Skip to main content

Showing 1–21 of 21 results for author: Andrecut, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.19987  [pdf, other

    cs.LG cs.CR

    Residual Random Neural Networks

    Authors: M. Andrecut

    Abstract: The single-layer feedforward neural network with random weights is a recurring motif in the neural networks literature. The advantage of these networks is their simplified training, which reduces to solving a ridge-regression problem. A general assumption is that these networks require a large number of hidden neurons relative to the dimensionality of the data samples, in order to achieve good cla… ▽ More

    Submitted 21 February, 2025; v1 submitted 25 October, 2024; originally announced October 2024.

    Comments: revised version, 17 pages, 8 figures, added kernel method, added kernel type

  2. arXiv:2311.06650  [pdf, other

    math.OC cs.LG

    Heuristic Optimal Transport in Branching Networks

    Authors: M. Andrecut

    Abstract: Optimal transport aims to learn a mapping of sources to targets by minimizing the cost, which is typically defined as a function of distance. The solution to this problem consists of straight line segments optimally connecting sources to targets, and it does not exhibit branching. These optimal solutions are in stark contrast with both natural, and man-made transportation networks, where branching… ▽ More

    Submitted 7 February, 2024; v1 submitted 11 November, 2023; originally announced November 2023.

    Comments: Accepted in Int. J. Mod. Phys. C, 11 pages, 6 figures

  3. arXiv:2310.16209  [pdf, other

    cs.LG

    ELM Ridge Regression Boosting

    Authors: M. Andrecut

    Abstract: We discuss a boosting approach for the Ridge Regression (RR) method, with applications to the Extreme Learning Machine (ELM), and we show that the proposed method significantly improves the classification performance and robustness of ELMs.

    Submitted 24 October, 2023; originally announced October 2023.

    Comments: 6 pages, 2 figures

  4. arXiv:2309.07450  [pdf, other

    cs.LG

    TensorFlow Chaotic Prediction and Blow Up

    Authors: M. Andrecut

    Abstract: Predicting the dynamics of chaotic systems is one of the most challenging tasks for neural networks, and machine learning in general. Here we aim to predict the spatiotemporal chaotic dynamics of a high-dimensional non-linear system. In our attempt we use the TensorFlow library, representing the state of the art for deep neural networks training and prediction. While our results are encouraging, a… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

    Comments: 10 pages, 3 figures

  5. arXiv:2302.13393  [pdf, other

    cs.LG

    Autoencoders as Pattern Filters

    Authors: M. Andrecut

    Abstract: We discuss a simple approach to transform autoencoders into "pattern filters". Besides filtering, we show how this simple approach can be used also to build robust classifiers, by learning to filter only patterns of a given class.

    Submitted 26 February, 2023; originally announced February 2023.

    Comments: 10 pages, 5 figures

  6. arXiv:2302.02507  [pdf, ps, other

    cs.CR

    Secret sharing scheme based on hashing

    Authors: M. Andrecut

    Abstract: We propose an adaptive threshold multi secret sharing scheme based solely on cryptographically secure hash functions. We show that the proposed scheme is also: perfect, ideal, verifiable, and proactive. Moreover the proposed scheme has a low computational complexity comparing to the most common schemes operating over finite fields.

    Submitted 5 February, 2023; originally announced February 2023.

    Comments: 7 pages

  7. arXiv:2211.07626  [pdf, other

    cs.CR

    Growing Random Strings in CA

    Authors: M. Andrecut

    Abstract: We discuss a class of cellular automata (CA) able to produce long random strings, starting from short "seed" strings. The approach uses two principles borrowed from cryptography: diffusion and confusion. We show numerically that the strings are pseudo-random using three approaches based on: Fourier transform, entropy estimation, and compression. An application to cryptography is also included with… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

    Comments: 9 pages, 4 figures

  8. arXiv:2205.07323  [pdf, ps, other

    cs.CR

    Attack vs Benign Network Intrusion Traffic Classification

    Authors: M. Andrecut

    Abstract: Intrusion detection systems (IDS) are used to monitor networks or systems for attack activity or policy violations. Such a system should be able to successfully identify anomalous deviations from normal traffic behavior. Here we discuss the machine learning approach to building an anomaly-based IDS using the CSE-CIC-IDS2018 dataset. Since the publication of this dataset a relatively large number o… ▽ More

    Submitted 15 May, 2022; originally announced May 2022.

    Comments: 8 pages

  9. arXiv:2201.07359  [pdf, other

    cs.CR cs.LG

    Sandbox Sample Classification Using Behavioral Indicators of Compromise

    Authors: M. Andrecut

    Abstract: Behavioral Indicators of Compromise are associated with various automated methods used to extract the sample behavior by observing the system function calls performed in a virtual execution environment. Thus, every sample is described by a set of BICs triggered by the sample behavior in the sandbox environment. Here we discuss a Machine Learning approach to the classification of the sandbox sample… ▽ More

    Submitted 18 January, 2022; originally announced January 2022.

    Comments: 10 pages, 2 figures

  10. arXiv:2106.00014  [pdf, other

    cs.NE cs.LG

    Diffusion Self-Organizing Map on the Hypersphere

    Authors: M. Andrecut

    Abstract: We discuss a diffusion based implementation of the self-organizing map on the unit hypersphere. We show that this approach can be efficiently implemented using just linear algebra methods, we give a python numpy implementation, and we illustrate the approach using the well known MNIST dataset.

    Submitted 31 May, 2021; originally announced June 2021.

    Comments: 10 pages, 4 figures

  11. arXiv:2102.03943  [pdf, other

    cs.LG

    Additive Feature Hashing

    Authors: M. Andrecut

    Abstract: The hashing trick is a machine learning technique used to encode categorical features into a numerical vector representation of pre-defined fixed length. It works by using the categorical hash values as vector indices, and updating the vector values at those indices. Here we discuss a different approach based on additive-hashing and the "almost orthogonal" property of high-dimensional random vecto… ▽ More

    Submitted 7 February, 2021; originally announced February 2021.

    Comments: 11 pages 3 figures

  12. arXiv:2012.13021  [pdf, other

    cs.LG physics.data-an

    K-Means Kernel Classifier

    Authors: M. Andrecut

    Abstract: We combine K-means clustering with the least-squares kernel classification method. K-means clustering is used to extract a set of representative vectors for each class. The least-squares kernel method uses these representative vectors as a training set for the classification task. We show that this combination of unsupervised and supervised learning algorithms performs very well, and we illustrate… ▽ More

    Submitted 23 December, 2020; originally announced December 2020.

    Comments: 8 pages, 2 figures

  13. arXiv:1802.09914  [pdf, other

    cs.CL cs.AI cs.LG stat.ML

    High-Dimensional Vector Semantics

    Authors: M. Andrecut

    Abstract: In this paper we explore the "vector semantics" problem from the perspective of "almost orthogonal" property of high-dimensional random vectors. We show that this intriguing property can be used to "memorize" random vectors by simply adding them, and we provide an efficient probabilistic solution to the set membership problem. Also, we discuss several applications to word context vector embeddings… ▽ More

    Submitted 23 February, 2018; originally announced February 2018.

    Comments: 12 pages, 5 figures, Int. J. Mod. Phys. C, 2018

  14. arXiv:1801.02068  [pdf, other

    physics.data-an cs.AI cs.LO q-bio.QM

    On the inherent competition between valid and spurious inductive inferences in Boolean data

    Authors: M. Andrecut

    Abstract: Inductive inference is the process of extracting general rules from specific observations. This problem also arises in the analysis of biological networks, such as genetic regulatory networks, where the interactions are complex and the observations are incomplete. A typical task in these problems is to extract general interaction rules as combinations of Boolean covariates, that explain a measured… ▽ More

    Submitted 6 January, 2018; originally announced January 2018.

    Comments: 12 pages, 2 figures, Int. J. Mod. Phys. C, 2017

  15. arXiv:1706.07896  [pdf, other

    cs.LG physics.data-an stat.ML

    Reservoir Computing on the Hypersphere

    Authors: M. Andrecut

    Abstract: Reservoir Computing (RC) refers to a Recurrent Neural Networks (RNNs) framework, frequently used for sequence learning and time series prediction. The RC system consists of a random fixed-weight RNN (the input-hidden reservoir layer) and a classifier (the hidden-output readout layer). Here we focus on the sequence learning problem, and we explore a different approach to RC. More specifically, we r… ▽ More

    Submitted 23 June, 2017; originally announced June 2017.

    Comments: 12 pages, 6 figures, Int. J. Mod. Phys. C, 2017

  16. arXiv:1703.07830  [pdf, other

    cs.LG physics.data-an stat.ML

    Randomized Kernel Methods for Least-Squares Support Vector Machines

    Authors: M. Andrecut

    Abstract: The least-squares support vector machine is a frequently used kernel method for non-linear regression and classification tasks. Here we discuss several approximation algorithms for the least-squares support vector machine classifier. The proposed methods are based on randomized block kernel matrices, and we show that they provide good accuracy and reliable scaling for multi-class classification pr… ▽ More

    Submitted 22 March, 2017; originally announced March 2017.

    Comments: 16 pages, 6 figures

    Journal ref: Int. J. Mod. Phys. C, 28, 1750015 (2017)

  17. arXiv:1506.00277  [pdf, ps, other

    cs.CR

    A Matrix Public Key Cryptosystem

    Authors: M. Andrecut

    Abstract: We discuss a matrix public key cryptosystem and its numerical implementation.

    Submitted 31 May, 2015; originally announced June 2015.

    Comments: 18 pages, C code included

  18. arXiv:1410.0382  [pdf, ps, other

    cs.CR physics.data-an

    A String-Based Public Key Cryptosystem

    Authors: M. Andrecut

    Abstract: Traditional methods in public key cryptography are based on number theory, and suffer from problems such as dealing with very large numbers, making key creation cumbersome. Here, we propose a new public key cryptosystem based on strings only, which avoids the difficulties of the traditional number theory approach. The security mechanism for public and secret keys generation is ensured by a recursi… ▽ More

    Submitted 19 January, 2015; v1 submitted 5 September, 2014; originally announced October 2014.

    Comments: In this revised version of the paper we show that the eavesdropper's problem of the proposed cryptosystem has a solution, and we give the details of the solution

    ACM Class: E.3

  19. arXiv:1304.2058  [pdf, ps, other

    physics.data-an cs.IT

    Stochastic Recovery Of Sparse Signals From Random Measurements

    Authors: M. Andrecut

    Abstract: Sparse signal recovery from a small number of random measurements is a well known NP-hard to solve combinatorial optimization problem, with important applications in signal and image processing. The standard approach to the sparse signal recovery problem is based on the basis pursuit method. This approach requires the solution of a large convex optimization problem, and therefore suffers from high… ▽ More

    Submitted 7 April, 2013; originally announced April 2013.

    Comments: 6 pages, 3 figures

    Journal ref: Engineering Letters, 19:1, EL_19_1_01 (2010)

  20. arXiv:1105.4936  [pdf, ps, other

    physics.data-an cs.CR

    Sparse Random Approximation and Lossy Compression

    Authors: M. Andrecut

    Abstract: We discuss a method for sparse signal approximation, which is based on the correlation of the target signal with a pseudo-random signal, and uses a modification of the greedy matching pursuit algorithm. We show that this approach provides an efficient encoding-decoding method, which can be used also for lossy compression and encryption purposes.

    Submitted 25 May, 2011; originally announced May 2011.

    Comments: 6 pages, 4 figures

  21. arXiv:0811.1081  [pdf, ps, other

    q-bio.QM cs.MS physics.comp-ph

    Parallel GPU Implementation of Iterative PCA Algorithms

    Authors: M. Andrecut

    Abstract: Principal component analysis (PCA) is a key statistical technique for multivariate data analysis. For large data sets the common approach to PCA computation is based on the standard NIPALS-PCA algorithm, which unfortunately suffers from loss of orthogonality, and therefore its applicability is usually limited to the estimation of the first few components. Here we present an algorithm based on Gr… ▽ More

    Submitted 6 November, 2008; originally announced November 2008.

    Comments: 45 pages, 1 figure, source code included