10,056 results on '"Evans, David A."'
Search Results
2. Re-entrant percolation in active Brownian hard disks
- Author
-
Evans, David, Martín-Roca, José, Harmer, Nathan J., Valeriani, Chantal, and Miller, Mark A.
- Subjects
Condensed Matter - Statistical Mechanics ,Condensed Matter - Soft Condensed Matter - Abstract
Non-equilibrium clustering and percolation are investigated in an archetypal model of two-dimensional active matter using dynamic simulations of self-propelled Brownian repulsive particles. We concentrate on the single-phase region up to moderate levels of activity, before motility-induced phase separation (MIPS) sets in. Weak activity promotes cluster formation and lowers the percolation threshold. However, driving the system further out of equilibrium partly reverses this effect, resulting in a minimum in the critical density for the formation of system-spanning clusters and introducing re-entrant percolation as a function of activity in the pre-MIPS regime. This non-monotonic behaviour arises from competition between activity-induced effective attraction (which eventually leads to MIPS) and activity-driven cluster breakup. Using an adapted iterative Boltzmann inversion method, we derive effective potentials to map weakly active cases onto a passive (equilibrium) model with conservative attraction, which can be characterised by Monte Carlo simulations. While the active and passive systems have practically identical radial distribution functions, we find decisive differences in higher-order structural correlations, to which the percolation threshold is highly sensitive. For sufficiently strong activity, no passive pairwise potential can reproduce the radial distribution function of the active system.
- Published
- 2024
- Full Text
- View/download PDF
3. The Mismeasure of Man and Models: Evaluating Allocational Harms in Large Language Models
- Author
-
Chen, Hannah, Ji, Yangfeng, and Evans, David
- Subjects
Computer Science - Computation and Language ,Computer Science - Computers and Society - Abstract
Large language models (LLMs) are now being considered and even deployed for applications that support high-stakes decision-making, such as recruitment and clinical decisions. While several methods have been proposed for measuring bias, there remains a gap between predictions, which are what the proposed methods consider, and how they are used to make decisions. In this work, we introduce Rank-Allocational-Based Bias Index (RABBI), a model-agnostic bias measure that assesses potential allocational harms arising from biases in LLM predictions. We compare RABBI and current bias metrics on two allocation decision tasks. We evaluate their predictive validity across ten LLMs and utility for model selection. Our results reveal that commonly-used bias metrics based on average performance gap and distribution distance fail to reliably capture group disparities in allocation outcomes, whereas RABBI exhibits a strong correlation with allocation disparities. Our work highlights the need to account for how models are used in contexts with limited resource constraints.
- Published
- 2024
4. The OPS-SAT benchmark for detecting anomalies in satellite telemetry
- Author
-
Ruszczak, Bogdan, Kotowski, Krzysztof, Evans, David, and Nalepa, Jakub
- Subjects
Electrical Engineering and Systems Science - Signal Processing ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Detecting anomalous events in satellite telemetry is a critical task in space operations. This task, however, is extremely time-consuming, error-prone and human dependent, thus automated data-driven anomaly detection algorithms have been emerging at a steady pace. However, there are no publicly available datasets of real satellite telemetry accompanied with the ground-truth annotations that could be used to train and verify anomaly detection supervised models. In this article, we address this research gap and introduce the AI-ready benchmark dataset (OPSSAT-AD) containing the telemetry data acquired on board OPS-SAT -- a CubeSat mission which has been operated by the European Space Agency which has come to an end during the night of 22--23 May 2024 (CEST). The dataset is accompanied with the baseline results obtained using 30 supervised and unsupervised classic and deep machine learning algorithms for anomaly detection. They were trained and validated using the training-test dataset split introduced in this work, and we present a suggested set of quality metrics which should be always calculated to confront the new algorithms for anomaly detection while exploiting OPSSAT-AD. We believe that this work may become an important step toward building a fair, reproducible and objective validation procedure that can be used to quantify the capabilities of the emerging anomaly detection techniques in an unbiased and fully transparent way., Comment: 13 pages, 8 figures, 3 tables
- Published
- 2024
5. Do Parameters Reveal More than Loss for Membership Inference?
- Author
-
Suri, Anshuman, Zhang, Xiao, and Evans, David
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Cryptography and Security - Abstract
Membership inference attacks are used as a key tool for disclosure auditing. They aim to infer whether an individual record was used to train a model. While such evaluations are useful to demonstrate risk, they are computationally expensive and often make strong assumptions about potential adversaries' access to models and training environments, and thus do not provide tight bounds on leakage from potential attacks. We show how prior claims around black-box access being sufficient for optimal membership inference do not hold for stochastic gradient descent, and that optimal membership inference indeed requires white-box access. Our theoretical results lead to a new white-box inference attack, IHA (Inverse Hessian Attack), that explicitly uses model parameters by taking advantage of computing inverse-Hessian vector products. Our results show that both auditors and adversaries may be able to benefit from access to model parameters, and we advocate for further research into white-box methods for membership inference., Comment: Accepted to Transactions on Machine Learning Research (TMLR)
- Published
- 2024
6. DP-RuL: Differentially-Private Rule Learning for Clinical Decision Support Systems
- Author
-
Lamp, Josephine, Feng, Lu, and Evans, David
- Subjects
Computer Science - Cryptography and Security - Abstract
Serious privacy concerns arise with the use of patient data in rule-based clinical decision support systems (CDSS). The goal of a privacy-preserving CDSS is to learn a population ruleset from individual clients' local rulesets, while protecting the potentially sensitive information contained in the rulesets. We present the first work focused on this problem and develop a framework for learning population rulesets with local differential privacy (LDP), suitable for use within a distributed CDSS and other distributed settings. Our rule discovery protocol uses a Monte-Carlo Tree Search (MCTS) method integrated with LDP to search a rule grammar in a structured way and find rule structures clients are likely to have. Randomized response queries are sent to clients to determine promising paths to search within the rule grammar. In addition, we introduce an adaptive budget allocation method which dynamically determines how much privacy loss budget to use at each query, resulting in better privacy-utility trade-offs. We evaluate our approach using three clinical datasets and find that we are able to learn population rulesets with high coverage (breadth of rules) and clinical utility even at low privacy loss budgets.
- Published
- 2024
7. Evaluating Google's Protected Audience Protocol
- Author
-
Long, Minjun and Evans, David
- Subjects
Computer Science - Cryptography and Security - Abstract
While third-party cookies have been a key component of the digital marketing ecosystem for years, they allow users to be tracked across web sites in ways that raise serious privacy concerns. Google has proposed the Privacy Sandbox initiative to enable ad targeting without third-party cookies. While there have been several studies focused on other aspects of this initiative, there has been little analysis to date as to how well the system achieves the intended goal of preventing request linking. This work focuses on analyzing linkage privacy risks for the reporting mechanisms proposed in the Protected Audience (PrAu) proposal (previously known as FLEDGE), which is intended to enable online remarketing without using third-party cookies. We summarize the overall workflow of PrAu and highlight potential privacy risks associated with its proposed design, focusing on scenarios in which adversaries attempt to link requests to different sites to the same user. We show how a realistic adversary would be still able to use the privacy-protected reporting mechanisms to link user requests and conduct mass surveillance, even with correct implementations of all the currently proposed privacy mechanisms.
- Published
- 2024
- Full Text
- View/download PDF
8. No Evidence of Interaction Between FADS2 Genotype and Breastfeeding on Cognitive or Other Traits in the UK Biobank
- Author
-
Centorame, Giulio, Warrington, Nicole M., Hemani, Gibran, Wang, Geng, Davey Smith, George, and Evans, David M.
- Published
- 2024
- Full Text
- View/download PDF
9. Quantum symmetries of noncommutative tori
- Author
-
Evans, David E. and Jones, Corey
- Subjects
Mathematics - Quantum Algebra ,Mathematical Physics ,Mathematics - Operator Algebras - Abstract
We consider the problem of building non-invertible quantum symmetries (as characterized by actions of unitary fusion categories) on noncommutative tori. We introduce a general method to construct actions of fusion categories on inductive limit C*-algberas using finite dimenionsal data, and then apply it to obtain AT-actions of arbitrary Haagerup-Izumi categories on noncommutative 2-tori, of the even part of the $E_{8}$ subfactor on a noncommutative 3-torus, and of $\text{PSU}(2)_{15}$ on a noncommutative 4-torus.
- Published
- 2024
10. Addressing Both Statistical and Causal Gender Fairness in NLP Models
- Author
-
Chen, Hannah, Ji, Yangfeng, and Evans, David
- Subjects
Computer Science - Computation and Language ,Computer Science - Computers and Society ,Computer Science - Machine Learning - Abstract
Statistical fairness stipulates equivalent outcomes for every protected group, whereas causal fairness prescribes that a model makes the same prediction for an individual regardless of their protected characteristics. Counterfactual data augmentation (CDA) is effective for reducing bias in NLP models, yet models trained with CDA are often evaluated only on metrics that are closely tied to the causal fairness notion; similarly, sampling-based methods designed to promote statistical fairness are rarely evaluated for causal fairness. In this work, we evaluate both statistical and causal debiasing methods for gender bias in NLP models, and find that while such methods are effective at reducing bias as measured by the targeted metric, they do not necessarily improve results on other bias metrics. We demonstrate that combinations of statistical and causal debiasing techniques are able to reduce bias measured through both types of metrics., Comment: NAACL 2024 (Findings)
- Published
- 2024
11. Do Membership Inference Attacks Work on Large Language Models?
- Author
-
Duan, Michael, Suri, Anshuman, Mireshghallah, Niloofar, Min, Sewon, Shi, Weijia, Zettlemoyer, Luke, Tsvetkov, Yulia, Choi, Yejin, Evans, David, and Hajishirzi, Hannaneh
- Subjects
Computer Science - Computation and Language - Abstract
Membership inference attacks (MIAs) attempt to predict whether a particular datapoint is a member of a target model's training data. Despite extensive research on traditional machine learning models, there has been limited work studying MIA on the pre-training data of large language models (LLMs). We perform a large-scale evaluation of MIAs over a suite of language models (LMs) trained on the Pile, ranging from 160M to 12B parameters. We find that MIAs barely outperform random guessing for most settings across varying LLM sizes and domains. Our further analyses reveal that this poor performance can be attributed to (1) the combination of a large dataset and few training iterations, and (2) an inherently fuzzy boundary between members and non-members. We identify specific settings where LLMs have been shown to be vulnerable to membership inference and show that the apparent success in such settings can be attributed to a distribution shift, such as when members and non-members are drawn from the seemingly identical domain but with different temporal ranges. We release our code and data as a unified benchmark package that includes all existing MIAs, supporting future work., Comment: Accepted at Conference on Language Modeling (COLM), 2024
- Published
- 2024
12. Understanding Variation in Subpopulation Susceptibility to Poisoning Attacks
- Author
-
Rose, Evan, Suya, Fnu, and Evans, David
- Subjects
Computer Science - Machine Learning ,Computer Science - Cryptography and Security - Abstract
Machine learning is susceptible to poisoning attacks, in which an attacker controls a small fraction of the training data and chooses that data with the goal of inducing some behavior unintended by the model developer in the trained model. We consider a realistic setting in which the adversary with the ability to insert a limited number of data points attempts to control the model's behavior on a specific subpopulation. Inspired by previous observations on disparate effectiveness of random label-flipping attacks on different subpopulations, we investigate the properties that can impact the effectiveness of state-of-the-art poisoning attacks against different subpopulations. For a family of 2-dimensional synthetic datasets, we empirically find that dataset separability plays a dominant role in subpopulation vulnerability for less separable datasets. However, well-separated datasets exhibit more dependence on individual subpopulation properties. We further discover that a crucial subpopulation property is captured by the difference in loss on the clean dataset between the clean model and a target model that misclassifies the subpopulation, and a subpopulation is much easier to attack if the loss difference is small. This property also generalizes to high-dimensional benchmark datasets. For the Adult benchmark dataset, we show that we can find semantically-meaningful subpopulation properties that are related to the susceptibilities of a selected group of subpopulations. The results in this paper are accompanied by a fully interactive web-based visualization of subpopulation poisoning attacks found at https://uvasrg.github.io/visualizing-poisoning, Comment: 18 pages, 11 figures
- Published
- 2023
13. Persistence of Contact Lens-Induced Corneal Parainflammation Following Lens Removal.
- Author
-
Datta, Ananya, Lee, Ji, Truong, Tiffany, Yang, Yujia, Evans, David, Fleiszig, Suzanne, and Flandrin, Orneika
- Subjects
Mice ,Animals ,Mice ,Inbred C57BL ,Lens ,Crystalline ,Contact Lenses ,Cornea ,Cytokines - Abstract
PURPOSE: Contact lens wear induces corneal parainflammation involving increased immune cell numbers after 24 hours (CD11c+, Lyz2+, γδ-T cells) and six days (Ly6G+ cells) wear. We investigated the time course of onset and resolution of these responses. METHODS: LysMcre or C57BL/6J mice were fitted with a contact lens (four to 48 hours). Contralateral eyes did not wear lenses. After lens removal, Lyz2+, MHC-II+ or Ly6G+ cells were examined by quantitative imaging. RT-qPCR determined cytokine gene expression. RESULTS: Lens wear for 24 hours increased corneal Lyz2+ cells versus contralateral eyes approximately two-fold. Corneas remained free of visible pathology. The Lyz2+ response was not observed after four or 12 hours wear, nor after 12 hours wear plus 12 hours no wear. Lens removal after 24 hours wear further increased Lyz2+ cells (∼48% after one day), which persisted for four days, returning to baseline by seven days. Lyz2+ cells in contralateral eyes remained at baseline. MHC-II+ cells showed a similar response but without increasing after lens removal. Lens wear for 48 hours showed reduced Lyz2+ cells versus 24 hours wear with one day discontinuation, correlating with reduced IL-1β and IL-18 gene expression. Lens wear for 24 hours did not induce Ly6G+ responses six days after removal. CONCLUSIONS: Lens-induced corneal parainflammation involving Lyz2+ cells requires 24 hours wear but persists after lens discontinuation, requiring seven days for reversal. Lens wear for 48 hours may suppress initial Lyz2+ cell and cytokine responses. The significance of parainflammation during and after lens wear remains to be determined.
- Published
- 2024
14. Paleomagnetic evidence for Neoarchean plate mobilism
- Author
-
Ding, Jikai, Rogers, Chris, Söderlund, Ulf, Evans, David A. D., Gong, Zheng, Ernst, Richard E., Chamberlain, Kevin, and Kilian, Taylor
- Published
- 2024
- Full Text
- View/download PDF
15. Patterns of cesarean birth rates in the public and private hospitals of Romania
- Author
-
Slovenski, Iulia, Wells, Nadya, and Evans, David
- Published
- 2024
- Full Text
- View/download PDF
16. Spatiotemporal changes in riverine input into the Eocene North Sea revealed by strontium isotope and barium analysis of bivalve shells
- Author
-
Kniest, Jorit F., Evans, David, Gerdes, Axel, Cantine, Marjorie, Todd, Jonathan A., Sigwart, Julia D., Vellekoop, Johan, Müller, Wolfgang, Voigt, Silke, and Raddatz, Jacek
- Published
- 2024
- Full Text
- View/download PDF
17. DINGO: increasing the power of locus discovery in maternal and fetal genome-wide association studies of perinatal traits
- Author
-
Hwang, Liang-Dar, Cuellar-Partida, Gabriel, Yengo, Loic, Zeng, Jian, Toivonen, Jarkko, Arvas, Mikko, Beaumont, Robin N., Freathy, Rachel M., Moen, Gunn-Helen, Warrington, Nicole M., and Evans, David M.
- Published
- 2024
- Full Text
- View/download PDF
18. Mechanisms of manipulation: a systematic review of the literature on immediate anatomical structural or positional changes in response to manually delivered high-velocity, low-amplitude spinal manipulation
- Author
-
Young, Kenneth J., Leboeuf-Yde, Charlotte, Gorrell, Lindsay, Bergström, Cecilia, Evans, David W., Axén, Iben, Chance-Larsen, Kenneth, Gagey, Olivier, Georgopoulos, Vasileios, Goncalves, Guillaume, Harris, Catherine, Harsted, Steen, Kerry, Roger, Lee, Edward, McCarthy, Christopher, Nim, Casper, Nyirö, Luana, Schweinhardt, Petra, and Vogel, Steven
- Published
- 2024
- Full Text
- View/download PDF
19. DeepMIP-Eocene-p1: multi-model dataset and interactive web application for Eocene climate research
- Author
-
Steinig, Sebastian, Abe-Ouchi, Ayako, de Boer, Agatha M., Chan, Wing-Le, Donnadieu, Yannick, Hutchinson, David K., Knorr, Gregor, Ladant, Jean-Baptiste, Morozova, Polina, Niezgodzki, Igor, Poulsen, Christopher J., Volodin, Evgeny M., Zhang, Zhongshi, Zhu, Jiang, Evans, David, Inglis, Gordon N., Meckler, A. Nele, and Lunt, Daniel J.
- Published
- 2024
- Full Text
- View/download PDF
20. Consistency, completeness and external validity of ethnicity recording in NHS primary care records: a cohort study in 25 million patients’ records at source using OpenSAFELY
- Author
-
Andrews, Colm D., Mathur, Rohini, Massey, Jon, Park, Robin, Curtis, Helen J., Hopcroft, Lisa, Mehrkar, Amir, Bacon, Seb, Hickman, George, Smith, Rebecca, Evans, David, Ward, Tom, Davy, Simon, Inglesby, Peter, Dillingham, Iain, Maude, Steven, O’Dwyer, Thomas, Butler-Cole, Ben F. C., Bridges, Lucy, Bates, Chris, Parry, John, Hester, Frank, Harper, Sam, Cockburn, Jonathan, Goldacre, Ben, MacKenna, Brian, Tomlinson, Laurie A., Walker, Alex J., and Hulme, William J.
- Published
- 2024
- Full Text
- View/download PDF
21. Public involvement in UK health and care research 1995–2020: reflections from a witness seminar
- Author
-
Palm, Marisha Emily, Evans, David, Staniszewska, Sophie, Brady, Louca-Mai, Hanley, Bec, Sainsbury, Kate, Stewart, Derek, and Wray, Paula
- Published
- 2024
- Full Text
- View/download PDF
22. A modern way to teach and practice manual therapy
- Author
-
Kerry, Roger, Young, Kenneth J., Evans, David W., Lee, Edward, Georgopoulos, Vasileios, Meakins, Adam, McCarthy, Chris, Cook, Chad, Ridehalgh, Colette, Vogel, Steven, Banton, Amanda, Bergström, Cecilia, Mazzieri, Anna Maria, Mourad, Firas, and Hutting, Nathan
- Published
- 2024
- Full Text
- View/download PDF
23. A genome-wide association study provides insights into the genetic etiology of 57 essential and non-essential trace elements in humans
- Author
-
Moksnes, Marta R., Hansen, Ailin F., Wolford, Brooke N., Thomas, Laurent F., Rasheed, Humaira, Simić, Anica, Bhatta, Laxmi, Brantsæter, Anne Lise, Surakka, Ida, Zhou, Wei, Magnus, Per, Njølstad, Pål R., Andreassen, Ole A., Syversen, Tore, Zheng, Jie, Fritsche, Lars G., Evans, David M., Warrington, Nicole M., Nøst, Therese H., Åsvold, Bjørn Olav, Flaten, Trond Peder, Willer, Cristen J., Hveem, Kristian, and Brumpton, Ben M.
- Published
- 2024
- Full Text
- View/download PDF
24. The Wnt/β-catenin pathway is important for replication of SARS-CoV-2 and other pathogenic RNA viruses
- Author
-
Xu, Zaikun, Elaish, Mohamed, Wong, Cheung Pang, Hassan, Bardes B., Lopez-Orozco, Joaquin, Felix-Lopez, Alberto, Ogando, Natacha S., Nagata, Les, Mahal, Lara K., Kumar, Anil, Wilson, Joyce A., Noyce, Ryan, Mayers, Irv, Power, Christopher, Evans, David, and Hobman, Tom C.
- Published
- 2024
- Full Text
- View/download PDF
25. Coinfection with Strongyloides and SARS-CoV-2: A systematic review
- Author
-
Rosca, Elena C, Heneghan, Carl, Spencer, Elizabeth A, Pluddemann, Annette, Maltoni, Susanna, Gandini, Sara, Onakpoya, Igho J, Evans, David, Conly, John M, and Jefferson, Tom
- Published
- 2023
26. SoK: Pitfalls in Evaluating Black-Box Attacks
- Author
-
Suya, Fnu, Suri, Anshuman, Zhang, Tingwei, Hong, Jingtao, Tian, Yuan, and Evans, David
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning - Abstract
Numerous works study black-box attacks on image classifiers. However, these works make different assumptions on the adversary's knowledge and current literature lacks a cohesive organization centered around the threat model. To systematize knowledge in this area, we propose a taxonomy over the threat space spanning the axes of feedback granularity, the access of interactive queries, and the quality and quantity of the auxiliary data available to the attacker. Our new taxonomy provides three key insights. 1) Despite extensive literature, numerous under-explored threat spaces exist, which cannot be trivially solved by adapting techniques from well-explored settings. We demonstrate this by establishing a new state-of-the-art in the less-studied setting of access to top-k confidence scores by adapting techniques from well-explored settings of accessing the complete confidence vector, but show how it still falls short of the more restrictive setting that only obtains the prediction label, highlighting the need for more research. 2) Identification the threat model of different attacks uncovers stronger baselines that challenge prior state-of-the-art claims. We demonstrate this by enhancing an initially weaker baseline (under interactive query access) via surrogate models, effectively overturning claims in the respective paper. 3) Our taxonomy reveals interactions between attacker knowledge that connect well to related areas, such as model inversion and extraction attacks. We discuss how advances in other areas can enable potentially stronger black-box attacks. Finally, we emphasize the need for a more realistic assessment of attack success by factoring in local attack runtime. This approach reveals the potential for certain attacks to achieve notably higher success rates and the need to evaluate attacks in diverse and harder settings, highlighting the need for better selection criteria., Comment: Accepted at SaTML 2024
- Published
- 2023
27. SoK: Memorization in General-Purpose Large Language Models
- Author
-
Hartmann, Valentin, Suri, Anshuman, Bindschaedler, Vincent, Evans, David, Tople, Shruti, and West, Robert
- Subjects
Computer Science - Computation and Language ,Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
Large Language Models (LLMs) are advancing at a remarkable pace, with myriad applications under development. Unlike most earlier machine learning models, they are no longer built for one specific application but are designed to excel in a wide range of tasks. A major part of this success is due to their huge training datasets and the unprecedented number of model parameters, which allow them to memorize large amounts of information contained in the training data. This memorization goes beyond mere language, and encompasses information only present in a few documents. This is often desirable since it is necessary for performing tasks such as question answering, and therefore an important part of learning, but also brings a whole array of issues, from privacy and security to copyright and beyond. LLMs can memorize short secrets in the training data, but can also memorize concepts like facts or writing styles that can be expressed in text in many different ways. We propose a taxonomy for memorization in LLMs that covers verbatim text, facts, ideas and algorithms, writing styles, distributional properties, and alignment goals. We describe the implications of each type of memorization - both positive and negative - for model performance, privacy, security and confidentiality, copyright, and auditing, and ways to detect and prevent memorization. We further highlight the challenges that arise from the predominant way of defining memorization with respect to model behavior instead of model weights, due to LLM-specific phenomena such as reasoning capabilities or differences between decoding algorithms. Throughout the paper, we describe potential risks and opportunities arising from memorization in LLMs that we hope will motivate new research directions.
- Published
- 2023
28. Terrestrial Very-Long-Baseline Atom Interferometry: Workshop Summary
- Author
-
Abend, Sven, Allard, Baptiste, Alonso, Iván, Antoniadis, John, Araujo, Henrique, Arduini, Gianluigi, Arnold, Aidan, Aßmann, Tobias, Augst, Nadja, Badurina, Leonardo, Balaz, Antun, Banks, Hannah, Barone, Michele, Barsanti, Michele, Bassi, Angelo, Battelier, Baptiste, Baynham, Charles, Quentin, Beaufils, Belic, Aleksandar, Beniwal, Ankit, Bernabeu, Jose, Bertinelli, Francesco, Bertoldi, Andrea, Biswas, Ikbal Ahamed, Blas, Diego, Boegel, Patrick, Bogojevic, Aleksandar, Böhm, Jonas, Böhringer, Samuel, Bongs, Kai, Bouyer, Philippe, Brand, Christian, Brimis, Apostolos, Buchmueller, Oliver, Cacciapuoti, Luigi, Calatroni, Sergio, Canuel, Benjamin, Caprini, Chiara, Caramete, Ana, Caramete, Laurentiu, Carlesso, Matteo, Carlton, John, Casariego, Mateo, Charmandaris, Vassilis, Chen, Yu-Ao, Chiofalo, Maria Luisa, Cimbri, Alessia, Coleman, Jonathon, Constantin, Florin Lucian, Contaldi, Carlo, Cui, Yanou, Da Ros, Elisa, Davies, Gavin, Rosendo, Esther del Pino, Deppner, Christian, Derevianko, Andrei, de Rham, Claudia, De Roeck, Albert, Derr, Daniel, Di Pumpo, Fabio, Djordjevic, Goran, Dobrich, Babette, Domokos, Peter, Dornan, Peter, Doser, Michael, Drougakis, Giannis, Dunningham, Jacob, Duspayev, Alisher, Easo, Sajan, Eby, Joshua, Efremov, Maxim, Ekelof, Tord, Elertas, Gedminas, Ellis, John, Evans, David, Fadeev, Pavel, Fanì, Mattia, Fassi, Farida, Fattori, Marco, Fayet, Pierre, Felea, Daniel, Feng, Jie, Friedrich, Alexander, Fuchs, Elina, Gaaloul, Naceur, Gao, Dongfeng, Gardner, Susan, Garraway, Barry, Gauguet, Alexandre, Gerlach, Sandra, Gersemann, Matthias, Gibson, Valerie, Giese, Enno, Giudice, Gian Francesco, Glasbrenner, Eric, Gündogan, Mustafa, Haehnelt, Martin G., Hakulinen, Timo, Hammerer, Klemens, Hanımeli, Ekim Taylan, Harte, Tiffany, Hawkins, Leonie, Hees, Aurelien, Heise, Jaret, Henderson, Victoria, Herrmann, Sven, Hird, Thomas, Hogan, Jason, Holst, Bodil, Holynski, Michael, Hussain, Kamran, Janson, Gregor, Jeglič, Peter, Jelezko, Fedor, Kagan, Michael, Kalliokoski, Matti, Kasevich, Mark, Kehagias, Alex, Kilian, Eva, Koley, Soumen, Konrad, Bernd, Kopp, Joachim, Kornakov, Georgy, Kovachy, Tim, Krutzik, Markus, Kumar, Mukesh, Kumar, Pradeep, Laemmerzahl, Claus, Landsberg, Greg, Langlois, Mehdi, Lanigan, Bryony, Lellouch, Samuel, Leone, Bruno, Lafitte, Christophe Le Poncin, Lewicki, Marek, Leykauf, Bastian, Lezeik, Ali, Lombriser, Lucas, López, Luis, Asamar, Elias López, Monjaraz, Cristian López, Luciano, Gaetano, Mohammed, Mohammed Mahmoud, Maleknejad, Azadeh, Markus, Krutzik, Marteau, Jacques, Massonnet, Didier, Mazumdar, Anupam, McCabe, Christopher, Meister, Matthias, Menu, Jonathan, Messineo, Giuseppe, Micalizio, Salvatore, Millington, Peter, Milosevic, Milan, Mitchell, Jeremiah, Montero, Mario, Morley, Gavin, Müller, Jürgen, Müstecaplıoğlu, Özgür, Ni, Wei-Tou, Noller, Johannes, Odžak, Senad, Oi, Daniel, Omar, Yasser, Pahl, Julia, Paling, Sean, Pandey, Saurabh, Pappas, George, Pareek, Vinay, Pasatembou, Elizabeth, Pelucchi, Emanuele, Santos, Franck Pereira dos, Piest, Baptist, Pikovski, Igor, Pilaftsis, Apostolos, Plunkett, Robert, Poggiani, Rosa, Prevedelli, Marco, Puputti, Julia, Veettil, Vishnupriya Puthiya, Quenby, John, Rafelski, Johann, Rajendran, Surjeet, Rasel, Ernst Maria, Sfar, Haifa Rejeb, Reynaud, Serge, Richaud, Andrea, Rodzinka, Tangui, Roura, Albert, Rudolph, Jan, Sabulsky, Dylan, Safronova, Marianna, Santamaria, Luigi, Schilling, Manuel, Schkolnik, Vladimir, Schleich, Wolfgang, Schlippert, Dennis, Schneider, Ulrich, Schreck, Florian, Schubert, Christian, Schwersenz, Nico, Semakin, Aleksei, Sergijenko, Olga, Shao, Lijing, Shipsey, Ian, Singh, Rajeev, Smerzi, Augusto, Sopuerta, Carlos F., Spallicci, Alessandro, Stefanescu, Petruta, Stergioulas, Nikolaos, Ströhle, Jannik, Struckmann, Christian, Tentindo, Silvia, Throssell, Henry, Tino, Guglielmo M., Tinsley, Jonathan, Mircea, Ovidiu Tintareanu, Tkalčec, Kimberly, Tolley, Andrew, Tornatore, Vincenza, Torres-Orjuela, Alejandro, Treutlein, Philipp, Trombettoni, Andrea, Tsai, Yu-Dai, Ufrecht, Christian, Ulmer, Stefan, Valuch, Daniel, Vaskonen, Ville, Aceves, Veronica Vazquez, Vitanov, Nikolay, Vogt, Christian, von Klitzing, Wolf, Vukics, András, Walser, Reinhold, Wang, Jin, Warburton, Niels, Webber-Date, Alexander, Wenzlawski, André, Werner, Michael, Williams, Jason, Windapssinger, Patrcik, Wolf, Peter, Wörner, Lisa, Xuereb, André, Yahia, Mohamed, Cruzeiro, Emmanuel Zambrini, Zarei, Moslem, Zhan, Mingsheng, Zhou, Lin, Zupan, Jure, and Zupanič, Erik
- Subjects
High Energy Physics - Experiment ,Astrophysics - Instrumentation and Methods for Astrophysics ,General Relativity and Quantum Cosmology ,High Energy Physics - Phenomenology ,Physics - Atomic Physics - Abstract
This document presents a summary of the 2023 Terrestrial Very-Long-Baseline Atom Interferometry Workshop hosted by CERN. The workshop brought together experts from around the world to discuss the exciting developments in large-scale atom interferometer (AI) prototypes and their potential for detecting ultralight dark matter and gravitational waves. The primary objective of the workshop was to lay the groundwork for an international TVLBAI proto-collaboration. This collaboration aims to unite researchers from different institutions to strategize and secure funding for terrestrial large-scale AI projects. The ultimate goal is to create a roadmap detailing the design and technology choices for one or more km-scale detectors, which will be operational in the mid-2030s. The key sections of this report present the physics case and technical challenges, together with a comprehensive overview of the discussions at the workshop together with the main conclusions., Comment: Summary of the Terrestrial Very-Long-Baseline Atom Interferometry Workshop held at CERN: https://indico.cern.ch/event/1208783/
- Published
- 2023
29. Woolf et als GWAS by subtraction is not useful for cross-generational Mendelian randomization studies
- Author
-
Evans, David M, Smith, George Davey, and Moen, Gunn-Helen
- Subjects
Quantitative Biology - Quantitative Methods - Abstract
Mendelian randomization (MR) is an epidemiological method that can be used to strengthen causal inference regarding the relationship between a modifiable environmental exposure and a medically relevant trait and to estimate the magnitude of this relationship1. Recently, there has been considerable interest in using MR to examine potential causal relationships between parental phenotypes and outcomes amongst their offspring. In a recent issue of BMC Research Notes, Woolf et al (2023) present a new method, GWAS by subtraction, to derive genome-wide summary statistics for paternal smoking and other paternal phenotypes with the goal that these estimates can then be used in downstream (including two sample) MR studies. Whilst a potentially useful goal, Woolf et al. (2023) focus on the wrong parameter of interest for useful genome-wide association studies (GWAS) and downstream cross-generational MR studies, and the estimator that they derive is neither efficient nor appropriate for such use., Comment: 8 pages, 0 figures
- Published
- 2023
30. A Note on Modelling Bidirectional Feedback Loops in Mendelian Randomization Studies
- Author
-
Hwang, Liang-Dar and Evans, David M.
- Published
- 2024
- Full Text
- View/download PDF
31. Accurate structure prediction of biomolecular interactions with AlphaFold 3
- Author
-
Abramson, Josh, Adler, Jonas, Dunger, Jack, Evans, Richard, Green, Tim, Pritzel, Alexander, Ronneberger, Olaf, Willmore, Lindsay, Ballard, Andrew J., Bambrick, Joshua, Bodenstein, Sebastian W., Evans, David A., Hung, Chia-Chun, O’Neill, Michael, Reiman, David, Tunyasuvunakool, Kathryn, Wu, Zachary, Žemgulytė, Akvilė, Arvaniti, Eirini, Beattie, Charles, Bertolli, Ottavia, Bridgland, Alex, Cherepanov, Alexey, Congreve, Miles, Cowen-Rivers, Alexander I., Cowie, Andrew, Figurnov, Michael, Fuchs, Fabian B., Gladman, Hannah, Jain, Rishub, Khan, Yousuf A., Low, Caroline M. R., Perlin, Kuba, Potapenko, Anna, Savy, Pascal, Singh, Sukhdeep, Stecula, Adrian, Thillaisundaram, Ashok, Tong, Catherine, Yakneen, Sergei, Zhong, Ellen D., Zielinski, Michal, Žídek, Augustin, Bapst, Victor, Kohli, Pushmeet, Jaderberg, Max, Hassabis, Demis, and Jumper, John M.
- Published
- 2024
- Full Text
- View/download PDF
32. What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners?
- Author
-
Suya, Fnu, Zhang, Xiao, Tian, Yuan, and Evans, David
- Subjects
Computer Science - Machine Learning ,Computer Science - Cryptography and Security - Abstract
We study indiscriminate poisoning for linear learners where an adversary injects a few crafted examples into the training data with the goal of forcing the induced model to incur higher test error. Inspired by the observation that linear learners on some datasets are able to resist the best known attacks even without any defenses, we further investigate whether datasets can be inherently robust to indiscriminate poisoning attacks for linear learners. For theoretical Gaussian distributions, we rigorously characterize the behavior of an optimal poisoning attack, defined as the poisoning strategy that attains the maximum risk of the induced model at a given poisoning budget. Our results prove that linear learners can indeed be robust to indiscriminate poisoning if the class-wise data distributions are well-separated with low variance and the size of the constraint set containing all permissible poisoning points is also small. These findings largely explain the drastic variation in empirical attack performance of the state-of-the-art poisoning attacks on linear learners across benchmark datasets, making an important initial step towards understanding the underlying reasons some learning tasks are vulnerable to data poisoning attacks., Comment: NeurIPS 2023 camera-ready version, 39 pages
- Published
- 2023
33. Spectral Sequence Computation of Higher Twisted $K$-Groups of $ SU(n)$
- Author
-
Evans, David E. and Pennig, Ulrich
- Subjects
Mathematics - K-Theory and Homology ,Mathematics - Algebraic Topology ,Mathematics - Operator Algebras ,19L50, 19L47, 46L80 - Abstract
Motivated by the Freed-Hopkins-Teleman theorem we study graded equivariant higher twists of $K$-theory for the groups $G = SU(n)$ induced by exponential functors. We compute the rationalisation of these groups for all $n$ and all non-trivial functors $F$ using the Mayer-Vietoris spectral sequence. Similar to the classical case only the $K$-theory in degree $\dim(G)$ is non-trivial and the non-vanishing group is a quotient of a localisation of the representation ring $R(G) \otimes \mathbb{Q}$ by a higher fusion ideal $J_{F,\mathbb{Q}}$. We give generators for this ideal and prove that these can be obtained as derivatives of a potential., Comment: 33 pages, one figure, minor mistake fixed in Section 3.1.1, setting has been adjusted to exponential functors that are symmetric monoidal and take values in graded vector spaces
- Published
- 2023
34. Active fire protection systems
- Author
-
Evans, David D.
- Published
- 2005
35. Physics-based modeling for WUI fire spread : simplified model algorithm for ignition of structures by burning vegetation
- Author
-
Evans, David D.
- Published
- 2004
36. Intracellular replication of Pseudomonas aeruginosa in epithelial cells requires suppression of the caspase-4 inflammasome.
- Author
-
Kroken, Abby, Klein, Keith, Mitchell, Patrick, Nieto, Vincent, Jedel, Eric, Evans, David, and Fleiszig, Suzanne
- Subjects
Pseudomonas aeruginosa ,caspase-4 ,cornea ,epithelium ,inflammasome ,keratitis ,pyroptosis ,type three secretion system ,Humans ,HeLa Cells ,Pseudomonas aeruginosa ,Inflammasomes ,Epithelial Cells ,Vacuoles - Abstract
Pathogenesis of Pseudomonas aeruginosa infections can include bacterial survival inside epithelial cells. Previously, we showed that this involves multiple roles played by the type three secretion system (T3SS), and specifically the effector ExoS. This includes ExoS-dependent inhibition of a lytic host cell response that subsequently enables intracellular replication. Here, we studied the underlying cell death response to intracellular P. aeruginosa, comparing wild-type to T3SS mutants varying in capacity to induce cell death and that localize to different intracellular compartments. Results showed that corneal epithelial cell death induced by intracellular P. aeruginosa lacking the T3SS, which remains in vacuoles, correlated with the activation of nuclear factor-κB as measured by p65 relocalization and tumor necrosis factor alpha transcription and secretion. Deletion of caspase-4 through CRISPR-Cas9 mutagenesis delayed cell death caused by these intracellular T3SS mutants. Caspase-4 deletion also countered more rapid cell death caused by T3SS effector-null mutants still expressing the T3SS apparatus that traffic to the host cell cytoplasm, and in doing so rescued intracellular replication normally dependent on ExoS. While HeLa cells lacked a lytic death response to T3SS mutants, it was found to be enabled by interferon gamma treatment. Together, these results show that epithelial cells can activate the noncanonical inflammasome pathway to limit proliferation of intracellular P. aeruginosa, not fully dependent on bacterially driven vacuole escape. Since ExoS inhibits the lytic response, the data implicate targeting of caspase-4, an intracellular pattern recognition receptor, as another contributor to the role of ExoS in the intracellular lifestyle of P. aeruginosa. IMPORTANCE Pseudomonas aeruginosa can exhibit an intracellular lifestyle within epithelial cells in vivo and in vitro. The type three secretion system (T3SS) effector ExoS contributes via multiple mechanisms, including extending the life of invaded host cells. Here, we aimed to understand the underlying cell death inhibited by ExoS when P. aeruginosa is intracellular. Results showed that intracellular P. aeruginosa lacking T3SS effectors could elicit rapid cell lysis via the noncanonical inflammasome pathway. Caspase-4 contributed to cell lysis even when the intracellular bacteria lacked the entire T33S and were consequently unable to escape vacuoles, representing a naturally occurring subpopulation during wild-type infection. Together, the data show the caspase-4 inflammasome as an epithelial cell defense against intracellular P. aeruginosa, and implicate its targeting as another mechanism by which ExoS preserves the host cell replicative niche.
- Published
- 2023
37. The identification of distinct protective and susceptibility mechanisms for hip osteoarthritis: findings from a genome-wide association study meta-analysis of minimum joint space width and Mendelian randomisation cluster analyses
- Author
-
Faber, Benjamin G, Frysz, Monika, Boer, Cindy G, Evans, Daniel S, Ebsim, Raja, Flynn, Kaitlyn A, Lundberg, Mischa, Southam, Lorraine, Hartley, April, Saunders, Fiona R, Lindner, Claudia, Gregory, Jennifer S, Aspden, Richard M, Lane, Nancy E, Harvey, Nicholas C, Evans, David M, Zeggini, Eleftheria, Davey Smith, George, Cootes, Timothy, Van Meurs, Joyce, Kemp, John P, and Tobias, Jonathan H
- Subjects
Arthritis ,Clinical Research ,Genetics ,Aging ,Human Genome ,2.1 Biological and endogenous factors ,Aetiology ,Musculoskeletal ,Cartilage ,Genome-wide association study ,Mendelian randomisation ,Osteoarthritis ,Clinical Sciences ,Public Health and Health Services ,Clinical sciences ,Epidemiology - Abstract
BackgroundHip minimum joint space width (mJSW) provides a proxy for cartilage thickness. This study aimed to conduct a genome-wide association study (GWAS) of mJSW to (i) identify new genetic determinants of mJSW and (ii) identify which mJSW loci convey hip osteoarthritis (HOA) risk and would therefore be of therapeutic interest.MethodsGWAS meta-analysis of hip mJSW derived from plain X-rays and DXA was performed, stratified by sex and adjusted for age and ancestry principal components. Mendelian randomisation (MR) and cluster analyses were used to examine causal effect of mJSW on HOA.Findings50,745 individuals were included in the meta-analysis. 42 SNPs, which mapped to 39 loci, were identified. Mendelian randomisation (MR) revealed little evidence of a causal effect of mJSW on HOA (ORIVW 0.98 [95% CI 0.82-1.18]). However, MR-Clust analysis suggested the null MR estimates reflected the net effect of two distinct causal mechanisms cancelling each other out, one of which was protective, whereas the other increased HOA susceptibility. For the latter mechanism, all loci were positively associated with height, suggesting mechanisms leading to greater height and mJSW increase the risk of HOA in later life.InterpretationsOne group of mJSW loci reduce HOA risk via increased mJSW, suggesting possible utility as targets for chondroprotective therapies. The second group of mJSW loci increased HOA risk, despite increasing mJSW, but were also positively related to height, suggesting they contribute to HOA risk via a growth-related mechanism.FundingPrimarily funded by the Medical Research Council and Wellcome Trust.
- Published
- 2023
38. TRPA1 and TPRV1 Ion Channels Are Required for Contact Lens-Induced Corneal Parainflammation and Can Modulate Levels of Resident Corneal Immune Cells.
- Author
-
Datta, Ananya, Lee, Ji, Flandrin, Orneika, Horneman, Hart, Lee, Justin, Metruccio, Matteo, Bautista, Diana, Evans, David, and Fleiszig, Suzanne
- Subjects
Animals ,Mice ,Contact Lenses ,Cornea ,Histocompatibility Antigens Class II ,Ion Channels ,TRPA1 Cation Channel ,TRPV Cation Channels ,Tumor Necrosis Factor-alpha - Abstract
PURPOSE: Contact lens wear can induce corneal parainflammation involving CD11c+ cell responses (24 hours), γδ T cell responses (24 hours and 6 days), and IL-17-dependent Ly6G+ cell responses (6 days). Topical antibiotics blocked these CD11c+ responses. Because corneal CD11c+ responses to bacteria require transient receptor potential (TRP) ion-channels (TRPA1/TRPV1), we determined if these channels mediate lens-induced corneal parainflammation. METHODS: Wild-type mice were fitted with contact lenses for 24 hours or 6 days and compared to lens wearing TRPA1 (-/-) or TRPV1 (-/-) mice or resiniferatoxin (RTX)-treated mice. Contralateral eyes were not fitted with lenses. Corneas were examined for major histocompatibility complex (MHC) class II+, CD45+, γδ T, or TNF-α+ cell responses (24 hours) or Ly6G+ responses (6 days) by quantitative imaging. The quantitative PCR (qPCR) determined cytokine gene expression. RESULTS: Lens-induced increases in MHC class II+ cells after 24 hours were abrogated in TRPV1 (-/-) but not TRPA1 (-/-) mice. Increases in CD45+ cells were unaffected. Increases in γδ T cells after 24 hours of wear were abrogated in TRPA1 (-/-) and TRPV1 (-/-) mice, as were 6 day Ly6G+ cell responses. Contralateral corneas of TRPA1 (-/-) and TRPV1 (-/-) mice showed reduced MHC class II+ and γδ T cells at 24 hours. RTX inhibited lens-induced parainflammatory phenotypes (24 hours and 6 days), blocked lens-induced TNF-α and IL-18 gene expression, TNF-α+ cell infiltration (24 hours), and reduced baseline MHC class II+ cells. CONCLUSIONS: TRPA1 and TRPV1 mediate contact lens-induced corneal parainflammation after 24 hours and 6 days of wear and can modulate baseline levels of resident corneal immune cells.
- Published
- 2023
39. Addendum: Accurate structure prediction of biomolecular interactions with AlphaFold 3
- Author
-
Abramson, Josh, Adler, Jonas, Dunger, Jack, Evans, Richard, Green, Tim, Pritzel, Alexander, Ronneberger, Olaf, Willmore, Lindsay, Ballard, Andrew J., Bambrick, Joshua, Bodenstein, Sebastian W., Evans, David A., Hung, Chia-Chun, O’Neill, Michael, Reiman, David, Tunyasuvunakool, Kathryn, Wu, Zachary, Žemgulytė, Akvilė, Arvaniti, Eirini, Beattie, Charles, Bertolli, Ottavia, Bridgland, Alex, Cherepanov, Alexey, Congreve, Miles, Cowen-Rivers, Alexander I., Cowie, Andrew, Figurnov, Michael, Fuchs, Fabian B., Gladman, Hannah, Jain, Rishub, Khan, Yousuf A., Low, Caroline M. R., Perlin, Kuba, Potapenko, Anna, Savy, Pascal, Singh, Sukhdeep, Stecula, Adrian, Thillaisundaram, Ashok, Tong, Catherine, Yakneen, Sergei, Zhong, Ellen D., Zielinski, Michal, Žídek, Augustin, Bapst, Victor, Kohli, Pushmeet, Jaderberg, Max, Hassabis, Demis, and Jumper, John M.
- Published
- 2024
- Full Text
- View/download PDF
40. Advancing Differential Privacy: Where We Are Now and Future Directions for Real-World Deployment
- Author
-
Cummings, Rachel, Desfontaines, Damien, Evans, David, Geambasu, Roxana, Huang, Yangsibo, Jagielski, Matthew, Kairouz, Peter, Kamath, Gautam, Oh, Sewoong, Ohrimenko, Olga, Papernot, Nicolas, Rogers, Ryan, Shen, Milan, Song, Shuang, Su, Weijie, Terzis, Andreas, Thakurta, Abhradeep, Vassilvitskii, Sergei, Wang, Yu-Xiang, Xiong, Li, Yekhanin, Sergey, Yu, Da, Zhang, Huanyu, and Zhang, Wanrong
- Subjects
Computer Science - Cryptography and Security - Abstract
In this article, we present a detailed review of current practices and state-of-the-art methodologies in the field of differential privacy (DP), with a focus of advancing DP's deployment in real-world applications. Key points and high-level contents of the article were originated from the discussions from "Differential Privacy (DP): Challenges Towards the Next Frontier," a workshop held in July 2022 with experts from industry, academia, and the public sector seeking answers to broad questions pertaining to privacy and its implications in the design of industry-grade systems. This article aims to provide a reference point for the algorithmic and design decisions within the realm of privacy, highlighting important challenges and potential research directions. Covering a wide spectrum of topics, this article delves into the infrastructure needs for designing private systems, methods for achieving better privacy/utility trade-offs, performing privacy attacks and auditing, as well as communicating privacy with broader audiences and stakeholders.
- Published
- 2023
41. Manipulating Transfer Learning for Property Inference
- Author
-
Tian, Yulong, Suya, Fnu, Suri, Anshuman, Xu, Fengyuan, and Evans, David
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Cryptography and Security - Abstract
Transfer learning is a popular method for tuning pretrained (upstream) models for different downstream tasks using limited data and computational resources. We study how an adversary with control over an upstream model used in transfer learning can conduct property inference attacks on a victim's tuned downstream model. For example, to infer the presence of images of a specific individual in the downstream training set. We demonstrate attacks in which an adversary can manipulate the upstream model to conduct highly effective and specific property inference attacks (AUC score $> 0.9$), without incurring significant performance loss on the main task. The main idea of the manipulation is to make the upstream model generate activations (intermediate features) with different distributions for samples with and without a target property, thus enabling the adversary to distinguish easily between downstream models trained with and without training examples that have the target property. Our code is available at https://github.com/yulongt23/Transfer-Inference., Comment: Accepted to CVPR 2023
- Published
- 2023
42. Subfactors and Mathematical Physics
- Author
-
Evans, David E. and Kawahigashi, Yasuyuki
- Subjects
Mathematical Physics ,Mathematics - Operator Algebras ,Mathematics - Quantum Algebra ,46L37, 17B69, 18D10, 81R10, 81T05, 81T40, 82B20, 82B23 - Abstract
This paper surveys the long-standing connections and impact between Vaughan Jones's theory of subfactors and various topics in mathematical physics, namely statistical mechanics,quantum field theory,quantum information and two-dimensional conformal field theory., Comment: 22 pages, 1 figure. To appear in an issue of the Bulletin of the AMS, dedicated to the mathematical legacy of Vaughan Jones
- Published
- 2023
- Full Text
- View/download PDF
43. GlucoSynth: Generating Differentially-Private Synthetic Glucose Traces
- Author
-
Lamp, Josephine, Derdzinski, Mark, Hannemann, Christopher, van der Linden, Joost, Feng, Lu, Wang, Tianhao, and Evans, David
- Subjects
Computer Science - Machine Learning ,Computer Science - Cryptography and Security - Abstract
We focus on the problem of generating high-quality, private synthetic glucose traces, a task generalizable to many other time series sources. Existing methods for time series data synthesis, such as those using Generative Adversarial Networks (GANs), are not able to capture the innate characteristics of glucose data and cannot provide any formal privacy guarantees without severely degrading the utility of the synthetic data. In this paper we present GlucoSynth, a novel privacy-preserving GAN framework to generate synthetic glucose traces. The core intuition behind our approach is to conserve relationships amongst motifs (glucose events) within the traces, in addition to temporal dynamics. Our framework incorporates differential privacy mechanisms to provide strong formal privacy guarantees. We provide a comprehensive evaluation on the real-world utility of the data using 1.2 million glucose traces; GlucoSynth outperforms all previous methods in its ability to generate high-quality synthetic glucose traces with strong privacy guarantees.
- Published
- 2023
44. Transmission of SARS-CoV-2 associated with cruise ship travel: A systematic review
- Author
-
Rosca, Elena Cecilia, Heneghan, Carl, Spencer, Elizabeth A, Brassey, Jon, Pluddemann, Annette, Onakpoya, Igho J, Evans, David, Conly, John M, and Jefferson, Tom
- Published
- 2022
45. TrojanPuzzle: Covertly Poisoning Code-Suggestion Models
- Author
-
Aghakhani, Hojjat, Dai, Wei, Manoel, Andre, Fernandes, Xavier, Kharkar, Anant, Kruegel, Christopher, Vigna, Giovanni, Evans, David, Zorn, Ben, and Sim, Robert
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
With tools like GitHub Copilot, automatic code suggestion is no longer a dream in software engineering. These tools, based on large language models, are typically trained on massive corpora of code mined from unvetted public sources. As a result, these models are susceptible to data poisoning attacks where an adversary manipulates the model's training by injecting malicious data. Poisoning attacks could be designed to influence the model's suggestions at run time for chosen contexts, such as inducing the model into suggesting insecure code payloads. To achieve this, prior attacks explicitly inject the insecure code payload into the training data, making the poison data detectable by static analysis tools that can remove such malicious data from the training set. In this work, we demonstrate two novel attacks, COVERT and TROJANPUZZLE, that can bypass static analysis by planting malicious poison data in out-of-context regions such as docstrings. Our most novel attack, TROJANPUZZLE, goes one step further in generating less suspicious poison data by never explicitly including certain (suspicious) parts of the payload in the poison data, while still inducing a model that suggests the entire payload when completing code (i.e., outside docstrings). This makes TROJANPUZZLE robust against signature-based dataset-cleansing methods that can filter out suspicious sequences from the training data. Our evaluation against models of two sizes demonstrates that both COVERT and TROJANPUZZLE have significant implications for practitioners when selecting code used to train or tune code-suggestion models.
- Published
- 2023
46. SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
- Author
-
Salem, Ahmed, Cherubin, Giovanni, Evans, David, Köpf, Boris, Paverd, Andrew, Suri, Anshuman, Tople, Shruti, and Zanella-Béguelin, Santiago
- Subjects
Computer Science - Machine Learning ,Computer Science - Cryptography and Security ,Computer Science - Computer Science and Game Theory - Abstract
Deploying machine learning models in production may allow adversaries to infer sensitive information about training data. There is a vast literature analyzing different types of inference risks, ranging from membership inference to reconstruction attacks. Inspired by the success of games (i.e., probabilistic experiments) to study security properties in cryptography, some authors describe privacy inference risks in machine learning using a similar game-based style. However, adversary capabilities and goals are often stated in subtly different ways from one presentation to the other, which makes it hard to relate and compose results. In this paper, we present a game-based framework to systematize the body of knowledge on privacy inference risks in machine learning. We use this framework to (1) provide a unifying structure for definitions of inference risks, (2) formally establish known relations among definitions, and (3) to uncover hitherto unknown relations that would have been difficult to spot otherwise., Comment: 20 pages, to appear in 2023 IEEE Symposium on Security and Privacy
- Published
- 2022
47. Dissecting Distribution Inference
- Author
-
Suri, Anshuman, Lu, Yifu, Chen, Yanjin, and Evans, David
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Cryptography and Security - Abstract
A distribution inference attack aims to infer statistical properties of data used to train machine learning models. These attacks are sometimes surprisingly potent, but the factors that impact distribution inference risk are not well understood and demonstrated attacks often rely on strong and unrealistic assumptions such as full knowledge of training environments even in supposedly black-box threat scenarios. To improve understanding of distribution inference risks, we develop a new black-box attack that even outperforms the best known white-box attack in most settings. Using this new attack, we evaluate distribution inference risk while relaxing a variety of assumptions about the adversary's knowledge under black-box access, like known model architectures and label-only access. Finally, we evaluate the effectiveness of previously proposed defenses and introduce new defenses. We find that although noise-based defenses appear to be ineffective, a simple re-sampling defense can be highly effective. Code is available at https://github.com/iamgroot42/dissecting_distribution_inference, Comment: Accepted at SaTML 2023 (updated Yifu's email address)
- Published
- 2022
48. Response of personal noise dosimeters to continuous and impulse-like signals
- Author
-
Evans, David J.
- Subjects
Dosimeters. ,Noise--Measurement. - Published
- 1991
49. Balanced Adversarial Training: Balancing Tradeoffs between Fickleness and Obstinacy in NLP Models
- Author
-
Chen, Hannah, Ji, Yangfeng, and Evans, David
- Subjects
Computer Science - Computation and Language - Abstract
Traditional (fickle) adversarial examples involve finding a small perturbation that does not change an input's true label but confuses the classifier into outputting a different prediction. Conversely, obstinate adversarial examples occur when an adversary finds a small perturbation that preserves the classifier's prediction but changes the true label of an input. Adversarial training and certified robust training have shown some effectiveness in improving the robustness of machine learnt models to fickle adversarial examples. We show that standard adversarial training methods focused on reducing vulnerability to fickle adversarial examples may make a model more vulnerable to obstinate adversarial examples, with experiments for both natural language inference and paraphrase identification tasks. To counter this phenomenon, we introduce Balanced Adversarial Training, which incorporates contrastive learning to increase robustness against both fickle and obstinate adversarial examples., Comment: EMNLP 2022
- Published
- 2022
50. Are Attribute Inference Attacks Just Imputation?
- Author
-
Jayaraman, Bargav and Evans, David
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
Models can expose sensitive information about their training data. In an attribute inference attack, an adversary has partial knowledge of some training records and access to a model trained on those records, and infers the unknown values of a sensitive feature of those records. We study a fine-grained variant of attribute inference we call \emph{sensitive value inference}, where the adversary's goal is to identify with high confidence some records from a candidate set where the unknown attribute has a particular sensitive value. We explicitly compare attribute inference with data imputation that captures the training distribution statistics, under various assumptions about the training data available to the adversary. Our main conclusions are: (1) previous attribute inference methods do not reveal more about the training data from the model than can be inferred by an adversary without access to the trained model, but with the same knowledge of the underlying distribution as needed to train the attribute inference attack; (2) black-box attribute inference attacks rarely learn anything that cannot be learned without the model; but (3) white-box attacks, which we introduce and evaluate in the paper, can reliably identify some records with the sensitive value attribute that would not be predicted without having access to the model. Furthermore, we show that proposed defenses such as differentially private training and removing vulnerable records from training do not mitigate this privacy risk. The code for our experiments is available at \url{https://github.com/bargavj/EvaluatingDPML}., Comment: 13 (main body) + 4 (references and appendix) pages. To appear in CCS'22
- Published
- 2022
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.