Skip to main content

Showing 1–48 of 48 results for author: Thomas, K

  1. arXiv:2407.02027  [pdf, other

    cs.CY

    Privacy Risks of General-Purpose AI Systems: A Foundation for Investigating Practitioner Perspectives

    Authors: Stephen Meisenbacher, Alexandra Klymenko, Patrick Gage Kelley, Sai Teja Peddinti, Kurt Thomas, Florian Matthes

    Abstract: The rise of powerful AI models, more formally $\textit{General-Purpose AI Systems}$ (GPAIS), has led to impressive leaps in performance across a wide range of tasks. At the same time, researchers and practitioners alike have raised a number of privacy concerns, resulting in a wealth of literature covering various privacy risks and vulnerabilities of AI models. Works surveying such risks provide di… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

    Comments: 5 pages. Accepted to SUPA@SOUPS'24

  2. arXiv:2406.15199  [pdf, other

    cs.IT cs.NI

    On the Computing and Communication Tradeoff in Reasoning-Based Multi-User Semantic Communications

    Authors: Nitisha Singh, Christo Kurisummoottil Thomas, Walid Saad, Emilio Calvanese Strinati

    Abstract: Semantic communication (SC) is recognized as a promising approach for enabling reliable communication with minimal data transfer while maintaining seamless connectivity for a group of wireless users. Unlocking the advantages of SC for multi-user cases requires revisiting how communication and computing resources are allocated. This reassessment should consider the reasoning abilities of end-users,… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: 7 pages, 5 figures, in submission to IEEE GLOBECOM

  3. arXiv:2406.12800  [pdf, other

    cs.CR

    Supporting Human Raters with the Detection of Harmful Content using Large Language Models

    Authors: Kurt Thomas, Patrick Gage Kelley, David Tao, Sarah Meiklejohn, Owen Vallis, Shunwen Tan, Blaž Bratanič, Felipe Tiengo Ferreira, Vijay Kumar Eranti, Elie Bursztein

    Abstract: In this paper, we explore the feasibility of leveraging large language models (LLMs) to automate or otherwise assist human raters with identifying harmful content including hate speech, harassment, violent extremism, and election misinformation. Using a dataset of 50,000 comments, we demonstrate that LLMs can achieve 90% accuracy when compared to human verdicts. We explore how to best leverage the… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  4. arXiv:2406.12161  [pdf, other

    cs.CY cs.CR cs.HC cs.SI

    Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse

    Authors: Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, Rebecca Umbach

    Abstract: Image-based sexual abuse (IBSA), like other forms of technology-facilitated abuse, is a growing threat to people's digital safety. Attacks include unwanted solicitations for sexually explicit images, extorting people under threat of leaking their images, or purposefully leaking images to enact revenge or exert control. In this paper, we explore how people seek and receive help for IBSA on social m… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: 18 pages, 4 figures, 8 tables, 103 references

    ACM Class: K.4.2; H.4.3; J.4

    Journal ref: Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024)

  5. arXiv:2406.06183  [pdf, other

    cs.CV cs.IR

    Black carbon plumes from gas flaring in North Africa identified from multi-spectral imagery with deep learning

    Authors: Tuel Alexandre, Kerdreux Thomas, Thiry Louis

    Abstract: Black carbon (BC) is an important pollutant aerosol emitted by numerous human activities, including gas flaring. Improper combustion in flaring activities can release large amounts of BC, which is harmful to human health and has a strong climate warming effect. To our knowledge, no study has ever directly monitored BC emissions from satellite imagery. Previous works quantified BC emissions indirec… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: Published at the workshop Tackling Climate Change with Machine Learning at ICLR 2024

  6. arXiv:2405.09757  [pdf, other

    cs.CR

    Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates

    Authors: Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn

    Abstract: Scams -- fraudulent schemes designed to swindle money from victims -- have existed for as long as recorded history. However, the Internet's combination of low communication cost, global reach, and functional anonymity has allowed scam volumes to reach new heights. Designing effective interventions requires first understanding the context: how scammers reach potential victims, the earnings they mak… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: Under review

  7. arXiv:2405.02336  [pdf, other

    cs.AI cs.LG cs.NI

    Artificial General Intelligence (AGI)-Native Wireless Systems: A Journey Beyond 6G

    Authors: Walid Saad, Omar Hashash, Christo Kurisummoottil Thomas, Christina Chaccour, Merouane Debbah, Narayan Mandayam, Zhu Han

    Abstract: Building future wireless systems that support services like digital twins (DTs) is challenging to achieve through advances to conventional technologies like meta-surfaces. While artificial intelligence (AI)-native networks promise to overcome some limitations of wireless technologies, developments still rely on AI tools like neural networks. Such tools struggle to cope with the non-trivial challen… ▽ More

    Submitted 29 April, 2024; originally announced May 2024.

  8. arXiv:2403.06514  [pdf, other

    cs.CV cs.AI

    Structure Your Data: Towards Semantic Graph Counterfactuals

    Authors: Angeliki Dimitriou, Maria Lymperaiou, Giorgos Filandrianos, Konstantinos Thomas, Giorgos Stamou

    Abstract: Counterfactual explanations (CEs) based on concepts are explanations that consider alternative scenarios to understand which high-level semantic features contributed to particular model predictions. In this work, we propose CEs based on the semantic graphs accompanying input data to achieve more descriptive, accurate, and human-aligned explanations. Building upon state-of-the-art (SoTA) conceptual… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Journal ref: ICML 2024

  9. arXiv:2402.01748  [pdf, other

    cs.NI cs.AI cs.CL cs.LG

    Large Multi-Modal Models (LMMs) as Universal Foundation Models for AI-Native Wireless Systems

    Authors: Shengzhe Xu, Christo Kurisummoottil Thomas, Omar Hashash, Nikhil Muralidhar, Walid Saad, Naren Ramakrishnan

    Abstract: Large language models (LLMs) and foundation models have been recently touted as a game-changer for 6G systems. However, recent efforts on LLMs for wireless networks are limited to a direct application of existing language models that were designed for natural language processing (NLP) applications. To address this challenge and create wireless-centric foundation models, this paper presents a compr… ▽ More

    Submitted 7 February, 2024; v1 submitted 29 January, 2024; originally announced February 2024.

  10. arXiv:2311.18224  [pdf, other

    cs.IT cs.AI cs.LG

    Reasoning with the Theory of Mind for Pragmatic Semantic Communication

    Authors: Christo Kurisummoottil Thomas, Emilio Calvanese Strinati, Walid Saad

    Abstract: In this paper, a pragmatic semantic communication framework that enables effective goal-oriented information sharing between two-intelligent agents is proposed. In particular, semantics is defined as the causal state that encapsulates the fundamental causal relationships and dependencies among different features extracted from data. The proposed framework leverages the emerging concept in machine… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

  11. arXiv:2310.20685  [pdf, other

    cs.CV

    NeRF Revisited: Fixing Quadrature Instability in Volume Rendering

    Authors: Mikaela Angelina Uy, Kiyohiro Nakayama, Guandao Yang, Rahul Krishna Thomas, Leonidas Guibas, Ke Li

    Abstract: Neural radiance fields (NeRF) rely on volume rendering to synthesize novel views. Volume rendering requires evaluating an integral along each ray, which is numerically approximated with a finite sum that corresponds to the exact integral along the ray under piecewise constant volume density. As a consequence, the rendered result is unstable w.r.t. the choice of samples along the ray, a phenomenon… ▽ More

    Submitted 19 January, 2024; v1 submitted 31 October, 2023; originally announced October 2023.

    Comments: Neurips 2023

  12. arXiv:2309.13223  [pdf, other

    cs.IT cs.LG

    Causal Reasoning: Charting a Revolutionary Course for Next-Generation AI-Native Wireless Networks

    Authors: Christo Kurisummoottil Thomas, Christina Chaccour, Walid Saad, Merouane Debbah, Choong Seon Hong

    Abstract: Despite the basic premise that next-generation wireless networks (e.g., 6G) will be artificial intelligence (AI)-native, to date, most existing efforts remain either qualitative or incremental extensions to existing "AI for wireless" paradigms. Indeed, creating AI-native wireless networks faces significant technical challenges due to the limitations of data-driven, training-intensive AI. These lim… ▽ More

    Submitted 31 January, 2024; v1 submitted 22 September, 2023; originally announced September 2023.

  13. arXiv:2305.17667  [pdf, other

    cs.AI cs.LG

    Choose your Data Wisely: A Framework for Semantic Counterfactuals

    Authors: Edmund Dervakos, Konstantinos Thomas, Giorgos Filandrianos, Giorgos Stamou

    Abstract: Counterfactual explanations have been argued to be one of the most intuitive forms of explanation. They are typically defined as a minimal set of edits on a given data sample that, when applied, changes the output of a model on that sample. However, a minimal set of edits is not always clear and understandable to an end-user, as it could, for instance, constitute an adversarial example (which is i… ▽ More

    Submitted 28 May, 2023; originally announced May 2023.

    Comments: To appear at IJCAI 2023

  14. arXiv:2304.12502  [pdf, ps, other

    cs.LG cs.IT eess.SP stat.ME

    Causal Semantic Communication for Digital Twins: A Generalizable Imitation Learning Approach

    Authors: Christo Kurisummoottil Thomas, Walid Saad, Yong Xiao

    Abstract: A digital twin (DT) leverages a virtual representation of the physical world, along with communication (e.g., 6G), computing (e.g., edge computing), and artificial intelligence (AI) technologies to enable many connected intelligence services. In order to handle the large amounts of network data based on digital twins (DTs), wireless systems can exploit the paradigm of semantic communication (SC) f… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

  15. arXiv:2304.02810  [pdf, other

    cs.CR

    Robust, privacy-preserving, transparent, and auditable on-device blocklisting

    Authors: Kurt Thomas, Sarah Meiklejohn, Michael A. Specter, Xiang Wang, Xavier Llorà, Stephan Somogyi, David Kleidermacher

    Abstract: With the accelerated adoption of end-to-end encryption, there is an opportunity to re-architect security and anti-abuse primitives in a manner that preserves new privacy expectations. In this paper, we consider two novel protocols for on-device blocklisting that allow a client to determine whether an object (e.g., URL, document, image, etc.) is harmful based on threat information possessed by a so… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

  16. arXiv:2303.08017  [pdf, other

    cs.IT cs.LG eess.SP

    Reliable Beamforming at Terahertz Bands: Are Causal Representations the Way Forward?

    Authors: Christo Kurisummoottil Thomas, Walid Saad

    Abstract: Future wireless services, such as the metaverse require high information rate, reliability, and low latency. Multi-user wireless systems can meet such requirements by utilizing the abundant terahertz bandwidth with a massive number of antennas, creating narrow beamforming solutions. However, existing solutions lack proper modeling of channel dynamics, resulting in inaccurate beamforming solutions… ▽ More

    Submitted 14 March, 2023; originally announced March 2023.

    Comments: Accepted at IEEE ICASSP 2023

  17. arXiv:2303.02400  [pdf, other

    cs.CV cs.AI

    Fine-Grained ImageNet Classification in the Wild

    Authors: Maria Lymperaiou, Konstantinos Thomas, Giorgos Stamou

    Abstract: Image classification has been one of the most popular tasks in Deep Learning, seeing an abundance of impressive implementations each year. However, there is a lot of criticism tied to promoting complex architectures that continuously push performance metrics higher and higher. Robustness tests can uncover several vulnerabilities and biases which go unnoticed during the typical model evaluation sta… ▽ More

    Submitted 4 March, 2023; originally announced March 2023.

    Journal ref: AAAI MAKE 2023

  18. arXiv:2303.01555  [pdf, other

    cs.CV cs.AI

    Counterfactual Edits for Generative Evaluation

    Authors: Maria Lymperaiou, Giorgos Filandrianos, Konstantinos Thomas, Giorgos Stamou

    Abstract: Evaluation of generative models has been an underrepresented field despite the surge of generative architectures. Most recent models are evaluated upon rather obsolete metrics which suffer from robustness issues, while being unable to assess more aspects of visual quality, such as compositionality and logic of synthesis. At the same time, the explainability of generative models remains a limited,… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

    Journal ref: AAAI MAKE 2023

  19. arXiv:2302.10149  [pdf, other

    cs.CR cs.LG

    Poisoning Web-Scale Training Datasets is Practical

    Authors: Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr

    Abstract: Deep learning models are often trained on distributed, web-scale datasets crawled from the internet. In this paper, we introduce two new dataset poisoning attacks that intentionally introduce malicious examples to a model's performance. Our attacks are immediately practical and could, today, poison 10 popular datasets. Our first attack, split-view poisoning, exploits the mutable nature of internet… ▽ More

    Submitted 6 May, 2024; v1 submitted 20 February, 2023; originally announced February 2023.

  20. "There's so much responsibility on users right now:" Expert Advice for Staying Safer From Hate and Harassment

    Authors: Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Franziska Roesner, Kurt Thomas

    Abstract: Online hate and harassment poses a threat to the digital safety of people globally. In light of this risk, there is a need to equip as many people as possible with advice to stay safer online. We interviewed 24 experts to understand what threats and advice internet users should prioritize to prevent or mitigate harm. As part of this, we asked experts to evaluate 45 pieces of existing hate-and-hara… ▽ More

    Submitted 29 August, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

    Comments: 17 pages, 7 figures, 1 table, 84 references

    Journal ref: Proceedings of the 2023 Conference on Human Factors in Computing Systems (CHI)

  21. arXiv:2302.02065  [pdf, other

    cs.IT eess.SP

    Sensing aided Channel Estimation in Wideband Millimeter-Wave MIMO Systems

    Authors: Rakesh Mundlamuri, Rajeev Gangula, Christo Kurisummoottil Thomas, Florian Kaltenberger, Walid Saad

    Abstract: In this work, the uplink channel estimation problem is considered for a millimeter wave (mmWave) multi-input multi-output (MIMO) system. It is well known that pilot overhead and computation complexity in estimating the channel increases with the number of antennas and the bandwidth. To overcome this, the proposed approach allows the channel estimation at the base station to be aided by the sensing… ▽ More

    Submitted 3 February, 2023; originally announced February 2023.

  22. arXiv:2210.12083  [pdf, other

    cs.CR cs.CY

    Do Content Management Systems Impact the Security of Free Content Websites? A Correlation Analysis

    Authors: Mohammed Alaqdhi, Abdulrahman Alabduljabbar, Kyle Thomas, Saeed Salem, DaeHun Nyang, David Mohaisen

    Abstract: This paper investigates the potential causes of the vulnerabilities of free content websites to address risks and maliciousness. Assembling more than 1,500 websites with free and premium content, we identify their content management system (CMS) and malicious attributes. We use frequency analysis at both the aggregate and per category of content (books, games, movies, music, and software), utilizi… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: 7 pages, 1 figure, 6 tables

  23. arXiv:2210.12040  [pdf, ps, other

    cs.LG cs.CL cs.IT

    Neuro-Symbolic Causal Reasoning Meets Signaling Game for Emergent Semantic Communications

    Authors: Christo Kurisummoottil Thomas, Walid Saad

    Abstract: Semantic communication (SC) aims to communicate reliably with minimal data transfer while simultaneously providing seamless connectivity to heterogeneous services and users. In this paper, a novel emergent SC (ESC) system framework is proposed and is composed of a signaling game for emergent language design and a neuro-symbolic (NeSy) artificial intelligence (AI) approach for causal reasoning. In… ▽ More

    Submitted 7 November, 2023; v1 submitted 21 October, 2022; originally announced October 2022.

  24. arXiv:2209.02533  [pdf, other

    cs.SI cs.CR cs.CY

    Understanding Longitudinal Behaviors of Toxic Accounts on Reddit

    Authors: Deepak Kumar, Jeff Hancock, Kurt Thomas, Zakir Durumeric

    Abstract: Toxic comments are the top form of hate and harassment experienced online. While many studies have investigated the types of toxic comments posted online, the effects that such content has on people, and the impact of potential defenses, no study has captured the long-term behaviors of the accounts that post toxic comments or how toxic comments are operationalized. In this paper, we present a long… ▽ More

    Submitted 6 September, 2022; originally announced September 2022.

  25. arXiv:2206.07499  [pdf, ps, other

    cs.IT eess.SP

    Mitigating Intra-Cell Pilot Contamination in Massive MIMO: A Rate Splitting Approach

    Authors: Anup Mishra, Yijie Mao, Christo Kurisummoottil Thomas, Luca Sanguinetti, Bruno Clerckx

    Abstract: Massive multiple-input multiple-output (MaMIMO) has become an integral part of the fifth-generation (5G) standard, and is envisioned to be further developed in beyond 5G (B5G) networks. With a massive number of antennas at the base station (BS), MaMIMO is best equipped to cater prominent use cases of B5G networks such as enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (… ▽ More

    Submitted 14 November, 2022; v1 submitted 15 June, 2022; originally announced June 2022.

  26. arXiv:2205.10768  [pdf, ps, other

    cs.LG cs.AI cs.IT

    Neuro-Symbolic Artificial Intelligence (AI) for Intent based Semantic Communication

    Authors: Christo Kurisummoottil Thomas, Walid Saad

    Abstract: Intent-based networks that integrate sophisticated machine reasoning technologies will be a cornerstone of future wireless 6G systems. Intent-based communication requires the network to consider the semantics (meanings) and effectiveness (at end-user) of the data transmission. This is essential if 6G systems are to communicate reliably with fewer bits while simultaneously providing connectivity to… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

  27. arXiv:2205.02422  [pdf, ps, other

    cs.NI quant-ph

    Quantum Semantic Communications for Resource-Efficient Quantum Networking

    Authors: Mahdi Chehimi, Christina Chaccour, Christo Kurisummoottil Thomas, Walid Saad

    Abstract: Quantum communication networks (QCNs) utilize quantum mechanics for secure information transmission, but the reliance on fragile and expensive photonic quantum resources renders QCN resource optimization challenging. Unlike prior QCN works that relied on blindly compressing direct quantum embeddings of classical data, this letter proposes a novel quantum semantic communications (QSC) framework exp… ▽ More

    Submitted 28 April, 2024; v1 submitted 4 May, 2022; originally announced May 2022.

    Comments: 5 pages, 3 figures

  28. arXiv:2201.03954  [pdf, other

    cs.LG cs.AI

    The Dataset Nutrition Label (2nd Gen): Leveraging Context to Mitigate Harms in Artificial Intelligence

    Authors: Kasia S. Chmielinski, Sarah Newman, Matt Taylor, Josh Joseph, Kemi Thomas, Jessica Yurkofsky, Yue Chelsea Qiu

    Abstract: As the production of and reliance on datasets to produce automated decision-making systems (ADS) increases, so does the need for processes for evaluating and interrogating the underlying data. After launching the Dataset Nutrition Label in 2018, the Data Nutrition Project has made significant updates to the design and purpose of the Label, and is launching an updated Label in late 2020, which is p… ▽ More

    Submitted 10 March, 2022; v1 submitted 10 January, 2022; originally announced January 2022.

  29. arXiv:2112.07047  [pdf, ps, other

    cs.CY

    SoK: A Framework for Unifying At-Risk User Research

    Authors: Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, Kurt Thomas

    Abstract: At-risk users are people who experience elevated digital security, privacy, and safety threats because of what they do, who they are, where they are, or who they are with. In this systematization work, we present a framework for reasoning about at-risk users based on a wide-ranging meta-analysis of 85 papers. Across the varied populations that we examined (e.g., children, activists, women in devel… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

    Comments: 18 pages, 2 tables

  30. arXiv:2106.13202  [pdf, other

    q-bio.QM cs.LG

    SALT: Sea lice Adaptive Lattice Tracking -- An Unsupervised Approach to Generate an Improved Ocean Model

    Authors: Ju An Park, Vikram Voleti, Kathryn E. Thomas, Alexander Wong, Jason L. Deglint

    Abstract: Warming oceans due to climate change are leading to increased numbers of ectoparasitic copepods, also known as sea lice, which can cause significant ecological loss to wild salmon populations and major economic loss to aquaculture sites. The main transport mechanism driving the spread of sea lice populations are near-surface ocean currents. Present strategies to estimate the distribution of sea li… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

    Comments: 5 pages, 3 figures, 3 tables

  31. arXiv:2106.04811  [pdf, other

    cs.DC cs.CR cs.DB cs.NI

    Benchmarking NetBASILISK: a Network Security Project for Science

    Authors: Jem Guhit, Edward Colone, Shawn McKee, Kris Steinhoff, Katarina Thomas

    Abstract: Infrastructures supporting distributed scientific collaborations must address competing goals in both providing high-performance access to resources while simultaneously securing the infrastructure against security threats. The NetBASILISK project is attempting to improve the security of such infrastructures while not adversely impacting their performance. This paper will present our work to creat… ▽ More

    Submitted 9 June, 2021; originally announced June 2021.

    Comments: 12 pages, 4 figures, presented at vCHEP '21 Conference

  32. arXiv:2106.04511  [pdf, other

    cs.SI cs.CR cs.CY cs.HC

    Designing Toxic Content Classification for a Diversity of Perspectives

    Authors: Deepak Kumar, Patrick Gage Kelley, Sunny Consolvo, Joshua Mason, Elie Bursztein, Zakir Durumeric, Kurt Thomas, Michael Bailey

    Abstract: In this work, we demonstrate how existing classifiers for identifying toxic comments online fail to generalize to the diverse concerns of Internet users. We survey 17,280 participants to understand how user expectations for what constitutes toxic content differ across demographics, beliefs, and personal experiences. We find that groups historically at-risk of harassment - such as people who identi… ▽ More

    Submitted 4 June, 2021; originally announced June 2021.

  33. arXiv:2106.00236  [pdf, other

    cs.CY

    "Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns

    Authors: Sunny Consolvo, Patrick Gage Kelley, Tara Matthews, Kurt Thomas, Lee Dunn, Elie Bursztein

    Abstract: People who are involved with political campaigns face increased digital security threats from well-funded, sophisticated attackers, especially nation-states. Improving political campaign security is a vital part of protecting democracy. To identify campaign security issues, we conducted qualitative research with 28 participants across the U.S. political spectrum to understand the digital security… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: 18 pages, 2 tables, one ancillary file with 4 appendices

  34. arXiv:2104.11537  [pdf, other

    cs.IT eess.SP

    Practical Hybrid Beamforming for Millimeter Wave Massive MIMO Full Duplex with Limited Dynamic Range

    Authors: Chandan Kumar Sheemar, Christo Kurisummoottil Thomas, Dirk Slock

    Abstract: Full Duplex (FD) radio has emerged as a promising solution to increase the data rates by up to a factor of two via simultaneous transmission and reception in the same frequency band. This paper studies a novel hybrid beamforming (HYBF) design to maximize the weighted sum-rate (WSR) in a single-cell millimeter wave (mmWave) massive multiple-input-multiple-output (mMIMO) FD system. Motivated by prac… ▽ More

    Submitted 3 January, 2022; v1 submitted 23 April, 2021; originally announced April 2021.

  35. arXiv:2012.12406  [pdf

    cs.CV q-bio.QM q-bio.TO

    Open source software for automatic subregional assessment of knee cartilage degradation using quantitative T2 relaxometry and deep learning

    Authors: Kevin A. Thomas, Dominik Krzemiński, Łukasz Kidziński, Rohan Paul, Elka B. Rubin, Eni Halilaj, Marianne S. Black, Akshay Chaudhari, Garry E. Gold, Scott L. Delp

    Abstract: Objective: We evaluate a fully-automated femoral cartilage segmentation model for measuring T2 relaxation values and longitudinal changes using multi-echo spin echo (MESE) MRI. We have open sourced this model and corresponding segmentations. Methods: We trained a neural network to segment femoral cartilage from MESE MRIs. Cartilage was divided into 12 subregions along medial-lateral, superficial-d… ▽ More

    Submitted 22 December, 2020; originally announced December 2020.

  36. arXiv:2004.12485  [pdf, other

    cs.LG cs.AI

    Learning To Navigate The Synthetically Accessible Chemical Space Using Reinforcement Learning

    Authors: Sai Krishna Gottipati, Boris Sattarov, Sufeng Niu, Yashaswi Pathak, Haoran Wei, Shengchao Liu, Karam M. J. Thomas, Simon Blackburn, Connor W. Coley, Jian Tang, Sarath Chandar, Yoshua Bengio

    Abstract: Over the last decade, there has been significant progress in the field of machine learning for de novo drug design, particularly in deep generative models. However, current generative approaches exhibit a significant challenge as they do not ensure that the proposed molecular structures can be feasibly synthesized nor do they provide the synthesis routes of the proposed small molecules, thereby se… ▽ More

    Submitted 19 May, 2020; v1 submitted 26 April, 2020; originally announced April 2020.

    Comments: added the statistics of top-100 compounds used logP metric with scaled components added values of the initial reactants to the box plots some values in tables are recalculated due to the inconsistent environments on different machines. corresponding benchmarks were rerun with the requirements on github. no significant changes in the results. corrected figures in the Appendix

  37. arXiv:2003.06478  [pdf, other

    cs.IT eess.SP

    A Rate Splitting Strategy for Mitigating Intra-Cell Pilot Contamination in Massive MIMO

    Authors: Christo Kurisummoottil Thomas, Bruno Clerckx, Luca Sanguinetti, Dirk Slock

    Abstract: The spectral efficiency (SE) of Massive MIMO (MaMIMO) systems is affected by low quality channel estimates. Rate-Splitting (RS) has recently gained some interest in multiuser multiple antenna systems as an effective means to mitigate the multi-user interference due to imperfect channel state information. This paper investigates the benefits of RS in the downlink of a single-cell MaMIMO system when… ▽ More

    Submitted 13 March, 2020; originally announced March 2020.

  38. arXiv:1909.09566  [pdf, other

    cs.CV

    Target-Specific Action Classification for Automated Assessment of Human Motor Behavior from Video

    Authors: Behnaz Rezaei, Yiorgos Christakis, Bryan Ho, Kevin Thomas, Kelley Erb, Sarah Ostadabbas, Shyamal Patel

    Abstract: Objective monitoring and assessment of human motor behavior can improve the diagnosis and management of several medical conditions. Over the past decade, significant advances have been made in the use of wearable technology for continuously monitoring human motor behavior in free-living conditions. However, wearable technology remains ill-suited for applications which require monitoring and interp… ▽ More

    Submitted 20 September, 2019; originally announced September 2019.

    Comments: This manuscript is under submission to the Sensors journal

  39. arXiv:1906.08891  [pdf, other

    cs.CV cs.CY cs.HC eess.IV

    Predicting Future Opioid Incidences Today

    Authors: Sandipan Choudhuri, Kaustav Basu, Kevin Thomas, Arunabha Sen

    Abstract: According to the Center of Disease Control (CDC), the Opioid epidemic has claimed more than 72,000 lives in the US in 2017 alone. In spite of various efforts at the local, state and federal level, the impact of the epidemic is becoming progressively worse, as evidenced by the fact that the number of Opioid related deaths increased by 12.5\% between 2016 and 2017. Predictive analytics can play an i… ▽ More

    Submitted 20 June, 2019; originally announced June 2019.

  40. arXiv:1807.03397  [pdf, other

    cs.CL

    Detecting Levels of Depression in Text Based on Metrics

    Authors: Ashwath Kumar Salimath, Robin K Thomas, Sethuram Ramalinga Reddy, Yuhao Qiao

    Abstract: Depression is one of the most common and a major concern for society. Proper monitoring using devices that can aid in its detection could be helpful to prevent it all together. The Distress Analysis Interview Corpus (DAIC) is used to build a metric-based depression detection. We have designed a metric to describe the level of depression using negative sentences and classify the participant accordi… ▽ More

    Submitted 9 July, 2018; originally announced July 2018.

    Comments: 7 pages, 1 Table

  41. arXiv:1806.00592  [pdf, ps, other

    cs.IT cs.DM math.CO

    Batch Codes for Asynchronous Recovery of Data

    Authors: Ago-Erik Riet, Vitaly Skachek, Eldho K. Thomas

    Abstract: We propose a new model of asynchronous batch codes that allow for parallel recovery of information symbols from a coded database in an asynchronous manner, i.e. when queries arrive at random times and they take varying time to process. We show that the graph-based batch codes studied by et al. are asynchronous. Further, we demonstrate that hypergraphs of Berge girth larger or equal to 4, respectiv… ▽ More

    Submitted 5 September, 2020; v1 submitted 2 June, 2018; originally announced June 2018.

    Comments: 18 pages

    MSC Class: 68P30 (primary) 05D99; 05B40 (secondary) ACM Class: E.4; G.2

  42. arXiv:1803.06772  [pdf, other

    cs.CR cs.SI

    SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection

    Authors: Peng Gao, Binghui Wang, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, Prateek Mittal

    Abstract: Sybil attacks are becoming increasingly widespread and pose a significant threat to online social systems; a single adversary can inject multiple colluding identities in the system to compromise security and privacy. Recent works have leveraged social network-based trust relationships to defend against Sybil attacks. However, existing defenses are based on oversimplified assumptions about network… ▽ More

    Submitted 6 June, 2018; v1 submitted 18 March, 2018; originally announced March 2018.

    Comments: Accepted paper at IEEE CNS 2018

  43. arXiv:1701.07579  [pdf, ps, other

    cs.IT

    Explicit Constructions and Bounds for Batch Codes with Restricted Size of Reconstruction Sets

    Authors: Eldho K. Thomas, Vitaly Skachek

    Abstract: Linear batch codes and codes for private information retrieval (PIR) with a query size $t$ and a restricted size $r$ of the reconstruction sets are studied. New bounds on the parameters of such codes are derived for small values of $t$ or of $r$ by providing corresponding constructions. By building on the ideas of Cadambe and Mazumdar, a new bound in a recursive form is derived for batch codes and… ▽ More

    Submitted 4 July, 2017; v1 submitted 26 January, 2017; originally announced January 2017.

    Comments: To appear in 5ICMCTA

  44. arXiv:1701.01938  [pdf, other

    cs.IT

    Polar Coding for the Binary Erasure Channel with Deletions

    Authors: Eldho K. Thomas, Vincent Y. F. Tan, Alexander Vardy, Mehul Motani

    Abstract: We study the application of polar codes in deletion channels by analyzing the cascade of a binary erasure channel (BEC) and a deletion channel. We show how polar codes can be used effectively on a BEC with a single deletion, and propose a list decoding algorithm with a cyclic redundancy check for this case. The decoding complexity is $O(N^2\log N)$, where $N$ is the blocklength of the code. An imp… ▽ More

    Submitted 8 January, 2017; originally announced January 2017.

    Comments: 4 pages; 1 figure; To appear in the IEEE Communication Letters

  45. arXiv:1504.01359  [pdf, ps, other

    cs.IT

    On Group Violations of Inequalities in five Subgroups

    Authors: Nadya Markin, Eldho K. Thomas, Frederique Oggier

    Abstract: We consider ten linear rank inequalities, which always hold for ranks of vector subspaces, and look at them as group inequalities. We prove that groups of order pq, for p,q two distinct primes, always satisfy these ten group inequalities. We give partial results for groups of order $p^2q$, and find that the symmetric group $S_4$ is the smallest group that yield violations, for two among the ten gr… ▽ More

    Submitted 18 March, 2015; originally announced April 2015.

  46. arXiv:1503.02985  [pdf, other

    cs.SI cs.CR

    SybilFrame: A Defense-in-Depth Framework for Structure-Based Sybil Detection

    Authors: Peng Gao, Neil Zhenqiang Gong, Sanjeev Kulkarni, Kurt Thomas, Prateek Mittal

    Abstract: Sybil attacks are becoming increasingly widespread, and pose a significant threat to online social systems; a single adversary can inject multiple colluding identities in the system to compromise security and privacy. Recent works have leveraged the use of social network-based trust relationships to defend against Sybil attacks. However, existing defenses are based on oversimplified assumptions, w… ▽ More

    Submitted 27 March, 2018; v1 submitted 10 March, 2015; originally announced March 2015.

    Comments: 17 pages, 18 figures

  47. arXiv:1301.6328  [pdf, ps, other

    math.GR cs.IT

    Explicit Constructions of Quasi-Uniform Codes from Groups

    Authors: Eldho K. Thomas, Frederique Oggier

    Abstract: We address the question of constructing explicitly quasi-uniform codes from groups. We determine the size of the codebook, the alphabet and the minimum distance as a function of the corresponding group, both for abelian and some nonabelian groups. Potentials applications comprise the design of almost affine codes and non-linear network codes.

    Submitted 27 January, 2013; originally announced January 2013.

  48. arXiv:1212.1298  [pdf, ps, other

    math.GR cs.IT

    On Abelian Group Representability of Finite Groups

    Authors: Eldho K. Thomas, Nadya Markin, Frédérique Oggier

    Abstract: A set of quasi-uniform random variables $X_1,...,X_n$ may be generated from a finite group $G$ and $n$ of its subgroups, with the corresponding entropic vector depending on the subgroup structure of $G$. It is known that the set of entropic vectors obtained by considering arbitrary finite groups is much richer than the one provided just by abelian groups. In this paper, we start to investigate in… ▽ More

    Submitted 8 December, 2012; v1 submitted 6 December, 2012; originally announced December 2012.

    Comments: 14 pages

    MSC Class: 20D15; 94A17