Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–4 of 4 results for author: Lamont, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.03401  [pdf, other

    cs.AI cs.LG cs.LO

    BAIT: Benchmarking (Embedding) Architectures for Interactive Theorem-Proving

    Authors: Sean Lamont, Michael Norrish, Amir Dezfouli, Christian Walder, Paul Montague

    Abstract: Artificial Intelligence for Theorem Proving has given rise to a plethora of benchmarks and methodologies, particularly in Interactive Theorem Proving (ITP). Research in the area is fragmented, with a diverse set of approaches being spread across several ITP systems. This presents a significant challenge to the comparison of methods, which are often complex and difficult to replicate. Addressing th… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

  2. arXiv:2212.04008  [pdf, other

    cs.CR

    Use of Cryptography in Malware Obfuscation

    Authors: Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia

    Abstract: Malware authors often use cryptographic tools such as XOR encryption and block ciphers like AES to obfuscate part of the malware to evade detection. Use of cryptography may give the impression that these obfuscation techniques have some provable guarantees of success. In this paper, we take a closer look at the use of cryptographic tools to obfuscate malware. We first find that most techniques are… ▽ More

    Submitted 7 September, 2023; v1 submitted 7 December, 2022; originally announced December 2022.

    Comments: This is the full version of the paper with the same title to appear in the Journal of Computer Virology and Hacking Techniques

  3. arXiv:1909.05030  [pdf, ps, other

    cs.SD cs.LG eess.AS stat.ML

    Computer Assisted Composition in Continuous Time

    Authors: Chamin Hewa Koneputugodage, Rhys Healy, Sean Lamont, Ian Mallett, Matt Brown, Matt Walters, Ushini Attanayake, Libo Zhang, Roger T. Dean, Alexander Hunter, Charles Gretton, Christian Walder

    Abstract: We address the problem of combining sequence models of symbolic music with user defined constraints. For typical models this is non-trivial as only the conditional distribution of each symbol given the earlier symbols is available, while the constraints correspond to arbitrary times. Previously this has been addressed by assuming a discrete time model of fixed rhythm. We generalise to continuous t… ▽ More

    Submitted 10 September, 2019; originally announced September 2019.

  4. arXiv:1703.01358  [pdf, ps, other

    cs.AI

    Generalised Discount Functions applied to a Monte-Carlo AImu Implementation

    Authors: Sean Lamont, John Aslanides, Jan Leike, Marcus Hutter

    Abstract: In recent years, work has been done to develop the theory of General Reinforcement Learning (GRL). However, there are few examples demonstrating these results in a concrete way. In particular, there are no examples demonstrating the known results regarding gener- alised discounting. We have added to the GRL simulation platform AIXIjs the functionality to assign an agent arbitrary discount function… ▽ More

    Submitted 3 March, 2017; originally announced March 2017.

    Comments: 12 pages, 4 figures