We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
The endemic Little Vermilion Flycatcher (LVF) Pyrocephalus nanus has suffered a drastic decline on Santa Cruz Island, Galapagos, where it was common 30 years ago. Currently, fewer than 40 individuals remain in the last remnants of natural humid forest in the Galapagos National Park on the island. This small population has low reproductive success, which is contributing to its decline in Santa Cruz. Previous studies have identified Avian Vampire Fly Philornis downsi parasitism, changes in food sources, and habitat alteration as threats to this species. In Santa Cruz, invasive plants may strongly affect the reproductive success of LVF because they limit accessibility to prey near the ground, the preferred foraging niche of these birds. Since 2019, we restored the vegetation in seven plots of 1 ha each by removing invasive blackberry plants and other introduced plant species. In all nests that reached late incubation, we also reduced the number of Avian Vampire Fly larvae. In this study, we compared foraging and perch height, pair formation, incubation time, and reproductive success between managed and unmanaged areas. As predicted, we found significantly lower foraging height and perch height in 2021 in managed areas compared with unmanaged areas. In 2020, the daily failure rate (DFR) of nests in the egg stage did not differ between management types; however, in 2021, the DFR in the egg stage was significantly lower in managed areas than in unmanaged areas. The DFR during the nestling stage was similar between managed and unmanaged areas in 2020, but in 2021, only nests in managed areas reached the nestling stage. Females brooded significantly more during the incubation phase in managed areas. Additionally, we found significantly higher reproductive success in managed areas compared with unmanaged areas in 2021, but not in 2020. Habitat restoration is a long-term process and these findings suggest that habitat management positively affects this small population in the long term.
High-resolution transmission electron microscopy (HRTEM) and electron diffraction experiments have been performed on R1 and R> 1 illite/smectite (I/S) samples that from X-ray powder diffraction (XRD) experiments appear to contain well-ordered layer sequences. The HRTEM images confirmed earlier computer image simulations, which suggested that periodicities due to I/S ordering can be imaged in TEM instruments of moderate resolution. The experiments also confirmed that in instruments of this sort, the strongest contrast arising from the compositional difference between I and S layers occurs under rather unusual imaging conditions of strong overfocus. Some selected-area electron diffraction (SAD) patterns showed additional diffraction spots consistent with R1 and R3 ordering. SAD patterns and cross-fringes arising in HRTEM images from non-00l reciprocal lattice rows indicated that the stacking vectors of most adjacent 2:1 layers were not randomly oriented with respect to each other. Thus, the I/S was not fully turbostratic, but instead consisted of very thin, coherently stacked crystallites that extended across the fundamental particles postulated by Nadeau and coworkers.
S/(I + S) ratios were determined for about seventy HRTEM images obtained and interpreted by three different TEM operators. These ratios were consistent with those obtained from standard XRD procedures, suggesting that results obtained by XRD can be used to infer the initial structural state of mixed-layer I/S prior to treatment of samples for XRD experiments. The HRTEM experiments thus demonstrated that the two specimens examined consisted of ordered I/S existing as small crystals, most of which contained more layers than the fundamental particles of Nadeau and coworkers. The non-turbostratic stacking suggests an energetic interaction between the individual fundamental particles, leading to at least two alternative thermodynamic descriptions of these materials. Although the I/S crystals in the present experiments probably were disaggregated into fundamental particles during sample preparation for XRD, the I/S crystals appear to have separated only along the smectite interlayers. If the term “fundamental particle” is to be used for primary, untreated I/S, its original definition should be modified to include not only free particles, but also those that occur as layers within small crystals. It further should be recognized that these particles can interact thermodynamically and crystallographically with their neighbors.
White matter hyperintensity (WMH) volume is a neuroimaging marker of lesion load related to small vessel disease that has been associated with cognitive aging and Alzheimer’s disease (AD) risk.
Method:
The present study sought to examine whether regional WMH volume mediates the relationship between APOE ε4 status, a strong genetic risk factor for AD, and cognition and if this association is moderated by age group differences within a sample of 187 healthy older adults (APOE ε4 status [carrier/non-carrier] = 56/131).
Results:
After we controlled for sex, education, and vascular risk factors, ANCOVA analyses revealed significant age group by APOE ε4 status interactions for right parietal and left temporal WMH volumes. Within the young-old group (50-69 years), ε4 carriers had greater right parietal and left temporal WMH volumes than non-carriers. However, in the old-old group (70-89 years), right parietal and left temporal WMH volumes were comparable across APOE ε4 groups. Further, within ε4 non-carriers, old-old adults had greater right parietal and left temporal WMH volumes than young-old adults, but there were no significant differences across age groups in ε4 carriers. Follow-up moderated mediation analyses revealed that, in the young-old, but not the old-old group, there were significant indirect effects of ε4 status on memory and executive functions through left temporal WMH volume.
Conclusions:
These findings suggest that, among healthy young-old adults, increased left temporal WMH volume, in the context of the ε4 allele, may represent an early marker of cognitive aging with the potential to lead to greater risk for AD.
There are numerous challenges pertaining to epilepsy care across Ontario, including Epilepsy Monitoring Unit (EMU) bed pressures, surgical access and community supports. We sampled the current clinical, community and operational state of Ontario epilepsy centres and community epilepsy agencies post COVID-19 pandemic. A 44-item survey was distributed to all 11 district and regional adult and paediatric Ontario epilepsy centres. Qualitative responses were collected from community epilepsy agencies. Results revealed ongoing gaps in epilepsy care across Ontario, with EMU bed pressures and labour shortages being limiting factors. A clinical network advising the Ontario Ministry of Health will improve access to epilepsy care.
Anterior temporal lobectomy is a common surgical approach for medication-resistant temporal lobe epilepsy (TLE). Prior studies have shown inconsistent findings regarding the utility of presurgical intracarotid sodium amobarbital testing (IAT; also known as Wada test) and neuroimaging in predicting postoperative seizure control. In the present study, we evaluated the predictive utility of IAT, as well as structural magnetic resonance imaging (MRI) and positron emission tomography (PET), on long-term (3-years) seizure outcome following surgery for TLE.
Participants and Methods:
Patients consisted of 107 adults (mean age=38.6, SD=12.2; mean education=13.3 years, SD=2.0; female=47.7%; White=100%) with TLE (mean epilepsy duration =23.0 years, SD=15.7; left TLE surgery=50.5%). We examined whether demographic, clinical (side of resection, resection type [selective vs. non-selective], hemisphere of language dominance, epilepsy duration), and presurgical studies (normal vs. abnormal MRI, normal vs. abnormal PET, correctly lateralizing vs. incorrectly lateralizing IAT) were associated with absolute (cross-sectional) seizure outcome (i.e., freedom vs. recurrence) with a series of chi-squared and t-tests. Additionally, we determined whether presurgical evaluations predicted time to seizure recurrence (longitudinal outcome) over a three-year period with univariate Cox regression models, and we compared survival curves with Mantel-Cox (log rank) tests.
Results:
Demographic and clinical variables (including type [selective vs. whole lobectomy] and side of resection) were not associated with seizure outcome. No associations were found among the presurgical variables. Presurgical MRI was not associated with cross-sectional (OR=1.5, p=.557, 95% CI=0.4-5.7) or longitudinal (HR=1.2, p=.641, 95% CI=0.4-3.9) seizure outcome. Normal PET scan (OR= 4.8, p=.045, 95% CI=1.0-24.3) and IAT incorrectly lateralizing to seizure focus (OR=3.9, p=.018, 95% CI=1.2-12.9) were associated with higher odds of seizure recurrence. Furthermore, normal PET scan (HR=3.6, p=.028, 95% CI =1.0-13.5) and incorrectly lateralized IAT (HR= 2.8, p=.012, 95% CI=1.2-7.0) were presurgical predictors of earlier seizure recurrence within three years of TLE surgery. Log rank tests indicated that survival functions were significantly different between patients with normal vs. abnormal PET and incorrectly vs. correctly lateralizing IAT such that these had seizure relapse five and seven months earlier on average (respectively).
Conclusions:
Presurgical normal PET scan and incorrectly lateralizing IAT were associated with increased risk of post-surgical seizure recurrence and shorter time-to-seizure relapse.
The Australian SKA Pathfinder (ASKAP) has surveyed the sky at multiple frequencies as part of the Rapid ASKAP Continuum Survey (RACS). The first two RACS observing epochs, at 887.5 (RACS-low) and 1 367.5 (RACS-mid) MHz, have been released (McConnell, et al. 2020, PASA, 37, e048; Duchesne, et al. 2023, PASA, 40, e034). A catalogue of radio sources from RACS-low has also been released, covering the sky south of declination $+30^{\circ}$ (Hale, et al., 2021, PASA, 38, e058). With this paper, we describe and release the first set of catalogues from RACS-mid, covering the sky below declination $+49^{\circ}$. The catalogues are created in a similar manner to the RACS-low catalogue, and we discuss this process and highlight additional changes. The general purpose primary catalogue covering 36 200 deg$^2$ features a variable angular resolution to maximise sensitivity and sky coverage across the catalogued area, with a median angular resolution of $11.2^{\prime\prime} \times 9.3^{\prime\prime}$. The primary catalogue comprises 3 105 668 radio sources, including those in the Galactic Plane (2 861 923 excluding Galactic latitudes of $|b|<5^{\circ}$), and we estimate the catalogue to be 95% complete for sources above 2 mJy. With the primary catalogue, we also provide two auxiliary catalogues. The first is a fixed-resolution, 25-arcsec catalogue approximately matching the sky coverage of the RACS-low catalogue. This 25-arcsec catalogue is constructed identically to the primary catalogue, except images are convolved to a less-sensitive 25-arcsec angular resolution. The second auxiliary catalogue is designed for time-domain science and is the concatenation of source lists from the original RACS-mid images with no additional convolution, mosaicking, or de-duplication of source entries to avoid losing time-variable signals. All three RACS-mid catalogues, and all RACS data products, are available through the CSIRO ASKAP Science Data Archive (https://research.csiro.au/casda/).
Our objective was to evaluate the psychometric properties of the culturally adapted NIH Toolbox African Languages® when used in Swahili and Dholuo-speaking children in western Kenya.
Method:
Swahili-speaking participants were recruited from Eldoret and Dholuo-speaking participants from Ajigo; all were <14 years of age and enrolled in primary school. Participants completed a demographics questionnaire and five fluid cognition tests of the NIH Toolbox® African Languages program, including Flanker, Dimensional Change Card Sort (DCCS), Picture Sequence Memory, Pattern Comparison, and List Sorting tests. Statistical analyses examined aspects of reliability, including internal consistency (in both languages) and test–retest reliability (in Dholuo only).
Results:
Participants included 479 children (n = 239, Swahili-speaking; n = 240, Dholuo-speaking). Generally, the tests had acceptable psychometric properties for research use within Swahili- and Dholuo-speaking populations (mean age = 10.5; SD = 2.3). Issues related to shape identification and accuracy over speed limited the utility of DCCS for many participants, with approximately 25% of children unable to match based on shape. These cultural differences affected outcomes of reliability testing among the Dholuo-speaking cohort, where accuracy improved across all five tests, including speed.
Conclusions:
There is preliminary evidence that the NIH Toolbox ® African Languages potentially offers a valid assessment of development and performance using tests of fluid cognition in Swahili and Dholuo among research settings. With piloting underway across other diverse settings, future research should gather additional evidence on the clinical utility and acceptability of these tests, specifically through the establishment of norming data among Kenyan regions and evaluating these psychometric properties.
Data from a national survey of 348 U.S. sports field managers were used to examine the effects of participation in Cooperative Extension events on the adoption of turfgrass weed management practices. Of the respondents, 94% had attended at least one event in the previous 3 yr. Of this 94%, 97% reported adopting at least one practice as a result of knowledge gained at an Extension turfgrass event. Half of the respondents had adopted four or more practices; a third adopted five or more practices. Nonchemical, cultural practices were the most-adopted practices (65% of respondents). Multiple regression analysis was used to examine factors explaining practice adoption and Extension event attendance. Compared to attending one event, attending three events increased total adoption by an average of one practice. Attending four or more events increased total adoption by two practices. Attending four or more events (compared to one event) increased the odds of adopting six individual practices by 3- to 6-fold, depending on the practice. This suggests that practice adoption could be enhanced by encouraging repeat attendance among past Extension event attendees. Manager experience was a statistically significant predictor of the number of Extension events attended but a poor direct predictor of practice adoption. Experience does not appear to increase adoption directly, but indirectly, via its impact on Extension event attendance. In addition to questions about weed management generally, the survey asked questions specifically about annual bluegrass management. Respondents were asked to rank seven sources of information for their helpfulness in managing annual bluegrass. There was no single dominant information source, but Extension was ranked more than any other source as the most helpful (by 22% of the respondents) and was ranked among the top three by 53%, closely behind field representative/local distributor sources at 54%.
Providing a logical framework for student learning, this is the first textbook on adversarial learning. It introduces vulnerabilities of deep learning, then demonstrates methods for defending against attacks and making AI generally more robust. To help students connect theory with practice, it explains and evaluates attack-and-defense scenarios alongside real-world examples. Feasible, hands-on student projects, which increase in difficulty throughout the book, give students practical experience and help to improve their Python and PyTorch skills. Book chapters conclude with questions that can be used for classroom discussions. In addition to deep neural networks, students will also learn about logistic regression, naïve Bayes classifiers, and support vector machines. Written for senior undergraduate and first-year graduate courses, the book offers a window into research methods and current challenges. Online resources include lecture slides and image files for instructors, and software for early course projects for students.
In this chapter, we address so-called “error generic” data poisoning (DP) attacks (hereafter called DP attacks) on classifiers. Unlike backdoor attacks, DP attacks aim to degrade overall classification accuracy. (Previous chapters were concerned with “error specific” DP attacks involving specific backdoor patterns and source and target classes for classification applications.) To effectively mislead classifier training using relatively few poisoned samples, an attacker introduces “feature collision” to the training samples by, for example, flipping the class labels of clean samples. Another possibility is to poison with synthetic data, not typical of any class. The information extracted from the clean and poisoned samples labeled to the same class (as well as from clean samples that originate from the same class as the (mislabeled) poisoned samples) is largely inconsistent, which prevents the learning of an accurate class decision boundary. We develop a BIC based framework for both detection and cleansing of such data poisoning. This method is compared with existing DP defenses for both image data domains and document classification domains.
In this chapter, we introduce the design of statistical anomaly detectors. We discuss types of data – continuous, discrete categorical, and discrete ordinal features – encountered in practice. We then discuss how to model such data, in particular to form a null model for statistical anomaly detection, with emphasis on mixture densities. The EM algorithm is developed for estimating the parameters of a mixture density. K-means is a specialization of EM for Gaussian mixtures. The Bayesian information criterion (BIC) is discussed and developed – widely used for estimating the number of components in a mixture density. We also discuss parsimonious mixtures, which economize on the number of model parameters in a mixture density (by sharing parameters across components). These models allow BIC to obtain accurate model order estimates even when the feature dimensionality is huge and the number of data samples is small (a case where BIC applied to traditional mixtures grossly underestimates the model order). Key performance measures are discussed, including true positive rate, false positive rate, and receiver operating characteristic (ROC) and associated area-under-the-curve (ROC AUC). The density models are used in attack detection defenses in Chapters 4 and 13. The detection performance measures are used throughout the book.
In this chapter we consider attacks that do not alter the machine learning model, but “fool” the classifier (plus supplementary defense, including human monitoring) into making erroneous decisions. These are known as test-time evasion attacks (TTEs). In addition to representing a threat, TTEs reveal the non-robustness of existing deep learning systems. One can alter the class decision made by the DNN by making small changes to the input, changes which would not alter the (robust) decision-making of a human being, for example performing visual pattern recognition. Thus, TTEs are a foil to claims that deep learning, currently, is achieving truly robust pattern recognition, let alone that it is close to achieving true artificial intelligence. Thus, TTEs are a spur to the machine learning community to devise more robust pattern recognition systems. We survey various TTE attacks, including FGSM, JSMA, and CW. We then survey several types of defenses, including anomaly detection as well as robust classifier training strategies. Experiments are included for anomaly detection defenses based on classical statistical anomaly detection, as well as a class-conditional generative adversarial network, which effectively learns to discriminate “normal” from adversarial samples, and without any supervision (no supervising attack examples).
In this chapter, we introduce attacks/threats against machine learning. A primary aim of an attack is to cause the neural network to make errors. An attack may target the training dataset (its integrity or privacy), the training process (deep learning), or the parameters of the DNN once trained. Alternatively, an attack may target vulnerabilities by discovering test samples that produce erroneous output. The attacks include: (i) TTEs, which make subtle changes to a test pattern, causing the classifier’s decision to change; (ii) data poisoning attacks, which corrupt the training set to degrade accuracy of the trained model; (iii) backdoor attacks, a special case of data poisoning where a subtle (backdoor) pattern is embedded into some training samples, with their supervising label altered, so the classifier learns to misclassify to a target class when the backdoor pattern is present; (iv) reverse-engineering attacks, which query a classifier to learn its decision-making rule; and (v) membership inference attacks, which seek information about the training set from queries to the classifier. Defenses aim to detect attacks and/or to proactively improve robustness of machine learning. An overview is given of the three main types of attacks (TTEs, data poisoning, and backdoors) investigated in subsequent chapters.
In this chapter, we focus on before/during training backdoor defense, where the defender is also the training authority, with control of the training process and responsibility for providing an accurate, backdoor-free DNN classifier. Deployment of a backdoor defense during training is supported by the fact that the training authority is usually more resourceful in both computation and storage than a downstream user of the trained classifier. Moreover, before/during training detection could be easier than post-training detection because the defender has access to the (possibly poisoned) training set and, thus, to samples that contain the backdoor pattern. However, before/during training detection is still highly challenging because it is unknown whether there is poisoning and, if so, which subset of samples (among many possible subsets) is poisoned. A detailed review of backdoor attacks (Trojans) is given, and optimization-based reverse-engineering defense for training set cleansing deployed before/during classifier training is described. The defense is designed to detect backdoor attacks on samples with a human-imperceptible backdoor pattern, as widely considered in existing attacks and defenses. Detection of training set poisoning is achieved by reverse engineering (estimating) the pattern of a putative backdoor attack, considering each class as the possible target class of an attack.
Previous chapters exclusively considered attacks against classifiers. In this chapter, we devise a backdoor attack and defense for deep regression or prediction models. Such models may be used to, for example, predict housing prices in an area given measured features, to estimate a city’s power consumption on a given day, or to price financial derivatives (where they replace complex equation solvers and vastly improve the speed of inference). The developed attack is made most effective by surrounding poisoned samples (with their mis-supervised target values) by clean samples, in order to localize the attack and thus make it evasive to detection. The developed defense involves the use of a kind of query-by-synthesis active learning which trades off depth (local error maximizers) and breadth of search. Both the developed attack and defense are evaluated for an application domain that involves the pricing of a simple (single barrier) financial option.
In this chapter we describe unsupervised post-training defenses that do not make explicit assumptions regarding the backdoor pattern or how it was incorporated into clean samples. These backdoor defenses aim to be “universal.” They do not produce an estimate of the backdoor pattern (which may be valuable information as the basis for detecting backdoor triggers at test time, the subject of Chapter 10). We start by describing a universal backdoor detector that does not require any clean labeled data. This approach optimizes over the input image to the DNN, seeking the input that yields the maximum margin (for each putative target class of an attack). The premise here, under a winner-take-all decision rule, is that backdoors produce much larger classifier margins than those of un-attacked examples. Then a universal backdoor mitigation strategy is described that does leverage a small clean dataset. This optimizes a threshold (tamping down unusually large ReLU activations) for each neuron in the network. In each backdoor attack scenario described, different detection and mitigation strategies are compared, where some mitigation strategies are also known as “unlearning” defenses. Some universal backdoor defenses modify or augment the DNN itself, while others do not.
In this chapter we focus on post-training defense against backdoor data poisoning (Trojans). The defender has access to the trained DNN but not to the training set. The following are examples. (i) Proprietary: a customized DNN model purchased by government or a company without data rights and without training set access. (ii) Legacy: the data is long forgotten or not maintained. (iii) Cell phone apps: the user has no access to the training set for the app classifier. It is also assumed that a clean labeled dataset (no backdoor poisoning) is available with a small number of examples from each of the classes from the domain. This clean labeled dataset is insufficient for retraining and its small size makes its availability a reasonable assumption. Reverse-engineering defenses (REDs) are described including one that estimates putative backdoor patterns for each candidate (source class, target class) backdoor pair and then assesses an order statistic p-value on the sizes of these perturbations. This is successful at detecting subtle backdoor patterns, including sparse patterns involving few pixels, and global patterns where many pixels are modified subtly. A computationally efficient variant is presented. The method addresses additive backdoor embeddings and other embedding functions.