Skip to main content

Showing 1–34 of 34 results for author: Pevný, T

.
  1. arXiv:2405.16961  [pdf, other

    eess.IV cs.AI cs.CR cs.MM

    Blind Data Adaptation to tackle Covariate Shift in Operational Steganalysis

    Authors: Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomáš Pevný

    Abstract: The proliferation of image manipulation for unethical purposes poses significant challenges in social networks. One particularly concerning method is Image Steganography, allowing individuals to hide illegal information in digital images without arousing suspicions. Such a technique pose severe security risks, making it crucial to develop effective steganalysis methods enabling to detect manipulat… ▽ More

    Submitted 29 May, 2024; v1 submitted 27 May, 2024; originally announced May 2024.

  2. arXiv:2401.14086  [pdf, other

    cs.AI cs.LG math.OC

    Generating Likely Counterfactuals Using Sum-Product Networks

    Authors: Jiri Nemecek, Tomas Pevny, Jakub Marecek

    Abstract: Explainability of decisions made by AI systems is driven by both recent regulation and user demand. These decisions are often explainable only \emph{post hoc}, after the fact. In counterfactual explanations, one may ask what constitutes the best counterfactual explanation. Clearly, multiple criteria must be taken into account, although "distance from the sample" is a key criterion. Recent methods… ▽ More

    Submitted 27 May, 2024; v1 submitted 25 January, 2024; originally announced January 2024.

    Comments: In review

  3. arXiv:2310.19463  [pdf, ps, other

    cs.AI cs.LG

    Optimize Planning Heuristics to Rank, not to Estimate Cost-to-Goal

    Authors: Leah Chrestien, Tomás Pevný, Stefan Edelkamp, Antonín Komenda

    Abstract: In imitation learning for planning, parameters of heuristic functions are optimized against a set of solved problem instances. This work revisits the necessary and sufficient conditions of strictly optimally efficient heuristics for forward search algorithms, mainly A* and greedy best-first search, which expand only states on the returned optimal path. It then proposes a family of loss functions b… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

    Comments: 10 pages

  4. arXiv:2310.04479  [pdf, other

    cs.LG cs.AI cs.CR cs.CV cs.MM eess.SP

    Leveraging Data Geometry to Mitigate CSM in Steganalysis

    Authors: Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomáš Pevný

    Abstract: In operational scenarios, steganographers use sets of covers from various sensors and processing pipelines that differ significantly from those used by researchers to train steganalysis models. This leads to an inevitable performance gap when dealing with out-of-distribution covers, commonly referred to as Cover Source Mismatch (CSM). In this study, we consider the scenario where test images are p… ▽ More

    Submitted 6 October, 2023; originally announced October 2023.

    Journal ref: IEEE International Workshop on Information Forensics and Security (WIFS 2023), Dec 2023, Nuremberg, Germany

  5. arXiv:2306.06777  [pdf, other

    cs.LG cs.AI math.OC

    Improving the Validity of Decision Trees as Explanations

    Authors: Jiri Nemecek, Tomas Pevny, Jakub Marecek

    Abstract: In classification and forecasting with tabular data, one often utilizes tree-based models. Those can be competitive with deep neural networks on tabular data and, under some conditions, explainable. The explainability depends on the depth of the tree and the accuracy in each leaf of the tree. We point out that decision trees containing leaves with unbalanced accuracy can provide misleading explana… ▽ More

    Submitted 4 June, 2024; v1 submitted 11 June, 2023; originally announced June 2023.

  6. arXiv:2305.17246  [pdf, other

    cs.CR cs.LG

    NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios

    Authors: Jaromír Janisch, Tomáš Pevný, Viliam Lisý

    Abstract: Current frameworks for training offensive penetration testing agents with deep reinforcement learning struggle to produce agents that perform well in real-world scenarios, due to the reality gap in simulation-based frameworks and the lack of scalability in emulation-based frameworks. Additionally, existing frameworks often use an unrealistic metric that measures the agents' performance on the trai… ▽ More

    Submitted 18 August, 2023; v1 submitted 26 May, 2023; originally announced May 2023.

    Comments: NASimEmu is available at https://github.com/jaromiru/NASimEmu and the baseline agents at https://github.com/jaromiru/NASimEmu-agents

  7. arXiv:2305.04754  [pdf, other

    cs.LG

    Is AUC the best measure for practical comparison of anomaly detectors?

    Authors: Vít Škvára, Tomáš Pevný, Václav Šmídl

    Abstract: The area under receiver operating characteristics (AUC) is the standard measure for comparison of anomaly detectors. Its advantage is in providing a scalar number that allows a natural ordering and is independent on a threshold, which allows to postpone the choice. In this work, we question whether AUC is a good metric for anomaly detection, or if it gives a false sense of comfort, due to relying… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

  8. arXiv:2211.03447  [pdf, other

    cs.MM cs.AI cs.CV eess.IV

    Using Set Covering to Generate Databases for Holistic Steganalysis

    Authors: Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomáš Pevný

    Abstract: Within an operational framework, covers used by a steganographer are likely to come from different sensors and different processing pipelines than the ones used by researchers for training their steganalysis models. Thus, a performance gap is unavoidable when it comes to out-of-distributions covers, an extremely frequent scenario called Cover Source Mismatch (CSM). Here, we explore a grid of proce… ▽ More

    Submitted 28 December, 2023; v1 submitted 7 November, 2022; originally announced November 2022.

    Comments: IEEE International Workshop on Information Forensics and Security (WIFS 2022), Dec 2022, Shanghai, China

  9. arXiv:2209.05206  [pdf, other

    cs.LG cs.AI

    A Differentiable Loss Function for Learning Heuristics in A*

    Authors: Leah Chrestien, Tomas Pevny, Antonin Komenda, Stefan Edelkamp

    Abstract: Optimization of heuristic functions for the A* algorithm, realized by deep neural networks, is usually done by minimizing square root loss of estimate of the cost to goal values. This paper argues that this does not necessarily lead to a faster search of A* algorithm since its execution relies on relative values instead of absolute ones. As a mitigation, we propose a L* loss, which upper-bounds th… ▽ More

    Submitted 12 September, 2022; originally announced September 2022.

    Comments: 10 pages

  10. arXiv:2208.02694  [pdf, ps, other

    stat.ML cs.LG

    Explaining Classifiers Trained on Raw Hierarchical Multiple-Instance Data

    Authors: Tomáš Pevný, Viliam Lisý, Branislav Bošanský, Petr Somol, Michal Pěchouček

    Abstract: Learning from raw data input, thus limiting the need for feature engineering, is a component of many successful applications of machine learning methods in various domains. While many problems naturally translate into a vector representation directly usable in standard classifiers, a number of data sources have the natural form of structured data interchange formats (e.g., security logs in JSON/XM… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

  11. arXiv:2112.01918  [pdf, other

    cs.AI cs.LG

    Heuristic Search Planning with Deep Neural Networks using Imitation, Attention and Curriculum Learning

    Authors: Leah Chrestien, Tomas Pevny, Antonin Komenda, Stefan Edelkamp

    Abstract: Learning a well-informed heuristic function for hard task planning domains is an elusive problem. Although there are known neural network architectures to represent such heuristic knowledge, it is not obvious what concrete information is learned and whether techniques aimed at understanding the structure help in improving the quality of the heuristics. This paper presents a network model to learn… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Comments: 8 pages plus references

  12. arXiv:2110.04776  [pdf, ps, other

    cs.LG stat.ML

    Fitting large mixture models using stochastic component selection

    Authors: Milan Papež, Tomáš Pevný, Václav Šmídl

    Abstract: Traditional methods for unsupervised learning of finite mixture models require to evaluate the likelihood of all components of the mixture. This becomes computationally prohibitive when the number of components is large, as it is, for example, in the sum-product (transform) networks. Therefore, we propose to apply a combination of the expectation maximization and the Metropolis-Hastings algorithm… ▽ More

    Submitted 10 October, 2021; originally announced October 2021.

  13. arXiv:2108.07602  [pdf, ps, other

    cs.LG cs.GT

    When Should You Defend Your Classifier -- A Game-theoretical Analysis of Countermeasures against Adversarial Examples

    Authors: Maximilian Samsinger, Florian Merkle, Pascal Schöttle, Tomas Pevny

    Abstract: Adversarial machine learning, i.e., increasing the robustness of machine learning algorithms against so-called adversarial examples, is now an established field. Yet, newly proposed methods are evaluated and compared under unrealistic scenarios where costs for adversary and defender are not considered and either all samples or no samples are adversarially perturbed. We scrutinize these assumptions… ▽ More

    Submitted 27 September, 2021; v1 submitted 17 August, 2021; originally announced August 2021.

  14. arXiv:2105.09107  [pdf, ps, other

    stat.ML cs.LG cs.MS

    Mill.jl and JsonGrinder.jl: automated differentiable feature extraction for learning from raw JSON data

    Authors: Simon Mandlik, Matej Racinsky, Viliam Lisy, Tomas Pevny

    Abstract: Learning from raw data input, thus limiting the need for manual feature engineering, is one of the key components of many successful applications of machine learning methods. While machine learning problems are often formulated on data that naturally translate into a vector representation suitable for classifiers, there are data sources, for example in cybersecurity, that are naturally represented… ▽ More

    Submitted 19 May, 2021; originally announced May 2021.

    Comments: 5 pages, 2 figures, 1 table, submitted to section on one-source software of Journal of Machine Learning Research

  15. arXiv:2104.09650  [pdf, other

    cs.LG cs.CR

    Map** the Internet: Modelling Entity Interactions in Complex Heterogeneous Networks

    Authors: Simon Mandlik, Tomas Pevny

    Abstract: Even though machine learning algorithms already play a significant role in data science, many current methods pose unrealistic assumptions on input data. The application of such methods is difficult due to incompatible data formats, or heterogeneous, hierarchical or entirely missing data fragments in the dataset. As a solution, we propose a versatile, unified framework called `HMill' for sample re… ▽ More

    Submitted 8 June, 2022; v1 submitted 19 April, 2021; originally announced April 2021.

    Comments: Master thesis, 108 page, 56 figures

  16. arXiv:2012.06260  [pdf, other

    cs.LG

    Comparison of Anomaly Detectors: Context Matters

    Authors: Vít Škvára, Jan Franců, Matěj Zorek, Tomáš Pevný, Václav Šmídl

    Abstract: Deep generative models are challenging the classical methods in the field of anomaly detection nowadays. Every new method provides evidence of outperforming its predecessors, often with contradictory results. The objective of this comparison is twofold: to compare anomaly detection methods of various paradigms with focus on deep generative models, and identification of sources of variability that… ▽ More

    Submitted 8 June, 2021; v1 submitted 11 December, 2020; originally announced December 2020.

  17. arXiv:2009.12462  [pdf, other

    cs.LG cs.AI

    Symbolic Relational Deep Reinforcement Learning based on Graph Neural Networks and Autoregressive Policy Decomposition

    Authors: Jaromír Janisch, Tomáš Pevný, Viliam Lisý

    Abstract: We focus on reinforcement learning (RL) in relational problems that are naturally defined in terms of objects, their relations, and object-centric actions. These problems are characterized by variable state and action spaces, and finding a fixed-length representation, required by most existing RL methods, is difficult, if not impossible. We present a deep RL framework based on graph neural network… ▽ More

    Submitted 25 August, 2023; v1 submitted 25 September, 2020; originally announced September 2020.

    Comments: code available at https://github.com/jaromiru/sr-drl

  18. arXiv:2006.01681  [pdf, other

    cs.LG cs.NE stat.ML

    Neural Power Units

    Authors: Niklas Heim, Tomáš Pevný, Václav Šmídl

    Abstract: Conventional Neural Networks can approximate simple arithmetic operations, but fail to generalize beyond the range of numbers that were seen during training. Neural Arithmetic Units aim to overcome this difficulty, but current arithmetic units are either limited to operate on positive numbers or can only represent a subset of arithmetic operations. We introduce the Neural Power Unit (NPU) that ope… ▽ More

    Submitted 17 December, 2020; v1 submitted 2 June, 2020; originally announced June 2020.

  19. arXiv:2005.01297  [pdf, other

    stat.ML cs.LG

    Sum-Product-Transform Networks: Exploiting Symmetries using Invertible Transformations

    Authors: Tomas Pevny, Vasek Smidl, Martin Trapp, Ondrej Polacek, Tomas Oberhuber

    Abstract: In this work, we propose Sum-Product-Transform Networks (SPTN), an extension of sum-product networks that uses invertible transformations as additional internal nodes. The type and placement of transformations determine properties of the resulting SPTN with many interesting special cases. Importantly, SPTN with Gaussian leaves and affine transformations pose the same inference task tractable that… ▽ More

    Submitted 4 May, 2020; originally announced May 2020.

  20. arXiv:2002.10923  [pdf, other

    cs.LG stat.ML

    General Framework for Binary Classification on Top Samples

    Authors: Lukáš Adam, Václav Mácha, Václav Šmídl, Tomáš Pevný

    Abstract: Many binary classification problems minimize misclassification above (or below) a threshold. We show that instances of ranking problems, accuracy at the top or hypothesis testing may be written in this form. We propose a general framework to handle these classes of problems and show which known methods (both known and newly proposed) fall into this framework. We provide a theoretical analysis of t… ▽ More

    Submitted 25 February, 2020; originally announced February 2020.

    MSC Class: 90C15; 90C26; 49M05

  21. arXiv:2002.04059  [pdf, other

    cs.CR

    Nested Multiple Instance Learning in Modelling of HTTP network traffic

    Authors: Tomas Pevny, Marek Dedic

    Abstract: In many interesting cases, the application of machine learning is hindered by data having a complicated structure stimulated by a structured file-formats like JSONs, XMLs, or ProtoBuffers, which is non-trivial to convert to a vector / matrix. Moreover, since the structure frequently carries a semantic meaning, reflecting it in the machine learning model should improve the accuracy but more importa… ▽ More

    Submitted 10 February, 2020; originally announced February 2020.

  22. arXiv:1912.00656  [pdf, other

    stat.ML cs.LG

    Rodent: Relevance determination in differential equations

    Authors: Niklas Heim, Václav Šmídl, Tomáš Pevný

    Abstract: We aim to identify the generating, ordinary differential equation (ODE) from a set of trajectories of a partially observed system. Our approach does not need prescribed basis functions to learn the ODE model, but only a rich set of Neural Arithmetic Units. For maximal explainability of the learnt model, we minimise the state size of the ODE as well as the number of non-zero parameters that are nee… ▽ More

    Submitted 12 March, 2020; v1 submitted 2 December, 2019; originally announced December 2019.

  23. arXiv:1911.08756  [pdf, other

    cs.LG cs.AI stat.ML

    Classification with Costly Features in Hierarchical Deep Sets

    Authors: Jaromír Janisch, Tomáš Pevný, Viliam Lisý

    Abstract: Classification with Costly Features (CwCF) is a classification problem that includes the cost of features in the optimization criteria. Individually for each sample, its features are sequentially acquired to maximize accuracy while minimizing the acquired features' cost. However, existing approaches can only process data that can be expressed as vectors of fixed length. In real life, the data ofte… ▽ More

    Submitted 29 February, 2024; v1 submitted 20 November, 2019; originally announced November 2019.

    Comments: formerly Hierarchical Multiple-Instance Data Classification with Costly Features; RL4RealLife @ ICML2021; code available at https://github.com/jaromiru/rcwcf

  24. arXiv:1909.02564  [pdf, other

    cs.LG cs.AI stat.ML

    Classification with Costly Features as a Sequential Decision-Making Problem

    Authors: Jaromír Janisch, Tomáš Pevný, Viliam Lisý

    Abstract: This work focuses on a specific classification problem, where the information about a sample is not readily available, but has to be acquired for a cost, and there is a per-sample budget. Inspired by real-world use-cases, we analyze average and hard variations of a directly specified budget. We postulate the problem in its explicit formulation and then convert it into an equivalent MDP, that can b… ▽ More

    Submitted 5 September, 2019; originally announced September 2019.

    Journal ref: Machine Learning (2020): 1-29

  25. arXiv:1906.09084  [pdf, other

    cs.LG cs.CR stat.ML

    Joint Detection of Malicious Domains and Infected Clients

    Authors: Paul Prasse, Rene Knaebel, Lukas Machlica, Tomas Pevny, Tobias Scheffer

    Abstract: Detection of malware-infected computers and detection of malicious web domains based on their encrypted HTTPS traffic are challenging problems, because only addresses, timestamps, and data volumes are observable. The detection problems are coupled, because infected clients tend to interact with malicious domains. Traffic data can be collected at a large scale, and antivirus tools can be used to id… ▽ More

    Submitted 21 June, 2019; originally announced June 2019.

    Comments: Mach Learn (2019)

  26. arXiv:1906.00764  [pdf, ps, other

    cs.LG stat.ML

    Approximation capability of neural networks on spaces of probability measures and tree-structured domains

    Authors: Tomas Pevny, Vojtech Kovarik

    Abstract: This paper extends the proof of density of neural networks in the space of continuous (or even measurable) functions on Euclidean spaces to functions on compact sets of probability measures. By doing so the work parallels a more then a decade old results on mean-map embedding of probability measures in reproducing kernel Hilbert spaces. The work has wide practical consequences for multi-instance l… ▽ More

    Submitted 3 June, 2019; originally announced June 2019.

  27. arXiv:1905.11890  [pdf, other

    stat.ML cs.LG

    Anomaly scores for generative models

    Authors: Václav Šmídl, Jan Bím, Tomáš Pevný

    Abstract: Reconstruction error is a prevalent score used to identify anomalous samples when data are modeled by generative models, such as (variational) auto-encoders or generative adversarial networks. This score relies on the assumption that normal samples are located on a manifold and all anomalous samples are located outside. Since the manifold can be learned only where the training data lie, there are… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

    Comments: 9 pages, 3 figures, submitted to NeurIPS 2019

  28. arXiv:1807.05027  [pdf, ps, other

    cs.LG stat.ML

    Are generative deep models for novelty detection truly better?

    Authors: Vít Škvára, Tomáš Pevný, Václav Šmídl

    Abstract: Many deep models have been recently proposed for anomaly detection. This paper presents comparison of selected generative deep models and classical anomaly detection methods on an extensive number of non--image benchmark datasets. We provide statistical comparison of the selected models, in many configurations, architectures and hyperparamaters. We arrive to conclusion that performance of the gene… ▽ More

    Submitted 13 July, 2018; originally announced July 2018.

    Comments: 7 pages, ODD v5.0 - KDD 2018 workshop

  29. arXiv:1807.00173  [pdf, other

    math.OC cs.LG stat.ML

    Algorithms for solving optimization problems arising from deep neural net models: nonsmooth problems

    Authors: Vyacheslav Kungurtsev, Tomas Pevny

    Abstract: Machine Learning models incorporating multiple layered learning networks have been seen to provide effective models for various classification problems. The resulting optimization problem to solve for the optimal vector minimizing the empirical risk is, however, highly nonconvex. This alone presents a challenge to application and development of appropriate optimization algorithms for solving the p… ▽ More

    Submitted 30 June, 2018; originally announced July 2018.

    Report number: Cisco Prague WP5 Report 2016-02

  30. arXiv:1807.00172  [pdf, other

    math.OC cs.LG stat.ML

    Algorithms for solving optimization problems arising from deep neural net models: smooth problems

    Authors: Vyacheslav Kungurtsev, Tomas Pevny

    Abstract: Machine Learning models incorporating multiple layered learning networks have been seen to provide effective models for various classification problems. The resulting optimization problem to solve for the optimal vector minimizing the empirical risk is, however, highly nonlinear. This presents a challenge to application and development of appropriate optimization algorithms for solving the problem… ▽ More

    Submitted 30 June, 2018; originally announced July 2018.

    Report number: Cisco Prague WP5 Project Report 2016-01

  31. arXiv:1711.07364  [pdf, other

    cs.AI cs.LG stat.ML

    Classification with Costly Features using Deep Reinforcement Learning

    Authors: Jaromír Janisch, Tomáš Pevný, Viliam Lisý

    Abstract: We study a classification problem where each feature can be acquired for a cost and the goal is to optimize a trade-off between the expected classification error and the feature cost. We revisit a former approach that has framed the problem as a sequential decision-making problem and solved it by Q-learning with a linear approximation, where individual actions are either requests for feature value… ▽ More

    Submitted 12 November, 2018; v1 submitted 20 November, 2017; originally announced November 2017.

    Comments: AAAI 2019

  32. arXiv:1705.02268  [pdf, ps, other

    cs.CR

    Multiple Instance Learning for Malware Classification

    Authors: Jan Stiborek, Tomáš Pevný, Martin Rehák

    Abstract: This work addresses classification of unknown binaries executed in sandbox by modeling their interaction with system resources (files, mutexes, registry keys and communication with servers over the network) and error messages provided by the operating system, using vocabulary-based method from the multiple instance learning paradigm. It introduces similarities suitable for individual resource type… ▽ More

    Submitted 5 May, 2017; originally announced May 2017.

  33. arXiv:1703.02868  [pdf, other

    cs.CR cs.LG

    Discriminative models for multi-instance problems with tree-structure

    Authors: Tomas Pevny, Petr Somol

    Abstract: Modeling network traffic is gaining importance in order to counter modern threats of ever increasing sophistication. It is though surprisingly difficult and costly to construct reliable classifiers on top of telemetry data due to the variety and complexity of signals that no human can manage to interpret in full. Obtaining training data with sufficiently large and variable body of labels can thus… ▽ More

    Submitted 7 March, 2017; originally announced March 2017.

  34. arXiv:1609.07257  [pdf, other

    cs.LG stat.ML

    Using Neural Network Formalism to Solve Multiple-Instance Problems

    Authors: Tomas Pevny, Petr Somol

    Abstract: Many objects in the real world are difficult to describe by a single numerical vector of a fixed length, whereas describing them by a set of vectors is more natural. Therefore, Multiple instance learning (MIL) techniques have been constantly gaining on importance throughout last years. MIL formalism represents each object (sample) by a set (bag) of feature vectors (instances) of fixed length where… ▽ More

    Submitted 7 March, 2017; v1 submitted 23 September, 2016; originally announced September 2016.

    Comments: Accepted to International Symposium on Neural Networks