Skip to main content

Showing 1–30 of 30 results for author: Oren, Y

.
  1. arXiv:2506.15756  [pdf

    cs.MA cs.AI cs.LG

    RecBayes: Recurrent Bayesian Ad Hoc Teamwork in Large Partially Observable Domains

    Authors: João G. Ribeiro, Yaniv Oren, Alberto Sardinha, Matthijs Spaan, Francisco S. Melo

    Abstract: This paper proposes RecBayes, a novel approach for ad hoc teamwork under partial observability, a setting where agents are deployed on-the-fly to environments where pre-existing teams operate, that never requires, at any stage, access to the states of the environment or the actions of its teammates. We show that by relying on a recurrent Bayesian classifier trained using past experiences, an ad ho… ▽ More

    Submitted 18 June, 2025; originally announced June 2025.

  2. arXiv:2506.04398  [pdf, ps, other

    cs.LG cs.AI

    Bridging the Performance Gap Between Target-Free and Target-Based Reinforcement Learning With Iterated Q-Learning

    Authors: Théo Vincent, Yogesh Tripathi, Tim Faust, Yaniv Oren, Jan Peters, Carlo D'Eramo

    Abstract: In value-based reinforcement learning, removing the target network is tempting as the boostrapped target would be built from up-to-date estimates, and the spared memory occupied by the target network could be reallocated to expand the capacity of the online network. However, eliminating the target network introduces instability, leading to a decline in performance. Removing the target network also… ▽ More

    Submitted 4 June, 2025; originally announced June 2025.

  3. arXiv:2505.21119  [pdf, ps, other

    cs.LG cs.AI stat.ML

    Universal Value-Function Uncertainties

    Authors: Moritz A. Zanger, Max Weltevrede, Yaniv Oren, Pascal R. Van der Vaart, Caroline Horsch, Wendelin Böhmer, Matthijs T. J. Spaan

    Abstract: Estimating epistemic uncertainty in value functions is a crucial challenge for many aspects of reinforcement learning (RL), including efficient exploration, safe decision-making, and offline RL. While deep ensembles provide a robust method for quantifying value uncertainty, they come with significant computational overhead. Single-model methods, while computationally favorable, often rely on heuri… ▽ More

    Submitted 2 June, 2025; v1 submitted 27 May, 2025; originally announced May 2025.

  4. arXiv:2504.06048  [pdf, other

    cs.LG

    Trust-Region Twisted Policy Improvement

    Authors: Joery A. de Vries, Jinke He, Yaniv Oren, Matthijs T. J. Spaan

    Abstract: Monte-Carlo tree search (MCTS) has driven many recent breakthroughs in deep reinforcement learning (RL). However, scaling MCTS to parallel compute has proven challenging in practice which has motivated alternative planners like sequential Monte-Carlo (SMC). Many of these SMC methods adopt particle filters for smoothing through a reformulation of RL as a policy inference problem. Yet, persisting de… ▽ More

    Submitted 24 May, 2025; v1 submitted 8 April, 2025; originally announced April 2025.

  5. arXiv:2411.12372  [pdf, other

    cs.CL cs.LG

    RedPajama: an Open Dataset for Training Large Language Models

    Authors: Maurice Weber, Daniel Fu, Quentin Anthony, Yonatan Oren, Shane Adams, Anton Alexandrov, Xiaozhong Lyu, Huu Nguyen, Xiaozhe Yao, Virginia Adams, Ben Athiwaratkun, Rahul Chalamala, Kezhen Chen, Max Ryabinin, Tri Dao, Percy Liang, Christopher Ré, Irina Rish, Ce Zhang

    Abstract: Large language models are increasingly becoming a cornerstone technology in artificial intelligence, the sciences, and society as a whole, yet the optimal strategies for dataset composition and filtering remain largely elusive. Many of the top-performing models lack transparency in their dataset curation and model development processes, posing an obstacle to the development of fully open language… ▽ More

    Submitted 19 November, 2024; originally announced November 2024.

    Comments: 38th Conference on Neural Information Processing Systems (NeurIPS 2024) Track on Datasets and Benchmarks

  6. arXiv:2406.01423  [pdf, other

    cs.LG cs.AI

    Value Improved Actor Critic Algorithms

    Authors: Yaniv Oren, Moritz A. Zanger, Pascal R. van der Vaart, Mustafa Mert Celikok, Matthijs T. J. Spaan, Wendelin Bohmer

    Abstract: To learn approximately optimal acting policies for decision problems, modern Actor Critic algorithms rely on deep Neural Networks (DNNs) to parameterize the acting policy and greedification operators to iteratively improve it. The reliance on DNNs suggests an improvement that is gradient based, which is per step much less greedy than the improvement possible by greedier operators such as the greed… ▽ More

    Submitted 11 March, 2025; v1 submitted 3 June, 2024; originally announced June 2024.

  7. arXiv:2403.09476  [pdf, other

    astro-ph.GA

    Sunyaev-Zeldovich Signals from $L^*$ Galaxies: Observations, Analytics, and Simulations

    Authors: Yossi Oren, Amiel Sternberg, Christopher F. McKee, Yakov Faerman, Shy Genel

    Abstract: We analyze measurements of the thermal Sunyaev-Zeldovich (tSZ) effect arising in the circumgalactic medium (CGM) of $L^*$ galaxies, reported by Bregman et al. 2022 and Das et al. 2023. In our analysis we use the Faerman et al. 2017 and Faerman et al. 2020 CGM models, a new power-law model (PLM), and the TNG100 simulation. For a given $M_{\rm vir}$, our PLM has four parameters; the fraction,… ▽ More

    Submitted 13 August, 2024; v1 submitted 14 March, 2024; originally announced March 2024.

    Comments: Accepted for publication in the Astrophysical Journal. 29 pages, 17 figures

  8. arXiv:2310.17623  [pdf, other

    cs.CL cs.LG

    Proving Test Set Contamination in Black Box Language Models

    Authors: Yonatan Oren, Nicole Meister, Niladri Chatterji, Faisal Ladhak, Tatsunori B. Hashimoto

    Abstract: Large language models are trained on vast amounts of internet data, prompting concerns and speculation that they have memorized public benchmarks. Going from speculation to proof of contamination is challenging, as the pretraining data used by proprietary models are often not publicly accessible. We show that it is possible to provide provable guarantees of test set contamination in language model… ▽ More

    Submitted 23 November, 2023; v1 submitted 26 October, 2023; originally announced October 2023.

  9. arXiv:2210.13455  [pdf, other

    cs.LG cs.AI

    Epistemic Monte Carlo Tree Search

    Authors: Yaniv Oren, Villiam Vadocz, Matthijs T. J. Spaan, Wendelin Böhmer

    Abstract: The AlphaZero/MuZero (A/MZ) family of algorithms has achieved remarkable success across various challenging domains by integrating Monte Carlo Tree Search (MCTS) with learned models. Learned models introduce epistemic uncertainty, which is caused by learning from limited data and is useful for exploration in sparse reward environments. MCTS does not account for the propagation of this uncertainty… ▽ More

    Submitted 2 April, 2025; v1 submitted 21 October, 2022; originally announced October 2022.

  10. DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting

    Authors: Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom

    Abstract: Browser fingerprinting aims to identify users or their devices, through scripts that execute in the users' browser and collect information on software or hardware characteristics. It is used to track users or as an additional means of identification to improve security. In this paper, we report on a new technique that can significantly extend the tracking time of fingerprint-based tracking methods… ▽ More

    Submitted 24 January, 2022; originally announced January 2022.

    Comments: Network and Distributed System Security Symposium, Feb 2022, San Diego, United States

  11. arXiv:2108.01707  [pdf

    cond-mat.soft

    Simplifying concentration-polarization of trace-ions in pressure-driven membrane processes

    Authors: Yaeli S. Oren, Viatcheslav Freger, Oded Nir

    Abstract: Accounting for concentration-polarization (CP) is critical for modeling solute transport in membrane separation processes. In a mixed-electrolyte solution, ions CP is affected not only by diffusion and advection but also by electromigration. Yet, the classic film model, lacking an electromigration term, is frequently used for modeling ion CP. Often, ion CP is altogether neglected to reduce the com… ▽ More

    Submitted 3 August, 2021; originally announced August 2021.

    Comments: 15 pages, 3 figures and a graphical abstract

  12. arXiv:2103.04952  [pdf, other

    cs.CR

    Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses

    Authors: Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom

    Abstract: The "eternal war in cache" has reached browsers, with multiple cache-based side-channel attacks and countermeasures being suggested. A common approach for countermeasures is to disable or restrict JavaScript features deemed essential for carrying out attacks. To assess the effectiveness of this approach, in this work we seek to identify those JavaScript features which are essential for carrying ou… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

  13. arXiv:1909.02060  [pdf, other

    cs.CL cs.LG stat.ML

    Distributionally Robust Language Modeling

    Authors: Yonatan Oren, Shiori Sagawa, Tatsunori B. Hashimoto, Percy Liang

    Abstract: Language models are generally trained on data spanning a wide range of topics (e.g., news, reviews, fiction), but they might be applied to an a priori unknown target distribution (e.g., restaurant reviews). In this paper, we first show that training on text outside the test distribution can degrade test performance when using standard maximum likelihood (MLE) training. To remedy this without the k… ▽ More

    Submitted 4 September, 2019; originally announced September 2019.

    Comments: Camera ready version for EMNLP

  14. arXiv:1908.02524  [pdf, other

    cs.CR

    Cross-Router Covert Channels

    Authors: Adar Ovadya, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren

    Abstract: Many organizations protect secure networked devices from non-secure networked devices by assigning each class of devices to a different logical network. These two logical networks, commonly called the host network and the guest network, use the same router hardware, which is designed to isolate the two networks in software. In this work we show that logical network isolation based on host and gu… ▽ More

    Submitted 7 August, 2019; originally announced August 2019.

    Comments: Presented at WOOT 2019 - https://orenlab.sise.bgu.ac.il/p/CrossRouter

  15. arXiv:1905.04691  [pdf, other

    cs.CR

    Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor

    Authors: Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren

    Abstract: Position sensors, such as the gyroscope, the magnetometer and the accelerometer, are found in a staggering variety of devices, from smartphones and UAVs to autonomous robots. Several works have shown how adversaries can mount spoofing attacks to remotely corrupt or even completely control the outputs of these sensors. With more and more critical applications relying on sensor readings to make impo… ▽ More

    Submitted 12 May, 2019; originally announced May 2019.

    ACM Class: B.8.1; K.6.5

  16. arXiv:1812.01194  [pdf, other

    stat.ML cs.LG

    A Retrieve-and-Edit Framework for Predicting Structured Outputs

    Authors: Tatsunori B. Hashimoto, Kelvin Guu, Yonatan Oren, Percy Liang

    Abstract: For the task of generating complex outputs such as source code, editing existing outputs can be easier than generating complex outputs from scratch. With this motivation, we propose an approach that first retrieves a training example based on the input (e.g., natural language description) and then edits it to the desired output (e.g., code). Our contribution is a computationally efficient method f… ▽ More

    Submitted 3 December, 2018; originally announced December 2018.

    Comments: To appear, NeurIPS 2018

  17. arXiv:1811.07153  [pdf, other

    cs.CR cs.LG

    Robust Website Fingerprinting Through the Cache Occupancy Channel

    Authors: Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom

    Abstract: Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user privacy, have been shown to be effective even if the traffic is sent over anonymity-preserving networks such as Tor. The classical attack model used to evaluate website fingerprinting attacks assumes an on-path adversary, who can observe all traffic traveling between the user's computer and the Tor… ▽ More

    Submitted 21 February, 2019; v1 submitted 17 November, 2018; originally announced November 2018.

  18. Robust Diabatic Quantum Search by Landau-Zener-Stückelberg Oscillations

    Authors: Yosi Atia, Yonathan Oren, Nadav Katz

    Abstract: Quantum computation by the adiabatic theorem requires a slowly varying Hamiltonian with respect to the spectral gap. We show that the Landau-Zener-Stückelberg oscillation phenomenon, that naturally occurs in quantum two level systems under non-adiabatic periodic drive, can be exploited to find the ground state of an N dimensional Grover Hamiltonian. The total runtime of this method is… ▽ More

    Submitted 20 December, 2018; v1 submitted 12 November, 2018; originally announced November 2018.

    Comments: 10 pages, 5 figures

  19. arXiv:1805.04850  [pdf, other

    cs.CR

    Shattered Trust: When Replacement Smartphone Components Attack

    Authors: Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren

    Abstract: Phone touchscreens, and other similar hardware components such as orientation sensors, wireless charging controllers, and NFC readers, are often produced by third-party manufacturers and not by the phone vendors themselves. Third-party driver source code to support these components is integrated into the vendor's source code. In contrast to 'pluggable' drivers, such as USB or network drivers, the… ▽ More

    Submitted 13 May, 2018; originally announced May 2018.

    Comments: Presented in WOOT 17', 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17) - 2017

  20. arXiv:1709.08878  [pdf, other

    cs.CL cs.AI cs.LG cs.NE stat.ML

    Generating Sentences by Editing Prototypes

    Authors: Kelvin Guu, Tatsunori B. Hashimoto, Yonatan Oren, Percy Liang

    Abstract: We propose a new generative model of sentences that first samples a prototype sentence from the training corpus and then edits it into a new sentence. Compared to traditional models that generate from scratch either left-to-right or by first sampling a latent sentence vector, our prototype-then-edit model improves perplexity on language modeling and generates higher quality outputs according to hu… ▽ More

    Submitted 7 September, 2018; v1 submitted 26 September, 2017; originally announced September 2017.

    Comments: 14 pages, Transactions of the Association for Computational Linguistics (TACL), 2018

  21. Theory of ion and water transport in reverse osmosis membranes

    Authors: Y. S. Oren, P. M. Biesheuvel

    Abstract: We present theory for ion and water transport through reverse osmosis membranes based on a Maxwell-Stefan framework combined with hydrodynamic theory for the reduced motion of particles in thin pores. We include all driving forces and frictions both on the fluid (water), and on the ions, including ion-fluid friction as well as ion-wall friction. By including the acid-base character of the carbonic… ▽ More

    Submitted 21 June, 2017; originally announced June 2017.

    Journal ref: Phys. Rev. Applied 9, 024034 (2018)

  22. arXiv:1502.07373  [pdf, other

    cs.CR cs.NI

    The Spy in the Sandbox -- Practical Cache Attacks in Javascript

    Authors: Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis

    Abstract: We present the first micro-architectural side-channel attack which runs entirely in the browser. In contrast to other works in this genre, this attack does not require the attacker to install any software on the victim's machine -- to facilitate the attack, the victim needs only to browse to an untrusted webpage with attacker-controlled content. This makes the attack model highly scalable and extr… ▽ More

    Submitted 1 March, 2015; v1 submitted 25 February, 2015; originally announced February 2015.

  23. arXiv:0910.3552  [pdf, ps, other

    astro-ph.HE

    Discrete Self-Similarity in Ultra-Relativistic Type-II Strong Explosions

    Authors: Yonatan Oren, Re'em Sari

    Abstract: A solution to the ultra-relativistic strong explosion problem with a non-power law density gradient is delineated. We consider a blast wave expanding into a density profile falling off as a steep radial power-law with small, spherically symmetric, and log-periodic density perturbations. We find discretely self-similar solutions to the perturbation equations and compare them to numerical simulati… ▽ More

    Submitted 19 October, 2009; originally announced October 2009.

    Comments: 21 pages, 5 figures

    Journal ref: Phys.Fluids 21:106102,2009

  24. arXiv:0907.1731  [pdf, ps, other

    astro-ph.HE

    Discrete Self-Similarity in Type-II Strong Explosions

    Authors: Yonatan Oren, Re'em Sari

    Abstract: We present new solutions to the strong explosion problem in a non-power law density profile. The unperturbed self-similar solutions discovered by Waxman & Shvarts describe strong Newtonian shocks propagating into a cold gas with a density profile falling off as $r^{-ω}$, where $ω>3$ (Type-II solutions). The perturbations we consider are spherically symmetric and log-periodic with respect to the… ▽ More

    Submitted 10 July, 2009; originally announced July 2009.

    Journal ref: Phys.Fluids 21:056101,2009

  25. arXiv:0901.0512  [pdf

    hep-ex

    Expected Performance of the ATLAS Experiment - Detector, Trigger and Physics

    Authors: The ATLAS Collaboration, G. Aad, E. Abat, B. Abbott, J. Abdallah, A. A. Abdelalim, A. Abdesselam, O. Abdinov, B. Abi, M. Abolins, H. Abramowicz, B. S. Acharya, D. L. Adams, T. N. Addy, C. Adorisio, P. Adragna, T. Adye, J. A. Aguilar-Saavedra, M. Aharrouche, S. P. Ahlen, F. Ahles, A. Ahmad, H. Ahmed, G. Aielli, T. Akdogan , et al. (2587 additional authors not shown)

    Abstract: A detailed study is presented of the expected performance of the ATLAS detector. The reconstruction of tracks, leptons, photons, missing energy and jets is investigated, together with the performance of b-tagging and the trigger. The physics potential for a variety of interesting physics processes, within the Standard Model and beyond, is examined. The study comprises a series of notes based on… ▽ More

    Submitted 14 August, 2009; v1 submitted 28 December, 2008; originally announced January 2009.

  26. GRB 051221A and Tests of Lorentz Symmetry

    Authors: Maria Rodriguez Martinez, Tsvi Piran, Yonatan Oren

    Abstract: Various approaches to quantum gravity suggest the possibility of violation of Lorentz symmetry at very high energies. In these cases we expect a modification at low energies of the dispersion relation of photons that contains extra powers of the momentum suppressed by a high energy scale. These terms break boost invariance and can be tested even at relatively low energies. We use the light curve… ▽ More

    Submitted 24 January, 2006; originally announced January 2006.

    Comments: 9 pages, 2 figures

    Journal ref: JCAP 0605 (2006) 017

  27. On Choptuik's scaling in higher dimensions

    Authors: Evgeny Sorkin, Yonatan Oren

    Abstract: We extend Choptuik's scaling phenomenon found in general relativistic critical gravitational collapse of a massless scalar field to higher dimensions. We find that in the range 4 <= D <= 11 the behavior is qualitatively similar to that discovered by Choptuik. In each dimension we obtain numerically the universal numbers associated with the critical collapse: the scaling exponent gamma and the ec… ▽ More

    Submitted 6 June, 2005; v1 submitted 3 February, 2005; originally announced February 2005.

    Comments: 18 pages, 11 eps figures; v2: 2 refs added, improved discussions to match the published version

    Journal ref: Phys.Rev. D71 (2005) 124005

  28. The apparent size of GRB afterglows as a test of the Fireball model

    Authors: Yonatan Oren, Ehud Nakar, Tsvi Piran

    Abstract: Taylor et al. (2004) reported recently on the first direct measurement of the apparent size of a GRB afterglow. Here we confront these observations with the predictions of the fireball model. We use a simple model to study numerically the evolution of the fireball and determine its apparent size, starting at the early spherical expansion phase through the jet break and into the Newtonian regime.… ▽ More

    Submitted 13 June, 2004; v1 submitted 11 June, 2004; originally announced June 2004.

    Journal ref: Mon.Not.Roy.Astron.Soc. 353 (2004) L35-L40

  29. Polarization and light curve variability: the "patchy shell" model

    Authors: Ehud Nakar, Yonatan Oren

    Abstract: Recent advances in early detection and detailed monitoring of GRB afterglows have revealed variability in some afterglow light curves. One of the leading models for this behavior is the patchy shell model. This model attributes the variability to random angular fluctuations in the relativistic jet energy. These an-axisymmetric fluctuations should also impose variations in the degree and angle of… ▽ More

    Submitted 5 February, 2004; v1 submitted 8 October, 2003; originally announced October 2003.

    Comments: 10 pages, 2 figures, Final version to appear in ApJL

    Journal ref: Astrophys.J. 602 (2004) L97-L100

  30. On the Collapse of Charged Scalar Fields

    Authors: Yonatan Oren, Tsvi Piran

    Abstract: We explore numerically the evolution of a collapsing spherical shell of charged, massless scalar field. We obtain an external \RN space-time, and an inner space-time that is bounded by a singularity on the Cauchy Horizon. We compare these results with previous analysis and discuss some of the numerical problems encountered.

    Submitted 17 June, 2003; originally announced June 2003.

    Comments: Accepted for publication in Phys. Rev. D

    Journal ref: Phys.Rev. D68 (2003) 044013