-
Fair Artificial Currency Incentives in Repeated Weighted Congestion Games: Equity vs. Equality
Authors:
Leonardo Pedroso,
Andrea Agazzi,
W. P. M. H. Heemels,
Mauro Salazar
Abstract:
When users access shared resources in a selfish manner, the resulting societal cost and perceived users' cost is often higher than what would result from a centrally coordinated optimal allocation. While several contributions in mechanism design manage to steer the aggregate users choices to the desired optimum by using monetary tolls, such approaches bear the inherent drawback of discriminating a…
▽ More
When users access shared resources in a selfish manner, the resulting societal cost and perceived users' cost is often higher than what would result from a centrally coordinated optimal allocation. While several contributions in mechanism design manage to steer the aggregate users choices to the desired optimum by using monetary tolls, such approaches bear the inherent drawback of discriminating against users with a lower income. More recently, incentive schemes based on artificial currencies have been studied with the goal of achieving a system-optimal resource allocation that is also fair. In this resource-sharing context, this paper focuses on repeated weighted congestion game with two resources, where users contribute to the congestion to different extents that are captured by individual weights. First, we address the broad concept of fairness by providing a rigorous mathematical characterization of the distinct societal metrics of equity and equality, i.e., the concepts of providing equal outcomes and equal opportunities, respectively. Second, we devise weight-dependent and time-invariant optimal pricing policies to maximize equity and equality, and prove convergence of the aggregate user choices to the system-optimum. In our framework it is always possible to achieve system-optimal allocations with perfect equity, while the maximum equality that can be reached may not be perfect, which is also shown via numerical simulations.
△ Less
Submitted 6 March, 2024;
originally announced March 2024.
-
Scalable Bayesian inference for the generalized linear mixed model
Authors:
Samuel I. Berchuck,
Felipe A. Medeiros,
Sayan Mukherjee,
Andrea Agazzi
Abstract:
The generalized linear mixed model (GLMM) is a popular statistical approach for handling correlated data, and is used extensively in applications areas where big data is common, including biomedical data settings. The focus of this paper is scalable statistical inference for the GLMM, where we define statistical inference as: (i) estimation of population parameters, and (ii) evaluation of scientif…
▽ More
The generalized linear mixed model (GLMM) is a popular statistical approach for handling correlated data, and is used extensively in applications areas where big data is common, including biomedical data settings. The focus of this paper is scalable statistical inference for the GLMM, where we define statistical inference as: (i) estimation of population parameters, and (ii) evaluation of scientific hypotheses in the presence of uncertainty. Artificial intelligence (AI) learning algorithms excel at scalable statistical estimation, but rarely include uncertainty quantification. In contrast, Bayesian inference provides full statistical inference, since uncertainty quantification results automatically from the posterior distribution. Unfortunately, Bayesian inference algorithms, including Markov Chain Monte Carlo (MCMC), become computationally intractable in big data settings. In this paper, we introduce a statistical inference algorithm at the intersection of AI and Bayesian inference, that leverages the scalability of modern AI algorithms with guaranteed uncertainty quantification that accompanies Bayesian inference. Our algorithm is an extension of stochastic gradient MCMC with novel contributions that address the treatment of correlated data (i.e., intractable marginal likelihood) and proper posterior variance estimation. Through theoretical and empirical results we establish our algorithm's statistical inference properties, and apply the method in a large electronic health records database.
△ Less
Submitted 16 April, 2024; v1 submitted 5 March, 2024;
originally announced March 2024.
-
Random Splitting of Point Vortex Flows
Authors:
Andrea Agazzi,
Francesco Grotto,
Jonathan C. Mattingly
Abstract:
We consider a stochastic version of the point vortex system, in which the fluid velocity advects single vortices intermittently for small random times. Such system converges to the deterministic point vortex dynamics as the rate at which single components of the vector field are randomly switched diverges, and therefore it provides an alternative discretization of 2D Euler equations. The random vo…
▽ More
We consider a stochastic version of the point vortex system, in which the fluid velocity advects single vortices intermittently for small random times. Such system converges to the deterministic point vortex dynamics as the rate at which single components of the vector field are randomly switched diverges, and therefore it provides an alternative discretization of 2D Euler equations. The random vortex system we introduce preserves microcanonical statistical ensembles of the point vortex system, hence constituting a simpler alternative to the latter in the statistical mechanics approach to 2D turbulence.
△ Less
Submitted 27 November, 2023;
originally announced November 2023.
-
Global Optimality of Elman-type RNN in the Mean-Field Regime
Authors:
Andrea Agazzi,
Jianfeng Lu,
Sayan Mukherjee
Abstract:
We analyze Elman-type Recurrent Reural Networks (RNNs) and their training in the mean-field regime. Specifically, we show convergence of gradient descent training dynamics of the RNN to the corresponding mean-field formulation in the large width limit. We also show that the fixed points of the limiting infinite-width dynamics are globally optimal, under some assumptions on the initialization of th…
▽ More
We analyze Elman-type Recurrent Reural Networks (RNNs) and their training in the mean-field regime. Specifically, we show convergence of gradient descent training dynamics of the RNN to the corresponding mean-field formulation in the large width limit. We also show that the fixed points of the limiting infinite-width dynamics are globally optimal, under some assumptions on the initialization of the weights. Our results establish optimality for feature-learning with wide RNNs in the mean-field regime
△ Less
Submitted 12 March, 2023;
originally announced March 2023.
-
Random Splitting of Fluid Models: Positive Lyapunov Exponents
Authors:
Andrea Agazzi,
Jonathan C. Mattingly,
Omar Melikechi
Abstract:
In this paper we give sufficient conditions for random splitting systems to have a positive top Lyapunov exponent. We verify these conditions for random splittings of two fluid models: the conservative Lorenz-96 equations and Galerkin approximations of the 2D Euler equations on the torus. In doing so, we highlight particular structures in these equations such as shearing. Since a positive top Lyap…
▽ More
In this paper we give sufficient conditions for random splitting systems to have a positive top Lyapunov exponent. We verify these conditions for random splittings of two fluid models: the conservative Lorenz-96 equations and Galerkin approximations of the 2D Euler equations on the torus. In doing so, we highlight particular structures in these equations such as shearing. Since a positive top Lyapunov exponent is an indicator of chaos which in turn is a feature of turbulence, our results show these randomly split fluid models have important characteristics of turbulent flow.
△ Less
Submitted 27 November, 2023; v1 submitted 6 October, 2022;
originally announced October 2022.
-
Random Splitting of Fluid Models: Ergodicity and Convergence
Authors:
Andrea Agazzi,
Jonathan C. Mattingly,
Omar Melikechi
Abstract:
We introduce a family of stochastic models motivated by the study of nonequilibrium steady states of fluid equations. These models decompose the deterministic dynamics of interest into fundamental building blocks, i.e., minimal vector fields preserving some fundamental aspects of the original dynamics. Randomness is injected by sequentially following each vector field for a random amount of time.…
▽ More
We introduce a family of stochastic models motivated by the study of nonequilibrium steady states of fluid equations. These models decompose the deterministic dynamics of interest into fundamental building blocks, i.e., minimal vector fields preserving some fundamental aspects of the original dynamics. Randomness is injected by sequentially following each vector field for a random amount of time. We show under general assumptions that these random dynamics possess a unique invariant measure and converge almost surely to the original, deterministic model in the small noise limit. We apply our construction to the Lorenz-96 equations, often used in studies of chaos and data assimilation, and Galerkin approximations of the 2D Euler and Navier-Stokes equations. An interesting feature of the models developed is that they apply directly to the conservative dynamics and not just those with excitation and dissipation.
△ Less
Submitted 1 October, 2022; v1 submitted 17 January, 2022;
originally announced January 2022.
-
A homotopic approach to policy gradients for linear quadratic regulators with nonlinear controls
Authors:
Craig Xu Chen,
Andrea Agazzi
Abstract:
We study the convergence of deterministic policy gradient algorithms in continuous state and action space for the prototypical Linear Quadratic Regulator (LQR) problem when the search space is not limited to the family of linear policies. We first provide a counterexample showing that extending the policy class to piecewise linear functions results in local minima of the policy gradient algorithm.…
▽ More
We study the convergence of deterministic policy gradient algorithms in continuous state and action space for the prototypical Linear Quadratic Regulator (LQR) problem when the search space is not limited to the family of linear policies. We first provide a counterexample showing that extending the policy class to piecewise linear functions results in local minima of the policy gradient algorithm. To solve this problem, we develop a new approach that involves sequentially increasing a discount factor between iterations of the original policy gradient algorithm. We finally prove that this homotopic variant of policy gradient methods converges to the global optimum of the undiscounted Linear Quadratic Regulator problem for a large class of Lipschitz, non-linear policies.
△ Less
Submitted 14 December, 2021;
originally announced December 2021.
-
Large deviations for Markov jump processes with uniformly diminishing rates
Authors:
Andrea Agazzi,
Luisa Andreis,
Robert I. A. Patterson,
D. R. Michiel Renger
Abstract:
We prove a large-deviation principle (LDP) for the sample paths of jump Markov processes in the small noise limit when, possibly, all the jump rates vanish uniformly, but slowly enough, in a region of the state space. We further discuss the optimality of our assumptions on the decay of the jump rates. As a direct application of this work we relax the assumptions needed for the application of LDPs…
▽ More
We prove a large-deviation principle (LDP) for the sample paths of jump Markov processes in the small noise limit when, possibly, all the jump rates vanish uniformly, but slowly enough, in a region of the state space. We further discuss the optimality of our assumptions on the decay of the jump rates. As a direct application of this work we relax the assumptions needed for the application of LDPs to, e.g., Chemical Reaction Network dynamics, where vanishing reaction rates arise naturally particularly the context of mass action kinetics.
△ Less
Submitted 25 February, 2021;
originally announced February 2021.
-
Urgency-aware Optimal Routing in Repeated Games through Artificial Currencies
Authors:
Mauro Salazar,
Dario Paccagnan,
Andrea Agazzi,
W. P. M. H.,
Heemels
Abstract:
When people choose routes minimizing their individual delay, the aggregate congestion can be much higher compared to that experienced by a centrally-imposed routing. Yet centralized routing is incompatible with the presence of self-interested agents. How can we reconcile the two? In this paper we address this question within a repeated game framework and propose a fair incentive mechanism based on…
▽ More
When people choose routes minimizing their individual delay, the aggregate congestion can be much higher compared to that experienced by a centrally-imposed routing. Yet centralized routing is incompatible with the presence of self-interested agents. How can we reconcile the two? In this paper we address this question within a repeated game framework and propose a fair incentive mechanism based on artificial currencies that routes selfish agents in a system-optimal fashion, while accounting for their temporal preferences. We instantiate the framework in a parallel-network whereby agents commute repeatedly (e.g., daily) from a common start node to the end node. Thereafter, we focus on the specific two-arcs case whereby, based on an artificial currency, the agents are charged when traveling on the first, fast arc, whilst they are rewarded when traveling on the second, slower arc. We assume the agents to be rational and model their choices through a game where each agent aims at minimizing a combination of today's discomfort, weighted by their urgency, and the average discomfort encountered for the rest of the period (e.g., a week). We show that, if prices of artificial currencies are judiciously chosen, the routing pattern converges to a system-optimal solution, while accommodating the agents' urgency. We complement our study through numerical simulations. Our results show that it is possible to achieve a system-optimal solution whilst reducing the agents' perceived discomfort by 14-20% when compared to a centralized optimal but urgency-unaware policy.
△ Less
Submitted 5 March, 2021; v1 submitted 23 November, 2020;
originally announced November 2020.
-
Global optimality of softmax policy gradient with single hidden layer neural networks in the mean-field regime
Authors:
Andrea Agazzi,
Jianfeng Lu
Abstract:
We study the problem of policy optimization for infinite-horizon discounted Markov Decision Processes with softmax policy and nonlinear function approximation trained with policy gradient algorithms. We concentrate on the training dynamics in the mean-field regime, modeling e.g., the behavior of wide single hidden layer neural networks, when exploration is encouraged through entropy regularization…
▽ More
We study the problem of policy optimization for infinite-horizon discounted Markov Decision Processes with softmax policy and nonlinear function approximation trained with policy gradient algorithms. We concentrate on the training dynamics in the mean-field regime, modeling e.g., the behavior of wide single hidden layer neural networks, when exploration is encouraged through entropy regularization. The dynamics of these models is established as a Wasserstein gradient flow of distributions in parameter space. We further prove global optimality of the fixed points of this dynamics under mild conditions on their initialization.
△ Less
Submitted 22 October, 2020;
originally announced October 2020.
-
Smart Home, security concerns of IoT
Authors:
Alessandro Ecclesie Agazzi
Abstract:
The IoT (Internet of Things) has become widely popular in the domestic environments. People are renewing their homes into smart homes; however, the privacy concerns of owning many Internet connected devices with always-on environmental sensors remain insufficiently addressed. Default and weak passwords, cheap materials and hardware, and unencrypted communication are identified as the principal thr…
▽ More
The IoT (Internet of Things) has become widely popular in the domestic environments. People are renewing their homes into smart homes; however, the privacy concerns of owning many Internet connected devices with always-on environmental sensors remain insufficiently addressed. Default and weak passwords, cheap materials and hardware, and unencrypted communication are identified as the principal threats and vulnerabilities of IoT devices. Solutions and countermeasures are also provided: choosing a strong password, strong authentication mechanisms, check online databases of exposed or default credentials to mitigate the first threat; a selection of smart home devices from reputable companies and the implementation of the SDN for the Dos/DDoS threat; and finally IDS, HTTPS protocol and VPN for eavesdrop**. The paper concludes dealing with a further challenge, "the lack of technical support", by which an auto-configuration approach should be analysed; this could both ease the installation/maintenance and enhance the security in the self configuration step of Smart Home devices.
△ Less
Submitted 6 July, 2020;
originally announced July 2020.
-
Business Email Compromise (BEC) and Cyberpsychology
Authors:
Alessandro Ecclesie Agazzi
Abstract:
The paper gives a brief introduction about what BEC (Business Email Compromise) is and why we should be concerned about. In addition, it presents 2 examples, Ubiquity and Peebles Media Group, which have been chosen to analyse the phenomena of BEC and underpin how universal BEC threat is for all companies. The psychology behind this scam has been, then, studied. In particular, the Big Five Framewor…
▽ More
The paper gives a brief introduction about what BEC (Business Email Compromise) is and why we should be concerned about. In addition, it presents 2 examples, Ubiquity and Peebles Media Group, which have been chosen to analyse the phenomena of BEC and underpin how universal BEC threat is for all companies. The psychology behind this scam has been, then, studied. In particular, the Big Five Framework has been analysed to understand how personality traits play an important role in Social Engineering-based attacks. Furthermore, the 6 basic principles of influence, by Cialdini, have been presented to show which strategies are adopted in such scam. The paper follows with the analysis of the BEC impacts, the incidents evaluation and, finally, with the description of some precautions, that companies should undertake in order to mitigate the likelihood of a Business Email Compromise.
△ Less
Submitted 5 July, 2020;
originally announced July 2020.
-
Study of the usability of LinkedIn: a social media platform meant to connect employers and employees
Authors:
Alessandro Ecclesie Agazzi
Abstract:
Social network platforms have increased and become very popular in the last decade; they allow people to create an online account to then interact with others creating a complicated net of connections. LinkedIn is one of the most used social media platform, created and used for professional purposes. Here, indeed, the user can either apply for job positions or join professional communities to deep…
▽ More
Social network platforms have increased and become very popular in the last decade; they allow people to create an online account to then interact with others creating a complicated net of connections. LinkedIn is one of the most used social media platform, created and used for professional purposes. Here, indeed, the user can either apply for job positions or join professional communities to deepen his own knowledge and expertise and be always up to date in the interested field. The primary objectives of this paper are assessing LinkedIn's usability, by using both user and expert evaluation and giving recommendations for the developer to improve this social network. This has been achieved through different steps; initially, feedbacks have been collected, via questionnaire, from direct users. Later, the usability issues, which have been underlined by users in the questionnaire, have been explored, by simulating user's problem-solving process, through Walkthrough. Finally, the overall usability of LinkedIn application has been measured by using SUS (System Usability Scale).
△ Less
Submitted 6 June, 2020;
originally announced June 2020.
-
Phishing and Spear Phishing: examples in Cyber Espionage and techniques to protect against them
Authors:
Alessandro Ecclesie Agazzi
Abstract:
Phishing attacks have become the most used technique in the online scams, initiating more than 91% of cyberattacks, from 2012 onwards. This study reviews how Phishing and Spear Phishing attacks are carried out by the phishers, through 5 steps which magnify the outcome, increasing the chance of success. The focus will be also given on four different layers of protection against these social enginee…
▽ More
Phishing attacks have become the most used technique in the online scams, initiating more than 91% of cyberattacks, from 2012 onwards. This study reviews how Phishing and Spear Phishing attacks are carried out by the phishers, through 5 steps which magnify the outcome, increasing the chance of success. The focus will be also given on four different layers of protection against these social engineering attacks, showing their strengths and weaknesses; the first and second layers consist of automated tools and decision-aid tools. the third one is users' knowledge and expertise to deal with potential threats. The last layer, defined as "external", will underline the importance of having a Multi-factor authentication, an effective way to provide an enhanced security, creating a further layer of protection against Phishing and Spear Phishing.
△ Less
Submitted 31 May, 2020;
originally announced June 2020.
-
Temporal-difference learning with nonlinear function approximation: lazy training and mean field regimes
Authors:
Andrea Agazzi,
Jianfeng Lu
Abstract:
We discuss the approximation of the value function for infinite-horizon discounted Markov Reward Processes (MRP) with nonlinear functions trained with the Temporal-Difference (TD) learning algorithm. We first consider this problem under a certain scaling of the approximating function, leading to a regime called lazy training. In this regime, the parameters of the model vary only slightly during th…
▽ More
We discuss the approximation of the value function for infinite-horizon discounted Markov Reward Processes (MRP) with nonlinear functions trained with the Temporal-Difference (TD) learning algorithm. We first consider this problem under a certain scaling of the approximating function, leading to a regime called lazy training. In this regime, the parameters of the model vary only slightly during the learning process, a feature that has recently been observed in the training of neural networks, where the scaling we study arises naturally, implicit in the initialization of their parameters. Both in the under- and over-parametrized frameworks, we prove exponential convergence to local, respectively global minimizers of the above algorithm in the lazy training regime. We then compare this scaling of the parameters to the mean-field regime, where the approximately linear behavior of the model is lost. Under this alternative scaling we prove that all fixed points of the dynamics in parameter space are global minimizers. We finally give examples of our convergence results in the case of models that diverge if trained with non-lazy TD learning, and in the case of neural networks.
△ Less
Submitted 11 August, 2021; v1 submitted 26 May, 2019;
originally announced May 2019.
-
Seemingly stable chemical kinetics can be stable, marginally stable, or unstable
Authors:
Andrea Agazzi,
Jonathan C. Mattingly
Abstract:
We present three examples of chemical reaction networks whose ordinary differential equation scaling limit are almost identical and in all cases stable. Nevertheless, the Markov jump processes associated to these reaction networks display the full range of behaviors: one is stable (positive recurrent), one is unstable (transient) and one is marginally stable (null recurrent). We study these differ…
▽ More
We present three examples of chemical reaction networks whose ordinary differential equation scaling limit are almost identical and in all cases stable. Nevertheless, the Markov jump processes associated to these reaction networks display the full range of behaviors: one is stable (positive recurrent), one is unstable (transient) and one is marginally stable (null recurrent). We study these differences and characterize the invariant measures by Lyapunov function techniques. In particular, we design a natural set of such functions which scale homogeneously to infinity, taking advantage of the same scaling behavior of the reaction rates.
△ Less
Submitted 15 October, 2018;
originally announced October 2018.
-
On the geometry of chemical reaction networks: Lyapunov function and large deviations
Authors:
Andrea Agazzi,
Amir Dembo,
Jean-Pierre Eckmann
Abstract:
In an earlier paper, we proved the validity of large deviations theory for the particle approximation of quite general chemical reaction networks (CRNs). In this paper, we extend its scope and present a more geometric insight into the mechanism of that proof, exploiting the notion of spherical image of the reaction polytope. This allows to view the asymptotic behavior of the vector field describin…
▽ More
In an earlier paper, we proved the validity of large deviations theory for the particle approximation of quite general chemical reaction networks (CRNs). In this paper, we extend its scope and present a more geometric insight into the mechanism of that proof, exploiting the notion of spherical image of the reaction polytope. This allows to view the asymptotic behavior of the vector field describing the mass-action dynamics of chemical reactions as the result of an interaction between the faces of this polytope in different dimensions. We also illustrate some local aspects of the problem in a discussion of Wentzell-Freidlin (WF) theory, together with some examples.
△ Less
Submitted 17 April, 2018; v1 submitted 19 October, 2017;
originally announced October 2017.
-
Large deviations theory for Markov jump models of chemical reaction networks
Authors:
Andrea Agazzi,
Amir Dembo,
Jean-Pierre Eckmann
Abstract:
We prove a sample path Large Deviation Principle (LDP) for a class of jump processes whose rates are not uniformly Lipschitz continuous in phase space. Building on it we further establish the corresponding Wentzell-Freidlin (W-F) (infinite time horizon) asymptotic theory. These results apply to jump Markov processes that model the dynamics of chemical reaction networks under mass action kinetics,…
▽ More
We prove a sample path Large Deviation Principle (LDP) for a class of jump processes whose rates are not uniformly Lipschitz continuous in phase space. Building on it we further establish the corresponding Wentzell-Freidlin (W-F) (infinite time horizon) asymptotic theory. These results apply to jump Markov processes that model the dynamics of chemical reaction networks under mass action kinetics, on a microscopic scale. We provide natural sufficient topological conditions for the applicability of our LDP and W-F results. This then justifies the computation of non-equilibrium potential and exponential transition time estimates between different attractors in the large volume limit, for systems that are beyond the reach of standard chemical reaction network theory.
△ Less
Submitted 22 October, 2017; v1 submitted 9 January, 2017;
originally announced January 2017.
-
Diffusion Fingerprints
Authors:
Jimmy Dubuisson,
Jean-Pierre Eckmann,
Andrea Agazzi
Abstract:
We introduce, test and discuss a method for classifying and clustering data modeled as directed graphs. The idea is to start diffusion processes from any subset of a data collection, generating corresponding distributions for reaching points in the network. These distributions take the form of high-dimensional numerical vectors and capture essential topological properties of the original dataset.…
▽ More
We introduce, test and discuss a method for classifying and clustering data modeled as directed graphs. The idea is to start diffusion processes from any subset of a data collection, generating corresponding distributions for reaching points in the network. These distributions take the form of high-dimensional numerical vectors and capture essential topological properties of the original dataset. We show how these diffusion vectors can be successfully applied for getting state-of-the-art accuracies in the problem of extracting pathways from metabolic networks. We also provide a guideline to illustrate how to use our method for classification problems, and discuss important details of its implementation. In particular, we present a simple dimensionality reduction technique that lowers the computational cost of classifying diffusion vectors, while leaving the predictive power of the classification process substantially unaltered. Although the method has very few parameters, the results we obtain show its flexibility and power. This should make it helpful in many other contexts.
△ Less
Submitted 25 June, 2015; v1 submitted 21 August, 2014;
originally announced August 2014.
-
The Colored Hofstadter Butterfly for the Honeycomb Lattice
Authors:
Andrea Agazzi,
Jean-Pierre Eckmann,
Gian Michele Graf
Abstract:
We rely on a recent method for determining edge spectra and we use it to compute the Chern numbers for Hofstadter models on the honeycomb lattice having rational magnetic flux per unit cell. Based on the bulk-edge correspondence, the Chern number $σ_H$ is given as the winding number of an eigenvector of a $2 \times 2$ transfer matrix, as a function of the quasi-momentum $k \in (0,2 π)$. This metho…
▽ More
We rely on a recent method for determining edge spectra and we use it to compute the Chern numbers for Hofstadter models on the honeycomb lattice having rational magnetic flux per unit cell. Based on the bulk-edge correspondence, the Chern number $σ_H$ is given as the winding number of an eigenvector of a $2 \times 2$ transfer matrix, as a function of the quasi-momentum $k \in (0,2 π)$. This method is computationally efficient (of order $O(n^4)$ in the resolution of the desired image). It also shows that for the honeycomb lattice the solution for $σ_H $ for flux $p/q$ in the $r$-th gap conforms with the Diophantine equation $r=σ_H\cdot p+ s\cdot q$, which determines $σ_H \mod q$. A window such as $σ_H \in(-q/2,q/2)$, or possibly shifted, provides a natural further condition for $σ_H$, which however turns out not to be met. Based on extensive numerical calculations, we conjecture that the solution conforms with the relaxed condition $σ_H\in(-q,q)$.
△ Less
Submitted 5 March, 2014;
originally announced March 2014.