31,531 results on '"Cavallaro AS"'
Search Results
2. Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems
- Author
-
He, Ping, Cavallaro, Lorenzo, and Ji, Shouling
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning ,Computer Science - Software Engineering - Abstract
Android malware presents a persistent threat to users' privacy and data integrity. To combat this, researchers have proposed machine learning-based (ML-based) Android malware detection (AMD) systems. However, adversarial Android malware attacks compromise the detection integrity of the ML-based AMD systems, raising significant concerns. Existing defenses against adversarial Android malware provide protections against feature space attacks which generate adversarial feature vectors only, leaving protection against realistic threats from problem space attacks which generate real adversarial malware an open problem. In this paper, we address this gap by proposing ADD, a practical adversarial Android malware defense framework designed as a plug-in to enhance the adversarial robustness of the ML-based AMD systems against problem space attacks. Our extensive evaluation across various ML-based AMD systems demonstrates that ADD is effective against state-of-the-art problem space adversarial Android malware attacks. Additionally, ADD shows the defense effectiveness in enhancing the adversarial robustness of real-world antivirus solutions.
- Published
- 2025
3. On the Effectiveness of Adversarial Training on Malware Classifiers
- Author
-
Bostani, Hamid, Cortellazzi, Jacopo, Arp, Daniel, Pierazzi, Fabio, Moonsamy, Veelasha, and Cavallaro, Lorenzo
- Subjects
Computer Science - Machine Learning ,Computer Science - Cryptography and Security - Abstract
Adversarial Training (AT) has been widely applied to harden learning-based classifiers against adversarial evasive attacks. However, its effectiveness in identifying and strengthening vulnerable areas of the model's decision space while maintaining high performance on clean data of malware classifiers remains an under-explored area. In this context, the robustness that AT achieves has often been assessed against unrealistic or weak adversarial attacks, which negatively affect performance on clean data and are arguably no longer threats. Previous work seems to suggest robustness is a task-dependent property of AT. We instead argue it is a more complex problem that requires exploring AT and the intertwined roles played by certain factors within data, feature representations, classifiers, and robust optimization settings, as well as proper evaluation factors, such as the realism of evasion attacks, to gain a true sense of AT's effectiveness. In our paper, we address this gap by systematically exploring the role such factors have in hardening malware classifiers through AT. Contrary to recent prior work, a key observation of our research and extensive experiments confirm the hypotheses that all such factors influence the actual effectiveness of AT, as demonstrated by the varying degrees of success from our empirical analysis. We identify five evaluation pitfalls that affect state-of-the-art studies and summarize our insights in ten takeaways to draw promising research directions toward better understanding the factors' settings under which adversarial training works at best.
- Published
- 2024
4. Determination of confinement regime boundaries via separatrix parameters on Alcator C-Mod based on a model for interchange-drift-Alfv\'en turbulence
- Author
-
Miller, M. A., Hughes, J. W., Eich, T., Tynan, G. R., Manz, P., Body, T., Silvagni, D., Grover, O., Hubbard, A. E., Cavallaro, A., Wigram, M., Kuang, A. Q., Mordijck, S., LaBombard, B., Dunsmore, J., and Whyte, D.
- Subjects
Physics - Plasma Physics - Abstract
The separatrix operational space (SepOS) model [Eich \& Manz, \emph{Nuclear Fusion} (2021)] is shown to predict the L-H transition, the L-mode density limit, and the ideal MHD ballooning limit in terms of separatrix parameters for a wide range of Alcator C-Mod plasmas. The model is tested using Thomson scattering measurements across a wide range of operating conditions on C-Mod, spanning $\overline{n}_{e} = 0.3 - 5.5 \times 10^{20}$m$^{-3}$, $B_{t} = 2.5 - 8.0$ T, and $B_{p} = 0.1 - 1.2$ T. An empirical regression for the electron pressure gradient scale length, $\lambda_{p_{e}}$, against a turbulence control parameter, $\alpha_{t}$, and the poloidal fluid gyroradius, $\rho_{s,p}$, for H-modes is constructed and found to require positive exponents for both regression parameters, indicating turbulence widening of near-SOL widths at high $\alpha_{t}$ and an inverse scaling with $B_{p}$, consistent with results on AUG. The SepOS model is also tested in the unfavorable drift direction and found to apply well to all three boundaries, including the L-H transition as long as a correction to the Reynolds energy transfer term, $\alpha_\mathrm{RS} < 1$ is applied. I-modes typically exist in the unfavorable drift direction for values of $\alpha_{t} \lesssim 0.35$. Finally, an experiment studying the transition between the type-I ELMy and EDA H-mode is analyzed using the same framework. It is found that a recently identified boundary at $\alpha_{t} = 0.55$ excludes most EDA H-modes but that the balance of wavenumbers responsible for the L-mode density limit, namely $k_\mathrm{EM} = k_\mathrm{RBM}$, may better describe the transition on C-Mod. The ensemble of boundaries validated and explored is then applied to project regime access and limit avoidance for the SPARC primary reference discharge parameters.
- Published
- 2024
5. Stereo Hand-Object Reconstruction for Human-to-Robot Handover
- Author
-
Pang, Yik Lung, Xompero, Alessio, Oh, Changjae, and Cavallaro, Andrea
- Subjects
Computer Science - Robotics ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Jointly estimating hand and object shape ensures the success of the robot grasp in human-to-robot handovers. However, relying on hand-crafted prior knowledge about the geometric structure of the object fails when generalising to unseen objects, and depth sensors fail to detect transparent objects such as drinking glasses. In this work, we propose a stereo-based method for hand-object reconstruction that combines single-view reconstructions probabilistically to form a coherent stereo reconstruction. We learn 3D shape priors from a large synthetic hand-object dataset to ensure that our method is generalisable, and use RGB inputs instead of depth as RGB can better capture transparent objects. We show that our method achieves a lower object Chamfer distance compared to existing RGB based hand-object reconstruction methods on single view and stereo settings. We process the reconstructed hand-object shape with a projection-based outlier removal step and use the output to guide a human-to-robot handover pipeline with wide-baseline stereo RGB cameras. Our hand-object reconstruction enables a robot to successfully receive a diverse range of household objects from the human., Comment: 8 pages, 9 figures, 1 table
- Published
- 2024
6. On the Lack of Robustness of Binary Function Similarity Systems
- Author
-
Capozzi, Gianluca, Tang, Tong, Wan, Jie, Yang, Ziqi, D'Elia, Daniele Cono, Di Luna, Giuseppe Antonio, Cavallaro, Lorenzo, and Querzoni, Leonardo
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
Binary function similarity, which often relies on learning-based algorithms to identify what functions in a pool are most similar to a given query function, is a sought-after topic in different communities, including machine learning, software engineering, and security. Its importance stems from the impact it has in facilitating several crucial tasks, from reverse engineering and malware analysis to automated vulnerability detection. Whereas recent work cast light around performance on this long-studied problem, the research landscape remains largely lackluster in understanding the resiliency of the state-of-the-art machine learning models against adversarial attacks. As security requires to reason about adversaries, in this work we assess the robustness of such models through a simple yet effective black-box greedy attack, which modifies the topology and the content of the control flow of the attacked functions. We demonstrate that this attack is successful in compromising all the models, achieving average attack success rates of 57.06% and 95.81% depending on the problem settings (targeted and untargeted attacks). Our findings are insightful: top performance on clean data does not necessarily relate to top robustness properties, which explicitly highlights performance-robustness trade-offs one should consider when deploying such models, calling for further research.
- Published
- 2024
7. Prithvi-EO-2.0: A Versatile Multi-Temporal Foundation Model for Earth Observation Applications
- Author
-
Szwarcman, Daniela, Roy, Sujit, Fraccaro, Paolo, Gíslason, Þorsteinn Elí, Blumenstiel, Benedikt, Ghosal, Rinki, de Oliveira, Pedro Henrique, Almeida, Joao Lucas de Sousa, Sedona, Rocco, Kang, Yanghui, Chakraborty, Srija, Wang, Sizhe, Kumar, Ankur, Truong, Myscon, Godwin, Denys, Lee, Hyunho, Hsu, Chia-Yu, Asanjan, Ata Akbari, Mujeci, Besart, Keenan, Trevor, Arevalo, Paulo, Li, Wenwen, Alemohammad, Hamed, Olofsson, Pontus, Hain, Christopher, Kennedy, Robert, Zadrozny, Bianca, Cavallaro, Gabriele, Watson, Campbell, Maskey, Manil, Ramachandran, Rahul, and Moreno, Juan Bernabe
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
This technical report presents Prithvi-EO-2.0, a new geospatial foundation model that offers significant improvements over its predecessor, Prithvi-EO-1.0. Trained on 4.2M global time series samples from NASA's Harmonized Landsat and Sentinel-2 data archive at 30m resolution, the new 300M and 600M parameter models incorporate temporal and location embeddings for enhanced performance across various geospatial tasks. Through extensive benchmarking with GEO-Bench, the 600M version outperforms the previous Prithvi-EO model by 8\% across a range of tasks. It also outperforms six other geospatial foundation models when benchmarked on remote sensing tasks from different domains and resolutions (i.e. from 0.1m to 15m). The results demonstrate the versatility of the model in both classical earth observation and high-resolution applications. Early involvement of end-users and subject matter experts (SMEs) are among the key factors that contributed to the project's success. In particular, SME involvement allowed for constant feedback on model and dataset design, as well as successful customization for diverse SME-led applications in disaster response, land use and crop mapping, and ecosystem dynamics monitoring. Prithvi-EO-2.0 is available on Hugging Face and IBM terratorch, with additional resources on GitHub. The project exemplifies the Trusted Open Science approach embraced by all involved organizations.
- Published
- 2024
8. Effects of Neutron Radiation on the Thermal Conductivity of Highly Oriented Pyrolitic Graphite
- Author
-
Guazzelli, Marcilei A., Avanzi, Luis H., Aguiar, Vitor A. P., Vilas-Bôas, Alexis C., Alberton, Saulo G., Masunaga, Sueli H., Chinaglia, Eliane F., Araki, Koiti, Nakamura, Marcelo, Toyama, Marcos M., Ferreira, Fabio F., Escote, Marcia T., Santos, Roberto B. B., Medina, Nilberto H., Oliveira, José Roberto B., Cappuzzello, Francesco, and Cavallaro, Manuela
- Subjects
Condensed Matter - Materials Science - Abstract
Highly Ordered Pyrolytic Graphite (HOPG) has been extensively researched due to its chemical and physical properties that make it suitable for applications in several technologies. Its high thermal conductivity makes HOPG an excellent heat sink, a crucial characteristic for manufacturing targets used in nuclear reactions, such as those proposed by the NUMEN project. However, when subjected to different radiation sources, this material undergoes changes in its crystalline structure, which alters its intended functionality. This study examined HOPG sheets before and after exposure to a 14 MeV neutron beam. Morphological and crystallographic analyses reveal that even minor disruptions in the high atomic ordering result in modifications to its thermal properties. The results of this study are essential to establish the survival time of the HOPG used as thermal interface material to improve heat dissipation of a nuclear target to be bombarded by an intense high-energy heavy-ion beam., Comment: Accepted for publication in "Diamond & Related Materials"
- Published
- 2024
- Full Text
- View/download PDF
9. Characterization of newly developed large area SiC sensors for the NUMEN experiment
- Author
-
Carbone, D., Spatafora, A., Calvo, D., Guerra, F., Brischetto, G. A., Cappuzzello, F., Cavallaro, M., Ferrero, M., La Via, F., and Tudisco, S.
- Subjects
Physics - Instrumentation and Detectors ,Nuclear Experiment - Abstract
First prototypes of large area, p-n junction, silicon carbide (SiC) detectors have been produced as part of an ongoing programme to develop a new particle identification wall for the focal plane detector of the MAGNEX magnetic spectrometer, in preparation for future NUMEN experimental campaigns. First characterizations of sensors from two wafers obtained with epitaxial silicon carbide growth and with different doping concentration are presented. Current (I-V) and capacitance (C-V) characteristics are investigated in order to determine the full depletion voltage and the doping profile. Radioactive {\alpha}-sources are used to measure the energy resolution and estimate the depletion depth.
- Published
- 2024
- Full Text
- View/download PDF
10. Identifying Privacy Personas
- Author
-
Hrynenko, Olena and Cavallaro, Andrea
- Subjects
Computer Science - Machine Learning ,Computer Science - Computers and Society - Abstract
Privacy personas capture the differences in user segments with respect to one's knowledge, behavioural patterns, level of self-efficacy, and perception of the importance of privacy protection. Modelling these differences is essential for appropriately choosing personalised communication about privacy (e.g. to increase literacy) and for defining suitable choices for privacy enhancing technologies (PETs). While various privacy personas have been derived in the literature, they group together people who differ from each other in terms of important attributes such as perceived or desired level of control, and motivation to use PET. To address this lack of granularity and comprehensiveness in describing personas, we propose eight personas that we derive by combining qualitative and quantitative analysis of the responses to an interactive educational questionnaire. We design an analysis pipeline that uses divisive hierarchical clustering and Boschloo's statistical test of homogeneity of proportions to ensure that the elicited clusters differ from each other based on a statistical measure. Additionally, we propose a new measure for calculating distances between questionnaire responses, that accounts for the type of the question (closed- vs open-ended) used to derive traits. We show that the proposed privacy personas statistically differ from each other. We statistically validate the proposed personas and also compare them with personas in the literature, showing that they provide a more granular and comprehensive understanding of user segments, which will allow to better assist users with their privacy needs.
- Published
- 2024
11. Image-guided topic modeling for interpretable privacy classification
- Author
-
Baia, Alina Elena and Cavallaro, Andrea
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Predicting and explaining the private information contained in an image in human-understandable terms is a complex and contextual task. This task is challenging even for large language models. To facilitate the understanding of privacy decisions, we propose to predict image privacy based on a set of natural language content descriptors. These content descriptors are associated with privacy scores that reflect how people perceive image content. We generate descriptors with our novel Image-guided Topic Modeling (ITM) approach. ITM leverages, via multimodality alignment, both vision information and image textual descriptions from a vision language model. We use the ITM-generated descriptors to learn a privacy predictor, Priv$\times$ITM, whose decisions are interpretable by design. Our Priv$\times$ITM classifier outperforms the reference interpretable method by 5 percentage points in accuracy and performs comparably to the current non-interpretable state-of-the-art model., Comment: Paper accepted at the eXCV Workshop at ECCV 2024. Supplementary material included. Code available at https://github.com/idiap/itm
- Published
- 2024
12. Sifting the debris: Patterns in the SNR population with unsupervised ML methods
- Author
-
Bufano, F., Bordiu, C., Cecconello, T., Munari, M., Hopkins, A., Ingallinera, A., Leto, P., Loru, S., Riggi, S., Sciacca, E., Vizzari, G., De Marco, A., Buemi, C. S., Cavallaro, F., Trigilio, C., and Umana, G.
- Subjects
Astrophysics - Astrophysics of Galaxies ,Astrophysics - Instrumentation and Methods for Astrophysics - Abstract
Supernova remnants (SNRs) carry vast amounts of mechanical and radiative energy that heavily influence the structural, dynamical, and chemical evolution of galaxies. To this day, more than 300 SNRs have been discovered in the Milky Way, exhibiting a wide variety of observational features. However, existing classification schemes are mainly based on their radio morphology. In this work, we introduce a novel unsupervised deep learning pipeline to analyse a representative subsample of the Galactic SNR population ($\sim$ 50% of the total) with the aim of finding a connection between their multi-wavelength features and their physical properties. The pipeline involves two stages: (1) a representation learning stage, consisting of a convolutional autoencoder that feeds on imagery from infrared and radio continuum surveys (WISE 22$\mu$m, Hi-GAL 70 $\mu$m and SMGPS 30 cm) and produces a compact representation in a lower-dimensionality latent space; and (2) a clustering stage that seeks meaningful clusters in the latent space that can be linked to the physical properties of the SNRs and their surroundings. Our results suggest that this approach, when combined with an intermediate uniform manifold approximation and projection (UMAP) reprojection of the autoencoded embeddings into a more clusterable manifold, enables us to find reliable clusters. Despite a large number of sources being classified as outliers, most clusters relate to the presence of distinctive features, such as the distribution of infrared emission, the presence of radio shells and pulsar wind nebulae, and the existence of dust filaments., Comment: Accepted in A&A. 17 pages, 11 figures
- Published
- 2024
- Full Text
- View/download PDF
13. Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
- Author
-
Abad, Gorka, Picek, Stjepan, Cavallaro, Lorenzo, and Urbieta, Aitor
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence - Abstract
Due to the high cost of training, large model (LM) practitioners commonly use pretrained models downloaded from untrusted sources, which could lead to owning compromised models. In-context learning is the ability of LMs to perform multiple tasks depending on the prompt or context. This can enable new attacks, such as backdoor attacks with dynamic behavior depending on how models are prompted. In this paper, we leverage the ability of vision transformers (ViTs) to perform different tasks depending on the prompts. Then, through data poisoning, we investigate two new threats: i) task-specific backdoors where the attacker chooses a target task to attack, and only the selected task is compromised at test time under the presence of the trigger. At the same time, any other task is not affected, even if prompted with the trigger. We succeeded in attacking every tested model, achieving up to 89.90\% degradation on the target task. ii) We generalize the attack, allowing the backdoor to affect \emph{any} task, even tasks unseen during the training phase. Our attack was successful on every tested model, achieving a maximum of $13\times$ degradation. Finally, we investigate the robustness of prompts and fine-tuning as techniques for removing the backdoors from the model. We found that these methods fall short and, in the best case, reduce the degradation from 89.90\% to 73.46\%.
- Published
- 2024
14. Segmenting Object Affordances: Reproducibility and Sensitivity to Scale
- Author
-
Apicella, Tommaso, Xompero, Alessio, Gastaldo, Paolo, and Cavallaro, Andrea
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Visual affordance segmentation identifies image regions of an object an agent can interact with. Existing methods re-use and adapt learning-based architectures for semantic segmentation to the affordance segmentation task and evaluate on small-size datasets. However, experimental setups are often not reproducible, thus leading to unfair and inconsistent comparisons. In this work, we benchmark these methods under a reproducible setup on two single objects scenarios, tabletop without occlusions and hand-held containers, to facilitate future comparisons. We include a version of a recent architecture, Mask2Former, re-trained for affordance segmentation and show that this model is the best-performing on most testing sets of both scenarios. Our analysis shows that models are not robust to scale variations when object resolutions differ from those in the training set., Comment: Paper accepted to Workshop on Assistive Computer Vision and Robotics (ACVR) in European Conference on Computer Vision (ECCV) 2024; 24 pages, 9 figures, 5 tables. Code and trained models are available at https://apicis.github.io/aff-seg/
- Published
- 2024
15. The European Universities Initiative: Between Status Hierarchies and Inclusion
- Author
-
Agata A. Lambrechts, Marco Cavallaro, and Benedetto Lepori
- Abstract
Using a dataset of higher education institutional alliances within the framework of the European University initiative (EUi), we test empirically whether the policy-defined goal of a relative balance between "excellence and inclusiveness" within the scheme has been achieved. Specifically, we provide a descriptive and analytical account of the diversity of the higher education institutions (HEIs) participating in the EUi, the composition of--as well as the mechanisms behind--the formation of individual alliances. We observe that alliance formation activated the deep sociological mechanisms of hierarchisation, with the alliances largely reproducing the existing "hierarchy of European HEIs." Specifically, we argue that the global-level stratification hierarchy cast by rankings influences the participation of individual institutions and--although to a more limited extent--the formation/structure of the alliances. Further, we demonstrate that the EUi has strengthened existing ties since most alliances thus far have built on existing forms of collaboration. However, we also show empirically that some of the distinctive policy design measures, namely the requirement for broad geographical coverage and generically framed rules for participation, as well as opening the initiative to new alliances and encouraging enlargement of the existing ones, have generated opportunities for involvement of the lower-status institutions. This broadened the scope of the EUi beyond the core of top-ranked research universities located in the knowledge production centres of Europe. We suggest that these observations may have important implications for how the intended extension of the EUi may be implemented in the future.
- Published
- 2024
- Full Text
- View/download PDF
16. MeerKAT reveals a ghostly thermal radio ring towards the Galactic Centre
- Author
-
Bordiu, C., Filipovic, M. D., Umana, G., Cotton, W. D., Buemi, C., Bufano, F., Camilo, F., Cavallaro, F., Cerrigone, L., Dai, S., Hopkins, A. M., Ingallinera, A., Jarrett, T., Koribalski, B., Lazarevic, S., Leto, P., Loru, S., Lundqvist, P., Mackey, J., Norris, R. P., Payne, J., Rowell, G., Riggi, S., Rizzo, J. R., Ruggeri, A. C., Shabala, S., Smeaton, Z. J., Trigilio, C., and Velovic, V.
- Subjects
Astrophysics - Astrophysics of Galaxies ,Astrophysics - Solar and Stellar Astrophysics - Abstract
We present the serendipitous discovery of a new radio-continuum ring-like object nicknamed Kyklos (J1802-3353), with MeerKAT UHF and L-band observations. The radio ring, which resembles the recently discovered odd radio circles (ORCs), has a diameter of 80 arcsec and is located just 6 deg from the Galactic plane. However, Kyklos exhibits an atypical thermal radio-continuum spectrum ({\alpha} = -0.1 +/- 0.3), which led us to explore different possible formation scenarios. We concluded that a circumstellar shell around an evolved massive star, possibly a Wolf-Rayet, is the most convincing explanation with the present data., Comment: 7 pages, 5 figures, accepted in A&A
- Published
- 2024
- Full Text
- View/download PDF
17. High-resolution open-vocabulary object 6D pose estimation
- Author
-
Corsetti, Jaime, Boscaini, Davide, Giuliari, Francesco, Oh, Changjae, Cavallaro, Andrea, and Poiesi, Fabio
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
The generalisation to unseen objects in the 6D pose estimation task is very challenging. While Vision-Language Models (VLMs) enable using natural language descriptions to support 6D pose estimation of unseen objects, these solutions underperform compared to model-based methods. In this work we present Horyon, an open-vocabulary VLM-based architecture that addresses relative pose estimation between two scenes of an unseen object, described by a textual prompt only. We use the textual prompt to identify the unseen object in the scenes and then obtain high-resolution multi-scale features. These features are used to extract cross-scene matches for registration. We evaluate our model on a benchmark with a large variety of unseen objects across four datasets, namely REAL275, Toyota-Light, Linemod, and YCB-Video. Our method achieves state-of-the-art performance on all datasets, outperforming by 12.6 in Average Recall the previous best-performing approach., Comment: Technical report. Extension of CVPR paper "Open-vocabulary object 6D pose estimation". Project page: https://jcorsetti.github.io/oryon
- Published
- 2024
18. Psychedelics and schizophrenia: a double-edged sword
- Author
-
Sapienza, Jacopo, Martini, Francesca, Comai, Stefano, Cavallaro, Roberto, Spangaro, Marco, De Gregorio, Danilo, and Bosia, Marta
- Published
- 2025
- Full Text
- View/download PDF
19. Simulation of the Impact of Digital Innovation on Export Volumes and CO2 Emissions in Italy
- Author
-
Quattrone, Giuseppe, Cavallaro, Fausto, Marino, Domenico, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Marino, Domenico, editor, and Monaca, Melchiorre Alberto, editor
- Published
- 2025
- Full Text
- View/download PDF
20. Efficient Vertex Linear Orderings to Find Minimal Feedback Arc Sets (minFAS)
- Author
-
Cavallaro, Claudia, Cutello, Vincenzo, Pavone, Mario, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Festa, Paola, editor, Ferone, Daniele, editor, Pastore, Tommaso, editor, and Pisacane, Ornella, editor
- Published
- 2025
- Full Text
- View/download PDF
21. Miniaturisation of Binary Classifiers Through Sparse Neural Networks
- Author
-
Cavallaro, Lucia, Serafin, Tommaso, Liotta, Antonio, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Sergeyev, Yaroslav D., editor, Kvasov, Dmitri E., editor, and Astorino, Annabella, editor
- Published
- 2025
- Full Text
- View/download PDF
22. Metaverse Mastery: Enhancing Public Speaking Skills in Linguistic High School Students Through Advanced Technologies
- Author
-
Aloisio, Alessandro, Cavallaro, Antonella, Romano, Marco, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Zaphiris, Panayiotis, editor, Ioannou, Andri, editor, Sottilare, Robert A., editor, Schwarz, Jessica, editor, and Rauterberg, Matthias, editor
- Published
- 2025
- Full Text
- View/download PDF
23. Hybrid Edge-Cloud Federated Learning: The Case of Lightweight Smoking Detection
- Author
-
Douzandeh Zenoozi, Amirhossein, Majidi, Babak, Cavallaro, Lucia, Liotta, Antonio, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Delir Haghighi, Pari, editor, Greguš, Michal, editor, Kotsis, Gabriele, editor, and Khalil, Ismail, editor
- Published
- 2025
- Full Text
- View/download PDF
24. Comparing Training of Sparse to Classic Neural Networks for Binary Classification in Medical Data
- Author
-
Erhan, Laura, Liotta, Antonio, Cavallaro, Lucia, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Delir Haghighi, Pari, editor, Fedushko, Solomiia, editor, Kotsis, Gabriele, editor, and Khalil, Ismail, editor
- Published
- 2025
- Full Text
- View/download PDF
25. Long time evolution of concentrated vortex rings with large radius
- Author
-
Buttà, Paolo, Cavallaro, Guido, and Marchioro, Carlo
- Subjects
Mathematics - Analysis of PDEs ,Mathematical Physics ,76B47, 37N10 - Abstract
We study the time evolution of an incompressible fluid with axial symmetry without swirl when the vorticity is sharply concentrated on $N$ annuli of radii of the order of $r_0$ and thickness $\varepsilon$. We prove that when $r_0= |\log \varepsilon|^\alpha$, $\alpha>1$, the vorticity field of the fluid converges for $\varepsilon \to 0$ to the point vortex model, in an interval of time which diverges as $\log|\log\varepsilon|$. This generalizes previous result by Cavallaro and Marchioro in [J. Math. Phys. 62, 053102, (2021)], that assumed $\alpha>2$ and in which the convergence was proved for short times only., Comment: 24 pages
- Published
- 2024
- Full Text
- View/download PDF
26. Demystifying Behavior-Based Malware Detection at Endpoints
- Author
-
Kaya, Yigitcan, Chen, Yizheng, Saha, Shoumik, Pierazzi, Fabio, Cavallaro, Lorenzo, Wagner, David, and Dumitras, Tudor
- Subjects
Computer Science - Cryptography and Security - Abstract
Machine learning is widely used for malware detection in practice. Prior behavior-based detectors most commonly rely on traces of programs executed in controlled sandboxes. However, sandbox traces are unavailable to the last line of defense offered by security vendors: malware detection at endpoints. A detector at endpoints consumes the traces of programs running on real-world hosts, as sandbox analysis might introduce intolerable delays. Despite their success in the sandboxes, research hints at potential challenges for ML methods at endpoints, e.g., highly variable malware behaviors. Nonetheless, the impact of these challenges on existing approaches and how their excellent sandbox performance translates to the endpoint scenario remain unquantified. We present the first measurement study of the performance of ML-based malware detectors at real-world endpoints. Leveraging a dataset of sandbox traces and a dataset of in-the-wild program traces; we evaluate two scenarios where the endpoint detector was trained on (i) sandbox traces (convenient and accessible); and (ii) endpoint traces (less accessible due to needing to collect telemetry data). This allows us to identify a wide gap between prior methods' sandbox-based detection performance--over 90%--and endpoint performances--below 20% and 50% in (i) and (ii), respectively. We pinpoint and characterize the challenges contributing to this gap, such as label noise, behavior variability, or sandbox evasion. To close this gap, we propose that yield a relative improvement of 5-30% over the baselines. Our evidence suggests that applying detectors trained on sandbox data to endpoint detection -- scenario (i) -- is challenging. The most promising direction is training detectors on endpoint data -- scenario (ii) -- which marks a departure from widespread practice. We implement a leaderboard for realistic detector evaluations to promote research., Comment: Behavior-based malware detection with machine learning. 18 pages, 10 figures, 15 tables. Leaderboard: https://malwaredetectioninthewild.github.io
- Published
- 2024
27. Explaining models relating objects and privacy
- Author
-
Xompero, Alessio, Bontonou, Myriam, Arbona, Jean-Michel, Benetos, Emmanouil, and Cavallaro, Andrea
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Accurately predicting whether an image is private before sharing it online is difficult due to the vast variety of content and the subjective nature of privacy itself. In this paper, we evaluate privacy models that use objects extracted from an image to determine why the image is predicted as private. To explain the decision of these models, we use feature-attribution to identify and quantify which objects (and which of their features) are more relevant to privacy classification with respect to a reference input (i.e., no objects localised in an image) predicted as public. We show that the presence of the person category and its cardinality is the main factor for the privacy decision. Therefore, these models mostly fail to identify private images depicting documents with sensitive data, vehicle ownership, and internet activity, or public images with people (e.g., an outdoor concert or people walking in a public space next to a famous landmark). As baselines for future benchmarks, we also devise two strategies that are based on the person presence and cardinality and achieve comparable classification performance of the privacy models., Comment: 7 pages, 3 figures, 1 table, supplementary material included as Appendix. Paper accepted at the 3rd XAI4CV Workshop at CVPR 2024. Code: https://github.com/graphnex/ig-privacy
- Published
- 2024
28. Sparse multi-view hand-object reconstruction for unseen environments
- Author
-
Pang, Yik Lung, Oh, Changjae, and Cavallaro, Andrea
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Recent works in hand-object reconstruction mainly focus on the single-view and dense multi-view settings. On the one hand, single-view methods can leverage learned shape priors to generalise to unseen objects but are prone to inaccuracies due to occlusions. On the other hand, dense multi-view methods are very accurate but cannot easily adapt to unseen objects without further data collection. In contrast, sparse multi-view methods can take advantage of the additional views to tackle occlusion, while keeping the computational cost low compared to dense multi-view methods. In this paper, we consider the problem of hand-object reconstruction with unseen objects in the sparse multi-view setting. Given multiple RGB images of the hand and object captured at the same time, our model SVHO combines the predictions from each view into a unified reconstruction without optimisation across views. We train our model on a synthetic hand-object dataset and evaluate directly on a real world recorded hand-object dataset with unseen objects. We show that while reconstruction of unseen hands and objects from RGB is challenging, additional views can help improve the reconstruction quality., Comment: Camera-ready version. Paper accepted to CVPRW 2024. 8 pages, 7 figures, 1 table
- Published
- 2024
29. Self-supervised contrastive learning of radio data for source detection, classification and peculiar object discovery
- Author
-
Riggi, S., Cecconello, T., Palazzo, S., Hopkins, A. M., Gupta, N., Bordiu, C., Ingallinera, A., Buemi, C., Bufano, F., Cavallaro, F., Filipović, M. D., Leto, P., Loru, S., Ruggeri, A. C., Trigilio, C., Umana, G., and Vitello, F.
- Subjects
Astrophysics - Instrumentation and Methods for Astrophysics - Abstract
New advancements in radio data post-processing are underway within the SKA precursor community, aiming to facilitate the extraction of scientific results from survey images through a semi-automated approach. Several of these developments leverage deep learning (DL) methodologies for diverse tasks, including source detection, object or morphology classification, and anomaly detection. Despite substantial progress, the full potential of these methods often remains untapped due to challenges associated with training large supervised models, particularly in the presence of small and class-unbalanced labelled datasets. Self-supervised learning has recently established itself as a powerful methodology to deal with some of the aforementioned challenges, by directly learning a lower-dimensional representation from large samples of unlabelled data. The resulting model and data representation can then be used for data inspection and various downstream tasks if a small subset of labelled data is available. In this work, we explored contrastive learning methods to learn suitable radio data representation from unlabelled images taken from the ASKAP EMU and SARAO MeerKAT GPS surveys. We evaluated trained models and the obtained data representation over smaller labelled datasets, also taken from different radio surveys, in selected analysis tasks: source detection and classification, and search for objects with peculiar morphology. For all explored downstream tasks, we reported and discussed the benefits brought by self-supervised foundational models built on radio data., Comment: 21 pages, 16 figures
- Published
- 2024
- Full Text
- View/download PDF
30. Local Binary and Multiclass SVMs Trained on a Quantum Annealer
- Author
-
Zardini, Enrico, Delilbasic, Amer, Blanzieri, Enrico, Cavallaro, Gabriele, and Pastorello, Davide
- Subjects
Computer Science - Emerging Technologies ,Computer Science - Machine Learning ,Quantum Physics - Abstract
Support vector machines (SVMs) are widely used machine learning models (e.g., in remote sensing), with formulations for both classification and regression tasks. In the last years, with the advent of working quantum annealers, hybrid SVM models characterised by quantum training and classical execution have been introduced. These models have demonstrated comparable performance to their classical counterparts. However, they are limited in the training set size due to the restricted connectivity of the current quantum annealers. Hence, to take advantage of large datasets (like those related to Earth observation), a strategy is required. In the classical domain, local SVMs, namely, SVMs trained on the data samples selected by a k-nearest neighbors model, have already proven successful. Here, the local application of quantum-trained SVM models is proposed and empirically assessed. In particular, this approach allows overcoming the constraints on the training set size of the quantum-trained models while enhancing their performance. In practice, the FaLK-SVM method, designed for efficient local SVMs, has been combined with quantum-trained SVM models for binary and multiclass classification. In addition, for comparison, FaLK-SVM has been interfaced for the first time with a classical single-step multiclass SVM model (CS SVM). Concerning the empirical evaluation, D-Wave's quantum annealers and real-world datasets taken from the remote sensing domain have been employed. The results have shown the effectiveness and scalability of the proposed approach, but also its practical applicability in a real-world large-scale scenario., Comment: 12 pages, 1 figure, 11 tables
- Published
- 2024
- Full Text
- View/download PDF
31. The distance to CRL 618 through its radio expansion parallax
- Author
-
Cerrigone, L., Umana, G., Trigilio, C., Menten, K. M., Bordiu, C., Ingallinera, A., Leto, P., Buemi, C. S., Bufano, F., Cavallaro, F., Loru, S., and Riggi, S.
- Subjects
Astrophysics - Solar and Stellar Astrophysics ,Astrophysics - Astrophysics of Galaxies - Abstract
CRL 618 is a post-AGB star that has started to ionize its ejecta. Its central HII region has been observed over the last 40 years and has steadily increased in flux density at radio wavelengths. In this paper, we present data that we obtained with the Very Large Array in its highest frequency band (43 GHz) in 2011 and compare these with archival data in the same frequency band from 1998. By applying the so-called expansion-parallax method, we are able to estimate an expansion rate of 4.0$\pm$0.4 mas yr$^{-1}$ along the major axis of the nebula and derive a distance of 1.1$\pm$0.2 kpc. Within errors, this distance estimation is in good agreement with the value of ~900 pc derived from the expansion of the optical lobes., Comment: 6 pages, 6 figures, accepted for publication on MNRAS
- Published
- 2024
32. Identifying Privacy Personas.
- Author
-
Olena Hrynenko and Andrea Cavallaro
- Published
- 2025
- Full Text
- View/download PDF
33. Absence of long-term incremental prognostic value of inducible wall motion abnormalities on dipyridamole stress CMR in patients with suspected or known coronary artery disease
- Author
-
Meloni, Antonella, Nugara, Cinzia, De Luca, Antonio, Cavallaro, Camilla, Cappelletto, Chiara, Barison, Andrea, Todiere, Giancarlo, Grigoratos, Chrysanthos, Mavrogeni, Sophie, Novo, Giuseppina, Grigioni, Francesco, Emdin, Michele, Sinagra, Gianfranco, Quaia, Emilio, Cademartiri, Filippo, and Pepe, Alessia
- Published
- 2024
- Full Text
- View/download PDF
34. Prevalence of alcohol-impaired driving: a systematic review with a gender-driven approach and meta-analysis of gender differences
- Author
-
Pelletti, Guido, Boscolo-Berto, Rafael, Anniballi, Laura, Giorgetti, Arianna, Pirani, Filippo, Cavallaro, Mara, Giorgini, Luca, Fais, Paolo, Pascali, Jennifer Paola, and Pelotti, Susi
- Published
- 2024
- Full Text
- View/download PDF
35. Correction to: The European Universities initiative: between status hierarchies and inclusion
- Author
-
Lambrechts, Agata A., Cavallaro, Marco, and Lepori, Benedetto
- Published
- 2024
- Full Text
- View/download PDF
36. Global cross-sectional survey on neonatal pharmacologic sedation and analgesia practices and pain assessment tools: impact of the sociodemographic index (SDI)
- Author
-
Arribas, Cristina, Cavallaro, Giacomo, Gonzalez, Juan-Luis, Lagares, Carolina, Raffaeli, Genny, Smits, Anne, Simons, Sinno H. P., Villamor, Eduardo, Allegaert, Karel, and Garrido, Felipe
- Published
- 2024
- Full Text
- View/download PDF
37. Hyperbilirubinemia and retinopathy of prematurity: a retrospective cohort study
- Author
-
Gulden, Silvia, Cervellini, Gaia, Colombo, Marta, Marangoni, Maria Beatrice, Taccani, Vittoria, Pesenti, Nicola, Raffaeli, Genny, Araimo, Gabriella, Osnaghi, Silvia, Fumagalli, Monica, Garrido, Felipe, Villamor, Eduardo, and Cavallaro, Giacomo
- Published
- 2024
- Full Text
- View/download PDF
38. Primary cutaneous, epidermotropic mycosis fungoides-like presentation: critical appraisal and description of two novel cases, broadening the spectrum of ALK+ T-cell lymphoma
- Author
-
Croci, Giorgio Alberto, Appio, Lorena, Cecchetti, Caterina, Tabano, Silvia, Alberti-Violetti, Silvia, Berti, Emilio, Rahal, Daoud, Cavallaro, Francesca, Onida, Francesco, Tomasini, Dario, and Todisco, Elisabetta
- Published
- 2024
- Full Text
- View/download PDF
39. Mapping Payment and Pricing Schemes for Health Innovation: Protocol of a Scoping Literature Review
- Author
-
Ardito, Vittoria, Cavallaro, Ludovico, Drummond, Michael, and Ciani, Oriana
- Published
- 2024
- Full Text
- View/download PDF
40. Improving outcome of treatment-resistant schizophrenia: effects of cognitive remediation therapy
- Author
-
Martini, Francesca, Spangaro, Marco, Bechi, Margherita, Agostoni, Giulia, Buonocore, Mariachiara, Sapienza, Jacopo, Nocera, Daniela, Ave, Chiara, Cocchi, Federica, Cavallaro, Roberto, and Bosia, Marta
- Published
- 2024
- Full Text
- View/download PDF
41. An automated insulin delivery system from pregestational care to postpartum in women with type 1 diabetes. Preliminary experience with telemedicine in 6 patients
- Author
-
Fresa, Raffaella, Bitterman, Olimpia, Cavallaro, Vincenzo, Di Filippi, Marianna, Dimarzo, Daniela, Mosca, Carmela, Nappi, Francesca, Rispoli, Marilena, and Napoli, Angela
- Published
- 2024
- Full Text
- View/download PDF
42. How to Train your Antivirus: RL-based Hardening through the Problem-Space
- Author
-
Tsingenopoulos, Ilias, Cortellazzi, Jacopo, Bošanský, Branislav, Aonzo, Simone, Preuveneers, Davy, Joosen, Wouter, Pierazzi, Fabio, and Cavallaro, Lorenzo
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence - Abstract
ML-based malware detection on dynamic analysis reports is vulnerable to both evasion and spurious correlations. In this work, we investigate a specific ML architecture employed in the pipeline of a widely-known commercial antivirus company, with the goal to harden it against adversarial malware. Adversarial training, the sole defensive technique that can confer empirical robustness, is not applicable out of the box in this domain, for the principal reason that gradient-based perturbations rarely map back to feasible problem-space programs. We introduce a novel Reinforcement Learning approach for constructing adversarial examples, a constituent part of adversarially training a model against evasion. Our approach comes with multiple advantages. It performs modifications that are feasible in the problem-space, and only those; thus it circumvents the inverse mapping problem. It also makes possible to provide theoretical guarantees on the robustness of the model against a particular set of adversarial capabilities. Our empirical exploration validates our theoretical insights, where we can consistently reach 0% Attack Success Rate after a few adversarial retraining iterations., Comment: 20 pages,4 figures
- Published
- 2024
- Full Text
- View/download PDF
43. Classification of compact radio sources in the Galactic plane with supervised machine learning
- Author
-
Riggi, S., Umana, G., Trigilio, C., Bordiu, C., Bufano, F., Ingallinera, A., Cavallaro, F., Gordon, Y., Norris, R. P., Gürkan, G., Leto, P., Buemi, C., Loru, S., Hopkins, A. M., Filipović, M. D., and Cecconello, T.
- Subjects
Astrophysics - Instrumentation and Methods for Astrophysics ,Computer Science - Machine Learning ,Statistics - Machine Learning - Abstract
Generation of science-ready data from processed data products is one of the major challenges in next-generation radio continuum surveys with the Square Kilometre Array (SKA) and its precursors, due to the expected data volume and the need to achieve a high degree of automated processing. Source extraction, characterization, and classification are the major stages involved in this process. In this work we focus on the classification of compact radio sources in the Galactic plane using both radio and infrared images as inputs. To this aim, we produced a curated dataset of ~20,000 images of compact sources of different astronomical classes, obtained from past radio and infrared surveys, and novel radio data from pilot surveys carried out with the Australian SKA Pathfinder (ASKAP). Radio spectral index information was also obtained for a subset of the data. We then trained two different classifiers on the produced dataset. The first model uses gradient-boosted decision trees and is trained on a set of pre-computed features derived from the data, which include radio-infrared colour indices and the radio spectral index. The second model is trained directly on multi-channel images, employing convolutional neural networks. Using a completely supervised procedure, we obtained a high classification accuracy (F1-score>90%) for separating Galactic objects from the extragalactic background. Individual class discrimination performances, ranging from 60% to 75%, increased by 10% when adding far-infrared and spectral index information, with extragalactic objects, PNe and HII regions identified with higher accuracies. The implemented tools and trained models were publicly released, and made available to the radioastronomical community for future application on new radio data., Comment: 27 pages, 15 figures, 9 tables
- Published
- 2024
44. Edge-Disjoint Paths in Eulerian Digraphs
- Author
-
Cavallaro, Dario, Kawarabayashi, Ken-ichi, and Kreutzer, Stephan
- Subjects
Computer Science - Computational Complexity ,Computer Science - Discrete Mathematics - Abstract
Disjoint paths problems are among the most prominent problems in combinatorial optimization. The edge- as well as vertex-disjoint paths problem, are NP-complete on directed and undirected graphs. But on undirected graphs, Robertson and Seymour (Graph Minors XIII) developed an algorithm for the vertex- and the edge-disjoint paths problem that runs in cubic time for every fixed number $p$ of terminal pairs, i.e. they proved that the problem is fixed-parameter tractable on undirected graphs. On directed graphs, Fortune, Hopcroft, and Wyllie proved that both problems are NP-complete already for $p=2$ terminal pairs. In this paper, we study the edge-disjoint paths problem (EDPP) on Eulerian digraphs, a problem that has received significant attention in the literature. Marx (Marx 2004) proved that the Eulerian EDPP is NP-complete even on structurally very simple Eulerian digraphs. On the positive side, polynomial time algorithms are known only for very restricted cases, such as $p\leq 3$ or where the demand graph is a union of two stars (see e.g. Ibaraki, Poljak 1991; Frank 1988; Frank, Ibaraki, Nagamochi 1995). The question of which values of $p$ the edge-disjoint paths problem can be solved in polynomial time on Eulerian digraphs has already been raised by Frank, Ibaraki, and Nagamochi (1995) almost 30 years ago. But despite considerable effort, the complexity of the problem is still wide open and is considered to be the main open problem in this area (see Chapter 4 of Bang-Jensen, Gutin 2018 for a recent survey). In this paper, we solve this long-open problem by showing that the Edge-Disjoint Paths Problem is fixed-parameter tractable on Eulerian digraphs in general (parameterized by the number of terminal pairs). The algorithm itself is reasonably simple but the proof of its correctness requires a deep structural analysis of Eulerian digraphs., Comment: To appear at STOC 2024
- Published
- 2024
45. The gravitational Vlasov-Poisson system with infinite mass and velocities in $\mathbb{R}^3$
- Author
-
Cavallaro, Guido and Marchioro, Carlo
- Subjects
Mathematics - Analysis of PDEs ,Mathematical Physics ,35Q83, 35Q85, 85A05 - Abstract
We study existence and uniqueness of the solution to the gravitational Vlasov-Poisson system evolving in $\mathbb{R}^3$. It is assumed that initially the particles are distributed according to a spatial density with a power-law decay in space, allowing for unbounded mass, and an exponential decay in velocities given by a Maxwell-Boltzmann law. We extend a classical result which holds for systems with finite total mass.
- Published
- 2024
- Full Text
- View/download PDF
46. Unraveling the Key of Machine Learning Solutions for Android Malware Detection
- Author
-
Liu, Jiahao, Zeng, Jun, Pierazzi, Fabio, Cavallaro, Lorenzo, and Liang, Zhenkai
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
Android malware detection serves as the front line against malicious apps. With the rapid advancement of machine learning (ML), ML-based Android malware detection has attracted increasing attention due to its capability of automatically capturing malicious patterns from Android APKs. These learning-driven methods have reported promising results in detecting malware. However, the absence of an in-depth analysis of current research progress makes it difficult to gain a holistic picture of the state of the art in this area. This paper presents a comprehensive investigation to date into ML-based Android malware detection with empirical and quantitative analysis. We first survey the literature, categorizing contributions into a taxonomy based on the Android feature engineering and ML modeling pipeline. Then, we design a general-propose framework for ML-based Android malware detection, re-implement 12 representative approaches from different research communities, and evaluate them from three primary dimensions, i.e., effectiveness, robustness, and efficiency. The evaluation reveals that ML-based approaches still face open challenges and provides insightful findings like more powerful ML models are not the silver bullet for designing better malware detectors. We further summarize our findings and put forth recommendations to guide future research.
- Published
- 2024
47. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)
- Author
-
Kan, Zeliang, McFadden, Shae, Arp, Daniel, Pendlebury, Feargus, Jordaney, Roberto, Kinder, Johannes, Pierazzi, Fabio, and Cavallaro, Lorenzo
- Subjects
Computer Science - Machine Learning ,Computer Science - Cryptography and Security ,Computer Science - Performance - Abstract
Machine learning (ML) plays a pivotal role in detecting malicious software. Despite the high F1-scores reported in numerous studies reaching upwards of 0.99, the issue is not completely solved. Malware detectors often experience performance decay due to constantly evolving operating systems and attack methods, which can render previously learned knowledge insufficient for accurate decision-making on new inputs. This paper argues that commonly reported results are inflated due to two pervasive sources of experimental bias in the detection task: spatial bias caused by data distributions that are not representative of a real-world deployment; and temporal bias caused by incorrect time splits of data, leading to unrealistic configurations. To address these biases, we introduce a set of constraints for fair experiment design, and propose a new metric, AUT, for classifier robustness in real-world settings. We additionally propose an algorithm designed to tune training data to enhance classifier performance. Finally, we present TESSERACT, an open-source framework for realistic classifier comparison. Our evaluation encompasses both traditional ML and deep learning methods, examining published works on an extensive Android dataset with 259,230 samples over a five-year span. Additionally, we conduct case studies in the Windows PE and PDF domains. Our findings identify the existence of biases in previous studies and reveal that significant performance enhancements are possible through appropriate, periodic tuning. We explore how mitigation strategies may support in achieving a more stable and better performance over time by employing multiple strategies to delay performance decay., Comment: 35 pages, submitted to ACM ToPS, under reviewing. arXiv admin note: text overlap with arXiv:1807.07838
- Published
- 2024
48. The MeerKAT 1.3 GHz Survey of the Small Magellanic Cloud
- Author
-
Cotton, W., Filipovic, M. D., Camilo, F., Indebetouw, R., Alsaberi, R. Z. E., Anih, J. O., Baker, M., Bastian, T . S., Bojicic, I., Carli, E., Cavallaro, F., Crawford, E. J., Dai, S., Haberl, F., Levin, L., Luken, K., Pennock, C . M., Rajabpour, N., Stappers, B. W., van Loon, J. Th., Zijlstra, A. A., Buchner, S., Geyer, M., Goedhart, S., and Serylak, M.
- Subjects
Astrophysics - Astrophysics of Galaxies - Abstract
We present new radio continuum images and a source catalogue from the MeerKAT survey in the direction of the Small Magellanic Cloud (SMC). The observations, at a central frequency of 1.3 GHz across a bandwidth of 0.8 GHz, encompass a field of view ~7 x 7 degrees and result in images with resolution of 8 arcsec. The median broad-band Stokes I image Root Mean Squared noise value is ~11 microJy/beam. The catalogue produced from these images contains 108,330 point sources and 517 compact extended sources. We also describe a UHF (544-1088 MHz) single pointing observation. We report the detection of a new confirmed Supernova Remnant (SNR) (MCSNR J0100-7211) with an X-ray magnetar at its centre and 10 new SNR candidates. This is in addition to the detection of 21 previously confirmed SNRs and two previously noted SNR candidates. Our new SNR candidates have typical surface brightness an order of magnitude below those previously known, and on the whole they are larger. The high sensitivity of the MeerKAT survey also enabled us to detect the bright end of the SMC Planetary Nebulae (PNe) sample - point-like radio emission is associated with 38 of 102 optically known PNe, of which 19 are new detections. Lastly, we present the detection of three foreground radio stars amidst 11 circularly polarised sources, and a few examples of morphologically interesting background radio galaxies from which the radio ring galaxy ESO 029-G034 may represent a new type of radio object., Comment: 31 pages, 27 figures
- Published
- 2024
49. Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses
- Author
-
Tsingenopoulos, Ilias, Rimmer, Vera, Preuveneers, Davy, Pierazzi, Fabio, Cavallaro, Lorenzo, and Joosen, Wouter
- Subjects
Computer Science - Artificial Intelligence ,Computer Science - Cryptography and Security - Abstract
Despite considerable efforts on making them robust, real-world ML-based systems remain vulnerable to decision based attacks, as definitive proofs of their operational robustness have so far proven intractable. The canonical approach in robustness evaluation calls for adaptive attacks, that is with complete knowledge of the defense and tailored to bypass it. In this study, we introduce a more expansive notion of being adaptive and show how attacks but also defenses can benefit by it and by learning from each other through interaction. We propose and evaluate a framework for adaptively optimizing black-box attacks and defenses against each other through the competitive game they form. To reliably measure robustness, it is important to evaluate against realistic and worst-case attacks. We thus augment both attacks and the evasive arsenal at their disposal through adaptive control, and observe that the same can be done for defenses, before we evaluate them first apart and then jointly under a multi-agent perspective. We demonstrate that active defenses, which control how the system responds, are a necessary complement to model hardening when facing decision-based attacks; then how these defenses can be circumvented by adaptive attacks, only to finally elicit active and adaptive defenses. We validate our observations through a wide theoretical and empirical investigation to confirm that AI-enabled adversaries pose a considerable threat to black-box ML-based systems, rekindling the proverbial arms race where defenses have to be AI-enabled too. Succinctly, we address the challenges posed by adaptive adversaries and develop adaptive defenses, thereby laying out effective strategies in ensuring the robustness of ML-based systems deployed in the real-world.
- Published
- 2023
50. The SARAO MeerKAT 1.3 GHz Galactic Plane Survey
- Author
-
Goedhart, S., Cotton, W. D., Camilo, F., Thompson, M. A., Umana, G., Bietenholz, M., Woudt, P. A., Anderson, L. D., Bordiu, C., Buckley, D. A. H., Buemi, C. S., Bufano, F., Cavallaro, F., Chen, H., Chibueze, J. O., Egbo, D., Frank, B. S., Hoare, M. G., Ingallinera, A., Irabor, T., Kraan-Korteweg, R. C., Kurapati, S., Leto, P., Loru, S., Mutale, M., Obonyo, W. O., Plavin, A., Rajohnson, S. H. A., Rigby, A., Riggi, S., Seidu, M., Serra, P., Smart, B. M., Stappers, B. W., Steyn, N., Surnis, M., Trigilio, C., Williams, G. M., Abbott, T. D., Adam, R. M., Asad, K. M. B., Baloyi, T., Bauermeister, E. F., Bennet, T. G. H., Bester, H., Botha, A. G., Brederode, L. R. S., Buchner, S., Burger, J. P., Cheetham, T., Cloete, K., de Villiers, M. S., de Villiers, D. I. L., Toit, L. J. du, Esterhuyse, S. W. P., Fanaroff, B. L., Fourie, D. J., Gamatham, R. R. G., Gatsi, T. G., Geyer, M., Gouws, M., Gumede, S. C., Heywood, I., Hokwana, A., Hoosen, S. W., Horn, D. M., Horrell, L. M. G., Hugo, B. V., Isaacson, A. I., Józsa, G. I. G., Jonas, J. L., Jordaan, J. D. B. L., Joubert, A. F., Julie, R. P. M., Kapp, F. B., Kriek, N., Kriel, H., Krishnan, V. K., Kusel, T. W., Legodi, L. S., Lehmensiek, R., Lord, R. T., Macfarlane, P. S., Magnus, L. G., Magozore, C., Main, J. P. L., Malan, J. A., Manley, J. R., Marais, S. J., Maree, M. D. J., Martens, A., Maruping, P., McAlpine, K., Merry, B. C., Mgodeli, M., Millenaar, R. P., Mokone, O. J., Monama, T. E., New, W. S., Ngcebetsha, B., Ngoasheng, K. J., Nicolson, G. D., Ockards, M. T., Oozeer, N., Passmoor, S. S., Patel, A. A., Peens-Hough, A., Perkins, S. J., Ramaila, A. J. T., Ratcliffe, S. M., Renil, R., Richter, L. L., Salie, S., Sambu, N., Schollar, C. T. G., Schwardt, L. C., Schwartz, R. L., Serylak, M., Siebrits, R., Sirothia, S. K., Slabber, M. J., Smirnov, O. M., Tiplady, A. J., van Balla, T. J., van der Byl, A., Van Tonder, V., Venter, A. J., Venter, M., Welz, M. G., and Williams, L. P.
- Subjects
Astrophysics - Astrophysics of Galaxies - Abstract
We present the SARAO MeerKAT Galactic Plane Survey (SMGPS), a 1.3 GHz continuum survey of almost half of the Galactic Plane (251\deg $\le l \le$ 358\deg and 2\deg $\le l \le$ 61\deg at $|b| \le 1.5\deg $). SMGPS is the largest, most sensitive and highest angular resolution 1 GHz survey of the Plane yet carried out, with an angular resolution of 8" and a broadband RMS sensitivity of $\sim$10--20 $\mu$ Jy/beam. Here we describe the first publicly available data release from SMGPS which comprises data cubes of frequency-resolved images over 908--1656 MHz, power law fits to the images, and broadband zeroth moment integrated intensity images. A thorough assessment of the data quality and guidance for future usage of the data products are given. Finally, we discuss the tremendous potential of SMGPS by showcasing highlights of the Galactic and extragalactic science that it permits. These highlights include the discovery of a new population of non-thermal radio filaments; identification of new candidate supernova remnants, pulsar wind nebulae and planetary nebulae; improved radio/mid-IR classification of rare Luminous Blue Variables and discovery of associated extended radio nebulae; new radio stars identified by Bayesian cross-matching techniques; the realisation that many of the largest radio-quiet WISE HII region candidates are not true HII regions; and a large sample of previously undiscovered background HI galaxies in the Zone of Avoidance., Comment: Accepted for publication in MNRAS. The data release is live and links can be found in the Data Availability Statement in the paper
- Published
- 2023
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.