Skip to main content

Showing 1–16 of 16 results for author: Wetzel, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.04978  [pdf, other

    cs.LG cs.AI

    Closed-Form Interpretation of Neural Network Classifiers with Symbolic Regression Gradients

    Authors: Sebastian Johann Wetzel

    Abstract: I introduce a unified framework for interpreting neural network classifiers tailored toward automated scientific discovery. In contrast to neural network-based regression, for classification, it is in general impossible to find a one-to-one map** from the neural network to a symbolic equation even if the neural network itself bases its classification on a quantity that can be written as a closed… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

  2. arXiv:2310.00664  [pdf, other

    cs.LG

    Twin Neural Network Improved k-Nearest Neighbor Regression

    Authors: Sebastian J. Wetzel

    Abstract: Twin neural network regression is trained to predict differences between regression targets rather than the targets themselves. A solution to the original regression problem can be obtained by ensembling predicted differences between the targets of an unknown data point and multiple known anchor data points. Choosing the anchors to be the nearest neighbors of the unknown data point leads to a neur… ▽ More

    Submitted 1 October, 2023; originally announced October 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2301.01383

  3. arXiv:2302.13880  [pdf, other

    cs.CR

    Efficient Privacy-Preserving Approximation of the Kidney Exchange Problem

    Authors: Malte Breuer, Ulrike Meyer, Susanne Wetzel

    Abstract: The kidney exchange problem (KEP) seeks to find possible exchanges among pairs of patients and their incompatible kidney donors while meeting specific optimization criteria such as maximizing the overall number of possible transplants. Recently, several privacy-preserving protocols for solving the KEP have been proposed. However, the protocols known to date lack scalability in practice since the K… ▽ More

    Submitted 1 February, 2024; v1 submitted 27 February, 2023; originally announced February 2023.

    Comments: Accepted at ACM Asia Conference on Computer and Communications Security (ASIA CCS 2024)

  4. arXiv:2301.01383  [pdf, other

    cs.LG stat.ME

    How to get the most out of Twinned Regression Methods

    Authors: Sebastian J. Wetzel

    Abstract: Twinned regression methods are designed to solve the dual problem to the original regression problem, predicting differences between regression targets rather then the targets themselves. A solution to the original regression problem can be obtained by ensembling predicted differences between the targets of an unknown data point and multiple known anchor data points. We explore different aspects o… ▽ More

    Submitted 3 January, 2023; originally announced January 2023.

  5. arXiv:2208.11319  [pdf, other

    cs.CR

    Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming (Updated and Extended Version)

    Authors: Malte Breuer, Pascal Hein, Leonardo Pompe, Ben Temme, Ulrike Meyer, Susanne Wetzel

    Abstract: The kidney exchange problem (KEP) is to find a constellation of exchanges that maximizes the number of transplants that can be carried out for a set of pairs of patients with kidney disease and their incompatible donors. Recently, this problem has been tackled from a privacy perspective in order to protect the sensitive medical data of patients and donors and to decrease the potential for manipula… ▽ More

    Submitted 23 October, 2023; v1 submitted 24 August, 2022; originally announced August 2022.

    Comments: This is the updated and extended version of the work published in 19th Annual International Conference on Privacy, Security and Trust (PST2022), August 22-24, 2022, Fredericton, Canada / Virtual Conference, https://doi.org/10.1109/PST55820.2022.9851968

  6. arXiv:2205.04051  [pdf, other

    physics.comp-ph cond-mat.quant-gas cs.LG quant-ph

    Unsupervised Learning of Rydberg Atom Array Phase Diagram with Siamese Neural Networks

    Authors: Zakaria Patel, Ejaaz Merali, Sebastian J. Wetzel

    Abstract: We introduce an unsupervised machine learning method based on Siamese Neural Networks (SNN) to detect phase boundaries. This method is applied to Monte-Carlo simulations of Ising-type systems and Rydberg atom arrays. In both cases the SNN reveals phase boundaries consistent with prior research. The combination of leveraging the power of feed-forward neural networks, unsupervised learning and the a… ▽ More

    Submitted 19 May, 2022; v1 submitted 9 May, 2022; originally announced May 2022.

  7. Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange

    Authors: Malte Breuer, Ulrike Meyer, Susanne Wetzel

    Abstract: To this day, there are still some countries where the exchange of kidneys between multiple incompatible patient-donor pairs is restricted by law. Typically, legal regulations in this context are put in place to prohibit coercion and manipulation in order to prevent a market for organ trade. Yet, in countries where kidney exchange is practiced, existing platforms to facilitate such exchanges genera… ▽ More

    Submitted 2 June, 2022; v1 submitted 17 January, 2022; originally announced January 2022.

    Comments: This is the extended version of the paper that appeared in the 12th ACM Conference on Data and Application Security and Privacy (CODASPY'22), April 24-26, 2022, Baltimore-Washington DC Area, United States, https://doi.org/10.1145/3508398.3511509

    Journal ref: 12th ACM Conference on Data and Application Security and Privacy 2022 (CODASPY'22)

  8. arXiv:2111.02269  [pdf, other

    cs.CR

    Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice (Extended Version)

    Authors: Malte Breuer, Ulrike Meyer, Susanne Wetzel

    Abstract: Secure Multi-Party Computation (SMPC) allows a set of parties to securely compute a functionality in a distributed fashion without the need for any trusted external party. Usually, it is assumed that the parties know each other and have already established authenticated channels among each other. However, in practice the parties sometimes must stay anonymous. In this paper, we conceptualize a fram… ▽ More

    Submitted 19 January, 2023; v1 submitted 3 November, 2021; originally announced November 2021.

    Comments: This is the extended version of the paper that appeared in the 18th International Conference on Privacy, Security and Trust (PST 2021) (DOI: 10.1109/PST52912.2021.9647793)

  9. Twin Neural Network Regression is a Semi-Supervised Regression Algorithm

    Authors: Sebastian J. Wetzel, Roger G. Melko, Isaac Tamblyn

    Abstract: Twin neural network regression (TNNR) is a semi-supervised regression algorithm, it can be trained on unlabelled data points as long as other, labelled anchor data points, are present. TNNR is trained to predict differences between the target values of two different data points rather than the targets themselves. By ensembling predicted differences between the targets of an unseen data point and a… ▽ More

    Submitted 10 June, 2021; originally announced June 2021.

  10. arXiv:2012.14873  [pdf, other

    cs.LG stat.ML

    Twin Neural Network Regression

    Authors: Sebastian J. Wetzel, Kevin Ryczko, Roger G. Melko, Isaac Tamblyn

    Abstract: We introduce twin neural network (TNN) regression. This method predicts differences between the target values of two different data points rather than the targets themselves. The solution of a traditional regression problem is then obtained by averaging over an ensemble of all predicted differences between the targets of an unseen data point and all training data points. Whereas ensembles are norm… ▽ More

    Submitted 29 December, 2020; originally announced December 2020.

  11. arXiv:2010.11328  [pdf, other

    cs.NE cs.AI cs.LG cs.SC

    Logic Guided Genetic Algorithms

    Authors: Dhananjay Ashok, Joseph Scott, Sebastian Wetzel, Maysum Panju, Vijay Ganesh

    Abstract: We present a novel Auxiliary Truth enhanced Genetic Algorithm (GA) that uses logical or mathematical constraints as a means of data augmentation as well as to compute loss (in conjunction with the traditional MSE), with the aim of increasing both data efficiency and accuracy of symbolic regression (SR) algorithms. Our method, logic-guided genetic algorithm (LGGA), takes as input a set of labelled… ▽ More

    Submitted 21 October, 2020; originally announced October 2020.

  12. A Privacy-Preserving Protocol for the Kidney Exchange Problem

    Authors: Malte Breuer, Ulrike Meyer, Susanne Wetzel, Anja Mühlfeld

    Abstract: Kidney donations from living donors form an attractive alternative to long waiting times on a list for a post-mortem donation. However, even if a living donor for a given patient is found, the donor's kidney might not meet the patient's medical requirements. If several patients are in this position, they may be able to exchange donors in a cyclic fashion. Current algorithmic approaches for determi… ▽ More

    Submitted 23 September, 2020; originally announced September 2020.

    Journal ref: Proceedings of the 19th Workshop on Privacy in the Electronic Society (WPES 2020)

  13. arXiv:2003.04299  [pdf, other

    physics.comp-ph cond-mat.dis-nn cs.LG

    Discovering Symmetry Invariants and Conserved Quantities by Interpreting Siamese Neural Networks

    Authors: Sebastian J. Wetzel, Roger G. Melko, Joseph Scott, Maysum Panju, Vijay Ganesh

    Abstract: In this paper, we introduce interpretable Siamese Neural Networks (SNN) for similarity detection to the field of theoretical physics. More precisely, we apply SNNs to events in special relativity, the transformation of electromagnetic fields, and the motion of particles in a central potential. In these examples, the SNNs learn to identify datapoints belonging to the same events, field configuratio… ▽ More

    Submitted 25 August, 2020; v1 submitted 9 March, 2020; originally announced March 2020.

    Journal ref: Phys. Rev. Research 2, 033499 (2020)

  14. arXiv:1905.04305  [pdf, other

    physics.comp-ph cs.LG hep-lat hep-ph

    Spectral Reconstruction with Deep Neural Networks

    Authors: Lukas Kades, Jan M. Pawlowski, Alexander Rothkopf, Manuel Scherzer, Julian M. Urban, Sebastian J. Wetzel, Nicolas Wink, Felix P. G. Ziegler

    Abstract: We explore artificial neural networks as a tool for the reconstruction of spectral functions from imaginary time Green's functions, a classic ill-conditioned inverse problem. Our ansatz is based on a supervised learning framework in which prior knowledge is encoded in the training data and the inverse transformation manifold is explicitly parametrised through a neural network. We systematically in… ▽ More

    Submitted 1 February, 2021; v1 submitted 10 May, 2019; originally announced May 2019.

    Comments: 20 pages, 16 figures

    Journal ref: Phys. Rev. D 102, 096001 (2020)

  15. arXiv:1703.08859  [pdf, ps, other

    cs.CY cs.CR

    The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research

    Authors: Alan Sherman, M. Dark, A. Chan, R. Chong, T. Morris, L. Oliva, J. Springer, B. Thuraisingham, C. Vatcher, R. Verma, S. Wetzel

    Abstract: Since fall 2012, several National Centers of Academic Excellence in Cyber Defense Research (CAE-Rs) fielded a collaborative course to engage students in solving applied cybersecurity research problems. We describe our experiences with this Information Security Research and Education (INSuRE) research collaborative. We explain how we conducted our project-based research course, give examples of stu… ▽ More

    Submitted 26 March, 2017; originally announced March 2017.

    Comments: A shorter version of this paper has been submitted to IEEE Security and Privacy

  16. arXiv:1703.02435  [pdf, other

    cond-mat.stat-mech cs.LG stat.ML

    Unsupervised learning of phase transitions: from principal component analysis to variational autoencoders

    Authors: Sebastian Johann Wetzel

    Abstract: We employ unsupervised machine learning techniques to learn latent parameters which best describe states of the two-dimensional Ising model and the three-dimensional XY model. These methods range from principal component analysis to artificial neural network based variational autoencoders. The states are sampled using a Monte-Carlo simulation above and below the critical temperature. We find that… ▽ More

    Submitted 12 March, 2017; v1 submitted 7 March, 2017; originally announced March 2017.

    Comments: corrected typos

    Journal ref: Phys. Rev. E 96, 022140 (2017)