
Gradients and Subgradients of Buffered Failure Probability
Gradients and subgradients are central to optimization and sensitivity a...
read it

Color and EdgeAware Adversarial Image Perturbations
Adversarial perturbation of images, in which a source image is deliberat...
read it

DeepFake Detection with Inconsistent Head Poses: Reproducibility and Analysis
Applications of deep learning to synthetic media generation allow the cr...
read it

TypeNet: Scaling up Keystroke Biometrics
We study the suitability of keystroke dynamics to authenticate 100K user...
read it

Optimistic Robust Optimization With Applications To Machine Learning
Robust Optimization has traditionally taken a pessimistic, or worstcase...
read it

MANCaLog: A Logic for MultiAttribute Network Cascades (Technical Report)
The modeling of cascade processes in multiagent systems in the form of ...
read it

Comparison of Gaussian process modeling software
Gaussian process fitting, or kriging, is often used to create a model fr...
read it

Ocean Plume Tracking with Unmanned Surface Vessels: Algorithms and Experiments
Pollution plume monitoring using autonomous vehicles is important due to...
read it

Implementation of Epidemic Routing with IP Convergence Layer in ns3
We present the Epidemic routing protocol implementation in ns3. It is a...
read it

Geographic Centroid Routing for Vehicular Networks
A number of geolocationbased Delay Tolerant Networking (DTN) routing pr...
read it

In the IP of the Beholder: Strategies for Active IPv6 Topology Discovery
Existing methods for active topology discovery within the IPv6 Internet ...
read it

Landscape Boolean Functions
In this paper we define a class of Boolean and generalized Boolean funct...
read it

Generalized bent Boolean functions and strongly regular Cayley graphs
In this paper we define the (edgeweighted) Cayley graph associated to a...
read it

An Improved Formula for Jacobi Rotations
We present an improved form of the algorithm for constructing Jacobi rot...
read it

A complete characterization of plateaued Boolean functions in terms of their Cayley graphs
In this paper we find a complete characterization of plateaued Boolean f...
read it

Generalized Batch Normalization: Towards Accelerating Deep Neural Networks
Utilizing recently introduced concepts from statistics and quantitative ...
read it

Bernstein approximation of optimal control problems
Bernstein polynomial approximation to a continuous function has a slower...
read it

An Internet Heartbeat
Obtaining sound inferences over remote networks via active or passive me...
read it

Sundials in the Shade: An Internetwide Perspective on ICMP Timestamps
ICMP timestamp request and response packets have been standardized for n...
read it

Partially APN Boolean functions and classes of functions that are not APN infinitely often
In this paper we define a notion of partial APNness and find various cha...
read it

Evaluating Explainers via Perturbation
Due to high complexity of many modern machine learning models such as de...
read it

An Improved Algorithm for hypot(a,b)
We develop a fast and accurate algorithm for evaluating √(a^2+b^2) for t...
read it

RootHadamard transforms and complementary sequences
In this paper we define a new transform on (generalized) Boolean functio...
read it

Cdifferentials, multiplicative uniformity and (almost) perfect cnonlinearity
In this paper we define a new (output) multiplicative differential, and ...
read it

Density Propagation with Characteristicsbased Deep Learning
Uncertainty propagation in nonlinear dynamic systems remains an outstand...
read it

Discovering the IPv6 Network Periphery
We consider the problem of discovering the IPv6 network periphery, i.e.,...
read it

Tropical Support Vector Machine and its Applications to Phylogenomics
Most data in genomewide phylogenetic analysis (phylogenomics) is essent...
read it

Some c(almost) perfect nonlinear functions
In a prior paper, along with P. Ellingsen, P. Felke and A. Tkachenko, we...
read it

ferify: A Virtual Machine File Protection System against ZeroDay Attacks
Most existing solutions for protecting VMs assume known attack patterns ...
read it

Keystroke Biometrics in Response to Fake News Propagation in a Global Pandemic
This work proposes and analyzes the use of keystroke biometrics for cont...
read it

The cdifferential behavior of the inverse function under the EAequivalence
While the classical differential uniformity (c=1) is invariant under the...
read it

Vanishing Flats: A Combinatorial Viewpoint on the Planarity of Functions and Their Application
For a function f from 𝔽_2^n to 𝔽_2^n, the planarity of f is usually meas...
read it

Cdifferential bent functions and perfect nonlinearity
Drawing inspiration from Nyberg's paper <cit.> on perfect nonlinearity a...
read it

A quantum algorithm to estimate the Gowers U_2 norm and linearity testing of Boolean functions
We propose a quantum algorithm to estimate the Gowers U_2 norm of a Bool...
read it

Filtered Poisson Process Bandit on a Continuum
We consider a version of the continuum armed bandit where an action indu...
read it

QRnet: optimal regulator design with LQRaugmented neural networks
In this paper we propose a new computational method for designing optima...
read it

Fast Compensated Algorithms for the Reciprocal Square Root, the Reciprocal Hypotenuse, and Givens Rotations
The reciprocal square root is an important computation for which many ve...
read it

A Classical Search Game in Discrete Locations
Consider a twoperson zerosum search game between a hider and a searche...
read it

On Boolean Functions with Low Polynomial Degree and Higher Order Sensitivity
Boolean functions are important primitives in different domains of crypt...
read it

ASLevel BGP Community Usage Classification
BGP communities are a popular mechanism used by network operators for tr...
read it

Robustness in Nonorthogonal Multiple Access 5G Networks
The diversity of fifth generation (5G) network use cases, multiple acces...
read it
Naval Postgraduate School
The mission of the Naval Postgraduate School is to provide relevant and unique advanced education and research programs to increase the combat effectiveness of commissioned officers of the Naval Service to enhance the security of the United States. In support of the foregoing, and to sustain academic excellence, NPS and the DON foster and encourage a program of relevant and meritorious research which both supports the needs of Navy and Department of Defense while building the intellectual capital of Naval Postgraduate School faculty.