no code implementations • 14 Apr 2024 • Yifan Yang, Ali Payani, Parinaz Naghizadeh
We then use this CDF error bound to provide a bound on the generalization error guarantees of a classifier trained on such non-IID data.
no code implementations • 12 Nov 2023 • Md Ferdous Alam, Parinaz Naghizadeh, David Hoelzle
In these environments, transfer RL algorithms, which can be used for the transfer of knowledge from one or multiple source environments to a target environment, have been shown to increase learning speed and improve initial and asymptotic performance.
no code implementations • 14 Sep 2023 • Pradeep Sharma Oruganti, Parinaz Naghizadeh, Qadeer Ahmed
This paper studies the problem of safe control of sampled-data systems under bounded disturbance and measurement errors with piecewise-constant controllers.
no code implementations • 10 Feb 2023 • Pradeep Sharma Oruganti, Parinaz Naghizadeh, Qadeer Ahmed
We study the problem of defending a Cyber-Physical System (CPS) consisting of interdependent components with heterogeneous sensitivity to investments.
1 code implementation • 31 May 2022 • Yiqiao Liao, Parinaz Naghizadeh
We consider two forms of dataset bias: errors by prior decision makers in the labeling process, and errors in measurement of the features of disadvantaged individuals.
1 code implementation • 25 Oct 2021 • Yifan Yang, Yang Liu, Parinaz Naghizadeh
Our proposed algorithm includes parameters that can be used to balance between the ultimate goal of removing data biases -- which will in turn lead to more accurate and fair decisions, and the exploration risks incurred to achieve this goal.
no code implementations • 29 Sep 2021 • Pradeep Sharma Oruganti, Parinaz Naghizadeh, Qadeer Ahmed
We then use numerical experiments to verify and evaluate how our proposed network interventions may be used to guide improvements in automotive security.
no code implementations • 12 Nov 2020 • Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi
We model the behavioral biases of human decision-making in securing interdependent systems and show that such behavioral decision-making leads to a suboptimal pattern of resource allocation compared to non-behavioral (rational) decision-making.
no code implementations • 4 Apr 2020 • Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi
We model the security investment decisions made by the defenders as a security game.
Cryptography and Security Computer Science and Game Theory