-
Operational Framework for a Quantum Database
Authors:
Carla Rieger,
Michele Grossi,
Gian Giacomo Guerreschi,
Sofia Vallecorsa,
Martin Werner
Abstract:
Databases are an essential component of modern computing infrastructures and allow efficient access to data stored persistently. Their structure depends on the type and relationships of the stored data elements and on the access pattern. Extending the concept of databases to the quantum domain is expected to increase both the storage efficiency and the access parallelism through quantum superposit…
▽ More
Databases are an essential component of modern computing infrastructures and allow efficient access to data stored persistently. Their structure depends on the type and relationships of the stored data elements and on the access pattern. Extending the concept of databases to the quantum domain is expected to increase both the storage efficiency and the access parallelism through quantum superposition. In addition, quantum databases may be seen as the result of a prior state preparation ready to be used by quantum algorithms when needed. On the other hand, limiting factors exist and include entanglement creation, the impossibility of perfect copying due to the no-cloning theorem, and the impossibility of coherently erasing a quantum state. In this work, we introduce quantum databases within the broader context of data structures using classical and quantum data and indexing. In particular, we are interested in quantum databases practical implementation and usability, focusing on the definition of the basic operations needed to create and manipulate data stored in a superposition state. Specifically, we address the case of quantum indexing in combination with classical data. For this scenario, we define the operations for database preparation, extension, removal of indices, writing, and read-out of data, as well as index permutation. We present their algorithmic implementation and highlight their advantages and limitations. Finally, we introduce steps toward defining the same operations in the more general context of quantum indexing and quantum data.
△ Less
Submitted 23 May, 2024;
originally announced May 2024.
-
Spectral stability and perturbation results for kernel differentiation matrices on the sphere
Authors:
Thomas Hangelbroek,
Christian Rieger,
Grady Wright
Abstract:
We investigate the spectrum of differentiation matrices for certain operators on the sphere that are generated from collocation at a set of scattered points $X$ with positive definite and conditionally positive definite kernels. We focus on the cases where these matrices are constructed from collocation using all the points in $X$ and from local subsets of points (or stencils) in $X$. The former c…
▽ More
We investigate the spectrum of differentiation matrices for certain operators on the sphere that are generated from collocation at a set of scattered points $X$ with positive definite and conditionally positive definite kernels. We focus on the cases where these matrices are constructed from collocation using all the points in $X$ and from local subsets of points (or stencils) in $X$. The former case are called global methods (e.g., the Kansa or radial basis function (RBF) pseudospectral method), while the latter are referred to as local methods (e.g., the RBF finite difference (RBF-FD) method). Both techniques are used extensively for numerically solving certain partial differential equations on spheres, as well as other domains. For time-dependent PDEs like the diffusion equation, the spectrum of the differentiation matrices and their stability under perturbations are central to understanding the temporal stability of the underlying numerical schemes.
In the global case, we present a perturbation estimate for differentiation matrices which discretize operators that commute with the Laplace-Beltrami operator. In doing so, we demonstrate that if such an operator has negative (non-positive) spectrum, then the differentiation matrix does, too. For conditionally positive definite kernels this is particularly challenging since the differentiation matrices are not necessarily diagonalizable. This perturbation theory is then used to obtain bounds on the spectra of the local RBF-FD differentiation matrices based on the conditionally positive definite surface spline kernels. Numerical results are presented to confirm the theoretical estimates.
△ Less
Submitted 22 December, 2023; v1 submitted 12 November, 2023;
originally announced November 2023.
-
Kernel Multi-Grid on Manifolds
Authors:
Thomas Hangelbroek,
Christian Rieger
Abstract:
Kernel methods for solving partial differential equations on surfaces have the advantage that those methods work intrinsically on the surface and yield high approximation rates if the solution to the partial differential equation is smooth enough. Naive implementations of kernel based methods suffer, however, from the cubic complexity in the degrees of freedom. Localized Lagrange bases have proven…
▽ More
Kernel methods for solving partial differential equations on surfaces have the advantage that those methods work intrinsically on the surface and yield high approximation rates if the solution to the partial differential equation is smooth enough. Naive implementations of kernel based methods suffer, however, from the cubic complexity in the degrees of freedom. Localized Lagrange bases have proven to overcome this computational complexity to some extend. In this article we present a rigorous proof for a geometric multigrid method with $τ\ge 2$-cycle for elliptic partial differential equations on surfaces which is based on precomputed Lagrange basis functions. Our new multigrid provably works on quasi-uniform point clouds on the surface and hence does not require a grid-structure. Moreover, the computational cost scales log-linear in the degrees of freedom.
△ Less
Submitted 25 February, 2023;
originally announced February 2023.
-
Highly Localized RBF Lagrange Functions for Finite Difference Methods on Spheres
Authors:
Wolfgang Erb,
Thomas Hangelbroek,
Francis J. Narcowich,
Christian Rieger,
Joseph D. Ward
Abstract:
The aim of this paper is to show how rapidly decaying RBF Lagrange functions on the spheres can be used to create effective, stable finite difference methods based on radial basis functions (RBF-FD). For certain classes of PDEs this approach leads to precise convergence estimates for stencils which grow moderately with increasing discretization fineness.
The aim of this paper is to show how rapidly decaying RBF Lagrange functions on the spheres can be used to create effective, stable finite difference methods based on radial basis functions (RBF-FD). For certain classes of PDEs this approach leads to precise convergence estimates for stencils which grow moderately with increasing discretization fineness.
△ Less
Submitted 16 February, 2023;
originally announced February 2023.
-
Extending error bounds for radial basis function interpolation to measuring the error in higher order Sobolev norms
Authors:
Thomas Hangelbroek,
Christian Rieger
Abstract:
Radial basis functions (RBFs) are prominent examples for reproducing kernels with associated reproducing kernel Hilbert spaces (RKHSs). The convergence theory for the kernel-based interpolation in that space is well understood and optimal rates for the whole RKHS are often known. Schaback added the doubling trick, which shows that functions having double the smoothness required by the RKHS (along…
▽ More
Radial basis functions (RBFs) are prominent examples for reproducing kernels with associated reproducing kernel Hilbert spaces (RKHSs). The convergence theory for the kernel-based interpolation in that space is well understood and optimal rates for the whole RKHS are often known. Schaback added the doubling trick, which shows that functions having double the smoothness required by the RKHS (along with complicated, albeit complicated boundary behavior) can be approximated with higher convergence rates than the optimal rates for the whole space. Other advances allowed interpolation of target functions which are less smooth, and different norms which measure interpolation error. The current state of the art of error analysis for RBF interpolation treats target functions having smoothness up to twice that of the native space, but error measured in norms which are weaker than that required for membership in the RKHS.
Motivated by the fact that the kernels and the approximants they generate are smoother than required by the native space, this article extends the doubling trick to error which measures higher smoothness. This extension holds for a family of kernels satisfying easily checked hypotheses which we describe in this article, and includes many prominent RBFs. In the course of the proof, new convergence rates are obtained for the abstract operator considered by Devore and Ron, and new Bernstein estimates are obtained relating high order smoothness norms to the native space norm.
△ Less
Submitted 13 September, 2023; v1 submitted 14 February, 2023;
originally announced February 2023.
-
Towards Scalable EM-based Anomaly Detection For Embedded Devices Through Synthetic Fingerprinting
Authors:
Kurt A. Vedros,
Georgios Michail Makrakis,
Constantinos Kolias,
Robert C. Ivans,
Craig Rieger
Abstract:
Embedded devices are omnipresent in modern networks including the ones operating inside critical environments. However, due to their constrained nature, novel mechanisms are required to provide external, and non-intrusive anomaly detection. Among such approaches, one that has gained traction is based on the analysis of the electromagnetic (EM) signals that get emanated during a device's operation.…
▽ More
Embedded devices are omnipresent in modern networks including the ones operating inside critical environments. However, due to their constrained nature, novel mechanisms are required to provide external, and non-intrusive anomaly detection. Among such approaches, one that has gained traction is based on the analysis of the electromagnetic (EM) signals that get emanated during a device's operation. However, one of the most neglected challenges of this approach is the requirement for manually gathering and fingerprinting the signals that correspond to each execution path of the software/firmware. Indeed, even simple programs are comprised of hundreds if not thousands of branches thus, making the fingerprinting stage an extremely time-consuming process that involves the manual labor of a human specialist. To address this issue, we propose a framework for generating synthetic EM signals directly from the machine code. The synthetic signals can be used to train a Machine Learning based (ML) system for anomaly detection. The main advantage of the proposed approach is that it completely removes the need for an elaborate and error-prone fingerprinting stage, thus, dramatically increasing the scalability of the corresponding protection mechanisms. The experimental evaluations indicate that our method provides high detection accuracy (above 90% AUC score) when employed for the detection of injection attacks. Moreover, the proposed methodology inflicts only a small penalty (-1.3%) in accuracy for the detection of the injection of as little as four malicious instructions when compared to the same methods if real signals were to be used.
△ Less
Submitted 5 February, 2023;
originally announced February 2023.
-
Detecting Code Injections in Noisy Environments Through EM Signal Analysis and SVD Denoising
Authors:
Ekaterina Miller,
Georgios Michail Makrakis,
Kurt A. Vedros,
Constantinos Kolias,
Craig Rieger,
Daniel Barbara
Abstract:
The penetration of embedded devices in networks that support critical applications has rendered them a lucrative target for attackers and evildoers. However, traditional protection mechanisms may not be supported due to the memory and computational limitations of these systems. Recently, the analysis of electromagnetic (EM) emanations has gathered the interest of the research community. Thus, anal…
▽ More
The penetration of embedded devices in networks that support critical applications has rendered them a lucrative target for attackers and evildoers. However, traditional protection mechanisms may not be supported due to the memory and computational limitations of these systems. Recently, the analysis of electromagnetic (EM) emanations has gathered the interest of the research community. Thus, analogous protection systems have emerged as a viable solution e.g., for providing external, non-intrusive control-flow attestation for resource-constrained devices. Unfortunately, the majority of current work fails to account for the implications of real-life factors, predominantly the impact of environmental noise. In this work, we introduce a framework that integrates singular value decomposition (SVD) along with outlier detection for discovering malicious modifications of embedded software even under variable conditions of noise. Our proposed framework achieves high detection accuracy i.e., above 93\% AUC score for unknown attacks, even for extreme noise conditions i.e., -10 SNR. To the best of our knowledge, this is the first time this realistic limiting factor, i.e., environmental noise, is successfully addressed in the context of EM-based anomaly detection for embedded devices.
△ Less
Submitted 11 December, 2022;
originally announced December 2022.
-
RX-ADS: Interpretable Anomaly Detection using Adversarial ML for Electric Vehicle CAN data
Authors:
Chathurika S. Wickramasinghe,
Daniel L. Marino,
Harindra S. Mavikumbure,
Victor Cobilean,
Timothy D. Pennington,
Benny J. Varghese,
Craig Rieger,
Milos Manic
Abstract:
Recent year has brought considerable advancements in Electric Vehicles (EVs) and associated infrastructures/communications. Intrusion Detection Systems (IDS) are widely deployed for anomaly detection in such critical infrastructures. This paper presents an Interpretable Anomaly Detection System (RX-ADS) for intrusion detection in CAN protocol communication in EVs. Contributions include: 1) window…
▽ More
Recent year has brought considerable advancements in Electric Vehicles (EVs) and associated infrastructures/communications. Intrusion Detection Systems (IDS) are widely deployed for anomaly detection in such critical infrastructures. This paper presents an Interpretable Anomaly Detection System (RX-ADS) for intrusion detection in CAN protocol communication in EVs. Contributions include: 1) window based feature extraction method; 2) deep Autoencoder based anomaly detection method; and 3) adversarial machine learning based explanation generation methodology. The presented approach was tested on two benchmark CAN datasets: OTIDS and Car Hacking. The anomaly detection performance of RX-ADS was compared against the state-of-the-art approaches on these datasets: HIDS and GIDS. The RX-ADS approach presented performance comparable to the HIDS approach (OTIDS dataset) and has outperformed HIDS and GIDS approaches (Car Hacking dataset). Further, the proposed approach was able to generate explanations for detected abnormal behaviors arising from various intrusions. These explanations were later validated by information used by domain experts to detect anomalies. Other advantages of RX-ADS include: 1) the method can be trained on unlabeled data; 2) explanations help experts in understanding anomalies and root course analysis, and also help with AI model debugging and diagnostics, ultimately improving user trust in AI systems.
△ Less
Submitted 5 September, 2022;
originally announced September 2022.
-
Multi-Agent Learning for Resilient Distributed Control Systems
Authors:
Yuhan Zhao,
Craig Rieger,
Quanyan Zhu
Abstract:
Resilience describes a system's ability to function under disturbances and threats. Many critical infrastructures, including smart grids and transportation networks, are large-scale complex systems consisting of many interdependent subsystems. Decentralized architecture becomes a key resilience design paradigm for large-scale systems. In this book chapter, we present a multi-agent system (MAS) fra…
▽ More
Resilience describes a system's ability to function under disturbances and threats. Many critical infrastructures, including smart grids and transportation networks, are large-scale complex systems consisting of many interdependent subsystems. Decentralized architecture becomes a key resilience design paradigm for large-scale systems. In this book chapter, we present a multi-agent system (MAS) framework for distributed large-scale control systems and discuss the role of MAS learning in resiliency. This chapter introduces the creation of an artificial intelligence (AI) stack in the MAS to provide computational intelligence for subsystems to detect, respond, and recover. We discuss the application of learning methods at the cyber and physical layers of the system. The discussions focus on distributed learning algorithms for subsystems to respond to each other, and game-theoretic learning for them to respond to disturbances and adversarial behaviors. The book chapter presents a case study of distributed renewable energy systems to elaborate on the MAS architecture and its interface with the AI stack.
△ Less
Submitted 9 August, 2022;
originally announced August 2022.
-
Thermodynamics as Combinatorics: A Toy Theory
Authors:
Ämin Baumeler,
Carla Rieger,
Stefan Wolf
Abstract:
We discuss a simple toy model which allows, in a natural way, for deriving central facts from thermodynamics such as its fundamental laws, including Carnot's version of the second principle. Our viewpoint represents thermodynamic systems as binary strings, and it links their temperature to their Hamming weight. From this, we can reproduce the possibility of negative temperatures, the notion of equ…
▽ More
We discuss a simple toy model which allows, in a natural way, for deriving central facts from thermodynamics such as its fundamental laws, including Carnot's version of the second principle. Our viewpoint represents thermodynamic systems as binary strings, and it links their temperature to their Hamming weight. From this, we can reproduce the possibility of negative temperatures, the notion of equilibrium as the coïncidence of two notions of temperature - statistical versus structural -, as well as the zeroth law of thermodynamics (transitivity of the thermal-equilibrium relation), which we find to be redundant, as other authors, yet at the same time not to be universally valid.
△ Less
Submitted 16 May, 2022;
originally announced May 2022.
-
Self-Supervised and Interpretable Anomaly Detection using Network Transformers
Authors:
Daniel L. Marino,
Chathurika S. Wickramasinghe,
Craig Rieger,
Milos Manic
Abstract:
Monitoring traffic in computer networks is one of the core approaches for defending critical infrastructure against cyber attacks. Machine Learning (ML) and Deep Neural Networks (DNNs) have been proposed in the past as a tool to identify anomalies in computer networks. Although detecting these anomalies provides an indication of an attack, just detecting an anomaly is not enough information for a…
▽ More
Monitoring traffic in computer networks is one of the core approaches for defending critical infrastructure against cyber attacks. Machine Learning (ML) and Deep Neural Networks (DNNs) have been proposed in the past as a tool to identify anomalies in computer networks. Although detecting these anomalies provides an indication of an attack, just detecting an anomaly is not enough information for a user to understand the anomaly. The black-box nature of off-the-shelf ML models prevents extracting important information that is fundamental to isolate the source of the fault/attack and take corrective measures. In this paper, we introduce the Network Transformer (NeT), a DNN model for anomaly detection that incorporates the graph structure of the communication network in order to improve interpretability. The presented approach has the following advantages: 1) enhanced interpretability by incorporating the graph structure of computer networks; 2) provides a hierarchical set of features that enables analysis at different levels of granularity; 3) self-supervised training that does not require labeled data. The presented approach was tested by evaluating the successful detection of anomalies in an Industrial Control System (ICS). The presented approach successfully identified anomalies, the devices affected, and the specific connections causing the anomalies, providing a data-driven hierarchical approach to analyze the behavior of a cyber network.
△ Less
Submitted 25 February, 2022;
originally announced February 2022.
-
On the Numerical Approximation of the Karhunen-Loève Expansion for Random Fields with Random Discrete Data
Authors:
Michael Griebel,
Guanglian Li,
Christian Rieger
Abstract:
Many physical and mathematical models involve random fields in their input data. Examples are ordinary differential equations, partial differential equations and integro--differential equations with uncertainties in the coefficient functions described by random fields. They also play a dominant role in problems in machine learning. In this article, we do not assume to have knowledge of the moments…
▽ More
Many physical and mathematical models involve random fields in their input data. Examples are ordinary differential equations, partial differential equations and integro--differential equations with uncertainties in the coefficient functions described by random fields. They also play a dominant role in problems in machine learning. In this article, we do not assume to have knowledge of the moments or expansion terms of the random fields but we instead have only given discretized samples for them. We thus model some measurement process for this discrete information and then approximate the covariance operator of the original random field. Of course, the true covariance operator is of infinite rank and hence we can not assume to get an accurate approximation from a finite number of spatially discretized observations. On the other hand, smoothness of the true (unknown) covariance function results in effective low rank approximations to the true covariance operator. We derive explicit error estimates that involve the finite rank approximation error of the covariance operator, the Monte-Carlo-type errors for sampling in the stochastic domain and the numerical discretization error in the physical domain. This permits to give sufficient conditions on the three discretization parameters to guarantee that an error below a prescribed accuracy $\varepsilon$ is achieved.
△ Less
Submitted 5 December, 2021;
originally announced December 2021.
-
Hybrid Quantum Classical Graph Neural Networks for Particle Track Reconstruction
Authors:
Cenk Tüysüz,
Carla Rieger,
Kristiane Novotny,
Bilge Demirköz,
Daniel Dobos,
Karolos Potamianos,
Sofia Vallecorsa,
Jean-Roch Vlimant,
Richard Forster
Abstract:
The Large Hadron Collider (LHC) at the European Organisation for Nuclear Research (CERN) will be upgraded to further increase the instantaneous rate of particle collisions (luminosity) and become the High Luminosity LHC (HL-LHC). This increase in luminosity will significantly increase the number of particles interacting with the detector. The interaction of particles with a detector is referred to…
▽ More
The Large Hadron Collider (LHC) at the European Organisation for Nuclear Research (CERN) will be upgraded to further increase the instantaneous rate of particle collisions (luminosity) and become the High Luminosity LHC (HL-LHC). This increase in luminosity will significantly increase the number of particles interacting with the detector. The interaction of particles with a detector is referred to as "hit". The HL-LHC will yield many more detector hits, which will pose a combinatorial challenge by using reconstruction algorithms to determine particle trajectories from those hits. This work explores the possibility of converting a novel Graph Neural Network model, that can optimally take into account the sparse nature of the tracking detector data and their complex geometry, to a Hybrid Quantum-Classical Graph Neural Network that benefits from using Variational Quantum layers. We show that this hybrid model can perform similar to the classical approach. Also, we explore Parametrized Quantum Circuits (PQC) with different expressibility and entangling capacities, and compare their training performance in order to quantify the expected benefits. These results can be used to build a future road map to further develop circuit based Hybrid Quantum-Classical Graph Neural Networks.
△ Less
Submitted 26 September, 2021;
originally announced September 2021.
-
Vulnerabilities and Attacks Against Industrial Control Systems and Critical Infrastructures
Authors:
Georgios Michail Makrakis,
Constantinos Kolias,
Georgios Kambourakis,
Craig Rieger,
Jacob Benjamin
Abstract:
Critical infrastructures (CI) and industrial organizations aggressively move towards integrating elements of modern Information Technology (IT) into their monolithic Operational Technology (OT) architectures. Yet, as OT systems progressively become more and more interconnected, they silently have turned into alluring targets for diverse groups of adversaries. Meanwhile, the inherent complexity of…
▽ More
Critical infrastructures (CI) and industrial organizations aggressively move towards integrating elements of modern Information Technology (IT) into their monolithic Operational Technology (OT) architectures. Yet, as OT systems progressively become more and more interconnected, they silently have turned into alluring targets for diverse groups of adversaries. Meanwhile, the inherent complexity of these systems, along with their advanced-in-age nature, prevents defenders from fully applying contemporary security controls in a timely manner. Forsooth, the combination of these hindering factors has led to some of the most severe cybersecurity incidents of the past years. This work contributes a full-fledged and up-to-date survey of the most prominent threats against Industrial Control Systems (ICS) along with the communication protocols and devices adopted in these environments. Our study highlights that threats against CI follow an upward spiral due to the mushrooming of commodity tools and techniques that can facilitate either the early or late stages of attacks. Furthermore, our survey exposes that existing vulnerabilities in the design and implementation of several of the OT-specific network protocols may easily grant adversaries the ability to decisively impact physical processes. We provide a categorization of such threats and the corresponding vulnerabilities based on various criteria. As far as we are aware, this is the first time an exhaustive and detailed survey of this kind is attempted.
△ Less
Submitted 10 September, 2021; v1 submitted 8 September, 2021;
originally announced September 2021.
-
Performance of Particle Tracking Using a Quantum Graph Neural Network
Authors:
Cenk Tüysüz,
Kristiane Novotny,
Carla Rieger,
Federico Carminati,
Bilge Demirköz,
Daniel Dobos,
Fabio Fracas,
Karolos Potamianos,
Sofia Vallecorsa,
Jean-Roch Vlimant
Abstract:
The Large Hadron Collider (LHC) at the European Organisation for Nuclear Research (CERN) will be upgraded to further increase the instantaneous rate of particle collisions (luminosity) and become the High Luminosity LHC. This increase in luminosity, will yield many more detector hits (occupancy), and thus measurements will pose a challenge to track reconstruction algorithms being responsible to de…
▽ More
The Large Hadron Collider (LHC) at the European Organisation for Nuclear Research (CERN) will be upgraded to further increase the instantaneous rate of particle collisions (luminosity) and become the High Luminosity LHC. This increase in luminosity, will yield many more detector hits (occupancy), and thus measurements will pose a challenge to track reconstruction algorithms being responsible to determine particle trajectories from those hits. This work explores the possibility of converting a novel Graph Neural Network model, that proven itself for the track reconstruction task, to a Hybrid Graph Neural Network in order to benefit the exponentially growing Hilbert Space. Several Parametrized Quantum Circuits (PQC) are tested and their performance against the classical approach is compared. We show that the hybrid model can perform similar to the classical approach. We also present a future road map to further increase the performance of the current hybrid model.
△ Less
Submitted 25 January, 2021; v1 submitted 2 December, 2020;
originally announced December 2020.
-
A Particle Method without Remeshing
Authors:
Matthias Kirchhart,
Christian Rieger
Abstract:
We propose a simple tweak to a recently developed regularisation scheme for particle methods. This allows us to chose the particle spacing $h$ proportional to the regularisation length $σ$ and achieve optimal error bounds of the form $\mathcal{O}(σ^n)$, $n\in\mathbb{N}$, without any need of remeshing. We prove this result for the linear advection equation but also carry out high-order experiments…
▽ More
We propose a simple tweak to a recently developed regularisation scheme for particle methods. This allows us to chose the particle spacing $h$ proportional to the regularisation length $σ$ and achieve optimal error bounds of the form $\mathcal{O}(σ^n)$, $n\in\mathbb{N}$, without any need of remeshing. We prove this result for the linear advection equation but also carry out high-order experiments on the full Navier--Stokes equations. In our experiments the particle methods proved to be highly accurate, long-term stable, and competitive with discontinuous Galerkin methods.
△ Less
Submitted 16 October, 2019; v1 submitted 16 September, 2019;
originally announced September 2019.
-
On Critical Infrastructures, Their Security and Resilience - Trends and Vision
Authors:
Craig Rieger,
Milos Manic
Abstract:
This short paper is presented in observance and promotion of November, the National Month of Critical Infrastructure Security and Resilience (CISR), established by the United States Department of Homeland Security in 2013. The CISR term focuses on essential assets (critical infrastructures) and two ultimate goals of making them secure and resilient. These assets and goals were put together in 2013…
▽ More
This short paper is presented in observance and promotion of November, the National Month of Critical Infrastructure Security and Resilience (CISR), established by the United States Department of Homeland Security in 2013. The CISR term focuses on essential assets (critical infrastructures) and two ultimate goals of making them secure and resilient. These assets and goals were put together in 2013 in the now well-known Presidential Policy Directive on CISR (PPD-21). This paper presents easy-to-ready material laying down the building blocks of CISR - what it means to you as a regular citizen, professional, or government worker. This paper presents concepts behind security and resilience pertinent to various types of activities - from every day to field-specific activities. This paper also presents basic elements to the field: 1. high-level introduction to the organizational units dealing with CISR in the United States; 2. explanation of basic terms and a list of further reading material; and 3. several discussion topics on the vision and future of CISR in critical infrastructure cyber-physical systems.
△ Less
Submitted 6 December, 2018;
originally announced December 2018.
-
Kernel-based stochastic collocation for the random two-phase Navier-Stokes equations
Authors:
Michael Griebel,
Christian Rieger,
Peter Zaspel
Abstract:
In this work, we apply stochastic collocation methods with radial kernel basis functions for an uncertainty quantification of the random incompressible two-phase Navier-Stokes equations. Our approach is non-intrusive and we use the existing fluid dynamics solver NaSt3DGPF to solve the incompressible two-phase Navier-Stokes equation for each given realization. We are able to empirically show that t…
▽ More
In this work, we apply stochastic collocation methods with radial kernel basis functions for an uncertainty quantification of the random incompressible two-phase Navier-Stokes equations. Our approach is non-intrusive and we use the existing fluid dynamics solver NaSt3DGPF to solve the incompressible two-phase Navier-Stokes equation for each given realization. We are able to empirically show that the resulting kernel-based stochastic collocation is highly competitive in this setting and even outperforms some other standard methods.
△ Less
Submitted 11 April, 2019; v1 submitted 26 October, 2018;
originally announced October 2018.
-
A representer theorem for deep kernel learning
Authors:
Bastian Bohn,
Michael Griebel,
Christian Rieger
Abstract:
In this paper we provide a finite-sample and an infinite-sample representer theorem for the concatenation of (linear combinations of) kernel functions of reproducing kernel Hilbert spaces. These results serve as mathematical foundation for the analysis of machine learning algorithms based on compositions of functions. As a direct consequence in the finite-sample case, the corresponding infinite-di…
▽ More
In this paper we provide a finite-sample and an infinite-sample representer theorem for the concatenation of (linear combinations of) kernel functions of reproducing kernel Hilbert spaces. These results serve as mathematical foundation for the analysis of machine learning algorithms based on compositions of functions. As a direct consequence in the finite-sample case, the corresponding infinite-dimensional minimization problems can be recast into (nonlinear) finite-dimensional minimization problems, which can be tackled with nonlinear optimization algorithms. Moreover, we show how concatenated machine learning problems can be reformulated as neural networks and how our representer theorem applies to a broad class of state-of-the-art deep learning methods.
△ Less
Submitted 7 June, 2018; v1 submitted 29 September, 2017;
originally announced September 2017.
-
$\varepsilon$-dimension in infinite dimensional hyperbolic cross approximation and application to parametric elliptic PDEs
Authors:
Dinh Dũng,
Michael Griebel,
Vu Nhat Huy,
Christian Rieger
Abstract:
In this article, we present a cost-benefit analysis of the approximation in tensor products of Hilbert spaces of Sobolev-analytic type. The Sobolev part is defined on a finite dimensional domain, whereas the analytical space is defined on an infinite dimensional domain. As main mathematical tool, we use the $\varepsilon$-dimension of a subset in a Hilbert space. The $\varepsilon$-dimension gives t…
▽ More
In this article, we present a cost-benefit analysis of the approximation in tensor products of Hilbert spaces of Sobolev-analytic type. The Sobolev part is defined on a finite dimensional domain, whereas the analytical space is defined on an infinite dimensional domain. As main mathematical tool, we use the $\varepsilon$-dimension of a subset in a Hilbert space. The $\varepsilon$-dimension gives the lowest number of linear information that is needed to approximate an element from the set in the norm of the Hilbert space up to an accuracy $\varepsilon>0$. From a practical point of view this means that we a priori fix an accuracy and ask for the amount of information to achieve this accuracy. Such an analysis usually requires sharp estimates on the cardinality of certain index sets which are in our case infinite-dimensional hyperbolic crosses. As main result, we obtain sharp bounds of the $\varepsilon$-dimension of the Sobolev-analytic-type function classes which depend only on the smoothness differences in the Sobolev spaces and the dimension of the finite dimensional domain where these spaces are defined. This implies in particular that, up to constants, the costs of the infinite dimensional (analytical) approximation problem is dominated by the finite-variate Sobolev approximation problem. We demonstrate this procedure with an examples of functions spaces stemming from the regularity theory of parametric partial differential equation.
△ Less
Submitted 28 February, 2017;
originally announced March 2017.
-
An inverse theorem for compact Lipschitz regions in $R^d$ using localized kernel bases
Authors:
Thomas Hangelbroek,
Francis J. Narcowich,
Christian Rieger,
Joseph D. Ward
Abstract:
While inverse estimates in the context of radial basis function approximation on boundary-free domains have been known for at least ten years, such theorems for the more important and difficult setting of bounded domains have been notably absent. This article develops inverse estimates for finite dimensional spaces arising in radial basis function approximation and meshless methods. The inverse es…
▽ More
While inverse estimates in the context of radial basis function approximation on boundary-free domains have been known for at least ten years, such theorems for the more important and difficult setting of bounded domains have been notably absent. This article develops inverse estimates for finite dimensional spaces arising in radial basis function approximation and meshless methods. The inverse estimates we consider control Sobolev norms of linear combinations of a localized basis by the $L_p$ norm over a bounded domain. The localized basis is generated by forming local Lagrange functions for certain types of RBFs (namely Matérn and surface spline RBFs). In this way it extends the boundary-free construction of Fuselier, Hangelbroek, Narcowich, Ward and Wright.
△ Less
Submitted 29 October, 2016; v1 submitted 12 August, 2015;
originally announced August 2015.
-
Direct and Inverse Results on Bounded Domains for Meshless Methods via Localized Bases on Manifolds
Authors:
Thomas Hangelbroek,
Francis J. Narcowich,
Christian Rieger,
Joseph D. Ward
Abstract:
This article develops direct and inverse estimates for certain finite dimensional spaces arising in kernel approximation. Both the direct and inverse estimates are based on approximation spaces spanned by local Lagrange functions which are spatially highly localized. The construction of such functions is computationally efficient and generalizes the construction given by the authors for restricted…
▽ More
This article develops direct and inverse estimates for certain finite dimensional spaces arising in kernel approximation. Both the direct and inverse estimates are based on approximation spaces spanned by local Lagrange functions which are spatially highly localized. The construction of such functions is computationally efficient and generalizes the construction given by the authors for restricted surface splines on $\mathbb{R}^d$. The kernels for which the theory applies includes the Sobolev-Matérn kernels for closed, compact, connected, $C^\infty$ Riemannian manifolds.
△ Less
Submitted 6 September, 2017; v1 submitted 5 June, 2014;
originally announced June 2014.