-
On the Trade-off between Flatness and Optimization in Distributed Learning
Authors:
Ying Cao,
Zhaoxian Wu,
Kun Yuan,
Ali H. Sayed
Abstract:
This paper proposes a theoretical framework to evaluate and compare the performance of gradient-descent algorithms for distributed learning in relation to their behavior around local minima in nonconvex environments. Previous works have noticed that convergence toward flat local minima tend to enhance the generalization ability of learning algorithms. This work discovers two interesting results. F…
▽ More
This paper proposes a theoretical framework to evaluate and compare the performance of gradient-descent algorithms for distributed learning in relation to their behavior around local minima in nonconvex environments. Previous works have noticed that convergence toward flat local minima tend to enhance the generalization ability of learning algorithms. This work discovers two interesting results. First, it shows that decentralized learning strategies are able to escape faster away from local minimizers and favor convergence toward flatter minima relative to the centralized solution in the large-batch training regime. Second, and importantly, the ultimate classification accuracy is not solely dependent on the flatness of the local minimizer but also on how well a learning algorithm can approach that minimum. In other words, the classification accuracy is a function of both flatness and optimization performance. The paper examines the interplay between the two measures of flatness and optimization error closely. One important conclusion is that decentralized strategies of the diffusion type deliver enhanced classification accuracy because it strikes a more favorable balance between flatness and optimization performance.
△ Less
Submitted 28 June, 2024;
originally announced June 2024.
-
Differential error feedback for communication-efficient decentralized learning
Authors:
Roula Nassif,
Stefan Vlaski,
Marco Carpentiero,
Vincenzo Matta,
Ali H. Sayed
Abstract:
Communication-constrained algorithms for decentralized learning and optimization rely on local updates coupled with the exchange of compressed signals. In this context, differential quantization is an effective technique to mitigate the negative impact of compression by leveraging correlations between successive iterates. In addition, the use of error feedback, which consists of incorporating the…
▽ More
Communication-constrained algorithms for decentralized learning and optimization rely on local updates coupled with the exchange of compressed signals. In this context, differential quantization is an effective technique to mitigate the negative impact of compression by leveraging correlations between successive iterates. In addition, the use of error feedback, which consists of incorporating the compression error into subsequent steps, is a powerful mechanism to compensate for the bias caused by the compression. Under error feedback, performance guarantees in the literature have so far focused on algorithms employing a fusion center or a special class of contractive compressors that cannot be implemented with a finite number of bits. In this work, we propose a new decentralized communication-efficient learning approach that blends differential quantization with error feedback. The approach is specifically tailored for decentralized learning problems where agents have individual risk functions to minimize subject to subspace constraints that require the minimizers across the network to lie in low-dimensional subspaces. This constrained formulation includes consensus or single-task optimization as special cases, and allows for more general task relatedness models such as multitask smoothness and coupled optimization. We show that, under some general conditions on the compression noise, and for sufficiently small step-sizes $μ$, the resulting communication-efficient strategy is stable both in terms of mean-square error and average bit rate: by reducing $μ$, it is possible to keep the estimation errors small (on the order of $μ$) without increasing indefinitely the bit rate as $μ\rightarrow 0$. The results establish that, in the small step-size regime and with a finite number of bits, it is possible to attain the performance achievable in the absence of compression.
△ Less
Submitted 26 June, 2024;
originally announced June 2024.
-
Accelerated Stochastic Min-Max Optimization Based on Bias-corrected Momentum
Authors:
Haoyuan Cai,
Sulaiman A. Alghunaim,
Ali H. Sayed
Abstract:
Lower-bound analyses for nonconvex strongly-concave minimax optimization problems have shown that stochastic first-order algorithms require at least $\mathcal{O}(\varepsilon^{-4})$ oracle complexity to find an $\varepsilon$-stationary point. Some works indicate that this complexity can be improved to $\mathcal{O}(\varepsilon^{-3})$ when the loss gradient is Lipschitz continuous. The question of ac…
▽ More
Lower-bound analyses for nonconvex strongly-concave minimax optimization problems have shown that stochastic first-order algorithms require at least $\mathcal{O}(\varepsilon^{-4})$ oracle complexity to find an $\varepsilon$-stationary point. Some works indicate that this complexity can be improved to $\mathcal{O}(\varepsilon^{-3})$ when the loss gradient is Lipschitz continuous. The question of achieving enhanced convergence rates under distinct conditions, remains unresolved. In this work, we address this question for optimization problems that are nonconvex in the minimization variable and strongly concave or Polyak-Lojasiewicz (PL) in the maximization variable. We introduce novel bias-corrected momentum algorithms utilizing efficient Hessian-vector products. We establish convergence conditions and demonstrate a lower iteration complexity of $\mathcal{O}(\varepsilon^{-3})$ for the proposed algorithms. The effectiveness of the method is validated through applications to robust logistic regression using real-world datasets.
△ Less
Submitted 18 June, 2024;
originally announced June 2024.
-
Causal Influence in Federated Edge Inference
Authors:
Mert Kayaalp,
Yunus Inan,
Visa Koivunen,
Ali H. Sayed
Abstract:
In this paper, we consider a setting where heterogeneous agents with connectivity are performing inference using unlabeled streaming data. Observed data are only partially informative about the target variable of interest. In order to overcome the uncertainty, agents cooperate with each other by exchanging their local inferences with and through a fusion center. To evaluate how each agent influenc…
▽ More
In this paper, we consider a setting where heterogeneous agents with connectivity are performing inference using unlabeled streaming data. Observed data are only partially informative about the target variable of interest. In order to overcome the uncertainty, agents cooperate with each other by exchanging their local inferences with and through a fusion center. To evaluate how each agent influences the overall decision, we adopt a causal framework in order to distinguish the actual influence of agents from mere correlations within the decision-making process. Various scenarios reflecting different agent participation patterns and fusion center policies are investigated. We derive expressions to quantify the causal impact of each agent on the joint decision, which could be beneficial for anticipating and addressing atypical scenarios, such as adversarial attacks or system malfunctions. We validate our theoretical results with numerical simulations and a real-world application of multi-camera crowd counting.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Detection of Malicious Agents in Social Learning
Authors:
Valentina Shumovskaia,
Mert Kayaalp,
Ali H. Sayed
Abstract:
Non-Bayesian social learning is a framework for distributed hypothesis testing aimed at learning the true state of the environment. Traditionally, the agents are assumed to receive observations conditioned on the same true state, although it is also possible to examine the case of heterogeneous models across the graph. One important special case is when heterogeneity is caused by the presence of m…
▽ More
Non-Bayesian social learning is a framework for distributed hypothesis testing aimed at learning the true state of the environment. Traditionally, the agents are assumed to receive observations conditioned on the same true state, although it is also possible to examine the case of heterogeneous models across the graph. One important special case is when heterogeneity is caused by the presence of malicious agents whose goal is to move the agents toward a wrong hypothesis. In this work, we propose an algorithm that allows discovering the true state of every individual agent based on the sequence of their beliefs. In so doing, the methodology is also able to locate malicious behavior.
△ Less
Submitted 25 June, 2024; v1 submitted 19 March, 2024;
originally announced March 2024.
-
Asynchronous Diffusion Learning with Agent Subsampling and Local Updates
Authors:
Elsa Rizk,
Kun Yuan,
Ali H. Sayed
Abstract:
In this work, we examine a network of agents operating asynchronously, aiming to discover an ideal global model that suits individual local datasets. Our assumption is that each agent independently chooses when to participate throughout the algorithm and the specific subset of its neighbourhood with which it will cooperate at any given moment. When an agent chooses to take part, it undergoes multi…
▽ More
In this work, we examine a network of agents operating asynchronously, aiming to discover an ideal global model that suits individual local datasets. Our assumption is that each agent independently chooses when to participate throughout the algorithm and the specific subset of its neighbourhood with which it will cooperate at any given moment. When an agent chooses to take part, it undergoes multiple local updates before conveying its outcomes to the sub-sampled neighbourhood. Under this setup, we prove that the resulting asynchronous diffusion strategy is stable in the mean-square error sense and provide performance guarantees specifically for the federated learning setting. We illustrate the findings with numerical simulations.
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
Diffusion Stochastic Optimization for Min-Max Problems
Authors:
Haoyuan Cai,
Sulaiman A. Alghunaim,
Ali H. Sayed
Abstract:
The optimistic gradient method is useful in addressing minimax optimization problems. Motivated by the observation that the conventional stochastic version suffers from the need for a large batch size on the order of $\mathcal{O}(\varepsilon^{-2})$ to achieve an $\varepsilon$-stationary solution, we introduce and analyze a new formulation termed Diffusion Stochastic Same-Sample Optimistic Gradient…
▽ More
The optimistic gradient method is useful in addressing minimax optimization problems. Motivated by the observation that the conventional stochastic version suffers from the need for a large batch size on the order of $\mathcal{O}(\varepsilon^{-2})$ to achieve an $\varepsilon$-stationary solution, we introduce and analyze a new formulation termed Diffusion Stochastic Same-Sample Optimistic Gradient (DSS-OG). We prove its convergence and resolve the large batch issue by establishing a tighter upper bound, under the more general setting of nonconvex Polyak-Lojasiewicz (PL) risk functions. We also extend the applicability of the proposed method to the distributed scenario, where agents communicate with their neighbors via a left-stochastic protocol. To implement DSS-OG, we can query the stochastic gradient oracles in parallel with some extra memory overhead, resulting in a complexity comparable to its conventional counterpart. To demonstrate the efficacy of the proposed algorithm, we conduct tests by training generative adversarial networks.
△ Less
Submitted 25 January, 2024;
originally announced January 2024.
-
Social Learning in Community Structured Graphs
Authors:
Valentina Shumovskaia,
Mert Kayaalp,
Ali H. Sayed
Abstract:
Traditional social learning frameworks consider environments with a homogeneous state, where each agent receives observations conditioned on that true state of nature. In this work, we relax this assumption and study the distributed hypothesis testing problem in a heterogeneous environment, where each agent can receive observations conditioned on their own personalized state of nature (or truth).…
▽ More
Traditional social learning frameworks consider environments with a homogeneous state, where each agent receives observations conditioned on that true state of nature. In this work, we relax this assumption and study the distributed hypothesis testing problem in a heterogeneous environment, where each agent can receive observations conditioned on their own personalized state of nature (or truth). We particularly focus on community structured networks, where each community admits their own true hypothesis. This scenario is common in various contexts, such as when sensors are spatially distributed, or when individuals in a social network have differing views or opinions. We show that the adaptive social learning strategy is a preferred choice for nonstationary environments, and allows each cluster to discover its own truth.
△ Less
Submitted 12 June, 2024; v1 submitted 19 December, 2023;
originally announced December 2023.
-
A Data-Driven Framework for Improving Public EV Charging Infrastructure: Modeling and Forecasting
Authors:
Nassr Al-Dahabreh,
Mohammad Ali Sayed,
Khaled Sarieddine,
Mohamed Elhattab,
Maurice Khabbaz,
Ribal Atallah,
Chadi Assi
Abstract:
This work presents an investigation and assessment framework, which, supported by realistic data, aims at provisioning operators with in-depth insights into the consumer-perceived Quality-of-Experience (QoE) at public Electric Vehicle (EV) charging infrastructures. Motivated by the unprecedented EV market growth, it is suspected that the existing charging infrastructure will soon be no longer capa…
▽ More
This work presents an investigation and assessment framework, which, supported by realistic data, aims at provisioning operators with in-depth insights into the consumer-perceived Quality-of-Experience (QoE) at public Electric Vehicle (EV) charging infrastructures. Motivated by the unprecedented EV market growth, it is suspected that the existing charging infrastructure will soon be no longer capable of sustaining the rapidly growing charging demands; let alone that the currently adopted ad hoc infrastructure expansion strategies seem to be far from contributing any quality service sustainability solutions that tangibly reduce (ultimately mitigate) the severity of this problem. Without suitable QoE metrics, operators, today, face remarkable difficulty in assessing the performance of EV Charging Stations (EVCSs) in this regard. This paper aims at filling this gap through the formulation of novel and original critical QoE performance metrics that provide operators with visibility into the per-EVCS operational dynamics and allow for the optimization of these stations' respective utilization. Such metrics shall then be used as inputs to a Machine Learning model finely tailored and trained using recent real-world data sets for the purpose of forecasting future long-term EVCS loads. This will, in turn, allow for making informed optimal EV charging infrastructure expansions that will be capable of reliably co** with the rising EV charging demands and maintaining acceptable QoE levels. The model's accuracy has been tested and extensive simulations are conducted to evaluate the achieved performance in terms of the above listed metrics and show the suitability of the recommended infrastructure expansions.
△ Less
Submitted 8 December, 2023;
originally announced December 2023.
-
Edge AI for Internet of Energy: Challenges and Perspectives
Authors:
Yassine Himeur,
Aya Nabil Sayed,
Abdullah Alsalemi,
Faycal Bensaali,
Abbes Amira
Abstract:
The digital landscape of the Internet of Energy (IoE) is on the brink of a revolutionary transformation with the integration of edge Artificial Intelligence (AI). This comprehensive review elucidates the promise and potential that edge AI holds for resha** the IoE ecosystem. Commencing with a meticulously curated research methodology, the article delves into the myriad of edge AI techniques spec…
▽ More
The digital landscape of the Internet of Energy (IoE) is on the brink of a revolutionary transformation with the integration of edge Artificial Intelligence (AI). This comprehensive review elucidates the promise and potential that edge AI holds for resha** the IoE ecosystem. Commencing with a meticulously curated research methodology, the article delves into the myriad of edge AI techniques specifically tailored for IoE. The myriad benefits, spanning from reduced latency and real-time analytics to the pivotal aspects of information security, scalability, and cost-efficiency, underscore the indispensability of edge AI in modern IoE frameworks. As the narrative progresses, readers are acquainted with pragmatic applications and techniques, highlighting on-device computation, secure private inference methods, and the avant-garde paradigms of AI training on the edge. A critical analysis follows, offering a deep dive into the present challenges including security concerns, computational hurdles, and standardization issues. However, as the horizon of technology ever expands, the review culminates in a forward-looking perspective, envisaging the future symbiosis of 5G networks, federated edge AI, deep reinforcement learning, and more, painting a vibrant panorama of what the future beholds. For anyone vested in the domains of IoE and AI, this review offers both a foundation and a visionary lens, bridging the present realities with future possibilities.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
Parkinson's Disease Detection through Vocal Biomarkers and Advanced Machine Learning Algorithms
Authors:
Md Abu Sayed,
Maliha Tayaba,
MD Tanvir Islam,
Md Eyasin Ul Islam Pavel,
Md Tuhin Mia,
Eftekhar Hossain Ayon,
Nur Nob,
Bishnu Padh Ghosh
Abstract:
Parkinson's disease (PD) is a prevalent neurodegenerative disorder known for its impact on motor neurons, causing symptoms like tremors, stiffness, and gait difficulties. This study explores the potential of vocal feature alterations in PD patients as a means of early disease prediction. This research aims to predict the onset of Parkinson's disease. Utilizing a variety of advanced machine-learnin…
▽ More
Parkinson's disease (PD) is a prevalent neurodegenerative disorder known for its impact on motor neurons, causing symptoms like tremors, stiffness, and gait difficulties. This study explores the potential of vocal feature alterations in PD patients as a means of early disease prediction. This research aims to predict the onset of Parkinson's disease. Utilizing a variety of advanced machine-learning algorithms, including XGBoost, LightGBM, Bagging, AdaBoost, and Support Vector Machine, among others, the study evaluates the predictive performance of these models using metrics such as accuracy, area under the curve (AUC), sensitivity, and specificity. The findings of this comprehensive analysis highlight LightGBM as the most effective model, achieving an impressive accuracy rate of 96% alongside a matching AUC of 96%. LightGBM exhibited a remarkable sensitivity of 100% and specificity of 94.43%, surpassing other machine learning algorithms in accuracy and AUC scores. Given the complexities of Parkinson's disease and its challenges in early diagnosis, this study underscores the significance of leveraging vocal biomarkers coupled with advanced machine-learning techniques for precise and timely PD detection.
△ Less
Submitted 2 December, 2023; v1 submitted 9 November, 2023;
originally announced November 2023.
-
Improving Cardiovascular Disease Prediction Through Comparative Analysis of Machine Learning Models: A Case Study on Myocardial Infarction
Authors:
Jonayet Miah,
Duc M Ca,
Md Abu Sayed,
Ehsanur Rashid Lipu,
Fuad Mahmud,
S M Yasir Arafat
Abstract:
Cardiovascular disease remains a leading cause of mortality in the contemporary world. Its association with smoking, elevated blood pressure, and cholesterol levels underscores the significance of these risk factors. This study addresses the challenge of predicting myocardial illness, a formidable task in medical research. Accurate predictions are pivotal for refining healthcare strategies. This i…
▽ More
Cardiovascular disease remains a leading cause of mortality in the contemporary world. Its association with smoking, elevated blood pressure, and cholesterol levels underscores the significance of these risk factors. This study addresses the challenge of predicting myocardial illness, a formidable task in medical research. Accurate predictions are pivotal for refining healthcare strategies. This investigation conducts a comparative analysis of six distinct machine learning models: Logistic Regression, Support Vector Machine, Decision Tree, Bagging, XGBoost, and LightGBM. The attained outcomes exhibit promise, with accuracy rates as follows: Logistic Regression (81.00%), Support Vector Machine (75.01%), XGBoost (92.72%), LightGBM (90.60%), Decision Tree (82.30%), and Bagging (83.01%). Notably, XGBoost emerges as the top-performing model. These findings underscore its potential to enhance predictive precision for coronary infarction. As the prevalence of cardiovascular risk factors persists, incorporating advanced machine learning techniques holds the potential to refine proactive medical interventions.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
Generative AI Model for Artistic Style Transfer Using Convolutional Neural Networks
Authors:
Jonayet Miah,
Duc M Cao,
Md Abu Sayed,
Md. Sabbirul Haque
Abstract:
Artistic style transfer, a captivating application of generative artificial intelligence, involves fusing the content of one image with the artistic style of another to create unique visual compositions. This paper presents a comprehensive overview of a novel technique for style transfer using Convolutional Neural Networks (CNNs). By leveraging deep image representations learned by CNNs, we demons…
▽ More
Artistic style transfer, a captivating application of generative artificial intelligence, involves fusing the content of one image with the artistic style of another to create unique visual compositions. This paper presents a comprehensive overview of a novel technique for style transfer using Convolutional Neural Networks (CNNs). By leveraging deep image representations learned by CNNs, we demonstrate how to separate and manipulate image content and style, enabling the synthesis of high-quality images that combine content and style in a harmonious manner. We describe the methodology, including content and style representations, loss computation, and optimization, and showcase experimental results highlighting the effectiveness and versatility of the approach across different styles and content
△ Less
Submitted 30 October, 2023; v1 submitted 27 October, 2023;
originally announced October 2023.
-
An Electric Vehicle Control Strategy to Mitigate Load Altering Attacks Against Power Grids
Authors:
Mohammad Ali Sayed,
Mohsen Ghafouri,
Ribal Atallah,
Mourad Debbabi,
Chadi Assi
Abstract:
Due to growing environmental concerns, the world's governments have been encouraging the shift of the transportation sector towards the adoption of Electric Vehicles (EVs). As a result, EV numbers have been growing exponentially and are expected to continue growing further which will add a large EV charging load to the power grid. To this end, this paper presents an EV-based defense mechanism agai…
▽ More
Due to growing environmental concerns, the world's governments have been encouraging the shift of the transportation sector towards the adoption of Electric Vehicles (EVs). As a result, EV numbers have been growing exponentially and are expected to continue growing further which will add a large EV charging load to the power grid. To this end, this paper presents an EV-based defense mechanism against Load-Altering (LA) attacks targeting the grid. The developed mechanism utilizes H-infinity controllers and Linear Matrix Inequalities (LMIs) to mitigate LA attacks. After the controller synthesis and presentation of the attack scenarios, we demonstrate the effectiveness and success of our defense mechanism against the three known types of LA attacks. The scenarios include three 800 MW LA attacks against the New England 39-bus grid. The results demonstrate how our EV-based mitigation scheme eliminates the attack impacts and maintains the grid's stability in face of an unknown persisting attack.
△ Less
Submitted 22 October, 2023;
originally announced October 2023.
-
Assessing the Influence of Different Types of Probing on Adversarial Decision-Making in a Deception Game
Authors:
Md Abu Sayed,
Mohammad Ariful Islam Khan,
Bryant A Allsup,
Joshua Zamora,
Palvi Aggarwal
Abstract:
Deception, which includes leading cyber-attackers astray with false information, has shown to be an effective method of thwarting cyber-attacks. There has been little investigation of the effect of probing action costs on adversarial decision-making, despite earlier studies on deception in cybersecurity focusing primarily on variables like network size and the percentage of honeypots utilized in g…
▽ More
Deception, which includes leading cyber-attackers astray with false information, has shown to be an effective method of thwarting cyber-attacks. There has been little investigation of the effect of probing action costs on adversarial decision-making, despite earlier studies on deception in cybersecurity focusing primarily on variables like network size and the percentage of honeypots utilized in games. Understanding human decision-making when prompted with choices of various costs is essential in many areas such as in cyber security. In this paper, we will use a deception game (DG) to examine different costs of probing on adversarial decisions. To achieve this we utilized an IBLT model and a delayed feedback mechanism to mimic knowledge of human actions. Our results were taken from an even split of deception and no deception to compare each influence. It was concluded that probing was slightly taken less as the cost of probing increased. The proportion of attacks stayed relatively the same as the cost of probing increased. Although a constant cost led to a slight decrease in attacks. Overall, our results concluded that the different probing costs do not have an impact on the proportion of attacks whereas it had a slightly noticeable impact on the proportion of probing.
△ Less
Submitted 8 January, 2024; v1 submitted 15 September, 2023;
originally announced October 2023.
-
A Survey of Network Requirements for Enabling Effective Cyber Deception
Authors:
Md Abu Sayed,
Moqsadur Rahman,
Mohammad Ariful Islam Khan,
Deepak Tosh
Abstract:
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence as a proactive defense strategy against sophisticated attacks. This paper presents a comprehensive survey that investigates the crucial network requirements essential for the successful implementation of effective cyber deception techniques. With a focus on diverse network architectures and topolog…
▽ More
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence as a proactive defense strategy against sophisticated attacks. This paper presents a comprehensive survey that investigates the crucial network requirements essential for the successful implementation of effective cyber deception techniques. With a focus on diverse network architectures and topologies, we delve into the intricate relationship between network characteristics and the deployment of deception mechanisms. This survey provides an in-depth analysis of prevailing cyber deception frameworks, highlighting their strengths and limitations in meeting the requirements for optimal efficacy. By synthesizing insights from both theoretical and practical perspectives, we contribute to a comprehensive understanding of the network prerequisites crucial for enabling robust and adaptable cyber deception strategies.
△ Less
Submitted 8 January, 2024; v1 submitted 31 August, 2023;
originally announced September 2023.
-
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach
Authors:
Md Abu Sayed,
Ahmed H. Anwar,
Christopher Kiekintveld,
Charles Kamhoua
Abstract:
Honeypots play a crucial role in implementing various cyber deception techniques as they possess the capability to divert attackers away from valuable assets. Careful strategic placement of honeypots in networks should consider not only network aspects but also attackers' preferences. The allocation of honeypots in tactical networks under network mobility is of great interest. To achieve this obje…
▽ More
Honeypots play a crucial role in implementing various cyber deception techniques as they possess the capability to divert attackers away from valuable assets. Careful strategic placement of honeypots in networks should consider not only network aspects but also attackers' preferences. The allocation of honeypots in tactical networks under network mobility is of great interest. To achieve this objective, we present a game-theoretic approach that generates optimal honeypot allocation strategies within an attack/defense scenario. Our proposed approach takes into consideration the changes in network connectivity. In particular, we introduce a two-player dynamic game model that explicitly incorporates the future state evolution resulting from changes in network connectivity. The defender's objective is twofold: to maximize the likelihood of the attacker hitting a honeypot and to minimize the cost associated with deception and reconfiguration due to changes in network topology. We present an iterative algorithm to find Nash equilibrium strategies and analyze the scalability of the algorithm. Finally, we validate our approach and present numerical results based on simulations, demonstrating that our game model successfully enhances network security. Additionally, we have proposed additional enhancements to improve the scalability of the proposed approach.
△ Less
Submitted 18 September, 2023; v1 submitted 22 August, 2023;
originally announced August 2023.
-
Prediction of Pneumonia and COVID-19 Using Deep Neural Networks
Authors:
M. S. Haque,
M. S. Taluckder,
S. B. Shawkat,
M. A. Shahriyar,
M. A. Sayed,
C. Modak
Abstract:
Pneumonia, caused by bacteria and viruses, is a rapidly spreading viral infection with global implications. Prompt identification of infected individuals is crucial for containing its transmission. This study explores the potential of medical image analysis to address this challenge. We propose machine-learning techniques for predicting Pneumonia from chest X-ray images. Chest X-ray imaging is vit…
▽ More
Pneumonia, caused by bacteria and viruses, is a rapidly spreading viral infection with global implications. Prompt identification of infected individuals is crucial for containing its transmission. This study explores the potential of medical image analysis to address this challenge. We propose machine-learning techniques for predicting Pneumonia from chest X-ray images. Chest X-ray imaging is vital for Pneumonia diagnosis due to its accessibility and cost-effectiveness. However, interpreting X-rays for Pneumonia detection can be complex, as radiographic features can overlap with other respiratory conditions. We evaluate the performance of different machine learning models, including DenseNet121, Inception Resnet-v2, Inception Resnet-v3, Resnet50, and Xception, using chest X-ray images of pneumonia patients. Performance measures and confusion matrices are employed to assess and compare the models. The findings reveal that DenseNet121 outperforms other models, achieving an accuracy rate of 99.58%. This study underscores the significance of machine learning in the accurate detection of Pneumonia, leveraging chest X-ray images. Our study offers insights into the potential of technology to mitigate the spread of pneumonia through precise diagnostics.
△ Less
Submitted 20 August, 2023;
originally announced August 2023.
-
Understanding Dhaka City Traffic Intensity and Traffic Expansion Using Gravity Model
Authors:
Md Abu Sayed,
Md Maksudur Rahman,
Moinul Islam Zaber,
Amin Ahsan Ali
Abstract:
Analysis of traffic pattern recognition and traffic congestion expansion in real time are one of the exciting and challenging tasks which help the government to build a robust and sustainable traffic management system specially in a densely populated city like Dhaka. In this paper, we analyze the traffic intensity for small areas which are also known as junction points or corridors. We describe Dh…
▽ More
Analysis of traffic pattern recognition and traffic congestion expansion in real time are one of the exciting and challenging tasks which help the government to build a robust and sustainable traffic management system specially in a densely populated city like Dhaka. In this paper, we analyze the traffic intensity for small areas which are also known as junction points or corridors. We describe Dhaka city traffic expansion from a congestion point by using gravity model. However, we process real-time traffic data of Dhaka city rather than depend on survey and interview. We exactly show that traffic expansion of Dhaka city exactly follows gravity model. Expansion of traffic from a congestion point spreads out rapidly to its neighbor and impact of congested point decreases as the distance increases from that congested point. This analysis will help the government making a planned urbanized Dhaka city in order to reduce traffic jam.
△ Less
Submitted 26 July, 2023;
originally announced August 2023.
-
Protecting the Future Grid: An Electric Vehicle Robust Mitigation Scheme Against Load Altering Attacks on Power Grids
Authors:
Mohammad Ali Sayed,
Mohsen Ghafouri,
Ribal Atallah,
Mourad Debbabi,
Chadi Assi
Abstract:
Due to the growing threat of climate change, the worlds governments have been encouraging the adoption of Electric Vehicles (EVs). As a result, EV numbers have been growing exponentially which will introduce a large EV charging load into the power grid. On this basis, we present a scheme to utilize EVs as a defense mechanism to mitigate Load-Altering (LA) attacks against the grid. The developed sc…
▽ More
Due to the growing threat of climate change, the worlds governments have been encouraging the adoption of Electric Vehicles (EVs). As a result, EV numbers have been growing exponentially which will introduce a large EV charging load into the power grid. On this basis, we present a scheme to utilize EVs as a defense mechanism to mitigate Load-Altering (LA) attacks against the grid. The developed scheme relies on robust control theory and Linear Matrix Inequalities (LMIs). Our EV-based defense mechanism is formulated as a feedback controller synthesized using H-2 and H-infinity control techniques to eliminate the impact of unknown LA attacks. The controller synthesis considers the grid topology and the uncertainties of the EV connection to the grid. To demonstrate the effectiveness of the proposed mitigation scheme, it is tested against three types of LA attacks on the New England 39-bus grid. We test our mitigation scheme against 800 MW static, switching, and dynamic attacks in the presence of multiple sources of uncertainty that can affect the EV load during deployment. The results demonstrate how the grid remains stable under the LA attacks that would otherwise lead to serious instabilities.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
Cyber Deception against Zero-day Attacks: A Game Theoretic Approach
Authors:
Md Abu Sayed,
Ahmed H. Anwar,
Christopher Kiekintveld,
Branislav Bosansky,
Charles Kamhoua
Abstract:
Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have been used to deceive attackers by misrepresenting the true state of the network. Existing work on cyber deception does not model zero-day attacks. In this paper, we address the question of "H…
▽ More
Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have been used to deceive attackers by misrepresenting the true state of the network. Existing work on cyber deception does not model zero-day attacks. In this paper, we address the question of "How to allocate honeypots over the network?" to protect its most valuable assets. To this end, we develop a two-player zero-sum game theoretic approach to study the potential reconnaissance tracks and attack paths that attackers may use. However, zero-day attacks allow attackers to avoid placed honeypots by creating new attack paths. Therefore, we introduce a sensitivity analysis to investigate the impact of different zero-day vulnerabilities on the performance of the proposed deception technique. Next, we propose several mitigating strategies to defend the network against zero-day attacks based on this analysis. Finally, our numerical results validate our findings and illustrate the effectiveness of the proposed defense approach.
△ Less
Submitted 25 July, 2023; v1 submitted 24 July, 2023;
originally announced July 2023.
-
Causal Influences over Social Learning Networks
Authors:
Mert Kayaalp,
Ali H. Sayed
Abstract:
This paper investigates causal influences between agents linked by a social graph and interacting over time. In particular, the work examines the dynamics of social learning models and distributed decision-making protocols, and derives expressions that reveal the causal relations between pairs of agents and explain the flow of influence over the network. The results turn out to be dependent on the…
▽ More
This paper investigates causal influences between agents linked by a social graph and interacting over time. In particular, the work examines the dynamics of social learning models and distributed decision-making protocols, and derives expressions that reveal the causal relations between pairs of agents and explain the flow of influence over the network. The results turn out to be dependent on the graph topology and the level of information that each agent has about the inference problem they are trying to solve. Using these conclusions, the paper proposes an algorithm to rank the overall influence between agents to discover highly influential agents. It also provides a method to learn the necessary model parameters from raw observational data. The results and the proposed algorithm are illustrated by considering both synthetic data and real Twitter data.
△ Less
Submitted 13 July, 2023;
originally announced July 2023.
-
Non-Asymptotic Performance of Social Machine Learning Under Limited Data
Authors:
** Hu,
Virginia Bordignon,
Mert Kayaalp,
Ali H. Sayed
Abstract:
This paper studies the probability of error associated with the social machine learning framework, which involves an independent training phase followed by a cooperative decision-making phase over a graph. This framework addresses the problem of classifying a stream of unlabeled data in a distributed manner. We consider two kinds of classification tasks with limited observations in the prediction…
▽ More
This paper studies the probability of error associated with the social machine learning framework, which involves an independent training phase followed by a cooperative decision-making phase over a graph. This framework addresses the problem of classifying a stream of unlabeled data in a distributed manner. We consider two kinds of classification tasks with limited observations in the prediction phase, namely, the statistical classification task and the single-sample classification task. For each task, we describe the distributed learning rule and analyze the probability of error accordingly. To do so, we first introduce a stronger consistent training condition that involves the margin distributions generated by the trained classifiers. Based on this condition, we derive an upper bound on the probability of error for both tasks, which depends on the statistical properties of the data and the combination policy used to combine the distributed classifiers. For the statistical classification problem, we employ the geometric social learning rule and conduct a non-asymptotic performance analysis. An exponential decay of the probability of error with respect to the number of unlabeled samples is observed in the upper bound. For the single-sample classification task, a distributed learning rule that functions as an ensemble classifier is constructed. An upper bound on the probability of error of this ensemble classifier is established.
△ Less
Submitted 15 June, 2023;
originally announced June 2023.
-
Resilient-Economic Coordinated Robust Operation of Integrated Electric-Gas Systems
Authors:
Ahmed Rabee Sayed,
Cheng Wang,
Tianshu Bi
Abstract:
Interactions between power and gas systems, which are both large and complex, have been gradually intensified during the last decades, predominantly due to the propagation of large fleet natural gas-fired power units (GPUs) and the technological developments of power-to-gas (P2G) facilities. These interactions not only bring significant economic benefits to society but also provide additional oper…
▽ More
Interactions between power and gas systems, which are both large and complex, have been gradually intensified during the last decades, predominantly due to the propagation of large fleet natural gas-fired power units (GPUs) and the technological developments of power-to-gas (P2G) facilities. These interactions not only bring significant economic benefits to society but also provide additional operating flexibilities, which are essential to handle fluctuations of the large-scale renewable power generation (RPG) and power system contingencies. Moreover, neglecting these interactions in power system operation may not only result in infeasible operation status in the gas systems but also increase the decision-making operation costs of both systems. previous studies suffered from two significant drawbacks, namely (1) they assumed the existence of only one utility that has full control authority over the power system and gas system; (2) the economic interactions between power systems and gas systems have been neglected, which goes against the current industrial practice. This research revisits the day-ahead resilient and economic operations of power systems considering the economic and physical interactions with gas systems, which are characterized by the modeling of bilateral energy purchase contracts and operational constraints of gas systems. This thesis provides a novel perspective and solution for the resilient and economically coordinated robust operation of integrated electric-gas systems (IEGSs) under uncertainties. The proposed robust scheduling decision frameworks are practically compatible with the existing industrial operations of the IEGSs.
△ Less
Submitted 1 May, 2023; v1 submitted 28 April, 2023;
originally announced April 2023.
-
Graph Exploration for Effective Multi-agent Q-Learning
Authors:
Ainur Zhaikhan,
Ali H. Sayed
Abstract:
This paper proposes an exploration technique for multi-agent reinforcement learning (MARL) with graph-based communication among agents. We assume the individual rewards received by the agents are independent of the actions by the other agents, while their policies are coupled. In the proposed framework, neighbouring agents collaborate to estimate the uncertainty about the state-action space in ord…
▽ More
This paper proposes an exploration technique for multi-agent reinforcement learning (MARL) with graph-based communication among agents. We assume the individual rewards received by the agents are independent of the actions by the other agents, while their policies are coupled. In the proposed framework, neighbouring agents collaborate to estimate the uncertainty about the state-action space in order to execute more efficient explorative behaviour. Different from existing works, the proposed algorithm does not require counting mechanisms and can be applied to continuous-state environments without requiring complex conversion techniques. Moreover, the proposed scheme allows agents to communicate in a fully decentralized manner with minimal information exchange. And for continuous-state scenarios, each agent needs to exchange only a single parameter vector. The performance of the algorithm is verified with theoretical results for discrete-state scenarios and with experiments for continuous ones.
△ Less
Submitted 19 April, 2023;
originally announced April 2023.
-
Compressed Regression over Adaptive Networks
Authors:
Marco Carpentiero,
Vincenzo Matta,
Ali H. Sayed
Abstract:
In this work we derive the performance achievable by a network of distributed agents that solve, adaptively and in the presence of communication constraints, a regression problem. Agents employ the recently proposed ACTC (adapt-compress-then-combine) diffusion strategy, where the signals exchanged locally by neighboring agents are encoded with randomized differential compression operators. We prov…
▽ More
In this work we derive the performance achievable by a network of distributed agents that solve, adaptively and in the presence of communication constraints, a regression problem. Agents employ the recently proposed ACTC (adapt-compress-then-combine) diffusion strategy, where the signals exchanged locally by neighboring agents are encoded with randomized differential compression operators. We provide a detailed characterization of the mean-square estimation error, which is shown to comprise a term related to the error that agents would achieve without communication constraints, plus a term arising from compression. The analysis reveals quantitative relationships between the compression loss and fundamental attributes of the distributed regression problem, in particular, the stochastic approximation error caused by the gradient noise and the network topology (through the Perron eigenvector). We show that knowledge of such relationships is critical to allocate optimally the communication resources across the agents, taking into account their individual attributes, such as the quality of their data or their degree of centrality in the network topology. We devise an optimized allocation strategy where the parameters necessary for the optimization can be learned online by the agents. Illustrative examples show that a significant performance improvement, as compared to a blind (i.e., uniform) resource allocation, can be achieved by optimizing the allocation by means of the provided mean-square-error formulas.
△ Less
Submitted 7 April, 2023;
originally announced April 2023.
-
Decentralized Adversarial Training over Graphs
Authors:
Ying Cao,
Elsa Rizk,
Stefan Vlaski,
Ali H. Sayed
Abstract:
The vulnerability of machine learning models to adversarial attacks has been attracting considerable attention in recent years. Most existing studies focus on the behavior of stand-alone single-agent learners. In comparison, this work studies adversarial training over graphs, where individual agents are subjected to perturbations of varied strength levels across space. It is expected that interact…
▽ More
The vulnerability of machine learning models to adversarial attacks has been attracting considerable attention in recent years. Most existing studies focus on the behavior of stand-alone single-agent learners. In comparison, this work studies adversarial training over graphs, where individual agents are subjected to perturbations of varied strength levels across space. It is expected that interactions by linked agents, and the heterogeneity of the attack models that are possible over the graph, can help enhance robustness in view of the coordination power of the group. Using a min-max formulation of diffusion learning, we develop a decentralized adversarial training framework for multi-agent systems. We analyze the convergence properties of the proposed scheme for both convex and non-convex environments, and illustrate the enhanced robustness to adversarial attacks.
△ Less
Submitted 23 March, 2023;
originally announced March 2023.
-
On the Fusion Strategies for Federated Decision Making
Authors:
Mert Kayaalp,
Yunus Inan,
Visa Koivunen,
Emre Telatar,
Ali H. Sayed
Abstract:
We consider the problem of information aggregation in federated decision making, where a group of agents collaborate to infer the underlying state of nature without sharing their private data with the central processor or each other. We analyze the non-Bayesian social learning strategy in which agents incorporate their individual observations into their opinions (i.e., soft-decisions) with Bayes r…
▽ More
We consider the problem of information aggregation in federated decision making, where a group of agents collaborate to infer the underlying state of nature without sharing their private data with the central processor or each other. We analyze the non-Bayesian social learning strategy in which agents incorporate their individual observations into their opinions (i.e., soft-decisions) with Bayes rule, and the central processor aggregates these opinions by arithmetic or geometric averaging. Building on our previous work, we establish that both pooling strategies result in asymptotic normality characterization of the system, which, for instance, can be utilized to derive approximate expressions for the error probability. We verify the theoretical findings with simulations and compare both strategies.
△ Less
Submitted 8 May, 2023; v1 submitted 10 March, 2023;
originally announced March 2023.
-
Multi-Agent Adversarial Training Using Diffusion Learning
Authors:
Ying Cao,
Elsa Rizk,
Stefan Vlaski,
Ali H. Sayed
Abstract:
This work focuses on adversarial learning over graphs. We propose a general adversarial training framework for multi-agent systems using diffusion learning. We analyze the convergence properties of the proposed scheme for convex optimization problems, and illustrate its enhanced robustness to adversarial attacks.
This work focuses on adversarial learning over graphs. We propose a general adversarial training framework for multi-agent systems using diffusion learning. We analyze the convergence properties of the proposed scheme for convex optimization problems, and illustrate its enhanced robustness to adversarial attacks.
△ Less
Submitted 3 March, 2023;
originally announced March 2023.
-
Edge-Based Detection and Localization of Adversarial Oscillatory Load Attacks Orchestrated By Compromised EV Charging Stations
Authors:
Khaled Sarieddine,
Mohammad Ali Sayed,
Sadegh Torabi,
Ribal Atallah,
Chadi Assi
Abstract:
In this paper, we investigate an edge-based approach for the detection and localization of coordinated oscillatory load attacks initiated by exploited EV charging stations against the power grid. We rely on the behavioral characteristics of the power grid in the presence of interconnected EVCS while combining cyber and physical layer features to implement deep learning algorithms for the effective…
▽ More
In this paper, we investigate an edge-based approach for the detection and localization of coordinated oscillatory load attacks initiated by exploited EV charging stations against the power grid. We rely on the behavioral characteristics of the power grid in the presence of interconnected EVCS while combining cyber and physical layer features to implement deep learning algorithms for the effective detection of oscillatory load attacks at the EVCS. We evaluate the proposed detection approach by building a real-time test bed to synthesize benign and malicious data, which was generated by analyzing real-life EV charging data collected during recent years. The results demonstrate the effectiveness of the implemented approach with the Convolutional Long-Short Term Memory model producing optimal classification accuracy (99.4\%). Moreover, our analysis results shed light on the impact of such detection mechanisms towards building resiliency into different levels of the EV charging ecosystem while allowing power grid operators to localize attacks and take further mitigation measures. Specifically, we managed to decentralize the detection mechanism of oscillatory load attacks and create an effective alternative for operator-centric mechanisms to mitigate multi-operator and MitM oscillatory load attacks against the power grid. Finally, we leverage the created test bed to evaluate a distributed mitigation technique, which can be deployed on public/private charging stations to average out the impact of oscillatory load attacks while allowing the power system to recover smoothly within 1 second with minimal overhead.
△ Less
Submitted 24 February, 2023;
originally announced February 2023.
-
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security
Authors:
Khaled Sarieddine,
Mohammad Ali Sayed,
Danial Jafarigiv,
Ribal Atallah,
Mourad Debbabi,
Chadi Assi
Abstract:
Faced with the threat of climate change, the world is rapidly adopting Electric Vehicles (EVs). The EV ecosystem, however, is vulnerable to cyber-attacks putting it and the power grid at risk. In this article, we present a security-oriented real-time Co-simulation Testbed for the EV ecosystem and the power grid.
Faced with the threat of climate change, the world is rapidly adopting Electric Vehicles (EVs). The EV ecosystem, however, is vulnerable to cyber-attacks putting it and the power grid at risk. In this article, we present a security-oriented real-time Co-simulation Testbed for the EV ecosystem and the power grid.
△ Less
Submitted 24 February, 2023;
originally announced February 2023.
-
Policy Evaluation in Decentralized POMDPs with Belief Sharing
Authors:
Mert Kayaalp,
Fatima Ghadieh,
Ali H. Sayed
Abstract:
Most works on multi-agent reinforcement learning focus on scenarios where the state of the environment is fully observable. In this work, we consider a cooperative policy evaluation task in which agents are not assumed to observe the environment state directly. Instead, agents can only have access to noisy observations and to belief vectors. It is well-known that finding global posterior distribut…
▽ More
Most works on multi-agent reinforcement learning focus on scenarios where the state of the environment is fully observable. In this work, we consider a cooperative policy evaluation task in which agents are not assumed to observe the environment state directly. Instead, agents can only have access to noisy observations and to belief vectors. It is well-known that finding global posterior distributions under multi-agent settings is generally NP-hard. As a remedy, we propose a fully decentralized belief forming strategy that relies on individual updates and on localized interactions over a communication network. In addition to the exchange of the beliefs, agents exploit the communication network by exchanging value function parameter estimates as well. We analytically show that the proposed strategy allows information to diffuse over the network, which in turn allows the agents' parameters to have a bounded difference with a centralized baseline. A multi-sensor target tracking application is considered in the simulations.
△ Less
Submitted 16 May, 2023; v1 submitted 8 February, 2023;
originally announced February 2023.
-
Memory-Aware Social Learning under Partial Information Sharing
Authors:
Michele Cirillo,
Virginia Bordignon,
Vincenzo Matta,
Ali H. Sayed
Abstract:
This work examines a social learning problem, where dispersed agents connected through a network topology interact locally to form their opinions (beliefs) as regards certain hypotheses of interest. These opinions evolve over time, since the agents collect observations from the environment, and update their current beliefs by accounting for: their past beliefs, the innovation contained in the new…
▽ More
This work examines a social learning problem, where dispersed agents connected through a network topology interact locally to form their opinions (beliefs) as regards certain hypotheses of interest. These opinions evolve over time, since the agents collect observations from the environment, and update their current beliefs by accounting for: their past beliefs, the innovation contained in the new data, and the beliefs received from the neighbors. The distinguishing feature of the present work is that agents are constrained to share opinions regarding only a single hypothesis. We devise a novel learning strategy where each agent forms a valid belief by completing the partial beliefs received from its neighbors. This completion is performed by exploiting the knowledge accumulated in the past beliefs, thanks to a principled memory-aware rule inspired by a Bayesian criterion. The analysis allows us to characterize the role of memory in social learning under partial information sharing, revealing novel and nontrivial learning dynamics. Surprisingly, we establish that the standard classification rule based on selecting the maximum belief is not optimal under partial information sharing, while there exists a consistent threshold-based decision rule that allows each agent to classify correctly the hypothesis of interest. We also show that the proposed strategy outperforms previously considered schemes, highlighting that the introduction of memory in the social learning algorithm is critical to overcome the limitations arising from sharing partial information.
△ Less
Submitted 25 January, 2023;
originally announced January 2023.
-
Enforcing Privacy in Distributed Learning with Performance Guarantees
Authors:
Elsa Rizk,
Stefan Vlaski,
Ali H. Sayed
Abstract:
We study the privatization of distributed learning and optimization strategies. We focus on differential privacy schemes and study their effect on performance. We show that the popular additive random perturbation scheme degrades performance because it is not well-tuned to the graph structure. For this reason, we exploit two alternative graph-homomorphic constructions and show that they improve pe…
▽ More
We study the privatization of distributed learning and optimization strategies. We focus on differential privacy schemes and study their effect on performance. We show that the popular additive random perturbation scheme degrades performance because it is not well-tuned to the graph structure. For this reason, we exploit two alternative graph-homomorphic constructions and show that they improve performance while guaranteeing privacy. Moreover, contrary to most earlier studies, the gradient of the risks is not assumed to be bounded (a condition that rarely holds in practice; e.g., quadratic risk). We avoid this condition and still devise a differentially private scheme with high probability. We examine optimization and learning scenarios and illustrate the theoretical findings through simulations.
△ Less
Submitted 16 January, 2023;
originally announced January 2023.
-
Distributed Bayesian Learning of Dynamic States
Authors:
Mert Kayaalp,
Virginia Bordignon,
Stefan Vlaski,
Vincenzo Matta,
Ali H. Sayed
Abstract:
This work studies networked agents cooperating to track a dynamical state of nature under partial information. The proposed algorithm is a distributed Bayesian filtering algorithm for finite-state hidden Markov models (HMMs). It can be used for sequential state estimation tasks, as well as for modeling opinion formation over social networks under dynamic environments. We show that the disagreement…
▽ More
This work studies networked agents cooperating to track a dynamical state of nature under partial information. The proposed algorithm is a distributed Bayesian filtering algorithm for finite-state hidden Markov models (HMMs). It can be used for sequential state estimation tasks, as well as for modeling opinion formation over social networks under dynamic environments. We show that the disagreement with the optimal centralized solution is asymptotically bounded for the class of geometrically ergodic state transition models, which includes rapidly changing models. We also derive recursions for calculating the probability of error and establish convergence under Gaussian observation models. Simulations are provided to illustrate the theory and to compare against alternative approaches.
△ Less
Submitted 5 December, 2022;
originally announced December 2022.
-
Discovering Influencers in Opinion Formation over Social Graphs
Authors:
Valentina Shumovskaia,
Mert Kayaalp,
Mert Cemri,
Ali H. Sayed
Abstract:
The adaptive social learning paradigm helps model how networked agents are able to form opinions on a state of nature and track its drifts in a changing environment. In this framework, the agents repeatedly update their beliefs based on private observations and exchange the beliefs with their neighbors. In this work, it is shown how the sequence of publicly exchanged beliefs over time allows users…
▽ More
The adaptive social learning paradigm helps model how networked agents are able to form opinions on a state of nature and track its drifts in a changing environment. In this framework, the agents repeatedly update their beliefs based on private observations and exchange the beliefs with their neighbors. In this work, it is shown how the sequence of publicly exchanged beliefs over time allows users to discover rich information about the underlying network topology and about the flow of information over the graph. In particular, it is shown that it is possible (i) to identify the influence of each individual agent to the objective of truth learning, (ii) to discover how well-informed each agent is, (iii) to quantify the pairwise influences between agents, and (iv) to learn the underlying network topology. The algorithm derived herein is also able to work under non-stationary environments where either the true state of nature or the graph topology are allowed to drift over time. We apply the proposed algorithm to different subnetworks of Twitter users, and identify the most influential and central agents by using their public tweets (posts).
△ Less
Submitted 14 March, 2023; v1 submitted 23 November, 2022;
originally announced November 2022.
-
Investigating the Security of EV Charging Mobile Applications As an Attack Surface
Authors:
K. Sarieddine,
M. A. Sayed,
S. Torabi,
R. Atallah,
C. Assi
Abstract:
In this paper, we study the security posture of the EV charging ecosystem against a new type of remote that exploits vulnerabilities in the EV charging mobile applications as an attack surface. We leverage a combination of static and dynamic analysis techniques to analyze the security of widely used EV charging mobile applications. Our analysis was performed on 31 of the most widely used mobile ap…
▽ More
In this paper, we study the security posture of the EV charging ecosystem against a new type of remote that exploits vulnerabilities in the EV charging mobile applications as an attack surface. We leverage a combination of static and dynamic analysis techniques to analyze the security of widely used EV charging mobile applications. Our analysis was performed on 31 of the most widely used mobile applications including their interactions with various components such as cloud management systems. The attack, scenarios that exploit these vulnerabilities were verified on a real-time co-simulation test bed. Our discoveries indicate the lack of user/vehicle verification and improper authorization for critical functions, which allow adversaries to remotely hijack charging sessions and launch attacks against the connected critical infrastructure. The attacks were demonstrated using the EVCS mobile applications showing the feasibility and the applicability of our attacks. Indeed, we discuss specific remote attack scenarios and their impact on EV users. More importantly, our analysis results demonstrate the feasibility of leveraging existing vulnerabilities across various EV charging mobile applications to perform wide-scale coordinated remote charging/discharging attacks against the connected critical infrastructure (e.g., power grid), with significant economical and operational implications. Finally, we propose countermeasures to secure the infrastructure and impede adversaries from performing reconnaissance and launching remote attacks using compromised accounts.
△ Less
Submitted 26 February, 2023; v1 submitted 19 November, 2022;
originally announced November 2022.
-
Local Graph-homomorphic Processing for Privatized Distributed Systems
Authors:
Elsa Rizk,
Stefan Vlaski,
Ali H. Sayed
Abstract:
We study the generation of dependent random numbers in a distributed fashion in order to enable privatized distributed learning by networked agents. We propose a method that we refer to as local graph-homomorphic processing; it relies on the construction of particular noises over the edges to ensure a certain level of differential privacy. We show that the added noise does not affect the performan…
▽ More
We study the generation of dependent random numbers in a distributed fashion in order to enable privatized distributed learning by networked agents. We propose a method that we refer to as local graph-homomorphic processing; it relies on the construction of particular noises over the edges to ensure a certain level of differential privacy. We show that the added noise does not affect the performance of the learned model. This is a significant improvement to previous works on differential privacy for distributed algorithms, where the noise was added in a less structured manner without respecting the graph topology and has often led to performance deterioration. We illustrate the theoretical results by considering a linear regression problem over a network of agents.
△ Less
Submitted 26 October, 2022;
originally announced October 2022.
-
Networked Signal and Information Processing
Authors:
Stefan Vlaski,
Soummya Kar,
Ali H. Sayed,
José M. F. Moura
Abstract:
The article reviews significant advances in networked signal and information processing, which have enabled in the last 25 years extending decision making and inference, optimization, control, and learning to the increasingly ubiquitous environments of distributed agents. As these interacting agents cooperate, new collective behaviors emerge from local decisions and actions. Moreover, and signific…
▽ More
The article reviews significant advances in networked signal and information processing, which have enabled in the last 25 years extending decision making and inference, optimization, control, and learning to the increasingly ubiquitous environments of distributed agents. As these interacting agents cooperate, new collective behaviors emerge from local decisions and actions. Moreover, and significantly, theory and applications show that networked agents, through cooperation and sharing, are able to match the performance of cloud or federated solutions, while offering the potential for improved privacy, increasing resilience, and saving resources.
△ Less
Submitted 18 April, 2023; v1 submitted 25 October, 2022;
originally announced October 2022.
-
Quantization for decentralized learning under subspace constraints
Authors:
Roula Nassif,
Stefan Vlaski,
Marco Carpentiero,
Vincenzo Matta,
Marc Antonini,
Ali H. Sayed
Abstract:
In this paper, we consider decentralized optimization problems where agents have individual cost functions to minimize subject to subspace constraints that require the minimizers across the network to lie in low-dimensional subspaces. This constrained formulation includes consensus or single-task optimization as special cases, and allows for more general task relatedness models such as multitask s…
▽ More
In this paper, we consider decentralized optimization problems where agents have individual cost functions to minimize subject to subspace constraints that require the minimizers across the network to lie in low-dimensional subspaces. This constrained formulation includes consensus or single-task optimization as special cases, and allows for more general task relatedness models such as multitask smoothness and coupled optimization. In order to cope with communication constraints, we propose and study an adaptive decentralized strategy where the agents employ differential randomized quantizers to compress their estimates before communicating with their neighbors. The analysis shows that, under some general conditions on the quantization noise, and for sufficiently small step-sizes $μ$, the strategy is stable both in terms of mean-square error and average bit rate: by reducing $μ$, it is possible to keep the estimation errors small (on the order of $μ$) without increasing indefinitely the bit rate as $μ\rightarrow 0$. Simulations illustrate the theoretical findings and the effectiveness of the proposed approach, revealing that decentralized learning is achievable at the expense of only a few bits.
△ Less
Submitted 28 July, 2023; v1 submitted 16 September, 2022;
originally announced September 2022.
-
Dynamic Load Altering EV Attacks Against Power Grid Frequency Control
Authors:
Mohammad Ali Sayed,
Mohsen Ghafouri,
Mourad Debbabi,
Chadi Assi
Abstract:
Driven by the necessity to combat climate change, Electric Vehicles (EV) are being deployed to take advantage of their ability in reducing emissions generated by the transportation sector. This deployment has left the power grid vulnerable to attacks through the EV infrastructure. This paper is written from an attackerś perspective and proposes a dynamic load altering strategy through manipulating…
▽ More
Driven by the necessity to combat climate change, Electric Vehicles (EV) are being deployed to take advantage of their ability in reducing emissions generated by the transportation sector. This deployment has left the power grid vulnerable to attacks through the EV infrastructure. This paper is written from an attackerś perspective and proposes a dynamic load altering strategy through manipulating EV charging to destabilize the grid. The attack is formulated based on feedback control theory, i.e., designing an attack based on Linear Matrix Inequalities (LMIs). After the stability metric and controller design have been established, we demonstrate our attack method against the Kundur 2 area grid. The attack scenario includes a cap of 200 MW EV load controlled by the attacker. However, the results show that even with this limitation, the attacker would be successful in pushing the grid toward instability and blackout.
△ Less
Submitted 20 July, 2022;
originally announced July 2022.
-
A Fundamental Limit of Distributed Hypothesis Testing Under Memoryless Quantization
Authors:
Yunus Inan,
Mert Kayaalp,
Ali H. Sayed,
Emre Telatar
Abstract:
We study a distributed hypothesis testing setup where peripheral nodes send quantized data to the fusion center in a memoryless fashion. The \emph{expected} number of bits sent by each node under the null hypothesis is kept limited. We characterize the optimal decay rate of the mis-detection (type-II error) probability provided that false alarms (type-I error) are rare, and study the tradeoff betw…
▽ More
We study a distributed hypothesis testing setup where peripheral nodes send quantized data to the fusion center in a memoryless fashion. The \emph{expected} number of bits sent by each node under the null hypothesis is kept limited. We characterize the optimal decay rate of the mis-detection (type-II error) probability provided that false alarms (type-I error) are rare, and study the tradeoff between the communication rate and maximal type-II error decay rate. We resort to rate-distortion methods to provide upper bounds to the tradeoff curve and show that at high rates lattice quantization achieves near-optimal performance. We also characterize the tradeoff for the case where nodes are allowed to record and quantize a fixed number of samples. Moreover, under sum-rate constraints, we show that an upper bound to the tradeoff curve is obtained with a water-filling solution.
△ Less
Submitted 24 June, 2022;
originally announced June 2022.
-
On the Arithmetic and Geometric Fusion of Beliefs for Distributed Inference
Authors:
Mert Kayaalp,
Yunus Inan,
Emre Telatar,
Ali H. Sayed
Abstract:
We study the asymptotic learning rates under linear and log-linear combination rules of belief vectors in a distributed hypothesis testing problem. We show that under both combination strategies, agents are able to learn the truth exponentially fast, with a faster rate under log-linear fusion. We examine the gap between the rates in terms of network connectivity and information diversity. We also…
▽ More
We study the asymptotic learning rates under linear and log-linear combination rules of belief vectors in a distributed hypothesis testing problem. We show that under both combination strategies, agents are able to learn the truth exponentially fast, with a faster rate under log-linear fusion. We examine the gap between the rates in terms of network connectivity and information diversity. We also provide closed-form expressions for special cases involving federated architectures and exchangeable networks.
△ Less
Submitted 1 November, 2023; v1 submitted 28 April, 2022;
originally announced April 2022.
-
Dencentralized learning in the presence of low-rank noise
Authors:
Roula Nassif,
Virginia Bordignon,
Stefan Vlaski,
Ali H. Sayed
Abstract:
Observations collected by agents in a network may be unreliable due to observation noise or interference. This paper proposes a distributed algorithm that allows each node to improve the reliability of its own observation by relying solely on local computations and interactions with immediate neighbors, assuming that the field (graph signal) monitored by the network lies in a low-dimensional subsp…
▽ More
Observations collected by agents in a network may be unreliable due to observation noise or interference. This paper proposes a distributed algorithm that allows each node to improve the reliability of its own observation by relying solely on local computations and interactions with immediate neighbors, assuming that the field (graph signal) monitored by the network lies in a low-dimensional subspace and that a low-rank noise is present in addition to the usual full-rank noise. While oblique projections can be used to project measurements onto a low-rank subspace along a direction that is oblique to the subspace, the resulting solution is not distributed. Starting from the centralized solution, we propose an algorithm that performs the oblique projection of the overall set of observations onto the signal subspace in an iterative and distributed manner. We then show how the oblique projection framework can be extended to handle distributed learning and adaptation problems over networks.
△ Less
Submitted 18 March, 2022;
originally announced March 2022.
-
Explainability and Graph Learning from Social Interactions
Authors:
Valentina Shumovskaia,
Konstantinos Ntemos,
Stefan Vlaski,
Ali H. Sayed
Abstract:
Social learning algorithms provide models for the formation of opinions over social networks resulting from local reasoning and peer-to-peer exchanges. Interactions occur over an underlying graph topology, which describes the flow of information among the agents. To account for drifting conditions in the environment, this work adopts an adaptive social learning strategy, which is able to track var…
▽ More
Social learning algorithms provide models for the formation of opinions over social networks resulting from local reasoning and peer-to-peer exchanges. Interactions occur over an underlying graph topology, which describes the flow of information among the agents. To account for drifting conditions in the environment, this work adopts an adaptive social learning strategy, which is able to track variations in the underlying signal statistics. Among other results, we propose a technique that addresses questions of explainability and interpretability of the results when the graph is hidden. Given observations of the evolution of the beliefs over time, we aim to infer the underlying graph topology, discover pairwise influences between the agents, and identify significant trajectories in the network. The proposed framework is online in nature and can adapt dynamically to changes in the graph topology or the true hypothesis.
△ Less
Submitted 16 November, 2022; v1 submitted 14 March, 2022;
originally announced March 2022.
-
Privatized Graph Federated Learning
Authors:
Elsa Rizk,
Stefan Vlaski,
Ali H. Sayed
Abstract:
Federated learning is a semi-distributed algorithm, where a server communicates with multiple dispersed clients to learn a global model. The federated architecture is not robust and is sensitive to communication and computational overloads due to its one-master multi-client structure. It can also be subject to privacy attacks targeting personal information on the communication links. In this work,…
▽ More
Federated learning is a semi-distributed algorithm, where a server communicates with multiple dispersed clients to learn a global model. The federated architecture is not robust and is sensitive to communication and computational overloads due to its one-master multi-client structure. It can also be subject to privacy attacks targeting personal information on the communication links. In this work, we introduce graph federated learning (GFL), which consists of multiple federated units connected by a graph. We then show how graph homomorphic perturbations can be used to ensure the algorithm is differentially private. We conduct both convergence and privacy theoretical analyses and illustrate performance by means of computer simulations.
△ Less
Submitted 16 January, 2023; v1 submitted 14 March, 2022;
originally announced March 2022.
-
Optimal Aggregation Strategies for Social Learning over Graphs
Authors:
** Hu,
Virginia Bordignon,
Stefan Vlaski,
Ali H. Sayed
Abstract:
Adaptive social learning is a useful tool for studying distributed decision-making problems over graphs. This paper investigates the effect of combination policies on the performance of adaptive social learning strategies. Using large-deviation analysis, it first derives a bound on the steady-state error probability and characterizes the optimal selection for the Perron eigenvectors of the combina…
▽ More
Adaptive social learning is a useful tool for studying distributed decision-making problems over graphs. This paper investigates the effect of combination policies on the performance of adaptive social learning strategies. Using large-deviation analysis, it first derives a bound on the steady-state error probability and characterizes the optimal selection for the Perron eigenvectors of the combination policies. It subsequently studies the effect of the combination policy on the transient behavior of the learning strategy by estimating the adaptation time in the low signal-to-noise ratio regime. In the process, it is discovered that, interestingly, the influence of the combination policy on the transient behavior is insignificant, and thus it is more critical to employ policies that enhance the steady-state performance. The theoretical conclusions are illustrated by means of computer simulations.
△ Less
Submitted 31 May, 2023; v1 submitted 14 March, 2022;
originally announced March 2022.
-
Online Graph Learning from Social Interactions
Authors:
Valentina Shumovskaia,
Konstantinos Ntemos,
Stefan Vlaski,
Ali H. Sayed
Abstract:
Social learning algorithms provide models for the formation of opinions over social networks resulting from local reasoning and peer-to-peer exchanges. Interactions occur over an underlying graph topology, which describes the flow of information and relative influence between pairs of agents. For a given graph topology, these algorithms allow for the prediction of formed opinions. In this work, we…
▽ More
Social learning algorithms provide models for the formation of opinions over social networks resulting from local reasoning and peer-to-peer exchanges. Interactions occur over an underlying graph topology, which describes the flow of information and relative influence between pairs of agents. For a given graph topology, these algorithms allow for the prediction of formed opinions. In this work, we study the inverse problem. Given a social learning model and observations of the evolution of beliefs over time, we aim at identifying the underlying graph topology. The learned graph allows for the inference of pairwise influence between agents, the overall influence agents have over the behavior of the network, as well as the flow of information through the social network. The proposed algorithm is online in nature and can adapt dynamically to changes in the graph topology or the true hypothesis.
△ Less
Submitted 11 March, 2022;
originally announced March 2022.
-
Social Opinion Formation and Decision Making Under Communication Trends
Authors:
Mert Kayaalp,
Virginia Bordignon,
Ali H. Sayed
Abstract:
This work studies the learning process over social networks under partial and random information sharing. In traditional social learning models, agents exchange full belief information with each other while trying to infer the true state of nature. We study the case where agents share information about only one hypothesis, namely, the trending topic, which can be randomly changing at every iterati…
▽ More
This work studies the learning process over social networks under partial and random information sharing. In traditional social learning models, agents exchange full belief information with each other while trying to infer the true state of nature. We study the case where agents share information about only one hypothesis, namely, the trending topic, which can be randomly changing at every iteration. We show that agents can learn the true hypothesis even if they do not discuss it, at rates comparable to traditional social learning. We also show that using one's own belief as a prior for estimating the neighbors' non-transmitted beliefs might create opinion clusters that prevent learning with full confidence. This phenomenon occurs when a single hypothesis corresponding to the truth is exchanged exclusively during all times. Such a practice, however, avoids the complete rejection of the truth under any information exchange procedure -- something that could happen if priors were uniform.
△ Less
Submitted 25 December, 2023; v1 submitted 4 March, 2022;
originally announced March 2022.
-
Social Learning under Randomized Collaborations
Authors:
Yunus Inan,
Mert Kayaalp,
Emre Telatar,
Ali H. Sayed
Abstract:
We study a social learning scheme where at every time instant, each agent chooses to receive information from one of its neighbors at random. We show that under this sparser communication scheme, the agents learn the truth eventually and the asymptotic convergence rate remains the same as the standard algorithms which use more communication resources. We also derive large deviation estimates of th…
▽ More
We study a social learning scheme where at every time instant, each agent chooses to receive information from one of its neighbors at random. We show that under this sparser communication scheme, the agents learn the truth eventually and the asymptotic convergence rate remains the same as the standard algorithms which use more communication resources. We also derive large deviation estimates of the log-belief ratios for a special case where each agent replaces its belief with that of the chosen neighbor.
△ Less
Submitted 12 May, 2022; v1 submitted 26 January, 2022;
originally announced January 2022.