Skip to main content

Showing 1–21 of 21 results for author: Naghizadeh, P

.
  1. arXiv:2404.09247  [pdf, other

    cs.LG stat.ML

    Generalization Error Bounds for Learning under Censored Feedback

    Authors: Yifan Yang, Ali Payani, Parinaz Naghizadeh

    Abstract: Generalization error bounds from learning theory provide statistical guarantees on how well an algorithm will perform on previously unseen data. In this paper, we characterize the impacts of data non-IIDness due to censored feedback (a.k.a. selective labeling bias) on such bounds. We first derive an extension of the well-known Dvoretzky-Kiefer-Wolfowitz (DKW) inequality, which characterizes the ga… ▽ More

    Submitted 14 April, 2024; originally announced April 2024.

  2. arXiv:2402.06108  [pdf, other

    cs.GT eess.SY

    United We Fall: On the Nash Equilibria of Multiplex and Multilayer Network Games

    Authors: Raman Ebrahimi, Parinaz Naghizadeh

    Abstract: Network games provide a framework to study strategic decision making processes that are governed by structured interdependencies among agents. However, existing models do not account for environments in which agents simultaneously interact over multiple networks, or when agents operate over multiple action dimensions. In this paper, we propose new models of multiplex network games to capture the d… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  3. arXiv:2311.06731  [pdf, other

    cs.LG cs.AI

    An advantage based policy transfer algorithm for reinforcement learning with metrics of transferability

    Authors: Md Ferdous Alam, Parinaz Naghizadeh, David Hoelzle

    Abstract: Reinforcement learning (RL) can enable sequential decision-making in complex and high-dimensional environments if the acquisition of a new state-action pair is efficient, i.e., when interaction with the environment is inexpensive. However, there are a myriad of real-world applications in which a high number of interactions are infeasible. In these environments, transfer RL algorithms, which can be… ▽ More

    Submitted 11 November, 2023; originally announced November 2023.

  4. arXiv:2309.08050  [pdf, other

    eess.SY

    Robust Control Barrier Functions for Sampled-Data Systems

    Authors: Pradeep Sharma Oruganti, Parinaz Naghizadeh, Qadeer Ahmed

    Abstract: This paper studies the problem of safe control of sampled-data systems under bounded disturbance and measurement errors with piecewise-constant controllers. To achieve this, we first propose the High-Order Doubly Robust Control Barrier Function (HO-DRCBF) for continuous-time systems where the safety enforcing constraint is of relative degree 1 or higher. We then extend this formulation to sampled-… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

  5. arXiv:2302.05411  [pdf, other

    eess.SY

    The Impact of Network Design Interventions on the Security of Interdependent Systems

    Authors: Pradeep Sharma Oruganti, Parinaz Naghizadeh, Qadeer Ahmed

    Abstract: We study the problem of defending a Cyber-Physical System (CPS) consisting of interdependent components with heterogeneous sensitivity to investments. In addition to the optimal allocation of limited security resources, we analyze the impact of an orthogonal set of defense strategies in the form of network design interventions in the CPS to protect it against the attacker. We first propose an algo… ▽ More

    Submitted 10 February, 2023; originally announced February 2023.

  6. arXiv:2206.00137  [pdf, other

    cs.LG cs.CY

    Social Bias Meets Data Bias: The Impacts of Labeling and Measurement Errors on Fairness Criteria

    Authors: Yiqiao Liao, Parinaz Naghizadeh

    Abstract: Although many fairness criteria have been proposed to ensure that machine learning algorithms do not exhibit or amplify our existing social biases, these algorithms are trained on datasets that can themselves be statistically biased. In this paper, we investigate the robustness of a number of existing (demographic) fairness criteria when the algorithm is trained on biased data. We consider two for… ▽ More

    Submitted 2 May, 2023; v1 submitted 31 May, 2022; originally announced June 2022.

  7. arXiv:2110.13054  [pdf, other

    cs.LG cs.CY

    Adaptive Data Debiasing through Bounded Exploration

    Authors: Yifan Yang, Yang Liu, Parinaz Naghizadeh

    Abstract: Biases in existing datasets used to train algorithmic decision rules can raise ethical and economic concerns due to the resulting disparate treatment of different groups. We propose an algorithm for sequentially debiasing such datasets through adaptive and bounded exploration in a classification problem with costly and censored feedback. Exploration in this context means that at times, and to a ju… ▽ More

    Submitted 10 January, 2023; v1 submitted 25 October, 2021; originally announced October 2021.

    Comments: NeurIPS 2022

  8. arXiv:2109.14555  [pdf, other

    eess.SY

    The Impact of Network Design Interventions on CPS Security

    Authors: Pradeep Sharma Oruganti, Parinaz Naghizadeh, Qadeer Ahmed

    Abstract: We study a game-theoretic model of the interactions between a Cyber-Physical System's (CPS) operator (the defender) against an attacker who launches step**-stone attacks to reach critical assets within the CPS. We consider that, in addition to optimally allocating its security budget to protect the assets, the defender may choose to modify the CPS through network design interventions. In particu… ▽ More

    Submitted 29 September, 2021; originally announced September 2021.

  9. arXiv:2011.06933  [pdf, other

    cs.CR cs.AI cs.GT

    Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems

    Authors: Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi

    Abstract: We model the behavioral biases of human decision-making in securing interdependent systems and show that such behavioral decision-making leads to a suboptimal pattern of resource allocation compared to non-behavioral (rational) decision-making. We provide empirical evidence for the existence of such behavioral bias model through a controlled subject study with 145 participants. We then propose thr… ▽ More

    Submitted 22 November, 2020; v1 submitted 12 November, 2020; originally announced November 2020.

    Comments: Accepted to appear at the 16th ACM Asia Conference on Computer and Communications Security (ASIACCS), 2021. arXiv admin note: text overlap with arXiv:2004.01958

  10. arXiv:2007.14574  [pdf, ps, other

    cs.GT cs.CY cs.NI

    Paid Prioritization with Content Competition

    Authors: Parinaz Naghizadeh, Carlee Joe-Wong, Mung Chiang

    Abstract: We study the effects of allowing paid prioritization arrangements in a market with content provider (CP) competition. We consider competing CPs who pay prioritization fees to a monopolistic ISP so as to offset the ISP's cost for investing in infrastructure to support fast lanes. Unlike prior works, our proposed model of users' content consumption accounts for multi-purchasing (i.e., users simultan… ▽ More

    Submitted 28 July, 2020; originally announced July 2020.

  11. arXiv:2004.01958  [pdf, other

    cs.CR cs.GT

    BASCPS: How does behavioral decision making impact the security of cyber-physical systems?

    Authors: Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi

    Abstract: We study the security of large-scale cyber-physical systems (CPS) consisting of multiple interdependent subsystems, each managed by a different defender. Defenders invest their security budgets with the goal of thwarting the spread of cyber attacks to their critical assets. We model the security investment decisions made by the defenders as a security game. While prior work has used security games… ▽ More

    Submitted 7 April, 2020; v1 submitted 4 April, 2020; originally announced April 2020.

    Comments: 32 pages

  12. arXiv:2001.03213  [pdf, ps, other

    eess.SY cs.GT econ.GN

    Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs

    Authors: Mustafa Abdallah, Parinaz Naghizadeh, Ashish R. Hota, Timothy Cason, Saurabh Bagchi, Shreyas Sundaram

    Abstract: We consider a system consisting of multiple interdependent assets, and a set of defenders, each responsible for securing a subset of the assets against an attacker. The interdependencies between the assets are captured by an attack graph, where an edge from one asset to another indicates that if the former asset is compromised, an attack can be launched on the latter asset. Each edge has an associ… ▽ More

    Submitted 9 May, 2020; v1 submitted 9 January, 2020; originally announced January 2020.

  13. arXiv:2001.00090  [pdf, other

    cs.CY cs.DC eess.SY

    Resilient Cyberphysical Systems and their Application Drivers: A Technology Roadmap

    Authors: Somali Chaterji, Parinaz Naghizadeh, Muhammad Ashraful Alam, Saurabh Bagchi, Mung Chiang, David Corman, Brian Henz, Suman Jana, Na Li, Shaoshuai Mou, Meeko Oishi, Chunyi Peng, Tiark Rompf, Ashutosh Sabharwal, Shreyas Sundaram, James Weimer, Jennifer Weller

    Abstract: Cyberphysical systems (CPS) are ubiquitous in our personal and professional lives, and they promise to dramatically improve micro-communities (e.g., urban farms, hospitals), macro-communities (e.g., cities and metropolises), urban structures (e.g., smart homes and cars), and living structures (e.g., human bodies, synthetic genomes). The question that we address in this article pertains to designin… ▽ More

    Submitted 19 December, 2019; originally announced January 2020.

    Comments: 36 pages, 2 figures, NSF-supported workshop on Grand Challenges in Resilience, held at Purdue, March 20-21, 2019

    MSC Class: C.5.3; D.4.5; H.4.0 ACM Class: C.5.3; D.4.5; H.4.0

  14. arXiv:1810.07608  [pdf, other

    cs.GT

    Adversarial Contract Design for Private Data Commercialization

    Authors: Parinaz Naghizadeh, Arunesh Sinha

    Abstract: The proliferation of data collection and machine learning techniques has created an opportunity for commercialization of private data by data aggregators. In this paper, we study this data monetization problem using a contract-theoretic approach. Our proposed adversarial contract design framework accounts for the heterogeneity in honest buyers' demands for data, as well as the presence of adversar… ▽ More

    Submitted 17 October, 2018; originally announced October 2018.

  15. arXiv:1611.09763  [pdf, ps, other

    math.OC cs.GT

    A Reputation-Based Contract for Repeated Crowdsensing with Costly Verification

    Authors: Donya G. Dobakhshari, Parinaz Naghizadeh, Mingyan Liu, Vijay Gupta

    Abstract: We study a setup in which a system operator hires a sensor to exert costly effort to collect accurate measurements of a value of interest over time. At each time, the sensor is asked to report his observation to the operator, and is compensated based on the accuracy of this observation. Since both the effort and observation are private information for the sensor, a naive payment scheme which compe… ▽ More

    Submitted 20 February, 2017; v1 submitted 29 November, 2016; originally announced November 2016.

    Comments: 8 pages

  16. arXiv:1604.08910  [pdf, other

    cs.GT cs.SI

    Provision of Public Goods on Networks: On Existence, Uniqueness, and Centralities

    Authors: Parinaz Naghizadeh, Mingyan Liu

    Abstract: We consider the provision of public goods on networks of strategic agents. We study different effort outcomes of these network games, namely, the Nash equilibria, Pareto efficient effort profiles, and semi-cooperative equilibria (effort profiles resulting from interactions among coalitions of agents). We identify necessary and sufficient conditions on the structure of the network for the uniquenes… ▽ More

    Submitted 18 May, 2016; v1 submitted 29 April, 2016; originally announced April 2016.

  17. arXiv:1604.04871  [pdf, ps, other

    cs.GT cs.CR

    Using Private and Public Assessments in Security Information Sharing Agreements

    Authors: Parinaz Naghizadeh, Mingyan Liu

    Abstract: Information sharing among organizations has been gaining attention as a method for improving cybersecurity. However, the associated disclosure costs act as deterrents for firms' voluntary cooperation. In this work, we take a game-theoretic approach to understanding firms' incentives in these agreements. We propose the design of inter-temporal incentives (i.e. conditioning future cooperation on pas… ▽ More

    Submitted 16 January, 2020; v1 submitted 17 April, 2016; originally announced April 2016.

    Comments: To appear in the IEEE Transactions on Information Forensics and Security (IEEE TIFS)

  18. arXiv:1503.07377  [pdf, ps, other

    cs.GT

    A Tale of Two Mechanisms: Incentivizing Investments in Security Games

    Authors: Parinaz Naghizadeh, Mingyan Liu

    Abstract: In a system of interdependent users, the security of an entity is affected not only by that user's investment in security measures, but also by the positive externality of the security decisions of (some of) the other users. The provision of security in such system is therefore modeled as a public good provision problem, and is referred to as a security game. In this paper, we compare two well-kno… ▽ More

    Submitted 25 March, 2015; originally announced March 2015.

    Comments: 45 pages, 7 figures

  19. arXiv:1308.0979  [pdf, ps, other

    cs.GT cs.CR

    Closing the Price of Anarchy Gap in the Interdependent Security Game

    Authors: Parinaz Naghizadeh, Mingyan Liu

    Abstract: The reliability and security of a user in an interconnected system depends on all users' collective effort in security. Consequently, investments in security technologies by strategic users is typically modeled as a public good problem, known as the Interdependent Security (IDS) game. The equilibria for such games are often inefficient, as selfish users free-ride on positive externalities of other… ▽ More

    Submitted 26 August, 2014; v1 submitted 5 August, 2013; originally announced August 2013.

    Comments: 8 pages, 1 figure

  20. arXiv:1307.6528  [pdf, ps, other

    cs.GT cs.SI physics.soc-ph

    Incentives, Quality, and Risks: A Look Into the NSF Proposal Review Pilot

    Authors: Parinaz Naghizadeh, Mingyan Liu

    Abstract: The National Science Foundation (NSF) will be experimenting with a new distributed approach to reviewing proposals, whereby a group of principal investigators (PIs) or proposers in a subfield act as reviewers for the proposals submitted by the same set of PIs. To encourage honesty, PIs' chances for getting funded are tied to the quality of their reviews (with respect to the reviews provided by the… ▽ More

    Submitted 24 July, 2013; originally announced July 2013.

    Comments: 10 pages, 14 figures

  21. arXiv:1306.0173  [pdf, other

    cs.GT

    Perceptions and Truth: A Mechanism Design Approach to Crowd-Sourcing Reputation

    Authors: Parinaz Naghizadeh, Mingyan Liu

    Abstract: We consider a distributed multi-user system where individual entities possess observations or perceptions of one another, while the truth is only known to themselves, and they might have an interest in withholding or distorting the truth. We ask the question whether it is possible for the system as a whole to arrive at the correct perceptions or assessment of all users, referred to as their reputa… ▽ More

    Submitted 2 June, 2013; originally announced June 2013.

    Comments: 14 pages, 3 figures