Skip to main content

Showing 1–25 of 25 results for author: Oren, Y

.
  1. arXiv:2406.01423  [pdf, other

    cs.LG cs.AI

    Value Improved Actor Critic Algorithms

    Authors: Yaniv Oren, Moritz A. Zanger, Pascal R. van der Vaart, Matthijs T. J. Spaan, Wendelin Bohmer

    Abstract: Many modern reinforcement learning algorithms build on the actor-critic (AC) framework: iterative improvement of a policy (the actor) using policy improvement operators and iterative approximation of the policy's value (the critic). In contrast, the popular value-based algorithm family employs improvement operators in the value update, to iteratively improve the value function directly. In this wo… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

  2. arXiv:2403.09476  [pdf, other

    astro-ph.GA

    Sunyaev-Zeldovich Signals from $L^*$ Galaxies: Observations, Analytics, and Simulations

    Authors: Yossi Oren, Amiel Sternberg, Christopher F. McKee, Yakov Faerman, Shy Genel

    Abstract: We analyze measurements of the thermal Sunyaev-Zeldovich (tSZ) effect arising in the circumgalactic medium (CGM) of $L^*$ galaxies, reported by Bregman et al. 2022 and Das et al. 2023. In our analysis we use the Faerman et al. 2017 and Faerman et al. 2020 CGM models, a new power-law model (PLM), and the TNG100 simulation. For a given $M_{\rm vir}$, our PLM has four parameters; the fraction,… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    Comments: Submitted to the Astrophysical Journal. 30 pages, 18 figures

  3. arXiv:2310.17623  [pdf, other

    cs.CL cs.LG

    Proving Test Set Contamination in Black Box Language Models

    Authors: Yonatan Oren, Nicole Meister, Niladri Chatterji, Faisal Ladhak, Tatsunori B. Hashimoto

    Abstract: Large language models are trained on vast amounts of internet data, prompting concerns and speculation that they have memorized public benchmarks. Going from speculation to proof of contamination is challenging, as the pretraining data used by proprietary models are often not publicly accessible. We show that it is possible to provide provable guarantees of test set contamination in language model… ▽ More

    Submitted 23 November, 2023; v1 submitted 26 October, 2023; originally announced October 2023.

  4. arXiv:2210.13455  [pdf, other

    cs.LG cs.AI

    E-MCTS: Deep Exploration in Model-Based Reinforcement Learning by Planning with Epistemic Uncertainty

    Authors: Yaniv Oren, Matthijs T. J. Spaan, Wendelin Böhmer

    Abstract: One of the most well-studied and highly performing planning approaches used in Model-Based Reinforcement Learning (MBRL) is Monte-Carlo Tree Search (MCTS). Key challenges of MCTS-based MBRL methods remain dedicated deep exploration and reliability in the face of the unknown, and both challenges can be alleviated through principled epistemic uncertainty estimation in the predictions of MCTS. We pre… ▽ More

    Submitted 30 August, 2023; v1 submitted 21 October, 2022; originally announced October 2022.

    Comments: Submitted to NeurIPS 2023, accepted to EWRL 2023

  5. DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting

    Authors: Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom

    Abstract: Browser fingerprinting aims to identify users or their devices, through scripts that execute in the users' browser and collect information on software or hardware characteristics. It is used to track users or as an additional means of identification to improve security. In this paper, we report on a new technique that can significantly extend the tracking time of fingerprint-based tracking methods… ▽ More

    Submitted 24 January, 2022; originally announced January 2022.

    Comments: Network and Distributed System Security Symposium, Feb 2022, San Diego, United States

  6. arXiv:2108.01707  [pdf

    cond-mat.soft

    Simplifying concentration-polarization of trace-ions in pressure-driven membrane processes

    Authors: Yaeli S. Oren, Viatcheslav Freger, Oded Nir

    Abstract: Accounting for concentration-polarization (CP) is critical for modeling solute transport in membrane separation processes. In a mixed-electrolyte solution, ions CP is affected not only by diffusion and advection but also by electromigration. Yet, the classic film model, lacking an electromigration term, is frequently used for modeling ion CP. Often, ion CP is altogether neglected to reduce the com… ▽ More

    Submitted 3 August, 2021; originally announced August 2021.

    Comments: 15 pages, 3 figures and a graphical abstract

  7. arXiv:2103.04952  [pdf, other

    cs.CR

    Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses

    Authors: Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom

    Abstract: The "eternal war in cache" has reached browsers, with multiple cache-based side-channel attacks and countermeasures being suggested. A common approach for countermeasures is to disable or restrict JavaScript features deemed essential for carrying out attacks. To assess the effectiveness of this approach, in this work we seek to identify those JavaScript features which are essential for carrying ou… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

  8. arXiv:1909.02060  [pdf, other

    cs.CL cs.LG stat.ML

    Distributionally Robust Language Modeling

    Authors: Yonatan Oren, Shiori Sagawa, Tatsunori B. Hashimoto, Percy Liang

    Abstract: Language models are generally trained on data spanning a wide range of topics (e.g., news, reviews, fiction), but they might be applied to an a priori unknown target distribution (e.g., restaurant reviews). In this paper, we first show that training on text outside the test distribution can degrade test performance when using standard maximum likelihood (MLE) training. To remedy this without the k… ▽ More

    Submitted 4 September, 2019; originally announced September 2019.

    Comments: Camera ready version for EMNLP

  9. arXiv:1908.02524  [pdf, other

    cs.CR

    Cross-Router Covert Channels

    Authors: Adar Ovadya, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren

    Abstract: Many organizations protect secure networked devices from non-secure networked devices by assigning each class of devices to a different logical network. These two logical networks, commonly called the host network and the guest network, use the same router hardware, which is designed to isolate the two networks in software. In this work we show that logical network isolation based on host and gu… ▽ More

    Submitted 7 August, 2019; originally announced August 2019.

    Comments: Presented at WOOT 2019 - https://orenlab.sise.bgu.ac.il/p/CrossRouter

  10. arXiv:1905.04691  [pdf, other

    cs.CR

    Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor

    Authors: Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren

    Abstract: Position sensors, such as the gyroscope, the magnetometer and the accelerometer, are found in a staggering variety of devices, from smartphones and UAVs to autonomous robots. Several works have shown how adversaries can mount spoofing attacks to remotely corrupt or even completely control the outputs of these sensors. With more and more critical applications relying on sensor readings to make impo… ▽ More

    Submitted 12 May, 2019; originally announced May 2019.

    ACM Class: B.8.1; K.6.5

  11. arXiv:1812.01194  [pdf, other

    stat.ML cs.LG

    A Retrieve-and-Edit Framework for Predicting Structured Outputs

    Authors: Tatsunori B. Hashimoto, Kelvin Guu, Yonatan Oren, Percy Liang

    Abstract: For the task of generating complex outputs such as source code, editing existing outputs can be easier than generating complex outputs from scratch. With this motivation, we propose an approach that first retrieves a training example based on the input (e.g., natural language description) and then edits it to the desired output (e.g., code). Our contribution is a computationally efficient method f… ▽ More

    Submitted 3 December, 2018; originally announced December 2018.

    Comments: To appear, NeurIPS 2018

  12. arXiv:1811.07153  [pdf, other

    cs.CR cs.LG

    Robust Website Fingerprinting Through the Cache Occupancy Channel

    Authors: Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom

    Abstract: Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user privacy, have been shown to be effective even if the traffic is sent over anonymity-preserving networks such as Tor. The classical attack model used to evaluate website fingerprinting attacks assumes an on-path adversary, who can observe all traffic traveling between the user's computer and the Tor… ▽ More

    Submitted 21 February, 2019; v1 submitted 17 November, 2018; originally announced November 2018.

  13. Robust Diabatic Quantum Search by Landau-Zener-Stückelberg Oscillations

    Authors: Yosi Atia, Yonathan Oren, Nadav Katz

    Abstract: Quantum computation by the adiabatic theorem requires a slowly varying Hamiltonian with respect to the spectral gap. We show that the Landau-Zener-Stückelberg oscillation phenomenon, that naturally occurs in quantum two level systems under non-adiabatic periodic drive, can be exploited to find the ground state of an N dimensional Grover Hamiltonian. The total runtime of this method is… ▽ More

    Submitted 20 December, 2018; v1 submitted 12 November, 2018; originally announced November 2018.

    Comments: 10 pages, 5 figures

  14. arXiv:1805.04850  [pdf, other

    cs.CR

    Shattered Trust: When Replacement Smartphone Components Attack

    Authors: Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren

    Abstract: Phone touchscreens, and other similar hardware components such as orientation sensors, wireless charging controllers, and NFC readers, are often produced by third-party manufacturers and not by the phone vendors themselves. Third-party driver source code to support these components is integrated into the vendor's source code. In contrast to 'pluggable' drivers, such as USB or network drivers, the… ▽ More

    Submitted 13 May, 2018; originally announced May 2018.

    Comments: Presented in WOOT 17', 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17) - 2017

  15. arXiv:1709.08878  [pdf, other

    cs.CL cs.AI cs.LG cs.NE stat.ML

    Generating Sentences by Editing Prototypes

    Authors: Kelvin Guu, Tatsunori B. Hashimoto, Yonatan Oren, Percy Liang

    Abstract: We propose a new generative model of sentences that first samples a prototype sentence from the training corpus and then edits it into a new sentence. Compared to traditional models that generate from scratch either left-to-right or by first sampling a latent sentence vector, our prototype-then-edit model improves perplexity on language modeling and generates higher quality outputs according to hu… ▽ More

    Submitted 7 September, 2018; v1 submitted 26 September, 2017; originally announced September 2017.

    Comments: 14 pages, Transactions of the Association for Computational Linguistics (TACL), 2018

  16. Theory of ion and water transport in reverse osmosis membranes

    Authors: Y. S. Oren, P. M. Biesheuvel

    Abstract: We present theory for ion and water transport through reverse osmosis membranes based on a Maxwell-Stefan framework combined with hydrodynamic theory for the reduced motion of particles in thin pores. We include all driving forces and frictions both on the fluid (water), and on the ions, including ion-fluid friction as well as ion-wall friction. By including the acid-base character of the carbonic… ▽ More

    Submitted 21 June, 2017; originally announced June 2017.

    Journal ref: Phys. Rev. Applied 9, 024034 (2018)

  17. arXiv:1502.07373  [pdf, other

    cs.CR cs.NI

    The Spy in the Sandbox -- Practical Cache Attacks in Javascript

    Authors: Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis

    Abstract: We present the first micro-architectural side-channel attack which runs entirely in the browser. In contrast to other works in this genre, this attack does not require the attacker to install any software on the victim's machine -- to facilitate the attack, the victim needs only to browse to an untrusted webpage with attacker-controlled content. This makes the attack model highly scalable and extr… ▽ More

    Submitted 1 March, 2015; v1 submitted 25 February, 2015; originally announced February 2015.

  18. arXiv:0910.3552  [pdf, ps, other

    astro-ph.HE

    Discrete Self-Similarity in Ultra-Relativistic Type-II Strong Explosions

    Authors: Yonatan Oren, Re'em Sari

    Abstract: A solution to the ultra-relativistic strong explosion problem with a non-power law density gradient is delineated. We consider a blast wave expanding into a density profile falling off as a steep radial power-law with small, spherically symmetric, and log-periodic density perturbations. We find discretely self-similar solutions to the perturbation equations and compare them to numerical simulati… ▽ More

    Submitted 19 October, 2009; originally announced October 2009.

    Comments: 21 pages, 5 figures

    Journal ref: Phys.Fluids 21:106102,2009

  19. arXiv:0907.1731  [pdf, ps, other

    astro-ph.HE

    Discrete Self-Similarity in Type-II Strong Explosions

    Authors: Yonatan Oren, Re'em Sari

    Abstract: We present new solutions to the strong explosion problem in a non-power law density profile. The unperturbed self-similar solutions discovered by Waxman & Shvarts describe strong Newtonian shocks propagating into a cold gas with a density profile falling off as $r^{-ω}$, where $ω>3$ (Type-II solutions). The perturbations we consider are spherically symmetric and log-periodic with respect to the… ▽ More

    Submitted 10 July, 2009; originally announced July 2009.

    Journal ref: Phys.Fluids 21:056101,2009

  20. arXiv:0901.0512  [pdf

    hep-ex

    Expected Performance of the ATLAS Experiment - Detector, Trigger and Physics

    Authors: The ATLAS Collaboration, G. Aad, E. Abat, B. Abbott, J. Abdallah, A. A. Abdelalim, A. Abdesselam, O. Abdinov, B. Abi, M. Abolins, H. Abramowicz, B. S. Acharya, D. L. Adams, T. N. Addy, C. Adorisio, P. Adragna, T. Adye, J. A. Aguilar-Saavedra, M. Aharrouche, S. P. Ahlen, F. Ahles, A. Ahmad, H. Ahmed, G. Aielli, T. Akdogan , et al. (2587 additional authors not shown)

    Abstract: A detailed study is presented of the expected performance of the ATLAS detector. The reconstruction of tracks, leptons, photons, missing energy and jets is investigated, together with the performance of b-tagging and the trigger. The physics potential for a variety of interesting physics processes, within the Standard Model and beyond, is examined. The study comprises a series of notes based on… ▽ More

    Submitted 14 August, 2009; v1 submitted 28 December, 2008; originally announced January 2009.

  21. GRB 051221A and Tests of Lorentz Symmetry

    Authors: Maria Rodriguez Martinez, Tsvi Piran, Yonatan Oren

    Abstract: Various approaches to quantum gravity suggest the possibility of violation of Lorentz symmetry at very high energies. In these cases we expect a modification at low energies of the dispersion relation of photons that contains extra powers of the momentum suppressed by a high energy scale. These terms break boost invariance and can be tested even at relatively low energies. We use the light curve… ▽ More

    Submitted 24 January, 2006; originally announced January 2006.

    Comments: 9 pages, 2 figures

    Journal ref: JCAP 0605 (2006) 017

  22. On Choptuik's scaling in higher dimensions

    Authors: Evgeny Sorkin, Yonatan Oren

    Abstract: We extend Choptuik's scaling phenomenon found in general relativistic critical gravitational collapse of a massless scalar field to higher dimensions. We find that in the range 4 <= D <= 11 the behavior is qualitatively similar to that discovered by Choptuik. In each dimension we obtain numerically the universal numbers associated with the critical collapse: the scaling exponent gamma and the ec… ▽ More

    Submitted 6 June, 2005; v1 submitted 3 February, 2005; originally announced February 2005.

    Comments: 18 pages, 11 eps figures; v2: 2 refs added, improved discussions to match the published version

    Journal ref: Phys.Rev. D71 (2005) 124005

  23. The apparent size of GRB afterglows as a test of the Fireball model

    Authors: Yonatan Oren, Ehud Nakar, Tsvi Piran

    Abstract: Taylor et al. (2004) reported recently on the first direct measurement of the apparent size of a GRB afterglow. Here we confront these observations with the predictions of the fireball model. We use a simple model to study numerically the evolution of the fireball and determine its apparent size, starting at the early spherical expansion phase through the jet break and into the Newtonian regime.… ▽ More

    Submitted 13 June, 2004; v1 submitted 11 June, 2004; originally announced June 2004.

    Journal ref: Mon.Not.Roy.Astron.Soc. 353 (2004) L35-L40

  24. Polarization and light curve variability: the "patchy shell" model

    Authors: Ehud Nakar, Yonatan Oren

    Abstract: Recent advances in early detection and detailed monitoring of GRB afterglows have revealed variability in some afterglow light curves. One of the leading models for this behavior is the patchy shell model. This model attributes the variability to random angular fluctuations in the relativistic jet energy. These an-axisymmetric fluctuations should also impose variations in the degree and angle of… ▽ More

    Submitted 5 February, 2004; v1 submitted 8 October, 2003; originally announced October 2003.

    Comments: 10 pages, 2 figures, Final version to appear in ApJL

    Journal ref: Astrophys.J. 602 (2004) L97-L100

  25. On the Collapse of Charged Scalar Fields

    Authors: Yonatan Oren, Tsvi Piran

    Abstract: We explore numerically the evolution of a collapsing spherical shell of charged, massless scalar field. We obtain an external \RN space-time, and an inner space-time that is bounded by a singularity on the Cauchy Horizon. We compare these results with previous analysis and discuss some of the numerical problems encountered.

    Submitted 17 June, 2003; originally announced June 2003.

    Comments: Accepted for publication in Phys. Rev. D

    Journal ref: Phys.Rev. D68 (2003) 044013