Skip to main content

Showing 1–6 of 6 results for author: Lebiere, C

.
  1. arXiv:2406.12147  [pdf, other

    cs.AI

    Metacognitive AI: Framework and the Case for a Neurosymbolic Approach

    Authors: Hua Wei, Paulo Shakarian, Christian Lebiere, Bruce Draper, Nikhil Krishnaswamy, Sergei Nirenburg

    Abstract: Metacognition is the concept of reasoning about an agent's own internal processes and was originally introduced in the field of developmental psychology. In this position paper, we examine the concept of applying metacognition to artificial intelligence. We introduce a framework for understanding metacognitive artificial intelligence (AI) that we call TRAP: transparency, reasoning, adaptation, and… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  2. arXiv:2312.03301  [pdf, other

    cs.SI physics.soc-ph

    Masking Behaviors in Epidemiological Networks with Cognitively-plausible Reinforcement Learning

    Authors: Konstantinos Mitsopoulos, Lawrence Baker, Christian Lebiere, Peter Pirolli, Mark Orr, Raffaele Vardavas

    Abstract: The COVID-19 pandemic highlighted the critical role of human behavior in influencing infectious disease transmission and the need for models capturing this complex dynamic. We present an agent-based model integrating an epidemiological simulation of disease spread with a cognitive architecture driving individual mask-wearing decisions. Agents decide whether to mask based on a utility function weig… ▽ More

    Submitted 6 December, 2023; originally announced December 2023.

    Comments: 12 pages, 6 figures

  3. arXiv:2311.16986  [pdf, other

    math.DS math.AP

    Multi-population opinion dynamics model

    Authors: Tigran Bakaryan, Yuliang Gu, Naira Hovakimyan, Tarek Abdelzaher, Christian Lebiere

    Abstract: We introduce multi-population opinion dynamics models linked to the bounded confidence model, aiming to explore how interactions between individuals contribute to the emergence of consensus, polarization, or fragmentation. Existing models either neglect agent similarities, sacrificing accuracy for scalability, or prioritize accuracy by introducing agent-wise connections, constraining scalability.… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

    Comments: 34 pages, 12 figures

    MSC Class: 35A01; 70E55

  4. arXiv:2203.10197  [pdf, other

    cs.SI

    Cost Function Learning in Memorized Social Networks with Cognitive Behavioral Asymmetry

    Authors: Yanbing Mao, **ing Li, Naira Hovakimyan, Tarek Abdelzaher, Christian Lebiere

    Abstract: This paper investigates the cost function learning in social information networks, wherein the influence of humans' memory on information consumption is explicitly taken into account. We first propose a model for social information-diffusion dynamics with a focus on systematic modeling of asymmetric cognitive bias, represented by confirmation bias and novelty bias. Building on the proposed social… ▽ More

    Submitted 28 October, 2022; v1 submitted 18 March, 2022; originally announced March 2022.

    Comments: 15 pages

  5. arXiv:1806.04658  [pdf

    cs.SI physics.soc-ph

    Social Networks through the Prism of Cognition

    Authors: Radosław Michalski, Bolesław K. Szymański, Przemysław Kazienko, Christian Lebiere, Omar Lizardo, Marcin Kulisiewicz

    Abstract: Human relations are driven by social events-people interact, exchange information, share knowledge and emotions, and gather news from mass media. These events leave traces in human memory, the strength of which depends on cognitive factors such as emotions or attention span. Each trace continuously weakens over time unless another related event activity strengthens it. Here, we introduce a novel c… ▽ More

    Submitted 22 January, 2021; v1 submitted 12 June, 2018; originally announced June 2018.

    Comments: 13 pages, 5 figures, reproductory code available

    Journal ref: Complexity, Vol. 2021, Article ID 4963903

  6. arXiv:1507.01930  [pdf, other

    cs.CR

    Malware Task Identification: A Data Driven Approach

    Authors: Eric Nunes, Casey Buto, Paulo Shakarian, Christian Lebiere, Stefano Bennati, Robert Thomson, Holger Jaenisch

    Abstract: Identifying the tasks a given piece of malware was designed to perform (e.g. logging keystrokes, recording video, establishing remote access, etc.) is a difficult and time-consuming operation that is largely human-driven in practice. In this paper, we present an automated method to identify malware tasks. Using two different malware collections, we explore various circumstances for each - includin… ▽ More

    Submitted 7 July, 2015; originally announced July 2015.

    Comments: 8 pages full paper, accepted FOSINT-SI (2015)