Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–13 of 13 results for author: Kay, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.00964  [pdf, other

    cs.IT cs.DM

    Permutation Entropy for Signal Analysis

    Authors: Bill Kay, Audun Myers, Thad Boydston, Emily Ellwein, Cameron Mackenzie, Iliana Alvarez, Erik Lentz

    Abstract: Shannon Entropy is the preeminent tool for measuring the level of uncertainty (and conversely, information content) in a random variable. In the field of communications, entropy can be used to express the information content of given signals (represented as time series) by considering random variables which sample from specified subsequences. In this paper, we will discuss how an entropy variant,… ▽ More

    Submitted 24 June, 2024; v1 submitted 1 December, 2023; originally announced December 2023.

  2. arXiv:2312.00023  [pdf, other

    cs.CR

    Hypergraph Topological Features for Autoencoder-Based Intrusion Detection for Cybersecurity Data

    Authors: Bill Kay, Sinan G. Aksoy, Molly Baird, Daniel M. Best, Helen Jenne, Cliff Joslyn, Christopher Potvin, Gregory Henselman-Petrusek, Garret Seppala, Stephen J. Young, Emilie Purvine

    Abstract: In this position paper, we argue that when hypergraphs are used to capture multi-way local relations of data, their resulting topological features describe global behaviour. Consequently, these features capture complex correlations that can then serve as high fidelity inputs to autoencoder-driven anomaly detection pipelines. We propose two such potential pipelines for cybersecurity data, one that… ▽ More

    Submitted 9 November, 2023; originally announced December 2023.

    MSC Class: 55N31

  3. arXiv:2311.16154  [pdf

    cs.CR

    Stepping out of Flatland: Discovering Behavior Patterns as Topological Structures in Cyber Hypergraphs

    Authors: Helen Jenne, Sinan G. Aksoy, Daniel Best, Alyson Bittner, Gregory Henselman-Petrusek, Cliff Joslyn, Bill Kay, Audun Myers, Garret Seppala, Jackson Warley, Stephen J. Young, Emilie Purvine

    Abstract: Data breaches and ransomware attacks occur so often that they have become part of our daily news cycle. This is due to a myriad of factors, including the increasing number of internet-of-things devices, shift to remote work during the pandemic, and advancement in adversarial techniques, which all contribute to the increase in both the complexity of data captured and the challenge of protecting our… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: 18 pages, 11 figures. This paper is written for a general audience

    MSC Class: 55N31

  4. arXiv:2309.08010  [pdf, other

    cs.CG

    Malicious Cyber Activity Detection Using Zigzag Persistence

    Authors: Audun Myers, Alyson Bittner, Sinan Aksoy, Daniel M. Best, Gregory Henselman-Petrusek, Helen Jenne, Cliff Joslyn, Bill Kay, Garret Seppala, Stephen J. Young, Emilie Purvine

    Abstract: In this study we synthesize zigzag persistence from topological data analysis with autoencoder-based approaches to detect malicious cyber activity and derive analytic insights. Cybersecurity aims to safeguard computers, networks, and servers from various forms of malicious attacks, including network damage, data theft, and activity monitoring. Here we focus on the detection of malicious activity u… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

  5. arXiv:2308.04537  [pdf, other

    cs.DM cs.SI math.CO math.OC

    Community Detection in Hypergraphs via Mutual Information Maximization

    Authors: Jurgen Kritschgau, Daniel Kaiser, Oliver Alvarado Rodriguez, Ilya Amburg, Jessalyn Bolkema, Thomas Grubb, Fangfei Lan, Sepideh Maleki, Phil Chodrow, Bill Kay

    Abstract: The hypergraph community detection problem seeks to identify groups of related nodes in hypergraph data. We propose an information-theoretic hypergraph community detection algorithm which compresses the observed data in terms of community labels and community-edge intersections. This algorithm can also be viewed as maximum-likelihood inference in a degree-corrected microcanonical stochastic blockm… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

    Comments: Submitted

  6. arXiv:2303.11464  [pdf, other

    math.CO cs.DM cs.LG math.NA quant-ph

    Seven open problems in applied combinatorics

    Authors: Sinan G. Aksoy, Ryan Bennink, Yuzhou Chen, José Frías, Yulia R. Gel, Bill Kay, Uwe Naumann, Carlos Ortiz Marrero, Anthony V. Petyuk, Sandip Roy, Ignacio Segovia-Dominguez, Nate Veldt, Stephen J. Young

    Abstract: We present and discuss seven different open problems in applied combinatorics. The application areas relevant to this compilation include quantum computing, algorithmic differentiation, topological data analysis, iterative methods, hypergraph cut algorithms, and power systems.

    Submitted 20 March, 2023; originally announced March 2023.

    Comments: 43 pages, 5 figures

    MSC Class: 05C90; 65Y04; 65D25; 05C65; 81P68; 62R40; 55N31; 65F10

  7. arXiv:2302.02857  [pdf, other

    cs.CG math.AT

    Topological Analysis of Temporal Hypergraphs

    Authors: Audun Myers, Cliff Joslyn, Bill Kay, Emilie Purvine, Gregory Roek, Madelyn Shapiro

    Abstract: In this work we study the topological properties of temporal hypergraphs. Hypergraphs provide a higher dimensional generalization of a graph that is capable of capturing multi-way connections. As such, they have become an integral part of network science. A common use of hypergraphs is to model events as hyperedges in which the event can involve many elements as nodes. This provides a more complet… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

  8. arXiv:2104.13983  [pdf, other

    cs.NE cs.CC cs.CL cs.ET

    Neuromorphic Computing is Turing-Complete

    Authors: Prasanna Date, Catherine Schuman, Bill Kay, Thomas Potok

    Abstract: Neuromorphic computing is a non-von Neumann computing paradigm that performs computation by emulating the human brain. Neuromorphic systems are extremely energy-efficient and known to consume thousands of times less power than CPUs and GPUs. They have the potential to drive critical use cases such as autonomous vehicles, edge computing and internet of things in the future. For this reason, they ar… ▽ More

    Submitted 28 April, 2021; originally announced April 2021.

    MSC Class: 68Q07; 03D10 ACM Class: F.1.1; D.1.m

  9. A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset

    Authors: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs

    Abstract: Although ubiquitous in modern vehicles, Controller Area Networks (CANs) lack basic security properties and are easily exploitable. A rapidly growing field of CAN security research has emerged that seeks to detect intrusions on CANs. Producing vehicular CAN data with a variety of intrusions is out of reach for most researchers as it requires expensive assets and expertise. To assist researchers, we… ▽ More

    Submitted 7 February, 2024; v1 submitted 28 December, 2020; originally announced December 2020.

    Comments: title changed and author added from original version

    Journal ref: PLoS one 19, no. 1 (2024): e0296879

  10. arXiv:2005.04171  [pdf, other

    cs.NE cs.LG

    Hyperparameter Optimization in Binary Communication Networks for Neuromorphic Deployment

    Authors: Maryam Parsa, Catherine D. Schuman, Prasanna Date, Derek C. Rose, Bill Kay, J. Parker Mitchell, Steven R. Young, Ryan Dellana, William Severa, Thomas E. Potok, Kaushik Roy

    Abstract: Training neural networks for neuromorphic deployment is non-trivial. There have been a variety of approaches proposed to adapt back-propagation or back-propagation-like algorithms appropriate for training. Considering that these networks often have very different performance characteristics than traditional neural networks, it is often unclear how to set either the network topology or the hyperpar… ▽ More

    Submitted 20 April, 2020; originally announced May 2020.

    Comments: 9 pages, 3 figures, To appear in WCCI 2020

  11. arXiv:1903.04523  [pdf, other

    math.CO cs.DM cs.SI

    The Iterated Local Model for Social Networks

    Authors: Anthony Bonato, Huda Chuangpishit, Sean English, Bill Kay, Erin Meger

    Abstract: On-line social networks, such as in Facebook and Twitter, are often studied from the perspective of friendship ties between agents in the network. Adversarial ties, however, also play an important role in the structure and function of social networks, but are often hidden. Underlying generative mechanisms of social networks are predicted by structural balance theory, which postulates that triads o… ▽ More

    Submitted 11 March, 2019; originally announced March 2019.

  12. arXiv:1211.2151  [pdf, ps, other

    math.CO cs.DM

    Graph Odometry

    Authors: Aaron Dutle, Bill Kay

    Abstract: We address problem of determining edge weights on a graph using non-backtracking closed walks from a vertex. We show that the weights of all of the edges can be determined from any starting vertex exactly when the graph has minimum degree at least three. We also determine the minimum number of walks required to reveal all edge weights.

    Submitted 9 November, 2012; originally announced November 2012.

    Comments: 14 pages, 5 figures

    MSC Class: 05C22

  13. arXiv:1109.0522  [pdf, ps, other

    math.CO cs.DM

    Graham's Tree Reconstruction Conjecture and a Waring-Type Problem on Partitions

    Authors: Joshua Cooper, Bill Kay, Anton Swifton

    Abstract: Suppose $G$ is a tree. Graham's "Tree Reconstruction Conjecture" states that $G$ is uniquely determined by the integer sequence $|G|$, $|L(G)|$, $|L(L(G))|$, $|L(L(L(G)))|$, $\ldots$, where $L(H)$ denotes the line graph of the graph $H$. Little is known about this question apart from a few simple observations. We show that the number of trees on $n$ vertices which can be distinguished by their ass… ▽ More

    Submitted 23 August, 2017; v1 submitted 2 September, 2011; originally announced September 2011.

    Comments: 18 pages, 1 figure

    MSC Class: 05C76 (Primary) 05C05; 05C60; 11P05; 11P81 (Secondary) ACM Class: G.2.2