no code implementations • 13 Jan 2024 • Erik Hemberg, Stephen Moskal, Una-May O'Reilly
Algorithms that use Large Language Models (LLMs) to evolve code arrived on the Genetic Programming (GP) scene very recently.
no code implementations • 10 Oct 2023 • Stephen Moskal, Sam Laney, Erik Hemberg, Una-May O'Reilly
We present prompt engineering approaches for a plan-act-report loop for one action of a threat campaign and and a prompt chaining design that directs the sequential decision process of a multi-action campaign.
no code implementations • 25 Aug 2021 • Chathika Gunaratne, Rene Reyes, Erik Hemberg, Una-May O'Reilly
Contagious respiratory diseases, such as COVID-19, depend on sufficiently prolonged exposures for the successful transmission of the underlying pathogen.
no code implementations • 5 Aug 2021 • Erik Hemberg, Una-May O'Reilly
Artificial Intelligence (AI) and Machine Learning (ML) algorithms can support the span of indicator-level, e. g. anomaly detection, to behavioral level cyber security modeling and inference.
no code implementations • 25 Jun 2021 • Jamal Toutouh, Erik Hemberg, Una-May O'Reilly
Generative adversary networks (GANs) suffer from training pathologies such as instability and mode collapse, which mainly arise from a lack of diversity in their adversarial interactions.
no code implementations • 27 Apr 2021 • John Emanuello, Kimberly Ferguson-Walter, Erik Hemberg, Una-May O Reilly, Ahmad Ridley, Dennis Ross, Diane Staheli, William Streilein
Malicious cyber activity is ubiquitous and its harmful effects have dramatic and often irreversible impacts on society.
no code implementations • 23 Apr 2021 • Prakruthi Karuna, Erik Hemberg, Una-May O'Reilly, Nick Rutar
Scaling the cyber hunt problem poses several key technical challenges.
1 code implementation • 1 Oct 2020 • Erik Hemberg, Jonathan Kelly, Michal Shlapentokh-Rothman, Bryn Reinstadler, Katherine Xu, Nick Rutar, Una-May O'Reilly
Many public sources of cyber threat and vulnerability information exist to serve the defense of cyber systems.
Cryptography and Security
no code implementations • 3 Aug 2020 • Jamal Toutouh, Erik Hemberg, Una-May O'Reilly
We investigate the impact on the performance of two algorithm components that influence the diversity during coevolution: the performance-based selection/replacement inside each sub-population and the communication through migration of solutions (networks) among overlapping neighborhoods.
no code implementations • 7 Apr 2020 • Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg
We delineate Adversarial Genetic Programming for Cyber Security, a research topic that, by means of genetic programming (GP), replicates and studies the behavior of cyber adversaries and the dynamics of their engagements.
no code implementations • 7 Apr 2020 • Jamal Toutouh, Una-May O'Reilly, Erik Hemberg
We investigate training Generative Adversarial Networks, GANs, with less data.
no code implementations • 7 Apr 2020 • Emiliano Perez, Sergio Nesmachnow, Jamal Toutouh, Erik Hemberg, Una-May O'Reilly
Generative adversarial networks (GANs) are widely used to learn generative models.
1 code implementation • 30 Mar 2020 • Jamal Toutouh, Erik Hemberg, Una-May O'Reilly
In machine learning, ensembles of predictors demonstrate better results than a single predictor for many tasks.
1 code implementation • 29 May 2019 • Jamal Toutouh, Erik Hemberg, Una-May O'Reilly
We contribute a superior evolutionary GANs training method, Mustangs, that eliminates the single loss function used across Lipizzaner's grid.
no code implementations • 14 Dec 2018 • Yanbang Wang, Nancy Law, Erik Hemberg, Una-May O'Reilly
Student learning activity in MOOCs can be viewed from multiple perspectives.
no code implementations • 12 Dec 2018 • Mucong Ding, Yanbang Wang, Erik Hemberg, Una-May O'Reilly
It consists of two alternative transfer methods based on representation learning with auto-encoders: a passive approach using transductive principal component analysis and an active approach that uses a correlation alignment loss term.
1 code implementation • 30 Nov 2018 • Tom Schmiedlechner, Ignavier Ng Zhi Yong, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly
GANs are difficult to train due to convergence pathologies such as mode and discriminator collapse.
1 code implementation • 9 May 2018 • Alex Huang, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly
A central challenge of adversarial learning is to interpret the resulting hardened model.
1 code implementation • 27 Apr 2018 • Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly
Game theory has emerged as a powerful framework for modeling a large range of multi-agent scenarios.
Computer Science and Game Theory
2 code implementations • 9 Jan 2018 • Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O'Reilly
We are inspired by them to develop similar methods for the discrete, e. g. binary, domain which characterizes the features of malware.
no code implementations • 1 Dec 2017 • Alessandro De Palma, Erik Hemberg, Una-May O'Reilly
The availability of massive healthcare data repositories calls for efficient tools for data-driven medicine.
6 code implementations • 24 Mar 2017 • Michael Fenton, James McDermott, David Fagan, Stefan Forstenlechner, Michael O'Neill, Erik Hemberg
Grammatical Evolution (GE) is a population-based evolutionary algorithm, where a formal grammar is used in the genotype to phenotype mapping process.