Title

Topic

  • ‘Covid-19 and the Law’ asks ‘the right questions’ about the pandemic and its effects

    Assistant professor of law and health sciences Katherine Kraschel has co-edited a new volume on the COVID-19 pandemic’s “enduring effect across the entire spectrum of law and policy.” According to the publisher’s website, “This collection provides a critical reflection on what changes the pandemic has already introduced and what its legacy may be. Chapters evaluate how healthcare and government institutions have succeeded and failed during this global ‘stress test’ and explore how … to ensure we are better prepared for future pandemics. This timely volume identifies the right questions to ask as we take stock of pandemic realities.”

    Learn more

    ,
  • ‘Assessing the Potential for the Surface Water and Ocean Topography (SWOT) Mission for Constituent Flux Estimations’

    ,

    “The recently launched Surface Water and Ocean Topography (SWOT) satellite will simultaneously measure river surface water widths, elevations, and slopes. These novel observations combined with assumptions for unobserved bathymetry and roughness enable the derivation of river discharge. … Here, we present how best to use SWOT data when it becomes live, including consideration of how best to accommodate or utilize the irregular flyover frequency of SWOT as it intersects with river reaches.” Find the paper and full list of authors at Frontiers in Earth Science.

    Learn more

    ,
  • ‘Bridging the Gap Between Collective Motility and Epithelial-Mesenchymal Transitions Through the Active Finite Voronoi Model’

    ,

    “We introduce an active version of the recently proposed finite Voronoi model of epithelial tissue. The resultant Active Finite Voronoi (AFV) model enables the study of both confluent and non-confluent geometries and transitions between them, in the presence of active cells. Our study identifies six distinct phases, characterized by aggregation-segregation, dynamical jamming-unjamming, and epithelial-mesenchymal transitions (EMT), thereby extending the behavior beyond that observed in previously studied vertex-based models.” Find the paper and full list of authors in Soft Matter.

    Learn more

    ,
  • Teaching AI to see in 3D: How Northeastern researchers are revolutionizing the field of computer vision

    Associate professor of electrical and computer engineering Sarah Ostadabbas, with Ph.D. students Le Jiang and Zhouping Wang, is developing a computer vision algorithm that can estimate three-dimensional human movement — in real time — from livestreamed, two-dimensional video sources.

    Learn more

    , ,
  • Maria Ivanova receives Global Green Mentor award at Climate Week NYC — but she’s just getting started

    Maria Ivanova, director of the School of Public Policy and Urban Affairs at Northeastern University, received the Global Green Mentor award during Climate Week NYC 2023 in recognition of her work in education and environmental governance.

    Learn more

    ,
  • ‘COSMOS-Web: An Overview of the JWST Cosmic Origins Survey’

    “We present the survey design, implementation and outlook for COSMOS-Web, a 255 hr treasury program conducted by the James Webb Space Telescope. … We anticipate COSMOS-Web’s legacy value to reach far beyond [its] scientific goals, touching many other areas of astrophysics, such as the identification of the first direct collapse black hole candidates, ultracool subdwarf stars in the Galactic halo and possibly the identification of z > 10 pair-instability supernovae. In this paper we provide an overview of the survey’s key measurements, specifications, goals and prospects for new discovery.” Find the paper and full list of authors at The Astrophysical…

    Learn more

  • ‘Altered Eye Movements During Reading With Simulated Central and Peripheral Visual Field Defects’

    “Although foveal vision provides fine spatial information, parafoveal and peripheral vision are also known to be important for efficient reading behaviors. Here we systematically investigate how different types and sizes of visual field defects affect the way visual information is acquired via eye movements during reading. … Our results showed differential impacts of central and peripheral vision loss on reading behaviors while lending further support for the importance of foveal and parafoveal vision in reading. These apparently deviated oculomotor behaviors may … reflect optimal reading strategies to compensate for the loss of visual information.” Find the paper and authors list…

    Learn more

  • ‘Shotgun … Synthesis Approach Enables the Discovery of Small-Molecule Inhibitors Against Pathogenic Free-Living Amoeba Glucokinases’

    “Pathogenic free-living amoebae (pFLA) can cause life-threatening central nervous system (CNS) infections and warrant the investigation of new chemical agents to combat the rise of infection from these pathogens. … Herein, we used our previously demonstrated multifragment kinetic target-guided synthesis (KTGS) screening strategy to identify inhibitors against pFLA glucokinases. … This work demonstrates the utility of KTGS to identify small-molecule binders for biological targets where resolved X-ray crystal structures are not readily accessible.” Find the paper and full list of authors at ACS Infectious Diseases.

    Learn more

    ,
  • ‘Mainstream News Articles Co-Shared With Fake News Buttress Misinformation Narratives’

    “Most prior and current research examining misinformation spread on social media focuses on reports published by ‘fake’ news sources. These approaches fail to capture another potential form of misinformation with a much larger audience: factual news from mainstream sources (‘real’ news) repurposed to promote false or misleading narratives. … We find that certain articles from reliable outlets are shared by a disproportionate number of users who also shared fake news on Twitter. … We show that co-shared articles contain existing misinformation narratives at a significantly higher rate.” Find the paper and full list of authors at ArXiv.

    Learn more

    , ,
  • ‘From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers’

    “We present the first open-source tool capable of efficiently sniffing 5G control channels, 5GSniffer and demonstrate its potential to conduct attacks on users privacy. 5GSniffer builds on our analysis of the 5G RAN control channel exposing side-channel leakage. We note that decoding the 5G control channels is significantly more challenging than in LTE. … We devise a set of techniques to achieve real-time control channels sniffing (over three orders of magnitude faster than brute-forcing).” Find the paper and full list of authors at the 2023 IEEE Symposium on Security and Privacy.

    Learn more

    ,
  • ‘A Computational Model of Coping and Decision Making in High-Stress, Uncertain Situations: An Application to Hurricane Evacuation Decisions’

    “Modeling and predicting people’s behavior in [stressful, emotion-evoking situations] is a critical research topic. To that end, we propose a computational model of coping that casts Lazarus’s theory of coping into a Partially Observable Markov Decision Process (POMDP) framework. … We evaluated the model’s assumptions in the context of a high-stress situation, hurricanes. … The results support the model’s assumptions showing that the proposed features are significantly associated with the evacuation decisions and people change their beliefs and goals to cope with the situation.” Find the paper and full list of authors at IEEE Transactions on Affective Computing.

    Learn more

  • ‘SABRE: Robust Bayesian Peer-to-Peer Federated Learning’

    “We introduce SABRE, a novel framework for robust variational Bayesian peer-to-peer federated learning. We analyze the robustness of the known variational Bayesian peer-to-peer federated learning framework (BayP2PFL) against poisoning attacks and subsequently show that BayP2PFL is not robust against those attacks. The new SABRE aggregation methodology is then devised to overcome the limitations of the existing frameworks. SABRE works well in non-IID settings, does not require the majority of the benign nodes over the compromised ones, and even outperforms the baseline algorithm in benign settings.” Find the paper and full list of authors at ArXiv.

    Learn more

    ,
  • ‘Investigating Large Language Models’ Perception of Emotion Using Appraisal Theory’

    “As more people interact with [Large Language Models like ChatGPT], improving our understanding of these black box models is crucial, especially regarding their understanding of human psychological aspects. In this work, we investigate their emotion perception through the lens of appraisal and coping theory using the Stress and Coping Process Questionaire (SCPQ). … The results show that LLMs’ responses are similar to humans in terms of dynamics of appraisal and coping, but their responses did not differ along key appraisal dimensions as predicted by the theory and data.” Find the paper and full list of authors at ArXiv.

    Learn more

    ,
  • ‘An Efficient Algorithm for Fair Multi-Agent Multi-Armed Bandit With Low Regret’

    “Recently a multi-agent variant of the classical multi-armed bandit was proposed to tackle fairness issues in online learning. Inspired by a long line of work in social choice and economics, the goal is to optimize the Nash social welfare instead of the total utility. Unfortunately previous algorithms either are not efficient or achieve sub-optimal regret in terms of the number of rounds. We propose a new efficient algorithm with lower regret than even previous inefficient ones.” Find the paper and full list of authors in the Proceedings of the AAAI Conference on Artificial Intelligence.

    Learn more

  • ‘Streaming Submodular Maximization With Differential Privacy’

    “In this work, we study the problem of privately maximizing a submodular function in the streaming setting. … When the size of the data stream drawn from the domain of the objective function is large or arrives very fast, one must privately optimize the objective within the constraints of the streaming setting. We establish fundamental differentially private baselines for this problem and then derive better trade-offs between privacy and utility for the special case of decomposable submodular functions.” Find the paper and full list of authors in Proceedings of Machine Learning Research.

    Learn more

  • ‘DomainNet: Homograph Detection and Understanding in Data Lake Disambiguation’

    , ,

    “Modern data lakes are heterogeneous in the vocabulary that is used to describe data. … How can we determine if a data value occurring more than once in the lake has different meanings and is therefore a homograph? While word and entity disambiguation have been well studied, … we show that data lakes provide a new opportunity for disambiguation of data values. … We introduce DomainNet, which efficiently represents this network, and investigate to what extent it can be used to disambiguate values without requiring any supervision.” Find the paper and full list of authors in ACM Transactions on Database…

    Learn more

  • ‘8th International Workshop on Mental Health and Well-being: Sensing and Intervention’

    “Mental health and well-being are critical components of overall health. … Detecting symptoms of mental illness early-on and delivering interventions to prevent and/or manage symptoms can improve health and well-being outcomes. Ubiquitous systems are increasingly playing a central role in uncovering clinically relevant contextual information on mental health. … The goal of this workshop is to bring together researchers, practitioners, and industry professionals interested in identifying, articulating, and addressing such issues and opportunities.” Find the paper and authors list in the 2023 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2023 ACM International Symposium on Wearable Computing…

    Learn more

    ,
  • ‘Black-box Attacks Against Neural Binary Function Detection’

    ,

    “Binary analyses based on deep neural networks (DNNs), or neural binary analyses (NBAs), have become a hotly researched topic in recent years. DNNs have been wildly successful at pushing the performance and accuracy envelopes in the natural language and image processing domains. … [However,] in this paper, we empirically demonstrate that the current state of the art in neural function boundary detection is vulnerable to both inadvertent and deliberate adversarial attacks.” Find the paper and full list of authors in the Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses.

    Learn more

    ,
  • ‘Accelerating Finite Field Arithmetic for Homomorphic Encryption on GPUs’

    “Fully homomorphic encryption (FHE) is a rapidly developing technology that enables computation directly on encrypted data, making it a compelling solution for security in cloud-based systems. In addition, modern FHE schemes are believed to be resistant to quantum attacks. Although FHE offers unprecedented potential for security, current implementations suffer from prohibitively high latency. … The parallel processing capabilities provided by modern GPUs make them compelling candidates to target these highly parallelizable workloads. In this article, we discuss methods to accelerate polynomial multiplication with GPUs, with the goal of making FHE practical.” Find the paper and list of authors at IEEE…

    Learn more

  • ‘Mapping the Typographic Latent Space of Digits’

    ,

    “Since the advancement of handwritten text to typefaces on a computer, the human mind has evolved towards corresponding various typefaces as norms of comprehension. … Currently, the PANOSE system, developed in 1998, is the most widely used and accepted method for classifying typefaces based on 10 visual attributes. In this work, we employ Disentangled Beta-VAE’s, in an unsupervised learning approach, to map the latent feature space with a dataset of MNIST Style Typographic Images (TMNIST-Digit) of 0-9 digits across 2990 unique font styles.” Find the paper and full list of authors at Open Review.

    Learn more

  • ‘StereoVoxelNet: Real-Time Obstacle Detection Based on Occupancy Voxels from a Stereo Camera Using Deep Neural Networks’

    , ,

    “Obstacle detection is a safety-critical problem in robot navigation, where stereo matching is a popular vision-based approach. While deep neural networks have shown impressive results in computer vision, most of the previous obstacle detection works only leverage traditional stereo matching techniques to meet the computational constraints for real-time feedback. This paper proposes a computationally efficient method that employs a deep neural network to detect occupancy from stereo images directly. … Our approach extracts the compact obstacle distribution based on volumetric representations.” Find the paper and full list of authors in the 2023 IEEE International Conference on Robotics and Automation proceedings.

    Learn more

    ,
  • ‘Lilac: A Modal Separation Logic for Conditional Probability’

    ,

    “We present Lilac, a separation logic for reasoning about probabilistic programs where separating conjunction captures probabilistic independence. Inspired by an analogy with mutable state where sampling corresponds to dynamic allocation, we show how probability spaces over a fixed, ambient sample space appear to be the natural analogue of heap fragments, and present a new combining operation on them such that probability spaces behave like heaps and measurability of random variables behaves like ownership. This combining operation forms the basis for our model of separation, and produces a logic with many pleasant properties.” Find the paper and authors list at ArXiv.

    Learn more

  • ‘Style2Fab: Functionality-Aware Segmentation for Fabricating Personalized 3D Models With Generative AI’

    “With recent advances in Generative AI, it is becoming easier to automatically manipulate 3D models. However, current methods tend to apply edits to models globally, which risks compromising the intended functionality of the 3D model when fabricated in the physical world. For example, modifying functional segments in 3D models, such as the base of a vase, could break the original functionality of the model, thus causing the vase to fall over. We introduce a method for automatically segmenting 3D models into functional and aesthetic elements.” Find the paper and full list of authors at ArXiv.

    Learn more

    ,
  • ‘High-Throughput Microscopy Image Deblurring With Graph Reasoning Attention Network’

    “High-quality (HQ) microscopy images afford more detailed information for modern life science research and quantitative image analyses. However, in practice, HQ microscopy images are not commonly available or suffer from blurring artifacts. Compared with natural images, such low-quality (LQ) microscopy ones often share some visual characteristics: more complex structures, less informative background, and repeating patterns. … To address those problems, we collect HQ electron microscopy and histology datasets and propose a graph reasoning attention network (GRAN).” Find the paper and full list of authors in the 2023 IEEE 20th International Symposium on Biomedical Imaging proceedings.

    Learn more

  • ‘MultiPL-E: A Scalable and Polyglot Approach to Benchmarking Neural Code Generation’

    “Large language models have demonstrated the ability to generate both natural language and programming language text. Although contemporary code generation models are trained on corpora with several programming languages, they are tested using benchmarks that are typically monolingual. The most widely used code generation benchmarks only target Python, so there is little quantitative evidence of how code generation models perform on other programming languages. We propose MultiPL-E, a system for translating unit test-driven code generation benchmarks to new languages.” Find the paper and full list of authors at IEEE Transactions on Software Engineering.

    Learn more

  • ‘NeRFInvertor: High Fidelity NeRF-GAN Inversion for Single-Shot Real Image Animation’

    “Nerf-based Generative models have shown impressive capacity in generating high-quality images with consistent 3D geometry. Despite successful synthesis of fake identity images randomly sampled from latent space, adopting these models for generating face images of real subjects is still a challenging task due to its so-called inversion issue. In this paper, we propose a universal method to surgically finetune these NeRF-GAN models in order to achieve high-fidelity animation of real subjects only by a single image.” Find the paper and full list of authors in the 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition proceedings.

    Learn more

  • ‘Viper: A Fast Snapshot Isolation Checker’

    “Snapshot isolation (SI) is supported by most commercial databases and is widely used by applications. However, checking SI today — given a set of transactions, checking if they obey SI — is either slow or gives up soundness. We present viper, an SI checker that is sound, complete and fast. Viper checks black-box databases and hence is transparent to both users and databases. To be fast, viper introduces BC-polygraphs, a new representation of transaction dependencies.” Find the paper and full list of authors in the Proceedings of the Eighteenth European Conference on Computer Systems.

    Learn more

  • ‘PAC-Learning for Strategic Classification’

    ‘The study of strategic or adversarial manipulation of testing data to fool a classifier has attracted much recent attention. Most previous works have focused on two extreme situations where any testing data point either is completely adversarial or always equally prefers the positive label. In this paper, we generalize both of these through a unified framework by considering strategic agents with heterogenous preferences, and introduce the notion of strategic VC-dimension (SVC) to capture the PAC-learnability in our general strategic setup. SVC provably generalizes the recent concept of adversarial VC-dimension (AVC).” Find the paper and full list of authors at JMLR.

    Learn more

  • ‘Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues’

    “Wi-Fi devices routinely queue frames at various layers of the network stack before transmitting, for instance, when the receiver is in sleep mode. In this work, we investigate how Wi-Fi access points manage the security context of queued frames. By exploiting power-save features, we show how to trick access points into leaking frames in plaintext, or encrypted using the group or an all-zero key. We demonstrate resulting attacks against several open-source network stacks.” Find the paper and full list of authors in the 32nd USENIX Security Symposium proceedings.

    Learn more

    ,
  • ‘One Tree to Rule Them All: Poly-Logarithmic Universal Steiner Tree’

    “A spanning tree T of graph G is a ρ-approximate universal Steiner tree (UST) for root vertex r if, for any subset of vertices S containing r, the cost of the minimal subgraph of T connecting S is within a ρ factor of the minimum cost tree connecting S in G. … We settle [several] open questions by giving polynomial-time algorithms for computing both O(log7n)-approximate USTs and poly-logarithmic strong sparse partition hierarchies.” Find the paper and full list of authors at ArXiv.

    Learn more