Skip to main content

Showing 1–15 of 15 results for author: Cullen, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.11005  [pdf, other

    cs.LG cs.CR

    It's Simplex! Disaggregating Measures to Improve Certified Robustness

    Authors: Andrew C. Cullen, Paul Montague, Shijie Liu, Sarah M. Erfani, Benjamin I. P. Rubinstein

    Abstract: Certified robustness circumvents the fragility of defences against adversarial attacks, by endowing model predictions with guarantees of class invariance for attacks up to a calculated size. While there is value in these certifications, the techniques through which we assess their performance do not present a proper accounting of their strengths and weaknesses, as their analysis has eschewed consi… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

    Comments: IEEE S&P 2024, IEEE Security & Privacy 2024, 14 pages

  2. Enhancing the Antidote: Improved Pointwise Certifications against Poisoning Attacks

    Authors: Shijie Liu, Andrew C. Cullen, Paul Montague, Sarah M. Erfani, Benjamin I. P. Rubinstein

    Abstract: Poisoning attacks can disproportionately influence model behaviour by making small changes to the training corpus. While defences against specific poisoning attacks do exist, they in general do not provide any guarantees, leaving them potentially countered by novel attacks. In contrast, by examining worst-case behaviours Certified Defences make it possible to provide guarantees of the robustness o… ▽ More

    Submitted 18 March, 2024; v1 submitted 14 August, 2023; originally announced August 2023.

    Journal ref: Proceedings of the 2023 AAAI Conference on Artificial Intelligence, 37(7), 8861-8869

  3. arXiv:2307.08627  [pdf, other

    cs.NI

    Managing Write Access without Token Fees in Leaderless DAG-based Ledgers

    Authors: Darcy Camargo, Luigi Vigneri, Andrew Cullen

    Abstract: A significant portion of research on distributed ledgers has focused on circumventing the limitations of leader-based blockchains mainly in terms of scalability, decentralization and power consumption. Leaderless architectures based on directed acyclic graphs (DAGs) avoid many of these limitations altogether, but their increased flexibility and performance comes at the cost of increased design com… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

    Comments: Short version awarded with the Best Paper Award at BLOCKCHAIN Congress 2023

  4. arXiv:2304.06369  [pdf, other

    cs.CR

    An attack resilient policy on the tip pool for DAG-based distributed ledgers

    Authors: Lianna Zhao, Andrew Cullen, Sebastian Müller, Olivia Saa, Robert Shorten

    Abstract: This paper discusses congestion control and inconsistency problems in DAG-based distributed ledgers and proposes an additional filter to mitigate these issues. Unlike traditional blockchains, DAG-based DLTs use a directed acyclic graph structure to organize transactions, allowing higher scalability and efficiency. However, this also introduces challenges in controlling the rate at which blocks are… ▽ More

    Submitted 10 May, 2023; v1 submitted 13 April, 2023; originally announced April 2023.

  5. arXiv:2303.13015  [pdf, other

    cs.LG cs.AI cs.DC

    Failure-tolerant Distributed Learning for Anomaly Detection in Wireless Networks

    Authors: Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie, Justin Kopacz

    Abstract: The analysis of distributed techniques is often focused upon their efficiency, without considering their robustness (or lack thereof). Such a consideration is particularly important when devices or central servers can fail, which can potentially cripple distributed systems. When such failures arise in wireless communications networks, important services that they use/provide (like anomaly detectio… ▽ More

    Submitted 22 March, 2023; originally announced March 2023.

  6. arXiv:2302.04379  [pdf, other

    cs.LG cs.CR

    Et Tu Certifications: Robustness Certificates Yield Better Adversarial Examples

    Authors: Andrew C. Cullen, Shijie Liu, Paul Montague, Sarah M. Erfani, Benjamin I. P. Rubinstein

    Abstract: In guaranteeing the absence of adversarial examples in an instance's neighbourhood, certification mechanisms play an important role in demonstrating neural net robustness. In this paper, we ask if these certifications can compromise the very models they help to protect? Our new \emph{Certification Aware Attack} exploits certifications to produce computationally efficient norm-minimising adversaria… ▽ More

    Submitted 11 June, 2024; v1 submitted 8 February, 2023; originally announced February 2023.

    Comments: 17 pages, 8 figures

    ACM Class: I.2.6; I.4.9

  7. arXiv:2210.06077  [pdf, other

    cs.LG

    Double Bubble, Toil and Trouble: Enhancing Certified Robustness through Transitivity

    Authors: Andrew C. Cullen, Paul Montague, Shijie Liu, Sarah M. Erfani, Benjamin I. P. Rubinstein

    Abstract: In response to subtle adversarial examples flip** classifications of neural network models, recent research has promoted certified robustness as a solution. There, invariance of predictions to all norm-bounded attacks is achieved through randomised smoothing of network inputs. Today's state-of-the-art certifications make optimal use of the class output scores at the input instance under test: no… ▽ More

    Submitted 12 October, 2022; originally announced October 2022.

    Comments: Accepted for Neurips`22, 19 pages, 14 figures, for associated code see https://github.com/andrew-cullen/DoubleBubble

    ACM Class: I.2.6; I.4.9

  8. arXiv:2204.08550  [pdf, other

    cs.RO

    Learning to Retrieve Relevant Experiences for Motion Planning

    Authors: Constantinos Chamzas, Aedan Cullen, Anshumali Shrivastava, Lydia E. Kavraki

    Abstract: Recent work has demonstrated that motion planners' performance can be significantly improved by retrieving past experiences from a database. Typically, the experience database is queried for past similar problems using a similarity function defined over the motion planning problems. However, to date, most works rely on simple hand-crafted similarity functions and fail to generalize outside their c… ▽ More

    Submitted 18 April, 2022; originally announced April 2022.

    Comments: Accepted in International Conference on Robotics and Automation (ICRA), 2022. Code will be released soon

  9. arXiv:2203.12076  [pdf, other

    cs.DC

    Improving Quality of Service for Users of DAG-based Distributed Ledgers

    Authors: Andrew Cullen, Lianna Zhao, Luigi Vigneri, Robert Shorten

    Abstract: An outstanding problem in the design of distributed ledgers concerns policies that govern the manner in which users interact with the network. Network usability is crucial to the mainstream adoption of distributed ledgers, particularly for enterprise applications in which most users do not wish to operate full node. For DAG-based ledgers such as IOTA, we propose a user-node interaction mechanism t… ▽ More

    Submitted 14 July, 2023; v1 submitted 22 March, 2022; originally announced March 2022.

  10. Adversarial Decisions on Complex Dynamical Systems using Game Theory

    Authors: Andrew C. Cullen, Tansu Alpcan, Alexander C. Kalloniatis

    Abstract: We apply computational Game Theory to a unification of physics-based models that represent decision-making across a number of agents within both cooperative and competitive processes. Here the competitors try to both positively influence their own returns, while negatively affecting those of their competitors. Modelling these interactions with the so-called Boyd-Kuramoto-Lanchester (BKL) complex d… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

  11. arXiv:2107.10238  [pdf, other

    cs.CR

    Secure Access Control for DAG-based Distributed Ledgers

    Authors: Lianna Zhao, Luigi Vigneri, Andrew Cullen, William Sanders, Pietro Ferraro, Robert Shorten

    Abstract: Access control is a fundamental component of the design of distributed ledgers, influencing many aspects of their design, such as fairness, efficiency, traditional notions of network security, and adversarial attacks such as Denial-of-Service (DoS) attacks. In this work, we consider the security of a recently proposed access control protocol for Directed Acyclic Graph-based distributed ledgers. We… ▽ More

    Submitted 20 July, 2021; originally announced July 2021.

    Comments: Submitted for consideration for publication in IEEE IoT Journal

  12. arXiv:2103.08241  [pdf, other

    cs.LG

    Reinforcement Learning with Algorithms from Probabilistic Structure Estimation

    Authors: Jonathan P. Epperlein, Roman Overko, Sergiy Zhuk, Christopher King, Djallel Bouneffouf, Andrew Cullen, Robert Shorten

    Abstract: Reinforcement learning (RL) algorithms aim to learn optimal decisions in unknown environments through experience of taking actions and observing the rewards gained. In some cases, the environment is not influenced by the actions of the RL agent, in which case the problem can be modeled as a contextual multi-armed bandit and lightweight myopic algorithms can be employed. On the other hand, when the… ▽ More

    Submitted 1 June, 2022; v1 submitted 15 March, 2021; originally announced March 2021.

  13. arXiv:2005.07778  [pdf, other

    cs.NI cs.DB

    Access Control for Distributed Ledgers in the Internet of Things: A Networking Approach

    Authors: Andrew Cullen, Pietro Ferraro, William Sanders, Luigi Vigneri, Robert Shorten

    Abstract: In the Internet of Things (IoT) domain, devices need a platform to transact seamlessly without a trusted intermediary. Although Distributed Ledger Technologies (DLTs) could provide such a platform, blockchains, such as Bitcoin, were not designed with IoT networks in mind, hence are often unsuitable for such applications: they offer poor transaction throughput and confirmation times, put stress on… ▽ More

    Submitted 14 July, 2021; v1 submitted 15 May, 2020; originally announced May 2020.

  14. Spatial Positioning Token (SPToken) for Smart Mobility

    Authors: Roman Overko, Rodrigo H. Ordonez-Hurtado, Sergiy Zhuk, Pietro Ferraro, Andrew Cullen, Robert Shorten

    Abstract: We introduce a permissioned distributed ledger technology (DLT) design for crowdsourced smart mobility applications. This architecture is based on a directed acyclic graph architecture (similar to the IOTA tangle) and uses both Proof-of-Work and Proof-of-Position mechanisms to provide protection against spam attacks and malevolent actors. In addition to enabling individuals to retain ownership of… ▽ More

    Submitted 11 December, 2020; v1 submitted 16 May, 2019; originally announced May 2019.

    Comments: A short version of this paper was submitted to ICCVE 2019: The 8th IEEE International Conference on Connected Vehicles and Expo

  15. Distributed Ledger Technology for IoT: Parasite Chain Attacks

    Authors: Andrew Cullen, Pietro Ferraro, Christopher King, Robert Shorten

    Abstract: Directed Acyclic Graph (DAG) based Distributed Ledgers can be useful in a number of applications in the IoT domain. A distributed ledger should serve as an immutable and irreversible record of transactions, however, a DAG structure is a more complicated mathematical object than its blockchain counterparts, and as a result, providing guarantees of immutability and irreversibility is more involved.… ▽ More

    Submitted 10 November, 2020; v1 submitted 21 March, 2019; originally announced April 2019.

    Journal ref: in IEEE Internet of Things Journal, vol. 7, no. 8, pp. 7112-7122, Aug. 2020