All Work
Title
Topic
-
Minkara serves as moderator for intersection of disability panel
“Bioengineering assistant professor Mona Minkara served as a moderator for the ‘Intersection of Disability Panel’ at the Disrupting Ableism and Advancing STEM: A National Leadership Summit held on June 5, 2023.” Click on “Learn More” to watch the video.
-
Understanding cell transitions in tumor development
“University distinguished professor Herbert Levine, physics and bioengineering, in collaboration with Brown University and MD Anderson Cancer Center, is leading a $1,200,000 NSF grant for determining the ‘Regulation of Cellular Stemness During the Epithelial-Mesenchymal Transition (EMT).'”
-
‘Predictors and Consequences of Pro-Environmental Behavior at Work’
“Increasingly, people are looking for meaning through their jobs, for employers that have a positive impact on the world, and for workplaces that promote mission-driven behavior. One such mission that is a growing priority is addressing climate change, especially for younger cohorts entering the workforce. Addressing the climate crisis will necessitate substantial changes at all levels of society, including organizational change. This paper examines individual, social, and contextual variables that are associated with pro-environmental behavior (PEB).” Find the paper and full list of authors at ResearchGate.
-
‘Microbial Chemolithoautotrophs are Abundant in Salt Marsh Sediment Following Long-Term Experimental Nitrate Enrichment’
“Long-term anthropogenic nitrate (NO3−) enrichment is a serious threat to many coastal systems. Nitrate reduction coupled with the oxidation of reduced forms of sulfur is conducted by chemolithoautotrophic microbial populations in a process that decreases nitrogen (N) pollution. However, little is known about the diversity and distribution of microbes capable of carbon fixation within salt marsh sediment and how they respond to long-term NO3− loading. We used genome-resolved metagenomics to characterize the distribution, phylogenetic relationships, and adaptations important to microbial communities within NO3− enriched sediment.” Find the paper and full list of authors at FEMS Microbiology Letters.
-
‘Workforce Ecosystems and AI’
“Companies increasingly rely on an extended workforce (e.g., contractors, gig workers … and technologies such as algorithmic management and artificial intelligence) to achieve strategic goals and objectives. When we ask leaders to describe how they define their workforce today, they mention a diverse array of participants, beyond just full- and part-time employees, all contributing in various ways. … Our ongoing research on workforce ecosystems demonstrates that managing work across organizational boundaries with groups of interdependent actors in a variety of employment relationships creates new opportunities and risks for both workers and businesses.” Find the paper and full list of authors…
-
ACM Distinguished Papers Award for paper on adversarial attacks in deep learning models
“Computer engineering graduate students Ruyi Ding, PhD’24, Cheng Gongye, PhD’23, Siyue Wang, PhD’22, mathematics professor A. Adam Ding and electrical and computer engineering professor Yunsi Fei were awarded a Distinguished Papers Award at the 18th ACM ASIA Conference on Computer and Communications Security for their paper on ‘EMShepherd: Detecting Adversarial Samples via Side-channel Leakage.'”
-
Lin receives NSF grant for ‘Dynamic Scene Understanding’ in computer vision
“Electrical and computer engineering associate professor Xue ‘Shelley’ Lin, in collaboration with Khoury College of Computer Science assistant professor Huaizu Jiang, was awarded a $600K NSF grant for ‘Toward Efficient and Robust Dynamic Scene Understanding Based on Visual Correspondences.'”
-
‘A Tool for Mutation Analysis in Racket’
“Racket is a functional programming language that is used to teach CS1 at many high schools and colleges. … In order to evaluate [mutation analysis’s] efficacy in our college’s introductory programming courses, we created a prototype mutation analysis tool for Racket. We describe the design and features of the tool and perform a feasibility study using two assignments from an intro CS course where student test suite thoroughness was evaluated by hand by human graders.” Find the paper and full list of authors in the 2023 IEEE International Conference on Software Testing Verification and Validation Workshop.
-
‘SliceLens: Guided Exploration of Machine Learning Datasets’
“SliceLens is a tool for exploring labeled, tabular, machine learning datasets. To explore a dataset, the user selects combinations of features in the dataset that they are interested in. The tool splits those features into bins and then visualizes the label distributions for the subsets of data created by the intersections of the bins. SliceLens guides the user in determining which feature combinations to explore. Guidance is based on a user-selected rating metric, which assigns a score to the subsets created by a given combination of features.”
-
‘”Everyone is Covered”: Exploring the Role of Online Interactions in Facilitating Connection and Social Support in Black Churches’
“Faith institutions provide social support and community care for many in the United States (U.S.). Notably, churches with predominantly Black populations have served as a site for social change and care provision. … However, the pandemic has emphasised how localising these care networks in physical spaces can limit access to social support. … Through interviews and focus groups with nine church members, we explore how hybrid faith communities that bridge offline and online contexts can enable social support and care provision.” Find the paper and full list of authors in the 2023 CHI Conference on Human Factors in Computing Systems…
-
‘Game Level Blending Using a Learned Level Representation’
“Game level blending via machine learning, the process of combining features of game levels to create unique and novel game levels using Procedural Content Generation via Machine Learning (PCGML) techniques, has gained increasing popularity in recent years. However, many existing techniques rely on human-annotated level representations, which limits game level blending to a limited number of annotated games. … In this paper, we present a novel approach to game level blending … that can serve as a level representation for unannotated games and a unified level representation across games without … human annotation.” Find the paper and full list of…
-
‘Typed-Untyped Interactions: A Comparative Analysis’
“The literature presents many strategies for enforcing the integrity of types when typed code interacts with untyped code. This article presents a uniform evaluation framework that characterizes the differences among some major existing semantics for typed–untyped interaction. Type system designers can use this framework to analyze the guarantees of their own dynamic semantics.” Find the paper and full list of authors in ACM Transactions on Programming Languages and Systems.
-
‘EMShepherd: Detecting Adversarial Samples via Side-channel Leakage’
“Deep Neural Networks (DNN) are vulnerable to adversarial perturbations-small changes crafted deliberately on the input to mislead the model for wrong predictions. Adversarial attacks have disastrous consequences for deep learning-empowered critical applications. … Inspired by the fact that electromagnetic (EM) emanations of a model inference are dependent on both operations and data and may contain footprints of different input classes, we propose a framework, EMShepherd, to capture EM traces of model execution, perform processing on traces and exploit them for adversarial detection.” Find the paper and full list of authors at ArXiv.
-
‘Injecting Language Workbench Technology Into Mainstream Languages’
“Eelco Visser envisioned a future where DSLs become a commonplace abstraction in software development. He took strides towards implementing this vision with the Spoofax language workbench. However, his vision is far from the mainstream of programming today. How will the many mainstream programmers encounter and adopt language workbench technology? We propose that the macro systems found in emerging industrial languages open a path towards delivering language workbenches as easy-to-adopt libraries.” Find the paper and full list of authors at the Dagstuhl Research Online Publication Server.
-
‘Analysis of Catastrophic Forgetting for Random Orthogonal Transformation Tasks in the Overparameterized Regime’
“Overparameterization is known to permit strong generalization performance in neural networks. In this work, we provide an initial theoretical analysis of its effect on catastrophic forgetting in a continual learning setup. We show experimentally that in Permuted MNIST image classification tasks, the generalization performance of multilayer perceptrons trained by vanilla stochastic gradient descent can be improved by overparameterization, and the extent of the performance increase achieved by overparameterization is comparable to that of state-of-the-art continual learning algorithms.” Find the paper and full list of authors in the Proceedings of Machine Learning Research.
-
Enhancing security for brain-inspired computing
“Electrical and computer engineering assistant professor Xiaolin Xu, in collaboration with Shaolei Ren from the University of California-Riverside, was awarded a $600,000 NSF grant for ‘Securing Brain-inspired Hyperdimensional Computing against Design-time and Run-time Attacks for Edge Devices.'”
-
Eco-friendly passive cooling with recycled packaging plastics
“Mechanical and industrial engineering associate professor Yi Zheng’s research group Nano Energy Laboratory published their research on ‘Oil-paper-umbrella-inspired passive radiative cooling using recycled packaging foam’ in the Journal of Materials Chemistry A and ‘Eco-friendly passive radiative cooling using recycled packaging plastics’ in Materials Today Sustainability. In both works, they studied eco-friendly passive cooling materials made of recycled packaging plastics for a greener and cleaner community. The low material cost and ease of fabrication provide a path for effective passive cooling, which requires zero external energy consumption (e.g., air conditioners), especially in less developed areas.”
-
‘Information Transfer in Multitask Learning, Data Augmentation and Beyond’
“A hallmark of human intelligence is that we continue to learn new information and then extrapolate the learned information onto new tasks and domains (see, e.g., Thrun and Pratt (1998)). While this is a fairly intuitive observation, formulating such ideas has proved to be a challenging research problem and continues to inspire new studies. Recently, there has been increasing interest in AI/ML about building models that generalize across tasks, even when they have some form of distribution shifts. How can we ground this research in a solid framework to develop principled methods for better practice?”
-
‘Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM’
“An encryption scheme is Key Dependent Message (KDM) secure if it is safe to encrypt messages that can arbitrarily depend on the secret keys themselves. In this work, we show how to upgrade essentially the weakest form of KDM security into the strongest one. In particular, we assume the existence of a symmetric-key bit-encryption that is circular-secure in the 1-key setting, meaning that it maintains security even if one can encrypt individual bits of a single secret key under itself.” Find the paper and full list of authors at Cryptology E-Print Archive.
-
‘Leveraging Large Language Models for Mental Health Prediction via Online Text Data’
“The recent technology boost of large language models (LLMs) has empowered a variety of applications. However, there is very little research on understanding and improving LLMs’ capability for the mental health domain. In this work, we present the first comprehensive evaluation of multiple LLMs … on various mental health prediction tasks via online text data. We conduct a wide range of experiments, covering zero-shot prompting, few-shot prompting, and instruction finetuning. The results indicate the promising yet limited performance of LLMs with zero-shot and few-shot prompt designs for mental health tasks.” Find the paper and full list of authors at ArXiv.
-
‘On-Robot Bayesian Reinforcement Learning for POMDPs’
“Robot learning is often difficult due to the expense of gathering data. The need for large amounts of data can, and should, be tackled with effective algorithms and leveraging expert information on robot dynamics. Bayesian reinforcement learning (BRL), thanks to its sample efficiency and ability to exploit prior knowledge, is uniquely positioned as such a solution method. Unfortunately, the application of BRL has been limited due to the difficulties of representing expert knowledge. … This paper advances BRL for robotics by proposing a specialized framework for physical systems.” Find the paper and full list of authors at ArXiv.
-
‘A Guessing Entropy-Based Framework for Deep Learning-Assisted Side-Channel Analysis’
‘Recently deep-learning (DL) techniques have been widely adopted in side-channel power analysis. A DL-assisted SCA generally consists of two phases: a deep neural network (DNN) training phase and a follow-on attack phase using the trained DNN. However, currently the two phases are not well aligned, as there is no conclusion on what metric used in the training can result in the most effective attack in the second phase. … We propose to conduct DNN training directly with a common SCA effectiveness metric, Guessing Entropy (GE).’ Find the paper and full list of authors in IEEE Transactions on Information Forensics and…
-
‘DRIP: Domain Refinement Iteration With Polytopes for Backward Reachability Analysis of Neural Feedback Loops’
“Safety certification of data-driven control techniques remains a major open problem. This letter investigates backward reachability as a framework for providing collision avoidance guarantees for systems controlled by neural network (NN) policies. … Existing methods conservatively assume a domain over which to relax the NN, which causes loose over-approximations of the set of states that could lead the system into the obstacle. … To address this issue, we introduce DRIP, an algorithm with a refinement loop on the relaxation domain, which substantially tightens the BP set bounds.” Find the paper and full list of authors at IEEE Control Systems Letters.