All Work
Title
Topic
-
Protecting wireless systems from adversarial attacks
“Electrical and computer engineering William Lincoln Smith Professor Tommaso Melodia, assistant professor Francesco Restuccia and assistant research professor Salvatore D’oro were awarded a patent for ‘Neural network for adversarial deep learning in wireless systems.'”
-
‘Exploring User Perceptions of Using An LLM-Based Conversational Assistant [as a] Cooking Partner’
Large language models (LLMs) have the ability to help in daily tasks. “In this research, we chose cooking, a complex daily task, as a scenario to investigate people’s successful and unsatisfactory experiences while receiving assistance from an LLM-based CA, Mango Mango. We discovered that participants value the system’s ability to provide extensive information beyond the recipe, offer customized instructions based on context, and assist them in dynamically planning the task. However, they expect the system to be more adaptive to oral conversation and provide more suggestive responses to keep users actively involved.” Find the paper and authors list at ArXiv.
-
‘Depredation Influences Anglers’ Perceptions on Soastal Shark Management and Conservation’
“Overfishing, habitat degradation, and climate change have caused declines in shark populations throughout the world’s oceans. … Reported increases in shark depredation within the last several years have begun to erode angler support for shark conservation, potentially undermining decades of previous work. To address these concerns, we implemented a GoM-wide online survey to characterize the impact of depredation on recreational reef fish anglers’ fishing satisfaction and perceptions of shark management and conservation.” Find the paper and full list of authors at Frontiers in Conservation Science.
-
‘Design and Characterization of Model Systems that Promote and Disrupt Transparency of Vertebrate Crystallins In Vitro’
“Positioned within the eye, the lens supports vision by transmitting and focusing light onto the retina. As an adaptive glassy material, the lens is constituted primarily by densely-packed, polydisperse crystallin proteins that organize to resist aggregation and crystallization at high volume fractions, yet the details of how crystallins coordinate with one another to template and maintain this transparent microstructure remain unclear. The role of individual crystallin subtypes (α, β, and γ) and paired subtype compositions … is explored using combinations of spectrophotometry, hard-sphere simulations, and surface pressure measurements.” Find the paper and full list of authors in Advanced Science.
-
Improving RF resonator technology
“Electrical and computer engineering associate professor Cristian Casella and electrical engineering student Xuanyi Zhao, PhD’23, were awarded a patent for ‘Two Dimensional Rod Resonator for RF Filtering.'”
-
‘Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the Wild’
“IoT devices are increasingly used in consumer homes. Despite recent works in characterizing IoT TLS usage for a limited number of in-lab devices, there exists a gap in quantitatively understanding TLS behaviors from devices in the wild and server-side certificate management. To bridge this knowledge gap, we conduct a new measurement study by focusing on the practice of device vendors, through a crowdsourced dataset of network traffic. … Our study highlights potential concerns in the TLS/PKI practice by IoT device vendors.” Find the paper and full list of authors in the Proceedings of the 2023 ACM on Internet Measurement Conference.
-
‘BehavIoT: Measuring Smart Home IoT Behavior Using Network-Inferred Behavior Models’
“Smart home IoT platforms are typically closed systems, meaning that there is poor visibility into device behavior. Understanding device behavior is important not only for determining whether devices are functioning as expected, but also can reveal implications for privacy, [security and safety]. … In this work, we demonstrate that the vast majority of IoT behavior can indeed be modeled, using a novel multi-dimensional approach that relies only on the (often encrypted) network traffic exchanged by IoT devices.” Find the paper and full list of authors in the Proceedings of the 2023 ACM on Internet Measurement Conference.
-
‘Detection of Sexism on Social Media With Multiple Simple Transformers’
“Social media platforms have become virtual communication channels, allowing users to voice their thoughts and opinions. However, this openness and features of anonymity have also given rise to the proliferation of harmful and offensive content, including sexism. This research aims at proposing a methodology and explores the use of different simple transformers. …The proposed approach has great scope for the efficient detection of sexist content on social media, aiding in the development of effective content moderation systems.” Find the paper and full list of authors at the CEUR Workshop Proceedings.
-
‘Localizing Traffic Differentiation’
“Network neutrality is important for users, content providers, policymakers, and regulators interested in understanding how network providers differentiate performance. … In prior work, WeHe detects differentiation via end-to-end throughput measurements between a client and server but does not isolate the network responsible for it. Differentiation can occur anywhere on the network path between endpoints. … We present a system, WeHeY, built atop WeHe, that can localize traffic differentiation, i.e., obtain concrete evidence that the differentiation happened within the client’s ISP.” Find the paper and full list of authors in the 2023 ACM on Internet Measurement Conference proceedings.
-
‘Decoupled Fitness Criteria for Reactive Systems’
“The correctness problem for reactive systems has been thoroughly explored and is well understood. Meanwhile, the efficiency problem for reactive systems has not received the same attention. Indeed, one correct system may be less fit than another correct system and determining this manually is challenging and often done ad hoc. We propose a novel and general framework which automatically assigns comparable fitness scores to reactive systems using interpretable parameters that are decoupled from the system being evaluated.” Find the paper and full list of authors in Software Engineering and Formal Methods.
-
‘Pyramid Attention Network for Image Restoration’
“Self-similarity refers to the image prior widely used in image restoration algorithms that small but similar patterns tend to occur at different locations and scales. However, recent advanced deep convolutional neural network-based methods for image restoration do not take full advantage of self-similarities by relying on self-attention neural modules that only process information at the same scale. To solve this problem, we present a novel Pyramid Attention module for image restoration, which captures long-range feature correspondences from a multi-scale feature pyramid.” Find the paper and full list of authors at the International Journal of Computer Vision.
-
‘Layout Sequence Prediction From Noisy Mobile Modality’
“Trajectory prediction plays a vital role in understanding pedestrian movement for applications such as autonomous driving and robotics. Current trajectory prediction models depend on long, complete, and accurately observed sequences from visual modalities. Nevertheless, real-world situations often involve obstructed cameras, missed objects or objects out of sight due to environmental factors, leading to incomplete or noisy trajectories. To overcome these limitations, we propose LTrajDiff, a novel approach that treats objects obstructed or out of sight as equally important as those with fully visible trajectories.” Find the paper and full list of authors at ArXiv.
-
‘When Collaborative Filtering is not Collaborative: Unfairness of PCA for Recommendations’
“We study the fairness of dimensionality reduction methods for recommendations. We focus on the established method of principal component analysis (PCA), which identifies latent components and produces a low-rank approximation via the leading components while discarding the trailing components. Prior works have defined notions of “fair PCA”; however, these definitions do not answer the following question: what makes PCA unfair? We identify two underlying mechanisms of PCA that induce unfairness at the item level.” Find the paper and full list of authors at ArXiv.
-
‘An Energy-Efficient Neural Network Accelerator With Improved Protections Against Fault-Attacks’
“Embedded neural network (NN) implementations are susceptible to misclassification under fault attacks. Injecting strong electromagnetic (EM) pulses is a non-invasive yet detrimental attack that affects the NN operations by (i) causing faults in the NN model/inputs while being read by the NN computation unit and (ii) corrupting NN computations results to cause misclassification eventually. This paper presents the first ASIC demonstration of an energy-efficient NN accelerator with inbuilt fault attack detection.” Find the paper and full list of authors in the European Conference on Solid-State Circuits proceedings.
-
‘CAFA-Evaluator: A Python Tool for Benchmarking Ontological Classification Methods’
“We present CAFA-evaluator, a powerful Python program designed to evaluate the performance of prediction methods on targets with hierarchical concept dependencies. It generalizes multi-label evaluation to modern ontologies where the prediction targets are drawn from a directed acyclic graph and achieves high efficiency by leveraging matrix computation and topological sorting. The program requirements include a small number of standard Python libraries, making CAFA-evaluator easy to maintain. … Owing to its reliability and accuracy, the organizers have selected CAFA-evaluator as the official CAFA evaluation software.” Find the paper and full list of authors at ArXiv.
-
‘FL4IoT: IoT Device Fingerprinting and Identification Using Federated Learning’
Unidentified devices in a network can result in devastating consequences. It is, therefore, necessary to fingerprint and identify IoT devices connected to private or critical networks. With the proliferation of massive but heterogeneous IoT devices, it is getting challenging to detect vulnerable devices connected to networks. … Federated learning (FL) has been regarded as a promising paradigm for decentralized learning and has been applied in many different use cases. … In this article, we propose a privacy-preserved IoT device fingerprinting and identification mechanisms using FL.” Find the paper and full list of authors at ACM Transactions on Internet of Things.
-
‘A Unified Dynamic Model for the Decomposition of Skin Conductance and the Inference of Sudomotor Nerve Activities’
“In behavioral health informatics, inferring an individual’s psychological state from physiological and behavioral data is fundamental. A key physiological signal in this endeavor is electrodermal activity (EDA), often quantified as skin conductance (SC), known for its sensitivity to a variety of psychological stimuli. Traditional methods to analyze skin conductance, such as the trough-to-peak method, often result in imprecise estimations due to overlapping skin conductance responses. … This paper introduces a novel fourth order dynamic system to model the temporal dynamics of skin conductance, unifying both the tonic level and phasic response.” Find the paper and full list of authors at…
-
‘KnitScript: A Domain-Specific Scripting Language for Advanced Machine Knitting’
“Knitting machines can fabricate complex fabric structures using robust industrial fabrication machines. However, machine knitting’s full capabilities are only available through low-level programming languages that operate on individual machine operations. We present KnitScript, a domain-specific machine knitting scripting language that supports computationally driven knitting designs. KnitScript provides a comprehensive virtual model of knitting machines, giving access to machine-level capabilities as they are needed while automating a variety of tedious and error-prone details.” Find the paper and full list of authors in the Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology.
-
‘Demonstration of Style2Fab: Functionality-Aware Segmentation for Fabricating Personalized 3D Models with Generative AI’
“With recent advances in Generative AI, it is becoming easier to automatically manipulate 3D models. However, current methods tend to apply edits to models globally, which risks compromising the intended functionality of the 3D model when fabricated in the physical world. … We introduce Style2Fab, a system for automatically segmenting 3D models into functional and aesthetic elements, and selectively modifying the aesthetic segments, without affecting the functional segments.” Find the paper and full list of authors in the Adjunct Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology.
-
‘A Feasibility Study on the Use of Audio-Based Ecological Momentary Assessment With Persons With Aphasia’
“We describe a smartphone/smartwatch system to evaluate anomia in individuals with aphasia by using audio-recording-based ecological momentary assessments. The system delivers object-naming assessments to a participant’s smartwatch, whereby a prompt signals the availability of images of these objects on the watch screen. Participants attempt to speak the names of the images that appear on the watch display out loud and into the watch as they go about their lives.” Find the paper and full list of authors in the Proceedings of the 25th International ACM SIGACCESS Conference on Computers and Accessibility.
-
‘Memory Efficient Multithreaded Incremental Segmented Sieve Algorithm’
“Prime numbers are fundamental in number theory and play a significant role in various areas, from pure mathematics to practical applications, including cryptography. In this contribution, we introduce a multithreaded implementation of the Segmented Sieve algorithm. In our implementation, instead of handling large prime ranges in one iteration, the sieving process is broken down incrementally, which theoretically eliminates the challenges of working with large numbers and can reduce memory usage, providing overall more efficient multi-core utilization over extended computations.” Find the paper and full list of authors at ArXiv.
-
‘OmniControl: Control Any Joint at Any Time for Human Motion Generation’
“We present a novel approach named OmniControl for incorporating flexible spatial control signals into a text-conditioned human motion generation model based on the diffusion process. Unlike previous methods that can only control the pelvis trajectory, OmniControl can incorporate flexible spatial control signals over different joints at different times with only one model. Specifically, we propose analytic spatial guidance that ensures the generated motion can tightly conform to the input control signals. At the same time, realism guidance is introduced to refine all the joints to generate more coherent motion.” Find the paper and full list of authors at ArXiv.
-
Professor Yi Zheng’s efforts to share science with his community — and the world — garner a Scientist of the Year award
Associate professor of mechanical and industrial engineering Yi Zheng received the 2022 Scientist of the Year award from the New England Chinese American Alliance, both for his pioneering work in electricity-free cooling and water filtration systems and for his deep civic engagement.
-
Ergun elected INFORMS fellow
“Ozlem Ergun, College of Engineering distinguished professor in mechanical and industrial engineering, was elected a Fellow of the Institute for Operations Research and the Management Sciences (INFORMS) for her applications of O.R. methods to humanitarian and health systems, emergency response and transportation and logistics problems and establishing a community of O.R. professionals with interest in public programs.”
-
‘A Time-Dependent Momentum-Resolved Scattering Approach to Core-Level Spectroscopies’
While new light sources allow for unprecedented resolution in experiments with X-rays, a theoretical understanding of the scattering cross-section is lacking. … This requires a knowledge of a full set of eigenstates in order to account for all intermediate processes away from equilibrium. … In this work, we present an alternative paradigm, recasting the problem in the time domain and explicitly solving the time-dependent Schrödinger equation without the limitations of perturbation theory: a faithful simulation of the scattering processes taking place in actual experiments, including photons and core electrons.” Find the paper and full list of authors at SciPost Physics.
-
‘Contrasting Ocean — Atmosphere Dynamics Mediate Flood Hazard Across the Mississippi River Basin’
“The Mississippi River basin drains nearly one-half of the contiguous United States. … Here, we use climate reanalysis and river gauge data to document the evolution of floods on the Missouri and Ohio Rivers—the two largest tributaries of the Mississippi River—and how they are influenced by major modes of climate variability centered in the Pacific and Atlantic Oceans. We show that the largest floods on these tributaries are preceded by the advection and convergence of moisture from the Gulf of Mexico following distinct atmospheric mechanisms.” Find the paper and full list of authors at Earth Interactions.
-
Army Research Laboratories sponsor cybersecurity research and robustness in additive manufacturing
In a collaborative effort, professors from the College of Engineering “were awarded a $1.5M research grant by the Army Research Laboratories (ARL) to spearhead innovative initiatives in cybersecurity and enhancement of mechanical robustness in parts and coatings produced through Cold Spray Additive Manufacturing. … The research will focus on implementing cutting-edge cybersecurity measures and improving the mechanical durability of components and coatings manufactured using Cold Spray Additive Manufacturing techniques. This interdisciplinary approach will provide solutions to critical challenges in both national defense and industrial applications.”