Title

Topic

  • ‘Adolescent Friendship, Cross-Sexuality Ties and Attitudes Toward Sexual Minorities: A Social Network Approach to Intergroup Contact’

    “Social ties between members of in- and outgroups are theorized to reduce individual levels of prejudice. However, instances of intergroup contact are not isolated events; cross-group interactions are embedded in broader networks defined by various social processes that guide the formation and maintenance of interpersonal relationships. This project reconsiders the potential benefits of intergroup contact by applying a network perspective to examine whether friendships between youth of different sexualities can shape individuals’ homophobic attitudes.” Find the paper and full list of authors in Social Science Research.

    Learn more

    ,
  • Developing a Computer Model for Carbon Dioxide Conversion

    , ,

    “Chemical engineering associate professor Richard West … assistant professor Magda Barecka and … assistant professor Qing Zhao were awarded a $500,000 grant for ‘Accelerating Electrocatalyst Innovation: High-Throughput Automated Microkinetic, Multiscale and Techno-economic Modeling’ as part of the Creating Revolutionary Energy and Technology Endeavors (CREATE) Exploratory Topic managed by the Advanced Research Projects Agency-Energy (ARPA-E). The objective of CREATE Exploratory Topic is to identify and support disruptive energy-related technologies and have the potential for large-scale impact. Northeastern University will develop a computer model that could identify new avenues for producing essential chemical ingredients using carbon dioxide, a waste product of fossil…

    Learn more

    ,
  • ACM Distinguished Papers Award for paper on adversarial attacks in deep learning models

    ,

    “Computer engineering graduate students Ruyi Ding, PhD’24, Cheng Gongye, PhD’23, Siyue Wang, PhD’22, mathematics professor A. Adam Ding and electrical and computer engineering professor Yunsi Fei were awarded a Distinguished Papers Award at the 18th ACM ASIA Conference on Computer and Communications Security for their paper on ‘EMShepherd: Detecting Adversarial Samples via Side-channel Leakage.'”

    Learn more

    , ,
  • Lin receives NSF grant for ‘Dynamic Scene Understanding’ in computer vision

    ,

    “Electrical and computer engineering associate professor Xue ‘Shelley’ Lin, in collaboration with Khoury College of Computer Science assistant professor Huaizu Jiang, was awarded a $600K NSF grant for ‘Toward Efficient and Robust Dynamic Scene Understanding Based on Visual Correspondences.'”

    Learn more

    ,
  • ‘Does Ukraine Have Kompromat on Joe Biden?’ asks Abrahms

    Associate professor of political science in the College of Social Science and Humanities and the D’Amore-McKim School of Business Max Abrahms raises the question of whether Ukraine may have compromising information (“kompromat”) on Joe Biden or his family. The suspicions Abrahms raise stem from the “many millions of dollars” that were paid to Hunter Biden “by the shady Ukrainian energy firm Burisma,” Joe Biden’s subsequent firing of Victor Shokin, Ukrainian general prosecutor “who had begun an investigation into the Burisma-Hunter gravy train.”

    Learn more

  • ‘A Tool for Mutation Analysis in Racket’

    ,

    “Racket is a functional programming language that is used to teach CS1 at many high schools and colleges. … In order to evaluate [mutation analysis’s] efficacy in our college’s introductory programming courses, we created a prototype mutation analysis tool for Racket. We describe the design and features of the tool and perform a feasibility study using two assignments from an intro CS course where student test suite thoroughness was evaluated by hand by human graders.” Find the paper and full list of authors in the 2023 IEEE International Conference on Software Testing Verification and Validation Workshop.

    Learn more

    ,
  • ‘SliceLens: Guided Exploration of Machine Learning Datasets’

    “SliceLens is a tool for exploring labeled, tabular, machine learning datasets. To explore a dataset, the user selects combinations of features in the dataset that they are interested in. The tool splits those features into bins and then visualizes the label distributions for the subsets of data created by the intersections of the bins. SliceLens guides the user in determining which feature combinations to explore. Guidance is based on a user-selected rating metric, which assigns a score to the subsets created by a given combination of features.”

    Learn more

  • ‘”Everyone is Covered”: Exploring the Role of Online Interactions in Facilitating Connection and Social Support in Black Churches’

    “Faith institutions provide social support and community care for many in the United States (U.S.). Notably, churches with predominantly Black populations have served as a site for social change and care provision. … However, the pandemic has emphasised how localising these care networks in physical spaces can limit access to social support. … Through interviews and focus groups with nine church members, we explore how hybrid faith communities that bridge offline and online contexts can enable social support and care provision.” Find the paper and full list of authors in the 2023 CHI Conference on Human Factors in Computing Systems…

    Learn more

  • ‘Game Level Blending Using a Learned Level Representation’

    “Game level blending via machine learning, the process of combining features of game levels to create unique and novel game levels using Procedural Content Generation via Machine Learning (PCGML) techniques, has gained increasing popularity in recent years. However, many existing techniques rely on human-annotated level representations, which limits game level blending to a limited number of annotated games. … In this paper, we present a novel approach to game level blending … that can serve as a level representation for unannotated games and a unified level representation across games without … human annotation.” Find the paper and full list of…

    Learn more

    ,
  • ‘Typed-Untyped Interactions: A Comparative Analysis’

    “The literature presents many strategies for enforcing the integrity of types when typed code interacts with untyped code. This article presents a uniform evaluation framework that characterizes the differences among some major existing semantics for typed–untyped interaction. Type system designers can use this framework to analyze the guarantees of their own dynamic semantics.” Find the paper and full list of authors in ACM Transactions on Programming Languages and Systems.

    Learn more

  • ‘EMShepherd: Detecting Adversarial Samples via Side-channel Leakage’

    ,

    “Deep Neural Networks (DNN) are vulnerable to adversarial perturbations-small changes crafted deliberately on the input to mislead the model for wrong predictions. Adversarial attacks have disastrous consequences for deep learning-empowered critical applications. … Inspired by the fact that electromagnetic (EM) emanations of a model inference are dependent on both operations and data and may contain footprints of different input classes, we propose a framework, EMShepherd, to capture EM traces of model execution, perform processing on traces and exploit them for adversarial detection.” Find the paper and full list of authors at ArXiv.

    Learn more

    ,
  • ‘Injecting Language Workbench Technology Into Mainstream Languages’

    “Eelco Visser envisioned a future where DSLs become a commonplace abstraction in software development. He took strides towards implementing this vision with the Spoofax language workbench. However, his vision is far from the mainstream of programming today. How will the many mainstream programmers encounter and adopt language workbench technology? We propose that the macro systems found in emerging industrial languages open a path towards delivering language workbenches as easy-to-adopt libraries.” Find the paper and full list of authors at the Dagstuhl Research Online Publication Server.

    Learn more

  • ‘Analysis of Catastrophic Forgetting for Random Orthogonal Transformation Tasks in the Overparameterized Regime’

    “Overparameterization is known to permit strong generalization performance in neural networks. In this work, we provide an initial theoretical analysis of its effect on catastrophic forgetting in a continual learning setup. We show experimentally that in Permuted MNIST image classification tasks, the generalization performance of multilayer perceptrons trained by vanilla stochastic gradient descent can be improved by overparameterization, and the extent of the performance increase achieved by overparameterization is comparable to that of state-of-the-art continual learning algorithms.” Find the paper and full list of authors in the Proceedings of Machine Learning Research.

    Learn more

    ,
  • Enhancing security for brain-inspired computing

    “Electrical and computer engineering assistant professor Xiaolin Xu, in collaboration with Shaolei Ren from the University of California-Riverside, was awarded a $600,000 NSF grant for ‘Securing Brain-inspired Hyperdimensional Computing against Design-time and Run-time Attacks for Edge Devices.'”

    Learn more

    ,
  • As all politics become climate politics, what we need are ‘diverse leaders,’ Stephens says

    Dean’s professor of sustainability science and policy Jennie C. Stephens published “Diversifying Power: Why We Need Antiracist, Feminist Leadership on Climate and Energy” in September 2020. According to the publisher’s webpage, “Stephens takes a closer look at climate and energy leadership related to job creation and economic justice, health and nutrition, housing and transportation. She looks at why we need to resist by investing in bold diverse leadership to curb the ‘the polluter elite.’ We need to reclaim and restructure climate and energy systems so policies are explicitly linked to social, economic, and racial justice.”

    Learn more

    ,
  • ‘Climate Justice in Higher Education: A Proposed Paradigm Shift Towards a Transformative Role for Colleges and Universities’

    “Moving beyond technocratic approaches to climate action, climate justice articulates a paradigm shift in how organizations think about their response to the climate crisis. … Through a commitment to advancing transformative climate justice, colleges and universities around the world could realign and redefine their priorities in teaching, research, and community engagement to shape a more just, stable, and healthy future. … Colleges and universities have an opportunity to leverage their unique role as powerful anchor institutions to demonstrate climate justice innovations and catalyze social change toward a more equitable, renewable-based future.” Find the paper and full list of authors at Climatic…

    Learn more

    ,
  • Eco-friendly passive cooling with recycled packaging plastics

    “Mechanical and industrial engineering associate professor Yi Zheng’s research group Nano Energy Laboratory published their research on ‘Oil-paper-umbrella-inspired passive radiative cooling using recycled packaging foam’ in the Journal of Materials Chemistry A and ‘Eco-friendly passive radiative cooling using recycled packaging plastics’ in Materials Today Sustainability. In both works, they studied eco-friendly passive cooling materials made of recycled packaging plastics for a greener and cleaner community. The low material cost and ease of fabrication provide a path for effective passive cooling, which requires zero external energy consumption (e.g., air conditioners), especially in less developed areas.”

    Learn more

    ,
  • ‘Information Transfer in Multitask Learning, Data Augmentation and Beyond’

    “A hallmark of human intelligence is that we continue to learn new information and then extrapolate the learned information onto new tasks and domains (see, e.g., Thrun and Pratt (1998)). While this is a fairly intuitive observation, formulating such ideas has proved to be a challenging research problem and continues to inspire new studies. Recently, there has been increasing interest in AI/ML about building models that generalize across tasks, even when they have some form of distribution shifts. How can we ground this research in a solid framework to develop principled methods for better practice?”

    Learn more

    , ,
  • ‘Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM’

    “An encryption scheme is Key Dependent Message (KDM) secure if it is safe to encrypt messages that can arbitrarily depend on the secret keys themselves. In this work, we show how to upgrade essentially the weakest form of KDM security into the strongest one. In particular, we assume the existence of a symmetric-key bit-encryption that is circular-secure in the 1-key setting, meaning that it maintains security even if one can encrypt individual bits of a single secret key under itself.” Find the paper and full list of authors at Cryptology E-Print Archive.

    Learn more

    ,
  • ‘Leveraging Large Language Models for Mental Health Prediction via Online Text Data’

    “The recent technology boost of large language models (LLMs) has empowered a variety of applications. However, there is very little research on understanding and improving LLMs’ capability for the mental health domain. In this work, we present the first comprehensive evaluation of multiple LLMs … on various mental health prediction tasks via online text data. We conduct a wide range of experiments, covering zero-shot prompting, few-shot prompting, and instruction finetuning. The results indicate the promising yet limited performance of LLMs with zero-shot and few-shot prompt designs for mental health tasks.” Find the paper and full list of authors at ArXiv.

    Learn more

    ,
  • ‘On-Robot Bayesian Reinforcement Learning for POMDPs’

    “Robot learning is often difficult due to the expense of gathering data. The need for large amounts of data can, and should, be tackled with effective algorithms and leveraging expert information on robot dynamics. Bayesian reinforcement learning (BRL), thanks to its sample efficiency and ability to exploit prior knowledge, is uniquely positioned as such a solution method. Unfortunately, the application of BRL has been limited due to the difficulties of representing expert knowledge. … This paper advances BRL for robotics by proposing a specialized framework for physical systems.” Find the paper and full list of authors at ArXiv.

    Learn more

    ,
  • ‘A Guessing Entropy-Based Framework for Deep Learning-Assisted Side-Channel Analysis’

    ,

    ‘Recently deep-learning (DL) techniques have been widely adopted in side-channel power analysis. A DL-assisted SCA generally consists of two phases: a deep neural network (DNN) training phase and a follow-on attack phase using the trained DNN. However, currently the two phases are not well aligned, as there is no conclusion on what metric used in the training can result in the most effective attack in the second phase. … We propose to conduct DNN training directly with a common SCA effectiveness metric, Guessing Entropy (GE).’ Find the paper and full list of authors in IEEE Transactions on Information Forensics and…

    Learn more

    , ,
  • ‘DRIP: Domain Refinement Iteration With Polytopes for Backward Reachability Analysis of Neural Feedback Loops’

    “Safety certification of data-driven control techniques remains a major open problem. This letter investigates backward reachability as a framework for providing collision avoidance guarantees for systems controlled by neural network (NN) policies. … Existing methods conservatively assume a domain over which to relax the NN, which causes loose over-approximations of the set of states that could lead the system into the obstacle. … To address this issue, we introduce DRIP, an algorithm with a refinement loop on the relaxation domain, which substantially tightens the BP set bounds.” Find the paper and full list of authors at IEEE Control Systems Letters.

    Learn more

  • ‘Using Sequences of Life-Events to Predict Human Lives’

    “Machine learning has revolutionized computers’ ability to analyze text through flexible computational models. Due to their structural similarity to written language, transformer-based architectures have also shown promise as tools to make sense of a range of multi-variate sequences. … We can also represent human lives in a way that shares this structural similarity to language. From one perspective, lives are simply sequences of events. … Here, we exploit this similarity to adapt innovations from natural language processing to examine the evolution and predictability of human lives based on detailed event sequences.” Find the paper and full list of authors at…

    Learn more

    ,
  • ‘Defense Against Shortest Path Attacks’

    “Identifying shortest paths between nodes in a network is an important task in applications involving routing of resources. Recent work has shown that a malicious actor can manipulate a graph to make traffic between two nodes of interest follow their target path. In this paper, we develop a defense against such attacks by modifying the weights of the graph that users observe. … In this context, we also consider a zero-sum version of the game, in which the defender’s goal is to minimize cost while achieving the minimum possible attack probability.” Find the paper and full list of authors at…

    Learn more

    ,
  • ‘On Regularity Lemma and Barriers in Streaming and Dynamic Matching’

    “We present a new approach for finding matchings in dense graphs by building on Szemerédi’s celebrated Regularity Lemma. This allows us to obtain non-trivial albeit slight improvements over longstanding bounds for matchings in streaming and dynamic graphs.” Find the paper and full list of authors in the Proceedings of the 55th Annual ACM Symposium on Theory of Computing.

    Learn more

  • ‘Jointly Extracting Interventions, Outcomes and Findings From RCT Reports With LLMs’

    ,

    “Results from Randomized Controlled Trials (RCTs) establish the comparative effectiveness of interventions, and are in turn critical inputs for evidence-based care. However, results from RCTs are presented in (often unstructured) natural language articles describing the design, execution, and outcomes of trials; clinicians must manually extract findings pertaining to interventions and outcomes of interest from such articles. … We propose and evaluate a text-to-text model built on instruction-tuned Large Language Models (LLMs) to jointly extract Interventions, Outcomes, and Comparators (ICO elements) from clinical abstracts, and infer the associated results reported.” Find the paper and full list of authors at ArXiv.

    Learn more

    ,
  • ‘Revisiting Relation Extraction in the Era of Large Language Models’

    ,

    “Relation extraction (RE) is the core NLP task of inferring semantic relationships between entities from text. Standard supervised RE techniques entail training modules to tag tokens comprising entity spans and then predict the relationship between them. Recent work has instead treated the problem as a sequence-to-sequence task, linearizing relations between entities as target strings to be generated conditioned on the input. Here we … [use] larger language models (GPT-3 and Flan-T5 large) than considered in prior work and evaluat[e] their performance on standard RE tasks under varying levels of supervision.” Find the paper and full list of authors at ArXiv.

    Learn more

    ,
  • ‘RedHOT: A Corpus of Annotated Medical Questions, Experiences and Claims on Social Media’

    ,

    “We present Reddit Health Online Talk (RedHOT), a corpus of 22,000 richly annotated social media posts from Reddit spanning 24 health conditions. … We collect additional granular annotations on identified claims.Specifically, we mark snippets that describe patient Populations, Interventions, and Outcomes (PIO elements) within these. Using this corpus, we introduce the task of retrieving trustworthy evidence relevant to a given claim made on social media. We propose a new method to automatically derive (noisy) supervision for this task which we use to train a dense retrieval model.” Find the paper and full list of authors at ACL Anthology.

    Learn more

  • ‘SemEval-2023 Task 8: Causal Medical Claim Identification and Related PIO Frame Extraction From Social Media Posts’

    ,

    “Identification of medical claims from user-generated text data is an onerous but essential step for various tasks including content moderation, and hypothesis generation. SemEval-2023 Task 8 is an effort towards building those capabilities and motivating further research in this direction. This paper summarizes the details and results of shared task 8 at SemEval-2023 which involved identifying causal medical claims and extracting related Populations, Interventions, and Outcomes (“PIO”) frames from social media (Reddit) text.” Find the paper and full list of authors at ACL Anthology.

    Learn more