oak ridge national laboratory
How America Gave China an Edge in Nuclear Power
Though the two countries are now in a race to develop atomic technology, China's most advanced reactor was the result of collaboration with American scientists. This April, in a speech given at the Shanghai branch of the Chinese Academy of Sciences, the physicist Xu Hongjie announced a breakthrough. For over a decade, his team had been working on an experimental nuclear reactor that runs on a lava-hot solution of fissile material and molten salt, rather than on solid fuel. The reactor, which went online two years ago, was a feat in itself. It is still the only one of its kind in operation in the world, and has the potential to be both safer and more efficient than the water-cooled nuclear plants that dominate the industry. Now, Xu explained, his team had been able to refuel the reactor without shutting it down, demonstrating a level of mastery over their new system. As dazzling as that was, the timing of Xu's speech also freighted the topic with geopolitical import. Only a few months earlier, DeepSeek, the Chinese artificial-intelligence company, had set alarms ringing through the U.S. tech world when it became clear that the relatively small Chinese startup, operating under U.S. export controls, had created a large language model that rivalled anything devised by the behemoths of Silicon Valley.
- North America > United States > California (0.34)
- Asia > China > Shanghai > Shanghai (0.25)
- North America > United States > Tennessee (0.05)
- (7 more...)
- Personal (0.48)
- Research Report (0.48)
- Government (1.00)
- Energy > Power Industry > Utilities > Nuclear (1.00)
Living Off the LLM: How LLMs Will Change Adversary Tactics
Oesch, Sean, Hutchins, Jack, Koch, Luke, Kurian, Kevin
Abstract---In living off the land attacks, malicious actors use legitimate tools and processes already present on a system to avoid detection. In this paper, we explore how the on-device LLMs of the future will become a security concern as threat actors integrate LLMs into their living off the land attack pipeline and ways the security community may mitigate this threat. LOTL involves malicious actors using legitimate tools and processes already present on a system, often referred to as living off the land binaries or LOLBins. These techniques allow threat actors to blend in with normal system activity, making their actions difficult to detect and potentially bypassing basic security measures. LOTL attacks leverage legitimate system tools like WMI and PowerShell that are typically allowlisted, making them difficult to detect and attribute since they leave no malware signatures. These attacks allow adversarie s extended dwell time to execute sophisticated operations, while the lack of malicious signatures enables repeated use of the same tactics and complicates both prevention and incident response.
- North America > United States > Tennessee > Anderson County > Oak Ridge (0.04)
- Europe > Ukraine (0.04)
Data Readiness for Scientific AI at Scale
Brewer, Wesley, Widener, Patrick, Anantharaj, Valentine, Wang, Feiyi, Beck, Tom, Shankar, Arjun, Oral, Sarp
This paper examines how Data Readiness for AI (DRAI) principles apply to leadership-scale scientific datasets used to train foundation models. We analyze archetypal workflows across four representative domains - climate, nuclear fusion, bio/health, and materials - to identify common preprocessing patterns and domain-specific constraints. We introduce a two-dimensional readiness framework composed of Data Readiness Levels (raw to AI-ready) and Data Processing Stages (ingest to shard), both tailored to high performance computing (HPC) environments. This framework outlines key challenges in transforming scientific data for scalable AI training, emphasizing transformer-based generative models. Together, these dimensions form a conceptual maturity matrix that characterizes scientific data readiness and guides infrastructure development toward standardized, cross-domain support for scalable and reproducible AI for science.
- Government > Regional Government > North America Government > United States Government (1.00)
- Energy (1.00)
- Health & Medicine > Pharmaceuticals & Biotechnology (0.93)
- Information Technology > Artificial Intelligence > Representation & Reasoning (1.00)
- Information Technology > Artificial Intelligence > Natural Language (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (1.00)
- Information Technology > Data Science > Data Quality (0.94)
yProv4ML: Effortless Provenance Tracking for Machine Learning Systems
Padovani, Gabriele, Anantharaj, Valentine, Fiore, Sandro
The rapid growth of interest in large language models (LLMs) reflects their potential for flexibility and generalization, and attracted the attention of a diverse range of researchers. However, the advent of these techniques has also brought to light the lack of transparency and rigor with which development is pursued. In particular, the inability to determine the number of epochs and other hyperparameters in advance presents challenges in identifying the best model. To address this challenge, machine learning frameworks such as MLFlow can automate the collection of this type of information. However, these tools capture data using proprietary formats and pose little attention to lineage. This paper proposes yProv4ML, a framework to capture provenance information generated during machine learning processes in PROV-JSON format, with minimal code modifications.
- North America > United States (0.69)
- Europe > Middle East > Cyprus > Limassol > Limassol (0.04)
- Europe > Italy > Trentino-Alto Adige/Südtirol > Trentino Province > Trento (0.04)
- Asia > Japan > Honshū > Kansai > Osaka Prefecture > Osaka (0.04)
- Energy (0.70)
- Government > Regional Government (0.69)
Agent-Based Modeling and Deep Neural Networks for Establishing Digital Twins of Secure Facilities under Sensing Restrictions
Gunaratne, Chathika, Stott, Mason, De, Debraj, Thakur, Gautam Malviya, Young, Chris
Digital twin technologies help practitioners simulate, monitor, and predict undesirable outcomes in-silico, while avoiding the cost and risks of conducting live simulation exercises. Virtual reality (VR) based digital twin technologies are especially useful when monitoring human Patterns of Life (POL) in secure nuclear facilities, where live simulation exercises are too dangerous and costly to ever perform. However, the high-security status of such facilities may restrict modelers from deploying human activity sensors for data collection. This problem was encountered when deploying MetaPOL, a digital twin system to prevent insider threat or sabotage of secure facilities, at a secure nuclear reactor facility at Oak Ridge National Laboratory (ORNL). This challenge was addressed using an agent-based model (ABM), driven by anecdotal evidence of facility personnel POL, to generate synthetic movement trajectories. These synthetic trajectories were then used to train deep neural network surrogates for next location and stay duration prediction to drive NPCs in the VR environment. In this study, we evaluate the efficacy of this technique for establishing NPC movement within MetaPOL and the ability to distinguish NPC movement during normal operations from that during a simulated emergency response. Our results demonstrate the success of using a multi-layer perceptron for next location prediction and mixture density network for stay duration prediction to predict the ABM generated trajectories. We also find that NPC movement in the VR environment driven by the deep neural networks under normal operations remain significantly different to that seen when simulating responses to a simulated emergency scenario.
- North America > United States > Tennessee > Anderson County > Oak Ridge (0.05)
- North America > United States > Tennessee > Knox County > Knoxville (0.04)
- North America > United States > New Mexico > Bernalillo County > Albuquerque (0.04)
- (2 more...)
- Government > Regional Government > North America Government > United States Government (1.00)
- Government > Military (1.00)
- Leisure & Entertainment > Games (0.94)
- (2 more...)
Agentic AI and the Cyber Arms Race
Oesch, Sean, Hutchins, Jack, Austria, Phillipe, Chaulagain, Amul
Abstract---Agentic AI is shifting the cybersecurity landscape as attackers and defenders leverage AI agents to augment humans and automate common tasks. In this article, we examine the implications for cyber warfare and global politics as Agentic AI becomes more powerful and enables the broad proliferation of capabilities only available to the most well resourced actors today . As attacks increased in volume and attackers became more sophisticated, moving towards polymorphic malware, packers, and novel evasion techniques, defenders looked to machine learning to provide scalability (quickly analyze large volumes of data and automate repetitive tasks), pattern recognition (detect common attack patterns), and novelty detection (recognize abnormal behaviors that may indicate malicious actors or insider threats). Companies now use Large Language Models (LLMs) to provide analysts and reverse engineers with a rapid analysis of malicious code and best next steps when triaging alerts. But the real paradigm shift in cybersecurity for both attackers and defenders is still on the horizon: agentic artificial intelligence (agentic AI).
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.92)
- Government > Regional Government > North America Government > United States Government (0.74)
Scale-up Unlearnable Examples Learning with High-Performance Computing
Zhu, Yanfan, Lyngaas, Issac, Meena, Murali Gopalakrishnan, Koran, Mary Ellen I., Malin, Bradley, Moyer, Daniel, Bao, Shunxing, Kapadia, Anuj, Wang, Xiao, Landman, Bennett, Huo, Yuankai
Recent advancements in AI models are structured to retain user interactions, which could inadvertently include sensitive healthcare data. In the healthcare field, particularly when radiologists use AI-driven diagnostic tools hosted on online platforms, there is a risk that medical imaging data may be repurposed for future AI training without explicit consent, spotlighting critical privacy and intellectual property concerns around healthcare data usage. Addressing these privacy challenges, a novel approach known as Unlearnable Examples (UEs) has been introduced, aiming to make data unlearnable to deep learning models. A prominent method within this area, called Unlearnable Clustering (UC), has shown improved UE performance with larger batch sizes but was previously limited by computational resources. To push the boundaries of UE performance with theoretically unlimited resources, we scaled up UC learning across various datasets using Distributed Data Parallel (DDP) training on the Summit supercomputer. Our goal was to examine UE efficacy at high-performance computing (HPC) levels to prevent unauthorized learning and enhance data security, particularly exploring the impact of batch size on UE's unlearnability. Utilizing the robust computational capabilities of the Summit, extensive experiments were conducted on diverse datasets such as Pets, MedMNist, Flowers, and Flowers102. Our findings reveal that both overly large and overly small batch sizes can lead to performance instability and affect accuracy. However, the relationship between batch size and unlearnability varied across datasets, highlighting the necessity for tailored batch size strategies to achieve optimal data protection. Our results underscore the critical role of selecting appropriate batch sizes based on the specific characteristics of each dataset to prevent learning and ensure data security in deep learning applications.
- North America > United States > Tennessee > Davidson County > Nashville (0.06)
- North America > United States > Tennessee > Knox County > Knoxville (0.05)
- North America > United States > California > Orange County > Irvine (0.04)
- Asia > China > Shanghai > Shanghai (0.04)
- Information Technology > Security & Privacy (1.00)
- Health & Medicine > Diagnostic Medicine > Imaging (0.69)
The Path To Autonomous Cyber Defense
Oesch, Sean, Austria, Phillipe, Chaulagain, Amul, Weber, Brian, Watson, Cory, Dixson, Matthew, Sadovnik, Amir
Abstract---Defenders are overwhelmed by the number and scale of attacks against their networks.This problem will only be exacerbated as attackers leverage artificial intelligence to automate their workflows. We propose a path to autonomous cyber agents able to augment defenders by automating critical steps in the cyber defense life cycle. To avoid being overwhelmed, and complexity. The deep neural nets in order to generalize well across creation of autonomous cyber defense agents is one states. By leveraging deep RL, DeepMind has trained promising approach to automate operations and prevent reinforcement learning algorithms to defeat expert human cyber defenders from being overwhelmed.
- North America > United States > Tennessee > Anderson County > Oak Ridge (0.14)
- Europe > Austria (0.04)
- North America > United States > Tennessee > Knox County > Knoxville (0.04)
- (3 more...)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Artificial Intelligence > Representation & Reasoning > Agents (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Reinforcement Learning (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (1.00)
Peggy Smedley Show: America's Cutting Edge: Machine Tools
Peggy and Tony Schmitz, professor, University of Tennessee, Knoxville, and joint faculty, Oak Ridge National Laboratory, talk about the ACE (America’s Cutting Edge) program and what brought him to the University of Tennessee. He explains that East Tennessee is an exploding ecosystem right now. They also discuss: Why it has the ACE program and the importance of machine tools for defense and our economic security. How machine tool technology has improved and the challenge of the lack of workforce to make the best use of that equipment. The result of outsourcing manufacturing to other countries and what needs to happen next. (11/8/22 - 796) IoT, Internet of Things, Peggy Smedley, artificial intelligence, machine learning, big data, digital transformation, cybersecurity, blockchain, 5G, cloud, sustainability, future of work, podcast, Tony Schmitz, University of Tennessee, Knoxville, Oak Ridge National Laboratory This episode is available on all major streaming platforms. If you enjoyed this segment, please consider leaving a review on Apple Podcasts.
- Government (1.00)
- Energy (0.93)
- Information Technology (0.73)
Fault Prognosis in Particle Accelerator Power Electronics Using Ensemble Learning
Radaideh, Majdi I., Pappas, Chris, Wezensky, Mark, Ramuhalli, Pradeep, Cousineau, Sarah
Early fault detection and fault prognosis are crucial to ensure efficient and safe operations of complex engineering systems such as the Spallation Neutron Source (SNS) and its power electronics (high voltage converter modulators). Following an advanced experimental facility setup that mimics SNS operating conditions, the authors successfully conducted 21 fault prognosis experiments, where fault precursors are introduced in the system to a degree enough to cause degradation in the waveform signals, but not enough to reach a real fault. Nine different machine learning techniques based on ensemble trees, convolutional neural networks, support vector machines, and hierarchical voting ensembles are proposed to detect the fault precursors. Although all 9 models have shown a perfect and identical performance during the training and testing phase, the performance of most models has decreased in the prognosis phase once they got exposed to real-world data from the 21 experiments. The hierarchical voting ensemble, which features multiple layers of diverse models, maintains a distinguished performance in early detection of the fault precursors with 95% success rate (20/21 tests), followed by adaboost and extremely randomized trees with 52% and 48% success rates, respectively. The support vector machine models were the worst with only 24% success rate (5/21 tests). The study concluded that a successful implementation of machine learning in the SNS or particle accelerator power systems would require a major upgrade in the controller and the data acquisition system to facilitate streaming and handling big data for the machine learning models. In addition, this study shows that the best performing models were diverse and based on the ensemble concept to reduce the bias and hyperparameter sensitivity of individual models.
- North America > United States > Tennessee > Anderson County > Oak Ridge (0.04)
- North America > United States > California > San Mateo County > Menlo Park (0.04)
- Asia > Indonesia > Bali (0.04)
- Government > Regional Government > North America Government > United States Government (0.93)
- Energy > Renewable (0.68)
- Information Technology > Artificial Intelligence > Machine Learning > Statistical Learning > Support Vector Machines (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Performance Analysis > Accuracy (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (1.00)