Papers

  • Honeyboost: Boosting honeypot performance with data fusion and anomaly detection

    With cyber incidents and data breaches becoming increasingly common, being able to predict a cyberattack has never been more crucial. Network Anomaly Detection Systems (NADS) ability to identify unusual behavior makes them useful in predicting such attacks. In this paper, we introduce a novel framework to enhance the performance of …

  • A Multi-Chamber Smart Suction Cup for Adaptive Gripping and Haptic Exploration

    We present a novel robot end-effector for gripping and haptic exploration. Tactile sensing through suction flow monitoring is applied to a new suction cup design that contains multiple chambers for air flow. Each chamber connects with its own remote pressure transducer, which enables both absolute and differential pressure measures between …

  • Deep Polarization Imaging for 3D shape and SVBRDF Acquisition

    We present a novel method for efficient acquisition of shape and spatially varying reflectance of 3D objects using polarization cues. Unlike previous works that have exploited polarization to estimate material or object appearance under certain constraints (known shape or multiview acquisition), we lift such restrictions by coupling polarization imaging with …

  • Covering Convex Polygons by Two Congruent Disks

    We consider the planar two-center problem for a convex polygon: given a convex polygon in the plane, find two congruent disks of minimum radius whose union contains the polygon. We present an $O(n\log n)$-time algorithm for the two-center problem for a convex polygon, where $n$ is the number of vertices …

  • A Generalized Concurrent Rule Construction for Double-Pushout Rewriting

    Double-pushout rewriting is an established categorical approach to the rule-based transformation of graphs and graph-like objects. One of its standard results is the construction of concurrent rules and the Concurrency Theorem pertaining to it: The sequential application of two rules can equivalently be replaced by the application of a concurrent …

  • AI Risk Skepticism

    In this work, we survey skepticism regarding AI risk and show parallels with other types of scientific skepticism. We start by classifying different types of AI Risk skepticism and analyze their root causes. We conclude by suggesting some intervention approaches, which may be successful in reducing AI risk skepticism, at …