Skip to main content

Showing 1–28 of 28 results for author: Beling, P

.
  1. arXiv:2405.02989  [pdf, other

    cs.CR eess.SY

    Defense against Joint Poison and Evasion Attacks: A Case Study of DERMS

    Authors: Zain ul Abdeen, Padmaksha Roy, Ahmad Al-Tawaha, Rouxi Jia, Laura Freeman, Peter Beling, Chen-Ching Liu, Alberto Sangiovanni-Vincentelli, Ming **

    Abstract: There is an upward trend of deploying distributed energy resource management systems (DERMS) to control modern power grids. However, DERMS controller communication lines are vulnerable to cyberattacks that could potentially impact operational reliability. While a data-driven intrusion detection system (IDS) can potentially thwart attacks during deployment, also known as the evasion attack, the tra… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

  2. arXiv:2404.03775  [pdf, ps, other

    cs.LG cs.AI eess.SY

    A Systems Theoretic Approach to Online Machine Learning

    Authors: Anli du Preez, Peter A. Beling, Tyler Cody

    Abstract: The machine learning formulation of online learning is incomplete from a systems theoretic perspective. Typically, machine learning research emphasizes domains and tasks, and a problem solving worldview. It focuses on algorithm parameters, features, and samples, and neglects the perspective offered by considering system structure and system behavior or dynamics. Online learning is an active field… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: Accepted by the 18th Annual IEEE International Systems Conference (SysCon)

  3. arXiv:2404.03769  [pdf, ps, other

    cs.SE cs.LG eess.SY

    On Extending the Automatic Test Markup Language (ATML) for Machine Learning

    Authors: Tyler Cody, Bingtong Li, Peter A. Beling

    Abstract: This paper addresses the urgent need for messaging standards in the operational test and evaluation (T&E) of machine learning (ML) applications, particularly in edge ML applications embedded in systems like robots, satellites, and unmanned vehicles. It examines the suitability of the IEEE Standard 1671 (IEEE Std 1671), known as the Automatic Test Markup Language (ATML), an XML-based standard origi… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: Accepted by the 18th Annual IEEE International Systems Conference (SysCon)

  4. arXiv:2311.10786  [pdf, other

    cs.AI eess.SY

    A Systems-Theoretical Formalization of Closed Systems

    Authors: Niloofar Shadab, Tyler Cody, Alejandro Salado, Peter Beling

    Abstract: There is a lack of formalism for some key foundational concepts in systems engineering. One of the most recently acknowledged deficits is the inadequacy of systems engineering practices for engineering intelligent systems. In our previous works, we proposed that closed systems precepts could be used to accomplish a required paradigm shift for the systems engineering of intelligent systems. However… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: 11 pages, 3 figures

  5. arXiv:2302.14567  [pdf, other

    cs.LG stat.ML

    Active Learning with Combinatorial Coverage

    Authors: Sai Prathyush Katragadda, Tyler Cody, Peter Beling, Laura Freeman

    Abstract: Active learning is a practical field of machine learning that automates the process of selecting which data to label. Current methods are effective in reducing the burden of data labeling but are heavily model-reliant. This has led to the inability of sampled data to be transferred to new models as well as issues with sampling bias. Both issues are of crucial concern in machine learning deployment… ▽ More

    Submitted 28 February, 2023; originally announced February 2023.

    Comments: Accepted 2022 IEEE International Conference on Machine Learning and Applications (IEEE ICMLA)

  6. arXiv:2211.03027  [pdf, other

    cs.LG cs.CR cs.NI

    Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain

    Authors: Lanxiao Huang, Tyler Cody, Christopher Redino, Abdul Rahman, Akshay Kakkar, Deepak Kushwaha, Cheng Wang, Ryan Clark, Daniel Radke, Peter Beling, Edward Bowen

    Abstract: Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used to develop reward and state associated with determination of surveillance detection routes (SDR). This work extends previous efforts on develo** RL methods for path analysis within enterprise networks. This work focuses on building SDR where the routes focus on exploring the network services while… ▽ More

    Submitted 6 November, 2022; originally announced November 2022.

  7. arXiv:2208.02837  [pdf, other

    cs.AI eess.SY

    Core and Periphery as Closed-System Precepts for Engineering General Intelligence

    Authors: Tyler Cody, Niloofar Shadab, Alejandro Salado, Peter Beling

    Abstract: Engineering methods are centered around traditional notions of decomposition and recomposition that rely on partitioning the inputs and outputs of components to allow for component-level properties to hold after their composition. In artificial intelligence (AI), however, systems are often expected to influence their environments, and, by way of their environments, to influence themselves. Thus, i… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Comments: The 15th International Conference on Artificial General Intelligence (AGI-22)

  8. arXiv:2203.11414  [pdf, other

    cs.MA physics.soc-ph

    BESSIE: A Behavior and Epidemic Simulator for Use With Synthetic Populations

    Authors: Henning S Mortveit, Stephen Adams, Faraz Dadgostari, Samarth Swarup, Peter Beling

    Abstract: In this paper, we present BESSIE (Behavior and Epidemic Simulator for Synthetic Information Environments), an open source, agent-based simulator for COVID-type epidemics. BESSIE uses a synthetic population where each person has demographic attributes, belong to a household, and has a base activity- and visit schedule covering seven days. The simulated disease spreads through contacts that arise fr… ▽ More

    Submitted 21 March, 2022; originally announced March 2022.

    Comments: 24 pages; the git repository and accompanying data will be made openly available upon final journal publication

  9. arXiv:2201.12416  [pdf, other

    cs.CR cs.LG cs.NI

    Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs

    Authors: Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter Beling, Edward Bowen

    Abstract: Reinforcement learning (RL), in conjunction with attack graphs and cyber terrain, are used to develop reward and state associated with determination of optimal paths for exfiltration of data in enterprise networks. This work builds on previous crown jewels (CJ) identification that focused on the target goal of computing optimal paths that adversaries may traverse toward compromising CJs or hosts w… ▽ More

    Submitted 25 April, 2022; v1 submitted 28 January, 2022; originally announced January 2022.

    Comments: The 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022)

  10. arXiv:2108.00293  [pdf, other

    cs.LG cs.AI cs.GT

    Inverse Reinforcement Learning for Strategy Identification

    Authors: Mark Rucker, Stephen Adams, Roy Hayes, Peter A. Beling

    Abstract: In adversarial environments, one side could gain an advantage by identifying the opponent's strategy. For example, in combat games, if an opponents strategy is identified as overly aggressive, one could lay a trap that exploits the opponent's aggressive nature. However, an opponent's strategy is not always apparent and may need to be estimated from observations of their actions. This paper propose… ▽ More

    Submitted 31 July, 2021; originally announced August 2021.

    Comments: The paper has been accepted as a regular paper in IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2021

  11. arXiv:2107.01196  [pdf, other

    cs.LG eess.SY math.OC

    A Systems Theory of Transfer Learning

    Authors: Tyler Cody, Peter A. Beling

    Abstract: Existing frameworks for transfer learning are incomplete from a systems theoretic perspective. They place emphasis on notions of domain and task, and neglect notions of structure and behavior. In doing so, they limit the extent to which formalism can be carried through into the elaboration of their frameworks. Herein, we use Mesarovician systems theory to define transfer learning as a relation on… ▽ More

    Submitted 2 July, 2021; originally announced July 2021.

  12. Empirically Measuring Transfer Distance for System Design and Operation

    Authors: Tyler Cody, Stephen Adams, Peter A. Beling

    Abstract: Classical machine learning approaches are sensitive to non-stationarity. Transfer learning can address non-stationarity by sharing knowledge from one system to another, however, in areas like machine prognostics and defense, data is fundamentally limited. Therefore, transfer learning algorithms have little, if any, examples from which to learn. Herein, we suggest that these constraints on algorith… ▽ More

    Submitted 2 July, 2021; originally announced July 2021.

  13. Cyberphysical Security Through Resiliency: A Systems-centric Approach

    Authors: Cody Fleming, Carl Elks, Georgios Bakirtzis, Stephen C. Adams, Bryan Carter, Peter A. Beling, Barry Horowitz

    Abstract: Cyber-physical systems (CPS) are often defended in the same manner as information technology (IT) systems -- by using perimeter security. Multiple factors make such defenses insufficient for CPS. Resiliency shows potential in overcoming these shortfalls. Techniques for achieving resilience exist; however, methods and theory for evaluating resilience in CPS are lacking. We argue that such methods a… ▽ More

    Submitted 9 October, 2021; v1 submitted 29 November, 2020; originally announced November 2020.

  14. arXiv:2007.12306  [pdf, other

    cs.AI cs.LG cs.MA

    Value-Decomposition Multi-Agent Actor-Critics

    Authors: Jianyu Su, Stephen Adams, Peter A. Beling

    Abstract: The exploitation of extra state information has been an active research area in multi-agent reinforcement learning (MARL). QMIX represents the joint action-value using a non-negative function approximator and achieves the best performance, by far, on multi-agent benchmarks, StarCraft II micromanagement tasks. However, our experiments show that, in some cases, QMIX is incompatible with A2C, a train… ▽ More

    Submitted 18 December, 2020; v1 submitted 23 July, 2020; originally announced July 2020.

    Comments: Accepted by 35th AAAI Conference on Artificial Intelligence (AAAI 2021)

  15. An Ontological Metamodel for Cyber-Physical System Safety, Security, and Resilience Coengineering

    Authors: Georgios Bakirtzis, Tim Sherburne, Stephen Adams, Barry M. Horowitz, Peter A. Beling, Cody H. Fleming

    Abstract: System complexity has become ubiquitous in the design, assessment, and implementation of practical and useful cyber-physical systems. This increased complexity is impacting the management of models necessary for designing cyber-physical systems that are able to take into account a number of ``-ilities'', such that they are safe and secure and ultimately resilient to disruption of service. We propo… ▽ More

    Submitted 9 June, 2020; originally announced June 2020.

  16. arXiv:2004.00470  [pdf, other

    cs.AI cs.MA

    Counterfactual Multi-Agent Reinforcement Learning with Graph Convolution Communication

    Authors: Jianyu Su, Stephen Adams, Peter A. Beling

    Abstract: We consider a fully cooperative multi-agent system where agents cooperate to maximize a system's utility in a partial-observable environment. We propose that multi-agent systems must have the ability to (1) communicate and understand the inter-plays between agents and (2) correctly distribute rewards based on an individual agent's contribution. In contrast, most work in this setting considers only… ▽ More

    Submitted 28 December, 2020; v1 submitted 1 April, 2020; originally announced April 2020.

  17. arXiv:1911.09837  [pdf, other

    cs.LG cs.CV eess.SP

    Graph Convolution Networks for Probabilistic Modeling of Driving Acceleration

    Authors: Jianyu Su, Peter A. Beling, Rui Guo, Kyungtae Han

    Abstract: The ability to model and predict ego-vehicle's surrounding traffic is crucial for autonomous pilots and intelligent driver-assistance systems. Acceleration prediction is important as one of the major components of traffic prediction. This paper proposes novel approaches to the acceleration prediction problem. By representing spatial relationships between vehicles with a graph model, we build a gen… ▽ More

    Submitted 7 May, 2020; v1 submitted 21 November, 2019; originally announced November 2019.

    Comments: Accepted by ITSC 2020

  18. arXiv:1806.09795  [pdf, ps, other

    cs.LG cs.GT stat.ML

    Multi-agent Inverse Reinforcement Learning for Certain General-sum Stochastic Games

    Authors: Xiaomin Lin, Stephen C. Adams, Peter A. Beling

    Abstract: This paper addresses the problem of multi-agent inverse reinforcement learning (MIRL) in a two-player general-sum stochastic game framework. Five variants of MIRL are considered: uCS-MIRL, advE-MIRL, cooE-MIRL, uCE-MIRL, and uNE-MIRL, each distinguished by its solution concept. Problem uCS-MIRL is a cooperative game in which the agents employ cooperative strategies that aim to maximize the total g… ▽ More

    Submitted 10 October, 2019; v1 submitted 26 June, 2018; originally announced June 2018.

    Comments: 30 pages

    Journal ref: Journal of Artificial Intelligence Research 66 (2019), pp 473-502

  19. arXiv:1403.6822  [pdf, ps, other

    cs.LG cs.GT

    Comparison of Multi-agent and Single-agent Inverse Learning on a Simulated Soccer Example

    Authors: Xiaomin Lin, Peter A. Beling, Randy Cogill

    Abstract: We compare the performance of Inverse Reinforcement Learning (IRL) with the relative new model of Multi-agent Inverse Reinforcement Learning (MIRL). Before comparing the methods, we extend a published Bayesian IRL approach that is only applicable to the case where the reward is only state dependent to a general one capable of tackling the case where the reward depends on both state and action. Com… ▽ More

    Submitted 26 March, 2014; originally announced March 2014.

    Comments: arXiv admin note: text overlap with arXiv:1403.6508

  20. Multi-agent Inverse Reinforcement Learning for Two-person Zero-sum Games

    Authors: Xiaomin Lin, Peter A. Beling, Randy Cogill

    Abstract: The focus of this paper is a Bayesian framework for solving a class of problems termed multi-agent inverse reinforcement learning (MIRL). Compared to the well-known inverse reinforcement learning (IRL) problem, MIRL is formalized in the context of stochastic games, which generalize Markov decision processes to game theoretic scenarios. We establish a theoretical foundation for competitive two-agen… ▽ More

    Submitted 29 July, 2019; v1 submitted 25 March, 2014; originally announced March 2014.

    Journal ref: IEEE Transactions on Games 10(1) (2018) 56-68

  21. arXiv:1403.6248  [pdf, ps, other

    cs.IR cs.CY cs.LG

    Classroom Video Assessment and Retrieval via Multiple Instance Learning

    Authors: Qifeng Qiao, Peter A. Beling

    Abstract: We propose a multiple instance learning approach to content-based retrieval of classroom video for the purpose of supporting human assessing the learning environment. The key element of our approach is a map** between the semantic concepts of the assessment system and features of the video that can be measured using techniques from the fields of computer vision and speech analysis. We report on… ▽ More

    Submitted 25 March, 2014; originally announced March 2014.

    Journal ref: The 14th International Conference on Artificial Intelligence in Education 2011

  22. arXiv:1401.5424  [pdf

    cs.AI

    Real Time Strategy Language

    Authors: Roy Hayes, Peter Beling, William Scherer

    Abstract: Real Time Strategy (RTS) games provide complex domain to test the latest artificial intelligence (AI) research. In much of the literature, AI systems have been limited to playing one game. Although, this specialization has resulted in stronger AI gaming systems it does not address the key concerns of AI researcher. AI researchers seek the development of AI agents that can autonomously interpret le… ▽ More

    Submitted 21 January, 2014; originally announced January 2014.

  23. arXiv:1309.5946  [pdf, ps, other

    cs.GT

    A Complexity of double dummy bridge

    Authors: Piotr Beling

    Abstract: This paper presents an analysis of complexity of double dummy bridge. Values of both, a state-space (search-space) complexity and a game tree complexity have been estimated. ----- Oszacowanie złożoności problemu rozgrywki w otwarte karty w brydżu Artykuł zawiera analiz{\ke} złożoności problemu rozgrywki w otwarte karty w brydżu, przy użyciu miar zaproponowanych przez Louisa Victora Allisa. O… ▽ More

    Submitted 23 September, 2013; originally announced September 2013.

    Comments: 10 pages, in Polish

  24. arXiv:1309.1307  [pdf, ps, other

    cs.PL

    C++11 -- idea r-wartości i przenoszenia

    Authors: Piotr Beling

    Abstract: This paper presents a review of some new futures introduced to C++ language by ISO/IEC 14882:2011 standard (known as C++11). It describes the ideas of r-values and move constructors. ---- Niniejszy artykuł jest jednym z serii artykułów w których zawarto przegl{\ka}d nowych elementów j{\ke}zyka C++ wprowadzonych przez standard ISO/IEC 14882:2011, znany pod nazw{\ka} C++11. W artykule przedstawi… ▽ More

    Submitted 5 September, 2013; originally announced September 2013.

    Comments: 7 pages, in Polish

  25. arXiv:1304.7600  [pdf, ps, other

    cs.PL

    C++11 - określanie typów

    Authors: Piotr Beling

    Abstract: This paper presents a review of some new futures introduced to C++ language by ISO/IEC 14882:2011 standard (known as C++11). It describes new language elements which allow to easier expressed of types of variables: auto and decltype keywords, new function declaration syntax, and tools which are included in type_traits header. ----- Niniejszy artykuł jest jednym z serii artykułów w których zawa… ▽ More

    Submitted 29 April, 2013; originally announced April 2013.

    Comments: 6 pages, in Polish

  26. arXiv:1301.3630  [pdf, ps, other

    cs.LG

    Behavior Pattern Recognition using A New Representation Model

    Authors: Qifeng Qiao, Peter A. Beling

    Abstract: We study the use of inverse reinforcement learning (IRL) as a tool for the recognition of agents' behavior on the basis of observation of their sequential decision behavior interacting with the environment. We model the problem faced by the agents as a Markov decision process (MDP) and model the observed behavior of the agents in terms of forward planning for the MDP. We use IRL to learn reward fu… ▽ More

    Submitted 20 March, 2013; v1 submitted 16 January, 2013; originally announced January 2013.

  27. arXiv:1209.4771  [pdf, ps, other

    cs.DS

    Counting common substrings effectively

    Authors: Stanisław Goldstein, Piotr Beling

    Abstract: This article presents effective (dynamic) algorithm for solving a problem of counting the number of substrings of given string which are also substrings of second string. Presented algorithm can be used for example for quick calculation of strings similarity measure using generalized $n$-gram method (Niewiadomski measure), which are shown. Correctness and complexity analyses are included. -----… ▽ More

    Submitted 21 September, 2012; originally announced September 2012.

    Comments: 6 pages, in Polish

  28. arXiv:1208.2112  [pdf, ps, other

    cs.LG

    Inverse Reinforcement Learning with Gaussian Process

    Authors: Qifeng Qiao, Peter A. Beling

    Abstract: We present new algorithms for inverse reinforcement learning (IRL, or inverse optimal control) in convex optimization settings. We argue that finite-space IRL can be posed as a convex quadratic program under a Bayesian inference framework with the objective of maximum a posterior estimation. To deal with problems in large or even infinite state space, we propose a Gaussian process model and use pr… ▽ More

    Submitted 21 January, 2013; v1 submitted 10 August, 2012; originally announced August 2012.

    Comments: conferencel American Control Conference 2011