Skip to main content

Showing 1–50 of 125 results for author: Vorobeychik, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.21688  [pdf, ps, other

    cs.CR cs.GT

    CyGym: A Simulation-Based Game-Theoretic Analysis Framework for Cybersecurity

    Authors: Michael Lanier, Yevgeniy Vorobeychik

    Abstract: We introduce a novel cybersecurity encounter simulator between a network defender and an attacker designed to facilitate game-theoretic modeling and analysis while maintaining many significant features of real cyber defense. Our simulator, built within the OpenAI Gym framework, incorporates realistic network topologies, vulnerabilities, exploits (including-zero-days), and defensive mechanisms. Add… ▽ More

    Submitted 26 June, 2025; originally announced June 2025.

  2. arXiv:2506.06530  [pdf, ps, other

    cs.CR

    Breaking the Gaussian Barrier: Residual-PAC Privacy for Automatic Privatization

    Authors: Tao Zhang, Yevgeniy Vorobeychik

    Abstract: The Probably Approximately Correct (PAC) Privacy framework [1] provides a powerful instance-based methodology for certifying privacy in complex data-driven systems. However, existing PAC Privacy algorithms rely on a Gaussian mutual information upper bound. We show that this is in general too conservative: the upper bound obtained by these algorithms is tight if and only if the perturbed mechanism… ▽ More

    Submitted 6 June, 2025; originally announced June 2025.

  3. arXiv:2506.02001  [pdf, ps, other

    cs.DC

    EcoLoRA: Communication-Efficient Federated Fine-Tuning of Large Language Models

    Authors: Han Liu, Ruoyao Wen, Srijith Nair, Jia Liu, Wenjing Lou, Chongjie Zhang, William Yeoh, Yevgeniy Vorobeychik, Ning Zhang

    Abstract: To address data locality and privacy restrictions, Federated Learning (FL) has recently been adopted to fine-tune large language models (LLMs), enabling improved performance on various downstream tasks without requiring aggregated data. However, the repeated exchange of model updates in FL can result in prohibitively high communication costs, hindering the distributed learning process. To address… ▽ More

    Submitted 20 May, 2025; originally announced June 2025.

  4. arXiv:2505.22979  [pdf, ps, other

    cs.GT cs.MA

    Learning Recommender Mechanisms for Bayesian Stochastic Games

    Authors: Bengisu Guresti, Chongjie Zhang, Yevgeniy Vorobeychik

    Abstract: An important challenge in non-cooperative game theory is coordinating on a single (approximate) equilibrium from many possibilities - a challenge that becomes even more complex when players hold private information. Recommender mechanisms tackle this problem by recommending strategies to players based on their reported type profiles. A key consideration in such mechanisms is to ensure that players… ▽ More

    Submitted 28 May, 2025; originally announced May 2025.

  5. arXiv:2505.06535  [pdf, ps, other

    cs.AI cs.LG stat.ML

    Online Feedback Efficient Active Target Discovery in Partially Observable Environments

    Authors: Anindya Sarkar, Binglin Ji, Yevgeniy Vorobeychik

    Abstract: In various scientific and engineering domains, where data acquisition is costly, such as in medical imaging, environmental monitoring, or remote sensing, strategic sampling from unobserved regions, guided by prior observations, is essential to maximize target discovery within a limited sampling budget. In this work, we introduce Diffusion-guided Active Target Discovery (DiffATD), a novel method th… ▽ More

    Submitted 10 May, 2025; originally announced May 2025.

    Comments: 30 pages, 28 figures, Pre-print

  6. arXiv:2504.05891  [pdf, other

    cs.GT cs.LG

    To Give or Not to Give? The Impacts of Strategically Withheld Recourse

    Authors: Yatong Chen, Andrew Estornell, Yevgeniy Vorobeychik, Yang Liu

    Abstract: Individuals often aim to reverse undesired outcomes in interactions with automated systems, like loan denials, by either implementing system-recommended actions (recourse), or manipulating their features. While providing recourse benefits users and enhances system utility, it also provides information about the decision process that can be used for more effective strategic manipulation, especially… ▽ More

    Submitted 8 April, 2025; originally announced April 2025.

    Journal ref: Artificial Intelligence and Statistics (AISTATS 2025)

  7. arXiv:2503.01885  [pdf, other

    cs.LG cs.AI

    Learning Policy Committees for Effective Personalization in MDPs with Diverse Tasks

    Authors: Luise Ge, Michael Lanier, Anindya Sarkar, Bengisu Guresti, Chongjie Zhang, Yevgeniy Vorobeychik

    Abstract: Many dynamic decision problems, such as robotic control, involve a series of tasks, many of which are unknown at training time. Typical approaches for these problems, such as multi-task and meta reinforcement learning, do not generalize well when the tasks are diverse. On the other hand, approaches that aim to tackle task diversity, such as using task embedding as policy context and task clusterin… ▽ More

    Submitted 26 May, 2025; v1 submitted 26 February, 2025; originally announced March 2025.

  8. arXiv:2503.00191  [pdf, other

    cs.RO cs.AI

    Learning Vision-Based Neural Network Controllers with Semi-Probabilistic Safety Guarantees

    Authors: Xinhang Ma, Junlin Wu, Hussein Sibai, Yiannis Kantaros, Yevgeniy Vorobeychik

    Abstract: Ensuring safety in autonomous systems with vision-based control remains a critical challenge due to the high dimensionality of image inputs and the fact that the relationship between true system state and its visual manifestation is unknown. Existing methods for learning-based control in such settings typically lack formal safety guarantees. To address this challenge, we introduce a novel semi-pro… ▽ More

    Submitted 28 February, 2025; originally announced March 2025.

    Comments: 6 pages, 2 figures, submitted to IROS 2025

  9. arXiv:2412.17854  [pdf, other

    cs.LG cs.AI cs.CY

    Active Geospatial Search for Efficient Tenant Eviction Outreach

    Authors: Anindya Sarkar, Alex DiChristofano, Sanmay Das, Patrick J. Fowler, Nathan Jacobs, Yevgeniy Vorobeychik

    Abstract: Tenant evictions threaten housing stability and are a major concern for many cities. An open question concerns whether data-driven methods enhance outreach programs that target at-risk tenants to mitigate their risk of eviction. We propose a novel active geospatial search (AGS) modeling framework for this problem. AGS integrates property-level information in a search policy that identifies a seque… ▽ More

    Submitted 19 December, 2024; originally announced December 2024.

    Comments: Accepted to AAAI 2025 (AI for Social Impact Track)

  10. arXiv:2410.07414  [pdf, ps, other

    cs.CR

    Bayes-Nash Generative Privacy Against Membership Inference Attacks

    Authors: Tao Zhang, Rajagopal Venkatesaramani, Rajat K. De, Bradley A. Malin, Yevgeniy Vorobeychik

    Abstract: Membership inference attacks (MIAs) pose significant privacy risks by determining whether individual data is in a dataset. While differential privacy (DP) mitigates these risks, it has limitations including limited resolution in expressing privacy-utility tradeoffs and intractable sensitivity calculations for tight guarantees. We propose a game-theoretic framework modeling privacy protection as a… ▽ More

    Submitted 10 July, 2025; v1 submitted 9 October, 2024; originally announced October 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2406.01811

  11. arXiv:2410.05295  [pdf, other

    cs.CR cs.AI cs.LG

    AutoDAN-Turbo: A Lifelong Agent for Strategy Self-Exploration to Jailbreak LLMs

    Authors: Xiaogeng Liu, Peiran Li, Edward Suh, Yevgeniy Vorobeychik, Zhuoqing Mao, Somesh Jha, Patrick McDaniel, Huan Sun, Bo Li, Chaowei Xiao

    Abstract: In this paper, we propose AutoDAN-Turbo, a black-box jailbreak method that can automatically discover as many jailbreak strategies as possible from scratch, without any human intervention or predefined scopes (e.g., specified candidate strategies), and use them for red-teaming. As a result, AutoDAN-Turbo can significantly outperform baseline methods, achieving a 74.3% higher average attack success… ▽ More

    Submitted 22 April, 2025; v1 submitted 3 October, 2024; originally announced October 2024.

    Comments: ICLR 2025 Spotlight. Project Page: https://autodans.github.io/AutoDAN-Turbo Code: https://github.com/SaFoLab-WISC/AutoDAN-Turbo

  12. arXiv:2408.12010  [pdf, other

    cs.CR

    Differential Confounding Privacy and Inverse Composition

    Authors: Tao Zhang, Bradley A. Malin, Netanel Raviv, Yevgeniy Vorobeychik

    Abstract: Differential privacy (DP) has become the gold standard for privacy-preserving data analysis, but its applicability can be limited in scenarios involving complex dependencies between sensitive information and datasets. To address this, we introduce \textit{differential confounding privacy} (DCP), a specialized form of the Pufferfish privacy (PP) framework that generalizes DP by accounting for broad… ▽ More

    Submitted 1 May, 2025; v1 submitted 21 August, 2024; originally announced August 2024.

  13. arXiv:2408.01375  [pdf

    cs.LG cs.CY

    Adaptive Recruitment Resource Allocation to Improve Cohort Representativeness in Participatory Biomedical Datasets

    Authors: Victor Borza, Andrew Estornell, Ellen Wright Clayton, Chien-Ju Ho, Russell Rothman, Yevgeniy Vorobeychik, Bradley Malin

    Abstract: Large participatory biomedical studies, studies that recruit individuals to join a dataset, are gaining popularity and investment, especially for analysis by modern AI methods. Because they purposively recruit participants, these studies are uniquely able to address a lack of historical representation, an issue that has affected many biomedical datasets. In this work, we define representativeness… ▽ More

    Submitted 2 August, 2024; originally announced August 2024.

    Comments: Accepted for publication at the American Medical Informatics Association Annual Symposium 2024, 10 pages, 5 figures

  14. arXiv:2407.00170  [pdf, other

    cs.LG cs.CY

    Dataset Representativeness and Downstream Task Fairness

    Authors: Victor Borza, Andrew Estornell, Chien-Ju Ho, Bradley Malin, Yevgeniy Vorobeychik

    Abstract: Our society collects data on people for a wide range of applications, from building a census for policy evaluation to running meaningful clinical trials. To collect data, we typically sample individuals with the goal of accurately representing a population of interest. However, current sampling processes often collect data opportunistically from data sources, which can lead to datasets that are bi… ▽ More

    Submitted 28 June, 2024; originally announced July 2024.

    Comments: 48 pages, 32 figures

  15. arXiv:2406.07687  [pdf, other

    cs.LG cs.CR

    Adversarial Machine Unlearning

    Authors: Zonglin Di, Sixie Yu, Yevgeniy Vorobeychik, Yang Liu

    Abstract: This paper focuses on the challenge of machine unlearning, aiming to remove the influence of specific training data on machine learning models. Traditionally, the development of unlearning algorithms runs parallel with that of membership inference attacks (MIA), a type of privacy threat to determine whether a data instance was used for training. However, the two strands are intimately connected: o… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  16. arXiv:2406.01917  [pdf, other

    cs.CV cs.AI

    GOMAA-Geo: GOal Modality Agnostic Active Geo-localization

    Authors: Anindya Sarkar, Srikumar Sastry, Aleksis Pirinen, Chongjie Zhang, Nathan Jacobs, Yevgeniy Vorobeychik

    Abstract: We consider the task of active geo-localization (AGL) in which an agent uses a sequence of visual cues observed during aerial navigation to find a target specified through multiple possible modalities. This could emulate a UAV involved in a search-and-rescue operation navigating through an area, observing a stream of aerial images as it goes. The AGL task is associated with two important challenge… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: 23 pages, 17 figures

  17. arXiv:2406.01811  [pdf, other

    cs.CR

    A Game-Theoretic Approach to Privacy-Utility Tradeoff in Sharing Genomic Summary Statistics

    Authors: Tao Zhang, Rajagopal Venkatesaramani, Rajat K. De, Bradley A. Malin, Yevgeniy Vorobeychik

    Abstract: The advent of online genomic data-sharing services has sought to enhance the accessibility of large genomic datasets by allowing queries about genetic variants, such as summary statistics, aiding care providers in distinguishing between spurious genomic variations and those with clinical significance. However, numerous studies have demonstrated that even sharing summary genomic information exposes… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

  18. arXiv:2405.15994  [pdf, ps, other

    cs.LG cs.AI

    Verified Safe Reinforcement Learning for Neural Network Dynamic Models

    Authors: Junlin Wu, Huan Zhang, Yevgeniy Vorobeychik

    Abstract: Learning reliably safe autonomous control is one of the core problems in trustworthy autonomy. However, training a controller that can be formally verified to be safe remains a major challenge. We introduce a novel approach for learning verified safe control policies in nonlinear neural dynamical systems while maximizing overall performance. Our approach aims to achieve safety in the sense of fini… ▽ More

    Submitted 15 November, 2024; v1 submitted 24 May, 2024; originally announced May 2024.

  19. arXiv:2405.14758  [pdf, ps, other

    cs.GT cs.AI cs.LG

    Axioms for AI Alignment from Human Feedback

    Authors: Luise Ge, Daniel Halpern, Evi Micha, Ariel D. Procaccia, Itai Shapira, Yevgeniy Vorobeychik, Junlin Wu

    Abstract: In the context of reinforcement learning from human feedback (RLHF), the reward function is generally derived from maximum likelihood estimation of a random utility model based on pairwise comparisons made by humans. The problem of learning a reward function is one of preference aggregation that, we argue, largely falls within the scope of social choice theory. From this perspective, we can evalua… ▽ More

    Submitted 7 November, 2024; v1 submitted 23 May, 2024; originally announced May 2024.

  20. arXiv:2405.02612  [pdf, other

    cs.LG cs.AI cs.CY stat.ML

    Learning Linear Utility Functions From Pairwise Comparison Queries

    Authors: Luise Ge, Brendan Juba, Yevgeniy Vorobeychik

    Abstract: We study learnability of linear utility functions from pairwise comparison queries. In particular, we consider two learning objectives. The first objective is to predict out-of-sample responses to pairwise comparisons, whereas the second is to approximately recover the true parameters of the utility function. We show that in the passive learning setting, linear utilities are efficiently learnable… ▽ More

    Submitted 19 June, 2024; v1 submitted 4 May, 2024; originally announced May 2024.

    Comments: Submitted to ECAI for review

  21. arXiv:2402.12426  [pdf

    cs.SI cs.CR cs.LG

    Attacks on Node Attributes in Graph Neural Networks

    Authors: Ying Xu, Michael Lanier, Anindya Sarkar, Yevgeniy Vorobeychik

    Abstract: Graphs are commonly used to model complex networks prevalent in modern social media and literacy applications. Our research investigates the vulnerability of these graphs through the application of feature based adversarial attacks, focusing on both decision time attacks and poisoning attacks. In contrast to state of the art models like Net Attack and Meta Attack, which target node attributes and… ▽ More

    Submitted 5 March, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

    Comments: Accepted to AAAI 2024 AICS workshop

  22. arXiv:2402.09290  [pdf, other

    cs.LG cs.AI

    Learning Interpretable Policies in Hindsight-Observable POMDPs through Partially Supervised Reinforcement Learning

    Authors: Michael Lanier, Ying Xu, Nathan Jacobs, Chongjie Zhang, Yevgeniy Vorobeychik

    Abstract: Deep reinforcement learning has demonstrated remarkable achievements across diverse domains such as video games, robotic control, autonomous driving, and drug discovery. Common methodologies in partially-observable domains largely lean on end-to-end learning from high-dimensional observations, such as images, without explicitly reasoning about true state. We suggest an alternative direction, intro… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  23. arXiv:2402.08747  [pdf, other

    cs.GT eess.SY

    Rationality of Learning Algorithms in Repeated Normal-Form Games

    Authors: Shivam Bajaj, Pranoy Das, Yevgeniy Vorobeychik, Vijay Gupta

    Abstract: Many learning algorithms are known to converge to an equilibrium for specific classes of games if the same learning algorithm is adopted by all agents. However, when the agents are self-interested, a natural question is whether agents have a strong incentive to adopt an alternative learning algorithm that yields them greater individual utility. We capture such incentives as an algorithm's rational… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

  24. arXiv:2402.01920  [pdf, other

    cs.LG cs.AI cs.CL

    Preference Poisoning Attacks on Reward Model Learning

    Authors: Junlin Wu, Jiongxiao Wang, Chaowei Xiao, Chenguang Wang, Ning Zhang, Yevgeniy Vorobeychik

    Abstract: Learning reward models from pairwise comparisons is a fundamental component in a number of domains, including autonomous control, conversational agents, and recommendation systems, as part of a broad goal of aligning automated decisions with user preferences. These approaches entail collecting preference information from people, with feedback often provided anonymously. Since preferences are subje… ▽ More

    Submitted 8 October, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

  25. arXiv:2312.14625  [pdf, other

    cs.AI cs.CR cs.LG

    Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks

    Authors: Taha Eghtesad, Sirui Li, Yevgeniy Vorobeychik, Aron Laszka

    Abstract: The increasing reliance of drivers on navigation applications has made transportation networks more susceptible to data-manipulation attacks by malicious actors. Adversaries may exploit vulnerabilities in the data collection or processing of navigation services to inject false information, and to thus interfere with the drivers' route selection. Such attacks can significantly increase traffic cong… ▽ More

    Submitted 6 March, 2024; v1 submitted 22 December, 2023; originally announced December 2023.

  26. arXiv:2312.07389  [pdf

    cs.CV

    Eroding Trust In Aerial Imagery: Comprehensive Analysis and Evaluation Of Adversarial Attacks In Geospatial Systems

    Authors: Michael Lanier, Aayush Dhakal, Zhexiao Xiong, Arthur Li, Nathan Jacobs, Yevgeniy Vorobeychik

    Abstract: In critical operations where aerial imagery plays an essential role, the integrity and trustworthiness of data are paramount. The emergence of adversarial attacks, particularly those that exploit control over labels or employ physically feasible trojans, threatens to erode that trust, making the analysis and mitigation of these attacks a matter of urgency. We demonstrate how adversarial attacks ca… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: Accepted at IEEE AIRP 2023

  27. arXiv:2311.09641  [pdf, other

    cs.AI cs.CL cs.CR cs.HC

    RLHFPoison: Reward Poisoning Attack for Reinforcement Learning with Human Feedback in Large Language Models

    Authors: Jiongxiao Wang, Junlin Wu, Muhao Chen, Yevgeniy Vorobeychik, Chaowei Xiao

    Abstract: Reinforcement Learning with Human Feedback (RLHF) is a methodology designed to align Large Language Models (LLMs) with human preferences, playing an important role in LLMs alignment. Despite its advantages, RLHF relies on human annotators to rank the text, which can introduce potential security vulnerabilities if any adversarial annotator (i.e., attackers) manipulates the ranking score by up-ranki… ▽ More

    Submitted 19 June, 2024; v1 submitted 16 November, 2023; originally announced November 2023.

  28. arXiv:2310.09689  [pdf, other

    cs.AI cs.CV

    A Partially Supervised Reinforcement Learning Framework for Visual Active Search

    Authors: Anindya Sarkar, Nathan Jacobs, Yevgeniy Vorobeychik

    Abstract: Visual active search (VAS) has been proposed as a modeling framework in which visual cues are used to guide exploration, with the goal of identifying regions of interest in a large geospatial area. Its potential applications include identifying hot spots of rare wildlife poaching activity, search-and-rescue scenarios, identifying illegal trafficking of weapons, drugs, or people, and many others. S… ▽ More

    Submitted 7 November, 2023; v1 submitted 14 October, 2023; originally announced October 2023.

    Comments: 26 pages, 20 figures, Accepted to NeurIPS 2023, Code is available at https://github.com/anindyasarkarIITH/PSRL_VAS/

  29. arXiv:2310.09360  [pdf, other

    cs.LG

    Exact Verification of ReLU Neural Control Barrier Functions

    Authors: Hongchao Zhang, Junlin Wu, Yevgeniy Vorobeychik, Andrew Clark

    Abstract: Control Barrier Functions (CBFs) are a popular approach for safe control of nonlinear systems. In CBF-based control, the desired safety properties of the system are mapped to nonnegativity of a CBF, and the control input is chosen to ensure that the CBF remains nonnegative for all time. Recently, machine learning methods that represent CBFs as neural networks (neural control barrier functions, or… ▽ More

    Submitted 13 October, 2023; originally announced October 2023.

  30. arXiv:2309.10092  [pdf, other

    cs.RO cs.AI

    Conformal Temporal Logic Planning using Large Language Models

    Authors: Jun Wang, Jiaming Tong, Kaiyuan Tan, Yevgeniy Vorobeychik, Yiannis Kantaros

    Abstract: This paper addresses planning problems for mobile robots. We consider missions that require accomplishing multiple high-level sub-tasks, expressed in natural language (NL), in a temporal and logical order. To formally define the mission, we treat these sub-tasks as atomic predicates in a Linear Temporal Logic (LTL) formula. We refer to this task specification framework as LTL-NL. Our goal is to de… ▽ More

    Submitted 8 August, 2024; v1 submitted 18 September, 2023; originally announced September 2023.

  31. arXiv:2307.12555  [pdf, ps, other

    cs.LG cs.SI

    Homophily-Driven Sanitation View for Robust Graph Contrastive Learning

    Authors: Yulin Zhu, Xing Ai, Yevgeniy Vorobeychik, Kai Zhou

    Abstract: We investigate adversarial robustness of unsupervised Graph Contrastive Learning (GCL) against structural attacks. First, we provide a comprehensive empirical and theoretical analysis of existing attacks, revealing how and why they downgrade the performance of GCL. Inspired by our analytic results, we present a robust GCL framework that integrates a homophily-driven sanitation view, which can be l… ▽ More

    Submitted 7 June, 2025; v1 submitted 24 July, 2023; originally announced July 2023.

  32. arXiv:2305.19083  [pdf, other

    cs.SI

    Defense Against Shortest Path Attacks

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Identifying shortest paths between nodes in a network is an important task in many applications. Recent work has shown that a malicious actor can manipulate a graph to make traffic between two nodes of interest follow their target path. In this paper, we develop a defense against such attacks by modifying the edge weights that users observe. The defender must balance inhibiting the attacker agains… ▽ More

    Submitted 30 April, 2025; v1 submitted 30 May, 2023; originally announced May 2023.

    Comments: 21 pages, 8 figures, to appear at the 2025 SIAM International Conference on Data Mining

  33. arXiv:2305.06547  [pdf, other

    cs.LG eess.SY

    Neural Lyapunov Control for Discrete-Time Systems

    Authors: Junlin Wu, Andrew Clark, Yiannis Kantaros, Yevgeniy Vorobeychik

    Abstract: While ensuring stability for linear systems is well understood, it remains a major challenge for nonlinear systems. A general approach in such cases is to compute a combination of a Lyapunov function and an associated control policy. However, finding Lyapunov functions for general nonlinear systems is a challenging task. To address this challenge, several methods have been proposed that represent… ▽ More

    Submitted 24 December, 2023; v1 submitted 10 May, 2023; originally announced May 2023.

    Comments: NeurIPS 2023

  34. arXiv:2305.00925  [pdf, other

    cs.CR cs.LG

    IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception

    Authors: Joseph Bao, Murat Kantarcioglu, Yevgeniy Vorobeychik, Charles Kamhoua

    Abstract: Over the years, honeypots emerged as an important security tool to understand attacker intent and deceive attackers to spend time and resources. Recently, honeypots are being deployed for Internet of things (IoT) devices to lure attackers, and learn their behavior. However, most of the existing IoT honeypots, even the high interaction ones, are easily detected by an attacker who can observe honeyp… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: FLAIRS-36

  35. arXiv:2303.14332  [pdf, other

    cs.AI

    Using Simple Incentives to Improve Two-Sided Fairness in Ridesharing Systems

    Authors: Ashwin Kumar, Yevgeniy Vorobeychik, William Yeoh

    Abstract: State-of-the-art order dispatching algorithms for ridesharing batch passenger requests and allocate them to a fleet of vehicles in a centralized manner, optimizing over the estimated values of each passenger-vehicle matching using integer linear programming (ILP). Using good estimates of future values, such ILP-based approaches are able to significantly increase the service rates (percentage of re… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: Accepted for publication at the International Conference on Automated Planning and Scheduling (ICAPS) 2023

  36. arXiv:2302.02208  [pdf, ps, other

    cs.LG

    Certified Robust Control under Adversarial Perturbations

    Authors: Jinghan Yang, Hunmin Kim, Wenbin Wan, Naira Hovakimyan, Yevgeniy Vorobeychik

    Abstract: Autonomous systems increasingly rely on machine learning techniques to transform high-dimensional raw inputs into predictions that are then used for decision-making and control. However, it is often easy to maliciously manipulate such inputs and, as a result, predictions. While effective techniques have been proposed to certify the robustness of predictions to adversarial input perturbations, such… ▽ More

    Submitted 4 February, 2023; originally announced February 2023.

  37. arXiv:2302.01763  [pdf, other

    cs.CR cs.AI

    Enabling Trade-offs in Privacy and Utility in Genomic Data Beacons and Summary Statistics

    Authors: Rajagopal Venkatesaramani, Zhiyu Wan, Bradley A. Malin, Yevgeniy Vorobeychik

    Abstract: The collection and sharing of genomic data are becoming increasingly commonplace in research, clinical, and direct-to-consumer settings. The computational protocols typically adopted to protect individual privacy include sharing summary statistics, such as allele frequencies, or limiting query responses to the presence/absence of alleles of interest using web-services called Beacons. However, even… ▽ More

    Submitted 11 January, 2023; originally announced February 2023.

  38. arXiv:2212.14115  [pdf, ps, other

    cs.LG cs.AI

    Certifying Safety in Reinforcement Learning under Adversarial Perturbation Attacks

    Authors: Junlin Wu, Hussein Sibai, Yevgeniy Vorobeychik

    Abstract: Function approximation has enabled remarkable advances in applying reinforcement learning (RL) techniques in environments with high-dimensional inputs, such as images, in an end-to-end fashion, mapping such inputs directly to low-level control. Nevertheless, these have proved vulnerable to small adversarial input perturbations. A number of approaches for improving or certifying robustness of end-t… ▽ More

    Submitted 28 December, 2022; originally announced December 2022.

  39. arXiv:2211.15788  [pdf, other

    cs.CV cs.AI

    A Visual Active Search Framework for Geospatial Exploration

    Authors: Anindya Sarkar, Michael Lanier, Scott Alfeld, Jiarui Feng, Roman Garnett, Nathan Jacobs, Yevgeniy Vorobeychik

    Abstract: Many problems can be viewed as forms of geospatial search aided by aerial imagery, with examples ranging from detecting poaching activity to human trafficking. We model this class of problems in a visual active search (VAS) framework, which has three key inputs: (1) an image of the entire search area, which is subdivided into regions, (2) a local search function, which determines whether a previou… ▽ More

    Submitted 29 October, 2023; v1 submitted 28 November, 2022; originally announced November 2022.

    Comments: Accepted to WACV 2024, 24 pages, 18 figures, Code is available at: https://github.com/anindyasarkarIITH/VAS

  40. arXiv:2211.11141  [pdf, other

    cs.SI

    Attacking Shortest Paths by Cutting Edges

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Identifying shortest paths between nodes in a network is a common graph analysis problem that is important for many applications involving routing of resources. An adversary that can manipulate the graph structure could alter traffic patterns to gain some benefit (e.g., make more money by directing traffic to a toll road). This paper presents the Force Path Cut problem, in which an adversary remov… ▽ More

    Submitted 20 November, 2022; originally announced November 2022.

    Comments: 37 pages, 11 figures; Extended version of arXiv:2104.03761

  41. arXiv:2209.03540  [pdf, other

    cs.LG cs.AI cs.CR

    Reward Delay Attacks on Deep Reinforcement Learning

    Authors: Anindya Sarkar, Jiarui Feng, Yevgeniy Vorobeychik, Christopher Gill, Ning Zhang

    Abstract: Most reinforcement learning algorithms implicitly assume strong synchrony. We present novel attacks targeting Q-learning that exploit a vulnerability entailed by this assumption by delaying the reward signal for a limited time period. We consider two types of attack goals: targeted attacks, which aim to cause a target policy to be learned, and untargeted attacks, which simply aim to induce a polic… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: 20 pages, 9 figures, Conference on Decision and Game Theory for Security

  42. arXiv:2206.10057  [pdf, other

    cs.LG

    Robust Deep Reinforcement Learning through Bootstrapped Opportunistic Curriculum

    Authors: Junlin Wu, Yevgeniy Vorobeychik

    Abstract: Despite considerable advances in deep reinforcement learning, it has been shown to be highly vulnerable to adversarial perturbations to state observations. Recent efforts that have attempted to improve adversarial robustness of reinforcement learning can nevertheless tolerate only very small perturbations, and remain fragile as perturbation size increases. We propose Bootstrapped Opportunistic Adv… ▽ More

    Submitted 9 January, 2023; v1 submitted 20 June, 2022; originally announced June 2022.

    Comments: ICML 2022

  43. arXiv:2205.00102  [pdf, other

    cs.GT

    Manipulating Elections by Changing Voter Perceptions

    Authors: Junlin Wu, Andrew Estornell, Lecheng Kong, Yevgeniy Vorobeychik

    Abstract: The integrity of elections is central to democratic systems. However, a myriad of malicious actors aspire to influence election outcomes for financial or political benefit. A common means to such ends is by manipulating perceptions of the voting public about select candidates, for example, through misinformation. We present a formal model of the impact of perception manipulation on election outcom… ▽ More

    Submitted 17 June, 2022; v1 submitted 29 April, 2022; originally announced May 2022.

    Comments: IJCAI 2022

  44. arXiv:2204.04251  [pdf, ps, other

    cs.GT econ.TH

    A Rotating Proposer Mechanism for Team Formation

    Authors: Jian Low, Chen Hajaj, Yevgeniy Vorobeychik

    Abstract: We present a rotating proposer mechanism for team formation, which implements a Pareto efficient subgame perfect Nash equilibrium of an extensive-form team formation game.

    Submitted 8 April, 2022; originally announced April 2022.

  45. arXiv:2202.14010   

    cs.CR cs.AI cs.GT cs.LG

    Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop at AAAI 2022

    Authors: James Holt, Edward Raff, Ahmad Ridley, Dennis Ross, Arunesh Sinha, Diane Staheli, William Streilen, Milind Tambe, Yevgeniy Vorobeychik, Allan Wollaber

    Abstract: The workshop will focus on the application of AI to problems in cyber security. Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities. Additionally, adversaries continue to develop new attacks. Hence, AI methods are required to understand and protect the cyber domain. These challenges are widely studied in enterprise networks, but there are many gaps… ▽ More

    Submitted 1 March, 2022; v1 submitted 28 February, 2022; originally announced February 2022.

  46. arXiv:2201.12408  [pdf, other

    cs.LG

    Networked Restless Multi-Armed Bandits for Mobile Interventions

    Authors: Han-Ching Ou, Christoph Siebenbrunner, Jackson Killian, Meredith B Brooks, David Kempe, Yevgeniy Vorobeychik, Milind Tambe

    Abstract: Motivated by a broad class of mobile intervention problems, we propose and study restless multi-armed bandits (RMABs) with network effects. In our model, arms are partially recharging and connected through a graph, so that pulling one arm also improves the state of neighboring arms, significantly extending the previously studied setting of fully recharging bandits with no network effects. In mobil… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

  47. arXiv:2112.13301  [pdf, other

    cs.CR q-bio.GN

    Defending Against Membership Inference Attacks on Beacon Services

    Authors: Rajagopal Venkatesaramani, Zhiyu Wan, Bradley A. Malin, Yevgeniy Vorobeychik

    Abstract: Large genomic datasets are now created through numerous activities, including recreational genealogical investigations, biomedical research, and clinical care. At the same time, genomic data has become valuable for reuse beyond their initial point of collection, but privacy concerns often hinder access. Over the past several years, Beacon services have emerged to broaden accessibility to such data… ▽ More

    Submitted 25 December, 2021; originally announced December 2021.

  48. arXiv:2112.02746  [pdf, other

    cs.MA cs.CY cs.GT cs.LG

    Unfairness Despite Awareness: Group-Fair Classification with Strategic Agents

    Authors: Andrew Estornell, Sanmay Das, Yang Liu, Yevgeniy Vorobeychik

    Abstract: The use of algorithmic decision making systems in domains which impact the financial, social, and political well-being of people has created a demand for these decision making systems to be "fair" under some accepted notion of equity. This demand has in turn inspired a large body of work focused on the development of fair learning algorithms which are then used in lieu of their conventional counte… ▽ More

    Submitted 5 December, 2021; originally announced December 2021.

  49. arXiv:2110.11411  [pdf, other

    cs.CV cs.AI cs.CR

    PROVES: Establishing Image Provenance using Semantic Signatures

    Authors: Mingyang Xie, Manav Kulshrestha, Shaojie Wang, Jinghan Yang, Ayan Chakrabarti, Ning Zhang, Yevgeniy Vorobeychik

    Abstract: Modern AI tools, such as generative adversarial networks, have transformed our ability to create and modify visual data with photorealistic results. However, one of the deleterious side-effects of these advances is the emergence of nefarious uses in manipulating information in visual data, such as through the use of deep fakes. We propose a novel architecture for preserving the provenance of seman… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

  50. arXiv:2110.04321  [pdf, other

    cs.GT cs.AI cs.LG cs.MA

    Computing an Optimal Pitching Strategy in a Baseball At-Bat

    Authors: Connor Douglas, Everett Witt, Mia Bendy, Yevgeniy Vorobeychik

    Abstract: The field of quantitative analytics has transformed the world of sports over the last decade. To date, these analytic approaches are statistical at their core, characterizing what is and what was, while using this information to drive decisions about what to do in the future. However, as we often view team sports, such as soccer, hockey, and baseball, as pairwise win-lose encounters, it seems natu… ▽ More

    Submitted 8 October, 2021; originally announced October 2021.