Zum Hauptinhalt springen

Showing 1–50 of 82 results for author: Swami, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.12702  [pdf, other

    cs.NI

    Ant Backpressure Routing for Wireless Multi-hop Networks with Mixed Traffic Patterns

    Authors: Negar Erfaniantaghvayi, Zhongyuan Zhao, Kevin Chan, Gunjan Verma, Ananthram Swami, Santiago Segarra

    Abstract: A mixture of streaming and short-lived traffic presents a common yet challenging scenario for Backpressure routing in wireless multi-hop networks. Although state-of-the-art shortest-path biased backpressure (SP-BP) can significantly improve the latency of backpressure routing while retaining throughput optimality, it still suffers from the last-packet problem due to its inherent per-commodity queu… ▽ More

    Submitted 22 August, 2024; originally announced August 2024.

  2. arXiv:2408.00193  [pdf, other

    cs.CR cs.AI

    Resilience and Security of Deep Neural Networks Against Intentional and Unintentional Perturbations: Survey and Research Challenges

    Authors: Sazzad Sayyed, Milin Zhang, Shahriar Rifat, Ananthram Swami, Michael De Lucia, Francesco Restuccia

    Abstract: In order to deploy deep neural networks (DNNs) in high-stakes scenarios, it is imperative that DNNs provide inference robust to external perturbations - both intentional and unintentional. Although the resilience of DNNs to intentional and unintentional perturbations has been widely investigated, a unified vision of these inherently intertwined problem domains is still missing. In this work, we fi… ▽ More

    Submitted 2 August, 2024; v1 submitted 31 July, 2024; originally announced August 2024.

  3. arXiv:2407.09753  [pdf, other

    cs.NI cs.LG eess.SP

    Biased Backpressure Routing Using Link Features and Graph Neural Networks

    Authors: Zhongyuan Zhao, Bojan Radojičić, Gunjan Verma, Ananthram Swami, Santiago Segarra

    Abstract: To reduce the latency of Backpressure (BP) routing in wireless multi-hop networks, we propose to enhance the existing shortest path-biased BP (SP-BP) and sojourn time-based backlog metrics, since they introduce no additional time step-wise signaling overhead to the basic BP. Rather than relying on hop-distance, we introduce a new edge-weighted shortest path bias built on the scheduling duty cycle… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

    Comments: 14 pages, 15 figures, submitted to IEEE Transactions on Machine Learning in Communications and Networking. arXiv admin note: text overlap with arXiv:2310.04364, arXiv:2211.10748

    MSC Class: 05C12 (Primary) 05-08 (Secondary) ACM Class: C.2.2; C.2.1; I.2.11; I.2.6

  4. arXiv:2402.08769  [pdf, other

    cs.LG cs.DC

    FLASH: Federated Learning Across Simultaneous Heterogeneities

    Authors: Xiangyu Chang, Sk Miraj Ahmed, Srikanth V. Krishnamurthy, Basak Guler, Ananthram Swami, Samet Oymak, Amit K. Roy-Chowdhury

    Abstract: The key premise of federated learning (FL) is to train ML models across a diverse set of data-owners (clients), without exchanging local data. An overarching challenge to this date is client heterogeneity, which may arise not only from variations in data distribution, but also in data quality, as well as compute/communication latency. An integrated view of these diverse and concurrent sources of h… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

  5. arXiv:2401.10297  [pdf, other

    eess.SP cs.LG cs.NI

    Learning Non-myopic Power Allocation in Constrained Scenarios

    Authors: Arindam Chowdhury, Santiago Paternain, Gunjan Verma, Ananthram Swami, Santiago Segarra

    Abstract: We propose a learning-based framework for efficient power allocation in ad hoc interference networks under episodic constraints. The problem of optimal power allocation -- for maximizing a given network utility metric -- under instantaneous constraints has recently gained significant popularity. Several learnable algorithms have been proposed to obtain fast, effective, and near-optimal performance… ▽ More

    Submitted 17 January, 2024; originally announced January 2024.

    Comments: ASILOMAR 2023

  6. arXiv:2401.04130  [pdf, other

    cs.LG cs.AI

    Plug-and-Play Transformer Modules for Test-Time Adaptation

    Authors: Xiangyu Chang, Sk Miraj Ahmed, Srikanth V. Krishnamurthy, Basak Guler, Ananthram Swami, Samet Oymak, Amit K. Roy-Chowdhury

    Abstract: Parameter-efficient tuning (PET) methods such as LoRA, Adapter, and Visual Prompt Tuning (VPT) have found success in enabling adaptation to new domains by tuning small modules within a transformer model. However, the number of domains encountered during test time can be very large, and the data is usually unlabeled. Thus, adaptation to new domains is challenging; it is also impractical to generate… ▽ More

    Submitted 8 February, 2024; v1 submitted 5 January, 2024; originally announced January 2024.

  7. arXiv:2310.04364  [pdf, other

    cs.NI eess.SP

    Enhanced Backpressure Routing Using Wireless Link Features

    Authors: Zhongyuan Zhao, Gunjan Verma, Ananthram Swami, Santiago Segarra

    Abstract: Backpressure (BP) routing is a well-established framework for distributed routing and scheduling in wireless multi-hop networks. However, the basic BP scheme suffers from poor end-to-end delay due to the drawbacks of slow startup, random walk, and the last packet problem. Biased BP with shortest path awareness can address the first two drawbacks, and sojourn time-based backlog metrics were propose… ▽ More

    Submitted 14 October, 2023; v1 submitted 6 October, 2023; originally announced October 2023.

    Comments: 5 pages, 5 figures, accepted to IEEE CAMSAP 2023. arXiv admin note: text overlap with arXiv:2211.10748

    MSC Class: 05C90 ACM Class: C.2.1; C.2.2

  8. arXiv:2306.07938  [pdf, other

    cs.SI cs.LG eess.SP

    Deep Demixing: Reconstructing the Evolution of Network Epidemics

    Authors: Boning Li, Gojko Čutura, Ananthram Swami, Santiago Segarra

    Abstract: We propose the deep demixing (DDmix) model, a graph autoencoder that can reconstruct epidemics evolving over networks from partial or aggregated temporal information. Assuming knowledge of the network topology but not of the epidemic model, our goal is to estimate the complete propagation path of a disease spread. A data-driven approach is leveraged to overcome the lack of model awareness. To solv… ▽ More

    Submitted 10 June, 2023; originally announced June 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2011.09583

  9. arXiv:2306.06574  [pdf, other

    cs.NI cs.LG eess.SY

    Learnable Digital Twin for Efficient Wireless Network Evaluation

    Authors: Boning Li, Timofey Efimov, Abhishek Kumar, Jose Cortes, Gunjan Verma, Ananthram Swami, Santiago Segarra

    Abstract: Network digital twins (NDTs) facilitate the estimation of key performance indicators (KPIs) before physically implementing a network, thereby enabling efficient optimization of the network configuration. In this paper, we propose a learning-based NDT for network simulators. The proposed method offers a holistic representation of information flow in a wireless network by integrating node, edge, and… ▽ More

    Submitted 10 June, 2023; originally announced June 2023.

  10. arXiv:2304.10013  [pdf, other

    cs.NI

    HTNet: Dynamic WLAN Performance Prediction using Heterogenous Temporal GNN

    Authors: Hongkuan Zhou, Rajgopal Kannan, Ananthram Swami, Viktor Prasanna

    Abstract: Predicting the throughput of WLAN deployments is a classic problem that occurs in the design of robust and high performance WLAN systems. However, due to the increasingly complex communication protocols and the increase in interference between devices in denser and denser WLAN deployments, traditional methods either have substantial runtime or enormous prediction error and hence cannot be applied… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

    Comments: InfoCom'23

  11. arXiv:2304.09329  [pdf, other

    cs.LG cs.IT eess.SY

    Learning to Transmit with Provable Guarantees in Wireless Federated Learning

    Authors: Boning Li, Jake Perazzone, Ananthram Swami, Santiago Segarra

    Abstract: We propose a novel data-driven approach to allocate transmit power for federated learning (FL) over interference-limited wireless networks. The proposed method is useful in challenging scenarios where the wireless channel is changing during the FL training process and when the training data are not independent and identically distributed (non-i.i.d.) on the local devices. Intuitively, the power po… ▽ More

    Submitted 11 December, 2023; v1 submitted 18 April, 2023; originally announced April 2023.

  12. arXiv:2304.00446  [pdf, other

    eess.SP cs.LG

    Deep Graph Unfolding for Beamforming in MU-MIMO Interference Networks

    Authors: Arindam Chowdhury, Gunjan Verma, Ananthram Swami, Santiago Segarra

    Abstract: We develop an efficient and near-optimal solution for beamforming in multi-user multiple-input-multiple-output single-hop wireless ad-hoc interference networks. Inspired by the weighted minimum mean squared error (WMMSE) method, a classical approach to solving this problem, and the principle of algorithm unfolding, we present unfolded WMMSE (UWMMSE) for MU-MIMO. This method learns a parameterized… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Comments: Under review at IEEE Trans. in Wireless Comm

  13. arXiv:2211.10748  [pdf, other

    eess.SP cs.LG

    Delay-aware Backpressure Routing Using Graph Neural Networks

    Authors: Zhongyuan Zhao, Bojan Radojicic, Gunjan Verma, Ananthram Swami, Santiago Segarra

    Abstract: We propose a throughput-optimal biased backpressure (BP) algorithm for routing, where the bias is learned through a graph neural network that seeks to minimize end-to-end delay. Classical BP routing provides a simple yet powerful distributed solution for resource allocation in wireless multi-hop networks but has poor delay performance. A low-cost approach to improve this delay performance is to fa… ▽ More

    Submitted 19 November, 2022; originally announced November 2022.

    Comments: 5 pages, 5 figures, submitted to IEEE ICASSP 2023

    MSC Class: 05-08 ACM Class: C.2.1

  14. arXiv:2203.14339  [pdf, other

    eess.SP cs.LG

    Distributed Link Sparsification for Scalable Scheduling Using Graph Neural Networks

    Authors: Zhongyuan Zhao, Ananthram Swami, Santiago Segarra

    Abstract: Distributed scheduling algorithms for throughput or utility maximization in dense wireless multi-hop networks can have overwhelmingly high overhead, causing increased congestion, energy consumption, radio footprint, and security vulnerability. For wireless networks with dense connectivity, we propose a distributed scheme for link sparsification with graph convolutional networks (GCNs), which can r… ▽ More

    Submitted 27 March, 2022; originally announced March 2022.

    Comments: 5 pages, 11 figures, accepted to IEEE ICASSP 2022. arXiv admin note: text overlap with arXiv:2111.07017

    MSC Class: 05-08 ACM Class: C.2.1

  15. arXiv:2111.07480  [pdf, other

    cs.LG cs.NI eess.SP

    Power Allocation for Wireless Federated Learning using Graph Neural Networks

    Authors: Boning Li, Ananthram Swami, Santiago Segarra

    Abstract: We propose a data-driven approach for power allocation in the context of federated learning (FL) over interference-limited wireless networks. The power policy is designed to maximize the transmitted information during the FL process under communication constraints, with the ultimate objective of improving the accuracy and efficiency of the global FL model being trained. The proposed power allocati… ▽ More

    Submitted 4 April, 2022; v1 submitted 14 November, 2021; originally announced November 2021.

  16. arXiv:2109.06992  [pdf, other

    cs.IT eess.SP

    ML-aided power allocation for Tactical MIMO

    Authors: Arindam Chowdhury, Gunjan Verma, Chirag Rao, Ananthram Swami, Santiago Segarra

    Abstract: We study the problem of optimal power allocation in single-hop multi-antenna ad-hoc wireless networks. A standard technique to solve this problem involves optimizing a tri-convex function under power constraints using a block-coordinate-descent based iterative algorithm. This approach, termed WMMSE, tends to be computationally complex and time consuming. Several learning-based approaches have been… ▽ More

    Submitted 28 October, 2021; v1 submitted 14 September, 2021; originally announced September 2021.

    Comments: Accepted at MILCOM 2021

  17. Link Scheduling using Graph Neural Networks

    Authors: Zhongyuan Zhao, Gunjan Verma, Chirag Rao, Ananthram Swami, Santiago Segarra

    Abstract: Efficient scheduling of transmissions is a key problem in wireless networks. The main challenge stems from the fact that optimal link scheduling involves solving a maximum weighted independent set (MWIS) problem, which is known to be NP-hard. In practical schedulers, centralized and distributed greedy heuristics are commonly used to approximately solve the MWIS problem. However, most of these gree… ▽ More

    Submitted 14 November, 2022; v1 submitted 12 September, 2021; originally announced September 2021.

    Comments: Main: 15 pages, 12 figures. Supplement: 5 pages, 7 figures. Accepted to IEEE Transactions on Wireless Communications. arXiv admin note: text overlap with arXiv:2011.09430

    MSC Class: 05-08 ACM Class: C.2.1

    Journal ref: IEEE Transactions on Wireless Communications ( Volume: 22, Issue: 6, June 2023), Page(s): 3997 - 4012

  18. arXiv:2105.09182  [pdf, other

    cs.LG cs.SI

    Free Energy Node Embedding via Generalized Skip-gram with Negative Sampling

    Authors: Yu Zhu, Ananthram Swami, Santiago Segarra

    Abstract: A widely established set of unsupervised node embedding methods can be interpreted as consisting of two distinctive steps: i) the definition of a similarity matrix based on the graph of interest followed by ii) an explicit or implicit factorization of such matrix. Inspired by this viewpoint, we propose improvements in both steps of the framework. On the one hand, we propose to encode node similari… ▽ More

    Submitted 9 September, 2022; v1 submitted 19 May, 2021; originally announced May 2021.

  19. arXiv:2101.01081  [pdf, ps, other

    cs.NI

    Additive Link Metrics Identification: Proof of Selected Lemmas and Propositions

    Authors: Liang Ma, Ting He, Kin K. Leung, Don Towsley, Ananthram Swami

    Abstract: This is a technical report, containing all the lemma and proposition proofs in paper "Topological Constraints on Identifying Additive Link Metrics via End-to-end Paths Measurements" by Liang Ma, Ting He, Kin K. Leung, Don Towsley, and Ananthram Swami, published in Annual Conference of The International Technology Alliance (ACITA), 2012.

    Submitted 17 December, 2020; originally announced January 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2012.12190

  20. arXiv:2012.12191  [pdf, ps, other

    cs.NI

    Efficient Identification of Additive Link Metrics: Theorem Proof and Evaluations

    Authors: Liang Ma, Ting He, Kin K. Leung, Don Towsley, Ananthram Swami

    Abstract: This is a technical report, containing all the theorem proofs and additional evaluations in paper "Efficient Identification of Additive Link Metrics via Network Tomography" by Liang Ma, Ting He, Kin K. Leung, Don Towsley, and Ananthram Swami, published in IEEE ICDCS, 2013.

    Submitted 17 December, 2020; originally announced December 2020.

  21. arXiv:2012.12190  [pdf, ps, other

    cs.NI

    Identification of Additive Link Metrics: Proof of Selected Theorems

    Authors: Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, Don Towsley

    Abstract: This is a technical report, containing all the theorem proofs in the following two papers: (1) Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, and Don Towsley, "Identifiability of Link Metrics Based on End-to-end Path Measurements," in ACM IMC, 2013. (2) Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, and Don Towsley, "Inferring Link Metrics from End-to-end Path Measurements: Identifiability a… ▽ More

    Submitted 23 December, 2020; v1 submitted 17 December, 2020; originally announced December 2020.

    Comments: References are updated

  22. arXiv:2012.11378  [pdf, ps, other

    cs.NI

    Partial Network Identifiability: Theorem Proof and Evaluation

    Authors: Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, Don Towsley

    Abstract: This is a technical report, containing all the theorem proofs and additional evaluations in paper "Monitor Placement for Maximal Identifiability in Network Tomography" by Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, Don Towsley, published in IEEE INFOCOM, 2014.

    Submitted 17 December, 2020; originally announced December 2020.

  23. arXiv:2012.09972  [pdf, ps, other

    cs.NI

    Link Identifiability with Two Monitors: Proof of Selected Theorems

    Authors: Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, Don Towsley

    Abstract: This is a technical report, containing all the theorem proofs in paper "Link Identifiability in Communication Networks with Two Monitors" by Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, and Don Towsley, published in IEEE Globecom, 2013.

    Submitted 24 December, 2020; v1 submitted 17 December, 2020; originally announced December 2020.

    Comments: Auxiliary algorithms are removed from this report as they exist in the main (IEEE Globecom'13) paper. arXiv admin note: substantial text overlap with arXiv:2012.11378

  24. arXiv:2012.09964  [pdf, ps, other

    cs.NI

    Fundamental Theories in Node Failure Localization

    Authors: Liang Ma, Ting He, Ananthram Swami, Don Towsley, Kin K. Leung, Jessica Lowe

    Abstract: This is a technical report, containing all the theorem proofs in paper "Node Failure Localization in Communication Networks via Network Tomography" by Liang Ma, Ting He, Ananthram Swami, Don Towsley, Kin K. Leung, and Jessica Lowe, published in ITA Annual Fall Meeting, 2014.

    Submitted 17 December, 2020; originally announced December 2020.

    Comments: arXiv admin note: text overlap with arXiv:2012.09959

  25. arXiv:2012.09959  [pdf, ps, other

    cs.NI

    Failure Localization Capability: Theorem Proof and Evaluation

    Authors: Liang Ma, Ting He, Ananthram Swami, Don Towsley, Kin K. Leung

    Abstract: This is a technical report, containing all the theorem proofs and additional evaluations in paper "Network Capability in Localizing Node Failures via End-to-end Path Measurements" by Liang Ma, Ting He, Ananthram Swami, Don Towsley, and Kin K. Leung, published in IEEE/ACM Transactions on Networking, vol. 25, no. 1, pp. 434-450, 2017.

    Submitted 26 December, 2020; v1 submitted 17 December, 2020; originally announced December 2020.

    Comments: Updated references

  26. arXiv:2012.09381  [pdf, ps, other

    cs.NI

    Node Failure Localization: Theorem Proof

    Authors: Liang Ma, Ting He, Ananthram Swami, Don Towsley, Kin K. Leung

    Abstract: This is a technical report, containing all the theorem proofs in paper "On Optimal Monitor Placement for Localizing Node Failures via Network Tomography" by Liang Ma, Ting He, Ananthram Swami, Don Towsley, and Kin K. Leung, published in IFIP WG 7.3 Performance, 2015.

    Submitted 16 December, 2020; originally announced December 2020.

  27. arXiv:2012.02250  [pdf, other

    eess.SP cs.LG

    Efficient power allocation using graph neural networks and deep algorithm unfolding

    Authors: Arindam Chowdhury, Gunjan Verma, Chirag Rao, Ananthram Swami, Santiago Segarra

    Abstract: We study the problem of optimal power allocation in a single-hop ad hoc wireless network. In solving this problem, we propose a hybrid neural architecture inspired by the algorithmic unfolding of the iterative weighted minimum mean squared error (WMMSE) method, that we denote as unfolded WMMSE (UWMMSE). The learnable weights within UWMMSE are parameterized using graph neural networks (GNNs), where… ▽ More

    Submitted 18 November, 2020; originally announced December 2020.

    Comments: Under review at IEEE ICASSP 2021. arXiv admin note: substantial text overlap with arXiv:2009.10812

  28. arXiv:2011.09430  [pdf, other

    eess.SP cs.LG

    Distributed Scheduling using Graph Neural Networks

    Authors: Zhongyuan Zhao, Gunjan Verma, Chirag Rao, Ananthram Swami, Santiago Segarra

    Abstract: A fundamental problem in the design of wireless networks is to efficiently schedule transmission in a distributed manner. The main challenge stems from the fact that optimal link scheduling involves solving a maximum weighted independent set (MWIS) problem, which is NP-hard. For practical link scheduling schemes, distributed greedy approaches are commonly used to approximate the solution of the MW… ▽ More

    Submitted 6 February, 2021; v1 submitted 18 November, 2020; originally announced November 2020.

    Comments: 5 pages, 6 figures, accepted to IEEE ICASSP 2021

    MSC Class: 05-08 ACM Class: C.2.1

  29. arXiv:2011.09418  [pdf, other

    eess.SP cs.LG

    Adaptive Contention Window Design using Deep Q-learning

    Authors: Abhishek Kumar, Gunjan Verma, Chirag Rao, Ananthram Swami, Santiago Segarra

    Abstract: We study the problem of adaptive contention window (CW) design for random-access wireless networks. More precisely, our goal is to design an intelligent node that can dynamically adapt its minimum CW (MCW) parameter to maximize a network-level utility knowing neither the MCWs of other nodes nor how these change over time. To achieve this goal, we adopt a reinforcement learning (RL) framework where… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

  30. arXiv:2011.04893  [pdf, other

    cs.PF cs.DC

    Resource Allocation in One-dimensional Distributed Service Networks with Applications

    Authors: Nitish K. Panigrahy, Prithwish Basu, Philippe Nain, Don Towsley, Ananthram Swami, Kevin S. Chan, Kin K. Leung

    Abstract: We consider assignment policies that allocate resources to users, where both resources and users are located on a one-dimensional line. First, we consider unidirectional assignment policies that allocate resources only to users located to their left. We propose the Move to Right (MTR) policy, which scans from left to right assigning nearest rightmost available resource to a user, and contrast it t… ▽ More

    Submitted 8 November, 2020; originally announced November 2020.

    Comments: arXiv admin note: text overlap with arXiv:1901.02414

  31. arXiv:2011.02653  [pdf, other

    cs.DC cs.NI cs.PF

    On the Analysis of Spatially Constrained Power of Two Choice Policies

    Authors: Nitish K. Panigrahy, Prithwish Basu, Don Towsley, Ananthram Swami, Kin K. Leung

    Abstract: We consider a class of power of two choice based assignment policies for allocating users to servers, where both users and servers are located on a two-dimensional Euclidean plane. In this framework, we investigate the inherent tradeoff between the communication cost, and load balancing performance of different allocation policies. To this end, we first design and evaluate a Spatial Power of two (… ▽ More

    Submitted 4 November, 2020; originally announced November 2020.

  32. You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning

    Authors: Shitong Zhu, Shasha Li, Zhongjie Wang, Xun Chen, Zhiyun Qian, Srikanth V. Krishnamurthy, Kevin S. Chan, Ananthram Swami

    Abstract: As Deep Packet Inspection (DPI) middleboxes become increasingly popular, a spectrum of adversarial attacks have emerged with the goal of evading such middleboxes. Many of these attacks exploit discrepancies between the middlebox network protocol implementations, and the more rigorous/complete versions implemented at end hosts. These evasion attacks largely involve subtle manipulations of packets t… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

    Comments: 12 pages, 12 figures; accepted to ACM CoNEXT 2020

  33. arXiv:2010.04259  [pdf, other

    cs.LG cs.AI

    Unsupervised Joint $k$-node Graph Representations with Compositional Energy-Based Models

    Authors: Leonardo Cotta, Carlos H. C. Teixeira, Ananthram Swami, Bruno Ribeiro

    Abstract: Existing Graph Neural Network (GNN) methods that learn inductive unsupervised graph representations focus on learning node and edge representations by predicting observed edges in the graph. Although such approaches have shown advances in downstream node classification tasks, they are ineffective in jointly representing larger $k$-node sets, $k{>}2$. We propose MHM-GNN, an inductive unsupervised g… ▽ More

    Submitted 8 October, 2020; originally announced October 2020.

    Comments: accepted at NeurIPS 2020

  34. arXiv:2009.08097  [pdf, other

    cs.LG cs.AI stat.ML

    An Extension of Fano's Inequality for Characterizing Model Susceptibility to Membership Inference Attacks

    Authors: Sumit Kumar Jha, Susmit Jha, Rickard Ewetz, Sunny Raj, Alvaro Velasquez, Laura L. Pullum, Ananthram Swami

    Abstract: Deep neural networks have been shown to be vulnerable to membership inference attacks wherein the attacker aims to detect whether specific input data were used to train the model. These attacks can potentially leak private or proprietary data. We present a new extension of Fano's inequality and employ it to theoretically establish that the probability of success for a membership inference attack o… ▽ More

    Submitted 17 September, 2020; originally announced September 2020.

    Comments: 9 pages, 3 figures

    ACM Class: I.2.0

  35. arXiv:2008.11772  [pdf, ps, other

    cs.CV

    Measurement-driven Security Analysis of Imperceptible Impersonation Attacks

    Authors: Shasha Li, Karim Khalil, Rameswar Panda, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami

    Abstract: The emergence of Internet of Things (IoT) brings about new security challenges at the intersection of cyber and physical spaces. One prime example is the vulnerability of Face Recognition (FR) based access control in IoT systems. While previous research has shown that Deep Neural Network(DNN)-based FR systems (FRS) are potentially susceptible to imperceptible impersonation attacks, the potency of… ▽ More

    Submitted 26 August, 2020; originally announced August 2020.

    Comments: accepted and appears in ICCCN 2020

  36. arXiv:2007.09763  [pdf, other

    cs.CV cs.LG

    Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency

    Authors: Shasha Li, Shitong Zhu, Sudipta Paul, Amit Roy-Chowdhury, Chengyu Song, Srikanth Krishnamurthy, Ananthram Swami, Kevin S Chan

    Abstract: There has been a recent surge in research on adversarial perturbations that defeat Deep Neural Networks (DNNs) in machine vision; most of these perturbation-based attacks target object classifiers. Inspired by the observation that humans are able to recognize objects that appear out of place in a scene or along with other unlikely objects, we augment the DNN with a system that learns context consi… ▽ More

    Submitted 24 July, 2020; v1 submitted 19 July, 2020; originally announced July 2020.

    Comments: The paper is accepted by ECCV 2020

  37. arXiv:2007.08025  [pdf, ps, other

    cs.LG stat.ML

    GraphCL: Contrastive Self-Supervised Learning of Graph Representations

    Authors: Hakim Hafidi, Mounir Ghogho, Philippe Ciblat, Ananthram Swami

    Abstract: We propose Graph Contrastive Learning (GraphCL), a general framework for learning node representations in a self supervised manner. GraphCL learns node embeddings by maximizing the similarity between the representations of two randomly perturbed versions of the intrinsic features and link structure of the same node's local subgraph. We use graph neural networks to produce two representations of th… ▽ More

    Submitted 15 July, 2020; originally announced July 2020.

    Comments: Under review for Neurips 2020

  38. arXiv:2005.07880  [pdf, other

    eess.SP cs.NI stat.AP

    Topology Inference with Multivariate Cumulants: The Möbius Inference Algorithm

    Authors: Kevin D. Smith, Saber Jafarpour, Ananthram Swami, Francesco Bullo

    Abstract: Many tasks regarding the monitoring, management, and design of communication networks rely on knowledge of the routing topology. However, the standard approach to topology mapping--namely, active probing with traceroutes--relies on cooperation from increasingly non-cooperative routers, leading to missing information. Network tomography, which uses end-to-end measurements of additive link metrics (… ▽ More

    Submitted 18 June, 2021; v1 submitted 16 May, 2020; originally announced May 2020.

  39. A Multifactorial Optimization Paradigm for Linkage Tree Genetic Algorithm

    Authors: Huynh Thi Thanh Binh, Pham Dinh Thanh, Tran Ba Trung, Le Cong Thanh, Le Minh Hai Phong, Ananthram Swami, Bui Thu Lam

    Abstract: Linkage Tree Genetic Algorithm (LTGA) is an effective Evolutionary Algorithm (EA) to solve complex problems using the linkage information between problem variables. LTGA performs well in various kinds of single-task optimization and yields promising results in comparison with the canonical genetic algorithm. However, LTGA is an unsuitable method for dealing with multi-task optimization problems. O… ▽ More

    Submitted 6 May, 2020; originally announced May 2020.

    Report number: INS_15553

    Journal ref: InformationSciences. 540 (2020) 325-344

  40. arXiv:2001.04229  [pdf, other

    cs.GT cs.DC cs.MA cs.NI

    Resource Sharing in the Edge: A Distributed Bargaining-Theoretic Approach

    Authors: Faheem Zafari, Prithwish Basu, Kin K. Leung, Jian Li, Ananthram Swami, Don Towsley

    Abstract: The growing demand for edge computing resources, particularly due to increasing popularity of Internet of Things (IoT), and distributed machine/deep learning applications poses a significant challenge. On the one hand, certain edge service providers (ESPs) may not have sufficient resources to satisfy their applications according to the associated service-level agreements. On the other hand, some E… ▽ More

    Submitted 4 July, 2020; v1 submitted 13 January, 2020; originally announced January 2020.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  41. arXiv:2001.00567  [pdf, other

    cs.NI cs.DC cs.MA

    Let's Share: A Game-Theoretic Framework for Resource Sharing in Mobile Edge Clouds

    Authors: Faheem Zafari, Kin K. Leung, Don Towsley, Prithwish Basu, Ananthram Swami, Jian Li

    Abstract: Mobile edge computing seeks to provide resources to different delay-sensitive applications. This is a challenging problem as an edge cloud-service provider may not have sufficient resources to satisfy all resource requests. Furthermore, allocating available resources optimally to different applications is also challenging. Resource sharing among different edge cloud-service providers can address t… ▽ More

    Submitted 2 January, 2020; originally announced January 2020.

    Comments: The paper is currently under review in IEEE Transactions on Network and Service Management

  42. arXiv:1911.02970  [pdf, other

    cs.LG cs.CL stat.ML

    SENSE: Semantically Enhanced Node Sequence Embedding

    Authors: Swati Rallapalli, Liang Ma, Mudhakar Srivatsa, Ananthram Swami, Heesung Kwon, Graham Bent, Christopher Simpkin

    Abstract: Effectively capturing graph node sequences in the form of vector embeddings is critical to many applications. We achieve this by (i) first learning vector embeddings of single graph nodes and (ii) then composing them to compactly represent node sequences. Specifically, we propose SENSE-S (Semantically Enhanced Node Sequence Embedding - for Single nodes), a skip-gram based novel embedding mechanism… ▽ More

    Submitted 7 November, 2019; originally announced November 2019.

  43. arXiv:1910.06799  [pdf, other

    cs.LG cs.DC

    Federated Learning for Coalition Operations

    Authors: D. Verma, S. Calo, S. Witherspoon, E. Bertino, A. Abu Jabal, A. Swami, G. Cirincione, S. Julier, G. White, G. de Mel, G. Pearson

    Abstract: Machine Learning in coalition settings requires combining insights available from data assets and knowledge repositories distributed across multiple coalition partners. In tactical environments, this requires sharing the assets, knowledge and models in a bandwidth-constrained environment, while staying in conformance with the privacy, security and other applicable policies for each coalition membe… ▽ More

    Submitted 14 October, 2019; originally announced October 2019.

    Comments: Presented at AAAI FSS-19: Artificial Intelligence in Government and Public Sector, Arlington, Virginia, USA

  44. arXiv:1909.09063  [pdf, other

    cs.NI cs.LG

    MACS: Deep Reinforcement Learning based SDN Controller Synchronization Policy Design

    Authors: Ziyao Zhang, Liang Ma, Konstantinos Poularakis, Kin K. Leung, Jeremy Tucker, Ananthram Swami

    Abstract: In distributed software-defined networks (SDN), multiple physical SDN controllers, each managing a network domain, are implemented to balance centralised control, scalability, and reliability requirements. In such networking paradigms, controllers synchronize with each other, in attempts to maintain a logically centralised network view. Despite the presence of various design proposals for distribu… ▽ More

    Submitted 19 September, 2019; originally announced September 2019.

    Comments: Published as a conference paper at ICNP 2019

  45. arXiv:1904.00820  [pdf, other

    cs.MA cs.NI

    A Game-Theoretic Framework for Resource Sharing in Clouds

    Authors: Faheem Zafari, Kin K. Leung, Don Towsley, Prithwish Basu, Ananthram Swami

    Abstract: Providing resources to different users or applications is fundamental to cloud computing. This is a challenging problem as a cloud service provider may have insufficient resources to satisfy all user requests. Furthermore, allocating available resources optimally to different applications is also challenging. Resource sharing among different cloud service providers can improve resource availabilit… ▽ More

    Submitted 28 May, 2019; v1 submitted 1 April, 2019; originally announced April 2019.

    Comments: The paper has been accepted for publication in IFIP WMNC 2019, Paris France

  46. arXiv:1903.05821  [pdf, other

    cs.LG stat.ML

    Attribution-driven Causal Analysis for Detection of Adversarial Examples

    Authors: Susmit Jha, Sunny Raj, Steven Lawrence Fernandes, Sumit Kumar Jha, Somesh Jha, Gunjan Verma, Brian Jalaian, Ananthram Swami

    Abstract: Attribution methods have been developed to explain the decision of a machine learning model on a given input. We use the Integrated Gradient method for finding attributions to define the causal neighborhood of an input by incrementally masking high attribution features. We study the robustness of machine learning models on benign and adversarial inputs in this neighborhood. Our study indicates tha… ▽ More

    Submitted 14 March, 2019; originally announced March 2019.

    Comments: 11 pages, 6 figures

  47. arXiv:1901.02414  [pdf, other

    cs.PF

    Resource Allocation in One-dimensional Distributed Service Networks

    Authors: Nitish K. Panigrahy, Prithwish Basu, Philippe Nain, Don Towsley, Ananthram Swami, Kevin S. Chan, Kin K. Leung

    Abstract: We consider assignment policies that allocate resources to users, where both resources and users are located on a one-dimensional line. First, we consider unidirectional assignment policies that allocate resources only to users located to their left. We propose the Move to Right (MTR) policy, which scans from left to right assigning nearest rightmost available resource to a user, and contrast it t… ▽ More

    Submitted 11 February, 2020; v1 submitted 8 January, 2019; originally announced January 2019.

  48. A Game-Theoretic Approach to Multi-Objective Resource Sharing and Allocation in Mobile Edge Clouds

    Authors: Faheem Zafari, Jian Li, Kin K Leung, Don Towsley, Ananthram Swami

    Abstract: Mobile edge computing seeks to provide resources to different delay-sensitive applications. However, allocating the limited edge resources to a number of applications is a challenging problem. To alleviate the resource scarcity problem, we propose sharing of resources among multiple edge computing service providers where each service provider has a particular utility to optimize. We model the reso… ▽ More

    Submitted 25 August, 2018; v1 submitted 21 August, 2018; originally announced August 2018.

    Comments: The paper has been accepted for publication in ACM Mobicom workshop "Technologies for the Wireless Edge" 2018

  49. arXiv:1807.00458  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Adversarial Perturbations Against Real-Time Video Classification Systems

    Authors: Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy Chowdhury, Ananthram Swami

    Abstract: Recent research has demonstrated the brittleness of machine learning systems to adversarial perturbations. However, the studies have been mostly limited to perturbations on images and more generally, classification that does not deal with temporally varying inputs. In this paper we ask "Are adversarial perturbations possible in real-time video classification systems and if so, what properties must… ▽ More

    Submitted 2 July, 2018; originally announced July 2018.

    Journal ref: Network and Distributed Systems Security (NDSS) Symposium 2019 24-27 February 2019, San Diego, CA, USA

  50. arXiv:1805.04983  [pdf, other

    cs.SI

    CARL: Content-Aware Representation Learning for Heterogeneous Networks

    Authors: Chuxu Zhang, Ananthram Swami, Nitesh V. Chawla

    Abstract: Heterogeneous networks not only present a challenge of heterogeneity in the types of nodes and relations, but also the attributes and content associated with the nodes. While recent works have looked at representation learning on homogeneous and heterogeneous networks, there is no work that has collectively addressed the following challenges: (a) the heterogeneous structural information of the net… ▽ More

    Submitted 13 May, 2018; originally announced May 2018.

    Comments: 9 pages