All Work
Title
Topic
-
‘Safe Deep Reinforcement Learning by Verifying Task-Level Properties’
“Cost functions are commonly employed in Safe Deep Reinforcement Learning (DRL). However, the cost is typically encoded as an indicator function due to the difficulty of quantifying the risk of policy decisions in the state space. Such an encoding requires the agent to visit numerous unsafe states to learn a cost-value function to drive the learning process toward safety. … In this paper, we investigate an alternative approach that uses domain knowledge to quantify the risk in the proximity of such states by defining a violation metric.” Read the paper and see the full list of authors in ArXiv.
-
Flood dangers rise as shipping channels deepen
Maqsood Mansur, graduate teaching assistant, assistant professor Julia Hopkins and professor Qin Jim Chen, have published a study investigating if “depth increase in a navigational channel in an estuarine region results in the amplification of the inland penetration of storm surge, thereby increasing the flood vulnerability,” concluding “that even the most conservative scenario of [sea-level rise] will cause an approximately 51% increase in flooded area in … the deepest ship channel.” Find “Estuarine Response to Storm Surge and Sea-Level Rise Associated with Channel Deepening: A Flood Vulnerability Assessment of Southwest Louisiana, USA” and the full list of authors in Natural…
-
Landherr receives American Institute of Chemical Engineers grant to create instructional comic for high schoolers
“Chemical engineering distinguished teaching professor Lucas Landherr has received a $3,500 grant from the American Institute of Chemical Engineers Foundation to create a comic that details the work of chemical engineering for high school seniors and first-year college engineering students.”
-
‘Efficient Resilient Functions’
“An n-bit boolean function is resilient to coalitions of size q if no fixed set of q bits is likely to influence the value of the function when the other n — q bits are chosen uniformly at random, even though the function is nearly balanced. We construct explicit functions resilient to coalitions of size q = n/(log n)O(log log n) = n1-o(1) computable by linear-size circuits and linear-time algorithms. We also obtain a tight size-depth tradeoff for computing such resilient functions.” Read the paper and see the full list of authors at SIAM.
-
Tadigadapa joins 2023 National Academy of Inventors as Senior Member
Professor and chair of electrical and computer engineering Srinivas Tadigadapa has been named as a Senior Member of the National Academy of Inventors. The National Academy of Inventors “was founded in 2010 to recognize and encourage inventors with patents issued from the United States Patent and Trademark Office, enhance the visibility of academic technology and innovation, encourage the disclosure of intellectual property, educate, and mentor innovative students, and translate the inventions of its members to benefit society,” they write in their mission statement.
-
Hofmann wins Outstanding Dissertation Award for work in disability studies and human-computer interaction
Megan “Hofmann, a senior research fellow at Khoury College who will begin as an assistant professor this fall,” Matty Wasserman writes for the Khoury College of Computer Science, had been awarded with the SIGCHI Outstanding Dissertation Award for her work “within the fields of human–computer interaction (HCI) and digital fabrication.”
-
Innovations in printed electronics: Transistors in silicon
Professor of electrical and computer engineering Ravinder Dahiya, in collaboration with researchers from the University of Glasgow, has published research that advances electronic printing. Printing “high-performance and stable transistors … remains a major challenge. This is because of the difficulties to print high-mobility semiconducting materials and the lack of high-resolution printing techniques,” they write. Crucially, the researchers now propose “silicon based … transistors to demonstrate the possibility of developing high-performance complementary metal–oxide–semiconductor… computing architecture.” Read “Printed n- and p-Channel Transistors using Silicon Nanoribbons Enduring Electrical, Thermal, and Mechanical Stress” and see the full list of authors in ACS Publications.
-
‘NapSS: Paragraph-Level Medical Text Simplification via Narrative Prompting and Sentence-Matching Summarization’
“Accessing medical literature is difficult for laypeople as the content is written for specialists and contains medical jargon. Automated text simplification methods offer a potential means to address this issue. In this work, we propose a summarize-then-simplify two-stage strategy, which we call NapSS, identifying the relevant content to simplify while ensuring that the original narrative flow is preserved. In this approach, we first generate reference summaries via sentence matching between the original and the simplified abstracts.” Read the paper and see the full list of authors in ArXiv.
-
Bajpayee spotlight speaker at Orthopedic Research Society
Associate professor Ambika Bajpayee presented as a spotlight speaker at the 2023 Orthopedic Research Society conferences, from February 10-14. Her talk was on “Bioelectricity for Cartilage Drug Delivery and Imaging.”
-
Riley receives Black Heritage Award for ‘dedicated service to Northeastern’
“Civil and environmental engineering lecturer and operations manager Rozanna Riley was selected to receive the Black Heritage Award, which is given to those Northeastern staff and administrators in recognition of their dedicated service to Northeastern, to the students, and/or to the John D. O’Bryant African American Institute.”
-
Patent for ultrasonic, underwater communication system
“Electrical and computer engineering assistant professor Francesco Restuccia, research assistant professor Emrecan Demirors and professor Tommaso Melodia were awarded a patent for “Underwater ultrasonic communication system and method.”
-
‘Generalization in Graph Neural Networks: Improved PAC-Bayesian Bounds on Graph Diffusion’
“Graph neural networks are widely used tools for graph prediction tasks. Motivated by their empirical performance, prior works have developed generalization bounds for graph neural networks, which scale with graph structures in terms of the maximum degree. In this paper, we present generalization bounds that instead scale with the largest singular value of the graph neural network’s feature diffusion matrix.” Read the paper and see the full list of authors in ArXiv.
-
‘How Many and Which Training Points Would Need To Be Removed To Flip this Prediction?’
“We consider the problem of identifying a minimal subset of training data St such that if the instances comprising St had been removed prior to training, the categorization of a given test point xt would have been different. … We propose comparatively fast approximation methods to find St based on influence functions, and find that—for simple convex text classification models—these approaches can often successfully identify relatively small sets of training examples which, if removed, would flip the prediction.” Read the paper and see the full list of authors in ArXiv.
-
Ganguly presents ‘a personal journey’ of climate resistance
“Auroop Ganguly, professor of civil and environmental engineering at Northeastern University, will share his personal journey building climate resilience. Professor Ganguly co-founded the climate analytics startup risQ, which models the complex financial risks posed by climate change.”
-
Hajjar receives $3.1 million grant for carbon-neutral construction research
“In a new $3.1 million grant from the Department of Energy’s Advanced Research Projects Agency-Energy (ARPA-E), Northeastern department of civil and environmental engineering chair and CDM Smith Professor Jerome Hajjar will lead a multi-institution team of researchers developing a new carbon sequestration technique using cross-laminated timber composite floor systems in bolted steel construction for building structures. The new structural method aims to decrease the use of steel while increasing the use of carbon-storing timber and design for deconstruction methods.”
-
‘An Optimized Acidic Digestion for the Isolation of Microplastics From Biota-Rich Samples’
“Plastic pollution is a growing concern. To analyze plastics in environmental samples, plastics need to be isolated. We present an acidic/oxidative method optimized to preserve plastics while digesting synthetic cellulose acetate and a range of organics encountered in environmental samples.” Find the paper and the full list of authors in Environmental Pollution.
-
‘Generative Adversarial Symmetry Discovery’
“Despite the success of equivariant neural networks in scientific applications, they require knowing the symmetry group a priori. However, it may be difficult to know which symmetry to use as an inductive bias in practice. Enforcing the wrong symmetry could even hurt the performance. In this paper, we propose a framework, LieGAN, to automatically discover equivariances from a dataset using a paradigm akin to generative adversarial training.” Read the paper and see the full list of authors in ArXiv.
-
‘One-Shot Empirical Privacy Estimation for Federated Learning’
“Privacy estimation techniques for differentially private (DP) algorithms are useful for comparing against analytical bounds, or to empirically measure privacy loss in settings where known analytical bounds are not tight. … In this work, we present a novel “one-shot” approach that can systematically address these challenges, allowing efficient auditing or estimation of the privacy loss of a model during the same, single training run used to fit model parameters, and without requiring any a priori knowledge about the model architecture or task.” Read the paper and see the full list of authors in ArXiv.
-
Byron Wallace named Sy and Laurie Sternberg Interdisciplinary Associate Professor for work on machine learning
“Professor Byron Wallace ‘has been awarded Northeastern’s Sy and Laurie Sternberg Interdisciplinary Associate Professorship for his work’ on applying machine learning and natural language processing to healthcare.” In an interview, Wallace gave one example of these applications: “the evolution of NLP systems [means they] can now spit out very plausible text, which medical practitioners can use to synthesize medical evidence and make better decisions for patient treatment.”
-
DeSteno podcast ‘How God Works’ is Ambie finalist
Professor of psychology David DeSteno’s podcast “How God Works” was a finalist for “Best Personal Growth/Spirituality Podcast” in the Ambies, the top awards show in the podcast industry. “How God Works” interrogates why, despite the fact that “religion and science often seem at odds, there’s one thing they can agree on: people who take part in spiritual practices tend to live longer, healthier, and happier lives.” The Ambies award show took place on March 7.
-
Reasoning through the picture: Machine learning between words and images
Researchers have identified a new “cross-modal retrieval” method to operate between “language and vision domains.” From their abstract: “To address this issue, we introduce an intuitive and interpretable model to learn a common embedding space for alignments between images and text descriptions. Specifically, our model first incorporates the semantic relationship information into visual and textual features by performing region or word relationship reasoning.” Read “Image-Text Embedding Learning via Visual and Textual Semantic Reasoning” and see the full list of authors in the IEEE Transactions on Pattern Analysis and Machine Intelligence.
-
‘Dissociation Between Linguistic and Nonlinguistic Statistical Learning in Children With Autism’
“Statistical learning (SL), the ability to detect and extract regularities from inputs, is considered a domain-general building block for typical language development. We compared 55 verbal children with autism (ASD, 6–12 years) and 50 typically-developing children in four SL tasks. The ASD group exhibited reduced learning in the linguistic SL tasks (syllable and letter), but showed intact learning for the nonlinguistic SL tasks (tone and image).” Read the paper and see the full list of authors in the Journal of Autism and Developmental Disorders.
-
‘Backdoor Attacks in Peer-to-Peer Federated Learning’
“We study backdoor attacks in peer-to-peer federated learning systems on different graph topologies and datasets. We show that only 5% attacker nodes are sufficient to perform a backdoor attack with 42% attack success without decreasing the accuracy on clean data by more than 2%. We also demonstrate that the attack can be amplified by the attacker crashing a small number of nodes.” Read the paper and see the full list of authors in ArXiv.
-
‘Stochastic Minimum Vertex Cover in General Graphs: A 3/2-Approximation’
“Our main result is designing an algorithm that returns a vertex cover of G* with size at most (3/2+ϵ) times the expected size of the minimum vertex cover, using only O(n/ϵp) non-adaptive queries. This improves over the best-known 2-approximation algorithm by Behnezhad, Blum, and Derakhshan [SODA’22], who also show that Ω(n/p) queries are necessary to achieve any constant approximation.” Read the paper and see the full list of authors in ArXiv.
-
‘A Closed-Form Solution of the Smoke Filling Time and Descent History in Enclosure Growing Fires With Floor Leaks’
“For the smoke filling time or smoke descent history in enclosure fires with floor leaks, the existing close-formed solutions are all based on the hypothesis that the expansion term is negligible. However, when the smoke interface is near to the floor level, the expansion term is more important than the plume entrainment term and the existing solutions give unrealistic predictions.” Read the paper and see the full list of authors in Fire Technology.
-
‘From Robustness to Privacy and Back’
“We study the relationship between two desiderata of algorithms in statistical inference and machine learning: differential privacy and robustness to adversarial data corruptions. … Dwork and Lei (STOC 2009) … observed that private algorithms satisfy robustness, and gave a general method for converting robust algorithms to private ones. However, all general methods for transforming robust algorithms into private ones lead to suboptimal error rates. Our work gives the first black-box transformation that converts any adversarially robust algorithm into one that satisfies pure differential privacy.” Read the paper and see the full list of authors in ArXiv.
-
Northeastern professors win 2023 Acorn Innovation Awards, helping bring research to market
“Electrical and computer engineering assistant professor Sarah Ostadabbas, professor Deniz Erdogmus and mechanical and industrial engineering associate professor Yi Zheng received MassVentures Acorn Innovation Awards to assist them in testing the viability of their technologies and potentially bringing their research to market.”