Skip to main content

Showing 1–31 of 31 results for author: Werner, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.06761  [pdf, other

    cs.CV cs.AI

    Cross-View Geolocalization and Disaster Mapping with Street-View and VHR Satellite Imagery: A Case Study of Hurricane IAN

    Authors: Hao Li, Fabian Deuser, Wenping Yina, Xuanshu Luo, Paul Walther, Gengchen Mai, Wei Huang, Martin Werner

    Abstract: Nature disasters play a key role in shaping human-urban infrastructure interactions. Effective and efficient response to natural disasters is essential for building resilience and a sustainable urban environment. Two types of information are usually the most necessary and difficult to gather in disaster response. The first information is about disaster damage perception, which shows how badly peop… ▽ More

    Submitted 13 August, 2024; originally announced August 2024.

  2. arXiv:2406.15898  [pdf, other

    cs.GT cs.LG

    Defection-Free Collaboration between Competitors in a Learning System

    Authors: Mariel Werner, Sai Praneeth Karimireddy, Michael I. Jordan

    Abstract: We study collaborative learning systems in which the participants are competitors who will defect from the system if they lose revenue by collaborating. As such, we frame the system as a duopoly of competitive firms who are each engaged in training machine-learning models and selling their predictions to a market of consumers. We first examine a fully collaborative scheme in which both firms share… ▽ More

    Submitted 22 June, 2024; originally announced June 2024.

  3. arXiv:2405.14947  [pdf, other

    quant-ph cs.ET

    Operational Framework for a Quantum Database

    Authors: Carla Rieger, Michele Grossi, Gian Giacomo Guerreschi, Sofia Vallecorsa, Martin Werner

    Abstract: Databases are an essential component of modern computing infrastructures and allow efficient access to data stored persistently. Their structure depends on the type and relationships of the stored data elements and on the access pattern. Extending the concept of databases to the quantum domain is expected to increase both the storage efficiency and the access parallelism through quantum superposit… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: 26 pages, 4 figures

  4. arXiv:2404.10767  [pdf, other

    cs.GT

    Privacy Can Arise Endogenously in an Economic System with Learning Agents

    Authors: Nivasini Ananthakrishnan, Tiffany Ding, Mariel Werner, Sai Praneeth Karimireddy, Michael I. Jordan

    Abstract: We study price-discrimination games between buyers and a seller where privacy arises endogenously--that is, utility maximization yields equilibrium strategies where privacy occurs naturally. In this game, buyers with a high valuation for a good have an incentive to keep their valuation private, lest the seller charge them a higher price. This yields an equilibrium where some buyers will send a sig… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: To appear in Symposium on Foundations of Responsible Computing (FORC 2024)

  5. arXiv:2403.00775  [pdf, ps, other

    q-fin.ST cs.DB cs.LG

    Detecting Anomalous Events in Object-centric Business Processes via Graph Neural Networks

    Authors: Alessandro Niro, Michael Werner

    Abstract: Detecting anomalies is important for identifying inefficiencies, errors, or fraud in business processes. Traditional process mining approaches focus on analyzing 'flattened', sequential, event logs based on a single case notion. However, many real-world process executions exhibit a graph-like structure, where events can be associated with multiple cases. Flattening event logs requires selecting a… ▽ More

    Submitted 14 February, 2024; originally announced March 2024.

    Comments: 12 pages, 2 figures, to appear in the ICPM 2023 Workshops Proceedings

  6. arXiv:2309.16499  [pdf, other

    cs.CV eess.IV

    Cross-City Matters: A Multimodal Remote Sensing Benchmark Dataset for Cross-City Semantic Segmentation using High-Resolution Domain Adaptation Networks

    Authors: Danfeng Hong, Bing Zhang, Hao Li, Yuxuan Li, Jing Yao, Chenyu Li, Martin Werner, Jocelyn Chanussot, Alexander Zipf, Xiao Xiang Zhu

    Abstract: Artificial intelligence (AI) approaches nowadays have gained remarkable success in single-modality-dominated remote sensing (RS) applications, especially with an emphasis on individual urban environments (e.g., single cities or regions). Yet these AI models tend to meet the performance bottleneck in the case studies across cities or regions, due to the lack of diverse RS information and cutting-ed… ▽ More

    Submitted 3 October, 2023; v1 submitted 26 September, 2023; originally announced September 2023.

  7. arXiv:2308.00982  [pdf, other

    cs.CV

    Orientation-Guided Contrastive Learning for UAV-View Geo-Localisation

    Authors: Fabian Deuser, Konrad Habel, Martin Werner, Norbert Oswald

    Abstract: Retrieving relevant multimedia content is one of the main problems in a world that is increasingly data-driven. With the proliferation of drones, high quality aerial footage is now available to a wide audience for the first time. Integrating this footage into applications can enable GPS-less geo-localisation or location correction. In this paper, we present an orientation-guided training framewo… ▽ More

    Submitted 2 August, 2023; originally announced August 2023.

  8. arXiv:2307.05717  [pdf, other

    cs.OH

    Towards Mobility Data Science (Vision Paper)

    Authors: Mohamed Mokbel, Mahmoud Sakr, Li Xiong, Andreas Züfle, Jussara Almeida, Taylor Anderson, Walid Aref, Gennady Andrienko, Natalia Andrienko, Yang Cao, Sanjay Chawla, Reynold Cheng, Panos Chrysanthis, Xiqi Fei, Gabriel Ghinita, Anita Graser, Dimitrios Gunopulos, Christian Jensen, Joon-Seok Kim, Kyoung-Sook Kim, Peer Kröger, John Krumm, Johannes Lauer, Amr Magdy, Mario Nascimento , et al. (23 additional authors not shown)

    Abstract: Mobility data captures the locations of moving objects such as humans, animals, and cars. With the availability of GPS-equipped mobile devices and other inexpensive location-tracking technologies, mobility data is collected ubiquitously. In recent years, the use of mobility data has demonstrated significant impact in various domains including traffic management, urban planning, and health sciences… ▽ More

    Submitted 7 March, 2024; v1 submitted 21 June, 2023; originally announced July 2023.

    Comments: Updated to reflect the major revision for ACM Transactions on Spatial Algorithms and Systems (TSAS). This version reflects the final version accepted by ACM TSAS

  9. arXiv:2307.02574  [pdf, other

    cs.CV cs.LG

    Semi-supervised Learning from Street-View Images and OpenStreetMap for Automatic Building Height Estimation

    Authors: Hao Li, Zhendong Yuan, Gabriel Dax, Gefei Kong, Hongchao Fan, Alexander Zipf, Martin Werner

    Abstract: Accurate building height estimation is key to the automatic derivation of 3D city models from emerging big geospatial data, including Volunteered Geographical Information (VGI). However, an automatic solution for large-scale building height estimation based on low-cost VGI data is currently missing. The fast development of VGI data platforms, especially OpenStreetMap (OSM) and crowdsourced street-… ▽ More

    Submitted 5 July, 2023; originally announced July 2023.

    Comments: Accepted for GIScience 2023

  10. arXiv:2306.08393  [pdf, other

    cs.LG cs.DC

    Provably Personalized and Robust Federated Learning

    Authors: Mariel Werner, Lie He, Michael Jordan, Martin Jaggi, Sai Praneeth Karimireddy

    Abstract: Identifying clients with similar objectives and learning a model-per-cluster is an intuitive and interpretable approach to personalization in federated learning. However, doing so with provable and optimal guarantees has remained an open challenge. We formalize this problem as a stochastic optimization problem, achieving optimal convergence rates for a large class of loss functions. We propose sim… ▽ More

    Submitted 18 December, 2023; v1 submitted 14 June, 2023; originally announced June 2023.

  11. arXiv:2304.08120  [pdf, other

    physics.geo-ph cs.LG cs.SD eess.AS

    DAS-N2N: Machine learning Distributed Acoustic Sensing (DAS) signal denoising without clean data

    Authors: Sacha Lapins, Antony Butcher, J. -Michael Kendall, Thomas S. Hudson, Anna L. Stork, Maximilian J. Werner, Jemma Gunning, Alex M. Brisbourne

    Abstract: This article presents a weakly supervised machine learning method, which we call DAS-N2N, for suppressing strong random noise in distributed acoustic sensing (DAS) recordings. DAS-N2N requires no manually produced labels (i.e., pre-determined examples of clean event signals or sections of noise) for training and aims to map random noise processes to a chosen summary statistic, such as the distribu… ▽ More

    Submitted 24 November, 2023; v1 submitted 17 April, 2023; originally announced April 2023.

    Comments: Submitted for publication to Geophysical Journal International. For the purpose of open access, the author(s) has applied a Creative Commons Attribution (CC BY) licence to the Author Accepted Manuscript version arising from this submission

  12. arXiv:2211.00543  [pdf

    cs.CV

    Geo-Information Harvesting from Social Media Data

    Authors: Xiao Xiang Zhu, Yuanyuan Wang, Mrinalini Kochupillai, Martin Werner, Matthias Häberle, Eike Jens Hoffmann, Hannes Taubenböck, Devis Tuia, Alex Levering, Nathan Jacobs, Anna Kruspe, Karam Abdulahhad

    Abstract: As unconventional sources of geo-information, massive imagery and text messages from open platforms and social media form a temporally quasi-seamless, spatially multi-perspective stream, but with unknown and diverse quality. Due to its complementarity to remote sensing data, geo-information from these sources offers promising perspectives, but harvesting is not trivial due to its data characterist… ▽ More

    Submitted 1 November, 2022; originally announced November 2022.

    Comments: Accepted for publication IEEE Geoscience and Remote Sensing Magazine

  13. arXiv:2201.10547  [pdf, other

    cs.LG cs.AI cs.MA

    Optimal Data Selection: An Online Distributed View

    Authors: Mariel Werner, Anastasios Angelopoulos, Stephen Bates, Michael I. Jordan

    Abstract: The blessing of ubiquitous data also comes with a curse: the communication, storage, and labeling of massive, mostly redundant datasets. We seek to solve this problem at its core, collecting only valuable data and throwing out the rest via submodular maximization. Specifically, we develop algorithms for the online and distributed version of the problem, where data selection occurs in an uncoordina… ▽ More

    Submitted 14 December, 2023; v1 submitted 25 January, 2022; originally announced January 2022.

  14. arXiv:2109.10167  [pdf

    cs.CY

    Challenges and Opportunities on Using Games to Support IoT Systems Teaching

    Authors: Bruno Pedraça de Souza, Claudia Maria Lima Werner

    Abstract: Context: New systems have emerged within the Industry 4.0 paradigm. These systems incorporate characteristics such as autonomy in decision making and acting in the context of IoT systems, continuous connectivity between devices and applications in cyber-physical systems, omnipresence properties in ubiquitous systems, among others. Thus, the engineering of these systems has changed, drastically aff… ▽ More

    Submitted 21 September, 2021; originally announced September 2021.

    Comments: in portuguese

  15. arXiv:2105.06331  [pdf, other

    cs.LG

    Informed Equation Learning

    Authors: Matthias Werner, Andrej Junginger, Philipp Hennig, Georg Martius

    Abstract: Distilling data into compact and interpretable analytic equations is one of the goals of science. Instead, contemporary supervised machine learning methods mostly produce unstructured and dense maps from input to output. Particularly in deep learning, this property is owed to the generic nature of simple standard link functions. To learn equations rather than maps, standard non-linearities can be… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

  16. arXiv:2101.08778  [pdf, other

    cs.CR econ.GN

    SoK: Decentralized Finance (DeFi)

    Authors: Sam M. Werner, Daniel Perez, Lewis Gudgeon, Ariah Klages-Mundt, Dominik Harz, William J. Knottenbelt

    Abstract: Decentralized Finance (DeFi), a blockchain powered peer-to-peer financial system, is mushrooming. Two years ago the total value locked in DeFi systems was approximately 700m USD, now, as of April 2022, it stands at around 150bn USD. The frenetic evolution of the ecosystem has created challenges in understanding the basic principles of these systems and their security risks. In this Systematization… ▽ More

    Submitted 15 September, 2022; v1 submitted 21 January, 2021; originally announced January 2021.

  17. CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory

    Authors: Pascal Nasahl, Robert Schilling, Mario Werner, Jan Hoogerbrugge, Marcel Medwed, Stefan Mangard

    Abstract: Memory vulnerabilities are a major threat to many computing systems. To effectively thwart spatial and temporal memory vulnerabilities, full logical memory safety is required. However, current mitigation techniques for memory safety are either too expensive or trade security against efficiency. One promising attempt to detect memory safety vulnerabilities in hardware is memory coloring, a security… ▽ More

    Submitted 9 March, 2021; v1 submitted 12 December, 2020; originally announced December 2020.

  18. Machine Learning Information Fusion in Earth Observation: A Comprehensive Review of Methods, Applications and Data Sources

    Authors: S. Salcedo-Sanz, P. Ghamisi, M. Piles, M. Werner, L. Cuadra, A. Moreno-Martínez, E. Izquierdo-Verdiguier, J. Muñoz-Marí, Amirhosein Mosavi, G. Camps-Valls

    Abstract: This paper reviews the most important information fusion data-driven algorithms based on Machine Learning (ML) techniques for problems in Earth observation. Nowadays we observe and model the Earth with a wealth of observations, from a plethora of different sensors, measuring states, fluxes, processes and variables, at unprecedented spatial and temporal resolutions. Earth observation is well equipp… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

    Journal ref: Information Fusion, Volume 63, November 2020, Pages 256-272

  19. arXiv:2012.02554  [pdf, other

    cs.CR

    Automating Seccomp Filter Generation for Linux Applications

    Authors: Claudio Canella, Mario Werner, Daniel Gruss, Michael Schwarz

    Abstract: Software vulnerabilities in applications undermine the security of applications. By blocking unused functionality, the impact of potential exploits can be reduced. While seccomp provides a solution for filtering syscalls, it requires manual implementation of filter rules for each individual application. Recent work has investigated automated approaches for detecting and installing the necessary fi… ▽ More

    Submitted 4 December, 2020; originally announced December 2020.

  20. HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment

    Authors: Pascal Nasahl, Robert Schilling, Mario Werner, Stefan Mangard

    Abstract: To ensure secure and trustworthy execution of applications, vendors frequently embed trusted execution environments into their systems. Here, applications are protected from adversaries, including a malicious operating system. TEEs are usually built by integrating protection mechanisms directly into the processor or by using dedicated external secure elements. However, both of these approaches onl… ▽ More

    Submitted 9 March, 2021; v1 submitted 11 September, 2020; originally announced September 2020.

  21. arXiv:2006.13922  [pdf, other

    q-fin.GN cs.GT

    DeFi Protocols for Loanable Funds: Interest Rates, Liquidity and Market Efficiency

    Authors: Lewis Gudgeon, Sam M. Werner, Daniel Perez, William J. Knottenbelt

    Abstract: We coin the term *Protocols for Loanable Funds (PLFs)* to refer to protocols which establish distributed ledger-based markets for loanable funds. PLFs are emerging as one of the main applications within Decentralized Finance (DeFi), and use smart contract code to facilitate the intermediation of loanable funds. In doing so, these protocols allow agents to borrow and save programmatically. Within t… ▽ More

    Submitted 15 October, 2020; v1 submitted 11 June, 2020; originally announced June 2020.

  22. arXiv:2006.03044  [pdf, other

    cs.CR cs.PF

    Unstable Throughput: When the Difficulty Algorithm Breaks

    Authors: Dragos I. Ilie, Sam M. Werner, Iain Stewart, William J. Knottenbelt

    Abstract: In Proof-of-Work blockchains, difficulty algorithms serve the crucial purpose of maintaining a stable transaction throughput by dynamically adjusting the block difficulty in response to the miners' constantly changing computational power. Blockchains that may experience severe hash rate fluctuations need difficulty algorithms that quickly adapt the mining difficulty. However, without careful desig… ▽ More

    Submitted 30 April, 2021; v1 submitted 4 June, 2020; originally announced June 2020.

  23. arXiv:2003.03479  [pdf, other

    cs.DC

    Step on the Gas? A Better Approach for Recommending the Ethereum Gas Price

    Authors: Sam M. Werner, Paul J. Pritz, Daniel Perez

    Abstract: In the Ethereum network, miners are incentivized to include transactions in a block depending on the gas price specified by the sender. The sender of a transaction therefore faces a trade-off between timely inclusion and cost of his transaction. Existing recommendation mechanisms aggregate recent gas price data on a per-block basis to suggest a gas price. We perform an empirical analysis of histor… ▽ More

    Submitted 20 January, 2021; v1 submitted 6 March, 2020; originally announced March 2020.

    Journal ref: in proceedings of The 2nd International Conference on Mathematical Research for Blockchain Economy (MARBLE 2020)

  24. arXiv:1912.00509  [pdf, other

    cs.CL cs.LG

    Speeding up Word Mover's Distance and its variants via properties of distances between embeddings

    Authors: Matheus Werner, Eduardo Laber

    Abstract: The Word Mover's Distance (WMD) proposed by Kusner et al. is a distance between documents that takes advantage of semantic relations among words that are captured by their embeddings. This distance proved to be quite effective, obtaining state-of-art error rates for classification tasks, but is also impracticable for large collections/documents due to its computational complexity. For circumventin… ▽ More

    Submitted 8 May, 2020; v1 submitted 1 December, 2019; originally announced December 2019.

    Comments: Author's final version, accepted for publication at ECAI2020

  25. Pointing in the Right Direction - Securing Memory Accesses in a Faulty World

    Authors: Robert Schilling, Mario Werner, Pascal Nasahl, Stefan Mangard

    Abstract: Reading and writing memory are, besides computation, the most common operations a processor performs. The correctness of these operations is therefore essential for the proper execution of any program. However, as soon as fault attacks are considered, assuming that the hardware performs its memory operations as instructed is not valid anymore. In particular, attackers may induce faults with the go… ▽ More

    Submitted 24 September, 2018; originally announced September 2018.

    Comments: Accepted at ACSAC 2018

  26. arXiv:1803.08359  [pdf, other

    cs.CR

    Securing Conditional Branches in the Presence of Fault Attacks

    Authors: Robert Schilling, Mario Werner, Stefan Mangard

    Abstract: In typical software, many comparisons and subsequent branch operations are highly critical in terms of security. Examples include password checks, signature checks, secure boot, and user privilege checks. For embedded devices, these security-critical branches are a preferred target of fault attacks as a single bit flip or skipping a single instruction can lead to complete access to a system. In th… ▽ More

    Submitted 22 March, 2018; originally announced March 2018.

    Comments: Accepted at DATE 2018

  27. arXiv:1802.06691  [pdf, other

    cs.CR

    Sponge-Based Control-Flow Protection for IoT Devices

    Authors: Mario Werner, Thomas Unterluggauer, David Schaffenrath, Stefan Mangard

    Abstract: Embedded devices in the Internet of Things (IoT) face a wide variety of security challenges. For example, software attackers perform code injection and code-reuse attacks on their remote interfaces, and physical access to IoT devices allows to tamper with code in memory, steal confidential Intellectual Property (IP), or mount fault attacks to manipulate a CPU's control flow. In this work, we pre… ▽ More

    Submitted 19 February, 2018; originally announced February 2018.

    Comments: accepted at IEEE EuroS&P 2018

  28. gearshifft - The FFT Benchmark Suite for Heterogeneous Platforms

    Authors: Peter Steinbach, Matthias Werner

    Abstract: Fast Fourier Transforms (FFTs) are exploited in a wide variety of fields ranging from computer science to natural sciences and engineering. With the rising data production bandwidths of modern FFT applications, judging best which algorithmic tool to apply, can be vital to any scientific endeavor. As tailored FFT implementations exist for an ever increasing variety of high performance computer hard… ▽ More

    Submitted 11 July, 2017; v1 submitted 2 February, 2017; originally announced February 2017.

    Journal ref: High Performance Computing, Theoretical Computer Science and General Issues, Vol. 10266, Springer International Publishing. (ISC High Performance 2017)

  29. SGXIO: Generic Trusted I/O Path for Intel SGX

    Authors: Samuel Weiser, Mario Werner

    Abstract: Application security traditionally strongly relies upon security of the underlying operating system. However, operating systems often fall victim to software attacks, compromising security of applications as well. To overcome this dependency, Intel introduced SGX, which allows to protect application code against a subverted or malicious OS by running it in a hardware-protected enclave. However, SG… ▽ More

    Submitted 4 January, 2017; originally announced January 2017.

    Comments: To appear in CODASPY'16

  30. arXiv:1304.6792  [pdf, ps, other

    cs.IT math.MG

    On the mixed $f$-divergence for multiple pairs of measures

    Authors: Elisabeth M. Werner, Deping Ye

    Abstract: In this paper, the concept of the classical $f$-divergence (for a pair of measures) is extended to the mixed $f$-divergence (for multiple pairs of measures). The mixed $f$-divergence provides a way to measure the difference between multiple pairs of (probability) measures. Properties for the mixed $f$-divergence are established, such as permutation invariance and symmetry in distributions. An Alex… ▽ More

    Submitted 24 April, 2013; originally announced April 2013.

    MSC Class: 94A15; 94A17

  31. arXiv:1205.3423  [pdf, ps, other

    math.FA cs.IT

    f-Divergence for convex bodies

    Authors: Elisabeth M. Werner

    Abstract: We introduce f-divergence, a concept from information theory and statistics, for convex bodies in R^n. We prove that f-divergences are SL(n) invariant valuations and we establish an affine isoperimetric inequality for these quantities. We show that generalized affine surface area and in particular the L_p affine surface area from the L_p Brunn Minkowski theory are special cases of f-divergences.

    Submitted 15 May, 2012; originally announced May 2012.

    MSC Class: 52A20; 53A15