Skip to main content

Showing 1–14 of 14 results for author: Young, S J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.09676  [pdf, other

    cs.LG

    HyperMagNet: A Magnetic Laplacian based Hypergraph Neural Network

    Authors: Tatyana Benko, Martin Buck, Ilya Amburg, Stephen J. Young, Sinan G. Aksoy

    Abstract: In data science, hypergraphs are natural models for data exhibiting multi-way relations, whereas graphs only capture pairwise. Nonetheless, many proposed hypergraph neural networks effectively reduce hypergraphs to undirected graphs via symmetrized matrix representations, potentially losing important information. We propose an alternative approach to hypergraph neural networks in which the hypergr… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: 9 pages, 1 figure

  2. arXiv:2312.00023  [pdf, other

    cs.CR

    Hypergraph Topological Features for Autoencoder-Based Intrusion Detection for Cybersecurity Data

    Authors: Bill Kay, Sinan G. Aksoy, Molly Baird, Daniel M. Best, Helen Jenne, Cliff Joslyn, Christopher Potvin, Gregory Henselman-Petrusek, Garret Seppala, Stephen J. Young, Emilie Purvine

    Abstract: In this position paper, we argue that when hypergraphs are used to capture multi-way local relations of data, their resulting topological features describe global behaviour. Consequently, these features capture complex correlations that can then serve as high fidelity inputs to autoencoder-driven anomaly detection pipelines. We propose two such potential pipelines for cybersecurity data, one that… ▽ More

    Submitted 9 November, 2023; originally announced December 2023.

    MSC Class: 55N31

  3. arXiv:2311.16154  [pdf

    cs.CR

    Step** out of Flatland: Discovering Behavior Patterns as Topological Structures in Cyber Hypergraphs

    Authors: Helen Jenne, Sinan G. Aksoy, Daniel Best, Alyson Bittner, Gregory Henselman-Petrusek, Cliff Joslyn, Bill Kay, Audun Myers, Garret Seppala, Jackson Warley, Stephen J. Young, Emilie Purvine

    Abstract: Data breaches and ransomware attacks occur so often that they have become part of our daily news cycle. This is due to a myriad of factors, including the increasing number of internet-of-things devices, shift to remote work during the pandemic, and advancement in adversarial techniques, which all contribute to the increase in both the complexity of data captured and the challenge of protecting our… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: 18 pages, 11 figures. This paper is written for a general audience

    MSC Class: 55N31

  4. arXiv:2311.08595  [pdf, other

    math.NA cs.DC math.CO

    Fast Parallel Tensor Times Same Vector for Hypergraphs

    Authors: Shruti Shivakumar, Ilya Amburg, Sinan G. Aksoy, Jiajia Li, Stephen J. Young, Srinivas Aluru

    Abstract: Hypergraphs are a popular paradigm to represent complex real-world networks exhibiting multi-way relationships of varying sizes. Mining centrality in hypergraphs via symmetric adjacency tensors has only recently become computationally feasible for large and complex datasets. To enable scalable computation of these and related hypergraph analytics, here we focus on the Sparse Symmetric Tensor Times… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

  5. arXiv:2309.08010  [pdf, other

    cs.CG

    Malicious Cyber Activity Detection Using Zigzag Persistence

    Authors: Audun Myers, Alyson Bittner, Sinan Aksoy, Daniel M. Best, Gregory Henselman-Petrusek, Helen Jenne, Cliff Joslyn, Bill Kay, Garret Seppala, Stephen J. Young, Emilie Purvine

    Abstract: In this study we synthesize zigzag persistence from topological data analysis with autoencoder-based approaches to detect malicious cyber activity and derive analytic insights. Cybersecurity aims to safeguard computers, networks, and servers from various forms of malicious attacks, including network damage, data theft, and activity monitoring. Here we focus on the detection of malicious activity u… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

  6. arXiv:2306.17825  [pdf, other

    math.NA cs.LG cs.SI math.CO physics.soc-ph

    Scalable tensor methods for nonuniform hypergraphs

    Authors: Sinan G. Aksoy, Ilya Amburg, Stephen J. Young

    Abstract: While multilinear algebra appears natural for studying the multiway interactions modeled by hypergraphs, tensor methods for general hypergraphs have been stymied by theoretical and practical barriers. A recently proposed adjacency tensor is applicable to nonuniform hypergraphs, but is prohibitively costly to form and analyze in practice. We develop tensor times same vector (TTSV) algorithms for th… ▽ More

    Submitted 3 April, 2024; v1 submitted 30 June, 2023; originally announced June 2023.

    MSC Class: 05C65; 15A69; 05C50; 05C85

  7. arXiv:2303.11464  [pdf, other

    math.CO cs.DM cs.LG math.NA quant-ph

    Seven open problems in applied combinatorics

    Authors: Sinan G. Aksoy, Ryan Bennink, Yuzhou Chen, José Frías, Yulia R. Gel, Bill Kay, Uwe Naumann, Carlos Ortiz Marrero, Anthony V. Petyuk, Sandip Roy, Ignacio Segovia-Dominguez, Nate Veldt, Stephen J. Young

    Abstract: We present and discuss seven different open problems in applied combinatorics. The application areas relevant to this compilation include quantum computing, algorithmic differentiation, topological data analysis, iterative methods, hypergraph cut algorithms, and power systems.

    Submitted 20 March, 2023; originally announced March 2023.

    Comments: 43 pages, 5 figures

    MSC Class: 05C90; 65Y04; 65D25; 05C65; 81P68; 62R40; 55N31; 65F10

  8. arXiv:2008.04357  [pdf, other

    cs.SI cs.CR cs.DM

    Directional Laplacian Centrality for Cyber Situational Awareness

    Authors: Sinan G. Aksoy, Emilie Purvine, Stephen J. Young

    Abstract: Cyber operations is drowning in diverse, high-volume, multi-source data. In order to get a full picture of current operations and identify malicious events and actors analysts must see through data generated by a mix of human activity and benign automated processes. Although many monitoring and alert systems exist, they typically use signature-based detection methods. We introduce a general method… ▽ More

    Submitted 23 March, 2021; v1 submitted 10 August, 2020; originally announced August 2020.

    Comments: 25 pages, 15 figures

  9. arXiv:1909.11694  [pdf, other

    cs.DC cs.NI math.CO

    Ramanujan Graphs and the Spectral Gap of Supercomputing Topologies

    Authors: Sinan G. Aksoy, Paul Bruillard, Stephen J. Young, Mark Raugas

    Abstract: Graph eigenvalues play a fundamental role in controlling structural properties, such as bisection bandwidth, diameter, and fault tolerance, which are critical considerations in the design of supercomputing interconnection networks. This motivates considering graphs with optimal spectral expansion, called Ramanujan graphs, as potential candidates for interconnection networks. In this work, we explo… ▽ More

    Submitted 8 April, 2020; v1 submitted 25 September, 2019; originally announced September 2019.

  10. arXiv:1906.04936  [pdf, other

    cs.DM cs.LG cs.SI

    Relative Hausdorff Distance for Network Analysis

    Authors: Sinan G. Aksoy, Kathleen E. Nowak, Emilie Purvine, Stephen J. Young

    Abstract: Similarity measures are used extensively in machine learning and data science algorithms. The newly proposed graph Relative Hausdorff (RH) distance is a lightweight yet nuanced similarity measure for quantifying the closeness of two graphs. In this work we study the effectiveness of RH distance as a tool for detecting anomalies in time-evolving graph sequences. We apply RH to cyber data with given… ▽ More

    Submitted 12 June, 2019; originally announced June 2019.

    Comments: 20 pages

  11. arXiv:1903.01682  [pdf, ps, other

    math.CO cs.DM cs.DS

    A linear-time algorithm and analysis of graph Relative Hausdorff distance

    Authors: Sinan G. Aksoy, Kathleen E. Nowak, Stephen J. Young

    Abstract: Graph similarity metrics serve far-ranging purposes across many domains in data science. As graph datasets grow in size, scientists need comparative tools that capture meaningful differences, yet are lightweight and scalable. Graph Relative Hausdorff (RH) distance is a promising, recently proposed measure for quantifying degree distribution similarity. In spite of recent interest in RH distance, l… ▽ More

    Submitted 7 August, 2019; v1 submitted 5 March, 2019; originally announced March 2019.

  12. Model of Cognitive Dynamics Predicts Performance on Standardized Tests

    Authors: Nathan O. Hodas, Jacob Hunter, Stephen J. Young, Kristina Lerman

    Abstract: In the modern knowledge economy, success demands sustained focus and high cognitive performance. Research suggests that human cognition is linked to a finite resource, and upon its depletion, cognitive functions such as self-control and decision-making may decline. While fatigue, among other factors, affects human activity, how cognitive performance evolves during extended periods of focus remains… ▽ More

    Submitted 7 September, 2018; originally announced September 2018.

    Comments: This is a pre-print of an article published in \emph{Journal of Computational Social Science}. The final authenticated version is available online at: https://doi.org/10.1007/s42001-018-0025-x

    Journal ref: J Comput Soc Sc (2018) 1: 295

  13. arXiv:1405.0157  [pdf, other

    cs.SI physics.soc-ph

    Dimensionality of social networks using motifs and eigenvalues

    Authors: Anthony Bonato, David F. Gleich, Myunghwan Kim, Dieter Mitsche, Paweł Prałat, Amanda Tian, Stephen J. Young

    Abstract: We consider the dimensionality of social networks, and develop experiments aimed at predicting that dimension. We find that a social network model with nodes and links sampled from an $m$-dimensional metric space with power-law distributed influence regions best fits samples from real-world networks when $m$ scales logarithmically with the number of nodes of the network. This supports a logarithmi… ▽ More

    Submitted 1 May, 2014; originally announced May 2014.

    Comments: 26 pages

  14. arXiv:1310.7652  [pdf, ps, other

    math.CO cs.DM cs.SI

    Connectivity and Giant Component of Stochastic Kronecker Graphs

    Authors: Mary Radcliffe, Stephen J. Young

    Abstract: Stochastic Kronecker graphs are a model for complex networks where each edge is present independently according the Kronecker (tensor) product of a fixed matrix k-by-k matrix P with entries in [0,1]. We develop a novel correspondence between the adjacencies in a general stochastic Kronecker graph and the action of a fixed Markov chain. Using this correspondence we are able to generalize the argume… ▽ More

    Submitted 1 April, 2015; v1 submitted 28 October, 2013; originally announced October 2013.

    Comments: 14 pages

    MSC Class: 05C80; 05C82