Skip to main content

Showing 1–15 of 15 results for author: Leslie, N

.
  1. arXiv:2401.04175  [pdf, other

    gr-qc astro-ph.HE

    A Gravitational Waveform Model for Detecting Accelerating Inspiraling Binaries

    Authors: Malcolm Lazarow, Nathaniel Leslie, Liang Dai

    Abstract: We present an analytic frequency-domain gravitational waveform model for an inspiraling binary whose center-of-mass undergoes a small acceleration, assumed to be constant during the detection, such as when it orbits a distant tertiary mass. The center-of-mass acceleration along the line of sight is incorporated as a new parameter that perturbs the standard TaylorF2 model. We calculate the wave pha… ▽ More

    Submitted 26 March, 2024; v1 submitted 8 January, 2024; originally announced January 2024.

    Comments: 12 pages, 3 figures, 2 tables

  2. arXiv:2301.01336  [pdf, other

    cs.MA

    Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs

    Authors: Haoxiang Ma, Shuo Han, Nandi Leslie, Charles Kamhoua, Jie Fu

    Abstract: This paper investigates the problem of synthesizing proactive defense systems in which the defender can allocate deceptive targets and modify the cost of actions for the attacker who aims to compromise security assets in this system. We model the interaction of the attacker and the system using a formal security model -- a probabilistic attack graph. By allocating fake targets/decoys, the defender… ▽ More

    Submitted 3 January, 2023; originally announced January 2023.

    Comments: Submission to AAMAS 2023

  3. arXiv:2204.01584  [pdf, other

    math.OC cs.GT eess.SY

    Synthesizing Attack-Aware Control and Active Sensing Strategies under Reactive Sensor Attacks

    Authors: Sumukha Udupa, Abhishek N. Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu

    Abstract: We consider the probabilistic planning problem for a defender (P1) who can jointly query the sensors and take control actions to reach a set of goal states while being aware of possible sensor attacks by an adversary (P2) who has perfect observations. To synthesize a provably-correct, attack-aware joint control and active sensing strategy for P1, we construct a stochastic game on graph with augmen… ▽ More

    Submitted 29 November, 2022; v1 submitted 28 March, 2022; originally announced April 2022.

    Comments: 7 pages, 3 figure, 1 table, 1 algorithm

    Journal ref: LCSS vol.7(2022)265-270

  4. Mode-by-mode Relative Binning: Fast Likelihood Estimation for Gravitational Waveforms with Spin-Orbit Precession and Multiple Harmonics

    Authors: Nathaniel Leslie, Liang Dai, Geraint Pratten

    Abstract: Faster likelihood evaluation enhances the efficiency of gravitational wave signal analysis. We present Mode-by-mode Relative Binning (MRB), a new method designed for obtaining fast and accurate likelihoods for advanced waveform models that include spin-orbit precession effects and multiple radiation harmonics from compact binary coalescence. Leveraging the "twisting-up" procedure of constructing p… ▽ More

    Submitted 2 December, 2021; v1 submitted 20 September, 2021; originally announced September 2021.

    Comments: 15 pages, 5 figures, 1 table, 1 algorithm. Comments and feedback welcome!

  5. arXiv:2104.00176  [pdf, ps, other

    cs.CR cs.FL cs.GT

    Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness

    Authors: Abhishek N. Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu

    Abstract: We consider the probabilistic planning problem where the agent (called Player 1, or P1) can jointly plan the control actions and sensor queries in a sensor network and an attacker (called player 2, or P2) can carry out attacks on the sensors. We model such an adversarial interaction using a formal model -- a reachability game with partially controllable observation functions. The main contribution… ▽ More

    Submitted 2 May, 2021; v1 submitted 31 March, 2021; originally announced April 2021.

    Comments: 7 pages, 5 figures, Submitted to CDC2021; Revised Alg. 2 to fix a typo and notation, results unchanged

  6. arXiv:2101.09113  [pdf, ps, other

    cs.LG

    Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions

    Authors: Todd Huster, Jeremy E. J. Cohen, Zinan Lin, Kevin Chan, Charles Kamhoua, Nandi Leslie, Cho-Yu Jason Chiang, Vyas Sekar

    Abstract: Generative adversarial networks (GANs) are often billed as "universal distribution learners", but precisely what distributions they can represent and learn is still an open question. Heavy-tailed distributions are prevalent in many different domains such as financial risk-assessment, physics, and epidemiology. We observe that existing GAN architectures do a poor job of matching the asymptotic beha… ▽ More

    Submitted 22 January, 2021; originally announced January 2021.

  7. arXiv:2010.01208  [pdf, ps, other

    cs.GT cs.FL

    Decoy Allocation Games on Graphs with Temporal Logic Objectives

    Authors: Abhishek N. Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua, Nandi O. Leslie

    Abstract: We study a class of games, in which the adversary (attacker) is to satisfy a complex mission specified in linear temporal logic, and the defender is to prevent the adversary from achieving its goal. A deceptive defender can allocate decoys, in addition to defense actions, to create disinformation for the attacker. Thus, we focus on the problem of jointly synthesizing a decoy placement strategy and… ▽ More

    Submitted 2 October, 2020; originally announced October 2020.

    Comments: 20 page, 4 figures, 2 algorithms, Accepted at Conference on Decision and Game Theory for Security (GameSec) 2020

  8. Deceptive Labeling: Hypergames on Graphs for Stealthy Deception

    Authors: Abhishek N. Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu

    Abstract: With the increasing sophistication of attacks on cyber-physical systems, deception has emerged as an effective tool to improve system security and safety by obfuscating the attacker's perception. In this paper, we present a solution to the deceptive game in which a control agent is to satisfy a Boolean objective specified by a co-safe temporal logic formula in the presence of an adversary. The age… ▽ More

    Submitted 9 June, 2020; v1 submitted 10 April, 2020; originally announced April 2020.

    Comments: 6 page, 3 figures, submitted to CDC 2020/L-CSS

  9. arXiv:2002.07025  [pdf, other

    cs.GT cs.FL cs.LO

    Secure-by-synthesis network with active deception and temporal logic specifications

    Authors: Jie Fu, Abhishek N. Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua

    Abstract: This paper is concerned with the synthesis of strategies in network systems with active cyber deception. Active deception in a network employs decoy systems and other defenses to conduct defensive planning against the intrusion of malicious attackers who have been confirmed by sensing systems. In this setting, the defender's objective is to ensure the satisfaction of security properties specified… ▽ More

    Submitted 17 February, 2020; originally announced February 2020.

    Comments: 16 pages, 9 figures

  10. arXiv:1908.03435  [pdf

    stat.AP

    Discovering a Regularity: the Case of An 800-year Law of Advances in Small-Arms Technologies

    Authors: Alexander Kott, Philip Perconti, Nandi Leslie

    Abstract: Considering a broad family of technologies where a measure of performance (MoP) is difficult or impossible to formulate, we seek an alternative measure that exhibits a regular pattern of evolution over time, similar to how a MoP may follow a Moore's law. In an empirical case study, we explore an approach to identifying such a composite measure called a Figure of Regularity (FoR). We use the propos… ▽ More

    Submitted 9 August, 2019; originally announced August 2019.

    Comments: under review, Technology Analysis and Strategic Management journal

  11. arXiv:1905.04833  [pdf, other

    cs.AI cs.CR cs.GT cs.LG

    Learning and Planning in the Feature Deception Problem

    Authors: Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles Kamhoua, Fei Fang

    Abstract: Today's high-stakes adversarial interactions feature attackers who constantly breach the ever-improving security measures. Deception mitigates the defender's loss by misleading the attacker to make suboptimal decisions. In order to formally reason about deception, we introduce the feature deception problem (FDP), a domain-independent model and present a learning and planning framework for finding… ▽ More

    Submitted 8 June, 2020; v1 submitted 12 May, 2019; originally announced May 2019.

  12. arXiv:1903.02655  [pdf, other

    quant-ph

    Maximal LELM Distinguishability of Qubit and Qutrit Bell States Using Projective and Non-Projective Measurements

    Authors: Nathaniel Leslie, Julien Devin, Theresa W. Lynn

    Abstract: Numerous quantum information protocols make use of maximally entangled two-particle states, or Bell states, in which information is stored in the correlations between the two particles rather than their individual properties. Retrieving information stored in this way means distinguishing between different Bell states, yet the well known no-go theorem establishes that projective linear evolution an… ▽ More

    Submitted 4 April, 2019; v1 submitted 6 March, 2019; originally announced March 2019.

    Comments: 15 pages, 11 figures

  13. Statistical Models for the Number of Successful Cyber Intrusions

    Authors: Nandi O. Leslie, Richard E. Harang, Lawrence P. Knachel, Alexander Kott

    Abstract: We propose several generalized linear models (GLMs) to predict the number of successful cyber intrusions (or "intrusions") into an organization's computer network, where the rate at which intrusions occur is a function of the following observable characteristics of the organization: (i) domain name server (DNS) traffic classified by their top-level domains (TLDs); (ii) the number of network securi… ▽ More

    Submitted 14 January, 2019; originally announced January 2019.

    Journal ref: The Journal of Defense Modeling and Simulation, 15(1), 49-63

  14. arXiv:1804.07651  [pdf

    cs.CR

    Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization (NATO) Workshop IST-153

    Authors: Alexander Kott, Benjamin Blakely, Diane Henshel, Gregory Wehner, James Rowell, Nathaniel Evans, Luis Muñoz-González, Nandi Leslie, Donald W French, Donald Woodard, Kerry Krutilla, Amanda Joyce, Igor Linkov, Carmen Mas-Machuca, Janos Sztipanovits, Hugh Harney, Dennis Kergl, Perri Nejib, Edward Yakabovicz, Steven Noel, Tim Dudman, Pierre Trepagnier, Sowdagar Badesha, Alfred Møller

    Abstract: This report summarizes the discussions and findings of the 2017 North Atlantic Treaty Organization (NATO) Workshop, IST-153, on Cyber Resilience, held in Munich, Germany, on 23-25 October 2017, at the University of Bundeswehr. Despite continual progress in managing risks in the cyber domain, anticipation and prevention of all possible attacks and malfunctions are not feasible for the current or fu… ▽ More

    Submitted 20 April, 2018; originally announced April 2018.

    Report number: ARL-SR-0396

  15. arXiv:1804.07646  [pdf

    cs.CR

    Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG

    Authors: Alexander Kott, Ryan Thomas, Martin Drašar, Markus Kont, Alex Poylisher, Benjamin Blakely, Paul Theron, Nathaniel Evans, Nandi Leslie, Rajdeep Singh, Maria Rigaki, S Jay Yang, Benoit LeBlanc, Paul Losiewicz, Sylvain Hourlier, Misty Blowers, Hugh Harney, Gregory Wehner, Alessandro Guarino, Jana Komárková, James Rowell

    Abstract: This report summarizes the discussions and findings of the Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience organized by the NATO research group IST-152-RTG. The workshop was held in Prague, Czech Republic, on 18-20 October 2017. There is a growing recognition that future cyber defense should involve extensive use of partially autonomous agents that actively patrol the fr… ▽ More

    Submitted 20 April, 2018; originally announced April 2018.

    Report number: ARL-SR-0395