Skip to main content

Showing 1–17 of 17 results for author: Insua, D R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.13647  [pdf, other

    cs.CY

    A framework for expected capability sets

    Authors: Nicolas Fayard, David Ríos Insua, Alexis Tsoukiàs

    Abstract: This paper addresses decision-aiding problems that involve multiple objectives and uncertain states of the world. Inspired by the capability approach, we focus on cases where a policy maker chooses an act that, combined with a state of the world, leads to a set of choices for citizens. While no preferential information is available to construct importance parameters for the criteria, we can obtain… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  2. arXiv:2401.01630  [pdf, other

    cs.AI cs.CR stat.AP

    A Cybersecurity Risk Analysis Framework for Systems with Artificial Intelligence Components

    Authors: Jose Manuel Camacho, Aitor Couce-Vieira, David Arroyo, David Rios Insua

    Abstract: The introduction of the European Union Artificial Intelligence Act, the NIST Artificial Intelligence Risk Management Framework, and related norms demands a better understanding and implementation of novel risk analysis approaches to evaluate systems with Artificial Intelligence components. This paper provides a cybersecurity risk analysis framework that can help assessing such systems. We use an i… ▽ More

    Submitted 3 January, 2024; originally announced January 2024.

    Comments: 54 pages, 18 tables, 6 figures

  3. arXiv:2101.10721  [pdf, other

    cs.GT cs.LG econ.TH

    Data sharing games

    Authors: Víctor Gallego, Roi Naveiro, David Ríos Insua, Wolfram Rozas

    Abstract: Data sharing issues pervade online social and economic environments. To foster social progress, it is important to develop models of the interaction between data producers and consumers that can promote the rise of cooperation between the involved parties. We formalize this interaction as a game, the data sharing game, based on the Iterated Prisoner's Dilemma and deal with it through multi-agent r… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

  4. arXiv:2007.02613  [pdf, ps, other

    cs.GT stat.AP

    Adversarial Risk Analysis (Overview)

    Authors: David Banks, Víctor Gallego, Roi Naveiro, David Ríos Insua

    Abstract: Adversarial risk analysis (ARA) is a relatively new area of research that informs decision-making when facing intelligent opponents and uncertain outcomes. It enables an analyst to express her Bayesian beliefs about an opponent's utilities, capabilities, probabilities and the type of strategic calculation that the opponent is using. Within that framework, the analyst then solves the problem from t… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

  5. arXiv:2004.08705  [pdf, other

    stat.ML cs.CR cs.LG stat.CO

    Protecting Classifiers From Attacks. A Bayesian Approach

    Authors: Victor Gallego, Roi Naveiro, Alberto Redondo, David Rios Insua, Fabrizio Ruggeri

    Abstract: Classification problems in security settings are usually modeled as confrontations in which an adversary tries to fool a classifier manipulating the covariates of instances to obtain a benefit. Most approaches to such problems have focused on game-theoretic ideas with strong underlying common knowledge assumptions, which are not realistic in the security realm. We provide an alternative Bayesian f… ▽ More

    Submitted 18 April, 2020; originally announced April 2020.

  6. arXiv:2003.03546  [pdf, other

    cs.AI cs.LG stat.CO stat.ML

    Adversarial Machine Learning: Bayesian Perspectives

    Authors: David Rios Insua, Roi Naveiro, Victor Gallego, Jason Poulos

    Abstract: Adversarial Machine Learning (AML) is emerging as a major field aimed at protecting machine learning (ML) systems against security threats: in certain scenarios there may be adversaries that actively manipulate input data to fool learning systems. This creates a new class of security vulnerabilities that ML systems may face, and a new desirable property called adversarial robustness essential to t… ▽ More

    Submitted 22 February, 2024; v1 submitted 7 March, 2020; originally announced March 2020.

    Journal ref: Journal of the American Statistical Association. Volume 118, 2023 - Issue 543

  7. arXiv:1911.11652  [pdf, other

    stat.ML cs.LG

    Assessing Supply Chain Cyber Risks

    Authors: Alberto Redondo, Alberto Torres-Barrán, David Ríos Insua, Jordi Domingo

    Abstract: Risk assessment is a major challenge for supply chain managers, as it potentially affects business factors such as service costs, supplier competition and customer expectations. The increasing interconnectivity between organisations has put into focus methods for supply chain cyber risk management. We introduce a general approach to support such activity taking into account various techniques of a… ▽ More

    Submitted 26 November, 2019; originally announced November 2019.

  8. arXiv:1911.09945  [pdf, other

    cs.CR

    Insider threat modeling: An adversarial risk analysis approach

    Authors: Chaitanya Joshi, David Rios Insua, Jesus Rios

    Abstract: Insider threats entail major security issues in geopolitics, cyber risk management and business organization. The game theoretic models proposed so far do not take into account some important factors such as the organisational culture and whether the attacker was detected or not. They also fail to model the defensive mechanisms already put in place by an organisation to mitigate an insider attack.… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    MSC Class: 91A40; 62C10

  9. arXiv:1911.03653  [pdf, other

    cs.CR cs.LG stat.ML

    Protecting from Malware Obfuscation Attacks through Adversarial Risk Analysis

    Authors: Alberto Redondo, David Rios Insua

    Abstract: Malware constitutes a major global risk affecting millions of users each year. Standard algorithms in detection systems perform insufficiently when dealing with malware passed through obfuscation tools. We illustrate this studying in detail an open source metamorphic software, making use of a hybrid framework to obtain the relevant features from binaries. We then provide an improved alternative so… ▽ More

    Submitted 9 November, 2019; originally announced November 2019.

  10. arXiv:1908.09744  [pdf, other

    cs.LG stat.ML

    Variationally Inferred Sampling Through a Refined Bound for Probabilistic Programs

    Authors: Victor Gallego, David Rios Insua

    Abstract: A framework to boost the efficiency of Bayesian inference in probabilistic programs is introduced by embedding a sampler inside a variational posterior approximation. We call it the refined variational approximation. Its strength lies both in ease of implementation and automatically tuning of the sampler parameters to speed up mixing time using automatic differentiation. Several strategies to appr… ▽ More

    Submitted 22 February, 2020; v1 submitted 26 August, 2019; originally announced August 2019.

  11. arXiv:1908.08773  [pdf, other

    cs.LG stat.ML

    Opponent Aware Reinforcement Learning

    Authors: Victor Gallego, Roi Naveiro, David Rios Insua, David Gomez-Ullate Oteiza

    Abstract: We introduce Threatened Markov Decision Processes (TMDPs) as an extension of the classical Markov Decision Process framework for Reinforcement Learning (RL). TMDPs allow suporting a decision maker against potential opponents in a RL context. We also propose a level-k thinking scheme resulting in a novel learning approach to deal with TMDPs. After introducing our framework and deriving theoretical… ▽ More

    Submitted 26 August, 2019; v1 submitted 22 August, 2019; originally announced August 2019.

    Comments: Substantially extends the previous work: https://www.aaai.org/ojs/index.php/AAAI/article/view/5106. This article draws heavily from arXiv arXiv:1809.01560

  12. arXiv:1908.06901  [pdf, ps, other

    cs.GT stat.CO stat.ML

    Gradient Methods for Solving Stackelberg Games

    Authors: Roi Naveiro, David Ríos Insua

    Abstract: Stackelberg Games are gaining importance in the last years due to the raise of Adversarial Machine Learning (AML). Within this context, a new paradigm must be faced: in classical game theory, intervening agents were humans whose decisions are generally discrete and low dimensional. In AML, decisions are made by algorithms and are usually continuous and high dimensional, e.g. choosing the weights o… ▽ More

    Submitted 23 October, 2019; v1 submitted 19 August, 2019; originally announced August 2019.

    Comments: Accepted in ADT Conference 2019

  13. arXiv:1903.07727  [pdf, other

    cs.CR

    An Adversarial Risk Analysis Framework for Cybersecurity

    Authors: David Rios Insua, Aitor Couce Vieira, Jose Antonio Rubio, Wolter Pieters, Katsiaryna Labunets, Daniel Garcia Rasines

    Abstract: Cyber threats affect all kinds of organisations. Risk analysis is an essential methodology for cybersecurity as it allows organisations to deal with the cyber threats potentially affecting them, prioritise the defence of their assets and decide what security controls should be implemented. Many risk analysis methods are present in cybersecurity models, compliance frameworks and international stand… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

  14. arXiv:1812.00071  [pdf, other

    stat.ML cs.LG

    Stochastic Gradient MCMC with Repulsive Forces

    Authors: Victor Gallego, David Rios Insua

    Abstract: We propose a unifying view of two different Bayesian inference algorithms, Stochastic Gradient Markov Chain Monte Carlo (SG-MCMC) and Stein Variational Gradient Descent (SVGD), leading to improved and efficient novel sampling schemes. We show that SVGD combined with a noise term can be framed as a multiple chain SG-MCMC method. Instead of treating each parallel chain independently from others, our… ▽ More

    Submitted 22 February, 2020; v1 submitted 30 November, 2018; originally announced December 2018.

    Comments: Extends the workshop version

  15. arXiv:1809.01560  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Reinforcement Learning under Threats

    Authors: Victor Gallego, Roi Naveiro, David Rios Insua

    Abstract: In several reinforcement learning (RL) scenarios, mainly in security settings, there may be adversaries trying to interfere with the reward generating process. In this paper, we introduce Threatened Markov Decision Processes (TMDPs), which provide a framework to support a decision maker against a potential adversary in RL. Furthermore, we propose a level-$k$ thinking scheme resulting in a new lear… ▽ More

    Submitted 30 July, 2019; v1 submitted 5 September, 2018; originally announced September 2018.

    Comments: Extends the verson published at the Proceedings of the AAAI Conference on Artificial Intelligence 33, https://www.aaai.org/ojs/index.php/AAAI/article/view/5106

  16. arXiv:1802.07513  [pdf, other

    stat.ML cs.GT cs.LG

    Adversarial classification: An adversarial risk analysis approach

    Authors: Roi Naveiro, Alberto Redondo, David Ríos Insua, Fabrizio Ruggeri

    Abstract: Classification problems in security settings are usually contemplated as confrontations in which one or more adversaries try to fool a classifier to obtain a benefit. Most approaches to such adversarial classification problems have focused on game theoretical ideas with strong underlying common knowledge assumptions, which are actually not realistic in security domains. We provide an alternative f… ▽ More

    Submitted 24 September, 2019; v1 submitted 21 February, 2018; originally announced February 2018.

    Comments: Published in the International Journal for Approximate Reasoning

    Journal ref: International Journal of Approximate Reasoning, 113, 133-148 (2019)

  17. A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity

    Authors: Aitor Couce Vieira, Siv Hilde Houmb, David Rios Insua

    Abstract: Oil and gas drilling is based, increasingly, on operational technology, whose cybersecurity is complicated by several challenges. We propose a graphical model for cybersecurity risk assessment based on Adversarial Risk Analysis to face those challenges. We also provide an example of the model in the context of an offshore drilling rig. The proposed model provides a more formal and comprehensive an… ▽ More

    Submitted 7 April, 2014; originally announced April 2014.

    Comments: In Proceedings GraMSec 2014, arXiv:1404.1634

    ACM Class: K.6.5

    Journal ref: EPTCS 148, 2014, pp. 78-93