Skip to main content

Showing 1–36 of 36 results for author: Lisitsa, A

Searching in archive cs. Search in all archives.
.
  1. Handling of Past and Future with Phenesthe+

    Authors: Manolis Pitsikalis, Alexei Lisitsa, Patrick Totzke

    Abstract: Writing temporal logic formulae for properties that combine instantaneous events with overlap** temporal phenomena of some duration is difficult in classical temporal logics. To address this issue, in previous work we introduced a new temporal logic with intuitive temporal modalities specifically tailored for the representation of both instantaneous and durative phenomena. We also provided an im… ▽ More

    Submitted 2 October, 2023; originally announced October 2023.

    Comments: In Proceedings GandALF 2023, arXiv:2309.17318

    ACM Class: F.4.1; I.2.4

    Journal ref: EPTCS 390, 2023, pp. 33-49

  2. arXiv:2308.10893  [pdf, other

    cs.LG cs.DB

    Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams

    Authors: Yinzheng Zhong, Alexei Lisitsa

    Abstract: In this paper, we introduce the transition-based feature generator (TFGen) technique, which reads general activity data with attributes and generates step-by-step generated data. The activity data may consist of network activity from packets, system calls from processes or classified activity from surveillance cameras. TFGen processes data online and will generate data with encoded historical data… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

  3. arXiv:2307.12185  [pdf, other

    math.GT cs.AI cs.LG

    Machine learning discovers invariants of braids and flat braids

    Authors: Alexei Lisitsa, Mateo Salles, Alexei Vernitski

    Abstract: We use machine learning to classify examples of braids (or flat braids) as trivial or non-trivial. Our ML takes form of supervised learning using neural networks (multilayer perceptrons). When they achieve good results in classification, we are able to interpret their structure as mathematical conjectures and then prove these conjectures as theorems. As a result, we find new convenient invariants… ▽ More

    Submitted 22 July, 2023; originally announced July 2023.

    Comments: 24 pages

  4. arXiv:2209.15103  [pdf, other

    cs.CR

    Data Querying with Ciphertext Policy Attribute Based Encryption

    Authors: Maryam Almarwani, Boris Konev, Alexei Lisitsa

    Abstract: Data encryption limits the power and efficiency of queries. Direct processing of encrypted data should ideally be possible to avoid the need for data decryption, processing, and re-encryption. It is vital to keep the data searchable and sortable. That is, some information is intentionally leaked. This intentional leakage technology is known as "querying over encrypted data schemes", which offer co… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

  5. arXiv:2206.10379  [pdf, other

    cs.CR

    Can process mining help in anomaly-based intrusion detection?

    Authors: Yinzheng Zhong, Alexei Lisitsa

    Abstract: In this paper, we consider the naive applications of process mining in network traffic comprehension, traffic anomaly detection, and intrusion detection. We standardise the procedure of transforming packet data into an event log. We mine multiple process models and analyse the process models mined with the inductive miner using ProM and the fuzzy miner using Disco. We compare the two types of proc… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

  6. arXiv:2206.05373  [pdf, other

    math.GT cs.LG

    An application of neural networks to a problem in knot theory and group theory (untangling braids)

    Authors: Alexei Lisitsa, Mateo Salles, Alexei Vernitski

    Abstract: We report on our success on solving the problem of untangling braids up to length 20 and width 4. We use feed-forward neural networks in the framework of reinforcement learning to train the agent to choose Reidemeister moves to untangle braids in the minimal number of moves.

    Submitted 10 June, 2022; originally announced June 2022.

  7. arXiv:2205.12064  [pdf, other

    cs.CR

    Process Mining Algorithm for Online Intrusion Detection System

    Authors: Yinzheng Zhong, John Y. Goulermas, Alexei Lisitsa

    Abstract: In this paper, we consider the applications of process mining in intrusion detection. We propose a novel process mining inspired algorithm to be used to preprocess data in intrusion detection systems (IDS). The algorithm is designed to process the network packet data and it works well in online mode for online intrusion detection. To test our algorithm, we used the CSE-CIC-IDS2018 dataset which co… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

    Comments: International Conference on Software Testing, Machine Learning and Complex Process Analysis

  8. arXiv:2111.01042  [pdf, other

    cs.AI

    Logic Rules Meet Deep Learning: A Novel Approach for Ship Type Classification

    Authors: Manolis Pitsikalis, Thanh-Toan Do, Alexei Lisitsa, Shan Luo

    Abstract: The ship** industry is an important component of the global trade and economy, however in order to ensure law compliance and safety it needs to be monitored. In this paper, we present a novel Ship Type classification model that combines vessel transmitted data from the Automatic Identification System, with vessel imagery. The main components of our approach are the Faster R-CNN Deep Neural Netwo… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

    Comments: Accepted and presented in RuleML+RR 2021

    ACM Class: I.2.1; I.5.1

  9. arXiv:2109.14502  [pdf, other

    cs.LG cs.AI math.GT

    Untangling Braids with Multi-agent Q-Learning

    Authors: Abdullah Khan, Alexei Vernitski, Alexei Lisitsa

    Abstract: We use reinforcement learning to tackle the problem of untangling braids. We experiment with braids with 2 and 3 strands. Two competing players learn to tangle and untangle a braid. We interface the braid untangling problem with the OpenAI Gym environment, a widely used way of connecting agents to reinforcement learning problems. The results provide evidence that the more we train the system, the… ▽ More

    Submitted 29 September, 2021; originally announced September 2021.

  10. arXiv:2109.02001   

    cs.SC cs.PL cs.SE

    Proceedings of the 9th International Workshop on Verification and Program Transformation

    Authors: Alexei Lisitsa, Andrei P. Nemytykh

    Abstract: The previous VPT 2020 workshop was organized in honour of Professor Alberto Pettorossi on the occasion of his academic retirement from Università di Roma Tor Vergata. Due to the pandemic the VPT 2020 meeting was cancelled but its proceeding have already appeared in the EPTCS 320 volume. The joint VPT-20-21 event has subsumed the original programme of VPT 2020 and provided an opportunity to mee… ▽ More

    Submitted 5 September, 2021; originally announced September 2021.

    Journal ref: EPTCS 341, 2021

  11. arXiv:2108.13365  [pdf, ps, other

    cs.LO cs.AI

    Representation and Processing of Instantaneous and Durative Temporal Phenomena

    Authors: Manolis Pitsikalis, Alexei Lisitsa, Shan Luo

    Abstract: Event definitions in Complex Event Processing systems are constrained by the expressiveness of each system's language. Some systems allow the definition of instantaneous complex events, while others allow the definition of durative complex events. While there are exceptions that offer both options, they often lack of intervals relations such as those specified by the Allen's interval algebra. In t… ▽ More

    Submitted 27 August, 2021; originally announced August 2021.

    Comments: Pre-proceedings paper presented at the 31st International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR 2021), Tallinn, Estonia, and Virtual, September 7-8, 2021 (arXiv:2107.10160)

    Report number: LOPSTR/2021/14 ACM Class: I.2.4

  12. arXiv:2108.02873  [pdf, ps, other

    math.GT cs.DM

    Circle graphs (chord interlacement graphs) of Gauss diagrams: Descriptions of realizable Gauss diagrams, algorithms, enumeration

    Authors: Abdullah Khan, Alexei Lisitsa, Viktor Lopatkin, Alexei Vernitski

    Abstract: Chord diagrams, under the name of Gauss diagrams, are used in low-dimensional topology as an important tool for studying curves or knots. Those Gauss diagrams that correspond to curves or knots are called realizable. The theme of our paper is the fact that realizability of a Gauss diagram can be expressed via its circle graph. Accordingly, one can define and study realizable circle graphs (with re… ▽ More

    Submitted 5 August, 2021; originally announced August 2021.

    Comments: 25 pages

  13. arXiv:2103.02102  [pdf, other

    math.GT cs.DM

    Experimental Mathematics Approach to Gauss Diagrams Realizability

    Authors: A. Khan, A. Lisitsa, A. Vernitski

    Abstract: A Gauss diagram (or, more generally, a chord diagram) consists of a circle and some chords inside it. Gauss diagrams are a well-established tool in the study of topology of knots and of planar and spherical curves. Not every Gauss diagram corresponds to a knot (or an immersed curve); if it does, it is called realizable. A classical question of computational topology asked by Gauss himself is which… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

  14. arXiv:1908.10738  [pdf, ps, other

    cs.SE cs.RO

    Modular Verification of Autonomous Space Robotics

    Authors: Marie Farrell, Rafael C. Cardoso, Louise A. Dennis, Clare Dixon, Michael Fisher, Georgios Kourtis, Alexei Lisitsa, Matt Luckcuck, Matt Webster

    Abstract: Ensuring that autonomous space robot control software behaves as it should is crucial, particularly as software failure in space often equates to mission failure and could potentially endanger nearby astronauts and costly equipment. To minimise mission failure caused by software errors, we can utilise a variety of tools and techniques to verify that the software behaves as intended. In particular,… ▽ More

    Submitted 28 August, 2019; originally announced August 2019.

  15. arXiv:1908.06970  [pdf

    cs.CR cs.MA

    Agent-based (BDI) modeling for automation of penetration testing

    Authors: Ge Chu, Alexei Lisitsa

    Abstract: Penetration testing (or pentesting) is one of the widely used and important methodologies to assess the security of computer systems and networks. Traditional pentesting relies on the domain expert knowledge and requires considerable human effort all of which incurs a high cost. The automation can significantly improve the efficiency, availability and lower the cost of penetration testing. Existin… ▽ More

    Submitted 18 August, 2019; originally announced August 2019.

  16. arXiv:1908.06723   

    cs.PL cs.LO

    Proceedings Seventh International Workshop on Verification and Program Transformation

    Authors: Alexei Lisitsa, Andrei Nemytykh

    Abstract: This volume contains a final and revised selection of papers presented at the Seventh International Workshop on Verification and Program Transformation (VPT 2019), which took place in Genova, Italy, on April 2nd, 2019, affiliated with Programming 2019.

    Submitted 16 August, 2019; originally announced August 2019.

    Journal ref: EPTCS 299, 2019

  17. Verification of Programs via Intermediate Interpretation

    Authors: Alexei P. Lisitsa, Andrei P. Nemytykh

    Abstract: We explore an approach to verification of programs via program transformation applied to an interpreter of a programming language. A specialization technique known as Turchin's supercompilation is used to specialize some interpreters with respect to the program models. We show that several safety properties of functional programs modeling a class of cache coherence protocols can be proved by a sup… ▽ More

    Submitted 23 August, 2017; originally announced August 2017.

    Comments: In Proceedings VPT 2017, arXiv:1708.06887. The author's extended version is arXiv:1705.06738

    Journal ref: EPTCS 253, 2017, pp. 54-74

  18. arXiv:1708.06887   

    cs.LO cs.PL cs.SE

    Proceedings Fifth International Workshop on Verification and Program Transformation

    Authors: Alexei Lisitsa, Andrei P. Nemytykh, Maurizio Proietti

    Abstract: This volume contains the proceedings of the Fifth International Workshop on Verification and Program Transformation (VPT 2017). The workshop took place in Uppsala, Sweden, on April 29th, 2017, affiliated with the European Joint Conferences on Theory and Practice of Software (ETAPS). The aim of the VPT workshop series is to provide a forum where people from the areas of program transformation and p… ▽ More

    Submitted 23 August, 2017; originally announced August 2017.

    Journal ref: EPTCS 253, 2017

  19. arXiv:1705.06738  [pdf, ps, other

    cs.PL

    Verifying Programs via Intermediate Interpretation

    Authors: Alexei P. Lisitsa, Andrei P. Nemytykh

    Abstract: We explore an approach to verification of programs via program transformation applied to an interpreter of a programming language. A specialization technique known as Turchin's supercompilation is used to specialize some interpreters with respect to the program models. We show that several safety properties of functional programs modeling a class of cache coherence protocols can be proved by a sup… ▽ More

    Submitted 18 May, 2017; originally announced May 2017.

    Comments: Fifth International Workshop on Verification and Program Transformation (VPT-2017), April 29th, 2017, Uppsala, Sweden, 37 pages

  20. arXiv:1607.01835   

    cs.PL cs.SE

    Proceedings of the Fourth International Workshop on Verification and Program Transformation

    Authors: Geoff Hamilton, Alexei Lisitsa, Andrei P. Nemytykh

    Abstract: This volume contains the revised versions of papers presented at the Fourth International Workshop on Verification and Program Transformation (VPT 2016) on April 2, 2016 in Eindhoven, The Netherlands. The workshop is an event of the European Joint Conferences on Theory and Practice of Software (ETAPS 2016). The aim of the VPT workshops is to provide a forum where people from the area of program… ▽ More

    Submitted 6 July, 2016; originally announced July 2016.

    Journal ref: EPTCS 216, 2016

  21. Finite Countermodel Based Verification for Program Transformation (A Case Study)

    Authors: Alexei P. Lisitsa, Andrei P. Nemytykh

    Abstract: Both automatic program verification and program transformation are based on program analysis. In the past decade a number of approaches using various automatic general-purpose program transformation techniques (partial deduction, specialization, supercompilation) for verification of unreachability properties of computing systems were introduced and demonstrated. On the other hand, the semantics ba… ▽ More

    Submitted 11 December, 2015; originally announced December 2015.

    Comments: In Proceedings VPT 2015, arXiv:1512.02215

    Journal ref: EPTCS 199, 2015, pp. 15-32

  22. arXiv:1512.02215   

    cs.LO cs.PL cs.SE

    Proceedings of the Third International Workshop on Verification and Program Transformation

    Authors: Alexei Lisitsa, Andrei P. Nemytykh, Alberto Pettorossi

    Abstract: This volume contains the papers selected among those which were presented at the 3rd International Workshop on Verification and Program Transformation (VPT 2015) held in London, UK, on April 11th, 2015. Previous editions of the Workshop were held at Saint-Petersburg (Russia) in 2013, and Vienna (Austria) in 2014. Those papers show that methods and tools developed in the field of program transfo… ▽ More

    Submitted 5 December, 2015; originally announced December 2015.

    Journal ref: EPTCS 199, 2015

  23. arXiv:1505.06595  [pdf, other

    math.GT cs.CC

    A combinatorial approach to knot recognition

    Authors: Andrew Fish, Alexei Lisitsa, David Stanovský

    Abstract: This is a report on our ongoing research on a combinatorial approach to knot recognition, using coloring of knots by certain algebraic objects called quandles. The aim of the paper is to summarize the mathematical theory of knot coloring in a compact, accessible manner, and to show how to use it for computational purposes. In particular, we address how to determine colorability of a knot, and prop… ▽ More

    Submitted 25 May, 2015; originally announced May 2015.

    MSC Class: 57M25; 57M27

  24. arXiv:1405.4211  [pdf, other

    cs.LO cs.DM math.GT

    Detecting unknots via equational reasoning, I: Exploration

    Authors: Andrew Fish, Alexei Lisitsa

    Abstract: We explore the application of automated reasoning techniques to unknot detection, a classical problem of computational topology. We adopt a two-pronged experimental approach, using a theorem prover to try to establish a positive result (i.e. that a knot is the unknot), whilst simultaneously using a model finder to try to establish a negative result (i.e. that the knot is not the unknot). The theor… ▽ More

    Submitted 16 May, 2014; originally announced May 2014.

    Comments: To appear in Proceedings of CICM 2014

  25. arXiv:1405.3097  [pdf, ps, other

    cs.DM cs.LO

    Computer-Aided Proof of Erdos Discrepancy Properties

    Authors: Boris Konev, Alexei Lisitsa

    Abstract: In 1930s Paul Erdos conjectured that for any positive integer $C$ in any infinite $\pm 1$ sequence $(x_n)$ there exists a subsequence $x_d, x_{2d}, x_{3d},\dots, x_{kd}$, for some positive integers $k$ and $d$, such that $\mid \sum_{i=1}^k x_{i\cdot d} \mid >C$. The conjecture has been referred to as one of the major open problems in combinatorial number theory and discrepancy theory. For the part… ▽ More

    Submitted 23 May, 2014; v1 submitted 13 May, 2014; originally announced May 2014.

    Comments: Revised and extended journal version of arXiv:1402.2184, http://arxiv.longhoe.net/abs/1402.2184

    ACM Class: F.2.2; I.2.3; G.2.1

  26. arXiv:1402.2184  [pdf, ps, other

    cs.DM math.CO math.NT

    A SAT Attack on the Erdos Discrepancy Conjecture

    Authors: Boris Konev, Alexei Lisitsa

    Abstract: In 1930s Paul Erdos conjectured that for any positive integer C in any infinite +1 -1 sequence (x_n) there exists a subsequence x_d, x_{2d}, ... , x_{kd} for some positive integers k and d, such that |x_d + x_{2d} + ... + x_{kd}|> C. The conjecture has been referred to as one of the major open problems in combinatorial number theory and discrepancy theory. For the particular case of C=1 a human pr… ▽ More

    Submitted 17 February, 2014; v1 submitted 10 February, 2014; originally announced February 2014.

    Comments: 8 pages. The description of the automata is clarified

    ACM Class: F.2.2; I.2.3; G.2.1

  27. arXiv:1310.2431  [pdf, other

    cs.LO cs.MA

    Practical Verification of Decision-Making in Agent-Based Autonomous Systems

    Authors: Louise A. Dennis, Michael Fisher, Nicholas K. Lincoln, Alexei Lisitsa, Sandor M. Veres

    Abstract: We present a verification methodology for analysing the decision-making component in agent-based hybrid systems. Traditionally hybrid automata have been used to both implement and verify such systems, but hybrid automata based modelling, programming and verification techniques scale poorly as the complexity of discrete decision-making increases making them unattractive in situations where complex… ▽ More

    Submitted 9 October, 2013; originally announced October 2013.

    Comments: Submitted to Journal of Automated Software Engineering

    MSC Class: 03B70

  28. arXiv:1209.5407  [pdf, other

    cs.PL cs.FL

    A Note on Program Specialization. What Can Syntactical Properties of Residual Programs Reveal?

    Authors: Alexei Lisitsa, Andrei P. Nemytykh

    Abstract: The paper presents two examples of non-traditional using of program specialization by Turchin's supercompilation method. In both cases we are interested in syntactical properties of residual programs produced by supercompilation. In the first example we apply supercompilation to a program encoding a word equation and as a result we obtain a program representing a graph describing the solution set… ▽ More

    Submitted 24 September, 2012; originally announced September 2012.

  29. arXiv:1107.5142  [pdf, ps, other

    cs.LO

    Finite countermodels for safety verification of parameterized tree systems

    Authors: Alexei Lisitsa

    Abstract: In this paper we deal with verification of safety properties of parameterized systems with a tree topology. The verification problem is translated to a purely logical problem of finding a finite countermodel for a first-order formula, which further resolved by a generic finite model finding procedure. A finite countermodel method is shown is at least as powerful as regular tree model checking and… ▽ More

    Submitted 26 July, 2011; originally announced July 2011.

    Comments: 18 pages

  30. arXiv:1107.0349  [pdf, ps, other

    cs.LO

    First-order finite satisfiability vs tree automata in safety verification

    Authors: Alexei Lisitsa

    Abstract: In this paper we deal with verification of safety properties of term-rewriting systems. The verification problem is translated to a purely logical problem of finding a finite countermodel for a first-order formula, which further resolved by a generic finite model finding procedure. A finite countermodel produced during successful verification provides with a concise description of the system invar… ▽ More

    Submitted 1 July, 2011; originally announced July 2011.

    Comments: 16 pages

  31. arXiv:1011.0447  [pdf, ps, other

    cs.LO

    Finite Model Finding for Parameterized Verification

    Authors: Alexei Lisitsa

    Abstract: In this paper we investigate to which extent a very simple and natural "reachability as deducibility" approach, originated in the research in formal methods in security, is applicable to the automated verification of large classes of infinite state and parameterized systems. The approach is based on modeling the reachability between (parameterized) states as deducibility between suitable encodings… ▽ More

    Submitted 25 November, 2010; v1 submitted 1 November, 2010; originally announced November 2010.

    Comments: 17 pages, slightly different version of the paper is submitted to TACAS 2011

  32. Agent Based Approaches to Engineering Autonomous Space Software

    Authors: Louise A. Dennis, Michael Fisher, Nicholas Lincoln, Alexei Lisitsa, Sandor M. Veres

    Abstract: Current approaches to the engineering of space software such as satellite control systems are based around the development of feedback controllers using packages such as MatLab's Simulink toolbox. These provide powerful tools for engineering real time systems that adapt to changes in the environment but are limited when the controller itself needs to be adapted. We are investigating ways in wh… ▽ More

    Submitted 2 March, 2010; originally announced March 2010.

    Comments: 3 pages, 1 Figure, Formal Methods in Aerospace

    Journal ref: EPTCS 20, 2010, pp. 63-67

  33. arXiv:0907.4180  [pdf, other

    cs.FL cs.CC

    On Descriptional Complexity of the Planarity Problem for Gauss Words

    Authors: Vitaliy Kurlin, Alexei Lisitsa, Igor Potapov, Rafiq Saleh

    Abstract: In this paper we investigate the descriptional complexity of knot theoretic problems and show upper bounds for planarity problem of signed and unsigned knot diagrams represented by Gauss words. Since a topological equivalence of knots can involve knot diagrams with arbitrarily many crossings then Gauss words will be considered as strings over an infinite (unbounded) alphabet. For establishing th… ▽ More

    Submitted 24 July, 2009; originally announced July 2009.

  34. arXiv:0806.2802  [pdf, ps, other

    cs.LO

    A logic with temporally accessible iteration

    Authors: Alexei Lisitsa

    Abstract: Deficiency in expressive power of the first-order logic has led to develo** its numerous extensions by fixed point operators, such as Least Fixed-Point (LFP), inflationary fixed-point (IFP), partial fixed-point (PFP), etc. These logics have been extensively studied in finite model theory, database theory, descriptive complexity. In this paper we introduce unifying framework, the logic with ite… ▽ More

    Submitted 17 June, 2008; originally announced June 2008.

  35. arXiv:cs/0702036  [pdf, ps, other

    cs.LO

    Efficient First-Order Temporal Logic for Infinite-State Systems

    Authors: Clare Dixon, Michael Fisher, Boris Konev, Alexei Lisitsa

    Abstract: In this paper we consider the specification and verification of infinite-state systems using temporal logic. In particular, we describe parameterised systems using a new variety of first-order temporal logic that is both powerful enough for this form of specification and tractable enough for practical deductive verification. Importantly, the power of the temporal language allows us to describe (… ▽ More

    Submitted 6 February, 2007; originally announced February 2007.

    Comments: 16 pages, 2 figures

    ACM Class: F.4.1; F.3.1; D.2.2; D.2.4

  36. arXiv:cs/0410072  [pdf, ps, other

    cs.LO cs.CL

    Temporal logic with predicate abstraction

    Authors: Alexei Lisitsa, Igor Potapov

    Abstract: A predicate linear temporal logic LTL_{λ,=} without quantifiers but with predicate abstraction mechanism and equality is considered. The models of LTL_{λ,=} can be naturally seen as the systems of pebbles (flexible constants) moving over the elements of some (possibly infinite) domain. This allows to use LTL_{λ,=} for the specification of dynamic systems using some resources, such as processes u… ▽ More

    Submitted 27 October, 2004; originally announced October 2004.

    Comments: 14 pages, 4 figures

    ACM Class: F.1.1; F.3.1; F.4.1; F.4.3