Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–9 of 9 results for author: Alhajjar, E

.
  1. arXiv:2404.12241  [pdf, other

    cs.CL cs.AI

    Introducing v0.5 of the AI Safety Benchmark from MLCommons

    Authors: Bertie Vidgen, Adarsh Agrawal, Ahmed M. Ahmed, Victor Akinwande, Namir Al-Nuaimi, Najla Alfaraj, Elie Alhajjar, Lora Aroyo, Trupti Bavalatti, Max Bartolo, Borhane Blili-Hamelin, Kurt Bollacker, Rishi Bomassani, Marisa Ferrara Boston, Siméon Campos, Kal Chakra, Canyu Chen, Cody Coleman, Zacharie Delpierre Coudert, Leon Derczynski, Debojyoti Dutta, Ian Eisenberg, James Ezick, Heather Frase, Brian Fuller , et al. (75 additional authors not shown)

    Abstract: This paper introduces v0.5 of the AI Safety Benchmark, which has been created by the MLCommons AI Safety Working Group. The AI Safety Benchmark has been designed to assess the safety risks of AI systems that use chat-tuned language models. We introduce a principled approach to specifying and constructing the benchmark, which for v0.5 covers only a single use case (an adult chatting to a general-pu… ▽ More

    Submitted 13 May, 2024; v1 submitted 18 April, 2024; originally announced April 2024.

  2. arXiv:2312.11379  [pdf, ps, other

    math.CO

    On locally finite ordered rooted trees and their rooted subtrees

    Authors: Geir Agnarsson, Elie Alhajjar, Aleyah Dawkins

    Abstract: In this article we compare the known dynamical polynomial time algorithm for the game-over attack strategy, to that of the brute force approach; of checking all the ordered rooted subtrees of a given tree that represents a given computer network. Our approach is purely enumerative and combinatorial in nature. We first revisit known results about a doubly exponential sequence and generalize them. W… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

    Comments: 35 pages, 7 figures

  3. arXiv:2311.13702  [pdf, other

    quant-ph

    Efficient quantum loading of probability distributions through Feynman propagators

    Authors: Elie Alhajjar, Jesse Geneson, Anupam Prakash, Nicolas Robles

    Abstract: We present quantum algorithms for the loading of probability distributions using Hamiltonian simulation for one dimensional Hamiltonians of the form ${\hat H}= Δ+ V(x) \mathbb{I}$. We consider the potentials $V(x)$ for which the Feynman propagator is known to have an analytically closed form and utilize these Hamiltonians to load probability distributions including the normal, Laplace and Maxwell-… ▽ More

    Submitted 28 November, 2023; v1 submitted 22 November, 2023; originally announced November 2023.

    Comments: 50 pages, 44 figures

  4. arXiv:2306.13116  [pdf, other

    cs.LG cs.AI

    A Machine Learning Pressure Emulator for Hydrogen Embrittlement

    Authors: Minh Triet Chau, João Lucas de Sousa Almeida, Elie Alhajjar, Alberto Costa Nogueira Junior

    Abstract: A recent alternative for hydrogen transportation as a mixture with natural gas is blending it into natural gas pipelines. However, hydrogen embrittlement of material is a major concern for scientists and gas installation designers to avoid process failures. In this paper, we propose a physics-informed machine learning model to predict the gas pressure on the pipes' inner wall. Despite its high-fid… ▽ More

    Submitted 22 June, 2023; originally announced June 2023.

  5. arXiv:2301.06229  [pdf, other

    cs.CR cs.AI stat.ME

    Novelty Detection in Network Traffic: Using Survival Analysis for Feature Identification

    Authors: Taylor Bradley, Elie Alhajjar, Nathaniel Bastian

    Abstract: Intrusion Detection Systems are an important component of many organizations' cyber defense and resiliency strategies. However, one downside of these systems is their reliance on known attack signatures for detection of malicious network events. When it comes to unknown attack types and zero-day exploits, modern Intrusion Detection Systems often fall short. In this paper, we introduce an unconvent… ▽ More

    Submitted 15 January, 2023; originally announced January 2023.

    Comments: 6 pages, 1 figure, 2 tables

  6. arXiv:2110.06089  [pdf, other

    cs.LG eess.SY math.DS

    Cubature Kalman Filter Based Training of Hybrid Differential Equation Recurrent Neural Network Physiological Dynamic Models

    Authors: Ahmet Demirkaya, Tales Imbiriba, Kyle Lockwood, Sumientra Rampersad, Elie Alhajjar, Giovanna Guidoboni, Zachary Danziger, Deniz Erdogmus

    Abstract: Modeling biological dynamical systems is challenging due to the interdependence of different system components, some of which are not fully understood. To fill existing gaps in our ability to mechanistically model physiological systems, we propose to combine neural networks with physics-based models. Specifically, we demonstrate how we can approximate missing ordinary differential equations (ODEs)… ▽ More

    Submitted 12 October, 2021; originally announced October 2021.

  7. arXiv:2006.01875  [pdf, ps, other

    quant-ph math.OA

    Maximally entangled correlation sets

    Authors: Elie Alhajjar, Travis Russell

    Abstract: We study the set of quantum correlations generated by actions on maximally entangled states. We show that such correlations are dense in their own convex hull. As a consequence, we show that these correlations are dense in the set of synchronous quantum correlations. We introduce the concept of corners of correlation sets and show that every local or nonsignalling correlation can be realized as th… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

    Comments: To appear in the Houston Journal of Math. Written June 2018 and revised June 2019. This preprint has been available on Researchgate, but we are posting it here to increase its availability

  8. arXiv:2004.11898  [pdf, other

    cs.CR cs.LG cs.NE stat.ML

    Adversarial Machine Learning in Network Intrusion Detection Systems

    Authors: Elie Alhajjar, Paul Maxwell, Nathaniel D. Bastian

    Abstract: Adversarial examples are inputs to a machine learning system intentionally crafted by an attacker to fool the model into producing an incorrect output. These examples have achieved a great deal of success in several domains such as image recognition, speech recognition and spam detection. In this paper, we study the nature of the adversarial problem in Network Intrusion Detection Systems (NIDS). W… ▽ More

    Submitted 23 April, 2020; originally announced April 2020.

    Comments: 25 pages, 6 figures, 4 tables

  9. Ehrhart positivity and Demazure characters

    Authors: Per Alexandersson, Elie Alhajjar

    Abstract: Demazure characters, also known as key polynomials, generalize the classical Schur polynomials. In particular, when all variables are set equal to $1$, these polynomials count the number of integer points in a certain class of Gelfand--Tsetlin polytopes. This property highlights the interaction between the corresponding polyhedral and combinatorial structures via Ehrhart theory. In this paper, we… ▽ More

    Submitted 8 December, 2018; originally announced December 2018.

    Comments: To appear in the conference proceedings of the Summer workshop on lattice polytopes, Osaka 2018

    MSC Class: 52B20; 05E05

    Journal ref: Algebraic and Geometric Combinatorics on Lattice Polytopes, pp. 56-71 (2019)