-
Metacognitive AI: Framework and the Case for a Neurosymbolic Approach
Authors:
Hua Wei,
Paulo Shakarian,
Christian Lebiere,
Bruce Draper,
Nikhil Krishnaswamy,
Sergei Nirenburg
Abstract:
Metacognition is the concept of reasoning about an agent's own internal processes and was originally introduced in the field of developmental psychology. In this position paper, we examine the concept of applying metacognition to artificial intelligence. We introduce a framework for understanding metacognitive artificial intelligence (AI) that we call TRAP: transparency, reasoning, adaptation, and…
▽ More
Metacognition is the concept of reasoning about an agent's own internal processes and was originally introduced in the field of developmental psychology. In this position paper, we examine the concept of applying metacognition to artificial intelligence. We introduce a framework for understanding metacognitive artificial intelligence (AI) that we call TRAP: transparency, reasoning, adaptation, and perception. We discuss each of these aspects in-turn and explore how neurosymbolic AI (NSAI) can be leveraged to address challenges of metacognition.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
Masking Behaviors in Epidemiological Networks with Cognitively-plausible Reinforcement Learning
Authors:
Konstantinos Mitsopoulos,
Lawrence Baker,
Christian Lebiere,
Peter Pirolli,
Mark Orr,
Raffaele Vardavas
Abstract:
The COVID-19 pandemic highlighted the critical role of human behavior in influencing infectious disease transmission and the need for models capturing this complex dynamic. We present an agent-based model integrating an epidemiological simulation of disease spread with a cognitive architecture driving individual mask-wearing decisions. Agents decide whether to mask based on a utility function weig…
▽ More
The COVID-19 pandemic highlighted the critical role of human behavior in influencing infectious disease transmission and the need for models capturing this complex dynamic. We present an agent-based model integrating an epidemiological simulation of disease spread with a cognitive architecture driving individual mask-wearing decisions. Agents decide whether to mask based on a utility function weighting factors like peer conformity, personal risk tolerance, and mask-wearing discomfort. By conducting experiments systematically varying behavioral model parameters and social network structures, we demonstrate how adaptive decision-making interacts with network connectivity patterns to impact population-level infection outcomes. The model provides a flexible computational framework for gaining insights into how behavioral interventions like mask mandates may differentially influence disease spread across communities with diverse social structures. Findings highlight the importance of integrating realistic human decision processes in epidemiological models to inform policy decisions during public health crises.
△ Less
Submitted 6 December, 2023;
originally announced December 2023.
-
Multi-population opinion dynamics model
Authors:
Tigran Bakaryan,
Yuliang Gu,
Naira Hovakimyan,
Tarek Abdelzaher,
Christian Lebiere
Abstract:
We introduce multi-population opinion dynamics models linked to the bounded confidence model, aiming to explore how interactions between individuals contribute to the emergence of consensus, polarization, or fragmentation. Existing models either neglect agent similarities, sacrificing accuracy for scalability, or prioritize accuracy by introducing agent-wise connections, constraining scalability.…
▽ More
We introduce multi-population opinion dynamics models linked to the bounded confidence model, aiming to explore how interactions between individuals contribute to the emergence of consensus, polarization, or fragmentation. Existing models either neglect agent similarities, sacrificing accuracy for scalability, or prioritize accuracy by introducing agent-wise connections, constraining scalability. Our proposed model captures similarities between agents in scalable matter.
In our setting, agents similarities are defined by their group affiliations. Specifically, each sub-population is characterized by its distribution, and the closeness between two sub-populations is measured by the Wasserstein distance of their corresponding distributions. This leads to two mutually connected dynamics: micro, the individual-based dynamics, and the macro, the distribution-based one. The individual-wise interactions take into account the population-wise interactions (similarities), and the population-wise interactions are updated based on the individual-wise interactions.
We have proven the well-posedness of our models. Additionally, we conducted several simulations to mimic certain complex social phenomena.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
Cost Function Learning in Memorized Social Networks with Cognitive Behavioral Asymmetry
Authors:
Yanbing Mao,
**ing Li,
Naira Hovakimyan,
Tarek Abdelzaher,
Christian Lebiere
Abstract:
This paper investigates the cost function learning in social information networks, wherein the influence of humans' memory on information consumption is explicitly taken into account. We first propose a model for social information-diffusion dynamics with a focus on systematic modeling of asymmetric cognitive bias, represented by confirmation bias and novelty bias. Building on the proposed social…
▽ More
This paper investigates the cost function learning in social information networks, wherein the influence of humans' memory on information consumption is explicitly taken into account. We first propose a model for social information-diffusion dynamics with a focus on systematic modeling of asymmetric cognitive bias, represented by confirmation bias and novelty bias. Building on the proposed social model, we then propose the M$^{3}$IRL: a model and maximum-entropy based inverse reinforcement learning framework for learning the cost functions of target individuals in the memorized social networks. Compared with the existing Bayesian IRL, maximum entropy IRL, relative entropy IRL and maximum causal entropy IRL, the characteristics of M$^{3}$IRL are significantly different here: no dependency on the Markov Decision Process principle, the need of only a single finite-time trajectory sample, and bounded decision variables. Finally, the effectiveness of the proposed social information-diffusion model and the M$^{3}$IRL algorithm are validated by the online social media data.
△ Less
Submitted 28 October, 2022; v1 submitted 18 March, 2022;
originally announced March 2022.
-
Social Networks through the Prism of Cognition
Authors:
Radosław Michalski,
Bolesław K. Szymański,
Przemysław Kazienko,
Christian Lebiere,
Omar Lizardo,
Marcin Kulisiewicz
Abstract:
Human relations are driven by social events-people interact, exchange information, share knowledge and emotions, and gather news from mass media. These events leave traces in human memory, the strength of which depends on cognitive factors such as emotions or attention span. Each trace continuously weakens over time unless another related event activity strengthens it. Here, we introduce a novel c…
▽ More
Human relations are driven by social events-people interact, exchange information, share knowledge and emotions, and gather news from mass media. These events leave traces in human memory, the strength of which depends on cognitive factors such as emotions or attention span. Each trace continuously weakens over time unless another related event activity strengthens it. Here, we introduce a novel cognition-driven social network (CogSNet) model that accounts for cognitive aspects of social perception. The model explicitly represents each social interaction as a trace in human memory with its corresponding dynamics. The strength of the trace is the only measure of the influence that the interactions had on a person. For validation, we apply our model to NetSense data on social interactions among university students. The results show that CogSNet significantly improves the quality of modeling of human interactions in social networks.
△ Less
Submitted 22 January, 2021; v1 submitted 12 June, 2018;
originally announced June 2018.
-
Malware Task Identification: A Data Driven Approach
Authors:
Eric Nunes,
Casey Buto,
Paulo Shakarian,
Christian Lebiere,
Stefano Bennati,
Robert Thomson,
Holger Jaenisch
Abstract:
Identifying the tasks a given piece of malware was designed to perform (e.g. logging keystrokes, recording video, establishing remote access, etc.) is a difficult and time-consuming operation that is largely human-driven in practice. In this paper, we present an automated method to identify malware tasks. Using two different malware collections, we explore various circumstances for each - includin…
▽ More
Identifying the tasks a given piece of malware was designed to perform (e.g. logging keystrokes, recording video, establishing remote access, etc.) is a difficult and time-consuming operation that is largely human-driven in practice. In this paper, we present an automated method to identify malware tasks. Using two different malware collections, we explore various circumstances for each - including cases where the training data differs significantly from test; where the malware being evaluated employs packing to thwart analytical techniques; and conditions with sparse training data. We find that this approach consistently out-performs the current state-of-the art software for malware task identification as well as standard machine learning approaches - often achieving an unbiased F1 score of over 0.9. In the near future, we look to deploy our approach for use by analysts in an operational cyber-security environment.
△ Less
Submitted 7 July, 2015;
originally announced July 2015.