Skip to main content

Showing 1–27 of 27 results for author: Lisy, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.09352  [pdf, other

    cs.CR cs.AI

    Counteracting Concept Drift by Learning with Future Malware Predictions

    Authors: Branislav Bosansky, Lada Hospodkova, Michal Najman, Maria Rigaki, Elnaz Babayeva, Viliam Lisy

    Abstract: The accuracy of deployed malware-detection classifiers degrades over time due to changes in data distributions and increasing discrepancies between training and testing data. This phenomenon is known as the concept drift. While the concept drift can be caused by various reasons in general, new malicious files are created by malware authors with a clear intention of avoiding detection. The existenc… ▽ More

    Submitted 14 April, 2024; originally announced April 2024.

  2. arXiv:2312.15220  [pdf, other

    cs.GT

    Look-ahead Search on Top of Policy Networks in Imperfect Information Games

    Authors: Ondrej Kubicek, Neil Burch, Viliam Lisy

    Abstract: Search in test time is often used to improve the performance of reinforcement learning algorithms. Performing theoretically sound search in fully adversarial two-player games with imperfect information is notoriously difficult and requires a complicated training process. We present a method for adding test-time search to an arbitrary policy-gradient algorithm that learns from sampled trajectories.… ▽ More

    Submitted 6 February, 2024; v1 submitted 23 December, 2023; originally announced December 2023.

  3. arXiv:2311.16781  [pdf, other

    cs.AI

    Generation of Games for Opponent Model Differentiation

    Authors: David Milec, Viliam Lisý, Christopher Kiekintveld

    Abstract: Protecting against adversarial attacks is a common multiagent problem. Attackers in the real world are predominantly human actors, and the protection methods often incorporate opponent models to improve the performance when facing humans. Previous results show that modeling human behavior can significantly improve the performance of the algorithms. However, modeling humans correctly is a complex p… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

    Comments: 4 pages

  4. arXiv:2305.17246  [pdf, other

    cs.CR cs.LG

    NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios

    Authors: Jaromír Janisch, Tomáš Pevný, Viliam Lisý

    Abstract: Current frameworks for training offensive penetration testing agents with deep reinforcement learning struggle to produce agents that perform well in real-world scenarios, due to the reality gap in simulation-based frameworks and the lack of scalability in emulation-based frameworks. Additionally, existing frameworks often use an unrealistic metric that measures the agents' performance on the trai… ▽ More

    Submitted 18 August, 2023; v1 submitted 26 May, 2023; originally announced May 2023.

    Comments: NASimEmu is available at https://github.com/jaromiru/NASimEmu and the baseline agents at https://github.com/jaromiru/NASimEmu-agents

  5. arXiv:2209.03188  [pdf, other

    cs.CR cs.AI cs.LG

    Avast-CTU Public CAPE Dataset

    Authors: Branislav Bosansky, Dominik Kouba, Ondrej Manhal, Thorsten Sick, Viliam Lisy, Jakub Kroustek, Petr Somol

    Abstract: There is a limited amount of publicly available data to support research in malware analysis technology. Particularly, there are virtually no publicly available datasets generated from rich sandboxes such as Cuckoo/CAPE. The benefit of using dynamic sandboxes is the realistic simulation of file execution in the target machine and obtaining a log of such execution. The machine can be infected by ma… ▽ More

    Submitted 6 September, 2022; originally announced September 2022.

  6. arXiv:2208.02694  [pdf, ps, other

    stat.ML cs.LG

    Explaining Classifiers Trained on Raw Hierarchical Multiple-Instance Data

    Authors: Tomáš Pevný, Viliam Lisý, Branislav Bošanský, Petr Somol, Michal Pěchouček

    Abstract: Learning from raw data input, thus limiting the need for feature engineering, is a component of many successful applications of machine learning methods in various domains. While many problems naturally translate into a vector representation directly usable in standard classifiers, a number of data sources have the natural form of structured data interchange formats (e.g., security logs in JSON/XM… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

  7. arXiv:2112.12594  [pdf, other

    cs.GT

    Continual Depth-limited Responses for Computing Counter-strategies in Sequential Games

    Authors: David Milec, Ondřej Kubíček, Viliam Lisý

    Abstract: In zero-sum games, the optimal strategy is well-defined by the Nash equilibrium. However, it is overly conservative when playing against suboptimal opponents and it can not exploit their weaknesses. Limited look-ahead game solving in imperfect-information games allows defeating human experts in massive real-world games such as Poker, Liar's Dice, and Scotland Yard. However, since they approximate… ▽ More

    Submitted 3 April, 2024; v1 submitted 23 December, 2021; originally announced December 2021.

    Comments: 16 pages, 15 figures

  8. arXiv:2112.10890  [pdf, other

    cs.GT cs.AI

    Revisiting Game Representations: The Hidden Costs of Efficiency in Sequential Decision-making Algorithms

    Authors: Vojtěch Kovařík, David Milec, Michal Šustr, Dominik Seitz, Viliam Lisý

    Abstract: Recent advancements in algorithms for sequential decision-making under imperfect information have shown remarkable success in large games such as limit- and no-limit poker. These algorithms traditionally formalize the games using the extensive-form game formalism, which, as we show, while theoretically sound, is memory-inefficient and computationally intensive in practice. To mitigate these challe… ▽ More

    Submitted 5 December, 2023; v1 submitted 20 December, 2021; originally announced December 2021.

  9. arXiv:2110.11987  [pdf, other

    cs.LG cs.CR

    Improving Robustness of Malware Classifiers using Adversarial Strings Generated from Perturbed Latent Representations

    Authors: Marek Galovic, Branislav Bosansky, Viliam Lisy

    Abstract: In malware behavioral analysis, the list of accessed and created files very often indicates whether the examined file is malicious or benign. However, malware authors are trying to avoid detection by generating random filenames and/or modifying used filenames with new versions of the malware. These changes represent real-world adversarial examples. The goal of this work is to generate realistic ad… ▽ More

    Submitted 22 October, 2021; originally announced October 2021.

    Comments: 35th Conference on Neural Information Processing Systems (NeurIPS 2021), Strategic ML Workshop

  10. arXiv:2105.09107  [pdf, ps, other

    stat.ML cs.LG cs.MS

    Mill.jl and JsonGrinder.jl: automated differentiable feature extraction for learning from raw JSON data

    Authors: Simon Mandlik, Matej Racinsky, Viliam Lisy, Tomas Pevny

    Abstract: Learning from raw data input, thus limiting the need for manual feature engineering, is one of the key components of many successful applications of machine learning methods. While machine learning problems are often formulated on data that naturally translate into a vector representation suitable for classifiers, there are data sources, for example in cybersecurity, that are naturally represented… ▽ More

    Submitted 19 May, 2021; originally announced May 2021.

    Comments: 5 pages, 2 figures, 1 table, submitted to section on one-source software of Journal of Machine Learning Research

  11. arXiv:2103.00187  [pdf, other

    cs.AI

    Multi-agent Reinforcement Learning in OpenSpiel: A Reproduction Report

    Authors: Michael Walton, Viliam Lisy

    Abstract: In this report, we present results reproductions for several core algorithms implemented in the OpenSpiel framework for learning in games. The primary contribution of this work is a validation of OpenSpiel's re-implemented search and Reinforcement Learning algorithms against the results reported in their respective originating works. Additionally, we provide complete documentation of hyperparamete… ▽ More

    Submitted 1 March, 2021; v1 submitted 27 February, 2021; originally announced March 2021.

  12. arXiv:2009.14521  [pdf, other

    cs.AI

    Complexity and Algorithms for Exploiting Quantal Opponents in Large Two-Player Games

    Authors: David Milec, Jakub Černý, Viliam Lisý, Bo An

    Abstract: Solution concepts of traditional game theory assume entirely rational players; therefore, their ability to exploit subrational opponents is limited. One type of subrationality that describes human behavior well is the quantal response. While there exist algorithms for computing solutions against quantal opponents, they either do not scale or may provide strategies that are even worse than the enti… ▽ More

    Submitted 16 December, 2020; v1 submitted 30 September, 2020; originally announced September 2020.

    Comments: 15 pages, 11 figures, submitted to AAAI 2021

    Journal ref: Proceedings of the AAAI Conference on Artificial Intelligence, 35(6), 5575-5583 (2021)

  13. arXiv:2009.12462  [pdf, other

    cs.LG cs.AI

    Symbolic Relational Deep Reinforcement Learning based on Graph Neural Networks and Autoregressive Policy Decomposition

    Authors: Jaromír Janisch, Tomáš Pevný, Viliam Lisý

    Abstract: We focus on reinforcement learning (RL) in relational problems that are naturally defined in terms of objects, their relations, and object-centric actions. These problems are characterized by variable state and action spaces, and finding a fixed-length representation, required by most existing RL methods, is difficult, if not impossible. We present a deep RL framework based on graph neural network… ▽ More

    Submitted 25 August, 2023; v1 submitted 25 September, 2020; originally announced September 2020.

    Comments: code available at https://github.com/jaromiru/sr-drl

  14. arXiv:2004.10638  [pdf

    cs.LG cs.AI stat.ML

    Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection

    Authors: Olga Petrova, Karel Durkota, Galina Alperovich, Karel Horak, Michal Najman, Branislav Bosansky, Viliam Lisy

    Abstract: Anomaly detection is a method for discovering unusual and suspicious behavior. In many real-world scenarios, the examined events can be directly linked to the actions of an adversary, such as attacks on computer networks or frauds in financial operations. While the defender wants to discover such malicious behavior, the attacker seeks to accomplish their goal (e.g., exfiltrating data) while avoidi… ▽ More

    Submitted 22 April, 2020; originally announced April 2020.

    Comments: 9 pages, 3 figures, 3 tables. Extended Abstract of this paper is accepted to AAMAS 2020

    MSC Class: 91A80 (Primary); 68T99 (Secondary) ACM Class: I.2.6; G.3

  15. arXiv:1911.08756  [pdf, other

    cs.LG cs.AI stat.ML

    Classification with Costly Features in Hierarchical Deep Sets

    Authors: Jaromír Janisch, Tomáš Pevný, Viliam Lisý

    Abstract: Classification with Costly Features (CwCF) is a classification problem that includes the cost of features in the optimization criteria. Individually for each sample, its features are sequentially acquired to maximize accuracy while minimizing the acquired features' cost. However, existing approaches can only process data that can be expressed as vectors of fixed length. In real life, the data ofte… ▽ More

    Submitted 29 February, 2024; v1 submitted 20 November, 2019; originally announced November 2019.

    Comments: formerly Hierarchical Multiple-Instance Data Classification with Costly Features; RL4RealLife @ ICML2021; code available at https://github.com/jaromiru/rcwcf

  16. arXiv:1909.02564  [pdf, other

    cs.LG cs.AI stat.ML

    Classification with Costly Features as a Sequential Decision-Making Problem

    Authors: Jaromír Janisch, Tomáš Pevný, Viliam Lisý

    Abstract: This work focuses on a specific classification problem, where the information about a sample is not readily available, but has to be acquired for a cost, and there is a per-sample budget. Inspired by real-world use-cases, we analyze average and hard variations of a directly specified budget. We postulate the problem in its explicit formulation and then convert it into an equivalent MDP, that can b… ▽ More

    Submitted 5 September, 2019; originally announced September 2019.

    Journal ref: Machine Learning (2020): 1-29

  17. arXiv:1906.11110  [pdf, other

    cs.AI cs.GT

    Rethinking Formal Models of Partially Observable Multiagent Decision Making

    Authors: Vojtěch Kovařík, Martin Schmid, Neil Burch, Michael Bowling, Viliam Lisý

    Abstract: Multiagent decision-making in partially observable environments is usually modelled as either an extensive-form game (EFG) in game theory or a partially observable stochastic game (POSG) in multiagent reinforcement learning (MARL). One issue with the current situation is that while most practical problems can be modelled in both formalisms, the relationship of the two models is unclear, which hind… ▽ More

    Submitted 28 September, 2021; v1 submitted 26 June, 2019; originally announced June 2019.

    Comments: A 2020 update of the original 2019 version of the paper. (Rewrote the main text and clarified the relationship between FOSGs/POSGs and EFGs. Some of the technical results are now presented in the appendix.)

  18. arXiv:1906.06412  [pdf, other

    cs.AI cs.GT

    Value Functions for Depth-Limited Solving in Zero-Sum Imperfect-Information Games

    Authors: Vojtěch Kovařík, Dominik Seitz, Viliam Lisý, Jan Rudolf, Shuo Sun, Karel Ha

    Abstract: We provide a formal definition of depth-limited games together with an accessible and rigorous explanation of the underlying concepts, both of which were previously missing in imperfect-information games. The definition works for an arbitrary extensive-form game and is not tied to any specific game-solving algorithm. Moreover, this framework unifies and significantly extends three approaches to de… ▽ More

    Submitted 24 March, 2022; v1 submitted 31 May, 2019; originally announced June 2019.

    Comments: The first two authors contributed equally

  19. arXiv:1906.06291  [pdf, ps, other

    cs.GT

    Problems with the EFG formalism: a solution attempt using observations

    Authors: Vojtěch Kovařík, Viliam Lisý

    Abstract: We argue that the extensive-form game (EFG) model isn't powerful enough to express all important aspects of imperfect information games, such as those related to decomposition and online game solving. We present a principled attempt to fix the formalism by considering information partitions that correspond to observations. We show that EFGs cannot be "fixed" without additional knowledge about the… ▽ More

    Submitted 14 June, 2019; originally announced June 2019.

  20. arXiv:1812.07351  [pdf, other

    cs.GT

    Monte Carlo Continual Resolving for Online Strategy Computation in Imperfect Information Games

    Authors: Michal Sustr, Vojtech Kovarik, Viliam Lisy

    Abstract: Online game playing algorithms produce high-quality strategies with a fraction of memory and computation required by their offline alternatives. Continual Resolving (CR) is a recent theoretically sound approach to online game playing that has been used to outperform human professionals in poker. However, parts of the algorithm were specific to poker, which enjoys many properties not shared by othe… ▽ More

    Submitted 8 March, 2019; v1 submitted 18 December, 2018; originally announced December 2018.

  21. arXiv:1804.09045  [pdf, other

    cs.GT

    Analysis of Hannan Consistent Selection for Monte Carlo Tree Search in Simultaneous Move Games

    Authors: Vojtěch Kovařík, Viliam Lisý

    Abstract: Hannan consistency, or no external regret, is a~key concept for learning in games. An action selection algorithm is Hannan consistent (HC) if its performance is eventually as good as selecting the~best fixed action in hindsight. If both players in a~zero-sum normal form game use a~Hannan consistent algorithm, their average behavior converges to a~Nash equilibrium (NE) of the~game. A similar result… ▽ More

    Submitted 7 July, 2019; v1 submitted 23 April, 2018; originally announced April 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1509.00149

  22. Automated Construction of Bounded-Loss Imperfect-Recall Abstractions in Extensive-Form Games

    Authors: Jiri Cermak, Viliam Lisy, Branislav Bosansky

    Abstract: Extensive-form games (EFGs) model finite sequential interactions between players. The amount of memory required to represent these games is the main bottleneck of algorithms for computing optimal strategies and the size of these strategies is often impractical for real-world applications. A common approach to tackle the memory bottleneck is to use information abstraction that removes parts of info… ▽ More

    Submitted 15 April, 2020; v1 submitted 14 March, 2018; originally announced March 2018.

    Journal ref: Cermak, Jiri, Viliam Lisy, and Branislav Bosansky. "Automated construction of bounded-loss imperfect-recall abstractions in extensive-form games." Artificial Intelligence 282 (2020): 103248

  23. arXiv:1711.07364  [pdf, other

    cs.AI cs.LG stat.ML

    Classification with Costly Features using Deep Reinforcement Learning

    Authors: Jaromír Janisch, Tomáš Pevný, Viliam Lisý

    Abstract: We study a classification problem where each feature can be acquired for a cost and the goal is to optimize a trade-off between the expected classification error and the feature cost. We revisit a former approach that has framed the problem as a sequential decision-making problem and solved it by Q-learning with a linear approximation, where individual actions are either requests for feature value… ▽ More

    Submitted 12 November, 2018; v1 submitted 20 November, 2017; originally announced November 2017.

    Comments: AAAI 2019

  24. DeepStack: Expert-Level Artificial Intelligence in No-Limit Poker

    Authors: Matej Moravčík, Martin Schmid, Neil Burch, Viliam Lisý, Dustin Morrill, Nolan Bard, Trevor Davis, Kevin Waugh, Michael Johanson, Michael Bowling

    Abstract: Artificial intelligence has seen several breakthroughs in recent years, with games often serving as milestones. A common feature of these games is that players have perfect information. Poker is the quintessential game of imperfect information, and a longstanding challenge problem in artificial intelligence. We introduce DeepStack, an algorithm for imperfect information settings. It combines recur… ▽ More

    Submitted 3 March, 2017; v1 submitted 6 January, 2017; originally announced January 2017.

  25. arXiv:1612.07547  [pdf, ps, other

    cs.GT

    Equilibrium Approximation Quality of Current No-Limit Poker Bots

    Authors: Viliam Lisy, Michael Bowling

    Abstract: Approximating a Nash equilibrium is currently the best performing approach for creating poker-playing programs. While for the simplest variants of the game, it is possible to evaluate the quality of the approximation by computing the value of the best response strategy, this is currently not computationally feasible for larger variants of the game, such as heads-up no-limit Texas hold'em. In this… ▽ More

    Submitted 8 January, 2017; v1 submitted 22 December, 2016; originally announced December 2016.

    Comments: To appear at AAAI-17 Workshop on Computer Poker and Imperfect Information Games

  26. arXiv:1509.00149  [pdf, other

    cs.GT

    Analysis of Hannan Consistent Selection for Monte Carlo Tree Search in Simultaneous Move Games

    Authors: Vojtěch Kovařík, Viliam Lisý

    Abstract: Monte Carlo Tree Search (MCTS) has recently been successfully used to create strategies for playing imperfect-information games. Despite its popularity, there are no theoretic results that guarantee its convergence to a well-defined solution, such as Nash equilibrium, in these games. We partially fill this gap by analysing MCTS in the class of zero-sum extensive-form games with simultaneous moves… ▽ More

    Submitted 1 September, 2015; originally announced September 2015.

  27. arXiv:1310.8613  [pdf, other

    cs.GT

    Convergence of Monte Carlo Tree Search in Simultaneous Move Games

    Authors: Viliam Lisý, Vojtěch Kovařík, Marc Lanctot, Branislav Bošanský

    Abstract: We study Monte Carlo tree search (MCTS) in zero-sum extensive-form games with perfect information and simultaneous moves. We present a general template of MCTS algorithms for these games, which can be instantiated by various selection methods. We formally prove that if a selection method is $ε$-Hannan consistent in a matrix game and satisfies additional requirements on exploration, then the MCTS a… ▽ More

    Submitted 5 November, 2013; v1 submitted 31 October, 2013; originally announced October 2013.

    Comments: NIPS 2013 paper including appendix

    Journal ref: Advances in Neural Information Processing Systems 26, pp 2112-2120, 2013