Skip to main content

Showing 1–50 of 112 results for author: Vorobeychik, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.00170  [pdf, other

    cs.LG cs.CY

    Dataset Representativeness and Downstream Task Fairness

    Authors: Victor Borza, Andrew Estornell, Chien-Ju Ho, Bradley Malin, Yevgeniy Vorobeychik

    Abstract: Our society collects data on people for a wide range of applications, from building a census for policy evaluation to running meaningful clinical trials. To collect data, we typically sample individuals with the goal of accurately representing a population of interest. However, current sampling processes often collect data opportunistically from data sources, which can lead to datasets that are bi… ▽ More

    Submitted 28 June, 2024; originally announced July 2024.

    Comments: 48 pages, 32 figures

  2. arXiv:2406.07687  [pdf, other

    cs.LG cs.CR

    Adversarial Machine Unlearning

    Authors: Zonglin Di, Sixie Yu, Yevgeniy Vorobeychik, Yang Liu

    Abstract: This paper focuses on the challenge of machine unlearning, aiming to remove the influence of specific training data on machine learning models. Traditionally, the development of unlearning algorithms runs parallel with that of membership inference attacks (MIA), a type of privacy threat to determine whether a data instance was used for training. However, the two strands are intimately connected: o… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  3. arXiv:2406.01917  [pdf, other

    cs.CV cs.AI

    GOMAA-Geo: GOal Modality Agnostic Active Geo-localization

    Authors: Anindya Sarkar, Srikumar Sastry, Aleksis Pirinen, Chongjie Zhang, Nathan Jacobs, Yevgeniy Vorobeychik

    Abstract: We consider the task of active geo-localization (AGL) in which an agent uses a sequence of visual cues observed during aerial navigation to find a target specified through multiple possible modalities. This could emulate a UAV involved in a search-and-rescue operation navigating through an area, observing a stream of aerial images as it goes. The AGL task is associated with two important challenge… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: 23 pages, 17 figures

  4. arXiv:2406.01811  [pdf, other

    cs.CR

    A Game-Theoretic Approach to Privacy-Utility Tradeoff in Sharing Genomic Summary Statistics

    Authors: Tao Zhang, Rajagopal Venkatesaramani, Rajat K. De, Bradley A. Malin, Yevgeniy Vorobeychik

    Abstract: The advent of online genomic data-sharing services has sought to enhance the accessibility of large genomic datasets by allowing queries about genetic variants, such as summary statistics, aiding care providers in distinguishing between spurious genomic variations and those with clinical significance. However, numerous studies have demonstrated that even sharing summary genomic information exposes… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

  5. arXiv:2405.15994  [pdf, ps, other

    cs.LG cs.AI

    Verified Safe Reinforcement Learning for Neural Network Dynamic Models

    Authors: Junlin Wu, Huan Zhang, Yevgeniy Vorobeychik

    Abstract: Learning reliably safe autonomous control is one of the core problems in trustworthy autonomy. However, training a controller that can be formally verified to be safe remains a major challenge. We introduce a novel approach for learning verified safe control policies in nonlinear neural dynamical systems while maximizing overall performance. Our approach aims to achieve safety in the sense of fini… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  6. arXiv:2405.14758  [pdf, ps, other

    cs.GT cs.AI cs.LG

    Axioms for AI Alignment from Human Feedback

    Authors: Luise Ge, Daniel Halpern, Evi Micha, Ariel D. Procaccia, Itai Shapira, Yevgeniy Vorobeychik, Junlin Wu

    Abstract: In the context of reinforcement learning from human feedback (RLHF), the reward function is generally derived from maximum likelihood estimation of a random utility model based on pairwise comparisons made by humans. The problem of learning a reward function is one of preference aggregation that, we argue, largely falls within the scope of social choice theory. From this perspective, we can evalua… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  7. arXiv:2405.02612  [pdf, other

    cs.LG cs.AI cs.CY stat.ML

    Learning Linear Utility Functions From Pairwise Comparison Queries

    Authors: Luise Ge, Brendan Juba, Yevgeniy Vorobeychik

    Abstract: We study learnability of linear utility functions from pairwise comparison queries. In particular, we consider two learning objectives. The first objective is to predict out-of-sample responses to pairwise comparisons, whereas the second is to approximately recover the true parameters of the utility function. We show that in the passive learning setting, linear utilities are efficiently learnable… ▽ More

    Submitted 19 June, 2024; v1 submitted 4 May, 2024; originally announced May 2024.

    Comments: Submitted to ECAI for review

  8. arXiv:2402.12426  [pdf

    cs.SI cs.CR cs.LG

    Attacks on Node Attributes in Graph Neural Networks

    Authors: Ying Xu, Michael Lanier, Anindya Sarkar, Yevgeniy Vorobeychik

    Abstract: Graphs are commonly used to model complex networks prevalent in modern social media and literacy applications. Our research investigates the vulnerability of these graphs through the application of feature based adversarial attacks, focusing on both decision time attacks and poisoning attacks. In contrast to state of the art models like Net Attack and Meta Attack, which target node attributes and… ▽ More

    Submitted 5 March, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

    Comments: Accepted to AAAI 2024 AICS workshop

  9. arXiv:2402.09290  [pdf, other

    cs.LG cs.AI

    Learning Interpretable Policies in Hindsight-Observable POMDPs through Partially Supervised Reinforcement Learning

    Authors: Michael Lanier, Ying Xu, Nathan Jacobs, Chongjie Zhang, Yevgeniy Vorobeychik

    Abstract: Deep reinforcement learning has demonstrated remarkable achievements across diverse domains such as video games, robotic control, autonomous driving, and drug discovery. Common methodologies in partially-observable domains largely lean on end-to-end learning from high-dimensional observations, such as images, without explicitly reasoning about true state. We suggest an alternative direction, intro… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  10. arXiv:2402.08747  [pdf, other

    cs.GT eess.SY

    Rationality of Learning Algorithms in Repeated Normal-Form Games

    Authors: Shivam Bajaj, Pranoy Das, Yevgeniy Vorobeychik, Vijay Gupta

    Abstract: Many learning algorithms are known to converge to an equilibrium for specific classes of games if the same learning algorithm is adopted by all agents. However, when the agents are self-interested, a natural question is whether agents have a strong incentive to adopt an alternative learning algorithm that yields them greater individual utility. We capture such incentives as an algorithm's rational… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

  11. arXiv:2402.01920  [pdf, other

    cs.LG cs.AI cs.CL

    Preference Poisoning Attacks on Reward Model Learning

    Authors: Junlin Wu, Jiongxiao Wang, Chaowei Xiao, Chenguang Wang, Ning Zhang, Yevgeniy Vorobeychik

    Abstract: Learning utility, or reward, models from pairwise comparisons is a fundamental component in a number of application domains. These approaches inherently entail collecting preference information from people, with feedback often provided anonymously. Since preferences are subjective, there is no gold standard to compare against; yet, reliance of high-impact systems on preference learning creates a s… ▽ More

    Submitted 2 February, 2024; originally announced February 2024.

  12. arXiv:2312.14625  [pdf, other

    cs.AI cs.CR cs.LG

    Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks

    Authors: Taha Eghtesad, Sirui Li, Yevgeniy Vorobeychik, Aron Laszka

    Abstract: The increasing reliance of drivers on navigation applications has made transportation networks more susceptible to data-manipulation attacks by malicious actors. Adversaries may exploit vulnerabilities in the data collection or processing of navigation services to inject false information, and to thus interfere with the drivers' route selection. Such attacks can significantly increase traffic cong… ▽ More

    Submitted 6 March, 2024; v1 submitted 22 December, 2023; originally announced December 2023.

  13. arXiv:2312.07389  [pdf

    cs.CV

    Eroding Trust In Aerial Imagery: Comprehensive Analysis and Evaluation Of Adversarial Attacks In Geospatial Systems

    Authors: Michael Lanier, Aayush Dhakal, Zhexiao Xiong, Arthur Li, Nathan Jacobs, Yevgeniy Vorobeychik

    Abstract: In critical operations where aerial imagery plays an essential role, the integrity and trustworthiness of data are paramount. The emergence of adversarial attacks, particularly those that exploit control over labels or employ physically feasible trojans, threatens to erode that trust, making the analysis and mitigation of these attacks a matter of urgency. We demonstrate how adversarial attacks ca… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: Accepted at IEEE AIRP 2023

  14. arXiv:2311.09641  [pdf, other

    cs.AI cs.CL cs.CR cs.HC

    RLHFPoison: Reward Poisoning Attack for Reinforcement Learning with Human Feedback in Large Language Models

    Authors: Jiongxiao Wang, Junlin Wu, Muhao Chen, Yevgeniy Vorobeychik, Chaowei Xiao

    Abstract: Reinforcement Learning with Human Feedback (RLHF) is a methodology designed to align Large Language Models (LLMs) with human preferences, playing an important role in LLMs alignment. Despite its advantages, RLHF relies on human annotators to rank the text, which can introduce potential security vulnerabilities if any adversarial annotator (i.e., attackers) manipulates the ranking score by up-ranki… ▽ More

    Submitted 19 June, 2024; v1 submitted 16 November, 2023; originally announced November 2023.

  15. arXiv:2310.09689  [pdf, other

    cs.AI cs.CV

    A Partially Supervised Reinforcement Learning Framework for Visual Active Search

    Authors: Anindya Sarkar, Nathan Jacobs, Yevgeniy Vorobeychik

    Abstract: Visual active search (VAS) has been proposed as a modeling framework in which visual cues are used to guide exploration, with the goal of identifying regions of interest in a large geospatial area. Its potential applications include identifying hot spots of rare wildlife poaching activity, search-and-rescue scenarios, identifying illegal trafficking of weapons, drugs, or people, and many others. S… ▽ More

    Submitted 7 November, 2023; v1 submitted 14 October, 2023; originally announced October 2023.

    Comments: 26 pages, 20 figures, Accepted to NeurIPS 2023, Code is available at https://github.com/anindyasarkarIITH/PSRL_VAS/

  16. arXiv:2310.09360  [pdf, other

    cs.LG

    Exact Verification of ReLU Neural Control Barrier Functions

    Authors: Hongchao Zhang, Junlin Wu, Yevgeniy Vorobeychik, Andrew Clark

    Abstract: Control Barrier Functions (CBFs) are a popular approach for safe control of nonlinear systems. In CBF-based control, the desired safety properties of the system are mapped to nonnegativity of a CBF, and the control input is chosen to ensure that the CBF remains nonnegative for all time. Recently, machine learning methods that represent CBFs as neural networks (neural control barrier functions, or… ▽ More

    Submitted 13 October, 2023; originally announced October 2023.

  17. arXiv:2309.10092  [pdf, other

    cs.RO cs.AI

    Conformal Temporal Logic Planning using Large Language Models

    Authors: Jun Wang, Jiaming Tong, Kaiyuan Tan, Yevgeniy Vorobeychik, Yiannis Kantaros

    Abstract: This paper addresses a new motion planning problem for mobile robots tasked with accomplishing multiple high-level sub-tasks, expressed using natural language (NL). These sub-tasks should be accomplished in a temporal and logical order. To formally define the overarching mission, we leverage Linear Temporal Logic (LTL) defined over atomic predicates modeling these NL-based sub-tasks. This is in co… ▽ More

    Submitted 22 February, 2024; v1 submitted 18 September, 2023; originally announced September 2023.

  18. arXiv:2307.12555  [pdf, other

    cs.LG cs.SI

    Homophily-Driven Sanitation View for Robust Graph Contrastive Learning

    Authors: Yulin Zhu, Xing Ai, Yevgeniy Vorobeychik, Kai Zhou

    Abstract: We investigate adversarial robustness of unsupervised Graph Contrastive Learning (GCL) against structural attacks. First, we provide a comprehensive empirical and theoretical analysis of existing attacks, revealing how and why they downgrade the performance of GCL. Inspired by our analytic results, we present a robust GCL framework that integrates a homophily-driven sanitation view, which can be l… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

  19. arXiv:2305.19083  [pdf, other

    cs.SI

    Defense Against Shortest Path Attacks

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Identifying shortest paths between nodes in a network is an important task in applications involving routing of resources. Recent work has shown that a malicious actor can manipulate a graph to make traffic between two nodes of interest follow their target path. In this paper, we develop a defense against such attacks by modifying the weights of the graph that users observe. The defender must bala… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

  20. arXiv:2305.06547  [pdf, other

    cs.LG eess.SY

    Neural Lyapunov Control for Discrete-Time Systems

    Authors: Junlin Wu, Andrew Clark, Yiannis Kantaros, Yevgeniy Vorobeychik

    Abstract: While ensuring stability for linear systems is well understood, it remains a major challenge for nonlinear systems. A general approach in such cases is to compute a combination of a Lyapunov function and an associated control policy. However, finding Lyapunov functions for general nonlinear systems is a challenging task. To address this challenge, several methods have been proposed that represent… ▽ More

    Submitted 24 December, 2023; v1 submitted 10 May, 2023; originally announced May 2023.

    Comments: NeurIPS 2023

  21. arXiv:2305.00925  [pdf, other

    cs.CR cs.LG

    IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception

    Authors: Joseph Bao, Murat Kantarcioglu, Yevgeniy Vorobeychik, Charles Kamhoua

    Abstract: Over the years, honeypots emerged as an important security tool to understand attacker intent and deceive attackers to spend time and resources. Recently, honeypots are being deployed for Internet of things (IoT) devices to lure attackers, and learn their behavior. However, most of the existing IoT honeypots, even the high interaction ones, are easily detected by an attacker who can observe honeyp… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: FLAIRS-36

  22. arXiv:2303.14332  [pdf, other

    cs.AI

    Using Simple Incentives to Improve Two-Sided Fairness in Ridesharing Systems

    Authors: Ashwin Kumar, Yevgeniy Vorobeychik, William Yeoh

    Abstract: State-of-the-art order dispatching algorithms for ridesharing batch passenger requests and allocate them to a fleet of vehicles in a centralized manner, optimizing over the estimated values of each passenger-vehicle matching using integer linear programming (ILP). Using good estimates of future values, such ILP-based approaches are able to significantly increase the service rates (percentage of re… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: Accepted for publication at the International Conference on Automated Planning and Scheduling (ICAPS) 2023

  23. arXiv:2302.02208  [pdf, ps, other

    cs.LG

    Certified Robust Control under Adversarial Perturbations

    Authors: Jinghan Yang, Hunmin Kim, Wenbin Wan, Naira Hovakimyan, Yevgeniy Vorobeychik

    Abstract: Autonomous systems increasingly rely on machine learning techniques to transform high-dimensional raw inputs into predictions that are then used for decision-making and control. However, it is often easy to maliciously manipulate such inputs and, as a result, predictions. While effective techniques have been proposed to certify the robustness of predictions to adversarial input perturbations, such… ▽ More

    Submitted 4 February, 2023; originally announced February 2023.

  24. arXiv:2302.01763  [pdf, other

    cs.CR cs.AI

    Enabling Trade-offs in Privacy and Utility in Genomic Data Beacons and Summary Statistics

    Authors: Rajagopal Venkatesaramani, Zhiyu Wan, Bradley A. Malin, Yevgeniy Vorobeychik

    Abstract: The collection and sharing of genomic data are becoming increasingly commonplace in research, clinical, and direct-to-consumer settings. The computational protocols typically adopted to protect individual privacy include sharing summary statistics, such as allele frequencies, or limiting query responses to the presence/absence of alleles of interest using web-services called Beacons. However, even… ▽ More

    Submitted 11 January, 2023; originally announced February 2023.

  25. arXiv:2212.14115  [pdf, ps, other

    cs.LG cs.AI

    Certifying Safety in Reinforcement Learning under Adversarial Perturbation Attacks

    Authors: Junlin Wu, Hussein Sibai, Yevgeniy Vorobeychik

    Abstract: Function approximation has enabled remarkable advances in applying reinforcement learning (RL) techniques in environments with high-dimensional inputs, such as images, in an end-to-end fashion, mapping such inputs directly to low-level control. Nevertheless, these have proved vulnerable to small adversarial input perturbations. A number of approaches for improving or certifying robustness of end-t… ▽ More

    Submitted 28 December, 2022; originally announced December 2022.

  26. arXiv:2211.15788  [pdf, other

    cs.CV cs.AI

    A Visual Active Search Framework for Geospatial Exploration

    Authors: Anindya Sarkar, Michael Lanier, Scott Alfeld, Jiarui Feng, Roman Garnett, Nathan Jacobs, Yevgeniy Vorobeychik

    Abstract: Many problems can be viewed as forms of geospatial search aided by aerial imagery, with examples ranging from detecting poaching activity to human trafficking. We model this class of problems in a visual active search (VAS) framework, which has three key inputs: (1) an image of the entire search area, which is subdivided into regions, (2) a local search function, which determines whether a previou… ▽ More

    Submitted 29 October, 2023; v1 submitted 28 November, 2022; originally announced November 2022.

    Comments: Accepted to WACV 2024, 24 pages, 18 figures, Code is available at: https://github.com/anindyasarkarIITH/VAS

  27. arXiv:2211.11141  [pdf, other

    cs.SI

    Attacking Shortest Paths by Cutting Edges

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Identifying shortest paths between nodes in a network is a common graph analysis problem that is important for many applications involving routing of resources. An adversary that can manipulate the graph structure could alter traffic patterns to gain some benefit (e.g., make more money by directing traffic to a toll road). This paper presents the Force Path Cut problem, in which an adversary remov… ▽ More

    Submitted 20 November, 2022; originally announced November 2022.

    Comments: 37 pages, 11 figures; Extended version of arXiv:2104.03761

  28. arXiv:2209.03540  [pdf, other

    cs.LG cs.AI cs.CR

    Reward Delay Attacks on Deep Reinforcement Learning

    Authors: Anindya Sarkar, Jiarui Feng, Yevgeniy Vorobeychik, Christopher Gill, Ning Zhang

    Abstract: Most reinforcement learning algorithms implicitly assume strong synchrony. We present novel attacks targeting Q-learning that exploit a vulnerability entailed by this assumption by delaying the reward signal for a limited time period. We consider two types of attack goals: targeted attacks, which aim to cause a target policy to be learned, and untargeted attacks, which simply aim to induce a polic… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: 20 pages, 9 figures, Conference on Decision and Game Theory for Security

  29. arXiv:2206.10057  [pdf, other

    cs.LG

    Robust Deep Reinforcement Learning through Bootstrapped Opportunistic Curriculum

    Authors: Junlin Wu, Yevgeniy Vorobeychik

    Abstract: Despite considerable advances in deep reinforcement learning, it has been shown to be highly vulnerable to adversarial perturbations to state observations. Recent efforts that have attempted to improve adversarial robustness of reinforcement learning can nevertheless tolerate only very small perturbations, and remain fragile as perturbation size increases. We propose Bootstrapped Opportunistic Adv… ▽ More

    Submitted 9 January, 2023; v1 submitted 20 June, 2022; originally announced June 2022.

    Comments: ICML 2022

  30. arXiv:2205.00102  [pdf, other

    cs.GT

    Manipulating Elections by Changing Voter Perceptions

    Authors: Junlin Wu, Andrew Estornell, Lecheng Kong, Yevgeniy Vorobeychik

    Abstract: The integrity of elections is central to democratic systems. However, a myriad of malicious actors aspire to influence election outcomes for financial or political benefit. A common means to such ends is by manipulating perceptions of the voting public about select candidates, for example, through misinformation. We present a formal model of the impact of perception manipulation on election outcom… ▽ More

    Submitted 17 June, 2022; v1 submitted 29 April, 2022; originally announced May 2022.

    Comments: IJCAI 2022

  31. arXiv:2204.04251  [pdf, ps, other

    cs.GT econ.TH

    A Rotating Proposer Mechanism for Team Formation

    Authors: Jian Low, Chen Hajaj, Yevgeniy Vorobeychik

    Abstract: We present a rotating proposer mechanism for team formation, which implements a Pareto efficient subgame perfect Nash equilibrium of an extensive-form team formation game.

    Submitted 8 April, 2022; originally announced April 2022.

  32. arXiv:2202.14010   

    cs.CR cs.AI cs.GT cs.LG

    Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop at AAAI 2022

    Authors: James Holt, Edward Raff, Ahmad Ridley, Dennis Ross, Arunesh Sinha, Diane Staheli, William Streilen, Milind Tambe, Yevgeniy Vorobeychik, Allan Wollaber

    Abstract: The workshop will focus on the application of AI to problems in cyber security. Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities. Additionally, adversaries continue to develop new attacks. Hence, AI methods are required to understand and protect the cyber domain. These challenges are widely studied in enterprise networks, but there are many gaps… ▽ More

    Submitted 1 March, 2022; v1 submitted 28 February, 2022; originally announced February 2022.

  33. arXiv:2201.12408  [pdf, other

    cs.LG

    Networked Restless Multi-Armed Bandits for Mobile Interventions

    Authors: Han-Ching Ou, Christoph Siebenbrunner, Jackson Killian, Meredith B Brooks, David Kempe, Yevgeniy Vorobeychik, Milind Tambe

    Abstract: Motivated by a broad class of mobile intervention problems, we propose and study restless multi-armed bandits (RMABs) with network effects. In our model, arms are partially recharging and connected through a graph, so that pulling one arm also improves the state of neighboring arms, significantly extending the previously studied setting of fully recharging bandits with no network effects. In mobil… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

  34. arXiv:2112.13301  [pdf, other

    cs.CR q-bio.GN

    Defending Against Membership Inference Attacks on Beacon Services

    Authors: Rajagopal Venkatesaramani, Zhiyu Wan, Bradley A. Malin, Yevgeniy Vorobeychik

    Abstract: Large genomic datasets are now created through numerous activities, including recreational genealogical investigations, biomedical research, and clinical care. At the same time, genomic data has become valuable for reuse beyond their initial point of collection, but privacy concerns often hinder access. Over the past several years, Beacon services have emerged to broaden accessibility to such data… ▽ More

    Submitted 25 December, 2021; originally announced December 2021.

  35. arXiv:2112.02746  [pdf, other

    cs.MA cs.CY cs.GT cs.LG

    Unfairness Despite Awareness: Group-Fair Classification with Strategic Agents

    Authors: Andrew Estornell, Sanmay Das, Yang Liu, Yevgeniy Vorobeychik

    Abstract: The use of algorithmic decision making systems in domains which impact the financial, social, and political well-being of people has created a demand for these decision making systems to be "fair" under some accepted notion of equity. This demand has in turn inspired a large body of work focused on the development of fair learning algorithms which are then used in lieu of their conventional counte… ▽ More

    Submitted 5 December, 2021; originally announced December 2021.

  36. arXiv:2110.11411  [pdf, other

    cs.CV cs.AI cs.CR

    PROVES: Establishing Image Provenance using Semantic Signatures

    Authors: Mingyang Xie, Manav Kulshrestha, Shaojie Wang, Jinghan Yang, Ayan Chakrabarti, Ning Zhang, Yevgeniy Vorobeychik

    Abstract: Modern AI tools, such as generative adversarial networks, have transformed our ability to create and modify visual data with photorealistic results. However, one of the deleterious side-effects of these advances is the emergence of nefarious uses in manipulating information in visual data, such as through the use of deep fakes. We propose a novel architecture for preserving the provenance of seman… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

  37. arXiv:2110.04321  [pdf, other

    cs.GT cs.AI cs.LG cs.MA

    Computing an Optimal Pitching Strategy in a Baseball At-Bat

    Authors: Connor Douglas, Everett Witt, Mia Bendy, Yevgeniy Vorobeychik

    Abstract: The field of quantitative analytics has transformed the world of sports over the last decade. To date, these analytic approaches are statistical at their core, characterizing what is and what was, while using this information to drive decisions about what to do in the future. However, as we often view team sports, such as soccer, hockey, and baseball, as pairwise win-lose encounters, it seems natu… ▽ More

    Submitted 8 October, 2021; originally announced October 2021.

  38. arXiv:2109.11637  [pdf, ps, other

    cs.GT cs.AI cs.CR cs.LG

    Learning Generative Deception Strategies in Combinatorial Masking Games

    Authors: Junlin Wu, Charles Kamhoua, Murat Kantarcioglu, Yevgeniy Vorobeychik

    Abstract: Deception is a crucial tool in the cyberdefence repertoire, enabling defenders to leverage their informational advantage to reduce the likelihood of successful attacks. One way deception can be employed is through obscuring, or masking, some of the information about how systems are configured, increasing attacker's uncertainty about their targets. We present a novel game-theoretic model of the res… ▽ More

    Submitted 17 June, 2022; v1 submitted 23 September, 2021; originally announced September 2021.

    Comments: GameSec 2021

  39. arXiv:2109.07724  [pdf, other

    cs.CR cs.GT

    Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies

    Authors: Shanto Roy, Salah Uddin Kadir, Yevgeniy Vorobeychik, Aron Laszka

    Abstract: Internet of Things (IoT) devices and applications can have significant vulnerabilities, which may be exploited by adversaries to cause considerable harm. An important approach for mitigating this threat is remote attestation, which enables the defender to remotely verify the integrity of devices and their software. There are a number of approaches for remote attestation, and each has its unique ad… ▽ More

    Submitted 26 September, 2021; v1 submitted 16 September, 2021; originally announced September 2021.

  40. arXiv:2107.03347  [pdf, other

    cs.SI

    Optimal Edge Weight Perturbations to Attack Shortest Paths

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Finding shortest paths in a given network (e.g., a computer network or a road network) is a well-studied task with many applications. We consider this task under the presence of an adversary, who can manipulate the network by perturbing its edge weights to gain an advantage over others. Specifically, we introduce the Force Path Problem as follows. Given a network, the adversary's goal is to make a… ▽ More

    Submitted 7 July, 2021; originally announced July 2021.

  41. arXiv:2106.09292  [pdf, other

    cs.LG

    CROP: Certifying Robust Policies for Reinforcement Learning through Functional Smoothing

    Authors: Fan Wu, Linyi Li, Zijian Huang, Yevgeniy Vorobeychik, Ding Zhao, Bo Li

    Abstract: As reinforcement learning (RL) has achieved great success and been even adopted in safety-critical domains such as autonomous vehicles, a range of empirical studies have been conducted to improve its robustness against adversarial attacks. However, how to certify its robustness with theoretical guarantees still remains challenging. In this paper, we present the first unified framework CROP (Certif… ▽ More

    Submitted 16 March, 2022; v1 submitted 17 June, 2021; originally announced June 2021.

    Comments: Published as a conference paper at ICLR 2022

  42. arXiv:2106.04663  [pdf, other

    cs.GT

    Solving Structured Hierarchical Games Using Differential Backward Induction

    Authors: Zun Li, Feiran Jia, Aditya Mate, Shahin Jabbari, Mithun Chakraborty, Milind Tambe, Yevgeniy Vorobeychik

    Abstract: From large-scale organizations to decentralized political systems, hierarchical strategic decision making is commonplace. We introduce a novel class of structured hierarchical games (SHGs) that formally capture such hierarchical strategic interactions. In an SHG, each player is a node in a tree, and strategic choices of players are sequenced from root to leaves, with root moving first, followed by… ▽ More

    Submitted 27 June, 2022; v1 submitted 8 June, 2021; originally announced June 2021.

    Comments: The short version of this paper appears in the proceedings of UAI-22

  43. arXiv:2106.04435  [pdf, other

    cs.LG cs.CR

    Enhancing Robustness of Neural Networks through Fourier Stabilization

    Authors: Netanel Raviv, Aidan Kelley, Michael Guo, Yevgeny Vorobeychik

    Abstract: Despite the considerable success of neural networks in security settings such as malware detection, such models have proved vulnerable to evasion attacks, in which attackers make slight changes to inputs (e.g., malware) to bypass detection. We propose a novel approach, \emph{Fourier stabilization}, for designing evasion-robust neural networks with binary inputs. This approach, which is complementa… ▽ More

    Submitted 8 June, 2021; originally announced June 2021.

    Comments: Full version of an ICML 2021 paper

  44. arXiv:2105.00505  [pdf, ps, other

    cs.GT cs.AI cs.MA

    Altruism Design in Networked Public Goods Games

    Authors: Sixie Yu, David Kempe, Yevgeniy Vorobeychik

    Abstract: Many collective decision-making settings feature a strategic tension between agents acting out of individual self-interest and promoting a common good. These include wearing face masks during a pandemic, voting, and vaccination. Networked public goods games capture this tension, with networks encoding strategic interdependence among agents. Conventional models of public goods games posit solely in… ▽ More

    Submitted 2 May, 2021; originally announced May 2021.

    Comments: To appear in IJCAI 2021

  45. arXiv:2104.04107  [pdf, other

    cs.CV cs.LG

    FACESEC: A Fine-grained Robustness Evaluation Framework for Face Recognition Systems

    Authors: Liang Tong, Zhengzhang Chen, Jingchao Ni, Wei Cheng, Dongjin Song, Haifeng Chen, Yevgeniy Vorobeychik

    Abstract: We present FACESEC, a framework for fine-grained robustness evaluation of face recognition systems. FACESEC evaluation is performed along four dimensions of adversarial modeling: the nature of perturbation (e.g., pixel-level or face accessories), the attacker's system knowledge (about training data and learning architecture), goals (dodging or impersonation), and capability (tailored to individual… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

    Comments: Accepted by CVPR'21

  46. arXiv:2104.03761  [pdf, other

    cs.SI

    PATHATTACK: Attacking Shortest Paths in Complex Networks

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Shortest paths in complex networks play key roles in many applications. Examples include routing packets in a computer network, routing traffic on a transportation network, and inferring semantic distances between concepts on the World Wide Web. An adversary with the capability to perturb the graph might make the shortest path between two nodes route traffic through advantageous portions of the gr… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

  47. arXiv:2102.10646  [pdf, other

    cs.GT cs.MA

    A Game-Theoretic Approach for Hierarchical Epidemic Control

    Authors: Feiran Jia, Aditya Mate, Zun Li, Shahin Jabbari, Mithun Chakraborty, Milind Tambe, Michael Wellman, Yevgeniy Vorobeychik

    Abstract: We design and analyze a multi-level game-theoretic model of hierarchical policy interventions for epidemic control, such as those in response to the COVID-19 pandemic. Our model captures the potentially mismatched priorities among a hierarchy of policy-makers (e.g., federal, state, and local governments) with respect to two cost components that have opposite dependence on the policy strength -- po… ▽ More

    Submitted 3 August, 2022; v1 submitted 21 February, 2021; originally announced February 2021.

  48. arXiv:2102.08557  [pdf, other

    cs.LG cs.CR cs.CY

    Re-identification of Individuals in Genomic Datasets Using Public Face Images

    Authors: Rajagopal Venkatesaramani, Bradley A. Malin, Yevgeniy Vorobeychik

    Abstract: DNA sequencing is becoming increasingly commonplace, both in medical and direct-to-consumer settings. To promote discovery, collected genomic data is often de-identified and shared, either in public repositories, such as OpenSNP, or with researchers through access-controlled repositories. However, recent studies have suggested that genomic data can be effectively matched to high-resolution three-d… ▽ More

    Submitted 16 February, 2021; originally announced February 2021.

  49. arXiv:2101.10648  [pdf, other

    cs.SI

    Strategic Evasion of Centrality Measures

    Authors: Marcin Waniek, Jan Woźnica, Kai Zhou, Yevgeniy Vorobeychik, Talal Rahwan, Tomasz Michalak

    Abstract: Among the most fundamental tools for social network analysis are centrality measures, which quantify the importance of every node in the network. This centrality analysis typically disregards the possibility that the network may have been deliberately manipulated to mislead the analysis. To solve this problem, a recent study attempted to understand how a member of a social network could rewire the… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

    Comments: 18 pages, 8 figures, 4 tables

  50. arXiv:2101.08314  [pdf, other

    cs.CE econ.TH

    Multi-Scale Games: Representing and Solving Games on Networks with Group Structure

    Authors: Kun Jin, Yevgeniy Vorobeychik, Mingyan Liu

    Abstract: Network games provide a natural machinery to compactly represent strategic interactions among agents whose payoffs exhibit sparsity in their dependence on the actions of others. Besides encoding interaction sparsity, however, real networks often exhibit a multi-scale structure, in which agents can be grouped into communities, those communities further grouped, and so on, and where interactions amo… ▽ More

    Submitted 20 January, 2021; originally announced January 2021.

    Comments: Accepted in AAAI 2021 main conference