Zum Hauptinhalt springen

Showing 101–115 of 115 results for author: Vorobeychik, Y

.
  1. arXiv:1608.07329  [pdf, ps, other

    cs.NI

    Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks

    Authors: Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: In networked systems, monitoring devices such as sensors are typically deployed to monitor various target locations. Targets are the points in the physical space at which events of some interest, such as random faults or attacks, can occur. Most often, these devices have limited energy supplies, and they can operate for a limited duration. As a result, energy-efficient monitoring of various target… ▽ More

    Submitted 25 August, 2016; originally announced August 2016.

  2. arXiv:1608.02257  [pdf, other

    cs.LG cs.CR stat.ML

    Robust High-Dimensional Linear Regression

    Authors: Chang Liu, Bo Li, Yevgeniy Vorobeychik, Alina Oprea

    Abstract: The effectiveness of supervised learning techniques has made them ubiquitous in research and practice. In high-dimensional settings, supervised learning commonly relies on dimensionality reduction to improve performance and identify the most important factors in predicting outcomes. However, the economic importance of learning has made it a natural target for adversarial manipulation of training d… ▽ More

    Submitted 9 August, 2016; v1 submitted 7 August, 2016; originally announced August 2016.

  3. arXiv:1606.06707  [pdf, other

    cs.GT cs.CR eess.SY

    Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments

    Authors: Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: In cyber-physical systems, malicious and resourceful attackers could penetrate the system through cyber means and cause significant physical damage. Consequently, detection of such attacks becomes integral towards making these systems resilient to attacks. To achieve this objective, intrusion detection systems (IDS) that are able to detect malicious behavior can be deployed. However, practical IDS… ▽ More

    Submitted 8 February, 2017; v1 submitted 21 June, 2016; originally announced June 2016.

    Comments: Decision and Game Theory for Security: 7th International Conference, GameSec 2016, New York, NY, USA

  4. arXiv:1606.06698  [pdf, other

    eess.SY cs.CR

    Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering

    Authors: Amin Ghafouri, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: Recent experimental studies have shown that traffic management systems are vulnerable to cyber-attacks on sensor data. This paper studies the vulnerability of fixed-time control of signalized intersections when sensors measuring traffic flow information are compromised and perturbed by an adversary. The problems are formulated by considering three malicious objectives: 1) worst-case network accumu… ▽ More

    Submitted 8 February, 2017; v1 submitted 21 June, 2016; originally announced June 2016.

    Journal ref: 9th International Symposium on Resilient Control Systems (ISRCS), Chicago, IL, pp. 130-135 (2016)

  5. arXiv:1604.02606  [pdf, other

    cs.GT cs.LG stat.ML

    A General Retraining Framework for Scalable Adversarial Classification

    Authors: Bo Li, Yevgeniy Vorobeychik, Xinyun Chen

    Abstract: Traditional classification algorithms assume that training and test data come from similar distributions. This assumption is violated in adversarial settings, where malicious actors modify instances to evade detection. A number of custom methods have been developed for both adversarial evasion attacks and robust learning. We propose the first systematic and general-purpose retraining framework whi… ▽ More

    Submitted 26 November, 2016; v1 submitted 9 April, 2016; originally announced April 2016.

  6. Predicting Human Cooperation

    Authors: John J. Nay, Yevgeniy Vorobeychik

    Abstract: The Prisoner's Dilemma has been a subject of extensive research due to its importance in understanding the ever-present tension between individual self-interest and social benefit. A strictly dominant strategy in a Prisoner's Dilemma (defection), when played by both players, is mutually harmful. Repetition of the Prisoner's Dilemma can give rise to cooperation as an equilibrium, but defection is a… ▽ More

    Submitted 5 April, 2016; v1 submitted 28 January, 2016; originally announced January 2016.

    Comments: Added references. New inline citation style. Added small portions of text. Re-compiled Rmarkdown file with updated ggplot2 so small aesthetic changes to plots

    Journal ref: PLoS ONE 11(5): e0155656 (2016)

  7. arXiv:1505.07548  [pdf, other

    cs.GT cs.AI

    Multidefender Security Games

    Authors: Jian Lou, Andrew M. Smith, Yevgeniy Vorobeychik

    Abstract: Stackelberg security game models and associated computational tools have seen deployment in a number of high-consequence security settings, such as LAX canine patrols and Federal Air Marshal Service. These models focus on isolated systems with only one defender, despite being part of a more complex system with multiple players. Furthermore, many real systems such as transportation networks and the… ▽ More

    Submitted 28 May, 2015; originally announced May 2015.

  8. arXiv:1501.00715  [pdf, other

    cs.GT

    Mechanism Design for Team Formation

    Authors: Mason Wright, Yevgeniy Vorobeychik

    Abstract: Team formation is a core problem in AI. Remarkably, little prior work has addressed the problem of mechanism design for team formation, accounting for the need to elicit agents' preferences over potential teammates. Coalition formation in the related hedonic games has received much attention, but only from the perspective of coalition stability, with little emphasis on the mechanism design objecti… ▽ More

    Submitted 4 January, 2015; originally announced January 2015.

    Comments: 12 pages

  9. arXiv:1409.4360  [pdf, other

    nlin.CD cs.DM nlin.CG

    Characterizing short-term stability for Boolean networks over any distribution of transfer functions

    Authors: C. Seshadhri, Andrew M. Smith, Yevgeniy Vorobeychik, Jackson Mayo, Robert C. Armstrong

    Abstract: We present a characterization of short-term stability of random Boolean networks under \emph{arbitrary} distributions of transfer functions. Given any distribution of transfer functions for a random Boolean network, we present a formula that decides whether short-term chaos (damage spreading) will happen. We provide a formal proof for this formula, and empirically show that its predictions are acc… ▽ More

    Submitted 15 September, 2014; originally announced September 2014.

    Journal ref: Phys. Rev. E 94, 012301 (2016)

  10. arXiv:1210.4873  [pdf

    cs.GT cs.CR

    Computing Optimal Security Strategies for Interdependent Assets

    Authors: Joshua Letchford, Yevgeniy Vorobeychik

    Abstract: We introduce a novel framework for computing optimal randomized security policies in networked domains which extends previous approaches in several ways. First, we extend previous linear programming techniques for Stackelberg security games to incorporate benefits and costs of arbitrary security configurations on individual assets. Second, we offer a principled model of failure cascades that allow… ▽ More

    Submitted 16 October, 2012; originally announced October 2012.

    Comments: Appears in Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI2012)

    Report number: UAI-P-2012-PG-459-468

  11. arXiv:1206.5288  [pdf

    cs.GT cs.AI

    Constrained Automated Mechanism Design for Infinite Games of Incomplete Information

    Authors: Yevgeniy Vorobeychik, Daniel Reeves, Michael P. Wellman

    Abstract: We present a functional framework for automated mechanism design based on a two-stage game model of strategic interaction between the designer and the mechanism participants, and apply it to several classes of two-player infinite games of incomplete information. At the core of our framework is a black-box optimization algorithm which guides the selection process of candidate mechanisms. Our approa… ▽ More

    Submitted 20 June, 2012; originally announced June 2012.

    Comments: Appears in Proceedings of the Twenty-Third Conference on Uncertainty in Artificial Intelligence (UAI2007)

    Report number: UAI-P-2007-PG-400-407

  12. arXiv:1205.2607  [pdf

    cs.GT

    Simulation-Based Game Theoretic Analysis of Keyword Auctions with Low-Dimensional Bidding Strategies

    Authors: Yevgeniy Vorobeychik

    Abstract: We perform a simulation-based analysis of keyword auctions modeled as one-shot games of incomplete information to study a series of mechanism design questions. Our first question addresses the degree to which incentive compatibility fails in generalized second-price (GSP) auctions. Our results suggest that sincere bidding in GSP auctions is a strikingly poor strategy and a poor predictor of equili… ▽ More

    Submitted 9 May, 2012; originally announced May 2012.

    Comments: Appears in Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence (UAI2009)

    Report number: UAI-P-2009-PG-583-590

  13. arXiv:1107.3792  [pdf, other

    cond-mat.dis-nn cs.AI cs.DM nlin.AO

    Influence and Dynamic Behavior in Random Boolean Networks

    Authors: C. Seshadhri, Yevgeniy Vorobeychik, Jackson R. Mayo, Robert C. Armstrong, Joseph R. Ruthruff

    Abstract: We present a rigorous mathematical framework for analyzing dynamics of a broad class of Boolean network models. We use this framework to provide the first formal proof of many of the standard critical transition results in Boolean network analysis, and offer analogous characterizations for novel classes of random Boolean networks. We precisely connect the short-run dynamic behavior of a Boolean ne… ▽ More

    Submitted 19 July, 2011; originally announced July 2011.

    Comments: To appear as a Letter in Physical Review Letters 8 pages, 4 figures

    Journal ref: Phys. Rev. Lett. 107, 108701 (2011)

  14. Price Prediction in a Trading Agent Competition

    Authors: K. M. Lochner, D. M. Reeves, Y. Vorobeychik, M. P. Wellman

    Abstract: The 2002 Trading Agent Competition (TAC) presented a challenging market game in the domain of travel shopping. One of the pivotal issues in this domain is uncertainty about hotel prices, which have a significant influence on the relative cost of alternative trip schedules. Thus, virtually all participants employ some method for predicting hotel prices. We survey approaches employed in the tourn… ▽ More

    Submitted 30 June, 2011; originally announced July 2011.

    Journal ref: Journal Of Artificial Intelligence Research, Volume 21, pages 19-36, 2004

  15. arXiv:1104.3103  [pdf, other

    cs.GT cond-mat.dis-nn physics.soc-ph

    Noncooperatively Optimized Tolerance: Decentralized Strategic Optimization in Complex Systems

    Authors: Yevgeniy Vorobeychik, Jackson Mayo, Robert Armstrong, Joseph Ruthruff

    Abstract: We introduce noncooperatively optimized tolerance (NOT), a generalization of highly optimized tolerance (HOT) that involves strategic (game theoretic) interactions between parties in a complex system. We illustrate our model in the forest fire (percolation) framework. As the number of players increases, our model retains features of HOT, such as robustness, high yield combined with high density, a… ▽ More

    Submitted 15 April, 2011; originally announced April 2011.

    Journal ref: Physical Review Letters, 107:108702, 2011