Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–6 of 6 results for author: Grana, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.05761  [pdf, other

    cs.LG cs.AI stat.ME

    Uncertainty Quantification for Local Model Explanations Without Model Access

    Authors: Surin Ahn, Justin Grana, Yafet Tamene, Kristian Holsheimer

    Abstract: We present a model-agnostic algorithm for generating post-hoc explanations and uncertainty intervals for a machine learning model when only a static sample of inputs and outputs from the model is available, rather than direct access to the model itself. This situation may arise when model evaluations are expensive; when privacy, security and bandwidth constraints are imposed; or when there is a ne… ▽ More

    Submitted 24 June, 2023; v1 submitted 13 January, 2023; originally announced January 2023.

  2. arXiv:2006.05048  [pdf, other

    cs.LG cs.AI cs.MA

    Policy-focused Agent-based Modeling using RL Behavioral Models

    Authors: Osonde A. Osoba, Raffaele Vardavas, Justin Grana, Rushil Zutshi, Amber Jaycocks

    Abstract: Agent-based Models (ABMs) are valuable tools for policy analysis. ABMs help analysts explore the emergent consequences of policy interventions in multi-agent decision-making settings. But the validity of inferences drawn from ABM explorations depends on the quality of the ABM agents' behavioral models. Standard specifications of agent behavioral models rely either on heuristic decision-making rule… ▽ More

    Submitted 5 November, 2020; v1 submitted 9 June, 2020; originally announced June 2020.

    Comments: This is a more detailed version of a paper ("Modeling Agent Behaviors for Policy Analysis via Reinforcement Learning") accepted to appear in IEEE ICMLA 2020. This also corrects an error in Fig. 7 of the original arXiv submission. Fig. 7 now specifies the right ABM architecture ("flu" instead of "tax")

  3. Perturbing Inputs to Prevent Model Stealing

    Authors: Justin Grana

    Abstract: We show how perturbing inputs to machine learning services (ML-service) deployed in the cloud can protect against model stealing attacks. In our formulation, there is an ML-service that receives inputs from users and returns the output of the model. There is an attacker that is interested in learning the parameters of the ML-service. We use the linear and logistic regression models to illustrate h… ▽ More

    Submitted 12 May, 2020; originally announced May 2020.

    Journal ref: IEEE Conference on Communication and Network Securtiy, Sixth Workshop on Security and Privacy in the Cloud, 2020

  4. Deep Reinforcement Learning for Event-Driven Multi-Agent Decision Processes

    Authors: Kunal Menda, Yi-Chun Chen, Justin Grana, James W. Bono, Brendan D. Tracey, Mykel J. Kochenderfer, David Wolpert

    Abstract: The incorporation of macro-actions (temporally extended actions) into multi-agent decision problems has the potential to address the curse of dimensionality associated with such decision problems. Since macro-actions last for stochastic durations, multiple agents executing decentralized policies in cooperative environments must act asynchronously. We present an algorithm that modifies generalized… ▽ More

    Submitted 29 May, 2019; v1 submitted 19 September, 2017; originally announced September 2017.

    Comments: Published in IEEE Transactions on Intelligent Transportation Systems (Volume: 20, Issue: 4, April 2019). https://ieeexplore.ieee.org/document/8419722

    Journal ref: IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 4, pp. 1259-1268, April 2019

  5. arXiv:1702.04449  [pdf, other

    cs.SI physics.soc-ph

    Modeling Social Organizations as Communication Networks

    Authors: David Wolpert, Justin Grana, Brendan Tracey, Tim Kohler, Artemy Kolchinsky

    Abstract: We identify the "organization" of a human social group as the communication network(s) within that group. We then introduce three theoretical approaches to analyzing what determines the structures of human organizations. All three approaches adopt a group-selection perspective, so that the group's network structure is (approximately) optimal, given the information-processing limitations of agents… ▽ More

    Submitted 14 February, 2017; originally announced February 2017.

  6. arXiv:1609.00104  [pdf, other

    cs.CR

    A Likelihood Ratio Detector for Identifying Within-Perimeter Computer Network Attacks

    Authors: Justin Grana, David Wolpert, Joshua Neil, Dongping Xie, Tanmoy Bhattacharya, Russel Bent

    Abstract: The rapid detection of attackers within firewalls of enterprise computer net- works is of paramount importance. Anomaly detectors address this problem by quantifying deviations from baseline statistical models of normal network behav- ior and signaling an intrusion when the observed data deviates significantly from the baseline model. However, many anomaly detectors do not take into account plausi… ▽ More

    Submitted 1 September, 2016; originally announced September 2016.