-
Hypothesis Network Planned Exploration for Rapid Meta-Reinforcement Learning Adaptation
Authors:
Maxwell Joseph Jacobson,
Yexiang Xue
Abstract:
Meta Reinforcement Learning (Meta RL) trains agents that adapt to fast-changing environments and tasks. Current strategies often lose adaption efficiency due to the passive nature of model exploration, causing delayed understanding of new transition dynamics. This results in particularly fast-evolving tasks being impossible to solve. We propose a novel approach, Hypothesis Network Planned Explorat…
▽ More
Meta Reinforcement Learning (Meta RL) trains agents that adapt to fast-changing environments and tasks. Current strategies often lose adaption efficiency due to the passive nature of model exploration, causing delayed understanding of new transition dynamics. This results in particularly fast-evolving tasks being impossible to solve. We propose a novel approach, Hypothesis Network Planned Exploration (HyPE), that integrates an active and planned exploration process via the hypothesis network to optimize adaptation speed. HyPE uses a generative hypothesis network to form potential models of state transition dynamics, then eliminates incorrect models through strategically devised experiments. Evaluated on a symbolic version of the Alchemy game, HyPE outpaces baseline methods in adaptation speed and model accuracy, validating its potential in enhancing reinforcement learning adaptation in rapidly evolving settings.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
Integrating Symbolic Reasoning into Neural Generative Models for Design Generation
Authors:
Maxwell Joseph Jacobson,
Yexiang Xue
Abstract:
Design generation requires tight integration of neural and symbolic reasoning, as good design must meet explicit user needs and honor implicit rules for aesthetics, utility, and convenience. Current automated design tools driven by neural networks produce appealing designs but cannot satisfy user specifications and utility requirements. Symbolic reasoning tools, such as constraint programming, can…
▽ More
Design generation requires tight integration of neural and symbolic reasoning, as good design must meet explicit user needs and honor implicit rules for aesthetics, utility, and convenience. Current automated design tools driven by neural networks produce appealing designs but cannot satisfy user specifications and utility requirements. Symbolic reasoning tools, such as constraint programming, cannot perceive low-level visual information in images or capture subtle aspects such as aesthetics. We introduce the Spatial Reasoning Integrated Generator (SPRING) for design generation. SPRING embeds a neural and symbolic integrated spatial reasoning module inside the deep generative network. The spatial reasoning module samples the set of locations of objects to be generated from a backtrack-free distribution. This distribution modifies the implicit preference distribution, which is learned by a recursive neural network to capture utility and aesthetics. Sampling from the backtrack-free distribution is accomplished by a symbolic reasoning approach, SampleSearch, which zeros out the probability of sampling spatial locations violating explicit user specifications. Embedding symbolic reasoning into neural generation guarantees that the output of SPRING satisfies user requirements. Furthermore, SPRING offers interpretability, allowing users to visualize and diagnose the generation process through the bounding boxes. SPRING is also adept at managing novel user specifications not encountered during its training, thanks to its proficiency in zero-shot constraint transfer. Quantitative evaluations and a human study reveal that SPRING outperforms baseline generative models, excelling in delivering high design quality and better meeting user specifications.
△ Less
Submitted 14 November, 2024; v1 submitted 13 October, 2023;
originally announced October 2023.
-
Human-centered XAI for Burn Depth Characterization
Authors:
Maxwell J. Jacobson,
Daniela Chanci Arrubla,
Maria Romeo Tricas,
Gayle Gordillo,
Yexiang Xue,
Chandan Sen,
Juan Wachs
Abstract:
Approximately 1.25 million people in the United States are treated each year for burn injuries. Precise burn injury classification is an important aspect of the medical AI field. In this work, we propose an explainable human-in-the-loop framework for improving burn ultrasound classification models. Our framework leverages an explanation system based on the LIME classification explainer to corrobor…
▽ More
Approximately 1.25 million people in the United States are treated each year for burn injuries. Precise burn injury classification is an important aspect of the medical AI field. In this work, we propose an explainable human-in-the-loop framework for improving burn ultrasound classification models. Our framework leverages an explanation system based on the LIME classification explainer to corroborate and integrate a burn expert's knowledge -- suggesting new features and ensuring the validity of the model. Using this framework, we discover that B-mode ultrasound classifiers can be enhanced by supplying textural features. More specifically, we confirm that texture features based on the Gray Level Co-occurance Matrix (GLCM) of ultrasound frames can increase the accuracy of transfer learned burn depth classifiers. We test our hypothesis on real data from porcine subjects. We show improvements in the accuracy of burn depth classification -- from ~88% to ~94% -- once modified according to our framework.
△ Less
Submitted 2 January, 2023; v1 submitted 24 October, 2022;
originally announced October 2022.
-
Numerical and Statistical Analysis of Aliquot Sequences
Authors:
Kevin Chum,
Richard K. Guy,
Michael J. Jacobson, Jr.,
Anton S. Mosunov
Abstract:
We present a variety of numerical data related to the growth of terms in aliquot sequences, iterations of the function $s(n) = σ(n) - n$. First, we compute the geometric mean of the ratio $s_k(n)/s_{k-1}(n)$ of $k$th iterates for $n \leq 2^{37}$ and $k=1,\dots,10.$ Second, we extend the computation of numbers not in the range of $s(n)$ (called untouchable) by Pollack and Pomerance to the bound of…
▽ More
We present a variety of numerical data related to the growth of terms in aliquot sequences, iterations of the function $s(n) = σ(n) - n$. First, we compute the geometric mean of the ratio $s_k(n)/s_{k-1}(n)$ of $k$th iterates for $n \leq 2^{37}$ and $k=1,\dots,10.$ Second, we extend the computation of numbers not in the range of $s(n)$ (called untouchable) by Pollack and Pomerance to the bound of $2^{40}$ and use these data to compute the geometric mean of the ratio of consecutive terms limited to terms in the range of $s(n).$ Third, we give an algorithm to compute $k$-untouchable numbers ($k-1$st iterates of $s(n)$ but not $k$th iterates) along with some numerical data. Finally, inspired by earlier work of Devitt, we estimate the growth rate of terms in aliquot sequences using a Markov chain model based on data extracted from thousands of sequences.
△ Less
Submitted 26 October, 2021;
originally announced October 2021.
-
Removable Weak Keys for Discrete Logarithm Based Cryptography
Authors:
Michael John Jacobson, Jr.,
Prabhat Kushwaha
Abstract:
We describe a novel type of weak cryptographic private key that can exist in any discrete logarithm based public-key cryptosystem set in a group of prime order $p$ where $p-1$ has small divisors. Unlike the weak private keys based on \textit{numerical size} (such as smaller private keys, or private keys lying in an interval) that will \textit{always} exist in any DLP cryptosystems, our type of wea…
▽ More
We describe a novel type of weak cryptographic private key that can exist in any discrete logarithm based public-key cryptosystem set in a group of prime order $p$ where $p-1$ has small divisors. Unlike the weak private keys based on \textit{numerical size} (such as smaller private keys, or private keys lying in an interval) that will \textit{always} exist in any DLP cryptosystems, our type of weak private keys occurs purely due to parameter choice of $p$, and hence, can be removed with appropriate value of $p$. Using the theory of implicit group representations, we present algorithms that can determine whether a key is weak, and if so, recover the private key from the corresponding public key. We analyze several elliptic curves proposed in the literature and in various standards, giving counts of the number of keys that can be broken with relatively small amounts of computation. Our results show that many of these curves, including some from standards, have a considerable number of such weak private keys. We also use our methods to show that none of the 14 outstanding Certicom Challenge problem instances are weak in our sense, up to a certain weakness bound.
△ Less
Submitted 15 November, 2020;
originally announced November 2020.
-
Main Controls on the Stable Carbon Isotope Composition of Speleothems
Authors:
Jens Fohlmeister,
Ny Riavo G. Voarintsoa,
Franziska A. Lechleitner,
Meighan Boyd,
Susanne Brandtstätter,
Matthew J. Jacobson,
Jessica Oster
Abstract:
The climatic controls on the stable carbon isotopic composition (d13C) of speleothem carbonate are less often discussed in the scientific literature in contrast to the frequently used stable oxygen isotopes. Various local processes influence speleothem d13C values and confident and detailed interpretations of this proxy are often complex. A better understanding of speleothem d13C values is critica…
▽ More
The climatic controls on the stable carbon isotopic composition (d13C) of speleothem carbonate are less often discussed in the scientific literature in contrast to the frequently used stable oxygen isotopes. Various local processes influence speleothem d13C values and confident and detailed interpretations of this proxy are often complex. A better understanding of speleothem d13C values is critical to improving the amount of information that can be gained from existing and future records. This contribution aims to disentangle the various processes governing speleothem d13C values and assess their relative importance. Using a large data set of previously published records we examine the spatial imprint of climate-related processes in speleothem d13C values deposited post-1900 CE, a period during which global temperature and climate data is readily available. Additionally, we investigate the causes for differences in average d13C values and growth rate under identical climatic conditions by analysing pairs of contemporaneously deposited speleothems from the same caves. This approach allows to focus on carbonate dissolution and fractionation processes during carbonate precipitation, which we evaluate using existing geochemical models. Our analysis of a large global data set of records reveals evidence for a temperature control, likely driven by vegetation and soil processes, on d13C values in recently deposited speleothems. Moreover, data-model intercomparison shows that calcite precipitation occurring along water flow paths prior to reaching the top of the speleothem can explain the wide d13C range observed for concurrently deposited samples from the same cave. We demonstrate that using the combined information of contemporaneously growing speleothems is a powerful tool to decipher controls on d13C values ...
△ Less
Submitted 29 April, 2020;
originally announced May 2020.
-
A note on the security of CSIDH
Authors:
Jean-François Biasse,
Annamaria Iezzi,
Michael J. Jacobson Jr
Abstract:
We propose an algorithm for computing an isogeny between two elliptic curves $E_1,E_2$ defined over a finite field such that there is an imaginary quadratic order $\mathcal{O}$ satisfying $\mathcal{O}\simeq \operatorname{End}(E_i)$ for $i = 1,2$. This concerns ordinary curves and supersingular curves defined over $\mathbb{F}_p$ (the latter used in the recent CSIDH proposal). Our algorithm has heur…
▽ More
We propose an algorithm for computing an isogeny between two elliptic curves $E_1,E_2$ defined over a finite field such that there is an imaginary quadratic order $\mathcal{O}$ satisfying $\mathcal{O}\simeq \operatorname{End}(E_i)$ for $i = 1,2$. This concerns ordinary curves and supersingular curves defined over $\mathbb{F}_p$ (the latter used in the recent CSIDH proposal). Our algorithm has heuristic asymptotic run time $e^{O\left(\sqrt{\log(|Δ|)}\right)}$ and requires polynomial quantum memory and $e^{O\left(\sqrt{\log(|Δ|)}\right)}$ classical memory, where $Δ$ is the discriminant of $\mathcal{O}$. This asymptotic complexity outperforms all other available method for computing isogenies.
We also show that a variant of our method has asymptotic run time $e^{\tilde{O}\left(\sqrt{\log(|Δ|)}\right)}$ while requesting only polynomial memory (both quantum and classical).
△ Less
Submitted 1 August, 2018; v1 submitted 10 June, 2018;
originally announced June 2018.
-
Unconditional Class Group Tabulation of Imaginary Quadratic Fields to $|Δ| < 2^{40}$
Authors:
A. S. Mosunov,
M. J. Jacobson Jr
Abstract:
We present an improved algorithm for tabulating class groups of imaginary quadratic fields of bounded discriminant. Our method uses classical class number formulas involving theta-series to compute the group orders unconditionally for all $Δ\not \equiv 1 \pmod{8}.$ The group structure is resolved using the factorization of the group order. The $1 \bmod 8$ case was handled using the methods of \cit…
▽ More
We present an improved algorithm for tabulating class groups of imaginary quadratic fields of bounded discriminant. Our method uses classical class number formulas involving theta-series to compute the group orders unconditionally for all $Δ\not \equiv 1 \pmod{8}.$ The group structure is resolved using the factorization of the group order. The $1 \bmod 8$ case was handled using the methods of \cite{jacobson}, including the batch verification method based on the Eichler-Selberg trace formula to remove dependence on the Extended Riemann Hypothesis. Our new method enabled us to extend the previous bound of $|Δ| < 2 \cdot 10^{11}$ to $2^{40}$. Statistical data in support of a variety conjectures is presented, along with new examples of class groups with exotic structures.
△ Less
Submitted 27 February, 2015;
originally announced February 2015.
-
Rigorous Computation of Fundamental Units in Algebraic Number Fields
Authors:
Felix Fontein,
Michael J. Jacobson Jr
Abstract:
We present an algorithm that unconditionally computes a representation of the unit group of a number field of discriminant $Δ_K$, given a full-rank subgroup as input, in asymptotically fewer bit operations than the baby-step giant-step algorithm. If the input is assumed to represent the full unit group, for example, under the assumption of the Generalized Riemann Hypothesis, then our algorithm c…
▽ More
We present an algorithm that unconditionally computes a representation of the unit group of a number field of discriminant $Δ_K$, given a full-rank subgroup as input, in asymptotically fewer bit operations than the baby-step giant-step algorithm. If the input is assumed to represent the full unit group, for example, under the assumption of the Generalized Riemann Hypothesis, then our algorithm can unconditionally certify its correctness in expected time $O(Δ_K^{n/(4n + 2) + ε}) = O(Δ_K^{1/4 - 1/(8n+4) + ε})$ where $n$ is the unit rank.
△ Less
Submitted 23 January, 2010;
originally announced January 2010.