Research

Groundbreaking work and published results in peer reviewed journals across disciplines.

Title

Topic

  • ‘An Optimized Acidic Digestion for the Isolation of Microplastics From Biota-Rich Samples’

    “Plastic pollution is a growing concern. To analyze plastics in environmental samples, plastics need to be isolated. We present an acidic/oxidative method optimized to preserve plastics while digesting synthetic cellulose acetate and a range of organics encountered in environmental samples.” Find the paper and the full list of authors in Environmental Pollution.

    Learn more

    ,
  • ‘Generative Adversarial Symmetry Discovery’

    ,

    “Despite the success of equivariant neural networks in scientific applications, they require knowing the symmetry group a priori. However, it may be difficult to know which symmetry to use as an inductive bias in practice. Enforcing the wrong symmetry could even hurt the performance. In this paper, we propose a framework, LieGAN, to automatically discover equivariances from a dataset using a paradigm akin to generative adversarial training.” Read the paper and see the full list of authors in ArXiv.

    Learn more

  • ‘One-Shot Empirical Privacy Estimation for Federated Learning’

    “Privacy estimation techniques for differentially private (DP) algorithms are useful for comparing against analytical bounds, or to empirically measure privacy loss in settings where known analytical bounds are not tight. … In this work, we present a novel “one-shot” approach that can systematically address these challenges, allowing efficient auditing or estimation of the privacy loss of a model during the same, single training run used to fit model parameters, and without requiring any a priori knowledge about the model architecture or task.” Read the paper and see the full list of authors in ArXiv.

    Learn more

  • Reasoning through the picture: Machine learning between words and images

    Researchers have identified a new “cross-modal retrieval” method to operate between “language and vision domains.” From their abstract: “To address this issue, we introduce an intuitive and interpretable model to learn a common embedding space for alignments between images and text descriptions. Specifically, our model first incorporates the semantic relationship information into visual and textual features by performing region or word relationship reasoning.” Read “Image-Text Embedding Learning via Visual and Textual Semantic Reasoning” and see the full list of authors in the IEEE Transactions on Pattern Analysis and Machine Intelligence.

    Learn more

    ,
  • ‘Dissociation Between Linguistic and Nonlinguistic Statistical Learning in Children With Autism’

    “Statistical learning (SL), the ability to detect and extract regularities from inputs, is considered a domain-general building block for typical language development. We compared 55 verbal children with autism (ASD, 6–12 years) and 50 typically-developing children in four SL tasks. The ASD group exhibited reduced learning in the linguistic SL tasks (syllable and letter), but showed intact learning for the nonlinguistic SL tasks (tone and image).” Read the paper and see the full list of authors in the Journal of Autism and Developmental Disorders.

    Learn more

    ,
  • ‘Backdoor Attacks in Peer-to-Peer Federated Learning’

    ,

    “We study backdoor attacks in peer-to-peer federated learning systems on different graph topologies and datasets. We show that only 5% attacker nodes are sufficient to perform a backdoor attack with 42% attack success without decreasing the accuracy on clean data by more than 2%. We also demonstrate that the attack can be amplified by the attacker crashing a small number of nodes.” Read the paper and see the full list of authors in ArXiv.

    Learn more

  • ‘Stochastic Minimum Vertex Cover in General Graphs: A 3/2-Approximation’

    “Our main result is designing an algorithm that returns a vertex cover of G* with size at most (3/2+ϵ) times the expected size of the minimum vertex cover, using only O(n/ϵp) non-adaptive queries. This improves over the best-known 2-approximation algorithm by Behnezhad, Blum, and Derakhshan [SODA’22], who also show that Ω(n/p) queries are necessary to achieve any constant approximation.” Read the paper and see the full list of authors in ArXiv.

    Learn more

  • ‘A Closed-Form Solution of the Smoke Filling Time and Descent History in Enclosure Growing Fires With Floor Leaks’

    “For the smoke filling time or smoke descent history in enclosure fires with floor leaks, the existing close-formed solutions are all based on the hypothesis that the expansion term is negligible. However, when the smoke interface is near to the floor level, the expansion term is more important than the plume entrainment term and the existing solutions give unrealistic predictions.” Read the paper and see the full list of authors in Fire Technology.

    Learn more

    ,
  • ‘From Robustness to Privacy and Back’

    “We study the relationship between two desiderata of algorithms in statistical inference and machine learning: differential privacy and robustness to adversarial data corruptions. … Dwork and Lei (STOC 2009) … observed that private algorithms satisfy robustness, and gave a general method for converting robust algorithms to private ones. However, all general methods for transforming robust algorithms into private ones lead to suboptimal error rates. Our work gives the first black-box transformation that converts any adversarially robust algorithm into one that satisfies pure differential privacy.” Read the paper and see the full list of authors in ArXiv.

    Learn more

  • Abinader publishes short story, ‘Hanging Fire,’ in Michigan Quarterly Review

    Professor of English Elmaz Abinader has a new short story appearing in the Winter 2023 issue of Michigan Quarterly Review titled “Hanging Fire.”

    Learn more

    ,
  • ‘Effects of Inhaled Cannabis High in Δ9-THC or CBD on the Aging Brain: A Translational MRI and Behavioral Study’

    ,

    “To understand the neurobiological effects of cannabis on the aging brain, 19–20 months old mice were divided into three groups exposed to vaporized cannabis containing. … Voxel based morphometry, diffusion weighted imaging, and resting state functional connectivity data were gathered after 28 days of exposure and following a two-week washout period. … Chronic inhaled CBD resulted in enhanced global network connectivity that persisted after drug cessation. The behavioral consequences of this sustained change in brain connectivity remain to be determined.” Read the paper and see the full list of authors in Frontiers in Aging Neuroscience.

    Learn more

  • Reframing disability as ‘a property of both humans and machines’

    Laura Forlano, professor of art and design and communication studies, has a new article titled “Living Intimately with Machines: Can AI Be Disabled?” Forlano proposes to take seriously the idea that we can “understand disability to be a property of both humans and machines.”

    Learn more

    ,
  • Heat pumps are simple and climate friendly—so why are they so hard to adopt?

    Professor of public policy and urban affairs Joan Fitzgerald describes the problems surrounding heat pumps, which aid electrification of homes and are more climate efficient, but which face “a complex policy environment surround[ing] a simple technology.” Some of the problems Fitzgerald cites include regulatory obstacles, confusing rebate programs, and supply chain delays.

    Learn more

  • ‘Do Multi-Document Summarization Models Synthesize?’

    “Multi-document summarization entails producing concise synopses of collections of inputs. For some applications, the synopsis should accurately synthesize inputs with respect to a key property or aspect. … In this paper we ask: To what extent do modern multi-document summarization models implicitly perform this type of synthesis? To assess this we perform a suite of experiments that probe the degree to which conditional generation models trained for summarization using standard methods yield outputs that appropriately synthesize inputs.” Read the paper and see the full list of authors in ArXiv.

    Learn more

  • Foregrounding care in the co-creation of urban spaces: How to find ‘liveable urban futures’

    This article asks, “Can participatory engagements in the form of more-than-human co-creation be a generative form of socially and ecologically-just and critical urban placemaking?” It goes on to explore “three interrelated examples of critical urban placemaking in the arts, interrogating how we might design for liveable urban futures as matters of care.” In foregrounding care, the authors explore “co-creation” practices that are “responsive and dynamic rather than prescriptive… [and that] “can transform the status quo, rather than merely reproduce it.” Read “Care-full co-curation: critical urban placemaking for more-than-human futures” and see the full list of authors in City: Analysis of Urban Change,…

    Learn more

    , ,
  • ‘Explaining Dataset Changes for Semantic Data Versioning with Explain-Da-V (Technical Report)’

    “In multi-user environments in which data science and analysis is collaborative, multiple versions of the same datasets are generated. While managing and storing data versions has received some attention in the research literature, the semantic nature of such changes has remained under-explored. In this work, we introduce \texttt{Explain-Da-V}, a framework aiming to explain changes between two given dataset versions.” Read the paper and see the full list of authors in ArXiv.

    Learn more

  • ‘Thought Bubbles: A Proxy into Players’ Mental Model Development’

    , , , ,

    “Studying mental models has recently received more attention, aiming to understand the cognitive aspects of human-computer interaction. However, there is not enough research on the elicitation of mental models in complex dynamic systems. We present Thought Bubbles as an approach for eliciting mental models and an avenue for understanding players’ mental model development in interactive virtual environments.” Read the paper and see the full list of authors at ArXiv.

    Learn more

  • ‘A Bias-Variance-Privacy Trilemma for Statistical Estimation’

    “The canonical algorithm for differentially private mean estimation is to first clip the samples to a bounded range and then add noise to their empirical mean. Clipping controls the sensitivity and, hence, the variance of the noise that we add for privacy. But clipping also introduces statistical bias. We prove that this tradeoff is inherent: no algorithm can simultaneously have low bias, low variance, and low privacy loss for arbitrary distributions.” Read the paper and see the full list of authors in ArXiv.

    Learn more

  • ‘Making Reconstruction-Based Method Great Again for Video Anomaly Detection’

    “Anomaly detection in videos is a significant yet challenging problem. Previous approaches based on deep neural networks employ either reconstruction-based or prediction-based approaches. … existing reconstruction-based methods 1) rely on old-fashioned convolutional autoencoders and are poor at modeling temporal dependency; 2) are prone to overfit the training samples, leading to indistinguishable reconstruction errors. … To address such issues, firstly, we get inspiration from transformer and propose Spatio-Temporal Auto-Trans-Encoder, dubbed as STATE, as a new autoencoder model for enhanced consecutive frame reconstruction.” Find the paper and the full list of authors in ArXiv.

    Learn more

  • Re-evaluating ESG reporting: The missing human factor

    , ,

    Researchers from the Center for the Future of Higher Education and Talent Strategy have produced a new report that details the importance of human capital and its measurement in Environmental, Social, and Governance reporting.

    Learn more

  • ‘Trajectory-Aware Eligibility Traces for Off-Policy Reinforcement Learning’

    “Off-policy learning from multistep returns is crucial for sample-efficient reinforcement learning, but counteracting off-policy bias without exacerbating variance is challenging. Classically, off-policy bias is corrected in a per-decision manner. … Many off-policy algorithms rely on this mechanism, along with differing protocols for cutting the IS ratios to combat the variance of the IS estimator. Unfortunately, once a trace has been fully cut, the effect cannot be reversed. … In this paper, we propose a multistep operator that can express both per-decision and trajectory-aware methods.” Read the paper and see the full list of authors in ArXiv.

    Learn more

  • ‘The Clinical Trials Puzzle: How Network Effects Limit Drug Discovery’

    “The depth of knowledge offered by post-genomic medicine has carried the promise of new drugs, and cures for multiple diseases. To explore the degree to which this capability has materialized, we extract meta-data from 356,403 clinical trials spanning four decades, aiming to offer mechanistic insights into the innovation practices in drug discovery. We find … the tested drugs target only 12% of the human interactome. If current patterns persist, it would take 170 years to target all druggable proteins.” Read the paper and see the full list of authors in ArXiv.

    Learn more

    , ,
  • ‘HoLA Robots: Mitigating Plan-Deviation Attacks in Multi-Robot Systems’

    “Emerging multi-robot systems rely on cooperation between humans and robots, with robots following automatically generated motion plans to service application-level tasks. Given the safety requirements associated with operating in proximity to humans and expensive infrastructure, it is important to understand and mitigate the security vulnerabilities of such systems. … We focus on centralized systems, where a *central entity* (CE) is responsible for determining and transmitting the motion plans to the robots, which report their location as they move following the plan.” Read the paper and see the full list of authors in ArXiv.

    Learn more

  • Paper from the Ocean Genome Legacy Center, ‘Greater Than pH 8: The pH Dependence of EDTA as a Preservative of High Molecular Weight DNA’

    , ,

    “Ethylenediaminetetraacetic acid (EDTA) is a divalent cation chelator and chemical preservative that has been shown to be the active ingredient of the popular DNA preservative DESS. EDTA may act to reduce DNA degradation during tissue storage by sequestering divalent cations that are required by nucleases naturally occurring in animal tissues. … Increasing the pH of EDTA-containing preservative solutions may improve their effectiveness as DNA preservatives.” Read “Greater Than pH 8: The pH Dependence of EDTA as a Preservative of High Molecular Weight DNA in Biological Samples” and find the full list of authors in PLOS ONE.

    Learn more

    ,
  • ‘Single-Pass Streaming Algorithms for Correlation Clustering’

    “We study correlation clustering in the streaming setting. This problem has been studied extensively and numerous algorithms have been developed, most requiring multiple passes over the stream. … We present a single-pass algorithm that obtains a 5-approximation using O(n) space. The algorithm itself is extremely simple and has implications beyond the streaming setting (such as for dynamic and local computation algorithms). The approximation analysis, on the other hand, is delicate and in fact tight.” Read the paper and see the full list of authors in the Society for Industrial and Applied Mathematics.

    Learn more

  • ‘Dynamic Algorithms for Maximum Matching Size’

    “We study fully dynamic algorithms for maximum matching. This is a well-studied problem, known to admit several update-time/approximation trade-offs. For instance, it is known how to maintain a 1/2-approximate matching in (poly log n) update time or a 2/3-approximate match­ing in O(√n) update time, where n is the number of vertices. … We show that when the goal is to maintain just the size of the matching (and not its edge-set), then these bounds can indeed be improved.” Read the paper and see the full list of authors in the Society for Industrial and Applied Mathematics.

    Learn more

  • ‘Decadal Application of WRF/Chem Under Future Climate and Emission Scenarios’

    ,

    “This work presents new climate and emissions scenarios to investigate changes on future meteorology and air quality in the U.S. Here, we employ a dynamically downscaled Weather Research and Forecasting model coupled with chemistry (WRF/Chem) simulations that use two Intergovernmental Panel on Climate Change scenarios (i.e., A1B and B2) integrated with explicitly projected emissions from a novel Technology Driver Model (TDM).” Read “Decadal Application of WRF/Chem Under Future Climate and Emission Scenarios: Impacts of Technology-Driven Climate and Emission Changes on Regional Meteorology and Air Quality” and see the full list of authors in Atmosphere.

    Learn more

    ,
  • ‘Who Wants To Cooperate—And Why? Attitude and Perception of Crowd Workers in Online Labor Markets’

    “Existing literature and studies predominantly focus on how crowdsource workers individually complete tasks and projects. Our study examines crowdsource workers’ willingness to work collaboratively. We report results from a survey of 122 workers on a leading online labor platform (Upwork) to examine crowd workers’ behavioral preferences for collaboration. … We then test if actual cooperative behavior matches with workers’ behavioral preferences through an incentivized social dilemma experiment. We find that respondents cooperate at a higher rate (85%) than reported in previous comparable studies (between 50-75%).” Read the paper and see the full list of authors in ArXiv.

    Learn more

    , ,
  • ‘Interphase Chromosomes of the Aedes Aegypti Mosquito Are Liquid Crystalline and Can Sense Mechanical Cues’

    In “Interphase chromosomes of the Aedes aegypti mosquito are liquid crystalline and can sense mechanical cues,” the authors observe “the three-dimensional architecture of the Aedes aegypti genome,” a species of mosquito. Their observations “[provide] a possible physical mechanism linking mechanical cues to gene regulation.” Find the paper and the full list of authors at Nature Communications.

    Learn more

    ,
  • Building a better hologram: Just add noise

    Researchers from Northeastern University, in collaboration with Nanjing University, have broken a “theoretical limit” in metasurface capacities—a.k.a. “holograms.” By introducing carefully engineered noise into Jones matrices, they have produced “the highest capacity reported for polarization multiplexing.” They demonstrate this raised capacity across “11 independent holographic images.” Read “Breaking the Limitation of Polarization Multiplexing in Optical Metasurfaces with Engineered Noise” and find the full list of authors at Science.

    Learn more

    ,