Research

Groundbreaking work and published results in peer reviewed journals across disciplines.

Title

Topic

  • ‘Designing Engagement: A Student-Based Perspective of the Economics of Crime’

    “This paper, developed by participants in an Economics of Crime course at Northeastern University in conjunction with their professor, highlights student perspectives of the relationship between the economic system, its operations and institutions, and the marginalization and victimization of Black people. The paper addresses specific attributes of the course curriculum that facilitated student understanding of these topics, and in doing so suggests an alternative pedagogy for discussing crime from an economics disciplinary perspective.” Find the paper and full list of authors at Contemporary Justice Review.

    Learn more

    ,
  • Northeastern researchers claim two editorial roles for Written Communication

    Mya Poe, associate professor in the department of English and Tieanna Graphenreed, PhD. student in English, have become co-editors of Written Communication, along with Dylan B. Dryer, University of Maine. They write that they “hope to further enrich Written Communication in four ways: First, we aim to increase the journal’s visibility as a potential home for work by scholars based in Asia, Africa, and South America. … Second, Written Communication will continue to advance methodological representation. … Third, we are planning to roll out a series of novel text-types. … Fourth, … we hope to reanimate the journal’s important role…

    Learn more

    ,
  • ‘Predictors and Consequences of Pro-Environmental Behavior at Work’

    “Increasingly, people are looking for meaning through their jobs, for employers that have a positive impact on the world, and for workplaces that promote mission-driven behavior. One such mission that is a growing priority is addressing climate change, especially for younger cohorts entering the workforce. Addressing the climate crisis will necessitate substantial changes at all levels of society, including organizational change. This paper examines individual, social, and contextual variables that are associated with pro-environmental behavior (PEB).” Find the paper and full list of authors at ResearchGate.

    Learn more

  • The math says that parents shouldn’t worry over shootings as students head back to school, says Northeastern researcher

    Professor of criminology, law and public policy James Alan Fox, and a principal researcher for the Northeastern University Mass Killing Database, writes that, while anxiety around rising numbers of school shootings are understandable, “The real epidemic is fear.” Fox argues that the data shows “Our nation’s schools are safe. In fact, only one-half of 1% of school-age victims of gun homicide are killed at school. Children are safer in school, where they have supervision and structure, than on playgrounds, ball fields and street corners. Indeed, some are safer at school than in their own home.”

    Learn more

    , ,
  • ‘Microbial Chemolithoautotrophs are Abundant in Salt Marsh Sediment Following Long-Term Experimental Nitrate Enrichment’

    “Long-term anthropogenic nitrate (NO3−) enrichment is a serious threat to many coastal systems. Nitrate reduction coupled with the oxidation of reduced forms of sulfur is conducted by chemolithoautotrophic microbial populations in a process that decreases nitrogen (N) pollution. However, little is known about the diversity and distribution of microbes capable of carbon fixation within salt marsh sediment and how they respond to long-term NO3− loading. We used genome-resolved metagenomics to characterize the distribution, phylogenetic relationships, and adaptations important to microbial communities within NO3− enriched sediment.” Find the paper and full list of authors at FEMS Microbiology Letters.

    Learn more

    ,
  • ‘Workforce Ecosystems and AI’

    “Companies increasingly rely on an extended workforce (e.g., contractors, gig workers … and technologies such as algorithmic management and artificial intelligence) to achieve strategic goals and objectives. When we ask leaders to describe how they define their workforce today, they mention a diverse array of participants, beyond just full- and part-time employees, all contributing in various ways. … Our ongoing research on workforce ecosystems demonstrates that managing work across organizational boundaries with groups of interdependent actors in a variety of employment relationships creates new opportunities and risks for both workers and businesses.” Find the paper and full list of authors…

    Learn more

  • Questions of equitability surround low-emission zones

    A As London attempts to expand its Ultra-Low Emissions Zone, the policy faces backlash, as the pay-to-drive policies “punish the poorest drivers and offer no alternatives in places with limited public transit,” writes professor Joan Fitzgerald. While these zones may be helpful in the fight against climate change, without public services like “adequate public transportation, safe bike lanes, and fair subsidies for purchasing compliant vehicles,” she continues, low-emission zones “are unjust and lose necessary political support.”

    Learn more

    ,
  • ‘Adolescent Friendship, Cross-Sexuality Ties and Attitudes Toward Sexual Minorities: A Social Network Approach to Intergroup Contact’

    “Social ties between members of in- and outgroups are theorized to reduce individual levels of prejudice. However, instances of intergroup contact are not isolated events; cross-group interactions are embedded in broader networks defined by various social processes that guide the formation and maintenance of interpersonal relationships. This project reconsiders the potential benefits of intergroup contact by applying a network perspective to examine whether friendships between youth of different sexualities can shape individuals’ homophobic attitudes.” Find the paper and full list of authors in Social Science Research.

    Learn more

    ,
  • ‘Does Ukraine Have Kompromat on Joe Biden?’ asks Abrahms

    Associate professor of political science in the College of Social Science and Humanities and the D’Amore-McKim School of Business Max Abrahms raises the question of whether Ukraine may have compromising information (“kompromat”) on Joe Biden or his family. The suspicions Abrahms raise stem from the “many millions of dollars” that were paid to Hunter Biden “by the shady Ukrainian energy firm Burisma,” Joe Biden’s subsequent firing of Victor Shokin, Ukrainian general prosecutor “who had begun an investigation into the Burisma-Hunter gravy train.”

    Learn more

  • ‘A Tool for Mutation Analysis in Racket’

    ,

    “Racket is a functional programming language that is used to teach CS1 at many high schools and colleges. … In order to evaluate [mutation analysis’s] efficacy in our college’s introductory programming courses, we created a prototype mutation analysis tool for Racket. We describe the design and features of the tool and perform a feasibility study using two assignments from an intro CS course where student test suite thoroughness was evaluated by hand by human graders.” Find the paper and full list of authors in the 2023 IEEE International Conference on Software Testing Verification and Validation Workshop.

    Learn more

    ,
  • ‘SliceLens: Guided Exploration of Machine Learning Datasets’

    “SliceLens is a tool for exploring labeled, tabular, machine learning datasets. To explore a dataset, the user selects combinations of features in the dataset that they are interested in. The tool splits those features into bins and then visualizes the label distributions for the subsets of data created by the intersections of the bins. SliceLens guides the user in determining which feature combinations to explore. Guidance is based on a user-selected rating metric, which assigns a score to the subsets created by a given combination of features.”

    Learn more

  • ‘”Everyone is Covered”: Exploring the Role of Online Interactions in Facilitating Connection and Social Support in Black Churches’

    “Faith institutions provide social support and community care for many in the United States (U.S.). Notably, churches with predominantly Black populations have served as a site for social change and care provision. … However, the pandemic has emphasised how localising these care networks in physical spaces can limit access to social support. … Through interviews and focus groups with nine church members, we explore how hybrid faith communities that bridge offline and online contexts can enable social support and care provision.” Find the paper and full list of authors in the 2023 CHI Conference on Human Factors in Computing Systems…

    Learn more

  • ‘Game Level Blending Using a Learned Level Representation’

    “Game level blending via machine learning, the process of combining features of game levels to create unique and novel game levels using Procedural Content Generation via Machine Learning (PCGML) techniques, has gained increasing popularity in recent years. However, many existing techniques rely on human-annotated level representations, which limits game level blending to a limited number of annotated games. … In this paper, we present a novel approach to game level blending … that can serve as a level representation for unannotated games and a unified level representation across games without … human annotation.” Find the paper and full list of…

    Learn more

    ,
  • ‘Typed-Untyped Interactions: A Comparative Analysis’

    “The literature presents many strategies for enforcing the integrity of types when typed code interacts with untyped code. This article presents a uniform evaluation framework that characterizes the differences among some major existing semantics for typed–untyped interaction. Type system designers can use this framework to analyze the guarantees of their own dynamic semantics.” Find the paper and full list of authors in ACM Transactions on Programming Languages and Systems.

    Learn more

  • ‘EMShepherd: Detecting Adversarial Samples via Side-channel Leakage’

    ,

    “Deep Neural Networks (DNN) are vulnerable to adversarial perturbations-small changes crafted deliberately on the input to mislead the model for wrong predictions. Adversarial attacks have disastrous consequences for deep learning-empowered critical applications. … Inspired by the fact that electromagnetic (EM) emanations of a model inference are dependent on both operations and data and may contain footprints of different input classes, we propose a framework, EMShepherd, to capture EM traces of model execution, perform processing on traces and exploit them for adversarial detection.” Find the paper and full list of authors at ArXiv.

    Learn more

    ,
  • ‘Injecting Language Workbench Technology Into Mainstream Languages’

    “Eelco Visser envisioned a future where DSLs become a commonplace abstraction in software development. He took strides towards implementing this vision with the Spoofax language workbench. However, his vision is far from the mainstream of programming today. How will the many mainstream programmers encounter and adopt language workbench technology? We propose that the macro systems found in emerging industrial languages open a path towards delivering language workbenches as easy-to-adopt libraries.” Find the paper and full list of authors at the Dagstuhl Research Online Publication Server.

    Learn more

  • ‘Analysis of Catastrophic Forgetting for Random Orthogonal Transformation Tasks in the Overparameterized Regime’

    “Overparameterization is known to permit strong generalization performance in neural networks. In this work, we provide an initial theoretical analysis of its effect on catastrophic forgetting in a continual learning setup. We show experimentally that in Permuted MNIST image classification tasks, the generalization performance of multilayer perceptrons trained by vanilla stochastic gradient descent can be improved by overparameterization, and the extent of the performance increase achieved by overparameterization is comparable to that of state-of-the-art continual learning algorithms.” Find the paper and full list of authors in the Proceedings of Machine Learning Research.

    Learn more

    ,
  • ‘Climate Justice in Higher Education: A Proposed Paradigm Shift Towards a Transformative Role for Colleges and Universities’

    “Moving beyond technocratic approaches to climate action, climate justice articulates a paradigm shift in how organizations think about their response to the climate crisis. … Through a commitment to advancing transformative climate justice, colleges and universities around the world could realign and redefine their priorities in teaching, research, and community engagement to shape a more just, stable, and healthy future. … Colleges and universities have an opportunity to leverage their unique role as powerful anchor institutions to demonstrate climate justice innovations and catalyze social change toward a more equitable, renewable-based future.” Find the paper and full list of authors at Climatic…

    Learn more

    ,
  • Eco-friendly passive cooling with recycled packaging plastics

    “Mechanical and industrial engineering associate professor Yi Zheng’s research group Nano Energy Laboratory published their research on ‘Oil-paper-umbrella-inspired passive radiative cooling using recycled packaging foam’ in the Journal of Materials Chemistry A and ‘Eco-friendly passive radiative cooling using recycled packaging plastics’ in Materials Today Sustainability. In both works, they studied eco-friendly passive cooling materials made of recycled packaging plastics for a greener and cleaner community. The low material cost and ease of fabrication provide a path for effective passive cooling, which requires zero external energy consumption (e.g., air conditioners), especially in less developed areas.”

    Learn more

    ,
  • ‘Information Transfer in Multitask Learning, Data Augmentation and Beyond’

    “A hallmark of human intelligence is that we continue to learn new information and then extrapolate the learned information onto new tasks and domains (see, e.g., Thrun and Pratt (1998)). While this is a fairly intuitive observation, formulating such ideas has proved to be a challenging research problem and continues to inspire new studies. Recently, there has been increasing interest in AI/ML about building models that generalize across tasks, even when they have some form of distribution shifts. How can we ground this research in a solid framework to develop principled methods for better practice?”

    Learn more

    , ,
  • ‘Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM’

    “An encryption scheme is Key Dependent Message (KDM) secure if it is safe to encrypt messages that can arbitrarily depend on the secret keys themselves. In this work, we show how to upgrade essentially the weakest form of KDM security into the strongest one. In particular, we assume the existence of a symmetric-key bit-encryption that is circular-secure in the 1-key setting, meaning that it maintains security even if one can encrypt individual bits of a single secret key under itself.” Find the paper and full list of authors at Cryptology E-Print Archive.

    Learn more

    ,
  • ‘Leveraging Large Language Models for Mental Health Prediction via Online Text Data’

    “The recent technology boost of large language models (LLMs) has empowered a variety of applications. However, there is very little research on understanding and improving LLMs’ capability for the mental health domain. In this work, we present the first comprehensive evaluation of multiple LLMs … on various mental health prediction tasks via online text data. We conduct a wide range of experiments, covering zero-shot prompting, few-shot prompting, and instruction finetuning. The results indicate the promising yet limited performance of LLMs with zero-shot and few-shot prompt designs for mental health tasks.” Find the paper and full list of authors at ArXiv.

    Learn more

    ,
  • ‘On-Robot Bayesian Reinforcement Learning for POMDPs’

    “Robot learning is often difficult due to the expense of gathering data. The need for large amounts of data can, and should, be tackled with effective algorithms and leveraging expert information on robot dynamics. Bayesian reinforcement learning (BRL), thanks to its sample efficiency and ability to exploit prior knowledge, is uniquely positioned as such a solution method. Unfortunately, the application of BRL has been limited due to the difficulties of representing expert knowledge. … This paper advances BRL for robotics by proposing a specialized framework for physical systems.” Find the paper and full list of authors at ArXiv.

    Learn more

    ,
  • ‘A Guessing Entropy-Based Framework for Deep Learning-Assisted Side-Channel Analysis’

    ,

    ‘Recently deep-learning (DL) techniques have been widely adopted in side-channel power analysis. A DL-assisted SCA generally consists of two phases: a deep neural network (DNN) training phase and a follow-on attack phase using the trained DNN. However, currently the two phases are not well aligned, as there is no conclusion on what metric used in the training can result in the most effective attack in the second phase. … We propose to conduct DNN training directly with a common SCA effectiveness metric, Guessing Entropy (GE).’ Find the paper and full list of authors in IEEE Transactions on Information Forensics and…

    Learn more

    , ,
  • ‘DRIP: Domain Refinement Iteration With Polytopes for Backward Reachability Analysis of Neural Feedback Loops’

    “Safety certification of data-driven control techniques remains a major open problem. This letter investigates backward reachability as a framework for providing collision avoidance guarantees for systems controlled by neural network (NN) policies. … Existing methods conservatively assume a domain over which to relax the NN, which causes loose over-approximations of the set of states that could lead the system into the obstacle. … To address this issue, we introduce DRIP, an algorithm with a refinement loop on the relaxation domain, which substantially tightens the BP set bounds.” Find the paper and full list of authors at IEEE Control Systems Letters.

    Learn more

  • ‘Using Sequences of Life-Events to Predict Human Lives’

    “Machine learning has revolutionized computers’ ability to analyze text through flexible computational models. Due to their structural similarity to written language, transformer-based architectures have also shown promise as tools to make sense of a range of multi-variate sequences. … We can also represent human lives in a way that shares this structural similarity to language. From one perspective, lives are simply sequences of events. … Here, we exploit this similarity to adapt innovations from natural language processing to examine the evolution and predictability of human lives based on detailed event sequences.” Find the paper and full list of authors at…

    Learn more

    ,
  • ‘Defense Against Shortest Path Attacks’

    “Identifying shortest paths between nodes in a network is an important task in applications involving routing of resources. Recent work has shown that a malicious actor can manipulate a graph to make traffic between two nodes of interest follow their target path. In this paper, we develop a defense against such attacks by modifying the weights of the graph that users observe. … In this context, we also consider a zero-sum version of the game, in which the defender’s goal is to minimize cost while achieving the minimum possible attack probability.” Find the paper and full list of authors at…

    Learn more

    ,
  • ‘On Regularity Lemma and Barriers in Streaming and Dynamic Matching’

    “We present a new approach for finding matchings in dense graphs by building on Szemerédi’s celebrated Regularity Lemma. This allows us to obtain non-trivial albeit slight improvements over longstanding bounds for matchings in streaming and dynamic graphs.” Find the paper and full list of authors in the Proceedings of the 55th Annual ACM Symposium on Theory of Computing.

    Learn more

  • ‘Jointly Extracting Interventions, Outcomes and Findings From RCT Reports With LLMs’

    ,

    “Results from Randomized Controlled Trials (RCTs) establish the comparative effectiveness of interventions, and are in turn critical inputs for evidence-based care. However, results from RCTs are presented in (often unstructured) natural language articles describing the design, execution, and outcomes of trials; clinicians must manually extract findings pertaining to interventions and outcomes of interest from such articles. … We propose and evaluate a text-to-text model built on instruction-tuned Large Language Models (LLMs) to jointly extract Interventions, Outcomes, and Comparators (ICO elements) from clinical abstracts, and infer the associated results reported.” Find the paper and full list of authors at ArXiv.

    Learn more

    ,
  • ‘Revisiting Relation Extraction in the Era of Large Language Models’

    ,

    “Relation extraction (RE) is the core NLP task of inferring semantic relationships between entities from text. Standard supervised RE techniques entail training modules to tag tokens comprising entity spans and then predict the relationship between them. Recent work has instead treated the problem as a sequence-to-sequence task, linearizing relations between entities as target strings to be generated conditioned on the input. Here we … [use] larger language models (GPT-3 and Flan-T5 large) than considered in prior work and evaluat[e] their performance on standard RE tasks under varying levels of supervision.” Find the paper and full list of authors at ArXiv.

    Learn more

    ,