Skip to main content

Showing 1–7 of 7 results for author: Wojnowicz, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.14973  [pdf, other

    stat.ML cs.LG

    Discovering group dynamics in synchronous time series via hierarchical recurrent switching-state models

    Authors: Michael Wojnowicz, Preetish Rath, Eric Miller, Jeffrey Miller, Clifford Hancock, Meghan O'Donovan, Seth Elkin-Frankston, Thaddeus Brunye, Michael C. Hughes

    Abstract: We seek to model a collection of time series arising from multiple entities interacting over the same time period. Recent work focused on modeling individual time series is inadequate for our intended applications, where collective system-level behavior influences the trajectories of individual entities. To address such problems, we present a new hierarchical switching-state model that can be trai… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

  2. arXiv:2206.00093  [pdf, other

    stat.ML cs.LG stat.CO

    Easy Variational Inference for Categorical Models via an Independent Binary Approximation

    Authors: Michael T. Wojnowicz, Shuchin Aeron, Eric L. Miller, Michael C. Hughes

    Abstract: We pursue tractable Bayesian analysis of generalized linear models (GLMs) for categorical data. Thus far, GLMs are difficult to scale to more than a few dozen categories due to non-conjugacy or strong posterior dependencies when using conjugate auxiliary variable methods. We define a new class of GLMs for categorical data called categorical-from-binary (CB) models. Each CB model has a likelihood t… ▽ More

    Submitted 31 May, 2022; originally announced June 2022.

    Comments: to appear at ICML 2022

  3. arXiv:1903.02013  [pdf, other

    cs.LG stat.ML

    PROPS: Probabilistic personalization of black-box sequence models

    Authors: Michael Thomas Wojnowicz, Xuan Zhao

    Abstract: We present PROPS, a lightweight transfer learning mechanism for sequential data. PROPS learns probabilistic perturbations around the predictions of one or more arbitrarily complex, pre-trained black box models (such as recurrent neural networks). The technique pins the black-box prediction functions to "source nodes" of a hidden Markov model (HMM), and uses the remaining nodes as "perturbation nod… ▽ More

    Submitted 5 March, 2019; originally announced March 2019.

    Journal ref: 2018 IEEE International Conference on Big Data (Big Data), 4768-4774

  4. arXiv:1901.00630  [pdf, other

    stat.ML cs.LG

    Projecting "better than randomly": How to reduce the dimensionality of very large datasets in a way that outperforms random projections

    Authors: Michael Wojnowicz, Di Zhang, Glenn Chisholm, Xuan Zhao, Matt Wolff

    Abstract: For very large datasets, random projections (RP) have become the tool of choice for dimensionality reduction. This is due to the computational complexity of principal component analysis. However, the recent development of randomized principal component analysis (RPCA) has opened up the possibility of obtaining approximate principal components on very large datasets. In this paper, we compare the p… ▽ More

    Submitted 3 January, 2019; originally announced January 2019.

    Comments: Originally published in IEEE DSAA in 2016; this post-print fixes a rendering error of the += operator in Algorithm 3

    Journal ref: 2016 IEEE 3rd International Conference on Data Science and Advanced Analytics (DSAA) (pp. 184-193). IEEE

  5. arXiv:1802.04466  [pdf, other

    cs.CR stat.AP

    Towards Generic Deobfuscation of Windows API Calls

    Authors: Vadim Kotov, Michael Wojnowicz

    Abstract: A common way to get insight into a malicious program's functionality is to look at which API functions it calls. To complicate the reverse engineering of their programs, malware authors deploy API obfuscation techniques, hiding them from analysts' eyes and anti-malware scanners. This problem can be partially addressed by using dynamic analysis; that is, by executing a malware sample in a controlle… ▽ More

    Submitted 5 December, 2020; v1 submitted 13 February, 2018; originally announced February 2018.

    Comments: To be published in the 2018 Network and Distributed Systems Security (NDSS) Symposium via its 2018 Workshop on Binary Analysis Research (BAR)

  6. "Influence Sketching": Finding Influential Samples In Large-Scale Regressions

    Authors: Mike Wojnowicz, Ben Cruz, Xuan Zhao, Brian Wallace, Matt Wolff, Jay Luan, Caleb Crable

    Abstract: There is an especially strong need in modern large-scale data analysis to prioritize samples for manual inspection. For example, the inspection could target important mislabeled samples or key vulnerabilities exploitable by an adversarial attack. In order to solve the "needle in the haystack" problem of which samples to inspect, we develop a new scalable version of Cook's distance, a classical sta… ▽ More

    Submitted 23 March, 2017; v1 submitted 17 November, 2016; originally announced November 2016.

    Comments: fixed additional typos

    Journal ref: Big Data (Big Data), 2016 IEEE International Conference on, pp. 3601 - 3612. IEEE, 2016

  7. arXiv:1607.04950  [pdf, other

    cs.CR stat.AP

    Wavelet decomposition of software entropy reveals symptoms of malicious code

    Authors: Michael Wojnowicz, Glenn Chisholm, Matt Wolff, Xuan Zhao

    Abstract: Sophisticated malware authors can sneak hidden malicious code into portable executable files, and this code can be hard to detect, especially if encrypted or compressed. However, when an executable file switches between code regimes (e.g. native, encrypted, compressed, text, and padding), there are corresponding shifts in the file's representation as an entropy signal. In this paper, we develop a… ▽ More

    Submitted 2 February, 2018; v1 submitted 18 July, 2016; originally announced July 2016.

    Comments: Post print of paper published in Journal of Innovation in Digital Ecosystems. This corrects typos introduced during editing