Skip to main content

Showing 1–20 of 20 results for author: Yener, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.04962  [pdf, other

    eess.IV cs.CV cs.LG

    C2P-GCN: Cell-to-Patch Graph Convolutional Network for Colorectal Cancer Grading

    Authors: Sudipta Paul, Bulent Yener, Amanda W. Lund

    Abstract: Graph-based learning approaches, due to their ability to encode tissue/organ structure information, are increasingly favored for grading colorectal cancer histology images. Recent graph-based techniques involve dividing whole slide images (WSIs) into smaller or medium-sized patches, and then building graphs on each patch for direct use in training. This method, however, fails to capture the tissue… ▽ More

    Submitted 13 May, 2024; v1 submitted 7 March, 2024; originally announced March 2024.

    Comments: Accepted at IEEE EMBC 2024

  2. arXiv:2308.15027  [pdf, ps, other

    cs.IR cs.CL

    Improving Neural Ranking Models with Traditional IR Methods

    Authors: Anik Saha, Oktie Hassanzadeh, Alex Gittens, Jian Ni, Kavitha Srinivas, Bulent Yener

    Abstract: Neural ranking methods based on large transformer models have recently gained significant attention in the information retrieval community, and have been adopted by major commercial solutions. Nevertheless, they are computationally expensive to create, and require a great deal of labeled data for specialized corpora. In this paper, we explore a low resource alternative which is a bag-of-embedding… ▽ More

    Submitted 29 August, 2023; originally announced August 2023.

    Comments: Short paper, 4 pages

  3. arXiv:2308.03891  [pdf, other

    cs.CL

    A Cross-Domain Evaluation of Approaches for Causal Knowledge Extraction

    Authors: Anik Saha, Oktie Hassanzadeh, Alex Gittens, Jian Ni, Kavitha Srinivas, Bulent Yener

    Abstract: Causal knowledge extraction is the task of extracting relevant causes and effects from text by detecting the causal relation. Although this task is important for language understanding and knowledge discovery, recent works in this domain have largely focused on binary classification of a text segment as causal or non-causal. In this regard, we perform a thorough analysis of three sequence tagging… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  4. arXiv:2305.20043  [pdf, ps, other

    cs.LG stat.ML

    Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning

    Authors: Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung

    Abstract: Inference of causal structures from observational data is a key component of causal machine learning; in practice, this data may be incompletely observed. Prior work has demonstrated that adversarial perturbations of completely observed training data may be used to force the learning of inaccurate causal structural models (SCMs). However, when the data can be audited for correctness (e.g., it is c… ▽ More

    Submitted 31 May, 2023; originally announced May 2023.

  5. arXiv:2304.10642  [pdf, other

    cs.CL

    Word Sense Induction with Knowledge Distillation from BERT

    Authors: Anik Saha, Alex Gittens, Bulent Yener

    Abstract: Pre-trained contextual language models are ubiquitously employed for language understanding tasks, but are unsuitable for resource-constrained systems. Noncontextual word embeddings are an efficient alternative in these settings. Such methods typically use one vector to encode multiple different meanings of a word, and incur errors due to polysemy. This paper proposes a two-stage method to distill… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

  6. arXiv:2202.13520  [pdf, other

    cs.GT cs.AI cs.CR

    Anti-Malware Sandbox Games

    Authors: Sujoy Sikdar, Sikai Ruan, Qishen Han, Paween Pitimanaaree, Jeremy Blackthorne, Bulent Yener, Lirong Xia

    Abstract: We develop a game theoretic model of malware protection using the state-of-the-art sandbox method, to characterize and compute optimal defense strategies for anti-malware. We model the strategic interaction between developers of malware (M) and anti-malware (AM) as a two player game, where AM commits to a strategy of generating sandbox environments, and M responds by choosing to either attack or h… ▽ More

    Submitted 27 February, 2022; originally announced February 2022.

  7. arXiv:2202.13054  [pdf, other

    stat.ML cs.LG

    Missing Value Knockoffs

    Authors: Deniz Koyuncu, Bülent Yener

    Abstract: One limitation of the most statistical/machine learning-based variable selection approaches is their inability to control the false selections. A recently introduced framework, model-x knockoffs, provides that to a wide range of models but lacks support for datasets with missing values. In this work, we discuss ways of preserving the theoretical guarantees of the model-x framework in the missing d… ▽ More

    Submitted 25 February, 2022; originally announced February 2022.

    Comments: 11 pages, 23 pages with supplementary material, 8 figures

  8. arXiv:2107.03806  [pdf, other

    cs.LG cs.CR

    Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models

    Authors: Daniel Park, Haidar Khan, Azer Khan, Alex Gittens, Bülent Yener

    Abstract: Adversarial examples pose a threat to deep neural network models in a variety of scenarios, from settings where the adversary has complete knowledge of the model in a "white box" setting and to the opposite in a "black box" setting. In this paper, we explore the use of output randomization as a defense against attacks in both the black box and white box models and propose two defenses. In the firs… ▽ More

    Submitted 8 July, 2021; originally announced July 2021.

    Comments: This is a substantially changed version of an earlier preprint (arXiv:1905.09871)

  9. arXiv:2011.08982  [pdf, other

    eess.SP cs.LG

    Patient-Specific Seizure Prediction Using Single Seizure Electroencephalography Recording

    Authors: Zaid Bin Tariq, Arun Iyengar, Lara Marcuse, Hui Su, Bülent Yener

    Abstract: Electroencephalogram (EEG) is a prominent way to measure the brain activity for studying epilepsy, thereby hel** in predicting seizures. Seizure prediction is an active research area with many deep learning based approaches dominating the recent literature for solving this problem. But these models require a considerable number of patient-specific seizures to be recorded for extracting the preic… ▽ More

    Submitted 13 November, 2020; originally announced November 2020.

    Comments: 8 pages

  10. A survey on practical adversarial examples for malware classifiers

    Authors: Daniel Park, Bülent Yener

    Abstract: Machine learning based solutions have been very helpful in solving problems that deal with immense amounts of data, such as malware detection and classification. However, deep neural networks have been found to be vulnerable to adversarial examples, or inputs that have been purposefully perturbed to result in an incorrect label. Researchers have shown that this vulnerability can be exploited to cr… ▽ More

    Submitted 6 November, 2020; originally announced November 2020.

    Comments: preprint. to appear in the Reversing and Offensive-oriented Trends Symposium(ROOTS) 2020

  11. arXiv:2011.03476  [pdf, other

    cs.CR cs.LG cs.NI

    Towards Obfuscated Malware Detection for Low Powered IoT Devices

    Authors: Daniel Park, Hannah Powers, Benji Prashker, Leland Liu, Bülent Yener

    Abstract: With the increased deployment of IoT and edge devices into commercial and user networks, these devices have become a new threat vector for malware authors. It is imperative to protect these devices as they become more prevalent in commercial and personal networks. However, due to their limited computational power and storage space, especially in the case of battery-powered devices, it is infeasibl… ▽ More

    Submitted 6 November, 2020; originally announced November 2020.

    Comments: preprint. to appear at the International Conference on Machine Learning Applications (ICMLA) 2020

  12. arXiv:2007.13417  [pdf, other

    physics.app-ph cs.CV eess.IV

    Image-driven discriminative and generative machine learning algorithms for establishing microstructure-processing relationships

    Authors: Wufei Ma, Elizabeth Kautz, Arun Baskaran, Aritra Chowdhury, Vineet Joshi, Bülent Yener, Daniel Lewis

    Abstract: We investigate methods of microstructure representation for the purpose of predicting processing condition from microstructure image data. A binary alloy (uranium-molybdenum) that is currently under development as a nuclear fuel was studied for the purpose of develo** an improved machine learning approach to image recognition, characterization, and building predictive capabilities linking micros… ▽ More

    Submitted 27 July, 2020; originally announced July 2020.

    Comments: 14 pages, 15 figures

  13. arXiv:1906.05496  [pdf, other

    physics.app-ph cs.CV cs.LG

    An image-driven machine learning approach to kinetic modeling of a discontinuous precipitation reaction

    Authors: Elizabeth Kautz, Wufei Ma, Saumyadeep Jana, Arun Devaraj, Vineet Joshi, Bülent Yener, Daniel Lewis

    Abstract: Micrograph quantification is an essential component of several materials science studies. Machine learning methods, in particular convolutional neural networks, have previously demonstrated performance in image recognition tasks across several disciplines (e.g. materials science, medical imaging, facial recognition). Here, we apply these well-established methods to develop an approach to microstru… ▽ More

    Submitted 13 June, 2019; originally announced June 2019.

    Comments: 30 pages, 8 figures

  14. arXiv:1905.09876  [pdf, other

    cs.LG cs.AI stat.ML

    Deep density ratio estimation for change point detection

    Authors: Haidar Khan, Lara Marcuse, Bülent Yener

    Abstract: In this work, we propose new objective functions to train deep neural network based density ratio estimators and apply it to a change point detection problem. Existing methods use linear combinations of kernels to approximate the density ratio function by solving a convex constrained minimization problem. Approximating the density ratio function using a deep neural network requires defining a suit… ▽ More

    Submitted 23 May, 2019; originally announced May 2019.

  15. arXiv:1905.09871  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Thwarting finite difference adversarial attacks with output randomization

    Authors: Haidar Khan, Daniel Park, Azer Khan, Bülent Yener

    Abstract: Adversarial examples pose a threat to deep neural network models in a variety of scenarios, from settings where the adversary has complete knowledge of the model and to the opposite "black box" setting. Black box attacks are particularly threatening as the adversary only needs access to the input and output of the model. Defending against black box adversarial example generation attacks is paramou… ▽ More

    Submitted 23 May, 2019; originally announced May 2019.

  16. Generation & Evaluation of Adversarial Examples for Malware Obfuscation

    Authors: Daniel Park, Haidar Khan, Bülent Yener

    Abstract: There has been an increased interest in the application of convolutional neural networks for image based malware classification, but the susceptibility of neural networks to adversarial examples allows malicious actors to evade classifiers. Adversarial examples are usually generated by adding small perturbations to the input that are unrecognizable to humans, but the same approach is not effective… ▽ More

    Submitted 15 October, 2019; v1 submitted 9 April, 2019; originally announced April 2019.

    Comments: Preprint

  17. arXiv:1903.02521  [pdf, other

    cs.CV cs.LG stat.ML

    Quantifying error contributions of computational steps, algorithms and hyperparameter choices in image classification pipelines

    Authors: Aritra Chowdhury, Malik Magdin-Ismail, Bulent Yener

    Abstract: Data science relies on pipelines that are organized in the form of interdependent computational steps. Each step consists of various candidate algorithms that maybe used for performing a particular function. Each algorithm consists of several hyperparameters. Algorithms and hyperparameters must be optimized as a whole to produce the best performance. Typical machine learning pipelines typically co… ▽ More

    Submitted 25 February, 2019; originally announced March 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1903.00405

  18. arXiv:1903.00405  [pdf, other

    cs.CV cs.LG stat.ML

    Quantifying contribution and propagation of error from computational steps, algorithms and hyperparameter choices in image classification pipelines

    Authors: Aritra Chowdhury, Malik Magdon-Ismail, Bulent Yener

    Abstract: Data science relies on pipelines that are organized in the form of interdependent computational steps. Each step consists of various candidate algorithms that maybe used for performing a particular function. Each algorithm consists of several hyperparameters. Algorithms and hyperparameters must be optimized as a whole to produce the best performance. Typical machine learning pipelines consist of c… ▽ More

    Submitted 21 February, 2019; originally announced March 2019.

  19. Focal onset seizure prediction using convolutional networks

    Authors: Haidar Khan, Lara Marcuse, Madeline Fields, Kalina Swann, Bülent Yener

    Abstract: Objective: This work investigates the hypothesis that focal seizures can be predicted using scalp electroencephalogram (EEG) data. Our first aim is to learn features that distinguish between the interictal and preictal regions. The second aim is to define a prediction horizon in which the prediction is as accurate and as early as possible, clearly two competing objectives. Methods: Convolutional f… ▽ More

    Submitted 29 May, 2018; originally announced May 2018.

    Comments: 8 pages, 6 figures, 3 tables

    Journal ref: Khan, H., Marcuse, L., Fields, M., Swann, K., & Yener, B. (2017). Focal onset seizure prediction using convolutional networks. IEEE Transactions on Biomedical Engineering

  20. arXiv:1311.4591  [pdf, ps, other

    cs.CR cs.IT

    On the Security of Key Extraction from Measuring Physical Quantities

    Authors: Matt Edman, Aggelos Kiayias, Qiang Tang, Bulent Yener

    Abstract: Key extraction via measuring a physical quantity is a class of information theoretic key exchange protocols that rely on the physical characteristics of the communication channel to enable the computation of a shared key by two (or more) parties that share no prior secret information. The key is supposed to be information theoretically hidden to an eavesdropper. Despite the recent surge of researc… ▽ More

    Submitted 16 December, 2015; v1 submitted 18 November, 2013; originally announced November 2013.