Search Results for author: Una-May O'Reilly

Found 34 papers, 11 papers with code

Min-Max Optimization without Gradients: Convergence and Applications to Black-Box Evasion and Poisoning Attacks

no code implementations ICML 2020 Sijia Liu, Songtao Lu, Xiangyi Chen, Yao Feng, Kaidi Xu, Abdullah Al-Dujaili, Mingyi Hong, Una-May O'Reilly

In this paper, we study the problem of constrained min-max optimization in a black-box setting, where the desired optimizer cannot access the gradients of the objective function but may query its values.

Evolving Code with A Large Language Model

no code implementations13 Jan 2024 Erik Hemberg, Stephen Moskal, Una-May O'Reilly

Algorithms that use Large Language Models (LLMs) to evolve code arrived on the Genetic Programming (GP) scene very recently.

Language Modelling Large Language Model

LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing

no code implementations10 Oct 2023 Stephen Moskal, Sam Laney, Erik Hemberg, Una-May O'Reilly

We present prompt engineering approaches for a plan-act-report loop for one action of a threat campaign and and a prompt chaining design that directs the sequential decision process of a multi-action campaign.

Prompt Engineering

CLAWSAT: Towards Both Robust and Accurate Code Models

1 code implementation21 Nov 2022 Jinghan Jia, Shashank Srikant, Tamara Mitrovska, Chuang Gan, Shiyu Chang, Sijia Liu, Una-May O'Reilly

We integrate contrastive learning (CL) with adversarial learning to co-optimize the robustness and accuracy of code models.

Code Generation Code Summarization +2

Representations of Computer Programs in the Human Brain

no code implementations29 Sep 2021 Shashank Srikant, Benjamin Lipkin, Anna A Ivanova, Evelina Fedorenko, Una-May O'Reilly

We find that the Multiple Demand system, a system of brain regions previously shown to respond to code, contains information about multiple specific code properties, as well as machine learned representations of code.

Evaluating Efficacy of Indoor Non-Pharmaceutical Interventions against COVID-19 Outbreaks with a Coupled Spatial-SIR Agent-Based Simulation Framework

no code implementations25 Aug 2021 Chathika Gunaratne, Rene Reyes, Erik Hemberg, Una-May O'Reilly

Contagious respiratory diseases, such as COVID-19, depend on sufficiently prolonged exposures for the successful transmission of the underlying pathogen.

Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence

no code implementations5 Aug 2021 Erik Hemberg, Una-May O'Reilly

Artificial Intelligence (AI) and Machine Learning (ML) algorithms can support the span of indicator-level, e. g. anomaly detection, to behavioral level cyber security modeling and inference.

Anomaly Detection BIG-bench Machine Learning

Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks

no code implementations25 Jun 2021 Jamal Toutouh, Erik Hemberg, Una-May O'Reilly

Generative adversary networks (GANs) suffer from training pathologies such as instability and mode collapse, which mainly arise from a lack of diversity in their adversarial interactions.

Signal Propagation in a Gradient-Based and Evolutionary Learning System

no code implementations10 Feb 2021 Jamal Toutouh, Una-May O'Reilly

Generative adversarial networks (GANs) exhibit training pathologies that can lead to convergence-related degenerative behaviors, whereas spatially-distributed, coevolutionary algorithms (CEAs) for GAN training, e. g. Lipizzaner, are empirically robust to them.

STRATA: Simple, Gradient-Free Attacks for Models of Code

no code implementations28 Sep 2020 Jacob M. Springer, Bryn Marie Reinstadler, Una-May O'Reilly

Neural networks are well-known to be vulnerable to imperceptible perturbations in the input, called adversarial examples, that result in misclassification.

Analyzing the Components of Distributed Coevolutionary GAN Training

no code implementations3 Aug 2020 Jamal Toutouh, Erik Hemberg, Una-May O'Reilly

We investigate the impact on the performance of two algorithm components that influence the diversity during coevolution: the performance-based selection/replacement inside each sub-population and the communication through migration of solutions (networks) among overlapping neighborhoods.

Generative Adversarial Network

Dependency-Based Neural Representations for Classifying Lines of Programs

no code implementations8 Apr 2020 Shashank Srikant, Nicolas Lesimple, Una-May O'Reilly

We investigate the problem of classifying a line of program as containing a vulnerability or not using machine learning.

Data Dieting in GAN Training

no code implementations7 Apr 2020 Jamal Toutouh, Una-May O'Reilly, Erik Hemberg

We investigate training Generative Adversarial Networks, GANs, with less data.

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

no code implementations7 Apr 2020 Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg

We delineate Adversarial Genetic Programming for Cyber Security, a research topic that, by means of genetic programming (GP), replicates and studies the behavior of cyber adversaries and the dynamics of their engagements.

Artificial Life Position

Re-purposing Heterogeneous Generative Ensembles with Evolutionary Computation

1 code implementation30 Mar 2020 Jamal Toutouh, Erik Hemberg, Una-May O'Reilly

In machine learning, ensembles of predictors demonstrate better results than a single predictor for many tasks.

Evolutionary Algorithms

Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML

1 code implementation30 Sep 2019 Sijia Liu, Songtao Lu, Xiangyi Chen, Yao Feng, Kaidi Xu, Abdullah Al-Dujaili, Minyi Hong, Una-May O'Reilly

In this paper, we study the problem of constrained robust (min-max) optimization ina black-box setting, where the desired optimizer cannot access the gradients of the objective function but may query its values.

Spatial Evolutionary Generative Adversarial Networks

1 code implementation29 May 2019 Jamal Toutouh, Erik Hemberg, Una-May O'Reilly

We contribute a superior evolutionary GANs training method, Mustangs, that eliminates the single loss function used across Lipizzaner's grid.

There are No Bit Parts for Sign Bits in Black-Box Attacks

no code implementations19 Feb 2019 Abdullah Al-Dujaili, Una-May O'Reilly

We present a black-box adversarial attack algorithm which sets new state-of-the-art model evasion rates for query efficiency in the $\ell_\infty$ and $\ell_2$ metrics, where only loss-oracle access to the model is available.

Adversarial Attack

Transfer Learning using Representation Learning in Massive Open Online Courses

no code implementations12 Dec 2018 Mucong Ding, Yanbang Wang, Erik Hemberg, Una-May O'Reilly

It consists of two alternative transfer methods based on representation learning with auto-encoders: a passive approach using transductive principal component analysis and an active approach that uses a correlation alignment loss term.

Representation Learning Transfer Learning

AST-Based Deep Learning for Detecting Malicious PowerShell

no code implementations3 Oct 2018 Gili Rusak, Abdullah Al-Dujaili, Una-May O'Reilly

With the celebrated success of deep learning, some attempts to develop effective methods for detecting malicious PowerShell programs employ neural nets in a traditional natural language processing setup while others employ convolutional neural nets to detect obfuscated malicious commands at a character level.

Towards Distributed Coevolutionary GANs

no code implementations21 Jul 2018 Abdullah Al-Dujaili, Tom Schmiedlechner, and Erik Hemberg, Una-May O'Reilly

Generative Adversarial Networks (GANs) have become one of the dominant methods for deep generative modeling.

On Visual Hallmarks of Robustness to Adversarial Malware

1 code implementation9 May 2018 Alex Huang, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly

A central challenge of adversarial learning is to interpret the resulting hardened model.

Approximating Nash Equilibria for Black-Box Games: A Bayesian Optimization Approach

1 code implementation27 Apr 2018 Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly

Game theory has emerged as a powerful framework for modeling a large range of multi-agent scenarios.

Computer Science and Game Theory

Adversarial Deep Learning for Robust Detection of Binary Encoded Malware

2 code implementations9 Jan 2018 Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O'Reilly

We are inspired by them to develop similar methods for the discrete, e. g. binary, domain which characterizes the features of malware.

Distributed Stratified Locality Sensitive Hashing for Critical Event Prediction in the Cloud

no code implementations1 Dec 2017 Alessandro De Palma, Erik Hemberg, Una-May O'Reilly

The availability of massive healthcare data repositories calls for efficient tools for data-driven medicine.

Likely to stop? Predicting Stopout in Massive Open Online Courses

no code implementations14 Aug 2014 Colin Taylor, Kalyan Veeramachaneni, Una-May O'Reilly

Even with more difficult prediction problems, such as predicting stop out at the end of the course with only one weeks' data, the models attained AUCs of 0. 7.

Feature Importance

Cannot find the paper you are looking for? You can Submit a new open access paper.