Zum Hauptinhalt springen

Showing 1–16 of 16 results for author: Hall, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.05895  [pdf, other

    cs.CY cs.CR

    Gender of Recruiter Makes a Difference: A study into Cybersecurity Graduate Recruitment

    Authors: Joanne L. Hall, Asha Rao

    Abstract: An ever-widening workforce gap exists in the global cybersecurity industry but diverse talent is underutilized. The global cybersecurity workforce is only 25% female. Much research exists on the effect of gender bias on the hiring of women into the technical workforce, but little on how the gender of the recruiter (gender difference) affects recruitment decisions. This research reveals differences… ▽ More

    Submitted 11 August, 2024; originally announced August 2024.

    Comments: 22 pages, 4 figures

  2. arXiv:2401.17459  [pdf, ps, other

    cs.CR cs.AI

    A Preliminary Study on Using Large Language Models in Software Pentesting

    Authors: Kumar Shashwat, Francis Hahn, Xinming Ou, Dmitry Goldgof, Lawrence Hall, Jay Ligatti, S. Raj Rajgopalan, Armin Ziaie Tabari

    Abstract: Large language models (LLM) are perceived to offer promising potentials for automating security tasks, such as those found in security operation centers (SOCs). As a first step towards evaluating this perceived potential, we investigate the use of LLMs in software pentesting, where the main task is to automatically identify software security vulnerabilities in source code. We hypothesize that an L… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

  3. arXiv:2309.15004  [pdf, other

    cs.CL cs.AI cs.LG

    Automating question generation from educational text

    Authors: Ayan Kumar Bhowmick, Ashish Jagmohan, Aditya Vempaty, Prasenjit Dey, Leigh Hall, Jeremy Hartman, Ravi Kokku, Hema Maheshwari

    Abstract: The use of question-based activities (QBAs) is wide-spread in education, traditionally forming an integral part of the learning and assessment process. In this paper, we design and evaluate an automated question generation tool for formative and summative assessment in schools. We present an expert survey of one hundred and four teachers, demonstrating the need for automated generation of QBAs, as… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Comments: Accepted to AI-2023 (Forty-third SGAI International Conference on Artificial Intelligence) as a long paper, link: http://www.bcs-sgai.org/ai2023

  4. arXiv:2309.00915  [pdf, ps, other

    cs.CR

    Manifesting Unobtainable Secrets: Threshold Elliptic Curve Key Generation using Nested Shamir Secret Sharing

    Authors: J. L. Hall, Y. Hertzog, M. Loewy, M. P. Skerritt, D. Valladolid, G. Verma

    Abstract: We present a mechanism to manifest unobtainable secrets using a nested Shamir secret sharing scheme to create public/private key pairs for elliptic curves. A threshold secret sharing scheme can be used as a decentralised trust mechanism with applications in identity validation, message decryption, and agreement empowerment. Decentralising trust means that there is no single point vulnerability whi… ▽ More

    Submitted 2 September, 2023; originally announced September 2023.

  5. arXiv:2210.05847  [pdf, other

    cs.SI

    Experimental Evaluation of Baselines for Forecasting Social Media Timeseries

    Authors: Kin Wai Ng, Frederick Mubang, Lawrence O. Hall, John Skvoretz, Adriana Iamnitchi

    Abstract: Forecasting social media activity can be of practical use in many scenarios, from understanding trends, such as which topics are likely to engage more users in the coming week, to identifying unusual behavior, such as coordinated information operations or PumpNDump efforts. To evaluate a new approach to forecasting, it is important to have baselines against which to assess performance gains. We ex… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

  6. arXiv:2202.08964  [pdf, other

    cs.LG cs.CY cs.SI

    Simulating User-Level Twitter Activity with XGBoost and Probabilistic Hybrid Models

    Authors: Fred Mubang, Lawrence Hall

    Abstract: The Volume-Audience-Match simulator, or VAM was applied to predict future activity on Twitter related to international economic affairs. VAM was applied to do timeseries forecasting to predict the: (1) number of total activities, (2) number of active old users, and (3) number of newly active users over the span of 24 hours from the start time of prediction. VAM then used these volume predictions t… ▽ More

    Submitted 17 February, 2022; originally announced February 2022.

  7. arXiv:2109.02785  [pdf, other

    q-bio.QM cs.CV cs.LG eess.IV

    Analysis of MRI Biomarkers for Brain Cancer Survival Prediction

    Authors: Subhashis Banerjee, Sushmita Mitra, Lawrence O. Hall

    Abstract: Prediction of Overall Survival (OS) of brain cancer patients from multi-modal MRI is a challenging field of research. Most of the existing literature on survival prediction is based on Radiomic features, which does not consider either non-biological factors or the functional neurological status of the patient(s). Besides, the selection of an appropriate cut-off for survival and the presence of cen… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.

  8. arXiv:2102.04300  [pdf, other

    eess.IV cs.CV cs.LG

    Deep Learning Models May Spuriously Classify Covid-19 from X-ray Images Based on Confounders

    Authors: Kaoutar Ben Ahmed, Lawrence O. Hall, Dmitry B. Goldgof, Gregory M. Goldgof, Rahul Paul

    Abstract: Identifying who is infected with the Covid-19 virus is critical for controlling its spread. X-ray machines are widely available worldwide and can quickly provide images that can be used for diagnosis. A number of recent studies claim it may be possible to build highly accurate models, using deep learning, to detect Covid-19 from chest X-ray images. This paper explores the robustness and generaliza… ▽ More

    Submitted 8 January, 2021; originally announced February 2021.

  9. arXiv:2008.02642  [pdf, other

    cs.SI

    Unsupervised Cyberbullying Detection via Time-Informed Gaussian Mixture Model

    Authors: Lu Cheng, Kai Shu, Siqi Wu, Yasin N. Silva, Deborah L. Hall, Huan Liu

    Abstract: Social media is a vital means for information-sharing due to its easy access, low cost, and fast dissemination characteristics. However, increases in social media usage have corresponded with a rise in the prevalence of cyberbullying. Most existing cyberbullying detection methods are supervised and, thus, have two key drawbacks: (1) The data labeling process is often time-consuming and labor-inten… ▽ More

    Submitted 6 August, 2020; originally announced August 2020.

    Comments: CIKM2020

  10. arXiv:2004.02060  [pdf

    eess.IV cs.CV cs.LG

    Finding Covid-19 from Chest X-rays using Deep Learning on a Small Dataset

    Authors: Lawrence O. Hall, Rahul Paul, Dmitry B. Goldgof, Gregory M. Goldgof

    Abstract: Testing for COVID-19 has been unable to keep up with the demand. Further, the false negative rate is projected to be as high as 30% and test results can take some time to obtain. X-ray machines are widely available and provide images for diagnosis quickly. This paper explores how useful chest X-ray images can be in diagnosing COVID-19 disease. We have obtained 122 chest X-rays of COVID-19 and over… ▽ More

    Submitted 20 May, 2020; v1 submitted 4 April, 2020; originally announced April 2020.

    Comments: 6 pages

  11. The Nipple-Areola Complex for Criminal Identification

    Authors: Wojciech Michal Matkowski, Krzysztof Matkowski, Adams Wai-Kin Kong, Cory Lloyd Hall

    Abstract: In digital and multimedia forensics, identification of child sexual offenders based on digital evidence images is highly challenging due to the fact that the offender's face or other obvious characteristics such as tattoos are occluded, covered, or not visible at all. Nevertheless, other naked body parts, e.g., chest are still visible. Some researchers proposed skin marks, skin texture, vein or an… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

    Comments: Accepted in the International Conference on Biometrics (ICB 2019), scheduled for 4-7 June 2019 in Crete, Greece

  12. arXiv:1901.04355  [pdf, other

    cs.CV cs.LG

    Iterative Deep Learning Based Unbiased Stereology With Human-in-the-Loop

    Authors: Saeed S. Alahmari, Dmitry Goldgof, Lawrence O. Hall, Palak Dave, Hady Ahmady Phoulady, Peter R. Mouton

    Abstract: Lack of enough labeled data is a major problem in building machine learning based models when the manual annotation (labeling) is error-prone, expensive, tedious, and time-consuming. In this paper, we introduce an iterative deep learning based method to improve segmentation and counting of cells based on unbiased stereology applied to regions of interest of extended depth of field (EDF) images. Th… ▽ More

    Submitted 14 January, 2019; originally announced January 2019.

    Comments: Accepted by ICMLA18 conference

  13. arXiv:1206.0531  [pdf, ps, other

    math.CO cs.IT quant-ph

    Mutually unbiased bases as submodules and subspaces

    Authors: Joanne L. Hall, Jan Stovicek

    Abstract: Mutually unbiased bases (MUBs) have been used in several cryptographic and communications applications. There has been much speculation regarding connections between MUBs and finite geometries. Most of which has focused on a connection with projective and affine planes. We propose a connection with higher dimensional projective geometries and projective Hjelmslev geometries. We show that this prop… ▽ More

    Submitted 4 June, 2012; originally announced June 2012.

    Comments: 5 pages. Accepted to ISIT2012

    MSC Class: 81P45; 51C05

  14. arXiv:1205.3310  [pdf, ps, other

    math.CO cs.IT quant-ph

    Planar Difference Functions

    Authors: Joanne L. Hall, Asha Rao, Diane Donovan

    Abstract: In 1980 Alltop produced a family of cubic phase sequences that nearly meet the Welch bound for maximum non-peak correlation magnitude. This family of sequences were shown by Wooters and Fields to be useful for quantum state tomography. Alltop's construction used a function that is not planar, but whose difference function is planar. In this paper we show that Alltop type functions cannot exist in… ▽ More

    Submitted 30 July, 2012; v1 submitted 15 May, 2012; originally announced May 2012.

    Comments: Accepted to ISIT2012. v2 added a reference and adjusted margins

  15. SMOTE: Synthetic Minority Over-sampling Technique

    Authors: N. V. Chawla, K. W. Bowyer, L. O. Hall, W. P. Kegelmeyer

    Abstract: An approach to the construction of classifiers from imbalanced datasets is described. A dataset is imbalanced if the classification categories are not approximately equally represented. Often real-world data sets are predominately composed of "normal" examples with only a small percentage of "abnormal" or "interesting" examples. It is also the case that the cost of misclassifying… ▽ More

    Submitted 9 June, 2011; originally announced June 2011.

    Journal ref: Journal Of Artificial Intelligence Research, Volume 16, pages 321-357, 2002

  16. arXiv:cs/9510103  [pdf, ps

    cs.AI

    Learning Membership Functions in a Function-Based Object Recognition System

    Authors: K. Woods, D. Cook, L. Hall, K. Bowyer, L. Stark

    Abstract: Functionality-based recognition systems recognize objects at the category level by reasoning about how well the objects support the expected function. Such systems naturally associate a ``measure of goodness'' or ``membership value'' with a recognized object. This measure of goodness is the result of combining individual measures, or membership values, from potentially many primitive evaluations… ▽ More

    Submitted 30 September, 1995; originally announced October 1995.

    Comments: See http://www.jair.org/ for any accompanying files

    Journal ref: Journal of Artificial Intelligence Research, Vol 3, (1995), 187-222