information flow analysis
Recently Published Documents


TOTAL DOCUMENTS

193
(FIVE YEARS 30)

H-INDEX

19
(FIVE YEARS 2)

2021 ◽  
pp. 1-23
Author(s):  
Erin Goddard ◽  
Thomas A. Carlson ◽  
Alexandra Woolgar

Abstract Attention can be deployed in different ways: When searching for a taxi in New York City, we can decide where to attend (e.g., to the street) and what to attend to (e.g., yellow cars). Although we use the same word to describe both processes, nonhuman primate data suggest that these produce distinct effects on neural tuning. This has been challenging to assess in humans, but here we used an opportunity afforded by multivariate decoding of MEG data. We found that attending to an object at a particular location and attending to a particular object feature produced effects that interacted multiplicatively. The two types of attention induced distinct patterns of enhancement in occipital cortex, with feature-selective attention producing relatively more enhancement of small feature differences and spatial attention producing relatively larger effects for larger feature differences. An information flow analysis further showed that stimulus representations in occipital cortex were Granger-caused by coding in frontal cortices earlier in time and that the timing of this feedback matched the onset of attention effects. The data suggest that spatial and feature-selective attention rely on distinct neural mechanisms that arise from frontal-occipital information exchange, interacting multiplicatively to selectively enhance task-relevant information.


2021 ◽  
Author(s):  
John H. Castellanos ◽  
Martin Ochoa ◽  
Alvaro A. Cardenas ◽  
Owen Arden ◽  
Jianying ZHOU

2021 ◽  
Vol 15 ◽  
Author(s):  
Tie Liang ◽  
Qingyu Zhang ◽  
Lei Hong ◽  
Xiaoguang Liu ◽  
Bin Dong ◽  
...  

As a common neurophysiological phenomenon, voluntary muscle fatigue is accompanied by changes in both the central nervous system and peripheral muscles. Considering the effectiveness of the muscle network and the functional corticomuscular coupling (FCMC) in analyzing motor function, muscle fatigue can be analyzed by quantitating the intermuscular coupling and corticomuscular coupling. However, existing coherence-based research on muscle fatigue are limited by the inability of the coherence algorithm to identify the coupling direction, which cannot further reveal the underlying neural mechanism of muscle fatigue. To address this problem, we applied the time-delayed maximal information coefficient (TDMIC) method to quantitate the directional informational interaction in the muscle network and FCMC during a right-hand stabilized grip task. Eight healthy subjects were recruited to the present study. For the muscle networks, the beta-band information flow increased significantly due to muscle fatigue, and the information flow between the synergist muscles were stronger than that between the synergist and antagonist muscles. The information flow in the muscle network mainly flows to flexor digitorum superficialis (FDS), flexor carpi ulnar (FCU), and brachioradialis (BR). For the FCMC, muscle fatigue caused a significant decrease in the beta- and gamma-band bidirectional information flow. Further analysis revealed that the beta-band information flow was significantly stronger in the descending direction [electroencephalogram (EEG) to surface electromyography (sEMG)] than that in the ascending direction (sEMG to EEG) during pre-fatigue tasks. After muscle fatigue, the beta-band information flow in the ascending direction was significantly stronger than that in the descending direction. The present study demonstrates the influence of muscle fatigue on information flow in muscle networks and FCMC. We proposes that beta-band intermuscular and corticomuscular informational interaction plays an adjusting role in autonomous movement completion under muscle fatigue. Directed information flow analysis can be used as an effective method to explore the neural mechanism of muscle fatigue on the macroscopic scale.


2021 ◽  
pp. 1-41
Author(s):  
Abhishek Bichhawat ◽  
Vineet Rajani ◽  
Deepak Garg ◽  
Christian Hammer

Information flow control (IFC) has been extensively studied as an approach to mitigate information leaks in applications. A vast majority of existing work in this area is based on static analysis. However, some applications, especially on the Web, are developed using dynamic languages like JavaScript where static analyses for IFC do not scale well. As a result, there has been a growing interest in recent years to develop dynamic or runtime information flow analysis techniques. In spite of the advances in the field, runtime information flow analysis has not been at the helm of information flow security, one of the reasons being that the analysis techniques and the security property related to them (non-interference) over-approximate information flows (particularly implicit flows), generating many false positives. In this paper, we present a sound and precise approach for handling implicit leaks at runtime. In particular, we present an improvement and enhancement of the so-called permissive-upgrade strategy, which is widely used to tackle implicit leaks in dynamic information flow control. We improve the strategy’s permissiveness and generalize it. Building on top of it, we present an approach to handle implicit leaks when dealing with complex features like unstructured control flow and exceptions in higher-order languages. We explain how we address the challenge of handling unstructured control flow using immediate post-dominator analysis. We prove that our approach is sound and precise.


2021 ◽  
pp. 1-68
Author(s):  
Zhiwu Xu ◽  
Hongxu Chen ◽  
Alwen Tiu ◽  
Yang Liu ◽  
Kunal Sareen

We introduce a novel type system for enforcing secure information flow in an imperative language. Our work is motivated by the problem of statically checking potential information leakage in Android applications. To this end, we design a lightweight type system featuring Android permission model, where the permissions are statically assigned to applications and are used to enforce access control in the applications. We take inspiration from a type system by Banerjee and Naumann to allow security types to be dependent on the permissions of the applications. A novel feature of our type system is a typing rule for conditional branching induced by permission testing, which introduces a merging operator on security types, allowing more precise security policies to be enforced. The soundness of our type system is proved with respect to non-interference. A type inference algorithm is also presented for the underlying security type system, by reducing the inference problem to a constraint solving problem in the lattice of security types. In addition, a new way to represent our security types as reduced ordered binary decision diagrams is proposed.


2021 ◽  
Vol 9 ◽  
pp. 740-755
Author(s):  
Gongbo Tang ◽  
Philipp Rönchen ◽  
Rico Sennrich ◽  
Joakim Nivre

In this paper, we evaluate the translation of negation both automatically and manually, in English–German (EN–DE) and English– Chinese (EN–ZH). We show that the ability of neural machine translation (NMT) models to translate negation has improved with deeper and more advanced networks, although the performance varies between language pairs and translation directions. The accuracy of manual evaluation in EN→DE, DE→EN, EN→ZH, and ZH→EN is 95.7%, 94.8%, 93.4%, and 91.7%, respectively. In addition, we show that under-translation is the most significant error type in NMT, which contrasts with the more diverse error profile previously observed for statistical machine translation. To better understand the root of the under-translation of negation, we study the model’s information flow and training data. While our information flow analysis does not reveal any deficiencies that could be used to detect or fix the under-translation of negation, we find that negation is often rephrased during training, which could make it more difficult for the model to learn a reliable link between source and target negation. We finally conduct intrinsic analysis and extrinsic probing tasks on negation, showing that NMT models can distinguish negation and non-negation tokens very well and encode a lot of information about negation in hidden states but nevertheless leave room for improvement.


Sign in / Sign up

Export Citation Format

Share Document