Skip to main content

Showing 1–13 of 13 results for author: Moothedath, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.11565  [pdf, other

    cs.LG stat.ML

    Thompson Sampling for Stochastic Bandits with Noisy Contexts: An Information-Theoretic Regret Analysis

    Authors: Sharu Theresa Jose, Shana Moothedath

    Abstract: We explore a stochastic contextual linear bandit problem where the agent observes a noisy, corrupted version of the true context through a noise channel with an unknown noise parameter. Our objective is to design an action policy that can approximate" that of an oracle, which has access to the reward model, the channel parameter, and the predictive distribution of the true context from the observe… ▽ More

    Submitted 22 March, 2024; v1 submitted 21 January, 2024; originally announced January 2024.

  2. arXiv:2401.11563  [pdf, other

    cs.LG cs.MA

    Distributed Multi-Task Learning for Stochastic Bandits with Context Distribution and Stage-wise Constraints

    Authors: Jiabin Lin, Shana Moothedath

    Abstract: We present the problem of conservative distributed multi-task learning in stochastic linear contextual bandits with heterogeneous agents. This extends conservative linear bandits to a distributed setting where M agents tackle different but related tasks while adhering to stage-wise performance constraints. The exact context is unknown, and only a context distribution is available to the agents as… ▽ More

    Submitted 9 April, 2024; v1 submitted 21 January, 2024; originally announced January 2024.

  3. arXiv:2303.17043  [pdf, other

    cs.LG stat.ML

    Federated Learning for Heterogeneous Bandits with Unobserved Contexts

    Authors: Jiabin Lin, Shana Moothedath

    Abstract: We study the problem of federated stochastic multi-arm contextual bandits with unknown contexts, in which M agents are faced with different bandits and collaborate to learn. The communication model consists of a central server and the agents share their estimates with the central server periodically to learn to choose optimal actions in order to minimize the total regret. We assume that the exact… ▽ More

    Submitted 29 January, 2024; v1 submitted 29 March, 2023; originally announced March 2023.

  4. arXiv:2207.14391  [pdf, other

    cs.LG

    Distributed Stochastic Bandit Learning with Delayed Context Observation

    Authors: Jiabin Lin, Shana Moothedath

    Abstract: We consider the problem where M agents collaboratively interact with an instance of a stochastic K-armed contextual bandit, where K>>M. The goal of the agents is to simultaneously minimize the cumulative regret over all the agents over a time horizon T. We consider a setting where the exact context is observed after a delay and at the time of choosing the action the agents are unaware of the conte… ▽ More

    Submitted 15 November, 2022; v1 submitted 28 July, 2022; originally announced July 2022.

  5. arXiv:2204.08117  [pdf, other

    cs.IT

    Fast Decentralized Federated Low Rank Matrix Recovery from Column-wise Linear Projections

    Authors: Shana Moothedath, Namrata Vaswani

    Abstract: This work develops a provably accurate fully-decentralized alternating projected gradient descent (GD) algorithm for recovering a low rank (LR) matrix from mutually independent projections of each of its columns, in a fast and communication-efficient fashion. To our best knowledge, this work is the first attempt to develop a provably correct decentralized algorithm (i) for any problem involving th… ▽ More

    Submitted 11 February, 2024; v1 submitted 17 April, 2022; originally announced April 2022.

  6. arXiv:2203.15629  [pdf, other

    cs.LG

    Stochastic Conservative Contextual Linear Bandits

    Authors: Jiabin Lin, Xian Yeow Lee, Talukder Jubery, Shana Moothedath, Soumik Sarkar, Baskar Ganapathysubramanian

    Abstract: Many physical systems have underlying safety considerations that require that the strategy deployed ensures the satisfaction of a set of constraints. Further, often we have only partial information on the state of the system. We study the problem of safe real-time decision making under uncertainty. In this paper, we formulate a conservative stochastic contextual bandit formulation for real-time de… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

  7. arXiv:2112.13412  [pdf, other

    cs.DS

    Fully Decentralized and Federated Low Rank Compressive Sensing

    Authors: Shana Moothedath, Namrata Vaswani

    Abstract: In this work we develop a fully decentralized, federated, and fast solution to the recently studied Low Rank Compressive Sensing (LRCS) problem: recover an nxq low-rank matrix from column-wise linear projections. An important application where this problem occurs, and a decentralized solution is desirable is in federated sketching: efficiently compressing the vast amounts of distributed images/vid… ▽ More

    Submitted 26 December, 2021; originally announced December 2021.

  8. arXiv:2007.12327  [pdf, other

    cs.GT cs.CR

    Stochastic Dynamic Information Flow Tracking Game using Supervised Learning for Detecting Advanced Persistent Threats

    Authors: Shana Moothedath, Dinuka Sahabandu, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran

    Abstract: Advanced persistent threats (APTs) are organized prolonged cyberattacks by sophisticated attackers. Although APT activities are stealthy, they interact with the system components and these interactions lead to information flows. Dynamic Information Flow Tracking (DIFT) has been proposed as one of the effective ways to detect APTs using the information flows. However, wide range security analysis u… ▽ More

    Submitted 25 June, 2021; v1 submitted 23 July, 2020; originally announced July 2020.

  9. arXiv:2007.00076  [pdf, other

    math.OC cs.GT

    A Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Detecting Advanced Persistent Threats

    Authors: Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran

    Abstract: Advanced Persistent Threats (APTs) are stealthy attacks that threaten the security and privacy of sensitive information. Interactions of APTs with victim system introduce information flows that are recorded in the system logs. Dynamic Information Flow Tracking (DIFT) is a promising detection mechanism for detecting APTs. DIFT taints information flows originating at system entities that are suscept… ▽ More

    Submitted 28 June, 2021; v1 submitted 30 June, 2020; originally announced July 2020.

    Comments: 15

  10. arXiv:2006.12327  [pdf, other

    cs.GT

    Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach

    Authors: Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran

    Abstract: Advanced Persistent Threats (APTs) are stealthy customized attacks by intelligent adversaries. This paper deals with the detection of APTs that infiltrate cyber systems and compromise specifically targeted data and/or infrastructures. Dynamic information flow tracking is an information trace-based detection mechanism against APTs that taints suspicious information flows in the system and generates… ▽ More

    Submitted 25 June, 2021; v1 submitted 22 June, 2020; originally announced June 2020.

  11. arXiv:1811.05622  [pdf, other

    cs.GT

    A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats

    Authors: Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran

    Abstract: Advanced Persistent Threats (APTs) infiltrate cyber systems and compromise specifically targeted data and/or resources through a sequence of stealthy attacks consisting of multiple stages. Dynamic information flow tracking has been proposed to detect APTs. In this paper, we develop a dynamic information flow tracking game for resource-efficient detection of APTs via multi-stage dynamic games. The… ▽ More

    Submitted 13 November, 2018; originally announced November 2018.

    Comments: 16

  12. arXiv:1710.10037  [pdf, other

    cs.DM

    Rapidly Mixing Markov Chain Monte Carlo Technique for Matching Problems with Global Utility Function

    Authors: Shana Moothedath, Prasanna Chaporkar, Madhu N. Belur

    Abstract: This paper deals with a complete bipartite matching problem with the objective of finding an optimal matching that maximizes a certain generic predefined utility function on the set of all matchings. After proving the NP-hardness of the problem using reduction from the 3-SAT problem, we propose a randomized algorithm based on Markov Chain Monte Carlo (MCMC) technique for solving this. We sample fr… ▽ More

    Submitted 27 October, 2017; originally announced October 2017.

  13. arXiv:1705.09600  [pdf, ps, other

    math.OC cs.DS

    Approximating Constrained Minimum Cost Input-Output Selection for Generic Arbitrary Pole Placement in Structured Systems

    Authors: Shana Moothedath, Prasanna Chaporkar, Madhu N. Belur

    Abstract: This paper is about minimum cost constrained selection of inputs and outputs for generic arbitrary pole placement. The input-output set is constrained in the sense that the set of states that each input can influence and the set of states that each output can sense is pre-specified. Our goal is to optimally select an input-output set that the system has no structurally fixed modes. Polynomial algo… ▽ More

    Submitted 9 January, 2018; v1 submitted 26 May, 2017; originally announced May 2017.

    Comments: 11 pages, 2 figures