Zum Hauptinhalt springen

Showing 1–33 of 33 results for author: Nichols, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.03827  [pdf, other

    cs.SE cs.AI cs.HC

    Automated Code Fix Suggestions for Accessibility Issues in Mobile Apps

    Authors: Forough Mehralian, Titus Barik, Jeff Nichols, Amanda Swearngin

    Abstract: Accessibility is crucial for inclusive app usability, yet developers often struggle to identify and fix app accessibility issues due to a lack of awareness, expertise, and inadequate tools. Current accessibility testing tools can identify accessibility issues but may not always provide guidance on how to address them. We introduce FixAlly, an automated tool designed to suggest source code fixes fo… ▽ More

    Submitted 7 August, 2024; originally announced August 2024.

    Comments: 10 pages, 5 figures

    ACM Class: D.2.5; I.2

  2. arXiv:2406.07739  [pdf, other

    cs.CL cs.HC cs.SE

    UICoder: Finetuning Large Language Models to Generate User Interface Code through Automated Feedback

    Authors: Jason Wu, Eldon Schoop, Alan Leung, Titus Barik, Jeffrey P. Bigham, Jeffrey Nichols

    Abstract: Large language models (LLMs) struggle to consistently generate UI code that compiles and produces visually relevant designs. Existing approaches to improve generation rely on expensive human feedback or distilling a proprietary model. In this paper, we explore the use of automated feedback (compilers and multi-modal models) to guide LLMs to generate high-quality UI code. Our method starts with an… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

    Comments: Accepted to NAACL 2024

  3. arXiv:2404.12500  [pdf, other

    cs.HC cs.CL cs.CV

    UIClip: A Data-driven Model for Assessing User Interface Design

    Authors: Jason Wu, Yi-Hao Peng, Amanda Li, Amanda Swearngin, Jeffrey P. Bigham, Jeffrey Nichols

    Abstract: User interface (UI) design is a difficult yet important task for ensuring the usability, accessibility, and aesthetic qualities of applications. In our paper, we develop a machine-learned model, UIClip, for assessing the design quality and visual relevance of a UI given its screenshot and natural language description. To train UIClip, we used a combination of automated crawling, synthetic augmenta… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

  4. arXiv:2404.07387  [pdf, other

    cs.HC cs.AI

    BISCUIT: Scaffolding LLM-Generated Code with Ephemeral UIs in Computational Notebooks

    Authors: Ruijia Cheng, Titus Barik, Alan Leung, Fred Hohman, Jeffrey Nichols

    Abstract: Programmers frequently engage with machine learning tutorials in computational notebooks and have been adopting code generation technologies based on large language models (LLMs). However, they encounter difficulties in understanding and working with code produced by LLMs. To mitigate these challenges, we introduce a novel workflow into computational notebooks that augments LLM-based code generati… ▽ More

    Submitted 11 July, 2024; v1 submitted 10 April, 2024; originally announced April 2024.

  5. arXiv:2404.05719  [pdf, other

    cs.CV cs.CL cs.HC

    Ferret-UI: Grounded Mobile UI Understanding with Multimodal LLMs

    Authors: Keen You, Haotian Zhang, Eldon Schoop, Floris Weers, Amanda Swearngin, Jeffrey Nichols, Yinfei Yang, Zhe Gan

    Abstract: Recent advancements in multimodal large language models (MLLMs) have been noteworthy, yet, these general-domain MLLMs often fall short in their ability to comprehend and interact effectively with user interface (UI) screens. In this paper, we present Ferret-UI, a new MLLM tailored for enhanced understanding of mobile UI screens, equipped with referring, grounding, and reasoning capabilities. Given… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

  6. arXiv:2402.06071  [pdf, other

    cs.HC

    Keyframer: Empowering Animation Design using Large Language Models

    Authors: Tiffany Tseng, Ruijia Cheng, Jeffrey Nichols

    Abstract: Large language models (LLMs) have the potential to impact a wide range of creative domains, but the application of LLMs to animation is underexplored and presents novel challenges such as how users might effectively describe motion in natural language. In this paper, we present Keyframer, a design tool for animating static images (SVGs) with natural language. Informed by interviews with profession… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  7. arXiv:2310.04869  [pdf, other

    cs.HC cs.AI cs.CL cs.CV

    ILuvUI: Instruction-tuned LangUage-Vision modeling of UIs from Machine Conversations

    Authors: Yue Jiang, Eldon Schoop, Amanda Swearngin, Jeffrey Nichols

    Abstract: Multimodal Vision-Language Models (VLMs) enable powerful applications from their fused understanding of images and language, but many perform poorly on UI tasks due to the lack of UI training data. In this paper, we adapt a recipe for generating paired text-image training data for VLMs to the UI domain by combining existing pixel-based methods with a Large Language Model (LLM). Unlike prior art, o… ▽ More

    Submitted 7 October, 2023; originally announced October 2023.

  8. AXNav: Replaying Accessibility Tests from Natural Language

    Authors: Maryam Taeb, Amanda Swearngin, Eldon Schoop, Ruijia Cheng, Yue Jiang, Jeffrey Nichols

    Abstract: Developers and quality assurance testers often rely on manual testing to test accessibility features throughout the product lifecycle. Unfortunately, manual testing can be tedious, often has an overwhelming scope, and can be difficult to schedule amongst other development milestones. Recently, Large Language Models (LLMs) have been used for a variety of tasks including automation of UIs, however t… ▽ More

    Submitted 4 March, 2024; v1 submitted 3 October, 2023; originally announced October 2023.

    Comments: Accepted into Conference on Human Factors in Computing Systems (CHI) 2024, 22 pages, 7 figures

    ACM Class: I.2

  9. arXiv:2310.00091  [pdf, other

    cs.HC cs.SE

    Towards Automated Accessibility Report Generation for Mobile Apps

    Authors: Amanda Swearngin, Jason Wu, Xiaoyi Zhang, Esteban Gomez, Jen Coughenour, Rachel Stukenborg, Bhavya Garg, Greg Hughes, Adriana Hilliard, Jeffrey P. Bigham, Jeffrey Nichols

    Abstract: Many apps have basic accessibility issues, like missing labels or low contrast. Automated tools can help app developers catch basic issues, but can be laborious or require writing dedicated tests. We propose a system, motivated by a collaborative process with accessibility stakeholders at a large technology company, to generate whole app accessibility reports by combining varied data collection me… ▽ More

    Submitted 16 October, 2023; v1 submitted 29 September, 2023; originally announced October 2023.

    Comments: 24 pages, 8 figures

  10. arXiv:2308.14835  [pdf, other

    cs.CR

    AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors

    Authors: Robert A. Bridges, Brian Weber, Justin M. Beaver, Jared M. Smith, Miki E. Verma, Savannah Norem, Kevin Spakes, Cory Watson, Jeff A. Nichols, Brian Jewell, Michael. D. Iannacone, Chelsey Dunivan Stahl, Kelly M. T. Huffer, T. Sean Oesch

    Abstract: This work presents an evaluation of six prominent commercial endpoint malware detectors, a network malware detector, and a file-conviction algorithm from a cyber technology vendor. The evaluation was administered as the first of the Artificial Intelligence Applications to Autonomous Cybersecurity (AI ATAC) prize challenges, funded by / completed in service of the US Navy. The experiment employed 1… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

  11. arXiv:2308.08726  [pdf, other

    cs.HC

    Never-ending Learning of User Interfaces

    Authors: Jason Wu, Rebecca Krosnick, Eldon Schoop, Amanda Swearngin, Jeffrey P. Bigham, Jeffrey Nichols

    Abstract: Machine learning models have been trained to predict semantic information about user interfaces (UIs) to make apps more accessible, easier to test, and to automate. Currently, most models rely on datasets that are collected and labeled by human crowd-workers, a process that is costly and surprisingly error-prone for certain tasks. For example, it is possible to guess if a UI element is "tappable"… ▽ More

    Submitted 16 August, 2023; originally announced August 2023.

  12. Topological Deep Learning: A Review of an Emerging Paradigm

    Authors: Ali Zia, Abdelwahed Khamis, James Nichols, Zeeshan Hayder, Vivien Rolland, Lars Petersson

    Abstract: Topological data analysis (TDA) provides insight into data shape. The summaries obtained by these methods are principled global descriptions of multi-dimensional data whilst exhibiting stable properties such as robustness to deformation and noise. Such properties are desirable in deep learning pipelines but they are typically obtained using non-TDA strategies. This is partly caused by the difficul… ▽ More

    Submitted 7 February, 2023; originally announced February 2023.

    Comments: 7 pages and 2 references

  13. arXiv:2301.13280  [pdf, other

    cs.HC

    WebUI: A Dataset for Enhancing Visual UI Understanding with Web Semantics

    Authors: Jason Wu, Siyan Wang, Siman Shen, Yi-Hao Peng, Jeffrey Nichols, Jeffrey P. Bigham

    Abstract: Modeling user interfaces (UIs) from visual information allows systems to make inferences about the functionality and semantics needed to support use cases in accessibility, app automation, and testing. Current datasets for training machine learning models are limited in size due to the costly and time-consuming process of manually collecting and annotating UIs. We crawled the web to construct WebU… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

    Comments: Accepted to CHI 2023. Dataset, code, and models release coming soon

  14. arXiv:2301.08372  [pdf, other

    cs.HC

    Screen Correspondence: Mapping Interchangeable Elements between UIs

    Authors: Jason Wu, Amanda Swearngin, Xiaoyi Zhang, Jeffrey Nichols, Jeffrey P. Bigham

    Abstract: Understanding user interface (UI) functionality is a useful yet challenging task for both machines and people. In this paper, we investigate a machine learning approach for screen correspondence, which allows reasoning about UIs by mapping their elements onto previously encountered examples with known functionality and properties. We describe and implement a model that incorporates element semanti… ▽ More

    Submitted 19 January, 2023; originally announced January 2023.

  15. Testing SOAR Tools in Use

    Authors: Robert A. Bridges, Ashley E. Rice, Sean Oesch, Jeff A. Nichols, Cory Watson, Kevin Spakes, Savannah Norem, Mike Huettel, Brian Jewell, Brian Weber, Connor Gannon, Olivia Bizovi, Samuel C Hollifield, Samantha Erwin

    Abstract: Modern security operation centers (SOCs) rely on operators and a tapestry of logging and alerting tools with large scale collection and query abilities. SOC investigations are tedious as they rely on manual efforts to query diverse data sources, overlay related logs, and correlate the data into information and then document results in a ticketing system. Security orchestration, automation, and res… ▽ More

    Submitted 14 February, 2023; v1 submitted 11 August, 2022; originally announced August 2022.

    Journal ref: Computers & Security 2023

  16. arXiv:2207.07712  [pdf, other

    cs.HC

    Reflow: Automatically Improving Touch Interactions in Mobile Applications through Pixel-based Refinements

    Authors: Jason Wu, Titus Barik, Xiaoyi Zhang, Colin Lea, Jeffrey Nichols, Jeffrey P. Bigham

    Abstract: Touch is the primary way that users interact with smartphones. However, building mobile user interfaces where touch interactions work well for all users is a difficult problem, because users have different abilities and preferences. We propose a system, Reflow, which automatically applies small, personalized UI adaptations, called refinements -- to mobile app screens to improve touch efficiency. R… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

  17. arXiv:2207.04165  [pdf, other

    cs.HC

    Extracting Replayable Interactions from Videos of Mobile App Usage

    Authors: Jieshan Chen, Amanda Swearngin, Jason Wu, Titus Barik, Jeffrey Nichols, Xiaoyi Zhang

    Abstract: Screen recordings of mobile apps are a popular and readily available way for users to share how they interact with apps, such as in online tutorial videos, user reviews, or as attachments in bug reports. Unfortunately, both people and systems can find it difficult to reproduce touch-driven interactions from video pixel data alone. In this paper, we introduce an approach to extract and replay user… ▽ More

    Submitted 8 July, 2022; originally announced July 2022.

  18. Assembling a Cyber Range to Evaluate Artificial Intelligence / Machine Learning (AI/ML) Security Tools

    Authors: Jeffrey A. Nichols, Kevin D. Spakes, Cory L. Watson, Robert A. Bridges

    Abstract: In this case study, we describe the design and assembly of a cyber security testbed at Oak Ridge National Laboratory in Oak Ridge, TN, USA. The range is designed to provide agile reconfigurations to facilitate a wide variety of experiments for evaluations of cyber security tools -- particularly those involving AI/ML. In particular, the testbed provides realistic test environments while permitting… ▽ More

    Submitted 20 January, 2022; originally announced January 2022.

    Comments: ICCWS 2021 16th International Conference on Cyber Warfare and Security. Academic Conferences Limited, 2021

  19. Sketch-based Creativity Support Tools using Deep Learning

    Authors: Forrest Huang, Eldon Schoop, David Ha, Jeffrey Nichols, John Canny

    Abstract: Sketching is a natural and effective visual communication medium commonly used in creative processes. Recent developments in deep-learning models drastically improved machines' ability in understanding and generating visual content. An exciting area of development explores deep-learning approaches used to model human sketches, opening opportunities for creative applications. This chapter describes… ▽ More

    Submitted 18 November, 2021; originally announced November 2021.

    Comments: Preprint of chapter in published in "Artificial Intelligence for Human Computer Interaction: A Modern Approach". arXiv admin note: substantial text overlap with arXiv:2005.07781

  20. Screen Parsing: Towards Reverse Engineering of UI Models from Screenshots

    Authors: Jason Wu, Xiaoyi Zhang, Jeff Nichols, Jeffrey P. Bigham

    Abstract: Automated understanding of user interfaces (UIs) from their pixels can improve accessibility, enable task automation, and facilitate interface design without relying on developers to comprehensively provide metadata. A first step is to infer what UI elements exist on a screen, but current approaches are limited in how they infer how those elements are semantically grouped into structured interface… ▽ More

    Submitted 17 September, 2021; originally announced September 2021.

  21. arXiv:2101.04893  [pdf, other

    cs.HC

    Screen Recognition: Creating Accessibility Metadata for Mobile Applications from Pixels

    Authors: Xiaoyi Zhang, Lilian de Greef, Amanda Swearngin, Samuel White, Kyle Murray, Lisa Yu, Qi Shan, Jeffrey Nichols, Jason Wu, Chris Fleizach, Aaron Everitt, Jeffrey P. Bigham

    Abstract: Many accessibility features available on mobile platforms require applications (apps) to provide complete and accurate metadata describing user interface (UI) components. Unfortunately, many apps do not provide sufficient metadata for accessibility features to work as expected. In this paper, we explore inferring accessibility metadata for mobile apps from their pixels, as the visual interfaces of… ▽ More

    Submitted 13 January, 2021; originally announced January 2021.

  22. arXiv:2012.09214  [pdf, other

    cs.CR cs.LG

    Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection

    Authors: Robert A. Bridges, Sean Oesch, Miki E. Verma, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeff A. Nichols, Brian Weber, Justin M. Beaver, Jared M. Smith, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall

    Abstract: In this paper, we present a scientific evaluation of four prominent malware detection tools to assist an organization with two primary questions: To what extent do ML-based tools accurately classify previously- and never-before-seen files? Is it worth purchasing a network-level malware detector? To identify weaknesses, we tested each tool against 3,536 total files (2,554 or 72\% malicious, 982 or… ▽ More

    Submitted 17 August, 2022; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: Includes Actionable Takeaways for SOCs

    Journal ref: Digital Threats: Research and Practice 2023

  23. arXiv:2004.03669  [pdf, other

    cs.CV cs.LG eess.IV

    Radon cumulative distribution transform subspace modeling for image classification

    Authors: Mohammad Shifat-E-Rabbi, Xuwang Yin, Abu Hasnat Mohammad Rubaiyat, Shiying Li, Soheil Kolouri, Akram Aldroubi, Jonathan M. Nichols, Gustavo K. Rohde

    Abstract: We present a new supervised image classification method applicable to a broad class of image deformation models. The method makes use of the previously described Radon Cumulative Distribution Transform (R-CDT) for image data, whose mathematical properties are exploited to express the image data in a form that is more suitable for machine learning. While certain operations such as translation, scal… ▽ More

    Submitted 2 March, 2022; v1 submitted 7 April, 2020; originally announced April 2020.

    Comments: 14 pages, 11 figures

  24. arXiv:1807.04191  [pdf, other

    cs.HC cs.CV

    A Computational Method for Evaluating UI Patterns

    Authors: Bardia Doosti, Tao Dong, Biplab Deka, Jeffrey Nichols

    Abstract: UI design languages, such as Google's Material Design, make applications both easier to develop and easier to learn by providing a set of standard UI components. Nonetheless, it is hard to assess the impact of design languages in the wild. Moreover, designers often get stranded by strong-opinionated debates around the merit of certain UI components, such as the Floating Action Button and the Navig… ▽ More

    Submitted 11 July, 2018; originally announced July 2018.

  25. arXiv:1805.06541  [pdf, other

    cs.CR

    Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics (Extended Version)

    Authors: Robert Bridges, Jarilyn Hernandez Jimenez, Jeffrey Nichols, Katerina Goseva-Popstojanova, Stacy Prowell

    Abstract: This paper presents an experimental design and data analytics approach aimed at power-based malware detection on general-purpose computers. Leveraging the fact that malware executions must consume power, we explore the postulate that malware can be accurately detected via power data analytics. Our experimental design and implementation allow for programmatic collection of CPU power profiles for fi… ▽ More

    Submitted 16 May, 2018; originally announced May 2018.

    Comments: Published version appearing in IEEE TrustCom-18. This version contains more details on mathematics and data collection

  26. arXiv:1705.01977  [pdf, other

    cs.CR

    Malware Detection on General-Purpose Computers Using Power Consumption Monitoring: A Proof of Concept and Case Study

    Authors: Jarilyn M. Hernández Jiménez, Jeffrey A. Nichols, Katerina Goseva-Popstojanova, Stacy Prowell, Robert A. Bridges

    Abstract: Malware detection is challenging when faced with automatically generated and polymorphic malware, as well as with rootkits, which are exceptionally hard to detect. In an attempt to contribute towards addressing these challenges, we conducted a proof of concept study that explored the use of power consumption for detection of malware presence in a general-purpose computer. The results of our experi… ▽ More

    Submitted 4 May, 2017; originally announced May 2017.

  27. arXiv:1405.5574  [pdf

    cs.SI physics.soc-ph

    Recommending Targeted Strangers from Whom to Solicit Information on Social Media

    Authors: Jalal Mahmud, Michelle X. Zhou, Nimrod Megiddo, Jeffrey Nichols, Clemens Drews

    Abstract: We present an intelligent, crowd-powered information collection system that automatically identifies and asks target-ed strangers on Twitter for desired information (e.g., cur-rent wait time at a nightclub). Our work includes three parts. First, we identify a set of features that characterize ones willingness and readiness to respond based on their exhibited social behavior, including the content… ▽ More

    Submitted 21 May, 2014; originally announced May 2014.

    Comments: arXiv admin note: substantial text overlap with arXiv:1404.2013

  28. arXiv:1405.3750  [pdf

    cs.SI physics.soc-ph

    Who Will Retweet This? Automatically Identifying and Engaging Strangers on Twitter to Spread Information

    Authors: Kyumin Lee, Jalal Mahmud, Jilin Chen, Michelle Zhou, Jeffrey Nichols

    Abstract: There has been much effort on studying how social media sites, such as Twitter, help propagate information in different situations, including spreading alerts and SOS messages in an emergency. However, existing work has not addressed how to actively identify and engage the right strangers at the right time on social media to help effectively propagate intended information within a desired time fra… ▽ More

    Submitted 12 July, 2014; v1 submitted 15 May, 2014; originally announced May 2014.

  29. arXiv:1404.2013  [pdf

    cs.SI physics.soc-ph

    Optimizing The Selection of Strangers To Answer Questions in Social Media

    Authors: Jalal Mahmud, Michelle Zhou, Nimrod Megiddo, Jeffrey Nichols, Clemens Drews

    Abstract: Millions of people express themselves on public social media, such as Twitter. Through their posts, these people may reveal themselves as potentially valuable sources of information. For example, real-time information about an event might be collected through asking questions of people who tweet about being at the event location. In this paper, we explore how to model and select users to target wi… ▽ More

    Submitted 8 April, 2014; originally announced April 2014.

  30. arXiv:1403.2345  [pdf

    cs.SI cs.CL cs.CY

    Home Location Identification of Twitter Users

    Authors: Jalal Mahmud, Jeffrey Nichols, Clemens Drews

    Abstract: We present a new algorithm for inferring the home location of Twitter users at different granularities, including city, state, time zone or geographic region, using the content of users tweets and their tweeting behavior. Unlike existing approaches, our algorithm uses an ensemble of statistical and heuristic classifiers to predict locations and makes use of a geographic gazetteer dictionary to ide… ▽ More

    Submitted 7 March, 2014; originally announced March 2014.

  31. arXiv:1402.6690  [pdf

    cs.SI cs.CL cs.CY

    Why Are You More Engaged? Predicting Social Engagement from Word Use

    Authors: Jalal Mahmud, Jilin Chen, Jeffrey Nichols

    Abstract: We present a study to analyze how word use can predict social engagement behaviors such as replies and retweets in Twitter. We compute psycholinguistic category scores from word usage, and investigate how people with different scores exhibited different reply and retweet behaviors on Twitter. We also found psycholinguistic categories that show significant correlations with such social engagement b… ▽ More

    Submitted 26 February, 2014; originally announced February 2014.

  32. arXiv:1001.0039  [pdf, ps, other

    astro-ph.IM cs.DL

    TGCat, The Chandra Transmission Grating Catalog and Archive: Systems, Design and Accessibility

    Authors: Arik W. Mitschang, David P. Huenemoerder, Joy S. Nichols

    Abstract: The recently released Chandra Transmission Grating Catalog and Archive, TGCat, presents a fully dynamic on-line catalog allowing users to browse and categorize Chandra gratings observations quickly and easily, generate custom plots of resulting response corrected spectra on-line without the need for special software and to download analysis ready products from multiple observations in one conven… ▽ More

    Submitted 30 December, 2009; originally announced January 2010.

    Comments: 5 pages, proceedings of ADASS XIX, Oct 4-8 2009, Sapporo, Japan

  33. arXiv:cs/0504047  [pdf, ps, other

    cs.IT cs.CC

    Pushdown dimension

    Authors: David Doty, Jared Nichols

    Abstract: This paper develops the theory of pushdown dimension and explores its relationship with finite-state dimension. Pushdown dimension is trivially bounded above by finite-state dimension for all sequences, since a pushdown gambler can simulate any finite-state gambler. We show that for every rational 0 < d < 1, there exists a sequence with finite-state dimension d whose pushdown dimension is at mos… ▽ More

    Submitted 26 May, 2005; v1 submitted 12 April, 2005; originally announced April 2005.

    Comments: 10 page main body; 12 page appendix of proofs