Search Results for author: Sicco Verwer

Found 25 papers, 13 papers with code

Differentially-Private Decision Trees and Provable Robustness to Data Poisoning

1 code implementation24 May 2023 Daniël Vos, Jelle Vos, Tianyu Li, Zekeriya Erkin, Sicco Verwer

By leveraging the better privacy-utility trade-off of PrivaTree we are able to train decision trees with significantly better robustness against backdoor attacks compared to regular decision trees and with meaningful theoretical guarantees.

Data Poisoning

Optimal Decision Tree Policies for Markov Decision Processes

1 code implementation30 Jan 2023 Daniël Vos, Sicco Verwer

While there is generally a trade-off between the performance and interpretability of machine learning models, we find that OMDTs limited to a depth of 3 often perform close to the optimal limit.

Imitation Learning

SoK: Explainable Machine Learning for Computer Security Applications

1 code implementation22 Aug 2022 Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer

The security literature sometimes also fails to disentangle the role of the various stakeholders, e. g., by providing explanations to model users and designers while also exposing them to adversaries.

Computer Security Explainable artificial intelligence +1

ENCODE: Encoding NetFlows for Network Anomaly Detection

1 code implementation8 Jul 2022 Clinton Cao, Annibale Panichella, Sicco Verwer, Agathe Blaise, Filippo Rebecchi

The first step for these machine learning pipelines is to pre-process the data before it is given to the machine learning algorithm.

Anomaly Detection BIG-bench Machine Learning

Learning state machines via efficient hashing of future traces

1 code implementation4 Jul 2022 Robert Baumgartner, Sicco Verwer

In this paper we propose a method to learn state machines from data streams using the count-min-sketch data structure to reduce memory requirements.

Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster

no code implementations28 Jun 2022 Clinton Cao, Agathe Blaise, Sicco Verwer, Filippo Rebecchi

In this work, we propose an approach that learns state machine models to model the runtime behaviour of a cloud environment that runs multiple microservice applications.

SECLEDS: Sequence Clustering in Evolving Data Streams via Multiple Medoids and Medoid Voting

1 code implementation24 Jun 2022 Azqa Nadeem, Sicco Verwer

K-medoids or Partitioning Around Medoids (PAM) is commonly used to cluster sequences since it supports alignment-based distances, and the k-centers being actual data items helps with cluster interpretability.

Clustering Dynamic Time Warping

Robust Attack Graph Generation

no code implementations15 Jun 2022 Dennis Mouwen, Sicco Verwer, Azqa Nadeem

We present a method to learn automaton models that are more robust to input modifications.

Graph Generation

FlexFringe: Modeling Software Behavior by Learning Probabilistic Automata

1 code implementation28 Mar 2022 Sicco Verwer, Christian Hammerschmidt

We present the efficient implementations of probabilistic deterministic finite automaton learning methods available in FlexFringe.

Anomaly Detection

Robust Optimal Classification Trees Against Adversarial Examples

no code implementations8 Sep 2021 Daniël Vos, Sicco Verwer

Decision trees are a popular choice of explainable model, but just like neural networks, they suffer from adversarial examples.

Classification

SAGE: Intrusion Alert-driven Attack Graph Extractor

1 code implementation6 Jul 2021 Azqa Nadeem, Sicco Verwer, Shanchieh Jay Yang

We propose to automatically learn AGs based on actions observed through intrusion alerts, without prior expert knowledge.

EXPObench: Benchmarking Surrogate-based Optimisation Algorithms on Expensive Black-box Functions

1 code implementation8 Jun 2021 Laurens Bliek, Arthur Guijt, Rickard Karlsson, Sicco Verwer, Mathijs de Weerdt

Surrogate algorithms such as Bayesian optimisation are especially designed for black-box optimisation problems with expensive objectives, such as hyperparameter tuning or simulation-based optimisation.

Bayesian Optimisation Benchmarking

Efficient Training of Robust Decision Trees Against Adversarial Examples

1 code implementation18 Dec 2020 Daniël Vos, Sicco Verwer

We can use algorithms that take adversarial attacks into account to fit trees that are more robust.

Adversarial Attack

Continuous surrogate-based optimization algorithms are well-suited for expensive discrete problems

no code implementations6 Nov 2020 Rickard Karlsson, Laurens Bliek, Sicco Verwer, Mathijs de Weerdt

One method to solve expensive black-box optimization problems is to use a surrogate model that approximates the objective based on previous observed evaluations.

Bayesian Optimization Gaussian Processes

Black-box Mixed-Variable Optimisation using a Surrogate Model that Satisfies Integer Constraints

no code implementations8 Jun 2020 Laurens Bliek, Arthur Guijt, Sicco Verwer, Mathijs de Weerdt

A challenging problem in both engineering and computer science is that of minimising a function for which we have no mathematical formulation available, that is expensive to evaluate, and that contains continuous and integer variables, for example in automatic algorithm configuration.

Black-box Combinatorial Optimization using Models with Integer-valued Minima

1 code implementation20 Nov 2019 Laurens Bliek, Sicco Verwer, Mathijs de Weerdt

When a black-box optimization objective can only be evaluated with costly or noisy measurements, most standard optimization algorithms are unsuited to find the optimal solution.

Bayesian Optimization Combinatorial Optimization

Learning a Safety Verifiable Adaptive Cruise Controller from Human Driving Data

no code implementations29 Oct 2019 Qin Lin, Sicco Verwer, John Dolan

Imitation learning provides a way to automatically construct a controller by mimicking human behavior from data.

Autonomous Vehicles Imitation Learning

Human in the Loop: Interactive Passive Automata Learning via Evidence-Driven State-Merging Algorithms

no code implementations28 Jul 2017 Christian A. Hammerschmidt, Radu State, Sicco Verwer

We present an interactive version of an evidence-driven state-merging (EDSM) algorithm for learning variants of finite state automata.

Learning Pairwise Disjoint Simple Languages from Positive Examples

no code implementations6 Jun 2017 Alexis Linard, Rick Smetsers, Frits Vaandrager, Umar Waqas, Joost van Pinxten, Sicco Verwer

A classical problem in grammatical inference is to identify a deterministic finite automaton (DFA) from a set of positive and negative examples.

Clustering

Anomaly Detection in a Digital Video Broadcasting System Using Timed Automata

no code implementations24 May 2017 Xiaoran Liu, Qin Lin, Sicco Verwer, Dmitri Jarnikov

This paper focuses on detecting anomalies in a digital video broadcasting (DVB) system from providers' perspective.

Anomaly Detection One-class classifier

Complementing Model Learning with Mutation-Based Fuzzing

1 code implementation8 Nov 2016 Rick Smetsers, Joshua Moerman, Mark Janssen, Sicco Verwer

An ongoing challenge for learning algorithms formulated in the Minimally Adequate Teacher framework is to efficiently obtain counterexamples.

Software Engineering

Learning optimization models in the presence of unknown relations

no code implementations6 Jan 2014 Sicco Verwer, Yingqian Zhang, Qing Chuan Ye

Given the learned models, we propose two types of optimization methods: a black-box best-first search approach, and a novel white-box approach that maps learned models to integer linear programs (ILP) which can then be solved by any ILP-solver.

regression

Cannot find the paper you are looking for? You can Submit a new open access paper.