Skip to main content

Showing 1–20 of 20 results for author: Kuijper, M

.
  1. arXiv:2405.01584  [pdf, other

    cs.CL cs.LG eess.SP

    Lightweight Conceptual Dictionary Learning for Text Classification Using Information Compression

    Authors: Li Wan, Tansu Alpcan, Margreta Kuijper, Emanuele Viterbo

    Abstract: We propose a novel, lightweight supervised dictionary learning framework for text classification based on data compression and representation. This two-phase algorithm initially employs the Lempel-Ziv-Welch (LZW) algorithm to construct a dictionary from text datasets, focusing on the conceptual significance of dictionary elements. Subsequently, dictionaries are refined considering label data, opti… ▽ More

    Submitted 28 April, 2024; originally announced May 2024.

    Comments: 12 pages, TKDE format

  2. arXiv:1904.04237  [pdf, ps, other

    eess.SY

    An Unknown Input Multi-Observer Approach for Estimation and Control under Adversarial Attacks

    Authors: Tianci Yang, Carlos Murguia, Margreta Kuijper, Dragan Nesic

    Abstract: We address the problem of state estimation, attack isolation, and control of discrete-time linear time-invariant systems under (potentially unbounded) actuator and sensor false data injection attacks. Using a bank of unknown input observers, each observer leading to an exponentially stable estimation error (in the attack-free case), we propose an observer-based estimator that provides exponential… ▽ More

    Submitted 6 April, 2019; originally announced April 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1811.10159

  3. arXiv:1904.04236  [pdf, ps, other

    eess.SY

    A Multi-Observer Based Estimation Framework for Nonlinear Systems under Sensor Attacks

    Authors: Tianci Yang, Carlos Murguia, Margreta Kuijper, Dragan Nesic

    Abstract: We address the problem of state estimation and attack isolation for general discrete-time nonlinear systems when sensors are corrupted by (potentially unbounded) attack signals. For a large class of nonlinear plants and observers, we provide a general estimation scheme, built around the idea of sensor redundancy and multi-observer, capable of reconstructing the system state in spite of sensor atta… ▽ More

    Submitted 6 April, 2019; originally announced April 2019.

    Comments: arXiv admin note: text overlap with arXiv:1806.06484

  4. arXiv:1811.10159  [pdf, ps, other

    eess.SY

    An Unknown Input Multi-Observer Approach for Estimation, Attack Isolation, and Control of LTI Systems under Actuator Attacks

    Authors: Tianci Yang, Carlos Murguia, Margreta Kuijper, Dragan Nesic

    Abstract: We address the problem of state estimation, attack isolation, and control for discrete-time Linear Time Invariant (LTI) systems under (potentially unbounded) actuator false data injection attacks. Using a bank of Unknown Input Observers (UIOs), each observer leading to an exponentially stable estimation error in the attack-free case, we propose an estimator that provides exponential estimates of t… ▽ More

    Submitted 25 November, 2018; originally announced November 2018.

  5. arXiv:1806.06484  [pdf, ps, other

    eess.SY cs.CR

    A Multi-Observer Approach for Attack Detection and Isolation of Discrete-Time Nonlinear Systems

    Authors: Tianci Yang, Carlos Murguia, Margreta Kuijper, Dragan Nešić

    Abstract: We address the problem of attack detection and isolation for a class of discrete-time nonlinear systems under (potentially unbounded) sensor attacks and measurement noise. We consider the case when a subset of sensors is subject to additive false data injection attacks. Using a bank of observers, each observer leading to an Input-to-State Stable (ISS) estimation error, we propose two algorithms fo… ▽ More

    Submitted 2 January, 2019; v1 submitted 17 June, 2018; originally announced June 2018.

    Comments: arXiv admin note: text overlap with arXiv:1805.04242

  6. arXiv:1805.10824  [pdf, ps, other

    cs.CL

    UG18 at SemEval-2018 Task 1: Generating Additional Training Data for Predicting Emotion Intensity in Spanish

    Authors: Marloes Kuijper, Mike van Lenthe, Rik van Noord

    Abstract: The present study describes our submission to SemEval 2018 Task 1: Affect in Tweets. Our Spanish-only approach aimed to demonstrate that it is beneficial to automatically generate additional training data by (i) translating training data from other languages and (ii) applying a semi-supervised learning method. We find strong support for both approaches, with those models outperforming our regular… ▽ More

    Submitted 28 May, 2018; originally announced May 2018.

    Comments: Accepted at SemEval 2018

  7. arXiv:1805.04242  [pdf, ps, other

    eess.SP eess.SY

    A Robust Circle-criterion Observer-based Estimator for Discrete-time Nonlinear Systems in the Presence of Sensor Attacks and Measurement Noise

    Authors: Tianci Yang, Carlos Murguia, Margreta Kuijper, Dragan Nešić

    Abstract: We address the problem of robust state estimation of a class of discrete-time nonlinear systems with positive-slope nonlinearities when the sensors are corrupted by (potentially unbounded) attack signals and bounded measurement noise. We propose an observer-based estimator, using a bank of circle-criterion observers, which provides a robust estimate of the system state in spite of sensor attacks a… ▽ More

    Submitted 19 September, 2018; v1 submitted 11 May, 2018; originally announced May 2018.

    Comments: arXiv admin note: text overlap with arXiv:1806.06484

  8. arXiv:1711.05400  [pdf, other

    eess.SP eess.SY

    Linear system security -- detection and correction of adversarial attacks in the noise-free case

    Authors: Zhanghan Tang, Margreta Kuijper, Michelle Chong, Iven Mareels, Chris Leckie

    Abstract: We address the problem of attack detection and attack correction for multi-output discrete-time linear time-invariant systems under sensor attack. More specifically, we focus on the situation where adversarial attack signals are added to some of the system's output signals. A 'security index' is defined to characterize the vulnerability of a system against such sensor attacks. Methods to compute t… ▽ More

    Submitted 14 November, 2017; originally announced November 2017.

    Comments: 10 pages, 4 figures; this paper also submitted to Automatica in Nov 2017

  9. arXiv:1602.06594  [pdf, ps, other

    eess.SY cs.CR

    Vulnerability of linear systems against sensor attacks--a system's security index

    Authors: Michelle S. Chong, Margreta Kuijper

    Abstract: The `security index' of a discrete-time LTI system under sensor attacks is introduced as a quantitative measure on the security of an observable system. We derive ideas from error control coding theory to provide sufficient conditions for attack detection and correction.

    Submitted 21 February, 2016; originally announced February 2016.

    Comments: Submitted

    MSC Class: 93B35; 94B05

    Journal ref: Proceedings of MTNS 2016 (International Symposium on Mathematical Theory of Networks and Systems, July 2016, Minneapolis, USA), pp.373-376

  10. arXiv:1408.2303  [pdf, ps, other

    cs.IT

    Gabidulin Decoding via Minimal Bases of Linearized Polynomial Modules

    Authors: Anna-Lena Trautmann, Margreta Kuijper

    Abstract: We show how Gabidulin codes can be decoded via parametrization by using interpolation modules over the ring of linearized polynomials with composition. Our decoding algorithm computes a list of message words that correspond to all closest codewords to a given received word. This involves the computation of a minimal basis for the interpolation module that corresponds to the received word, followed… ▽ More

    Submitted 1 September, 2015; v1 submitted 11 August, 2014; originally announced August 2014.

  11. arXiv:1406.4600  [pdf, ps, other

    cs.SC cs.IT math.RA

    Gröbner Bases for Linearized Polynomials

    Authors: Margreta Kuijper, Anna-Lena Trautmann

    Abstract: In this work we develop the theory of Gröbner bases for modules over the ring of univariate linearized polynomials with coefficients from a finite field.

    Submitted 18 June, 2014; originally announced June 2014.

  12. arXiv:1405.7152  [pdf, ps, other

    cs.IT

    Iterative List-Decoding of Gabidulin Codes via Gröbner Based Interpolation

    Authors: Margreta Kuijper, Anna-Lena Trautmann

    Abstract: We show how Gabidulin codes can be list decoded by using an iterative parametrization approach. For a given received word, our decoding algorithm processes its entries one by one, constructing four polynomials at each step. This then yields a parametrization of interpolating solutions for the data so far. From the final result a list of all codewords that are closest to the received word with resp… ▽ More

    Submitted 28 May, 2014; originally announced May 2014.

    Comments: Submitted to IEEE Information Theory Workshop 2014 in Hobart, Australia

  13. arXiv:1404.5716  [pdf, ps, other

    cs.IT

    List-Decoding Gabidulin Codes via Interpolation and the Euclidean Algorithm

    Authors: Margreta Kuijper, Anna-Lena Trautmann

    Abstract: We show how Gabidulin codes can be list decoded by using a parametrization approach. For this we consider a certain module in the ring of linearized polynomials and find a minimal basis for this module using the Euclidean algorithm with respect to composition of polynomials. For a given received word, our decoding algorithm computes a list of all codewords that are closest to the received word wit… ▽ More

    Submitted 23 April, 2014; originally announced April 2014.

    Comments: Submitted to ISITA 2014, IEICE copyright upon acceptance

  14. arXiv:1403.2779  [pdf, ps, other

    cs.IT

    Erasure codes with simplex locality

    Authors: Margreta Kuijper, Diego Napp

    Abstract: We focus on erasure codes for distributed storage. The distributed storage setting imposes locality requirements because of easy repair demands on the decoder. We first establish the characterization of various locality properties in terms of the generator matrix of the code. These lead to bounds on locality and notions of optimality. We then examine the locality properties of a family of non-bina… ▽ More

    Submitted 11 March, 2014; originally announced March 2014.

    Comments: submitted in December 2013 to Mathematical Theory of Networks and Systems (MTNS) International Symposium 2014

    MSC Class: 11T71

    Journal ref: Proceedings of MTNS 2014 (21st International Symposium on Mathematical Theory of Networks and Systems, July 2014, Groningen, the Netherlands), pp.1606-1609

  15. An iterative algorithm for parametrization of shortest length shift registers over finite rings

    Authors: M. Kuijper, R. Pinto

    Abstract: The construction of shortest feedback shift registers for a finite sequence S_1,...,S_N is considered over the finite ring Z_{p^r}. A novel algorithm is presented that yields a parametrization of all shortest feedback shift registers for the sequence of numbers S_1,...,S_N, thus solving an open problem in the literature. The algorithm iteratively processes each number, starting with S_1, and const… ▽ More

    Submitted 27 January, 2012; originally announced January 2012.

    Comments: Submitted

    MSC Class: 94A55; 11T71

    Journal ref: Designs, Codes and Cryptography , pp. 1-23, 2016

  16. arXiv:1110.6698  [pdf, other

    cs.IT

    An algebraic approach to source coding with side information using list decoding

    Authors: Mortuza Ali, Margreta Kuijper

    Abstract: Existing literature on source coding with side information (SCSI) mostly uses the state-of-the-art channel codes namely LDPC codes, turbo codes, and their variants and assume classical unique decoding. In this paper, we present an algebraic approach to SCSI based on the list decoding of the underlying channel codes. We show that the theoretical limit of SCSI can be achieved in the proposed list de… ▽ More

    Submitted 31 October, 2011; originally announced October 2011.

    Comments: 14 Pages, 7 Figures. Submitted to IEEE Transactions on Information Theory

  17. A parametric approach to list decoding of Reed-Solomon codes using interpolation

    Authors: Mortuza Ali, Margreta Kuijper

    Abstract: In this paper we present a minimal list decoding algorithm for Reed-Solomon (RS) codes. Minimal list decoding for a code $C$ refers to list decoding with radius $L$, where $L$ is the minimum of the distances between the received word $\mathbf{r}$ and any codeword in $C$. We consider the problem of determining the value of $L$ as well as determining all the codewords at distance $L$. Our approach i… ▽ More

    Submitted 13 April, 2011; v1 submitted 3 November, 2010; originally announced November 2010.

    Comments: Corrected Definition 2.3. Accepted for publication in IEEE Transactions on Information Theory

    Journal ref: IEEE Transactions on Information Theory, vol. 57, no. 10, pp. 6718 - 6728, 2011

  18. arXiv:1001.2805  [pdf, other

    cs.IT

    Source Coding With Side Information Using List Decoding

    Authors: Mortuza Ali, Margreta Kuijper

    Abstract: The problem of source coding with side information (SCSI) is closely related to channel coding. Therefore, existing literature focuses on using the most successful channel codes namely, LDPC codes, turbo codes, and their variants, to solve this problem assuming classical unique decoding of the underlying channel code. In this paper, in contrast to classical decoding, we have taken the list decod… ▽ More

    Submitted 15 January, 2010; originally announced January 2010.

  19. arXiv:0906.4602  [pdf, ps, other

    cs.IT

    Minimal Gröbner bases and the predictable leading monomial property

    Authors: M. Kuijper, K. Schindelar

    Abstract: We focus on Gröbner bases for modules of univariate polynomial vectors over a ring. We identify a useful property, the "predictable leading monomial (PLM) property" that is shared by minimal Gröbner bases of modules in F[x]^q, no matter what positional term order is used. The PLM property is useful in a range of applications and can be seen as a strengthening of the wellknown predictable degree pr… ▽ More

    Submitted 26 May, 2010; v1 submitted 25 June, 2009; originally announced June 2009.

    Comments: 14 pages, submitted, shortened version

    Journal ref: Linear Algebra and its Applications, vol. 434, pages 104-116, 2011

  20. arXiv:0801.3703  [pdf, ps, other

    cs.IT

    On minimality of convolutional ring encoders

    Authors: Margreta Kuijper, Raquel Pinto

    Abstract: Convolutional codes are considered with code sequences modelled as semi-infinite Laurent series. It is wellknown that a convolutional code C over a finite group G has a minimal trellis representation that can be derived from code sequences. It is also wellknown that, for the case that G is a finite field, any polynomial encoder of C can be algebraically manipulated to yield a minimal polynomial… ▽ More

    Submitted 14 April, 2009; v1 submitted 24 January, 2008; originally announced January 2008.

    Comments: 13 pages in v1, submitted; 8 pages in revision v2

    Journal ref: IEEE Trans. Information Theory, Vol. 55, No. 11, pp. 4890-4897, November 2009