All Work
Title
Topic
-
Patent received for ‘molecularly-imprinted electrochemical sensors’ to better detect disease
Researchers in the College of Engineering have received a patent for “Molecularly-Imprinted Electrochemical Sensors.” These sensors are “useful for detecting volatile organic compounds associated with certain diseases or conditions and/or diagnosing certain diseases or conditions.” They are constructed from “layers of metal on a layer of silicon, and a layer of molecularly imprinted polymer in electrical communication with the … metal. … Methods of using the devices (e.g., to detect one or more analytes in a sample, to detect and/or diagnose a disease or condition in a subject), and methods of making the devices are also provided” in the patent.
-
Watch along with the Intellectual Property Awareness Summit
The Intellectual Property Awareness Summit, which “is a gathering of IP owners, creators, educators, lawyers, organizations and investors” took place on May 2nd “in conjunction with Northeastern University’s Center for Research Innovation.” It brought together individuals who shared “a common goal – to explore ways to make the benefits of IP rights, and the issues surrounding them, more apparent to people and society.” You can watch recordings of the summit’s panels and keynote address at YouTube.
-
Berent investigates ‘how the physical body gives rise to subjective experience’
“Consciousness presents a “hard problem” to scholars. At stake is how the physical body gives rise to subjective experience. Why consciousness is “hard”, however, is uncertain. One possibility is that the challenge arises from ontology—because consciousness is a special property/substance that is irreducible to the physical. Here, I show how the “hard problem” emerges from two intuitive biases that lie deep within human psychology: Essentialism and Dualism. To determine whether a subjective experience is transformative, people judge whether the experience pertains to one’s essence, and per Essentialism, one’s essence lies within one’s body.”
-
‘Fear-Related Psychophysiological Patterns Are Situation and Individual Dependent: A Bayesian model Comparison Approach’
“Is there a universal mapping of physiology to emotion, or do these mappings vary substantially by person or situation? Psychologists, philosophers, and neuroscientists have debated this question for decades. Most previous studies have focused on differentiating emotions on the basis of accompanying autonomic responses using analytical approaches that often assume within-category homogeneity. In the present study, we took an alternative approach to this question. We determined the extent to which the relationship between subjective experience and autonomic reactivity generalizes across, or depends upon, the individual and situation for instances of … fear.” Find the paper and full list of authors…
-
“Persisters represent a small subpopulation of cells that are tolerant of killing by antibiotics and are implicated in the recalcitrance of chronic infections to antibiotic therapy. One general theme has emerged regarding persisters formed by different bacterial species, namely, a state of relative dormancy characterized by diminished activity of antibiotic targets. Within this framework, a number of studies have linked persister formation to stochastic decreases in energy-generating components. … In this study, we screen knockouts in the main global regulators of Escherichia coli for their effect on persisters.” Find the paper and full list of authors at mBio.
-
Clark provides ‘A Generative AI Teaching Exercise for Marketing Classes’
Associate professor of marketing Bruce Clark has provided another perspective on the use of AI in the classroom. While some teachers and instructors might try to ban the tool, Clark “decided to run a couple of experiments.” After teaching with AI, Clark notes that students came away “recognizing its limitations.” Clark also suggests other potential class sessions, experiments and methodologies instructors might try with their students, while everyone adapts to how widespread this technology has become.
-
‘Collective Intelligence in Human-AI Teams: A Bayesian Theory of Mind Approach’
“We develop a network of Bayesian agents that collectively model the mental states of teammates from the observed communication. Using a generative computational approach to cognition, we make two contributions. First, we show that our agent could generate interventions that improve the collective intelligence of a human-AI team beyond what humans alone would achieve. Second, we develop a real-time measure of human’s theory of mind ability and test theories about human cognition.” Find the paper and full list of authors in the Proceedings of the AAAI Conference on Artificial Intelligence.
-
‘From Ensemble Clustering to Subspace Clustering: Cluster Structure Encoding’
“In this study, we propose a novel algorithm to encode the cluster structure by incorporating ensemble clustering (EC) into subspace clustering (SC). First, the low-rank representation (LRR) is learned from a higher order data relationship induced by ensemble K-means coding, which exploits the cluster structure in a co-association matrix of basic partitions (i.e., clustering results). Second, to provide a fast predictive coding mechanism, an encoding function parameterized by neural networks is introduced to predict the LRR derived from partitions.” Find the paper and full list of authors at IEEE Transactions on Neural Networks and Learning Systems.
-
‘Transforming Complex Problems Into K-Means Solutions’
“K-means is a fundamental clustering algorithm widely used in both academic and industrial applications. … Studies show the equivalence of K-means to principal component analysis, non-negative matrix factorization, and spectral clustering. However, these studies focus on standard K-means with squared euclidean distance. In this review paper, we unify the available approaches in generalizing K-means to solve challenging and complex problems. We show that these generalizations can be seen from four aspects: data representation, distance measure, label assignment and centroid updating.” Find the paper and full list of authors at IEEE Transactions on Pattern Analysis and Machine Intelligence.
-
‘GlueGen: Plug and Play Multi-Modal Encoders for X-to-Image Generation’
“Text-to-image (T2I) models based on diffusion processes have achieved remarkable success in controllable image generation using user-provided captions. However, the tight coupling between the current text encoder and image decoder in T2I models makes it challenging to replace or upgrade. Such changes often require massive fine-tuning or even training from scratch with the prohibitive expense. To address this problem, we propose GlueGen, which applies a newly proposed GlueNet model to align features from single-modal or multi-modal encoders with the latent space of an existing T2I model.” Find the paper and full list of authors at ArXiv.
-
‘Sturgeon-MKIII: Simultaneous Level and Example Playthrough Generation via Constraint Satisfaction With Tile Rewrite Rules’
“Completability is a key aspect of procedural level generation. In this work, we present a constraint-based approach to level generation for 2D tile-based games that simultaneously generates a level and an example playthrough of the level demonstrating its completability. … The mechanics are represented as constraints in the same problem along with the constraints used to generate the level itself. … We demonstrate the flexibilty of the system and of tile rewrite rules in several applications, including lock-and-key dungeons, platformers, puzzles and match-three style games.”
-
‘An Online Therapeutic Intervention for Veterans Patients Suffering With Chronic Pain’
“Chronic pain affects a large proportion of veterans. … However, opioid-based medication can lead to overuse or misuse. Thus, the Veteran’s Health Administration (VHA) is interested in non-pharmacological approaches that target both pain management and chronic pain-related functional issues. … This manuscript describes a project to develop and evaluate Veteran ACT for Chronic Pain (VACT-CP), an online therapy conducted by an embodied conversational agent (ECA) portraying a mental healthcare coach tasked to lessen the effects of chronic pain and improve functioning.” Find the paper and list of authors in IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and…
-
‘Continuously Accelerating Research’ through reproducible software for scientists
“Science is facing a software reproducibility crisis. Software powers experimentation, and fuels insights, yielding new scientific contributions. Yet, the research software is often difficult for other researchers to reproducibly run. … As software engineering researchers, we believe that it is our duty to create tools and processes that instill reproducibility, reusability and extensibility into research software. This paper outlines a vision for a community infrastructure that will bring the benefits of continuous integration to scientists developing research software.” Find the paper and full list of authors in the IEEE/ACM International Conference on Software Engineering proceedings.
-
‘Edge Grasp Network: A Graph-Based SE(3)-Invariant Approach to Grasp Detection’
“Given point cloud input, the problem of 6-DoF grasp pose detection is to identify a set of hand poses in SE(3) from which an object can be successfully grasped. This important problem has many practical applications. Here we propose a novel method and neural network model that enables better grasp success rates relative to what is available in the literature. The method takes standard point cloud data as input and works well with single-view point clouds observed from arbitrary viewing directions.” Find the paper and full list of authors in the IEEE International Conference on Robotics and Automation proceedings.
-
‘mmSpoof: Resilient Spoofing of Automotive Millimeter-Wave Radars Using Reflect Array’
“FMCW radars are integral to automotive driving for robust and weather-resistant sensing of surrounding objects. However, these radars are vulnerable to spoofing attacks that can cause sensor malfunction and potentially lead to accidents. Previous attempts at spoofing FMCW radars using an attacker device have not been very effective due to the need for synchronization between the attacker and the victim. We present a novel spoofing mechanism called mmSpoof that does not require synchronization and is resilient to various security features and countermeasures.” Find the paper and list of authors in the IEEE Symposium on Security and Privacy proceedings.
-
‘Fully Dynamic Matching: (2−2‾√)-Approximation in Polylog Update Time’
“We study maximum matchings in fully dynamic graphs, which are graphs that undergo both edge insertions and deletions. Our focus is on algorithms that estimate the size of maximum matching after each update while spending a small time. … We show that for any fixed ε>0, a (2−2‾√−ε) approximation can be maintained in poly(logn) time per update even in general graphs. Our techniques also lead to the same approximation for general graphs in two passes of the semi-streaming setting, removing a similar gap in that setting.” Find the paper and full list of authors at ArXiv.
-
‘McMini: A Programmable DPOR-Based Model Checker for Multithreaded Programs’
“Current model checkers hardwire the behavior of common thread operations, and do not recognize application-dependent thread paradigms or functions using simpler primitive operations. This introduces additional operations, causing current model checkers to be excessively slow. In addition, there is no mechanism to model the semantics of the actual thread wakeup policies implemented in the underlying thread library or operating system. Eliminating these constraints can make model checkers faster. … McMini is an extensible model checker based on DPOR (Dynamic Partial Order Reduction).” Find the paper and full list of authors at Programming Journal.
-
‘Type Prediction With Program Decomposition and Fill-in-the-Type Training’
“TypeScript and Python are two programming languages that support optional type annotations, which are useful but tedious to introduce and maintain. This has motivated automated type prediction: given an untyped program, produce a well-typed output program. Large language models (LLMs) are promising for type prediction, but there are challenges. … We address these challenges [with] OpenTau, a search-based approach for type prediction that leverages large language models. We propose a new metric for type prediction quality, give a tree-based program decomposition that searches a space of generated types and present fill-in-the-type fine-tuning.” Find the paper and full list of authors…
-
‘HVA_CPS Proposal: A Process for Hazardous Vulnerability Analysis in Distributed Cyber-Physical Systems’
“Society is increasingly dependent upon the use of distributed cyber-physical systems (CPSs), such as energy networks, chemical processing plants and transport systems. Such CPSs typically have multiple layers of protection to prevent harm to people or the CPS. However, if both the control and protection systems are vulnerable to cyber-attacks, an attack may cause CPS damage or breaches of safety. … This article identifies the attributes that a rigorous hazardous vulnerability analysis (HVA) process would require and compares them against related works. None fully meet the requirements for rigour.” Find the paper and full list of authors at PeerJ Computer Science.
-
‘Companion: A Pilot Randomized Clinical Trial … for Detecting and Modifying Daily Inactivity Among Adults >60 Years — Design and Protocol’
“Supervised personal training is most effective in improving the health effects of exercise in older adults. … Strategies to extend the effect of trainer contact outside of supervision and that integrate meaningful and intelligent two-way communication to provide complex and interactive problem solving may motivate older adults to “move more and sit less” and sustain positive behaviors to further improve health. This paper describes … a technology-based behavior-aware text-based virtual “Companion” … to deliver behavior change strategies using socially engaging, contextually salient, and tailored text message conversations in near-real-time.” Find the paper and full list of authors at MDPI Sensors.
-
‘SECDA-TFLite: A Toolkit for Efficient Development of FPGA-Based DNN Accelerators for Edge Inference’
“In this paper we propose SECDA-TFLite, a new open source toolkit for developing DNN hardware accelerators integrated within the TFLite framework. The toolkit leverages the principles of SECDA, a hardware/software co-design methodology, to reduce the design time of optimized DNN inference accelerators on edge devices with FPGAs. With SECDA-TFLite, we reduce the initial setup costs associated with integrating a new accelerator design within a target DNN framework, allowing developers to focus on the design.” Find the paper and full list of authors in the Journal of Parallel and Distributed Computing.
-
‘A Study of Multi-Factor and Risk-Based Authentication Availability’
“Password-based authentication (PBA) remains the most popular form of user authentication on the web despite its long-understood insecurity. Given the deficiencies of PBA, many online services support multi-factor authentication (MFA) and/or risk-based authentication (RBA) to better secure user accounts. … In this paper, we present a study of 208 popular sites in the Tranco top 5K that support account creation to understand the availability of MFA and RBA on the web … and how logging into sites through more secure SSO providers changes the landscape of user authentication security.” Find the paper and full list of authors at USENIX Security…
-
‘Wrapped in Story: The Affordances of Narrative for Citizen Science Games’
“Citizen science games enable public participation in scientific research, yet these games often struggle to engage wide audiences. As a potential solution, some game developers look to narrative as an experience-enhancing feature. … We investigated the effects of wrapping a story around the tutorial puzzles of the citizen science game Foldit. We found that the narrative increased the time players spent engaging with the game’s tutorial and its scientific puzzles but did not substantially affect their progress through the tutorial.” Find the paper and full list of authors in the 18th International Conference on the Foundations of Digital Games proceedings.
-
‘Iterative Soft Shrinkage Learning for Efficient Image Super-Resolution’
“Image super-resolution (SR) has witnessed extensive neural network designs from CNN to transformer architectures. However, prevailing SR models suffer from prohibitive memory footprint and intensive computations, which limits further deployment on edge devices. This work investigates the potential of network pruning for super-resolution to take advantage of off-the-shelf network designs and reduce the underlying computational overhead. … We adopt unstructured pruning with sparse models directly trained from scratch.” Find the paper and full list of authors at ArXiv.
-
‘UniControl: A Unified Diffusion Model for Controllable Visual Generation in the Wild’
“Achieving machine autonomy and human control often represent divergent objectives in the design of interactive AI systems. Visual generative foundation models such as Stable Diffusion show promise in navigating these goals, especially when prompted with arbitrary languages. However, they often fall short in generating images with spatial, structural or geometric controls. … In response, we introduce UniControl, a new generative foundation model that consolidates a wide array of controllable condition-to-image (C2I) tasks within a singular framework, while still allowing for arbitrary language prompts.” Find the paper and full list of authors at ArXiv.
-
‘Linearity of Relation Decoding in Transformer Language Models’
“Much of the knowledge encoded in transformer language models (LMs) may be expressed in terms of relations: relations between words and their synonyms, entities and their attributes, etc. We show that, for a subset of relations, this computation is well-approximated by a single linear transformation on the subject representation. Linear relation representations may be obtained by constructing a first-order approximation to the LM from a single prompt, and they exist for a variety of factual, commonsense, and linguistic relations.” Find the paper and full list of authors at ArXiv.
-
At the world’s largest conference of management scholars, Northeastern pulls out all the stops
Northeastern University faculty members presented research, won awards and hosted a reception for some of the 8,000 attendees who visited Boston for the 2023 Academy of Management Conference.
-
Academy of Management 2023 Publication Awards
Northeastern faculty and post-docs were the recipients of numerous awards at the 2023 Academy of Management Conference.