Skip to main content

Showing 1–19 of 19 results for author: Arnaboldi, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.02157  [pdf, other

    stat.ML cs.LG

    Online Learning and Information Exponents: On The Importance of Batch size, and Time/Complexity Tradeoffs

    Authors: Luca Arnaboldi, Yatin Dandi, Florent Krzakala, Bruno Loureiro, Luca Pesce, Ludovic Stephan

    Abstract: We study the impact of the batch size $n_b$ on the iteration time $T$ of training two-layer neural networks with one-pass stochastic gradient descent (SGD) on multi-index target functions of isotropic covariates. We characterize the optimal batch size minimizing the iteration time as a function of the hardness of the target, as characterized by the information exponents. We show that performing gr… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  2. arXiv:2405.15459  [pdf, other

    stat.ML cs.LG

    Repetita Iuvant: Data Repetition Allows SGD to Learn High-Dimensional Multi-Index Functions

    Authors: Luca Arnaboldi, Yatin Dandi, Florent Krzakala, Luca Pesce, Ludovic Stephan

    Abstract: Neural networks can identify low-dimensional relevant structures within high-dimensional noisy data, yet our mathematical understanding of how they do so remains scarce. Here, we investigate the training dynamics of two-layer shallow neural networks trained with gradient-based algorithms, and discuss how they learn pertinent features in multi-index models, that is target functions with low-dimensi… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  3. arXiv:2403.10144  [pdf, other

    cs.CL cs.AI cs.LG cs.LO cs.PL

    NLP Verification: Towards a General Methodology for Certifying Robustness

    Authors: Marco Casadio, Tanvi Dinkar, Ekaterina Komendantskaya, Luca Arnaboldi, Matthew L. Daggitt, Omri Isac, Guy Katz, Verena Rieser, Oliver Lemon

    Abstract: Deep neural networks have exhibited substantial success in the field of Natural Language Processing and ensuring their safety and reliability is crucial: there are safety critical contexts where such models must be robust to variability or attack, and give guarantees over their output. Unlike Computer Vision, NLP lacks a unified verification methodology and, despite recent advancements in literatu… ▽ More

    Submitted 31 May, 2024; v1 submitted 15 March, 2024; originally announced March 2024.

  4. arXiv:2402.03220  [pdf, other

    stat.ML cs.LG

    The Benefits of Reusing Batches for Gradient Descent in Two-Layer Networks: Breaking the Curse of Information and Leap Exponents

    Authors: Yatin Dandi, Emanuele Troiani, Luca Arnaboldi, Luca Pesce, Lenka Zdeborová, Florent Krzakala

    Abstract: We investigate the training dynamics of two-layer neural networks when learning multi-index target functions. We focus on multi-pass gradient descent (GD) that reuses the batches multiple times and show that it significantly changes the conclusion about which functions are learnable compared to single-pass gradient descent. In particular, multi-pass GD with finite stepsize is found to overcome the… ▽ More

    Submitted 30 June, 2024; v1 submitted 5 February, 2024; originally announced February 2024.

    Comments: Accepted at the International Conference on Machine Learning (ICML), 2024

  5. arXiv:2401.06379  [pdf, other

    cs.AI

    Vehicle: Bridging the Embedding Gap in the Verification of Neuro-Symbolic Programs

    Authors: Matthew L. Daggitt, Wen Kokke, Robert Atkey, Natalia Slusarz, Luca Arnaboldi, Ekaterina Komendantskaya

    Abstract: Neuro-symbolic programs -- programs containing both machine learning components and traditional symbolic code -- are becoming increasingly widespread. However, we believe that there is still a lack of a general methodology for verifying these programs whose correctness depends on the behaviour of the machine learning components. In this paper, we identify the ``embedding gap'' -- the lack of techn… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

  6. arXiv:2305.18502  [pdf, other

    stat.ML cs.LG

    Esca** mediocrity: how two-layer networks learn hard generalized linear models with SGD

    Authors: Luca Arnaboldi, Florent Krzakala, Bruno Loureiro, Ludovic Stephan

    Abstract: This study explores the sample complexity for two-layer neural networks to learn a generalized linear target function under Stochastic Gradient Descent (SGD), focusing on the challenging regime where many flat directions are present at initialization. It is well-established that in this scenario $n=O(d \log d)$ samples are typically needed. However, we provide precise results concerning the pre-fa… ▽ More

    Submitted 1 March, 2024; v1 submitted 29 May, 2023; originally announced May 2023.

  7. arXiv:2305.04003  [pdf, other

    cs.CL cs.AI cs.LG

    ANTONIO: Towards a Systematic Method of Generating NLP Benchmarks for Verification

    Authors: Marco Casadio, Luca Arnaboldi, Matthew L. Daggitt, Omri Isac, Tanvi Dinkar, Daniel Kienitz, Verena Rieser, Ekaterina Komendantskaya

    Abstract: Verification of machine learning models used in Natural Language Processing (NLP) is known to be a hard problem. In particular, many known neural network verification methods that work for computer vision and other numeric datasets do not work for NLP. Here, we study technical reasons that underlie this problem. Based on this analysis, we propose practical methods and heuristics for preparing NLP… ▽ More

    Submitted 15 August, 2023; v1 submitted 6 May, 2023; originally announced May 2023.

    Comments: To appear in proceedings of 6th Workshop on Formal Methods for ML-Enabled Autonomous Systems (Affiliated with CAV 2023)

  8. arXiv:2302.05882  [pdf, other

    stat.ML cond-mat.dis-nn cs.LG

    From high-dimensional & mean-field dynamics to dimensionless ODEs: A unifying approach to SGD in two-layers networks

    Authors: Luca Arnaboldi, Ludovic Stephan, Florent Krzakala, Bruno Loureiro

    Abstract: This manuscript investigates the one-pass stochastic gradient descent (SGD) dynamics of a two-layer neural network trained on Gaussian data and labels generated by a similar, though not necessarily identical, target function. We rigorously analyse the limiting dynamics via a deterministic and low-dimensional description in terms of the sufficient statistics for the population risk. Our unifying an… ▽ More

    Submitted 12 February, 2023; originally announced February 2023.

  9. arXiv:2208.03484  [pdf, other

    cs.CR cs.SE

    Towards Interdependent Safety Security Assessments using Bowties

    Authors: Luca Arnaboldi, David Aspinall

    Abstract: We present a way to combine security and safety assessments using Bowtie Diagrams. Bowties model both the causes leading up to a central failure event and consequences which arise from that event, as well as barriers which impede events. Bowties have previously been used separately for security and safety assessments, but we suggest that a unified treatment in a single model can elegantly capture… ▽ More

    Submitted 6 August, 2022; originally announced August 2022.

  10. arXiv:2206.14575  [pdf, other

    cs.CL cs.AI

    Why Robust Natural Language Understanding is a Challenge

    Authors: Marco Casadio, Ekaterina Komendantskaya, Verena Rieser, Matthew L. Daggitt, Daniel Kienitz, Luca Arnaboldi, Wen Kokke

    Abstract: With the proliferation of Deep Machine Learning into real-life applications, a particular property of this technology has been brought to attention: robustness Neural Networks notoriously present low robustness and can be highly sensitive to small input perturbations. Recently, many methods for verifying networks' general properties of robustness have been proposed, but they are mostly applied in… ▽ More

    Submitted 13 July, 2022; v1 submitted 21 June, 2022; originally announced June 2022.

  11. arXiv:2202.05207  [pdf, other

    cs.LG cs.LO cs.PL

    Vehicle: Interfacing Neural Network Verifiers with Interactive Theorem Provers

    Authors: Matthew L. Daggitt, Wen Kokke, Robert Atkey, Luca Arnaboldi, Ekaterina Komendantskya

    Abstract: Verification of neural networks is currently a hot topic in automated theorem proving. Progress has been rapid and there are now a wide range of tools available that can verify properties of networks with hundreds of thousands of nodes. In theory this opens the door to the verification of larger control systems that make use of neural network components. However, although work has managed to incor… ▽ More

    Submitted 10 February, 2022; originally announced February 2022.

  12. arXiv:2105.09150  [pdf, other

    cs.CR

    Automating Cryptographic Protocol Language Generation from Structured Specifications

    Authors: Roberto Metere, Luca Arnaboldi

    Abstract: Security of cryptographic protocols can be analysed by creating a model in a formal language and verifying the model in a tool. All such tools focus on the last part of the analysis, verification, and the interpretation of the specification is only explained in papers. Rather, we focus on the interpretation and modelling part by presenting a tool to aid the cryptographer throughout the process and… ▽ More

    Submitted 5 April, 2022; v1 submitted 19 May, 2021; originally announced May 2021.

    Comments: conference paper, 11 pages, 13 figures

  13. arXiv:2105.08096  [pdf, other

    cs.CR

    A Review of Intrusion Detection Systems and Their Evaluation in the IoT

    Authors: Luca Arnaboldi, Charles Morisset

    Abstract: Intrusion Detection Systems (IDS) are key components for securing critical infrastructures, capable of detecting malicious activities on networks or hosts. The procedure of implementing a IDS for Internet of Things (IoT) networks is not without challenges due to the variability of these systems and specifically the difficulty in accessing data. The specifics of these very constrained devices rende… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

  14. arXiv:2103.12419  [pdf, other

    cs.LG cs.AI eess.SY q-fin.TR

    Volume-Centred Range Bars: Novel Interpretable Representation of Financial Markets Designed for Machine Learning Applications

    Authors: Artur Sokolovsky, Luca Arnaboldi, Jaume Bacardit, Thomas Gross

    Abstract: Financial markets are a source of non-stationary multidimensional time series which has been drawing attention for decades. Each financial instrument has its specific changing-over-time properties, making its analysis a complex task. Hence, improvement of understanding and development of more informative, generalisable market representations are essential for the successful operation in financial… ▽ More

    Submitted 8 May, 2022; v1 submitted 23 March, 2021; originally announced March 2021.

    Comments: The reproducibility package available at: https://doi.org/10.5281/zenodo.4629567

  15. arXiv:2009.09993  [pdf, ps, other

    q-fin.TR cs.LG

    A Generic Methodology for the Statistically Uniform & Comparable Evaluation of Automated Trading Platform Components

    Authors: Artur Sokolovsky, Luca Arnaboldi

    Abstract: Although machine learning approaches have been widely used in the field of finance, to very successful degrees, these approaches remain bespoke to specific investigations and opaque in terms of explainability, comparability, and reproducibility. The primary objective of this research was to shed light upon this field by providing a generic methodology that was investigation-agnostic and interpreta… ▽ More

    Submitted 18 June, 2022; v1 submitted 21 September, 2020; originally announced September 2020.

    Comments: Associated processing files are available at: https://doi.org/10.5281/zenodo.4036850

  16. arXiv:1911.12757  [pdf, other

    eess.SY cs.CR

    Modelling Load-Changing Attacks in Cyber-Physical Systems

    Authors: Luca Arnaboldi, Ricardo M. Czekster, Roberto Metere, Charles Morisset

    Abstract: Cyber-Physical Systems (CPS) are present in many settings addressing a myriad of purposes. Examples are Internet-of-Things (IoT) or sensing software embedded in appliances or even specialised meters that measure and respond to electricity demands in smart grids. Due to their pervasive nature, they are usually chosen as recipients for larger scope cyber-security attacks. Those promote system-wide d… ▽ More

    Submitted 17 December, 2019; v1 submitted 28 November, 2019; originally announced November 2019.

    Comments: 15 pages

  17. arXiv:1910.02656  [pdf, other

    cs.CR

    Towards a Data Centric Approach for the Design and Verification of Cryptographic Protocols

    Authors: Luca Arnaboldi, Roberto Metere

    Abstract: We propose MetaCP, a Meta Cryptography Protocol verification tool, as an automated tool simplifying the design of security protocols through a graphical interface. The graphical interface can be seen as a modern editor of a non-relational database whose data are protocols. The information of protocols are stored in XML, enjoying a fixed format and syntax aiming to contain all required information… ▽ More

    Submitted 7 October, 2019; originally announced October 2019.

    Comments: 3 pages, 2 figures, to appear in the Proceedings of ACM CCS 2019 - Poster Session

  18. Generating Synthetic Data for Real World Detection of DoS Attacks in the IoT

    Authors: Luca Arnaboldi, Charles Morisset

    Abstract: Denial of service attacks are especially pertinent to the internet of things as devices have less computing power, memory and security mechanisms to defend against them. The task of mitigating these attacks must therefore be redirected from the device onto a network monitor. Network intrusion detection systems can be used as an effective and efficient technique in internet of things systems to off… ▽ More

    Submitted 24 January, 2019; originally announced January 2019.

    Comments: 16 pages

    Journal ref: In: Mazzara M., Ober I., Salaunn G. (eds) Software Technologies: Applications and Foundations. STAF 2018

  19. Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems

    Authors: Luca Arnaboldi, Charles Morrisset

    Abstract: Denial of Service (DoS) attacks constitute a major security threat to today's Internet. This challenge is especially pertinent to the Internet of Things (IoT) as devices have less computing power, memory and security mechanisms to mitigate DoS attacks. This paper presents a model that mimics the unique characteristics of a network of IoT devices, including components of the system implementing `Cr… ▽ More

    Submitted 30 October, 2017; originally announced October 2017.

    Journal ref: In: Livraga G., Mitchell C. (eds) Security and Trust Management. STM 2017. Lecture Notes in Computer Science, vol 10547. Springer, Cham