Mafia (also called Werewolf) is a party game. The participants are dividedinto two competing groups: citizens and a mafia. The objective is to eliminatethe opponent group. The game consists of two consecutive phases (day and night)and a certain set of actions (e.g. lynching durin … | Continue reading
The ability to identify authors of computer programs based on their codingstyle is a direct threat to the privacy and anonymity of programmers. Whilerecent work found that source code can be attributed to authors with highaccuracy, attribution of executable binaries appears to be … | Continue reading
Data recovery has long been a focus of the electronics industry for decadesby security experts, focusing on hard disk recovery, a type of non-volatilememory. Unfortunately, none of the existing research, neither from academia,industry, or government, have ever considered data rec … | Continue reading
A complete understanding of the brain requires an integrated description ofthe numerous scales of neural organization. It means studying the interplay ofgenes, synapses, and even whole brain regions which ultimately leads todifferent types of behavior, from perception to action, … | Continue reading
IPv6 is being more and more adopted, in part to facilitate the millions ofsmart devices that have already been installed at home. Unfortunately, we findthat the privacy of a substantial fraction of end-users is still at risk,despite the efforts by ISPs and electronic vendors to i … | Continue reading
Combining simple architectures with large-scale pre-training has led tomassive improvements in image classification. For object detection,pre-training and scaling approaches are less well established, especially inthe long-tailed and open-vocabulary setting, where training data i … | Continue reading
A compact summary of present fundamental physics is given and evaluated. Its9 lines contain both general relativity and the standard model of particlephysics. Their precise agreement with experiments, in combination with theirextreme simplicity and their internal consistency, sug … | Continue reading
The main design principles in computer architecture have recently shiftedfrom a monolithic scaling-driven approach to the development of heterogeneousarchitectures that tightly co-integrate multiple specialized processor andmemory chiplets. In such data-hungry multi-chip architec … | Continue reading
Name-based gender classification has enabled hundreds of otherwise infeasiblescientific studies of gender. Yet, the lack of standardization, proliferationof ad hoc methods, reliance on paid services, understudied limitations, andconceptual debates cast a shadow over many applicat … | Continue reading
Cache template attacks demonstrated automated leakage of user input in sharedlibraries. However, for large binaries, the runtime is prohibitively high.Other automated approaches focused on cryptographic implementations and mediasoftware but are not directly applicable to user inp … | Continue reading
We provide three detailed case studies of vulnerabilities in smart contracts,and show how property-based testing would have found them: 1. the Dexter1 token exchange; 2. the iToken; 3. the ICO of Brave's BAT token. The last example is, in fact, new, and was missed in the audi … | Continue reading
CoqQ is a framework for reasoning about quantum programs in the Coq proofassistant. Its main components are: a deeply embedded quantum programminglanguage, in which classic quantum algorithms are easily expressed, and anexpressive program logic for proving properties of programs. … | Continue reading
In this work, we propose a complete framework that generates visual art.Unlike previous stylization methods that are not flexible with style parameters(i.e., they allow stylization with only one style image, a single stylizationtext or stylization of a content image from a certai … | Continue reading
Recent large-scale text-driven synthesis models have attracted much attentionthanks to their remarkable capabilities of generating highly diverse imagesthat follow given text prompts. Such text-based synthesis methods areparticularly appealing to humans who are used to verbally d … | Continue reading
It is becoming increasingly popular for distributed systems to exploitoffload to reduce load on the CPU. Remote Direct Memory Access (RDMA) offload,in particular, has become popular. However, RDMA still requires CPUintervention for complex offloads that go beyond simple remote me … | Continue reading
Modern software systems are often built by leveraging code written by othersin the form of libraries and packages to accelerate their development. Whilethere are many benefits to using third-party packages, software projects oftenbecome dependent on a large number of software pac … | Continue reading
The recent work ``Combinatorial Optimization with Physics-Inspired GraphNeural Networks'' [Nat Mach Intell 4 (2022) 367] introduces a physics-inspiredunsupervised Graph Neural Network (GNN) to solve combinatorial optimizationproblems on sparse graphs. To test the performances of … | Continue reading
Large Language Models (LLMs) have been transformative. They are pre-trainedfoundational models that can be adapted with fine tuning to many differentnatural language tasks, each of which previously would have required a separatenetwork model. This is one step closer to the extrao … | Continue reading
Integrated Development Environments (IDEs) provide tool support to automatemany source code editing tasks. Traditionally, IDEs use only the spatialcontext, i.e., the location where the developer is editing, to generatecandidate edit recommendations. However, spatial context alone … | Continue reading
We present Firefly, a new browser-based interactive tool for visualizing 3Dparticle data sets. On a typical personal computer, Firefly can simultaneouslyrender and enable real-time interactions with > ~10 million particles, and caninteractively explore datasets with billions of p … | Continue reading
Face verification systems aim to validate the claimed identity using featurevectors and distance metrics. However, no attempt has been made to bypass sucha system using generated images that are constrained by the same featurevectors. In this work, we train StarGAN v2 to generate … | Continue reading
Most music theory books are like medieval medical textbooks: they containunjustified superstition, non-reasoning, and funny symbols glorified by Latinphrases. How does music, in particular harmony, actually work, presented as areal, scientific theory of music? The core to our ap … | Continue reading
The 44th International Conference on Software Engineering (ICSE 2022) washeld in person from May 22 to May 27, 2022 in Pittsburgh, PA, USA. Here, wesummarize themes of research and the direction of research in the field ofsoftware engineering and testing that we observed at the c … | Continue reading
Publicly verifiable quantum money is a protocol for the preparation ofquantum states that can be efficiently verified by any party for authenticitybut is computationally infeasible to counterfeit. We develop a cryptographicscheme for publicly verifiable quantum money based on Gau … | Continue reading
Codex, a large language model (LLM) trained on a variety of codebases,exceeds the previous state of the art in its capacity to synthesize andgenerate code. Although Codex provides a plethora of benefits, models that maygenerate code on such scale have significant limitations, ali … | Continue reading
The optical fiber network has become a worldwide infrastructure. In additionto the basic functions in telecommunication, its sensing ability has attractedmore and more attention. In this paper, we discuss the risk of household fiberbeing used for eavesdropping and demonstrate its … | Continue reading
Denizens of Silicon Valley have called Moore's Law "the most important graphin human history," and economists have found that Moore's Law-powered I.T.revolution has been one of the most important sources of national productivitygrowth. But data substantiating these claims tend to … | Continue reading
We show that autoregressive language models can learn to infill text after weapply a straightforward transformation to the dataset, which simply moves aspan of text from the middle of a document to its end. While this dataaugmentation has garnered much interest in recent years, w … | Continue reading
We describe a stochastic, dynamical system capable of inference and learningin a probabilistic latent variable model. The most challenging problem in suchmodels - sampling the posterior distribution over latent variables - isproposed to be solved by harnessing natural sources of … | Continue reading
Thirty study participants playtested an innocent-looking "escape room" gamein virtual reality (VR). Behind the scenes, an adversarial program hadaccurately inferred over 25 personal data attributes, from anthropometrics likeheight and wingspan to demographics like age and gender, … | Continue reading
The study of biases, such as gender or racial biases, is an important topicin the social and behavioural sciences. However, the concept of bias is notalways clearly defined in the literature. Definitions of bias are oftenambiguous, or definitions are not provided at all. To study … | Continue reading
We present initial results of an ongoing engineering study on the feasibilityof a space mission to the focal region of the solar gravitational lens (SGL).The mission goal is to conduct exoplanet imaging operations at heliocentricdistances in the range ~548-900 astronomical units … | Continue reading
The evaluation of the financial markets to predict their behaviour have beenattempted using a number of approaches, to make smart and profitable investmentdecisions. Owing to the highly non-linear trends and inter-dependencies, it isoften difficult to develop a statistical approa … | Continue reading
This paper addresses the visualisation of image classification models, learntusing deep Convolutional Networks (ConvNets). We consider two visualisationtechniques, based on computing the gradient of the class score with respect tothe input image. The first one generates an image, … | Continue reading
Information security isn't just about software and hardware -- it's at leastas much about policies and processes. But the research community overwhelminglyfocuses on the former over the latter, while gaping policy and process problemspersist. In this experience paper, we describe … | Continue reading
In most sports, especially football, most coaches and analysts search for keyperformance indicators using notational analysis. This method utilizes astatistical summary of events based on video footage and numerical records ofgoal scores. Unfortunately, this approach is now obsol … | Continue reading
We present an improved method for symbolic regression that seeks to fit datato formulas that are Pareto-optimal, in the sense of having the best accuracyfor a given complexity. It improves on the previous state-of-the-art bytypically being orders of magnitude more robust toward n … | Continue reading
An emerging theme in artificial intelligence research is the creation ofmodels to simulate the decisions and behavior of specific people, in domainsincluding game-playing, text generation, and artistic expression. These modelsgo beyond earlier approaches in the way they are tailo … | Continue reading
We consider general aspects of the physics underlying the flight of Gossamerspiders, also known as ballooning spiders. We show that existing observationsand the physics of spider silk in the presence of the Earth's staticatmospheric electric field indicate a potentially important … | Continue reading
Scalable Solid-State Drives (SSDs) have revolutionized the way we store andaccess our data across datacenters and handheld devices. Unfortunately, scalingtechnology can have a significant environmental impact. Across the globe, mostsemiconductor manufacturing use electricity that … | Continue reading
By linking to external websites, Wikipedia can act as a gateway to the Web.To date, however, little is known about the amount of traffic generated byWikipedia's external links. We fill this gap in a detailed analysis of usagelogs gathered from Wikipedia users' client devices. Our … | Continue reading
Prototype pollution is a dangerous vulnerability affecting prototype-basedlanguages like JavaScript and the Node.js platform. It refers to the ability ofan attacker to inject properties into an object's root prototype at runtime andsubsequently trigger the execution of legitimate … | Continue reading
Photorealistic telepresence requires both high-fidelity body modeling andfaithful driving to enable dynamically synthesized appearance that isindistinguishable from reality. In this work, we propose an end-to-endframework that addresses two core challenges in modeling and driving … | Continue reading
This paper investigates the cryptocurrency giveaway scam with the YouTubelive stream carried out on 5/15/2022 and 5/16/2022. In this scam scheme, thescammer plays a recorded video of a famous person in a YouTube live streamannotated with a cryptocurrency giveaway announcement. In … | Continue reading
While deep learning has enabled tremendous progress on text and imagedatasets, its superiority on tabular data is not clear. We contribute extensivebenchmarks of standard and novel deep learning methods as well as tree-basedmodels such as XGBoost and Random Forests, across a larg … | Continue reading
In this paper, we present the design, implementation, and analysis of DNSover CoAP (DoC), a new proposal for secure and privacy-friendly name resolutionof constrained IoT devices. We implement different design choices of DoC inRIOT, an open-source operating system for the IoT, ev … | Continue reading
This document aims to be a self-contained, mathematically precise overview oftransformer architectures and algorithms (*not* results). It covers whattransformers are, how they are trained, what they are used for, their keyarchitectural components, and a preview of the most promin … | Continue reading
Among the various approaches for producing point distributions with bluenoise spectrum, we argue for an optimization framework using Gaussian kernels.We show that with a wise selection of optimization parameters, this approachattains unprecedented quality, provably surpassing the … | Continue reading