fractional $k$-server problem on hierarchically separated trees (HSTs) with competitive ratio $f(k)$ can be used to obtain a randomized algorithm for any metric space with competitive ratio $f(k)^2 O((log k)^2)$. Employing the…
    ▽ More

    Submitted 21 February, 2018; v1 submitted 6 November, 2017;
    originally announced November 2017.

  • k-server via multiscale entropic regularization

    Authors:

    Sebastien Bubeck,

    Michael B. Cohen,

    James R. Lee,

    Yin Tat Lee,

    Aleksander Madry

    Abstract:

    We present an $O((log k)^2)$-competitive randomized algorithm for the $k$-server problem on hierarchically separated trees (HSTs). This is the first $o(k)$-competitive randomized algorithm for which the competitive ratio is independent of the size of the underlying HST. Our algorithm is designed in the framework of online mirror descent where the mirror map is a multiscale entropy. When combined…
    ▽ More

    Submitted 3 November, 2017;
    originally announced November 2017.

  • Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning

    Authors:

    Wei-Han Lee,

    Ruby B. Lee

    Abstract:

    Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence,…
    ▽ More

    Submitted 30 August, 2017;
    originally announced August 2017.

  • Secure Pick Up: Implicit Authentication When You Start Using the Smartphone

    Authors:

    Wei-Han Lee,

    Xiaochen Liu,

    Yilin Shen,

    Hongxia Jin,

    Ruby B. Lee

    Abstract:

    We propose Secure Pick Up (SPU), a convenient, lightweight, in-device, non-intrusive and automatic-learning system for smartphone user authentication. Operating in the background, our system implicitly observes users’ phone pick-up movements, the way they bend their arms when they pick up a smartphone to interact with the device, to authenticate the users.
    Our SPU outperforms the state-of-the-ar…
    ▽ More

    Submitted 30 August, 2017;
    originally announced August 2017.

  • Interpretable Categorization of Heterogeneous Time Series Data

    Authors:

    Ritchie Lee,

    Mykel J. Kochenderfer,

    Ole J. Mengshoel,

    Joshua Silbermann

    Abstract:

    Understanding heterogeneous multivariate time series data is important in many applications ranging from smart homes to aviation. Learning models of heterogeneous multivariate time series that are also human-interpretable is challenging and not adequately addressed by the existing literature. We propose grammar-based decision trees (GBDTs) and an algorithm for learning them. GBDTs extend decision…
    ▽ More

    Submitted 26 January, 2018; v1 submitted 30 August, 2017;
    originally announced August 2017.

  • GitHub and Stack Overflow: Analyzing Developer Interests Across Multiple Social Collaborative Platforms

    Authors:

    Roy Ka-Wei Lee,

    David Lo

    Abstract:

    Increasingly, software developers are using a wide array of social collaborative platforms for software development and learning. In this work, we examined the similarities in developer’s interests within and across GitHub and Stack Overflow. Our study finds that developers share common interests in GitHub and Stack Overflow, on average, 39% of the GitHub repositories and Stack Overflow questions…
    ▽ More

    Submitted 24 August, 2017; v1 submitted 22 August, 2017;
    originally announced August 2017.

  • Quantification of De-anonymization Risks in Social Networks

    Authors:

    Wei-Han Lee,

    Changchang Liu,

    Shouling Ji,

    Prateek Mittal,

    Ruby Lee

    Abstract:

    The risks of publishing privacy-sensitive data have received considerable attention recently. Several de-anonymization attacks have been proposed to re-identify individuals even if data anonymization techniques were applied. However, there is no theoretical quantification for relating the data utility that is preserved by the anonymization techniques and the data vulnerability against de-anonymiza…
    ▽ More

    Submitted 14 March, 2017;
    originally announced March 2017.

  • Implicit Sensor-based Authentication of Smartphone Users with Smartwatch

    Authors:

    Wei-Han Lee,

    Ruby Lee

    Abstract:

    Smartphones are now frequently used by end-users as the portals to cloud-based services, and smartphones are easily stolen or co-opted by an attacker. Beyond the initial log-in mechanism, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data, whether in the cloud or in the smartphone. But attackers who have gained access to a logged-in…
    ▽ More

    Submitted 9 March, 2017;
    originally announced March 2017.

  • Multi-sensor authentication to improve smartphone security

    Authors:

    Wei-Han Lee,

    Ruby Lee

    Abstract:

    The widespread use of smartphones gives rise to new security and privacy concerns. Smartphone thefts account for the largest percentage of thefts in recent crime statistics. Using a victim’s smartphone, the attacker can launch impersonation attacks, which threaten the security of the victim and other users in the network. Our threat model includes the attacker taking over the phone after the user…
    ▽ More

    Submitted 9 March, 2017;
    originally announced March 2017.

  • Friendship Maintenance and Prediction in Multiple Social Networks

    Authors:

    Roy Ka-Wei Lee,

    Ee-Peng Lim

    Abstract:

    Due to the proliferation of online social networks (OSNs), users find themselves participating in multiple OSNs. These users leave their activity traces as they maintain friendships and interact with other users in these OSNs. In this work, we analyze how users maintain friendship in multiple OSNs by studying users who have accounts in both Twitter and Instagram. Specifically, we study the similar…
    ▽ More

    Submitted 2 March, 2017;
    originally announced March 2017.

  • MRFI Stream Arbitration: An Efficient Arbitration Scheme for NoC with Emerging Interconnect Technology

    Authors:

    Rex Lee,

    Yilei Li

    Abstract:

    An improved version of stream arbitration based on multiband RF interconnect (MRFI) is proposed. Thanks to the simultaneous multiple channel transmitting/receiving feature of MRFI, dynamic bandwidth allocation is achieved in the proposed arbitration algorithm. With dynamic bandwidth allocation, MRFI based arbitration can guarantee 100% channel bandwidth utilization, which is a significant improvem…
    ▽ More

    Submitted 14 February, 2017; v1 submitted 23 December, 2016;
    originally announced December 2016.

  • Performance Analysis of License Assisted Access LTE with Asymmetric Hidden Terminals

    Authors:

    H. R. Lee,

    H. Kim,

    H. J. Yang,

    J. T. Kim,

    S. K. Baek

    Abstract:

    License Assisted Access (LAA) LTE (LTE-LAA) is a new type of LTE that aggregates the licensed LTE bands with the unlicensed bands via carrier aggregation. To operate in unlicensed bands, LTE-LAA adopts the listen-before-talk policy and designs its channel access mechanism similar to WLAN’s DCF. In this paper, we consider an LAA network consisting of an LTE-LAA eNB coexisting with a Wi-Fi STA, and…
    ▽ More

    Submitted 13 December, 2016;
    originally announced December 2016.

  • Separators in region intersection graphs

    Authors:

    James R. Lee

    Abstract:

    For undirected graphs $G=(V,E)$ and $G_0=(V_0,E_0)$, say that $G$ is a region intersection graph over $G_0$ if there is a family of connected subsets ${ R_u subseteq V_0 : u in V }$ of $G_0$ such that ${u,v} in E iff R_u cap R_v neq emptyset$.
    We show if $G_0$ excludes the complete graph $K_h$ as a minor for some $h geq 1$, then every region intersection graph $G$ over $G_0$ with…
    ▽ More

    Submitted 27 July, 2017; v1 submitted 4 August, 2016;
    originally announced August 2016.

  • Recognizing Surgical Activities with Recurrent Neural Networks

    Authors:

    Robert DiPietro,

    Colin Lea,

    Anand Malpani,

    Narges Ahmidi,

    S. Swaroop Vedula,

    Gyusung I. Lee,

    Mija R. Lee,

    Gregory D. Hager

    Abstract:

    We apply recurrent neural networks to the task of recognizing surgical activities from robot kinematics. Prior work in this area focuses on recognizing short, low-level activities, or gestures, and has been based on variants of hidden Markov models and conditional random fields. In contrast, we work on recognizing both gestures and longer, higher-level activites, or maneuvers, and we model the map…
    ▽ More

    Submitted 22 June, 2016; v1 submitted 20 June, 2016;
    originally announced June 2016.

  • Re-enabling high-speed caching for LSM-trees

    Authors:

    Lei Guo,

    Dejun Teng,

    Rubao Lee,

    Feng Chen,

    Siyuan Ma,

    Xiaodong Zhang

    Abstract:

    LSM-tree has been widely used in cloud computing systems by Google, Facebook, and Amazon, to achieve high performance for write-intensive workloads. However, in LSM-tree, random key-value queries can experience long latency and low throughput due to the interference from the compaction, a basic operation in the algorithm, to caching. LSM-tree relies on frequent compaction operations to merge data…
    ▽ More

    Submitted 6 June, 2016;
    originally announced June 2016.

  • Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation

    Authors:

    Tianwei Zhang,

    Yinqian Zhang,

    Ruby B. Lee

    Abstract:

    In cloud computing, network Denial of Service (DoS) attacks are well studied and defenses have been implemented, but severe DoS attacks on a victim’s working memory by a single hostile VM are not well understood. Memory DoS attacks are Denial of Service (or Degradation of Service) attacks caused by contention for hardware memory resources on a cloud server. Despite the strong memory isolation tech…
    ▽ More

    Submitted 4 October, 2017; v1 submitted 10 March, 2016;
    originally announced March 2016.

  • Cloud Server Benchmarks for Performance Evaluation of New Hardware Architecture

    Authors:

    Hao Wu,

    Fangfei Liu,

    Ruby B. Lee

    Abstract:

    Adding new hardware features to a cloud computing server requires testing both the functionalities and the performance of the new hardware mechanisms. However, commonly used cloud computing server workloads are not well-represented by the SPEC integer and floating-point benchmark and Parsec suites typically used by the computer architecture community. Existing cloud benchmark suites for scale-out…
    ▽ More

    Submitted 4 March, 2016;
    originally announced March 2016.

  • SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network

    Authors:

    Roy Ka-Wei Lee,

    Yingjiu Li

    Abstract:

    The EPCglobal network is a computer network which allows supply chain companies to search for their unknown partners globally and share information stored in product RFID tags with each other. Although there have been quite a number of recent research works done to improve the security of EPCglobal Network, the existing access control solutions are not efficient and scalable. For instance, when a…
    ▽ More

    Submitted 18 September, 2015;
    originally announced September 2015.

  • Lower bounds on the size of semidefinite programming relaxations

    Authors:

    James R. Lee,

    Prasad Raghavendra,

    David Steurer

    Abstract:

    We introduce a method for proving lower bounds on the efficacy of semidefinite programming (SDP) relaxations for combinatorial problems. In particular, we show that the cut, TSP, and stable set polytopes on $n$-vertex graphs are not the linear image of the feasible region of any SDP (i.e., any spectrahedron) of dimension less than $2^{n^c}$, for some constant $c > 0$. This result yields the first…
    ▽ More

    Submitted 23 November, 2014;
    originally announced November 2014.



  • Source link

    Write a comment:
    *

    Your email address will not be published.