The Malicious Use of AI: Forecasting, Prevention, and Mitigation (2018) [pdf]

This report surveys the landscape of potential security threats frommalicious uses of AI, and proposes ways to better forecast, prevent, andmitigate these threats. After analyzing the ways in... | Continue reading


@arxiv.org | 5 years ago

Uncertainty from Heisenberg to Today [pdf]

We explore the different meanings of "quantum uncertainty" contained inHeisenberg's seminal paper from 1927, and also some of the precise definitionsthat were explored later. We recount the... | Continue reading


@arxiv.org | 5 years ago

Mac Protocols for Terahertz Communication: A Comprehensive Survey

Terahertz communication is emerging as a future technology to supportTerabits per second link (Tbps) with highlighting features as high throughputand negligible latency. However, the unique... | Continue reading


@arxiv.org | 5 years ago

Why Software Projects Need Heroes (Lessons Learned from 1100 Projects)

Continue reading


@arxiv.org | 5 years ago

Measuring Irregular Geographic Exposure on the Internet

In this work, we examine to what extent the Internet's routing infrastructureneedlessly exposes network traffic to nations geographically irrelevant topacket transmission. We quantify what... | Continue reading


@arxiv.org | 5 years ago

Why Software Projects Need Heroes

A "hero" project is one where 80% or more of the contributions are made bythe 20% of the developers. In the literature, such projects are deprecatedsince they might cause bottlenecks in... | Continue reading


@arxiv.org | 5 years ago

Mining Rules Incrementally over Large Knowledge Bases

Multiple web-scale Knowledge Bases, e.g., Freebase, YAGO, NELL, have beenconstructed using semi-supervised or unsupervised information extractiontechniques and many of them, despite their large... | Continue reading


@arxiv.org | 5 years ago

Impact of a Night of Sleep Deprivation on Novice Developers’ Performance (2018)

We present a quasi-experiment to investigate whether, and to what extent,sleep deprivation impacts the performance of novice software developers usingthe agile practice of test-first development... | Continue reading


@arxiv.org | 5 years ago

HOList: An Environment for Machine Learning of Higher-Order Theorem Proving

Reproducing, comparing and reusing results from machine learning and systemspapers is a very tedious, ad hoc and time-consuming process. I will demonstratehow to automate this process using... | Continue reading


@arxiv.org | 5 years ago

Study urges reappraisal of alleged racial 'bias' in face recognition

Many recent news headlines have labeled face recognition technology as biasedor racist. We report on a methodical investigation into differences in facerecognition accuracy between... | Continue reading


@arxiv.org | 5 years ago

Unsupervised Singing Voice Conversion

We present a deep learning method for singing voice conversion. The proposednetwork is not conditioned on the text or on the notes, and it directlyconverts the audio of one singer to the voice... | Continue reading


@arxiv.org | 5 years ago

Evaluating the Unsupervised Learning of Disentangled Representations

The key idea behind the unsupervised learning of disentangled representationsis that real-world data is generated by a few explanatory factors of variationwhich can be recovered by unsupervised... | Continue reading


@arxiv.org | 5 years ago

Analyzing the Impact of GDPR on Storage Systems [pdf]

The recently introduced General Data Protection Regulation (GDPR) is forcingseveral companies to make significant changes to their systems to achievecompliance. Motivated by the finding that... | Continue reading


@arxiv.org | 5 years ago

Low-Memory Neural Network Training: A Technical Report

Memory is increasingly often the bottleneck when training neural networkmodels. Despite this, techniques to lower the overall memory requirements oftraining have been less widely studied... | Continue reading


@arxiv.org | 5 years ago

Donate to ArXiv

Continue reading


@arxiv.org | 5 years ago

Audio Word2Vec Using Sequence-to-Sequence Autoencoder (2016)

The vector representations of fixed dimensionality for words (in text)offered by Word2Vec have been shown to be very useful in many applicationscenarios, in particular due to the semantic... | Continue reading


@arxiv.org | 5 years ago

Big Math and the One-Brain Barrier a Position Paper and Architecture Proposal

Over the last decades, a class of important mathematical results haverequired an ever increasing amount of human effort to carry out. For some, thehelp of computers is now indispensable. We... | Continue reading


@arxiv.org | 5 years ago

An Introduction to Deep Reinforcement Learning (2018)

Deep reinforcement learning is the combination of reinforcement learning (RL)and deep learning. This field of research has been able to solve a wide rangeof complex decision-making tasks that... | Continue reading


@arxiv.org | 5 years ago

Introduction to Coding Quantum Algorithms: A Tutorial Series Using Pyquil

As the field of Quantum Computing continues to grow, so too has the generalpublic's interest in testing some of the publicly available quantum computers.However, many might find learning all of... | Continue reading


@arxiv.org | 5 years ago

Is coding a relevant metaphor for building AI?

Brette contends that the neural coding metaphor is an invalid basis fortheories of what the brain does. Here, we argue that it is an insufficientguide for building an artificial intelligence... | Continue reading


@arxiv.org | 5 years ago

Is the Starry Night Turbulent?

Vincent van Gogh's painting, The Starry Night, is an iconic piece of art andcultural history. The painting portrays a night sky full of stars, with eddies(spirals) both large and small.... | Continue reading


@arxiv.org | 5 years ago

Cyberbullying in Digital Age: Perspective and Info Sharing Behavior on Twitter [pdf]

Continue reading


@arxiv.org | 5 years ago

First steps to a constructor theory of cognition

This article applies the conceptual framework of constructor theory ofinformation to cognition theory. The main result of this work is that cognitiontheory, in specific situations concerning for... | Continue reading


@arxiv.org | 5 years ago

Topics in Applied Mathematics and Nonlinear Waves

The selection of topics in this text has formed the core of a one semestercourse in applied mathematics at the Arctic University of Norway that has beenrunning continuously since the 1970s. The... | Continue reading


@arxiv.org | 5 years ago

Magic: The Gathering Is Turing Complete

$\textit{Magic: The Gathering}$ is a popular and famously complicated tradingcard game about magical combat. In this paper we show that optimal play inreal-world $\textit{Magic}$ is at least as... | Continue reading


@arxiv.org | 5 years ago

RowHammer: A Retrospective

This retrospective paper describes the RowHammer problem in Dynamic RandomAccess Memory (DRAM), which was initially introduced by Kim et al. at the ISCA2014 conference~\cite{rowhammer-isca2014}.... | Continue reading


@arxiv.org | 5 years ago

A Synergistic Approach for Analyzing Neural Net Robustness

In recent years, the notion of local robustness (or robustness for short) hasemerged as a desirable property of deep neural networks. Intuitively,robustness means that small perturbations to an... | Continue reading


@arxiv.org | 5 years ago

Google Street View image of a house predicts car accident risk of its resident

Road traffic injuries are a leading cause of death worldwide. Properestimation of car accident risk is critical for appropriate allocation ofresources in healthcare, insurance, civil... | Continue reading


@arxiv.org | 5 years ago

Restricting Control Flow During Speculative Execution with Venkman

Side-channel attacks such as Spectre that utilize speculative execution tosteal application secrets pose a significant threat to modern computingsystems. While program transformations can... | Continue reading


@arxiv.org | 5 years ago

Secure and secret cooperation of robotic swarms by using Merkle trees

Swarm robotics systems are envisioned to become an important component ofboth academic research and real-world applications. However, in order to reachwidespread adoption, new models that ensure... | Continue reading


@arxiv.org | 5 years ago

ClangJIT: Enhancing C++ with Just-in-Time Compilation

The C++ programming language is not only a keystone of thehigh-performance-computing ecosystem but has proven to be a successful base forportable parallel-programming frameworks. As is well... | Continue reading


@arxiv.org | 5 years ago

One world versus many: the inadequacy of Everettian accounts of quantum mechanix

There is a compelling intellectual case for exploring whether purely unitaryquantum theory defines a sensible and scientifically adequate theory, asEverett originally proposed. Many different... | Continue reading


@arxiv.org | 5 years ago

The Web is missing an essential part of infrastructure: an Open Web Index

A proposal for building an index of the Web that separates the infrastructurepart of the search engine - the index - from the services part that will formthe basis for myriad search engines and... | Continue reading


@arxiv.org | 5 years ago

Fooling automated surveillance: adversarial patches to attack person detector

Adversarial attacks on machine learning models have seen increasing interestin the past years. By making only subtle changes to the input of aconvolutional neural network, the output of the... | Continue reading


@arxiv.org | 5 years ago

Gentle Measurement of Quantum States and Differential Privacy

In differential privacy (DP), we want to query a database about n users, in away that "leaks at most eps about any individual user," even conditioned on anyoutcome of the query. Meanwhile, in... | Continue reading


@arxiv.org | 5 years ago

Steganography and Steganalysis: Different Approaches [pdf]

Continue reading


@arxiv.org | 5 years ago

Steganography: The Art of Hiding Data [pdf]

Continue reading


@arxiv.org | 5 years ago

A Comprehensive Survey on Deep Learning Approaches (2018)

Deep learning has demonstrated tremendous success in variety of applicationdomains in the past few years. This new field of machine learning has beengrowing rapidly and applied in most of the... | Continue reading


@arxiv.org | 5 years ago

Privacy Loss in Apple’s Implementation of Differential Privacy (2017)

In June 2016, Apple announced that it will deploy differential privacy forsome user data collection in order to ensure privacy of user data, even fromApple. The details of Apple's approach... | Continue reading


@arxiv.org | 5 years ago

Introduction to Multi-Armed Bandits

Multi-armed bandits a simple but very powerful framework for algorithms thatmake decisions over time under uncertainty. An enormous body of work hasaccumulated over the years, covered in several... | Continue reading


@arxiv.org | 5 years ago

Predicting Student Performance Based on Online Study Habits

Online tools provide unique access to research students' study habits andproblem-solving behavior. In MOOCs, this online data can be used to informinstructors and to provide automatic guidance... | Continue reading


@arxiv.org | 5 years ago

Variability in the interpretation of Dutch probability phrases

Verbal probability phrases are often used to express estimated risk. In thisstudy, focus was on the numerical interpretation of 29 Dutch probability andfrequency phrases, including several... | Continue reading


@arxiv.org | 5 years ago

Starlight Deflection Measurements During the 21 August 2017 Total Solar Eclipse

Precise starlight positions near the sun were measured during the 21 August2017 total solar eclipse in order to measure their gravitational deflections.The equipment, procedures, and analysis... | Continue reading


@arxiv.org | 5 years ago

Evaluation of the Riken Post-K Processor Simulator

For the purpose of developing applications for Post-K at an early stage,RIKEN has developed a post-K processor simulator. This simulator is based onthe general-purpose processor simulator gem5.... | Continue reading


@arxiv.org | 5 years ago

GANs for Text to Face Generation

As a sub-domain of text-to-image synthesis, text-to-face generation has hugepotentials in public safety domain. With lack of dataset, there are almost norelated research focusing on text-to-face... | Continue reading


@arxiv.org | 5 years ago

RF-Trojan: Leaking Kernel Data Using Register File Trojan

Register Files (RFs) are the most frequently accessed memories in amicroprocessor for fast and efficient computation and control logic. Segmentregisters and control registers are especially... | Continue reading


@arxiv.org | 5 years ago

A Discussion on Solving Partial Differential Equations Using Neural Networks

Can neural networks learn to solve partial differential equations (PDEs)? Weinvestigate this question for two (systems of) PDEs, namely, the Poissonequation and the steady Navier--Stokes... | Continue reading


@arxiv.org | 5 years ago

From Theory to Systems: A Grounded Approach to Programming Language Education

I present a new approach to teaching a graduate-level programming languagescourse focused on using systems programming ideas and languages likeWebAssembly and Rust to motivate PL theory. Drawing... | Continue reading


@arxiv.org | 5 years ago