• ### Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features(1708.08327)

May 10, 2019 cs.CR, cs.LG
Machine learning (ML) techniques are increasingly common in security applications, such as malware and intrusion detection. However, ML models are often susceptible to evasion attacks, in which an adversary makes changes to the input (such as malware) in order to avoid being detected. A conventional approach to evaluate ML robustness to such attacks, as well as to design robust ML, is by considering simplified feature-space models of attacks, where the attacker changes ML features directly to effect evasion, while minimizing or constraining the magnitude of this change. We investigate the effectiveness of this approach to designing robust ML in the face of attacks that can be realized in actual malware (realizable attacks). We demonstrate that in the context of structure-based PDF malware detection, such techniques appear to have limited effectiveness, but they are effective with content-based detectors. In either case, we show that augmenting the feature space models with conserved features (those that cannot be unilaterally modified without compromising malicious functionality) significantly improves performance. Finally, we show that feature space models enable generalized robustness when faced with a variety of realizable attacks, as compared to classifiers which are tuned to be robust to a specific realizable attack.
• ### Combining Probabilistic Load Forecasts(1803.06730)

March 18, 2018 stat.AP
Probabilistic load forecasts provide comprehensive information about future load uncertainties. In recent years, many methodologies and techniques have been proposed for probabilistic load forecasting. Forecast combination, a widely recognized best practice in point forecasting literature, has never been formally adopted to combine probabilistic load forecasts. This paper proposes a constrained quantile regression averaging (CQRA) method to create an improved ensemble from several individual probabilistic forecasts. We formulate the CQRA parameter estimation problem as a linear program with the objective of minimizing the pinball loss, with the constraints that the parameters are nonnegative and summing up to one. We demonstrate the effectiveness of the proposed method using two publicly available datasets, the ISO New England data and Irish smart meter data. Comparing with the best individual probabilistic forecast, the ensemble can reduce the pinball score by 4.39% on average. The proposed ensemble also demonstrates superior performance over nine other benchmark ensembles.
• ### Screening of Fungi for the Application of Self-Healing Concrete(1711.10386)

March 2, 2018 q-bio.OT, physics.app-ph
Concrete is susceptible to cracking owing to drying shrinkage, freeze-thaw cycles, delayed ettringite formation, reinforcement corrosion, creep and fatigue, etc. Since maintenance and inspection of concrete infrastructure require onerous labor and high costs, self-healing of harmful cracks without human interference or intervention could be of great attraction. The goal of this study is to explore a new self-healing approach in which fungi are used as a self-healing agent to promote calcium carbonate precipitation to fill the cracks in concrete structures. Recent research results in the field of geomycology have shown that many species of fungi could play an important role in promoting calcium carbonate mineralization, but their application in self-healing concrete has not been reported. Therefore, a screening of different species of fungi has been conducted in this study. Our results showed that, despite the drastic pH increase owing to the leaching of calcium hydroxide from concrete, Aspergillus nidulans (MAD1445), a pH regulatory mutant, could grow on concrete plates and promote calcium carbonate precipitation.
• ### A Comprehensive First Principles Study of Structural, Elastic and Electronic Properties of Two-Dimensional Titanium Carbide/Nitride Based MXenes(1802.06648)

Feb. 19, 2018 cond-mat.mtrl-sci
Density functional theory calculations are carried out to investigate the structural, elastic and electronic properties of two-dimensional (2D) titanium carbide and nitride based pristine and functionalized MXenes. Simulation results show that carbide-based MXenes have larger lattice constants and monolayer thicknesses than nitride-based MXenes. The in-plane elastic moduli of titanium nitride based pristine MXenes are larger than those of titanium carbide based pristine MXenes, whereas in both systems they decrease with the increase of the monolayer thickness. Cohesive energy calculations indicate that MXenes with a larger monolayer thickness have a better structural stability. The nitride-based MXenes are found to be less stable with respect to carbide-based MXenes, similar to experimental reports. However, adsorption energy calculations imply that titanium nitride based pristine MXenes has stronger preference to adhere to the terminal groups, particularly the -O groups, which suggests more active surfaces. By analyzing the electron localization function and charge density distribution, the interactions between Ti-C, Ti-N, Ti-T are determined to be essentially ionic bonding. More importantly, nearly free electron states are observed to exist outside the surfaces of -OH functionalized carbide and nitride based MXenes, which provide almost perfect transmission channels without nuclear scattering for electron transport. Density of states analysis shows that the overall electrical conductivity of nitride-based MXenes is higher than that of carbide-based MXenes. The exceptional properties of titanium nitride based MXenes, including strong surface adsorption, high elastic constants and elastic modulus, and good metallic conductivity, make them promising materials for catalysis and energy storage applications.
• ### A Linearly Convergent Majorized ADMM with Indefinite Proximal Terms for Convex Composite Programming and Its Applications(1706.01698)

Feb. 7, 2018 math.OC
This paper aims to study a majorized alternating direction method of multipliers with indefinite proximal terms (iPADMM) for convex composite optimization problems. We show that the majorized iPADMM for 2-block convex optimization problems converges globally under weaker conditions than those used in the literature and exhibits a linear convergence rate under a local error bound condition. Based on these, we establish the linear rate convergence results for a symmetric Gaussian-Seidel based majorized iPADMM, which is designed for multi-block composite convex optimization problems. Moreover, we apply the majorized iPADMM to solve different types of regularized logistic regression problems. The numerical results on both synthetic and real datasets demonstrate the efficiency of the majorized iPADMM and also illustrate the effectiveness of the introduced indefinite proximal terms.
• ### Interactions of Fungi with Concrete: Significant Importance for Bio-Based Self-Healing Concrete(1708.01337)

Dec. 25, 2017 q-bio.OT, physics.app-ph
The goal of this study is to explore a new self-healing concept in which fungi are used as a self-healing agent to promote calcium mineral precipitation to fill the cracks in concrete. An initial screening of different species of fungi has been conducted. Fungal growth medium was overlaid onto cured concrete plate. Mycelial discs were aseptically deposited at the plate center. The results showed that, due to the dissolving of Ca(OH)2 from concrete, the pH of the growth medium increased from its original value of 6.5 to 13.0. Despite the drastic pH increase, Trichoderma reesei (ATCC13631) spores germinated into hyphal mycelium and grew equally well with or without concrete. X-ray diffraction (XRD) and scanning electron microscope (SEM) confirmed that the crystals precipitated on the fungal hyphae were composed of calcite. These results indicate that T. reesei has great potential to be used in bio-based self-healing concrete for sustainable infrastructure.
• ### A comparison theorem under sublinear expectations and related limit theorems(1710.01624)

Oct. 4, 2017 math.PR
In this paper, on the sublinear expectation space, we establish a comparison theorem between independent and convolutionary random vectors, which states that the partial sums of those two sequences of random vectors are identically distributed. Under the sublinear framework, through the comparison theorem, several fundamental limit theorems for convolutionary random vectors are obtained, including the law of large numbers, the central limit theorem and the law of iterated logarithm.
• ### Dynamic Mobile Edge Caching with Location Differentiation(1709.05377)

Sept. 15, 2017 cs.NI
Mobile edge caching enables content delivery directly within the radio access network, which effectively alleviates the backhaul burden and reduces round-trip latency. To fully exploit the edge resources, the most popular contents should be identified and cached. Observing that content popularity varies greatly at different locations, to maximize local hit rate, this paper proposes an online learning algorithm that dynamically predicts content hit rate, and makes location-differentiated caching decisions. Specifically, a linear model is used to estimate the future hit rate. Considering the variations in user demand, a perturbation is added to the estimation to account for uncertainty. The proposed learning algorithm requires no training phase, and hence is adaptive to the time-varying content popularity profile. Theoretical analysis indicates that the proposed algorithm asymptotically approaches the optimal policy in the long term. Extensive simulations based on real world traces show that, the proposed algorithm achieves higher hit rate and better adaptiveness to content popularity fluctuation, compared with other schemes.
• ### Multi-message Authentication over Noisy Channel with Secure Channel Codes(1708.02888)

Aug. 9, 2017 cs.IT, math.IT, cs.CR
In this paper, we investigate multi-message authentication to combat adversaries with infinite computational capacity. An authentication framework over a wiretap channel $(W_1,W_2)$ is proposed to achieve information-theoretic security with the same key. The proposed framework bridges the two research areas in physical (PHY) layer security: secure transmission and message authentication. Specifically, the sender Alice first transmits message $M$ to the receiver Bob over $(W_1,W_2)$ with an error correction code; then Alice employs a hash function (i.e., $\varepsilon$-AWU$_2$ hash functions) to generate a message tag $S$ of message $M$ using key $K$, and encodes $S$ to a codeword $X^n$ by leveraging an existing strongly secure channel coding with exponentially small (in code length $n$) average probability of error; finally, Alice sends $X^n$ over $(W_1,W_2)$ to Bob who authenticates the received messages. We develop a theorem regarding the requirements/conditions for the authentication framework to be information-theoretic secure for authenticating a polynomial number of messages in terms of $n$. Based on this theorem, we propose an authentication protocol that can guarantee the security requirements, and prove its authentication rate can approach infinity when $n$ goes to infinity. Furthermore, we design and implement an efficient and feasible authentication protocol over binary symmetric wiretap channel (BSWC) by using \emph{Linear Feedback Shifting Register} based (LFSR-based) hash functions and strong secure polar code. Through extensive experiments, it is demonstrated that the proposed protocol can achieve low time cost, high authentication rate, and low authentication error rate.
• ### Cost-Effective Cache Deployment in Mobile Heterogeneous Networks(1707.04179)

July 13, 2017 cs.IT, math.IT, cs.NI
This paper investigates one of the fundamental issues in cache-enabled heterogeneous networks (HetNets): how many cache instances should be deployed at different base stations, in order to provide guaranteed service in a cost-effective manner. Specifically, we consider two-tier HetNets with hierarchical caching, where the most popular files are cached at small cell base stations (SBSs) while the less popular ones are cached at macro base stations (MBSs). For a given network cache deployment budget, the cache sizes for MBSs and SBSs are optimized to maximize network capacity while satisfying the file transmission rate requirements. As cache sizes of MBSs and SBSs affect the traffic load distribution, inter-tier traffic steering is also employed for load balancing. Based on stochastic geometry analysis, the optimal cache sizes for MBSs and SBSs are obtained, which are threshold-based with respect to cache budget in the networks constrained by SBS backhauls. Simulation results are provided to evaluate the proposed schemes and demonstrate the applications in cost-effective network deployment.
• ### Self-Sustaining Caching Stations: Towards Cost-Effective 5G-Enabled Vehicular Networks(1706.08628)

June 26, 2017 cs.IT, math.IT, cs.NI
In this article, we investigate the cost-effective 5G-enabled vehicular networks to support emerging vehicular applications, such as autonomous driving, in-car infotainment and location-based road services. To this end, self-sustaining caching stations (SCSs) are introduced to liberate on-road base stations from the constraints of power lines and wired backhauls. Specifically, the cache-enabled SCSs are powered by renewable energy and connected to core networks through wireless backhauls, which can realize "drop-and-play" deployment, green operation, and low-latency services. With SCSs integrated, a 5G-enabled heterogeneous vehicular networking architecture is further proposed, where SCSs are deployed along roadside for traffic offloading while conventional macro base stations (MBSs) provide ubiquitous coverage to vehicles. In addition, a hierarchical network management framework is designed to deal with high dynamics in vehicular traffic and renewable energy, where content caching, energy management and traffic steering are jointly investigated to optimize the service capability of SCSs with balanced power demand and supply in different time scales. Case studies are provided to illustrate SCS deployment and operation designs, and some open research issues are also discussed.
• ### Strong limit theorems for weighted sums of negatively associated random variables in nonlinear probability(1706.05788)

June 19, 2017 math.PR
In this paper, based on the initiation of the notion of negatively associated random variables under nonlinear probability, a strong limit theorem for weighted sums of random variables within the same frame is achieved without assumptions of independence and identical distribution, from which the Marcinkiewich-Zygmund type and Kolmogorov type strong laws of large numbers are derived. In addition, as applications of our results, Stranssen type invariance principles of negatively associated random variables and vertically independent random variables are proposed respectively.
• ### Energy-Sustainable Traffic Steering for 5G Mobile Networks(1705.06663)

May 18, 2017 cs.IT, math.IT, cs.NI
Renewable energy harvesting (EH) technology is expected to be pervasively utilized in the next generation (5G) mobile networks to support sustainable network developments and operations. However, the renewable energy supply is inherently random and intermittent, which could lead to energy outage, energy overflow, quality of service (QoS) degradation, etc. Accordingly, how to enhance renewable energy sustainability is a critical issue for green networking. To this end, an energy-sustainable traffic steering framework is proposed in this article, where the traffic load is dynamically adjusted to match with energy distributions in both spatial and temporal domains by means of inter- and intra-tier steering, caching and pushing. Case studies are carried out, which demonstrate the proposed framework can reduce on-grid energy demand while satisfying QoS requirements. Research topics and challenges of energy-sustainable traffic steering are also discussed.
• ### Software Defined Space-Air-Ground Integrated Vehicular Networks: Challenges and Solutions(1703.02664)

May 15, 2017 cs.NI
This article proposes a software defined space-air-ground integrated network architecture for supporting diverse vehicular services in a seamless, efficient, and cost-effective manner. Firstly, the motivations and challenges for integration of space-air-ground networks are reviewed. Secondly, a software defined network architecture with a layered structure is presented. To protect the legacy services in satellite, aerial, and territorial segments, resources in each segment are sliced through network slicing to achieve service isolation. Then, available resources are put into a common and dynamic space-air-ground resource pool, which is managed by hierarchical controllers to accommodate vehicular services. Finally, a case study is carried out, followed by discussion on some open research topics.
• ### Convergence of ground state solutions for nonlinear Schr\"{o}dinger equations on graphs(1705.03981)

May 11, 2017 math.AP
We consider the nonlinear Schr\"{o}dinger equation $-\Delta u+(\lambda a(x)+1)u=|u|^{p-1}u$ on a locally finite graph $G=(V,E)$. We prove via the Nehari method that if $a(x)$ satisfies certain assumptions, for any $\lambda>1$, the equation admits a ground state solution $u_\lambda$. Moreover, as $\lambda\rightarrow \infty$, the solution $u_\lambda$ converges to a solution of the Dirichlet problem $-\Delta u+u=|u|^{p-1}u$ which is defined on the potential well $\Omega$. We also provide a numerical experiment which solves the equation on a finite graph to illustrate our results.
• ### Deep Reinforcement Learning-based Image Captioning with Embedding Reward(1704.03899)

April 12, 2017 cs.AI, cs.CV
Image captioning is a challenging problem owing to the complexity in understanding the image content and diverse ways of describing it in natural language. Recent advances in deep neural networks have substantially improved the performance of this task. Most state-of-the-art approaches follow an encoder-decoder framework, which generates captions using a sequential recurrent prediction model. However, in this paper, we introduce a novel decision-making framework for image captioning. We utilize a "policy network" and a "value network" to collaboratively generate captions. The policy network serves as a local guidance by providing the confidence of predicting the next word according to the current state. Additionally, the value network serves as a global and lookahead guidance by evaluating all possible extensions of the current state. In essence, it adjusts the goal of predicting the correct words towards the goal of generating captions similar to the ground truth captions. We train both networks using an actor-critic reinforcement learning model, with a novel reward defined by visual-semantic embedding. Extensive experiments and analyses on the Microsoft COCO dataset show that the proposed framework outperforms state-of-the-art approaches across different evaluation metrics.
• ### A Riemann-Hilbert Approach to the Complex Sharma-Tasso-Olver Equation on the Half Line(1704.03456)

April 11, 2017 math-ph, math.MP, nlin.SI, nlin.PS
In this paper, we use the Fokas method to analyze the complex Sharma-Tasso-Olver(cSTO) equation on the half line. We show that it can be represented in terms of the solution of a matrix RHP formulated in the plane of the complex spectral parameter {\lambda}.
• ### Software Defined Networking Enabled Wireless Network Virtualization: Challenges and Solutions(1704.01247)

April 5, 2017 cs.NI
Next generation (5G) wireless networks are expected to support the massive data and accommodate a wide range of services/use cases with distinct requirements in a cost-effective, flexible, and agile manner. As a promising solution, wireless network virtualization (WNV), or network slicing, enables multiple virtual networks to share the common infrastructure on demand, and to be customized for different services/use cases. This article focuses on network-wide resource allocation for realizing WNV. Specifically, the motivations, the enabling platforms, and the benefits of WNV, are first reviewed. Then, resource allocation for WNV along with the technical challenges is discussed. Afterwards, a software defined networking (SDN) enabled resource allocation framework is proposed to facilitate WNV, including the key procedures and the corresponding modeling approaches. Furthermore, a case study is provided as an example of resource allocation in WNV. Finally, some open research topics essential to WNV are discussed.
• ### The $p$-capacitary Orlicz-Hadamard variational formula and Orlicz-Minkowski problems(1703.01458)

March 4, 2017 math.AP, math.FA, math.MG
In this paper, combining the $p$-capacity for $p\in (1, n)$ with the Orlicz addition of convex domains, we develop the $p$-capacitary Orlicz-Brunn-Minkowski theory. In particular, the Orlicz $L_{\phi}$ mixed $p$-capacity of two convex domains is introduced and its geometric interpretation is obtained by the $p$-capacitary Orlicz-Hadamard variational formula. The $p$-capacitary Orlicz-Brunn-Minkowski and Orlicz-Minkowski inequalities are established, and the equivalence of these two inequalities are discussed as well. The $p$-capacitary Orlicz-Minkowski problem is proposed and solved under some mild conditions on the involving functions and measures. In particular, we provide the solutions for the normalized $p$-capacitary $L_q$ Minkowski problems with $q>1$ for both discrete and general measures.
• ### Analysis on Cohort Effects in view of Differential Geometry and its Applications(1703.00398)

Feb. 21, 2017 stat.AP
This paper analyzes birth cohort effects and develops an approach which is based on differential geometry to identify and measure cohort effects in mortality data sets. The measurement is quantitative and provides a potential method to compare cohort effects among different countries or groups. Data sets of four countries (e.g. U.k., U.S., Canada and Japan) are taken as examples to explain our approach and applications of the measurement to a modified Lee-Carter model are analyzed. In fact, this paper is an upgrade version of our paper arXiv:1504.00327. There is a new section which gives applications of our approach based on the Lee-Carter and APC models.
• ### Catalyzing Cloud-Fog Interoperation in 5G Wireless Networks: An SDN Approach(1612.05291)

Dec. 15, 2016 cs.NI
The piling up storage and compute stacks in cloud data center are expected to accommodate the majority of internet traffic in the future. However, as the number of mobile devices significantly increases, getting massive data into and out of the cloud wirelessly inflicts high pressure on the bandwidth, and meanwhile induces unpredictable latency. Fog computing, which advocates extending clouds to network edge, guarantees low latency and location-aware service provisioning. In this article, we consider fog computing as an ideal complement rather than a substitute of cloud computing, and we propose a software defined networking (SDN) enabled framework for cloud-fog interoperation, aiming at improving quality of experience and optimizing network resource usage. Two case studies are provided to illuminate the feasibility and advantage of the proposed framework. At last, potential research issues are presented for further investigation.
• ### AutoScaler: Scale-Attention Networks for Visual Correspondence(1611.05837)

Nov. 17, 2016 cs.CV
Finding visual correspondence between local features is key to many computer vision problems. While defining features with larger contextual scales usually implies greater discriminativeness, it could also lead to less spatial accuracy of the features. We propose AutoScaler, a scale-attention network to explicitly optimize this trade-off in visual correspondence tasks. Our network consists of a weight-sharing feature network to compute multi-scale feature maps and an attention network to combine them optimally in the scale space. This allows our network to have adaptive receptive field sizes over different scales of the input. The entire network is trained end-to-end in a siamese framework for visual correspondence tasks. Our method achieves favorable results compared to state-of-the-art methods on challenging optical flow and semantic matching benchmarks, including Sintel, KITTI and CUB-2011. We also show that our method can generalize to improve hand-crafted descriptors (e.g Daisy) on general visual correspondence tasks. Finally, our attention network can generate visually interpretable scale attention maps.
• ### Competing Mechanisms between Dislocation and Phase Transformation in Plastic Deformation of Single Crystalline Yttria-Stabilized Tetragonal Zirconia Nanopillars(1607.03141)

July 11, 2016 cond-mat.mtrl-sci
Molecular dynamics (MD) is employed to investigate the plastic deformation mechanisms of single crystalline yttria-stabilized tetragonal zirconia (YSTZ) nanopillars under uniaxial compression. Simulation results show that the nanoscale plastic deformation of YSTZ is strongly dependent on the crystallographic orientation of zirconia nanopillars. For the first time, the experimental explored tetragonal to monoclinic phase transformation is reproduced by MD simulations in some particular loading directions. Three distinct mechanisms of dislocation, phase transformation, and a combination of dislocation and phase transformation are identified when applying compressive loading along different directions. The strength of zirconia nanopillars exhibits a sensitive behavior depending on the failure mechanisms, such that the dislocation-mediated deformation leads to the lowest strength, while the phase transformation-dominated deformation results in the highest strength.
• ### A Hierarchical Distributed Processing Framework for Big Image Data(1607.00577)

July 3, 2016 cs.CV
This paper introduces an effective processing framework nominated ICP (Image Cloud Processing) to powerfully cope with the data explosion in image processing field. While most previous researches focus on optimizing the image processing algorithms to gain higher efficiency, our work dedicates to providing a general framework for those image processing algorithms, which can be implemented in parallel so as to achieve a boost in time efficiency without compromising the results performance along with the increasing image scale. The proposed ICP framework consists of two mechanisms, i.e. SICP (Static ICP) and DICP (Dynamic ICP). Specifically, SICP is aimed at processing the big image data pre-stored in the distributed system, while DICP is proposed for dynamic input. To accomplish SICP, two novel data representations named P-Image and Big-Image are designed to cooperate with MapReduce to achieve more optimized configuration and higher efficiency. DICP is implemented through a parallel processing procedure working with the traditional processing mechanism of the distributed system. Representative results of comprehensive experiments on the challenging ImageNet dataset are selected to validate the capacity of our proposed ICP framework over the traditional state-of-the-art methods, both in time efficiency and quality of results.
• ### Phylogenomic Analyses of Large-scale Nuclear Genes Provide New Insights into the Evolutionary Relationships within the Rosids(1606.09348)

June 30, 2016 q-bio.PE
The Rosids is one of the largest groups of flowering plants, with 140 families and ~70,000 species. Previous phylogenetic studies of the rosids have primarily utilized organelle genes that likely differ in evolutionary histories from nuclear genes. To better understand the evolutionary history of rosids, it is necessary to investigate their phylogenetic relationships using nuclear genes. Here, we employed large-scale phylogenomic datasets composed of nuclear genes, including 891 clusters of putative orthologous genes. Combined with comprehensive taxon sampling covering 63 species representing 14 out of the 17 orders, we reconstructed the rosids phylogeny with coalescence and concatenation methods, yielding similar tree topologies from all datasets. However, these topologies did not agree on the placement of Zygophyllales. Through comprehensive analyses, we found that missing data and gene tree heterogeneity were potential factors that may mislead concatenation methods, in particular, large amounts of missing data under high gene tree heterogeneity. Our results provided new insights into the deep phylogenetic relationships of the rosids, and demonstrated that coalescence methods may effectively resolve the phylogenetic relationships of the rosids with missing data under high gene tree heterogeneity.