Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Quantum Key-Length Extension, Joseph Jaeger, Fang Song, Stefano Tessaro Nov 2022

Quantum Key-Length Extension, Joseph Jaeger, Fang Song, Stefano Tessaro

Computer Science Faculty Publications and Presentations

Should quantum computers become available, they will reduce the effective key length of basic secret-key primitives, such as blockciphers. To address this we will either need to use blockciphers with inherently longer keys or develop key-length extension techniques to amplify the security of a blockcipher to use longer keys.

We consider the latter approach and revisit the FX and double encryption constructions. Classically, FX was proven to be a secure key-length extension technique, while double encryption fails to be more secure than single encryption due to a meet-in-the-middle attack. In this work we provide positive results, with concrete and tight …


From Machine Learning To Deep Learning: A Comprehensive Study Of Alcohol And Drug Use Disorder, Banafsheh Rekabdar, David L. Albright, Haelim Jeong, Sameerah Talafha Nov 2022

From Machine Learning To Deep Learning: A Comprehensive Study Of Alcohol And Drug Use Disorder, Banafsheh Rekabdar, David L. Albright, Haelim Jeong, Sameerah Talafha

Computer Science Faculty Publications and Presentations

This study aims to train and validate machine learning and deep learning models to identify patients with risky alcohol and drug misuse in a Screening, Brief Intervention, and Referral to Treatment (SBIRT) program. An observational cohort of 6978 adults was admitted in the western region of Alabama at three medical facilities between January and December of 2019. Data were cleaned and pre-processed using data imputation techniques and an augmented sampling data method. The primary analysis involved the multi-class classification of alcohol and drug misuse. Our study shows that accurate identification of alcohol and drug use screening instrument scores was best …


A Simpler Machine Learning Model For Acute Kidney Injury Risk Stratification In Hospitalized Patients, Yirui Hu, Kunpeng Liu, Kevin Ho, David Riviello, Jason Brown, Alex R. Chang, Gurmukteshwar Singh, H. Lester Kirchner Oct 2022

A Simpler Machine Learning Model For Acute Kidney Injury Risk Stratification In Hospitalized Patients, Yirui Hu, Kunpeng Liu, Kevin Ho, David Riviello, Jason Brown, Alex R. Chang, Gurmukteshwar Singh, H. Lester Kirchner

Computer Science Faculty Publications and Presentations

Background: Hospitalization-associated acute kidney injury (AKI), affecting one-in-five inpatients, is associated with increased mortality and major adverse cardiac/kidney endpoints. Early AKI risk stratification may enable closer monitoring and prevention. Given the complexity and resource utilization of existing machine learning models, we aimed to develop a simpler prediction model. Methods: Models were trained and validated to predict risk of AKI using electronic health record (EHR) data available at 24 h of inpatient admission. Input variables included demographics, laboratory values, medications, and comorbidities. Missing values were imputed using multiple imputation by chained equations. Results: 26,410 of 209,300 (12.6%) inpatients developed AKI during …


Motion-Adjustable Neural Implicit Video Representation, Long Mai, Feng Liu Sep 2022

Motion-Adjustable Neural Implicit Video Representation, Long Mai, Feng Liu

Computer Science Faculty Publications and Presentations

Implicit neural representation (INR) has been successful in representing static images. Contemporary image-based INR, with the use of Fourier-based positional encoding, can be viewed as a mapping from sinusoidal patterns with different frequencies to image content. Inspired by that view, we hypothesize that it is possible to generate temporally varying content with a single image-based INR model by displacing its input sinusoidal patterns over time. By exploiting the relation between the phase information in sinusoidal functions and their displacements, we incorporate into the conventional image-based INR model a phase-varying positional encoding module, and couple it with a phase-shift generation module …


Quantum Algorithms For Attacking Hardness Assumptions In Classical And Post‐Quantum Cryptography, J.-F. Biasse, X. Bonnetain, E. Kirshanova, A. Schrottenloher, Fang Song Aug 2022

Quantum Algorithms For Attacking Hardness Assumptions In Classical And Post‐Quantum Cryptography, J.-F. Biasse, X. Bonnetain, E. Kirshanova, A. Schrottenloher, Fang Song

Computer Science Faculty Publications and Presentations

In this survey, the authors review the main quantum algorithms for solving the computational problems that serve as hardness assumptions for cryptosystem. To this end, the authors consider both the currently most widely used classically secure cryptosystems, and the most promising candidates for post-quantum secure cryptosystems. The authors provide details on the cost of the quantum algorithms presented in this survey. The authors furthermore discuss ongoing research directions that can impact quantum cryptanalysis in the future.


Snerf: Stylized Neural Implicit Representations For 3d Scenes, Thu Nguyen-Phuoc, Feng Liu, Lei Xiao Jul 2022

Snerf: Stylized Neural Implicit Representations For 3d Scenes, Thu Nguyen-Phuoc, Feng Liu, Lei Xiao

Computer Science Faculty Publications and Presentations

This paper presents a stylized novel view synthesis method. Applying state-of-the-art stylization methods to novel views frame by frame often causes jittering artifacts due to the lack of cross-view consistency. Therefore, this paper investigates 3D scene stylization that provides a strong inductive bias for consistent novel view synthesis. Specifically, we adopt the emerging neural radiance fields (NeRF) as our choice of 3D scene representation for their capability to render high-quality novel views for a variety of scenes. However, as rendering a novel view from a NeRF requires a large number of samples, training a stylized NeRF requires a large amount …


Extending Tensor Virtual Machine To Support Deep-Learning Accelerators With Convolution Cores, Yanzhao Wang, Fei Xie May 2022

Extending Tensor Virtual Machine To Support Deep-Learning Accelerators With Convolution Cores, Yanzhao Wang, Fei Xie

Computer Science Faculty Publications and Presentations

Deep-learning accelerators are increasingly popular. There are two prevalent accelerator architectures: one based on general matrix multiplication units and the other on convolution cores. However, Tensor Virtual Machine (TVM), a widely used deep-learning compiler stack, does not support the latter. This paper proposes a general framework for extending TVM to support deep-learning accelerators with convolution cores. We have applied it to two well-known accelerators: Nvidia's NVDLA and Bitmain's BM1880 successfully. Deep-learning workloads can now be readily deployed to these accelerators through TVM and executed efficiently. This framework can extend TVM to other accelerators with minimum effort.


Sl-Cyclegan: Blind Motion Deblurring In Cycles Using Sparse Learning, Ali Syed Saqlain, Li-Yun Wang, Zhiyong Liu May 2022

Sl-Cyclegan: Blind Motion Deblurring In Cycles Using Sparse Learning, Ali Syed Saqlain, Li-Yun Wang, Zhiyong Liu

Computer Science Faculty Publications and Presentations

In this paper, we introduce an end-to-end generative adversarial network (GAN) based on sparse learning for single image motion deblurring, which we called SL-CycleGAN. For the first time in image motion deblurring, we propose a sparse ResNet-block as a combination of sparse convolution layers and a trainable spatial pooler k-winner based on HTM (Hierarchical Temporal Memory) to replace non-linearity such as ReLU in the ResNet-block of SL-CycleGAN generators. Furthermore, we take our inspiration from the domain-to-domain translation ability of the CycleGAN, and we show that image deblurring can be cycle-consistent while achieving the best qualitative results. Finally, we perform extensive …


Rate Maximization In A Uav Based Full-Duplex Multi-User Communication Network Using Multi-Objective Optimization, Syed Muhammad Hashir, Sabyasachi Gupta, Gavin Megson, Ehsan Aryafar, Joseph Camp Feb 2022

Rate Maximization In A Uav Based Full-Duplex Multi-User Communication Network Using Multi-Objective Optimization, Syed Muhammad Hashir, Sabyasachi Gupta, Gavin Megson, Ehsan Aryafar, Joseph Camp

Computer Science Faculty Publications and Presentations

In this paper, we study an unmanned-aerial-vehicle (UAV) based full-duplex (FD) multi-user communication network, where a UAV is deployed as a multiple-input–multiple-output (MIMO) FD base station (BS) to serve multiple FD users on the ground. We propose a multi-objective optimization framework which considers two desirable objective functions, namely sum uplink (UL) rate maximization and sum downlink (DL) rate maximization while providing quality-of-service to all the users in the communication network. A novel resource allocation multi-objective-optimization-problem (MOOP) is designed which optimizes the downlink beamformer, the beamwidth angle, and the 3D position of the UAV, and also the UL power of the …