Zum Hauptinhalt springen

Showing 1–21 of 21 results for author: Park, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.20542  [pdf, ps, other

    cs.LG stat.ML

    On the Connection Between Non-negative Matrix Factorization and Latent Dirichlet Allocation

    Authors: Benedikt Geiger, Peter J. Park

    Abstract: Non-negative matrix factorization with the generalized Kullback-Leibler divergence (NMF) and latent Dirichlet allocation (LDA) are two popular approaches for dimensionality reduction of non-negative data. Here, we show that NMF with $\ell_1$ normalization constraints on the columns of both matrices of the decomposition and a Dirichlet prior on the columns of one matrix is equivalent to LDA. To sho… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: 9 pages

    MSC Class: 62H30; 15A23; 62H22; 62F15; 68W40

  2. arXiv:2403.07126  [pdf, other

    stat.AP cs.CV

    Heterogeneous Image-based Classification Using Distributional Data Analysis

    Authors: Alec Reinhardt, Newsha Nikzad, Raven J. Hollis, Galia Jacobson, Millicent A. Roach, Mohamed Badawy, Peter Chul Park, Laura Beretta, Prasun K Jalal, David T. Fuentes, Eugene J. Koay, Suprateek Kundu

    Abstract: Diagnostic imaging has gained prominence as potential biomarkers for early detection and diagnosis in a diverse array of disorders including cancer. However, existing methods routinely face challenges arising from various factors such as image heterogeneity. We develop a novel imaging-based distributional data analysis (DDA) approach that incorporates the probability (quantile) distribution of the… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: 16, 2 figures, 3 tables

  3. arXiv:2402.19379  [pdf, other

    cs.CY cs.AI cs.CL cs.LG

    Wisdom of the Silicon Crowd: LLM Ensemble Prediction Capabilities Rival Human Crowd Accuracy

    Authors: Philipp Schoenegger, Indre Tuminauskaite, Peter S. Park, Philip E. Tetlock

    Abstract: Human forecasting accuracy in practice relies on the 'wisdom of the crowd' effect, in which predictions about future events are significantly improved by aggregating across a crowd of individual forecasters. Past work on the forecasting ability of large language models (LLMs) suggests that frontier LLMs, as individual forecasters, underperform compared to the gold standard of a human crowd forecas… ▽ More

    Submitted 22 July, 2024; v1 submitted 29 February, 2024; originally announced February 2024.

    Comments: 20 pages; 13 visualizations (nine figures, four tables)

  4. arXiv:2402.07862  [pdf, other

    cs.CY cs.AI cs.CL cs.LG

    AI-Augmented Predictions: LLM Assistants Improve Human Forecasting Accuracy

    Authors: Philipp Schoenegger, Peter S. Park, Ezra Karger, Sean Trott, Philip E. Tetlock

    Abstract: Large language models (LLMs) match and sometimes exceeding human performance in many domains. This study explores the potential of LLMs to augment human judgement in a forecasting task. We evaluate the effect on human forecasters of two LLM assistants: one designed to provide high-quality ("superforecasting") advice, and the other designed to be overconfident and base-rate neglecting, thus providi… ▽ More

    Submitted 22 August, 2024; v1 submitted 12 February, 2024; originally announced February 2024.

    Comments: 22 pages pages (main text comprised of 19 pages, appendix comprised of three pages). 10 visualizations in the main text (four figures, six tables), three additional figures in the appendix

  5. arXiv:2402.06185  [pdf, other

    cs.CV cs.AI cs.LG

    Development and validation of an artificial intelligence model to accurately predict spinopelvic parameters

    Authors: Edward S. Harake, Joseph R. Linzey, Cheng Jiang, Rushikesh S. Joshi, Mark M. Zaki, Jaes C. Jones, Siri S. Khalsa, John H. Lee, Zachary Wilseck, Jacob R. Joseph, Todd C. Hollon, Paul Park

    Abstract: Objective. Achieving appropriate spinopelvic alignment has been shown to be associated with improved clinical symptoms. However, measurement of spinopelvic radiographic parameters is time-intensive and interobserver reliability is a concern. Automated measurement tools have the promise of rapid and consistent measurements, but existing tools are still limited by some degree of manual user-entry re… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

    Comments: 10 pages, 5 figures, to appear in Journal of Neurosurgery: Spine

  6. arXiv:2310.13014  [pdf, other

    cs.CY cs.AI cs.CL cs.LG

    Large Language Model Prediction Capabilities: Evidence from a Real-World Forecasting Tournament

    Authors: Philipp Schoenegger, Peter S. Park

    Abstract: Accurately predicting the future would be an important milestone in the capabilities of artificial intelligence. However, research on the ability of large language models to provide probabilistic predictions about future events remains nascent. To empirically test this ability, we enrolled OpenAI's state-of-the-art large language model, GPT-4, in a three-month forecasting tournament hosted on the… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

    Comments: 13 pages, six visualizations (four figures, two tables)

  7. arXiv:2310.06009  [pdf, other

    cs.CY cs.AI cs.LG

    Divide-and-Conquer Dynamics in AI-Driven Disempowerment

    Authors: Peter S. Park, Max Tegmark

    Abstract: AI companies are attempting to create AI systems that outperform humans at most economically valuable work. Current AI models are already automating away the livelihoods of some artists, actors, and writers. But there is infighting between those who prioritize current harms and future harms. We construct a game-theoretic model of conflict to study the causes and consequences of this disunity. Our… ▽ More

    Submitted 18 December, 2023; v1 submitted 9 October, 2023; originally announced October 2023.

    Comments: 28 pages, nine visualizations (seven figures and two tables)

  8. arXiv:2308.14752  [pdf, other

    cs.CY cs.AI cs.HC

    AI Deception: A Survey of Examples, Risks, and Potential Solutions

    Authors: Peter S. Park, Simon Goldstein, Aidan O'Gara, Michael Chen, Dan Hendrycks

    Abstract: This paper argues that a range of current AI systems have learned how to deceive humans. We define deception as the systematic inducement of false beliefs in the pursuit of some outcome other than the truth. We first survey empirical examples of AI deception, discussing both special-use AI systems (including Meta's CICERO) built for specific competitive situations, and general-purpose AI systems (… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

    Comments: 18 pages (not including executive summary, references, and appendix), six figures

  9. arXiv:2308.12287  [pdf, other

    cs.CR

    Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models

    Authors: Fredrik Heiding, Bruce Schneier, Arun Vishwanath, Jeremy Bernstein, Peter S. Park

    Abstract: AI programs, built using large language models, make it possible to automatically create phishing emails based on a few data points about a user. They stand in contrast to traditional phishing emails that hackers manually design using general rules gleaned from experience. The V-Triad is an advanced set of rules for manually designing phishing emails to exploit our cognitive heuristics and biases.… ▽ More

    Submitted 30 November, 2023; v1 submitted 23 August, 2023; originally announced August 2023.

  10. Performance Evaluation of Transport Protocols and Roadmap to a High-Performance Transport Design for Immersive Applications

    Authors: Inayat Ali, Seungwoo Hong, Pyung-koo Park, Tae Yeon Kim

    Abstract: Immersive technologies such as virtual reality (VR), augmented reality (AR), and holograms will change users' digital experience. These immersive technologies have a multitude of applications, including telesurgeries, teleconferencing, Internet shopping, computer games, etc. Holographic-type communication (HTC) is a type of augmented reality media that provides an immersive experience to Internet… ▽ More

    Submitted 6 August, 2024; v1 submitted 29 June, 2023; originally announced June 2023.

    Comments: Accepted in The 14th International Conference on Ubiquitous and Future Networks (ICUFN 2023), Paris France, July 4-7 2023

  11. arXiv:2302.07267  [pdf

    cs.HC cs.AI cs.CL

    Diminished Diversity-of-Thought in a Standard Large Language Model

    Authors: Peter S. Park, Philipp Schoenegger, Chongyang Zhu

    Abstract: We test whether Large Language Models (LLMs) can be used to simulate human participants in social-science studies. To do this, we run replications of 14 studies from the Many Labs 2 replication project with OpenAI's text-davinci-003 model, colloquially known as GPT3.5. Based on our pre-registered analyses, we find that among the eight studies we could analyse, our GPT sample replicated 37.5% of th… ▽ More

    Submitted 13 September, 2023; v1 submitted 13 February, 2023; originally announced February 2023.

    Comments: 67 pages (42-page main text, 25-page SI); 12 visualizations (four tables and three figures in the main text, five figures in the SI); additional exploratory follow-up study varied the demographic details preceding the prompt; preregistered OSF database is available at https://osf.io/dzp8t/

    MSC Class: 68T50 ACM Class: I.2.7

  12. arXiv:2201.12416  [pdf, other

    cs.CR cs.LG cs.NI

    Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs

    Authors: Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter Beling, Edward Bowen

    Abstract: Reinforcement learning (RL), in conjunction with attack graphs and cyber terrain, are used to develop reward and state associated with determination of optimal paths for exfiltration of data in enterprise networks. This work builds on previous crown jewels (CJ) identification that focused on the target goal of computing optimal paths that adversaries may traverse toward compromising CJs or hosts w… ▽ More

    Submitted 25 April, 2022; v1 submitted 28 January, 2022; originally announced January 2022.

    Comments: The 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022)

  13. arXiv:2112.09379  [pdf

    cs.CV

    Enhanced Frame and Event-Based Simulator and Event-Based Video Interpolation Network

    Authors: Adam Radomski, Andreas Georgiou, Thomas Debrunner, Chenghan Li, Luca Longinotti, Minwon Seo, Moosung Kwak, Chang-Woo Shin, Paul K. J. Park, Hyunsurk Eric Ryu, Kynan Eng

    Abstract: Fast neuromorphic event-based vision sensors (Dynamic Vision Sensor, DVS) can be combined with slower conventional frame-based sensors to enable higher-quality inter-frame interpolation than traditional methods relying on fixed motion approximations using e.g. optical flow. In this work we present a new, advanced event simulator that can produce realistic scenes recorded by a camera rig with an ar… ▽ More

    Submitted 17 December, 2021; originally announced December 2021.

    Comments: 10 pages, 19 figures

  14. arXiv:2108.09358  [pdf, other

    cs.CR cs.LG cs.NI

    Crown Jewels Analysis using Reinforcement Learning with Attack Graphs

    Authors: Rohit Gangupantulu, Tyler Cody, Abdul Rahman, Christopher Redino, Ryan Clark, Paul Park

    Abstract: Cyber attacks pose existential threats to nations and enterprises. Current practice favors piece-wise analysis using threat-models in the stead of rigorous cyber terrain analysis and intelligence preparation of the battlefield. Automated penetration testing using reinforcement learning offers a new and promising approach for developing methodologies that are driven by network structure and cyber t… ▽ More

    Submitted 20 August, 2021; originally announced August 2021.

  15. arXiv:2108.07124  [pdf, other

    cs.LG cs.CR cs.NI

    Using Cyber Terrain in Reinforcement Learning for Penetration Testing

    Authors: Rohit Gangupantulu, Tyler Cody, Paul Park, Abdul Rahman, Logan Eisenbeiser, Dan Radke, Ryan Clark

    Abstract: Reinforcement learning (RL) has been applied to attack graphs for penetration testing, however, trained agents do not reflect reality because the attack graphs lack operational nuances typically captured within the intelligence preparation of the battlefield (IPB) that include notions of (cyber) terrain. In particular, current practice constructs attack graphs exclusively using the Common Vulnerab… ▽ More

    Submitted 4 August, 2022; v1 submitted 16 August, 2021; originally announced August 2021.

    Comments: 2022 IEEE International Conference on Omni-Layer Intelligent Systems (COINS)

  16. arXiv:2105.13503  [pdf, ps, other

    eess.SY cs.NI

    Wireless for Control: Over-the-Air Controller

    Authors: Pangun Park, Piergiuseppe Di Marco, Carlo Fischione

    Abstract: In closed-loop wireless control systems, the state-of-the-art approach prescribes that a controller receives by wireless communications the individual sensor measurements, and then sends the computed control signal to the actuators. We propose an over-the-air controller scheme where all sensors attached to the plant simultaneously transmit scaled sensing signals directly to the actuator; then the… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

  17. arXiv:2006.12060  [pdf, ps, other

    cs.NI

    Wireless Avionics Intra-Communications: A Survey of Benefits, Challenges, and Solutions

    Authors: Pangun Park, Piergiuseppe Di Marco, Junghyo Nah, Carlo Fischione

    Abstract: In the aeronautics industry, wireless avionics intra-communications have a tremendous potential to improve efficiency and flexibility while reducing the weight, fuel consumption, and maintenance costs over traditional wired avionics systems. This survey starts with an overview of the major benefits and opportunities in the deployment of wireless technologies for critical applications of an aircraf… ▽ More

    Submitted 22 June, 2020; originally announced June 2020.

  18. arXiv:1804.04762  [pdf

    cs.CR

    A Determination Scheme for Quasi-Identifiers Using Uniqueness and Influence for De-Identification of Clinical Data

    Authors: Jipmin Jung, Phillip Park, Jaedong Lee, Hyein Lee, Geonkook Lee, Hyosoung Cha

    Abstract: Objectives; The accumulation and usefulness of clinical data have increased with IT development. While using clinical data that needs to be identifiable to obtain meaningful information, it is essential to ensure that data is de-identified and unnecessary clinical information is minimized to protect personal information. This process requires criteria and an appropriate method as there are clear i… ▽ More

    Submitted 12 April, 2018; originally announced April 2018.

  19. arXiv:1708.07353  [pdf, ps, other

    eess.SY cs.IT cs.NI

    Wireless Network Design for Control Systems: A Survey

    Authors: Pangun Park, Sinem Coleri Ergen, Carlo Fischione, Chenyang Lu, Karl Henrik Johansson

    Abstract: Wireless networked control systems (WNCS) are composed of spatially distributed sensors, actuators, and con- trollers communicating through wireless networks instead of conventional point-to-point wired connections. Due to their main benefits in the reduction of deployment and maintenance costs, large flexibility and possible enhancement of safety, WNCS are becoming a fundamental infrastructure te… ▽ More

    Submitted 24 August, 2017; originally announced August 2017.

    Comments: 37 pages, 17 figures, 4 tables

  20. arXiv:1702.02700  [pdf, other

    cs.SI physics.soc-ph

    The Opacity Problem in Social Contagion

    Authors: George Berry, Christopher J. Cameron, Patrick Park, Michael W. Macy

    Abstract: Fads, product adoption, mobs, rumors, memes, and emergent norms are diverse social contagions that have been modeled as network cascades. Empirical study of these cascades is vulnerable to what we describe as the "opacity problem": the inability to observe the critical level of peer influence required to trigger an individual's behavioral change. Even with maximal information, network cascades rev… ▽ More

    Submitted 19 November, 2018; v1 submitted 8 February, 2017; originally announced February 2017.

    Comments: 31 pages, 7 figures, 2 tables

    ACM Class: C.2.1

    Journal ref: Social Networks Volume 56, January 2019, Pages 93-101

  21. arXiv:1303.0045  [pdf, other

    cs.SI physics.soc-ph

    The Mesh of Civilizations and International Email Flows

    Authors: Bogdan State, Patrick Park, Ingmar Weber, Yelena Mejova, Michael Macy

    Abstract: In The Clash of Civilizations, Samuel Huntington argued that the primary axis of global conflict was no longer ideological or economic but cultural and religious, and that this division would characterize the "battle lines of the future." In contrast to the "top down" approach in previous research focused on the relations among nation states, we focused on the flows of interpersonal communication… ▽ More

    Submitted 10 March, 2013; v1 submitted 28 February, 2013; originally announced March 2013.

    Comments: 10 pages, 3 figures

    ACM Class: H.3.5; J.4