Publications
Advances in speaker recognition for multilingual conversational telephone speech: the JHU-MIT system for NIST SRE20 CTS challenge
Summary
Summary
We present a condensed description of the joint effort of JHUCLSP/HLTCOE and MIT-LL for NIST SRE20. NIST SRE20 CTS consisted of multilingual conversational telephone speech. The set of languages included in the evaluation was not provided, encouraging the participants to develop systems robust to any language. We evaluated x-vector architectures...
AAM-Gym: Artificial intelligence testbed for advanced air mobility
Summary
Summary
We introduce AAM-Gym, a research and development testbed for Advanced Air Mobility (AAM). AAM has the potential to revolutionize travel by reducing ground traffic and emissions by leveraging new types of aircraft such as electric vertical take-off and landing (eVTOL) aircraft and new advanced artificial intelligence (AI) algorithms. Validation of...
Toward improving EN adoption: Bridging the gap between stated intention and actual use
Summary
Summary
As the COVID-19 pandemic swept the globe in the spring of 2020, technologists looked to enlist technology to assist public health authorities (PHAs) and help stem the tide of infections. As part of this technology push, experts in health care, cryptography, and other related fields developed the Private Automated Contact...
The thundering herd: Amplifying kernel interference to attack response times
Summary
Summary
Embedded and real-time systems are increasingly attached to networks. This enables broader coordination beyond the physical system, but also opens the system to attacks. The increasingly complex workloads of these systems include software of varying assurance levels, including that which might be susceptible to compromise by remote attackers. To limit...
Modeling probability of alert of Bluetooth low energy-based automatic exposure notifications
Summary
Summary
BLEMUR, or Bluetooth Low Energy Model of User Risk, is a model of the probability of alert at a given duration and distance of an index case for a specific configuration of settings for an Exposure Notification (EN) system.The Google-Apple EN framework operates in the duration and Bluetooth Low Energy...
Nearfield anechoic chamber and farfield on-site antenna calibration pattern comparison of an S-band planar phased array radar
Summary
Summary
The Advanced Technology Demonstrator (ATD) is an active, S-band, dual-polarization phased array radar developed for weather sensing. The ATD is an active electronically scanned array (AESA) with a 4-m aperture comprised of 4,864 individual transmit/receive (T/R) modules. The antenna was calibrated at the element, subarray, and array levels. Calibration, validation...
Graph-guided network for irregularly sampled multivariate time series
Summary
Summary
In many domains, including healthcare, biology, and climate science, time series are irregularly sampled with varying time intervals between successive readouts and different subsets of variables (sensors) observed at different time points. Here, we introduce RAINDROP, a graph neural network that embeds irregularly sampled and multivariate time series while also...
Preventing Kernel Hacks with HAKCs
Summary
Summary
Commodity operating system kernels remain monolithic for practical and historical reasons. All kernel code shares a single address space, executes with elevated processor privileges, and has largely unhindered access to all data, including data irrelevant to the completion of a specific task. Applying the principle of least privilege, which limits...
Cross-language attacks
Summary
Summary
Memory corruption attacks against unsafe programming languages like C/C++ have been a major threat to computer systems for multiple decades. Various sanitizers and runtime exploit mitigation techniques have been shown to only provide partial protection at best. Recently developed ‘safe’ programming languages such as Rust and Go hold the promise...
System analysis for responsible design of modern AI/ML systems
Summary
Summary
The irresponsible use of ML algorithms in practical settings has received a lot of deserved attention in the recent years. We posit that the traditional system analysis perspective is needed when designing and implementing ML algorithms and systems. Such perspective can provide a formal way for evaluating and enabling responsible...