Skip to main content

Showing 1–30 of 30 results for author: Higham, D J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19807  [pdf, other

    cs.LG cs.AI

    Deceptive Diffusion: Generating Synthetic Adversarial Examples

    Authors: Lucas Beerens, Catherine F. Higham, Desmond J. Higham

    Abstract: We introduce the concept of deceptive diffusion -- training a generative AI model to produce adversarial images. Whereas a traditional adversarial attack algorithm aims to perturb an existing image to induce a misclassificaton, the deceptive diffusion model can create an arbitrary number of new, misclassified images that are not directly associated with training or test images. Deceptive diffusion… ▽ More

    Submitted 28 June, 2024; originally announced June 2024.

    MSC Class: 68T07 ACM Class: I.2.0; I.5.1

  2. arXiv:2406.12670  [pdf, other

    cs.AI cs.LG

    Stealth edits for provably fixing or attacking large language models

    Authors: Oliver J. Sutton, Qinghua Zhou, Wei Wang, Desmond J. Higham, Alexander N. Gorban, Alexander Bastounis, Ivan Y. Tyukin

    Abstract: We reveal new methods and the theoretical foundations of techniques for editing large language models. We also show how the new theory can be used to assess the editability of models and to expose their susceptibility to previously unknown malicious attacks. Our theoretical approach shows that a single metric (a specific measure of the intrinsic dimensionality of the model's features) is fundament… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: 24 pages, 9 figures. Open source implementation: https://github.com/qinghua-zhou/stealth-edits

    MSC Class: 68T07; 68T50; 68W40 ACM Class: I.2.7; F.2.0

  3. arXiv:2402.07631  [pdf, other

    cs.SI cond-mat.dis-nn cond-mat.stat-mech nlin.AO physics.data-an

    Higher-order Connection Laplacians for Directed Simplicial Complexes

    Authors: Xue Gong, Desmond J. Higham, Konstantinos Zygalakis, Ginestra Bianconi

    Abstract: Higher-order networks encode the many-body interactions existing in complex systems, such as the brain, protein complexes, and social interactions. Simplicial complexes are higher-order networks that allow a comprehensive investigation of the interplay between topology and dynamics. However, simplicial complexes have the limitation that they only capture undirected higher-order interactions while… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

    Comments: 34 pages, 13 figures

  4. arXiv:2312.14977  [pdf, other

    cs.LG cs.AI

    Diffusion Models for Generative Artificial Intelligence: An Introduction for Applied Mathematicians

    Authors: Catherine F. Higham, Desmond J. Higham, Peter Grindrod

    Abstract: Generative artificial intelligence (AI) refers to algorithms that create synthetic but realistic output. Diffusion models currently offer state of the art performance in generative AI for images. They also form a key component in more general tools, including text-to-image generators and large language models. Diffusion models work by adding noise to the available training data and then learning h… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    MSC Class: 68T07; 60J60 ACM Class: I.2; I.2.6

  5. arXiv:2311.17128  [pdf, other

    cs.CV cs.AI

    Vulnerability Analysis of Transformer-based Optical Character Recognition to Adversarial Attacks

    Authors: Lucas Beerens, Desmond J. Higham

    Abstract: Recent advancements in Optical Character Recognition (OCR) have been driven by transformer-based models. OCR systems are critical in numerous high-stakes domains, yet their vulnerability to adversarial attack remains largely uncharted territory, raising concerns about security and compliance with emerging AI regulations. In this work we present a novel framework to assess the resilience of Transfo… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

    MSC Class: 65F35 ACM Class: I.2.10; G.1.3

  6. arXiv:2309.07072  [pdf, ps, other

    cs.LG

    The Boundaries of Verifiable Accuracy, Robustness, and Generalisation in Deep Learning

    Authors: Alexander Bastounis, Alexander N. Gorban, Anders C. Hansen, Desmond J. Higham, Danil Prokhorov, Oliver Sutton, Ivan Y. Tyukin, Qinghua Zhou

    Abstract: In this work, we assess the theoretical limitations of determining guaranteed stability and accuracy of neural networks in classification tasks. We consider classical distribution-agnostic framework and algorithms minimising empirical risks and potentially subjected to some weights regularisation. We show that there is a large family of tasks for which computing and verifying ideal stable and accu… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

    MSC Class: 68T07; 68T05

  7. arXiv:2309.03665  [pdf, other

    cs.LG cs.AI

    How adversarial attacks can disrupt seemingly stable accurate classifiers

    Authors: Oliver J. Sutton, Qinghua Zhou, Ivan Y. Tyukin, Alexander N. Gorban, Alexander Bastounis, Desmond J. Higham

    Abstract: Adversarial attacks dramatically change the output of an otherwise accurate learning system using a seemingly inconsequential modification to a piece of input data. Paradoxically, empirical evidence indicates that even systems which are robust to large random perturbations of the input data remain susceptible to small, easily constructed, adversarial perturbations of their inputs. Here, we show th… ▽ More

    Submitted 7 September, 2023; originally announced September 2023.

    Comments: 11 pages, 8 figures, additional supplementary materials

  8. arXiv:2308.15092  [pdf, other

    math.NA cs.AI cs.LG

    Can We Rely on AI?

    Authors: Desmond J. Higham

    Abstract: Over the last decade, adversarial attack algorithms have revealed instabilities in deep learning tools. These algorithms raise issues regarding safety, reliability and interpretability in artificial intelligence; especially in high risk settings. From a practical perspective, there has been a war of escalation between those develo** attack and defence strategies. At a more theoretical level, res… ▽ More

    Submitted 29 August, 2023; originally announced August 2023.

    MSC Class: 68T01; 68T05; 90C31 ACM Class: I.2.0; I.5.0

  9. arXiv:2306.14266  [pdf, other

    cs.SI math.NA

    Estimating Network Dimension When the Spectrum Struggles

    Authors: Peter Grindrod, Desmond John Higham, Henry-Louis de Kergorlay

    Abstract: What is the dimension of a network? Here, we view it as the smallest dimension of Euclidean space into which nodes can be embedded so that pairwise distances accurately reflect the connectivity structure. We show that a recently proposed and extremely efficient algorithm for data clouds, based on computing first and second nearest neighbour distances, can be used as the basis of an approach for es… ▽ More

    Submitted 25 June, 2023; originally announced June 2023.

    MSC Class: 05C20; 05C80; 05C85; 05C90; 05C82 ACM Class: G.2.2

  10. arXiv:2306.02918  [pdf, other

    cs.AI math.NA

    Adversarial Ink: Componentwise Backward Error Attacks on Deep Learning

    Authors: Lucas Beerens, Desmond J. Higham

    Abstract: Deep neural networks are capable of state-of-the-art performance in many classification tasks. However, they are known to be vulnerable to adversarial attacks -- small perturbations to the input that lead to a change in classification. We address this issue from the perspective of backward error and condition number, concepts that have proved useful in numerical analysis. To do this, we build on t… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

    MSC Class: 65F35 ACM Class: I.2.10; G.1.3

  11. arXiv:2207.13895  [pdf, ps, other

    cs.SI math.NA math.PR physics.soc-ph stat.CO

    Generative Hypergraph Models and Spectral Embedding

    Authors: Xue Gong, Desmond J. Higham, Konstantinos Zygalakis

    Abstract: Many complex systems involve interactions between more than two agents. Hypergraphs capture these higher-order interactions through hyperedges that may link more than two nodes. We consider the problem of embedding a hypergraph into low-dimensional Euclidean space so that most interactions are short-range. This embedding is relevant to many follow-on tasks, such as node reordering, clustering, and… ▽ More

    Submitted 5 January, 2023; v1 submitted 28 July, 2022; originally announced July 2022.

  12. arXiv:2202.12769  [pdf, other

    cs.SI math.NA physics.data-an

    Core-periphery detection in hypergraphs

    Authors: Francesco Tudisco, Desmond J. Higham

    Abstract: Core-periphery detection is a key task in exploratory network analysis where one aims to find a core, a set of nodes well-connected internally and with the periphery, and a periphery, a set of nodes connected only (or mostly) with the core. In this work we propose a model of core-periphery for higher-order networks modeled as hypergraphs and we propose a method for computing a core-score vector th… ▽ More

    Submitted 25 February, 2022; originally announced February 2022.

  13. arXiv:2201.01543  [pdf, other

    cs.SI physics.data-an quant-ph

    Testing a QUBO Formulation of Core-periphery Partitioning on a Quantum Annealer

    Authors: Catherine F. Higham, Desmond J. Higham, Francesco Tudisco

    Abstract: We propose a new kernel that quantifies success for the task of computing a core-periphery partition for an undirected network. Finding the associated optimal partitioning may be expressed in the form of a quadratic unconstrained binary optimization (QUBO) problem, to which a state-of-the-art quantum annealer may be applied. We therefore make use of the new objective function to (a) judge the perf… ▽ More

    Submitted 5 January, 2022; originally announced January 2022.

  14. arXiv:2111.05715  [pdf, ps, other

    cs.SI math.DS math.NA

    A Hierarchy of Network Models Giving Bistability Under Triadic Closure

    Authors: Stefano Di Giovacchino, Desmond J. Higham, Konstantinos C. Zygalakis

    Abstract: Triadic closure describes the tendency for new friendships to form between individuals who already have friends in common. It has been argued heuristically that the triadic closure effect can lead to bistability in the formation of large-scale social interaction networks. Here, depending on the initial state and the transient dynamics, the system may evolve towards either of two long-time states.… ▽ More

    Submitted 10 November, 2021; originally announced November 2021.

    Comments: 20 pages, 9 figures

    MSC Class: 60J20; 60J74; 68R10

  15. arXiv:2107.03026  [pdf, ps, other

    cs.SI physics.soc-ph

    Directed Network Laplacians and Random Graph Models

    Authors: Xue Gong, Desmond John Higham, Konstantinos Zygalakis

    Abstract: We consider spectral methods that uncover hidden structures in directed networks. We establish and exploit connections between node reordering via (a) minimizing an objective function and (b) maximizing the likelihood of a random graph model. We focus on two existing spectral approaches that build and analyse Laplacian-style matrices via the minimization of frustration and trophic incoherence. The… ▽ More

    Submitted 11 October, 2021; v1 submitted 7 July, 2021; originally announced July 2021.

    MSC Class: 05C20; 05C80; 05C85; 05C90; 05C82

  16. arXiv:2106.13997  [pdf, other

    cs.CR cs.AI cs.LG

    The Feasibility and Inevitability of Stealth Attacks

    Authors: Ivan Y. Tyukin, Desmond J. Higham, Alexander Bastounis, Eliyas Woldegeorgis, Alexander N. Gorban

    Abstract: We develop and study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence (AI) systems including deep learning neural networks. In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself. Such a stealth attack could be conducted by a mischievous, corrupt or disgr… ▽ More

    Submitted 4 January, 2023; v1 submitted 26 June, 2021; originally announced June 2021.

    MSC Class: 68T01; 68T05; 90C31

    Journal ref: IMA Journal of Applied Mathematics, October 2023, hxad027

  17. arXiv:2103.07319  [pdf, other

    cs.SI cs.DM math.DS

    Epidemics on Hypergraphs: Spectral Thresholds for Extinction

    Authors: Desmond John Higham, Henry-Louis de Kergorlay

    Abstract: Epidemic spreading is well understood when a disease propagates around a contact graph. In a stochastic susceptible-infected-susceptible setting, spectral conditions characterise whether the disease vanishes. However, modelling human interactions using a graph is a simplification which only considers pairwise relationships. This does not fully represent the more realistic case where people mee… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

    MSC Class: 92C60; 37N25; 05C65 ACM Class: J.4; J.3

  18. arXiv:2103.05031  [pdf, other

    cs.SI physics.soc-ph

    Higher-order Network Analysis Takes Off, Fueled by Classical Ideas and New Data

    Authors: Austin R. Benson, David F. Gleich, Desmond J. Higham

    Abstract: Higher-order network analysis uses the ideas of hypergraphs, simplicial complexes, multilinear and tensor algebra, and more, to study complex systems. These are by now well established mathematical abstractions. What's new is that the ideas can be tested and refined on the type of large-scale data arising in today's digital world. This research area therefore is making an impact across many applic… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

    Comments: Based on the SIAM News online article https://sinews.siam.org/Details-Page/higher-order-network-analysis-takes-off-fueled-by-old-ideas-and-new-data

  19. arXiv:2101.06215  [pdf, other

    cs.SI math.NA physics.data-an

    Node and Edge Nonlinear Eigenvector Centrality for Hypergraphs

    Authors: Francesco Tudisco, Desmond J. Higham

    Abstract: Network scientists have shown that there is great value in studying pairwise interactions between components in a system. From a linear algebra point of view, this involves defining and evaluating functions of the associated adjacency matrix. Recent work indicates that there are further benefits from accounting directly for higher order interactions, notably through a hypergraph representation whe… ▽ More

    Submitted 24 August, 2021; v1 submitted 15 January, 2021; originally announced January 2021.

  20. arXiv:2012.02999  [pdf, other

    cs.SI math.NA

    A Theory for Backtrack-Downweighted Walks

    Authors: Francesca Arrigo, Desmond J. Higham, Vanni Noferini

    Abstract: We develop a complete theory for the combinatorics of walk-counting on a directed graph in the case where each backtracking step is downweighted by a given factor. By deriving expressions for the associated generating functions, we also obtain linear systems for computing centrality measures in this setting. In particular, we show that backtrack-downweighted Katz-style network centrality can be co… ▽ More

    Submitted 5 December, 2020; originally announced December 2020.

    MSC Class: 05C50; 05C82; 68R10

  21. arXiv:2006.13984  [pdf, other

    stat.ML cs.LG math.ST

    Consistency of Anchor-based Spectral Clustering

    Authors: Henry-Louis de Kergorlay, Desmond John Higham

    Abstract: Anchor-based techniques reduce the computational complexity of spectral clustering algorithms. Although empirical tests have shown promising results, there is currently a lack of theoretical support for the anchoring approach. We define a specific anchor-based algorithm and show that it is amenable to rigorous analysis, as well as being effective in practice. We establish the theoretical consisten… ▽ More

    Submitted 27 June, 2020; v1 submitted 24 June, 2020; originally announced June 2020.

  22. On Adversarial Examples and Stealth Attacks in Artificial Intelligence Systems

    Authors: Ivan Y. Tyukin, Desmond J. Higham, Alexander N. Gorban

    Abstract: In this work we present a formal theoretical framework for assessing and analyzing two classes of malevolent action towards generic Artificial Intelligence (AI) systems. Our results apply to general multi-class classifiers that map from an input space into a decision space, including artificial neural networks used in deep learning applications. Two classes of attacks are considered. The first cla… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

    MSC Class: 68T05; 68T10; 90C31

    Journal ref: 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, United Kingdom, 2020

  23. arXiv:1910.12711  [pdf, other

    cs.SI math.NA physics.data-an

    A framework for second order eigenvector centralities and clustering coefficients

    Authors: Francesca Arrigo, Desmond J. Higham, Francesco Tudisco

    Abstract: We propose and analyse a general tensor-based framework for incorporating second order features into network measures. This approach allows us to combine traditional pairwise links with information that records whether triples of nodes are involved in wedges or triangles. Our treatment covers classical spectral methods and recently proposed cases from the literature, but we also identify many inte… ▽ More

    Submitted 28 October, 2019; originally announced October 2019.

  24. arXiv:1807.01496  [pdf, other

    cs.DM cs.SI

    Centrality-Friendship Paradoxes: When Our Friends Are More Important Than Us

    Authors: Desmond J. Higham

    Abstract: The friendship paradox states that, on average, our friends have more friends than we do. In network terms, the average degree over the nodes can never exceed the average degree over the neighbours of nodes. This effect, which is a classic example of sampling bias, has attracted much attention in the social science and network science literature, with variations and extensions of the paradox being… ▽ More

    Submitted 4 July, 2018; originally announced July 2018.

    MSC Class: 68R10; 94C15 ACM Class: G.2.2; F.2.1

  25. arXiv:1804.09820  [pdf, other

    cs.SI math.NA physics.data-an

    A Nonlinear Spectral Method for Core--Periphery Detection in Networks

    Authors: Francesco Tudisco, Desmond J. Higham

    Abstract: We derive and analyse a new iterative algorithm for detecting network core--periphery structure. Using techniques in nonlinear Perron-Frobenius theory, we prove global convergence to the unique solution of a relaxed version of a natural discrete optimization problem. On sparse networks, the cost of each iteration scales linearly with the number of nodes, making the algorithm feasible for large-sca… ▽ More

    Submitted 11 February, 2019; v1 submitted 25 April, 2018; originally announced April 2018.

  26. arXiv:1801.05894  [pdf, other

    math.HO cs.LG math.NA stat.ML

    Deep Learning: An Introduction for Applied Mathematicians

    Authors: Catherine F. Higham, Desmond J. Higham

    Abstract: Multilayered artificial neural networks are becoming a pervasive tool in a host of application fields. At the heart of this deep learning revolution are familiar concepts from applied and computational mathematics; notably, in calculus, approximation theory, optimization and linear algebra. This article provides a very brief introduction to the basic ideas that underlie deep learning from an appli… ▽ More

    Submitted 17 January, 2018; originally announced January 2018.

    MSC Class: 97R40; 68T01; 65K10; 62M45 ACM Class: G.1.6; I.2.10; I.2.0; I.2.6

  27. arXiv:1511.07305  [pdf, ps, other

    cs.SI math.NA physics.soc-ph

    Block Matrix Formulations for Evolving Networks

    Authors: Caterina Fenu, Desmond J. Higham

    Abstract: Many types of pairwise interaction take the form of a fixed set of nodes with edges that appear and disappear over time. In the case of discrete-time evolution, the resulting evolving network may be represented by a time-ordered sequence of adjacency matrices. We consider here the issue of representing the system as a single, higher dimensional block matrix, built from the individual time-slices.… ▽ More

    Submitted 1 June, 2016; v1 submitted 23 November, 2015; originally announced November 2015.

    Comments: 18 pages, 2 figures

    MSC Class: 05C50; 15A69

  28. arXiv:1505.00965  [pdf, other

    math.NA cs.CE physics.data-an q-fin.CP stat.CO

    An Introduction to Multilevel Monte Carlo for Option Valuation

    Authors: Desmond J. Higham

    Abstract: Monte Carlo is a simple and flexible tool that is widely used in computational finance. In this context, it is common for the quantity of interest to be the expected value of a random variable defined via a stochastic differential equation. In 2008, Giles proposed a remarkable improvement to the approach of discretizing with a numerical method and applying standard Monte Carlo. His multilevel Mont… ▽ More

    Submitted 5 May, 2015; originally announced May 2015.

    Comments: Submitted to International Journal of Computer Mathematics, special issue on Computational Methods in Finance

    MSC Class: 65C30

  29. arXiv:1409.1831  [pdf, other

    cs.CY cs.SI physics.data-an

    Opportunities at the Mathematics/Future Cities Interface

    Authors: Peter Grindrod, Desmond J. Higham, Robert S. MacKay

    Abstract: We make the case for mathematicians and statisticians to stake their claim in the fast-moving and high-impact research field that is becoming known as Future Cities. After assessing the Future Cities arena, we provide some illustrative challenges where mathematical scientists can make an impact.

    Submitted 5 September, 2014; originally announced September 2014.

    Comments: A revised version of this document will appear in SIAM News (Society of Industrial and Applied Mathematics)

    Report number: University of Strathclyde Mathematics and Statistics Research Report 10 (2014) MSC Class: 05C82; 94C15; 65F50

  30. arXiv:1406.2017  [pdf, other

    cs.SI physics.soc-ph

    Anticipating Activity in Social Media Spikes

    Authors: Desmond J. Higham, Peter Grindrod, Alexander V. Mantzaris, Amanda Otley, Peter Laflin

    Abstract: We propose a novel mathematical model for the activity of microbloggers during an external, event-driven spike. The model leads to a testable prediction of who would become most active if a spike were to take place. This type of information is of great interest to commercial organisations, governments and charities, as it identifies key players who can be targeted with information in real time whe… ▽ More

    Submitted 8 June, 2014; originally announced June 2014.