Skip to main content

Showing 1–24 of 24 results for author: Hemberg, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.07102  [pdf, other

    cs.NE cs.AI

    Evolving Code with A Large Language Model

    Authors: Erik Hemberg, Stephen Moskal, Una-May O'Reilly

    Abstract: Algorithms that use Large Language Models (LLMs) to evolve code arrived on the Genetic Programming (GP) scene very recently. We present LLM GP, a formalized LLM-based evolutionary algorithm designed to evolve code. Like GP, it uses evolutionary operators, but its designs and implementations of those operators radically differ from GP's because they enlist an LLM, using prompting and the LLM's pre-… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

    Comments: 34 pages, 9 figures, 6 Tables

    ACM Class: I.2.8

  2. arXiv:2310.06936  [pdf, other

    cs.CR cs.LG

    LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing

    Authors: Stephen Moskal, Sam Laney, Erik Hemberg, Una-May O'Reilly

    Abstract: In this paper, we explore the potential of Large Language Models (LLMs) to reason about threats, generate information about tools, and automate cyber campaigns. We begin with a manual exploration of LLMs in supporting specific threat-related actions and decisions. We proceed by automating the decision process in a cyber campaign. We present prompt engineering approaches for a plan-act-report loop… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

  3. arXiv:2308.03191  [pdf, other

    cs.HC

    The Facebook Algorithm's Active Role in Climate Advertisement Delivery

    Authors: Aruna Sankaranarayanan, Erik Hemberg, Una-May O'Reilly

    Abstract: Communication strongly influences attitudes on climate change. Within sponsored communication, high spend and high reach advertising dominates. In the advertising ecosystem we can distinguish actors with adversarial stances: organizations with contrarian or advocacy communication goals, who direct the advertisement delivery algorithm to launch ads in different destinations by specifying targets an… ▽ More

    Submitted 7 August, 2023; v1 submitted 6 August, 2023; originally announced August 2023.

  4. arXiv:2108.11025  [pdf, other

    q-bio.PE cs.SI q-bio.QM

    Evaluating Efficacy of Indoor Non-Pharmaceutical Interventions against COVID-19 Outbreaks with a Coupled Spatial-SIR Agent-Based Simulation Framework

    Authors: Chathika Gunaratne, Rene Reyes, Erik Hemberg, Una-May O'Reilly

    Abstract: Contagious respiratory diseases, such as COVID-19, depend on sufficiently prolonged exposures for the successful transmission of the underlying pathogen. It is important for organizations to evaluate the efficacy of interventions aiming at mitigating viral transmission among their personnel. We have developed a operational risk assessment simulation framework that couples a spatial agent-based mod… ▽ More

    Submitted 24 August, 2021; originally announced August 2021.

  5. arXiv:2108.02618  [pdf, other

    cs.CR cs.AI

    Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence

    Authors: Erik Hemberg, Una-May O'Reilly

    Abstract: Artificial Intelligence (AI) and Machine Learning (ML) algorithms can support the span of indicator-level, e.g. anomaly detection, to behavioral level cyber security modeling and inference. This contribution is based on a dataset named BRON which is amalgamated from public threat and vulnerability behavioral sources. We demonstrate how BRON can support prediction of related threat techniques and a… ▽ More

    Submitted 5 August, 2021; originally announced August 2021.

    Comments: 5 pages, 2 Figures, 2 Tables, ACM KDD AI4Cyber: The 1st Workshop on Artificial Intelligence- enabled Cybersecurity Analytics at KDD'21

  6. arXiv:2106.13590  [pdf, ps, other

    cs.LG cs.AI cs.DC

    Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks

    Authors: Jamal Toutouh, Erik Hemberg, Una-May O'Reilly

    Abstract: Generative adversary networks (GANs) suffer from training pathologies such as instability and mode collapse, which mainly arise from a lack of diversity in their adversarial interactions. Co-evolutionary GAN (CoE-GAN) training algorithms have shown to be resilient to these pathologies. This article introduces Mustangs, a spatially distributed CoE-GAN, which fosters diversity by using different los… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

    Comments: Accepted to be presented during Conference of the Spanish Association of Artificial Intelligence (CAEPIA 2021). arXiv admin note: substantial text overlap with arXiv:1905.12702

  7. arXiv:2104.13254   

    cs.CR cs.AI

    Proceedings - AI/ML for Cybersecurity: Challenges, Solutions, and Novel Ideas at SIAM Data Mining 2021

    Authors: John Emanuello, Kimberly Ferguson-Walter, Erik Hemberg, Una-May O Reilly, Ahmad Ridley, Dennis Ross, Diane Staheli, William Streilein

    Abstract: Malicious cyber activity is ubiquitous and its harmful effects have dramatic and often irreversible impacts on society. Given the shortage of cybersecurity professionals, the ever-evolving adversary, the massive amounts of data which could contain evidence of an attack, and the speed at which defensive actions must be taken, innovations which enable autonomy in cybersecurity must continue to expan… ▽ More

    Submitted 1 June, 2021; v1 submitted 27 April, 2021; originally announced April 2021.

  8. arXiv:2104.11576  [pdf, other

    cs.CR cs.AI

    Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation

    Authors: Prakruthi Karuna, Erik Hemberg, Una-May O'Reilly, Nick Rutar

    Abstract: Scaling the cyber hunt problem poses several key technical challenges. Detecting and characterizing cyber threats at scale in large enterprise networks is hard because of the vast quantity and complexity of the data that must be analyzed as adversaries deploy varied and evolving tactics to accomplish their goals. There is a great need to automate all aspects, and, indeed, the workflow of cyber hun… ▽ More

    Submitted 23 April, 2021; originally announced April 2021.

    Comments: 5 pages 8 figures

  9. arXiv:2010.00533  [pdf, other

    cs.CR

    Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyber Hunting

    Authors: Erik Hemberg, Jonathan Kelly, Michal Shlapentokh-Rothman, Bryn Reinstadler, Katherine Xu, Nick Rutar, Una-May O'Reilly

    Abstract: Many public sources of cyber threat and vulnerability information exist to help defend cyber systems. This paper links MITRE's ATT&CK MATRIX of Tactics and Techniques, NIST's Common Weakness Enumerations (CWE), Common Vulnerabilities and Exposures (CVE), and Common Attack Pattern Enumeration and Classification list (CAPEC), to gain further insight from alerts, threats and vulnerabilities. We prese… ▽ More

    Submitted 10 February, 2021; v1 submitted 1 October, 2020; originally announced October 2020.

    Comments: 13 pages, 12 figures

  10. arXiv:2008.01124  [pdf, other

    cs.NE cs.DC cs.LG

    Analyzing the Components of Distributed Coevolutionary GAN Training

    Authors: Jamal Toutouh, Erik Hemberg, Una-May O'Reilly

    Abstract: Distributed coevolutionary Generative Adversarial Network (GAN) training has empirically shown success in overcoming GAN training pathologies. This is mainly due to diversity maintenance in the populations of generators and discriminators during the training process. The method studied here coevolves sub-populations on each cell of a spatial grid organized into overlap** Moore neighborhoods. We… ▽ More

    Submitted 3 August, 2020; originally announced August 2020.

    Comments: Accepted as a full paper in Sixteenth International Conference on Parallel Problem Solving from Nature (PPSN XVI)

  11. Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

    Authors: Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg

    Abstract: Cyber security adversaries and engagements are ubiquitous and ceaseless. We delineate Adversarial Genetic Programming for Cyber Security, a research topic that, by means of genetic programming (GP), replicates and studies the behavior of cyber adversaries and the dynamics of their engagements. Adversarial Genetic Programming for Cyber Security encompasses extant and immediate research efforts in a… ▽ More

    Submitted 6 April, 2020; originally announced April 2020.

  12. arXiv:2004.04642  [pdf, other

    cs.LG cs.NE

    Data Dieting in GAN Training

    Authors: Jamal Toutouh, Una-May O'Reilly, Erik Hemberg

    Abstract: We investigate training Generative Adversarial Networks, GANs, with less data. Subsets of the training dataset can express empirical sample diversity while reducing training resource requirements, e.g. time and memory. We ask how much data reduction impacts generator performance and gauge the additive value of generator ensembles. In addition to considering stand-alone GAN training and ensembles o… ▽ More

    Submitted 6 April, 2020; originally announced April 2020.

    Comments: Chapter 14 of the Book "Deep Neural Evolution - Deep Learning with Evolutionary Computation"

  13. arXiv:2004.04633  [pdf, other

    cs.DC cs.NE

    Parallel/distributed implementation of cellular training for generative adversarial neural networks

    Authors: Emiliano Perez, Sergio Nesmachnow, Jamal Toutouh, Erik Hemberg, Una-May O'Reilly

    Abstract: Generative adversarial networks (GANs) are widely used to learn generative models. GANs consist of two networks, a generator and a discriminator, that apply adversarial learning to optimize their parameters. This article presents a parallel/distributed implementation of a cellular competitive coevolutionary method to train two populations of GANs. A distributed memory parallel implementation is pr… ▽ More

    Submitted 3 August, 2020; v1 submitted 7 April, 2020; originally announced April 2020.

    Comments: This article has been accepted for publication in IEEE International Parallel and Distributed Processing Symposium, Parallel and Distributed Combinatorics and Optimization, 2020

  14. arXiv:2003.13532  [pdf, other

    cs.AI cs.LG cs.NE

    Re-purposing Heterogeneous Generative Ensembles with Evolutionary Computation

    Authors: Jamal Toutouh, Erik Hemberg, Una-May O'Reilly

    Abstract: Generative Adversarial Networks (GANs) are popular tools for generative modeling. The dynamics of their adversarial learning give rise to convergence pathologies during training such as mode and discriminator collapse. In machine learning, ensembles of predictors demonstrate better results than a single predictor for many tasks. In this study, we apply two evolutionary algorithms (EAs) to create e… ▽ More

    Submitted 3 August, 2020; v1 submitted 30 March, 2020; originally announced March 2020.

    Comments: Accepted as a full paper for the Genetic and Evolutionary Computation Conference - GECCO'20

  15. Spatial Evolutionary Generative Adversarial Networks

    Authors: Jamal Toutouh, Erik Hemberg, Una-May O'Reilly

    Abstract: Generative adversary networks (GANs) suffer from training pathologies such as instability and mode collapse. These pathologies mainly arise from a lack of diversity in their adversarial interactions. Evolutionary generative adversarial networks apply the principles of evolutionary computation to mitigate these problems. We hybridize two of these approaches that promote training diversity. One, E-G… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

  16. arXiv:1812.05767  [pdf, other

    cs.HC cs.CY cs.LG

    Using Detailed Access Trajectories for Learning Behavior Analysis

    Authors: Yanbang Wang, Nancy Law, Erik Hemberg, Una-May O'Reilly

    Abstract: Student learning activity in MOOCs can be viewed from multiple perspectives. We present a new organization of MOOC learner activity data at a resolution that is in between the fine granularity of the clickstream and coarse organizations that count activities, aggregate students or use long duration time units. A detailed access trajectory (DAT) consists of binary values and is two dimensional with… ▽ More

    Submitted 13 December, 2018; originally announced December 2018.

    Comments: 10 pages, accepted by 2019 International Conference on Learning Analytics and Knowledge

  17. arXiv:1812.05043  [pdf, other

    cs.LG cs.CY stat.ML

    Transfer Learning using Representation Learning in Massive Open Online Courses

    Authors: Mucong Ding, Yanbang Wang, Erik Hemberg, Una-May O'Reilly

    Abstract: In a Massive Open Online Course (MOOC), predictive models of student behavior can support multiple aspects of learning, including instructor feedback and timely intervention. Ongoing courses, when the student outcomes are yet unknown, must rely on models trained from the historical data of previously offered courses. It is possible to transfer models, but they often have poor prediction performanc… ▽ More

    Submitted 18 December, 2018; v1 submitted 12 December, 2018; originally announced December 2018.

    Comments: 10 pages, 11 figures, accepted at LAK'19

  18. arXiv:1811.12843  [pdf, other

    cs.NE cs.LG

    Lipizzaner: A System That Scales Robust Generative Adversarial Network Training

    Authors: Tom Schmiedlechner, Ignavier Ng Zhi Yong, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly

    Abstract: GANs are difficult to train due to convergence pathologies such as mode and discriminator collapse. We introduce Lipizzaner, an open source software system that allows machine learning engineers to train GANs in a distributed and robust way. Lipizzaner distributes a competitive coevolutionary algorithm which, by virtue of dual, adapting, generator and discriminator populations, is robust to collap… ▽ More

    Submitted 30 November, 2018; originally announced November 2018.

    Comments: Systems for ML Workshop (MLSYS) at NeurIPS 2018

  19. arXiv:1807.08194  [pdf, other

    cs.NE

    Towards Distributed Coevolutionary GANs

    Authors: Abdullah Al-Dujaili, Tom Schmiedlechner, and Erik Hemberg, Una-May O'Reilly

    Abstract: Generative Adversarial Networks (GANs) have become one of the dominant methods for deep generative modeling. Despite their demonstrated success on multiple vision tasks, GANs are difficult to train and much research has been dedicated towards understanding and improving their gradient-based learning dynamics. Here, we investigate the use of coevolution, a class of black-box (gradient-free) co-opti… ▽ More

    Submitted 31 August, 2018; v1 submitted 21 July, 2018; originally announced July 2018.

    Comments: Accepted at AAAI 2018 Fall Symposium Series

  20. arXiv:1805.03553  [pdf, other

    cs.LG cs.CR cs.HC stat.ML

    On Visual Hallmarks of Robustness to Adversarial Malware

    Authors: Alex Huang, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly

    Abstract: A central challenge of adversarial learning is to interpret the resulting hardened model. In this contribution, we ask how robust generalization can be visually discerned and whether a concise view of the interactions between a hardened decision map and input samples is possible. We first provide a means of visually comparing a hardened model's loss behavior with respect to the adversarial variant… ▽ More

    Submitted 9 May, 2018; originally announced May 2018.

    Comments: Submitted to the IReDLiA workshop at the Federated Artificial Intelligence Meeting (FAIM) 2018

  21. arXiv:1804.10586  [pdf, other

    cs.GT

    Approximating Nash Equilibria for Black-Box Games: A Bayesian Optimization Approach

    Authors: Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly

    Abstract: Game theory has emerged as a powerful framework for modeling a large range of multi-agent scenarios. Many algorithmic solutions require discrete, finite games with payoffs that have a closed-form specification. In contrast, many real-world applications require modeling with continuous action spaces and black-box utility functions where payoff information is available only in the form of empirical… ▽ More

    Submitted 11 June, 2018; v1 submitted 27 April, 2018; originally announced April 2018.

    Comments: Accepted at OptMAS@AAMAS'18

  22. arXiv:1801.02950  [pdf, other

    cs.CR cs.LG stat.ML

    Adversarial Deep Learning for Robust Detection of Binary Encoded Malware

    Authors: Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O'Reilly

    Abstract: Malware is constantly adapting in order to avoid detection. Model based malware detectors, such as SVM and neural networks, are vulnerable to so-called adversarial examples which are modest changes to detectable malware that allows the resulting malware to evade detection. Continuous-valued methods that are robust to adversarial examples of images have been developed using saddle-point optimizatio… ▽ More

    Submitted 25 March, 2018; v1 submitted 9 January, 2018; originally announced January 2018.

    Comments: 1ST Deep Learning and Security Workshop (co-located with the 39th IEEE Symposium on Security and Privacy)

  23. arXiv:1712.00206  [pdf, other

    cs.LG

    Distributed Stratified Locality Sensitive Hashing for Critical Event Prediction in the Cloud

    Authors: Alessandro De Palma, Erik Hemberg, Una-May O'Reilly

    Abstract: The availability of massive healthcare data repositories calls for efficient tools for data-driven medicine. We introduce a distributed system for Stratified Locality Sensitive Hashing to perform fast similarity-based prediction on large medical waveform datasets. Our implementation, for an ICU use case, prioritizes latency over throughput and is targeted at a cloud environment. We demonstrate our… ▽ More

    Submitted 1 December, 2017; originally announced December 2017.

    Comments: Accepted poster at NIPS 2017 Workshop on Machine Learning for Health (https://ml4health.github.io/2017/)

  24. PonyGE2: Grammatical Evolution in Python

    Authors: Michael Fenton, James McDermott, David Fagan, Stefan Forstenlechner, Michael O'Neill, Erik Hemberg

    Abstract: Grammatical Evolution (GE) is a population-based evolutionary algorithm, where a formal grammar is used in the genotype to phenotype map** process. PonyGE2 is an open source implementation of GE in Python, developed at UCD's Natural Computing Research and Applications group. It is intended as an advertisement and a starting-point for those new to GE, a reference for students and researchers, a r… ▽ More

    Submitted 26 April, 2017; v1 submitted 24 March, 2017; originally announced March 2017.

    Comments: 8 pages, 4 figures, submitted to the 2017 GECCO Workshop on Evolutionary Computation Software Systems (EvoSoft)

    Journal ref: In Proceedings of GECCO '17 Companion, Berlin, Germany, July 15-19, 2017, 8 pages