Essex County
Canadian snowbirds are still unhappy with Trump. And Palm Springs is feeling the chill
Things to Do in L.A. Canadian snowbirds are still unhappy with Trump. This is read by an automated voice. Please report any issues or inconsistencies here . Palm Springs relies heavily on Canadian tourists, who are declining to travel to the U.S. or shortening their stays because of Trump. The number of Canadian visitors to California plummeted more than 18% in 2025 compared with the year prior.
- North America > Mexico (0.05)
- North America > Greenland (0.05)
- North America > United States > Oklahoma (0.04)
- (13 more...)
- Media (0.95)
- Health & Medicine (0.95)
- Banking & Finance > Real Estate (0.95)
- (4 more...)
Comparing verbal, visual and combined explanations for Bayesian Network inferences
Nyberg, Erik P., Mascaro, Steven, Zukerman, Ingrid, Wybrow, Michael, Vo, Duc-Minh, Nicholson, Ann
Bayesian Networks (BNs) are an important tool for assisting probabilistic reasoning, but despite being considered transparent models, people have trouble understanding them. Further, current User Interfaces (UIs) still do not clarify the reasoning of BNs. To address this problem, we have designed verbal and visual extensions to the standard BN UI, which can guide users through common inference patterns. We conducted a user study to compare our verbal, visual and combined UI extensions, and a baseline UI. Our main findings are: (1) users did better with all three types of extensions than with the baseline UI for questions about the impact of an observation, the paths that enable this impact, and the way in which an observation influences the impact of other observations; and (2) using verbal and visual modalities together is better than using either modality alone for some of these question types.
- North America > United States > Massachusetts > Middlesex County > Lowell (0.14)
- Oceania > Australia (0.04)
- North America > Canada > Quebec > Montreal (0.04)
- (11 more...)
- Research Report > New Finding (1.00)
- Research Report > Experimental Study (1.00)
- Health & Medicine (1.00)
- Education (1.00)
Detecting Sleeper Agents in Large Language Models via Semantic Drift Analysis
Zanbaghi, Shahin, Rostampour, Ryan, Abid, Farhan, Jarmakani, Salim Al
Large Language Models (LLMs) can be backdoored to exhibit malicious behavior under specific deployment conditions while appearing safe during training a phenomenon known as "sleeper agents." Recent work by Hubinger et al. demonstrated that these backdoors persist through safety training, yet no practical detection methods exist. We present a novel dual-method detection system combining semantic drift analysis with canary baseline comparison to identify backdoored LLMs in real-time. Our approach uses Sentence-BERT embeddings to measure semantic deviation from safe baselines, complemented by injected canary questions that monitor response consistency. Evaluated on the official Cadenza-Labs dolphin-llama3-8B sleeper agent model, our system achieves 92.5% accuracy with 100% precision (zero false positives) and 85% recall. The combined detection method operates in real-time (<1s per query), requires no model modification, and provides the first practical solution to LLM backdoor detection. Our work addresses a critical security gap in AI deployment and demonstrates that embedding-based detection can effectively identify deceptive model behavior without sacrificing deployment efficiency.
- Information Technology > Artificial Intelligence > Natural Language > Large Language Model (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Performance Analysis > Accuracy (0.96)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.89)
Conflict-Free Flight Scheduling Using Strategic Demand Capacity Balancing for Urban Air Mobility Operations
Hemmati, Vahid, Ayalew, Yonas, Mohammadi, Ahmad, Ahmari, Reza, Kebria, Parham, Homaifar, Abdollah, Saif, Mehrdad
Abstract-- In this paper, we propose a conflict-free multi-agent flight scheduling that ensures robust separation in constrained airspace for Urban Air Mobility (UAM) operations application. First, we introduce Pairwise Conflict A voidance (PCA) based on delayed departures, leveraging kinematic principles to maintain safe distances. Next, we expand PCA to multi-agent scenarios, formulating an optimization approach that systematically determines departure times under increasing traffic densities. Performance metrics, such as average delay, assess the effectiveness of our solution. Through numerical simulations across diverse multi-agent environments and real-world UAM use cases, our method demonstrates a significant reduction in total delay while ensuring collision-free operations. This approach provides a scalable framework for emerging urban air mobility systems.
- North America > United States > North Carolina > Guilford County > Greensboro (0.04)
- North America > Canada > Ontario > Essex County > Windsor (0.04)
- Transportation > Infrastructure & Services (1.00)
- Transportation > Air (1.00)
- Information Technology (1.00)
- (3 more...)
Differentiable Synthesis of Program Architectures
Differentiable programs have recently attracted much interest due to their inter-pretability, compositionality, and their efficiency to leverage differentiable training. However, synthesizing differentiable programs requires optimizing over a combinatorial, rapidly exploded space of program architectures.
- North America > Canada > Quebec > Montreal (0.04)
- North America > Canada > British Columbia > Vancouver (0.04)
- Europe > France (0.04)
- (8 more...)
- Europe > United Kingdom > England > Cambridgeshire > Cambridge (0.04)
- North America > United States > New York (0.04)
- North America > United States > Massachusetts > Middlesex County > Cambridge (0.04)
- (4 more...)
- North America > United States > Louisiana > Orleans Parish > New Orleans (0.04)
- North America > Canada > Quebec > Montreal (0.04)
- North America > Canada > British Columbia > Vancouver (0.04)
- (7 more...)
Comparing Reconstruction Attacks on Pretrained Versus Full Fine-tuned Large Language Model Embeddings on Homo Sapiens Splice Sites Genomic Data
Al-Saidi, Reem, Ayday, Erman, Kobti, Ziad
This study investigates embedding reconstruction attacks in large language models (LLMs) applied to genomic sequences, with a specific focus on how fine-tuning affects vulnerability to these attacks. Building upon Pan et al.'s seminal work demonstrating that embeddings from pretrained language models can leak sensitive information, we conduct a comprehensive analysis using the HS3D genomic dataset to determine whether task-specific optimization strengthens or weakens privacy protections. Our research extends Pan et al.'s work in three significant dimensions. First, we apply their reconstruction attack pipeline to pretrained and fine-tuned model embeddings, addressing a critical gap in their methodology that did not specify embedding types. Second, we implement specialized tokenization mechanisms tailored specifically for DNA sequences, enhancing the model's ability to process genomic data, as these models are pretrained on natural language and not DNA. Third, we perform a detailed comparative analysis examining position-specific, nucleotide-type, and privacy changes between pretrained and fine-tuned embeddings. We assess embeddings vulnerabilities across different types and dimensions, providing deeper insights into how task adaptation shifts privacy risks throughout genomic sequences. Our findings show a clear distinction in reconstruction vulnerability between pretrained and fine-tuned embeddings. Notably, fine-tuning strengthens resistance to reconstruction attacks in multiple architectures -- XLNet (+19.8\%), GPT-2 (+9.8\%), and BERT (+7.8\%) -- pointing to task-specific optimization as a potential privacy enhancement mechanism. These results highlight the need for advanced protective mechanisms for language models processing sensitive genomic data, while highlighting fine-tuning as a potential privacy-enhancing technique worth further exploration.
- North America > Canada > Ontario > Essex County > Windsor (0.04)
- North America > United States > Ohio > Cuyahoga County > Cleveland (0.04)
An Experimental Study of Trojan Vulnerabilities in UAV Autonomous Landing
Ahmari, Reza, Mohammadi, Ahmad, Hemmati, Vahid, Mynuddin, Mohammed, Mahmoud, Mahmoud Nabil, Kebria, Parham, Homaifar, Abdollah, Saif, Mehrdad
This study investigates the vulnerabilities of autonomous navigation and landing systems in Urban Air Mobility (UAM) vehicles. Specifically, it focuses on Trojan attacks that target deep learning models, such as Convolutional Neural Networks (CNNs). Trojan attacks work by embedding covert triggers within a model's training data. These triggers cause specific failures under certain conditions, while the model continues to perform normally in other situations. We assessed the vulnerability of Urban Autonomous Aerial Vehicles (UAAVs) using the DroNet framework. Our experiments showed a significant drop in accuracy, from 96.4% on clean data to 73.3% on data triggered by Trojan attacks. To conduct this study, we collected a custom dataset and trained models to simulate real-world conditions. We also developed an evaluation framework designed to identify Trojan-infected models. This work demonstrates the potential security risks posed by Trojan attacks and lays the groundwork for future research on enhancing the resilience of UAM systems.
- North America > United States > Alabama > Tuscaloosa County > Tuscaloosa (0.14)
- North America > United States > North Carolina > Guilford County > Greensboro (0.04)
- North America > Canada > Ontario > Essex County > Windsor (0.04)
- Information Technology > Security & Privacy (1.00)
- Aerospace & Defense (0.98)
- Government > Military (0.95)
- Transportation > Air (0.93)
GPS Spoofing Attack Detection in Autonomous Vehicles Using Adaptive DBSCAN
Mohammadi, Ahmad, Ahmari, Reza, Hemmati, Vahid, Owusu-Ambrose, Frederick, Mahmoud, Mahmoud Nabil, Kebria, Parham, Homaifar, Abdollah, Saif, Mehrdad
Abstract-- As autonomous vehicles become an essential component of modern transportation, they are increasingly vulnerable to threats such as GPS spoofing attacks. This study presents an adaptive detection approach utilizing a dynamically tuned Density Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm, designed to adjust the detection threshold (ε) in real-time. The threshold is updated based on the recursive mean and standard deviation of displacement errors between GPS and in-vehicle sensors data, but only at instances classified as non-anomalous. Furthermore, an initial threshold, determined from 120,000 clean data samples, ensures the capability to identify even subtle and gradual GPS spoofing attempts from the beginning. T o assess the performance of the proposed method, five different subsets from the real-world Honda Research Institute Driving Dataset (HDD) are selected to simulate both large and small magnitude GPS spoofing attacks. The modified algorithm effectively identifies turn-by-turn, stop, overshoot, and multiple small biased spoofing attacks, achieving detection accuracies of 98.62 1%, 99.96 0.1%, 99.88 0.1%, and 98.38 0.1%, respectively. This work provides a substantial advancement in enhancing the security and safety of A Vs against GPS spoofing threats.
- North America > United States > Alabama > Tuscaloosa County > Tuscaloosa (0.14)
- Pacific Ocean > North Pacific Ocean > San Francisco Bay (0.04)
- North America > United States > North Carolina > Guilford County > Greensboro (0.04)
- (2 more...)
- Information Technology > Security & Privacy (1.00)
- Transportation > Ground > Road (0.68)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Artificial Intelligence > Robots > Autonomous Vehicles (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Performance Analysis > Accuracy (0.68)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.47)